You are on page 1of 129

UNIT I

WIRELESS COMMUNICATION FUNDAMENTALS Introduction Wireless transmission Frequencies for radio transmission Signals Antennas Signal Propagation Multiplexing Modulations Spread spectrum MAC SDMA FDMA TDMA CDMA Cellular Wireless Networks. INTRODUCTION Mobile computing means different things to different people. Ubiquitous, wireless and remote computing Wireless and mobile computing are not synonymous. Wireless is a transmission or information transport method that enables mobile computing. Aspects of mobility: user mobility: users communicate (wireless) anytime, anywhere, with anyone device portability: devices can be connected anytime, anywhere to the network Mobility Issues Bandwidth restrictions and variability Location-aware network operation o User may wake up in a new environment o Dynamic replication of data Querying wireless data & location-based responses Busty network activity during connections & handling disconnections Disconnection o OS and File System Issues - allow for disconnected operation o Database System Issues - when disconnected, based on local data Portability Issues Battery power restrictions Risks to data - Physical damage, loss, theft - Unauthorized access - encrypt data stored on mobiles - Backup critical data to fixed (reliable) hosts Small user interface - Small displays due to battery power and aspect ratio constraints - Cannot open too many windows - Difficult to click on miniature icons - Input - Graffiti, (Dictionary-based) Expectation - Gesture or handwriting recognition with Stylus Pen Voice matching or voice recognition APPLICATIONS Vehicles transmission of news, road condition, weather, music via DAB personal communication using GSM position via GPS local ad-hoc network with vehicles close-by to prevent accidents, guidance system, redundancy vehicle data (e.g., from busses, high-speed trains) can be transmitted in advance for maintenance Emergencies early transmission of patient data to the hospital, current status, first diagnosis Replacement of a fixed infrastructure in case of earthquakes, hurricanes, fire etc. crisis, war, ...

Travelling salesmen direct access to customer files stored in a central location consistent databases for all agents mobile office Replacement of fixed networks remote sensors, e.g., weather, earth activities flexibility for trade shows LANs in historic buildings Entertainment, education, outdoor Internet access intelligent travel guide with up-to-date location dependent information ad-hoc networks for multi user games Location dependent services Location aware services what services, e.g., printer, fax, phone, server etc. exist in the local environment Follow-on services automatic call-forwarding, transmission of the actual workspace to the current location Information services push: e.g., current special offers in the supermarket pull: e.g., where is the Black Forrest Cherry Cake? Support services caches, intermediate results, state information etc. follow the mobile device through the fixed network Privacy who should gain knowledge about the location Effects of device portability Power consumption limited computing power, low quality displays, small disks due to limited battery capacity CPU: power consumption ~ CV2f C: internal capacity, reduced by integration V: supply voltage, can be reduced to a certain limit f: clock frequency, can be reduced temporally higher probability, has to be included in advance into the design (e.g., defects, theft)

Loss of data

Limited user interfaces compromise between size of fingers and portability integration of character/voice recognition, abstract symbols Limited memory limited value of mass memories with moving parts Flash-memory or? as alternative

Wireless networks in comparison to fixed networks Higher loss-rates due to interference emissions of, e.g., engines, lightning

Restrictive regulations of frequencies frequencies have to be coordinated, useful frequencies are almost all occupied Low transmission rates local some Mbit/s, regional currently, e.g., 9.6kbit/s with GSM .Higher delays, higher jitter connection setup time with GSM in the second range, several hundred milliseconds for other wireless systems

Lower security, simpler active attacking radio interface accessible for everyone, base station can be simulated, thus attracting calls from mobile phones

Always shared medium secure access mechanisms important

Early history of wireless communication Many people in history used light for communication heliographs, flags (semaphore), ... 150 BC smoke signals for communication; (Polybius, Greece) 1794, optical telegraph, Claude Chappe

Here electromagnetic waves are of special importance: 1831 Faraday demonstrates electromagnetic induction J. Maxwell (1831-79): theory of electromagnetic Fields, wave equations (1864) H. Hertz (1857-94): demonstrates with an experiment the wave character of electrical transmission through space(1886, in Karlsruhe, Germany, at the location of todays University of Karlsruhe) Wireless systems: overview of the development

cellular phones 1981: NMT 450 1983: AM PS

satellites

cordless phones 1980: CT0 1984: CT1 1987: CT1+ 1989: CT 2

wireless L AN

1982: Inmarsat- A

1986: NMT 900

1988: Inmarsat-C 1991: D- AMPS 1992: Inmarsat-B Inmarsat-M

1991: CDMA 1992: GSM

199x: proprietary

1991: DECT 1995/96/97: IEEE 802.11, HIPERL AN

1993: PDC 1994: DCS 1800 analog digital

1998: Iridium 2005?: UMTS/IMT-2000

2005?: MBS, WATM

Areas of research in mobile communication Wireless Communication Mobility Portability power consumption limited computing power, sizes of display, ... usability Simple reference model used here location dependent services location transparency quality of service support (delay, jitter, security) transmission quality (bandwidth, error rate, delay) modulation, coding, interference media access, regulations

Influence of mobile communication to the LAYER MODEL Application layer service location new applications, multimedia adaptive applications Transport layer congestion and flow control quality of service Network layer addressing, routing, device location hand-over Data link layer authentication media access multiplexing media access control

Physical layer encryption modulation interference attenuation frequency WIRELESS TRANSMISSION - FREQUENCIES FOR RADIO TRANSMISSION Frequencies for communication

Frequencies for mobile communication VHF-/UHF-ranges for mobile radio simple, small antenna for cars deterministic propagation characteristics, reliable connections SHF and higher for directed radio links, satellite communication small antenna, focusing large bandwidth available Wireless LANs use frequencies in UHF to SHF spectrum some systems planned up to EHF limitations due to absorption by water and oxygen molecules (resonance frequencies) Weather dependent fading, signal loss caused by heavy rainfall etc. Frequencies and regulations ITU-R holds auctions for new frequencies, manages frequency bands worldwide (WRC, World Radio Conferences)
Europe Mobile phones NMT 453-457MHz, 463-467 MHz; GSM 890-915 MHz, 935-960 MHz; 1710-1785 MHz, 1805-1880 MHz CT1+ 885-887 MHz, 930-932 MHz; CT2 864-868 MHz DECT 1880-1900 MHz IEEE 802.11 2400-2483 MHz HIPERLAN 1 5176-5270 MHz USA AMPS, TDMA, CDMA 824-849 MHz, 869-894 MHz; TDMA, CDMA, GSM 1850-1910 MHz, 1930-1990 MHz; PACS 1850-1910 MHz, 1930-1990 MHz PACS-UB 1910-1930 MHz Japan PDC 810-826 MHz, 940-956 MHz; 1429-1465 MHz, 1477-1513 MHz PHS 1895-1918 MHz JCT 254-380 MHz

Cordless telephones

Wireless LANs

IEEE 802.11 2400-2483 MHz

IEEE 802.11 2471-2497 MHz

SIGNALS physical representation of data function of time and location signal parameters: parameters representing the value of data classification

o continuous time/discrete time o continuous values/discrete values o analog signal = continuous time and continuous values o digital signal = discrete time and discrete values signal parameters of periodic signals: period T, frequency f=1/T, amplitude A, phase shift sine wave as special periodic signal for a carrier: s(t) = At sin(2 ft t + t) Fourier representation of periodic signals

g (t )
1 0

1 c an sin(2nft) bn cos(2nft) 2 n 1 n 1
1 0 t t

Ideal periodic signal

Real composition (based on harmonics)

Different representations of signals amplitude (amplitude domain) frequency spectrum (frequency domain) phase state diagram (amplitude M and phase in polar coordinates)

Composed signals transferred into frequency domain using Fourier transformation Digital signals need ANTENNAS Isotropic radiator Radiation and reception of electromagnetic waves, coupling of wires to space for radio transmission Isotropic radiator: equal radiation in all directions (three dimensional) - only a theoretical reference antenna Real antennas always have directive effects (vertically and/or horizontally) Radiation pattern: measurement of radiation around an antenna infinite frequencies for perfect transmission Modulation with a carrier frequency for transmission (analog signal!)

Ideal isotropic radiator

z y x

z x

Simple dipoles Real antennas are not isotropic radiators but, e.g., dipoles with lengths /4 on car roofs or /2 as Hertzian dipole, shape of antenna proportional to wavelength

/4

/2

Example: Radiation pattern of a simple Hertzian dipole

Directed and Sectorized Often used for microwave connections or base stations for mobile phones (e.g., radio coverage of a valley)

Antennas: diversity Grouping of 2 or more antennas o multi-element antenna arrays Antenna diversity switched diversity, selection diversity receiver chooses antenna with largest output diversity combining combine output power to produce gain cophasing needed to avoid cancellation o

/2 /4 /4 /2

/2

SIGNAL PROPAGATION Transmission range communication possible low error rate Detection range detection of the signal possible no communication possible Interference range signal may not be detected signal adds to the background noise Signal propagation Propagation in free space always like light (straight line) Receiving power proportional to 1/d (d = distance between sender and receiver)

Receiving power additionally influenced by fading (frequency dependent) shadowing reflection at large obstacles scattering at small obstacles diffraction at edges

Shadowing Multipath propagation

Reflection

Scattering

Diffraction

Signal can take many different paths between sender and receiver due to reflection, scattering, diffraction Time dispersion: signal is dispersed over time Interference with neighbor symbols, Inter Symbol Interference (ISI) The signal reaches a receiver directly and phase shifted Distorted signal depending on the phases of the different parts Effects of mobility Channel characteristics change over time and location signal paths change different delay variations of different signal parts different phases of signal parts

Quick changes in the power received (short term fading) Additional changes in distance to sender obstacles further away Slow changes in the average power received (long term fading) MULTIPLEXING Multiplexing in 4 dimensions space (si) time (t) frequency (f) code (c)

Frequency Division Multiplexing - FDM The oldest used technique used for multiplexing. Possible when the useful bandwidth of the medium exceeds that of the signals it has to carry. Each signal is modulated on a different carrier frequency. This results in shifting the spectrum of the signal around the carrier frequency. Sufficient guard-band is given so those neighboring signals do not overlap in the frequency domain. At the receiving end each signal is extracted by first passing it through a band-pass filter and then demodulating with the same carrier frequency that was used to modulate the signal. The signals carried using FDM may be analog signals or may be analog signals representing digital data. However FDM is mostly a technique from the era of analog communications. In FDM a device uses some of the channel all of the time. FDM is used in radio and television broadcasting. FDM is also used in high capacity long distance links in the telephone network. Frequency division multiplexing (FDM) achieves multiplexing by using different carrier frequencies .Receiver can "tune" to specific frequency and extract modulation for that one channel .Frequencies must be separated to avoid interference Wastes potential signal bandwidth for guard channels.Only useful in media that can carry multiple signals with different frequencies - high-bandwidth required . Used in: The standard of the analog telephone network The standard in radio broadcasting The standard for video 1. Broadcast 2. Cable 3. Satellite

Frequency Division Multiplexing Diagram

Time Division Multiplexing - TDM Time division multiplexing is more suitable for digital data. TDM can be used when the data rate available on a communication link exceeds the data rate required by any one of the sources. In TDM each source that is to use the link fills up a buffer with data. A TDM multiplexer scans the buffers in some predetermined order and transmits bits from each source one after the other. Requires digital signaling & transmission Requires data rate = sum of inputs + framing Data rate much higher than equivalent analog bandwidth uses Separates data streams in time not frequency The standard of the modern digital telephone system

Code Division Multiplexing - CDM Each channel has a unique code. All channels use the same spectrum at the same time. Advantages: bandwidth efficient no coordination and synchronization necessary good protection against interference and tapping Disadvantages: lower user data rates more complex signal regeneration

k1

k2

k3

k4

k5

k6

MODULATIONS Digital modulation o digital data is translated into an analog signal (baseband) o ASK, FSK, PSK - main focus in this chapter o differences in spectral efficiency, power efficiency, robustness Analog modulation o o o o Basic schemes shifts center frequency of baseband signal up to the radio carrier Motivation smaller antennas (e.g., /4) Frequency Division Multiplexing medium characteristics

o Amplitude Modulation (AM) o Frequency Modulation (FM) o Phase Modulation (PM) Modulation and demodulation

Digital modulation Modulation of digital signals known as Shift Keying. Amplitude Shift Keying (ASK): very simple low bandwidth requirements very susceptible to interference Frequency Shift Keying (FSK): needs larger bandwidth Phase Shift Keying (PSK): more complex robust against interference

Advanced Frequency Shift Keying bandwidth needed for FSK depends on the distance between the carrier frequencies special pre-computation avoids sudden phase shifts MSK (Minimum Shift Keying) bit separated into even and odd bits, the duration of each bit is doubled depending on the bit values (even, odd) the higher or lower frequency, original or inverted is chosen the frequency of one carrier is twice the frequency of the other even higher bandwidth efficiency using a Gaussian low-pass filter GMSK (Gaussian MSK), used in GSM.

Advanced Phase Shift Keying BPSK (Binary Phase Shift Keying): bit value 0: sine wave bit value 1: inverted sine wave very simple PSK low spectral efficiency robust, used e.g. in satellite systems

QPSK (Quadrature Phase Shift Keying): 2 bits coded as one symbol symbol determines shift of sine wave needs less bandwidth compared to BPSK more complex Often also transmission of relative, not absolute phase shift: DQPSK - Differential QPSK (IS-136, PACS, PHS BPSK (Binary Phase Shift Keying): QPSK (Quadrature Phase Shift Keying):

10

11

00
Quadrature Amplitude Modulation Quadrature Amplitude Modulation (QAM): combines amplitude and phase modulation

01

it is possible to code n bits using one symbol 2n discrete levels, n=2 identical to QPSK bit error rate increases with n, but less errors compared to comparable PSK schemes

SPREAD SPECTRUM Effects of spreading and interference

DSSS (Direct Sequence Spread Spectrum) XOR of the signal with pseudo-random number (chipping sequence) many chips per bit (e.g., 128) result in higher bandwidth of the signal Advantages reduces frequency selective fading in cellular networks o base station scan use the same frequency range several base stations can detect and recover the signal o soft handover

Disadvantages precise power control necessary

FHSS (Frequency Hopping Spread Spectrum) Discrete changes of carrier frequency Two versions Advantages Disadvantages not as robust as DSSS simpler to detect FHSS (Frequency Hopping Spread Spectrum) frequency selective fading and interference limited to short period simple implementation uses only small portion of spectrum at any time Fast Hopping: several frequencies per user bit Slow Hopping: several user bits per frequency sequence of frequency changes determined via pseudo random number sequence

Frequency Hopping Spread Spectrum

Medium Access Control (MAC) MAC protocol which were developed for nodes at short distance did not show good performance for nodes at longer distance so another protocol has to be developed Known as 2p MAC Protocol. 802.11 protocols were good for devices which had no power supply issue frequent charging were available to them etc. 1. This protocol based devices were not good for certain operation like monitoring the natural habitat of wildlife. 2. Sampling the water level of dam. These applications do not require frequent human intervention and are required to run for a longer duration. To fulfill the requirement other protocol was developed sensor network (802.15.4) Energy Budgets:-Main points which were discussed in this were how its protocol helps in saving power by cleverly managing the time when device should sleep when to wake up. MAC protocol used in 802.15.4. Routing and tree formation in ZigBee: - Routing protocol was developed by Zigbee firm.

Wireless MAC Issues Wireless medium makes the MAC design more challenging than the wireline networks. The three important issues are: 1. Half Duplex operation > either send or receive but not both at a given time

2. Time varying channel 3. Burst channel errors

1. Half Duplex Operation In wireless, its difficult to receive data when the transmitter is sending the data, because: When node is transmitting, a large fraction of the signal energy leaks into the receiver path The transmitted and received power levels can differ by orders of magnitude The leakage signal typically has much higher power than the received signal ->Impossible to detect a received signal, while transmitting data Collision detection is not possible, while sending data As collision cannot be detected by the sender, all proposed protocols attempt to minimize the probability of collision -> Focus on collision avoidance

2. Time Varying Channel Three mechanisms for radio signal propagation Reflection occurs when a propagating wave impinges upon an object that has very large dimensions than the wavelength of the radio wave e.g. reflection occurs from the surface of the earth and from buildings and walls

Diffraction occurs when the radio path between the transmitter and the receiver is obstructed by a surface with sharp edges Scattering occurs when the medium through which the wave travels consists of objects with The received signal by a node is a superposition of time-shifted and attenuated versions of the ransmitted signals the received signal varies with time .The time varying signals (time varying channel) phenomenon also known as multipath propagation. The rate of variation of channel is determined by the coherence time of the hannel Coherence time is defined as time within which When a nodes received signal strength drops below a certain threshold the node is said to be in fade .Handshaking is widely used strategy to ensure the link quality is good enough for data communication. A successful handshake between a sender and a receiver (small message) indicates a good communication link. 3. Burst Channel Errors As a consequence of time varying channel and varying signals strengths errors are introduced inthe transmission (Very likely) for wire line networks the bit error rate (BER) is the probability of packet error is small .For wire line networks the errors are due to random For wireless networks the BER is as high.For wireless networks the errors are due to node being in fade as a result errors occur in a long burst. Packet loss due to burst errors - mitigation techniques Smaller packets Forward Error Correcting Codes Retransmissions (Acks) Location Dependent Carrier Sensing Location Dependent Carrier Sensing results in three types of nodes that protocols need to deal with: Hidden Nodes Even if the medium is free near the transmitter, it may not be free near the intended receiver Exposed Nodes Even if the medium is busy near the transmitter, it may be free near the intended receiver Capture Capture occurs when a receiver can cleanly receive a transmission from one of two simultaneous transmissions

Hidden Node/Terminal Problem A hidden node is one that is within the range of the intended destination but out of range of sender Node B can communicate with A and C both A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism C falsely thinks that the channel is idle Exposed Nodes An exposed node is one that is within the range of the sender but out of range of destination .when a nodes received signal strength drops below a certain threshold the node is said to be in fade .Handshaking is widely used strategy to ensure the link quality is good enough for data communication. A successful handshake between a sender and a receiver (small message) indicates a good communication link. In theory C can therefore have a parallel transmission with any node that cannot hear the transmission from B, i.e. out of range of B. But C will not transmit to any node because its an exposed node. Exposed nodes waste bandwidth. Capture Capture is said to occur when a receiver can cleanly receive a transmission from one of two simultaneous transmissions both within its range Assume node A and D transmit simultaneously to B. The signal strength received from D is much higher than that from A, and Ds transmission can be decoded without errors in presence of transmissions from A.D has captured A. Capture is unfair because it gives preference to nodes that are closer to the receiver. It may improve protocol performance MULTIPLE ACCESS FDMA It is an ANALOQUE technique in time. Synchronization the transmission bandwidth is partitioned to frequency slots different users has different RF carrier frequencies, i.e. Each user is assigned a particular frequency slot. users/signals are at the receiver by separated out FILTERING if all frequency slots are occupied then the system has reached its. TDMA It is a DIGITAL technique requires between users synchronization each user/signal is assigned a particular a time-frame) time slot. CELLULAR WIRELESS NETWORKS Implements space division multiplex: base station covers a certain transmission area (cell).Mobile stations communicate only via the base station Advantages of cell structures: higher capacity, higher number of users less transmission power needed more robust, decentralized base station deals with interference, transmission area etc. locally (within

Problems: fixed network needed for the base stations handover (changing from one cell to another) necessary interference with other cells

Cell sizes from some 100 m in cities to, e.g., 35 km on the country side (GSM) - even less for higher frequencies Frequency reuse only with a certain distance between the base stations Standard model using 7 frequencies:

f3 f5 f4 f1 f3 f2
Fixed frequency assignment: certain frequencies are assigned to a certain cell problem: different traffic load in different cells Dynamic frequency assignment: base station chooses frequencies depending on the frequencies already used in neighbor cells more capacity in cells with more traffic assignment can also be based on interference measurements

f2 f6 f4 f7 f1 f5

3 cell cluster

3 cell cluster with 3 sector antennas

Cell : Why Hexagon? In reality the cell is an irregular shaped circle, for design convenience and as a first order approximation, it is assumed to be regular polygons The hexagon is used for two reasons: A hexagonal layout requires fewer cells, therefore, fewer transmission site Less expensive compared to square and triangular cells

Irregular cell shape leads to inefficient use of the spectrum because of inability to reuse frequency on account of co channel interference uneconomical deployment of equipment, requiring relocation from one cell site to another

