The document discusses Mobile IP and the Wireless Application Protocol (WAP). Mobile IP allows devices to change their network point of attachment while maintaining ongoing connections. It uses home and foreign agents to register devices' locations and tunnel traffic to their new addresses. WAP provides a standard for internet access from wireless devices. It defines protocols like WML, WTP, and WDP to support limited devices over various wireless networks.
GSM-architecture-Location tracking and call setup- Mobility management- Handover-
Security-GSM SMS –International roaming for GSM- call recording functions-subscriber and
service data mgt –-Mobile Number portability -VoIP service for Mobile Networks – GPRS –
Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-
combined RA/LA update procedures-Billing
For the detection of lost mobile SNIFFER plays a vital role.The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection .
Seeing through walls using Wireless Vision Technology. Wi-Fi signals are typically information carriers between a transmitter
and a receiver. In this paper, we show that Wi-Fi can also
extend our senses, enabling us to see moving objects through walls and behind closed doors.
GSM-architecture-Location tracking and call setup- Mobility management- Handover-
Security-GSM SMS –International roaming for GSM- call recording functions-subscriber and
service data mgt –-Mobile Number portability -VoIP service for Mobile Networks – GPRS –
Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-
combined RA/LA update procedures-Billing
For the detection of lost mobile SNIFFER plays a vital role.The sniffer device has to be designed precisely and size should be reduced for easy mobility for the purpose of detection .
Seeing through walls using Wireless Vision Technology. Wi-Fi signals are typically information carriers between a transmitter
and a receiver. In this paper, we show that Wi-Fi can also
extend our senses, enabling us to see moving objects through walls and behind closed doors.
History, Basic concepts of wireless communication, challenges in wireless communication, cellular communication, performance criteria, wireless communication standars, how call is made?
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive
routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer
solutions-TCP over Ad hoc wireless Networks
Spread spectrum is a communication technique that spreads a narrowband communication signal over a wide range of frequencies for transmission then de-spreads it into the original data bandwidth at the receive.
While driving on highways, motorists should not exceed the maximum speed limit permitted for their vehicle. This speed checker will come handy for the highway traffic police as it will not only provide a digital display in accordance with a vehicle’s speed but also sound an alarm if the vehicle exceeds the permissible speed for the highway.
This presentation contains the basic of cellular system.
in which direction the cellular system works and how it changes the network from one bast station to another is simply explained.
how Hand-off occur between two base station is shown via figure to understand well.
the cell system in mobile network and the cell spliting, sectoring, microcell zone concept is also explained well.
Please take a look.
may be it is helpfull for you.
Thank you.
History, Basic concepts of wireless communication, challenges in wireless communication, cellular communication, performance criteria, wireless communication standars, how call is made?
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive
routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer
solutions-TCP over Ad hoc wireless Networks
Spread spectrum is a communication technique that spreads a narrowband communication signal over a wide range of frequencies for transmission then de-spreads it into the original data bandwidth at the receive.
While driving on highways, motorists should not exceed the maximum speed limit permitted for their vehicle. This speed checker will come handy for the highway traffic police as it will not only provide a digital display in accordance with a vehicle’s speed but also sound an alarm if the vehicle exceeds the permissible speed for the highway.
This presentation contains the basic of cellular system.
in which direction the cellular system works and how it changes the network from one bast station to another is simply explained.
how Hand-off occur between two base station is shown via figure to understand well.
the cell system in mobile network and the cell spliting, sectoring, microcell zone concept is also explained well.
Please take a look.
may be it is helpfull for you.
Thank you.
XMPP and SIP Presence Protocols for Messaging and Session Control.pptxGSCWU
XMPP is the Extensible Messaging and Presence Protocol, a set of open technologies for instant messaging, presence, multi-party chat, voice and video calls, collaboration, lightweight middleware, content syndication, and generalized routing of XML data.
