Mobile Computing
Mobile Computing
Core: 13
MOBILE COMPUTING
M16UCA13
Credit: 4
UNIT - I
Introduction: Applications - A Simplified Reference Model. Wireless Transmission: Frequencies for
radio transmission - Signals - Antennas - Signal Propagation - Multiplexing - Modulation - Spread
Spectrum - Cellular System.
UNIT - II
Medium Access Control: Motivation for a Specialized MAC- Hidden and exposed terminals - Near
and far terminals - SDMA - FDMA - TDMA - Fixed TDM - Classical Aloha - Slotted Aloha - Carrier
Sense Multiple Access - Demand assigned Multiple Access - PRMA Packet Reservation Multiple
Access - Reservation TDMA - Multiple Access with Collision Avoidance - Polling - Inhibit Sense
Multiple Access. CDMA - Spread Aloha multiple access.
UNIT - III
Telecommunication Systems: GSM - Mobile Services - System Architecture - Radio Interface -
Protocols - Localization and Calling - Handover - Security. UMTS and IMT 2000: UMTS releases and
standardization - UMTS System Architecture - UMTS Radio Interface -UTRAN - UMTS Handover.
UNIT - IV
Satellite System: History - Applications - Basics - Routing- Localization - Handover. Wireless LAN:
IEEE 802.11- System Architecture - Protocol Architecture - Physical Layer - Medium Access Control
Layer. Bluetooth: User scenarios - Architecture - Radio Layer - Baseband Layer - Link Manager
Protocol.
UNIT - V
Mobile Network Layer: Mobile IP - Goals, Assumption, and Requirements - Entities and Terminology
- IP Packet delivery - Agent discovery - Registration. Dynamic Host Configuration Protocol - Mobile
Transport Layer: Traditional TCP - Congestion Control - Slow Start - Fast Retransmit.
TEXT BOOK
Jochen Schiller, "Mobile Communications",2nd Edition, eighth impression, Pearson Education, 2011.
REFERENCE BOOKS
1. William Stallings,"Wireless Communication and Networks", 2nd Edition, Pearson Education, 2005.
2. Theodore Rappaport, "Wireless Communications: Principles and Practice", Prentice Hall
Communications,1996.
UNIT – I
Introduction
In present and future the computers are portable. But the users need to access the
networks. To do this only choice is wireless. People will also be mobile.
Definition for wireless and mobile:
Mobility:
There are two kinds of mobility:
User mobility
Device portability
User mobility:
Refers to a user who has access to the same telecommunication services
at different places.
Users are mobile and the services also follows(e.g.,) call forwarding in
cellular phones.
Device portability:
Refers to the movement of communication devices(e.g.,) mobile phones.
Wireless:
The way of accessing the network was by wire. The wires are replaced by
electromagnetic waves through the air.
A communication device can have one of the following characteristics:
o Fixed and wired: ( e.g.,) desk top uses fixed networks.
o Mobile and wired: (e.g.,) laptop connected using telephone and modem.
o Fixed and wireless: this mode is used for installing network in historical buildings to
avoid damage caused due to wiring.
o Mobile and wireless: no cable and the users can roam.
Application:
Although many applications can be benefit from wireless networks and mobile
communications particular application environments seem to be predestined for their use.
1. Vehicle 2. Emergency
3. Business 4. Infotainment
5. Replacement of wired networks 6. Location dependent services
7. Mobile and wireless devices
Vehicle:
Today’s cars already comprise some, but tomorrow’s cars will compromise
many wireless communication systems and mobility aware applications.
Music, news, road conditions, weather reports, and other broadcast information
are received via digital audio broadcasting (DAB) with 1.5 Mbit/s.
For remote areas, satellite communication can be used, while the current
position of the car is determined via the global positioning system (GPS).
In the future, cars will also inform other cars about accidents via the ad-hoc
network to help them slow down in time, even before a driver can recognize an
accident.
Emergency:
Imagine the possibilities of an ambulance with a high-quality wireless
connection to a hospital.
Vital information about injured persons can be sent to the hospital from the
scene of the accident.
All the necessary steps for this particular type of accident can be prepared and
specialists can be consulted for an early diagnosis.
Wireless networks are the only means of communication in the case of natural
disasters such as hurricanes or earthquakes.
Business:
A traveling salesman today needs access to the company’s database: to ensure
that files on her laptop reflect the current situation, to enable the company to
keep track of all activities of their traveling employees, to keep databases
consistent etc.
With wireless access, the laptop can be turned into a true mobile office, but
efficient and powerful synchronization mechanisms are needed to ensure data
consistency.
Replacement of wired networks:
In some cases, wireless networks can also be used to replace wired networks,
e.g., remote sensors, for tradeshows, or in historic buildings.
Due to economic reasons, it is often impossible to wire remote sensors for
weather forecasts, earthquake detection, or to provide environmental
information.
Infotainment and more:
Wireless networks can provide up-to-date information at any appropriate
location.
The travel guide tell something about the history of a building, downloading
information about a concert in the building at the same evening via a local
wireless network.
Location dependent services:
Several services that might depend on the actual location can be distinguished:
o Follow-on-services
o Location aware services
o Privacy
o Information services
o Support services
Mobile and wireless devices:
The following list gives some examples of mobile and wireless devices graded by
increasing performance.
Sensor
Embedded controllers, Pager
Mobile phones
Personal digital assistant
Pocket computer
Notebook/laptop
A simplified Reference model:
The reference model of wireless system
The description of the above figure is
PDA is an example of wireless and portable device. The PDA communicates
with the base station. The base station consists of a radio transceiver and an
internetworking unit connecting the wireless link with the fixed link.
The communicating partners of the PDA are the conventional computer on the
right hand side.
The protocol stack is represented beneath the system.
End systems such as PDA and computer need full protocol stack. Intermediate
systems such as internetworking unit do not need all the layers.
