Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
24 views24 pages

Mobile Computing Unit 2 Notes

Wireless networking enables devices to communicate without physical cables, utilizing radio waves and other signals. It includes various types such as WLAN, WPAN, WMAN, and WWAN, each serving different ranges and applications. Key components include access points, routers, and security measures like encryption and authentication to address vulnerabilities.

Uploaded by

Arpita Agarwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views24 pages

Mobile Computing Unit 2 Notes

Wireless networking enables devices to communicate without physical cables, utilizing radio waves and other signals. It includes various types such as WLAN, WPAN, WMAN, and WWAN, each serving different ranges and applications. Key components include access points, routers, and security measures like encryption and authentication to address vulnerabilities.

Uploaded by

Arpita Agarwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Wireless Networking

Introduction

Wireless networking refers to the technology that enables devices to communicate without
using physical cables. Instead of relying on wired connections like Ethernet, wireless
networks utilize radio waves, infrared, or satellite signals to transmit data. Wireless
networking has revolutionized communication, enabling mobility, scalability, and ease of
connectivity in various applications, including personal, enterprise, and industrial networks.

Basics of Wireless Networking

A wireless network consists of devices that communicate over airwaves rather than through
cables. The fundamental components include:

• Wireless Access Points (WAPs): Devices that allow wireless devices to connect to a
wired network.

• Wireless Network Interface Cards (WNICs): Hardware in computers and other


devices enabling wireless communication.

• Routers: Devices that direct data traffic between networks.

• Antennas: Components that transmit and receive signals.

• Modems: Convert digital data to a format suitable for transmission.

Types of Wireless Networks

Wireless networking can be categorized into different types based on range, technology, and
application:

1. Wireless Local Area Network (WLAN)

A WLAN connects devices within a limited geographical area, such as a home, office, or
campus. It typically operates on the IEEE 802.11 (Wi-Fi) standard. WLANs provide mobility
and ease of installation compared to wired networks.

2. Wireless Personal Area Network (WPAN)

A WPAN connects devices within a short range (typically a few meters). Technologies used
include:

• Bluetooth: Operates in the 2.4 GHz frequency band, used for short-range
communication between devices.

• Infrared (IR): Used for remote controls and device-to-device communication.

3. Wireless Metropolitan Area Network (WMAN)


WMAN covers a city or large area, often using technologies like WiMAX (IEEE 802.16). It is
suitable for providing broadband internet services over wide areas.

4. Wireless Wide Area Network (WWAN)

WWAN provides network access over large geographic areas using cellular technologies (3G,
4G, 5G). It is commonly used for mobile internet and remote connectivity.

Wireless Communication Technologies

Various wireless communication technologies enable data transmission in different


scenarios:

1. Wi-Fi (IEEE 802.11)

Wi-Fi is the most widely used wireless networking technology. It operates on multiple
frequency bands (2.4 GHz, 5 GHz, and 6 GHz) and supports different standards:

• 802.11a: Operates on the 5 GHz band, providing high-speed data transfer.

• 802.11b/g: Operates on the 2.4 GHz band, offering broader coverage but lower
speeds.

• 802.11n: Uses MIMO (Multiple Input Multiple Output) for higher speeds and
improved reliability.

• 802.11ac/ax (Wi-Fi 6): Enhances performance with better efficiency and increased
speed.

2. Bluetooth

Bluetooth is used for short-range communication between devices such as smartphones,


laptops, and IoT devices. Bluetooth Low Energy (BLE) is an energy-efficient version widely
used in wearable technology and smart home devices.

3. Cellular Networks (3G, 4G, 5G)

Cellular networks use radio waves to provide wide-area connectivity.

• 3G: Introduced mobile internet access.

• 4G LTE: Enhanced data speeds for HD streaming and gaming.

• 5G: Offers ultra-high speed, low latency, and improved network capacity.

4. Near Field Communication (NFC)

NFC enables close-range wireless communication, commonly used for contactless payments
and data transfer between devices.

5. Li-Fi (Light Fidelity)


Li-Fi is an emerging technology that uses visible light for high-speed wireless
communication, offering an alternative to radio-based networks.

Security in Wireless Networks

Wireless networks are vulnerable to security threats due to the open nature of
communication channels. Key security measures include:

1. Encryption

Encryption protects data from unauthorized access. Common encryption standards include:

• WEP (Wired Equivalent Privacy): An outdated and insecure encryption method.

