the 1390 standard
DESCRIPTION
The 1390 Standard. 5. Conditions and Assumptions. 6. Mathematical Modeling. 7. Simulation Analysis. LEGEND: M – detection method Sb – number of input signal bits Lb – number of local signal bits fs – sampling frequency Id – ideal conditions A – amplitude distortion - PowerPoint PPT PresentationTRANSCRIPT
The 1390 StandardAnother 10-billion unit market:
1.Universal house meters/resources becomeintelligentif linked to a centralized DB accessible from Internet
2.Success story of ET Technologies!Who comes first to China?
3.Off-hook versus on-hookMajor issue—low VLSI area solutionfor high production volume
SUBOPTIMAL DETECTIONFOR SIGNAL TYPES
DEFINED BY THE IEEE 1390 STANDARD
Miljan Vuletić, Goran Davidović, Veljko Milutinović
Department of Computer EngineeringSchool of Electrical Engineering
University of BelgradePOB 35-54, 11120 Belgrade, Serbia, Yugoslavia
E-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]
1. Introduction
TelephoneNetwork
Fax
Telephone
Security TIU
Utility Controller
UtilityDatabase
Utility Server
Utility Provider End User
Meter
Appliance
- UTSA (Utility Telemetry Service Architecture):
- Optimal detection methods- Suboptimal detection methods (DMF, SAS, WPD, BMF)- TIU: Telemetry Interface Unit
Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]
Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]
2. Problem Definition- SAT (Single Alert Tone) and DAT (Dual Alert Tone) detection- SAT:{f1, f2, f3, f4, f5, f6, f7, f8, f9}- DAT:{fg & fx, where fx is one of f1, f2, f3, f4, f5, f6, f7, or f8}- Frequency values:
f1=375.2Hz, f2=404.3Hz, f3=468.0Hz, f4=495.8Hz, f5=520.6Hz,f6=548.0Hz, f7=562.8Hz, f8=578.4Hz, f9=1633.0Hz, fg =1827.0Hz
3. Existing Solutions- Newely adopted standard IEEE 1390- Application of optimal detection methods (DSP)- R2 signal detector developed by TELLCO (TUA 0096AA)
4. Suggested Solution- Using suboptimal methods for signal detection- Goal: To lessen the total VLSI area of signal detector
Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]
5. Conditions and AssumptionsCONDITIONS
- SAT and DAT are of duration 600ms or less- False detection of SAT and DAT signals
should be avoided (harmonics, voice, DTMF*)- Allowed frequency shift is 1%- Transistor count estimate
should comply to CMOS implementation constraints
ASSUMPTIONS
- Max amplitude distortion in the case of SAT is -3dB- Max relative amplitude ratio in the case of DAT is -6dB- Min SNR (Signal to Noise Ratio) is 10dB- Separate detector exists for low and high frequencies- The used VLSI logic is fast enough
to perform critical operations in real time
Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]
* DTMF - Dual Tone Multi-Frequency
6. Mathematical Modeling- S i g n a l d e t e c t i o n b a s e d o n D F T- T h r e e s a m p l e s i n t h e f r e q u e n c y d o m a i n a r e t e s t e d ,
b e f o r e a d e c i s i o n f o r a p a r t i c u l a r f r e q u e n c y i s m a d e- S e p a r a t e d e t e c t o r s f o r l o w a n d h i g h f r e q u e n c i e s :
T h e d e t e c t i o n p r o b l e m h a s b e e n p a r t i t i o n e d- T h e c h o i c e o f D F T r e s o l u t i o n :
f f 2
30 0 1. m a x , f
f fi i 1
4 ,
f - d i s t a n c e b e t w e e n t w o n e i g h b o r i n g D F T s a m p l e s ;f i + 1 a n d f i – r e a l n e i g h b o r i n g f r e q u e n c i e s ;
f m a x - m a x i m a l f r e q u e n c y f r o m t h e g i v e n f r e q u e n c y s e t ;