UNIT I WIRELESS COMMUNICATION FUNDAMENTALS Part- A 1. Define SAMA. Spread Aloha Multiple Access is a combination of CDMA and TDMA. The CDMA better suits for connection oriented services only and not for connection less bursty data traffic because it requires to program both sender and receiver to access different users with different codes. 2. Define CDMA. Code Division Multiple Access systems use codes with certain characteristics to separate different users. To enable access to the shared medium without interference. The users use the same frequency and time to transmit data. The main problem is to find good codes and to separate this signal from noise. The good code can be found the following 2 characteristic 1.Orthogonal, 2.AutoCorrelation. 3. What are the several versions in CSMA? There are several versions in CSMA, they are as follows a) Non-persistent CSMA b) p-persistent CSMA c) 1-persistent CSMA 4. What is meant by non-persistent CSMA? In, non-persistent CSMA, stations sense the carrier and start sending immediately if the medium is idle., if the medium is busy, the station pauses a random amount of time before sensing the medium again and repeating this pattern. 5. What is meant by p-persistent CSMA? In p-persistent CSMA system nodes also sense the medium, but only transmit with a probability of p. With the station deferring to the next slot with the probability 1-p, i.e. access is slotted in addition. 6. What is SDMA? Space Division Multiple Access (SDMA) is used for allocating separated spaces to users in wireless networks. The basis for the SDMA algorithm is formed by cells and sectorized antennas which constitute the infrastructure implementing space division multiplexing (SDM) 7. What is FDD? In FDMA, the base station and the mobile station establish a duplex channel. The two directions, mobile station to base station and vice versa are separated using different frequencies. This Scheme is called Frequency Division Duplex (FDD)

8. What are the 2 sub layers in DLC? Logical Link Control (LLC) Media Access Control (MAC)

9. List out the advantages of frequency division multiplexing. no dynamic coordination necessary works also for analog signals 10. List out the disadvantages of frequency division multiplexing. waste of bandwidth if the traffic is distributed unevenly inflexible guard spaces 11. Define time division multiplexing. A channel gets the whole spectrum for a certain amount of time 12. List out the advantages of time division multiplexing. only one carrier in the medium at any time throughput high even for many users 13. List out the disadvantages of time division multiplexing. precise synchronization necessary

14. Define code division multiplexing. Each channel has a unique code All channels use the same spectrum at the same time 15. Define Signal physical representation of data function of time and location signal parameters: parameters representing the value of data 16. Define Analog modulation. shifts center frequency of base band signal up to the radio carrier 17. What is Quadrature Amplitude Modulation? Quadrature Amplitude Modulation (QAM): combines amplitude and phase modulation it is possible to code n bits using one symbol 2n discrete levels, n=2 identical to QPSK bit error rate increases with n, but less errors compared to comparable PSK schemes 18. What is digital modulation? * Digital data is translated into an analog signal (baseband) * ASK, FSK, PSK - main focus in this chapter * Differences in spectral efficiency, power efficiency, robustness

UNIT1 - WIRELESS COMMUNICATION FUNDAMENTALS Part B 1. Explain different TDMA schemes in detail. Fixed TDMA, Classical TDMA, Slotted TDMA, Carrier sense multiple access, Demand assigned multiple access, PRMA Packet reservation multiple access, Reservation multiple access, Reservation TDMA, Multiple access with collision avoidance, Polling, Inhibit sense multiple access. 2. Explain multiplexing in detail. Frequency multiplex Time multiplex Code multiplex 3. Discuss Modulation techniques in detail. Digital modulation Analog modulation Basic schemes Amplitude Modulation (AM) Frequency Modulation (FM) Phase Modulation (PM) 4. Account on CDMA Scheme. Good code, Orthogonal, Autocorrelation, Spread aloha multiple access. 5. Explain FDMA in detail Segment the frequency band into Disjoint sub-bands. Terminals Signal Separation Advantages Disadvantages 6. Discuss SDMA in detail segment space into cells/sectors Terminals Signal Separation Advantages Disadvantages 7.Explain major types of networks. Satellite-based networks Cellular networks Cordless systems Fixed wireless access schemes

8. Explain types of Antennas in detail. Isotropic antenna (idealized) Radiates power equally in all directions Dipole antennas WhtHalf-wave dipole antenna (or Hertz antenna) Quarter-wave vertical antenna (or Marconi antenna) Parabolic Reflective Antenna 9. Explain the various applications of mobile computing. Various applications and explanation

IT1402 -MOBILE COMPUTING UNIT II TELECOMMUNICATION NETWORKS Telecommunication systems GSM GPRS DECT UMTS IMT-2000 Satellite Networks - Basics Parameters and Configurations Capacity Allocation FAMA and DAMA Broadcast Systems DAB - DVB. Telecommunication systems -GSM GPRS DECT UMTS IMT-2000 Building Blocks AMPS Advanced Mobile Phone System TACS Total Access Communication System NMT Nordic Mobile Telephone System

AMPS Advanced Mobile Phone System analog technology used in North and South America and approximately 35 other countries operates in the 800 MHz band using FDMA technology

TACS Total Access Communication System variant of AMPS deployed in a number of countries primarily in the UK

NMT Nordic Mobile Telephone System analog technology deployed in the Benelux countries and Russia operates in the 450 and 900 MHz band first technology to offer international roaming only within the Nordic countries

System Architecture
Mobile Stations (MS)

Base Transceiver Station (BTS)


Base Station Controller (BSC) Base Transceiver Station (BTS)

A interface

VLR HLR
Mobil Switchin e g Centr (MSC e )

Abis interface

Base Station (BS)

Um interface

G M S C

P S T N

Base Transceiver Station (BTS)

Base Station Controller (BSC) Base Transceiver Station (BTS)

Abis interface

Base Station (BS)

CCITT Signalling System No. 7 (SS7) interface

Mobile Station (MS) Mobile Equipment (ME) Subscriber Identity Module (SIM) Base Station Subsystem (BBS) Base Transceiver Station (BTS) Base Station Controller (BSC) Network Subsystem Mobile Switching Center (MSC) Home Location Register (HLR) Visitor Location Register (VLR) Authentication Center (AUC) Equipment Identity Register (EIR) Mobile Station: is a subscriber unit intended for use while on the move at unspecified locations. It could be a hand-held or a portable terminal. Base Station: a fixed radio station used for communication with MS. It is located at the centre of a cell and consist of Transmitters and Receivers. Mobile Switching Centre: it coordinates the routing of calls, do the billing, etc.

Mobile Station (MS) The Mobile Station is made up of two entities: 1. Mobile Equipment (ME) 2. Subscriber Identity Module (SIM) Mobile Equipment Produced by many different manufacturers Must obtain approval from the standardization body Uniquely identified by an IMEI (International Mobile Equipment Identity)

Subscriber Identity Module (SIM) Smart card containing the International Mobile Subscriber Identity (IMSI) Allows user to send and receive calls and receive other subscribed services Encoded network identification details Protected by a password or PIN Can be moved from phone to phone contains key information to activate the phone

Base Station Subsystem (BBS) Base Station Subsystem is composed of two parts that communicate across the standardized Abis interface allowing operation between components made by different suppliers 1. Base Transceiver Station (BTS) 1. Base Station Controller (BSC) Base Transceiver Station (BTS) Houses the radio transceivers that define a cell Handles radio-link protocols with the Mobile Station Speech and data transmissions from the MS are recoded Requirements for BTS: o ruggedness o reliability o portability o minimum costs

Base Station Controller (BSC) Manages Resources for BTS Handles call set up Location update Handover for each MS

Network Subsystem Mobile Switching Center (MSC) Switch speech and data connections between:

Base Station Controllers Mobile Switching Centers GSM-networks Other external networks Heart of the network Three main jobs: 1) Connects calls from sender to receiver 2) Collects details of the calls made and received 3) Supervises operation of the rest of the network components Home Location Registers (HLR) - contains administrative information of each subscriber - Current location of the mobile

Visitor Location Registers (VLR) - contains selected administrative information from the HLR - authenticates the user - tracks which customers have the phone on and ready to receive a call - periodically updates the database on which phones are turned on and ready to receive calls Authentication Center (AUC) mainly used for security data storage location and functional part of the network Ki is the primary element

Equipment Identity Register (EIR) Database that is used to track handsets using the IMEI (International Mobile Equipment Identity) Made up of three sub-classes: The White List, The Black List and the Gray List Optional database

Basic Features Provided by GSM Call Waiting - Notification of an incoming call while on the handset Call Hold - Put a caller on hold to take another call Call Barring - All calls, outgoing calls, or incoming calls Call Forwarding - Calls can be sent to various numbers defined by the user Multi Party Call Conferencing - Link multiple calls together Advanced Features Provided by GSM Calling Line ID - incoming telephone number displayed Alternate Line Service - one for personal calls - one for business calls Closed User Group - call by dialing last for numbers Advice of Charge - tally of actual costs of phone calls Fax & Data - Virtual Office / Professional Office Roaming - services and features can follow customer from market to market Advantages of GSM Crisper, cleaner quieter calls Security against fraud and eavesdropping International roaming capability in over 100 countries Improved battery life Efficient network design for less expensive system expansion Efficient use of spectrum Advanced features such as short messaging and caller ID

A wide variety of handsets and accessories High stability mobile fax and data at up to 9600 baud Ease of use with over the air activation, and all account information is held in a smart card which can be moved from handset to handset

UMTS (Universal Mobile Telephone System Reasons for innovations - new service requirements - availability of new radio bands User demands - seamless Internet-Intranet access - wide range of available services - compact, lightweight and affordable terminals - simple terminal operation - open, understandable pricing structures for the whole spectrum of available services UMTS Basic Parameter Frequency Bands (FDD : 2x60 MHz): 1920 to 1980 MHz (Uplink) 2110 to 2170 MHz (Downlink) Frequency Bands (TDD: 20 + 15 MHz): 1900 1920 MHz and 2010 2025 MHz RF Carrier Spacing: 4.4 - 5 MHz RF Channel Raster: 200 KHz Power Control Rate: 1500 Cycles per Second UMTS W-CDMA Architecture

GPRS General Packet Radio Service Definition: GPRS stands for General Packet Radio Service and is a second generation (2G) and third generation (3G)-or sometimes refered to as in-between both generations, 2.5G--wireless data service that extends GSM data capabilities for Internet access, multimedia messaging services, and early mobile Internet applications via the wireless application protocol (WAP), as well as other wireless data services. Features of GPRS GPRS was one of the earliest cell phone data access technologies, and more widespread particularly in Europe and Asia, though it was adopted by carriers in North America, such as Rogers in Canada and TMobile in the US. 2G (second generation) GPRS service had data rates of 56-114 kbit/second--akin to dial-up modem speeds. GPRS wireless networks were later enhance faster 3G (third generation) throughput speeds. T-Mobile's EDGE (enhanced Data Rates for Global Evolution), for example, delivers up to 4 times the GPRS rate. Both GPRS and Edge, however, are quickly being surpassed by even faster 4G (fourth generation) mobile data networks. Examples: GPRS, which refers to a mobile or wireless data service, is not the same as GPS, which refers to geolocation. GPRS data networks enable users to access Web data and rich content from their cell phones. Technical overview The GPRS core network allows 2G, 3G and WCDMA mobile networks to transmit IP packets to external networks such as the Internet. The GPRS system is an integrated part of the GSM network switching subsystem. Services offered GPRS extends the GSM Packet circuit switched data capabilities and makes the following services possible:

SMS messaging and broadcasting "Always on" internet access Multimedia messaging service (MMS) Push to talk over cellular (PoC) Instant messaging and presencewireless village Internet applications for smart devices through wireless application protocol (WAP) Point-to-point (P2P) service: inter-networking with the Internet (IP) Point-to-Multipoint (P2M) service: point-to-multipoint multicast and point-to-multipoint group calls

If SMS over GPRS is used, an SMS transmission speed of about 30 SMS messages per minute may be achieved. This is much faster than using the ordinary SMS over GSM, whose SMS transmission speed is about 6 to 10 SMS messages per minute. Protocols supported GPRS supports the following protocols:

Internet protocol IP. In practice, built-in mobile browsers use IPv4 since IPv6 was not yet popular. Point-to-point protocol (PPP). In this mode PPP is often not supported by the mobile phone operator but if the mobile is used as a modem to the connected computer, PPP is used to tunnel IP to the phone. This allows an IP address to be assigned dynamically (IPCP not DHCP) to the mobile equipment. X.25 connections. This is typically used for applications like wireless payment terminals, although it has been removed from the standard. X.25 can still be supported over PPP, or even over IP, but doing this requires either a network based router to perform encapsulation or intelligence built in to the end-device/terminal; e.g., user equipment (UE).

When TCP/IP is used, each phone can have one or more IP addresses allocated. GPRS will store and forward the IP packets to the phone even during handover. The TCP handles any packet loss (e.g. due to a radio noise induced pause). Hardware Devices supporting GPRS are divided into three classes: Class A Can be connected to GPRS service and GSM service (voice, SMS), using both at the same time. Such devices are known to be available today. Class B Can be connected to GPRS service and GSM service (voice, SMS), but using only one or the other at a given time. During GSM service (voice call or SMS), GPRS service is suspended, and then resumed automatically after the GSM service (voice call or SMS) has concluded. Most GPRS mobile devices are Class B. Class C Are connected to either GPRS service or GSM service (voice, SMS). Must be switched manually between one or the other service. A true Class A device may be required to transmit on two different frequencies at the same time, and thus will need two radios. To get around this expensive requirement, a GPRS mobile may implement the dual transfer mode (DTM) feature. A DTM-capable mobile may use simultaneous voice and packet data, with the network coordinating to ensure that it is not required to transmit on two different frequencies at the same time. Such mobiles are considered pseudo-Class A, sometimes referred to as "simple class A". Some networks support DTM since 2007

DECT Digital Enhanced Cordless Telecommunications The base unit and handset of a British Telecom DECT cordless telephone Digital Enhanced Cordless Telecommunications (Digital European Cordless Telecommunications), usually known by the acronym DECT, is a digital communication standard, which is primarily used for creating cordless phone systems. It originated in Europe, where it is the universal standard, replacing earlier cordless phone standards, such as 900 MHz CT1 and CT2. Beyond Europe, it has been adopted by Australia, and most countries in Asia and South America. North American adoption was delayed by United States radio frequency regulations. This forced development of a variation of DECT, called DECT 6.0, using a slightly different frequency range; the technology is nearly identical, but the frequency difference makes the technology incompatible with systems in other areas, even from the same manufacturer. DECT has almost universally replaced other standards in most countries where it is used, with the exception of North America. DECT is used primarily in home and small office systems, but is also available in many PBX systems for medium and large businesses. DECT can also be used for purposes other than cordless phones. Voice applications, such as baby monitors, are becoming common. Data applications also exist, but have been eclipsed by Wi-Fi. 3G cellular also competes with both DECT and Wi-Fi for both voice and data. Nowadays you can find DECT as well in special applications like Remote Controls for industrial applications. DECT handsets and bases from different manufacturers typically work together at the most basic level of functionality: making and receiving calls. The DECT standard includes a standardized interoperability profile for simple telephone capabilities, called GAP, which most manufacturers implement. The standard also contains several other interoperability profiles, for data and for radio local-loop services. Application The DECT standard fully specifies a means for a portable unit, such as a cordless telephone, to access a fixed telecoms network via radio. But, unlike the GSM standards, does not specify any internal aspects of the fixed network itself. Connectivity to the fixed network (which may be of many different kinds) is done through a base station or "Radio Fixed Part" to terminate the radio link, and a gateway to connect calls to the fixed network. In most cases the gateway connection is to the public switched telephone network or telephone jack, although connectivity with newer technologies such as Voice over IP has become available. There are also other devices such as some baby monitors utilizing DECT, and in these devices there is no gateway functionality. The DECT standard originally envisaged three major areas of application:

Domestic cordless telephony, using a single base station to connect one or more handsets to the public telecoms network. Enterprise premises cordless PABXs and wireless LANs, using many base stations for coverage. Calls continue as users move between different coverage cells, through a mechanism called handover. Calls can be both within the system and to the public telecoms network. Public access, using large numbers of base stations to provide high capacity building or urban area coverage as part of a public telecoms network.

Of these, the domestic application (cordless home telephones) has been extremely successful. The enterprise PABX market had some success, and all the major PABX vendors have offered DECT access options. The public access application did not succeed, since public cellular networks rapidly out-competed DECT by coupling their ubiquitous coverage with large increases in capacity and continuously falling costs. There has been only one major installation of DECT for public access: in early 1998 Telecom Italia launched a DECT network known as "Fido" after much

regulatory delay, covering major cities in Italy. The service was promoted for only a few months and, having peaked at 142,000 subscribers, was shut down in 2001. DECT has also been used for Fixed Wireless Access as a substitute for copper pairs in the "last mile" in countries such as India and South Africa. By using directional antennas and sacrificing some traffic capacity, cell coverage could extend to over 10 km. In Europe the power limit laid down for use of the DECT spectrum (250 mW peak) was expressed in ERP, rather than the more commonly-used EIRP, permitting the use of high-gain directional antennas to produce much higher EIRP and hence long ranges. The standard is also used in electronic cash terminals, traffic lights, and remote door openers. Features Typical abilities of a domestic DECT Generic Access Profile (GAP) system include:

Multiple handsets to one base station and one phone line socket. This allows several cordless telephones to be placed around the house, all operating from the same telephone jack. Additional handsets have a battery charger station which does not plug into the telephone system. Handsets can in many cases be used as intercoms, communicating between each other, and sometimes as walkie-talkies, intercommunicating without telephone line connection. Interference-free wireless operation to around 100 metres (109 yards) outdoors, much less indoors when separated by walls. Operates clearly in common congested domestic radio traffic situations, for instance, generally immune to interference from other DECT systems, Wi-Fi networks, video senders, Bluetooth technology, baby monitors and other wireless devices. Talk-time of several hours and standby time of several days on one battery charge.

Some systems offer:


A longer range between the telephone and base station (usable further from the base) Extended battery talk-time, sometimes up to 24 hours

Technical properties Some DECT properties:


Audio codec: G.726, G.711, G.722 (wideband), G.729.1 (wideband) and MPEG-4 ER LD AAC (wideband and super-wideband) Net bit rate: 32 kbit/s Frequency: 1880 MHz1900 MHz in Europe, 1900 MHz-1920 MHz in China,1893 MHz1906 MHz in Japan, 1910 MHz-1930 MHz in Latin America and 1920 MHz1930 MHz in the US and Canada, US DECT and DECT 6 products may NOT be used in the UK or Ireland as they cause and suffer from interference with the UK & Ireland 3G cellular networks with unlicensed use of such products being prohibited by UK agencies. As DECT and DECT 6.0 do not operate in the 2.4 GHz ISM band, they are not subject to the interference arising in this band from its use by 802.11b and 802.11g WiFi, and 2.4 GHz cordless phones. Carriers: 10 (1.728 MHz spacing) in Europe, 5 (1.728 MHz spacing) in the US Time slots: 2 x 12 (up and down stream) Channel allocation: dynamic Average transmission power: 10 mW (250 mW peak) in Europe, 4 mW (100 mW peak) in the US

The DECT physical layer uses:


Frequency division multiple access (FDMA), Time division multiple access (TDMA) and Time division duplex (TDD)

This means that the radio spectrum is divided into physical channels in two dimensions: frequency and time. The maximum allowed power for portable equipment as well as base stations is 250 mW. A portable device radiates an average of about 10 mW during a call as it is only using one of 24 time slots to transmit. The DECT media access control layer controls the physical layer and provides connection oriented, connectionless and broadcast services to the higher layers. The DECT data link layer uses LAPC (Link Access Protocol Control), a specially designed variant of the ISDN data link protocol called LAPD. They are based on HDLC. The DECT network layer always contains the following protocol entities:

Call Control (CC) Mobility Management (MM)

Optionally it may also contain others:


Call Independent Supplementary Services (CISS) Connection Oriented Message Service (COMS) Connectionless Message Service (CLMS)

All these communicate through a Link Control Entity (LCE). The call control protocol is derived from ISDN DSS1, which is a Q.931 derived protocol. Many DECT-specific changes have been made. The mobility management protocol includes many elements similar to the GSM protocol, but also includes elements unique to DECT. Unlike the GSM protocol, the DECT network specifications do not define cross-linkages between the operation of the entities (for example, Mobility Management and Call Control). The architecture presumes that such linkages will be designed into the interworking unit that connects the DECT access network to whatever mobility-enabled fixed network is involved. By keeping the entities separate, the handset is capable of responding to any combination of entity traffic, and this creates great flexibility in fixed network design without breaking full interoperability. DECT GAP is an interoperability profile for DECT. The intent is that two different products from different manufacturers that both conform not only to the DECT standard, but also to the GAP profile defined within the DECT standard, are able to interoperate for basic calling. The DECT standard includes full testing suites for GAP, and GAP products on the market from different manufacturers are in practice interoperable for the basic functions. Security The DECT media access control layer also provides encryption services with the DECT Standard Cipher (DSC). The encryption is fairly weak, using a 35-bit initialization vector and encrypting the voice stream with 64-bit encryption. The security algorithm has been broken. Another attack involves impersonating a DECT base station, which allows calls to be listened to, recorded, and re-routed to a different destination.

