the 1390 standard

66
The 1390 Standard Another 10-billion unit market: 1.Universal house meters/resources become intelligent if linked to a centralized DB accessible from Internet 2.Success story of ET Technologies! Who comes first to China? 3.Off-hook versus on-hook Major issue—low VLSI area solution for high production volume

Upload: kylie-morrison

Post on 01-Jan-2016

35 views

Category:

Documents


3 download

DESCRIPTION

The 1390 Standard. 5. Conditions and Assumptions. 6. Mathematical Modeling. 7. Simulation Analysis. LEGEND: M – detection method Sb – number of input signal bits Lb – number of local signal bits fs – sampling frequency Id – ideal conditions A – amplitude distortion - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The 1390 Standard

The 1390 StandardAnother 10-billion unit market:

1.Universal house meters/resources becomeintelligentif linked to a centralized DB accessible from Internet

2.Success story of ET Technologies!Who comes first to China?

3.Off-hook versus on-hookMajor issue—low VLSI area solutionfor high production volume

Page 2: The 1390 Standard

SUBOPTIMAL DETECTIONFOR SIGNAL TYPES

DEFINED BY THE IEEE 1390 STANDARD

Miljan Vuletić, Goran Davidović, Veljko Milutinović

Department of Computer EngineeringSchool of Electrical Engineering

University of BelgradePOB 35-54, 11120 Belgrade, Serbia, Yugoslavia

E-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]

Page 3: The 1390 Standard

1. Introduction

TelephoneNetwork

Fax

Telephone

Security TIU

Utility Controller

UtilityDatabase

Utility Server

Utility Provider End User

Meter

Appliance

- UTSA (Utility Telemetry Service Architecture):

- Optimal detection methods- Suboptimal detection methods (DMF, SAS, WPD, BMF)- TIU: Telemetry Interface Unit

Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]

Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]

Page 4: The 1390 Standard

2. Problem Definition- SAT (Single Alert Tone) and DAT (Dual Alert Tone) detection- SAT:{f1, f2, f3, f4, f5, f6, f7, f8, f9}- DAT:{fg & fx, where fx is one of f1, f2, f3, f4, f5, f6, f7, or f8}- Frequency values:

f1=375.2Hz, f2=404.3Hz, f3=468.0Hz, f4=495.8Hz, f5=520.6Hz,f6=548.0Hz, f7=562.8Hz, f8=578.4Hz, f9=1633.0Hz, fg =1827.0Hz

3. Existing Solutions- Newely adopted standard IEEE 1390- Application of optimal detection methods (DSP)- R2 signal detector developed by TELLCO (TUA 0096AA)

4. Suggested Solution- Using suboptimal methods for signal detection- Goal: To lessen the total VLSI area of signal detector

Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]

Page 5: The 1390 Standard

5. Conditions and AssumptionsCONDITIONS

- SAT and DAT are of duration 600ms or less- False detection of SAT and DAT signals

should be avoided (harmonics, voice, DTMF*)- Allowed frequency shift is 1%- Transistor count estimate

should comply to CMOS implementation constraints

ASSUMPTIONS

- Max amplitude distortion in the case of SAT is -3dB- Max relative amplitude ratio in the case of DAT is -6dB- Min SNR (Signal to Noise Ratio) is 10dB- Separate detector exists for low and high frequencies- The used VLSI logic is fast enough

to perform critical operations in real time

Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]

* DTMF - Dual Tone Multi-Frequency

Page 6: The 1390 Standard

6. Mathematical Modeling- S i g n a l d e t e c t i o n b a s e d o n D F T- T h r e e s a m p l e s i n t h e f r e q u e n c y d o m a i n a r e t e s t e d ,

b e f o r e a d e c i s i o n f o r a p a r t i c u l a r f r e q u e n c y i s m a d e- S e p a r a t e d e t e c t o r s f o r l o w a n d h i g h f r e q u e n c i e s :

T h e d e t e c t i o n p r o b l e m h a s b e e n p a r t i t i o n e d- T h e c h o i c e o f D F T r e s o l u t i o n :

f f 2

30 0 1. m a x , f

f fi i 1

4 ,

f - d i s t a n c e b e t w e e n t w o n e i g h b o r i n g D F T s a m p l e s ;f i + 1 a n d f i – r e a l n e i g h b o r i n g f r e q u e n c i e s ;

f m a x - m a x i m a l f r e q u e n c y f r o m t h e g i v e n f r e q u e n c y s e t ;