M i l j a n V u l e t ić , G o r a n D a v i d o v i ć , V e l j k o M i l u t i n o v i ćE - m a i l : { m i l j a n @ g a l e b , d a v i d o v i c @ b u e f 3 1 } . e t f . b g . a c . y u , v m @ e t f . b g . a c . y u
7. Simulation Analysis- Simulator of the signal detector written in C- Different levels of quantization noise (DMF, SAS, WPD, BMF)- Different environmental conditions:
ideal conditions, presence of Gaussian noise,presence of pulse noise, presence of burst pulse noise
- Different types of signal distortion:amplitude, frequency,interference in the form of neighboring frequency from the set
- Percentage of successful detectionfor every of suboptimal detection methods has been found
- Selection of the most convenient suboptimal detection method (WPD,BMF)
Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]
- Simulation results: Percentage of successfulIEEE 1390 signal detection (low frequencies);pulse noise case
M Sb Lb fs Id A F I AFI
8 8 8000 100 100 97.626 100 90.801
10000 100 100 98.516 100 92.582
4 4 8000 100 100 98.516 100 91.988
10000 100 100 98.516 100 90.208
3 3 8000 100 100 100 100 88.427
DMF 10000 100 100 99.703 100 92.582
3 2 8000 100 100 93.175 100 81.899
10000 100 100 96.142 100 79.228
2 3 8000 100 100 96.439 100 82.493
10000 100 100 96.406 100 86.647
2 2 8000 100 100 87.834 100 77.448
10000 100 100 98.516 100 82.789
4 1 8000 100 100 95.846 100 81.602
10000 100 100 98.220 100 92.878
SAS 3 1 8000 100 100 100 100 89.911
10000 100 100 100 100 84.866
2 1 8000 100 100 92.285 100 80.119
10000 100 100 99.406 100 78.635
1 4 8000 100 100 100 100 100
10000 100 100 100 100 100
WPD 1 3 8000 100 100 97.033 100 99.110
10000 100 100 97.703 100 99.703
1 2 8000 100 100 95.252 100 96.736
10000 100 100 99.406 100 98.813
BMF 1 1 8000 100 100 99.406 100 99.109
10000 100 100 100 100 99.109
LEGEND:
M – detection methodSb – number of input signal bitsLb – number of local signal bitsfs – sampling frequencyId – ideal conditionsA – amplitude distortionF – frequency shiftI - interferenceAFI – presence of all AFI distortions
8. Implementation Analysis- G a t e - l e v e l h i e r a r c h y s c h e m e o f t h e I E E E 1 3 9 0
s ig n a l d e t e c t o r- V L S I c o m p le x i t y e s t im a t e ( m a x t r a n s i s t o r c o u n t )
ACMP
CMP
D
Q
Q
D
Q
Q
8
2
ERR
f9, f g
f1-f 8
DetCore
fs
A
B
ClkGen
clk
DET
LF
HF
Detection Method BMF WPDSAT/DAT gate-level complexity:
ROM (max. number of bits) 133500 534000
Logic (max. number of gates) 8000 9500
SAT/DAT total transistor count: 165500 572000
Components of the detector core (DetCore):CM (Control Module);ARM (Adder, Registers, and Memory);OM (Output Module);
n
CMclk
fs
SELL6
4
SELH
ADDRL ADDRH
x y
end1
end2
OM 8
2
ERR
f9 , f g
f1-f 8
DET
RF1OUT
RF2OUT
m
n
End
ARM
End1
ShClk
ShClk
SELL SELH
A
B
A
BEnd2
ADDRL ADDRH
RF1OUT
RF2OUT
m
D
Q
Q
"1"
D
Q
Q
End2
End1
End2End1
Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]
Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]
9. Conclusion- Performed analyses:
Mathematical modelingSimulation analysisImplementation analysis
- Suggested algorithm presents a possible solutionof SAT/DAT (IEEE 1390) signal detection
- VLSI realization of the appropriate detector:Complexity/Performance tradeoff
- Next steps:HDL language description of the detectorHDL model simulation and testingVLSI implementation: silicon compilation
Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]
What is the Next Step?