Functions of the layers in wireless and mobile environment:
Physical layer:
It is the lowest layer in the communication system.
This layer is responsible for conversion of bits into signals that can be transmitted in the
sender side. The physical layer of the receiver then transforms the signals back into a bit
stream.
This layer is responsible for frequency selection, generation of carrier frequency, signal
detection, modulation and encryption.
Data link layer:
The function is to access the medium, multiplex the data streams.
Correction of transmission errors and synchronization.
It is responsible for reliable point to point connection between two devices or point to
multipoint connection between one sender and many receivers.
Network layer:
The function is routing of packets through network.
The other functions are addressing, device location and handover between different
networks.
Transport layer:
This layer is used to establish an end to end connection.
The others functions are QOS, flow and congestion control.
Application layer:
The top most layer.
The function are service location , support for multimedia applications, video sitter,
latency.
SIGNALS
Physical representation of data
Function of time and location
Signal parameters: parameters representing the value of data
Classification
o continuous time/discrete time
o continuous values/discrete values
o analog signal = continuous time and continuous values
o digital signal = discrete time and discrete values
Signal parameters of periodic signals:
period T, frequency f=1/T, amplitude A, phase shift j
Sine wave as special periodic signal for a carrier:s(t) = At sin(2 p ft t + jt)
ANTENNAS
Isotropic radiator
Radiation and reception of electromagnetic waves, coupling of wires to space for radio
transmission Isotropic radiator: equal radiation in all directions (three dimensional) – only a theoretical
reference antenna Real antennas always have directive effects (vertically and/or horizontally)
Radiation pattern: measurement of radiation around an antenna.
Often used for microwave connections or base stations for mobile phones (e.g., radio coverage of a
valley)
Antennas: diversity
SIGNAL PROPAGATION
Transmission range
communication possible
low error rate
Detection range
Interference range
Signal propagation
Multipath propagation
Signal can take many different paths between sender and receiver due to reflection, scattering,
diffraction
Time dispersion: signal is dispersed over time
Interference with “neighbor” symbols, Inter Symbol Interference (ISI)
The signal reaches a receiver directly and phase shifted
Distorted signal depending on the phases of the different parts
Effects of mobility
Additional changes in
distance to sender
obstacles further away
MULTIPLEXING
Multiplexing in 4 dimensions
Space (s)
Time (t)
Frequency (f)
Code (c)
The oldest used technique used for multiplexing. Possible when the useful bandwidth of the
medium exceeds that of the signals it has to carry. Each signal is modulated on a different carrier
frequency.
This results in shifting the spectrum of the signal around the carrier frequency. Sufficient
guard-band is given so those neighboring signals do not overlap in the frequency domain.
At the receiving end each signal is extracted by first passing it through a band-pass filter and
then demodulating with the same carrier frequency that was used to modulate the signal. The signals
carried using FDM may be analog signals or may be analog signals representing digital data. However
FDM is mostly a technique from the era of analog communications. In FDM a device uses some of the
channel all of the time. FDM is used in radio and television broadcasting. FDM is also used in high
capacity long distance links in the telephone network.
Frequency division multiplexing (FDM) achieves multiplexing by using different carrier
frequencies .Receiver can “tune” to specific frequency and extract modulation for that one channel
.Frequencies must be separated to avoid interference – “Wastes” potential signal bandwidth for guard
channels.Only useful in media that can carry multiple signals with different frequencies – high-
bandwidth required .
Used in:
1. Broadcast
2. Cable
3. Satellite
Time division multiplexing is more suitable for digital data. TDM can be used when the data rate
available on a communication link exceeds the data rate required by any one of the sources. In TDM
each source that is to use the link fills up a buffer with data. A TDM multiplexer scans the buffers in
some predetermined order and transmits bits from each source one after the other.
Each channel has a unique code. All channels use the same spectrum at the same time.
Advantages:
bandwidth efficient
no coordination and synchronization necessary
good protection against interference and tapping
Disadvantages:
MODULATIONS
Digital modulation
Analog modulation
Basic schemes
Very simple
Low bandwidth requirements
Very susceptible to interference
More complex
Robust against interference
Bandwidth needed for FSK depends on the distance between the carrier frequencies
Special pre-computation avoids sudden phase shifts
MSK (Minimum Shift Keying)
Bit separated into even and odd bits, the duration of each bit is doubled
Depending on the bit values (even, odd) the higher or lower frequency, original or inverted is
chosen
The frequency of one carrier is twice the frequency of the other
Even higher bandwidth efficiency using a Gaussian low-pass filter
SPREAD SPECTRUM
Many chips per bit (e.g., 128) result in higher bandwidth of the signal
Advantages
Disadvantages
Two versions
Fast Hopping:
Several frequencies per user bit
Slow Hopping:
Several user bits per frequency
Advantages
Disadvantages
MAC protocol which were developed for nodes at short distance did not show good
performance for nodes at longer distance so another protocol has to be developed Known as 2p MAC
Protocol.
802.11 protocols were good for devices which had no power supply issue frequent charging were
available to them etc.
1. This protocol based devices were not good for certain operation like monitoring the natural
habitat of wildlife.
2. Sampling the water level of dam.
These applications do not require frequent human intervention and are required to run for a longer
duration.
To fulfill the requirement other protocol was developed sensor network (802.15.4)
Energy Budgets:-Main points which were discussed in this were how its protocol helps in
saving power by cleverly managing the time when device should sleep when to wake up.
Routing and tree formation in ZigBee: – Routing protocol was developed by Zigbee firm.
Wireless medium makes the MAC design more challenging than the wireline networks.