M i l j a n V u l e t ić , G o r a n D a v i d o v i ć , V e l j k o M i l u t i n o v i ćE - m a i l : { m i l j a n @ g a l e b , d a v i d o v i c @ b u e f 3 1 } . e t f . b g . a c . y u , v m @ e t f . b g . a c . y u

Page 7: The 1390 Standard

7. Simulation Analysis- Simulator of the signal detector written in C- Different levels of quantization noise (DMF, SAS, WPD, BMF)- Different environmental conditions:

ideal conditions, presence of Gaussian noise,presence of pulse noise, presence of burst pulse noise

- Different types of signal distortion:amplitude, frequency,interference in the form of neighboring frequency from the set

- Percentage of successful detectionfor every of suboptimal detection methods has been found

- Selection of the most convenient suboptimal detection method (WPD,BMF)

Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]

Page 8: The 1390 Standard

- Simulation results: Percentage of successfulIEEE 1390 signal detection (low frequencies);pulse noise case

M Sb Lb fs Id A F I AFI

8 8 8000 100 100 97.626 100 90.801

10000 100 100 98.516 100 92.582

4 4 8000 100 100 98.516 100 91.988

10000 100 100 98.516 100 90.208

3 3 8000 100 100 100 100 88.427

DMF 10000 100 100 99.703 100 92.582

3 2 8000 100 100 93.175 100 81.899

10000 100 100 96.142 100 79.228

2 3 8000 100 100 96.439 100 82.493

10000 100 100 96.406 100 86.647

2 2 8000 100 100 87.834 100 77.448

10000 100 100 98.516 100 82.789

4 1 8000 100 100 95.846 100 81.602

10000 100 100 98.220 100 92.878

SAS 3 1 8000 100 100 100 100 89.911

10000 100 100 100 100 84.866

2 1 8000 100 100 92.285 100 80.119

10000 100 100 99.406 100 78.635

1 4 8000 100 100 100 100 100

10000 100 100 100 100 100

WPD 1 3 8000 100 100 97.033 100 99.110

10000 100 100 97.703 100 99.703

1 2 8000 100 100 95.252 100 96.736

10000 100 100 99.406 100 98.813

BMF 1 1 8000 100 100 99.406 100 99.109

10000 100 100 100 100 99.109

LEGEND:

M – detection methodSb – number of input signal bitsLb – number of local signal bitsfs – sampling frequencyId – ideal conditionsA – amplitude distortionF – frequency shiftI - interferenceAFI – presence of all AFI distortions

Page 9: The 1390 Standard

8. Implementation Analysis- G a t e - l e v e l h i e r a r c h y s c h e m e o f t h e I E E E 1 3 9 0

s ig n a l d e t e c t o r- V L S I c o m p le x i t y e s t im a t e ( m a x t r a n s i s t o r c o u n t )

ACMP

CMP

D

Q

Q

D

Q

Q

8

2

ERR

f9, f g

f1-f 8

DetCore

fs

A

B

ClkGen

clk

DET

LF

HF

Detection Method BMF WPDSAT/DAT gate-level complexity:

ROM (max. number of bits) 133500 534000

Logic (max. number of gates) 8000 9500

SAT/DAT total transistor count: 165500 572000

Page 10: The 1390 Standard

Components of the detector core (DetCore):CM (Control Module);ARM (Adder, Registers, and Memory);OM (Output Module);

n

CMclk

fs

SELL6

4

SELH

ADDRL ADDRH

x y

end1

end2

OM 8

2

ERR

f9 , f g

f1-f 8

DET

RF1OUT

RF2OUT

m

n

End

ARM

End1

ShClk

ShClk

SELL SELH

A

B

A

BEnd2

ADDRL ADDRH

RF1OUT

RF2OUT

m

D

Q

Q

"1"

D

Q

Q

End2

End1

End2End1

Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]

Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]

Page 11: The 1390 Standard

9. Conclusion- Performed analyses:

Mathematical modelingSimulation analysisImplementation analysis

- Suggested algorithm presents a possible solutionof SAT/DAT (IEEE 1390) signal detection

- VLSI realization of the appropriate detector:Complexity/Performance tradeoff

- Next steps:HDL language description of the detectorHDL model simulation and testingVLSI implementation: silicon compilation

Miljan Vuletić, Goran Davidović, Veljko MilutinovićE-mail: {miljan@galeb, davidovic@buef31}.etf.bg.ac.yu, [email protected]

Page 12: The 1390 Standard

What is the Next Step?

