Mobile Computing with WirelessLAN and its Modes

Mobile computing with WirelessLAN And its modes Ad hoc network with challenges

Don't use plagiarized sources. Get Your Custom Essay on
Mobile Computing with WirelessLAN and its Modes
Just from $13/Page
Order Essay

Pallavi D. Dudhe, Prof. P. L. Ramteke

 
Abstract – In this paper, we summarized Mobile computing with WirelessLAN and its modes Ad hoc network and infrastructure. We define the operational model of our mobile computing environment, where we plan to demonstrate our proposed solutions. Mobile cloud computing is the combination of both cloud computing and mobile networks to bring benefits for mobile users, network operators, as well as cloud computing providers. In the present mobile communication environment, lot of research is going on, to improve the performance of issues like handoffs, routing etc. Security is another key issue that needs to be considered, when the setup of communication channel is to be set. Wireless local area network (WLAN) security are inherently weak and do not provide adequate security. Newer, more robust, wireless security technologies are being developed but have not had widespread acceptance within corporate information infrastructures. An ad hoc network is a collection of mobile nodes equipped with wireless communication adapters; these nodes dynamically form a temporary network without the need of any existing network infrastructure. Earlier studies on ad hoc networks aimed to propose solutions to some fundamental problems, such as routing, coping with the new challenges caused by network’s and nodes’ features without taking the security issues into account.
Keywords – Mobile computing, mobile computing security, mobile agent’s security, mobile ad hoc networks, wireless networks.
I. INTRODUCTION
Mobile computing requires wireless network to support outdoor mobility and handoff from one network to the next at a pedestrian or vehicular speed. Traveler in car using laptop connected with a GSM phone engaged in mobile computing. One of the more exciting information technologies to come about in the last several years was wireless computing. Computer users have to be tied to massive desktop computers to accomplish their daily tasks. Ubiquitous computing or pervasive computing refers to access to computer network at any location by any person all the time. With the rapid growth in the wireless mobile communication technology, small devices like PDAs, laptops are able to communicate with the fixed wired network. Because of its flexibility and provision of providing ubiquitous infrastructure, there is need to provide security at any level. As wireless communication takes place mainly through the radio signals rather than wires, it is easier to intercept or eavesdrop on the communication channels. Therefore, it is important to provide security from all these threats. There are different kinds of issues within security like confidentiality, integrity, availability, legitimacy, and accountability that needs to be individually taken care off. Mobile Cloud Computing at its simplest refers to an infrastructure where both the data storage and the data processing happen outside of the mobile device. Mobile cloud applications move the computing power and data storage away from mobile phones and into the cloud, bringing applications and mobile computing to not just Smartphone users but a much broader range of mobile subscribers. Nowadays, microprocessors and wireless adapters are embedded in many devices, as cell-phones, PDAs, Laptops, digital sensors, and GPS receivers. These well-equipped devices allow the creation of wireless mobile networks, which make the vision of nomadic computing with its ubiquitous access more and more attractive.
II. VARIOUS FORMS OF COMPUTING
Mobile, ubiquitous, nomadic, untethered, pervasive and anytime, anywhere, any person computing are used by researchers to refer to computing that uses small portable devices and wireless communication network.
Nomadic computing refers to limited migration. Migration is within a building at a pedestrian speed. In the same vein, users carrying laptop with DIAL-UP modems are engaged in nomadic computing. Ubiquitous computing or pervasive computing refers to access to computer network all the time at any location by any person.Ubiquitous computing can not be realized unless mobile computing matures.