Remote and virtual factories,controlled by integrated 1390/Internet
Wireless Internet-oriented telemetry and more,using integrated GPS/Internet
References:[Domazet98] Domazet, D.,
"Virtual Factories on Internet,"Technical Report, DD/1/98, Gintic Institute, SingaporeMarch 1998.
[Jameel98] Jameel, A., Stuempfle, M., Jiang, D., Fuchs, A.,"Web on Wheels: Toward Internet-Enabled Cars,"IEEE COMPUTER, January 1998, pp. 69-76.
Case Study:Virtual Factories - Globalization in Action
Factories with no people and no light!Different production phases at different global locations.Example: Gintic in Singapore [Domazet98].
Design
Analysis Manufacturing
Materials
ManagementMarketing
UnifiedProductConcept
(USA)
(EU) (Singapore)
(USA) (Serbia)
(Japan)
Figure 1: The Gintic Approach
Case Study:Web on Wheels - Telematik by Mercedes
- Internet services can be extended to customers in automobiles.- Another issue is remote diagnostics.- First Internet-enabled cars may hit roads before the year 2002
[Jameel98].
- Location awareness is the major prerequisite for location sensitive services.- Safe-to-use is the major design requirement (no eyes off the road when email).- Easy-to-use is another important issue (no hands off the wheel
Veljko Milutinović, Miljan VuletićE-mail: [email protected], [email protected]
Major services:
(a) Seamless access to office or home computers (e.g., email)(b) Location-based information on demand (e.g., the nearest gas station)(c) Remote diagnostics and roadside assistance (e.g., S.O.S.)(d) Personalized services on demand (e.g., WWW access)(e) Interactive audio and video for passengers (e.g., time sinks)(f) Electronic commerce on Interent (e.g., smart cards)(g) Electronic business on Interent (EBI)
Major issues:
(a) Mobile wireless communications(b) System architecture(c) User interface design
Mobile Wireless Communications
The Internet
Customer assistance centeror other service providers
Personal devices - Smart card - HPC/PDA - Smart phone
Vehicle functions - Onboard diagnosis - Comfort functions
CDPDGPS
Metricom
Internet clientsInternet servers
CAN Bus
Audio
Navigation
Storage device
Entertainment
Infraredtranciever
Figure 2: The Internet on Wheels Concept Car
Metricom - Metropolitan Network (10s Kbits/s for flat montly fee) CDPD - Cellular Digital Packet Data HPC - High Performance Computing PDA - Personal Digital Assistant
System Architecture
IP
TCP
IP
TCP
IP
TCP connection
Sender
Internet Wired networkconnection
Wirelessconnection
Homeagent
Basestation
Mobilehost
Figure 3: The Basic Mobile IP Architecture
Veljko Milutinović, Miljan VuletićE-mail: [email protected], [email protected]
User Interface
PresenterContent
Contentplug-in
Contentprovider
Userinput
Controlreception
Statusinformation
Configurationinformation
Display
Speech
Externaldevices
Infrastructure
Car data
Multimedia
Microphone
Pointer deviceAlphanumeric device
Figure 5: The Basic User Interface Infrastructure
Major Solutions:(a) One-touch(b) Speech-synthesis(c) Speech-recognition
Veljko Milutinović, Miljan VuletićE-mail: [email protected], [email protected]
Advanced Internet ServicesS. Cvetkovic ([email protected])
V. Milutinovic ([email protected])
Mutations of Classical Approaches:
Internet Fax
Fax Web
Net to Phone
Net Talk
A Very Informative Reference:
[Cvetkovic98] Cvetkovic, S., "Issues in Internet for EBI",
http://galeb.etf.bg.ac.yu/~ebi/ or [email protected], 1998.
