Introduction to Mobile Computing 1 Presentation Outline What is - - PowerPoint PPT Presentation

introduction to mobile computing
SMART_READER_LITE
LIVE PREVIEW

Introduction to Mobile Computing 1 Presentation Outline What is - - PowerPoint PPT Presentation

Introduction to Mobile Computing 1 Presentation Outline What is mobile computing? Comparison to wired networks Why go mobile? Types of wireless devices Mobile objects Moving object databases (MOD) Query language


slide-1
SLIDE 1

Introduction to Mobile Computing

1

slide-2
SLIDE 2

Presentation Outline

  • What is mobile computing?
  • Comparison to wired networks
  • Why go mobile?
  • Types of wireless devices
  • Mobile objects
  • Moving object databases (MOD)
  • Query language for MOD
  • Applications of mobile computing
  • Challenges
  • Future of mobile computing
  • Conclusion

2

slide-3
SLIDE 3

What Is Mobile Computing?

  • What is computing?

Operation of computers (according to oxfords advance learner’s dictionary)

  • What is the mobile?

That someone /something can move or be moved easily and quickly from place to place

  • What is mobile computing?

Users with portable computers still have network connections while they move

3

slide-4
SLIDE 4

What Is Mobile Computing? (Cont.)

  • Is using a digital camera “Mobile

Computing”, or using an MP3 player or handheld computer (e.g. 3Com’s Palm Pilot

  • r Compaq’s iPAQ 3660)?

4

slide-5
SLIDE 5

What Is Mobile Computing? (Cont.)

  • A simple definition could be:

Mobile Computing is using a computer (of one kind or another) while on the move

  • Another definition could be:

Mobile Computing is when a (work) process is moved from a normal fixed position to a more dynamic position.

  • A third definition could be:

Mobile Computing is when a work process is carried

  • ut somewhere where it was not previously possible.

5

slide-6
SLIDE 6

What Is Mobile Computing? (Cont.)

  • Mobile Computing is an umbrella term

used to describe technologies that enable people to access network services anyplace, anytime, and anywhere.

6

slide-7
SLIDE 7

Comparison to Wired Net.

  • Wired Networks
  • high bandwidth
  • low bandwidth

variability

  • can listen on wire
  • high power machines
  • high resource machines
  • need physical

access(security)

  • low delay
  • connected operation
  • Mobile Networks
  • low bandwidth
  • high bandwidth

variability

  • hidden terminal problem
  • low power machines
  • low resource machines
  • need proximity
  • higher delay
  • disconnected operation

7

slide-8
SLIDE 8

Why Go Mobile?

  • Enable anywhere/anytime connectivity
  • Bring computer communications to areas

without pre-existing infrastructure

  • Enable mobility
  • Enable new applications
  • An exciting new research area

8

slide-9
SLIDE 9

Types of Wireless Devices

  • Laptops
  • Palmtops
  • PDAs
  • Cell phones
  • Pagers
  • Sensors

9

slide-10
SLIDE 10

Mobile Objects

  • A mobile object is

some code that carries a state

10

slide-11
SLIDE 11

Mobile Objects (Cont.)

  • A mobile object is

some code that carries a state

  • that lives on a host

11

slide-12
SLIDE 12

Mobile Objects (Cont.)

  • A mobile object is

some code that carries a state

  • Lives in a host
  • That visits places

12

slide-13
SLIDE 13

Mobile Objects (Cont.)

  • A mobile object is

some code that carries a state

  • Lives in a host
  • That visits places
  • which is let in when

trusted

13

slide-14
SLIDE 14

Mobile Objects (Cont.)

  • A mobile object is

some code that carries a state

  • Lives in a host
  • That visits places
  • which is let in when

trusted

  • and barred when

untrusted

14

slide-15
SLIDE 15

Mobile Objects (Cont.)

  • A mobile object is some

code that carries a state

  • Lives in a host
  • That visits places
  • which is let in when

trusted

  • and barred when

untrusted

  • and will refuse to go to

untrustworthy places

15

slide-16
SLIDE 16

Mobile Objects (Cont.)

