data communication using ai
data communication using ai
SYLLABUS
Unit - I:
Unit - II:
Unit - III:
Unit – IV:
Unit – V:
1
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
Kit : iOS, Android, BlackBerry, Windows Phone, M-commerce –Structure –Pros & Cons – Mobile
Payment System – Security Issues .
2
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
3
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
Presentation tier:
The topmost level of a mobile computing application concern the user interface. A good user
interface facilities the users to issue requests and to present the results to the them. This layer run
on the client’s computer.
Application tier:
This layer has the vital responsibility of making logical decisions and performing and data
layers. The middle tier to be like an engine of an automobile. It performs the processing of user
input, obtaining information and then making decisions.
Data tier:
The data tier is responsible for providing the basic facilities of data storage, access, and
manipulation. This layer contains a database. The information is stored and retrieved from the
database.
1.6 MAC protocol:
It should implement some rules that help to enforce discipline when multiple nodes
contend for a shared channel. It should help maximize the utilization of the channel. Channel
allocation needs to be fair. No node should be discriminated against at any time and made to wait
for an unduly long time for transmission. It should be capable of supporting several types of
traffic having different maximum and average bit rates. It should be robust in the face of
equipment failures and changing network conditions.
1.7 Wireless MAC protocols: Some issues:
The MAC protocol in a wireless medium is much more complex than its wired
counterpart. First, it is difficult to implement a collision are hard to be detected by the
transmitting nodes. The hidden and Exposed Terminal Problems in an infrastructureless
Network: The hidden terminal problem arises when at least three nodes (A, B and C) and
communicating among each other. The node A is in the radio range of the node B, and B is also
within the radio range of C. However, the nodes A and C are not in the radio range of each other.
Therefore, if both A and C start to transmit to B at the same time, the data received at node B.
Such a situation can arise because A and C are “hidden” from each other, because they are
outside each other’s transmission range.
A related problem called exposed terminal could arise in a scenario, node D is within
node A’s transmission range. Node B is within the transmission range of both the nodes A and C,
4
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
but the node A and C are not within each other’s transmission range. MAC protocols usually
inhibit transmission when transmission from another terminal is detected. As a result node A will
not be able to transmit to any node when B is transmitting to C.
1.8 Fixed Assignment Schemes:
A few important categories of fixed assignment MAC protocols are the following:
Frequency Division Multiple Access(FDMA)
Time Division Multiple Access(TDMA)
Code Division Multiple Access (CDMA)
Frequency Division Multiple Access (FDMA):
In FDMA, the available bandwidth is divided into many narrower frequency bands called
channels. A division of the existing bandwidth into many channels. For full duplex
communication to take place, each user is allocated a forward link for communicating from it to
the base station and a reverse channel for communicating from the BS to it.
Time Division Multiple Access (TDMA)
TDMA is an access method in which multiple nodes are allotted different time slots to access the
same physical channel. The timeline is divided into fixed-sized time slots and these are divided
among multiple nodes that can transmit.
Code Division Multiple Access (CDMA):
In CDMA, multiple users are allotted different codes that consist of sequences of 0 and 1 to
access the same channel. A special coding scheme is used that allows signals from multiple users
to be multiplexed over the same physical channel. In CDMA, scheduling is applied. All the
senders send signals simultaneously through a common medium. The bandwidth of this medium
is much larger than the space that would be allocated to each packet transmission during FDMA
and the signals can be distinguished from each other by means of special coding scheme.
1.9 Random Assignment Schemes:
There are a number of random assignment schemes that are used in MAC protocols. A
few important ones are the following:
ALOHA
Slotted ALOHA
CSMA
CSMA/CD
5
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
CSMA/CA
ALOHA:
It is a simple communication schme that was developed at the university of Hawaii. The basic
ALOHA scheme, is a simple protocol. If a node has data to send, it begins to transmit. Note that
the first step implies that Pure ALOHA does not check whether the channel is busy before
transmitting.If the frame successfully reaches the destination, the next frame is sent. If the frame
fails to be received at the destination, it is sent again. The simple ALOHA scheme works
acceptably, when the chances of contention are small.