• WPA (Wi-Fi Protected Access): Improved security over WEP.

• WPA2/WPA3: Modern encryption standards offering strong protection.

2. Authentication

Authentication mechanisms verify the identity of users and devices. Common methods
include:

• MAC Address Filtering: Allows only specific devices to connect.

• RADIUS Server: Provides centralized authentication.

• Two-Factor Authentication (2FA): Enhances security by requiring an additional


authentication factor.

3. Intrusion Detection and Prevention Systems (IDPS)

IDPS monitors network traffic to detect and prevent unauthorized access or malicious
activities.

4. Firewalls

Firewalls act as barriers between trusted and untrusted networks, filtering incoming and
outgoing traffic based on predefined rules.

Advantages of Wireless Networking

Wireless networking offers several benefits:

• Mobility: Users can access the network from anywhere within range.

• Scalability: Easy to expand without additional physical infrastructure.

• Cost-Effectiveness: Reduces the cost of installing and maintaining cables.

• Flexibility: Supports a wide range of devices and applications.

Challenges and Limitations


Despite its advantages, wireless networking has some challenges:

• Security Risks: Prone to eavesdropping, hacking, and unauthorized access.

• Interference: Signals may be affected by physical obstacles, other wireless devices, or


environmental factors.

• Limited Range: Wireless networks have a shorter range compared to wired


connections.

• Bandwidth Constraints: High congestion can lead to reduced speeds and


performance.

Future of Wireless Networking

Wireless networking is evolving with new technologies to enhance speed, security, and
efficiency. Some trends include:

• 6G Networks: Expected to provide even faster speeds and ultra-low latency.

• IoT (Internet of Things): Growing adoption of connected devices.

• AI-Driven Network Management: AI-powered solutions for optimizing network


performance and security.

• Edge Computing: Enhancing processing capabilities closer to the data source.

Wireless LAN (WLAN)

Introduction

Wireless Local Area Network (WLAN) is a type of wireless network that allows devices to
connect and communicate without the need for physical cables. WLANs use radio waves to
enable communication between devices, providing mobility, flexibility, and ease of
deployment compared to traditional wired networks. WLANs are widely used in homes,
offices, universities, and public places to provide internet access and facilitate seamless
communication.

Basics of Wireless LAN

A WLAN consists of several components that work together to enable wireless connectivity.
These include:

• Access Points (APs): Devices that transmit and receive wireless signals, acting as a
bridge between wired and wireless networks.
• Wireless Network Interface Cards (WNICs): Hardware in computers, smartphones,
and other devices that enable wireless communication.

• Routers: Devices that direct data traffic between networks and enable internet
access.

• Antennas: Components that transmit and receive signals to extend network


coverage.

• Modems: Convert digital data to a format suitable for transmission.

Types of WLAN

WLANs can be classified based on their application and configuration:

1. Infrastructure Mode

In this mode, devices communicate through access points (APs) connected to a wired
network. This is the most common type of WLAN and is used in homes, offices, and public
spaces.

2. Ad-Hoc Mode

In an ad-hoc WLAN, devices communicate directly with each other without the need for an
access point. This mode is useful for temporary networks, such as file sharing between
laptops or gaming setups.

3. Enterprise WLAN

Enterprise WLANs are large-scale networks designed for businesses, universities, and
institutions. They often use multiple access points and advanced security measures to
manage large numbers of users efficiently.

4. Public WLAN (Hotspots)

Public WLANs, also known as Wi-Fi hotspots, are available in public places like cafes,
airports, and libraries. They provide internet access to users within a specific range.

WLAN Standards (IEEE 802.11)

WLANs operate on the IEEE 802.11 standard, commonly known as Wi-Fi. Different versions
of the standard have been developed to improve speed, range, and security:

• 802.11a: Operates at 5 GHz with speeds up to 54 Mbps.

• 802.11b: Operates at 2.4 GHz with speeds up to 11 Mbps.

• 802.11g: Operates at 2.4 GHz with speeds up to 54 Mbps.

• 802.11n: Introduces MIMO (Multiple Input Multiple Output) for higher speeds up to
600 Mbps.
• 802.11ac: Operates at 5 GHz with speeds up to 1 Gbps.

• 802.11ax (Wi-Fi 6): Enhances efficiency, speed, and capacity for modern networks.