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Internet Fax The TCP.INT Remote Printing
Basic idea:
(a) Sending a fax message by email to a server
which is local to the fax message destination.
(b) Sending a real fax as a local call, at no charge to the sender.
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Checking if the destination location is covered by the service:
(a) Via WWW:
Visit http://www.tpc.int (option: Check Coverage)
and type in the destination fax number (starting with the country code)
(b) Via email:
Send email to [email protected] and specify the destination fax number.
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Sending is based on several methods:
(a) Sending email to the address
[email protected] includes the name and the location of the receiver
'_' means 'space'
'/' means 'enter'
FAXNUMBER includes no spaces, dashes, or points (up to 15 digits).
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Example
/[email protected]_Milutinovic
delivers the email message to fax number +381-11-324-8681
with the following text in the header of the message:
Veljko Milutinovic IFACT
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
(b) Visiting the WWW page
http://www.tpc.int (Option: Send a Fax)
and filling in a form.
(c) Sending a WORD or an EXCELdocument
using the program HQFax
which can be found at http://www.tpc.int(Option: Client Software)
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
(d) Sending a scanned document (BMP,GIF, PCX, TIF, JPG, ...)
using the program ScanFax
which can be found at http://www.tpc.int(Option: Client Software)
Acknowledgement comes to the sender's email address
after the fax is delivered (typically after a few minutes):time of delivery, transfer time, etc...
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Internet Fax MailboxThe FaxWeb
Basic idea:
(a) Faxes directed to a phone number get posted on WWW
(b) Ideal for those without mobile phone/fax units
(c) More info at http://www.faxweb.net
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Internet to Phone TalkThe Net2Phone by IDT
Basic idea:
(a) The talk is transformed into a bit stream,
and transported via Internet to a server in the USA.
(b) At the server, it is transformed into an analog signal,
and transported via telephone network to an ordinary telephone set.
(c) Costs are charged,
based on the distance from the server in the USA.
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Cost structure:
(a) For a PC in Yugoslavia,
the savings is from about 15 times (when the callee is in the USA),
to about 4 times (when the callee is in a neighboring European country)
(b) The cost has three parts:
(1) Local phone call (from the home to the local Internet provider).
(2) The Internet provider charges (about $0.01/min, in Yugoslavia).
(3) The IDT charges (the major part).
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
(c) The IDT charges per minute:
(1) London - Internet=$0.18 (YugoClassical=$0.80).
(2) NYC off peak - Internet=$0.10 (YugoClassical=$1.44).
(3) NYC peak - Internet=$0.15 (YugoClassical=$1.44).
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Technical prerequisites:
(a) Pentium, sound card, ear set, microphone, modem (min 28800 bps).
(b) Prefered - provider using cable rather than satelite infrastructure.
(b) Software package Net2Phone (from www.net2phone.com
Option:Download).
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Getting started: (for details see [Cvetkovic98])
(a) Download and install.
(b) On the first login, a personal form is filled out, anda PIN is defined.
(c) The IDT server defines the ACCOUNT NUMBER, used for charging purposes;
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Charging:
(a) Up-front payment $25, $50, or $100 by credit card.
(there is a form at http://www.net2phone.com).
(b) Automatic charging while talking.
(there is an account balance option athttp://www.net2phone.com).
(c) No charging for 1-800 and 1-888 numbers in the USA.
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Human interface:
(a) Press the CALL button to initiate the call.
(b) Press the PUSH TO TALK button to talk (if half duplex sound card).
(c) Release the same button to listen (if half duplex sound card).
(d) Press the VOX button to activate the AUTOMATIC PUSH TO TALK.
(e) Press HANG UP to finish.
For more options see [Cvetkovic98].S. Cvetkovic ([email protected])
V. Milutinovic ([email protected])
Problems:
(a) Echo if satelite link used.
(b) Low quality if slow modem
(c) Classical phone set can not call a PC, for now.