The CSMA Scheme:
A popular MAC arbitration technique is the Carrier Sense Multiple Access (CSMA). In this
technique, a node senses the medium before starting to transmit. If it senses that some
transmission is already underway, it defers its transmission. Two popular extensions of the basic
CSMA technique are the collision detection (CSMA/CD) and the collision avoidance
(CSMA/CA) techniques. In a wireless network, a collision avoidance scheme works much better
compared to a collision detection-based scheme. A collision avoidance scheme is based on the
idea that it is necessary to prevent collision at the moment they are most likely to occur, when
the bus released after a packet transmission.
1.10 Reservation Based scheme:
A basic form of the reservation scheme is the RTS/CTS scheme/ In an RTS/CTS scheme,
a sender transmits an RTS packet to the receiver before the actual data transmission. On
receiving this the receiver sends a CTS packet and the actual data transfer commences only after
.When the other nodes sharing the medium sense the CTS packet, they refrain form transmitting
until the transmission from the sending node is complete.
MACA
MACA stands for Multiple Access collision Avoidance. MACA solves the hidden/exposed
terminal problems by regulating the transmitter power. A node running MACA requests to use
the medium by sending an RTS to the receiver. Since radio signals propagate Omni directionally,
every terminal within the sender’s radio range will hear this and then refrain from transmitting.
The start of its transmission, it sends a Request TO Send (RTS). B receives the RTS that contains
the senders name and the receivers name as well as the length of the future transmission. In
response to the RTS, an acknowledgment from B is triggered indicating Clear To Send (CTS).
6
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
The CTS contains the names of the sender and receiver, and the length of the planned
transmission. This CTS is heared by C and the medium is reserved for use by A for the duration
of the transmission. On receipt of CTS from B, C refrains from transmitting anytime for the time
indicated in the CTS. Thus a collision cannot occur at B during data transmission and the hidden
terminal problem is solved. This is a collision avoidance protocol, a collision can occur during
the sending of an RTS. Both A and C could send an RTS at sane time. But an RTS occurs over a
very small duration compared to the duration of data transmission. Thus the probability of
collision remains much less. B resolves this contention problem by acknowledging only one
station in the CTS. No transmission occurs without an appropriate CTS. Thus C can start its
transmission assuming that no collision would occur at A.
Unit - II: MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER : Overview of Mobile
IP – Features of Mobile IP – Key Mechanism in Mobile IP – Route Optimization - Overview of TCP/IP –
Architecture of TCP/IP – Adaptation of TCP Window – Improvement in TCP Performance.
7
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
8
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
9
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
10
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
11
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
stateless, which means each client request is considered new because it is unrelated to previous
requests. Being stateless frees up network paths so they can be used continuously.
TCP/IP model layers
TCP/IP functionality is divided into four layers, each of which include specific protocols.
The application layer provides applications with standardized data exchange. Its protocols
include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office
Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and Simple Network Management
Protocol (SNMP).
The transport layer is responsible for maintaining end-to-end communications across the
network. TCP handles communications between hosts and provides flow control, multiplexing
and reliability. The transport protocols include TCP and User Datagram Protocol (UDP), which
is sometimes used instead of TCP for special purposes.
The network layer, also called the internet layer, deals with packets and connects independent
networks to transport the packets across network boundaries. The network layer protocols are the
IP and the Internet Control Message Protocol (ICMP), which is used for error reporting.
The physical layer consists of protocols that operate only on a link -- the network component
that interconnects nodes or hosts in the network. The protocols in this layer include Ethernet for
local area networks (LANs) and the Address Resolution Protocol (ARP).
Advantages of TCP/IP
TCP/IP is nonproprietary and, as a result, is not controlled by any single company. Therefore, the
internet protocol suite can be modified easily. It is compatible with all operating systems, so it
can communicate with any other system. The internet protocol suite is also compatible with all
types of computer hardware and networks.
2.7 Adaptation of TCP/IP:
TCP is a connection-oriented protocol, which means a connection is established and
maintained until the application programs at each end have finished exchanging messages. It
determines how to break application data into packets that networks can deliver, sends packets to
and accepts packets from the network layer, manages flow control, and—because it is meant to
provide error-free data transmission—handles retransmission of dropped or garbled packets as
well as acknowledgement of all packets that arrive. In the Open Systems Interconnection(OSI)
12
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
communication model, TCP covers parts of Layer 4, the Transport Layer, and parts of Layer 5,
the Session Layer.