How WLAN Works

WLANs use radio frequency signals to transmit data between devices and access points. The
process involves:

1. A wireless device (e.g., laptop, smartphone) sends a connection request.

2. The access point authenticates the device and grants network access.

3. Data is transmitted using radio waves, modulated to encode information.

4. The access point forwards data to the router or internet for further communication.

Security in WLAN

Since WLANs transmit data over the air, they are vulnerable to security threats. Common
security measures include:

1. Encryption

Encryption ensures data privacy by encoding transmitted data. Common encryption


protocols include:

• WEP (Wired Equivalent Privacy): Weak and outdated.

• WPA (Wi-Fi Protected Access): More secure than WEP.

• WPA2/WPA3: Strong encryption standards used in modern networks.

2. Authentication

Authentication methods verify users before granting access. These include:

• MAC Address Filtering: Restricts network access to specific devices.

• RADIUS Server: Centralized authentication for enterprise networks.

• Two-Factor Authentication (2FA): Adds an extra layer of security.

3. Firewalls and Intrusion Detection Systems

Firewalls and intrusion detection systems (IDS) monitor and filter network traffic to prevent
unauthorized access and attacks.

Advantages of WLAN

• Mobility: Users can move freely within the network range.

• Scalability: Networks can be expanded without additional cables.


• Ease of Installation: Quick setup compared to wired networks.

• Cost-Effectiveness: Reduces infrastructure and maintenance costs.

Challenges of WLAN

• Security Risks: Susceptible to hacking and unauthorized access.

• Interference: Other electronic devices and physical obstacles can disrupt signals.

• Limited Range: Coverage depends on access point placement and environment.

• Bandwidth Limitations: High user density can lead to network congestion.

Future of WLAN

WLAN technology continues to evolve with advancements such as:

• Wi-Fi 6E: Utilizes the 6 GHz band for improved speed and efficiency.

• Mesh Networking: Enhances coverage by using multiple interconnected access


points.

• AI and Machine Learning: Optimizes network performance and security.

• Integration with 5G: Enables seamless connectivity in hybrid wireless environments.

MAC Issues in Wireless Networks

Introduction

Medium Access Control (MAC) plays a crucial role in wireless networking by regulating how
devices share the communication medium. Unlike wired networks, where dedicated links
exist between nodes, wireless networks use a shared transmission medium, leading to
several challenges. This document explores the key MAC issues in wireless networks,
including collision, hidden terminal problems, exposed terminal problems, and fairness.

1. Collision in Wireless Networks

Collisions occur when multiple devices attempt to transmit data simultaneously, causing
interference and data loss. In wireless networks, collisions are more problematic than in
wired networks because:

• Lack of Collision Detection: Unlike Ethernet, where CSMA/CD (Carrier Sense Multiple
Access with Collision Detection) is used, wireless networks cannot listen while
transmitting, making collision detection difficult.
• Signal Propagation Delays: Due to varying distances between devices, signals take
different times to reach the receiver, increasing the likelihood of overlapping
transmissions.

Collision Avoidance Strategies

To address collisions, wireless networks use CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance):

• RTS/CTS (Request to Send / Clear to Send): A handshake mechanism where a sender


requests transmission permission from the receiver before sending data.

• Backoff Mechanism: After detecting a busy channel, a device waits for a random
time before attempting retransmission.

2. Hidden Terminal Problem

The hidden terminal problem occurs when two devices (A and C) are out of each other's
range but within the range of a common access point (B). If A transmits data to B while C
also transmits to B (unaware of A’s transmission), collisions can occur at B.

Solution:

• RTS/CTS Mechanism: Helps notify all devices within range about ongoing
transmissions to avoid collisions.

3. Exposed Terminal Problem

The exposed terminal problem occurs when a device refrains from transmitting
unnecessarily due to the presence of another transmission nearby. For example, if A is
transmitting to B and C wants to send data to D, C may sense A’s transmission and wrongly
assume that it cannot transmit, leading to reduced network efficiency.

Solution:

• Use of RTS/CTS with Adaptive Power Control: Helps distinguish between interfering
transmissions and independent communications.

4. Fairness in MAC

Fairness ensures that all devices get an equal opportunity to access the wireless channel.
Common fairness issues include:

• Starvation: Some nodes may dominate channel access while others struggle to
transmit.