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Internet PC to PC Talk Net Talk
Basic idea:
(a) Sound is transformed into bitstream andtransported to another PC
(b) Camera option more popular !!!
(c) Net Conference
(d) Working together in anapplication during a meeting
NetMeeting by Microsoft (http://microsoft.com/netmeeting)IPhone by Vocaltec (http://www.vocaltec.com)
S. Cvetkovic ([email protected])V. Milutinovic ([email protected])
Some Popular Static Image Formats for HTML/WWW
Mostly supported by all popular WWW browsers:
*.gif*.jpeg or .jpg*.png*.bmp
Some Popular Dynamic Image Formats for WWW
Mostly additional SW (plug-in modules) needed for full functionality(compression always supported):
*.avi*.mov*.mpeg or .mpgRealVideo
Source: [email protected]: Information to follow is subject to change!
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
(1) .GIF (Graphic Interchange Format) Convenient for storing of computer generated pictures Not convenient for storing photo pictures, due to limitations of the palette Standard 256 colors Possible to define “transparent color” with flavor of the “background” Possible to keep more pictures in one file,
information about the time pause between two pictures, information about looping, etc Compression is w/o loss, based on LZW Download modes:
(a) Normal (line by line)(b) Interlaced (all odd lines first)
(2) .JPG (Joint Photographic Experts Group) Mostly intended for storing photo pictures Compression level controlled by picture quality;
compression is lossy (loss should not be visible to human eye) 16 million colors (24-bit palette) No “transparent” colors (so far) Download modes:
(a) Baseline (line by line)(b) Progressive (in several passes – draft first)
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
(3) .PNG (Portable Network Graphics) Supported by IE only (so far) Supposed to take the best from both .GIF and .JPG, but suffers from file size
(4) .BMP (Bitmap) Supported by IE only No compression supported
(5) .AVI (Audio Video Interleave) A Microsoft standard No plug-in only if IE used(6) .MOV (Quicktime Movie) An Apple standard Business as usual(7) .MPG (Motion Picture Experts Group) Based on same principles as .JPG More aggressive compression(8) RealVideo Specifically developed for emitting video records over Internet, in real time Quality depends on network bandwidth and availability
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
Music on the WWW: Formats of Interest
Popular browsers (Netscape & Explorer) support: wav mid
Other formats (needing extra software): mp3 dat ra
Source: Ivan Sokić (e-mail: [email protected])
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
WAVE (*.wav)
Digital equivalent of an audio signal, obtained by ADC from players(CD, etc) or others
For the CD-player quality, takes 172KB/sec (e.g., over 10 MB for one minute) Lower sampling rate possible, but sound quality decreases Browser expects that the entire file is read into memory,
before reproduction starts;this read-in may take enormous time,and causes (unnecessary) virtual memory page swapping
Critical resource: Memory
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
MIDI (*.mid)
Stores info on musical instruments and tones to play Intrepretation performed by the sound card and the resident drivers Quality determined by the sound card infrastructure No voice synthesis! No way to port-in the audio CD contents Today, the only practical solution
for background music on WWW pages Selected servers contain popular MIDI music to download
(often, permitions needed both from music and file authors) Critical issue: Applicability
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
Useful Sites for MIDIDownload
http://ultimatemidi.com/midigk.htmlhttp://www.prs.net/midi.htmlhttp://stud1.tuwien.ac.at/~e8925292/bestmid .htm#Pop1
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
MP3 (*.mp3)
Similar to WAVE, except for additional compression,with file size reduction up to 10 times!
