Professional Documents
Culture Documents
Wireless Networks
V. Jeyasri Arokiamary
M.E., PGDBA, MISTE,
Formerly Associate Professor, Department of ECE,
Kumaraguru College of Technology,
Coimbatore - 641 006.
Tamilnadu
® TM
TECHNICAL
PUBLICATIONS
SINCE 1993 An Up-Thrust for Knowledge
(i)
Wireless Networks
Subject Code : EC8004
Published by :
® TM
Amit Residency, Office No.1, 412, Shaniwar Peth, Pune - 411030, M.S. INDIA
TECHNICAL P h . : + 9 1 - 0 2 0 - 2 4 4 9 5 4 9 6 / 9 7 , Te l e f a x : + 9 1 - 0 2 0 - 2 4 4 9 5 4 9 7
PUBLICATIONS
SINCE 1993 An Up-Thrust for Knowledge Email : sales@technicalpublications.org Website : www.technicalpublications.org
Printer :
Yogiraj Printers & Binders
Sr.No. 10\1A,
Ghule Industrial Estate, Nanded Village Road,
Tal-Haveli, Dist-Pune - 411041.
Price : ` 225/-
ISBN 97 8-93-89420-66-1
9 789389 420661 AU 17
The book uses plain, lucid language to explain fundamentals of this subject. The
book provides logical method of explaining various complicated concepts and stepwise
methods to explain the important topics. Each chapter is well supported with necessary
illustrations, practical examples and solved problems. All the chapters in the book are
arranged in a proper sequence that permits each topic to build upon earlier studies. All
care has been taken to make students comfortable in understanding the basic concepts
of the subject.
The book not only covers the entire scope of the subject but explains the philosophy
of the subject. This makes the understanding of this subject more clear and makes it
more interesting. The book will be very useful not only to the students but also to the
subject teachers. The students have to omit nothing and possibly have to cover nothing
more.
I wish to express my profound thanks to all those who helped in making this book a
reality. Much needed moral support and encouragement is provided on numerous
occasions by my whole family. I wish to thank the Publisher and the entire team of
Technical Publications who have taken immense pain to get this book in time with
quality printing.
Any suggestion for the improvement of the book will be acknowledged and well
appreciated.
Author
V. Jeyasri Arokiamary
(iii)
ACKNOWLEDGEMENT
What shall I render to the LORD for all his benefits towards me ? I will take up the
cup of salvation and call upon the name of the LORD.
I am grateful to the Lord Jesus Christ for strengthing me to write this book.
I wish to thank my husband D. Anthony and loving son Richie Immanual for their
patience and understanding while writing this tenth book.
I also thank the Publishers, and the staff team of Technical Publications for
bringing out this book with quality printing.
Finally I thank all the readers who are very much supportive of my books.
Author
V. Jeyasri Arokiamary
(iv)
Syllabus
Wireless Networks (EC8004)
UNIT I WIRELESS LAN
Introduction-WLAN technologies: - IEEE802.11: System architecture, protocol architecture,
802.11b, 802.11a – Hiper LAN: WATM, BRAN, HiperLAN2 – Bluetooth: Architecture, WPAN – IEEE
802.15.4, Wireless USB, Zigbee, 6LoWPAN, WirelessHART
(iv)
Table of Contents
Unit - I Wireless LAN
1.3.4.3 Deauthentication . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 13
1.4 Types................................................................................................................1 - 13
1.4.1 802.11a Standard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 13
1.4.2 802.11b Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 14
1.6 HIPERLAN.........................................................................................................1 - 18
1.6.1 OFDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 23
1.7 WATM..............................................................................................................1 - 25
1.7.1 Services of WATM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 25
1.7.2 Generic Reference Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 25
(v)
1.7.3 Handover Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 26
1.7.4 Location Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 26
1.7.5 Mobility - Quality of Service (QoS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 27
1.8 BRAN................................................................................................................1 - 27
1.9 Hiper LAN2 - Bluetooth....................................................................................1 - 28
1.9.1 Bluetooth Radio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 28
1.9.1.1 Vertical Antenna . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 29
1.9.2.2 Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 29
1.9.2.3 Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 30
1.9.2.5 Polarization . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 30
(vii)
Unit - III 3G Overview
(viii)
4.2.2 Disadvantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 - 3
(ix)
5.8 Advanced Broadband Wireless Access and Services .......................................5 - 20
5.9 Mobile Virtual Network Operator (MVNO) .....................................................5 - 21
University Questions with Answers .................................................................5 - 22
Appendix - A Extra Long and Two Marks Questions with Answers
(A - 1) to (A - 16)
(x)
Unit
Wireless LAN
I
Syllabus
Introduction - WLAN technologies : - IEEE802.11: System architecture, protocol architecture,
802.11b, 802.11a – Hiper LAN: WATM, BRAN, HiperLAN2 – Bluetooth: Architecture, WPAN-IEEE
802.15.4, Wireless USB, Zigbee, 6LoWPAN, Wireless HART
Contents
1.1 Introduction to Wireless Local Area Networks [WLAN] ...May-18, Dec.-18 · · · · · · · Marks 5
1.2 Wireless LAN (WLAN) Technologies . . . . . . . . . May-17, Dec.-18 · · · · · · · · · · · · Marks 8
1.3 Introduction to 802.11 Standard . . . . . . . . . . . . . May-17, 18, 19, Dec.-17, 18 · · · Marks 16
1.4 Types
1.5 IEEE 802.11 Standard for WLAN
1.6 HIPERLAN
1.7 WATM . . . . . . . . . . . . . . . . . . May-19 · · · · · · · · · · · · · · · · · · Marks 2
1.8 BRAN
1.9 Hiper LAN2 - Bluetooth . . . . . . . . . . . . . . . . . . May - 17, 18, Dec. - 17· · · · · · · Marks 16
1.10 WPAN
1.11 Wireless USB (WUSB)
1.12 IEEE 802.15.4
1.13 Zigbee
1.14 6LoWPAN
1.15 Wireless HART
(1 - 1)
Wireless Networks 1-2 Wireless LAN
The wireless local area network (WLAN) is a technology developed for wideband
local accesses. The coverage area is upto 100 meters WLAN enables data related LAN
functioning. WLAN is generally restricted to a campus, office building or a room and
not operated by very large network owners. WLAN has a goal to achieve flexible ad
hoc communications.
The attractive features of WLAN are :
1. Design is simple.
2. Flexible radio coverage.
3. Robust in nature.
4. Quality of service (QoS) is good.
5. Has slow standardization and proprietary solutions grows higher.
6. Security.
7. Safety.
There are many design goals for developing WLAN as a competing technology :
It should provide ;
1. Low power.
2. Global operation (acceptance).
3. Robustness.
4. Simplicity in real time functioning.
5. Transparency.
6. Flexible with other networks.
Main standards of WLAN are :
1) IEEE 802.11. 2) HIPERLAN.
· Wireless LAN’s are useful for network management by reducing the cost of LAN
ownerships.
· Network managers implement wireless LAN's to enable backups for meeting
critical applications.
· Applications like car rental services provide faster service with real time customer
related information input and retrieval of the same.
· Wireless LAN’s provide reduced cost of deployment.
TM
Wireless LAN technology can be classified into three groups as given below.
Classification
(Example)
Server
hp
Application protocol
Mobile
station
LLC RELAY
802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY
LLC
Data link
management
layer MAC
MAC
Station
(DLL) management
PLCP
Physical PHY
layer management
(PHY) PMD
Fig. 1.2.1
TM
In wireless LAN
technology SS-LAN is a better UM f2 UM
method where interference
CM
problems are highly reduced. Frequency
UM (f1) UM UM UM UM f3 UM
Many cells (for example) may
overlap with other with same CM CM
centre frequencies but by UM UM UM UM
using SS techniques
interferences are reduced.
Ethernet
For example, in multiple switch (ES)
hp
Router
WLAN, in each cell there are or bridge
control module (CM) and
Fig. 1.2.2 Multiple cell WLAN using hub topology
user modules (UM). The
wireless LAN's are linked to backbone by using routers/bridges functionalities which are
TM
done by control module. It acts as an interface. Each CM has its own range of
transmission. Within each cell a hub or peer to peer topology may be used. In the above
hub topology, WLAN hub can be kept (mounted) on the ceiling and it is connected to
that of the WLAN. It is possible to have automatic hand off of mobile stations by such
WLAN hub topologies. On the other hand in a peer to peer configuration there will be
no hub and a MAC algorithm can be applied for control mechanisms.
This is well suited in ad hoc type of LAN's. The SS-WLAN’s are limited to data
rates of 1-3 Mbps.
An example for this narrow band LAN's are narrow band microwave LAN’s where
a narrow band of microwave frequency is used for communication. They are two
categories commonly used. They are licensed narrow band RF and unlicensed narrow
band RF. A dynamic relay function in LAN is made possible by which every station acts
like a repeater to drag data/message between stations if they are out of range. This is
done in narrow band WLAN.
The 802.11 IEEE standard is very popular today because of its low cost and easy
deployment. The 802.11a and 802.11b standards are discussed in this chapter. The future
of the standard will rely on 802.11e which gives provision for hybrid co-ordination
function, that is two medium access mechanisms (MAC). They are controlled channel
access and contention based channel access. The electronic hardware IEEE 802.11 based
WLAN is applied in different categories as given below.
1. Residential areas.
2. Airports.
3. Apartments.
4. Classrooms etc.
While the ability or efficiency of the network is increased the quality of service (QoS)
is continuously ensured.
This standard operates at either 2.4 GHz frequency for industrial area. Scientific and
medical band (ISM band) or the 5 GHz unlicensed national information infrastructure
(UNI) band. A common radio channel can be shared and the procedures required for
802.11 standard is defined by medium access control layer (MAC). This standard
supports both ad hoc and infrastructure mode.
TM
In the year 1987 the analysis of wireless local area network (wireless LAN) began
with the IEEE 802 standard. In particular the IEEE 802.11 standard was dedicated for the
development of wireless LAN operation. The medium access protocol called as MAC
Distribution System
(DS)
AP
Basic STA 1
Service Set AP
STA 5
STA 2
STA 4
STA 3
STA 6 STA 7 Basic
service set
AP - ACCESS POINT.
STA - STATION.
DS - DISTRIBUTION SYSTEM.
ESS - EXTENDED SERVICE SET.
protocol is widely related to this standard. In a way the 802.11 standard is somewhat
similar to Ethernet, and it also adapts Ethernet technology to serve the wireless world.
The important components of IEEE 802.11 standard are listed as four groups. They
are wireless medium, Access points, distribution system and the corresponding station.
These four groups will be dealt later in this chapter.
The architecture of IEEE 802.11 standard is given below. The building block of a
wireless LAN is a basic service set (BSS). It uses the MAC protocol to access the wireless
medium.
Each station in the entire system belongs to a particular BSS, and their association is
dynamic. The two or more services are interconnected through a distribution system
known as DS. The extended service set (ESS) will usually consist of two or more basic
service sets. The ESS is like one logical LAN to the logical link control (LLC) level.
Whenever an access to the distribution system from station is required the logic access
point AP enables to establish connectivity between station and distribution system.
Similarly to integrate the wired local area network and 802.11 standard a portal is used.
It is nothing but a logic implemented in a device like router or bridge, which is a part
of the wired LAN and it can be attached to the distribution system.
The entire family of this IEEE 802.11 standard in connection to the open system
(OSI) model will ease the understanding of the underlaying concept of it.
The IEEE 802 family mainly deals with the physical layer and data link layer of OSI
model as depicted in the diagram above. In general the 802.11 standard has both MAC
and physical components. The MAC lies in the data link layer whereas the physical
layer holds two important components known as physical layer convergence procedure
(PLCP) which helps to map the MAC frames onto the medium and a physical medium
dependent (PMD) system to transmit the frames. Each branch under this 802.11 family
802.1 MANAGEMENT
OVERVIEW OF 802
component
Physical
Fig. 1.3.2 The OSI model and IEEE 802 family interlink diagram
TM
tree is responsible for a specification. For example 802.5 is token ring specification and
802.3 is for carrier sense multiple access network with collision detection known as
CSMA/CD.
It is also worthwhile to say that 802.11 is just another link layer which can use the
802.2/LLC encapsulation. As in the interlink diagram shown above, there are two
physical layers along with MAC and are known as frequency hopping spread-spectrum
(FHSS) and direct sequence spread spectrum (DSSS) links. Further revisions of 802.11
added the 802.11a as orthogonal frequency division multiplexing (OFDM) and 802.11b as
high rate direct sequence spread spectrum layer (HR/DSSS) link. The 802.11 is attractive
since it enhances its services to mobile technology.
The architecture of IEEE 802.11 protocol consists of MAC layer with logical link
control for providing many services. The MAC layer consists of three functional layers.
1) Access Control :
There are two important protocols considered for access control. First, the distributed
access protocol to distribute decision to transmit data and second a centralized access
protocol by which 'centralized decision' is made. It is used to connect many wireless
stations. The distributed access protocol enables an ad hoc network.
2) Security :
The data transfer under 802.11 standard is more secure. The content of the signal is
retrieved only by proper recipient and the content remains hidden for an unauthorised
user.
TM
Contention
Free Service (CFS)
Contention
Point Service (CS)
Co-ordination
Function (PCF) MAC
layer
Distributed Co-ordination Function (DCF)
D FS Contention window
P FS
2 2 6 6 2 6 From 0 to 2312 4
· Frame Control (FC) : It indicates type of frame and also provides control
information.
· Duration/Connection ID : Whenever it is used as duration field, it indicates the
time a channel will be allocated for a successful transmission of a MAC frame. It
may also contain an association or connection identifier.
Addresses :
The address fields depends on context. The address types includes source,
transmitting station and receiving station.
Frame Body :
It generally contains a MAC service data units (MSDU) or a fragment of an MSDU.
This MSDU is a logical link control (LLC) protocol data unit (or) the MAC control
information.
TM
Wait upto
the frame
transmits
s 'N'
medium
dle?
'Y'
Wait
FS
'Y'
Wait
Transmission FS
of frame
s still 'N'
dle?
'Y'
Providing exponential
backoff while medium
is in idle state
Starting transmission of
frame
Note : If there is longer back off time periods it will smooth out the heavy load
condition in MAC logic of IEEE 802.11 standard.
The IEEE 802.11 standard provides both authentication and privacy mechanisms. At
the transmitter end encryption process is done and at receiver end decryption is done.
TM
Key Key
The encrypted input signal is called as cipher text which consists of plaintext the
original data as hidden information. A secret key is used at transmitter which may be
private or public key. The decryption algorithm along with secret key helps to get back
the plain text from cipher text.
1.3.4.1 Authentication
The IEEE 802.11 standard has two types of authentication schemes namely open
system and shared key system.
In the open system authentication, an "authentication frame" (MAC control frame) is
sent by first party to the second party. If such a frame is sent it is assumed that an open
system type of authentication is an process. The second party responds by sending its
authentication frame to first party and finally they exchange information without the
security concerns being addressed.
In shared key authentication a common secret key is shared between two parties and
it is kept confidential, so that any intruder cannot access the data.
1.3.4.3 Deauthentication
Whenever the existing authentication has to be terminated then this deauthentication
will be invoked.
The medium access control in data link layer for IEEE 802.11 is dealt below.
1.4 Types
IEEE 802.11a and 802.11b
The IEEE 802.11 infrared scheme is omnidirectional rather than a point to point
scheme. The modulation used is pulse position modulation. The two schemes 802.11a
and 802.11b are the two important specifications of 802.11 standard.
The 802.11a standard group utilizes 5 GHz frequency. The larger frequency band is
chopped into many number of channels (subchannels) using orthogonal frequency
division multiplexing (OFDM) scheme.
The subchannels in OFDM are used to transmit the data, and set of all the
sub channels are combined as one common channel. The data rates allowed are upto
54 Mbps.
In conventional frequency division multiplexing (FDM) scheme guard bands are
inserted between consecutive bands of information to avoid overlapping.
In OFDM scheme all the subchannel frequencies overlap as shown below but still
maintains transmission without interference. It is possible using the technique known as
orthogonality.
With the OFDM technique intersymbol interference may not make a big problem.
But if the subcarriers are tightly packed into a particular channel it may cause inter
carrier interference (ICI).
For 802.11a IEEE standard the convolutional code at different data rates forward
error correction is allowed to correct any errors in reception.