• Contention Window Adjustment: CSMA/CA-based protocols use a contention


window that needs to be adjusted dynamically to balance fairness and efficiency.

Solution:
• Weighted Fair Queuing (WFQ): Ensures fair distribution of bandwidth.

• Adaptive Contention Window Mechanisms: Adjusts waiting times based on network


congestion levels.

IEEE 802.11 Standard for Wireless LANs

Introduction

IEEE 802.11 is a set of wireless networking standards developed by the Institute of Electrical
and Electronics Engineers (IEEE) to define wireless local area network (WLAN)
communication. These standards specify protocols for wireless data transmission, frequency
bands, security mechanisms, and performance enhancements. Since its inception in 1997,
IEEE 802.11 has undergone multiple revisions to improve speed, efficiency, and security.

Evolution of IEEE 802.11 Standards

IEEE 802.11 has evolved through multiple amendments, each enhancing various aspects of
wireless communication. Below are the major versions:

1. IEEE 802.11 (Legacy - 1997)

The original 802.11 standard operated at 2.4 GHz with a maximum data rate of 2 Mbps. It
used Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum
(DSSS) for signal transmission.

2. IEEE 802.11a (1999)

• Operates on the 5 GHz frequency band.

• Supports a maximum data rate of 54 Mbps.

• Uses Orthogonal Frequency Division Multiplexing (OFDM) for better efficiency.

• Less interference compared to 2.4 GHz but with reduced range.

3. IEEE 802.11b (1999)

• Operates at 2.4 GHz.

• Maximum data rate of 11 Mbps.

• Uses DSSS for improved signal integrity.

• Widespread adoption due to better range compared to 802.11a.

4. IEEE 802.11g (2003)

• Operates at 2.4 GHz but uses OFDM like 802.11a.


• Maximum data rate of 54 Mbps.

• Backward compatible with 802.11b.

• More susceptible to interference due to the crowded 2.4 GHz band.

5. IEEE 802.11n (2009)

• Operates on both 2.4 GHz and 5 GHz bands.

• Introduced Multiple Input Multiple Output (MIMO) technology.

• Maximum data rate of 600 Mbps.

• Increased range and efficiency compared to previous standards.

6. IEEE 802.11ac (2013) – Wi-Fi 5

• Operates only on the 5 GHz band.

• Supports higher data rates up to 6.9 Gbps.

• Uses Multi-User MIMO (MU-MIMO) to serve multiple clients simultaneously.

• Wider channel bandwidths (up to 160 MHz) for improved performance.

7. IEEE 802.11ax (2019) – Wi-Fi 6

• Operates on both 2.4 GHz and 5 GHz bands.

• Improves efficiency with Orthogonal Frequency Division Multiple Access (OFDMA).

• Maximum data rate of 9.6 Gbps.

• Better performance in dense environments (e.g., stadiums, offices).

• Target Wake Time (TWT) feature for power-saving in IoT devices.

8. IEEE 802.11be (Upcoming) – Wi-Fi 7

• Expected to operate on 2.4 GHz, 5 GHz, and 6 GHz.

• Higher speeds (potentially exceeding 30 Gbps).

• Improved MU-MIMO and OFDMA.

IEEE 802.11 Architecture

A WLAN under IEEE 802.11 consists of:

• Stations (STAs): Wireless devices like laptops, smartphones, or IoT devices.

• Access Points (APs): Provide connectivity between STAs and the wired network.

• Basic Service Set (BSS): A group of STAs communicating with an AP.


• Extended Service Set (ESS): Multiple BSSs connected via a distribution system.

• Ad-hoc Mode: Direct device-to-device communication without an AP.

• Infrastructure Mode: STAs connect through an AP to access network services.

IEEE 802.11 Security Mechanisms

To protect WLANs, IEEE 802.11 standards incorporate several security features:

1. Wired Equivalent Privacy (WEP)

• Early encryption standard but considered weak due to vulnerabilities.

2. Wi-Fi Protected Access (WPA)

• Improved encryption and authentication compared to WEP.

3. Wi-Fi Protected Access 2 (WPA2)

• Uses Advanced Encryption Standard (AES) for stronger security.

4. Wi-Fi Protected Access 3 (WPA3)

• Enhanced encryption and protection against brute-force attacks.

• Introduces Simultaneous Authentication of Equals (SAE) for better authentication


security.

