SlideShare a Scribd company logo
Module – 4 (Mobile Network and Transport Layer) Mobile network layer –
Mobile Internet Protocol (IP), Dynamic Host Configuration Protocol
(DHCP), Mobile ad-hoc networks – Routing, Dynamic Source Routing
(DSR), Destination Sequence Distance Vector (DSDV), Ad-hoc routing
protocols. Mobile transport layer – Traditional Transmission Control Protocol
(TCP), Improvements in Classical TCP. Wireless Application Protocol (WAP)
- Architecture, Wireless Datagram Protocol (WDP), Wireless Transport Layer
Security (WTLS), Wireless Transaction Protocol (WTP), Wireless Session
Protocol (WSP).
Mobile IP
Goals, assumptions and requirements
• As long as the receiver can be reached within its physical subnet, it gets the packets;
as soon as it moves outside the subnet, a packet will not reach it.
Quick ‘solutions’
A new IP address may be assigned to a moving node. But the problem is that nobody
knows about this new address.
Requirements
Compatibility: Mobile IP has to be integrated into existing operating systems or at
least work with them.
Transparency: Mobility should remain ‘invisible’ for many higher layer
protocols and applications.
Scalability and efficiency: Introducing a new mechanism to the internet must not
jeopardize its efficiency
Security: All the messages related to the Mobile IP are authenticated
Entities and terminology
Mobile node (MN): A mobile node is an end-system that can change its point of attachment to
the internet using mobile IP. The MN keeps its IP address and can continuously communicate
with any other system in the internet as long as link-layer connectivity is given.
Correspondent node (CN): At least one partner is needed for communication. In the
following the CN represents this partner for the MN. The CN can be a fixed or mobile node.
• Home network: The home network is the subnet the MN belongs to with respect to its
IP address. No mobile IP support is needed within the home network.
• Foreign network: The foreign network is the current subnet the MN visits and which is
not the home network.
• Foreign agent (FA): The FA can provide several services to the MN during its visit to the
foreign network. The FA can have the COA
• Care-of address (COA): The COA defines the current location of the MN All IP
packets sent to the MN are delivered to the COA, not directly to the IP address of the
MN.
• Foreign agent COA: Foreign agent COA is an IP address of the FA. Many MN using the
FA can share this COA as common COA.
• Co-located COA: The MN temporarily acquired an additional IP address which acts as
COA is called as Co-located COA.
• Home agent (HA): The HA provides several services for the MN and is located in the
home network. It tunnels the packets, maintains a location registry and routing
IP packet delivery
Dynamic host configuration protocol
• The dynamic host configuration protocol is mainly used to simplify the
installation and maintenance of networked computers.
DHCP clients send a request to a server (DHCPDISCOVER)
Mobile ad-hoc networks
• Instant infrastructure: Unplanned meetings, spontaneous interpersonal
communications etc. cannot rely on any infrastructure
• Disaster relief: Hurricanes cut phone and power lines, floods destroy base
stations, fires burn servers. Emergency teams can only rely on an
infrastructure they can set up themselves
• Remote areas: Too expensive to set up an infrastructure in sparsely
populated areas
• Effectiveness: Small status information, ad-hoc network might be a better
solution
Routing
Asymmetric links
• Node A receives a signal from node B.
• B might receive nothing, have a weak link, or even have a better link than the reverse
direction.
• Routing information collected for one direction is of almost no use for the other direction
Redundant links
• In ad-hoc networks nobody controls redundancy, so there might be many redundant links
• High redundancy can cause a large computational overhead for routing table updates.
Interference
• One transmission might interfere with another and nodes might overhear the transmissions
of other nodes
Dynamic topology
• The mobile nodes may frequently change their locations, This results in frequent changes in
topology.
Dynamic source routing
• Dynamic source routing (DSR), divides the task of routing into two separate problems
• Route discovery: A node only tries to discover a route to a destination if it has to send
something to destination and there is currently no known route.
• Route maintenance: If a node is continuously sending packets via a route, it has to make sure
that the route is held upright. As soon as a node detects problems with the current route, it has
to find an alternative.
Dynamic source routing eliminates all periodic routing updates and works as follows.
• If a node needs to discover a route, it broadcasts a route request with a unique identifier and the
destination address as parameters.
• Any node that receives a route request does the following
• If the node has already received the same request, it drops the request packet.
• If the node recognizes its own address as the destination, the request has reached its
target.
• Otherwise, the node appends its own address to a list of traversed hops in the packet and
broadcasts this updated route request.
Routing
• N1 broadcasts the request ((N1), id = 42, target = N3), N2 and N4 receive
this request.
• N2 then broadcasts ((N1, N2), id = 42, target = N3), N4 broadcasts ((N1, N4), id =
42, target = N3). N3 and N5 receive N2’s broadcast, N1, N2, and N5 receive
N4’s broadcast.
• N3 recognizes itself as target, N5 broadcasts ((N1, N2, N5), id = 42, target =
N3). N3 and N4 receive N5’s broadcast. N1, N2, and N5 drop N4’s broadcast
packet, because they all recognize an already received route request (and N2’s
broadcast reached N5 before N4’s did).
• N4 drops N5’s broadcast, N3 recognizes (N1, N2, N5) as an alternate, but
longer route.
• N3 now has to return the path (N1, N2, N3) to N1. This is simple assuming
symmetric links working in both directions. N3 can forward the information using