Remote and virtual factories,controlled by integrated 1390/Internet

Wireless Internet-oriented telemetry and more,using integrated GPS/Internet

References:[Domazet98] Domazet, D.,

"Virtual Factories on Internet,"Technical Report, DD/1/98, Gintic Institute, SingaporeMarch 1998.

[Jameel98] Jameel, A., Stuempfle, M., Jiang, D., Fuchs, A.,"Web on Wheels: Toward Internet-Enabled Cars,"IEEE COMPUTER, January 1998, pp. 69-76.

Page 13: The 1390 Standard

Case Study:Virtual Factories - Globalization in Action

Factories with no people and no light!Different production phases at different global locations.Example: Gintic in Singapore [Domazet98].

Design

Analysis Manufacturing

Materials

ManagementMarketing

UnifiedProductConcept

(USA)

(EU) (Singapore)

(USA) (Serbia)

(Japan)

Figure 1: The Gintic Approach

Page 14: The 1390 Standard

Case Study:Web on Wheels - Telematik by Mercedes

- Internet services can be extended to customers in automobiles.- Another issue is remote diagnostics.- First Internet-enabled cars may hit roads before the year 2002

[Jameel98].

- Location awareness is the major prerequisite for location sensitive services.- Safe-to-use is the major design requirement (no eyes off the road when email).- Easy-to-use is another important issue (no hands off the wheel

Veljko Milutinović, Miljan VuletićE-mail: [email protected], [email protected]

Page 15: The 1390 Standard

Major services:

(a) Seamless access to office or home computers (e.g., email)(b) Location-based information on demand (e.g., the nearest gas station)(c) Remote diagnostics and roadside assistance (e.g., S.O.S.)(d) Personalized services on demand (e.g., WWW access)(e) Interactive audio and video for passengers (e.g., time sinks)(f) Electronic commerce on Interent (e.g., smart cards)(g) Electronic business on Interent (EBI)

Major issues:

(a) Mobile wireless communications(b) System architecture(c) User interface design

Page 16: The 1390 Standard

Mobile Wireless Communications

The Internet

Customer assistance centeror other service providers

Personal devices - Smart card - HPC/PDA - Smart phone

Vehicle functions - Onboard diagnosis - Comfort functions

CDPDGPS

Metricom

Internet clientsInternet servers

CAN Bus

Audio

Navigation

Storage device

Entertainment

Infraredtranciever

Figure 2: The Internet on Wheels Concept Car

Metricom - Metropolitan Network (10s Kbits/s for flat montly fee) CDPD - Cellular Digital Packet Data HPC - High Performance Computing PDA - Personal Digital Assistant

Page 17: The 1390 Standard

System Architecture

IP

TCP

IP

TCP

IP

TCP connection

Sender

Internet Wired networkconnection

Wirelessconnection

Homeagent

Basestation

Mobilehost

Figure 3: The Basic Mobile IP Architecture

Page 18: The 1390 Standard

Veljko Milutinović, Miljan VuletićE-mail: [email protected], [email protected]

Page 19: The 1390 Standard

User Interface

PresenterContent

Contentplug-in

Contentprovider

Userinput

Controlreception

Statusinformation

Configurationinformation

Display

Speech

Externaldevices

Infrastructure

Car data

Multimedia

Microphone

Pointer deviceAlphanumeric device

Figure 5: The Basic User Interface Infrastructure

Major Solutions:(a) One-touch(b) Speech-synthesis(c) Speech-recognition

Veljko Milutinović, Miljan VuletićE-mail: [email protected], [email protected]

Page 20: The 1390 Standard

Advanced Internet ServicesS. Cvetkovic ([email protected])

V. Milutinovic ([email protected])

Page 21: The 1390 Standard

Mutations of Classical Approaches:

Internet Fax

Fax Web

Net to Phone

Net Talk

A Very Informative Reference:

[Cvetkovic98] Cvetkovic, S., "Issues in Internet for EBI",

http://galeb.etf.bg.ac.yu/~ebi/ or [email protected], 1998.