TM
FDM
OFDM
The 802.11b standard is an extension of IEEE 802.11 DSSS scheme providing data
rates of 5.5 Mbps and 11 Mbps. The 11 Mbps data rate scheme with complementary
code keying (CCK) modulation method is used for 802.11b Mbps in a some what
complex method.
TM
In this scheme the input data are treated in blocks each with 8 bits at a data rate of
1.37 MHz (approx.) so that 1.37 MHz multiplied with 8 bits per symbol representation is
11 Mbps proper mapping can be done for 6 bits of each 8 bits persymbol with one of
the 64 codes sequence using a 8 ´ 8 Walsh matrix. The output of the mapping process
summed with two bits will be taken as input to a quadrature phase shift keying (QPSK)
modulator unit. Walsh codes are used since they are common orthogonal codes applied
in code division multiplication access (CDMA) linked applications.
Selecting one
of 64 complex
codes Output
Differential
modulation
nput MUX Q
data (1 8) Output
11 MHz
Fig. 1.4.2 Modulation scheme
IEEE 802.11 Services
This standard provides multiple services which are basically inherent to the wired
systems. A list of services and their corresponding providers are tabulated below.
The IEEE 802.11 standard also defines three services which are Authentication,
Privacy and Deauthentication.
1.5 IEEE 802.11 Standard for WLAN
IEEE 802.11 is a set of standards used to implement WLAN. The frequency bands
are 2.4, 3 and 5 GHz. The base version of IEEE 802.11 in 2007 was developed and it has
many amendmends.
The popular versions of IEEE 802.11 standard are defined as 802.11b and 802.11g
protocols and they are amendmends to the basic 802.11.
TM
· Descriptions of 802.11b, e, f, g, h, n : The 802.11b and 802.11g uses 2.4 GHz ISM
bands. They might suffer due to interferences. 802.11b is accepted widely for
WLAN in wireless networks and it is followed by 802.11g and 802.11n.
802.11n is a new multi streaming modulation technique. Apart from this other
standards like c-f, h, j are known for service amendmends and connections and used as
extensions with previous specifications.
To control interference problems. The 802.11b and 802.11g uses direct sequence
spread spectrum (DSSS) and the orthogonal frequency division multiplexing (OFDM)
methods.
The IEEE 802.11e is a new standard that supports Quality of Service (QoS) in
Wireless Local Area Networks (WLANs). The mechanisms for supporting QoS, are
Enhanced Distribution Coordination Function (EDCF) and Hybrid Coordination Function
(HCF) are defined in 802.11e standard and they have to be evaluated.
In addition to the features in 802.11 standard to support QoS,. The 802.11e has these
special mechanisms. IEEE 802.11 Task Group E defines enhancements to the 802.11 MAC
and it is 802.11e standard. It has introduced EDCF and HCF.
The stations that operate under 802.11e are called as enhanced stations. It can act as
centralized controller for other stations within the same BSS is known as Hybrid
Coordinator (HC).
Note : Count down takesplace till the medium is idle and there will be back off
when the medium enters into busy.
Single station can implement even up to eight transmission queues are realized as
virtual stations, and QoS parameters determines priorities. For parallel TC's in single
station if two counters reaches zero simultaneously. A scheduler inside station will avoid
virtual collisions.
TM
AIFS(TC)
AIFS(TC)
DIFS
Low priority
PIFS back off
TC
Time
SIFS Medium priority
back off
SIFS TC
High priority
ACK RTS
TC
Contention CTS
SIFS
window
DATA Defer
access
It will reside within an 802.11e AP. With the 802.11e standard there might be two
phases of operations within superframes that is CP and CFP. They alternate over time in
a continuous manner. The EDCF is and used only in CP where as HCF is used in two
phases. This makes new coordination function hybrid.
TM
CF- end
Beacon
RTS/CTS
TXOP
TXOP TXOP
TBTT TBTT
Fig. 1.5.2 802.11e Superframe
Note : Every station knows when the next beacon frame will be arriving. This time is
the target beacon transition time (TBTT). TBTT as shown in the superframe will be
announced in every beacon frame.
1.6 HIPERLAN
The HIPERLAN is "HIgh PErformance Radio LAN" and it is a European standard.
This HIPERLAN standard was initiated in 1999. The HIPERLAN-1 technology is acutally
based on some functional requirements that is specified by ETSI. The frequency
spectrum of 5.15 to 5.35 GHz band was first used by WLAN standard ( @ 5 GHz).
The two standards HIPERLAN-1 and HIPERLAN-2 have some functional
requirements.
· Data rate – 23.5 Mbps.
· Ad hoc – Multihop networking capability.
· Provides coverage upto 100 m.
· Enhanced power saving.
· Provides time bounded services.
In HIPERLAN-1 multihop topology is followed and overlapping of two WLAN's is
possible.
Actually this standard group had its origin in 1992 and the maximum work was
completed in 1997. It satisfies some of the functional requirements specified by a group
of European standard and for high speed wireless local networks known as ETSI. Also
CEPT released the frequency spectrum at 5 GHz to 17 GHz for the implementation of
HIPERLAN-1 standards. HIPERLAN-1 was followed by HIPERLAN-2 which mainly
TM
focussed on high data rates. The HIPERLAN and HIPER ACCESS were used for remote
access functions where as HIPER-LINK was used to interconnect switches in the
backbone of network. Some of the functional requirements of HIPERLAN-1 included
features like,
i) Multihop ad hoc network capability.
ii) Flexible with power saving methods.
iii) Wider coverage (@ 100 m).
iv) Should be compatible with various time-bound services.
The ad hoc network architecture in HIPERLAN-1 is shown in Fig. 1.6.1 (a). The solid
lines shows the peer to peer communications between two terminals whereas the dashed
lines shows the forward link lines, inside the HIPERLAN. Three terminals A, D and F
have the forward link connections. The terminal 'D' is a member of HIPERLAN-1 and
HIPERLAN-2. Since it is located at the overlapping portion of the two HIPERLAN's
Multihop operation between the terminals is made possible. A forwarder node accepts
the packet and if the packet has no address of its own then forwarder node retransmits
the packet to some other terminal in its neighbourhood. But a Non-forwarder node
accepts the packet as it is. Also a non-forwarder should select atleast one of its
neighbour as a forwarder node.
The InterHIPERLAN needs a bilateral co-operation and agreement between the two
HIPERLAN’s is involved. In peer to peer type of communication shown by solid lines
below and the dotted lines represent connections for forwarding.
B
A
D
F
HIPERLAN
A
HIPERLAN
Fig. 1.6.1 (a) Architecture of ad hoc network in HIPERLAN-1
TM
The architecture of ad hoc network (B) is shown in Fig. 1.6.1 (b) with forwarding and
non-forwarding network. It is related to the previous Fig. (A) shown in Fig. 1.6.1 (a).
1 2
6
f
f
4 f
HIPERLAN
B
HIPERLAN
Fig. 1.6.1 (b) Architecture of Ad hoc network in HIPERLAN-1 related to Fig. 1.6.1 (a)
As the two HIPERLAN’s (1 and 2) overlap with each other a common node falls in
the intersecting area. It is also a forwarding node. In this architecture the forwarding
node is denoted as 'f'.
The physical layer (PHY) uses 200 MHz at 5.15 to 5.35 GHz which can be divided
into 5 channels with a spacing of 40 MHz in European countries and divided into 6
channels with a spacing of 33 MHz spacing in U.S. The modulation used is single carrier
Gaussian minimum shift keying (GMSK) scheme with a transmission power of 1 W. The
data rate is upto 23 Mbps. A simple implementation of fall back data rates is possible
with multisymbol quadrature amplitude modulation (QAM) embedded in OFDM
scheme. In HIPERLAN-1, maximum of 47 codewords per packet are possible.
Contention phase
P.P. Elimination Yield
Cycle phase
synchronization burst
interval
Priority Yield
detection Elimination listening Data
survival transmission
verification
Priority (ES)
assertion
A Listen before talk protocol known as Non preemptive multiple access (NPMA)
type protocol is used by HIPERLAN-1. It has similarities with 802.11 standard and also
supports voice oriented transmission and asynchronous transmissions.
A "priority scheme" is defined by HIPERLAN-1 MAC scheme. The channel access
scheme in HIPERLAN-1 is shown below.
In the channel access in HIPERLAN-1 technology, if a channel is busy the terminal
access has three phases whenever a channel becomes available. The three phases are;
1. Prioritization phase 2. Contention phase 3. Transmission phase.
1) Prioritization Phase :
The terminals with highest priority will survive and the remaining terminals have to
wait till the channel becomes available.
Hence implementation of WLAN should clearly show the prioritization.
2) Contention Phase :
It has two time periods defined as,
1) Elimination period 2) Yield period.
During the elimination period a random number generator is executed by each
terminal and selects any one of twelve available slots and sends a burst consisting of
256 bits. Upto 256-bit durations it verifies (listens) to the channel and if the terminal
does not hear any burst after the transmission it will again transmit as burst after
twelveth slot in elimination survival (ES) verification zone.
If the terminal hears a burst signal in elimination survival (ES) zone period they will
elimate themselves. The rest of the terminals alone will enter to yield time period of the
contention survival interval. The duration of yield period of each terminal is determined
from an exponentially distributed random variable. It helps to reduce average waiting
time required to run the counter. Later HIPERLAN-2 followed this HIPERLAN-1 WLAN
standard. HIPERLAN-2 supported WLAN in many aspects. It uses two types of major
topologies known as Infrastructure and Ad hoc structures. HIPERLAN-2 standard mostly
co-ordinates in all sense with IEEE 802.11 standard and some examples are,
1. Working on higher layers.
2. Transmission technique.
It enables integration of WLAN into cellular systems for which 2 features are
important.
Features
(1) (2)
Supporting Supporting
a. Roaming between QoS control for
LAN and WAN integration of WLAN with
b. Roaming between corporate cellular system
public environments
TM
HIPERLAN-2 focusses on ATM and IP services with high data rates. It also supports
connection less and connection oriented services. The demerit of HIPERLAN-1 is that it
supports connectionless services.
Transmission phase :
Topologies
If a node has survived both the prioritization and contention phases can send data.
This protocol data unit (PDU) can be either unicast or multicast. In unicast transmission
the sender will expect to receive acknowledgement immediately. This acknowledgement
is sent from destination node.
Two types of topologies are possible with HIPERLAN-2 standard.
The architecture of HIPERLAN-2 may follow Ad hoc or infrastructure topology.
The HIPERLAN-2 supports centralized topology and ad hoc type topologies. In
infrastructure type, the router controls all the neighbourhood nodes through subnets.
Intranet is established with routers 1 and 2. A subnet (say A) can communicate with
subnet (say B) in this structure.
Router
Subnet B
ntranet
Router
Subnet A
(a) Infrastructure
(b) Ad hoc
Higher layer
Convergence layers
Connection Connection
based less
Communication management
MAC
Physical layer
TM
The principle orthogonality of adjacent carriers are used and their efficient
implementation is based on Fast Fourier Transform (FFT).
The Multicarrier Modulation (MCM) is used for high speed voice frequency band
modems. In conventional type of modulation carrier is modulated with a particular rate.
But in MCM 'N' numbers of carriers are considered and each of the carrier is modulated
with a specific rate and with a spacing in between them. To prevent overlapping
between symbols a particular time period as guard time is allowed between two OFDM
pulses in transmission with the cost of reduced data rate. Some carriers are intended for
redundancy and synchronization purposes.
The multisymbol modulation scheme uses multiphase modulation and
multiamplitude modulation techniques which helps to avail the data rate. Quadrature
Phase Shift Keying (QPSK) is a traditional keying method that can be used where four
symbol system is followed encoding two bits in one of the four transmitted symbols and
the signal constellation is such that four points represents amplitudes and phases of the
symbols. The symbol transmission rate is double with this scheme when it is compared
with Binary Phase Shift Keying (BPSK) scheme.
In multirate transmission approach under OFDM even in channel degradation
conditions reliable data transmission is possible.
The signal to noise ratio (SNR) increases as the modulation efficiency increases. If
the subscriber moves away from base station SNR value will reduce and the error rates
can be measured.
Convergence layer
RLC
Logical channels
MAC
Medium Access Control
Transport channels
Physical layer
TM
Wireless ATM features mostly are from telecommunication technology. WATM are
useful in 'Quality of services' which in turn suppots WLAN's like HIPERLAN 2.
An integration of wireless terminals and ATM networks are needed in present
wireless scenario.
For a mobile ATM the extensions of ATM system has to be accounted.
They include,
· Location management
· Mobile routing
· Network management
· Handover signalling and
· QoS and traffic control system etc.
WATM can be designed and used for sending voice data, high quality video,
classical data, short messages etc. For example the areas where WATM can be used are,
· Wireless and mobile access from distances, internet access, multi-media
computing in universities, schools etc.
· Information retrieval, data-base connection in industries.
· Transfer of medical images, remote patient monitoring system in hospitals.
· Home equipment like TV, CD-player, PC control.
· For networked vehicle access control.
· Office environment etc.
TM
Radio
segment
WATM Radio
MATM EMAS -E EMAS-N
terminal access
terminal (Switch) (Network)
adapter system
Fixed
end ATM
system switch
In location management there are several requirements with WATM. They include,
· Security of information
· Transparency of mobility
TM
· Efficiency
· Scalability
· Identification
· Inter-working standards in which the location management functionalities should
cooperate with existing fixed ATM networks.
The main advantage for the WATM networks is guaranteed QoS. The WATM has to
provide Mobile QoS (M-QoS). It comprises of three unique parts. They are namely,
· Handover QoS,
· Wired QoS, and
· Wireless QoS
This WATM system should do mapping of QoS and set of its parameters. Also it has
to monitor the completion of service request.
On each wireless and wired case WATM must also map the end-to-end
requirements, such as mapping of end-to-end delay with the all delay factors.
Note : In QoS support of handover protocols are capable of supporting two types of
QoS whenever handover takes place. They are hard handover QoS and 'Soft handover
QoS'.
1.8 BRAN
TM
The BRAN technology is not dependent from the protocols of that of fixed networks.
This technology is useful for ATM and the TCP/IP networks. It is shown in the layered
model of BRAN. The Data Link Control (DLC) of the BRAN provides a common
interface to other higher layers. A network convergence sublayer (NCSL) is used for this
purpose. This layer is used by Ethernet, WATM or even an Internet Protocol (IP)
network. In the situations of BRAN as Radio Access Link (RAL) for WATM then the
core ATM networking may use the BRAN-NCSL services.
Note : BRAN has specific four various network types including HIPERLAN 1,
HIPERLAN 2, HIPERLINK and HIPERACCESS standards.
The Bluetooth technology lies under Wireless Local Area Network (WLAN). The
wireless LAN setup provides more benefits than wired LAN by avoiding the cost of
installing LAN cabling and makes simple relocation whenever a network’s structure has
to be changed.
The Wireless Personal Area Network (WPAN) uses infrared rays and radio waves
for communication, establishment. i.e. It is made possible for a Personal Computer (PC)
to communicate with another Infrared device, IRDA (Infrared Data Association) like
another Personal Digital Assistant (PDA) or a PC or a mobile phone.
One of the PAN technology standard is known as Bluetooth. It mainly uses radio
instead of infrared. The data rate is of 1 Mbps for a distance of 10 meters, approx.
It is independent of line of sight technique. Hence the wireless PAN (WPAN) works
in ad hoc mode only.
In Latin generally the term 'ad hoc' means "for this particular purpose only". It
means 'spontaneous' small area network. The new devices like bluetooth or 802.11 IEEE
standard used this "ad hoc" technique. Hence bluetooth deals with short range wireless
technology. It provides low cost solution. Also it provides links between mobile
computers, portable handheld devices, cellular phones etc. The Bluetooth ad hoc
technique is considered as a challenge and interesting topic to develop by the Bluetooth
special Interest Group.
The bluetooth technology was mainly intended to work in 2.4 GHz band frequency.
The wavelength of the bluetooth radio signal is around 12.5 cms. The antenna useful for
bluetooth signal transmission and reception can be vertical antenna and dipole antenna.
TM
Main lobe
Side lobe
Back lobe
1.9.2.3 Efficiency
It is defined as the ratio of power level of transmitted signal and the received signal.
The compatability of the transmitter and receiver should hold good for better power
level which in turn enables higher efficiency.
1.9.2.4 Return Loss
The return loss is used to measure the antenna performance, and it is expressed in
decibel units. If the antenna can absorb 50 % of the signal where the remaining portion
of signal is reflected then the return loss is – 3 dB.