the list in reverse order.
Destination sequence distance vector
DSDV now adds two things to the distance vector algorithm
• Sequence numbers: Each routing advertisement comes with a sequence number.
Sequence numbers help to apply the advertisements in correct order.
• Damping: Frequent changes in topology destabilize the routing mechanisms. A node
waits with the changes are get stable.
Routing table of N1
Mobile transport layer
Traditional TCP
• Congestion control
• Slow start
• Fast retransmit/fast recovery
Implications on mobility
• Mobility itself can cause packet loss.
• When using mobile IP, there could still be some packets in transit to the old
foreign agent
• The mobile node moves to the new foreign agent.
• The old foreign agent may not be able to forward those packets to the new foreign
agent or even buffer the packets of the mobile node takes too long.
• This packet loss has nothing to do because it is caused by the problems of
rerouting traffic.
• With the help of ACK, TCP resend the packets
Classical TCP improvements
Indirect TCP
 The access point will act as a proxy.
 This means that the mobile host considered the AP as the fixed host and the
fixed host considered the AP as the mobile host.
Advantages with I-TCP
• It does not require any changes in the TCP protocol
• Due to the strict partitioning into two connections, transmission errors on the
wireless link, i.e., lost packets, cannot propagate into the fixed network
• Optimizing of these new mechanisms is quite simple because they only cover one
single hop
• Only a Small delay between the mobile host and foreign agent
Disadvantages of I-TCP
• The loss of the end-to-end semantics of TCP might cause problems if the foreign
agent partitioning the TCP connection crashes
• The handover latency may be much more problematic
• The foreign agent must be a trusted entity
Snooping TCP
Advantages of snooping TCP
1. The end-to-end TCP semantic is preserved
2. The correspondent host does not need to be changed; most of the enhancements are in the foreign agent
3. It does not need a handover of state as soon as the mobile host moves to another foreign agent
Disadvantages of snooping TCP
1. Snooping TCP does not isolate the behavior of the wireless link as well as I- TCP
2. Using negative acknowledgements between the foreign agent and the mobile host assumes additional
mechanisms on the mobile host.
3. All efforts for snooping and buffering data may be useless if certain encryption schemes are applied end-to-
end between the correspondent host and mobile host.
Mobile TCP
• M-TCP splits the TCP connection into two parts as I-TCP does
• An unmodified TCP is used on the standard host-supervisory host (SH)
connection, while an optimized TCP is used on the SH-MH connection.
• The SH monitors all packets sent to the MH and ACKs returned from the MH
• If the SH does not receive an ACK for some time, it assumes that the MH is
disconnected.
• It chokes the sender by setting the sender’s window size to 0. Setting the window
size to 0 forces the sender to go into persistent mode
• As soon as the SH detects connectivity again, it reopens the window of the
sender to the old value.
• The sender can continue sending at full speed
Advantages of M-TCP
• It maintains the TCP end-to-end semantics. The SH does not send any ACK itself but
forwards the ACKs from the MH.
• If the MH is disconnected, it avoids useless retransmissions, slow starts or breaking
connections by simply shrinking the sender’s window to 0.
• Since it does not buffer data in the SH, it is not necessary to forward buffers to a new
SH.
Disadvantages of M-TCP
• As the SH does not act as proxy, packet loss on the wireless link due to bit errors is
propagated to the sender. M-TCP assumes low bit error rates, which is not always a
valid assumption.
• A modified TCP on the wireless link not only requires modifications to the MH
protocol software but also new network elements like the bandwidth manager.
Fast retransmit/fast recovery
• When the mobile host registers at a new foreign agent it will send duplicate
acknowledgements to correspondent hosts.
• The proposal is to send three duplicates.
• This forces the corresponding host to go into fast retransmit mode and not to start slow
start,
• The correspondent host continues to send with the same rate it did before the mobile
host moved to another foreign agent.
• This approach additionally puts the mobile host into fast retransmit.
• The mobile host retransmits all unacknowledged packets using the current congestion
window size without going into slow start.
• The advantage of this approach is its simplicity. Only minor changes in the mobile
host’s is required. No foreign agent or correspondent host has to be changed.
• The disadvantage of this scheme is the insufficient isolation of packet losses.
Transmission/time-out freezing
• Loss or delay of ACK is several reasons (Congestion, Mobile reached to out of
coverage area or cell with no capacity left)
• The MAC layer knows the real reason for the interruption and does not assume
congestion
• The MAC layer can inform the TCP layer of an upcoming loss of connection or that
the current interruption is not caused by congestion.
• TCP can now stop sending and ‘freezes’ the current state of its congestion window
and further timers
• As soon as the MAC layer detects connectivity again, it signals TCP that it can
resume operation at exactly the same point where it had been forced to stop
• The advantage of this approach is that it offers a way to resume TCP connections
even after longer interruptions of the connection.
• The disadvantages of this approach is the software on the mobile host have to be
changed and all mechanisms rely on the capability of the MAC layer to detect future
interruptions.
Selective retransmission
• If a single packet is lost, the sender has to retransmit everything starting from the
lost packet (go-back-n retransmission).
• This one waste the bandwidth.
• TCP can indirectly request a selective retransmission of packets.
• The receiver can acknowledge single packets.