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 22: The 1390 Standard

Internet Fax The TCP.INT Remote Printing

Basic idea:

(a) Sending a fax message by email to a server

which is local to the fax message destination.

(b) Sending a real fax as a local call, at no charge to the sender.

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 23: The 1390 Standard

Checking if the destination location is covered by the service:

(a) Via WWW:

Visit http://www.tpc.int (option: Check Coverage)

and type in the destination fax number (starting with the country code)

(b) Via email:

Send email to [email protected] and specify the destination fax number.

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 24: The 1390 Standard

Sending is based on several methods:

(a) Sending email to the address

[email protected] includes the name and the location of the receiver

'_' means 'space'

'/' means 'enter'

FAXNUMBER includes no spaces, dashes, or points (up to 15 digits).

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 25: The 1390 Standard

Example

/[email protected]_Milutinovic

delivers the email message to fax number +381-11-324-8681

with the following text in the header of the message:

Veljko Milutinovic IFACT

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 26: The 1390 Standard

(b) Visiting the WWW page

http://www.tpc.int (Option: Send a Fax)

and filling in a form.

(c) Sending a WORD or an EXCELdocument

using the program HQFax

which can be found at http://www.tpc.int(Option: Client Software)

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 27: The 1390 Standard

(d) Sending a scanned document (BMP,GIF, PCX, TIF, JPG, ...)

using the program ScanFax

which can be found at http://www.tpc.int(Option: Client Software)

Acknowledgement comes to the sender's email address

after the fax is delivered (typically after a few minutes):time of delivery, transfer time, etc...

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 28: The 1390 Standard

Internet Fax MailboxThe FaxWeb

Basic idea:

(a) Faxes directed to a phone number get posted on WWW

(b) Ideal for those without mobile phone/fax units

(c) More info at http://www.faxweb.net

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 29: The 1390 Standard

Internet to Phone TalkThe Net2Phone by IDT

Basic idea:

(a) The talk is transformed into a bit stream,

and transported via Internet to a server in the USA.

(b) At the server, it is transformed into an analog signal,

and transported via telephone network to an ordinary telephone set.

(c) Costs are charged,

based on the distance from the server in the USA.

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 30: The 1390 Standard

Cost structure:

(a) For a PC in Yugoslavia,

the savings is from about 15 times (when the callee is in the USA),

to about 4 times (when the callee is in a neighboring European country)

(b) The cost has three parts:

(1) Local phone call (from the home to the local Internet provider).

(2) The Internet provider charges (about $0.01/min, in Yugoslavia).

(3) The IDT charges (the major part).

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 31: The 1390 Standard

(c) The IDT charges per minute:

(1) London - Internet=$0.18 (YugoClassical=$0.80).

(2) NYC off peak - Internet=$0.10 (YugoClassical=$1.44).

(3) NYC peak - Internet=$0.15 (YugoClassical=$1.44).

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 32: The 1390 Standard

Technical prerequisites:

(a) Pentium, sound card, ear set, microphone, modem (min 28800 bps).

(b) Prefered - provider using cable rather than satelite infrastructure.

(b) Software package Net2Phone (from www.net2phone.com

Option:Download).

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 33: The 1390 Standard

Getting started: (for details see [Cvetkovic98])

(a) Download and install.

(b) On the first login, a personal form is filled out, anda PIN is defined.

(c) The IDT server defines the ACCOUNT NUMBER, used for charging purposes;

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 34: The 1390 Standard

Charging:

(a) Up-front payment $25, $50, or $100 by credit card.

(there is a form at http://www.net2phone.com).

(b) Automatic charging while talking.

(there is an account balance option athttp://www.net2phone.com).

(c) No charging for 1-800 and 1-888 numbers in the USA.

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 35: The 1390 Standard

Human interface:

(a) Press the CALL button to initiate the call.

(b) Press the PUSH TO TALK button to talk (if half duplex sound card).

(c) Release the same button to listen (if half duplex sound card).