1.9.2.5 Polarization
Polarization is a parameter that expresses the direction of electric field in comparison
with that of the earths surface. The polarization may be any one of the three types,
vertical, horizontal (or) circular polarization.
Note : 1) The bluetooth transmitter uses Gaussian Frequency Shift Keying (GFSK),
where a binary 1 is equalent to positive frequency deviation and binary 0 is equalent
to negative frequency deviation.
The bluetooth devices can be classified as any one of three different power classes.
Example :
Power Class Max Output Min Output
of Bluetooth Power Level Power Level
1 100 mW 1 mW
2 2.4 mW 0.25 mW
It is a simple and direct network scheme which connects two devices with each
other. It is also known as P2P connection. Out of the two devices one device is assumed
to be a piconet master device (M) and the other device is assumed as a slave(S).
Master Slave
M S
Fig. 1.9.3
Point-to-Multipoint and piconet connection
In a point to multipoint connection minimum of more than two devices form a
network. It is also called as piconet where a maximum of eight devices can be connected
in a network.
One device acts as a master device (M) and other devices are called as slave
devices(S).
Seven slaves
S
S S S
One master
S M S M S
S
S S
(a) (b)
Fig. 1.9.4 (a) One master and three slave communication
(b) One master with seven slaves communication under piconet
Note : A piconet for bluetooth can contain upto 256 devices in a communication
network but only eight devices can actively participate among them. No data transfer
is allowed between slaves (S) of same piconet and allowed only through the master
(M) device.
1.9.4 Scatternet
S S
S S S S
S M S S M S
Slave
S P S P
S S
Parked
Master device
Piconet 'B'
Piconet 'A'
Fig. 1.9.5 Example of scatternet where slave of piconet A communicates with master of
piconet B
1.9.5 Bluetooth Connectionmode Relationship
TM
If a Bluetooth device is in active mode it transmits and receives packets, which may
be of data or control packets. Each slave is assigned a bit address to differentiate it from
a packed device. It is valid as long as the slave is a member of the piconet setup. The
other three modes are mainly intented for saving power by reducing their own duty
cycles.
When the device is in hold mode it has intermediate power efficiency which is
achieved by making the particular device inactive temporarily for short time intervals.
For this purpose a timer is used internally.
The sniff mode is good in prolonging or safe guarding the life of battery by
minimising unnecessary transmission of the poll packets. Whenever communication
between master and slave is large sniff mode is more suitable. Devices that are in sniff
mode have least power efficiency with highest duty cycle than other modes.
When a slave decides to be inactive for a particular time interval it enters into park
mode that has larger duration than hold and sniff modes. Though this slave device does
not participate in data traffic it maintains its synchronization with the master device in
piconet.
Applications
Baseband
Radio frequency
TM
services to that of the upper layers protocol. It may include services like segmentation,
reassembly protocol multiplexing and also group abstractions for the data packets. The
control informations can be exchanged. The Service Discovery Procotol (SDP) enables
two or more Bluetooth devices in case of supporting a particular service. The Telephone
Control Protocol (TCP) is used to define the both call control.
Signalling and mobility management in connection with cordless telephone
applications. Finally the RFCOMM in Bluetooth stack is a 'cable replacement' protocol
that will provide RS232 control and also data signals of Bluetooth baseband signal.
· Call home from a distant place to turn any appliances on and off, set alarm etc.
· It also helps in monitoring remotely the home networks, air conditioners, ovens
etc.
· The control is possible with bluetooth upto 10 meters. It is developed such that
can be used by many users.
· The 'piconet setup' i.e. eight small devices can communicate in a small network
helps to develop networking for a short range. Also upto ten piconets can be in a
same coverage range of the Bluetooth radio.
· To provide security each link is protected and encoded and hence Bluetooth
technology assures user authentication.
· The short range wireless connectivity oriented applications like cable replacement,
Ad hoc networking and data-voice accessing are possible with Bluetooth.
1.9.8 Three Classes of Bluetooth Protocol
Class 3 :
It mainly comprises of the existing protocols which are actually adopted by the
Bluetooth Special Interest Group (SIG). It includes protocols like PPP, WAP, WAE,
UDP/TCP/IP, OBEX, V-card, V-cal etc.
The Bluetooth devices in a piconet consists of master and slave configuration. The
piconet has structures like single-slave piconet, multi-slave piconet and scatternet. In
single-slave piconet one slave is connected to a single master.
S
M
M S
M M
S
S M
S
S
S
S S S
S S S
1 2 3
2 - Multi-slave piconet
Slave (S)
3 - Scatternet
In the Bluetooth specification one packet per hop is enabled and a single slot packet
with duration of 625 msec is extended to three other slots of 1875 msec duration is
allowed. Different data rates (speed) of data and voice applications regarding to form a
piconet is possible. In the frame format given below there are 74 bits for accessing a
code field and 54 bits for the header field different payloads that can even be 5 slots are
enabled in bluetooth packet setup.
S-add (3) Type (4) Flow (1) ARQ (1) SEQ (1) HEC (8)
18 Bits repeats
three times
In this format the header field has 18 bits and it is repeated three times and
considered as 54 bits. The four bit packet type can allow sixteen choices for various
voice and data services including control packets.
TM
address and it will be still synchronized with that of the piconet of the setup. A device
in this park mode will not be a part of broadcasting phase.
SB Unconnected stand by
state
2. Distance For 10 meter, 100 meter distances For 15-150 meters/300 meters for
with high transmit power. indoor and outdoors areas.
5. Data rate Uses slower data rate : 1 Mbps Example : 802.11a standard : 24
raw data. Rate future version may to 54 mbps, with 5 GHz
deal with 2 Mbps data rate. bandwidth.
TM
7. Power Lower current draw and longer High current draw and shorter
battery life. battery life.
8. Security The key length of algorithm is 64 bit and 128 bit encryption
selectable within the range of 8 or capability available.
128 bits.
1.10 WPAN
The Wireless Personal Area Networks (WPAN) works effectively in promoting user
needs. One such example of WPAN is Bluetooth technology. It is a short range
technology and works with 2.4 GHz frequency. The wavelength is around 12.5 cms.
The Bluetooth technology lies under Wireless Local Area Network (WLAN). The
wireless LAN setup provides more benefits than wired LAN by avoiding the cost of
installing LAN cabling and makes simple relocation whenever a network’s structure has
to be changed.
The Wireless Personal Area Network (WPAN) uses infrared rays and radio waves
for communication, establishment. i.e. It is made possible for a Personal Computer (PC)
to communicate with another Infrared device, IRDA (Infrared Data Association) like
another Personal Digital Assistant (PDA) or a PC or a mobile phone.
One of the PAN technology standard is known as Bluetooth. It mainly uses radio
instead of infrared. The data rate is of 1 Mbps for a distance of 10 meters, approx.
It is independent of line of sight technique. Hence the wireless PAN (WPAN) works
in ad hoc mode only.
TM
A transfer rate of 480 Mbps is possible within a 3 m radius from the PC. If the
distance increases then the transfer rate also decreases.
WUSB works on a frequency range from 3.1 GHz to 10.6 GHz.
1.14 6LoWPAN
It is a protocol which facilitates carrying of IPv6 packets on the top of low power
networks which adhere to IEEE 802.15.4. Initially an adaption layer “IP over Foo”
adhering to the constraints of IPv6 was envisaged to cater to 1280 byte MTU with larger
address sizes. Hence, a set of headers accommodating large IPv6 headers compressed
into a small header of nearly 4 bytes was designed. This also used mesh networks,
fragmentation/reassembly when required. This was to enable even smaller devices use
Internet protocol.
In 6LoWPAN instead of using a single header e.g. As in Zigbee, it has used stacked
headers associated with IPv6. As it cuts down the cost as header are sent only when
absolutely required. Further, this results in energy saving so as to ensure “low cost, low
power.”
A prefix is used to identify the header. The dispatch header indicates the header
types which follows the dispatch header (6 bits) essentially, defines the compressed
header of IPv6. The mesh Header (4 bytes) has two single but fields indicating the
source or destination. The fragmentation header (3 bytes) takes care of the 6LoWPAN
was initially designed by IETF (Inernet Engineering Task Force) for usage is small
networks.
6LoWPAN is essentially smaller than Zigbee etc. as shown in Fig. 1.14.1 below.
Parameter 6LoWPAN
RAM 4K
TM
Uncompressed
0 0 0 0 0 0 1 IPV6 address, 40 bytes
(i)
(ii)
11 0 Tag size
(iii)
By stacking all the headers the compatibility is achieved for the network. The
concept of stacked header is shown in Fig. 1.14.3 below.
6LoWPAN also allows header compression to suit IPv6.
NETWORK HEADER
D Src
Preamble Fctr Fch
16 16
APPLICATION
DATA
Frag
1st
IP
UPP
Review Questions
Part A
1. Define a network and wireless network.
2. Mention three parameters of an efficient network.
3. Compare LAN, MAN and WAN networks.
4. Define metropolitan area network.
5. Define local area network.
6. Define wide area network.
7. Draw an internetwork arrangement.
8. List three applications of WLAN.
9. What is 802.11 standard ?
10. What are the advantages of 802.11 standard ?
11. What is known as DLC ?
12. What is known as LLC ?
13. Define medium access control.
14. Differentiate DLC and PHY under MAC.
15. Draw the protocol stack of IEEE 802.11 standard.
TM
TM
Part B
1. Explain WLAN technologies including infrared, UHF narrowband and spread spectrum in detail.
2. Explain the system architecture, protocol architecture of IEEE 802.11 standard in detail?
3. Describe the physical layer and MAC layer in IEEE 802.11 standard with neat sketches.
4. What are IEEE 802.11 a and IEEE 802.11 b ? Explain.
5. Explain the architecture of bluetooth with its radiolayer baseband layer and link manager protocol in
detail.
6. i) Explain sequence control in IEEE 802.11 ?
ii) Explain IEEE 802.11a standard ?
7. i) Explain connection management in bluetooth radio.
ii) Comment on frame format in bluetooth technology.
8. Explain the following,
i) Wireless USB
ii) Zigbee
iii) 6LoWPAN
9. Explain IEEE 802.15.4 standard and wireless HART in detail.
Part A
1. State the significance of Radio transmission over infrared. (Refer section 1.2.1)
AU : May - 17, Marks 2
2. Give any three differences between HIPERLAN 1 and HIPERLAN 2. (Refer sections 1.3 and 1.9)
AU : May - 18, Marks 2
3. What is IEEE 802.11 ? What are the functions of MAC layer in 1EEE 802.11 ?
(Refer sections 1.3 and 1.3.2) AU : May - 18, Marks 2
4. What is the principle behind infrared technology ? What are the advantages and disadvantages of
infrared technology ? (Refer sections 1.2.1 and 1.1.1) AU : Dec. - 18, Marks 2
5. Identify the need of WATM systems. (Refer sections 1.7.1) AU : May - 19, Marks 2
Part B
1. Explain and compare the medium access mechanism of DCF methods adopted in IEEE 802.11
WLAN. (Refer section 1.3.2) AU : May - 17, Marks 16
2. Describe the user scenario architecture and protocol stack of Bluetooth technology.
(Refer section 1.9.6) AU : May - 17, Marks 16
3. Explain in detail about the IEEE 802.11 protocol architecture and bridging with other networks.
(Refer section 1.3.2) AU : Dec. - 17, Marks 16
4. Define hiperlan-2. Discuss about the various operation modes and protocol stack in hiperlan-2.
(Refer sections 1.9, 1.9.5 and 1.9.6) AU : Dec. - 17, Marks 16
TM
5. With neat sketch describe the architecture of IEEE 802.11 and explain the MAC management
techniques. (Refer section 1.3.2) AU : May - 18, Marks 16
6. Elucidate the advantages of WLAN techniques. (Refer sections 1.1 and 1.1.1)
AU : May - 18, Marks 5
7. Explain the architecture of hyperlan II protocol. (Refer sections 1.9 and 1.9.6)
AU : May - 18, Marks 11
8. Compare infrared vs radio transmissiion techniques. (Refer sections 1.2, 1.2.1, 1.2.2 and 1.2.3)
AU : Dec. - 18, Marks 8
9. Elucidate the advantages of WLAN technique. (Refer sections 1.1.1 and 1.2)
AU : Dec. - 18, Marks 8
10. Draw the protocol architecture of WLAN (802.11). Explain the physical lauyer and MAC
management layer of 802.11. (Refer section 1.3.2) AU : Dec. - 18, Marks 16
11. Describe the IEEE 802.11 MAC data frame format with relevant diagram. (Refer section 1.3.2)
AU : May - 19, Marks 13
12. Give the strategy of logical link control and adaptation protocol (L2CAP).
(Refer sections 1.3.2 and 1.3.3) AU : May - 19, Marks 13
qqq
TM
Notes
TM
Contents
2.1 Mobile IP . . . . . . . . . . . . . . . . . . May - 18 · · · · · · · · · · · · · · · · · Marks 16
2.2 Goals and Requirements of Mobile IP . . . . . . . . . . May-17, 18, 19, Dec. - 18 · · · · · Marks 16
2.3 Agent Discovery in Mobile IP . . . . . . . . . . . . . . . . . Dec.-17, 18, May - 19 · · · · · · · Marks 16
2.4 IP-in-IP Encapsulation . . . . . . . . . . . . . . . . . . May - 17, 19, Dec.-17 · · · · · · · Marks 16
2.5 IP Packet Delivery . . . . . . . . . . . . . . . . . . Dec. - 18· · · · · · · · · · · · · · · · · · Marks 8
2.6 IPv6
2.7 Entities and Terminologies . . . . . . . . . . . . . . . . . . Dec.-17, May - 19 · · · · · · · · · · Marks 15
2.8 Session Initiation Protocol (SIP) . . . . . . . . . . . . . . May - 18, 19, Dec.-18 · · · · · · · Marks 16
2.9 Mobile Ad-hoc Network . . . . . . . . . . . . . . . . . . May - 19 · · · · · · · · · · · · · · · · · · Marks 2
2.10 Routing . . . . . . . . . . . . . . . . . . May-17, 18, Dec.-17, 18 · · · · · · Marks 16
2.11 Comparison of Cellular Networks and Ad-hoc Networks ... May-18· · · · · · · · · · · · Marks 2
(2 - 1)
Wireless Networks 2-2 Mobile Network Layer
Introduction : Overview
Whenever the user is connected to an application(s) across the Internet it is said to
be in mobile status. The routers actually uses the IP address in IP datagram to do the
routing function. The network portion of an IP address helps routers to send datagram
from source computer to network where the target computer is attached (connected)
with. Mobile IP can also deal with dynamic IP addresses.
Terminologies related to mobile IP :
· Home address : The IP address on the network is known as home address.
· Home network : A mobile node is designated to a network which is called as
home network.
· Foreign agent : The router on the foreign network is called as foreign agent.
· Foreign network : Whenever the mobile node moves the attachment point to
another network then it is called as foreign network.
Home agent : The mobile node that communicates with the router of its home
network is called as a “home agent”.
Care of address : It is the address that is used to identify the location of foreign
agent.
In wireless and wired networks as soon as a person leaves his home network packet
data reception is immediately stopped. Because of routing mechanisms packet reception
in mobile status is not possible. On the otherhand addresses of all the computers in
internet has to be kept stored but it is not practically implementable.
TM
Only if the receiver is available within the physical subnet it will continue to get
data packet. For this the correct topological address is a must. Also higher layer
protocols like TCP always relays on the IP addresses. Hence any change of IP address
may break the TCP connection. A TCP connection can be identified with informations
like
- Source IP address
- Source port
- Destinations IP address
- Destination port.
A charge of IP address will affect TCP connection that has been established. Change
of IP address may be a quick solution but it does not work practically.
Hence apart from this some of the requirements as an alternate to this quick
solutions are
- Compatibility with other computers
- Transparency of mobility status
- Scalability
- Efficiency
- Security.
Home agent
It (router on home network on mobile node) tunnels datagrams to mobile node
whenever mobile node is away from its home network. Home agent also maintains the
location data (information) for mobile node.
Home address
It is an IP address assigned for a period to a mobile node. Wherever the home agent
is connected to network this address remains unchanged.
Correspondent node
The mobile node communicates with a peer and called as correspondent node. It can
be stationary or mobile.
TM
Link
It is a medium used for communication of nodes at link layer.
Tunnel
It is the path that is followed by datagram when encapsulated. At destination side
the delivered datagram is decapsulated.
Foreign network
Except mobile nodes’s home network all other network can be treated as foreign
network.
Care-of-address
Whenever mobile node is away from its home network the care-of-address is the
termination point of a tunnel (path) towards the mobile node.
Home network
Mobile node which is assigned to network is called as home network.
Foreign agent
A router available on a foreign network is known as foreign agent.
Basic capabilities
Fig. 2.3.1
i) Discovery
ii) Registration
iii) Tunneling, are discussed below.
i) Discovery :
Each mobile node uses a particular discovery procedure to identify the respective
home and foreign agents. This mobile IP discovery procedure is built on the top of an
TM
existing router discovery. The router can detect the entry of any new mobile node. The
router will periodically issue a router advertisement message. The mobile node by
noticing this advertisement message will compare the network portion of the router IP
address with network portion of its IP address allocated by the home network.
ii) Registration :
iii) Tunnelling
Introduction
A tunnel basically establishes a pipe (virtual pipe) for their data packets to travel
from tunnel entry and tunnel end point.
But tunnelling a packet does not affect the data. Tunnelling is done using
encapsulation.
The encapsulation is a mechanism of picking a data packet containing a packet
header and data and then fitting it together into the data packet of next new packet. An
opposite procedure of the same is called as decapsulation.
NTERNET
USER
CONTROL
DATAGRAM
MESSAGE
PROTOCOL
PROTOCOL
INTERNET
PROTOCOL
HOME
X
NETWORK
FOR
X
3
HOME 2 FOREIGN
AGENT AGENT
INTERNET
1 5
SERVER
NODE A
TM
Original Original
IP header data
New
New data
IP header
Minimal encapsulation
Flags Fragment
ID Identification
offset
Minimal
TTL IP checksum
encapsulation
IP address of HA
Care-of-address
Layer
S Reserved IP checksum
4 protocol
IP address of MN
PAYLOAD
In the IP-in-IP encapsulation method several fields are just redundant. Hence it is
better to use minimal encapsulation as an optimal method of encapsulation. The tunnel
entry and end point are defined. Here the field for header consists of value 55. The type
of protocol and the address of mobile nodes are required. For fragmentation offset no
field is specified in minimal encapsulation.
The 'S' is set bit. IP cheksum TTL, flags, IP identification are available as shown in
Fig. 2.4.2. The minimal encapsulation will not entertain/work with previously
fragmented data packets.
In the tunnelling operation of mobile-IP, IP-within-IP encapsulation (embedding)
mechanism is applied. For this a new IP header called as tunnel header is added by
home agent. Therefore the home agents address is the tunnel source IP address itself.
FRAGMENT
IDENTIFICATION FLAGS
OFFSET
FRAGMENT
IDENTIFICATION FLAGS
OFFSET
TIME TO HEADER
LIVE PROTOCOL CHECKSUM
IP PAYLOAD
TM
For the delivery of data packets to and from the mobile node the needed entities are
- Home network
- Router (Home Agent) - (HA)
- Router (Foreign Agent) - (FA)
- Internet
- Mobile Node (MN)
- Correspondent Node (CN)
If CN want to transmit a packet to MN the mobile IP should be capable to support
the hiding of mobility of MN, because the CN need not be informed about the status of
MN.
Once if a packet is being sent to MN from CN, the Internet that does not have the
location of MN currently will route the packet to the HA to which MN belongs to.
This HA will know the present location of MN. The data packet is not simply
forwarded to the subnet but prior to that it is encapsulated and then tunnelled to
Care-of-Address(CoA). A new header is also added.
Then the Foreign Agent (FA) will decapsulate it and eliminate this header added
additionally forward it to the destination node.
Path 3
Path 4
Internet
Foreign
network
Path 1
CN Router
Thus the packet delivery procedure through Internet takes place with the help of
routers and agents as discussed above.
TM
Note : Shaded fields in the IP encapsulation represents the fields that are carried
directly from inner IP header to that of the outer IP header portion.
2.6 IPv6
Every packet in IPv6 consists of a base header and a payload. Each payload is
composed of two parts namely extension headers and data packets from upper layers.
Data packet
Extension from upper
header layer
In IPv6 the version number is 6. A four bit priority field defines the priority of
packets.
Version PRI Flow label
(VER) (4 bits) (24 bits)
6 bits
Payload extension
header + Data packets of
upper layer
There is eight-bit hop limit field. The source and destination address fields are of
16 bytes each. Priority of each packet is defined in the priority field in IPv6.
A sequence of packets that emerges from a particular source to an intented
destination requires special kind of handling by the routers. This is known as flow of
packets.
IPv6 provides many features than IPv4 to broden the internet protocol.
Comparison of IPv4 and IPv6 packet headers :
· The header field length is deleted in IPv6 and its length is fixed.
· The service type field is also eliminated.
TM
· The identification (ID), offset and flag fields are included in the fragmentation
extension header.
· The header checksum is provided by the upper layer protocols.
· In IPv4 there is optional field available. It is implemented as extension headers in
the IPv6 protocol.
Introduction to IPv6 :
The Internet Protocol version 6 (IPv6) provides access to different information
sources across the globe. The address space is expandable. The IPv6 makes use of 128
bit addresses for every packet. There are both local and global addresses available. The
link local addresses are present within the subnet whereas global addresses are helpful
in routing process of global Internet.
In IPv6 a three level addressing is used. This hierarchical addressing includes .
· A public topology
· Site topology and
· An interface identifier.
In IPv6 all the nodes mainly implements authentication and required encryption. It
results in strong Internet security.
IPv6 integrates different security techniques in the system such as,
· Public key cryptography to provide two- party identities.
· Bulk encryption algorithm to provide data encryption.
· Digital ID cards methods in which authenticated signed digital certificates are
used.
· IP network layer encryption is ensured.
· Diffie-Hellman key exchanging mechanisms for key deriving procedures within
peer users, etc.
Internet protocol version 6 (IPv6) has many features for providing mobility support.
In IPv4 (version-4) has no such feature. IPv6 also has stateless configuration and
neighbour discovery facility with the hierarchical addressing schemes IPv6 is able to
manage IP mobility. The process of renumbering is simplified to some extent. IPv6
retains the guidelines of home agent, home network and the encapsulation procedures
TM
for delivering data packets to the mobile node's present point of attachment from the
home network.
In case if discovery of care-of-address in still in process then a node can configure its
care-of-address with the help of applying stateless address autoconfiguration and
neighbour discovery in the IP network layer. Hence in IPv6 it does not require and
foreign agents to provide mobility support.
COA
HOME ROUTER ROUTER
NETWORK (HA) (FA) MOBILE
NODE
(MN)
INTERNET FOREIGN
NETWORK
CORRESPONDENCE
NODE ROUTER
(CN)
TM
HA can
HA can HA can be implemented
be implemented be implemented on router but HA
on router on an acts only as manager
arbitrary for the mobile
node nodes that belong
to a virtual home network
Fig. 2.7.3
TM
MOBILE
NODE X
HOME
X
NETWORK
FOR
X
3
HOME 2 FOREIGN
AGENT AGENT
INTERNET
1 5
SERVER
NODE A
Case study
The server ‘A’ (say) wants to send an IP datagram to a node X. The home address
of X is known to A. The server A does not know whether X is in its home network or
not. A sends packet to X with home address of X as its destination internet protocol
address in the IP header. The IP datagram then routed to X’s home network area.
At the X’s home location network the IP datagram is intercepted by the available
home agent. The home agent also discovers that ‘X’ is a foreign network. Then the home
agent encapsulates the full datagram inside a new IP datagram.
At the distant network the IP datagram which is incoming is intercepted by the
foreign agent. The foreign agent acts as a counterpart of this home agent in the foreign
network.
X intends to respond to the message and it sends traffic to ‘A’. In this example A is
not mobile. Hence A has a fixed Internet Protocol (IP) address. For routing X’s IP
datagram to A, each datagram is sent to a router in a foreign network, and this router is
a foreign agent.
The IP datagram from X to A then travels across the network using A’s address (IP)
as its destination address.
TM
TM
FRAGMENT
IDENTIFICATION FLAGS
OFFSET
TIME TO HEADER
LIVE PROTOCOL CHECKSUM
IP PAYLOAD
· Note : Shaded fields in the IP encapsulation represents the fields that are carried
directly from inner IP header to that of the outer IP header portion.
A simple VoIP architecture subject to Session Initiation Protocol (SIP) is given here.
This protocol mainly pertains to Voice over IP and specifically suited for the
Internet. Mobile users can establish a call, connect or terminate as desired. The SIP
supports various types to establish and terminate the multimedia communications as
below
· User location -For communication determining the location and end system that
has to be used.
· User availability - Finding if person called is available.
· User capability- Type of media that is to be used
· Call setup - Engaging the call by dialling to establish the connection
· Call handling - Deals with transfer of voice data
· Call termination - When call is over resources are released
TM
Proxy Proxy
server server
hp
Gateway PSTN
User
agent
SIP components
In recent years wireless network nodes became popular and as the applications
using Internet is high. Sometimes an user may be interested in using a laptop computer
without making routing functions via global internet. For such cases internet protocols
will not be required. Thus the mobile computer users can be allowed to set up a short
lived network with wireless communication devices, for a particular moment. This
network is known as ad-hoc network. It is independent of infrastructure. Thus even
when there is no infrastructure available an ad-hoc network can be formed.
TM
The wireless computing devices are able to communicate with each other in ad-hoc
networking, it is possible even there is no,
* Routers or
* Base stations or
* Internet service providers
The ad-hoc network and mobile ad-hoc network (MANET) are discussed in this
chapter.
TM
· Effective system : The ad-hoc packet oriented network setup is less expensive and
also effective. These ad-hoc networks provides a better solution for application
specific cases.
A working group at IETF under ad-hoc networks focused on mobile ad-hoc
networking termed as 'MANET' in the year of 2002.
A relation between MANET and mobile IP is shown in the Fig. 2.9.3. (See Fig. 2.9.3
on page 22)
The "mobile ad-hoc networks" MANETs have many advantages and one of the most
important advantage is its "Infrastructure independent" nature. The ad-hoc networks
does not need infrastructure's that is required for other wireless networks. The term
infrastructure includes need of base stations, routers etc.
The ad-hoc networks are composed of the equal nodes that can communicate with
each other through wireless links. Their is no central control for their work.
The important features of ad-hoc networks and MANET's are discussed in detail in
this chapter.
The term MANET describes mobile, wireless, distributed multihop networks that
could operate independent of infrastructure. A MANET network is composed of mobile,
autonomous, wireless nodes that could be connected at network edges to that of the
fixed wired internet. Initially MANET is developed due to military requirements where
infrastructure less, line of sight operations are required.
2) Connectivity
It refers to many issues. One such is the number of neighbouring nodes that could
link to them directly. This link may be bidirectional. Connectivity also refers to link
capacity between any two nodes.
3) Network Topology
The user mobility can affect the network topology. Due to it the network protocols
has to adapt to topology changes. Conversely when nodes are inoperative due to dead
batteries their will be rapid changes in topology.
TM
4) User Traffic
The design of MANET is thick related with user traffic. It includes some conditions
like,
· Does the user traffic consist of bursty, shorter packets without periodic delays ?
· Does it contain longer packets sent periodically with fixed time bounds ?
· Or is it a combination of these two suitations ?
5) Operational Environment
It refers to terrain whether it is a urban, rural or maritime etc. Due to any one of
this LOS may not exist.
6) Energy
In MANET there is no availability of fixed base stations. A low energy network
approach is tried with battery operated store and forward nodes in the network.
If some nodes are not participating in network operations shutting them for some
time can be done.
In addition to there issues cost involved in MANET designed is also high that has to
be planned with a proper balance with network features.
hp
hp
Global
Internet
hp
hp
hp
hp
hp
hp hp
hp
hp
R1 R2 R3
Mobile
router
(R1-R3)
MANET
D1 D2 D3 D4 D5 D6 D7
Mobile
devices
(D1 - D7)
Mobile IP
DHCP
Fixed
network
The mobile router (I) and mobile devices (II) forms MANET as shown here. It's
relation with fixed network is established.
TM
Highly dynamic,
Scarce Shared
unpredictable
link links
networks
resources
Effects Several
due to rapid updates
topology in routing
Lower Access
changes
bandwidths to the
overhead
information
Efficiency
Many
algorithms
at various
time scales.
Control over
the transmission
parameters
Several
algorithms
Integrated algorithms
that can be complex and
would violate layering
Routing is a complex task in ad-hoc networks. The destination node may be out of
range with respect to source node which is transmitting data packets.
The purpose of routing is to find correct path between the source and destination for
forwarding packets. If infrastructure is available in wireless networks routing will be an
easier task because there the cells are defined.
But in ad-hoc network independent of infrastructure routine is tough task.
Thus in ad-hoc networks,
· The traditional routing algorithms will not be suitable.
· Centralized approaches will not be appropriate.
· Several nodes in network should have routing capability.
· They have no connection and ad-hoc network between nodes and they experience
fast changing environment.
· If the load is less a method called as "flooding" can be applied in ad-hoc
networking. But flooding is not an efficient method. To avoid looping as packets
are forwarded, a hop counter should be used because the knowledge of
maximum number of hops is very important. Still this flooding technique is not
much used for packet forwarding.
TM
The MANET's routing protocols are classified as proactive (table-driven) and reactive
(on-demand) types.
MANET routing protocols
1 2
Proactive Reactive
Hybrid
Fig. 2.10.1
These classification depends upon how they respond to any changes in network
topology.
If a host is running a proactive protocol will react to topology change by
propagating routing related informations to the neighbours. Such information
transmission takes place whenever there is a change in link state is detected.
TM
1. Infrastructured network
2. Ad hoc network.
In the first type it has the fixed and wired gateways and in the second type it
consists of infrastructureless mobile network. It has no fixed routers. All the nodes are
flexible with dynamic connections in the network in a arbitrary manner. The applications
of ad hoc network are meetings where quick information sharing is a must and
emergency search and rescue operation cases etc. The ad hoc network of early days had
few drawbacks like the following.
1. High power consumption 2. Low bandwidth. 3. High error rates
The routing information must be properly advertised by broadcasting or multicasting
the packets that are transmitted periodically.
Decision has to be made based on the data and delaying of advertising the routes
are allowed. The idea of delaying is to avoid many number of rebroadcasts in the
network due to instability.
The two types of protocols are table driven routing protocol and source initiated
(demand-driven type) routing protocol.
The table driven routing protocol tries to maintain consistent and up-to-date routing
related information from each node to every other node in the network.
The DSDV protocol under this category requires every mobile station to advertise to
every current neighbour. The entries of the list may dynamically change and it makes
way for requirement of frequent advertisements to take place. Hence every node can
have knowledge about every other mobile computer.
The DSDV protocol enables shortest number of hops for a route to a destination. The
mobile computers frequently link with base stations that allows them to exchange
information with other computers connected in the wired networks.
In an ad hoc network movement of host (mobile host) is supported by this protocol.
For example the mobile host (MH 1 , MH 2 , MH 3 ....) can move in an ad hoc network.
MH3 MH4
MH5
Mobile
host
MH7
MH1 MH1
The movement of each mobile host (MH i ) is possible and each one has its sequence
number. A table is maintained and updated as the hopping takes place. Advertisements
of routing information in the network is made whenever required. The DSDV routing
protocol well suits the movement of mobile hosts.
The fluctuations of routing has to be avoided. The updation of routes are done as
per few important criteria.
1. Routes are preferred if sequence numbers are same and still the metric is lower.
2. Routes are preferred (most of the time) if the sequence numbers are newer.
To avoid damping fluctuations setting time has to be properly used. The setting has
three fields keyed with first field.
1. Destination address field
2. Last settling time field
3. Average settling time field.
APPLICATION
REQUEST or
RESPONSE
COAP
MESSAGES
UDP
As seen in Fig. 2.10.3 above the request/response and messages layers from the
CoAP protocol.
CoAP supports following types of messages
· Confirmable
· Non confirmable
· Acknowledgement
· Reset.
The CoAP comprises (i) A binary header (ii) A compact option (iii) The payload.
The CoAP generates two types of messages (a) Confirmable and
(b) Non-confirmable.
Confirmable message (CON) is obtained from reliable source. Confirmable message
is acknowledge by (ACK) message as shown in Fig. 2.10.4 below.
TM
Client Server
Confirmable message
CON (ID : 0 × BB51)
Acknowledgment message
The Non confirmable (NON) messages however do not require an ACK message as
shown in Fig. 2.10.5.