  • Mobile objects can

talk to their friends

16

slide-17
SLIDE 17

Mobile Objects (Cont.)

  • Mobile objects can

talk to their friends

  • but only by co-
  • peration of the

hosts

17

slide-18
SLIDE 18

Moving Object Databases (MOD)

  • Deals with Mobile Objects whose

geometry, position changes over time

  • Traditional DBMS alone is incapable

for this purpose

  • MOD is built on top of existing DBMS

to support a critical set of capabilities

18

slide-19
SLIDE 19

Moving Object Databases (MOD) (Cont.)

  • DOMINO (Databases for Moving

Objects Tracking) Approach

  • System Architecture

19

DOMINO ArcView GIS Informix DBMS

slide-20
SLIDE 20

Moving Object Databases (MOD) (Cont.)

  • Omnitracs
  • developed by Qualcomm
  • Is a commercial system used by the

transportation industry

  • Provides location management by connecting

vehicles, via satellites, to company DB

  • Vehicles are equipped with GPS, and they they

automatically and periodically report their location

20

slide-21
SLIDE 21

Query Language for MOD

  • Regular query language (SQL) is

nontemporal

  • For MOD we need Spatial and Temporal

Query language

  • “Where is the nearest station?”
  • “What is the distance of the closest

taxicab?”

21

slide-22
SLIDE 22

Query Language for MOD (Cont.)

  • Some proposed query language:
  • Future Temporal Logic (FTL)
  • MobSQL
  • SQL like query languages with specific

predicates and operators to address temporal issues

22

slide-23
SLIDE 23

Query Language for MOD (Cont.)

  • What is the nearest station?

SELECT station.name, station.address FROM station in Stations WHERE NEAREST (HERE,station);

  • “At what time truck 12A arrive to Windsor ”

SELECT t FROM v in Trucks, c in Cities WHERE v WITHIN(t) c and v.id = 12A and c.name=Windsor

23

slide-24
SLIDE 24

Applications of Mobile Computing

  • Emergency services

24

slide-25
SLIDE 25

Applications of Mobile Computing (Cont.)

  • For Estate Agents
  • In courts
  • In companies
  • Stock Information Collection/Control
  • Credit Card Verification
  • Taxi/Truck Dispatch
  • Electronic Mail/Paging

25

slide-26
SLIDE 26

Challenges

  • Disconnection
  • Low bandwidth
  • High bandwidth variability
  • Low power and resources
  • Security risks
  • Wide variety terminals and devices with

different capabilities

  • Device attributes
  • Fit more functionality into single, smaller

device

26

slide-27
SLIDE 27

Future of Mobile Computing

  • Use of Artificial Intelligence
  • Integrated Circuitry -> Compact Size
  • Increases in Computer Processor

speeds

27

slide-28
SLIDE 28

Conclusion

  • Mobile computing has severe

limitations

  • however, it is far from impossible, and

technology improves all the time

  • Lots of challenges
  • some have (good) solutions, many
  • thers are still waiting to be solved

28

slide-29
SLIDE 29

References

  • Papers:
  • “Moving Object Databases: Issues and Solution” by Ouri Wolfson, Bo Xu,

Sam Chaamberlain and Liqin Jiang

  • “DOMINO: Databases for Moving Objects Traking” by Ouri Wolfson, Bo

Xu, Sam Chaamberlain, Liqin Jiang and Prasad Sistla

  • “MobSQL, An SQL Like Query Language for Mobile Objets Databases”

by Ahmed Lbath and Mourad Ouziri

  • WWW Links:
  • http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/ vk5/report.html
  • http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol1/vk5/article1.html
  • http://www.cs.ucsb.edu/~ebelding/courses/284/w04/slides/intro.pdf
  • http://www.ansa.co.uk/ANSATech/ANSAhtml/98-

ansa/external/9807tb/9807mose.pdf

  • http://www.danishtechnology.dk/it/9238

29

slide-30
SLIDE 30

Mobile IP

slide-31
SLIDE 31
  • Mobile IP is a proposed standard protocol

that builds on the Internet Protocol for packet routing and delivery by making mobility transparent to applications and higher level protocols like TCP.

