-- Problems and Solutions
Chaojie Qiu (SID: 9942930)
Abstract
In the area of modern industries, wireless and mobile networking systems
are playing more and more important roles with the development of the digital
communication technologies. In this paper, we discussed wireless and mobile
networking and its performance in the modern industries. Our main topics
focused on some problems existing in wireless and mobile networking and
then trying to give the solutions to solve these problems. Currently wireless
and mobile systems have better performance in many fields, but some critical
problems are unavoidable to exist and solving these problems will be helpful
to improve its performance.
1. Introduction
Wireless and mobile networking will revolutionise the way we communicate
by telephone (not mobile) and by computers, at work and at home. Leading
edge companies are already using this new technology to gain a competitive
advantage. At this time, applications for wireless and mobile networking
are almost appearing in all market segments that rely on communications
and the benefit from mobility. Mobile computers, such as notebook or PDAs
(personal digital assistants), are rapidly growing to become a major segment
of the computer industry. Wireless and mobile networking systems have been
proved to be one of the best products in many areas from medical environments,
military scenarios, industrial setting and office automation to banking,
and airports, even for people walking around a store with a PDA doing inventory.
Wireless and mobile networking has been playing a more and more important
role in the area of the present and future digital wireless telecommunication.
Advances in wireless and mobile networking have engendered a new computing
paradigm (called mobile computing) in which users carrying portable devices
have access to a shared infrastructure independent of their physics location.
A mobile computing environment consists of two distinct sets of entities:
mobile hosts and fixed hosts. Some of fixed hosts (called Mobile Support
Stations) are augmented with a wireless interface to communicate with mobile
hosts. A mobile host can move from one cell (or radio coverage area of
a fixed host) to another while retaining its network connections. Usually,
mobile hosts are required to be able to communicate with each other and
with stationary or wired or fixed hosts so that the most efficient use
of the best network connectivity is transparently and adaptively made and
available to the mobile host at any time. In future mobile computing environments,
a large number of users carrying some wireless products, such as low-power
palmtop machines and mobile phones, will be necessary to have more conveniently
access to information over wireless channels anywhere in the world and
at any time without more errors. Mobile users can connect to information
servers or other users through either wireless or wired connections. In
general, the connections can involve the exchange of voice, data, text,
facsimile, or video information.
The mobile computing paradigm introduces a number of new technical issues
in the area of database systems. Techniques for traditional distributed
database management, for example, have been based on the assumption that
the location of and connections among hosts in the distributed system do
not change. However, in the mobile computing environment, these assumptions
are not longer valid. Mobility of hosts engenders a new kind of locality
that migrates as hosts move. A user carrying a portable computer can submit
the operations of a transaction to distributed data servers from different
locations. As a result of this mobility, the operations of the transactions
may be executed at different servers. The distribution of operations implies
that the transmission of message may be required among these data servers
in order to co-ordinate the execution of these operations.
A mobile machine, in order to take advantage of the highest speed or
most capable network available, will need to be able to work with any of
two, three, or even more wireless networks. Further, a mobile user would
in general like to be connected the wireless network able to meet the applications?
needs at lowest usage cost. When moving beyond the range of one wireless
network, a user would generally like to be automatically connected to another.
In nature, information data is required to be reliably and safely transmitted
over wireless and mobile networks. Due to the limitations of the present
wireless networking technologies, some errors may be unavoidable, and even
their corrections may be unreachable.
2. History and Development
All modes of communication using conductive metal or optical fibre have
one thing in common: communication devices must be connected physically.
Physical connection is sufficient for many applications such as connecting
PCs in an office connecting them to a mainframe within the same building.
It is acceptable for short distances, but expensive and difficult to maintain
for long distances. So, the network participants need a way to communicate
without using a physical connection; that is called wireless communication.
At present, no area of telecommunications is growing and changing faster
than wireless and mobile networking. The wireless communication technologies
are quickly getting to be improved to a new higher level with the development
of more wireless products. However, these technologies are not new ideas.
As early as 1901, the Italian physicist Guglielmo Marconi demonstrated
a ship-to-shore wireless telegraph using Morse Code (dots and dashes are
binary, after all).
From then on, wireless and mobile networks have been experiencing the
development of three generations in a century.
The first generation comprises today?s simple cordless telephones and
analogy cellular telephones. Our present cordless telephones are stand-alone
consumer products and do not require any interoperability specifications.
Second-generation cordless telephones will be designed as components
of a large network. These will include Cordless Telecommunications, the
second-generation networks and the Digital European Cordless Telecommunications
standard, and North American and Pan-European Digital Cellular systems.
The third generation wireless information networks are being formed.
The central concept is to create a single network infrastructure that will
allow users to exchange economically any kind of information between any
desired locations. The new network will merge the separate first and second-generation
cordless and cellular services, and also encompass other means of wireless
access such as paging, dispatch, public safety and wireless local area
networks.
The advanced technology of wireless communication almost has been applied
to all kinds of areas in real life. In some companies, a wireless high-speed
data communication network is being built to be accessible from airports,
hotels, and convention centres. Subscribers will have radio-frequency cards
that will wirelessly connect their notebook computers at high speeds to
network-access points, which will connect over wires to the Internet and
corporate networks. After collecting signals from the cards, the access
points will feed the data through a router to the roof. From there, signals
will be sent to a centralised city access point.
Compared to its history and some other industries, modern digital wireless
systems have much better performance.
3. Wireless Transmission and Mobile Transactions
Some people even believe that only two kinds of communication, fibre
and wireless, exist in the future. All fixed computers, telephones, fax
machines and so on will be use fibre communication, and all mobile ones
will be by wireless. In our time, many people and companies need to be
on-line all the time. For the mobile users, fibre optics could be of no
use because they may need to get their hits of data for their laptop, notebook,
shirt pocket, palmtop, or wristwatch computers without being tethered to
the terrestrial communication infrastructure. So, these users can benefit
from wireless communication. It also has many other important applications
besides providing connectivity to users who want to read their email in
aeroplanes.
Several different types of wireless transmission are available today,
including:
The microwaves travel in straight lines and can therefore be narrowly
focused. Concentrating all the energy into a small beam using a parabolic
antenna gives a much higher signal to noise ratio, but transmitting and
receiving antenna must be accurately aligned with each other.
It is also necessary to re-examine various transaction processing issues
in mobile computing systems to account for characteristic of wireless client/server
computing. As a mobile host interactively submits the operations of a transaction
to its co-ordinator, the latter subsequently forwards these operations
to the distributed database servers. The characteristics of a mobile transaction
can be described as follows:
4. Problems and Solutions
There are several common problems associated with wireless and mobile
networking. These problems include the insecurity of any physical boundaries
to delimit authorised members of a network, location-dependent link reliability,
battery and power usage, signal transmission and acceptation among multiple
nodes (hosts), and background noise and unauthorised or unwanted interference
from other devices working in the same frequency band. Some of them have
been solved or are being processed, but for other problems we do not have
better solutions yet.
4.1. Wireless Links among Hosts
Nowadays millions of people have portable machines, including portable
computers, and they generally want to read their electronic mails and access
their normal file systems wherever in the world they may be. These mobile
hosts introduce a new complication: to route a packet to a mobile host,
the network first has to find it. The reliability of these operations depends
on the wireless link between portable machines and signal transmitters
(network administrators).
For mobile hosts, the primary connection to the rest of the network
is a wireless link. But, unlink wired links, wireless links are relatively
unreliable and have low bandwidth constraints. This case is particularly
obvious for the connections between two mobile hosts. In many occasions
(such as under the ground or on the moving vehicles), a lower bandwidth
may result in a greater difficulty to maintain connections between mobile
hosts and other hosts. Moreover, for a transmitter, there is a limited
covered spread area. Its transmission power decreases with the growth of
the distance.
A key point to solve these problems is to guarantee that mobile hosts
have a more power ability to receive lower signals. In a wireless network,
for example, it is very important to consider the antennas, which are used
to ensure good quality transmission and reception of signals. It is also
more reliable and secure to consider using a wide band of frequencies because
the data, especially the larger-size data, can be transmitted over this
band of frequencies.
However, it is not easy to become completely true in the short-term
time. In fact, the solution to solve it involves in the improvement of
all kinds of technologies in wireless communication.
4.2. Battery and Power Usage
Mobile hosts equipped with batteries suffer from limited battery life
constraints. In general, a battery may maintain the connection of a mobile
host in less than 100 hours. It is particularly serious for those who travel
outdoors in a longer time. The recharging cycle of a battery will decrease
with its age growth.
Efficiently decreasing the waste of battery power and maintaining a
longer-time connection for mobile hosts is a key to solve this problem.
It is required for manufacturers to improve the technology of battery manufacturing
and the quality of materials used. It is also concerned about the quality
of mobile machines and the tasks executed in it.
In order to avoid the emergent case of the insufficiency of battery
power, most of users carrying wireless and mobile communication tools usually
equip one or more extra full-recharged batteries while travelling outdoors
in a longer time. It seems not to be a good way, but it is sufficient and
efficient to guarantee enough power to maintain the connections between
mobile receivers and signal transmitters.
We may expect that, in the near future, a new kind of rechargeable battery
with a lighter weight will be used in mobile machines. It looks like a
kind of ordinary battery, but it can keep a longer time of connection.
Obviously, that will provide more convenience for those who travel outdoors.
4.3. Connections on the Move (Location-Dependent Link
Reliability)
The mobility of the hosts implies that the hosts will connect from different
access points and hence users may also want to stay and keep connection
while on the move. In traditional distributed database systems, many techniques
have been based on the assumption that the location of hosts and the connections
among hosts can not be changed. However, in the wireless and mobile networking
environment, these assumptions are no longer valid. As mobile hosts move,
the change and migration of the location must be informed to the other
related hosts or fixed service hosts. As a consequence of this procedure,
existing solutions for traditional distributed database management may
not be readily applicable to the mobile computing environment. In particular,
migrating localities may introduce extra communication costs and extra
work in fixed networks.
In a mobile environment, a mobile host can query or update a database,
which is distributed in multiple data servers over a fixed network, from
different locations. It is also likely to incur a long disconnection period
duo to the limitations of battery energy and the mobility of hosts. This
long-disconnection characteristic may cause mobile transactions that access
data from servers to be long-lived.
The technology of maintaining connections between a moving host and
other hosts or two moving hosts is a key technology in wireless communication.
Wireless transmissions involve electromagnetic waves travelling through
the air or free space where they may be sensed by a receiving antenna.
Electromagnetic waves travelling are usually interfered with each other
and with other nature powers such as lightning or the higher buildings
on the earth. The movements and facing directions of mobile hosts have
also affected the efficiency of signals received.
So the improvement of the ability to prevent mobile hosts from being
interfered depends on adjusting the distribution of Mobile Support Stations.
The next step necessary to do is to improve the ability of mobile hosts
receiving weaker signals or under some new environments.
4.4. Channel Signal Fading (Multipath Fading)
In the real world, multipath occurs when there is more than one path
available for radio signal propagation. The phenomenon of reflection, diffraction
and scattering all give rise to additional radio propagation paths beyond
the direct optical "line of sight" path between the radio transmitter and
receiver. In a multiple systems, the average power decreases with the distance
and the power fluctuations. The reason for this fluctuation is that the
relative phases of the arriving paths are changing as the mobile host moves
from one location to another. At certain areas all of the paths are essentially
in phase alignment, producing relatively large received power; in other
areas, the paths are nearly cancelling each other, producing a drastic
reduction of the received power. These fluctuations constitute distance-dependent
fading observed by the mobile user. Doppler effect will also cause signal
fading.
Hence, an efficient algorithm should exist to solve channel assignment
problems in the time, frequency and code domains. Some existing applications,
such as HP 11757B, characterises the equalisers in modern digital microwave
radios by introducing a precisely controlled notch in and around the radio?s
transmission bandwidth. This allows precise measurements of the equalisers?
ability to compensate for multipath fading. Testing susceptibility to multipath
conditions is especially important since fading is recognised as one of
the predominant causes of unacceptable bit error rate and link outages.
Multipath problems can be mitigated in a number of ways:
4.5. Indoor Radio Propagation
One of the biggest challenges for wireless systems will be that it must
be used indoors. Indoor radio propagation is almost a mysterious subject.
But the general reason why it is more difficult than outdoors has also
been well known. Multipath spread is greater in outdoor areas than indoor.
This is because in outdoor areas there is usually much space for the signal
to travel, thus the multipath delay spread is greater.
The Doppler spread is also greater on an outdoors-mobile radio channel
than in indoor areas. Doppler spread is the result of relative movement
between the transmitter and the receiver and/or movement in the reflecting
elements that cause multipath effects. The Doppler spread is greater a
mobile radio channel than an indoor radio channel because of the higher
relative speeds between the transmitter and receiver. In the mobile environment,
transmitters and receivers may be located in vehicles potentially moving
at higher speeds. In the indoor environment, the moving people and other
obstacles are the main cause of Doppler spread. So there are less Doppler
spread in the indoor environment.
Radio propagation obstacles can be termed hard partitions if they are
part of the physical / structural components of a building. On the other
hand, obstacles formed by the office furniture and fixed or movable or
portable structures that do not extend to a buildings ceiling are considered
soft partitions. Radio signals effectively penetrate both kinds of obstacles
or partitions in ways that are very hard to predict. An obstacle may result
in an additional signal loss of 20 dB or more. We can not do anything about
buildings, building materials or structures this system will be used in.
However, we must still explore the realm of overall macroscopic signal
propagation in a typical building. The signal levels and range of signal
losses present in a building may be able to be predicted. So, to enable
this prediction, a number of studies and measurements have been made which
grossly characterise in building signal propagation.
4.6. Transmission of Multimedia Information
In many wireless network applications, secure transmission of multimedia
information (e.g., voice, video, data, etc.) is critical. Wireless transmission
imposes constraints not found in typical wired systems such as low power
consumption, tolerance to high bit error rates, and scalability. The number
of transmission errors depends on the data size, so more errors may be
presented while transmitting a multimedia data, over a wireless network,
which generally has accompanied with a larger size. In wireless local area
networks, the error rates often much higher, and the transmissions from
different computers can interfere with one another. Although these networks
have a larger capacity, usually of 1-2 M bps, but they are much slower
than wired local area networks.
A variety of low power techniques have been developed to reduce high
bit error rates while the larger-size data, such as imagine files and multimedia
data files, is transmitted over wireless networks. Of them, one key idea
involves exploiting the variation in computation requirements to dynamically
vary the power supply voltage. With the widespread use of portable computing
devices, low power consumption has become a major design criterion. One
way of minimising power consumption is to perform all tasks, other than
managing hardware for the display and input, on a stationary workstation
and exchange information between that workstation and the portable terminal
via a wireless link. The improvement of these technologies will be helpful
to correct some errors during transmission and retransmission.
Wireless transmission of multimedia information has been a very popular
issue. We have no way to performance real-time multimedia features in mobile
networks. In many technical aspect of this issue has not been solved. Perhaps
it will take a longer time to reach a high level.
4.7. Unpredictable End Segments of Communication Channels
One problem with efficient use of wireless infrastructures is the unpredictability
of at least the end segments of the communication channel, as result of
mobility or unpredictable surroundings. Since optimal use of resources
typically requires a good system model, unpredictability means that even
if a good model is known for all possible situations to be encountered,
the system may not know on which of these models to base its decisions.