• The sender can now determine precisely which packet is needed and can retransmit
it.
• The advantage of this approach is sender retransmits only the lost packets. This
lowers bandwidth requirements and is extremely helpful in slow wireless links.
• Disadvantage: of more complex software on the receiver side, because now more
buffer is necessary to resequence data and to wait for gaps to be filled.
Transaction-oriented TCP
• Transaction-oriented TCP T/TCP can combine packets for connection
establishment and connection release with user data packets.
• This can reduce the number of packets down to two instead of seven
• The advantage is the reduction in the over- head which standard TCP has for
connection setup and connection release
• Disadvantage: T/TCP is not the original TCP, so it requires changes in the mobile
host and all correspondent hosts.
Wireless application protocol
• A protocol should be enable global wireless communication across different wireless
network technologies.
• Interoperable: To support terminals and software from different vendors to
communicate with networks from different providers;
• Scalable, Protocols and services should scale with customer needs and number of
customers.
• Efficient: Provide QoS suited to the characteristics of the wireless and mobile
networks.
• Reliable: Consistent and predictable platform for deploying services;
• Secure: Preserve the integrity of user data, protection of devices and services from
security problems.
WAP ARCHITECTURE
Bearer services
• WAP does not specify any new bearer services, but uses existing data services and will
integrate further services. (SMS, Circuit-switched data, high-speed circuit switched
data (HSCSD) and GPRS)
Transport layer
• Protocols are wireless datagram protocol (WDP) and wireless control message
protocol (WCMP).
• This layer offers a bearer independent, consistent datagram-oriented service to the
higher layers.
• The transport layer service access point (T-SAP) is the common interface to be used
by higher layers.
Security layer
• Protocol: Wireless transport layer security
• WTLS is based on the transport layer security (TLS) and secure sockets layer (SSL)
• It offers data integrity, privacy, authentication, and denial-of-service protection
Transaction layer
• Protocol : Wireless transaction protocol
• Efficiently provides reliable or unreliable requests and asynchronous
transactions
Session layer
• Protocol: Wireless session protocol (WSP)
• It offers two services one connection-oriented and one connectionless
• Also provides long-lived session state, session suspend and resume, session
migration and other features needed for wireless mobile access to the web.
Application layer
• Protocol : Wireless application environment (WAE)
• It offers a framework for the integration of different www and mobile tele-
phony applications
Wireless datagram protocol
• Operates on top of many different bearer services capable of carrying
data
 To send a datagram the node must send a T-
DUnitdata.req
 It consists of destination address (DA),
destination port (DP), Source address (SA),
source port (SP) and user data (UD)
 The T-DUnitdata.ind service indicates the
reception of data.
 T-DError.ind (Error message) indicates that
the higher layer requests a service the WDP
cannot fulfill.
 Wireless control message protocol (WCMP)
provides error handling mechanisms
Wireless transport layer security
• The wireless transport layer security (WTLS), can be integrated into the WAP
architecture.
• Provide different levels of security (privacy, data integrity, and authentication) and
has been optimized for low bandwidth, high-delay bearer networks.
• Since the devices are MN, WTLS takes low processing power and very limited
memory for cryptographic algorithms.
• WTLS supports datagram and connection-oriented transport layer protocols.
SEC-Create req.
 key exchange suite (KES), a cipher suite
(CS), and a compression method (CM)
SEC-Create res.
 Sequence number mode (SNM), key refresh
cycle (KR), session id (SID
 SEC-Exchange req. (indicates that the peer
wishes to perform public-key authentication so it
requests a client certificate (CC) from the
originator.)
Wireless transaction protocol
• WTP has been designed to run on very thin clients, such as mobile
phones.
• WTP offers improved reliability over datagram services, improved
efficiency over connection-oriented services, and support for web
browsing
• It provides three classes of transaction service
• A special feature is its able to provide a user acknowledgement or
automatic acknowledgement
WTP class 0
 Class 0 offers an unreliable transaction service without a result message.
TR-Invoke.req
 A flag : WTP generate acknowledgement or user acknowledgement
 H provides a simple index to uniquely identify the transaction
• WTP class 1 offers a reliable transaction service
Basic transaction - no user
acknowledgement
Basic transaction with user
acknowledgement
WTP Class 2
• Provides the classic reliable request/response transaction from many client/server
scenarios
Wireless session protocol
• Designed to operate on top of the datagram service WDP or the transaction
service WTP
• WSP provides a shared state between a client and a server to optimize content
transfer.
• Session management: Establish, release, suspending & resuming
• Capability negotiation: Clients and servers can agree upon a common level of
protocol functionality
• Content encoding: WSP also supports binary encoding for the content it
transfers.
• HTTP/1.1 functionality: Supports the functions HTTP/1.1 offers, such as
extensible request/reply methods, composite objects, and content type
negotiation.
• Exchange of session headers: Client and server can exchange request/reply
headers
• Push and pull data transfer: Pulling data from a server.
• Asynchronous requests: Supports a client that can send multiple requests to a
server simultaneously.
WSP/B session establishment WSP/B session suspension and resume
WSP/B session termination
CH -Client header, RC- Requested capabilities
SA-server address, CA-client address
R-Reason