1. Half Duplex operation –> either send or receive but not both at a given time
In wireless, it’s difficult to receive data when the transmitter is sending the data, because:
When node is transmitting, a large fraction of the signal energy leaks into the receiver path
The transmitted and received power levels can differ by orders of magnitude
The leakage signal typically has much higher power than the received signal ->“Impossible to
detect a received signal, while transmitting data”
Collision detection is not possible, while sending data
As collision cannot be detected by the sender, all proposed protocols attempt to minimize the
probability of collision -> Focus on collision avoidance
Reflection – occurs when a propagating wave impinges upon an object that has very large
dimensions than the wavelength of the radio wave e.g. reflection occurs from the surface of the
earth and from buildings and walls
Diffraction – occurs when the radio path between the transmitter and the receiver is obstructed
by a surface with sharp edges
Scattering – occurs when the medium through which the wave travels consists of objects with
As a consequence of time varying channel and varying signals errors are introduced in the
transmission (Very likely) forstrengths wire line networks the bit error rate (BER) is the probability
of packet error is small .For wire line networks the errors are due to random For wireless networks the
BER is as high.For wireless networks the errors are due to node being in fade as a result errors occur in
a long burst. Packet loss due to burst errors – mitigation techniques
Smaller packets
Forward Error Correcting Codes
Retransmissions (Acks)
MULTIPLE ACCESSES
An access method in which multiple users, data services, or sources allotted different time-
slices to access the same channel.
Available time-slice divided among multiple modulated-signal sources. These sources use the
same medium, set of frequencies, and same channel for transmission of data.
GSM Eight radio-carriers (e.g., mobile phones) C1, C2, C3, C4, C5, C6, C7, and C8 in eight
TDMA time-slices, one for each radio carrier.
CELLULAR SYSTEM:
- The following concept holds when cell system follows SDM.
- For mobile communication transmitter is needed.
- The transmitter is called as base station.
- The base station covers certain area called cell.
- The radius of the cell can be from meters, tens of meters, kilometers.
- The shapes of the cells are assumed to be circle or hexagon.
- The real shape depends upon environment, weather and load.
- Never use the same frequency at the same time within the interference range.
Methods to create cell patterns:
Clusters:
Cells are combined to form clusters.
Types:
1. Three cell forming a cluster.
2. Seven cells forming a cluster.
All the cells within a cluster use a different sets of frequencies. Moreover
still to avoid interference sectorized antenna can be used.
Assignment of frequency to cells
(1) Fixed
(2) Dynamic
Fixed:
Here the frequencies are assigned in advance to the cell cluster and cell respectively.
This method is called as FCA used in GSM.
Disadvantages:
Not efficient in different traffic load condition.
Dynamic:
- Here the frequency can be borrowed and the frequencies can be freely assigned
to cells used in DECT.
- As the frequencies are repeated, the transmission power has to be limited to avoid
interference with the next cell using the same frequency.
- Another method to reduce the interference is to use sectorized antenna.
Borrow of frequency:
- Here when a cell has heavy traffic and its neighbour has light load,
the frequency can be borrowed.
- This scheme is called as borrowing channel allocation (BCL).
Breathe:
- When cellular systems use CDM, the cell planning faces a problem of cell size
depending upon the load, under that scenario the cells are said to breathe.
- The concept of breathe is that the cells can cover a large area under light load
and size shrinks under heavy load.
Advantages of cellular systems with small cells:
(1) Higher Capacity:
a. With SDM the frequency can be reused.
b. Frequency is feasible if the two transmitters are far away.
c. Small cells allow more users.
(2) Less Transmission Power:
a. Power is problematic for the mobile/hand held devices.
b. The devices which are closer to the base station needs less transmission
power.
(3) Local Interference:
a. In small cells the mobile and base need to cater only the local interference.
b. In the case of large cells they have to cater more interference problems.
(4) Robustness:
a. Cellular Systems are decentralized.
b. If one antenna fails it affects only small area.
Disadvantages:
(1) Infrastructure:
a. Cellular systems need complex infrastructure to connect all base stations.
b. E.g antenna, Location registers, switched are needed, which makes the system
costly.
(2) hand over:
a. As the cell size is small more number of handover is needed.
b. Handover means, when quality is low, the mobile needs to be handed over
from one transmitter to another.
(3) Frequency:
a. As the frequency is reused between transmitters, to avoid the interference the
frequency has to be distributed carefully.
b. More over only limited number of frequencies are available.
UNIT-II
TDMA
- TDMA stands for time division multiplex access.
- TDMA offers flexible scheme, allocates time slots for communication which is controlled
by TDM.
- The receiver need not tune the frequency; can stay at the same frequency.
- Uses only one frequency, many algorithms, exists to control the medium access.
- Here the system listens to many channels separated in time at the same frequency.
- Synchronization between the sender and receiver needs to be achieved.
- MAC address is used as identification.
- The identification makes the receiver identify when message is intended for it.
- Fixed schemes do not need an identification, but flexible.
Types of TDM
(a) Fixed TDMA
(b) Demand Oriented TDMA.
Fixed TDM:
- This is the simplest algorithm for using TDM.
- Here time slots are allocated for channels in the fixed pattern.
- Hence the result is fixed bandwidth.
- Now external synchronization needed.
- Each mobile must know its turn, hence no interference will occur.
- The pattern is to be assigned by the base stations.
The frequency is same.
Advantages:
- Bandwidth is fixed.
- Delay is fixed.
- Constant data rate.
Disadvantages:
- Wastage of bandwidth when the system has no data to transmit.
- Inflexible.
- Not suitable for bursty data.
Demand Oriented TDMA:
The demand oriented TDMA methods are:
1. Classical Aloha
2. slotted Aloha
3. CSMA
4. DAMA
5. PRMA
6. Reservation TDMA
7. MACA
8. Polling
9. ISMA
CLASSICAL ALOHA:
- Here the TDMA is applied without controlling the access.
- Each station can access the medium without a central arbiter controlling the access and
without co-ordination.
- If two or more stations access the medium at the same time collision occurs and the data
transmitted is too destroyed.
- Aloha is neither co-ordinated nor resolves contention.
- Can be used under light load.
Slotted Aloha:
- In slotted Aloha the time is divided into slots.
- All the senders need to be synchronized.
- When the sender wants to transmit attempts at the beginning of time slot.
- Synchronization is done at the beginning of the time slot.
- Systems are not co-ordinate.
- Through put is doubled from classical Aloha to slotted Aloha.
- Well suited for light load.
- Guarantees for maximum delay and throughput in not given.
Carrier Senses Multiple Access:
- Carrier senses multiple accesses.
- The medium is sensed before the access.
- Hence the name CSMA.
- The concept of sensing and accessing the medium decreases the probability of collision.
- Hidden terminals cannot be detected.
- Hence collision can occur at the receiver.
Types of CSMA.
(i) Non-persistent CSMA:
- Station sense the medium and start sending immediately if the medium is free.
- If the medium is busy the stations waits for a random amount of time and then once again
senses the medium.
- Repeats the above if the medium is found busy.
Problem faced:
- Overheads in sending RTS and CTS.
- Unsuitable for time critical data packets which is to be transmitted in short duration.
- State diagram for the sender and receiver.
CDMA:
- CDMA stands for code division multiple accesses.
- CDMA uses the technique of code division multiplexing.
- CDMA uses the codes to separate the users in code space, thus helping the medium be
shared without interference.
- Characteristics for code:
1. Auto correction
2. Orthogonal.
Orthogonal:
- The code is represented by vector.
- The vectors are said to be orthogonal, if their inner product is zero.
Auto Correction:
The inner product with itself should be large. Such code is called auto correction.
(eg) Barker Code;
(1,-1, 1,-1, 1, 1, 1,-1,-1,-1) * (1,-1, 1,-1, 1, 1, 1,-1,-1,-1) =
(1+1+1+1+1+1+1+1+1+1+1+1) = 11
Concept of CDMA:
When two senders want to send data. CDMA assigns unique orthogonal sequences Ak =
010011, Bk = 110101.
- A wants to send the bit Ad = 1, B wants to send Bd = 0.
- Both the sender spread their signal using the key as chipping sequence.
As = Ad * Ak As = Signal of the data to be transmitted
= 1 * (-1, 1,-1,-1, 1, 1) = (-1, 1,-1,-1, 1, 1)
B sends the signal
Bs =Bd * Bk
= -1*(1,1,-1,1,-1,1)= (-1,-1,+1,-1,+1,+1)
- Both the signal are transmitted at the same time using same frequency
C=As + Bs= (-2,0,0,-2,+2,0)
- The receiver after receiving, wants A’s data, despreads as C * Ak
(-2,0,0,-2,=2,0)*(-1,+1,-1,-1,+1,+1)
= 2+0+0+2+2+0= 6 > 0
Hence it concludes that the data is 1.
If the despread is<0 the data is 0.
- In the above scenario noise was neglected.
- Noise would add to the transmitted signal ‘C’ which results the difficulty in identifying the
bit.
- Problem faced by CDMA is power has to be adjusted over 1000 times/sec which consumes
lot of energy.
- Sender and receiver are not simple devices.
- When the need to communicate with a devices a different codes are needed.
- Does not support bursty traffic.
Spread Aloha Multiple Accesses:
- Here the CDMA and Aloha are combined to form SAMA.
Working Principle:
- Users use the same spreading code.
- Sender A and B access the medium at the same time in their narrow band spectrum
resulting in collision.
- The same data can be sent with higher power for shorter period 1 the spread spectrum is
used to spread the signals to increase the bandwidth.
Advantages:
1. Collision is low.
2. Spread spectrum a results in robustness against narrow band interference.
3. Coexistence with other systems in same frequency band.
Disadvantages:
1. Finding the good chipping sequence is difficult.
2. Code is not orthogonal to itself.
UNIT - III
TELECOMMUNICATION SYSTEMS:
Global System For Mobile Communications
(GSM: originally from Groupe Special Mobile)
- A digital cellular phone technology based on TDMA.
- GSM was first deployed in seven European countries in 1992.
- GSM defines the entire cellular system.
- Its ubiquity makes international roaming very common between mobile phone operators,
enabling subscribers to use their phones in many parts of the world thus is considered a second
generation (2G) mobile phone system.
- A mobile station MS is connected to the GSM public land mobile network PLMN via u
interface
- PLMN is the infrastructure needed for the GSM networks.
a. This network is connected to transit networks.
b. There will be additional network the Source/Destinations network before another
terminal TE is connected.
(a) Bearer Services
- Bearer services comprises of all services that enable the transparent transmission of data
between the interface to the network.
- Bearer services permit transparent/non transparent, synchronous and asynchronous data
transmission.
Transparent Bearer Services:
- This service uses the functions of physical layer to transmit data.
- Data transmission has a constant delay and throughput if no error occurs .
- FEC is used increase the transmission quality.
Non-Transparent Bearer Services:
- Uses the protocols of layers data link and network to transmit data.
- These services uses transparent bearer service radio link protocol(RPL).
(b) Tele Services
- Tele Services are application specific and need all the 7 layers of ISO/OSI reference model
- Services are specified end to end.
- These tele services are voice oriented tele services.
- Important service is
(a) Telephony Services
(b) Emergency Number
(c) Short Message Service
(d) Enhanced Message Service
(e) Multimedia Message Service
(f) Group 3 Fax
(c) Supplementary Services
- GSM offer supplementary services.
They are
(a) User Identification
(b) Call Redirection/Forwarding
(c) Closed User Group
(d) Multiparty Communication
SYSTEM ARCHITECTURE:
- The architecture of GSM comes in hierarchy, consisting of many entities, interfaces and
subsystem.
- The GSM system consist of three subsystems
(1) The Radio Subsystem (RSS)
(2) Network and Switching Subsystems(NSS)
(3) Operation Subsystem (OSS).
Radio Subsystem
- The Radio System consists of all radio specific entities
- The mobile stations and base station subsystems.
- As they are in the same radio frequency they form a cell.
- Components of RSS:
(i) Mobile Station
(ii) Base Transceiver Station
(iii) Base Station Subsystem
(iv) Base Station Controller.
1. Base Station Subsystem (BSS)
- A GSM network comprises many BSSs, each controlled by a base station controller (BSC).
- The BSS carries out transcoding of speech channels, allocation of radio channels to mobile
phones, paging, quality management of transmission and reception over the Air interface and
many other tasks related to the radio network.
Subchannels
(a) Stand alone dedicated control channel: SDCCH
- Until the MS has not established a TCH with BTS the SDCCH is used for low data rate for
signaling.
(b) Slow associated dedicated control channel: SACCH
- Each TCH and SDCCH has SACCH
- This is used to exchange system information.
(c) Fax associated dedicated control channel: FACCH
- When more signaling information needs to be transmitted this channel is used.
- This channel uses time slots.
PROTOCOLS:
Handover:
- Handover means handling over the mobile from one cell to another cell.
- Two reasons for handover
(i) When a mobile station moves out of the range of BTS the signal level decreases
continuously and falls below the minimal requirements for communication.
(ii) The traffic in one cell is too high , shifting of some MS to other cells with is lower load.
This is called as load balancing.
UTRA Mode
1. UTRA – FDD (W-CDMA)
2. UTRA – TDD (TD-CDMA).
UTRA-FDD (W-CDMA)
- The FDD mode for UTRA uses wide band CDMA(W-CDMA) with direct
sequence spreading.
- Each frame has got logical amd physical channel and their mapping.
Uplink Channels:
1. Dedicated Physical Data Channel:(DPDCH)
this channel conveys user/signaling data.
This spreading facture is between 4 and 256
2. Dedicated physical Control Channel(DPCCH)
In each Connection layer 1 needs exactly one DPCCH.
This channel conveys control data for the physical layer only.
Spreading is constant at 256.
The pilot is used for channel estimation.
Downlink channel:
Dedicated physical Channel:(DPCH)
- the downlink time multiplexes control data and user data
- Spreading factor is between 4 and 512
- Physical Random Access channel PRACH is used for this.
1. Primary synchronization
2. secondary synchronization
3. identification of the scrambling code
Fig2.22
UTRAN:
Core Network:
CSD Protocol Stack:
- this used the ATM adaptation layers AAL2 for user data transmission.
- RNC implement the RLC and MAC layer.
2. Soft Handover
here the nodes receive the signals from many stations whereby making the handover
soft.
UE can receive signals from upto three antennas which may belong to different node 3.
- The UE combines the received data.
- RNC combines the data stream received from node B.
Classical scenario for satellite systems supporting global mobile communication. Depending on its
type, each satellite can cover a certain area on the earth with the satellite is possible for mobile users
via a mobile user link(MUL) and for the base station controlling the satellite and acting as gateway to
other networks via the gateway link satellite links(ISL).
Basics:
Satellite orbit around the earth. Depending on the application, these orbits can be circular or
elliptical.
the attractive force Fg of the earth due to gravity equals m.g(R/r)2
the centrifugal force Fc trying to pull the satellite away equals m-r-w2
The variable have the following meaning:
m is the mass of the satellite
R is the radius of earth with R=6,370
The r is the distance of the satellite to the centre of the earth
g is the acceleration of gravity with g = 9.81 m/s2
Important parameters in satellite communication are the inclination and elevation angles. The
inclination angle is defined as the angle between the equatorial plane and the described by the satellite
orbit.
The elevation angle is defined as the angle between the center of the satellite beam and the
plane tangential to the earths surface.
A so called footprint can be defined as the area on earth where the signals of the satellite can
be received.
GEO 173:
Distance = 35,786 km. Example: Inmarsat
Advantages:
1.Can cover any spot on the earth
2.Senders and receivers use fixed antenna positions. Hence no adjusting is needed.
3.Lifetime is about 15 years.
4.Does not need handover due to large footprint.
5.Does not exhibit Doppler shift becauses relative movement is zero.
Disadvantages:
1. Northern od souther regions have problems in receiving due to low elevation above the
latitude of 60s.
2. Transmit power needed is high. Hence cannot be used for low/battery powered devices
3. hogh latency needed.
4. the frequency cannot be reused due to large footprint
5. transferring GEO into orbit is expensive
LEO 174:
- Circulate on a lower orbit
- Duration is 95 to 120 minutes
- High elevation for every spot hence high quality communication link.
- Visible on earth for 10 minutes only.
Classification
1. Little Leo: Has low bandwidth 100 b/s.
2. Big Leo: 1,000 bits/sec
3. Broadband: Some MBPs.
Advantages:
1.Transmission rate 2400 bits/sec
2.Low transmit power(1 W)
3.Delay for Packet delivery is low i.e.,10m,s
4.Smaller footprint hence frequency reuse is possible
5.Higher elevation to polar regions, hence better global coverage.
Disadvantages:
1. Needs many satellites to cover the earth
2. Due to short time visibility with high elevation needs additional mechanism for
landover between satellites.
3. Lifetime is 5 to 8 years.
4. Low latency
5. factors are needed for inter-satellite routing. Example: Global Star, Iridium
MEO:
Positioned between LEO and GEO.
Advantages:
1. as the orbit is 10,000 km. needs a dozen satellite to cover the earth
2. Movement is relatively low
3. Coverage is high, hence few handover.
Disadvantages
1. Due to larger distance delay is 70-80 ms.
2. satellites need high transmit power.
Routing:
Handover:
There are four types of handover in satellite systems.
1. Intra satellite Handover
The user moves from one spot beam to another spot beam of the same satellite.
2. Intersatellite Handover
When a user leaves the footprint of a satellite(or) when the satellite moves away, this
type of handover takes place. Inter satellite handover takes place if they support ISL.
3. Gateway Hnadover
When the mobile and satellite have contact, but the satellite moves away from the current gateway,
this type of handover takes place.
4. Intersystem Handover
This type of handover takes place between different systems.
Wireless LAN:
WLANs use electromagnetic radio waves to transport data between computers in a Local Area
Network (LAN), without the limitations set by “hard wired network cable or phone wire connection”.
Advantages of WLAN over wired LAN
1. Flexibility
2. planning
3. design
4. robustness
5. cost
Disadvantages:
1. QOS
2. proprietary solution
3. restriction
4. safety and security
IEEE 802.11
Introduction to IEEE 802.11:
The IEEE finalized the initial standard for wireless LANs, IEEE 802.11 in june 1997. this initial
standard specifies a 2.4 GHz operating frequency with data rates of 1 and 2 Mbps.
IEEE802.11a
The 802.11a standard specifies operation in the 5GHz band with data rates up to 54Mb/s.
Advantages:
The standard to 802.11b. higher speed physical layer extension in the 2.4GHz Band.its include
having much higher capacity and less RF interference with other types of devices, and products are just
now becoming available throughout 2002.
System Architecture:
Wireless networks can be of either of 2 basic architectures
1. Infra structure based
2. Ad hoc based
Infrastructure based IEEE 802.11 WLAN
IEEE 802.11 allows the ad hoc network between station. This ad hoc network is called as
Independent BSS(IBSS). In the above diagram S1,S2,S3 can communicated with each other but not
with S4 and S5.
Protocol Architecture:
The above architecture shows wireless LAN connected to Ethernet via bridge.
IEEE 802.11 covers the physical layer and medium access layer
The physical layer is subdivided into(PCLP) physical layer convergence protocol and
physical medium dependent(PMD) sub layer.
Function of MAC
1. Medium access
2. fragmentation
3. encryption
Functions of PLCP:
1.Provides a carrier Sense signal called channel assessment(CCA).
2.Provides PHY service access point(SAP) independent of transmission technology.
Functions of PMD:
1.Handles modulation and encoding/decoding of signals
Function MAC management:
1. supports association and reassociation of station to access point.
2. supports roaming
3. Controls authentication, encryption, synchronization of ststion with accompoint.
4. Power management
5. Maintain management information basic MIB
Function of PHY management:
1. Channel Tuning
2. Maintain PHY MIB
Functions of station management:
1.Intracts with both management layers and is responsible for higher layer functions.
Physical layer:
IEEE 802.11 supports three different physical layer: one layer based on infra red and
two layers based on radio transmission.
All PHY variants include the provision of the clear channel assessment signal(CCA).
The PHY layer offers a service access point with 1 or 2 Mbit/s transfer rate to the MAC
layer.
The remainder of this section presents the three versions of a PHY layer defined in the
standard.
Frequency hopping spread spectrum:
Synchronization: The PLCP preamble starts with 80 bit synchronization, which is a
010101… bit pattern.
Start frame delimiter(SFD): the following 16 bits indicate the start of the frame and
provide frame synchronization.
PLCP_PDU length word(PLW): this first field of the PLCP header indicates the length
of the payload in bytes including the 32 bit CRC at the end of the payload.
Header error check(HLC): Finally, the PLCP header is protected by a 16 bit checksum
with the standard ITU-T generator polynomial.
Infra red:
The PHY layer, which is based on infra red (IR) transmission, uses near visible light at
850-950 nm.
The standard does not require a line-of-sight between sender and receiver, but should
also work with diffuse light.
Proprietry products offer, e.g., up to 4 Mbit/s using diffuse infra red ligt.
MAC frames
Frame control: the first 2 bytes serve purposes. They contain several sub-fields as
explained after the MAC frame.
Duration/ID: if the field value is less than 32,768, the duration field contains the value
indicating the period of time in which the m,edium is occupied. This field is used for
setting the NAV for the virtual reservation mechanism using RTS/CTS and during
fragmentation.
Address 1 to 4: the four address fields contain standard IEEE 802 MAC address, as they
are known from other 802.x LANs.
Sequence control: Due to the acknowledgement mechanism frames may be duplicated.
Data: the MAC frame may contain arbitary is used to filter duplicates.
Checksum: Finally, a 32 bit checksum is used to protect the frame as it is common
practice in all 802.x networks.
MAC Management:
synchronization: functions to support finding a wireless LAN, synchronization of
internal clocks, generation of beacon signals.
BLUE TOOTH
Introduction:
A study group under IEEE 802.11 discussed wireless personal Area network under the following
criteria for blue tooth.
1. Market potential
What is the market for the available technology?
2. Compatibility
Compatible with IEEE 802
3. Distinct Identity
Topics like low cost ,low power which are not addressed in 802.11 is addressed.
4. Technical Feasibility
Building of Prototypes was considered important.
5. Economic Feasibility
The cost should be shared than the existing ones.
User Scenarios:
1. Connection of peripheral devices
- Now the treads is that the devices are connected to the system without wires.
- They need battery for power supply
2. Support of ad hoc networking
- To build the network for short duration any plan blue tooth can be used.
- Because small devices may not have WLAN adapters.
- Hence it can be done via blue tooth.
-
3. Bridging of networks
- Using Pico nets a mobile phone can be connected to laptop
- Mobile phones cannot have full WLAN adapters, hence is needs a blue
tooth.
-
Architecture:
Pico net:
A Pico net is a collection of Blue tooth devices
1. One device in the Pico net as a master (M)
2. Other device are connected to a master as slave(s)
3. Each pico net has a unique hopping pattern
4. Two additional types of devices are present in the Pico Net
a. Parked Device: They are the device which can not actively participate in the
Pico Nets but can be reactivated.
b. Stand by device: Device which do not participate are called stand by device.
