Wireless and Mobile Networking

-- Problems and Solutions

Chaojie Qiu (SID: 9942930)

[email protected]

Abstract

In the area of modern industries, wireless and mobile networking systems are playing more and more important roles with the development of the digital communication technologies. In this paper, we discussed wireless and mobile networking and its performance in the modern industries. Our main topics focused on some problems existing in wireless and mobile networking and then trying to give the solutions to solve these problems. Currently wireless and mobile systems have better performance in many fields, but some critical problems are unavoidable to exist and solving these problems will be helpful to improve its performance.

1. Introduction

Wireless and mobile networking will revolutionise the way we communicate by telephone (not mobile) and by computers, at work and at home. Leading edge companies are already using this new technology to gain a competitive advantage. At this time, applications for wireless and mobile networking are almost appearing in all market segments that rely on communications and the benefit from mobility. Mobile computers, such as notebook or PDAs (personal digital assistants), are rapidly growing to become a major segment of the computer industry. Wireless and mobile networking systems have been proved to be one of the best products in many areas from medical environments, military scenarios, industrial setting and office automation to banking, and airports, even for people walking around a store with a PDA doing inventory. Wireless and mobile networking has been playing a more and more important role in the area of the present and future digital wireless telecommunication.

Advances in wireless and mobile networking have engendered a new computing paradigm (called mobile computing) in which users carrying portable devices have access to a shared infrastructure independent of their physics location. A mobile computing environment consists of two distinct sets of entities: mobile hosts and fixed hosts. Some of fixed hosts (called Mobile Support Stations) are augmented with a wireless interface to communicate with mobile hosts. A mobile host can move from one cell (or radio coverage area of a fixed host) to another while retaining its network connections. Usually, mobile hosts are required to be able to communicate with each other and with stationary or wired or fixed hosts so that the most efficient use of the best network connectivity is transparently and adaptively made and available to the mobile host at any time. In future mobile computing environments, a large number of users carrying some wireless products, such as low-power palmtop machines and mobile phones, will be necessary to have more conveniently access to information over wireless channels anywhere in the world and at any time without more errors. Mobile users can connect to information servers or other users through either wireless or wired connections. In general, the connections can involve the exchange of voice, data, text, facsimile, or video information.

The mobile computing paradigm introduces a number of new technical issues in the area of database systems. Techniques for traditional distributed database management, for example, have been based on the assumption that the location of and connections among hosts in the distributed system do not change. However, in the mobile computing environment, these assumptions are not longer valid. Mobility of hosts engenders a new kind of locality that migrates as hosts move. A user carrying a portable computer can submit the operations of a transaction to distributed data servers from different locations. As a result of this mobility, the operations of the transactions may be executed at different servers. The distribution of operations implies that the transmission of message may be required among these data servers in order to co-ordinate the execution of these operations.

A mobile machine, in order to take advantage of the highest speed or most capable network available, will need to be able to work with any of two, three, or even more wireless networks. Further, a mobile user would in general like to be connected the wireless network able to meet the applications? needs at lowest usage cost. When moving beyond the range of one wireless network, a user would generally like to be automatically connected to another. In nature, information data is required to be reliably and safely transmitted over wireless and mobile networks. Due to the limitations of the present wireless networking technologies, some errors may be unavoidable, and even their corrections may be unreachable.

2. History and Development

All modes of communication using conductive metal or optical fibre have one thing in common: communication devices must be connected physically. Physical connection is sufficient for many applications such as connecting PCs in an office connecting them to a mainframe within the same building. It is acceptable for short distances, but expensive and difficult to maintain for long distances. So, the network participants need a way to communicate without using a physical connection; that is called wireless communication.

At present, no area of telecommunications is growing and changing faster than wireless and mobile networking. The wireless communication technologies are quickly getting to be improved to a new higher level with the development of more wireless products. However, these technologies are not new ideas. As early as 1901, the Italian physicist Guglielmo Marconi demonstrated a ship-to-shore wireless telegraph using Morse Code (dots and dashes are binary, after all).

From then on, wireless and mobile networks have been experiencing the development of three generations in a century.