More Related Content

Similar to Module-4 Short notes.pptx

Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits typesgjeyasriitaamecnew
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layerswarna sudha
 
COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK Amar Panchal
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicastinghamsa nandhini
 
24-ad-hoc.ppt
24-ad-hoc.ppt24-ad-hoc.ppt
24-ad-hoc.pptsumadi26
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Computer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxComputer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxpallavir61
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
BIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.pptBIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.pptAmanyaLaban
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxAayushMishra89
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETateeq ateeq
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt21121A0594
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxHirazNor
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptxsameernsn1
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxPondinesh2
 

Similar to Module-4 Short notes.pptx (20)

Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
wireless networks
wireless networkswireless networks
wireless networks
 
unit-4
unit-4 unit-4
unit-4
 
COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
24-ad-hoc.ppt
24-ad-hoc.ppt24-ad-hoc.ppt
24-ad-hoc.ppt
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Computer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptxComputer network transport layer MODUL 2.pptx
Computer network transport layer MODUL 2.pptx
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
BIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.pptBIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.ppt
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Switching
SwitchingSwitching
Switching
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 

More from AzmiNizar1

myofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptxmyofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptxAzmiNizar1
 
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdfBiochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdfAzmiNizar1
 
Vaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunologyVaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunologyAzmiNizar1
 