XMPP was originally developed in the Jabber open-source community to provide an open, decentralized alternative to the closed instant messaging services at that time
The Session Initiation Protocol is a signaling protocol that enables the Voice Over Internet Protocol (VoIP) by defining the messages sent between endpoints and managing the actual elements of a call. SIP supports voice calls, video conferencing, instant messaging, and media distribution.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
Solid waste management & Types of Basic civil Engineering notes by DJ Sir
Types of SWM
Liquid wastes
Gaseous wastes
Solid wastes.
CLASSIFICATION OF SOLID WASTE:
Based on their sources of origin
Based on physical nature
SYSTEMS FOR SOLID WASTE MANAGEMENT:
METHODS FOR DISPOSAL OF THE SOLID WASTE:
OPEN DUMPS:
LANDFILLS:
Sanitary landfills
COMPOSTING
Different stages of composting
VERMICOMPOSTING:
Vermicomposting process:
Encapsulation:
Incineration
MANAGEMENT OF SOLID WASTE:
Refuse
Reuse
Recycle
Reduce
FACTORS AFFECTING SOLID WASTE MANAGEMENT:
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
2. MOBILE IP
• The term mobile in this context implies that a user is
connected to one or more applications across the Internet,
that the user's point of attachment changes dynamically,
and that all connections are automatically maintained
despite the change.
• Routers make use of the IP address in an IP datagram to
perform routing.
• In particular, the network portion of an IP address is used
by routers to move a datagram from the source computer
to the network to which the target computer is attached.
• Then the final router on the path, which is attached to the
same network as the target computer, uses the host
portion of the IP address to deliver the IP datagram to the
destination.
Operation of Mobile IP
3. • A mobile node is assigned to a particular network, known
as its home network. Its IP address on that network,
known as its home address, is static.
• When the mobile node moves its attachment point to
another network, that network is considered a foreign
network for this host.
• Once the mobile node is reattached, it makes its presence
known by registering with a network node, typically a
router, on the foreign network known as a foreign agent.
• The mobile node then communicates with a similar agent
on the user's home network, known as a home agent,
giving the home agent the care-of address of the mobile
node.
5. • To support the operations Mobile IP includes three basic
capabilities:
• Discovery: A mobile node uses a discovery
procedure to identify prospective home agents and foreign
agents.
• Registration: A mobile node uses an authenticated
registration procedure to inform its home agent of its care-of
address.
• Tunneling: Tunneling is used to forward IP
datagrams from a home address to a care-of address.
6. Discovery
• The discovery process in Mobile IP is very similar to the
router advertisement process defined in ICMP (Internet
Control Message Protocol). Accordingly, agent discovery
makes use of ICMP router advertisement messages, with
one or more extensions specific to Mobile IP.
Protocol Support for Mobile IP
7. • The router advertisement portion of the message includes the IP
address of the router.
• The advertisement extension includes additional information
about the router's role as an agent.
• A mobile node listens for these agent advertisement messages.
Mobile IP Agent Advertisement Message
8. • The agent advertisement extension follows the ICMP router
advertisement fields and consists of the following fields.
• • Type: 16, indicates that this is an agent advertisement.
• • Length: Number of bytes in the extension, excluding the Type
and Length fields.
• • Sequence Number: The count of agent advertisement
messages sent since the agent was initialized.
• • Lifetime: The longest lifetime, in seconds, that this agent is
willing to accept a registration request from a mobile node.
• • R: Registration with this foreign agent is required. Even those
mobile nodes that have already acquired a care-of address from
this foreign agent must re-register.
• B: Busy. The foreign agent will not accept registrations from
additional mobile nodes.
• • H: This agent offers services as a home agent on this network.
• • F: This agent offers services as a foreign agent on this network.
9. • • M: This agent can receive tunneled IP datagrams that use
minimal encapsulation
• • G: This agent can receive tunneled IP datagrams that use GRE
encapsulation.
• • r: reserved.
• • T: Foreign agent supports reverse tunneling.
• • Care-Of Address: The care-of address or addresses supported
by this agent on this network.
• The registration process involves four steps:
• 1. The mobile node requests the forwarding service by sending a
registration request to the foreign agent.