The first generation comprises today?s simple cordless telephones and analogy cellular telephones. Our present cordless telephones are stand-alone consumer products and do not require any interoperability specifications.

Second-generation cordless telephones will be designed as components of a large network. These will include Cordless Telecommunications, the second-generation networks and the Digital European Cordless Telecommunications standard, and North American and Pan-European Digital Cellular systems.

The third generation wireless information networks are being formed. The central concept is to create a single network infrastructure that will allow users to exchange economically any kind of information between any desired locations. The new network will merge the separate first and second-generation cordless and cellular services, and also encompass other means of wireless access such as paging, dispatch, public safety and wireless local area networks.

The advanced technology of wireless communication almost has been applied to all kinds of areas in real life. In some companies, a wireless high-speed data communication network is being built to be accessible from airports, hotels, and convention centres. Subscribers will have radio-frequency cards that will wirelessly connect their notebook computers at high speeds to network-access points, which will connect over wires to the Internet and corporate networks. After collecting signals from the cards, the access points will feed the data through a router to the roof. From there, signals will be sent to a centralised city access point.

Compared to its history and some other industries, modern digital wireless systems have much better performance.

3. Wireless Transmission and Mobile Transactions

Some people even believe that only two kinds of communication, fibre and wireless, exist in the future. All fixed computers, telephones, fax machines and so on will be use fibre communication, and all mobile ones will be by wireless. In our time, many people and companies need to be on-line all the time. For the mobile users, fibre optics could be of no use because they may need to get their hits of data for their laptop, notebook, shirt pocket, palmtop, or wristwatch computers without being tethered to the terrestrial communication infrastructure. So, these users can benefit from wireless communication. It also has many other important applications besides providing connectivity to users who want to read their email in aeroplanes.

Several different types of wireless transmission are available today, including:

Radio waves are easy to generate, can travel long distances, and penetrate buildings easily, so they are widely used for communication, both indoors and outdoors. Radio waves are also omnidirectional. This means that they travel in all directions from the source, so that the transmitter and receiver do not have to be carefully aligned physically. But sometimes omnidirectional radio is good and sometimes it is bad.

The microwaves travel in straight lines and can therefore be narrowly focused. Concentrating all the energy into a small beam using a parabolic antenna gives a much higher signal to noise ratio, but transmitting and receiving antenna must be accurately aligned with each other.

It is also necessary to re-examine various transaction processing issues in mobile computing systems to account for characteristic of wireless client/server computing. As a mobile host interactively submits the operations of a transaction to its co-ordinator, the latter subsequently forwards these operations to the distributed database servers. The characteristics of a mobile transaction can be described as follows:

Mobile transactions are long running, error-prone, and heterogeneous. As a consequence, modelling mobile transaction may be very restrictive.

4. Problems and Solutions

There are several common problems associated with wireless and mobile networking. These problems include the insecurity of any physical boundaries to delimit authorised members of a network, location-dependent link reliability, battery and power usage, signal transmission and acceptation among multiple nodes (hosts), and background noise and unauthorised or unwanted interference from other devices working in the same frequency band. Some of them have been solved or are being processed, but for other problems we do not have better solutions yet.

4.1. Wireless Links among Hosts

Nowadays millions of people have portable machines, including portable computers, and they generally want to read their electronic mails and access their normal file systems wherever in the world they may be. These mobile hosts introduce a new complication: to route a packet to a mobile host, the network first has to find it. The reliability of these operations depends on the wireless link between portable machines and signal transmitters (network administrators).

For mobile hosts, the primary connection to the rest of the network is a wireless link. But, unlink wired links, wireless links are relatively unreliable and have low bandwidth constraints. This case is particularly obvious for the connections between two mobile hosts. In many occasions (such as under the ground or on the moving vehicles), a lower bandwidth may result in a greater difficulty to maintain connections between mobile hosts and other hosts. Moreover, for a transmitter, there is a limited covered spread area. Its transmission power decreases with the growth of the distance.

A key point to solve these problems is to guarantee that mobile hosts have a more power ability to receive lower signals. In a wireless network, for example, it is very important to consider the antennas, which are used to ensure good quality transmission and reception of signals. It is also more reliable and secure to consider using a wide band of frequencies because the data, especially the larger-size data, can be transmitted over this band of frequencies.