Medium Access Control (MAC) in IEEE 802.11

MAC layer controls access to the wireless medium and ensures efficient data transmission.
Key MAC techniques include:

• Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): Avoids data
collisions by sensing the channel before transmitting.

• Request to Send / Clear to Send (RTS/CTS): Helps mitigate hidden terminal


problems.

• Fragmentation and Reassembly: Improves transmission reliability in noisy


environments.

• Power Management: Reduces power consumption in battery-powered devices.

Advantages of IEEE 802.11

• Mobility: Enables wireless access anywhere within range.

• Scalability: Supports expanding networks without additional cabling.

• Flexibility: Works with various devices and applications.


• High Speed: Improved data rates with new standards like Wi-Fi 6.

Challenges of IEEE 802.11

• Interference: Other wireless devices can cause signal degradation.

• Security Risks: Open networks are vulnerable to attacks.

• Limited Range: Wireless signals degrade over long distances.

• Network Congestion: High-density environments can impact performance.

Future of IEEE 802.11

• Wi-Fi 7 (802.11be): Promises even faster speeds and lower latency.

• Integration with 5G: Seamless connectivity between cellular and Wi-Fi networks.

• AI-Driven Network Management: Automating performance optimization.

Wireless Multiple Access Protocols

Wireless communication has revolutionized the way devices connect and exchange data.
Since multiple devices share the same communication medium in a wireless network,
Multiple Access Protocols play a crucial role in managing access efficiently. These protocols
ensure fair usage, reduce collisions, and enhance network performance.

In this article, we will explore the different types of Wireless Multiple Access Protocols,
their working principles, advantages, and challenges.

1. Introduction to Multiple Access Protocols

Multiple Access Protocols are mechanisms that allow multiple devices to transmit and
receive data over a shared communication channel without excessive interference. Wireless
networks, unlike wired ones, do not have a dedicated path for each device. Instead, all
nodes share the radio frequency spectrum, leading to potential issues such as collisions,
congestion, and fairness in data transmission.

To overcome these challenges, Wireless Multiple Access Protocols are designed to ensure
efficient communication among multiple users. These protocols mainly fall under three
categories:

1. Random Access Protocols


2. Controlled Access Protocols

3. Channelization Protocols

2. Random Access Protocols

Random Access Protocols allow devices to transmit data whenever they have data to send.
These protocols work on the principle of contention, meaning that devices compete for
access to the channel. If two or more devices transmit simultaneously, a collision occurs, and
retransmission is required.

A. ALOHA (Pure and Slotted ALOHA)

ALOHA is one of the earliest random access protocols. It has two variants:

• Pure ALOHA: Devices transmit data whenever they want. If a collision occurs, the
sender waits for a random period and retransmits. The main disadvantage is the high
probability of collisions, limiting efficiency to about 18%.

• Slotted ALOHA: Time is divided into discrete slots, and devices can only send data at
the beginning of a slot. This reduces collisions and improves efficiency to around
37%.

B. Carrier Sense Multiple Access (CSMA)

CSMA improves upon ALOHA by listening to the channel before transmitting. If the channel
is idle, transmission occurs; otherwise, the device waits. There are different types of CSMA:

• Non-Persistent CSMA: If the channel is busy, the device waits for a random time
before sensing again.

• 1-Persistent CSMA: If the channel is busy, the device continuously senses and
transmits immediately when it becomes free.

• P-Persistent CSMA: A hybrid approach used in slotted systems, where a device


transmits with a probability p when the channel is free.

C. CSMA with Collision Detection (CSMA/CD) and Collision Avoidance (CSMA/CA)

• CSMA/CD (Used in Ethernet): Devices detect collisions while transmitting and stop
sending immediately. This is ineffective in wireless networks because collisions
cannot always be detected due to the hidden terminal problem.

• CSMA/CA (Used in Wi-Fi - IEEE 802.11): Instead of detecting collisions, CSMA/CA


avoids them by using techniques like RTS/CTS (Request to Send / Clear to Send) and
ACK (Acknowledgment) mechanisms.
3. Controlled Access Protocols

Controlled Access Protocols ensure that only one device transmits at a time, reducing
collisions and improving efficiency. These protocols work well for high-traffic networks but
introduce additional overhead due to scheduling.

A. Polling

A central controller (like a router or base station) asks each device whether it has data to
send. If the device has data, it is granted access to the channel. This method ensures fairness
but increases delay.