Client Server
Non-confirmable message
NON (ID : 0 × BB51)
The request is sent by the client by a CON or NON message. The server then sends
its ACK message of the request is in CON message form.
CoAP uses User Datagram Protocol [UDP] to transport data and UDP security
aspects cover its information.
The cellular wireless networks like GSM, CDMA are infrastructure type. The cellular
network consists of a main central entity say base station and other mobile devices are
mobile subscribers. Any communication between mobile devices and mobile transceiver
station (MTS) takes place through the base station. Depending upon the range both
macrocell and microcell works with its base station.
But in Ad-hoc networks it operates without any infrastructure. They are self
organising multihop networks. There is no central entity like cellular networks. The
mesh networks and WSN networks are few examples of Ad-hoc networks. A simple
comparison of cellular networks with the Ad-hoc networks is tabulated below.
TM
Time Takes more time for deployment It does not take more time for
deployment
Network Maintenance It needs periodic maintenance Since the nodes are self
organising maintenance is easier
Thus cellular networks differs from Ad-hoc networks in several aspects respectively.
Review Questions
Part A
1. Define ‘mobile IP’.
2. List any three important features of mobile IP.
3. What is known as home address ?
4. Write short notes on link and tunnel.
5. Write short note on Internet protocol.
6. Explain architecture of mobile IP.
7. Write a note on tunnelling.
8. What is known as DHCP ?
9. What are the applications of DHCP ?
10. How DHCP helps to maintain proper number of IP addresses ?
11. What are the advantages of DHCP ?
12. What is a ‘BOOTP’ ?
13. What are the constraints in using ‘BOOTP’ ?
14. Write a short note on ‘Routing’ ?
15. List four devices which are connected with internet.
TM
Part B
1. Explain destination sequence distance vector in detail.
2. Explain dynamic source routing in detail.
3. Explain MANET in detail.
4. Explain security in MANET's in detail.
5. Explain the structure of MANET's and mobile IP with a neat sketch.
6. Explain various routing algorithms in detail.
7. Explain security in MANET's and applications of ad-hoc networks.
8. Write short notes on i) DSDV and ii) Advantages of routing.
9. Explain the properties and advantages of MANET in detail.
10. Explain DSDV protocol in detail.
11. Explain CoAP in detail.
TM
Part A
1. What is care of address in mobile IP ? (Refer section 2.2.1) AU : May - 17, Marks 2
2. What is Encapsulation in mobile IP ? (Refer section 2.4) AU : May - 17, Marks 2
3. When the agent solicitation message has to be sent by mobile node ? (Refer section 2.7.1)
AU : Dec. - 17, Marks 2
4. Why is routing in multi-hop ad-hoc networks complicated ? (Refer section 2.10)
AU : Dec. - 17, Marks 2
5. What is a Mobile IP ? What are the entities of Mobile IP ? (Refer sections 2.1 and 2.2)
AU : May - 18, Marks 2
6. Differentiate an ad hoc network with respect to :
a) Bandwidth usage b) Cost effectiveness. (Refer sections 2.11) AU : May - 18, Marks 2
7. Define SIP. Write the funtions of SIP. (Refer section 2.8) AU : Dec. - 18, Marks 2
8. Differentiate proactive and reactive routing protocols. Write examples for each.
(Refer section 2.10.2) AU : Dec. - 18, Marks 2
9. Define the term Care of address in mobile IP. (Refer section 2.2.1) AU : May - 19, Marks 2
10. Outline the characteristics of MANET. (Refer section 2.9.1) AU : May - 19, Marks 2
Part B
1. State the entities and terminologies used in Mobile IP along with tunneling and also explain the
three types of encapsulation mechanisms used in mobile IP. (Refer section 2.2.1 and 2.4)
AU : May-17, Marks 16
2. Explain and compare the working mechanism of both destination sequence distance vector and
dynamic source routing protocol when applied on a mobile network scenario.
(Refer section 2.2.1 and Appendix Q.54) AU : May-17, Marks 16
3. Explain how tunneling works in general especially for mobile IP using IP in IP, minimal and
generic routing encapsulation respectively. Discuss the advantages and disadvantages of these three
methods. (Refer sections 2.3 and 2.4) AU : Dec.-17, Marks 16
4. Explain the Mobile IP session intiation protocol for IP pocket delivery in Mobile IP Networks.
(Refer sections 2.1 and 2.8) AU : May-18, Marks 16
5. Explain with neat diagram and example the destination sequence distance vector routing algorithm
of Adhoc Networks. (Refer section 2.10.3) AU : May-18, Marks 16
6. Imagine the following scenario. A Japanese and a German meet at a conference on Hawaii. Both
want to use their laptops for exchanging data, both run mobile IP for mobility support. Explain the
optimizations speed in this mobile IP networks. (Refer sections 2.3 and 2.5)
AU : Dec.-18, Marks 8
TM
7. Discuss on the entities and terminolgy of mobile IP Networks. (Refer section 2.2.1)
AU : Dec.-18, Marks 8
8. Explain the destination sequence distance vector routing protocol. Mention its features.
(Refer section 2.10.3) AU : Dec.-18, Marks 16
9. How the tunneling and IP in IP encapsulation occur in the mobile IP ?
(Refer sections 2.3 and 2.4) AU : May-19, Marks 13
10. Analyse all possible solutions to be adopted for giving mobility support in the network layer such
that both delay constraints along with throughput levels are achieved.
(Refer sections 2.7, 2.7.1 and 2.8) AU : May-19, Marks 15
qqq
TM
Notes
TM
Contents
3.1 Overview of UMTS . . . . . . . . . . . . . . . . . . May - 18,19· · · · · · · · · · · · · · · · Marks 2
3.2 Basic Block Diagram . . . . . . . . . . . . . . . . . . May - 17, Dec.-18 · · · · · · · · · · · Marks 2
3.3 Air Interface Protocol Structure fo UMTS . . . . . . May - 17,18,19, Dec.-17 · · · · · · Marks 16
3.4 UMTS Core Network Architecture . . . . . . . . . . . May - 17,18, Dec.-18 · · · · · · · · Marks 16
3.5 Third Generation (3G) Standards and Networks
. . . . . . . . . . . . . . . . . . May - 17,19, Dec.-18 · · · · · · · · Marks 16
3.6 UTRA-TDD (TD-CDMA)
3.7 TD-SCDMA
(3 - 1)
Wireless Networks 3-2 3G Overview
UE UTRAN CN
UE - User Equipment
UTRAN - UTRA Network
CN - Core Network
The UTRA network called as ‘UTRAN’ enables cell level mobilities and it has many
radio network subsystems (RNS). The main functions of RNS is listed below.
1. Call handover control
2. Channel ciphering and deciphering
3. Radio resource management
In the architecture of UMTS, the user equipment (UE) is connected to core network
‘CN’ via UTRAN block.
Functions like
1. Gateways to other (external) networks
2. Inter system handover are handled by core network
There are two types of modes compatible with UTRA system.
TM
The time division duplexing mode of the UTRA technology makes use of wideband
TDMA/CDMA for the medium access and the up/down links uses the same frequency.
The data rate is 2 Mbit/sec for about 120 channels (approx) in case of the user traffic.
The direct sequence (DSS) type of spreading code is applied and the modulation scheme
used is QPSK. In TDD the power controlling can be slower than the FDD because the
number of power controlling cycles in one second are less. It is worth noting that the
TM
frame structures of FDD and TDD are same and hence both the schemes can coexist in
necessary conditions.
The physical layer provides transfer services information to the next layer using
various types of channels. While considering channels there are three important types
of channels which have to be considered. They are
i) Logical channels
Radio Resource
Control (RRC)
Radio
Bearers
Layer - 2
Packet Data
Convergence
Control
Protocol (PDCP)
Control
Control
Control
Layer - 2
Control Broadcast
Multicast
Control (BMC)
Physical Channal
Air Interface
Thus the transport channels are mapped onto the physical channels.
TM
DPDCH I Real
q(t)
Adder
+ Adder O/P
DPCCH Q I jQ Img
j q(t)
Scrambling sin( t)
code
DATA
Channelization Scambling
code code
(b)
The Walsh codes are used in WCDMA. The spreading codes in WCDMA are known
as orthogonal variable spreading factor (OVSF) codes. Then spreading factor can vary
from 4 to 512. This standard uses 3.84 megachips/sec chip rate and maintained as
TM
constant. By using shorter spreading codes higher data rates and by using longer
spreading codes lower data rates are obtained. Thus by decreasing spreading factor the
data rate can be increased. But it will also reduce the number of cellular users which can
be supported. The reason is fewer codes are only available in case of shorter spreading
factor.
In case of demodulation pilot symbols are used. The channels DPCH, CCPCH and
the PRACH carriers pilot symbols.
In spreading at the transmitter end, the channelization code is capable of identifying
the physical data channels DPDCH and control channels (DPCCH) with the code length.
The process of scrambling follows the spreading. It uses gold code that has a
pseudorandom characteristics. The long code has 10 msec frame and used at rake
receiver in base station. The short code is used when the base station applies multiuser
detection techniques.
In modulation combine Inphase-Quadrature, code multiplexing is used (i.e. dual
channel QPSK scheme).
The transmission power can be reduced by having faster power control in the
uplinks.
In downlink channel characteristics the same functions dealt under uplink are done
and at first the DPCH serial bits are converted to parallel bits so as to have correct
mapping in inphase and quadrature branches effectively.
I
q(t)
Serial
to
DPCH Adder O/P
parallel
bits Q
q(t)
Fig. 3.3.3 WCDMA (UMTS) Downlink operations, spreading, scrambling and modulation
S.C - Scrambling code
C.C. - Channel code
In spreading that is based on OVSF codes operating limit is upto 512 chips. The
scrambling uses gold codes for a time frame of 10 msec (i.e. 38400 chips). Under
TM
channels SCH, the primary and secondary SCH are used. The primary SCH consists of a
code of 256 chips and in secondary SCH it can generate upto 64 various code words, for
identifying common channels having continuous transmission. In modulation quadrature
phase shift keying with relevant time-multiplexed data and control system are used.
Transport channels :
The main characteristics of information that the transport channels can provide is
summarized below :
i) The shared information for up or downlink.
ii) The control information for up or downlink.
iii) Power control characteristics.
iv) Managing the collision risk.
v) Mobile station identification.
vi) Beam forming information.
vii) Data rate variation.
viii) Broadcast coverage area
- In entire cellular area or in a selected cell alone.
Higher layers
physical layers
TM
The interaction between physical and higher layers are shown in the diagram. Every
transport channel carries the transport format indicator (TFI). The physical layer does the
function of combining all the TFI information from various transport channels to form
the Transport Format Combination Indicator denoted as TFCI. This TFCI is useful as it
informs the mobile equipment about availability of active transport channel, in the
current frame.
The TFI is added to each TC such that
{TFI + TC} is done where
It is possible to divide the transport channels into common channel and dedicated
channel for a specific operation.
TRANSPORT CHANNELS
Hence the transport channel has common and dedicated channels and uses them
according to the nature of the operational requirement, in transport channels of
W-CDMA(UMTS).
TM
2560 chips
k
(10 2 bits) ; k 0 to 6 that depends
on the spreading factor
TM
They are meant for retransmitting the old data frame according to instructions
given.
Thus the radio layer protocol does important functionalities in MAC layer under
cdma 2000.
The simple UMTS core network comprises of the network connected to entities like
UTRAN, SS7 (for signalling), Packet Data Network (PDN) and circuit switching system.
The UMTS Core Network (UCN) has specific packed-based services.
The larger two areas circuit switching CS data services and packet-data services.
The CS area or domain has its functional modules such as ;
· Entities that supports CS services E.g. : 3G-MSC/VLR
· Entities that supports PS services E.g. : 3G-SGSN, 3G-GGSN
· Entitites that supports both CS and PS services E.g. : 3G-HLR
· Service Control Point (SCP), and Service Signalling Point SSP etc., denoted as IN
system.
· Billing, element and service managements etc. under "Network Management"
system.
· Swtiching and transport.
SS7
Circuit Signalling
switching
UMTS
Core
Network
(UCN)
Packet Data
UTR AN Network (PDN)
È
Fig. 3.4.1 UMTS architecture
The 3G-MSC, 3G-SGSN, 3GGSN etc. does their own function assigned in the UMTS
Core Network architecture.
TM
3.4.1 3G-MSC
This 3G-Mobile Switching Centre (3G-MSC) provides the CS services in the network.
Its services also includes control and signalling such as SS7, MAP, ISDN user part
(ISUP). 3G-MSC provides interconnection to other networks. For example connection
with PSTN and ISDN. Some of the significant functionalities of 3G-MSC are namely,
TM
Selecting a base station to which the handoff has to be made depends on few factors
like,
i) SNR of beacon signals from access points.
ii) Mobile node's region may move in very short time intervals.
iii) Availability of the resources at the access point.
The main resources that has to be acquired in new cell are uplink and downlink
channels.
Design issues :
To perform better location management an average time for which mobile node stays
within a cell is known as cell residency time. It has be calculated accurately. The
periodic time-based updates (dynamic updates) has to be monitored.
· As a mobile node is switched on then its HLR has to notified to ensure the
current position of the node.
· To find the current location of mobile node first its HLR is notified and then the
HLR contacts the current base station of cell where the node is available.
Dynamic update schemes :
The Registration Areas (RA) based location updates is a static update scheme. It does
not include measurements of dynamic mobilities of the mobile node. Boundaries of RAs
found with the aggregate mobility information patterns of mobile nodes.
The static boundaries leads to many location updates of mobile nodes two adjacent
RAs. These type of ping-pong effects are avoided in dynamic update procedures.
The periodic updates are dynamic updates. They are example of dynamic update
scheme. Apart from this there are some more dynamic update schemes. They are ;
i) Movement-based updates. ii) Distance-based updates.
TM
Note : To avoid roaming mobile node's location very often the technique known as
per-user location caching can be used. For efficient implementation of the caching
scheme the two parameters to consider are,
i) Location at which registrars has to be informed for caching.
ii) At what time the location information has to be cached ?
The location information can be replicated. Partial replication is done under two
organizations of location registrars. They are hierarchical and flat organization.
These location management procedures ensures the current location of the node. It is
followed by the second task handoff procedure. Hence in mobility management both
location and handoff management are done.
ATM/AAL5
The physical connection to the UTRA Network for the transportation of the user
data plane traffic via I u interface with the help of GPRS Tunnelling Protocol (GTP).
· In and G n MAP intefaces :
The 3G-SGSN with the help of these interfaces is capable of completing the sessions
[originating or terminating] in the network by interacting with other entities like GGSN,
HLR etc.
· Short Message Services (SMS)
· Mobility Management
This includes the functions such as,
· Handling attach function,
· Authentication issues,
· Updating HLR, relocations, and intersystem handovers.
· Subscriber database
Its function is to serve as an intermediate storage of user data for supporting further
mobility, in the network.
· Charging information
The SGSN gathers the charging information of radio network usages by the
subscribers/users
· OAM
It includes all Operation, Administration and Maintenance functionalities in the
network.
The third generation (3G) cellular systems have the goal to fulfil the demands of
several services. The 3G systems provide global mobile multimedia communication
facilities in an attractive way. It has minimum performance quality equal to that of ISDN
speed (144 kb/sec). Coming to the mobility services in microcell and macrocell
environment it uses 384 kb/sec and 2 Mb sec for the low mobility services mainly in
picocellular and microcellular environments. The evolutions of 3G system for CDMA
has led to the CDMA 2000 standard. In a similar way the evolution of 3G for IS - 136,
GSM etc. has led to wide band CDMA (W - CDMA) standard. It is also known as
Universal Mobile Telecommunication Service (UMTS).
The 3G systems guarantee an efficient wireless access with high performance quality.
They adopt intelligent new protocols to meet the cellular needs of the modern world.
Some of the important characteristics of 3G systems are summarized below :
· 3G system supports packet-switched and circuit switched services like Internet
traffic and voice services.
· It supports roaming.
· It provides backward compatability and inter operatibility.
· It supports symmetric and asymmetric traffic.
· It is compatible with running many servicess simultaneously in same terminal.
· It can create 'Virtual Home Environment' (VHE), that is creating a personalized
set of services for a user and also when the user is in movement it can be
maintained as such.
These 3G systems were standardized and it was initiated in the year 1992 by the
International Telecommunication Union (ITU). As a result of this 3G standardization the
International Mobile Telecommunication 2000 (IMT - 2000) was introduced which has
different 3G standards in it.