Compression time long, which is not an issue,because compression is done only once, off-line
Decompression doable at run-time, if PC133 or better,but slows down the PC and the Browser
Critical resource: Processing time
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
Real Audio (*.ra)
Intended for “live broadcast” over Internet,at the expence of lower quality(in order to be able to withstand bandwidthshrinkings)
Listening concurrently with download, which meansperiodicalskipping/repeating (unpleasant) if bandwith disturbed
Critcal issue: Quality of the sound
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
DAT (*.dat)
This is the format of popular audio CDs At reproduction time,
only parts of the file are read into memory at a time If other resources access CD data, reproduction may get interrupted,
resulting in short pauses;consequently, not good for background music, if other data from the same CD are being used
Good: CD usable both in PC and in audio CD players Critical resource: CD ROM player
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
Real Audio (*.ra)
Intended for “live broadcast” over Internet,at the expence of lower quality(in order to be able to withstand bandwidth shrinkings)
Listening concurrently with download, which means periodicalskipping/repeating (unpleasant) if bandwith disturbed
Critcal issue: Quality of the sound
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
The Mobile IP
Veljko MilutinovićDepartment of Computer Engineering,
School of Electrcal Engineering,University of Belgrade
Email: [email protected]: http://galeb.etf.bg.ac.yu/~vm
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
Networking Terminology Mobile
Agent advertisement: The procedure by which a mobilityagent becomes known to the mobile node.Agent discovery: The process by which a mobile nodecan obtain the IP address of a home agent or foreignagent, depending upon whether the mobile node is homeor away from home. Agent discovery occurs when amobile node receives an agent advertisement, either as aresult of periodic broadcast or in response to a solicitation.Automatic home agent discovery: The process by whicha mobile node can obtain the IP address of a home agentof its home network.Binding: The triplet of numbers that contains mobilenode's home address, its-care-of address, and theregistration lifetime - how long mobility agents can usebinding.Binding update: The message that supplies a new bindingto an entity that needs to know the new care-of addressfor a mobile node. The binding update contains the mobilenode's home address, new care-of address, and a newregistration lifetime.Care-of address: An IP address on the mobile node'scurrent point of attachment to the Internet, when themobile node is not attached to the home network.Collocated care-of address is a care-of address assignedto one of the mobile node's network interfaces, instead ofone being offered by a foreign agent.Correspondent node: A node that sends or receives apacket to mobile node; the correspondent node may beanother mobile node or a nonmobile Internet node.Discovery: In this article, short for agent discovery.Encapsulation: The process of incorporating an originalIP packet (less any preceding fields such as a MACheader) inside another IP packet, making the fields withinthe original IP header temporarily lose their effect.Foreign agent: A mobility agent on the foreign networkthat can assist the mobile node in receiving datagramsdelivered to the care-of address.Foreign network: The network to which the mobile nodeis attached when it is not attached to its home network,and on which the care-of address is reachable from therest of the Internet.Fully qualified domain name (FQDN). An Internetnode's FQDN is its complete domain name as defined bythe Domain Name System (DNS). A node can be knownlocally by a relative domain name that is a substring of itsFQDN, but such a relative name cannot be resolvedcorrectly by Internet nodes outside of the part of thedomain name hierarchy indicated by the relative name.The fully qualified name can be resolved from anywherein the Internet, subject to access control and routability ofthe resolution request.Home address: The IP address assigned to the mobilenode, making it logically appear attached to its homenetwork.