10

International Mobile Telecommunications (IMT) IMT 2000, also known as International Mobile Telecommunications 2000, is the ITU globally coordinated definition of 3G covering key issues such as frequency spectrum use and technical standards. Different types of 3G Networks specified by IMT 2000 ITU Recommendation ITU-R M.1457 specifies five types of 3G radio interfaces:

IMT-2000 CDMA Direct Spread, also known as UTRA FDD including WCDMA in Japan, ARIB / DoCoMo recommendation. UMTS is developed by 3GPP. IMT-2000 CDMA Multi-carrier, also known as Cdma2000 (3X) developed by 3GPP2. IMT2000 CDMA2000 includes 1X components, like cdma2000 1X EV-DO. IMT-2000 CDMA TDD, also known as UTRA TDD and TD-SCDMA. TD-SCDMA is developed in China and supported by TD-SCDMA Forum. IMT-2000 TDMA Single Carrier, also known as UWC-136 (Edge) supported by UWCC. IMT-2000 DECT supported by DECT Forum.

Features Data rates ITU has not provided a clear definition of the data rate users can expect from 3G equipment or providers. Thus users sold 3G service may not be able to point to a standard and say that the rates it specifies are not being met. While stating in commentary that "it is expected that IMT-2000 will provide higher transmission rates: a minimum data rate of 2 Mbit/s for stationary or walking users, and 384 kbit/s in a moving vehicle, the ITU does not actually clearly specify minimum or average rates or what modes of the interfaces qualify as 3G, so various rates are sold as 3G intended to meet customers expectations of broadband data. Security 3G networks offer greater security than their 2G predecessors. By allowing the UE (User Equipment) to authenticate the network it is attaching to, the user can be sure the network is the intended one and not an impersonator. 3G networks use the KASUMI block cipher instead of the older A5/1 stream cipher. However, a number of serious weaknesses in the KASUMI cipher have been identified. In addition to the 3G network infrastructure security, end-to-end security is offered when application frameworks such as IMS are accessed, although this is not strictly a 3G property. Applications of 3G The bandwidth and location information available to 3G devices gives rise to applications not previously available to mobile phone users. Some of the applications are:

Mobile TV Video on demand Video Conferencing Telemedicine Location-based services Global Positioning System (GPS) 11

SATELLITE NETWORKS History of satellite communication 1945 Arthur C. Clarke publishes an essay about Extra Terrestrial Relays 1957 first satellite SPUTNIK 1960 first reflecting communication satellite ECHO 1963 first geostationary satellite SYNCOM 1965 first commercial geostationary satellite Satellit Early Bird (INTELSAT I): 240 duplex telephone channels or 1 TV channel, 1.5 years lifetime 1976 three MARISAT satellites for maritime communication 1982 first mobile satellite telephone system INMARSAT-A 1988 first satellite system for mobile phones and data communication INMARSAT-C 1993 first digital satellite telephone system 1998 global satellite systems for small mobile phones Applications Traditionally weather satellites radio and TV broadcast satellites military satellites satellites for navigation and localization (e.g., GPS) Telecommunication global telephone connections backbone for global networks connections for communication in remote places or underdeveloped areas global mobile communication satellite systems to extend cellular phone systems (e.g., GSM orAMPS) Classical satellite systems

Basics Satellites in circular orbits attractive force Fg = m g (R/r) centrifugal force Fc = m r m: mass of the satellite R: radius of the earth (R = 6370 km) r: distance to the center of the earth g: acceleration of gravity (g = 9.81 m/s) : angular velocity ( = 2 f, f: rotation frequency)

12

Stable orbit Fg = Fc

Basics o o o o o o o o Elliptical or circular orbits Complete rotation time depends on distance satellite-earth Inclination: angle between orbit and equator Elevation: angle between satellite and horizon LOS (Line of Sight) to the satellite necessary for connection 1. High elevation needed, less absorption due to e.g. buildings Uplink: connection base station - satellite Downlink: connection satellite - base station Typically separated frequencies for uplink and downlink 1. Transponder used for sending/receiving and shifting of frequencies 2. Transparent transponder: only shift of frequencies 3. Regenerative transponder: additionally signal regeneration

IElevation

Link budget of satellites Parameters like attenuation or received power determined by four parameters: Sending power Gain of sending antenna Distance between sender and receiver Gain of receiving antenna Problems Varying strength of received signal due to multipath propagation Interruptions due to shadowing of signal (no LOS) possible solutions Link Margin to eliminate variations in signal strength Satellite diversity (usage of several visible satellites at the same time) helps to use less sending power

13

L: Loss f: carrier frequency r: distance c: speed of light ORBITS Four different types of satellite orbits can be identified depending on the shape and diameter of the orbit: GEO: geostationary orbit, ca. 36000 km above earth surface LEO (Low Earth Orbit): ca. 500 - 1500 km MEO (Medium Earth Orbit) or ICO (Intermediate Circular Orbit): ca. 6000 - 20000 km HEO (Highly Elliptical Orbit) elliptical orbits

Geostationary satellites Orbit 35,786 km distance to earth surface, orbit in equatorial plane (inclination 0) Complete rotation exactly one day, satellite is synchronous to earth rotation Fix antenna positions, no adjusting necessary Satellites typically have a large footprint (up to 34% of earth surface!), therefore difficult to reuse frequencies Bad elevations in areas with latitude above 60 due to fixed position above the equator High transmit power needed High latency due to long distance (ca. 275 ms) Not useful for global coverage for small mobile phones and data transmission, typically used for radio and TV transmission LEO systems Orbit ca. 500 - 1500 km above earth surface Visibility of a satellite ca. 10 - 40 minutes Global radio coverage possible Latency comparable with terrestrial long distance Connections, ca. 5 - 10 ms Smaller footprints, better frequency reuse But now handover necessary from one satellite to another Many satellites necessary for global coverage More complex systems due to moving satellites Examples: Iridium (start 1998, 66 satellites) Global star (start 1999, 48 satellites)

14

MEO systems Orbit ca. 5000 - 12000 km above earth surface Comparison with LEO systems: Slower moving satellites Less satellites needed Simpler system design For many connections no hand-over needed Higher latency, ca. 70 - 80 ms Higher sending power needed Special antennas for small footprints needed Example: ICO (Intermediate Circular Orbit, Inmarsat) start ca. 2000 Routing One solution: inter satellite links (ISL) Reduced number of gateways needed Forward connections or data packets within the satellite network as long as possible Only one uplink and one downlink per direction needed for the connection of two mobile phones Problems: More complex focusing of antennas between satellites High system complexity due to moving routers Higher fuel consumption Thus shorter lifetime Iridium and Teledesic planned with ISL Other systems use gateways and additionally terrestrial networks Localization of mobile stations Mechanisms similar to GSM Gateways maintain registers with user data HLR (Home Location Register): static user data VLR (Visitor Location Register): (last known) location of the mobile station SUMR (Satellite User Mapping Register): Satellite assigned to a mobile station Positions of all satellites Registration of mobile stations Localization of the mobile station via the satellites position Requesting user data from HLR Updating VLR and SUMR Calling a mobile station Localization using HLR/VLR similar to GSM Connection setup using the appropriate satellite Handover in satellite systems Several additional situations for handover in satellite systems compared to cellular terrestrial mobile phone networks caused by the movement of the satellites Intra satellite handover Handover from one spot beam to another Mobile station still in the footprint of the satellite, but in another cell Inter satellite handover Handover from one satellite to another satellite Mobile station leaves the footprint of one satellite

15

Gateway handover Handover from one gateway to another Mobile station still in the footprint of a satellite, but gateway leaves the footprint Inter system handover Handover from the satellite network to a terrestrial cellular network Mobile station can reach a terrestrial network again which might be cheaper, has a lower latency etc. Overview of LEO/MEO systems

FDMA - Frequency Division Multiple Access

Frequency Division Multiple Access or FDMA is a channel access method used in multiple-access protocols as a channelization protocol. FDMA gives users an individual allocation of one or several frequency bands, or channels. It is particularly commonplace in satellite communication. FDMA, like other Multiple Access systems, coordinates access between multiple users. Alternatives include TDMA, CDMA, or SDMA. These protocols are utilized differently, at different levels of the theoretical OSI model. Disadvantage: Crosstalk may cause interference among frequencies and disrupt the transmission. Features

In FDMA all users share the satellite simultaneously but each user transmits at single frequency. FDMA can be used with both analog and digital signal. FDMA requires high-performing filters in the radio hardware, in contrast to TDMA and CDMA. FDMA is not vulnerable to the timing problems that TDMA has. Since a predetermined frequency band is available for the entire period of communication, stream data (a continuous flow of data that may not be packetized) can easily be used with FDMA. Due to the frequency filtering, FDMA is not sensitive to near-far problem which is pronounced for CDMA. Each user transmits and receives at different frequencies as each user gets a unique frequency slot

16

FDMA is distinct from frequency division duplexing (FDD). While FDMA allows multiple users simultaneous access to a transmission system, FDD refers to how the radio channel is shared between the uplink and downlink (for instance, the traffic going back and forth between a mobile-phone and a mobile phone base station). Frequencydivision multiplexing (FDM) is also distinct from FDMA. FDM is a physical layer technique that combines and transmits low-bandwidth channels through a high-bandwidth channel. FDMA, on the other hand, is an access method in the data link layer. FDMA also supports demand assignment in addition to fixed assignment. Demand assignment allows all users apparently continuous access of the radio spectrum by assigning carrier frequencies on a temporary basis using a statistical assignment process. The first FDMA demand-assignment system for satellite was developed by COMSAT for use on the Intelsat series IVA and V satellites. There are two main techniques:

Multi-channel per-carrier (MCPC) Single-channel per-carrier (SCPC)

Hints Satellite frequency is already broken into bands, and is broken in to smaller channels in Frequency Division Multiple Access (FDMA). Overall bandwidth within a frequency band is increased due to frequency reuse (a frequency is used by two carriers with orthogonal polarization). The number of sub-channels is limited by three factors: o Thermal noise (too weak a signal will be effected by background noise). o Intermodulation noise (too strong a signal will cause noise). o Crosstalk (cause by excessive frequency reusing). FDMA can be performed in two ways: o Fixed-assignment multiple access (FAMA): The sub-channel assignments are of a fixed allotment. Ideal for broadcast satellite communication. o Demand-assignment multiple access (DAMA): The sub-channel allotment changes based on demand. Ideal for point to point communication.

DAMA - Demand Assigned Multiple Access

Demand Assigned Multiple Access (DAMA) is a technology used to assign a channel to clients that don't need to use it constantly. DAMA systems assign communication channels based on requests issued from user terminals to a network control system. When the circuit is no longer in use, the channels are then returned to the central pool for reassignment to other users. Channels are typically a pair of carrier frequencies (one for transmit and one for receive), but can be other fixed bandwidth resources such as timeslots in a TDMA burst plan or even physical party line channels. Once a channel is allocated to a given pair of nodes, it is not available to other users in the network until their session is finished. It allows utilizing of one channel (radio or baseband frequency, timeslot, etc.) by many users sequentially at different times. This technology is mainly useful with sparsely used networks of transient clients, as opposed to PAMA (Permanently Assigned Multiple Access). By using DAMA technology the number of separate nodes that can use a limited pool of circuits can be greatly increased at the expense of no longer being able 17

to provide simultaneous access for all possible pairs of nodes. A five-channel DAMA network can only have five simultaneous conversations but could have any number of nodes. A five-channel PAMA network permanently supports five simultaneous conversations, with channel ownership remaining with their permanently assigned nodes even when idle. DAMA and PAMA are related only to channel/resource allocation and should not be confused with the Multiple access/multiplexing methods (such as FDMA frequencies, TDMA slots, CDMA codes, or others) intended to divide a single communication channel into multiple virtual channels. These systems typically use resource allocation protocols that allow a more rapid (although often less deterministic, consider CDMA collisions) near-real-time allocation of bandwidth based on demand and data priority. However, in sparsely allocated multiple-access channels, DAMA can be used to allocate the individual virtual channel resources provided by the multiple-access channel. This is most common in environments that are sufficiently sparsely utilized that there is no need to add complexity just to recover "conversation gap" idle periods. DAMA is widely used in satellite communications, especially in VSAT systems. It is very effective in environments comprising multiple users each having a low to moderate usage profile. DAMA is often used in military environments due to the relative simplicity of implementation, ease of modeling, and the fact that military usage profiles are a very good fit. In military SATCOM, it has the added advantage that it can function in a bent pipe environment, thus requires no special security or coordination hardware on the satellite. This allows the master and slave ground stations to be upgraded repeatedly to change or improve security and compression without requiring an expensive satellite replacement. DAMA Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length) Reservation can increase efficiency to 80%
a sender reserves a future time-slot sending within this reserved time-slot is possible without collision reservation also causes higher delays typical scheme for satellite links Explicit Reservation according to Roberts (Reservation-ALOHA) Implicit Reservation (PRMA) Reservation-TDMA

Examples for reservation algorithms:

Access method DAMA: Explicit Reservation Explicit Reservation (Reservation Aloha): Two modes: ALOHA mode for reservation: Competition for small reservation slots, collisions possible reserved mode for data transmission in reserved slots (no collisions possible) Important for all stations to keep the reservation list consistent. Thus all stations have to synchronize periodically

18

Broadcasting Systems Digital Audio Broadcasting Digital Audio Broadcasting (DAB) is a digital radio technology for broadcasting radio stations, used in several countries, particularly in Europe. As of 2006, approximately 1,002 stations worldwide broadcast in the DAB format. The DAB standard was initiated as a European research project in the 1980s. The Norwegian Broadcasting Corporation (NRK) launched the very first DAB channel in the world on June 1 1995 (NRK Klassisk), and the BBC and SR launched their first DAB digital radio broadcasts in September 1995. DAB receivers have been available in many countries since the end of the nineties. DAB may offer more radio programmes over a specific spectrum than analogue FM radio. DAB is more robust with regard to noise and multipath fading for mobile listening, since DAB reception quality first degrades rapidly when the signal strength falls below a critical threshold, whereas FM reception quality degrades slowly with the decreasing signal. An unblinded "informal listening test" by Sverre Holm has shown that for stationary listening the audio quality on DAB is subjectively lower than FM stereo (but this may be due to observer bias). Most stations using a bit rate of 128 kbit/s or less, with the MP2 audio codec, which requires 160 kbit/s to achieve perceived FM quality. 128 kbit/s gives better dynamic range or signal-to-noise ratio than FM radio, but a more smeared stereo image, and an upper cutoff frequency of 14 kHz, corresponding to 15 kHz of FM radio.[5] However, "CD sound quality" with MP2 is possible "with 256..192 kbps". An upgraded version of the system was released in February 2007, which is called DAB+. DAB is not forward compatible with DAB+, which means that DAB-only receivers will not be able to receive DAB+ broadcasts.[7] DAB+ is approximately twice as efficient as DAB due to the adoption of the AAC+ audio codec, and DAB+ can provide high quality audio with as low as 64 kbit/s. Reception quality will also be more robust on DAB+ than on DAB due to the addition of Reed-Solomon error correction coding. In spectrum management, the bands that are allocated for public DAB services, are abbreviated with T-DAB, where the "T" stands for terrestrial. More than 20 countries provide DAB transmissions, and several countries, such as Australia, Italy, Malta, Switzerland and Germany, have started transmitting DAB+ stations. See Countries using DAB/DMB. However, DAB radio has still not replaced the old FM system in popularity. Benefits of DAB Current AM and FM terrestrial broadcast technology is well established, compatible, and cheap to manufacture. Benefits of DAB over analogue systems are explained below. Improved features for users DAB radios automatically tune to all the available stations, offering a list for the user to select from. DAB can carry "radiotext" (in DAB terminology, Dynamic Label Segment, or DLS) from the station giving real-time information such as song titles, music type and news or traffic updates. Advance programme guides can also be transmitted. A similar feature also exists on FM in the form of the RDS. (However, not all FM receivers allow radio stations to be stored by name.) DAB receivers can display time of day as encoded into transmissions, so is automatically corrected when travelling between time zones and when changing to or from Daylight Saving. This is not implemented on all receivers, and some display time only when in "Standby" mode.

19

Some radios offer a pause facility on live broadcasts, caching the broadcast stream on local flash memory, although this function is limited. More stations DAB is not more bandwidth efficient than analogue measured in programmes per MHz of a specific transmitter (the so called link spectral efficiency). However, it is less susceptible to co-channel interference (cross talk), which makes it possible to reduce the reuse distance, i.e. use the same radio frequency channel more densely. The system spectral efficiency (the average number of radio programmes per MHz and transmitter) is a factor three more efficient than analog FM for local radio stations, as can be seen in the above numerical example. For national and regional radio networks, the efficiency is improved by more than an order of magnitude due to the use of SFNs. In that case, adjacent transmitters use the same frequency. In certain areas particularly rural areas the introduction of DAB gives radio listeners a greater choice of radio stations. For instance, in South Norway, radio listeners experienced an increase in available stations from 6 to 21 when DAB was introduced in November 2006. Reception quality The DAB standard integrates features to reduce the negative consequences of multipath fading and signal noise, which afflict existing analogue systems. Also, as DAB transmits digital audio, there is no hiss with a weak signal, which can happen on FM. However, radios in the fringe of a DAB signal, can experience a "bubbling mud" sound interrupting the audio and/or the audio cutting out altogether. Due to sensitivity to doppler shift in combination with multipath propagation, DAB reception range (but not audio quality) is reduced when traveling speeds of more than 120 to 200 km/h, depending on carrier frequency. Less pirate interference The specialised nature and cost of DAB broadcasting equipment provide barriers to pirate radio stations broadcasting on DAB. In cities such as London with large numbers of pirate radio stations broadcasting on FM, this means that some stations can be reliably received via DAB in areas where they are regularly difficult or impossible to receive on FM due to pirate radio interference. Variable bandwidth Mono talk radio, news and weather channels and other non-music programs need significantly less bandwidth than a typical music radio station, which allows DAB to carry these programmes at lower bit rates, leaving more bandwidth to be used for other programs. However, this had led to the situation where some stations are being broadcast in mono Transmission costs It is common belief that DAB is more expensive to transmit than FM. It is true that DAB uses higher frequencies than FM and therefore there is a need to compensate with more transmitters, higher radiated powers, or a combination, to achieve the same coverage. A DAB network is also more expensive than an FM network. However, the last couple of years have seen significant improvement in power efficiency for DAB-transmitters. This efficiency originates from the ability a DAB network has in broadcasting more channels per network. One network can broadcast 6-10 channels (with MPEG audio codec) or 10-16 channels (with HE AAC codec). Hence, it is

20

thought that the replacement of FM-radios and FM-transmitters with new DAB-radios and DAB-transmitters will not cost any more as opposed to newer FM facilities. Cheaper transmission costs is backed by independent network studies from Teracom (Sweden) and SSR/SRG (Switzerland). Among other things they show that DAB is up to 6 times less expensive than FM. Disadvantages of DAB Reception quality The reception quality on DAB can be poor even for people that live well within the coverage area. The reason for this is that the old version of DAB uses weak error correction coding, so that when there are a lot of errors with the received data not enough of the errors can be corrected and a "bubbling mud" sound occurs. In some cases a complete loss of signal can happen. This situation will be improved upon in the new DAB standard (DAB+, discussed below) that uses stronger error correction coding and as additional transmitters are built. Audio Quality Broadcasters have been criticized for squeezing in more stations per ensemble than recommended, by:

Minimizing the bit-rate, to the lowest level of sound-quality that listeners are willing to tolerate, such as 128 kbit/s for stereo and even 64 kbit/s for mono speech radio. Having few digital channels broadcasting in stereo.

Signal delay The nature of a SFN is such that the transmitters in a network must broadcast the same signal at the same time. To achieve synchronization, the broadcaster must counter any differences in propagation time incurred by the different methods and distances involved in carrying the signal from the multiplexer to the different transmitters. This is done by applying a delay to the incoming signal at the transmitter based on a timestamp generated at the multiplexer, created taking into account the maximum likely propagation time, with a generous added margin for safety. Delays in the receiver due to digital processing (e.g. deinterleaving) add to the overall delay perceived by the listener. [19] The signal is delayed by 24 seconds depending on the decoding circuitry used. This has disadvantages:

DAB radios are out of step with live events, so the experience of listening to live commentaries on events being watched is impaired; Delayed time signals : Even in a well-defined network with a fixed delay, the listener has to apply an offset when using the broadcast time signal to set a clock. Listeners using a combination of analog (AM or FM) and DAB radios (e.g. in different rooms of a house) will hear a confusing mixture when both receivers are within earshot.

Coverage As DAB is at a relatively early stage of deployment, DAB coverage is poor in nearly all countries in comparison to the high population coverage provided by FM. Compatibility In 2006 tests began using the much improved HE-AAC codec for DAB+. Virtually none of the receivers made before 2008 support the new codec, however, thus making them partially obsolete once DAB+ broadcasts begin and completely obsolete once the old MPEG-1 Layer 2 stations are switched off. However new receivers are both DAB and DAB+ compatible.

