You are on page 1of 3

MobCommunications - UNIT I Introduction of different data streams, correction of transmission errors, and synchronization

Introduction: In the present days, wireless communication system has become an (i.e., detection of a data frame). Altogether, the data link layer is responsible for a
essential part of various types of wireless communication devices, that permits reliable point-to-point connection between two devices or a point- to-multipoint
user to communicate even from remote operated areas. There are many devices connection between one sender and several receivers. ● Network layer: This third
used for wireless communication like mobiles. Cordless telephones, Zigbee layer is responsible for routing packets through a network or establishing a
wireless technology, GPS, Wi-Fi, satellite television and wireless computer parts. connection between two entities over many other intermediate systems.
Current wireless phones include 3 and 4G networks, Bluetooth and Wi-Fi Important functions are addressing, routing, device location, and handover
technologies. between different networks. ● Transport layer: This layer is used in the reference
Applications: Television and Radio Broadcasting, Satellite Communication, Radar model to establish an end-to- end connection ● Application layer: Finally, the
Mobile Telephone System (Cellular Communication), Global Positioning System applications (complemented by additional layers that can support applications) are
(GPS), Infrared Communication, WLAN (Wi-Fi), Bluetooth, Paging, Cordless Phones situated on top of all transmission oriented layers. Functions are service location,
Radio Frequency Identification (RFID), Near Field Communications (NFC), Internet support for multimedia applications, adaptive applications that can handle the
of Things (IoT). large variations in transmission characteristics, and wireless access to the world-
Mobile And Wireless Devices: wide web using a portable device.
The definition of mobile and wireless varies from person to person and Need for Mobile Computing: Mobile computing is a generic term that refers to a
organization to organization. In many cases, the terms mobile and wireless are variety of devices that allow people to access data and information from wherever
used interchangeably, even though they are two different things. Let's start with they are. Sometimes referred to as "human-computer interaction," mobile
the term mobile. Mobile is the ability to be on the move. A mobile device is computing transports data, voice, and video over a network via a mobile device.
anything that can be used on the move, ranging from laptops to mobile phones. Mobile computing can use cellphone connections to make phone calls, as well as
As long as location is not fixed, it is considered mobile. Areas that are not included to connect to the Internet. They include: Laptops, Smartphones, Tablets and
in our definition of mobile include remote offices, home offices, or home Wearable computers. ● Portability: Devices/nodes connected within the mobile
appliances. While these are definitely remote, they are not considered mobile. computing system should facilitate mobility. These devices may have limited
Wireless refers to the transmission of voice and data over radio waves. It allows device capabilities and limited power supply, but should have a sufficient
workers to communicate with enterprise data without requiring a physical processing capability and physical portability to operate in a movable
connection to the network. Wireless devices include anything that uses a wireless environment. ● Connectivity: This defines the quality of service (QoS) of the
network to either send or receive data. The wireless network itself can be accessed network connectivity. In a mobile computing system, the network availability is
from mobile workers, as well as in fixed locations. expected to be maintained at a high level with the minimal amount of
A mobile device (or handheld computer) is a computing device small enough to lag/downtime without being affected by the mobility of the connected nodes. ●
hold and operate in the hand. Typically, any handheld computer device will have Interactivity: The nodes belonging to a mobile computing system are connected
an LCD flatscreen interface, providing a touchscreen interface with digital buttons with one another to communicate and collaborate through active transactions of
and keyboard or physical buttons along with a physical keyboard. Many such data. ● Individuality: A portable device or a mobile node connected to a mobile
devices can connect to the Internet and interconnect with other devices such as network often denote an individual; a mobile computing system should be able to
car entertainment systems or headsets via Wi-Fi, Bluetooth, cellular networks or adopt the technology to cater the individual needs and also to obtain contextual
near field communication (NFC). Integrated cameras, digital media players, the information of each node.
ability to place and receive telephone calls, video games, and Global Positioning Wireless Transmission: Wireless transmission is a form of unguided media.