B. Token Passing

A token (a special control message) circulates in the network. Only the device holding the
token can transmit. Once the transmission is done, the token is passed to the next device.
This method eliminates collisions but increases complexity. Example: Token Ring Networks.

4. Channelization Protocols

Channelization protocols divide the available bandwidth into separate channels, allowing
multiple devices to transmit simultaneously without interference.

A. Frequency Division Multiple Access (FDMA)

• The available bandwidth is divided into separate frequency bands, and each device
gets a dedicated frequency.

• Used in analog cellular networks (1G) and some satellite communication systems.

• Low interference but wastes bandwidth when a device is idle.

B. Time Division Multiple Access (TDMA)

• Time is divided into slots, and each device is assigned a specific time slot to transmit.

• Used in 2G GSM networks.

• Efficient but suffers from synchronization issues and time slot wastage when a user
is idle.

C. Code Division Multiple Access (CDMA)

• All devices transmit over the same frequency spectrum but use different unique
codes (spread spectrum technique).

• Used in 3G cellular networks.

• Provides high capacity and security but requires complex signal processing.
D. Orthogonal Frequency Division Multiple Access (OFDMA)

• An advanced form of FDMA where frequency bands are divided into subcarriers,
allowing multiple users to transmit simultaneously.

• Used in 4G LTE and 5G networks.

• High spectral efficiency but complex to implement.

5. Comparison of Multiple Access Protocols

Collision Implementation
Protocol Efficiency Examples
Handling Complexity

Low (~18-
ALOHA High collisions Simple Satellite networks
37%)

Reduces
CSMA Medium Moderate Wi-Fi (802.11)
collisions

CSMA/CA Avoids collisions High Complex Wi-Fi (802.11)

Polling No collisions High Requires central control Bluetooth

Token Token Ring


No collisions High Complex
Passing Networks

FDMA No collisions Medium Simple 1G Networks

TDMA No collisions High Moderate GSM (2G)

CDMA No collisions Very High Complex 3G Networks

OFDMA No collisions Very High Very Complex 4G, 5G

6. Challenges in Wireless Multiple Access

While multiple access protocols improve efficiency, several challenges remain:

1. Interference – Signals from different devices may interfere, leading to errors.

2. Hidden and Exposed Terminal Problems – In wireless networks, some devices may
not detect each other, leading to collisions (hidden terminal) or unnecessary waiting
(exposed terminal).
3. Synchronization Issues – TDMA requires precise time synchronization, which can be
difficult in distributed systems.

4. Scalability – As the number of users increases, managing multiple access becomes


more challenging.

5. Security Concerns – Wireless networks are prone to eavesdropping and jamming


attacks.

Wireless Application Protocol (WAP) Architecture

1. Introduction to WAP

Wireless Application Protocol (WAP) is a standard for enabling mobile devices (such as
phones and PDAs) to access the internet and other network services. It was introduced to
overcome the limitations of early mobile networks, such as low bandwidth, high latency,
and limited processing power of mobile devices.

WAP provides a platform-independent framework for accessing the web, similar to how
HTTP works for wired internet. It was primarily used in 2G and early 3G networks before
being replaced by more advanced technologies like HTML5 and responsive web design in
modern smartphones.

2. WAP Architecture Overview

The WAP architecture is designed to work in a wireless environment and consists of multiple
layers that function similarly to the OSI model. It ensures that mobile devices can interact
with web services efficiently. The architecture includes the following key components:

1. Mobile Device (User Agent)

2. WAP Gateway

3. Web Server (Origin Server)

4. Wireless Network

Each component plays a crucial role in processing and delivering WAP-based content. Below
is a layered structure of the WAP architecture:

WAP Protocol Stack (Layered Model)

The WAP architecture follows a layered approach similar to TCP/IP and OSI models:
Equivalent OSI
WAP Layer Function
Layer

Application Layer Provides services like browsing (WML), scripting


Application
(WAE) (WMLScript), and telephony services.

Session Layer Manages connections and ensures efficient data


Session
(WSP) exchange.

Transaction Layer
Transport Supports reliable and unreliable data transmission.
(WTP)

Security Layer Provides encryption, authentication, and data


Transport
(WTLS) integrity.

Transport Layer Network + Maps WAP to different wireless bearers (GSM, CDMA,
(WDP) Transport etc.).

Each of these layers plays a vital role in handling wireless internet browsing, messaging, and
data transfer. Let's examine each component in detail.