Vaginal Bleeding .pptx
Vaginal Bleeding .pptxVaginal Bleeding .pptx
Vaginal Bleeding .pptxAzmiNizar1
 
1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdfAzmiNizar1
 
Checkpointing.pptx
Checkpointing.pptxCheckpointing.pptx
Checkpointing.pptxAzmiNizar1
 
Genetic Algorithm (1).pdf
Genetic Algorithm (1).pdfGenetic Algorithm (1).pdf
Genetic Algorithm (1).pdfAzmiNizar1
 
dc module1 part 1.pptx
dc module1 part 1.pptxdc module1 part 1.pptx
dc module1 part 1.pptxAzmiNizar1
 
L20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.pptL20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.pptAzmiNizar1
 

More from AzmiNizar1 (10)

myofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptxmyofascial pain syndrome ENG pptttt.pptx
myofascial pain syndrome ENG pptttt.pptx
 
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdfBiochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
Biochemistry topic 15 (kidneys)(Satya Kalidindi 9a).pdf
 
Vaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunologyVaccines : A textbook based study of immunology
Vaccines : A textbook based study of immunology
 
Vaginal Bleeding .pptx
Vaginal Bleeding .pptxVaginal Bleeding .pptx
Vaginal Bleeding .pptx
 
1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf
 
Checkpointing.pptx
Checkpointing.pptxCheckpointing.pptx
Checkpointing.pptx
 
Genetic Algorithm (1).pdf
Genetic Algorithm (1).pdfGenetic Algorithm (1).pdf
Genetic Algorithm (1).pdf
 
Chapter9.pdf
Chapter9.pdfChapter9.pdf
Chapter9.pdf
 
dc module1 part 1.pptx
dc module1 part 1.pptxdc module1 part 1.pptx
dc module1 part 1.pptx
 
L20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.pptL20-Thalamus & Limbic System.ppt
L20-Thalamus & Limbic System.ppt
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 