  • Changed perceptions of the Internet due to

large variety of wireless devices offering IP connectivity, such as PDAs, handhelds, and digital cellular phones.

Motivation

slide-32
SLIDE 32

Motivation

  • Without specific support, delivery not possible for

mobile nodes away from its home IP subnet (because routing based on the network prefix and destn IP addr).

  • Cannot change IP address on moving to new IP-

subnet (because cannot maintain tpt/higher level connections).

slide-33
SLIDE 33

Home Agent Home Subnet Mobile Node

HOME ADDRESS (Will never change)

Foreign Subnet Home Agent Correspondent Node

In Foreign Subnet, Mob Node acquires a CARE-OF ADDRESS*

LINK-LOCAL ADDRESS

slide-34
SLIDE 34

Binding

Home Address Care-of Address association

Home Registration

Home Agent

Mobile Node

Primary Care-of Address maintained in Binding-Cache* till Life-Time expires. Used for Tunneling by employing Encapsulation

* For route optimisation

Avoid congestion at HA Minimise N/W load Reduction of impact of failure of HA Foriegn Subnet

slide-35
SLIDE 35

Binding : Issues

  • Registration. When node acquires a new

care-of address.

  • Intimation. Node must intimate to

– HA – Correspondent node.

  • Binding Ack. Node may expect an Ack
  • Life-time. Node should know its likely time
  • f association.
  • Identification of Binding Updates.
slide-36
SLIDE 36

Binding Update

Option Type A H L RESUME LIFE TIME IDENTIFICATION CARE-OF ADDRESS Node maintains a counter and increments it as and when it acquires a c/o addr Binding update is identified by this field. Care of address acquired by node is reflected in this field Binding update survives for the time specified as Life Time Distinguishing Link-Local address H=1 : Request to serve as Home Agent L=1 : Link-Local Address included A=1 : Ack reqd. HOME LINK LEVEL ADDRESS Option Length

slide-37
SLIDE 37

Binding Ack

Option Type Option Length IDENTIFICATION Refresh Life Time Field copied from received Binding-update Life -time for which Binding will be cached

slide-38
SLIDE 38

Mobile Node Operation

  • IP decapsulation.
  • Send Binding updates.
  • Receive Binding Ack.
  • Keep track of Nodes (because of Life-time).
  • Send Binding Updates using Routing

Header.

slide-39
SLIDE 39

Correspondent Node Ops

  • Process received Binding Updates.
  • Send Binding-Ack.
  • Maintain Binding-Cache.
  • Maint Security Association.
slide-40
SLIDE 40

Packet Delivery

Entries in Binding- Cache Yes No Send to HA Using Normal Procedure Send Directly to Care-of Addr ICMP Error Message Recd Yes Delete entry in Binding -Cache Wait for fresh Binding

slide-41
SLIDE 41

Home Agent Ops

  • Send Binding-Ack to Binding Updates.
  • Encapsulate Pkts for tunneling.
  • Neighbour Advertisement.
  • Proxy Neighbour Advertisement.
  • Home Agent Discovery.
  • Handle Returned ICMP errors.
slide-42
SLIDE 42

Issues

  • Encapsulation.
  • Movement Detection.
  • Security.
slide-43
SLIDE 43

IP Encapsulation within IP

  • Required when HA receives

packet for a node which has moved outside home territory.

slide-44
SLIDE 44

Tunneling

  • This method of sending IP datagrams is called

‘tunneling’

  • End-points of tunnel are called encapsulator &

decapsulator

  • Flow of packets :

src encapsulator decapsulator destn

  • Mobile node is attached to a foreign network.
  • Need to deliver packets addressed to mobile node,

to an agent that can deliver datagrams to mobile node at current location

  • The datagrams are sent over the tunnel
  • Multiple src-dest pairs can share the same tunnel
slide-45
SLIDE 45