However, it is not easy to become completely true in the short-term time. In fact, the solution to solve it involves in the improvement of all kinds of technologies in wireless communication.

4.2. Battery and Power Usage

Mobile hosts equipped with batteries suffer from limited battery life constraints. In general, a battery may maintain the connection of a mobile host in less than 100 hours. It is particularly serious for those who travel outdoors in a longer time. The recharging cycle of a battery will decrease with its age growth.

Efficiently decreasing the waste of battery power and maintaining a longer-time connection for mobile hosts is a key to solve this problem. It is required for manufacturers to improve the technology of battery manufacturing and the quality of materials used. It is also concerned about the quality of mobile machines and the tasks executed in it.

In order to avoid the emergent case of the insufficiency of battery power, most of users carrying wireless and mobile communication tools usually equip one or more extra full-recharged batteries while travelling outdoors in a longer time. It seems not to be a good way, but it is sufficient and efficient to guarantee enough power to maintain the connections between mobile receivers and signal transmitters.

We may expect that, in the near future, a new kind of rechargeable battery with a lighter weight will be used in mobile machines. It looks like a kind of ordinary battery, but it can keep a longer time of connection. Obviously, that will provide more convenience for those who travel outdoors.

4.3. Connections on the Move (Location-Dependent Link Reliability)

The mobility of the hosts implies that the hosts will connect from different access points and hence users may also want to stay and keep connection while on the move. In traditional distributed database systems, many techniques have been based on the assumption that the location of hosts and the connections among hosts can not be changed. However, in the wireless and mobile networking environment, these assumptions are no longer valid. As mobile hosts move, the change and migration of the location must be informed to the other related hosts or fixed service hosts. As a consequence of this procedure, existing solutions for traditional distributed database management may not be readily applicable to the mobile computing environment. In particular, migrating localities may introduce extra communication costs and extra work in fixed networks.

In a mobile environment, a mobile host can query or update a database, which is distributed in multiple data servers over a fixed network, from different locations. It is also likely to incur a long disconnection period duo to the limitations of battery energy and the mobility of hosts. This long-disconnection characteristic may cause mobile transactions that access data from servers to be long-lived.

The technology of maintaining connections between a moving host and other hosts or two moving hosts is a key technology in wireless communication. Wireless transmissions involve electromagnetic waves travelling through the air or free space where they may be sensed by a receiving antenna. Electromagnetic waves travelling are usually interfered with each other and with other nature powers such as lightning or the higher buildings on the earth. The movements and facing directions of mobile hosts have also affected the efficiency of signals received.

So the improvement of the ability to prevent mobile hosts from being interfered depends on adjusting the distribution of Mobile Support Stations. The next step necessary to do is to improve the ability of mobile hosts receiving weaker signals or under some new environments.

4.4. Channel Signal Fading (Multipath Fading)

In the real world, multipath occurs when there is more than one path available for radio signal propagation. The phenomenon of reflection, diffraction and scattering all give rise to additional radio propagation paths beyond the direct optical "line of sight" path between the radio transmitter and receiver. In a multiple systems, the average power decreases with the distance and the power fluctuations. The reason for this fluctuation is that the relative phases of the arriving paths are changing as the mobile host moves from one location to another. At certain areas all of the paths are essentially in phase alignment, producing relatively large received power; in other areas, the paths are nearly cancelling each other, producing a drastic reduction of the received power. These fluctuations constitute distance-dependent fading observed by the mobile user. Doppler effect will also cause signal fading.
The fading multipath channel through which the radio interface operates presents one of the major challenges to system designers. Different coding techniques and their performance on the fading channel are covered, as well as equalisation and diversity techniques.

Hence, an efficient algorithm should exist to solve channel assignment problems in the time, frequency and code domains. Some existing applications, such as HP 11757B, characterises the equalisers in modern digital microwave radios by introducing a precisely controlled notch in and around the radio?s transmission bandwidth. This allows precise measurements of the equalisers? ability to compensate for multipath fading. Testing susceptibility to multipath conditions is especially important since fading is recognised as one of the predominant causes of unacceptable bit error rate and link outages.

Multipath problems can be mitigated in a number of ways:

Many wireless systems demand "robust" and error free radio communication, since the overall system fails if the radio system fails.

4.5. Indoor Radio Propagation

One of the biggest challenges for wireless systems will be that it must be used indoors. Indoor radio propagation is almost a mysterious subject. But the general reason why it is more difficult than outdoors has also been well known. Multipath spread is greater in outdoor areas than indoor. This is because in outdoor areas there is usually much space for the signal to travel, thus the multipath delay spread is greater.

The Doppler spread is also greater on an outdoors-mobile radio channel than in indoor areas. Doppler spread is the result of relative movement between the transmitter and the receiver and/or movement in the reflecting elements that cause multipath effects. The Doppler spread is greater a mobile radio channel than an indoor radio channel because of the higher relative speeds between the transmitter and receiver. In the mobile environment, transmitters and receivers may be located in vehicles potentially moving at higher speeds. In the indoor environment, the moving people and other obstacles are the main cause of Doppler spread. So there are less Doppler spread in the indoor environment.

Radio propagation obstacles can be termed hard partitions if they are part of the physical / structural components of a building. On the other hand, obstacles formed by the office furniture and fixed or movable or portable structures that do not extend to a buildings ceiling are considered soft partitions. Radio signals effectively penetrate both kinds of obstacles or partitions in ways that are very hard to predict. An obstacle may result in an additional signal loss of 20 dB or more. We can not do anything about buildings, building materials or structures this system will be used in. However, we must still explore the realm of overall macroscopic signal propagation in a typical building. The signal levels and range of signal losses present in a building may be able to be predicted. So, to enable this prediction, a number of studies and measurements have been made which grossly characterise in building signal propagation.

4.6. Transmission of Multimedia Information

In many wireless network applications, secure transmission of multimedia information (e.g., voice, video, data, etc.) is critical. Wireless transmission imposes constraints not found in typical wired systems such as low power consumption, tolerance to high bit error rates, and scalability. The number of transmission errors depends on the data size, so more errors may be presented while transmitting a multimedia data, over a wireless network, which generally has accompanied with a larger size. In wireless local area networks, the error rates often much higher, and the transmissions from different computers can interfere with one another. Although these networks have a larger capacity, usually of 1-2 M bps, but they are much slower than wired local area networks.

A variety of low power techniques have been developed to reduce high bit error rates while the larger-size data, such as imagine files and multimedia data files, is transmitted over wireless networks. Of them, one key idea involves exploiting the variation in computation requirements to dynamically vary the power supply voltage. With the widespread use of portable computing devices, low power consumption has become a major design criterion. One way of minimising power consumption is to perform all tasks, other than managing hardware for the display and input, on a stationary workstation and exchange information between that workstation and the portable terminal via a wireless link. The improvement of these technologies will be helpful to correct some errors during transmission and retransmission.

Wireless transmission of multimedia information has been a very popular issue. We have no way to performance real-time multimedia features in mobile networks. In many technical aspect of this issue has not been solved. Perhaps it will take a longer time to reach a high level.

4.7. Unpredictable End Segments of Communication Channels

One problem with efficient use of wireless infrastructures is the unpredictability of at least the end segments of the communication channel, as result of mobility or unpredictable surroundings. Since optimal use of resources typically requires a good system model, unpredictability means that even if a good model is known for all possible situations to be encountered, the system may not know on which of these models to base its decisions.

The usual static design compromises are to prepare for the worst case or for the likely cases. But for some of the large variations in conditions of a wireless network, these approaches are not satisfactory. Thus, a major focus of research should base on adaptive control systems. For example, radio channels are eminently shared channels. Initially there is little work on time varying characterisations of capacity regions or optimal receivers as the main parameters, like number of users or received signal strength, change. Generally, a system attempting to adapt to this change must be able to detect, in some manner, that the change has taken place. Related work will need a strong mix of control, estimation and communications know-how.

The work on adaptive behaviour does not stop at the channel level. Since the location or position is a major variable, network layer adapting is also required. Such work is already represented in designs like Mobile-IP protocols and network-adaptive applications. Basic results like the rate of convergence for network algorithms over mobile nodes or the very meaning of mobility from a network point of view are rare. More adaptive algorithms for mobile wireless networks are heuristic in nature.