Module-4 Short notes.pptx

  • 1. Module – 4 (Mobile Network and Transport Layer) Mobile network layer – Mobile Internet Protocol (IP), Dynamic Host Configuration Protocol (DHCP), Mobile ad-hoc networks – Routing, Dynamic Source Routing (DSR), Destination Sequence Distance Vector (DSDV), Ad-hoc routing protocols. Mobile transport layer – Traditional Transmission Control Protocol (TCP), Improvements in Classical TCP. Wireless Application Protocol (WAP) - Architecture, Wireless Datagram Protocol (WDP), Wireless Transport Layer Security (WTLS), Wireless Transaction Protocol (WTP), Wireless Session Protocol (WSP).
  • 2. Mobile IP Goals, assumptions and requirements • As long as the receiver can be reached within its physical subnet, it gets the packets; as soon as it moves outside the subnet, a packet will not reach it. Quick ‘solutions’ A new IP address may be assigned to a moving node. But the problem is that nobody knows about this new address. Requirements Compatibility: Mobile IP has to be integrated into existing operating systems or at least work with them. Transparency: Mobility should remain ‘invisible’ for many higher layer protocols and applications. Scalability and efficiency: Introducing a new mechanism to the internet must not jeopardize its efficiency Security: All the messages related to the Mobile IP are authenticated
  • 3. Entities and terminology Mobile node (MN): A mobile node is an end-system that can change its point of attachment to the internet using mobile IP. The MN keeps its IP address and can continuously communicate with any other system in the internet as long as link-layer connectivity is given. Correspondent node (CN): At least one partner is needed for communication. In the following the CN represents this partner for the MN. The CN can be a fixed or mobile node.
  • 4. • Home network: The home network is the subnet the MN belongs to with respect to its IP address. No mobile IP support is needed within the home network. • Foreign network: The foreign network is the current subnet the MN visits and which is not the home network. • Foreign agent (FA): The FA can provide several services to the MN during its visit to the foreign network. The FA can have the COA • Care-of address (COA): The COA defines the current location of the MN All IP packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. • Foreign agent COA: Foreign agent COA is an IP address of the FA. Many MN using the FA can share this COA as common COA. • Co-located COA: The MN temporarily acquired an additional IP address which acts as COA is called as Co-located COA. • Home agent (HA): The HA provides several services for the MN and is located in the home network. It tunnels the packets, maintains a location registry and routing
  • 6. Dynamic host configuration protocol • The dynamic host configuration protocol is mainly used to simplify the installation and maintenance of networked computers. DHCP clients send a request to a server (DHCPDISCOVER)
  • 7.
  • 8. Mobile ad-hoc networks • Instant infrastructure: Unplanned meetings, spontaneous interpersonal communications etc. cannot rely on any infrastructure • Disaster relief: Hurricanes cut phone and power lines, floods destroy base stations, fires burn servers. Emergency teams can only rely on an infrastructure they can set up themselves • Remote areas: Too expensive to set up an infrastructure in sparsely populated areas • Effectiveness: Small status information, ad-hoc network might be a better solution
  • 9. Routing Asymmetric links • Node A receives a signal from node B. • B might receive nothing, have a weak link, or even have a better link than the reverse direction. • Routing information collected for one direction is of almost no use for the other direction Redundant links • In ad-hoc networks nobody controls redundancy, so there might be many redundant links • High redundancy can cause a large computational overhead for routing table updates. Interference • One transmission might interfere with another and nodes might overhear the transmissions of other nodes Dynamic topology • The mobile nodes may frequently change their locations, This results in frequent changes in topology.
  • 10. Dynamic source routing • Dynamic source routing (DSR), divides the task of routing into two separate problems • Route discovery: A node only tries to discover a route to a destination if it has to send something to destination and there is currently no known route. • Route maintenance: If a node is continuously sending packets via a route, it has to make sure that the route is held upright. As soon as a node detects problems with the current route, it has to find an alternative. Dynamic source routing eliminates all periodic routing updates and works as follows. • If a node needs to discover a route, it broadcasts a route request with a unique identifier and the destination address as parameters. • Any node that receives a route request does the following • If the node has already received the same request, it drops the request packet. • If the node recognizes its own address as the destination, the request has reached its target. • Otherwise, the node appends its own address to a list of traversed hops in the packet and broadcasts this updated route request.
  • 11.
  • 13. • N1 broadcasts the request ((N1), id = 42, target = N3), N2 and N4 receive this request. • N2 then broadcasts ((N1, N2), id = 42, target = N3), N4 broadcasts ((N1, N4), id = 42, target = N3). N3 and N5 receive N2’s broadcast, N1, N2, and N5 receive N4’s broadcast. • N3 recognizes itself as target, N5 broadcasts ((N1, N2, N5), id = 42, target = N3). N3 and N4 receive N5’s broadcast. N1, N2, and N5 drop N4’s broadcast packet, because they all recognize an already received route request (and N2’s broadcast reached N5 before N4’s did). • N4 drops N5’s broadcast, N3 recognizes (N1, N2, N5) as an alternate, but longer route. • N3 now has to return the path (N1, N2, N3) to N1. This is simple assuming symmetric links working in both directions. N3 can forward the information using the list in reverse order.
  • 14. Destination sequence distance vector DSDV now adds two things to the distance vector algorithm • Sequence numbers: Each routing advertisement comes with a sequence number. Sequence numbers help to apply the advertisements in correct order. • Damping: Frequent changes in topology destabilize the routing mechanisms. A node waits with the changes are get stable. Routing table of N1
  • 15. Mobile transport layer Traditional TCP • Congestion control • Slow start
  • 17. Implications on mobility • Mobility itself can cause packet loss. • When using mobile IP, there could still be some packets in transit to the old foreign agent • The mobile node moves to the new foreign agent. • The old foreign agent may not be able to forward those packets to the new foreign agent or even buffer the packets of the mobile node takes too long. • This packet loss has nothing to do because it is caused by the problems of rerouting traffic. • With the help of ACK, TCP resend the packets
  • 18. Classical TCP improvements Indirect TCP  The access point will act as a proxy.  This means that the mobile host considered the AP as the fixed host and the fixed host considered the AP as the mobile host.
  • 19. Advantages with I-TCP • It does not require any changes in the TCP protocol • Due to the strict partitioning into two connections, transmission errors on the wireless link, i.e., lost packets, cannot propagate into the fixed network • Optimizing of these new mechanisms is quite simple because they only cover one single hop • Only a Small delay between the mobile host and foreign agent Disadvantages of I-TCP • The loss of the end-to-end semantics of TCP might cause problems if the foreign agent partitioning the TCP connection crashes • The handover latency may be much more problematic • The foreign agent must be a trusted entity
  • 20. Snooping TCP Advantages of snooping TCP 1. The end-to-end TCP semantic is preserved 2. The correspondent host does not need to be changed; most of the enhancements are in the foreign agent 3. It does not need a handover of state as soon as the mobile host moves to another foreign agent Disadvantages of snooping TCP 1. Snooping TCP does not isolate the behavior of the wireless link as well as I- TCP 2. Using negative acknowledgements between the foreign agent and the mobile host assumes additional mechanisms on the mobile host. 3. All efforts for snooping and buffering data may be useless if certain encryption schemes are applied end-to- end between the correspondent host and mobile host.
  • 21. Mobile TCP • M-TCP splits the TCP connection into two parts as I-TCP does • An unmodified TCP is used on the standard host-supervisory host (SH) connection, while an optimized TCP is used on the SH-MH connection. • The SH monitors all packets sent to the MH and ACKs returned from the MH • If the SH does not receive an ACK for some time, it assumes that the MH is disconnected. • It chokes the sender by setting the sender’s window size to 0. Setting the window size to 0 forces the sender to go into persistent mode • As soon as the SH detects connectivity again, it reopens the window of the sender to the old value. • The sender can continue sending at full speed
  • 22. Advantages of M-TCP • It maintains the TCP end-to-end semantics. The SH does not send any ACK itself but forwards the ACKs from the MH. • If the MH is disconnected, it avoids useless retransmissions, slow starts or breaking connections by simply shrinking the sender’s window to 0. • Since it does not buffer data in the SH, it is not necessary to forward buffers to a new SH. Disadvantages of M-TCP • As the SH does not act as proxy, packet loss on the wireless link due to bit errors is propagated to the sender. M-TCP assumes low bit error rates, which is not always a valid assumption. • A modified TCP on the wireless link not only requires modifications to the MH protocol software but also new network elements like the bandwidth manager.
  • 23. Fast retransmit/fast recovery • When the mobile host registers at a new foreign agent it will send duplicate acknowledgements to correspondent hosts. • The proposal is to send three duplicates. • This forces the corresponding host to go into fast retransmit mode and not to start slow start, • The correspondent host continues to send with the same rate it did before the mobile host moved to another foreign agent. • This approach additionally puts the mobile host into fast retransmit. • The mobile host retransmits all unacknowledged packets using the current congestion window size without going into slow start. • The advantage of this approach is its simplicity. Only minor changes in the mobile host’s is required. No foreign agent or correspondent host has to be changed. • The disadvantage of this scheme is the insufficient isolation of packet losses.
  • 24. Transmission/time-out freezing • Loss or delay of ACK is several reasons (Congestion, Mobile reached to out of coverage area or cell with no capacity left) • The MAC layer knows the real reason for the interruption and does not assume congestion • The MAC layer can inform the TCP layer of an upcoming loss of connection or that the current interruption is not caused by congestion. • TCP can now stop sending and ‘freezes’ the current state of its congestion window and further timers • As soon as the MAC layer detects connectivity again, it signals TCP that it can resume operation at exactly the same point where it had been forced to stop • The advantage of this approach is that it offers a way to resume TCP connections even after longer interruptions of the connection. • The disadvantages of this approach is the software on the mobile host have to be changed and all mechanisms rely on the capability of the MAC layer to detect future interruptions.
  • 25. Selective retransmission • If a single packet is lost, the sender has to retransmit everything starting from the lost packet (go-back-n retransmission). • This one waste the bandwidth. • TCP can indirectly request a selective retransmission of packets. • The receiver can acknowledge single packets. • The sender can now determine precisely which packet is needed and can retransmit it. • The advantage of this approach is sender retransmits only the lost packets. This lowers bandwidth requirements and is extremely helpful in slow wireless links. • Disadvantage: of more complex software on the receiver side, because now more buffer is necessary to resequence data and to wait for gaps to be filled.