21

Power requirements As DAB requires digital signal processing techniques to convert from the received digitally encoded signal to the analogue audio content, the complexity of the electronic circuitry required to do this is high. This translates into needing more power to effect this conversion than compared to an analogue FM to audio conversion, meaning that portable receiving equipment will tend to have a shorter battery life, or require higher power (and hence more bulk). This means that they use more energy than analogue Band II VHF receivers. As an indicator of this increased power consumption, some radio manufacturers quote the length of time their receivers can play on a single charge. For a commonly used FM/DAB-receiver from manufacturer PURE, this is stated as: DAB 10 hours, FM 22 hours. Use of Licensed Codec The use of MPEG and latterly AAC has prompted criticism of the fact that a (large) public system is financially supporting a private company. In general, an open system will permit equipment to be bought from various sources in competition with each other but by selecting a single vendor of codec, with which all equipment must be compatible, this is not possible. Digital Video Broadcasting Digital Video Broadcasting (DVB) is a suite of internationally accepted open standards for digital television. DVB standards are maintained by the DVB Project, an international industry consortium with more than 270 members, and they are published by a Joint Technical Committee (JTC) of European Telecommunications Standards Institute (ETSI), European Committee for Electrotechnical Standardization (CENELEC) and European Broadcasting Union (EBU). Many aspects of DVB are patented, including elements of the MPEG video coding and audio coding. Transmission DVB systems distribute data using a variety of approaches, including:

Satellite: DVB-S, DVB-S2 and DVB-SH o DVB-SMATV for distribution via SMATV Cable: DVB-C, DVB-C2 Terrestrial television: DVB-T, DVB-T2 o Digital terrestrial television for handhelds: DVB-H, DVB-SH Microwave: using DTT (DVB-MT), the MMDS (DVB-MC), and/or MVDS standards (DVB-MS)

These standards define the physical layer and data link layer of the distribution system. Devices interact with the physical layer via a synchronous parallel interface (SPI), synchronous serial interface (SSI), or asynchronous serial interface (ASI). All data is transmitted in MPEG transport streams with some additional constraints (DVB-MPEG). DVB has established a 3D TV group (CM-3DTV) to identify "what kind of 3D-TV solution does the market want and need, and how can DVB play an active part in the creation of that solution?" The CM-3DTV group held a DVB 3DTV Kick-off Workshop in Geneva on January 25, 2010, followed by the first CM-3DTV meeting the next day.[3] DVB now defines a new standard for 3D video broadcast: DVB 3D-TV. Content Besides digital audio and digital video transmission, DVB also defines data connections (DVB-DATA - EN 301 192) with return channels (DVB-RC) for several media (DECT, GSM, PSTN/ISDN, satellite etc.) and protocols (DVBIPTV: Internet Protocol; DVB-NPI: network protocol independent).

22

Older technologies such as teletext (DVB-TXT) and vertical blanking interval data (DVB-VBI) are also supported by the standards to ease conversion. However, for many applications more advanced alternatives like DVB-SUB for subtitling are available. Encryption and metadata The conditional access system (DVB-CA) defines a Common Scrambling Algorithm (DVB-CSA) and a physical Common Interface (DVB-CI) for accessing scrambled content. DVB-CA providers develop their wholly proprietary conditional access systems with reference to these specifications. Multiple simultaneous CA systems can be assigned to a scrambled DVB program stream providing operational and commercial flexibility for the service provider. DVB is also developing a Content Protection and Copy Management system for protecting content after it has been received (DVB-CPCM), which is intended to allow flexible use of recorded content on a home network or beyond, while preventing unconstrained sharing on the Internet. DVB-CPCM has been the source of much controversy in the popular press and It is said that CPCM is the DVB's answer to the failed American Broadcast Flag. DVB transports include metadata called Service Information (DVB-SI, ETSI EN 300 468, ETSI TR 101 211) that links the various elementary streams into coherent programs and provides human-readable descriptions for electronic program guides as well as for automatic searching and filtering. Recently, DVB has adopted a profile of the metadata defined by the TV-Anytime Forum (DVB-TVA, ETSI TS 102323). This is an XML Schema based technology and the DVB profile is tailored for enhanced Personal Digital Recorders. DVB lately also started an activity to develop a service for IPTV (DVB-IPI, ETSI TR 102033, ETSI TS 102034, ETSI TS 102814) which also includes metadata definitions for a broadband content guide (DVB-BCG, ETSI TS 102 539). Software platform The DVB Multimedia Home Platform (DVB-MHP) defines a Java-based platform for the development of consumer video system applications. In addition to providing abstractions for many DVB and MPEG-2 concepts, it provides interfaces for other features like network card control, application download, and layered graphics. Return channel DVB has standardized a number of return channels that work together with DVB(-S/T/C) to create bi-directional communication. RCS is short for Return Channel Satellite, and specifies return channels in C, Ku and Ka frequency bands with return bandwidth of up to 2 Mbit/s. DVB-RCT is short for Return Channel Terrestrial, specified by ETSI EN 301958. Adoption DVB-S and DVB-C were ratified in 1994. DVB-T was ratified in early 1997. The first commercial DVB-T broadcasts were performed by the United Kingdom's Digital TV Group in late 1998. In 2003 Berlin, Germany was the first area to completely stop broadcasting analog TV signals. Most European countries are fully covered by digital television and many have switched off PAL/SECAM services. In Europe, as well as in Australia, South Africa and India, DVB is used throughout. This also holds true for cable and satellite in most Asian, African and many South American countries. Many of these have not yet selected a format for digital terrestrial broadcasts (DTTV) and a few (Canada, El Salvador, Honduras, Mexico, South Korea and the United States) have chosen ATSC instead of DVB-T.

23

UNIT II

TELECOMMUNICATION SYSTEMS

Part A 1) What are the four types of handover available in GSM? 1. Intra cell Handover 2. Inter cell Intra BSC Handover 3. Inter BSC Intra MSC handover 4. Inter MSC Handover 2) What are the categories of Mobile services? Bearer services Tele services Supplementary services 3) What are the services provided by supplementary services? User identification Call redirection Call forwarding Closed user groups Multiparty Communication 4) What are types of Handover? Intra-cell handover Inter-cell, intra- BSC handover Inter-BSC, intra-MSC handover Inter MSC handover 5) What is meant by GPRS? The General Packet Radio Service provides packet mode transfer for applications that exhibit traffic patterns such as frequent transmission of small volumes. 6) What are subsystems in GSM system? Radio subsystem (RSS) Network & Switching subsystem (NSS) Operation subsystem (OSS) 7) What is the information in SIM? Card type, serial no, list of subscribed services Personal Identity Number (PIN) Pin Unlocking Key (PUK) An Authentication Key (KI) 8) Define Normal Burst? The frame used for normal data transmission within a time slot is called Normal Burst. 9) What are the logical channels in GSM? Traffic channel(TCH) Control channel(CCH)

10) What is the function of Medium Access Control Layer? The functions of Medium Access Control Layer is responsible for establishes, maintains, and releases channels for higher layers by activating and deactivating physical channels. 11) What is Handover? The satellite is the base station in satellite communication systems and that itself is moving. So, additional instance of handover are necessary due to the movement of the satellite 1. Intra Satellite handover: 2. Inter Satellite handover. 3. Gateway handover. 4. Inter System handover. 12) What is MSC? Main Service Channel (MSC) carries all user data. eg. audio, multimedia data. 13) What is FIC? The Fast Information Channel (FIC) contains Fast Information Block (FIB) with 256bits each(16 bit checksum). An FIC carries all control information which is required for interpreting the configuration and content of the MSC. 14) What are the different types of disk? A flat disks Skewed disks Multi disks 15) What are the goals of DVB? The goal of DVB is to introduce digital TV broadcasting using satellite transmission (DVB-5) cable technology (DVB-c) and terrestrial transmission (DVB-7). 16) Name some of the formats supported by MOT? Multimedia and Hypermedia information coding experts group (MHEG) Join photographs experts group (JPEG) American standard code for information interchange (ASCII) Moving pictures expert group (MPEG) Hypertext markup language (HTML) Hypertext transfer protocol (HTTP) Bitmap (BMP) Graphics interchange format (GIF) 17) Give structure MOT object. 7bytes variable size variable size Header core

Header Extension Body Header core: contain the size of the header and body and the content type of the object. Header Extension: contains additional object handling data such as repetition distance to support caching, segmentation information and priority of the data. Body: contains arbitrary data to be transmitted. 18) What are different interleaving and repetition schemes applied by DAB to objects and segments? 1. Object Repetition. 2. Interleaved Objects. 3. Segment repetition. 4. Header repetition. 19) What are the advantages of DAB? 1. DAB can offer sound in CD like quality. 2. DAB can use single frequency network where all senders transmitting the same radio program can operate at the same frequency. 3. DAB use VHF and UHF frequency bands. 4. DAB uses DQPSK modulation scheme. 5. DAB user COFDM and FEC. 6. DAB can transmit up to six stereo audio programmes with a data rate of 192kbit/s each. 20) What is object repetition? DAB can repeat objects several times. If an object A consists of four segments (A1,A2,A3,A4) a single repetition pattern would be A1A2A3A4A1A2A3A4A1A2A3A4.. 21) What is EIT? Event Information Table (EIT) contains status information about the current transmission and some additional information for set-top boxes. 22) What is the service information sent by DVB? Digital Video Broadcast Containers are basically MPEG-2 frames. DVB sends service information. This information is, 1. Network information table (NIT). 2. Service Description Table (SDT). 3. Event Information Table (EIT). 4. Time and Date Table (TDT) 23) What are the advantages of DVB? 1. Data rates planned for users are 6-38mbit/s for the downlink and 33-100kbit/s for the uplink. 2. Transmitted along with TV programmes and doesnt require additional lines or hardware per customer. 3. Can be used in remote areas and developing countries where there is no high bandwidth wired network.

24) What is meant by beacon? A beacon contains a timestamp and other management information used for power management and roaming. e.g., identification of the base station subsystem (BSS) 25) What is Active scanning? Active scanning comprises sending a probe on each channel and waiting for response. Beacon and Probe response contain the information necessary to join the new BSS. 26) What is Passive Scanning? Passive Scanning Simply means listening into the medium to find other networks, i.e. receiving the beacon of another network issued by the synchronization function within an access point.

UNIT2 TELECOMMUNICATION SYSTEMS Part B 1. Write notes on DECT and TETRA System architecture, Protocol Architecture 2. Write notes on UMTS and IMT 2000 UMTS basic architecture, UTRA FDD mode, UTRA TDD mode 3. Explain broadcast systems in detail. Overview Cyclical repetition of data Digital audio broadcasting Multimedia object transfer protocol Digital video broadcasting. 4. Explain satellite systems in detail. History Applications Basics GEO LEO MEO Routing Localization Handover Examples. 5. Explain GSM systems in detail. Mobile services- System Architecture Radio interface Protocols Localization and calling Handover Security - New data services 6. Explain GPRS systems in detail. System architecture, Protocol Architecture Handover Security.\ 7. Explain DAB in detail. Media access Frequencies second phase: one out of 9 frequency blocks in the L-band Date-rates: Modulation: Digital services: 8. Explain DVB in detail. Container High-speed Internet 9. Explain the following a) Routing b) Hand over c) Localization 10. Explain the various satellite orbit and the parameters associated. Parameters of satellites and explanations-Three orbits and explanation

UNIT III

WIRLESS LAN Wireless LAN IEEE 802.11 - Architecture services MAC Physical layer IEEE 802.11a 802.11b standards HIPERLAN Blue Tooth. WIRELESS LAN Characteristics of wireless LANs Advantages o o o o Disadvantages Very flexible within the reception area Ad-hoc networks without previous planning possible (almost) no wiring difficulties (e.g. historic buildings, firewalls) More robust against disasters like, e.g., earthquakes, fire - or users pulling a plug... o o

Typically very low bandwidth compared to wired networks (1-10 Mbit/s) Many proprietary solutions, especially for higher bit-rates, standards take their time (e.g. IEEE 802.11) o Products have to follow many national restrictions if working wireless, it takes a vary long time to establish global solutions like, e.g., IMT-2000 Design goals for wireless LANs global, seamless operation low power for battery use no special permissions or licenses needed to use the LAN robust transmission technology simplified spontaneous cooperation at meetings easy to use for everyone, simple management protection of investment in wired networks security (no one should be able to read my data), privacy (no one should be able to collect user profiles), safety (low radiation) o transparency concerning applications and higher layer protocols, but also location awareness if necessary Comparison: infrared vs. radio transmission o o o o o o o o

Comparison: infrastructure vs. ad-hoc networks

IEEE 802.11 - ARCHITECTURE SERVICES - ARCHITECTURE SERVICES MAC PHYSICAL LAYER IEEE 802.11A - 802.11B STANDARDS

802.11 - Architecture of an infrastructure network Station (STA) terminal with access mechanisms to the wireless medium and radio contact to the access point Basic Service Set (BSS) o group of stations using the same radio frequency Access Point o station integrated into the wireless LAN and the distribution system Portal o bridge to other (wired) networks Distribution System o interconnection network to form one logical network (EES: Extended Service Set) based on several BSS o

802.11 - Architecture of an ad-hoc network

Direct communication within a limited range o o Station (STA): terminal with access mechanisms to the wireless medium Basic Service Set (BSS): group of stations using the same radio frequency

IEEE standard 802.11

802.11 - Layers and functions MAC -Access mechanisms, fragmentation, encryption MAC Management - Synchronization, roaming, MIB, power management PLCP Physical Layer Convergence Protocol - Clear channel assessment signal (carrier sense) PMD Physical Medium Dependent - Modulation, coding PHY Management - Channel selection, MIB Station Management - Coordination of all management functions

802.11 - Layers

802.11 - Physical layer 3 versions: 2 radio (typ. 2.4 GHz), 1 IR o data rates 1 or 2 Mbit/s

FHSS (Frequency Hopping Spread Spectrum) o o spreading, despreading, signal strength, typ. 1 Mbit/s min. 2.5 frequency hops/s (USA), two-level GFSK modulation

DSSS (Direct Sequence Spread Spectrum) o o o o Infrared o o 850-950 nm, diffuse light, typ. 10 m range carrier detection, energy detection, synchronization 802.11 - MAC layer I - DFWMAC Traffic services Asynchronous Data Service (mandatory) exchange of data packets based on best-effort support of broadcast and multicast Time-Bounded Service (optional) implemented using PCF (Point Coordination Function) Access methods DFWMAC-DCF CSMA/CA (mandatory) collision avoidance via randomized back-off mechanism minimum distance between consecutive packets ACK packet for acknowledgements (not for broadcasts) DFWMAC-DCF w/ RTS/CTS (optional) Distributed Foundation Wireless MAC avoids hidden terminal problem DFWMAC- PCF (optional) access point polls terminals according to a list DBPSK modulation for 1 Mbit/s (Differential Binary Phase Shift Keying), DQPSK for 2 Mbit/s (Differential Quadrature PSK) preamble and header of a frame is always transmitted with 1 Mbit/s, rest of transmission 1 or 2 Mbit/s chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code) max. radiated power 1 W (USA), 100 mW (EU), min. 1mW

Priorities defined through different inter frame spaces no guaranteed, hard priorities SIFS (Short Inter Frame Spacing) highest priority, for ACK, CTS, polling response PIFS (PCF IFS) medium priority, for time-bounded service using PCF DIFS (DCF, Distributed Coordination Function IFS) lowest priority, for asynchronous data service 802.11 - MAC layer

MAC address format

scenario ad-hoc network infrastructure network, from AP infrastructure network, to AP infrastructure network, within DS

to DS from DS 0 0 0 1 1 1 0 1

address 1 DA DA BSSID RA

address 2 SA BSSID SA TA

address 3 BSSID SA DA DA

address 4 SA

DS: Distribution System AP: Access Point DA: Destination Address SA: Source Address BSSID: Basic Service Set Identifier RA: Receiver Address TA: Transmitter Address MAC management Synchronization try to find a LAN, try to stay within a LAN timer etc. Power management sleep-mode without missing a message periodic sleep, frame buffering, traffic measurements Association/Reassociation integration into a LAN roaming, i.e. change networks by changing access points scanning, i.e. active search for a network MIB - Management Information Base managing, read, write

HIPERLAN
ETSI standard
European standard, cf. GSM, DECT, ... Enhancement of local Networks and interworking with fixed networks integration of time-sensitive services from the early beginning one standard cannot satisfy all requirements
range, bandwidth, QoS support commercial constraints

HIPERLAN family

HIPERLAN 1 standardized since 1996

higher layers medium access control layer channel access control layer physical layer HIPERLAN layers network layer data link layer physical layer OSI layers logical link control layer medium access control layer physical layer IEEE 802.x layers
7.31.1

Original HIPERLAN protocol family

Application

Frequency Topology Antenna Range QoS Mobility Interface Data rate Power conservation

HIPERLAN 3 HIPERLAN 4 wireless local point-to-point loop wireless ATM connections 5.1-5.3GHz 17.2-17.3GHz decentralized adcellular, point-topoint-to-point hoc/infrastructure centralized multipoint omni-directional directional 50 m 50-100 m 5000 m 150 m statistical ATM traffic classes (VBR, CBR, ABR, UBR) <10m/s stationary conventional LAN ATM networks 23.5 Mbit/s yes >20 Mbit/s 155 Mbit/s not necessary

HIPERLAN 1 wireless LAN

HIPERLAN 2 access to ATM fixed networks

HIPERLAN 1 - Characteristics Data transmission point-to-point, point-to-multipoint, connectionless 23.5 Mbit/s, 1 W power, 2383 byte max. packet size Services asynchronous and time-bounded services with hierarchical priorities compatible with ISO MAC Topology

infrastructure or ad-hoc networks transmission range can be larger then coverage of a single node (forwarding integrated in mobile terminals) Further mechanisms power saving, encryption, checksums Services and protocols CAC service MAC protocol CAC protocol

definition of communication services over a shared medium specification of access priorities abstraction of media characteristics MAC service, compatible with ISO MAC and ISO MAC bridges uses HIPERLAN CAC

provides a CAC service, uses the PHY layer, specifies hierarchical access mechanisms for one or several channels Physical protocol send and receive mechanisms, synchronization, FEC, modulation, signal strength HIPERLAN 1 - Physical layer Scope Channels 3 mandatory and 2 optional channels (with their carrier frequencies) mandatory channel 0: 5.1764680 GHz channel 1: 5.1999974 GHz channel 2: 5.2235268 GHz optional (not allowed in all countries) channel 3: 5.2470562 GHz channel 4: 5.2705856 GHz BLUETOOTH modulation, demodulation, bit and frame synchronization forward error correction mechanisms measurements of signal strength channel sensing

Consortium: Ericsson, Intel, IBM, Nokia, Toshiba - many members Scenarios connection of peripheral devices loudspeaker, joystick, headset support of ad-hoc networking small devices, low-cost bridging of networks e.g., GSM via mobile phone - Bluetooth - laptop Simple, cheap, replacement of IrDA, low range, lower data rates 2.4 GHz, FHSS, TDD, CDMA

Bluetooth MAC layer

Scatternets

UNIT III

WIRELESS NETWORKS

Part A 1) What is the primary goal of IEE 802.11? The primary goal of the standard was the specification of a simple, robust, WLAN which offers time bounded and asynchronous services also it should be able to operate with multiple physical layers. 2) What is meant by SIFS? SIFS means Short Inter Frame Spacing. The shortest waiting time defined for short control message such as acknowledgements or polling response. 3) What are Advantages of wireless LAN? Flexibility, Planning, Design, Robustness, Quality Service, Cost, Proprietary Solution, Restriction, Safety and Security 4) What are Design Goals of Wireless LAN? Global Operation Low Power License-free Operation Robust transmission technology Simplified spontaneous co-operation Easy to use Protection of investment Safety and Security Transparency for application 5) What are the three Low Power States provided by Bluetooth? PARK state HOLD state SNIFF state 6) What is SCO? SCO-stands for Synchronous Connection Oriented Link Standard telephone (voice) connection requires symmetrical, circuit-switched, point-to point connections. For this type of link, the master reserves two consecutive slots at fixed intervals. 7) What are the three phases in EY-NPMA? i. Prioritization: Determine the highest priority of a data packet ready to be sent on competing nodes. ii. Contention: Eliminate all but one of the contenders, if more than one sender has the highest current priority. iii. Transmission: Finally, transmit the packet of the remaining node. 8) What are Advantages and Disadvantages of Infrared? Advantages: i. Simple & extremely cheap senders and receivers which integrated in almost all mobile devices

ii. No licenses are needed for infrared technology and shielding is very simple. iii. Electrical devices do not interfere with infrared transmission. Disadvantages: i. Low bandwidth ii. Quite easily shielded iii. Cannot Penetrate 9) What are the system integration functions of MAC management? Synchronization Power management Roaming Management information base (MIB) 10) What do you meant by roaming? Moving between access point is called roaming. Even wireless networks may require more than one access point to cover all rooms. In order to provide uninterrupted service, we require roaming when the user moves from one access point to another. 11) What is mobile routing? Even if the location of a terminal is known to the system, it still has to route the traffic through the network to the access point currently responsible for the wireless terminal. Each time a user moves to a new access point, the system must reroute traffic. This is known as mobile routing. 12) What are the functions which support service and connection control? >Access point control function >Call control and connection control function >Network security agent >Service control function >Mobility management function 13) What are the examples for service scenarios identified in WATM ? >Office environments >Universities, schools, training, centres >Industry >Hospitals >Home >Networked vehicles 14) What is BRAN? The broadband radio access networks (BRAN) which have been standardized by European Telecommunications Standard Institute( ETSI) are a possible choice for an RAL for WATM. Although BRAN has been standardized independently from WATM, there is co-operation between the two to concentrate the common efforts on one goal. The main motivation behind BRAN is the deregulation and privatization of the telecommunication sector in Europe.