Also a smooth beginning 3G standard with a better backward compatibility with 2G
standards was the aim of IMT - 2000. The 3G systems tries to converge several
applications including telephony, multimedia services and internet etc in an effective
manner.
It is also worth noting that a combination of different networks like 3G, ATM,
Ethernet and X.25 will serve effectively if used for a single multimedia session. The 3G
data service requires novel protocols to serve better and it is sure that if efficient
middle-ware protocols are used it will help 3G system to provide improved applications.
TM
IMT 2000
Common
pilot signal CDM CDM TDM
Dedicated
pilot signal TDM CDM TDM
Core
GSM - MAP/IP ANSI - 41/IP GSM - MAP/IP
network
TM
The cdma 2000 is a 3G standard. It has a smooth transition and a better backward
compatability with 2G CDMA systems. The cdma-2000 can be used as an air interface.
The protocol stack diagram of cdma 2000 consists of the important entities including
signalling TCP, IP, UDP, high speed networks, voice and packet data related
applications in top layers, link access control, medium access control layers correspond
to layer 2 of OS2 and the fundamental physical layer that corresponds to layer 1 of OSI
model.
The terms used in protocol stack block diagram are,
i) TCP - Transport control protocol.
ii) UDP - User datagram protocol.
iii) IP - Internet protocol.
iv) LAC - Link access control.
v) MAC - Medium access control.
vi) QoS - Quality of service.
In second generation (2G) systems the IS - 95 family called as cdma one that is
based on CDMA technique. Thus for 3G systems some hardware approaches are only
required that will help to develop many service application under 3G which had a
smooth upgradation from 2G to 3G. Thus 3G has backward compatability.
The cdma 2000 is thus an advancement of CDMA technology developed by the
Qualcomm and meant for high data rate (HDR) packet standard. The standard also uses
the adjacent three 1.25 MHz channels that can be used together for providing packet
TM
data throughputs and it will rely on vehicle speed, cell traffic loading and propagation
environments.
Packet Circuit
data Voice data
S applications
applications applications
I
G
N
OSI
A
layers
L High-speed
from TCP UDP
L circuit
3 to 7
I
network
N layer
G services
IP
Multiplexing Quality of
service
Physical layer :
In the cdma 2000 physical layer, originally two spreading modes were made use of
namely Multicarrier (MC) and Direct Spread (DS) techniques. There are two non direct
spread modes in cdma 2000 known as 1X and 3X. That is under the 1X mode it uses a
cdma one carrier whereas the 3X is the popular multicarrier system. The simplest
version of the cdma 2000 standard is the 1X mode.
The uplink and downlink characteristics are summarized for the stake of
understanding the future enhancements.
TM
Uplink Characteristics :
i) Using open or closed power control :
The uplink is permitted to opt both the open loop power control and fast closed
loop power control which is derived from 2G cdma one, and a good development is
observed in CDMA technology in 3G systems.
ii) Pilot-based coherent detection :
In uplink performance of cdma 2000 is enhanced by the usage of Reverse Pilot
Channel (R - PICH) and it provides a way for the base station to do the required
coherent demodulation of the traffic received.
Downlink Characteristics :
Fast power control :
The closed-loop fast power control is used in cdma 2000. The power of the downlink
traffic is measured by the mobile stations. Then according to the observation they give a
'power-up' or 'power-down' command to the base stations. A significant performance for
high speed transfers is seen in a low-mobility environment.
Transmit diversity :
Transmit diversity is used at the base station, and it is required that diversity has to
be applied at receiver end also to make the system effective. It can be applied for both
direct spread and multicarrier approaches. In multicarrier method the basestation uses
different antennas that are spatially separated for transmitting sub carrier. The signals
that are originating from various antennas fade and are not dependable which leads to
frequency diversity. Under direct spread approach the base station spreads the stream of
data into two substreams and then they are transmitted with two antenna separately. To
have better spreading of code, orthogonality between the two streams of data is
maintained.
Common Characteristics
i) Turbo codes :
The cdma 2000 standard uses turbo codes for its coding for the supplemental
channels. It is applied to increase robustness in case of high n-speed data service
applications.
Double number of Walsh codes :
It is possible to use even upto 128 Walsh codes in cdma 2000 for variable spreading
procedure. The carrier capacity is thus increased twice when compared to cdma one
standard.
Independent data channels :
There are two types of physical data channels which are used. They are (i)
fundamental channels (FCH's), (ii) supplemental channels (SCH's). They are coded
separately and then interleaved. High data rate services are possible with the SCH's.
5 msec frame options :
The common frames have frame duration of 20 msec. A latency of 5 msec is also
permitted for low latency type of transmission.
Chiprates with backward compatability :
The chiprates used in cdma 2000 are actually multiples of the chiprates used in
cdma one standard. This is one of the simplified mode of chiprates adapted in cdma
2000 by its backward compatability.
iii) Downlink
The downlink physical channels are,
* Forward pilot channel (F-PICH)
* Forward auxiliary pilot channel (F-APICH)
* Transmit diversity pilot channel (F-TDPICH)
* Forward common control channel (F-CCCH)
* Forward sync channel (F-SYNCH)
* Forward paging channel (F-PCH)
* Forward broadcast channel (F-BCH)
* Forward quick paging channel (F-QPCH)
* Forward common power control channel (F-CPCCH)
* Forward common assignment channel (F-CACH)
* Forward data traffic channel.
TM
i) F-PICH :
This channel is used to get the multipath fading and the channel conditions. This
channel is shared by the mobile nodes to obtain the above mentioned information.
ii) F-APICH :
The number of these channels can be many. These F-APICH channels are used along
with the smart antennas (array of antennas) in beam-forming applications. It was
observed that the coverage of smart antennas are increased by the help of these
channels. Each APICH channel is assigned a unique Walsh code under code multiplexed
scheme in downlink.
F-TDPICH :
These channels are intended for synchronization by the mobile within a particular
cell.
F-CCCH :
It is used to send high-layer messages (e.g. MAC layer) to the mobile units. The
F-CCCH channel is used by the base station.
F-SYNCH :
This forward sync channel is used for providing initial synchronization related
informations to the mobile stations.
Two types of forward sync channels are used.
1) Wideband sync channel.
2) Shared sync channel.
The wideband synchronization channel is compatible with both the non-overlay and
overlay configurations. The shared synchronization channel is compatible with overlay
configuration and it is used in both cdma 2000 and IS-95 channels.
F-PCH :
This channel is used by base stations. The channel is intended to transmit the mobile
station specific messages and the overhead messages. Here also two types of channels
are used.
Forward paging channel
1) Wideband paging channel
2) Shared paging channel
The wideband paging channel is compatible with both the overlay and non-overlay
configurations. It is modulated across the 3G cdma 2000 wideband channel completely.
The shared paging channel is compatible with overlay configuration of the 3G cdma
TM
2000 standard over the 2G IS-95 standard. It is also used for both cdma 2000 and IS-95
channels.
F-BCH :
This channel is intended to transmit control information to the respective mobile
stations effectively which have not been allotted a traffic channel.
F-QPCH :
This quick paging channel is used by the paging channel for providing control
information to the mobile stations.
F-CPCCH :
The necessary power control information of uplink common control channels are
conveyed by base stations using this channel.
F-CACH :
The quick assignments of reverse common control (uplink) channel is done by base
station using this channel.
In addition to these channels the forward data traffic channels are also used in
downlink (forward) physical channels in cdma 200 standard.
TM
The TDD frame can be symmetrical or asymmetrical for reflecting different user
requirements. A simple frame structure is shown here. Applying burst type it may result
in data rates of 414, 828, 1,656, 3,312 and 6,624 kb/sec. It considers that all the slots are
being used for the data transmission. A burst of type 2 is shown here in which has two
data fields of 1,104 chips each. For these two data fields spreading is applied . In
addition to this for training and channel estimation a midamble of 256 chips is used.
RADIO FRAME
10
0 1 2 3 11 12 13 14
msec
TIME SLOT
2560 chips
GP : Guard period
GP : 96 chips
3.7 TD-SCDMA
As the evolution of UTRA-FDD and UTRA-TDD radio technologies used for UMTS
the TD-synchronous CDMA (TD-SCDMA) is also very useful.
The TD-SCDMA is basically a chinese proporsal for third generation cellular systems
and its integrated with UTRA-TDD.
Some of the development of various generations of cellular telecommunication
systems are shown hare as a simpler classification.
There are five groups of third generation (3G) radio access technologies are used for
cellular communication.
IMT-DS ® The direct spread technology consists of wideband CDMA (W-CDMA)
TM
IMT-TC ® It has time code in UTRA-TDD system and uses time-division CDMA
(TD-CDMA)
IMT-MC ® The cdma2000 is a multicarrier technique.
IMT-SC ® An enhancementof US-TDMA systems. for example UNC-136 is a single
carries technology.
IMT-FT ® It is frequency time technology and it is an enhanced version of the
cordless and telephone standards say DECT.
In standardization process the main triggering forces are namely 3GPP and 3GPP2
respectively.
FDMA CT 0/1
AMPS CT 2
NMT
IS - 136 DECT
TDMA
D - AMPS EDGE
IMT-SC
GSM GPRS
TDMA IS 136
PDC
(Personal
Digital
Cellular)
IMT - DS
UTRA FDD/W - CDMA technology
IMT - TC
CDMA
UTRA TDD/TD - CDMA technology
TD - SCDMA Synchronous CDMA
Generation 1G 2G 2.5G 3G . . . .
TM
Part - A
Q.1 Name the 3G radio access scheme identified to support different spectrum scenario.
(Refer sections 3.2 and 3.2.1) AU : May-17, Marks 2
Q.2 How is isolation between users in the downlink accomplished in a WCDMA system ?
(Refer section 3.3) AU : Dec.-17, Marks 2
Q.3 What is UMTS ? What are the layers of UMTS ? (Refer section 3.1)
AU : May-18, Marks 2
Q.4 Give the significance about link adaption scheme. (Refer section 3.4.2)
AU : May-18, Marks 2
Q.5 Name the functions of Radio Network Control (RNC). (Refer section 3.2)
AU : Dec.-18, Marks 2
Part - B
Q.9 Explain the UMTS network architecture with GSM, 3G and also explain the reference
architecture. (Refer section 3.3 and 3.5) AU : May-17, Marks 16
Q.11 Discuss the role of the access link control application part (ALCAP) in the UMTS.
(Refer section 3.3) AU : Dec.-17, Marks 16
Q.13 Describe Channel Structure in UMTS Terrestrial Radio. (Refer section 3.3)
AU : May-18, Marks 8
Q.14 With neat diagram, explain the reference Architecture of UMTS. (Refer section 3.4)
AU : Dec.-18, Marks 16
qqq
TM
Notes
TM
Contents
4.1 Internetworking Objectives and Requirements
4.2 Schemes to Connect WLANs and 3G Networks
4.3 Session Mobility
4.4 Internetworking Architectures for WLAN and GPRS
. . . . . . . . . . . . . . . . . . May - 19 · · · · · · · · · · · · · · · · · Marks 15
4.5 Local Multipoint Distribution System [LMDS]
4.6 Multichannel Multipoint Distribution Service [MMDS]
(4 - 1)
Wireless Networks 4-2 Internetworking between WLANS and WWANS
The main objective of interworking is to adopt the independent WLAN and 3GPP
standards. The objective is to curtail the interdependence between the standards to the
maximum extent possible.
While a user is availing 3GPP services and is using a WLAN device, it must be
made possible to use the 3GPP facility without hardware/software upgrades. 3GPP
services must be made available effortlessly to the end user without any additional
expenditure on his side.
· To enable a mobile subscriber to use his (SIM/USIM) to avail the WLAN services.
Authentication, Authorization and Accounting (AAA) is required for WLAN uses
to access 3GPP data networks.
· To enable WLAN subscribers to use 3GPP based packet switched services. This
allows WLAN uses to access 3GPP data services in both 3GPP and WLAN
networks.
· To enable common billing for users who access WLAN and 3GPP data networks.
· The service provided should be smooth across both 3GPP and WLAN systems
without compromising on quantity and totally avoiding disruptions.
· Another objective is offering circuit switched services by the 3GPP provider for
the WLAN systems also.
TM
This enables the network to act independently while the gateway node helps in
roaming operation between the two networks.
As the networks operate independently delay and loss during hand off can be
minimized.
Emulator approach : This is also called as tight coupling approach. It uses WLAN as
basic access in the 3G networks. The emulator approach also replaces 3G basic accesses
by WLAN layer 1 and layer 2.
The Access Point (AP) of WLAN could be viewed as 3G network controller. It is like
a serving GPRS support node say SGSN respectively.
4.2.1 Advantages
· The main use of emulator approach is that the mobile IP is not needed. The 3GPP
core network takes care of packet routing and forwarding processes.
· The packet loss is reduced to a significant level. Delay is also minimized.
4.2.2 Disadvantages
· This approach has less flexibility because of the tightly coupled networks
arrangement. The operators of them has to be same only, then more information
could be exchanged.
· The gateway GPRS support node [GGSN] is the only point to the Internet. Hence,
all the data packets have to travel first through this node. GGSN acts as a
bottleneck at some point of time.
Introduction : In Internet working of WLAN and other cellular standards like GPRS
aims to provide high-quality circuit-switched voice service to the mobile users. The
different characteristics of cellular network interacts with the Wireless Local area
Networks (WLANS) effectively. The cellular data network GPRS and the 3G cellular
TM
standards such as UMTS, cdma 2000 works with WLANs and data communication takes
place.
TM
MMS MEDIA
GPRS
CORE NETWORK
HA
HLR/ AAA
HSS SGSN IP
FA NETWORK
PSTN
MSC/
VLR
GGSN
SGSN
GPRS NODE
q INTERNET
p r
TM
4-5
IWG
WLANs
IWG
RNC IEEE
RNC 802.11 WLAN
AAA IP NETWORK
UTRAN IP BACKBONE
FA NETWORK
Node
C DISTRIBUTION
AP
Fig. 4.4.1 A Simple Architecture of Internetworking UMTS/GPRS networks with IEEE 802.11
Internetworking between WLANS and WWANS
Wireless Networks 4-6 Internetworking between WLANS and WWANS
The UTRAN and the GPRS core network are connected to WLAN base IP network.
The PSTN, CS core network, Internet operators IP networks are interlinked. The support
nodes are useful for linking. The dotted lines p,q represent tight coupling and r is for
loose coupling in the networks.
For interworking of 3G networks with WLAN location-aware authentication and a
secured roaming services are important.
Also, roaming functionalities addresses intradomain micro-mobility and interdomain
macro-mobility.
The authentication, authorization and accounting (AAA) proxy browser and AAA
server are useful in handling micro mobility and macro mobility.
The AAA proxy browser and AAA server takes care of reauthentication functions.
The AAA server/ proxy is connected to IP backbone network and through the network
it monitors the billing system.
The guaranteed services of the 3G cellular networks with WLAN interworking
includes,
i) Privacy and security
ii) Quality of Service [QoS]
iii) Global service roaming
iv) Handover procedures including mobility management.
Better location-aware schemes are applied in interworking network.
Tight Coupling
Interworking involves connecting WLAN and 3GPP networks. A number of users
have to be addressed regarding architecture, handoff, data security etc.
Two methods which are widely suggested are tight coupling and loose coupling.
Tight coupling of WLAN and 3GPP are linked through the core network (GPRS).
In the loose coupling the WLAN bypasses the GPRS network.
TM
Base access control and changing adhering to 3GPP are used in tight coupling. GPRS
based services are extended from 3GPP users to operate in WLAN also. Normal voice
calls are enabled from WLAN network to 3GPP smoothly by tight coupling.
Loose Coupling
In the case of loose coupling WLAN is applied as an access network. It uses no data
interfaces to the 3GPP (GPRS) core network but WLAN utilizes the subscribers databases
available in the GPRS network.
With loose coupling WLAN could bypass the GPRS network. It provides a direct
simple access to the destination packet data networks. The loose coupling is flexible to
some extent to the subscribers that the SIM card can be reused and they can access a set
of wireless data services with WLAN.
On the other hand in the tight coupling 3GPP system-based access control and
charging is being used.
The ultimate goal of 3GPP circuit-switched services is to permit the operator to
provide access to the circuit-stitched services from a WLAN arrangement, say usage of
normal voice calls in the system.
TM
4.5.1 Introduction
· The advent of LMDS channel was mainly driven by the digital TV applications.