• 2. The foreign agent relays this request to the mobile node's
home agent.
• 3. The home agent either accepts or denies the request and
sends a registration reply to the foreign agent.
• 4. The foreign agent relays this reply to the mobile node.
Registration
11. Tunneling
• Once a mobile node is registered with a home agent, the
home agent must be able to intercept IP datagrams sent to
the mobile node's home address so that these datagrams
can be forwarded via tunneling.
• The standard does not mandate a specific technique for
this purpose but references ARP (Address Resolution
Protocol) as a possible mechanism.
12. WIRELESS APPLICATION PROTOCOL
• The Wireless Application Protocol (WAP) is a universal, open
standard developed by the WAP Forum to provide mobile users
of wireless phones and other wireless terminals .
• WAP is designed to work with all wireless network technologies
(e.g., GSM, CDMA, and TDMA).
• The WAP specification includes
• • A programming model based on the WWW Programming
model
• A markup language, the Wireless Markup Language, adhering to
XML
• A specification of a small browser suitable for a mobile, wireless
terminal
• A lightweight communications protocol stack
• • A framework for wireless telephony applications (WTAs)
15. Wireless Markup Language
• WML was designed to describe content and format for
presenting data on devices with limited bandwidth, limited
screen size, and limited user input capability.
• It is designed to work with telephone keypads, styluses,
and other input devices common to mobile, wireless
communication.
• Text and image support: Formatting and layout commands
are provided for text and limited image capability.
• Support for navigation among cards and decks: WML
includes provisions for event handling, which is used for
navigation or executing scripts.
16. WML Script
• WML Script is a scripting language with similarities to
JavaScript.
• It is designed for defining script-type programs in a user
device with limited processing power and memory.
19. Wireless Session Protocol
• WSP provides applications with an interface for two
session services.
• The connection oriented session service operates above
the reliable transport protocol WTP, and the
connectionless session service operates above the
unreliable transport protocol WDP.
• WSP Service In general, a connection-mode WSP provides
the following services:
• Establish a reliable session from client to server and
release that session in an orderly manner.
• Agree on a common level of protocol functionality using
capability negotiation.
• Exchange content between client and server using compact
encoding.
20. • Suspend and resume a session.
• Push content from server to client.
• Session establishment
• Server address: The peer with which the session is to be
established.
• Client address: The originator of the session.
• Client headers: Contain attribute information that can be
used for application level parameters to be communicated
to the peer.
21. Wireless Transaction Protocol
• WTP manages transactions by conveying requests and
responses between a user agent (such as a WAP browser)
and an application server for such activities as browsing
and e-transactions.
• WTP includes the following features:
• Three classes of transaction service.
• Optional user-to-user reliability: WTP user triggers the
confirmation of each received message.
• Optional out-of-band data on acknowledgments.
• Asynchronous transactions.
22. WTP Transaction Classes
• WTP provides three transaction classes that may be
invoked by WSP or another higher layer protocol:
• Class 0: Unreliable invoke message with no result message
• Class 1: Reliable invoke message with no result message
• Class 2: Unreliable invoke message with one reliable result
message
23.
24. Wireless Datagram Protocol
• WDP is used to adapt a higher-layer WAP protocol to the
communication mechanism (called the bearer) used
between the mobile node and the WAP gateway.
• service with the following parameters:
• • Source address: Address of the device making a request
to the WDP layer
• • Source port: Application address associated with the
source address
• • Destination address: Destination address for the data
submitted to WDP
• • Destination port: Application address associated with
the destination address
• • User data: User data from the next higher layer,
submitted to WDP for transmission to the destination port
25. • The following fields are necessary in a WDP PDU:
• • Header length (1 byte): Length of header.
• • Port numbers identifier (1 byte)
• • Port numbers length (1 byte)
• • Destination port (2 bytes)
• • Source port (2 bytes)
• SAR identifier (1 byte)
• SAR length (1 byte)
• Datagram reference number (1 bytes)
• Number of segments (1 byte)
• Segment count
• User data (1 to n bytes)