Home agent: A node on the home network thateffectively causes the mobile node to be reachable at itshome address even when the mobile node is not attachedto its home network.Home network: The network at which the mobile nodeseems reachable, to the rest of the Internet, by virtue of itsassigned IP address.Minimal encapsulation: A variant encapsulationtechnique specified in RFC 2003 that temporarily altersthe structure of the original IP header, but uses fewerbytes for tunneling packets to the care-of address than thedefault method (IP-within-IP) uses.Mobile node: A node that, as a part of normal use,changes its point of attachment to the Internet.Mobility agent: A node (typically a router) that offerssupport services to mobile nodes. A mobility agent can beeither a home agent or a foreign agent.Nomadicity: The full range of network technology beingdesigned to come to the assistance of the mobile (ornomadic) computer use, not limited to network layerprotocols.Redirection: A message that is intended to cause achange in the routing behavior of the node receiving it.Registration: The process by which the mobile agentinforms the home agent about its current care-of addressRemote redirection: A redirect sent from a source notpresent on the local network. The source can be locatedanywhere in the global Internet and may have maliciousintent and be untraceable.Replay attack: A security violation whereby a maliciousentity attempts to imitate a transaction recorded duringprevious and valid transaction between two protocolentities. Both protocol entities have to be aware that thesubsequent identical traffic streams may no longer bevalid. Since the previous transaction was valid, thealgorithms for detecting replay attacks needs toincorporate data that can never be reproduced in anycorrect subsequent transaction.Route optimization: A process that enables the deliveryof packets directly to the care-of address from acorrespondent node without having to detour through thehome network.Source routing: A routing technique that causes some orall intermediate routing points to be represented directly inthe data packet to be forwarded This is in contrast to thetypical situation in which intermediate routers rely onacquired routing state information to forward incomingpackets.Tunneling: The same as encapsulation, but withadditional connotations about changing the effects ofInternet routing on the original IP packets.
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
The Mobile IP (RFC 2002)
Essence:
Increasing variety of wireless devices offering IP connectivity(PDAs, handhelds, and digital cellular phones).
Making mobility transparent to applicationsand higher level protocols (TCP, ...).
Using two IP addresses: a fixed home addressplus a care-of address that changes at each new point of attachment.
Major mechanisms:
1. Discovering the care-of address2. Registering the care-of addressTunneling the care-of address
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
Introduction into Mobile IP
The IP routes packets from a source to a destinationby allowing routers to forward packets according to routing tables(destination network number obtained by masking some of the lower IP bits).
Mobile IP requires the existence of a network node known as home agent.Also, at the new point of attachment, a foreign agent is involved.
Whenever mobile node away from its home network (at a foreign network),home agent gets all the packages and forwards themto the mobile node's current point of attachment(through an interaction with the foreign agent).
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
T h e D i s c o v e r y P r o c e s s
W h e n e v e r t h e m o b i l e n o d e m o v e s ,i t o b t a i n s i t s n e w c a r e - o f a d d r e s s t h r o u g h t h e d i s c o v e r y p r o c e s s ,b a s e d o n t h e r o u t e r a d v e r t i s i n g p r o t o c o l ( e x t e n s i o n o f t h e R F C 1 2 5 6 ) .
D i s c o v e r y o p e r a t i o n s i n m o b i l e I P ( F A i s f o r e i g n a g e n t ) . F A a d v e r t i s e s :( a ) a b o u t c a r e - o f a d d r e s s e s ,( b ) a b o u t s p e c i a l s e r v i c e s , a n d( c ) a b o u t t h e v i s i t i n g m o b i l e a g e n t s ( p u s h v e r s u s p u l l )
FA FA adver tises service
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
T h e R e g i s t e r i n g P r o c e s s
N e x t , t h e n e w c a r e - o f a d d r e s s i s r e g i s t e r e d w i t h i t s h o m e a g e n t ,s o t h e f i r s t n e x t p a c k e t c a n b e f o r w a r d e d .
FA
FA
H A
M H requests serviceM H relays request to H A
H A accep ts or den ies
FA relays sta tus to M H
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
H om eA gen t
H A FAS rc D est P ro to S rc D est P ro to
E n capsu la tedd iagramX M H ? Payload
S rc D est P ro to
ForeignA gen t
M obile H ost
X M H ? Payload
S rc D est P ro to
Payload?M HX4 or 55
Further delivery requires that the care-of address appears as destination IP.This transformation is called redirection.
Home agent redirects packets from the home network to the care-of address,by constructing a new IP header.
The new header encapsulates the original packetcausing the mobile's node home address to have no effect on packet routing
The inverse transformation is done by the foreign agent.
