Information Technology Reference
In-Depth Information
Figure 1. Mobile environment
Mobile
Node
Mobile
Node
Mobile
Node
Static
Node
Mobile
Node
associated with at least one static node in order to remain in the network and be able to communicate
with other mobile nodes by means of using the static node as the proxy for communication.
Identiication of Mobile nodes
The identification of mobile nodes (Goh & Taniar, 2004a) in the mobile environment (Goh & Taniar,
2004a, 2004b; Wang et al., 2003) can be classified into two categories, namely the identification of the
mobile node itself and the identification of the mobile node in relation to the physical location in the
mobile environment. The identification of the mobile node itself can be done by sharing the pre-exist-
ing feature of the network system, such as the IEEE 802.11b wireless network system (Wang et al.,
2003). The network runs by using ethernet protocol in the data link layer, and the TCP/IP protocol in
the network and transport layer.
In the ethernet protocol (Wang et al., 2003), each and every single node in the network must have
identification. This identification is formatted as a sequence of hexadecimal digits, such as 00-0F-20-
AC-FF-AF . This number is unique globally. The second identification method in the network is to use
IP address, such as 192.128.1.1 . However, this may pose a problem in a complex network which the
network can be segmented to many different parts and different parts of the network can have machines
of the same IP address (Goh & Taniar, 2005).
The best means of identification of mobile nodes is at the application layer which uses username
and domain names to identify the mobile nodes, such as john@science.university.edu. This not only
identifies the machine but also identifies the person using the machine and can eliminate the problem
which arises from multiple users sharing a single machine.
Matrices in Mobile environment
Matrices will be used in this chapter as a means to draw grid lines in the mobile environment. Through
the use of matrices (Goh & Taniar, 2004b), each individual spot in the mobile environment can be bet-
Search WWH ::




Custom Search