· It was standardized and initiated in Europe with the project say Digital Video
Broadcasting (DVB).It was developed in European broadcasting union.
· With DVB the LMDS was useful for wider broadcasting markets.
· It was same as the ‘direct to home” satellite services.
· They use QPSK modulation and a concatenated Forward Error Correction (FEC)
coding technique.
· Also, a convolution inner code and Read Soloman outcode is used.
· Also, the transmission frame is based on the MPEG2 transport data stream.
TM
· Consider the outer code could carry 188 information bytes and it has a block
length of say 204 bytes. It is capable of correcting errors upto 8 bytes in each
black. This code is attained using the Reed-Solomon code. That is by shortening
the RS(255,239) code.
· The convolution inter-leaver say with interleaving depth I = 12 is inserted
between the inner and outer encoder units.
· Then errors could be uniformly distributed that occur due to bursts in receiver.
· The interleaved and deinterleaved blocks are shown here as a simple example.
i) · · · · · · · ·
ii) · · · · · · · ·
The input data bytes are fed to a parallel branches with first in first out parallel shift
registers. There are delays that starts from 0 and increases by multiples of 17 say second
branch. Then a 17 byte delay would be there and it goes on.
· The output switch is made to move cyclically with the input switch.
· The deinterleaves has the same structure except the reverse order of the time
delays.
· The Digital Video Broadcasting (DVB) specifications mentions all the transmission
and receive functions including all system parameters. It does not include the
symbol rate of the modern operations.
TM
· Thus, the Local Multipoint Distribution System (LMDS) is a system for the
broadband microwave wireless transmission direct from the local antenna to
home premises and business area without the LOS radius. It provides several
services to the subscribers.
Review Questions
Part A
1. What are objectives of Internet working ?
2. List the Internet working requirements ?
3. Write a note on WLAN.
4. Define GPRS.
5. What is known as LMDS ?
6. Write a note on multichannel multipoint distribution system ?
7. What are the advantages of LMDS ?
8. List any two requirements of Internet working.
9. Write a short note on specifications of LMDS.
10. Write a note about WLAN and 3GPP data networks.
TM
Part B
1. Explain Internet working objectives and its requirements.
2. Write a detailed notes on,
i) Schemes to connect WLAN and 3G networks.
ii) Internet working requirements.
3. What is known as session mobility ? Explain the objectives of Internet working ?
4. Explain the interworking architecture for WLAN and GPRS ?
5. What is LMDS ? Explain LMDS system in detail.
6. Explain multichannel multipoint distribution system in detail.
Q.1 How does the 3G GGSN/MSC differ from the GPRS architecture elements
(2G GGSN/MSC) ? What sort of enhancements are carried out in UMTS to meet out
its specifications. (Refer sections 4.4 and 4.4.2) AU : May-19, Marks 15
qqq
TM
Notes
TM
Contents
5.1 Introduction
5.2 4G Vision . . . . . . . . . . . . . . . . . . May -18, Dec.-18 · · · · · · · · · · · Marks 10
5.3 Comparison of 4G and 3G . . . . . . . . . . . . . . . . . May -18, Dec.-18 · · · · · · · · · · · Marks 11
5.4 4G Features and Challenges . . . . . . . . . . . . . . . May -17,19, Dec.-18 · · · · · · · · Marks 13
5.5 Applications of 4G . . . . . . . . . . . . . . . . . . Dec.-17· · · · · · · · · · · · · · · · · · · Marks 2
5.6 4G Technologies . . . . . . . . . . . . . . . . . . May -17,19 · · · · · · · · · · · · · · · Marks 16
5.7 LTE - Network Architecture and Protocol . . . . . May -18, 19 · · · · · · · · · · · · · · · Marks 16
5.8 Advanced Broadband Wireless Access and Services
5.9 Mobile Virtual Network Operator (MVNO)
(5 - 1)
Wireless Networks 5-2 4G and Beyond
5.1 Introduction
The objective of 4G mobile systems are to integrate Present wireless technologies
including WWAN, WLAN, Bluetooth technique etc. A real convergence of mobile radio
and Internet is possible with 4G. There is a great improvement in throughout from bytes
(for SMS) to KB/Sec (For MMS) is allowed. The Wireless transmission techniques are
used which includes digital audio broadcast (DAB); digital video broadcast (DVB).
In addition to this, local multipoint distributional services (LMDS) and the
multichannel multipoint distribution service (MMDS).
Cellular GSM
2G and 2G
Short range
Cellular
PAN/LAN/
UMTS 3G
MAN/WAN Connection
IP based
Core Network
Broadcast (IPCN)
DAB/DVB
WLAN
Layer HIPERLAN
Cellular
4G
Fig. 5.1.1 A seemless connections of the networks
TM
Application Fixed
Mobile
end backbone Air
terminal access Terminal Subscriber
unit Interface
points
A simple comparison of 4G with the 3G with respect to some of their parameters are
tabulated below.
6. Internet Protocol (IP) Several airline protocols All the Internet protocols
used (e.g. IPv5.0) used (e.g. IPv6.0)
TM
Fully
converged
services Diverse
user's
devices
Year
2010 Several
autonomous
Mobile networks
accesses
Software
independency
Fig. 5.4.1 Some 4G features
Other key features of 4G networks includes ;
· Anytime, Anywhere with any other device, enables higher usability
· Personalized communication facilities
· Integrated Services
· Supporting multimedia services at lesser cost.
· Provides telecommunication, Data and multimedia services.
· 4G Networks are basically all IP based heterogeneous networks. They provide
anytime anywhere services.
User
È
Application Mobile Other
end devices terminals
(Eg : PDA)
Fig. 5.4.2 4G - Access to internet from anywhere using any wireless device
Hence the features of 4G are more attractive and it has captured the mobile market
replacing the bottolenecks of 3G Networks.
Accessing Internet from, Anywhere, Anytime with Any device is a popular feature
of 4G standard.
In QoS the process of IP - based devices and Non IP - based devices is a difficult
task. Some of the 4G challanges and their possible solutions are tabulated below :
I) Mobile Station
ii) Selection of wireless system Each wirless system has its The system is to be
own characterisitics. choosen in a manner tailor
Choosing an appopriate made for the users
technology emerging requirements among
wirless technologies. multiple.
iii) Multimode user termnials Designing a single user The user terminal has to be
terminal which can made adaptable to the
operatue in various network interfaces.
wireless networks. To
overcome. Problems like
device size, backward
comptability and power
consumption.
TM
III) Services
ii) Billing System, multiple Billing with detailed Serveral billing and
service providers informations. accounting frameworks are
Collecting managing and applied and processed.
storing of users accounting
informations from many
service providers.
Virtual navigation :
An user can get the navigation informations and receives the required database
about the streets, path, buildings where the travels etc. This indeed needs a high speed
transmission.
Virtual presence :
The 4G system provides virtual presence environment. Even if an user is on off-site
user services will be available for him. Thus anywhere, anytime is made possible.
TM
Education :
The 4G system facilitates on-line education to students from anywhere in the world
in affordable costs.
Tele medicine :
The remote health monitoring of patients with the help of video conferencing for the
physicians from anywhere and at any time.
4G
3.5G
Carrier Service
Carrier Speed Protocol Freq. Distance
network High speed offered
downlink
packet Europe MBS 34 Mb/sec OFDM 60 GHz 100 M
access
(HSDPA)
used Europe WSI >34Mb/sec OFDM 40 GHz >100 M
– speed
10 Mb/sec MBS - Mobile Broadband System WSI - Wireless Strategic Initiative
Wi-Fi
Europe HyperLAN 2 34 Mb/sec 802.11a 5 GHz 100 M
IEEE and
3G MIND 34 Mb/sec 802.11a(IPV6) 17 GHz 100 M
Europe
Sprint 10 to 72
802.16a OFDM 2150 MHz 35 Miles
Mb/sec
TM
If there is any increase in the value of 'p-ave' ratio of a signal then an increase in
system linearty is required, so as to minimize distortion.
The Linearization techniques will help in this situation but it is not very economical
to offord in the system.
Considering the block length as ' L b ', the channels response length be ' L c ' then the
new length of cyclically extended symbol is expressed as,
· New Length = L b + L c – 1
· It has no ISI
· The uncoded bits are appended to the data.
TM
· In the MCM receiver end just the ' L b ' samples processed where as ' L c – 1'
samples would be discarded.
This results in a loss in signal-to-noise ratio (SNR). This is given as,
Lb +Lc – 1
· (SNR)losses = 10 log indB
Lb
In 4G networks there are two types of MCM techniques are applied and they are ;
i) Multicarrier code division multiple access (MC-CDMA)
The MC-CDMA is nothing but OFDM with a CDMA overlay on it.
ii) Orthogonal frequency division multiplexing (OFDM) using the time division
multiple access (TDMA) technique.
The users or subscribers are distinguished with an orthogonal codes in MC-CDMA.
Here data is spreaded in frequency or time. Each user could be assigned several codes.
The MC-CDMA uses QPSK for its modulation.
In next one, OFDM with TDMA technique the users are allocated time slots for
tranceiving data. In OFDA with TDMA uses high-level modulation like,
multilevel quadrature amplitude modulation (M-QAM) in which 'M' can be 4 to 256.
H(f) Broadband
channel
Parallel
narrow
H(f) band
channel
Fig. 5.6.1 Broadband channel is divided into many parallel narrowband channels in
OFDM - TDMA
TM
Amp
1 2 3 4 5 6 7
Freq.
Fig. 5.6.2 The overlapping of subchannels
The subcarrier pulse shape in OFDM is square in nature. Using inverse FFT (IFFT)
the pulse forming and modulation is being performed. For decoding purpose FFT is
implemented.
The OFDM scheme divides the available broadband channel into several parallel
subchannels. The OFDM receiver unit receive the signal transmitted and senses it. If
required it does the necessary correction over it before the transmitted signal is
extracted.
Note : An attractive advantage of OFDM is that even though the subchannels overlap
with each other their is no risk of interference between them. This is because each of
the frequencies in OFDM is an integer multiple of that of a fundamental frequency.
Tr Rr
TM
I|P 1
Tr1 Rr1
I|P 2
Tr2 Rr2
Signal
processing
unit
I|P 3
Tr3 Rr3
I|P 4
Tr4 Rr4
Mobile Roof
transmitters top
receivers
L.O. L.O.
TM
Case i) MISO : Consider there are 'M' transmitting antennas. The power will be divided
into 'M' transmitter antenna branches.
At the receiving antenna end if signals are added up coherently we might get an
M-fold of increase in SNR value when compared to SISO system.
é(SignalPower)ù
Increase inü M2 –ê ú
ï ~ ë M û
SNR ý -
Noise
(approx) ïþ
i.e. SNR ~
- M ´ SNR 0 ; Where SNR 0 is the average SNR value
The MIMO system is just as a combined system of MISO and SIMO radio channels.
Here an increase of MN fold of average value of SNR 0 could be obtained.
Capacity = C ~
- B log 2(1+ M ´ N ´ SNR 0 )
Where N ³ M , and different signals are transmitted with the same bandwidth (B).
~ æ N ö
C single - mB log 2 ç 1+ ´ SNR 0 ÷ ,
channel
è M ø
1) MISO 5.35 B
3) SISO 3.45 B
4) SIMO 5.66 B
Þ N ´ SNR 0
The channel capacity of the channel is roughly equal to the value such as,
C ~
- B log 2 [1 + N ´ SNR 0 ] ....
A comparision of channel capacity for different channels are shown in the above
table. The four different schemes MISO, MIMO, SISO, and SIMO schemes has an unique
channel capacity C and average SNR value. We observe a linear increase in capacity
according to the transmitting antennas from SISO to MIMO schemes.
TM
FROM TO
SERVICES
VOICE
DATA
IP
CONTROL
PHYSICAL
NETWORK
TRANSPORT
PHYSICAL
NETWORK
· · · ·
Cell
phone Camera PC ····
IMS architecture-schematic :
This architecture is standardized using the IP domain to provide multimedia
services. Multimedia sessions are easily carried forward using IP transport as oppose to
circuit switched networks. The All-IP domain encompasses the Application Layer,
Control Layer and Transport Layer. Therefore switching of service providers, flexibility
and enhanced service convergence is easily enabled.
TM
LAYER
APPLICATION
OSA - SCS SIP IM - SSF
SLF S - CSCF
LAYER
CONTROL
HSS I - CSCF BGCF MGCF SGW
TM
5 - 16
ACCESS AND
TRANSPORT P - CSCF MRFC
LAYER
PUBLIC SWITCHED
INTERNET TELEPHONE
IP NETWORK
CORE
UTRAN N/W
[ UMTS ] GGSN MRFP MGW
DSLAM
TM
The goal of LTE / SAE architecture is to optimize the wireless system for packet
data transmission that is supported by the packet core networks.
An inter-connection between core network and radio access network is done. Here
the core network takes core of the core network related functions such as,
· Security
· Terminals context and
· Mobility management etc.
The other Radio Access Network (RAN) does all the wireless radio interface related
functions.
Also the architecture is compatible such that can be used by non-3GPP access
wireless networks, for example LAN, WiMAX, WLAN etc.
By this different packet access systems finds a real convergence.
The LTE/SAE architecture is efficient in its performances and provides ;
® Attaining mobility within its evolved access system
® Evolved access system is implied on existing and the new frequency bands
® Inter-system mobility
® Indentification of roaming interfaces
TM
GE-
RAN PCR
SGSN
function
GPRS
core HSS
UT-RAN
IP
server
3GPP SAE (eg :IMS)
Evolved MM
Entity Anchor Anchor
RAN
unit unit
Evolved
packet
core
WLAN
Non-
3GPP
3GPP
IP
IP Access
Access
TM
® In access gateway entity, both mobility management and user plan entities
might be collacated.
® To provide effective connectivity to IP multimedia system, LTE suggests
lesser number of nodes in the packet core arrangement when compared to 3G.
® The physical layer provides fundamental bit transmission functions over air
interface.
® This physical layer is driven by SC-FDMA in the uplink and OFDMA in
the downlink.
® Dynamic mapping of physical channels to the resources available.
® With transport channels the physical channel offers data transmission
functionalities to next higher layers.
® All resource mapping is dynamically done and it is driven by the
scheduler.
® Due to this efficient scheduling process, there are no dedicated physical
channels and transport channels as in the case of 2G.GSM or 3G-WCDMA.
The LTE/SAE core network architecture thus provides faster communication and
attends user services in an effective approach in wireless networks.
TM
Review Questions
Part A
1. Compare 3G and 4G with any four points.
2. Write a note on 4G vision.
3. List any three features of 4G services.
4. What are the applications of 4G ?
5. Define MCM
6. Write a note on smart antennas ?
7. What is SISO and SIMO ?
8. What is MISO and MIMO ?
9. Write an equation of channel capacity for a SISO system.
10. Write an equation of total system capacity in a MIMO system ?
11. Compare SISO and SIMO systems.
12. What are advantages of smart antennas ?
Part B
1. a) Explain the 4G vision.
b) What are the features and challenges of 4G ? Explain.
2. a) What are the applications of 4G ?
b) Compare 3G and 4G networks.
3. Explain the 4G technologies MCM, and OFDM-MIMO system in detail. What is a MIMO system?
TM
Part - A
Q.1 Mention the features and challenges of 4G. (Refer section 5.4.2)
AU : May-17, Marks 2
Q.2 Define multi carrier modulation. (Refer section 5.6.1) AU : May-17, Marks 2
Q.4 List the characteristics of 4G network. (Refer section 5.2) AU : May-18, Marks 2
Q.5 What are the techniques to improve network survivaility in differernt layers ? Name
the challanges faced by 4G. (Refer section 5.4.2) AU : Dec.-18, Marks 2
Q.6 Define the Long Term Evolution (LTE). (Refer section 5.7.1) AU : May-19, Marks 2
Q.7 List the features of 4G. (Refer section 5.4.1) AU : May-19, Marks 2
Part - B
Q.9 Explain in detail about LTE wireless systems. (Refer sections 5.7.1 and 5.7.2)
AU : May-18, Marks 16
Q.10 Define 4G and compare the key parameters of 4G with 3G. (Refer section 5.3)
AU : May-18, Marks 11
Q.12 Categorize the four types of smart antenna technique and explain in detail.
(Refer section 5.6.2) AU : May-19, Marks 13
Q.13 Summarize the 4G key challenges and mention the proposed solutions.
(Refer section 5.4.2) AU : May-19, Marks 13
qqq
TM
(A - 1)
TM
Q.12 What are the three main stages in network management operations in AMPS ?