Figure 1. Relationship between computing
One of the more exciting information technologies to come about in the last several years was wireless computing. WirelessLANs operate in one of two modes, ad-hoc or infrastructure. Ad-hoc defines a method of wireless computer peers to exchange data without a predefined network infrastructure and has not met with great success. The infrastructure mode of operation is predominantly used for construction of wireless networks and requires two components; wireless access point(s) connected to a traditional wired network and wireless network interface card(s) installed into the computing devices.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

III. GENERAL ARCHITECTURE OF WIRELESS NETWORKS
Wireless LAN is a traditional LAN architecture extended with a wireless interface to service small low-powered portable terminals capable of wireless access. The wireless LAN is further connected to a more extensive fixed network such as LAN or WAN. Wireless LANs have limited range and are designed to be used only in local environments. There are two types of wireless LAN architectures: ad-hoc networks and infrastructure networks. The Wide-Area Wireless Networks are special mobile radio networks that provide wide coverage for low bandwidth data services. In paging networks the service is usually receive-only and has very low bandwidth. The initial applications for satellite systems are voice and paging. Additional services planned include messaging and fax transmission.
Wireless networks communicate by modulating radio waves or pulsing infrared light. Wireless communication is linked to the wired network infrastructure by stationary transceivers. The area covered by an individual transceiver’s signal is known as a cell. Cell sizes vary widely:

Figure 2. Architecture of wireless networks
A. Operational problems associated with wireless network

Disconnection:-Wireless communications suffer from frequent disconnections due to a higher degree of noise and interference as well as the process of inter-cell hand-offs. Disconnections can be hidden by asynchronous operation.
Heterogeneous network:-To achieve wireless communication a mobile host must get connected to different and heterogeneous networks. The general problem of heterogeneity can be addressed by exploiting emerging distributed systems.
Bandwidth and Interface Variability:-Bandwidth can shift one to four orders of magnitude, depending on whether the system is plugged in or using wireless access or switching interfaces, e.g. from infrared to radio when the user moves from indoors to outdoors. Mobile applications have to adapt their behaviour properly.
Security Risks:- Precisely because connection to a wireless link is so easy, the security of wireless communication can be compromised much more easily than that of wired communication.

B. Challenges regarding wireless network
Main cause of loss of packets in wired network is congestion because error rates are very low. In wireless network, congestion still remains a problem, but this situation is somewhat reversed. Wired and wireless network require different techniques to achieve reliability and flow control. TCP works is unsuitable for wireless network as it interprets errors as packet loss. ITCP (split/indirect TCP) splits TCP into two parts , One between sender and local MSS of the recipient. The other between local MSS and recipient. If MH switches cell during life time of a ITCP
Connection center point of connection moves to new MSS. sender remains completely unaware about it.
IV. AD HOC NETWORK
An ad hoc network is a collection of mobile nodes equipped with wireless communication adapters,
these nodes dynamically form a temporary network without the need of any existing network infrastructure. A mobile ad hoc network, or MANET, is a temporary infrastructure less network, formed by a set of mobile hosts that dynamically establish their own network, without relying on any central administration. Mobile hosts used in MANET have to ensure the roles that were ensured by the powerful fixed infrastructure in traditional networks. This is a challenging task, since these devices have limited resources such as CPU, storage, energy, etc.Moreover, the network’s environment has some features that add extra complications, such as the frequent topology changes caused by nodes’ mobility, and the unreliability and the bandwidth limitation of wireless channels.
A. Security requirements of ad hoc network
The security services of ad hoc networks are not different than those of other types of network communication. The goal is to protect the information and the resources from attacks and misbehavior. In working with network security, there are many requirements that an effective security must ensure:

Availability: ensures that the desired network services are available whenever they are expected, inspite of attacks. Systems that ensure availability seek to combat denial of service and energy starvation attacks that we will present later.

Authenticity: ensures communication from one node to another is genuine. It ensures that a malicious node cannot masquerade as a trusted network node.

Data confidentiality: is a core security primitive for ad hoc networks, It ensures that a given message cannot be understood by anyone else than its (their) desired recipient(s). Data confidentiality is typically enabled by applying cryptography

Integrity: denotes the authenticity of data sent from one node to another. That is, it ensures that a message sent from node A to node B was not modified by a malicious node, C, during transmission.