One kind of useful work to help adaptive design would be to simulate or emulate realistic mobile entities and characterise mobility of realistic nodes. Distributed simulation data exists with such information. In many situations the resulting dynamics of the nodes probably exhibits low relative mobility between a set of nodes and higher mobility between them and another set. Some of these traits may be used to simplify the adaptive design and achieve practical adaptive schemes for many useful scenarios.

4.8. Wireless Channel Security

In the past two decades, the public communication system infrastructure has undergone a major revolution. The security problem of these systems, including wireless and mobile networks systems, has become a public demand and need. Security policies and security techniques have been one of major research topics for a long time. Unfortunately, standards and designs for these systems currently have not addressed the security they will face in the future.

The top level of a wireless information networks is shown in Figure 1. The public network (Internet and Phone) and the private network such as the one modelled as a university are usually not secure, The private networks modelled as an industry, a wireless service provider, and a private local area network are usually secure. Figure 1 also illustrates security firewalls for the secure private networks. A scenario of corporate firewalls illustrates concepts of security management correctness, sufficiency, and completeness.

The present technology that implements the wireless channels is not secure except for some data encryption, authentication, and spread-spectrum implementations that provide limited protection to elementary attempts at jamming, spoofing, and interception.

General security solutions try to establish perimeters or layers of protection to filter what data passes in or out. Multiple layers and access points make robust network security systems a nature example of distributed operations in both implementation and management aspects. The level of threat to the resources and data within a system makes active management of security capabilities an important distributed operations mission. These solutions are particularly applicable for solving the computer security problem.

In general, a wireless channel security system (see ?Channel Security? in Figure 1) should be exist and used to process and filter signals after the transmitter sent these signals and before the receiver will receive them over a wireless network. Like firewalls in wired network, the channel security system will check the status of signals or transmitters and then take a suited action, such as correcting some errors, enhancing the signal power, and rejecting the entrance of unauthorised users. The most important point is to prevent unauthorised wireless users from illegally entering into this wireless network. To some extent, it is hard to make this channel security system.

Some wireless systems have given more implications of solving the wireless and mobile network security problem. In these systems, while security transmitters send signals to a network of wireless modem or receivers, this information is gathered and relayed to a security control panel (on a wireless channel security system). All the information received is then filtered and processed by the system in order to ensure the wireless security by checking the status of wireless modem or receivers. If a wireless receiver fails to respond to normal interrogations or if power is lost to a wireless receiver, an alarm is generated and personnel are dispatched to correct the problem.

5. Summary

Wireless and mobile networks offer a flexibility that physical cabling simply can not rival. This flexibility, coupled with fast transfer speeds and easy expandability, makes them ideal for a wide variety of uses. Personal communication and mobile computing will require a wireless network infrastructure which is fast deployable, possibly multi-hop, and capable of multimedia service support. The stated goal of wireless and mobile networking is ubiquitous communication. That is, digital connectivity of any types, at any time and anywhere. This goal reflects the high-perceived value of communications. In the coming few years, applications of wireless and mobile networking will exist more and more widely in medical environments, military scenarios, industrial setting and office automation. We are expecting such a day will be coming.

6. Reference

[1] A. William: Understanding Data Communications and Networks, PWS Publishing Company.

[2] A. Tanenbaum: Computer Networks (3rd Edition), Prentice Hall, 1996.

[3] S. Willian: Data and Computer Communication (4th Edition), Macmillian Publishing Company, 1994.

[4] G. Forman and J. Zahorjan: The Challenges of mobile computing, IEEE Computer.

[5] R. H. Katz: Adaptation and Mobility in Wireless information systems, IEEE Personal Communication.

[6] D. Barbara and T. Imielinksi: Sleepers and Workaholics: Caching Strategies for Mobile environments, Proceedings of the ACM SIGMOD Conference on Management of Data, pages 1-12, 1994.

[7] L. Yeo and A. Zaslavsky: Submission of Transactions from Mobile Workstations in a Co-operative Multidatabase Processing Environment, Distributed Computing Systems, Poznan, Poland, June 1994.