15) What are the different network types of BRAN? >Hyperlan1 >Hyperlan2 >Hyper access >Hyperlink 16) What is the main problem for WATM during handover? The main problem for WATM during the handover is rerouting of all connections and maintaining connection quality. 17) What are the different segments in ATM end-to-end connection? An ATM end-to-end connection is separated into different segments. >A fixed segment is a part of the connection that is not affected by the handover >Handover segment is affected by the handover and is located completely within a handover domain. 18) What is anchor point?. The Anchor point is the boundary between a handover segment and a fixed segment. 19) What are different types of handover? >Hard handover >Terminal initiated >Network initiated >Network initiated, terminal assisted >Network controlled >Backward handover >Forward handover 20) What is mobile terminal and wireless terminal?. Mobile terminal is a standard ATM terminal with the additional capability of reconnecting after access point change. the terminal can be moved between different access point within a certain domain. Wireless terminal is accessed via a wireless link, but the terminal itself is fixed, i.e., the terminal keeps its access point to the network.

UNIT3 WIRELESS NETWORKS Part B 1. Explain IEEE802.11 standard for WLANS in detail. System architecture Protocol architecture Physical layer Frequency hopping spread spectrum, Direct spectrum spread spectrum, Infrared Medium access control layer- Basic DFWMAC-DCF using CSMA/CA, DFWMAC-DCF with RTS/CTS extension, DFWMAC-PCF with polling, MC frames MAC management Synchronization, Power management, Roaming 802.11b. 2 Write notes on WATM services and Functions. Wireless mobile terminal side functions and mobility supporting network side functions. 3. Write notes on WATM handover. Handover reference model, handover requirements, types of handover, hand over scenarios, backward handover, and forward handover. 4. Write notes on location management, addressing and access point control protocol. Requirements for location management, procedures and entities 5. Give a detail note on HYPERLAN. Reference model and configurations- Physical layer Data link control layer broadcast phase, downlink phase, uplink phase, random access phasebroascast channel, frame channel, access feedback channel, long transport channel, short transport channel, random channel Convergence layer Ethernet, IEEE 1394 (Firewire), ATM. 6. Account on BLUETOOTH in detail. User scenarios- Connection of peripheral devices, support of ad-hoc networking, bridging of networks Architecture networking, protocol stackradio layer Baseband layer- physical links- synchronous connection-oriented link, Asynchronous connectionless link link manager protocol L2CAP Security SDP Profiles IEEE802.15 .

UNIT IV MOBILE NETWORK LAYER Mobile IP Dynamic Host Configuration Protocol - Routing DSDV DSR Alternative Metrics Mobile IP A standard for mobile computing and networking Computers doesnt stay put. Change location without restart its application or terminating any ongoing communication IP Networking Protocol layer Network Layer Transport Layer What does IP do moving packets from source to destination No end-to-end guarantees IP addresses Network-prefix Host portion IP Routing Packet Header Network-prefix Every node on the same link has the same network-prefix Mobile IP Solves the following problems f a node moves from one link to another without chnging its IP address, it will be unable to receive packets at the new link; and If a node moves from one link to another without chnging its IP address, it will be unable to receive packets at the new link; and Mobile IP Overview Solution for Internet Scalable, robust, secure, maintain communication Use their permanent IP address Routing protocol Route packets to nodes that could potentially change location very rapidly Layer 4-7, outside Mobile IP, but will be of major interest
1

Mobile IP: Terminology Mobile Node (MN) node that moves across networks without changing its IP address Correspondent Node (CN) ost with which MN is corresponding (TCP)

Home Agent (HA) host in the home network of the MN, typically a router registers the location of the MN, tunnels IP packets to the COA

Foreign Agent (FA) host in the current foreign network of the MN, typically a router forwards tunneled packets to the MN, typically the default router for MN

Care-of Address (COA) address of the current tunnel end-point for the MN (at FA or MN) actual location of the MN from an IP point of view

Tunneling An encapsulating IP packet including a path and an original IP packet IP-in-IP encapsulation

IP-in-IP encapsulation
IP-in-IP-encapsulation (mandatory in RFC 2003)
tunnel between HA and COA
ver. IHL TOS length IP identification flags fragment offset TTL IP-in-IP IP checksum IP address of HA Care-of address COA ver. IHL TOS length IP identification flags fragment offset TTL lay. 4 prot. IP checksum IP address of CN IP address of MN TCP/UDP/ ... payload

Mobile IP and IPv6 Mobile IP was developed for IPv4, but IPv6 simplifies the protocols Security is integrated and not an add-on, authentication of registration is included COA can be assigned via auto-configuration (DHCPv6 is one candidate), every node has address auto configuration No need for a separate FA, all routers perform router advertisement which can be used instead of the special agent advertisement; Addresses are always co-located MN can signal a sender directly the COA, sending via HA not needed in this case (automatic path optimization) softhand-over, i.e. without packet loss, between two subnets is supported MN sends the new COA to its old router the old router encapsulates all incoming packets for the MN and forwards them to the new COA Authentication is always granted
DHCP: Dynamic Host Configuration Protocol Main idea: E.g WPI has pool of IP addresses it can lease to hosts for short term use, claim back when done Application simplification of installation and maintenance of networked computers Supplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default router etc. enables automatic integration of systems into an Intranet or the Internet, can be used to acquire a COA for Mobile IP Client/Server-Model the client sends via a MAC broadcast a request to the DHCP serve r (might be via a DHCP relay) client relay server client

Dynamic Host Configuration Protocol (DHCP) is a network protocol for automatically assigning TCP/IP information to client machines. Each DHCP client connects to the centrally-located DHCP server which returns that client's network configuration, including the IP address, gateway, and DNS servers DHCP is useful for automatic configuration of client network interfaces. When configuring the client system, the administrator can choose DHCP and instead of entering an IP address, netmask, gateway, or DNS servers. The client retrieves this information from the DHCP server. DHCP is also useful if an administrator wants to change the IP addresses of a large number of systems. Instead of reconfiguring all the systems, he can just edit one DHCP configuration file on the server for the new set of IP addresses. If the DNS servers for an organization changes, the changes are made on the DHCP server, not on the DHCP clients. Once the network is restarted on the clients (or the clients are rebooted), the changes take effect. Furthermore, if a laptop or any type of mobile computer is configured for DHCP, it can be moved from office to office without being reconfigured as long as each office has a DHCP server that allows it to connect to the network.
3

Configuration File The first step in configuring a DHCP server is to create the configuration file that stores the network information for the clients. Global options can be declared for all clients, while other options can be declared for individual client systems. The configuration file can contain extra tabs or blank lines for easier formatting. Keywords are caseinsensitive and lines beginning with a hash mark (#) are considered comments. Two DNS update schemes are currently implemented the ad-hoc DNS update mode and the interim DHCP-DNS interaction draft update mode. If and when these two are accepted as part of the Internet Engineering Task Force (IETF) standards process, there will be a third mode the standard DNS update method. The DHCP server must be configured to use one of the two current schemes. Version 3.0b2pl11 and previous versions used the ad-hoc mode; however, it has been deprecated. There are two types of statements in the configuration file: Parameters State how to perform a task, whether to perform a task, or what network configuration options to send to the client. Declarations Describe the topology of the network, describe the clients, provide addresses for the clients, or apply a group of parameters to a group of declarations. Some parameters must start with the option keyword and are referred to as options. Options configure DHCP options; whereas, parameters configure values that are not optional or control how the DHCP server behaves. In Example the routers, subnet-mask, domain-name, domain-name-servers, and time-offset options are used for any host statements declared below it. Additionally, a subnet can be declared, a subnet declaration must be included for every subnet in the network. If it is not, the DHCP server fails to start. In this example, there are global options for every DHCP client in the subnet and a range declared. Clients are assigned an IP address within the range. subnet 192.168.1.0 netmask 255.255.255.0 { option routers 192.168.1.254; option subnet-mask 255.255.255.0; option domain-name "example.com"; option domain-name-servers 192.168.1.1; option time-offset -18000; # Eastern Standard Time

range 192.168.1.10 192.168.1.100;


}

ROUTING Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address to have a topological correct address (standard IP) or needs special entries in the routing tables

Specific routes to end-systems? change of all routing table entries to forward packets to the right destination does not scale with the number of mobile hosts and frequent changes in the location, security problems

Changing the IP-address? adjust the host IP address depending on the current location almost impossible to find a mobile system, DNS updates take to long time

Requirements to Mobile IP Transparency mobile end-systems keep their IP address continuation of communication after interruption of link possible point of connection to the fixed network can be changed

Compatibility support of the same layer 2 protocols as IP no changes to current end-systems and routers required mobile end-systems can communicate with fixed systems

Security authentication of all registration messages

Efficiency and scalability only little additional messages to the mobile system required (connection typically via a low andwidth radio link) world-wide support of a large number of mobile systems in the whole Internet
5

IPv6 availability Generally available with (new) versions of most operating systems. BSD, Linux 2.2 Solaris 8 An option with Windows 2000/NT Most routers can support IPV6 Supported in J2SDK/JRE 1.4

IPv6 Design Issues Overcome IPv4 scaling problem Lack of address space. Flexible transition mechanism. New routing capabilities. Quality of service. Security. Ability to add features in the future.

Mobile ad hoc networks Standard Mobile IP needs an infrastructure Home Agent/Foreign Agent in the fixed network DNS, routing etc. are not designed for mobility

Sometimes there is no infrastructure! remote areas, ad-hoc meetings, disaster areas Cost can also be an argument against an infrastructure! no default router available every node should be able to forward

Traditional routing algorithms Traditional algorithms are pro-active i.e. operate independent of user-message demands. Suitable for wired networks. Distance Vector periodic exchange of messages with all physical neighbors that contain information about who can be reached at what distance selection of the shortest path if several paths available Link State periodic notification of all routers about the current state of all physical links routers get a complete picture of the network Example ARPA packet radio network (1973), DV-Routing, up to 138 nodes every 7.5s exchange of routing tables including link quality updating of tables also by reception of packets routing problems solved with limited flooding
6

Problems of traditional routing algorithms Dynamics of the topology Frequent changes of connections, connection quality, participants Limited performance of mobile systems periodic updates of routing tables need energy without contributing to the transmission of user data; sleep modes difficult to realize Limited bandwidth of the system is reduced even more due to the exchange of routing information Links can be asymmetric, i.e., they can have a direction dependent transmission quality Uncontrolled redundancy in links Interference unplanned links (advantage?)

DSDV (Destination Sequenced Distance Vector) Early work on demand version: AODV (Ad-hoc On-demand Distance Vector

Expansion of distance vector routing (but still pro-active) Sequence numbers for all routing updates assures in-order execution of all updates avoids loops and inconsistencies

Decrease of update frequency (damping) store time between first and best announcement of a path inhibit update if it seems to be unstable (based on the stored time values)

Dynamic source routing


Split routing into discovering a path and maintaining a path Discovering a path Only if a path for sending packets to a certain destination is needed and no path is currently available (reactive algorithm) Maintaining a path Only while the path is in use: make sure that it can be used continuously Path discovery Broadcast a packet (Route Request) with destination address and unique ID if a station receives a broadcast packet if the station is the receiver (i.e., has the correct destination address) then return the packet to the sender 7

a ID) then Discard the packet

Maintaining paths

otherwise, append own address and broadcast packet

sender receives packet with the current path (address list)


After sending a packet wait for a layer 2 acknowledgement (if applicable) listen into the medium to detect if other stations forward the packet (if possible) request an explicit acknowledgement if a station encounters problems it can inform the sender of a packet or look-up a new path locally

ALTERNATIVE METRICS.

Mobile IP with reverse tunneling Router accepts often only topological correctaddresses (firewall!) a packet from the MN encapsulated by the FA is now topological correct furthermore multicast and TTL problems solved (TTL in the home network correct, but MN is to far away from the receiver) Reverse tunneling does not solve problems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing) The standard is backwards compatible the extensions can be implemented easily and cooperate with current implementations without these extensions Agent Advertisements can carry requests for reverse tunneling World Wide Web and mobility Protocol (HTTP, Hypertext Transfer Protocol) and language (HTML, Hypertext Markup Language) of the Web have not been designed for mobile applications and mobile devices, thus creating many problems! Typical transfer sizes HTTP request: 100-350 byte responses avg. <10 kbyte, header 160 byte, GIF 4.1kByte, JPEG 12.8 kbyte, HTML 5.6 kbyte but also many large files that cannot be ignored The Web is no file system Web pages are not simple files to download static and dynamic content, interaction with servers via forms, content transformation, push technologies etc. many hyperlinks, automatic loading and reloading, redirecting a single click might have big consequences
8

UNIT 4 - NETWORK LAYER 1) What is generic routing encapsulation? Generic routing encapsulation (GRE) is an encapsulation scheme which supports other network protocols in addition to IP. It allows the encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suite. 2) Define COA. The COA (care of address) defines the current location of the MN from an IP point of view. All IP packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery toward the MN is done using the tunnel. 3) What is meant by Transparency? Mobility should remain invisible for many higher layer Protocols and applications. The only affects of mobility should be a higher delay and lower bandwidth which are natural in the case of mobile networks. 4) What is Generic Routing encapsulation? Generic Routing encapsulation (GRE) allows the encapsulation of packets of one protocol suite into the payload portion of a packet of another protocol suit. 5) What is Binding Request? Any node that wants to know the current location of an MN can send a binding request to the HA. The HA can check if the MN has allowed dissemination of its current location. 6) What are the possibilities for the location of care-of-address (COA)? The two possibilities for the location of care-of-address are: i. Foreign agent COA ii.Co-related COA 7) What are the requirements for the development of mobile IP standard? The requirements are: a.Compatibility b.Transparency c.Scalability and efficiency d.Security 8) What is Dynamic source Routing? Dynamic Source Routing eliminates all periodic routing updates. If a node needs to discover a route, it broadcast a route request with a unique identifier and the destination address as parameters. Any node that receivers a route request gives a list of addresses representing a possible path on its way toward the destination. 9) Why is need of routing? Routing is to find the path between source and destination and to forward the packets appropriately.

10) Define Mobile node: Mobile node: A mobile node is an end-system or router that can change its point of attachment to the Internet using mobile IP. The MN keeps its IP address and can continuously with any other system in the Internet as long as link layer connectivity is given. 11) What is Encapsulation and Decapsulation? Encapsulation is the mechanism of taking a packet consisting of packet header and data and putting it into the data part of a new packet. The reverse operation, taking a packet out of the data part of another packet, is called decapsulation. 12) Define Dynamic source routing. In an adhoc networks where nodes exchanges packets from time to time. Dynamic Source routing divides the task of routing into two separate problems: i) Routing Recovery: A node only tries to discover a route to destination if it has to send something to this destination and there is currently no known route ii) Route Maintenance: If a node is continuously sending packets via route, it has to make sure that the route is held urgent. As soon as a node detects problem with the current route it has to find an alternative node. 13) Define Compatibility. support of the same layer 2 protocols as IP no changes to current end-systems and routers required mobile end-systems can communicate with fixed systems 14) What is Home Agent (HA)? Home Agent (HA) system in the home network of the MN, typically a router registers the location of the MN, tunnels IP datagrams to the COA 15) Define Foreign Agent (FA). system in the current foreign network of the MN, typically a router forwards the tunneled datagrams to the MN, typically also the default router for the MN 16) Define Agent Advertisement. HA and FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in the home or a foreign network MN reads a COA from the FA advertisement messages 17) Define Registration. MN signals COA to the HA via the FA, HA acknowledges via FA to MN these actions have to be secured by authentication 18) Define Key distribution Home agent distributes session keys foreign agent has a security association with the home agent

mobile host registers a new binding at the home agent home agent answers with a new session key for foreign agent and mobile node

19) Applications of Dynamic Host Configuration Protocol. simplification of installation and maintenance of networked computers supplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default router etc. enables automatic integration of systems into an Intranet or the Internet, can be used to acquire a COA for Mobile IP 20) Define DSDV (Destination Sequenced Distance Vector). Expansion of distance vector routing Sequence numbers for all routing updates assures in-order execution of all updates avoids loops and inconsistencies 21) List the examples for interference based routing. Least Interference Routing (LIR) calculate the cost of a path based on the number of stations that can receive a transmission Max-Min Residual Capacity Routing (MMRCR) calculate the cost of a path based on a probability function of successful transmissions and interference Least Resistance Routing (LRR) calculate the cost of a path based on interference, jamming and other transmissions LIR is very simple to implement

UNIT4 NETWORK LAYER Part B 1. Explain mobile IP in detail. Goals, assumptions and requirements Entities and terminology IP packet delivery Agent discovery Agent advertisement, Agent solicitation Registration Tunneling and encapsulation- IP-in-IP encapsulation, minimal encapsulation, generic routing encapsulation optimizations Reverse tunneling IPv6. 2. Give a detailed account of mobile ad-hoc networks. Instant infrastructure, Disaster relief Remote areas Effectiveness Routing Asymmetric links, redundant links, interference, dynamic topology Destination sequence distance vector sequence numbers, damping - Dynamic source routing route discovery, route maintenance Alternative metrics least interference routing. 3. Explain about DHCP: Dynamic Host Configuration Protocol. Application Client/Server-Model DHCP - protocol mechanisms DHCP characteristics 4. Discuss about Adhoc-networks. Standard Mobile IP needs an infrastructure Routing Routing examples for an ad-hoc network 5. Explain about Traditional routing algorithms in detail. Distance Vector- Link State 6. Explain about DSDV (Destination Sequenced Distance Vector) in detail. Expansion of distance vector routing Sequence numbers for all routing updates Decrease of update frequency 7 .State Dynamic source routing in detail. Discover a path Maintaining a path
Optimizations

8. Discuss about inference routing in detail. Least Interference Routing (LIR) Max-Min Residual Capacity Routing (MMRCR) Least Resistance Routing (LRR)

UNIT V TRANSPORT AND APPLICATION LAYERS Traditional TCP Classical TCP improvements WAP, WAP 2.0. TRADITIONAL TCP TCP is an alternative transport layer protocol over IP. TCP provides: Connection-oriented Reliable Full-duplex Byte-Stream Connection-Oriented Connection oriented means that a virtual connection is established before any user data is transferred. If the connection cannot be established - the user program is notified. If the connection is ever interrupted - the user program(s) is notified.

Reliable Reliable means that every transmission of data is acknowledged by the receiver. If the sender does not receive acknowledgement within a specified amount of time, the sender retransmits the data

Byte Stream Stream means that the connection is treated as a stream of bytes. The user application does not need to package data in individual datagrams (as with UDP).

Buffering TCP is responsible for buffering data and determining when it is time to send a datagram. It is possible for an application to tell TCP to send the data it has buffered without waiting for a buffer to fill up.

Full Duplex TCP provides transfer in both directions. To the application program these appear as 2 unrelated data streams, although TCP can piggyback control and data communication by providing control information (such as an ACK) along with user data.

TCP Ports Interprocess communication via TCP is achieved with the use of ports (just like UDP). UDP ports have no relation to TCP ports (different name spaces). TCP Segments The chunk of data that TCP asks IP to deliver is called a TCP segment. Each segment contains: data bytes from the byte stream control information that identifies the data bytes 1

TCP Lingo When a client requests a connection it sends a SYN segment (a special TCP segment) to the server port. SYN stands for synchronize. The SYN message includes the clients ISN. ISN is Initial Sequence Number. Every TCP segment includes a Sequence Number that refers to the first byte of data included in the segment. Every TCP segment includes an Acknowledgement Number that indicates the byte number of the next data that is expected to be received. All bytes up through this number have already been received. There are a bunch of control flags: URG: urgent data included. ACK: this segment is (among other things) an acknowledgement. RST: error connection must be reset. SYN: synchronize Sequence Numbers (setup) FIN: polite connection termination

MSS: Maximum segment size (A TCP option) Window: Every ACK includes a Window field that tells the sender how many bytes it can send before the receiver will have to toss it away (due to fixed buffer size). CLASSICAL TCP IMPROVEMENTS

TCP Connection Creation Programming details later - for now we are concerned with the actual communication. A server accepts a connection. Must be looking for new connections! A client requests a connection. Must know where the server is!

