Vous êtes sur la page 1sur 6

Cordless and Portable Computing in a Wireless Office Environment

bY
Peter Wong and Fred Halsall
Department of Electronic Engineering, University College of Swansea
Singleton Park, Swansea SA2 8PP, UK

Abstract Portable Computing Requirements


The ability of a network to support mobile In order to identi@ the requirements relating to
terminals lies very much in the network a r c t i ” portable computing, consider a typical application in
and the protocols used. In this paper, the impact of which a user visiting a site - a campus or company
mobile computers on the existing LAN architecture for example - wishes to use his or her portable
and the network protocols used are studied . A computer to log onto a server that is connected to
robust network architecture based on the DECT the LAN at their home site. Typically this maybe b
system (Digital European Cordless access files and spreadsheets which are to be
Telecommunications) is proposed. together with discussed at a meeting for example. copies of
appropriate interworking procedures. which enable documents for circulation can then be retrieved from
the network and protocols such as TCPllP the remote server and if necessary, printed locally.
(Transmission Control Promlllnternet Protocol) to This can be achieved by providing a Wireless radio
handle mobile computing. connection into the site fixed-wire LAN and from
there, through an appropriate connection (either the
internet or the private or public network) to the
Introduction home site.

The advent of laptop, notebook and more recently A study of the user requirements of portable
palmtop computers is giving rise to a rapid increase terminals has shown that bandwidth is not of key
in demand for portable computers. Although in importance since most user tn” ‘om are
some instances these computers are used in a stand- relatively short and involve only a modest amount of
alone mode, in others there is a need for them to data. Simulations for wireless access to an Ethernet
access services available h g h existing fixed-wire over a 32 kbps duplex DECT channel for an
networks such as local area networks (LANs). interactive TCPllP connection using TELNET (a
Although much attention has been given to the remote login application) P] have shown that the
development of high bit rate wireless LANs. little additional delays intrcduced by the radio link
anention has been given to the connection of (through the limited badwidth and error control)
portable computers to existing fixed-wire LANs and are minimal when compared to the overall
the ability to support mobile computing [I]. transaction time. n i s is shown in figure 1, where
the times for the transmission of hte frames over the
This paper looks at the network infrastructure to ethemet for a typical TELNET user transaction
support terminal mobility and the impact this has on comprisii of a login procedure, a directory and file
the protocols used. A robust network architecture listing, closing with a logout procedure, are shown
supporting mobility in local and private networks is and compared for a similar transaction over a fixed
proposed based on the Digital European Cordless wire medium when a wireless access into a fixed
Telecommunications ( D E 0 standard. Also. how network is used. As can be concluded from the two
the TCPllP protocol suite can be used to support sets of results, the added overheads resulting from
mobile computmg. the DECT radio link are negligible for transactions

Authorized licensed use limited to: PONDICHERRY ENGG COLLEGE. Downloaded on August 29, 2009 at 01:01 from IEEE Xplore. Restrictions apply.
of this type. The major issue when supporting linked to the two network databases, the Home Data
terminal mobility, therefore is not bandwidth but Base (HDB) and Visitor Data Base (VDB), which
rather the ability of the network architecture and its contain user information such as addresses,
associated communication protocols to support identities, current location etc. The various
terminal mobility. components making up the DECT network
architecture are shown in figure 2.
In a portable computing environment, it will be
expected of mobile terminals to roam about a The construction of a robust network architecture is
network, for example interdepamnent or buildings. achieved through the hierarchical dimensioning of
In such an event, the network must be informed of the network into unique Location areas and domains
the new location of the mobile terminal and update in the context of the network infrastructure.
its location database, i.e. mobility management. Location ares can be defined as the area governed
'Ihi requires the updating of location infomation by a cluster of base stations. Typically, this can be a
when a portable roams about various domains in a building or a department, such as that shown in the
network. Another issue is the ability of the protocols figure. When a portable terminal enters a new
used on the fixed network to support mobile location area, it will be required of it to update its
terminals. One of the most popular of LAN location. All base stations within a location area will
protocols is TCPIIP, however, it only serves fixed broadcast the same identity periodically to inform
terminals on the network. In order for TCPllP to portables of the domain it is entering and may
handle mobile terminals, interworking procedures request the portable terminal to update its location.
need to be defined. to enable TCP/IP to be used as The procedure of location updating enables the
an end to end protocol between mobile and fixed network to track the portable's current location
terminals transparently. Clearly, two key issues accurately, when a different domain is entered and
need to be closely addressed, the first concerning the this information is stored in the HDB or VDB.
network infrastructure whereby unique location Several Location areas make up a local network site
areas need to be defined in a network and secondly and is controlled by a Common Control Fixed Part
involving the protocol and the interworking (CCFP) with its own HDB and VDB. Private
procedures required to support mobility. The networks can further be constructed with a group of
following sections will address these issues closely. local networks, each with unique location areas.
Through such a hierarchical architecture, large
private networks can be created and the mobility of
Network Architectures Supporting terminals can be managed in a controlled manner.
In such a network, as illustrated in figure 2, each
Mobility department make up a location area. Within this
domain, base stations possess the same subnetwork
As an example of a network architecture supporting identity and are attached to the fixed wire LAN to
the mobility of terminals. the recently defined handle LAN traffic as well as to carry voice traffic.
DECT system is used. as it provides a hierarchical Assuming TCP/IP is operating on the LAN, each
set of identities for the unique definition of location base station will possess an Internet address within
areas in a local and private network scenario IJ]. the sub-network, like a terminal on the network. The
The DECT network is cellular in nature and consists form of addressing as used in the figure is of the
of Base Stations known as Radio Fixed Parts (RFP). Class B Internet Address (Class B IP addressing
serving a community of Portable Terminals known consists of a 14 bit netid and a 16 bit hostid) with
as Cordless Portable Parts (CPP). The RFPs provide subnet routing, as this form of addressing is fairly
a pico-cellular coverage of around 200 metres common. Details of sub-network addressing has
indoors and are connected to a network element been included at the end of the paper.
h w n as the Common Control Fixed Part (CCFP).
From this. connections are controlled and routed to Based on subnet addressing techniques, it is
the private or public network. The CCFP is also therefore proposed that all portable terminals within