Such encapsulation is called tunneling
The Tunneling Process
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
The Ongoing Research1. Security improvement (making it more secure)2. Route optimization (bypassing the home)3. Source routing
(moving different outgoing and reply routers)
The Mobile IP WWW Resources1. Mobile IP working group drafts and documents
http://www.ietf.org/html.charters/mobileip-charter.html
2. Stanford MosquitoNet Mobile IP projecthttp://mosquitonet.stanford.edu/software/mip.html
3. The CMU Monarch projecthttp://www.monarch.cs.cmu.edu/
4. Portland State Secure Mobile Networking projecthttp://www.cs.pdx.edu/research/SMN/
5. State University of New York at BinghamtonLinux-Mobile IP projecthttp://anchor.cs.binghamtom.edu/~mobileip/
FA MH
SRC HA2.
1.
1.
2b.
2a.
2.
3.
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
Selected HICSS Case Studies on Mobile Computing
(1) The CoBERT Agents: Cooperating on the Best Effort Basis Developed for real-time with soft/hard deadlines Israel ([email protected])
(2) QoS for Wireless ATM Broker concept for resource management and negotiation Germany ([email protected])
(3) Concurrent Data Access in Mobile Hetero Systems New algorithm for limited bandwidth and frequent disconnect
USA ([email protected])
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
Mobile Phone & Internet
(b) GSM-900, GSM-1800 (DCS), GSM-1900 (PCS)
(a) GSM = Global System for Mobile Communication (1990)
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
GSM Advanced Services:
(a) Divert call
(b) Answering machine
(c) CLIP (Calling Line Identification Presentation)
(d) Call waiting
(e) Conference call
(f) Roaming
(g) Barring calls(h) SMS (Short Message Service)
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
More About SMS:
Basic idea:
(a) Exchange of messages up to 160 chars
(b) Contact without disturbing receiver with phone ring
(c) Low cost communication for mobile subscriber
How to:
(a) Choose menu option in your mobile phone(b) Enter the message(c) Enter the destination mobile phone number (international format e.g. +381641234567)
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
What happened with my message:
(a) Message is sent to SMS Center (SMSC)
(b) SMSC tries to locate mobile destination and delivers the message
(c) If the destination is unreachable
message is saved by SMSC for later delivery(d) Destination phone beeps if it receives a message from SMSC
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
(a) Sending a message to mobile phone from WEB page
(b) Finding the WEB page of the mobile subscriber’s GSM network; one can use http://www.gsmworld.com to identify the network
(c) Trying multinetwork gateways
http://www.mtn.co.za http://www.advalvas.be/sms
WEB-TO-SMS:
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
(a) Direct from PC to mobile phone, using a special e-mail address(e.g. [email protected])
EMAIL-TO-SMS:(1) Direct to phone number
(b) Message is broken into 160-character chunks, and sent to mobile phone via SMS
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
(a) Sending e-mail from a mobile phone(b) Sending SMS message in the following format
EMA username@domain body_of_the_message 160to number +393388641732
(c) Instead of @ one can use !
(d) Your GSM network has to have a roaming agreement with TIM (Telecom Italia Mobile) to use this service
SMS-TO-EMAIL:
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
(2) Using an intermediate e-mail address
(a) Mobile user has to open an e-mail account at eSMS
(more info at http://www.esms.com)
(b) Message sent to [email protected] can be:
(1) Sent to mobile phone broken into 160 character chunks; number of chunks can be limited by the user
(2) Only username and subject of the message are sent to mobile; complete message is forwarded to e-mail defined by user (“notification” mode)
(3) Message is forwarded to another e-mail address only (“do not disturb” mode)
V. Milutinovic ([email protected]) D.Petkovic – [email protected]
Research at UB/IFACT
Suboptimal detection and correlation
Issues:Optimal versus suboptimalProblems reincarnate—experiences accumulate
On-hook: Suboptimal detectionOff-hook: Suboptimal correlation
Acknowledgments:Goran Davidović and Miljan VuletićPapers: M+M (2)
V. Milutinovic ([email protected]) D.Petkovic – [email protected]