  • 26. Transaction-oriented TCP • Transaction-oriented TCP T/TCP can combine packets for connection establishment and connection release with user data packets. • This can reduce the number of packets down to two instead of seven • The advantage is the reduction in the over- head which standard TCP has for connection setup and connection release • Disadvantage: T/TCP is not the original TCP, so it requires changes in the mobile host and all correspondent hosts.
  • 27. Wireless application protocol • A protocol should be enable global wireless communication across different wireless network technologies. • Interoperable: To support terminals and software from different vendors to communicate with networks from different providers; • Scalable, Protocols and services should scale with customer needs and number of customers. • Efficient: Provide QoS suited to the characteristics of the wireless and mobile networks. • Reliable: Consistent and predictable platform for deploying services; • Secure: Preserve the integrity of user data, protection of devices and services from security problems.
  • 29. Bearer services • WAP does not specify any new bearer services, but uses existing data services and will integrate further services. (SMS, Circuit-switched data, high-speed circuit switched data (HSCSD) and GPRS) Transport layer • Protocols are wireless datagram protocol (WDP) and wireless control message protocol (WCMP). • This layer offers a bearer independent, consistent datagram-oriented service to the higher layers. • The transport layer service access point (T-SAP) is the common interface to be used by higher layers. Security layer • Protocol: Wireless transport layer security • WTLS is based on the transport layer security (TLS) and secure sockets layer (SSL) • It offers data integrity, privacy, authentication, and denial-of-service protection
  • 30. Transaction layer • Protocol : Wireless transaction protocol • Efficiently provides reliable or unreliable requests and asynchronous transactions Session layer • Protocol: Wireless session protocol (WSP) • It offers two services one connection-oriented and one connectionless • Also provides long-lived session state, session suspend and resume, session migration and other features needed for wireless mobile access to the web. Application layer • Protocol : Wireless application environment (WAE) • It offers a framework for the integration of different www and mobile tele- phony applications
  • 31. Wireless datagram protocol • Operates on top of many different bearer services capable of carrying data  To send a datagram the node must send a T- DUnitdata.req  It consists of destination address (DA), destination port (DP), Source address (SA), source port (SP) and user data (UD)  The T-DUnitdata.ind service indicates the reception of data.  T-DError.ind (Error message) indicates that the higher layer requests a service the WDP cannot fulfill.  Wireless control message protocol (WCMP) provides error handling mechanisms
  • 32. Wireless transport layer security • The wireless transport layer security (WTLS), can be integrated into the WAP architecture. • Provide different levels of security (privacy, data integrity, and authentication) and has been optimized for low bandwidth, high-delay bearer networks. • Since the devices are MN, WTLS takes low processing power and very limited memory for cryptographic algorithms. • WTLS supports datagram and connection-oriented transport layer protocols.
  • 33. SEC-Create req.  key exchange suite (KES), a cipher suite (CS), and a compression method (CM) SEC-Create res.  Sequence number mode (SNM), key refresh cycle (KR), session id (SID  SEC-Exchange req. (indicates that the peer wishes to perform public-key authentication so it requests a client certificate (CC) from the originator.)
  • 34.
  • 35. Wireless transaction protocol • WTP has been designed to run on very thin clients, such as mobile phones. • WTP offers improved reliability over datagram services, improved efficiency over connection-oriented services, and support for web browsing • It provides three classes of transaction service • A special feature is its able to provide a user acknowledgement or automatic acknowledgement
  • 36. WTP class 0  Class 0 offers an unreliable transaction service without a result message. TR-Invoke.req  A flag : WTP generate acknowledgement or user acknowledgement  H provides a simple index to uniquely identify the transaction
  • 37. • WTP class 1 offers a reliable transaction service Basic transaction - no user acknowledgement Basic transaction with user acknowledgement
  • 38. WTP Class 2 • Provides the classic reliable request/response transaction from many client/server scenarios
  • 39. Wireless session protocol • Designed to operate on top of the datagram service WDP or the transaction service WTP • WSP provides a shared state between a client and a server to optimize content transfer. • Session management: Establish, release, suspending & resuming • Capability negotiation: Clients and servers can agree upon a common level of protocol functionality • Content encoding: WSP also supports binary encoding for the content it transfers. • HTTP/1.1 functionality: Supports the functions HTTP/1.1 offers, such as extensible request/reply methods, composite objects, and content type negotiation. • Exchange of session headers: Client and server can exchange request/reply headers • Push and pull data transfer: Pulling data from a server. • Asynchronous requests: Supports a client that can send multiple requests to a server simultaneously.
  • 40. WSP/B session establishment WSP/B session suspension and resume WSP/B session termination CH -Client header, RC- Requested capabilities SA-server address, CA-client address R-Reason