M=Master
S=Slave
P=Parked
SB=Standby
Communication between different Pico nets takes place jumping between the nets.
Radio Layer:
- Radio layer define the carrier frequencies and output power.
- Blue tooth devices will be integrated into mobile devices and rely on battery power
- Blue tooth has to support multimedia data.
Base band Layer:
- Complex layer
- Function: perform frequency hopping for interference mitigation and medium access, defines
physical links and pocket formats.
- Within each slot the master or one of 7 slaves transmit data.
- After transmission the radio returns to the frequency required for hopping because every salve
will not have transmission, and cannot react on multi bit transmission.
- This is needed for synchronization.
Agent Advertisement
Agent advertisements are used to discover the home and foreign agents while moving from one
network area to network. The process is similar as when the internet nodes detect routers by ICMP
router discovery protocol (RFC 1256). Therefore the same RFC 1256 is used for agent discovery
with the support of mobility by attaching special extensions to ICMP messages. The Home Agent
and Foreign Agent periodically send a router advertisement ICMP messages in the form of beacon
frames. In this way they show their willingness to act as Mobile IP routers.
When the mobile node receives the advertisement; it compares the network part of the agent’s
IP address with the network part of its own IP address (Home address). A mismatch in network parts
indicates that mobile node is in a foreign network. The foreign agent provides foreign- agent
care-of-address through agent advertisement which is the address of foreign agent itself. Many nodes
can share the same care-of-address which reduces demand of already scarce IPv4 addresses and also
IPv6 addresses looking at the sprawl of mobile computing devices. It also reduces bandwidth
because foreign agent is end of the tunnel therefore messages from foreign agent to mobile node are
not encapsulated.
The following Extensions are applied to ICMP router Advertisement and are shown in Figure 1
Mobile-IP extension
1) Type = 16
2) Length = number of COA provided with the message. It is equal to 6+4*(no. of
addresses)
3) Registration lifetime = maximum lifetime specified by the agent in seconds which
the node can request during registration.
4) Sequence No. = total no. of advertisements sent during initialization.
5) The flags after registration lifetime explain the features of advertisement. They are
described as:
R-bit: registration with this agent is required even when the mobile node uses a co- located
COA.
B-bit: The Foreign agent is busy to take any registrations
H-bit: Agentis home agent
F-bit: Agent is foreign agent
M-bit: Minimal encapsulation is used for encapsulation
G-bit: Generic routing encapsulation is used
r-bit: was initially set to V in first version of mobile IP (RFC 2002) suggested use of header
compression and should be ignored.
T-bit: reverse tunneling.
The fields following the flags lists the COAs advertised.
The foreign agent should advertise at least one CoA. Home agents do not broadcast care-of-
addresses but they still broadcast mobility agent advertisements which the mobile node knows when
they return to their home network.
Agent Solicitation
The mobile node can also broadcast an agent solicitation based on RFC 1256 for router
solicitations. It will be answered by the foreign agent. A mobile node can search the foreign
agent using agent solicitation. To avoid flooding of the network, three solicitations are sent per
second as it enters a new network. This gap can be large for dynamic networks with moving
mobile nodes or the app’s which require continuous packet stream. If a node does not get reply for
agent solicitation, it decreases the rate of solicitations to avoid flooding of network.
If the mobile node moves to a network that has no foreign agents or all the agents are busy it can
acquire a temporary address through DHCP (RFC 2131) .The mobile node acts as its own foreign
agent and the address obtained as known as co-located care-of-address.
Registration
Once the care-of-address is achieved through the two steps describe as above the mobile node
registers it with its Home agent and informs about the current location where the packets
intended for it can be forwarded. The mobile node sends a registration request to the Home Agent
with its Care-of–address information. The Home Agent receives this request and accepts or reject it
andaccordingly sends a registration reply back to the mobile node. The process of registration
request depends on the location of COA.
It involves four steps
a. The Mobile node sends a registration request to foreign agent and at
the same time requests for forwarding services.
b. FA forwards the registration request to the Home agent of that mobile
node.
c. HA either accepts or rejects the request and sends a registration reply to the
FA.
d. FA relays this reply to the mobile node.
Duringthe registration process, the Home agent maintains mobile binding containing
the Home address, Care-of-address and registration lifetime. This is called binding of
the mobile node. Registration lifetime is negotiated during registration process
and represents validity of registration in seconds. It cannot be greater than
provided with agent advertisement. The registration is valid till that period and is
automatically deleted after the lifetime expires. The MN registers again before the
binding period expires when it moves to another foreign network or when it returns to
the Home network. This prevents mobility bindings of the nodes which are no longer
used.
The registration can be unsuccessful if there are too many tunnels at HA and it cannot
handle more requests or when there is authentication failure or HA is not reachable
to FA.
UDP packets used for the registration requests and reply. UDP header for registration
request contains the following fields
0 7 8 15 16 23 24 31
type 1 S B D M G R T x lifetime
home
address
home agent
COA
Identification
extensions …
Figure 4: Registration request format
74
in tunnels decapsulation at the end point.
• M bit indicates that the mode of encapsulation is minimal
encapsulation.
• G bit indicates generic routing encapsulation.
• T bit indicates reverse tunneling from the FA
• r & x are set to zero
• Life time = validity of registration in seconds. A zero indicates the
deregistration and all the bits set to one indicates infinite time.
Remaining fields are
• Source address of packet which is interface address of MN.
• Destination address is that of FA or HA depending on type of COA.
• COA of the MN at the new agent.
• Identification which is generated by mobile node to uniquely
identify a request and match it with registration reply. This field
protects against replay attacks of registrations.
• Extensions contain parameter for authentication.