(d) Press the VOX button to activate the AUTOMATIC PUSH TO TALK.

(e) Press HANG UP to finish.

For more options see [Cvetkovic98].S. Cvetkovic ([email protected])

V. Milutinovic ([email protected])

Page 36: The 1390 Standard

Problems:

(a) Echo if satelite link used.

(b) Low quality if slow modem

(c) Classical phone set can not call a PC, for now.

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 37: The 1390 Standard

Internet PC to PC Talk Net Talk

Basic idea:

(a) Sound is transformed into bitstream andtransported to another PC

(b) Camera option more popular !!!

(c) Net Conference

(d) Working together in anapplication during a meeting

NetMeeting by Microsoft (http://microsoft.com/netmeeting)IPhone by Vocaltec (http://www.vocaltec.com)

S. Cvetkovic ([email protected])V. Milutinovic ([email protected])

Page 38: The 1390 Standard

Some Popular Static Image Formats for HTML/WWW

Mostly supported by all popular WWW browsers:

*.gif*.jpeg or .jpg*.png*.bmp

Some Popular Dynamic Image Formats for WWW

Mostly additional SW (plug-in modules) needed for full functionality(compression always supported):

*.avi*.mov*.mpeg or .mpgRealVideo

Source: [email protected]: Information to follow is subject to change!

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 39: The 1390 Standard

(1) .GIF (Graphic Interchange Format) Convenient for storing of computer generated pictures Not convenient for storing photo pictures, due to limitations of the palette Standard 256 colors Possible to define “transparent color” with flavor of the “background” Possible to keep more pictures in one file,

information about the time pause between two pictures, information about looping, etc Compression is w/o loss, based on LZW Download modes:

(a) Normal (line by line)(b) Interlaced (all odd lines first)

(2) .JPG (Joint Photographic Experts Group) Mostly intended for storing photo pictures Compression level controlled by picture quality;

compression is lossy (loss should not be visible to human eye) 16 million colors (24-bit palette) No “transparent” colors (so far) Download modes:

(a) Baseline (line by line)(b) Progressive (in several passes – draft first)

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 40: The 1390 Standard

(3) .PNG (Portable Network Graphics) Supported by IE only (so far) Supposed to take the best from both .GIF and .JPG, but suffers from file size

(4) .BMP (Bitmap) Supported by IE only No compression supported

(5) .AVI (Audio Video Interleave) A Microsoft standard No plug-in only if IE used(6) .MOV (Quicktime Movie) An Apple standard Business as usual(7) .MPG (Motion Picture Experts Group) Based on same principles as .JPG More aggressive compression(8) RealVideo Specifically developed for emitting video records over Internet, in real time Quality depends on network bandwidth and availability

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 41: The 1390 Standard

Music on the WWW: Formats of Interest

Popular browsers (Netscape & Explorer) support: wav mid

Other formats (needing extra software): mp3 dat ra

Source: Ivan Sokić (e-mail: [email protected])

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 42: The 1390 Standard

WAVE (*.wav)

Digital equivalent of an audio signal, obtained by ADC from players(CD, etc) or others

For the CD-player quality, takes 172KB/sec (e.g., over 10 MB for one minute) Lower sampling rate possible, but sound quality decreases Browser expects that the entire file is read into memory,

before reproduction starts;this read-in may take enormous time,and causes (unnecessary) virtual memory page swapping

Critical resource: Memory

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 43: The 1390 Standard

MIDI (*.mid)

Stores info on musical instruments and tones to play Intrepretation performed by the sound card and the resident drivers Quality determined by the sound card infrastructure No voice synthesis! No way to port-in the audio CD contents Today, the only practical solution

for background music on WWW pages Selected servers contain popular MIDI music to download

(often, permitions needed both from music and file authors) Critical issue: Applicability

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 44: The 1390 Standard

Useful Sites for MIDIDownload

http://ultimatemidi.com/midigk.htmlhttp://www.prs.net/midi.htmlhttp://stud1.tuwien.ac.at/~e8925292/bestmid .htm#Pop1

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 45: The 1390 Standard

MP3 (*.mp3)

Similar to WAVE, except for additional compression,with file size reduction up to 10 times!

Compression time long, which is not an issue,because compression is done only once, off-line

Decompression doable at run-time, if PC133 or better,but slows down the PC and the Browser

Critical resource: Processing time

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 46: The 1390 Standard

Real Audio (*.ra)

Intended for “live broadcast” over Internet,at the expence of lower quality(in order to be able to withstand bandwidthshrinkings)

Listening concurrently with download, which meansperiodicalskipping/repeating (unpleasant) if bandwith disturbed

Critcal issue: Quality of the sound

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 47: The 1390 Standard

DAT (*.dat)

This is the format of popular audio CDs At reproduction time,

only parts of the file are read into memory at a time If other resources access CD data, reproduction may get interrupted,

resulting in short pauses;consequently, not good for background music, if other data from the same CD are being used

Good: CD usable both in PC and in audio CD players Critical resource: CD ROM player

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 48: The 1390 Standard

Real Audio (*.ra)

Intended for “live broadcast” over Internet,at the expence of lower quality(in order to be able to withstand bandwidth shrinkings)

Listening concurrently with download, which means periodicalskipping/repeating (unpleasant) if bandwith disturbed

Critcal issue: Quality of the sound

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 49: The 1390 Standard

The Mobile IP

Veljko MilutinovićDepartment of Computer Engineering,

School of Electrcal Engineering,University of Belgrade

Email: [email protected]: http://galeb.etf.bg.ac.yu/~vm

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 50: The 1390 Standard

Networking Terminology Mobile

Agent advertisement: The procedure by which a mobilityagent becomes known to the mobile node.Agent discovery: The process by which a mobile nodecan obtain the IP address of a home agent or foreignagent, depending upon whether the mobile node is homeor away from home. Agent discovery occurs when amobile node receives an agent advertisement, either as aresult of periodic broadcast or in response to a solicitation.Automatic home agent discovery: The process by whicha mobile node can obtain the IP address of a home agentof its home network.Binding: The triplet of numbers that contains mobilenode's home address, its-care-of address, and theregistration lifetime - how long mobility agents can usebinding.Binding update: The message that supplies a new bindingto an entity that needs to know the new care-of addressfor a mobile node. The binding update contains the mobilenode's home address, new care-of address, and a newregistration lifetime.Care-of address: An IP address on the mobile node'scurrent point of attachment to the Internet, when themobile node is not attached to the home network.Collocated care-of address is a care-of address assignedto one of the mobile node's network interfaces, instead ofone being offered by a foreign agent.Correspondent node: A node that sends or receives apacket to mobile node; the correspondent node may beanother mobile node or a nonmobile Internet node.Discovery: In this article, short for agent discovery.Encapsulation: The process of incorporating an originalIP packet (less any preceding fields such as a MACheader) inside another IP packet, making the fields withinthe original IP header temporarily lose their effect.Foreign agent: A mobility agent on the foreign networkthat can assist the mobile node in receiving datagramsdelivered to the care-of address.Foreign network: The network to which the mobile nodeis attached when it is not attached to its home network,and on which the care-of address is reachable from therest of the Internet.Fully qualified domain name (FQDN). An Internetnode's FQDN is its complete domain name as defined bythe Domain Name System (DNS). A node can be knownlocally by a relative domain name that is a substring of itsFQDN, but such a relative name cannot be resolvedcorrectly by Internet nodes outside of the part of thedomain name hierarchy indicated by the relative name.The fully qualified name can be resolved from anywherein the Internet, subject to access control and routability ofthe resolution request.Home address: The IP address assigned to the mobilenode, making it logically appear attached to its homenetwork.

Home agent: A node on the home network thateffectively causes the mobile node to be reachable at itshome address even when the mobile node is not attachedto its home network.Home network: The network at which the mobile nodeseems reachable, to the rest of the Internet, by virtue of itsassigned IP address.Minimal encapsulation: A variant encapsulationtechnique specified in RFC 2003 that temporarily altersthe structure of the original IP header, but uses fewerbytes for tunneling packets to the care-of address than thedefault method (IP-within-IP) uses.Mobile node: A node that, as a part of normal use,changes its point of attachment to the Internet.Mobility agent: A node (typically a router) that offerssupport services to mobile nodes. A mobility agent can beeither a home agent or a foreign agent.Nomadicity: The full range of network technology beingdesigned to come to the assistance of the mobile (ornomadic) computer use, not limited to network layerprotocols.Redirection: A message that is intended to cause achange in the routing behavior of the node receiving it.Registration: The process by which the mobile agentinforms the home agent about its current care-of addressRemote redirection: A redirect sent from a source notpresent on the local network. The source can be locatedanywhere in the global Internet and may have maliciousintent and be untraceable.Replay attack: A security violation whereby a maliciousentity attempts to imitate a transaction recorded duringprevious and valid transaction between two protocolentities. Both protocol entities have to be aware that thesubsequent identical traffic streams may no longer bevalid. Since the previous transaction was valid, thealgorithms for detecting replay attacks needs toincorporate data that can never be reproduced in anycorrect subsequent transaction.Route optimization: A process that enables the deliveryof packets directly to the care-of address from acorrespondent node without having to detour through thehome network.Source routing: A routing technique that causes some orall intermediate routing points to be represented directly inthe data packet to be forwarded This is in contrast to thetypical situation in which intermediate routers rely onacquired routing state information to forward incomingpackets.Tunneling: The same as encapsulation, but withadditional connotations about changing the effects ofInternet routing on the original IP packets.

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 51: The 1390 Standard

The Mobile IP (RFC 2002)

Essence:

Increasing variety of wireless devices offering IP connectivity(PDAs, handhelds, and digital cellular phones).

Making mobility transparent to applicationsand higher level protocols (TCP, ...).

Using two IP addresses: a fixed home addressplus a care-of address that changes at each new point of attachment.

Major mechanisms:

1. Discovering the care-of address2. Registering the care-of addressTunneling the care-of address

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 52: The 1390 Standard

Introduction into Mobile IP

The IP routes packets from a source to a destinationby allowing routers to forward packets according to routing tables(destination network number obtained by masking some of the lower IP bits).

Mobile IP requires the existence of a network node known as home agent.Also, at the new point of attachment, a foreign agent is involved.

Whenever mobile node away from its home network (at a foreign network),home agent gets all the packages and forwards themto the mobile node's current point of attachment(through an interaction with the foreign agent).

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 53: The 1390 Standard

T h e D i s c o v e r y P r o c e s s

W h e n e v e r t h e m o b i l e n o d e m o v e s ,i t o b t a i n s i t s n e w c a r e - o f a d d r e s s t h r o u g h t h e d i s c o v e r y p r o c e s s ,b a s e d o n t h e r o u t e r a d v e r t i s i n g p r o t o c o l ( e x t e n s i o n o f t h e R F C 1 2 5 6 ) .

D i s c o v e r y o p e r a t i o n s i n m o b i l e I P ( F A i s f o r e i g n a g e n t ) . F A a d v e r t i s e s :( a ) a b o u t c a r e - o f a d d r e s s e s ,( b ) a b o u t s p e c i a l s e r v i c e s , a n d( c ) a b o u t t h e v i s i t i n g m o b i l e a g e n t s ( p u s h v e r s u s p u l l )

FA FA adver tises service

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 54: The 1390 Standard

T h e R e g i s t e r i n g P r o c e s s

N e x t , t h e n e w c a r e - o f a d d r e s s i s r e g i s t e r e d w i t h i t s h o m e a g e n t ,s o t h e f i r s t n e x t p a c k e t c a n b e f o r w a r d e d .

FA

FA

H A

M H requests serviceM H relays request to H A

H A accep ts or den ies

FA relays sta tus to M H

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 55: The 1390 Standard

H om eA gen t

H A FAS rc D est P ro to S rc D est P ro to

E n capsu la tedd iagramX M H ? Payload

S rc D est P ro to

ForeignA gen t

M obile H ost

X M H ? Payload

S rc D est P ro to

Payload?M HX4 or 55

Further delivery requires that the care-of address appears as destination IP.This transformation is called redirection.

Home agent redirects packets from the home network to the care-of address,by constructing a new IP header.

The new header encapsulates the original packetcausing the mobile's node home address to have no effect on packet routing

The inverse transformation is done by the foreign agent.