Client Starts A client starts by sending a SYN segment with the following information: Clients ISN (generated pseudo-randomly) Maximum Receive Window for client. Optionally (but usually) MSS (largest datagram accepted). No payload! (Only TCP headers)

Server Response When a waiting server sees a new connection request, the server sends back a SYN segment with: Servers ISN (generated pseudo-randomly) Request Number is Client ISN+1 Maximum Receive Window for server. Optionally (but usually) MSS No payload! (Only TCP headers) When the Servers SYN is received, the client sends back an ACK with: Acknowledgment Number is Servers ISN+1

TCP 3-way handshake Client: I want to talk, and Im starting with byte number X. Server: OK, Im here and Ill talk. My first byte will be called number Y, and I know your first byte will be number X+1. Client: Got it - you start at byte number Y+1. Bill: Monica, Im afraid Ill syn and byte your ack TCP Data and ACK Once the connection is established, data can be sent. Each data segment includes a sequence number identifying the first byte in the segment. Each segment (data or empty) includes a request number indicating what data has been received

Buffering Keep in mind that TCP is part of the Operating System. The O.S. takes care of all these details asynchronously. The TCP layer doesnt know when the application will ask for any received data. TCP buffers incoming data so its ready when we ask for it.

TCP Buffers Both the client and server allocate buffers to hold incoming and outgoing data The TCP layer does this. Both the client and server announce with every ACK how much buffer space remains (the Window field in a TCP segment).

Send Buffers ACKs A receiver doesnt have to ACK every segment (it can ACK many segments with a single ACK segment). Each ACK can also contain outgoing data (piggybacking). If a sender doesnt get an ACK after some time limit, it resends the data. The application gives the TCP layer some data to send. The data is put in a send buffer, where it stays until the data is ACKd. The TCP layer wont accept data from the application unless (or until) there is buffer space.

TCP Segment Order Most TCP implementations will accept out-of-order segments (if there is room in the buffer). Once the missing segments arrive, a single ACK can be sent for the whole thing. Remember: IP delivers TCP segments, and IP is not reliable - IP datagrams can be lost or arrive out of order.

Termination The TCP layer can send a RST segment that terminates a connection if something is wrong. Usually the application tells TCP to terminate the connection politely with a FIN segment. 3

TCP Sockets Programming Creating a passive mode (server) socket. Establishing an application-level connection. Sending/receiving data. Terminating a connection.

Establishing a passive mode TCP socket Passive mode: Address already determined. Tell the kernel to accept incoming connection requests directed at the socket address. 3-way handshake Tell the kernel to queue incoming connections for us. Accepting an incoming connection Once we start listening on a socket, the O.S. will queue incoming connections Handles the 3-way handshake Queues up multiple connections. When our application is ready to handle a new connection, we need to ask the O.S. for the next connection.

Terminating a TCP connection Either end of the connection can call the close() system call. If the other end has closed the connection, and there is no buffered data, reading from a TCP socket returns 0 to indicate EOF

Client Code TCP clients can connect to a server, which: takes care of establishing an endpoint address for the client socket. dont need to call bind first, the O.S. will take care of assigning the local endpoint address (TCP port number, IP address). Attempts to establish a connection to the specified server. 3-way handshake Reading from a TCP socket By default read() will block until data is available. Reading from a TCP socket may return less than max bytes (whatever is available). You must be prepared to read data 1 byte at a time! WIRELESS APPLICATION PROTOCOL (WAP) Empowers mobile users with wireless devices to easily access and interact with information and services. A standard created by wireless and Internet companies to enable Internet access from a cellular phone

WAP: Main Features Browser Micro browser, similar to existing web browsers Markup language Similar to HTML, adapted to mobile devices 4

Script language Similar to Javascript, adapted to mobile devices Gateway Transition from wireless to wired world Server Wap/Origin server, similar to existing web servers Protocol layers Transport layer, security layer, session layer etc. Telephony application interface Access to telephony functions

Internet Model

HTML HTTP TLS/SSL TCP/IP

WAP Architecture

WAP Application Server

WAP: Network Elements

WAP Specifies Wireless Application Environment WML Microbrowser WMLScript Virtual Machine WMLScript Standard Library Wireless Telephony Application Interface (WTAI) WAP content types

Wireless Protocol Stack Wireless Session Protocol (WSP) Wireless Transport Layer Security (WTLS) Wireless Transaction Protocol (WTP) Wireless Datagram Protocol (WDP) Wireless network interface definitions

WAP Stack

WAE (Wireless Application Environment): Architecture: application model, browser, gateway, server WML: XML-Syntax, based on card stacks, variables, ... WTA: telephone services, such as call control, phone book etc. WSP (Wireless Session Protocol): Provides HTTP 1.1 functionality Supports session management, security, etc. WTP (Wireless Transaction Protocol): Provides reliable message transfer mechanisms Based on ideas from TCP/RPC WTLS (Wireless Transport Layer Security): Provides data integrity, privacy, authentication functions Based on ideas from TLS/SSL WDP (Wireless Datagram Protocol): Provides transport layer functions Based on ideas from UDP

WHY WAP? Wireless networks and phones have specific needs and requirements not addressed by existing Internet technologies WAP Enables any data transport TCP/IP, UDP/IP, GUTS (IS-135/6), SMS, or USSD. Optimizes the content and air-link protocols Utilizes plain Web HTTP 1.1 servers leverages existing development methodologies 7

utilizes standard Internet markup language technology (XML) all WML content is accessed via HTTP 1.1 requests WML UI components map well onto existing mobile phone user interfaces no re-education of the end-users leveraging market penetration of mobile devices Several modular entities together form a fully compliant Internet entity

WAP: Killer Applications Location-based services Real-time traffic reporting, Event/restaurant recommendation Enterprise solutions Email access, Database access, global intranet access Information updates pushed to WAP devices Financial services Banking, Bill-paying, Stock trading, Funds transfers Travel services Schedules and rescheduling, Reservations Gaming and Entertainment Online, real-time, multi-player games Downloadable horoscopes, cartoons, quotes, advice M-Commerce Shopping on the go Instant comparison shopping Location-based special offers and sales

Wireless Application Environment (WAE) Goals device and network independent application environment for low-bandwidth, wireless devices considerations of slow links, limited memory, low computing power, small display, simple user interface (compared to desktops) integrated Internet/WWW programming model high interoperability

WAE Components Architecture Application model, Microbrowser, Gateway, Server User Agents WML/WTA/Others content formats: vCard, vCalendar, Wireless Bitmap, WML, ... WML XML-Syntax, based on card stacks, variables, ... WMLScript procedural, loops, conditions, ... (similar to JavaScript) WTA telephone services, such as call control, text messages, phone book, ... (accessible from WML/WMLScript) Proxy (Method/Push)

WAE: Logical Model

WML: Wireless Markup Language Tag-based browsing language: Screen management (text, images) Data input (text, selection lists, etc.) Hyperlinks & navigation support Takes into account limited display, navigation capabilities of devices XML-based language describes only intent of interaction in an abstract manner presentation depends upon device capabilities Cards and Decks document consists of many cards User interactions are split into cards Explicit navigation between cards cards are grouped to decks deck is similar to HTML page, unit of content transmission Events, variables and state mgmt The basic unit is a card. Cards are grouped together into Decks Document ~ Deck (unit of transfer) All decks must contain Document prologue XML & document type declaration <WML> element Must contain one or more cards WML Example WML> <CARD> <DO TYPE=ACCEPT> <GO URL=#eCard/> </DO Welcome! </CARD> <CARD NAME=eCard> <DO TYPE=ACCEPT> <GO URL=/submit?N=$(N)&S=$(S)/> </DO> Enter name: <INPUT KEY=N/> Choose speed: 9

<SELECT KEY=S> <OPTION VALUE=0>Fast</OPTION> <OPTION VALUE=1>Slow</OPTION> <SELECT> </CARD> </WML> WMLScript Complement to WML Derived from JavaScript Provides general scripting capabilities Procedural logic, loops, conditionals, etc. Optimized for small-memory, small-cpu devices Features local user interaction, validity check of user input access to device facilities (phone call, address book etc.) extensions to the device software configure device, download new functionality after deployment Bytecode-based virtual machine Stack-oriented design, ROM-able Designed for simple, low-impact implementation WMLScript compiler resides in the network

WMLScript Libraries Lang - VM constants, general-purpose math functionality, etc. String - string processing functions URL - URL processing Browser - WML browser interface Dialog - simple user interface Float - floating point functions

Wireless Telephony Application (WTA) Collection of telephony specific extensions designed primarily for network operators Example calling a number (WML) wtai://wp/mc;07216086415 calling a number (WMLScript) WTAPublic.makeCall("07216086415"); Implementation Extension of basic WAE application model Extensions added to standard WML/WMLScript browser Exposes additional API (WTAI)

WTA Features Extension of basic WAE application model network model for interaction 10

client requests to server event signaling: server can push content to the client event handling table indicating how to react on certain events from the network client may now be able to handle unknown events telephony functions some application on the client may access telephony functions WTAI includes: Call control Network text messaging Phone book interface Event processing Security model: segregation Separate WTA browser Separate WTA port

WAP Push Services Web push Scheduled pull by client (browser) example: Active Channels no real-time alerting/response example: stock quotes Wireless push accomplished by using the network itself example: SMS limited to simple text, cannot be used as starting point for service example: if SMS contains news, user cannot request specific news item WAP push Network supported push of WML content example: Alerts or service indications Pre-caching of data (channels/resources)

Push Access Protocol Based on request/response model Push initiator is the client Push proxy is the server Initiator uses HTTP POST to send push message to proxy Initiator sends control information as an XML document, and content for mobile (as WML) Proxy sends XML entity in response indicating submission status Initiator can cancel previous push query status of push query status/capabilities of device

Push Proxy Gateway WAP stack (communication with mobile device) TCP/IP stack (communication with Internet push initiator) Proxy layer does control information parsing content transformation session management 11

client capabilities store and forward prioritization address resolution management function

WTP Services and Protocols WTP (Transaction) provides reliable data transfer based on request/reply paradigm no explicit connection setup or tear down optimized setup (data carried in first packet of protocol exchange) seeks to reduce 3-way handshake on initial request supports header compression segmentation /re-assembly retransmission of lost packets selective-retransmission port number addressing (UDP ports numbers) flow control message oriented (not stream) supports an Abort function for outstanding requests supports concatenation of PDUs supports User acknowledgement or Stack acknowledgement option acks may be forced from the WTP user (upper layer) default is stack ack WAP 2.0. WSP - Wireless Session Protocol Goals HTTP 1.1 functionality Request/reply, content type negotiation, ... support of client/server transactions, push technology key management, authentication, Internet security services WSP Services provides shared state between client and server, optimizes content transfer session management (establish, release, suspend, resume) efficient capability negotiation content encoding push

WSP/B (Browsing) HTTP/1.1 functionality - but binary encoded exchange of session headers push and pull data transfer asynchronous requests WSP Overview Header Encoding compact binary encoding of headers, content type identifiers and other well-known textual or structured values reduces the data actually sent over the network Capabilities (are defined for): 12

message size, client and server protocol options: Confirmed Push Facility, Push Facility, Session Suspend Facility, Acknowledgement headers maximum outstanding requests extended methods header code pages Suspend and Resume server knows when client can accept a push multi-bearer devices dynamic addressing allows the release of underlying bearer resources Session Context and Push push can take advantage of session headers server knows when client can accept a push Connection-mode long-lived communication, benefits of the session state, reliability

Connectionless-mode stateless applications, no session creation overhead, no reliability overhead WAP: Ongoing Work WDP WTLS WTP WSP WAE

Tunnel to support WAP where no (end-to-end) IP bearer available support for end-to-end security (extending WTLS endpoint beyond WAP Gateway) interoperable between WAP and Internet (public key infrastructure) integrating Smart Cards for security functions efficient transport over wireless links (wireless TCP) bearer selection/switching quality of service definitions quality of service parameters multicast data, multimedia support User agent profiles: personalize for device characteristics, preferences etc Push architecture, asynchronous applications Billing

13

UNIT 5 - TRANSPORT AND APPLICATION LAYERS Part A 1) What are the two functions of the transport layer in the internet? The two functions of the transport layer in the internet are check summing over user data and multiplexing/ demultiplexing of data from applications. 2) What is called the exponential growth of the congestion window? The senders always calculate congestion window for a window start size of the congestion window is one segment. Sender sends one packet and waits for acknowledgement. If acknowledgement arises it raises the level of congestion window by one. If sender sends two packets if acknowledgement arises it raises the level of congestion window by two. This scheme raises the level of congestion window every time the acknowledges come back, which takes round trip time (RTT).This is called the exponential growth of the congestion window 3) Advantages of I-TCP: I-TCP does not require any changes in the TCP protocol as used by the hosts in the fixed network or other hosts in a wireless network that do not use this optimization. Without partitioning retransmission of lost packets would take place between mobile host and correspondent host across the whole network. Optimization of new mechanisms is quite simple to be done in I-TCP as they only cover a single hop. The short delay between the mobile host and foreign agent can be determined and is independent of other traffic streams. Therefore an optimized TCP can use precise time-outs to guarantee retransmission as fast as possible. Partitioning into two connections also allows the use of a different transport layer protocol between the foreign agent and the mobile host or the use of compressed headers etc. The foreign agent can act as a gateway to translate between different protocols. 4) Disadvantages of I-TCP: The loss of the end to end semantics of TCP cause problems if the foreign agent portioning the TCP connection crashes. An increased handover latency is more problematic in practical use The foreign agent must be a trusted entity because the TCP connections end at this point. 5) Define Slow Start? TCPs reaction to a missing acknowledgement is quite drastic, but necessary to get rid of congestion. The behaviour TCP shows after the detection of congestion is called Slow start. 6) How does data transmission takes place? Data transmission takes place using network adapters, fibre optics, copper wires, special hardware for routers etc. 7) What is mean by SCPS-TP? The set of protocols developed for space communication is known as space communications protocol standards (SCPS), the extended TCP is called SCPS-transport protocols.(SCPS-TP).

8) What are Advantage and Disadvantage of MobileTCP? Advantage: i. M-TCP maintains the TCP end-to-end semantice. The SH does not send any ACK itself but forwards the ACKs from the MH. ii.If the MH is disconnected, M_TCP avoids useless retransmissions, slow starts or breaking connections by simply shrinking the senders window to 0; iii. Since M-TCP does not buffer data in the SH as I-TCP does, it is not necessary to forward buffers to a new SH. Lost packets will be automatically retransmitted to the new SH. Disadvantage: i. As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due to bit errors is propagated to the sender. M-TCP assumes low bit error rates, which is not always a valid assumption. ii. A modified TCP on the wireless link not only requires modification to the MH protocol software but also new network elements like the bandwidth manager. 9) What is fast retransmit? In TCP, a receiver sends acknowledgements only if it receive any packets from the sender. Thus receiving acknowledgements from a receiver shows additionally that the receiver continuously receives something from the sender. Therefore, the gap in the packet stream is not due to severe congestion, but a simple packet loss due to a transmission error. The sender can now retransmit the missing packets before the timer expires. This behaviour is called fast retransmit. 10) What is fast recovery? The receipt of acknowledgement shows that there is no congestion justifying a slow start. The sender can continue with the current congestion window. The sender performs a fast recovery from the packet loss. This mechanism can improve the efficiency of TCP dramatically. 11) What is HTTP? The Hypertext transfer protocol is a stateless, lightweight, application level protocol for data transfer between servers and clients. An HTTP transaction consists of an HTTP request issued by a client and an HTTP response from the server. Stateless means that all HTTP transactions independent of each other. 12) What is image scaling? If a page contains a true color, high-resolution picture, this picture can be scaled down to fewer colors, lower resolution, or finally to only the title of the picture. The user can decide to download the picture separately. Further one can offer clipping, zooming, or detail studies to users if they are interested in a part of the picture. 13) What is WAP? Wireless application protocol (WAP) is a common effort of many companies and organizations to set up a framework for wireless and mobile web access using many different transport systems. Eg. GSM, GPRS, UMTS.

14) What is WMLBrowser? WMLBrowser is a library that provides several functions typical for a browser, such as prev to go back one card or refresh to update the context of the user interface. 15) Define Damping Transient changes in topology that are short duration should not destabilize the routing mechanism. Advertisements containing changes in topology currently stored are therefore not disseminated further. A node waits with dissemination if these changes are most likely not yet stable.Waitingg time depends on the time between the first and the best announcement.

UNIT5 TRANSPORT AND APPLICATION LAYERS Part B 1. Write notes on traditional TCP. Congestion controls, slow start, fast retransmit/ fast recovery, implications on mobility. 2. Write notes on wireless TCP. Indirect TCP, snooping TCP, Mobile TCP, Fast retransmit/fast recovery, transmission/time-out freezing, selective retransmission, transaction oriented TCP. 3. Write notes on WDP and WTLS. Figure and explanation about WDP and WTLS. 4. Write notes on wireless transaction protocol. Figure and explanation about WTP class 0, class 1 and class 2. 5. Write notes on wireless sessions protocol. WSP/B over WTP and WSP/ B as connectionless session service 6. Explain Traditional TCP Architecture-Types- Frame formats-Explanation 7. Explain in detail about WAP. Architecture-Types-Forum-Advantages-Disadvantages 8. Discuss about WMLBrowser. Browser library-functions-Security.

MOBILE COMPUTING UNIT 1 WIRELESS COMMUNICATION FUNDAMENTALS TWO MARK QUESTIONS IN UNIT-1 1. Define CDMA. 2. Define Signal. 3. What is digital modulation? 4. Define code division multiplexing. 5. List out the advantages of frequency division multiplexing. 6. What are the several versions in CSMA? 7. What is Quadrature Amplitude Modulation? 8. What are the 2 sub layers in DLC? 9. Define time division multiplexing. 10. List out the different types of frequencies used for data transmission. 11. Define Antenna. 12. List out the different types of antennas. 13. Define Modulation. 14. What is hidden and exposed terminal problem? 15. Define polling. 16. What is spread spectrum? 17. List out the different types of spread spectrum techniques. 18. Distinguish between ALOHA and slotted ALOHA. 19. Define fading. 20. Distinguish between DSSS and FHSS. 21. What are the 3 fundamental propagation behaviors depending on their frequency? 22. What is multipath propagation? 23. What is guard space? 24. What are the 3 different basic schemes analog modulations? 25. What is the use of Phase Lock Loop (PLL)? 26. What is hopping sequence? 27. What is dwell time? 28. What are the advantages of cellular systems? 29. What is browsing channel allocation and fixed channel allocation? 30. What are the disadvantages of cellular systems? 31. What is digital sense multiple access? 32. What is Network and Switching subsystem? 33. What is authentication centre? 34. What is called burst and normal burst? 35. What are the basic groups of logical channels? 36. Define traffic multiframe and control multiframe?

BIG QUESTIONS IN UNIT-1 1. Explain different TDMA schemes in detail. 2. Explain multiplexing in detail. 3. Discuss Modulation techniques in detail. 4. Account on CDMA Scheme. 5. Explain FDMA in detail. 6. Discuss SDMA in detail. 7. Explain major types of networks. 8. Explain types of Antennas in detail. 9. Explain the various applications of mobile computing. 10. Explain about the signal propagation. 11. Discuss about the cellular system. 12. List the difference between S/T/F/CDMA. 13. What is spread spectrum with its types. 14. Why do MAC scheme in wired network fail in wireless networks and how dose the multiple access with collision avoidance (MACA) scheme work. 15. Define modulation and explain the method for analog modulation techniques in details. 16. Discuss briefly the advanced phase shift keying.

UNIT II

TELECOMMUNICATION SYSTEMS

TWO MARK QUESTIONS IN UNIT-II 1. What is Handover? 2. What are the categories of Mobile services? 3. What is TETRA? 4. What is meant by GPRS? 5. What are subsystems in GSM system? 6. What is meant by GEO? 7. Define the inclination angle and perigee. 8. Define the elevation angle and footprint. 9. What is MSC? 10. What are the different types of disk? 11. What are the goals of DVB? 12. Name some of the formats supported by MOT? 13. What are the advantages of DAB? 14. What is object repetition? 15. What is EIT? 16. What are the service information sent by DVB? 17. What is Active scanning? 18. What is Passive Scanning? 19. What is FIC? 20. What are the registers maintained by the gateway of satellite? 21. Specify the security services offered by GSM. 22. What is the frequency range of uplink and downlink in GSM network? 23. What are the two basic groups of logical channels in GSM? 24. What are the control channel groups in GSM? 25. List out the numbers needed to locate an MS and to address the MS. 26. What are the four possible handover scenarios in GSM? 27. What are the security services offered by GSM? 28. What is meant by GGSN? 29. What is meant by SGSN? 30. What is meant by BSSGP? 31. Define the protocol architecture of DECT. 32. Specify the standards offered by TETRA. 33. How many ITU standardized groups of 3G radio access technologies are there in IMT-2000? 34. What are the steps perform during the search for a cell after power on? 35. What are the two basic classes of handover? 36. What are the two basic transport mechanisms used by DAB? 37. What are the two transport modes defined for MSC? 38. Define the terms: i. Earth Station. ii. Uplink. 39. Define Elevation Angle. 40. What are the factors limited the number of sub channels provided within the satellite channel?