Authorized licensed use limited to: PONDICHERRY ENGG COLLEGE. Downloaded on August 29, 2009 at 01:01 from IEEE Xplore. Restrictions apply.
the local network be categorised into a mobile sub- When a TCPlIP frame arrives at the DLC layer of
network for portable terminals only (in the figure, the CPP, it is fragmented and appended with
sub-network 15 is allocated to portable terminals) overheads for error and flow control prior to
i.e. a virtual subnetwork, for easier management of transmission over the radio link. At the base station,
portable terminals. Hence portables belonging to a upon reception, the frame is reconstructed and is
network will possess the same Internet portion of the prepared for transmission over the Ethernet. The
addresses with other fixed terminals but will have a base stations which are strategically located to
separate mobile sub-network physical address. provide uniform radio coverage, upon reception of a
packet with an IP address of a CPP, makes a note of
When the mobile terminal with an IP address the IP address of the CPP with the time slot
137.44.15.2 visits department Y, upon arrival, it assigned. The RFP, then invokes the IP translation
will realise from the broadcasts of the RFP that it is module which replaces the IP address in the packet
in a different location area from what it was from the CPP with an Ip dynamically allocated for
previously in. It will then be required to update its by the base station. This Dynam~c IP (DIP),
location information at the HDB. If it wishes to assigned by the RFP is unique within the domain of
access the fixed wire LAN services, it will gain the sub-network for routing purposes. Within a sub-
through one of the RFR on the visited network, network, the DIP assigned by the RFIJ will possess
using the IP translation procedures described in the similar Internet and Physical Network address, only
following sections. The RFP essentially translates the host portion is assigned dynamically. The RFP
the Mobile IP address to that suitable for routing on maintains a table of portables it is serving, keeping
the fixed wire network. account of mobile IP addresses, time slot used and
Dynamic IP assigned. In order that each dynamic IP
is uniquely assigned, all base stations will be
Achieving Protocol Transparency required to interrogate the HDB before assigning a
DIP (When a call terminates, the DIP within the
Considering TCPnP is operating end-toad between sub-network is free and can be re-assigned). Hence,
the portable and the fixed terminals on the Ethernet, the HDB keeps a database of all portable terminal's
the protocol stack used is illustrated as follows. The Mobile IPS (CPPs) and Dynamic Ips (RFP) used
base station which is aaached on the ethernet during a connection.
(shown in figure 2) acts as an intermediary and
relays the DECT packets to and from the Ethernet Once a Dynamic IP is assigned, it replaces the
between the portable and fixed terminals. Mobile IP when the packet is traversing the fixed
network for routing purposes. The new TCPllP
TCPnP packets arriving at the DECT protocol packet, with the Dynamic IP of the RFP is then
layers at the portable terminal are first fragmented. encapsulated with the Ethernet MAC address of the
the DLC layer ensuring that the packets are RFP and broadcasted to the host I server (assuming
transmitted and received correctly and in order. The the MAC address of the host has been resolved hy
MAC layer is responsible for the setting up and the Address Resolution Protocol). The host, replies
clearing of calls and the PHY layer ensures the appropriately back to the Dynamic IP. The RFP,
frequency and timing synchronisation is achieved seeing that the IP address is one of the DIPS it is
with the base station. Upon re-assembly of the serving, accepts the packet, removes the Ethernet
DECT fragments, the RFP translates the IP address header and relates the dynamic IP to the appropriate
to one assigned by the base station, for routing Mobile IP of the CPP and time slot assigned by the
purposes, and encapsulates the original datagram RFP. Following this, it formats the packet for
into Ethernet format. The reverse process applies transmission over the DECT radio link. Figure 3
when the fixed terminal sends a reply to the portable summarises the transparent IP translation
terminal. procedures.