Such encapsulation is called tunneling

The Tunneling Process

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 56: The 1390 Standard

The Ongoing Research1. Security improvement (making it more secure)2. Route optimization (bypassing the home)3. Source routing

(moving different outgoing and reply routers)

The Mobile IP WWW Resources1. Mobile IP working group drafts and documents

http://www.ietf.org/html.charters/mobileip-charter.html

2. Stanford MosquitoNet Mobile IP projecthttp://mosquitonet.stanford.edu/software/mip.html

3. The CMU Monarch projecthttp://www.monarch.cs.cmu.edu/

4. Portland State Secure Mobile Networking projecthttp://www.cs.pdx.edu/research/SMN/

5. State University of New York at BinghamtonLinux-Mobile IP projecthttp://anchor.cs.binghamtom.edu/~mobileip/

FA MH

SRC HA2.

1.

1.

2b.

2a.

2.

3.

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 57: The 1390 Standard

Selected HICSS Case Studies on Mobile Computing

(1) The CoBERT Agents: Cooperating on the Best Effort Basis Developed for real-time with soft/hard deadlines Israel ([email protected])

(2) QoS for Wireless ATM Broker concept for resource management and negotiation Germany ([email protected])

(3) Concurrent Data Access in Mobile Hetero Systems New algorithm for limited bandwidth and frequent disconnect

USA ([email protected])

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 58: The 1390 Standard

Mobile Phone & Internet

(b) GSM-900, GSM-1800 (DCS), GSM-1900 (PCS)

(a) GSM = Global System for Mobile Communication (1990)

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 59: The 1390 Standard

GSM Advanced Services:

(a) Divert call

(b) Answering machine

(c) CLIP (Calling Line Identification Presentation)

(d) Call waiting

(e) Conference call

(f) Roaming

(g) Barring calls(h) SMS (Short Message Service)

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 60: The 1390 Standard

More About SMS:

Basic idea:

(a) Exchange of messages up to 160 chars

(b) Contact without disturbing receiver with phone ring

(c) Low cost communication for mobile subscriber

How to:

(a) Choose menu option in your mobile phone(b) Enter the message(c) Enter the destination mobile phone number (international format e.g. +381641234567)

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 61: The 1390 Standard

What happened with my message:

(a) Message is sent to SMS Center (SMSC)

(b) SMSC tries to locate mobile destination and delivers the message

(c) If the destination is unreachable

message is saved by SMSC for later delivery(d) Destination phone beeps if it receives a message from SMSC

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 62: The 1390 Standard

(a) Sending a message to mobile phone from WEB page

(b) Finding the WEB page of the mobile subscriber’s GSM network; one can use http://www.gsmworld.com to identify the network

(c) Trying multinetwork gateways

http://www.mtn.co.za http://www.advalvas.be/sms

WEB-TO-SMS:

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 63: The 1390 Standard

(a) Direct from PC to mobile phone, using a special e-mail address(e.g. [email protected])

EMAIL-TO-SMS:(1) Direct to phone number

(b) Message is broken into 160-character chunks, and sent to mobile phone via SMS

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 64: The 1390 Standard

(a) Sending e-mail from a mobile phone(b) Sending SMS message in the following format

EMA username@domain body_of_the_message 160to number +393388641732

(c) Instead of @ one can use !

(d) Your GSM network has to have a roaming agreement with TIM (Telecom Italia Mobile) to use this service

SMS-TO-EMAIL:

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 65: The 1390 Standard

(2) Using an intermediate e-mail address

(a) Mobile user has to open an e-mail account at eSMS

(more info at http://www.esms.com)

(b) Message sent to [email protected] can be:

(1) Sent to mobile phone broken into 160 character chunks; number of chunks can be limited by the user

(2) Only username and subject of the message are sent to mobile; complete message is forwarded to e-mail defined by user (“notification” mode)

(3) Message is forwarded to another e-mail address only (“do not disturb” mode)

V. Milutinovic ([email protected]) D.Petkovic – [email protected]

Page 66: The 1390 Standard

Research at UB/IFACT

Suboptimal detection and correlation

Issues:Optimal versus suboptimalProblems reincarnate—experiences accumulate

On-hook: Suboptimal detectionOff-hook: Suboptimal correlation

Acknowledgments:Goran Davidović and Miljan VuletićPapers: M+M (2)

V. Milutinovic ([email protected]) D.Petkovic – [email protected]