Introduction to Mobile Computing
1
Introduction to Mobile Computing 1 Presentation Outline What is - - PowerPoint PPT Presentation
Introduction to Mobile Computing 1 Presentation Outline What is mobile computing? Comparison to wired networks Why go mobile? Types of wireless devices Mobile objects Moving object databases (MOD) Query language
1
2
Operation of computers (according to oxfords advance learner’s dictionary)
That someone /something can move or be moved easily and quickly from place to place
Users with portable computers still have network connections while they move
3
Computing”, or using an MP3 player or handheld computer (e.g. 3Com’s Palm Pilot
4
Mobile Computing is using a computer (of one kind or another) while on the move
Mobile Computing is when a (work) process is moved from a normal fixed position to a more dynamic position.
Mobile Computing is when a work process is carried
5
used to describe technologies that enable people to access network services anyplace, anytime, and anywhere.
6
variability
access(security)
variability
7
without pre-existing infrastructure
8
9
some code that carries a state
10
some code that carries a state
11
some code that carries a state
12
some code that carries a state
trusted
13
some code that carries a state
trusted
untrusted
14
code that carries a state
trusted
untrusted
untrustworthy places
15
talk to their friends
16
talk to their friends
hosts
17
18
19
DOMINO ArcView GIS Informix DBMS
transportation industry
vehicles, via satellites, to company DB
automatically and periodically report their location
20
nontemporal
Query language
taxicab?”
21
22
SELECT station.name, station.address FROM station in Stations WHERE NEAREST (HERE,station);
SELECT t FROM v in Trucks, c in Cities WHERE v WITHIN(t) c and v.id = 12A and c.name=Windsor
23
24
25
different capabilities
device
26
27
28
Sam Chaamberlain and Liqin Jiang
Xu, Sam Chaamberlain, Liqin Jiang and Prasad Sistla
by Ahmed Lbath and Mourad Ouziri
ansa/external/9807tb/9807mose.pdf
29
that builds on the Internet Protocol for packet routing and delivery by making mobility transparent to applications and higher level protocols like TCP.
large variety of wireless devices offering IP connectivity, such as PDAs, handhelds, and digital cellular phones.
mobile nodes away from its home IP subnet (because routing based on the network prefix and destn IP addr).
subnet (because cannot maintain tpt/higher level connections).
Home Agent Home Subnet Mobile Node
HOME ADDRESS (Will never change)
Foreign Subnet Home Agent Correspondent Node
In Foreign Subnet, Mob Node acquires a CARE-OF ADDRESS*
LINK-LOCAL ADDRESS
Home Address Care-of Address association
Home Agent
Mobile Node
Primary Care-of Address maintained in Binding-Cache* till Life-Time expires. Used for Tunneling by employing Encapsulation
* For route optimisation
Avoid congestion at HA Minimise N/W load Reduction of impact of failure of HA Foriegn Subnet
care-of address.
– HA – Correspondent node.
Option Type A H L RESUME LIFE TIME IDENTIFICATION CARE-OF ADDRESS Node maintains a counter and increments it as and when it acquires a c/o addr Binding update is identified by this field. Care of address acquired by node is reflected in this field Binding update survives for the time specified as Life Time Distinguishing Link-Local address H=1 : Request to serve as Home Agent L=1 : Link-Local Address included A=1 : Ack reqd. HOME LINK LEVEL ADDRESS Option Length
Option Type Option Length IDENTIFICATION Refresh Life Time Field copied from received Binding-update Life -time for which Binding will be cached
Header.
Entries in Binding- Cache Yes No Send to HA Using Normal Procedure Send Directly to Care-of Addr ICMP Error Message Recd Yes Delete entry in Binding -Cache Wait for fresh Binding
‘tunneling’
decapsulator
src encapsulator decapsulator destn
to an agent that can deliver datagrams to mobile node at current location
Orginal pkt
| IP Payload | | IP Payload |
– Length of outer header in 32 bit words
– Measures length of entire encapsulated IP datagram
– Copied from inner header if set
– Appr time to deliver to tunnel exit
receiving router itself, then discard packet
point, then discard packet
intermediate router in the tunnel other than exit
– Return dest unreachable message to org sender
– Return host unreachable message
– Relay ICMP datagram too big to org sender
– Handled by encapsulator itself and MUST NOT relay message to org sender
– SHOULD NOT relay msg to org sender , SHOULD activate congestion control mechanism
– MUST be reported to org sender as host unreachable message
beyond IP header
– This may not contain the org datagram
messages from interior of tunnel to org sender
– MTU of the tunnel – TTL (path length) of tunnel – Reachability of the tunnel
received
TTL value in soft state, then return error message to sender
tunnel and if “don’t fragment” bit set, then return datagram too big message to sender.
source routed datagrams, because of added header
known that the node at tunnel exit can decapsulate the datagram
Node know its likely Link-Local address provider?
– Router Solicited Message. – Unsolicited Periodic Message.
is Node/HA unreachable and How to detect?
a hand-off with overlapping cells should be done?
assist in Hand-off.
Home Subnet itself gets changed?
– Router Discovery – Neighbor Unreachability Detection
R O U T E R
Router Solicitation Messages
N O D E
Router Advertisement Messages
Default Router List Prefix List ( care-of-address )
Hosts should ignore Validation of Router Solicitation Messages Validation of Router Advertisement Messages Sending Unsolicited Router Advertisements (random time) Ceasing To Be An Advertising Interface
N O D E
Neighbor Advertisement Messages Sending Neighbor Solicitation Messages
N O D E
Receipt of any IPv6 packets from its link layer address Router Advertisement Messages
Neighbor Cache IsRouter Flag
Receipt of Neighbor Solicitation Messages Receipt of Neighbor Advertisement Messages
could not possibly have been forwarded by a router
message authenticates correctly
zero.
no source link-layer address option in the message.
ADDRESS RESOLUTION AND NEIGHBOR UNREACHABILITY DETECTION
Back
– Key Distribution – Diffie-Hellman Key exchange algorithm.
– passive eavesdropping – Active replay attacks – Other attacks
agent and mobile node
– Default algorithm is keyed MD5 – Key size 128 bits – Data should be hashed using this key – Foreign agents need to support authentication using this method
agent need secured to avoid illegal users and for billing purposes
Digest’
messages with same message digest
– Mobile node can create tunnel to home agent – Datagram look like to be sent by home agent – Location tracking is difficult
node, not replayed by an attacker from previous registration
– Timestamps (mandatory) – Nonces (optional)
synchronized TOD clock
protected
every message to B
next message
against alteration
nonce is sent in reply
Routing.
Mobile IP coexist with the security features coming into use within the Internet. Firewalls, in particular, cause difficulty for Mobile IP because they block all classes of incoming packets that do not meet specified criteria.
connections based on TCP should survive cell changes. However, opinion is not unanimous on the need for this feature.
IP may well face competition from alternative tunneling protocols such as PPTP and L2TP.
URLs
charter.html
perkins.htm
URLs
charter.html