BIG QUESTIONS IN UNIT-II 1. Write notes on DECT and TETRA. 2. Write notes on UMTS and IMT 2000. 3. Explain broadcast systems in detail. 4. Explain satellite systems in detail. 5. Explain GSM systems in detail. 6. Explain GPRS systems in detail. 7. Explain DAB in detail. 8. Explain DVB in detail. 9. Explain the following a) Routing b) Hand over c) Localization. 10. Explain the various satellite orbit and the parameters associated. 11. Compare GEO, MEO and LEO

UNIT III

WIRELESS NETWORKS

TWO MARK QUESTIONS IN UNIT-3 1. What is the primary goal of IEE 802.11? 2. What is meant by SIFS? 3. What are Advantages of wireless LAN? 4. What are Design Goals of Wireless LAN? 5. What are the three Low Power States provided by Bluetooth? 6. What is SCO? 7. What are Advantages and Disadvantages of Infrared? 8. What are the system integration functions of MAC management? 9. What do you meant by roaming?. 10. What is mobile routing? 11. What are the functions which support service and connection control? 12. What are the examples for service scenarios identified in WATM ? 13. What is BRAN? 14. What are the different network types of BRAN? 15. What is the main problem for WATM during handover? 16. What are the different segments in ATM end-to-end connection? 17. What is anchor point? . 18. What are different types of handover? 19. What is mobile terminal and wireless terminal?. 20. Mention some of the disadvantages of WLANS? 21. Mention the design goals of WLANS? 22. What is the difference between infrastructure and ad-hoc networks? 23. Mention the features of infrared transmission? 24. What are the disadvantages of infrared transmission? 25. Mention the features of radio transmission? 26. What are the disadvantages of radio transmission? 27. Define frequency hopping spread spectrum? 28. Define random back off time? 29. What is Traffic Indication Map? 30. What is Delivery Traffic Indication Map? 31. What is Ad-hoc TIM? 32. Mention the features of HIPERLAN1? 33. What are the three phases of medium access in EY-NPMA? 34. Mention the elements of Bluetooth core protocols? 35. What is the purpose of sniff state? 36. What is the use of hold state? 37. What is the purpose of park state?

BIG QUESTIONS IN UNIT-3 1. 2. 3. 4. Explain the architecture and features of IEEE 802.11 in details Write notes on WATM services and Functions. Write notes on WATM handover. Write notes on location management, addressing and access point control protocol. 5. Give a detail note on HYPERLAN 6. Account on BLUETOOTH in detail. 7. Discuss in detail about the different services of IEEE802.11. 8. Explain in detail about Adhoc networks. 9. List out the Advantages and Disadvantages of Infrastructure network and adhoc network. 10. Explain the MAC layer in IEEE802.11 11. Explain how power management is done in IEEE 802.11 infrastructure based and ad hoc networks. 12. Discuss how to increase the quality of service in an ad hoc network.

UNIT IV

NETWORK LAYER

TWO MARK QUESTIONS IN UNIT-IV 1. What is generic routing encapsulation? 2. Define COA. 3. What is meant by Transparency? 4. What is Binding Request? 5. What are the possibilities for the location of care-of-address (COA)? 6. What are the requirements for the development of mobile IP standard? 7. Why is need of routing? 8. What is Dynamic source Routing? 9. Define Mobile node. 10. What is Encapsulation and Decapsulation? 11. Define Compatibility. 12. What is Home Agent (HA)? 13. Define Foreign Agent (FA). 14. Define Agent Advertisement. 15. Define Registration. 16. Define Key distribution. 17. Applications of Dynamic Host Configuration Protocol. 18. Define DSDV (Destination Sequenced Distance Vector). 19. List the examples for interference based routing. 20. Define tunneling. 21. What are the requirements of mobile IP? 22. Mention the different entities in a mobile IP. 23. What do you mean by mobility binding? 24. Define a tunnel. 25. Define an outer header 26. Define an inner header. 27. What is the use of network address translation? 28. Define triangular routing. 29. What is meant by a binding cache? 30. Define binding request. 31. What is known as Binding update? 32. Explain binding acknowledgement. 33. Define binding warning. 34. Explain cellular IP. 35. What are the advantages of cellular IP? 36. What is known as mobility anchor point? 37. Explain destination sequence distance vector routing. 38. What are the two things added to the distance vector algorithm? 39. How the dynamic source routing does divide the task of routing into two separate problems?

BIG QUESTIONS IN UNIT-IV 1. Explain mobile IP in detail. 2. Give a detailed account of mobile ad-hoc networks. 3. Explain about DHCP: Dynamic Host Configuration Protocol. 4. Discuss about Adhoc-networks. 5. Explain about Traditional routing algorithms in detail. 6. Explain about DSDV (Destination Sequenced Distance Vector) in detail. 7. State Dynamic source routing in detail. 8. Discuss about inference routing in detail. 9. Explain the following :a)Agent Advertisement b)Encapsulation 10. Explain the following:a)Registration b)Tunneling. 11. a. What are the requirements of a mobile IP? (8) b. Describe Dynamic host configuration protocol. (8) 12. a. Discuss the routing algorithm in ad-hoc network (8) b. What are the entities in mobile IP? (8) 13. a. Discuss how optimization in achieved in mobile IP (8).b. Explain tunneling and encapsulation in mobile IP. (8) 14. Explain how dynamic source routing protocols handles routing with an example

UNIT V

TRANSPORT AND APPLICATION LAYERS

TWO MARK QUESTIONS IN UNIT-V 1. What are the two functions of the transport layer in the internet? 2. What is called the exponential growth of the congestion window? 3. List out the advantages of I-TCP. 4. List out disadvantages of I-TCP. 5. Define Slow Start. 6. How does data transmission takes place? 7. What is mean by Slow Start? 8. What is mean by SCPS-TP? 9. What are Advantages and Disadvantages of MobileTCP? 10. What is Fast retransmit? 11. What is fast recovery? 12. What is HTTP? 13. What is WAP? 14. What is WML Browser? 15. List out advantages of Transmission Freezing. 16. Define WAE. 17. What is WML? 18. Write short notes on WAP forum. 19. Distinguish between Traditional TCP and wireless TCP? 20. What is WTP? What are its classes? 21. List out the network elements of WAP. 22. What is the purpose of congestion window in classical TCP? 23. What is slow start? 24. What is the use of congestion threshold? 25. What led to the development of Indirect TCP? 26. What is the goal of M-TCP? 27. What do you mean by persistent mode? 28. What are the characteristics of 2.5G/3.5G wireless networks? 29. What are the configuration parameters to adapt TCP to wireless environments? 30. State the requirements of WAP. 31. Name the layers of WAP. 32. Name some ICMP messages. 33. What is WTP? What are its classes? 34. What is WSP? 35. Name some features of WSP adapted to web browsing. 36. What is WML? 37. What are the features of WML? 38. What are the advantages of WML Script over WML? 39. Name the libraries specified by WML Script. 40. What are the classes of libraries? 41. Name the operations performed by PAP. 42. What are the components of WAP2.0?

BIG QUESTIONS IN UNIT-V 1. Explain in detail about traditional TCP. 2. Explain about Classical TCP improvement techniques in detail. 3. Write notes on WDP and WTLS. 4. Write notes on wireless sessions protocol 5. Explain in detail about WAP. 6. Discuss about WAE and WTP. 7. Explain the following: Snooping TCP and Indirect TCP. 8. Explain the following: Selective repeat and Fast retransmit and recovery. 9. Explain the following: Freezing and transaction oriented TCP. 10. Explain about WML and WML script with the help of an example. 11. Explain classical TCP improvements and snooping TCP. 12. Explain the concept of wireless markup language. 13. Explain wireless application protocols with the its version WAP 2.0in detail. Describe the operation of the window flow control mechanism

UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS Part-1 (2 Marks) 1. What are the 3 fundamental propagation behaviors depending on their frequency? 2. What is multipath propagation? 3. What is guard space? 4. What is the 3 different basic shemes analog modulation? 5. What is the use of Phase Lock Loop (PLL)? 6. What is hopping sequence? 7. What is dwell time? 8. What are the advantages of cellular systems? 9. What is browsing channel allocation and fixed channel allocation? 10. What are the disadvantages of cellular systems? 11. What is digital sense multiple access? 12. What is Network and Switching subsystem? 13. What is authentication centre? 14. What is called burst and normal burst? 15. What are the basic groups of logical channels? 16. Define traffic multi frame and control multi frame? 17. What is OVSF? 18. Specify the steps perform during the search for a cell after power on? 19. Explain about transparent mode? 20. What are the basic classes of handovers? Part -B 1. Explain about Mobile services (16) 2. Explain System architecture (16) 3. Explain briefly about TETRA (16)

4. Write brief about UMTS and IMT-2000(16) 5. Explain about UTRAN (16) UNIT-2- TELECOMMUNICATION NETWORKS Part -1(2 Marks) 1. Specify the security services offered by GSM. 2. What is the frequency range of uplink and downlink in GSM network? 3. What are the two basic groups of logical channels in GSM? 4. What are the control channel groups in GSM? 5. List out the numbers needed to locate an MS and to address the MS. 6. What are the four possible handover scenarios in GSM? 7. What are the security services offered by GSM? 8. What is meant by GGSN? 9. What is meant by SGSN? 10. What is meant by BSSGP? 11. Define the protocol architecture of DECT. 12. Specify the standards offered by TETRA. 13. How many ITU standardized groups of 3G radio access technologies are there in IMT-2000? 14. What are the steps perform during the search for a cell after power on? 15. What are the two basic classes of handover? 16. What are the two basic transport mechanisms used by DAB? 17. What are the two transport modes defined for MSC? 18. Define Elevation Angle. 19. What are the factors limited the number of sub channels provided within the satellite channel? Part-B 1. Explain GSM architecture (16) 2. Explain Satellite networks in detail (16)

3. Write short notes on DAB (16) 4. Write short notes on DVB (16) 5. Explain about DECT (16) UNIT-III WIRLESS LAN IT 1402 MOBILE COMPUTING Part-A (2 marks) 1. What are the advantages of WLANS? 2. Mention some of the disadvantages of WLANS? 3. Mention the design goals of WLANS? 4. What is the difference between infrastructure and ad-hoc networks? 6. Mention the features of infrared transmission? 7. What are the disadvantages of infrared transmission? 8. Mention the features of radio transmission? 10. Define frequency hopping spread spectrum? 11. Define random back off time? 12. What is Traffic Indication Map? 13. What is Delivery Traffic Indication Map? 14. What is Ad-hoc TIM? 15. What is meant by roaming? 16. Mention the features of HIPERLAN1? 17. What are the three phases of medium access in EY-NPMA? 18. Mention the elements of Bluetooth core protocols? 19. What is the purpose of sniff state? 20. What is the use of hold state? 21. What is the purpose of park state? Part-B 1. Explain the architecture of IEEE 802.11(16)

2. Explain the MAC layer in IEEE802.11 (16) 3. Explain HIPERLAN 1 in detail HIPERLAN 1(16) 4. Explain about WATM (16) 5. Writ e short notes on Bluetooth. (16) UNIT: 4- MOBILE NETWORK LAYER Part A (2 marks) 1. What are the requirements of mobile IP? 2. Mention the different entities in a mobile IP. 3. What do you mean by mobility binding? 4. Define a tunnel. 5. What is encapsulation? 6. What is decapsulation? 7. Define an outer header. 8. Define an inner header. 9. What is meant by generic routing encapsulation? 10. What is the use of network address translation? 11. Define triangular routing. 12. What is meant by a binding cache? 13. Define binding request. 14. What is known as Binding update? 15. Explain binding acknowledgement. 16. Define binding warning. 17. Explain cellular IP. 18. What are the advantages of cellular IP? 19. What is known as mobility anchor point? 20. Explain destination sequence distance vector routing

21. What are the two things added to the distance vector algorithm? 22. How the dynamic source routing does divide the task of routing into two separate problems? Part -B 1. What are the requirements of a mobile IP? (16) 2. What are the entities in mobile IP? (16) 3. Explain tunneling and encapsulation in mobile IP. (16) 4. Describe Dynamic host configuration protocol. (16) 5. Explain routing in IPv6. (16) UNIT-V TRANSPORT AND APPLICATION LAYERS Part-A (2 marks) 1. What is slow start? 2. What is the use of congestion threshold? 3. What led to the development of Indirect TCP? 4. What is the goal of M-TCP? 5. What do you mean by persistent mode? 6. What are the characteristics of 2.5G/3.5G wireless networks? 7. What are the configuration parameters to adapt TCP to wireless environments? 8. State the requirements of WAP. 9. Name the layers of WAP. 10. Name some ICMP messages. 11. What is WTP? What are its classes? 12. What is WSP? 13. Name some features of WSP adapted to web browsing. 14. What is WML? 15. What are the features of WML? 16. What are the advantages of WML Script over WML?

17. Name the libraries specified by WMLScript. 18. What are the classes of libraries? 19. Name the operations performed by PAP. 20. What are the components of WAP2.0? Part-B 1. Explain traditional TCP. (16) 2. Explain classical TCP improvements (16) 3. Write short notes on WAP (16)

IT1402 Mobile Computing UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS PART A (2MARKS)

1. What are the 3 fundamental propagation behaviors depending on their frequency? 2. What is multipath propagation? 3. What is guard space? 4. What is the 3 different basic schemes analog modulation? 5. What is the use of Phase Lock Loop (PLL)? 6. What is hopping sequence? 7. What is dwell time? 8. What are the advantages of cellular systems? 9. What is browsing channel allocation and fixed channel allocation? 10. What are the disadvantages of cellular systems? 11. What is digital sense multiple access? 12. What is Network and Switching subsystem? 13. What is authentication centre? 14. What is called burst and normal burst? 15. What are the basic groups of logical channels? 16. Define traffic multi frame and control multi frame? 17. What is OVSF? 18. Specify the steps perform during the search for a cell after power on? 19. Explain about transparent mode? 20. What are the basic classes of handovers? 21. When are tuning frequency and frequency considered? 22. How can you utilize mobile antennas efficiently? 23. Compare various modulation techniques. 24. Define the relation between the data rate and bandwidth. What has harmonics to do with bandwidth? PART B 1. 2. 3. 4. 5. 6. 7. 8. 9. Discuss briefly the multiplexing techniques. Explain about the signal propagation. Discuss about the cellular system. List the difference between SDMA /TDMA /FDMA/CDMA. What is spread spectrum with its types. Explain about the TDMA. Why CDMA is needed and explain it with an example? Why do MAC scheme in wired network fail in wireless networks and how does the multiple access with collision avoidance (MACA) scheme work? Define modulation and explain the method for analog modulation techniques in details. (16) (16) (16) (16) (16) (16) (16) (16) (16) (16) (16) (08) (08)

10. Discuss briefly the code division multiplexing techniques. 11. Discuss briefly the advanced phase shift keying. 12. a. Explain about cellular wireless network. b. Explain about wireless transmission.

IT1402 Mobile Computing 13. Consider three users and Barker code of six bits each for the users transmitting the signals, introduce noise and near / far problem while transmitting and reconstruct the data in the receiving side providing the proper counter measures for the complications. Table the frequency bands used for wireless applications with their ranges, propagation 14. a.models and applications. Represent diagrammatically the protocol machines for multiple access with collision b. avoidance. UNIT- 2 TELECOMMUNICATION NETWORKS PART A (2 MARKS)

(16)

(08) (08)

1. Specify the security services offered by GSM. 2. What is the frequency range of uplink and downlink in GSM network? 3. What are the two basic groups of logical channels in GSM? 4. What are the control channel groups in GSM? 5. List out the numbers needed to locate an MS and to address the MS. 6. What are the four possible handover scenarios in GSM? 7. What is meant by GGSN? 8. What is meant by SGSN? 9. What is meant by BSSGP? 10. Define the protocol architecture of DECT. 11. Specify the standards offered by TETRA. 12. How many ITU standardized groups of 3G radio access technologies are there in IMT-2000? 13. What are the steps perform during the search for a cell after power on? 14. What are the two basic classes of handover? 15. What are the two basic transport mechanisms used by DAB? 16. What are the two transport modes defined for MSC? 17. Define the terms: i. Earth Station. ii. Uplink. 18. Define Elevation Angle. 19. What are the factors limited the number of sub channels provided within the satellite channel? 20. Differentiate Broadcast from Multicast. 21. Detail the features of MSAT. 22. How can an efficient routing be made in satellite systems? 23. What do you understand by co channel interference and adjacent? 24. Describe the services provided by GSM network. PART B 1. Explain GSM architecture. 2. Explain Satellite networks in detail. 3. Write short notes on DAB. 4. Write short notes on DVB. 5. Explain DECT. 6. Explain in details the functioning of GPRS. 7. Compare GEO, MEO and LEO (16) (16) (16) (16) (16) (16) (16)

IT1402 Mobile Computing

3 (16)

8. Sketch the data network in your campus. How many hosts are there and how large is the user population? What is the speed of the access link to the Internet? How so you gain access to the Internet? How much does home access to the Internet costs? 9. Consider a mobile user who is migrating from a place to another place provide him a a. seamless service by satellite system, also sketch the architecture. (08) b. Discuss the importance of DECT Protocol Layers. UNIT-3 WIRELESS LAN PART A (2 MARKS) 1. What are the advantages of WLANS? 2. Mention some of the disadvantages of WLANS. 3. Mention the design goals of WLANS. 4. What is the difference between infrastructure and ad-hoc networks? 6. Mention the features of infrared transmission. 7. What are the disadvantages of infrared transmission? 8. Mention the features of radio transmission. 9. What are the disadvantages of radio transmission? 10. Define frequency hopping spread spectrum. 11. Define random back off time. 12. What is Traffic Indication Map? 13. What is Delivery Traffic Indication Map? 14. What is Ad-hoc TIM? 15. What is meant by roaming? 16. Mention the features of HIPERLAN1. 17. What are the three phases of medium access in EY-NPMA? 18. Mention the elements of Bluetooth core protocols. 19. What is the purpose of sniff state? 20. What is the use of hold state? 21. What is the purpose of park state? 22. In what functionality Switches differ from Routers. PART B 1. Explain the architecture and features of IEEE 802.11 in details. 2. Explain the MAC layer in IEEE802.11. (16) (16) (08)

IT1402 Mobile Computing

3. Explain HIPERLAN in detail. 4. Write short notes on Bluetooth. 5. Explain the service offered by IEEE802.11 standard. 6. Explain how power management is done in IEEE 802.11 infrastructure based and ad hoc networks. 7. Discuss how to increase the quality of service in an ad hoc network. 8. a. Detail the time- bounded service on top of the standard DCF mechanism where ad hoc networks cannot use the function. b. Discuss the PHY frame format of an IEEE 802.11 using the spread spectrum technique which separates by code. 9. a. The channel access control sublayer of HIPERLAN offers a connectionless data transfer service to the higher MAC layer. Justify the above statement with related references. b.Discuss the functionalities and support provided by L2CAP. UNIT - 4 MOBILE NETWORK LAYER PART A (2 MARKS) 1. What are the requirements of mobile IP? 2. Mention the different entities in a mobile IP. 3. What do you mean by mobility binding? 4. Define a tunnel. 5. What is encapsulation? 6. What is decapsulation? 7. Define an outer header 8. Define an inner header. 9. What is meant by generic routing encapsulation? 10. What is the use of network address translation? 11. Define triangular routing. 12. What is meant by a binding cache? 13. Define binding request. 14. What is known as Binding update? 15. Explain binding acknowledgement. 16. Define binding warning. 17. Explain cellular IP.

(16) (16) (16)

(16) (16)

(08)

(08)

(08) (08)

IT1402 Mobile Computing 18. What are the advantages of cellular IP? 19. What is known as mobility anchor point? 20. Explain destination sequence distance vector routing. 21. What are the two things added to the distance vector algorithm?