System (GPS) capabilities are common. Power is typically provided by a lithium Wireless communication involves no physical link established between two or
battery. Mobile devices may run mobile operating systems that allow third-party more devices, communicating wirelessly. Wireless signals are spread over in the
apps specialized for said capabilities to be installed and run.Early smartphones air and are received and interpreted by appropriate antennas. When an antenna
were joined in the late 2000s by larger, but otherwise the same, tablets. Input and is attached to electrical circuit of a computer or wireless device, it converts the
output is now usually via a touch-screen interface. Phones/tablets and personal digital data into wireless signals and spread all over within its frequency range. The
digital assistants may provide much of the functionality of a laptop or desktop receptor on the other end receives these signals and converts them back to digital
computer but more conveniently. Enterprise digital assistants can provide data. A little part of electromagnetic spectrum can be used for wireless
additional business functionality such as integrated data capture via barcode, RFID transmission.
and smart card readers. By 2010, mobile devices often contained sensors such as
accelerometers, magnetometers and gyroscopes allowing detection of orientation
and motion. Mobile devices may provide biometric user authentication such as
face recognition or fingerprint recognition.
Simplified Reference Model:
1) Radio Transmission: Radio frequency is easier to generate and because of its
large wavelength it can penetrate through walls and structures alike. Radio waves
can have wavelength from 1 mm – 100,000 km and have frequency ranging from
3 Hz (Extremely Low Frequency) to 300 GHz (Extremely High Frequency). Radio
frequencies are sub-divided into six bands. Radio waves at lower frequencies can
travel through walls whereas higher RF can travel in straight line and bounce back.
The power of low frequency waves decreases sharply as they cover long distance.
High frequency radio waves have more power. Lower frequencies such as VLF, LF,
MF bands can travel on the ground up to 1000 kilometers, over the earth’s surface.
2) Microwave Transmission: Electromagnetic waves above 100 MHz tend to travel
in a straight line and signals over them can be sent by beaming those waves
towards one particular station. Because Microwaves travels in straight lines, both
sender and receiver must be aligned to be strictly in line-of-sight. Microwaves can
have wavelength ranging from 1 mm – 1 meter and frequency ranging from 300
Mobile terminals are computerized devices which feature a screen on which to MHz to 300 GHz. Microwave antennas concentrate the waves making a beam of it.
view information and a keyboard or keypad for entering information, and may be As shown in picture above, multiple antennas can be aligned to reach farther.
connected to various peripheral devices. A base station is a fixed point of Microwaves have higher frequencies and do not penetrate wall like obstacles.
communication for customer cellular phones on a carrier network. The base Microwave transmission depends highly upon the weather conditions and the
station is connected to an antenna (or multiple antennae) that receives and frequency it is using. 3) Infrared Transmission: Infrared wave lies in between
transmits the signals in the cellular network to customer phones and cellular visible light spectrum and microwaves. It has wavelength of 700-nm to 1-mm and
devices. That equipment is connected to a mobile switching station that connects frequency ranges from 300-GHz to 430-THz. Infrared wave is used for very short
cellular calls to the public switched telephone network (PSTN). A single base range communication purposes such as television and it’s remote. Infrared travels
station may extend the service providers network by blocks or by miles. Base in a straight line hence it is directional by nature. Because of high frequency range,
stations are company-specific. However, a single site may host multiple base Infrared cannot cross wall-like obstacles. 4) Light Transmission: Highest most
stations from competing telecommunication companies. Conventional servers electromagnetic spectrum which can be used for data transmission is light or
typically have all the protocols implemented in a server environment. ● Physical optical signaling. This is achieved by means of LASER. Because of frequency light
layer: This is the lowest layer in a communication system and is responsible for the uses, it tends to travel strictly in straight line. Hence the sender and receiver must
conversion of a stream of bits into signals that can be transmitted on the sender be in the line-of-sight. Because laser transmission is unidirectional, at both ends of
side. The physical layer of the receiver then transforms the signals back into a bit communication the laser and the photo-detector needs to be installed. Laser beam
stream. For wireless communication, the physical layer is responsible for is generally 1mm wide hence it is a work of precision to align two far receptors
frequency selection, generation of the carrier frequency, signal detection each pointing to lasers source. Laser works as Tx (transmitter) and photo-detectors