513

Authorized licensed use limited to: PONDICHERRY ENGG COLLEGE. Downloaded on August 29, 2009 at 01:01 from IEEE Xplore. Restrictions apply.
From the figure, Mobile IP addresses (belonging to constructed, supporting private wtworks based on
Mobile sub-network domain) on packets are relayed hierarchically dimensioning the network into local
over the radio. On reception, the Mobile IP address networLs and sub-network. This a r c b t e "
is then replaced with the Dynamic IP address of the supports smaller, more amageable networks in the
sub-network by the RFT. The RFP mahtaim a table management of mobility informaton. A "radii
of CPPs it is Senring, relating Mobile IPs with the router' has also been proposed to achieve the
time slot used over DECT and the Dynamic IP transparent interworking of IP protoaAs between the
assigned. The packet, with the DrPlrp and MAC* wireless and fixed network using IP relay. for the
are then transmitted o m the Ethernet. The host / translation of IP addresses suitable for routing in the
server replies with its source IP and MAC address fixed network.
together with the dessination DIP and MAC address
of the RFP. The RFT then looks at the table and
translates the DIP back to the CPPs Mobile IP and
transmits over the time slot assigned back to the
CPP, achieving piotocol transparency between Sub-Network addressing has the advantage of
portable and fixed termiaals. hierarchical routing, in which the first two octets of
the32bitIPaddress(Octetsl and2)representthe
7he RFP. therefore behaves as a router. or more top level of the muting hierarchy, the core gateway
appropriately, a "radio router", routing system or the Internet part of the address. Octets 3
TCPIIPIDECT frames onto the Ethermt and and 4 represent the l o d part of the address, for
relaying TCPllp1802.3 frames from the E & m c identifying a host within the network. The Internet
back to the CPP. portion of the address therefore identifies the
location of a site and the local portion identifies a
Using this transparent interworking scheme. TCPIIP host on that site. Quite often, of the two octets in the
based DECT terminals are able to gain access to the local portion of the address. one octet is used to
fixed wire network via the base station on the identify a physical network, and the other to identify
network. This transparent interworking technique is a host within that physical network [4].
not only limited to DECT but can be used for any
TCPllP based Wireless LAN systems intending to
support mobile terminals. The heart of the
Acknowledgement
interworking techniques lie in the base station,
which performs the buffering of frames to and from The authors would like to acknowledge that the
the network and d a t i o n of mobile IP addresses work was carried out as part of the DTIISERC
to Dynamic IP addresses and vice-versa. The
LINK Personal co"unicatiom programnu:
procedure just described enables existing TCPlIP
implementations to be adopted to support mobility of References
portable terminals without any modifications. This
eases the implementation of such a service on a [ I ] loannidis 1. D
um D,Maguire G,"IP based
LAN suppo- TCPIIP. Rotocols for Mobile Internetworting", ACM
Sigcomm 91. Sept 1991
Conclusion [2] Wong P. Halsall F. " Portable Computing in a
DECT Rmdio Environment'. Roc. E E I Ith
The use of TCPlIP in a wireless LAN environment Teletraffic Symposium, April 93. BT Laboratories.
has been eddressed to support the mobility of UK, 1993
portable terminals. Different types of connections 131 ETSI. = DECT Common Interface : Identities
and mobility scenarios were, with solutions based on
and Addressing Part 6 '1992
141 Comer DE, "InternetworkingWith TCPIIP
the Dynarmc lP (DIP) interworking technique. A
robust network architecture for DECT has been
Volume 1 : Principles, Protocols and Architecture",
Second Edition, Rentice-Hall. 1992

Authorized licensed use limited to: PONDICHERRY ENGG COLLEGE. Downloaded on August 29, 2009 at 01:01 from IEEE Xplore. Restrictions apply.
Telnet Transaction Analysis

lo00

b
E-
E!
fa
t
200

0-
I i II
3

TELNET Transaction Results Ethernet -

lo00 -.-I__

Bm
t
S
.--
E-
c
f 400 .-.
t
200 ..-, -
0 I I I I Ill I 1

TELNET Transaction Results DECTEthernet -


Figure 1 Typical Portable Transaction

Authorized licensed use limited to: PONDICHERRY ENGG COLLEGE. Downloaded on August 29, 2009 at 01:01 from IEEE Xplore. Restrictions apply.
Et5
137.44.15.25
~-
Department Y
PBX CCFP DECTRdio
F '

'IIRFP 137.44.4.31 -L
137.44@acta 1 a d12) =
137.44.1 = t h p t . Y

,P
-
137.44.4= D c p ~X
137.44.15 Mob* &a

Fj CPP
CPP
(vole) fi)
137.44.15.1
(data)
137.44..15..2
Site Netwoi-k
Server
F Q p e 2 Local Site Network

- Mobile IP Icpp

Mobile IP Icpp
DE' *+MAC*(- I host + MAC host

I
Icpp T i S I o t DIPrfp
- -. .. . . __- ---

Figure 3 'Ituroprent htuworking of Rotocds for mobile termin&

516

Authorized licensed use limited to: PONDICHERRY ENGG COLLEGE. Downloaded on August 29, 2009 at 01:01 from IEEE Xplore. Restrictions apply.

Vous aimerez peut-être aussi