22. How the dynamic source routing does divide the task of routing into two separate problems? PART B 1. a. What are the requirements of a mobile IP? b. Describe Dynamic host configuration protocol. 2. a. Discuss the routing algorithm in ad-hoc network. b. What are the entities in mobile IP? 3. a. Discuss how optimization in achieved in mobile IP. b. Explain tunneling and encapsulation in mobile IP. 4. Explain how dynamic source routing protocols handles routing with an example. 5. Discuss and detail the differences in topology reorganization in DSDV and DSR routing protocols. 6. a. What are the general problems of mobile IP regarding security and support of quality of service? b. Name the inefficiencies of mobile IP regarding data forwarding from a correspondent node to a mobile node. What are optimizations and what additional problems do they cause? UNIT- 5 TRANSPORT AND APPLICATION LAYERS PART A (2 MARKS) 1. What is slow start? 2. What is the use of congestion threshold? 3. What led to the development of Indirect TCP? 4. What is the goal of M-TCP? 5. What do you mean by persistent mode? 6. What are the characteristics of 2.5G/3.5G wireless networks? 7. What are the configuration parameters to adapt TCP to wireless environments? 8. State the requirements of WAP. 9. Name the layers of WAP. 10. Name some ICMP messages. 11. What is WTP? What are its classes? (08) (08) (16) (16)

(08) (08) (08) (08) (08) (08)

IT1402 Mobile Computing 12. What is WSP? 13. Name some features of WSP adapted to web browsing. 14. What is WML? 15. What are the features of WML? 16. What are the advantages of WML Script over WML? 17. Name the libraries specified by WML Script. 18. What are the classes of libraries? 19. Name the operations performed by PAP. 20. What are the components of WAP2.0? 21. How and why does I-TCP isolate problems on the wireless link? PART B 1. Explain in detail about traditional TCP in details. 2. Explain classical TCP improvements and snooping TCP. 3. Explain the function of the components of the WAP architecture. 4. Explain the concept of wireless markup language. 5. Explain wireless application protocols with the its version WAP 2.0 in detail. 6. Describe the operation of the window flow control mechanism. 7. What are the major difference between WAP 2.0 and WAP 1.x? What influenced the WAP 2.0 development?

(16) (16) (16) (16)

(16) (16)

(16)

Model Exam1 Subject Name : Mobile Computing Max. Marks: 100 Duration : 3 Hrs

Answer all the questions PART A (10 x 2 = 20 Marks) 1. Why electromagnetic waves with very low frequency not used for data transmission? 2. What are main benefits of spread spectrum system? 3. What are the reasons for delays in GSM for packet data traffic? 4. Differentiate hard and soft handoff. 5. Why is the physical layer in IEEE 802.11 subdivided? 6. What is HIPERLAN? 7. What are the differences between AODV and standard distance vector algorithm? 8. What advantages does the use of IPV6 offer for mobility? 9. How does I-TCP isolate problems on wireless link? 10. List out the advantages of WAP. PART-B (5 x 16 = 80 Marks) 11. (a) Explain in detail about multiplexing. (OR) (b) Sketch the block diagram of transmitter and receiver of DSSS & FHSS. 12. (a) Explain the functional and protocol architecture of GSM. (OR) (b) Discuss the functional and protocol architecture of GPRs. 13. (a) (i) Explain IEEE 802.11 protocol architecture and bridging with other networks. (ii) How do IEEE 802.11 solve hidden terminal problems? Explain With necessary diagrams. (OR) (b) Discuss in detail about Bluetooth. (16) (6) (10) (16) (16) (16) (16)

14. (a) Explain any one reactive routing protocol in ad-hoc networks with an example. (OR) (b) Discuss ZRP and ODMR in detail. (OR) 15. (a) Compare and contrast I-TCP, Snooping TCP and M-TCP. (OR) (b) Discuss briefly about WAP architecture.

(16)

(16)

(16)

Model Exam2 Subject Name : Mobile Computing Max. Marks: 100 Answer all the questions PART A (10 x 2 = 20 Marks) 1. Differentiate analog modulation and digital modulation. 2. How are guard spaces realized between users in CDMA? 3. What are the reasons for delays in GSM for packet data traffic? 4. How security is implemented in GSM? 5. Why is the physical layer in IEEE 802.11 subdivided? 6. What is DCF?

Duration

: 3 Hrs

7. What are the differences between AODV and standard distance vector algorithm? 8. What advantages does the use of IPV6 offer for mobility? 9. Define fast retransmit. 10. What are the classes in WTP? PART-B (5 x 16 = 80 Marks) 11. (a) Compare and contrast S/T/F/CDMA in detail. (OR) (b) Explain in detail about spread spectrum techniques. 12. (a) Explain the functional and protocol architecture of GSM. (OR) (b) Discuss channel allocation and call routing in detail. 13. (a) (i) Explain IEEE 802.11 MAC functions in detail. (ii) How do IEEE 802.11 solve hidden terminal problems? Explain With necessary diagrams. (OR) (b) Discuss in detail about HIPERLAN. 14. (a) Explain the following with respect to IP. (i) Agent Advertisement. (ii) Tunneling. (iii) Encapsulation. (OR) (b) Discuss about DSDV and DSR. (OR) 15. (a) Explain the TCP improvement techniques in detail. (OR) (b) Discuss briefly about WTLS, WSP and WAE in WAP. (16) (16) (16) (16) (10) (6) (16) (16) (16) (16)

Subject Name : Mobile Computing

Model Exam3 Max. Marks: 100

Duration

: 3 Hrs

Answer all the questions PART A (10 x 2 = 20 Marks) 1. What are the several versions in CSMA? 2. What is FDD? 3. What are types of Handover? 4. What is meant by beacon? 5. What are the advantages and disadvantages of infrared? 6. .What is the differences between AODV and standard distance vector algorithm? 7. What advantages does the use of IPV6 offer for mobility? 8. What are the requirements for the development of mobile IP? 9. Define slow start. 10. Define wml. PART-B (5 x 16 = 80 Marks) 11. (a) Discuss signal propagation techniques in detail. (OR) (b) Explain in detail about spread spectrum techniques. 12. (a) Explain channel allocation and call routing in GSM. (OR) (b) Discuss functional and protocol architecture of GPRs. 13. (a) Explain in detail about Bluetooth. . (OR) (16) (16) (16) (16) (16) (16)

(b) Discuss in detail about HIPERLAN. 14. (a) Explain the following with respect to IP. (i) Agent Registration. (ii) IP optimization. (iii) Tunneling. (OR) (b) Discuss about DHCP in detail.

(16)

15. (a) Explain I-TCP,M-TCP,S-TCP and Freezing TCP in detail. (OR) (b) Discuss briefly about WAP architecture.

(16)

(16)

Question paper code: D2286 B.E/B.Tech Degree Examination APRIL /MAY 2010 Eighth Semester Computer Science and Engineering IT1402-MOBILE COMPUTING (Regulation 2004) Answer all questions Part -A(10*2=20)Marks 1 What is spreading factor? 2.What is polling? 3.Distinguish between soft handover& hard Hand over. 4.Define foot print with respect to satellite systems. 5.State the 3 phases of the medium access of different competing nodes. 6.what are the power saving mechanisms in bluetooth? 7.What are the drawbacks of wired networks? 8.Define Dynamic Source Routing. 9.What is the difference between TCP & UDP. 10. Mention any 2 salient features of WAP. Part-B (5*16=80)Marks 11 (a) i Discuss in detail about the types of antennas with their radiation patterns.(12) ii Explain Diversity techniques.(4) [or] 11 (b) Explain space Frequency,code & Time division Multiplexing in detail.(16) 12 (a) Describe Digital Audio Broadcasting.(16) [or] (b) Explain routing ,localization and handover in satellite systems.(16) 13 (a) Describe architecture of BLUE TOOTH.(16) [or] (b)Explain Channel control sub layer in HIPERLAN.(16) 14 (a) Explain optimization in Mobile IP in detail.(16) [or] (b)Explain IPV6 Protocol in detail.(16) 15 (a) Discuss the role of WWW in support for mobility.(16) [or] (b) Explain the following: (i) Indirect TCP. (6) (ii)Snooping TCP.(6) (iii)Explain about performance enhancing proxies.(4)

B.E./B.Tech. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2009. Seventh Semester Information Technology IT1402- MOBILE COMPUTING (Regulation 2004) Time: Three hours Maximum:100 marks Answer ALL questions. PART A- (10 X 2= 20 Marks)

1. Why do Hidden and Exposed terminal problems arise? 2. Differentiate Broadcast from Multicast. 3. Detail the features of MSAT. 4. How can an efficient routing be made in satellite systes? 5. When are tuning frequency and frequency considered? 6. How can you utilize mobile antennas efficiently? 7. Compare various modulation techniques. 8. When it's required to go for GMSK, GFSK and DQPSK? 9. In what functionalities Switches differ from Routers? 10. How and why does I-TCP isolate problems on the wireless link? PART B - (5 X 16 = 80 Marks) 11. (a) Consider three users and Barker code of six bits each for the users transmitting the signals, introduce noise and near/far problem while transmitting and reconstruct the data in the receiving side providing the proper countermeasures for the complications. (Note: Use CDMA technologies) (Marks 16) (Or) (b) (i) Table the frequency bands useed for wireless applications with their ranges, propagation models and applications. (Marks 6) (ii) Represent diagrammatically the protocol machines for multiple access with collision avoidance. (Marks 10) 12. (a) (i) Sketch the data network in your campus. How many hosts are there and how large is the user population? What is the speed of the access link to the Internet? How so you gain access to the Internet? How much does home access to the Internet costs? (Marks 10) (ii) Why are so many different identifiers/addresses (e.g. MSISDN, TMSI, IMSI)

needed in GSM? Give reasons and distinguish between user- related and system related identifiers. (Marks 6) (Or) (b) (i) Consider a mobile user who is migrating from a place to another place, provide him a seamless service by satellite system, also sketch the architecture. (Marks 8) (ii) Discuss the importance of DECT Protocol Layers. (Marks 8) 13. (a) (i) Detail the time- bounded service on top of the standard DCF mechanism where ad hoc networks cannot use the function. (Marks 8) (ii) Discuss the PHY frame format of an IEEE 802.11 using the spread spectrum technique which separates by code. (Marks 8) (Or) (b) (i) The channel access control sublayer of HIPERLAN offers a connectionless data transfer service to the higher MAC layer. Justify the above statement with related references. (Marks 10) (ii) Discuss the functionalities and support provided by L2CAP. (Marks 6) 14. (a) Discuss and detail the differences in topology reorganization in DSDV and DSR routing protocols. (Marks 16) (Or) (b) (i) What are the general problems of mobile IP regarding security and support of quality of service? (Marks 8) (ii) Name the inefficiencies of mobile IP regarding data forwarding from a correspondent node to a mobile node. What are optimizations and what additional problems do they cause? (Marks 8) 15. (a) What are the major difference between WAP 2.0 and WAP 1.x? What influenced the WAP 2.0 development? (Marks 16) (Or) (b) Detail about UTMS Radio Interfaces in Frequency Division Duplex and Time Division Duplex modes. (Marks 16)

MAY /JUNE 2009 MOBILE COMPUTING. Part A 1. Define near /far effect? 2. Give any two application of satellite systems? 3. What are ad-hoc networks? 4. Define handover in WATM? 5. What is meant by Registration lifetime of a packet ? 6. What is meant by tunneling? 7. How does the standard TCP behave when a packet is lost during transmission? 8. Define time out freezing? 9. Mention the role of transaction layer in WAP? 10. Mention any two messages of WCMP? Part B 11. a)Explain in detail: i)DECT system. [Mark 8] ii)TETRA system. [Mark 8] Or b) i) Discuss LEO,MEO, and GEO satellite systems. [Mark 8] ii) Discuss Digital Video Broadcasting. [Mark 8] 12. a )Explain in detail: i)HIPERLAN [Mark 8] ii) BLUETOOTH [Mark 8] Or b) What is meant by WATM? Describe WATM reference model, location management , services and QOS. [Mark 16] 13.a) i) Discuss the purpose and application of DHCP. [Mark 8] ii) Explain agent discovery and registration. [Mark 8] Or b) Explain the various routing strategies in mobile ad-hoc networks? 14. a) Explain any 4 classical TCP improvement techniques. [Mark 16] Or b) i)Discuss Transaction oriented TCP in detail. [Mark 8] ii) Discuss TCP over 2.5/3G wireless networks. [Mark 8] 15.a) Discuss the component of WAP arch/- and its application environment. [Mark 16] Or b)i)Write short notes on WML script. [Mark 8] ii) Discuss WTA? [Mark 8]

B.E. / B.Tech DEGREE EXAMINATION, NOVEMBER/DECEMBER 2008 Seventh Semester Information Technology IT1402 MOBILE COMPUTING (Regulation 2004) Time: Three hours Maximum: 100 marks Answer ALL questions. PART A (10 x 2=20 marks) 1. Differentiate analog modulation and digital modulation. 2. How are guard spaces realized between users in CDMA? 3. What are the general problems of satellite signals travelling from a satellite to receiver? 4. Differentiate symmetrical and asymmetrical communication system. 5. What is HIPERLAN? 6. How is mobility restricted using WLANS? 7. What could be quick solutions and why dont they work? 8. What advantages does the use of IPV 6 offer for mobility? 9. Write the advantages and disadvantages of mobile TCP. 10. Define fast retransmit. PART B (5 x 16 = 80 marks) 11. (a) Explain in detail about multiplexing. Or (b) Explain the following : (i) MAC (ii) SDMA. 12. (a) Explain the functional architecture of a GSM system. Or (b) Discuss about digital video broadcasting. 13. (a) Explain the concept of blue tooth architecture. Or (b) Explain the concept of IEEE 802.11 medium access control layer. 14. (a) Explain the following : (i) DSDV [Marks 8] (ii) Ad-hoc DSR. [Marks 8] Or (b) Discuss about tunneling and encapsulation mechanism and reverse tunneling. 15. (a) Explain and detail about traditional TCP. Or (b) (i) Briefly explain about indirect and snooping TCP. [Marks 8] (ii) Briefly discuss about WAP.[Marks 8]

B.E/B.Tech. Degree Examination, April/May 2008 Eighth Semester (Regulation 2004) Computer Science and Engineering IT 1402- Mobile Computing Part-A(10*2=20 marks)

1. Assume a receiver is located 10 km from a 150 W transmitter. The carrier frequency is 6 GHz and free space propagation is assumed, Gain at transmitter is 1 dB and Gain at receiver is 1 dB. (a) Calculate the transmit power in dBW. (b) Find the power at the receiver in Watts. 2. What limits the number of simultaneous users in a TDM/FDM system compared to a CDM system ? What happens to the transmission quality of connections if the load gets higher on the cell ? 3. Consider the handoff procedure in GSM system that is based on relative signal strength with threshold; that is, a mobile switches from one cell to another if (a) the signal at the current BS is sufficiently weak (less than a predefined threshold) and (b) the other signal is stronger than the two. What are the drawbacks of this scheme, when the threshold is too low or too high ? 4. State the different types of transport modes and channels used to carry packets in Digital Audio Broadcasting. 5. In the Distributed Coordination Function(DCF) protocol of IEEE 802.11, why does a Node wait only SIFS time units (after the last data packet reception) before sending an ACK, while waiting DIFS time units before attempting a data transmission ? 6. What are the advantages and problems of forwarding mechanisms in Bluetooth networks regarding security and power saving ? 7. How can DHCP be used for mobility and support of Mobile IP ? 8. What are the differences between AODV and the standard distance vector algorithm ? Why are extensions needed ? 9. How and why does I-TCP isolate problems on the wireless link ? What are the main drawbacks of this solution ? 10.Mention two WAP service providers. Find two cell phones supporting WAP and identify which WAP version they support.

Part-B(5*16=80 marks) 11. (a) How does frequency reuse enhance cellular network capacity ? Besides the number of users, what other major factor influences the decision on cluster size ? A cellular system uses frequency spectrum 1800 MHz to 1840 MHz for uplink channels and 1860 MHz to 1900 MHz for downlink channels respectively. Each channel takes 200 KHz and can be shared by 8 users. Each user needs one uplink and one downlink channel. How many users can be supported without frequency reuse in this cellular system ? [16] (OR) (b) What is the use of spread spectrum ? Sketch the block diagram of the Transmitter and Receiver of DSSS. Explain what each block does and what the signal looks like (in time and/or frequency domains) at each location in the block diagram with an example.[16]

12. (a) Name the main elements of GSM system architecture and describe their functions. What are the advantages of specifying not only the radio interface but also the internal interfaces of the GSM system ? Explain the inter-BSC,intra-MSC handover process in the GSM system using typical signals and a message sequence chart. Explain the decision points and the resource allocation steps,if they exist.[16] (OR) (b) What is DAB ? Explain the components,frame format and the protocol used by DAB to access different formats of data also describe how DVB is used for data broadcasting and to access high speed internet. [16]

13. (a) (i) Using IEEE 802.11 (DCF): S1 and S2 send CBR/UDP traffic to the common destination D. Consider S1,S2 and D all within receive range of each other when the basic scheme is used (no RTS/CTS): Describe a collision (what happens before,during and after).What does the collision probability depend on ? When RTS/CTS is used: What are the changes to the previous answers ? comment also on the throughput and fairness. [16] (OR) (b) (i) Describe the briefly how collision is avoided in HIPERLAN-1. [8] (ii)Draw the protocol architecture of Bluetooth and explain briefly the Base band layer and L2CAP of Bluetooth. [8]

14. (a) Given the network topology below, use the dynamic source routing

algorithm to compute the shortest path from A to all other nodes. Make sure to show the results of the computation at each step.[16] 7 B --- D |\ 1/ | |\/| 12| /\ |1 | /10\ | A --- C -------- E 31 (OR) (b) Consider a mobile node MN from network X. The user of MN wishes to communicate with a corresponding node CN in network Y. The node MN moves from X to a foreign network A. Describe the sequence of messages that are required in Mobile IPv4 so that MN and CN can continue to communicate. Include both the user data messages and the Mobile IP control messages. Now, consider the case where CN moves to foreign network B while MN is still in the foreign network A. Can CN and MN still communicate ? (Does Mobile IP support both endpoints moving? ) Show the message flow to indicate how it will succeed or fail in this case. [16] 15. (a) As a transport layer protocol, TCP uses a window mechanism to exercise flow control over the best effort IP in the internet. Flow control is exercised by the edge router based on congestion status encountered in the core routers between teh TCP sender and TCP receiver. (i) Describe the operation of the window flow control mechanism. [8] (ii)ACKs from the TCP receiver are the basis that the TCP sender uses to adjust the sending window size. Describe and discuss how ACKs are used for this purpose. [8] (OR) (b) Specify the enhancements made to the basic client server architecture of the web to suit a mobile wireless user ? Briefly discuss the main goals of WAP. Expain the layers of WAP protocol used to achieve the following : A client wants to have a shared state with the server for transferring the content. [16]

DEGREE EXAMINATION MOBILE COMPUTING Time : Three Hours Maximum : 100 marks PART A (10 x 2 = 20 marks) 1. What is a guard space? 2. What is CMDA? 3. List the four possible handover and scenarios in GSM 4. Define inclination angle and elevation angle 5. Give the 802.11 PHY frame format using DSS 6. What are the low power states of a blue tooth device? 7. What is a care of address? 8. What are the routing metrics in wireless adhoc network? 9. What is a wireless Telephony application? 10. List the classes of transaction service of WTP. PART B (5 x 16 = 80 marks) 11. (a) Discuss in detail the Wireless Transaction Protocol. (16) (or) (b) Discuss in detail the Wireless Session Protocol (16) 12. (a) Explain time division multiple access (16) (or) (b) (i) Discuss the spread spectrum techniques (10) (ii) What is Code Division Multiplexing? Explain (6) 13. (a) (i) Discuss in detail localization, calling and handover in GSM (10) (ii) Explain the types of orbits in satellite system (6) (or) (b) (i) Explain the GSM system architecture (12) (ii)Explain the protocol architecture of DECT (4) 14. (a) Discuss in detail the medium access control mechanism of ICCC 802.11 (16) (or) (b) (i) Explain the information bases and networking of adhoc HIPERLAN. (8) (ii) Discuss MAC layer bluetooth system (8) 15. (a) (i)Describe tunneling and encapsulation in Mobile IP (8) (ii) Discuss in detail dynamic source routing (8) (or) (b) (i) Write short notes on reverse tunneling (4) (ii) Explain IP packet delivery, agent advertisement, discovery and registration process in mobile IP (12)

DEGREE EXAMINATION MOBILE COMPUTING Time : Three Hours Maximum : 100 marks PART A- (10x2=20 marks) 1. What is spreading factor? 2. What is polling? 3. Distinguish between soft hand over and hard hand over. 4. Define footprint with respect to satellite systems. 5. State the three phases of the medium access of different competing nodes. 6. What are the power saving mechanisms in Bluetooth? 7. What are the drawbacks of wired networks? 8. Define: Dynamic Source Routing. 9. What is the difference between TCP and UDP? 10. Mention any two salient features of WAP. PART B- (5x16=80 marks) 11.(a)(i) Discuss in detail the types of Antennas with their radiation patterns. (ii) Explain Diversity techniques. OR (b) Explain Space, Frequency, Code and Time Division multiplexing in detail. 12.(a) Describe Digital Audio Broadcasting. OR (b) Explain routing, localization and hand over in satellite systems. 13.(a) Describe the architecture of BLUE TOOTH. OR (b) Explain channel control sub layer in HIPERLAN.

14.(a) Explain optimization in Mobile IP in detail. OR (b) Explain IPv6 protocol in detail. 15.(a) Discuss the role of WWW in support for mobility. OR (b) Explain the following: (i) Indirect TCP. (ii) Snooping TCP. (iii) Explain about performance enhancing proxies.

You might also like