UNIT 4 MOBILE TCP/IP & WAP.

Slides:



Advertisements
Similar presentations
Mobile IP and Wireless Application Protocol
Advertisements

Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
OSI Model OSI MODEL.
Chapter 5: TCP/IP and OSI Business Data Communications, 5e.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Chapter 4 : TCP/IP and OSI Business Data Communications, 4e.
Semester Copyright USM EEE442 Computer Networks Introduction: Protocols En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK)
Protocols and the TCP/IP Suite
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
Mobile IP and Wireless Application Protocol
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
ECEN 619 “Internet Protocols and Modeling” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Lecture notes and Paper.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Computer Networks with Internet Technology William Stallings
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Wireless Application Protocol (WAP) Reference: Chapter 12, section 2, Wireless Communications and Networks, by William Stallings, Prentice Hall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Gursharan Singh Tatla Transport Layer 16-May
OIS Model TCP/IP Model.
Chapter 5: TCP/IP and OSI Business Data Communications, 6e.
Network and Internet Security
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
WIRELESS PROTOCOLS. The ISO OSI Reference Model A Network is a complex piece of hardware and Software.A Network is a complex piece of hardware and Software.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Protocols and the TCP/IP Suite
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Lecture 3: Networks and Protocols Anders Västberg Slides are a selection from the slides from chapter 3 and 4 from:
Mukesh N. Tekwani Elphinstone College Mumbai
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
The OSI Model.
ECEN “Internet Protocols and Modeling” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Grading (Tentative):
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
WIRELESS APPLICATION PROTOCOL Definition It is universal, open standard developed by the WAP Forum to provide mobile users of wireless phones and other.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
William Stallings Data and Computer Communications
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Net 221D:Computer Networks Fundamentals
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
ECEN “Internet Protocols and Modeling” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Lecture notes and.
TUNALIData Communications1 Chapter 2 Protocols and Architecture.
Shambhu J Upadhyaya 1 Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York COMMUNICATION PROTOCOLS.
Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocols and the TCP/IP Suite
Mobile IP and Wireless Application Protocol
Computer Networks with Internet Technology William Stallings
Mobile IP and Wireless Application Protocol
WAP.
Protocols and the TCP/IP Suite
ECEN 619 “Internet Protocols and Modeling”
ECEN “Internet Protocols and Modeling”
Chapter 2. Protocols and Architecture
Protocols and the TCP/IP Suite
Presentation transcript:

UNIT 4 MOBILE TCP/IP & WAP

TCP/IP Protocol Suite

Key Features of a Protocol Syntax Concerns the format of the data blocks Semantics Includes control information for coordination and error handling Timing Includes speed matching and sequencing

Agents Involved in Communication Applications Exchange data between computers (e.g., electronic mail) Computers Connected to networks Networks Transfers data from one computer to another

TCP/IP Layers Physical layer Network access layer Internet layer Host-to-host, or transport layer Application layer

TCP/IP Physical Layer Covers the physical interface between a data transmission device and a transmission medium or network Physical layer specifies: Characteristics of the transmission medium The nature of the signals The data rate Other related matters

TCP/IP Network Access Layer Concerned with the exchange of data between an end system and the network to which it's attached Software used depends on type of network Circuit switching Packet switching (e.g., X.25) LANs (e.g., Ethernet) Others

T:TCP/IP Internet Layer Uses internet protocol (IP) Provides routing functions to allow data to traverse multiple interconnected networks Implemented in end systems and routers

TCP/IP Host-to-Host, or Transport Layer Commonly uses transmission control protocol (tcp) Provides reliability during data exchange Completeness Order

TCP/IP Application Layer Logic supports user applications Uses separate modules that are peculiar to each different type of application

Protocol Data Units (PDUs)

Common TCP/IP Applications Simple mail transfer protocol (SMTP) Provides a basic electronic mail facility File Transfer Protocol (FTP) Allows files to be sent from one system to another TELNET Provides a remote logon capability

Layers of the OSI Model Application Presentation Session Transport Network Data link Physical

OSI Application Layer Provides access to the OSI environment for users Provides distributed information services

OSI Presentation Layer Provides independence to the application processes from differences in data representation (syntax)

OSI Session Layer Provides the control structure for communication between applications Establishes, manages, and terminates connections (sessions) between cooperating applications

OSI Transport Layer Provides reliable, transparent transfer of data between end points Provides end-to-end error recovery and flow control

OSI Network Layer Provides upper layers with independence from the data transmission and switching technologies used to connect systems Responsible for establishing, maintaining, and terminating connections

OSI Data link Layer Provides for the reliable transfer of information across the physical link Sends blocks (frames) with the necessary synchronization, error control, and flow control

OSI Physical Layer Concerned with transmission of unstructured bit stream over physical medium Deals with accessing the physical medium Mechanical characteristics Electrical characteristics Functional characteristics Procedural characteristics