For example, when a Web server sends an HTMLfile to a client, it uses the HTTP
protocol to do so. The HTTP program layer asks the TCP layer to set up the connection and send
the file. The TCP stack divides the file into packets, numbers them and then forwards them
individually to the IP layer for delivery. Although each packet in the transmission will have the
same source and destination IP addresses, packets may be sent along multiple routes. The TCP
program layer in the client computer waits until all of the packets have arrived, then
acknowledges those it receives and asks for the retransmission on any it does not (based on
missing packet numbers), then assembles them into a file and delivers the file to the receiving
application.
2.8 Imporvement in TCP Perfoemance:
Initially, it was thought that TCP/IP could not be used for storage networking
applications, as it would place an excessive load on the end systems -- the servers, disk arrays
and tape libraries. TCP requires a large amount of processing power and, until recently, had been
handled by the server CPU, limiting the amount of TCP a box can run and still have useful
cycles left over.
However, early in 2002, TCP offload adapters became commercially available and
changed this workload balance. These specialized adapter cards include a hardware-based TCP
offload engine that handles IP storage protocols at full wire speed over a Gigabit Ethernet
interface. The loading on the server CPU is no greater than that of a Fibre Channel HBA, so
TCP/IP has become a viable storage networking protocol. Vendors now are sampling 10 Gbps
TCP offload engines and have promised to deliver IP storage adapter cards that have 10 Gbps
Ethernet interfaces during 2003.
Although the limitations of the TCP computational intensity have been overcome,
another limitation -- flow control -- still can cause network performance problems. TCP was
designed for use in very large networks and, indeed, it is used today by hundreds of millions of
users of the world's largest network, the Internet. To ensure fairness and accessibility by millions
of simultaneous users, TCP uses a fairly conservative flow-control algorithm. In effect, each user
is granted a modest initial data flow rate that increases as acknowledgments are returned from
the destination end system when the IP packets are received without errors. If packets are
13
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
dropped or contain errors, the sending system must fall back to a much lower flow rate and start
once again to ramp its rate. In a well-designed network, TCP has little impact on performance,
but in a congested or error-prone network, the overall performance can be cut by more than half.
To improve the operation of TCP/IP, a specification is available for a more aggressive version of
TCP. It sometimes is called fast-start TCP, as its initial flow rate will be greater, and it will
recover more quickly from lost packets.
14
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
compresses data, then sends it down through a channel with two other streams of user data, each
in its own timeslot.
Features of GSM
Listed below are the features of GSM that account for its popularity and wide acceptance.
Improved spectrum efficiency
International roaming
Low-cost mobile sets and base stations (BSs)
High-quality speech
Compatibility with Integrated Services Digital Network (ISDN) and other telephone services.
Support for new services
Composition of the network
The GSM network has four separate parts that work together to function as a whole: the
mobile device itself, the base station subsystem (BSS), the network switching subsystem (NSS)
and the operation and support subsystem (OSS).The mobile device connects to the network via
hardware. The subscriber identity module (SIM) card provides the network with identifying
information about the mobile user.
Security:
Although GSM was designed as a secure wireless system, it can still experience attacks.
It uses authentication measures, such as challenge-response authentication, which prompts a user
to provide a valid answer to a question, and a preshared key that can come in the form of a
password or passphrase.There are a few cryptographic security algorithms that GMS employs,
including stream ciphers that encrypt plaintext digits. A5/1, A5/2 and A5/3 are three stream
ciphers that ensure that a user's conversation is private. However, the algorithms for both A5/1
and A5/2 have been broken and published and are therefore susceptible to plaintext attacks.
GSM uses GPRS, a packet-based communication service, to transmit data, such as through web
browsing. However, the ciphers that GPRS uses -- GEA/1 and GEA/2 – were broken and
published as well in 2011. Researchers published open source software to sniff packets in the
GPRS network. Since many GSM network operators have roaming agreements with foreign
operators, users can often continue to use their phones when they travel to other countries. SIM
cards that hold home network access configurations may be switched to those with metered local
access, significantly reducing roaming costs, while experiencing no reductions in service.