Encapsulated Pkt

Orginal pkt

  • Encap. pkt
  • | Outer IP Header |
  • | IP Header | | IP Header |
  • ------------------- --------------------------

| IP Payload | | IP Payload |

slide-46
SLIDE 46

IP header fields

  • Src. and dest. addresses are those of end points
  • f tunnel
  • Internet header length :

– Length of outer header in 32 bit words

  • Total length :

– Measures length of entire encapsulated IP datagram

  • Don’t fragment bit :

– Copied from inner header if set

  • Time to live TTL:

– Appr time to deliver to tunnel exit

slide-47
SLIDE 47

Routing failures

  • If IP src addr of datagram matches that of the

receiving router itself, then discard packet

  • If IP src addr matches that of the tunnel exit

point, then discard packet

slide-48
SLIDE 48

ICMP messages from the tunnel

  • Encapsulator may receive ICMP messages from any

intermediate router in the tunnel other than exit

  • Some typical messages received are shown
  • Network unreachable:

– Return dest unreachable message to org sender

  • Host unreachable:

– Return host unreachable message

  • Datagram too big:

– Relay ICMP datagram too big to org sender

  • Source route failed:

– Handled by encapsulator itself and MUST NOT relay message to org sender

slide-49
SLIDE 49

ICMP error messages (contd.)

  • Source quench

– SHOULD NOT relay msg to org sender , SHOULD activate congestion control mechanism

  • Time exceeded

– MUST be reported to org sender as host unreachable message

slide-50
SLIDE 50

Tunnel management

  • ICMP requires routers to return 8 bytes of datagram

beyond IP header

– This may not contain the org datagram

  • So not always possible for encap to relay ICMP

messages from interior of tunnel to org sender

  • Encap maintains “soft state” about tunnel

– MTU of the tunnel – TTL (path length) of tunnel – Reachability of the tunnel

  • Encap updates soft state based on ICMP msgs

received

slide-51
SLIDE 51

Tunnel management (contd.)

  • For eg. If TTL of recvd packet is less than the

TTL value in soft state, then return error message to sender

  • If size of recvd datagram is bigger than MTU of

tunnel and if “don’t fragment” bit set, then return datagram too big message to sender.

slide-52
SLIDE 52

Disadvantages

  • Encapsulated datagrams are larger than

source routed datagrams, because of added header

  • Encapsulation cannot be used unless it is

known that the node at tunnel exit can decapsulate the datagram

slide-53
SLIDE 53

Mobile Computing

Neighbor Discovery for IP Version 6 (IPv6)

slide-54
SLIDE 54

Issues : Movement Detection

  • Neighbour Discovery Protocol. How does a

Node know its likely Link-Local address provider?

  • Router Discovery. How to discover a HA?

– Router Solicited Message. – Unsolicited Periodic Message.

  • Neighbour Unreachability Detection. When

is Node/HA unreachable and How to detect?

slide-55
SLIDE 55

Issues : Movement Detection

  • Hand-off with overlapping cells. How does

a hand-off with overlapping cells should be done?

  • Router assisted Hand-off. How can a Router

assist in Hand-off.

  • Renumbering the Home Subnet. What if the

Home Subnet itself gets changed?

slide-56
SLIDE 56

Movement Detection

  • Neighbor Discovery Protocol

– Router Discovery – Neighbor Unreachability Detection

slide-57
SLIDE 57

Router Discovery

R O U T E R

Router Solicitation Messages

N O D E

Router Advertisement Messages

Default Router List Prefix List ( care-of-address )

Hosts should ignore Validation of Router Solicitation Messages Validation of Router Advertisement Messages Sending Unsolicited Router Advertisements (random time) Ceasing To Be An Advertising Interface

slide-58
SLIDE 58

Neighbor Unreachability Detection

N O D E

Neighbor Advertisement Messages Sending Neighbor Solicitation Messages

N O D E

Receipt of any IPv6 packets from its link layer address Router Advertisement Messages

Neighbor Cache IsRouter Flag

Receipt of Neighbor Solicitation Messages Receipt of Neighbor Advertisement Messages

slide-59
SLIDE 59
  • Message Validation
  • The IP Hop Limit field has a value of 255, i.e., the packet

could not possibly have been forwarded by a router

  • If the message includes an IP Authentication Header, the

message authenticates correctly

  • ICMP Checksum is valid
  • ICMP Code is 0
  • ICMP length (derived from the IP length) is 8 or more
  • All included options have a length that is greater than

zero.