Non-repudiation ensures that the origin of the message is legitimate. i.e. when one node receives a false message from another, nonrepudiation allows the former to accuse the later of sending the false message and enables all other nodes to know about it. Digital signature may be used to ensure nonrepudiation

B. Challenges regarding Ad hoc network
Ad hoc network routing is the ultimate challenge. Ad hoc networks arise in rapid deployment scenarios:

Emergency disaster management.
Military operation in remote sites.
Business meeting venues without infrastructure support.

Many routing algorithms are designed: AODV, DSR, DSDV, TORA, FSR, LAR, ABR, etc.There are interesting application of conventional graph theoretic problems in ad hoc network routing.
V. CHALLENGES REGARDING MOBILE COMPUTING
Mobile computing affects entire spectrum of issues in computing. First of all it is distributed and mobile computing. Distributed computing as we know works on static wired network. Node may initiate computation somewhere and migrate to another place. So two major problem that arise due to mobility are Searching for current location of a mobile node and to impose a communication structure among nodes. Physical location of mobile is not the network address, so how do we route the message to a mobile host. This question is being addressed by two different communities: Internet community and cellular community . Work of Internet community involves Mobile IP which work as assumes connection-less, packet switching scenario. Cellular community’s effort based on location management of cellular phone users. It deals with connection oriented communication, since it is motivated by issues in call-setup in telephony. Main problem in mobility management is to find an appropriate trade-off between searching and informing. Searching is performed when address of the message recipient is not known or at least not known precisely. Informing is a responsibility of the mobile unit when it migrates. Extreme situations can be

Mobile unit never informs works for units receiving few messages and for units which don’t move during receiving.
Always informs works well for units receiving messages frequently.

VI. CONCLUSION
In this paper we have studied the different challenges regarding wirelessLAN, its modes Ad hoc network and infrastructure as well as requirement regarding security. As with every Information technology project, security must be a primary consideration. For security to effective, it must be deployed proportional to risk. WLANs present a security risk to organizations but providing security for WLANs is not an insurmountable challenge. There are security solutions available for WLANs to mitigate those most conceivable risks we think securing ad hoc networks is a great challenge that includes many opened problems of research, and receives more and more attention among ad hoc networks community.
REFERENCES
[1] Abolfazli, Saeid; Sanaei, Zohreh; Ahmed, Ejaz; Gani, Abdullah; Buyya, Rajkumar (1 July 2013). “Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges”.IEEE Communications Surveys & Tutorials 99 (pp):
[2] R.K.Ghosh ,CSE100, April 2005.
[3] Arbaugh, W. A., Shankar, N., & Wan, J. Y. (2001). Your 802.11 Wireless Network has No Clothes. Unpublished manuscript, University of Maryland at College Park. Retrieved October 21, 2004, from http://www.cs.umd.edu/~waa/wireless.pdf
[4] William Stallings. Cryptography and Network Security principles and practices. Pearson Education Inc, third edition edition, 2003.
[5] Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In 7th International Security Protocols Workshop, Cambridge, UK, April 1999.
[6] Duchamp, D. (1992) Issues in Wireless Mobile Computing. Proceedings Third Workshop on Workstation Operating Systems, April 1992, 2-10.
[7] Sumi Helal,Ph.D Associate professor, computer & information science & Engineering Department , University of Florida, Gainesville.FL32611,helal@cise.ufl.edu.
[8] Berghel, H. (2004). Wireless Infidelity I: War Driving.Communications of the ACM, 47(9), 21-28.
[9] Forman, G.H. and Zahorian, J. (1994) The Challenges of Mobile Computing. IEEE Computer, April 1994, 38- 47.
[10] Charles.E. Perkins and Elizabeth.M. Royer. Ad hoc on demand distance vector (AODV) algorithm. In the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’99), pages 90-100, 1999.
 

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy