Vous êtes sur la page 1sur 11

Paper Presentation

Mobile Networking

CS II Year

2009
By
M. PackiaLakshmi.(01808132028)
P.Sahana.( 01808132037)

Anna University Thirukuvalai


Campus
Mobile Networking

Contents
1.
2.
3.
4.
5.
6.
7.

Introduction:

Introduction.
Generations of Mobile Network
Applications Of Mobile Networking
Benefits Of Mobile Networking
Mobile Network Architecture And Its Functions
Latest Technologies Of Mobile Network
Conclusion

M
obile Computing is a technology that allows transmission of data, via computer, without having
to be connected to a fixed physical link. In the past, wireless communications predominantly
used, circuit switching to carry voice over the network; however, more recently both voice and
data are being transmitted over both circuit-switched and packet-switched networks.
Mobile data communication has become a very important and rapidly evolving technology as it
allows users to transmit data from remote locations to other remote or fixed locations. This
proves to be the solution to the biggest problem of business people on the move mobility.

Generations of Mobile Network


First Generation (1981 NMT launch)
The first mobile systems were based on analogue transmission. They had a low traffic
density of one call per radio channel, poor voice quality, and they used insecure and
unencrypted transmission, which led to the spoofing of identities.

Second Generation (1991 GSM launch)


The second generation of mobile systems was based on digital transmission with a
number of different standards (GSM, ERMES, CT2, CT3, DCS 1800, DECT). GSM
(Global System for Mobile) communications is the most popular standard in use today
using SIM (Subscriber Identity Module) technology for encryption authentication and
billing purposes. The transmission uses TDMA (Time Division Multiple Access) and
CDMA One (Code Division Multiple Access One) techniques to increase data traffic on
the network.

Second to Third Generation Bridge (2000 GPRS launch)


The introduction of GPRS is seen as an extra period of mobile networking development,
between 2G and 3G. GPRS (General Packet Radio Service) is a data service which
enables mobile devices to send and receive e-mails and picture messages. It operates at
the speeds of up to 115kbit/s, which has been increased to a maximum of 384kbit/s by
using EDGE (Enhanced Data Rates for Global Evolution). Typical GSM data
transmission rates reached 9.6kbit/s.

Third Generation (2003 First UK 3G launch)

The third generation of mobile systems unifies different mobile technology standards,
and uses higher frequency bands for transmission and CDMA to deliver data rates of up
to 2Mbit/s to support multimedia services. The European standard is UMTS (Universal
Mobile Telecommunication Systems). Mobile systems continue to use digital
transmission with SIM authentication. Data transmission uses a WCDMA (Wideband
Code Division Multiple Access). Technique to achieve data rates between 384kbit/s and
2048kbit/s.

Fourth Generation (2007+)


4G is still at the research stage. It is based on an ad hoc networking model where there is
no need for a fixed infrastructure operation. Ad hoc networking requires global mobility
features (e.g. Mobile IP) and connectivity to a global IPv6 network to support an IP
address for every mobile device. Seamless roaming in heterogeneous IP networks (e.g.
802.11 WLAN, GPRS and UMTS) will be possible with higher data rates, from 2Mbit/s
to 10100Mbit/s, offering reduced delays and new services. As mobile devices will not
rely on a fixed infrastructure, they will require enhanced intelligence to self configure in
ad hoc networks and have routing capabilities to route over a packet-switched network.

Applications of Mobile Networking


Mobile networking means time efficiency. Efficient utilization of resources (i.e.: staff) to save
transportation costs and other non quantifiable costs. Applications of mobile networking are:

Emergency Services:
Ability to receive information on the move is vital where the emergency services are
involved. Information regarding the address, type and other details of an incident can be
dispatched quickly, via a CDPD system using mobile computers, to one or several
appropriate mobile units which are in the vicinity of the incident. Here the reliability and
security implemented in the CDPD system would be of great advantage.

In court:
Defense counsels can take mobile computers in court. When the opposing counsel
references a case which they are not familiar, they can use the computer to get direct, realtime access to on-line legal database services, where they can gather information on the
case and related precedents. Therefore mobile computers allow immediate access to a
wealth of information, making people better informed and prepared.

In companies:
Managers can use mobile computers in, say, critical presentations to major customers.
They can access the latest market share information. At a small recess, they can revise the
presentation to take advantage of this information. They can communicate with the office

about possible new offers and call meetings for discussing responds to the new proposals.
Therefore, mobile computers can leverage competitive advantages.

Credit Card Verification:


At Point of Sale (POS) terminals in shops and supermarkets, when customers use credit
cards for transactions, the intercommunication required between the bank central
computer and the POS terminal, in order to effect verification of the card usage, can take
place quickly and securely over cellular channels using a mobile computer unit. This can
speed up the transaction process and relieve congestion at the POS terminals.

Electronic Mail/Paging:
Usage of a mobile unit to send and read emails is a very useful asset for any business
individual, as it allows him/her to keep in touch with any colleagues as well as any urgent
developments that may affect their work. Access to the Internet, using mobile computing
technology, allows the individual to have vast arrays of knowledge at his/her fingertips.
Paging is also achievable here, giving even more intercommunication capability between
individuals, using a single mobile computer device.

Benefits:

Mobility Solution at the Network Layer:


With the mobile router deployed in a moving vehicle, repeated reconfiguration of the
various devices attached to that router as the vehicle travels is no longer necessary.
Because the mobile router operates at the network layer and is independent of the
physical layer, it operates transparently over cellular, satellite, and other wireless or fixed
media.

Always-On Connection to the Internet:


This feature supports an always-on connection to the Internet, providing access to current
and changing information. For example, aircraft pilots can access the latest weather
updates while flying and EMS vehicles can be in communication with emergency room
technicians while on the way to the hospital.

Versatile:
Any IP-enabled device can be connected to the mobile router LAN ports and achieve
mobility. Applications that are not specifically designed for mobility can be accessed and
deployed.

Dynamic Mobile Networks:


The dynamic network enables dynamic registration of mobile networks, which results in
minimal configuration on the home agent making administration and set up easier. When
configured for dynamic registration, the mobile router tells the home agent which
networks are configured in each registration request. The home agent dynamically adds

these networks to the forwarding table and there is no need to statically define the
networks on the home agent.

Mobile Network Architecture and its Functions:


In a network setting the permanent home of a mobile node such as (a laptop or pads) is known as
home network and the entity with in the home network that performs mobility management
functions on the mobile node known as the home agent. The network in which the mobile node is
currently residing is known as foreign network and the entity within the foreign network that
helps the mobile node with the mobility management function known as foreign agent. A
correspondent is the entity wishing to communicate with the mobile node.

Node B
NodeA

Mobile Network Architecture

The IP address is changes from subnet to subnet. So that some problem's are fixed. To avoid this
problem Two IP addresses are used. These IP addresses are called as Home address and care of
address. Home address is static known to everybody to identify of the host. The care of address is
changes at each new point of the attachment.

The followings are functions of mobile networking:

Correspondent X wants to transmit an IP datagram to node A. the home address of A is


advertised and known to X does not know whether A is in the home network or
somewhere else.therefore,X sends the packet to A with As home address as the
destination IP address in the IP header. The IP datagram is routed to As home network.

At the As home network, the incoming IP datagram is intercepted by the home agent.The
home agent discovers that A is in a foreign network. A care-of-address has been allocated
to A by this foreign network and available with the home agent. The home agent
encapsulates the entire datagram inside a new IP datagram, with the care-of-address in the
new datagram with the care-of-address is retransmitted by the home agent.

At the foreign network, the incoming IP datagram is intercepted by the foreign agent. The
foreign agent is the counterpart of the home agent in the foreign network. The foreign
agent strips off the outer IP header, and delivers the original datagram to A.

A intends to respond to this message and sends traffic to X in this example, X is not
mobile; therefore X has a fixed IP address .For routing As IP datagram to X,each datagram
is sent to some router in the foreign network.Typically,this router is the foreign agent. A
uses Xs IP static address as the destination address in the IP header.

The IP datagram from A to X travels directly across the network, using Xs IP address as
the destination address.

Latest technologies of Mobile Network:

Bluetooth:
Bluetooth is a wireless protocol for exchanging data over short distances from fixed and
mobile devices, creating personal area networks (PANs). It was originally conceived as a
wireless alternative to data cables. It can connect several devices, overcoming problems
of synchronization. Bluetooth uses a radio technology called frequency-hopping spread
spectrum, which chops up the data being sent and transmits chunks of it on up to 79
frequencies. It can achieve a gross data rate of 1 Mb/s. Bluetooth provides a way to
connect and exchange information between devices such as mobile phones, telephones,
laptops, personal computers, printers,

Global Positioning System (GPS) receivers, digital cameras, and video game consoles
through a secure, globally unlicensed Industrial, Scientific, and Medical (ISM) 2.4 GHz
short-range radio frequency bandwidth.

RFID:
RFID stands for Radio-Frequency Identification. The acronym refers to small
electronic devices that consist of a small chip and an antenna. The chip typically is
capable of carrying 2,000 bytes of data or less.

The RFID device serves the same purpose as a bar code or a magnetic strip on the back of
a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar
code or magnetic strip must be scanned to get the information, the RFID device must be
scanned to retrieve the identifying information.

WiMAX:

WiMAX means Wireless Broadband. It offers an alternative to high bandwidth wireline


access networks like fiber optic, cable modems and DSL(Digital Subscriber Line).

In the above figure indicates the function of WiMAX that contains the following functions:
A subscriber sends wireless traffic at the speeds ranging from 2M to 155M bit/sec from a
fixed antenna on a building.
The base station receives transmissions from multiple sites and sends traffic over wireless
or wired links to a switching center using 802.16 protocols.
The switching center sends traffic to on ISP or the public switched telephone networks.

Conclusion:
Most of these have to do with the inherent limitations of the technology.

Security:
In such a environment weak security link from a wireless network could become a point
of vulnerability for the entire system.therefore,in a mobile computing environment,it is
necessary to have a robust security and trust infrastructure.

Range:
The typical range of a common 802.11g network with standard equipment is on the order
of tens of meters. While sufficient for a typical home, it will be insufficient in a larger
structure.

Reliability:
We cant expect the packets reach to destination because making interference and
propagation effects all the more disturbing. As a result, important network resources such
as servers are rarely connected wirelessly.

Speed:
The speed on most wireless networks (typically 1-108 Mbit/s) is reasonably
slow compared to the slowest common wired networks (100 Mbit/s up to several Gbit/s).

If the above disadvantages are recovered, the mobile network will grow very well. In future, the
world will captured by mobile networking. The world without mobile networking is impossible.

Vous aimerez peut-être aussi