Comparison of OSI and TCP/IP

TCP/IP Architecture Dominance TCP/IP protocols matured quicker than similar OSI protocols When the need for interoperability across networks was recognized, only TCP/IP was available and ready to go OSI model is unnecessarily complex Accomplishes in seven layers what TCP/IP does with fewer layers

Elements of Standardization within OSI Framework Protocol Specification Format of protocol data units (PDUs) exchanged Semantics of all fields Allowable sequence of PDUs Service Definition Functional description that defines what services are provided, but not how the services are to be provided Addressing Entities are referenced by means of a service access point (SAP)

Internetworking Terms Communication network – facility that provides a data transfer service among devices attached to the network Internet – collection of communication networks, interconnected by bridges/routers Intranet – internet used by an organization for internal purposes Provides key Internet applications Can exist as an isolated, self-contained internet

Internetworking Terms End System (ES) – device used to support end-user applications or services Intermediate System (IS) – device used to connect two networks Bridge – an IS used to connect two LANs that use similar LAN protocols Router - an IS used to connect two networks that may or may not be similar

Functions of a Router Provide a link between networks Provide for the routing and delivery of data between processes on end systems attached to different networks Provide these functions in such a way as not to require modifications of the networking architecture of any of the attached subnetworks

Network Differences Routers Must Accommodate Addressing schemes Different schemes for assigning addresses Maximum packet sizes Different maximum packet sizes requires segmentation Interfaces Differing hardware and software interfaces Reliability Network may provide unreliable service

Mobile IP and Wireless Application Protocol

Mobile IP Uses Enable computers to maintain Internet connectivity while moving from one Internet attachment point to another Mobile – user's point of attachment changes dynamically and all connections are automatically maintained despite the change Nomadic - user's Internet connection is terminated each time the user moves and a new connection is initiated when the user dials back in New, temporary IP address is assigned

Operation of Mobile IP Mobil node is assigned to a particular network – home network IP address on home network is static – home address Mobile node can move to another network – foreign network Mobile node registers with network node on foreign network – foreign agent Mobile node gives care-of address to agent on home network – home agent

Capabilities of Mobile IP Discovery – mobile node uses discovery procedure to identify prospective home and foreign agents Registration – mobile node uses an authenticated registration procedure to inform home agent of its care-of address Tunneling – used to forward IP datagrams from a home address to a care-of address

Discovery Mobile node is responsible for ongoing discovery process Must determine if it is attached to its home network or a foreign network Transition from home network to foreign network can occur at any time without notification to the network layer Mobile node listens for agent advertisement messages Compares network portion of the router's IP address with the network portion of home address

Agent Solicitation Foreign agents are expected to issue agent advertisement messages periodically If a mobile node needs agent information immediately, it can issue ICMP router solicitation message Any agent receiving this message will then issue an agent advertisement

Move Detection Mobile node may move from one network to another due to some handoff mechanism without IP level being aware Agent discovery process is intended to enable the agent to detect such a move Algorithms to detect move: Use of lifetime field – mobile node uses lifetime field as a timer for agent advertisements Use of network prefix – mobile node checks if any newly received agent advertisement messages are on the same network as the node's current care-of address

Co-Located Addresses If mobile node moves to a network that has no foreign agents, or all foreign agents are busy, it can act as its own foreign agent Mobile agent uses co-located care-of address IP address obtained by mobile node associated with mobile node's current network interface Means to acquire co-located address: Temporary IP address through an Internet service, such as DHCP May be owned by the mobile node as a long-term address for use while visiting a given foreign network

Registration Process Mobile node sends registration request to foreign agent requesting forwarding service Foreign agent relays request to home agent Home agent accepts or denies request and sends registration reply to foreign agent Foreign agent relays reply to mobile node

Registration Operation Messages Registration request message Fields = type, S, B, D, M, V, G, lifetime, home address, home agent, care-of-address, identification, extensions Registration reply message Fields = type, code, lifetime, home address, home agent, identification, extensions

Registration Procedure Security Mobile IP designed to resist attacks Node pretending to be a foreign agent sends registration request to a home agent to divert mobile node traffic to itself Agent replays old registration messages to cut mobile node from network For message authentication, registration request and reply contain authentication extension Fields = type, length, security parameter index (SPI), authenticator

Types of Authentication Extensions Mobile-home – provides for authentication of registration messages between mobile node and home agent; must be present Mobile-foreign – may be present when a security association exists between mobile node and foreign agent Foreign-home – may be present when a security association exists between foreign agent and home agent

Tunneling Home agent intercepts IP datagrams sent to mobile node's home address Home agent informs other nodes on home network that datagrams to mobile node should be delivered to home agent Datagrams forwarded to care-of address via tunneling Datagram encapsulated in outer IP datagram