15
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
16
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
17
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
in GSM, except that it generally contains fewer cells. Because routing areas are smaller than
location areas, less radio resources are used While broadcasting a page message.
3.3 Universal Mobile Telecommunications System (UMTS)
UMTS (Universal Mobile Telecommunications System) is a so-called "third-generation
(3G)," broadband , packet -based transmission of text, digitized voice, video, and multimedia at
data rates up to and possibly higher than 2 megabits per second ( Mbps ), offering a consistent
set of services to mobile computer and phone users no matter where they are located in the
world. Based on the Global System for Mobile ( GSM ) communication standard, UMTS,
endorsed by major standards bodies and manufacturers, is the planned standard for mobile users
around the world by 2002. Once UMTS is fully implemented, computer and phone users can be
constantly attached to the Internet as they travel and, as they roaming service , have the same set
of capabilities no matter where they travel to. Users will have access through a combination of
terrestrial wireless and satellite transmissions. Until UMTS is fully implemented, users can have
multi-mode devices that switch to the currently available technology (such as GSM 900 and
1800) where UMTS is not yet available.
Today's cellular telephone systems are mainly circuit-switched , with connections always
dependent on circuit availability. packet-switchedconnection, using the Internet Protocol ( IP ),
means that a virtual connection is always available to any other end point in the network. It will
also make it possible to provide new services, such as alternative billing methods (pay-per-bit,
pay-per-session, flat rate, asymmetric bandwidth, and others). The higher bandwidth of UMTS
also promises new services, such as video conferencing. UMTS promises to realize the Virtual
Home Environment ( VHE ) in which a roaming user can have the same services to which the
user is accustomed when at home or in the office, through a combination of transparent terrestrial
and satellite connections.
Trials of UMTS technology, using advanced mobile phone/computing device prototypes,
are currently being conducted by Nortel Networks and BT (British Telecommunications). The
electromagnetic radiation spectrum for UMTS has been identified as frequency bands 1885-2025
MHz for future IMT-2000 systems, and 1980-2010 MHz and 2170-2200 MHz for the satellite
portion of UMTS systems.
UMTS supports maximum theoretical data transfer rates of 42 Mbit/s when Evolved
HSPA (HSPA+) is implemented in the network. Users in deployed networks can expect a
18
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
transfer rate of up to 384 kbit/s for Release '99 (R99) handsets (the original UMTS release), and
7.2 Mbit/s for High-Speed Downlink Packet Access (HSDPA) handsets in the downlink
connection. These speeds are significantly faster than the 9.6 kbit/s of a single GSM
errorcorrected circuit switched data channel, multiple 9.6 kbit/s channels in High-Speed Circuit-
Switched Data (HSCSD) and 14.4 kbit/s for CDMA. Since 2006, UMTS networks in many
countries have been or are in the process of being upgraded with High-Speed Downlink Packet
Access (HSDPA), sometimes known as 3.5G.
Currently, HSDPA enables downlink transfer speeds of up to 21 Mbit/s. Work is also
progressing on improving the uplink transfer speed with the High-Speed Uplink Packet Access
(HSUPA). Longer term, the 3GPP Long Term Evolution (LTE) project plans to move UMTS to
4G speeds of 100 Mbit/s down and 50 Mbit/s up, using a next generation air interface technology
based upon orthogonal frequency-division multiplexing.
Unit – IV: MOBILE AD-HOC NETWORKS : Ad-Hoc basic concepts – Characteristics- Applications
–Design Issues – Routing – Essential of Traditional Routing Protocols – Popular Routing Protocols –
Vehicular Ad-Hoc Networks (VANET)- MANET Vs VANET – Security.
19
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
4.2 Characteristics
Operating without a central coordinator
Multi-hop radio relaying
Frequent link breakage due to mobile nodes
Constraint resources (bandwidth, computing power, battery lifetime, etc.)
Instant deployment
4.3 Applications
Military applications
Collaborative computing
Emergency rescue
Mesh networks
Wireless sensor networks
Multi-hop cellular networks
Wireless Community Network
4.4 MANET Design Issues
A mobile ad hoc network is a collection of wireless nodes that can dynamically be set up
anywhere and anytime without using any pre-existing network infrastructure. It is an
autonomous system in which mobile hosts connected by wireless links are free to move
randomly and often act as routers at the same time. The traffic types in ad hoc networks are quite
different from those in an infrastructured wireless network including:
1) Peer-to-Peer. Communication between two nodes which are within one hop. Network traffic
(Bps) is usually consistent.