3. Components of WAP Architecture

A. Mobile Device (User Agent)

• The user agent is the mobile phone, PDA, or any other wireless device capable of
accessing WAP-based content.

• It contains a WAP browser (similar to a web browser) that interprets WML (Wireless
Markup Language) pages.

• The browser interacts with a WAP Gateway to fetch and display content.

B. WAP Gateway

• Acts as an intermediary between the mobile device and the web server.

• Converts WAP requests (binary format) from mobile devices into HTTP requests for
the internet.

• Compresses and optimizes data to handle low bandwidth and high latency issues of
wireless networks.

• Functions of a WAP Gateway:

1. Protocol conversion – Translates WAP requests to HTTP requests and vice


versa.
2. Encoding and decoding – Converts content between WML and other formats.

3. Security processing – Encrypts and decrypts data using WTLS.

C. Web Server (Origin Server)

• The origin server hosts websites and web applications, typically running HTTP and
WAP services.

• Stores WML pages, images, and scripts that are accessed by mobile users.

• Responds to requests from the WAP Gateway and delivers WAP-compatible content.

D. Wireless Network

• The wireless network provides data connectivity between the mobile device and the
WAP Gateway.

• It supports different bearer networks, such as:

o GSM (Global System for Mobile Communication)

o CDMA (Code Division Multiple Access)

o GPRS (General Packet Radio Service)

o 3G, 4G, LTE

• The Wireless Data Protocol (WDP) ensures compatibility across different network
types.

4. Detailed Breakdown of WAP Protocol Stack

A. Wireless Application Environment (WAE) – Application Layer

• Equivalent to the Application layer of the OSI model.

• Provides tools and services for building mobile applications.

• Includes:

o WML (Wireless Markup Language) – Similar to HTML but optimized for small
screens.

o WMLScript – A lightweight scripting language similar to JavaScript.

o Telephony Applications – Enables integration with voice and SMS services.

B. Wireless Session Protocol (WSP) – Session Layer

• Provides session management between client and server.


• Supports connection-oriented and connectionless modes.

• Reduces overhead for wireless communication.

C. Wireless Transaction Protocol (WTP) – Transport Layer

• Manages transaction requests for reliable data transfer.

• Works similarly to TCP but optimized for wireless networks.

• Provides three classes of transaction services:

1. Unreliable message exchange (Class 0) – No acknowledgment required.

2. Reliable message exchange (Class 1) – Acknowledgment without


retransmission.

3. Reliable transaction service (Class 2) – Acknowledgment with retransmission.

D. Wireless Transport Layer Security (WTLS) – Security Layer

• Provides encryption, authentication, and data integrity.

• Equivalent to SSL/TLS in wired networks.

• Protects WAP communications from eavesdropping and data tampering.

E. Wireless Datagram Protocol (WDP) – Transport Layer

• Adapts WAP communication for different wireless networks.

• Functions like the UDP protocol in traditional networking.

• Ensures WAP works across various bearer services (GSM, GPRS, CDMA, etc.).

5. Working of WAP Architecture

1. User Request

o The mobile user enters a URL in the WAP browser.

o The request is sent in binary format to the WAP Gateway.

2. Processing by WAP Gateway

o The gateway converts the request into an HTTP request.

o It forwards the request to the origin server (web server).

3. Web Server Response

o The web server processes the request and retrieves WML content.
o The content is sent back to the WAP Gateway.

4. Data Optimization

o The WAP Gateway compresses and encodes the content to optimize it for
mobile devices.

o It converts WML to binary format to reduce transmission overhead.

5. Display on Mobile Device

o The WAP browser receives the binary WML content.

o It decodes and renders the content for the user.

6. Advantages of WAP Architecture

• Optimized for Wireless Networks – Works efficiently over low-bandwidth and high-
latency networks.

• Platform-Independent – Works on different devices and operating systems.

• Efficient Data Transfer – Uses compression and encoding to reduce data size.

• Security – Supports WTLS for encryption and authentication.

• Scalability – Can support a large number of users and devices.

7. Limitations of WAP Architecture

• Slow Data Speeds – WAP was designed for 2G networks, making it slower compared
to modern technologies.

• Limited Content – WML is less powerful than HTML, restricting functionality.

• Complex Implementation – Requires a WAP Gateway for conversion and processing.