Registration Reply:
0 7 8 15 16 31
type = 3 code lifetime
Home address
Home agent
COA
Identification
extensions …
Figure 5: Registration reply format
75
Encapsulation is the mechanism of taking a packet consisting of packet
header and data and putting it into the data part of new packet.
The reverse operation, taking a packet out of the data part of another
packet called decapsulation.
Dynamic host configuration protocol
The dynamic host configuration protocol is mainly used to simplify the
installation and maintenance of networked computers.
DNCP is based on a client/server model as shown in diagram.
DNCP clients sends a request to a server to which the server responds.
A client sends requests using MAC broadcasts to reach all devices in the
LAN.
DNCP relay might be needed to forward requests across inter-working units
to a DHCP server.
76
DHCP (Dynamic Host Configuration Protocol)
An IP address can be defined as a unique numeric identifier (address) that is
assigned to each computer operating in a TCP/IP based network. Manually
configuring computers with IP addresses and other TCP/IP configuration parameters
is not an intricate task. However, manually configuring thousands of workstations
with unique IP addresses would be a time consuming, and cumbersome experience.
When you manually assign IP addresses, you increase the risk of duplicating IP
address assignments, configuring the incorrectsubnet masks, and incorrectly
configuring other TCP/IP configuration parameters.
This is where the Dynamic Host Configuration Protocol (DHCP) becomes
important. The Dynamic Host Configuration Protocol (DHCP) is a service that does the
above mentioned tasks for administrators, thereby saving simplifying the administration
of IP addressing in TCP/IP based networks. TCP/IP configuration was basically a
manual process before the DHCP protocol was introduced. One of the main
disadvantages of manually assigning IP addresses to hundreds of computers is that it
could result in the assigned IP addresses not being unique.
In a TCP/IP based network, to uniquely identify computers on the network, each
computer must have a unique IP address. To communicate on the Internet and private
TCP/IP network, all hosts defined on the network must have IP addresses. The 32-bit IP
address identifies a particular host on the network.
circumstances:
DHCP server, you assign that computer a static IP address.
When you configure computers as important network servers such
as domain controllers, or DNS servers; you manually assign the IP
address to these computers.
DHCP functions at the application layer of the TCP/IP protocol stack. One of
the primary tasks of the protocol is to automatically assign IP addresses to DHCP
clients. A server running the DHCP service is called a DHCP server. The DHCP
protocol automates the configuration of TCP/IP clients because IP addressing occurs
through the system. You can configure a server as a DHCP server so that the DHCP
server can automatically assign IP
77
Addresses to DHCP clients, and with no manual intervention. IP addresses that
are assigned via a DHCP server are regarded as dynamically assigned IP addresses. The
DHCP server assigns IP addresses from a predetermined IP address range(s), called a
scope. The functions of the DHCP server are outlined below:
Dynamically assign IP addresses to DHCP clients.
Allocate the following TCP/IP configuration
information to DHCP clients: o Subnet mask
information.
Default gateway IP addresses.
Domain Name System (DNS) IP addresses.
Windows Internet Naming Service (WINS) IP addresses.
You can increase the availability of DHCP servers by using the 80/20 Rule if you
have two
DHCP servers located on different subnets.
The 80/20 Rule is applied as follows:
78
The framework for the DHCP protocol is defined in RFC 2131. The DHCP
protocol stems from the Bootstrap Protocol (BOOTP) protocol. BOOTP enables clients
to boot up from the network instead of booting up from the hard drive.
The DHCP server has a predefined pool of IP addresses, from which it allocates
IP addresses to DHCP clients. During the boot process, DHCP clients request IP
addresses, and obtain leases for IP addresses from the DHCP server.
When the DHCP client boots on the network, a negotiation process called the
DHCP lease process occurs between the DHCP server and client. The negotiation
process comprises of four messages, sent between the DHCP server and the DHCP
client.
Routing:
In wireless networks using an infrastructure , ells have been defined. Within a cell,
the base station can reach all mobile nodes without routing.
The very simple example already shows some fundamental differences between
wired networks and ad-hoc wireless networks related to routing.
- Asymmetric links
- Redundant links
79
- Interference
- Dynamic topology
Ad-hoc networks using mobile nodes face additional problems due to hardware
limitations. using the standard routing protocols with periodic updates wastes battery
power without sending any user and disables sleep modes.
Destination sequence distance vector:
- Destination sequence distance vector(DSDV) routing is an enhancement to
distance vector routing .
- DSDV can be considered historically is among the protocols currently.
- Distance vector routing is used as routing information protocol(RIP) in wired
networks.
- DSDV now adds two things to the distance vector algorithm.
- Sequence numbers
- Damping
Dynamic source routing:
Dynamic source routing(DSR) divides the task of routing into separate problems
- Route discovery
- Route maintenance
The basic principle of source routing is also used in fixed networks. Dynamic
source routing eliminates all periodic routing updates and work.
The basic algorithm for route discovery can be optimized in many ways.
- A node can cache path fragments from recent requests.
- A node can also update this cache from packet herders forwarding other packets.
- A node could request an explicit acknowledgement
Mobile transport layer
Traditional TCP:
Several mechanisms of the transmission control protocol that influence the
efficiency of TCP in am mobile environment.
Congestion control:
A transport layer such as TCP has been designed for fixed networks with fixed
end-systems.
80
Congestion may appear from time to time even in carefully designed networks.
Slow start:
- The behavior TCP shows after the detection of congestion is called slow start.
- The sender always calculates a congestion window for a receiver.
Fast Retransmit:
The sender can continue with the current congestion window. The sender
performs a fast recovery from the packet loss.
The other reason for activating slow start is a time-out due to a missing
acknowledgement.
TCP using fast retransmit /fast recovery interprets this congestion in the
network and activities the slow start mechanism.
81
GLOSSARY:
Mobile communication
Mobile hardware
Mobile software
82