2) Remote-to-Remote. Communication between two nodes beyond a single hop but which
maintain a stable route between them. This may be the result of several nodes staying within
communication range of each other in a single area or possibly moving as a group. The traffic is
similar to standard network traffic.
3) Dynamic Traffic. This occurs when nodes are dynamic and moving around. Routes must be
reconstructed. This results in a poor connectivity and network activity in short bursts.
MANET has the following features:
20
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
1) Autonomous terminal.
In MANET, each mobile terminal is an autonomous node, which may function as both a
host and a router. In other words, besides the basic processing ability as a host, the mobile nodes
can also perform switching functions as a router. So usually endpoints and switches are
indistinguishable in MANET.
2) Distributed operation.
Since there is no background network for the central control of the network operations,
the control and management of the network is distributed among the terminals. The nodes
involved in a MANET should collaborate amongst themselves and each node acts as a relay as
needed, to implement functions e.g. security and routing.
3) Multihop routing.
Basic types of ad hoc routing algorithms can be single-hop and multihop, based on
different link layer attributes and routing protocols. Single-hop MANET is simpler than multihop
in terms of structure and implementation, with the cost of lesser functionality and applicability.
When delivering data packets from a source to its destination out of the direct wireless
transmission range, the packets should be forwarded via one or more intermediate nodes.
4) Dynamic network topology.
Since the nodes are mobile, the network topology may change rapidly and unpredictably
and the connectivity among the terminals may vary with time. MANET should adapt to the
traffic and propagation conditions as well as the mobility patterns of the mobile network nodes.
The mobile nodes in the network dynamically establish routing among themselves as they move
about, forming their own network on the fly. Moreover, a user in the MANET may not only
operate within the ad hoc network, but may require access to a public fixed network (e.g.
Internet). Service Area Access Point Service Area Access Point Backbone Service Area (a)
Infrastructure-based wireless network (b) Ad hoc wireless network
5) Fluctuating link capacity.
The nature of high bit-error rates of wireless connection might be more profound in a
MANET. One end-to-end path can be shared by several sessions. The channel over which the
terminals communicate is subject to noise, fading, and interference, and has less bandwidth than
a wired network. In some scenarios, the path between any pair of users can traverse multiple
wireless links and the link themselves can be heterogeneous.
21
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
6) Light-weight terminals.
In most cases, the MANET nodes are mobile devices with less CPU processing
capability, small memory size, and low power storage.
MANET Applications
With the increase of portable devices as well as progress in wireless communication, ad -
hoc networking is gaining importance with the increasing number of widespread applications.
Ad hoc networking can be applied anywhere where there is little or no communication
infrastructure or the existing infrastructure is expensive or inconvenient to use. Ad hoc
networking allows the devices to maintain connections to the network as well as easily adding
and removing devices to and from the network. The set of applications for MANETs is diverse,
ranging from large-scale, mobile, highly dynamic networks, to small, static networks that are
constrained by power sources. Besides the legacy applications that move from traditional
infrastructured environment into the ad hoc context, a great deal of new services can and will be
generated for the new environment.
Typical applications include:
1) Military battlefield.
Military equipment now routinely contains some sort of computer equipment. Ad hoc
networking would allow the military to take advantage of commonplace network technology to
maintain an information network between the soldiers, vehicles, and military information head
quarters. The basic techniques of ad hoc network came from this field.
2) Commercial sector.
Ad hoc can be used in emergency/rescue operations for disaster relief efforts, e.g. in fire,
flood, or earthquake. Emergency rescue operations must take place where non-existing or
damaged communications infrastructure and rapid deployment of a communication network is
needed. Information is relayed from one rescue team member to another over a small handheld.
Other commercial scenarios include e.g. ship-to-ship ad hoc mobile communication, law
enforcement, etc.
3) Local level.