Mobile IP Encapsulation Options IP-within-IP – entire IP datagram becomes payload in new IP datagram Original, inner IP header unchanged except TTL decremented by 1 Outer header is a full IP header Minimal encapsulation – new header is inserted between original IP header and original IP payload Original IP header modified to form new outer IP header Generic routing encapsulation (GRE) – developed prior to development of Mobile IP

Wireless Application Protocol (WAP) Open standard providing mobile users of wireless terminals access to telephony and information services Wireless terminals include wireless phones, pagers and personal digital assistants (PDAs) Designed to work with all wireless network technologies such as GSM, CDMA, and TDMA Based on existing Internet standards such as IP, XML, HTML, and HTTP Includes security facilities

WAP Protocol Stack

WAP Programming Model

Wireless Markup Language (WML) Features Text and image support – formatting and layout commands Deck/card organizational metaphor – WML documents subdivided into cards, which specify one or more units of interaction Support for navigation among cards and decks – includes provisions for event handling; used for navigation or executing scripts

WMLScript Scripting language for defining script-type programs in a user device with limited processing power and memory WMLScript capabilities: Check validity of user input before it’s sent Access device facilities and peripherals Interact with user without introducing round trips to origin server

WMLScript WMLScript features: JavaScript-based scripting language Procedural logic Event-based Compiled implementation Integrated into WAE

Wireless Application Environment (WAE) WAE specifies an application framework for wireless devices WAE elements: WAE User agents – software that executes in the wireless device Content generators – applications that produce standard content formats in response to requests from user agents in the mobile terminal Standard content encoding – defined to allow a WAE user agent to navigate Web content Wireless telephony applications (WTA) – collection of telephony-specific extensions for call and feature control mechanisms

WAE Client Components

Wireless Session Protocol (WSP) Transaction-oriented protocol based on the concept of a request and a reply Provides applications with interface for two session services: Connection-oriented session service – operates above reliable transport protocol WTP Connectionless session service – operates above unreliable transport protocol WDP

Connection-mode WSP Services Establish reliable session from client to server and release Agree on common level of protocol functionality using capability negotiation Exchange content between client and server using compact encoding Suspend and resume a session Push content from server to client in an unsynchronized manner

WSP Transaction Types Session establishment – client WSP user requests session with server WSP user Session termination – client WSP user initiates termination Session suspend and resume – initiated with suspend and resume requests Transaction – exchange of data between a client and server Nonconfirmed data push – used to send unsolicited information from server to client Confirmed data push – server receives delivery confirmation from client

Wireless Transaction Protocol (WTP) Lightweight protocol suitable for "thin" clients and over low-bandwidth wireless links WTP features Three classes of transaction service Optional user-to-user reliability: WTP user triggers confirmation of each received message Optional out-of-band data on acknowledgments PDU concatenation and delayed acknowledgment to reduce the number of messages sent Asynchronous transactions

WTP Transaction Classes Class 0: Unreliable invoke message with no result message Class 1: Reliable invoke message with no result message Class 2: Unreliable invoke message with one reliable result message

WTP PDU Types Invoke PDU – used to convey a request from an initiator to a responder ACK PDU – used to acknowledge an Invoke or Result PDU Result PDU – used to convey response of the server to the client Abort PDU – used to abort a transaction Segmented invoke PDU and segmented result PDU – used for segmentation and reassembly Negative acknowledgment PDU – used to indicate that some packets did not arrive

Examples of WTP Operation

Wireless Transport Layer Security (WTLS) Features Data integrity – ensures that data sent between client and gateway are not modified, using message authentication Privacy – ensures that the data cannot be read by a third party, using encryption Authentication – establishes authentication of the two parties, using digital certificates Denial-of-service protection – detects and rejects messages that are replayed or not successfully verified

WTLS Protocol Stack WTLS consists of two layers of protocols WTLS Record Protocol – provides basic security services to various higher-layer protocols Higher-layer protocols: The Handshake Protocol The Change Cipher Spec Protocol The Alert Protocol

WTLS Protocol Stack

WTLS Record Protocol Operation

Phases of the Handshake Protocol Exchange First phase – used to initiate a logical connection and establish security capabilities Second phase – used for server authentication and key exchange Third phase – used for client authentication and key exchange Forth phase – completes the setting up of a secure connection

Wireless Datagram Protocol (WDP) Used to adapt higher-layer WAP protocol to the communication mechanism used between mobile node and WAP gateway WDP hides details of the various bearer networks from the other layers of WAP Adaptation may include: Partitioning data into segments of appropriate size for the bearer Interfacing with the bearer network

Wireless Control Message Protocol (WCMP) Performs the same support function for WDP as ICMP does for IP Used in environments that don’t provide IP bearer and don’t lend themselves to the use of ICMP Used by wireless nodes and WAP gateways to report errors encountered in processing WDP datagrams Can also be used for informational and diagnostic purposes