• Security Concerns – Although WTLS exists, it is weaker than modern SSL/TLS


protocols.
Mobile IP: Enabling Seamless Mobility in Networks

1. Introduction to Mobile IP

In traditional IP networks, a device is assigned a fixed IP address based on its current


network. However, when a mobile device moves between different networks, it cannot
maintain the same IP address, causing connection disruptions. Mobile IP was developed to
solve this issue by enabling devices to maintain the same IP address while roaming across
different networks.

Why is Mobile IP Needed?

• Standard IP addressing is location-dependent, making mobility difficult.

• Changing IP addresses disrupts ongoing communication sessions.

• Mobile IP allows devices to remain reachable and connected while moving across
networks.

• It is crucial for applications like VoIP, video conferencing, and mobile computing.

2. Mobile IP Architecture

Mobile IP is defined by IETF RFC 5944 and consists of three main components:

1. Mobile Node (MN) – A device (such as a smartphone or laptop) that moves between
networks while maintaining the same IP address.

2. Home Agent (HA) – A router in the mobile node’s home network that tracks its
location and forwards data to its current location.

3. Foreign Agent (FA) – A router in a visited (foreign) network that assists the mobile
node in registering and forwarding data.

Supporting Components

• Correspondent Node (CN) – Any device that communicates with the mobile node
(e.g., a web server).

• Care-of Address (CoA) – A temporary IP address assigned to the mobile node when it
moves to a foreign network.

3. Working of Mobile IP

Mobile IP follows a registration, tunneling, and data forwarding process.

Step 1: Agent Discovery


• The Mobile Node (MN) scans for available networks.

• It receives advertisements from the Home Agent (HA) or Foreign Agent (FA).

• The MN detects whether it is in the home network or a foreign network.

Step 2: Registration

• If the MN is in a foreign network, it registers with the Foreign Agent (FA).

• The FA forwards the registration request to the Home Agent (HA).

• The HA acknowledges the request and updates the MN’s new location.

Step 3: Tunneling

• When the Correspondent Node (CN) sends data to the MN, it is first delivered to the
Home Agent.

• The HA encapsulates the data in an IP tunnel and forwards it to the Foreign Agent
(FA).

• The FA then delivers the data to the MN using the Care-of Address (CoA).

Step 4: Data Forwarding

• The MN can respond directly to the CN or route data through the HA.

• The process continues as long as the MN remains in the foreign network.

4. Tunneling in Mobile IP

Tunneling is a key technique in Mobile IP that enables packet forwarding. The HA


encapsulates the original IP packet inside another IP packet before sending it to the FA.

Types of Tunneling

1. IP-in-IP Encapsulation – The original IP packet is wrapped inside another IP header.

2. Minimal Encapsulation – A shorter header is added to reduce overhead.

3. Generic Routing Encapsulation (GRE) – A flexible encapsulation method that


supports multiple protocols.

5. Handoff in Mobile IP

A handoff (or handover) occurs when a mobile device moves from one network to another.
Mobile IP supports two types of handoff:
1. Hard Handoff

o The connection is broken before re-establishing in a new network.

o Causes temporary data loss.

2. Soft Handoff

o The mobile node connects to the new network before leaving the old one.

o Ensures seamless connectivity with no data loss.

6. Advantages of Mobile IP

Seamless Mobility – Users can move between networks without losing connection.
Continuous Communication – VoIP, video calls, and online applications work without
disruption.
Transparency – Applications work without modification.
Scalability – Supports millions of mobile devices worldwide.

7. Limitations of Mobile IP

Triangular Routing Problem – Data travels through the Home Agent, causing delays.
Security Risks – Mobile IP is vulnerable to attacks like spoofing and session hijacking.
Latency – Frequent handoffs can introduce delays.
Battery Drain – Continuous scanning and registration consume device power.

8. Mobile IP vs. Cellular IP

Feature Mobile IP Cellular IP

Mobility Type Wide-area (Global) Local (Micro-Mobility)

Handoff Type Hard Handoff Soft Handoff

Overhead High Low

Latency High Low

9. Applications of Mobile IP

• Mobile Computing – Enables laptops, smartphones, and tablets to stay connected.


• Telemedicine – Doctors can access real-time patient data remotely.

• Military Communications – Secure mobile networking for defense operations.

• IoT and Smart Cities – Ensures connectivity for smart devices.

You might also like