Ad hoc networks can autonomously link an instant and temporary multimedia network
using notebook computers or palmtop computers to spread and share information among
participants at a e.g. conference or classroom. Another appropriate local level application might
22
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
Link State Routing Protocol : Link state routing has a different philosophy from that of
distance vector routing. In link state routing, if each node in the domain has the entire topology
of the domain the list of nodes and links, how they are connected including the type, cost
(metric), and condition of the links (up or down)-the node can use Dijkstra's algorithm to build a
routing table.
Distance Vector Routing Protocol : In this protocol, the least cost route between any two nodes
is the route with minimum distance. Each node maintains a vector (table) of minimum distances
to every node. This guides the packets to the desired node.
Destination sequenced distance vector routing (DSDV) is adapted from the conventional
Routing Information Protocol (RIP) to ad hoc networks routing. It adds a new attribute, sequence
23
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
number, to each route table entry of the conventional RIP. Using the newly added sequence
number, the mobile nodes can distinguish stale route information from the new and thus prevent
the formation of routing loops.
In DSDV, each mobile node of an ad hoc network maintains a routing table, which lists
all available destinations, the metric and next hop to each destination and a sequence number
generated by the destination node. Using such routing table stored in each mobile node, the
packets are transmitted between the nodes of an ad hoc network. Each node of the ad hoc
network updates the routing table with advertisement periodically or when significant new
information is available to maintain the consistency of the routing table with the dynamically
changing topology of the ad hoc network.
If a node receives multiple update packets for a same destination during the waiting time
period, the routes with more recent sequence numbers are always preferred as the basis for
packet forwarding decisions, but the routing information is not necessarily advertised
immediately, if only the sequence numbers have been changed. If the update packets have the
same sequence number with the same node, the update packet with the smallest metric will be
used and the existing route will be discarded or stored as a less preferable route. In this case, the
update packet will be propagated with the sequence number to all mobile nodes in the ad hoc
network.
Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks. It is
similar to AODV in that it forms a route on-demand when a transmitting node requests one.
However, it uses source routing instead of relying on the routing table at each intermediate
device. Determining source routes requires accumulating the address of each device between the
source and destination during route discovery. The accumulated path information iscached by
nodes processing the route discovery packets. The learned paths are used to route packets. To
accomplish source routing, the routed packets contain the address of each device the packet will
traverse. This may result in high overhead for long paths or large addresses, like IPv6.
24
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
To avoid using source routing, DSR optionally defines a flow id option that allows
packets to be forwarded on a hop-by-hop basis. This protocol is truly based on source routing
whereby all the routing information is maintained (continually updated) at mobile nodes. It has
only two major phases, which are Route Discovery and Route Maintenance. Route Reply would
only be generated if the message has reached the intended destination node (route record which
is initially contained in Route Request would be inserted into the Route Reply).
To return the Route Reply, the destination node must have a route to the source node. If
the route is in the Destination Node's route cache, the route would be used. Otherwise, the node
will reverse the route based on the route record in the Route Request message header (this
requires that all links are symmetric). In the event of fatal transmission, the Route Maintenance
Phase is initiated whereby the Route Error packets are generated at a node.
The erroneous hop will be removed from the node's route cache; all routes containing the
hop are truncated at that point. Again, the Route Discovery Phase is initiated to determine the
most viable route.
Dynamic source routing protocol (DSR) is an on-demand protocol designed to restrict the
bandwidth consumed by control packets in ad hoc wireless networks by eliminating the periodic
table-update messages required in the table-driven approach. The major difference between this
and the other on-demand routing protocols is that it is beacon-less and hence does not require
periodic hello packet (beacon) transmissions, which are used by a node to inform its neighbors of
its presence.
The basic approach of this protocol (and all other on-demand routing protocols) during
the route construction phase is to establish a route by flooding RouteRequest packets in the
network. The destination node, on receiving a RouteRequest packet, responds by sending a
RouteReply packet back to the source, which carries the route traversed by the RouteRequest
packet received.