The usual static design compromises are to prepare for the worst case
or for the likely cases. But for some of the large variations in conditions
of a wireless network, these approaches are not satisfactory. Thus, a major
focus of research should base on adaptive control systems. For example,
radio channels are eminently shared channels. Initially there is little
work on time varying characterisations of capacity regions or optimal receivers
as the main parameters, like number of users or received signal strength,
change. Generally, a system attempting to adapt to this change must be
able to detect, in some manner, that the change has taken place. Related
work will need a strong mix of control, estimation and communications know-how.
The work on adaptive behaviour does not stop at the channel level. Since
the location or position is a major variable, network layer adapting is
also required. Such work is already represented in designs like Mobile-IP
protocols and network-adaptive applications. Basic results like the rate
of convergence for network algorithms over mobile nodes or the very meaning
of mobility from a network point of view are rare. More adaptive algorithms
for mobile wireless networks are heuristic in nature.
One kind of useful work to help adaptive design would be to simulate
or emulate realistic mobile entities and characterise mobility of realistic
nodes. Distributed simulation data exists with such information. In many
situations the resulting dynamics of the nodes probably exhibits low relative
mobility between a set of nodes and higher mobility between them and another
set. Some of these traits may be used to simplify the adaptive design and
achieve practical adaptive schemes for many useful scenarios.
4.8. Wireless Channel Security
In the past two decades, the public communication system infrastructure
has undergone a major revolution. The security problem of these systems,
including wireless and mobile networks systems, has become a public demand
and need. Security policies and security techniques have been one of major
research topics for a long time. Unfortunately, standards and designs for
these systems currently have not addressed the security they will face
in the future.
The top level of a wireless information networks is shown in Figure
1. The public network (Internet and Phone) and the private network such
as the one modelled as a university are usually not secure, The private
networks modelled as an industry, a wireless service provider, and a private
local area network are usually secure. Figure 1 also illustrates security
firewalls for the secure private networks. A scenario of corporate firewalls
illustrates concepts of security management correctness, sufficiency, and
completeness.
The present technology that implements the wireless channels is not
secure except for some data encryption, authentication, and spread-spectrum
implementations that provide limited protection to elementary attempts
at jamming, spoofing, and interception.
General security solutions try to establish perimeters or layers of
protection to filter what data passes in or out. Multiple layers and access
points make robust network security systems a nature example of distributed
operations in both implementation and management aspects. The level of
threat to the resources and data within a system makes active management
of security capabilities an important distributed operations mission. These
solutions are particularly applicable for solving the computer security
problem.
In general, a wireless channel security system (see ?Channel Security?
in Figure 1) should be exist and used to process and filter signals after
the transmitter sent these signals and before the receiver will receive
them over a wireless network. Like firewalls in wired network, the channel
security system will check the status of signals or transmitters and then
take a suited action, such as correcting some errors, enhancing the signal
power, and rejecting the entrance of unauthorised users. The most important
point is to prevent unauthorised wireless users from illegally entering
into this wireless network. To some extent, it is hard to make this channel
security system.
Some wireless systems have given more implications of solving the wireless
and mobile network security problem. In these systems, while security transmitters
send signals to a network of wireless modem or receivers, this information
is gathered and relayed to a security control panel (on a wireless channel
security system). All the information received is then filtered and processed
by the system in order to ensure the wireless security by checking the
status of wireless modem or receivers. If a wireless receiver fails to
respond to normal interrogations or if power is lost to a wireless receiver,
an alarm is generated and personnel are dispatched to correct the problem.
Radio waves are easy to generate, can travel long distances, and penetrate
buildings easily, so they are widely used for communication, both indoors
and outdoors. Radio waves are also omnidirectional. This means that they
travel in all directions from the source, so that the transmitter and receiver
do not have to be carefully aligned physically. But sometimes omnidirectional
radio is good and sometimes it is bad.
Mobile transactions are long running, error-prone, and heterogeneous. As
a consequence, modelling mobile transaction may be very restrictive.
The fading multipath channel through which the radio interface operates
presents one of the major challenges to system designers. Different coding
techniques and their performance on the fading channel are covered, as
well as equalisation and diversity techniques.
Many wireless systems demand "robust" and error free radio communication,
since the overall system fails if the radio system fails.