(although heavy interference may disturb the signal), modulation of data onto a works as Rx (receiver). Lasers cannot penetrate obstacles such as walls, rain, and
carrier frequency and (depending on the transmission scheme) encryption. ● Data thick fog. Additionally, laser beam is distorted by wind, atmosphere temperature,
link layer: The main tasks of this layer include accessing the medium, multiplexing or variation in temperature in the path. Laser is safe for data transmission as it is
very difficult to tap 1mm wide laser without interrupting the communication 6) Code-division multiplexing: Code division multiplexing (CDM), Code division
channel. multiple access (CDMA) or spread spectrum is a class of techniques where several
Multiplexing: In telecommunications and computer networks, multiplexing channels simultaneously share the same frequency spectrum, and this spectral
(sometimes contracted to muxing) is a method by which multiple analog or digital bandwidth is much higher than the bit rate or symbol rate. One form is frequency
signals are combined into one signal over a shared medium. The aim is to share a hopping, another is direct sequence spread spectrum. In the latter case, each
scarce resource. For example, in telecommunications, several telephone calls may channel transmits its bits as a coded channel-specific sequence of pulses called
be carried using one wire. Multiplexing originated in telegraphy in the 1870s, and chips. Number of chips per bit, or chips per symbol, is the spreading factor. This
is now widely applied in communications. In telephony, George Owen Squier is coded transmission typically is accomplished by transmitting a unique time-
credited with the development of telephone carrier multiplexing in 1910. The dependent series of short pulses, which are placed within chip times within the
multiplexed signal is transmitted over a communication channel such as a cable. larger bit time. All channels, each with a different code, can be transmitted on the
The multiplexing divides the capacity of the communication channel into several same fiber or radio channel or other medium, and asynchronously demultiplexed.
logical channels, one for each message signal or data stream to be transferred. A Advantages over conventional techniques are that variable bandwidth is possible
reverse process, known as demultiplexing, extracts the original channels on the (just as in statistical multiplexing), that the wide bandwidth allows poor signal-to-
receiver end. A device that performs the multiplexing is called a multiplexer (MUX), noise ratio according to Shannon-Hartley theorem, and that multi-path
and a device that performs the reverse process is called a demultiplexer (DEMUX propagation in wireless communication can be combated by rake receivers.
or DMX). Inverse multiplexing (IMUX) has the opposite aim as multiplexing, namely A significant application of CDMA is the Global Positioning System (GPS).
to break one data stream into several streams, transfer them simultaneously over Multi access method: A multiplexing technique may be further extended into a
several communication channels, and recreate the original data stream. Types: multiple access method or channel access method, for example, TDM into time-
Multiple variable bit rate digital bit streams may be transferred efficiently over a division multiple access (TDMA) and statistical multiplexing into carrier-sense
single fixed bandwidth channel by means of statistical multiplexing. This is an multiple access (CSMA). A multiple access method makes it possible for several
asynchronous mode time-domain multiplexing which is a form of time-division transmitters connected to the same physical medium to share its capacity.
multiplexing. Digital bit streams can be transferred over an analog channel by Multiplexing is provided by the Physical Layer of the OSI model, while multiple
means of code-division multiplexing techniques such as frequency-hopping spread access also involves a media access control protocol, which is part of the Data Link
spectrum (FHSS) and direct-sequence spread spectrum (DSSS). In wireless Layer. The Transport layer in the OSI model, as well as TCP/IP model, provides
communications, multiplexing can also be accomplished through alternating statistical multiplexing of several application layer data flows to/from the same
polarization (horizontal/vertical or clockwise/counter-clockwise) on each adjacent computer. Other widely used multiple access techniques are time-division multiple
channel and satellite, or through phased multi-antenna array combined with a access (TDMA) and frequency-division multiple access (FDMA). Code-division
multiple-input multiple-output communications (MIMO) scheme. 1) Space- multiplex techniques are used as an access technology, namely code-division
division multiplexing: In wired communication, space-division multiplexing, also multiple access (CDMA), in Universal Mobile Telecommunications System (UMTS)
known as Space-division multiple access is the use of separate point-to-point standard for the third-generation (3G) mobile communication identified by the ITU
electrical conductors for each transmitted channel. Examples include an analogue (International Telecommunication Union).
stereo audio cable, with one pair of wires for the left channel and another for the Spread Spectrum and Cellular Systems: In telecommunication and radio
right channel, and a multi-pair telephone cable, a switched star network such as a communication, spread-spectrum techniques are methods by which a signal (e.g.,
telephone access network, a switched Ethernet network, and a mesh network. an electrical, electromagnetic, or acoustic signal) generated with a particular
In wireless communication, space-division multiplexing is achieved with multiple bandwidth is deliberately spread in the frequency domain, resulting in a signal with
antenna elements forming a phased array antenna. Examples are multiple-input a wider bandwidth. These techniques are used for a variety of reasons, including
and multiple-output (MIMO), single-input and multiple-output (SIMO) and the establishment of secure communications, increasing resistance to natural
multiple-input and single-output (MISO) multiplexing. An IEEE 802.11n wireless interference, noise and jamming, to prevent detection, and to limit power flux
router with k antennas makes it in principle possible to communicate with k density (e.g., in satellite down links). Frequency-hopping spread spectrum (FHSS),
multiplexed channels, each with a peak bit rate of 54 Mbit/s, thus increasing the direct-sequence spread spectrum (DSSS), time-hopping spread spectrum (THSS),
total peak bit rate by the factor k. Different antennas would give different multi- chirp spread spectrum (CSS), and combinations of these techniques are forms of
path propagation (echo) signatures, making it possible for digital signal processing spread spectrum. Each of these techniques employs pseudorandom number
techniques to separate different signals from each other. These techniques may sequences—created using pseudorandom number generators—to determine and
also be utilized for space diversity (improved robustness to fading) or beamforming control the spreading pattern of the signal across the allocated bandwidth.
(improved selectivity) rather than multiplexing. Wireless standard IEEE 802.11 uses either FHSS or DSSS in its radio interface. ●
2) Frequency-division multiplexing: Frequency-division multiplexing (FDM): The FHSS: Frequency-hopping spread spectrum (FHSS) is a method of transmitting
spectrum of each input signal is shifted to a distinct frequency range. Frequency- radio signals by rapidly switching a carrier among many frequency channels, using
division multiplexing (FDM) is inherently an analog technology. FDM achieves the a pseudorandom sequence known to both transmitter and receiver. It is used as a
combining of several signals into one medium by sending signals in several distinct multiple access method in the code division multiple access (CDMA) scheme
frequency ranges over a single medium. In FDM the signals are electrical signals. frequency-hopping code division multiple access (FH-CDMA). ● DSSS: In
One of the most common applications for FDM is traditional radio and television telecommunications, direct-sequence spread spectrum (DSSS) is a spread
broadcasting from terrestrial, mobile or satellite stations, or cable television. Only spectrum modulation technique used to reduce overall signal interference. The
one cable reaches a customer's residential area, but the service provider can send spreading of this signal makes the resulting wideband channel noisier, allowing for
multiple television channels or signals simultaneously over that cable to all greater resistance to unintentional and intentional interference. Some practical
subscribers without interference. Receivers must tune to the appropriate and effective uses of DSSS include the Code Division Multiple Access (CDMA)
frequency (channel) to access the desired signal. channel access method and the IEEE 802.11b specification used in Wi-Fi networks.
A variant technology, called wavelength-division multiplexing (WDM) is used in ● THSS: Time-hopping (TH) is a communications signal technique which can be
optical communications. used to achieve anti-jamming (AJ) or low probability of intercept (LPI). It can also
3) Time-division multiplexing: is a digital (or in rare cases, analog) technology refer to pulse-position modulation, which in its simplest form employs 2k discrete
which uses time, instead of space or frequency, to separate the different data pulses (referring to the unique positions of the pulse within the transmission
streams. TDM involves sequencing groups of a few bits or bytes from each window) to transmit k bit(s) per pulse. To achieve LPI, the transmission time is
individual input stream, one after the other, and in such a way that they can be changed randomly by varying the period and duty cycle of the pulse (carrier) using
associated with the appropriate receiver. If done sufficiently quickly, the receiving a pseudo-random sequence. The transmitted signal will then have intermittent
devices will not detect that some of the circuit time was used to serve another start and stop times. Although often used to form hybrid spread-spectrum (SS)
logical communication path. Carrier sense multiple access and multidrop systems, TH is strictly speaking a non-SS technique. Spreading of the spectrum is
communication methods are similar to time-division multiplexing in that multiple caused by other factors associated with TH, such as using pulses with low duty
data streams are separated by time on the same medium, but because the signals cycle having a wide frequency response. An example of hybrid SS is TH-FHSS or
have separate origins instead of being combined into a single signal, are best hybrid TDMA (time division multiple access).
viewed as channel access methods, rather than a form of multiplexing. ● CSS: In digital communications, chirp spread spectrum (CSS) is a spread spectrum
4) Polarization-division multiplexing: It uses the polarization of electromagnetic technique that uses wideband linear frequency modulated chirp pulses to encode
radiation to separate orthogonal channels. It is in practical use in both radio and information. A chirp is a sinusoidal signal whose frequency increases or decreases
optical communications, particularly in 100 Gbit/s per channel fiber optic over time (often with a polynomial expression for the relationship between time
transmission systems. and frequency). In the picture is an example of an upchirp in which the frequency
5) Orbital angular momentum multiplexing: It is a relatively new and experimental increases linearly over time.
technique for multiplexing multiple channels of signals carried using Medium Access Control – Comparisons: In IEEE 802 LAN/MAN standards, the
electromagnetic radiation over a single path. It can potentially be used in addition medium access control (MAC) sublayer, also known as the media access control
to other physical multiplexing methods to greatly expand the transmission sublayer, and the logical link control (LLC) sublayer together make up the data link
capacity of such systems. As of 2012 it is still in its early research phase, with small- layer. Within that data link layer, the LLC provides flow control and multiplexing
scale laboratory demonstrations of bandwidths of up to 2.5 Tbit/s over a single for the logical link (i.e. EtherType, VLAN etc), while the MAC provides flow control
light path. This is a controversial subject in the academic community, with many and multiplexing for the physical link, i.e. the transmission medium. the MAC block
claiming it is not a new method of multiplexing, but rather a special case of space- provides a control abstraction of the physical layer such that the complexities of
division multiplexing. physical link control are invisible to the LLC and upper layers of the network stack.
When sending data to another device on the network, the MAC block encapsulates MAC: While being simple and improving energy efficiency, the low power listening
higher-level frames into frames appropriate for the transmission medium (i.e. the approach used by B-MAC which employs a long preamble is suboptimal in terms
MAC adds a syncword preamble and also padding if necessary), adds a frame check of energy consumption, is subject to overhearing, as well as introducing excess
sequence to identify transmission errors, and then forwards the data to the latency at each hop.
physical layer as soon as the appropriate channel access method permits it. Comparison Table:
Controlling when data is sent and when to wait is necessary to avoid congestion
and collisions, especially for topologies with a collision domain (bus, ring, mesh,
point-to-multipoint topologies). Additionally, the MAC is also responsible for
compensating for congestion and collisions by initiating retransmission if a jam
signal is detected, and/or negotiating a slower transmission rate if necessary.