Each RouteRequest carries a sequence number generated by the source node and the path
it has traversed. A node, upon receiving a RouteRequest packet, checks the sequence number on
the packet before forwarding it. The packet is forwarded only if it is not a duplicate
RouteRequest. The sequence number on the packet is used to prevent loop formations and to
avoid multiple transmissions of the same RouteRequest by an intermediate node that receives it
25
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
through multiple paths. Thus, all nodes except the destination forward a RouteRequest packet
during the route construction phase. A destination node, after receiving the first RouteRequest
packet, replies to the source node through the reverse path the RouteRequest packet had
traversed. Nodes can also learn about the neighbouring routes traversed by data packets if
operated in the promiscuous mode (the mode of operation in which a node can receive the
packets that are neither broadcast nor addressed to itself). This route cache is also used during
the route construction phase
This causes control traffic overhead to be dynamic and it will result in an initial delay when
initiating such communication. A route is considered found when the RREQ message reaches
either the destination itself, or an intermediate node with a valid route entry for the destination.
For as long as a route exists between two endpoints, AODV remains passive. When the route
becomes invalid or lost, AODV will again issue a request.
AODV avoids the ``counting to infinity'' problem from the classical distance vector algorithm by
using sequence numbers for every route. The counting to infinity problem is the situation where
nodes update each other in a loop. Consider nodes A, B, C and D making up a MANET. A is not
updated on the fact that its route to D via C is broken. This means that A has a registered route,
with a metric of 2, to D. C has registered that the link to D is down, so once node B is updated on
the link breakage between C and D, it will calculate the shortest path to D to be via A using a
metric of 3. C receives information that B can reach D in 3 hops and updates its metric to 4
hops. A then registers an update in hop-count for its route to D via C and updates the metric to 5.
And so they continue to increment the metric in a loop.
26
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
27
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
28
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
phones) contain two mobile operating systems – the main user-facing software platform is
supplemented by a second low-level proprietary real-time operating system which operates the
radio and other hardware. Research has shown that these low-level systems may contain a range
of security vulnerabilities permitting malicious base stations to gain high levels of control over
the mobile device.
5.2 Special Constraints and Requirements
Design and capabilities of a Mobile OS (Operating System) is very different than general
purpose OS running on desktop machines
Physically Constrained
Battery-powered device
Small screens of varying shapes, sizes, and resolutions
Memory
Storage space
Working in Uncertainty
Networks come and go
Other devices appear and disappear
OS need to provide robust methods for handling connections and coping with service
interruptions and ad hoc attempts to communicate.Today's mobile devices are multifunctional
devices capable of hosting a broad range of applications for both business and consumer use.
Smartphones and tablets enable people to use their mobile device to access the Internet for email,
instant messaging, text messaging and Web browsing, as well as work documents, contact lists
and more. Mobile devices are often seen as an extension to your own PC or laptop, and in some
cases newer, more powerful mobile devices can even completely replace PCs. And when the
devices are used together, work done remotely on a mobile device can be synchronized with PCs
to reflect changes and new information while away from the computer.
Much like the Linux or Windows operating system controls your desktop or laptop
computer, a mobile operating system is the software platform on top of which other programs
can run on mobile devices. A mobile operating system, also called a mobile OS, is an operating
system that is specifically designed to run on mobile devices such as mobile phones,
smartphones, PDAs, tablet computers and other handheld devices.
29
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
30
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
31
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
Some SDKs are required for developing a platform-specific app. For example, the development
of an Android app on Java platform requires a Java Development Kit. For IOS applications
(apps) the IOS SDK is required. For Universal Windows Platform the .NET Framework
SDK might be used. There are also SDKs that add new features, they are installed in apps to
provide analytics and data about application activity. Some prominent creators of these types of
SDKs include Google, InMobi, and Facebook.
iOS
iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc.
exclusively for its hardware. It is the operating system that presently powers many of the
company's mobile devices, including the iPhone, and iPod Touch; it also powered the iPad prior
to the introduction of iPadOS in 2019.
Android
Android is an open source and Linux-based Operating System for mobile devices such as
smartphones and tablet computers. Android was developed by the Open Handset Alliance, led by
Google, and other companies.
Android offers a unified approach to application development for mobile devices which means
developers need only develop for Android, and their applications should be able to run on
different devices powered by Android.
The first beta version of the Android Software Development Kit (SDK) was released by Google
in 2007 where as the first commercial version, Android 1.0, was released in September 2008.
On June 27, 2012, at the Google I/O conference, Google announced the next Android version,
4.1 Jelly Bean. Jelly Bean is an incremental update, with the primary aim of improving the user
interface, both in terms of functionality and performance.