  • If the IP source address is the unspecified address, there is

no source link-layer address option in the message.

ADDRESS RESOLUTION AND NEIGHBOR UNREACHABILITY DETECTION

Back

slide-60
SLIDE 60

Security Issues

  • Session Keys with local routers.

– Key Distribution – Diffie-Hellman Key exchange algorithm.

  • Source Address filtering by firewalls.
slide-61
SLIDE 61

Security Considerations

  • Security considerations are important
  • Wireless links are vulnerable to

– passive eavesdropping – Active replay attacks – Other attacks

slide-62
SLIDE 62

Message Authentication Codes

  • Authentication required between home

agent and mobile node

– Default algorithm is keyed MD5 – Key size 128 bits – Data should be hashed using this key – Foreign agents need to support authentication using this method

  • Other algorithms also can be applied
slide-63
SLIDE 63

Areas of security concern

  • Tunneling mobile node’s traffic to its care-
  • f-address
  • ARP is also not authenticated
  • Communication between foreign and home

agent need secured to avoid illegal users and for billing purposes

slide-64
SLIDE 64

MD5 algorithm

  • Input: message of arbitrary length
  • Output: 128 bit ‘fingerprint’ or ‘Message

Digest’

  • Computationally infeasible to produce two

messages with same message digest

  • Reliable than checksum
slide-65
SLIDE 65

Privacy issues

  • Encryption required for sensitive data
  • Absolute location policy

– Mobile node can create tunnel to home agent – Datagram look like to be sent by home agent – Location tracking is difficult

slide-66
SLIDE 66

Replay protection for registration requests

  • Home agent need to verify message is from

node, not replayed by an attacker from previous registration

  • Two methods

– Timestamps (mandatory) – Nonces (optional)

slide-67
SLIDE 67

Protection using timestamps

  • Two nodes must have adequately

synchronized TOD clock

  • Current time sent with request
  • Default value 7 sec. time difference
  • Time synchronization messages should be

protected

slide-68
SLIDE 68

Protection using nonces

  • Node A includes new random number in

every message to B

  • A checks if B returns same number back in

next message

  • Authentication code is used to protect

against alteration

  • Self synchronizing: if registration fails, new

nonce is sent in reply

slide-69
SLIDE 69

Problem Areas

  • Routing inefficiencies. Problem of Triangle

Routing.

  • Security issues. Requirement of making

Mobile IP coexist with the security features coming into use within the Internet. Firewalls, in particular, cause difficulty for Mobile IP because they block all classes of incoming packets that do not meet specified criteria.

slide-70
SLIDE 70

Problem Areas

  • User perceptions of reliability. The design
  • f Mobile IP is founded on the premise that

connections based on TCP should survive cell changes. However, opinion is not unanimous on the need for this feature.

  • Competition from other protocols. Mobile

IP may well face competition from alternative tunneling protocols such as PPTP and L2TP.

slide-71
SLIDE 71

References

URLs

  • http://www.ietf.org/html.charters/mobileip-

charter.html

  • http://www.computer.org/internet/v2n1/

perkins.htm

Drafts :

  • Route Optimization in Mobile IP
  • Mobility Support in IPv6
  • IP Mobility Support for IPv4, revised
slide-72
SLIDE 72

References

Request For Comments

  • IP Encapsulation within IP (RFC 2003)
  • IP Mobility Support (RFC 2002)
  • Neighbour Discovery (RFC 2461)

URLs

  • http://www.ietf.org/html.charters/mobileip-

charter.html