When receiving data from the physical layer, the MAC block ensures data integrity
by verifying the sender's frame check sequences, and strips off the sender's
preamble and padding before passing the data up to the higher layers. According
to IEEE Std 802-2001 section 6.2.3 "MAC sublayer", the primary functions
performed by the MAC layer are: 1) Frame delimiting and recognition; 2)
Addressing of destination stations (both as individual stations and as groups of
stations); 3) Conveyance of source-station addressing information; 4) Transparent
data transfer of LLC PDUs, or of equivalent information in the Ethernet sublayer;
5) Protection against errors, generally by means of generating and checking frame
check sequences; 6) Control of access to the physical transmission medium; 7)
receive/transmit normal frames; 8) half-duplex retransmission and backoff
functions; 9) append/check FCS (frame check sequence); 10) interframe gap
enforcement; 11) discard malformed frames; 12) prepend(tx)/remove(rx)
preamble, SFD (start frame delimiter), and padding; 13) half-duplex compatibility:
append(tx)/remove(rx) MAC address. Types & Comparisons of MACs:

● Sensor MAC (S-MAC): The key idea behind S-MAC is the utilization of managed
synchronized duty cycles. A duty cycle utilizes a periodic awake and sleep schedule,
allowing nodes in sleep mode turn off their radio. A duty cycle is represented as a
ratio of wake time to total cycle time, S- MAC limits it duty cycles to about 10%,
reducing energy waste by attempting to minimize idle listening. Sleep and listen
periods are predefined and constant in S-MAC; ● Timeout MAC (T-MAC): T-MAC
is similar to S-MAC in that it utilizes an active/sleep duty cycle. However, TMAC
improves upon the design of S-MAC by introducing an adaptive duty cycle in which
the active part is dynamically ended, in- creasing the efficiency of the algorithm for
variable traffic loads. The idea behind the design of T-MAC is as follows. While
latency requirements and buffers space are generally fixed, the message rate will
usually vary. Therefore, the nodes must be implemented with an active time that
can handle the highest expected load. Whenever the load is lower than that which
is expected, the active time is not optimally used and energy will be wasted on idle
listening; ● S-MACL, a Global Sleeping Schedule: As mentioned the S-MAC
protocol creates virtual clusters in which the clustered nodes follow a common
sleeping schedule. In order to connect these virtual clusters, nodes residing
between clusters have to adopt multiple schedules. These nodes, known as border
nodes, constitute nearly 50 percent of the nodes in some net- works and may have
to adopt up to 4 different schedules. These border nodes have to stay in active
mode longer than other node, which means that they waste more energy than
non-border nodes. Resultantly, these nodes will die sooner, and the network
coverage rate is reduced; ● Patten MAC (P-MAC): P-MAC is unique in that instead
of having fixed sleep and awake schedules as with S-MAC, the sleep- wakeup
schedules of the sensor nodes are adaptively determined, based on a node’s own
traffic and that of its neighbors. This improves throughput under heavy traffic and
reduces unwanted energy consumption while the networks is performing under
light loads when compared to the performance S-MAC; ● Traffic-Adaptive MAC
(TRAMA): As a traffic load increase, the probability of collisions of control or data
packets occurring in any contention-based scheme increases. This degrades
channel utilization and further reduces battery life. TRAMA implementation
attempts to provide energy-efficient conflict free channel access in wireless sensor
networks by creating transmission schedules that are adaptive to changes,
prolongs the battery life of each node, and is robust to wireless loses [7]. The
protocol consists of three components: the Neighbor Protocol (NP), the Schedule
Exchange Proto- col (SEP) and the Adaptive Election Algorithm (AEA). Additionally,
TRAMA uses single, time-slotted channel access that is divided up into random and
scheduled access periods; ● B-MAC, a Versatile Low Power MAC: B-MAC is a
carrier sense media access (CSMA) protocol that utilizes low power listening and
an extended preamble to achieve low power communication. Further- more, B-
MAC is designed for duty cycled WSN, so nodes have an awake and a sleep period,
and each node can have an independent schedule; ● X-MAC, a Short Preamble

You might also like