The source code for Android is available under free and open source software licenses. Google
publishes most of the code under the Apache License version 2.0 and the rest, Linux kernel
changes, under the GNU General Public License version 2.
32
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
Android Applications
Android applications are usually developed in the Java language using the Android
Software Development Kit. Once developed, Android applications can be packaged easily and
sold out either through a store such as Google Play, SlideME, Opera Mobile
Store, Mobango, F-droid and the Amazon Appstore. Android powers hundreds of millions of
mobile devices in more than 190 countries around the world. It's the largest installed base of any
mobile platform and growing fast. Every day more than 1 million new Android devices are
activated worldwide.
Blackberry
BlackBerry OS is a proprietary mobile operating system developed by Canadian
company BlackBerry Limited for its BlackBerry line of smart phone handheld devices. Updates
to the operating system may be automatically available from wireless carriers that support
the BlackBerry over the air software loading (OTASL) service.
Windows Phone
Windows Phone is Microsoft's smart phone operating system and a brand for the
numerous hardware designs that run on it. Windows Phone uses a Metro-derived user interface
(UI), closely reflecting and relying on the tile-like interface introduced with the desktop systems.
5.5 M-Commerce
Mobile Commerce, also known as m-commerce . It is the use of wireless handheld
devices like cell phones and tablets to conduct commercial transactions online, including the
purchase and sale of products, online banking, and paying bills. The industries affected most by
m-commerce include:
Financial services, which includes mobile banking (when customers use their handheld
devices to access their accounts and pay their bills) as well as brokerage services, in which
stock quotes can be displayed and trading conducted from the same handheld device.
Telecommunications, in which service changes, bill payment and account reviews can all be
performed from the same handheld device.
Service and retail, as consumers are given the ability to place and pay for orders on-the-fly.
33
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
Information services, which include the delivery of financial news, sports figures and traffic
updates to a single mobile device.
More convenience for customers in comparing prices, reading reviews and making purchases
without the need of a desktop computer.
A poorly executed mobile experience can deter customers from making purchases.
Mobile payment options are not available in every geographic location and may not support
every type of digital wallet.
Businesses must know and comply with tax laws and regulations of all countries they ship to
some businesses will avoid this by only allowing purchases and shipping from their country
of origin.
34
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
alternative to cash, checks, credit cards and debit cards, and can make possible new opportunities
for commerce convenience. Mobile payment (also referred to as mobile money, mobile money
transfer, and mobile wallet) generally refer to payment services operated under financial
regulation and performed from or via a mobile device. Instead of paying with cash, cheque, or
credit cards, a consumer can use a mobile to pay for a wide range of services and digital or hard
goods.
5.9 Security Issues
The concept of security in M-commerce is the most important aspect of a business that a
mobile-system should respond to. There is no need to implement, such system without securing
its environment, especially where transactions involve monetary value. Different views from
participants in an M-commerce scenario, percept, security and privacy as major factors for
markets breakthrough of the according system. Moving from participant’s point of views, I have
defined five security objectives / standards that a system should respond to:
Authentication: Ensure that the content of the transaction originates from the presumed
sender/partner.
Integrity: Ensure that the content of transaction is not modified during the delivery and cannot
be altered at any time. The technique used is called digital signatures.
Authorization: Ensure that anyone involved in the transaction must be recognize and verified in
order to authorize/allow the transaction to take place. It is more like digital certificates.
Non-repudiation: No-one should be able to claim that any transaction on his/her behalf was
made without their knowledge. The concept of digital signatures is applied.
The mobile device – confidential user data on the mobile device as well as the device itself
should be protected from unauthorized use. The security mechanisms employed here include
user authentication (e.g. PIN or password authentication), secure storage of confidential data
(e.g. SIM card in mobile phones) and security of the operating system.
35
Mobile Computing Prepared by Mrs.N.S.Abinaya,M.Sc.,M.Phil.,
The network operator infrastructure – security mechanisms for the end user often terminate in the
access network. This raises questions regarding the security of the user’s data within and beyond
the access network. Moreover, the user receives certain services for which he/she has to pay.
This often involves the network operator and he/she will want to be assured about correct
charging and billing.
36