Ans. : i) Mobility Management
ii) Authentication and
iii) Radio Resource Management.
TM
Q.26 Mention few other standards of IEEE 802.11 with its description.
Ans. :
Q.28 What are the network topologies possible with HIPERLAN - 2 standard ?
Ans. : i) Infrastructure type ii) Ad-hoc type
TM
Q.36 What are the devices associated with Internet for routing procedures ?
Ans. : i) Repeaters ii) Bridges iii) Routers.
TM
Q.50 What are the indicators used to estimate the performance of routing protocols
in MANET ?
Ans. : The indicators of estimating protocol performance includes
i) Data packet delivery ratio
ii) End - to - end delay
iii) Protocol overhead.
TM
In the below diagram the mobile host is connected through a wireless link and an
Access Point (AP) to the wired internet. The correspondent host resides here. The
foreign agent can control the mobility of mobile host. Also it can handover the existing
connection to next foreign agent whenever the mobile moves on.
Access
point-AP hp
Foreign agent
Wired
Internet
Standard TCP
Wireless
Mobile TCP
host
If handover takes place I-TCP needs several actions to happen. The I-TCP has many
advantages and they are listed below :
The I-TCP does not need any changes in TCP protocol when used by hosts in fixed
network. All optimizations for TCP works between correspondent host and foreign
agent.
Because of the strict partitioning into two connections in I-TCP the transmission
errors if any would not propagate into fixed network.
In I-TCP new mechanisms can be introduced between foreign agent and mobile host.
It allows different tests to be applied.
It is also possible to apply different transport layer protocol between mobile host and
foreign agent. Compressed headers can also used in I-TCP.
But with the technique of segmentation in I-TCP there are also same demerits. Some
of the demerits are listed below :
The correspondent node is not aware of partitioning done. A crashing access node
may crash applications that runs on correspondent node and assumes a reliable
end-to-end delivery.
Increased handover latency creates problem.
The foreign agent involved should be a trusted entity or otherwise their will be
security problems.
TM
The sender's state remain constant whatever be the time for which the receiver is
disconnected. This is persistant mode.
An adapted TCP is used by wireless link and it is capable of recovering from packet
losses. It does not use slow start. The M-TCP also needs a bandwidth manager to
provide fair sharing over wireless links.
Merits of M-TCP :
· Maintains end-to-end TCP semantics.
· It can avoid unwanted retransmissions in case of MH disconnections.
· Lost packets will be retransmitted automatically.
Q.53 Why firewall is used in UMTS ?
Ans. : The purpose of firewall in UMTS is to provide security. To prevent any data
hacking it is useful in the network.
TM
1) Route Discovery
2) Route Maintenance.
Route Discovery : It is performed whenever a node wants to send a packet of data to
a particular destination for which it does not have a route.
Route Maintenance : It identifies a link failure on an active route or path. Once route
failure is found then it is informed in such a way that it is maintained. Both the route
discovery and route maintenance are available on an on-demand situation. Information
cannot be exchanged in a periodical way.
A main difficulty in operation with Dynamic Source Routing (DSR) is handling
congestion. While dealing with DSR protocol it is important to consider mobile status of
devices. The impact they have created is high. Since ad hoc devices consists of mobile
devices, stability of routes in the network often change. Due to changes in delivery, the
packets become instable, as the mobile network enter and exit freely.
It is better to select lesser number of hops on a particular route. Distance matters a
lot, and as the range of transmission increases the quality of wireless radio channel
starts decreases providing less reliable transmission. This in turn increases more packet
losses and necessitates retransmission thus reducing system efficiency.
Node mobility impacts on routes available. It is also complex to monitor congestion
levels in the network. Final throughput will be less due to this level of mobility of
nodes. If it is high stability of routes will decrease and throughput will naturally
decrease. These may be known to the initiator because of the collapse of the routes
created by high mobility in the network.
Hence protocols including dynamic source routed protocol (DSR) dealing with mobile
ad hoc networks has to take into account so many criterion for improving the entire
system's performance.
· Network adapters
· Fiber optics
· Copper wires
· Special hardware for routers.
In data transmission there may be packet loss due to some problem in transmission
path such as "Congestion" in node.
To ensure reliable data delivery controlling this congestion is important. Even if a
network is designed carefully congestion may occur. In router the packet buffers would
be filled and the router will be unable to forward packets.
Now the sum of input rates of the packets intended for an output link will be
higher than output link capacity.
If there is a packet loss receiver unit will recognize it later by noticing a gap in
packet stream. But upto the missing packet state the receiver sends acknowledge the
sequence to the sender.
The sender by noticing a missing acknowledgement in the sequence of
acknowledgement recognizes a packet loss occurance, due to congestion in path.
To avoid congestion now TCP reduces the rate of packet transmission drastically so
that accumulation of packets gets slow down.
Note : In heavy load TCP guarantees sharing of bandwidth. Also by using reliable
hardware like special routers, network adapters and software the congestion in
transmission path can be controlled.
TM
performs a 'fast recovery' from packet loss strategy. By this mechanism efficiency of TCP
is improved.
Slow Start
If there is missing acknowledgement due to a packet loss TCP reacts fast. It may not
come out of congestion quickly. But its behavior exhibits slow start after the congestion
detection. The sender calculates a congestion window and its start size is one segment.
After arrival of an acknowledgement sender increases the window by one. Then after
arrival of two acknowledgements, sender increases congestion window by two. It
continues and if another two acknowledgments are received the congestion window is
again increases by two and now it will be equal to 4. Such a mechanism is called as
exponential growth of congestion window in slow start technique.
Every time an acknowledgement coming back will take one Round Trip Time (RTT)
So far we noticed that congestion window was doubled every time. But the steps
might be very large and hance doubling is not good. The exponential growth of
congestion window stops at the congestion threshold.
Note : As the congestion window reaches the congestion threshold level then after
that if an acknowledgement is received then the window will be increased only by
(linearly) and doubling the size is avoided.
Implications on Mobility
The mobility itself may induce packet loss. Always soft handover may not be possible
from one system to another.
Fundamental design problem in TCP is if there is packet loss the cause for it cannot
be distinguished easily. Sometime error control mechanism is misused for congestion
control. But end result will be packet loss for both cases.
When using the mobile IP there may be some packet available in transit to the old
agent (foreign agent) where as the mobile node is moving to a new foreign agent. So
that there may be packet loss. Thus packet loss may also be induced by mobility from
one node to another.
Q.56 What is the significance of snooping TCP ?
Ans. : Snooping TCP :
Main drawback in I-TCP is the segmentation of single TCP connection into two
connections. Because of this original end-to-end TCP semantic will be lost. But here the
function of enhancement is buffering data closer to mobile host so as to perform local
retransmission when there is a packet loss. A correct place for TCP enhancement is the
foreign agent (in mobile IP terms) as shown below.
TM
As it is seen the foreign agent buffers packets with that of the destination mobile
host. In addition to this, it also snoops the packet flow in two directions (as shown) and
recognizes acknowledgements. By buffering packets to a foreign node there is a chance
of local retransmission in case of packet losses in wireless link. Till receiveing
acknowledgements from mobile host the foreign agent continues buffering process. If it
does not receive acknowledgement then either packet or acknowledgement could be lost.
As an alternate it could receive a duplicate ACK but it also reflects that a packet has
been lost. Now a faster retransmission is made by foreign agent and time outs will also
be shorter. The foreign agent can filter any duplicate ACK's so that unwanted
retransmissions are avoided.
Unnecessary traffic on wireless link can be avoided since the foreign agent is
capable of discards duplicates of packets that was already transmitted and
acknowledged.
With snooping TCP there are many advantages. Some of them are summarized
below :
i) The end-to-end semantic of TCP is not changed.
ii) As soon as a mobile host reaches a new foreign agent a handover of state is not
required.
iii) The correspondent host involved need not be changed.
iv) It does not account wheather the next foreign agent had applied enhancement or
not.
Q.57 Write a note transaction - oriented TCP ?
Ans. : Transaction-Oriented TCP :
Consider an application is running on mobile host (MH). The MH sends short
requests from time to the server. If the application that is running reliable packet
transfer it would use TCP. Due to this several packets are required over the wireless
links. The sequence of steps are given below.
· At first TCP use a three-way handshake for establishing connection.
· For transmission of request and closing connections through three-way handshake
atleast 4 (1 + 3) additional packets are neeeded.
· If there is a heavy traffic for a long time this requirement is minimum or
otherwise it will be of waste to have more packets to handle less packet
transmission.
In this example an overhead scenario is shown. The web services depend on HTTP
and it need reliable transport system. TCP is used for this purpose in Internet.
TM
Client Server
TCP SYN
TCP SYN/ACK
Connection
TCP A setup
HTTP R CK
equest
Data
nse
transmission HTTP Respo
Syn : Synchronization
ACK : Acknowledgment
The TCP connection has to established before a HTTP request is sent. Assume GPRS
is used as wire area transport system.
There is an one-way delay equal to 550 msec. To set up a TCP connection it may take
more than one second.
The Transaction-oriented TCP (T-TCP) emerged in this regard to provide more
efficiency T-TCP can combine the packets for both connection establishment and release
with that of the user data packets. By this approach the additional number of packets
can be reduced. If there is seven additional packets required this T-TCP can reduce it
upto two packets.
Merit
· Reduction in overhead.
Demerits
· Needs changes in mobile host and correspondent hosts.
· Has security problems.
Summary of the classical enhancements to the TCP are tabulated below regarding
mobility scenario.
TM
The configuration parameters with respect to the above characteristics for adapting
TCP to the wireless environment are;
i) Limited transmit (Useful when smaller amount of data are sent)
ii) Large windows (Large window should be supported).
iii) Large MTU (Maximum Transfer Unit). If the MTU is larger it will increase
congestion window.
iv) Explicit Congestion Notification (ECN).
v) Selective Acknowledgment (SACK).
vi) Time stamp.
vii) No header compression.
TM
The above recommended configuration parameters for 2.5G/3G networks are already
used by the i-mode system. To have better efficiency in the above wireless networks all
the parameters have to be considered.
Selective Retransmission
One of the important advantage of extension of TCP is the usage of 'selective
retransmission'. The TCP-ACK's are cumulative, and they acknowledge the receipt of
packets upto a particular packet. Now the sender retransmits all packets from the last
packet onwards. This is 'go-back-n retransmission' method. The bandwidth is wasted
due to sending many packets once again.
An alternate to this is selective retransmission. The TCP requests indirectly for
selective retransmission. The receiver is capable of acknowledging single packets and the
sender can determine in particular about which packet is to be retransmitted.
qqq
TM
Q.1 Find the transfer time of 20 kB file with mobile data network with a rate of
10 kbps.
Ans. : In mobile networks like mobitex the length of file is limited to 20 kb.
For transferring a file of 20 Kb the time of transfer (t) is
= 20 (kB) ´ 8 (B/b) ´ 10 (kB/s)
t = 16 sec.
Q.2 Calculate P n and P n + 1 in case of collision between bluetooth and IEEE 802.11
(Assume n = 6).
L Ie éL ù L
Ans. : Given : n = 6 ; P n = - ê Ie ú, where n = Ie
L BS L
ë BS û L BS
L Ie éL ù
and Pn + 1 = 1 - + ê Ie ú,
L BS ë L BS û
Q.3 In an open area find the difference between received signal strength of the two
terminals which are located in 10 m and 1 km from the base station ?
Ans. : In open areas the received signal strength would fall by 40 dB (approx) in a
decade. The received signal power between two terminals that are at 10 m and 1m from
1 m base station will be around 80 dB.
Q.4 Assume an out-of-band radiation is 40 dB below the main lobe. If two channel
are operating in two adjacent channels find the impact in this situation.
Ans. : Assuming the out-of-band radiation is 40 dB below the transmitted signal
power then it might exceed the signal strength of the information signal by 60 dB
(approx).
Q.5 Consider the IS-95 digital cellular systems. Find the channel capacity of the
channel which has bandwidth of channel 1.25 MHz and transmission rate of
9600 bps with signal to interference ratio of 3dB to 9 dB.
(B - 1)
TM
S
Ans. : The second generation cellular system requires at receiving end as,
I
S
3 dB < < 9 dB.
I
Channel bandwidth is 1.25 MHz.
Transmission rate is 9600 bps.
\ Channel capacity will be,
æ 1.25 MHz 1ö
C = ç ´ ÷
è 9600 bps 8ø
= 16 to
æ 1.25 MHz 1ö
C = ç ´ ÷
è 9600 bps 2ø
= 65 users.
Q.6 What will be the channel capacity of an AMPS analog system with a carrier
bandwidth of 30 kHz, frequency reuse factor is 7 each with 1.25 MHz of
bandwidth.
Ans. : Given : K = 7
æ 1.25 MHz 1ö
Capacity (c) = ç ´ ÷
è 30 kHz 7ø
Q.7 Find the capacity of a GSM network for K = 3, carrier bandwidth as 200 kHz
number of users in a carrier signal as 8; K = 3, each with 1.25 MHz of
bandwidth in the system.
Ans. :
æ 1.25 MHzö æ 8 ö
Capacity = ç ÷ ×ç ÷
è 200 kHz ø è 3 ø
Q.8 Where the conversion from analog signal and coding will take place in speech
conversion procedure in GSM ?
Ans. : The conversion process from analog signal will take place at mobile station MS
and from this signal further coding will take place at the base station subsystem.
TM
Q.9 If the data rate is 9600 bps how many bits will be carried by a 10 ms
half-frame in IS-95 CDMA standard ?
Ans. : The number of bits generally depend upon the data rate of signal. A 10 ms
half-frame will carry around 96 bits if the data rate is 9600 bps.
Q.12 With QAM and rate 3/4 convolutional coding technique if 64-QAM is used
what will be the data rate for 250 kbps per carrier signal ? Consider a
48 carrier signal in this case.
3
Ans. : A 64-QAM modulation technique is used with a rate convolutional coder unit, 6
4
bits per symbols is modulated with the data given the effective data rate will be equal to
4
250 kbps/carrier signal ´ ´ 6 b/symbols ´ 48 carrier signal.
3
4
Data rate = 250 kbps/carrier ´ ´ 6 b/symbols ´ 48 carrier signals = 54 Mbp/sec.
3
Q.13 What is the ISM band of frequency of operation for a bluetooth device ?
Ans. : The bluetooth devices operate in ISM bands at 2.4 GHz frequencies.
Q.14 Why there is interference issues between a bluetooth devices and IEEE 802.11
standard ?
Ans. : The IEEE 802.11 devices and bluetooth devices operated in same frequency
band of 2.4 GHz. Hence the probability of occurrence of interference between these
devices were more.
Q.15 What is the data rate of high quality voice packets if packets are sent at rate
of 1600 slots per second ?
Ans. : Consider a high quality voice packets (HV), the HV packets are 240 bits long in
size and hence they are transmitted every six slots. The 1-slots packets transmitted at
the rate of 1,600 slots per sec.
TM
é 1600 ù
Data rate = ê slots per secú ´ 240 bits
ë 6 slots û
= 64 kb/sec.
Q.16 Assume a symmetric 1-slot DH 1 link between a master and slave terminals
carrying 216 bps at 800 slots per second in each and every direction. Find its
associated data rate for transmission.
Ans. : Assume a 1-slot DTH link between a master (M) and slave (S).
= 172.8 kb/sec.
Q.17 In bluetooth considering a DM 5 link with 5-slots packets sending 1792 bits in
a packet by master and 1-slot packet carries 136 bits in a packet by the slave.
The number packets in one second is 1600/6 packet in a second each direction.
Find the i) Data rate from master and ii) Data rate from slave.
Ans. :
· In medium data rate in bluetooth, consider an asymmetric DM 5 link using 5-slot
packets that carry 1792 b/packet by master 'M'.
· In same case 136 b/packet by the slave 'S'
é 1600 ù
i) Data rate by M = ê1796 (bits / packet) ´ (packets /sec. )ú
ë 6 û
= 477.8 kbp/sec.
é 1600 ù
ii) Data rate by S = ê136 (bits / packet) ´ (packets /sec. ) ú
ë 6 û
= 36.3 kbp/sec.
Q.18 If the length ratio of IEEE 802.11 and bluetooth device packets is 4-3,
probability of overlap of the IEEE 802.11 packet having n = 4, and for n + 1
what will be dwell periods of bluetooth ?
Ans. :
Length of IEEE 802.11 L Ie
= = 4.3
Length of Bluetooth L BS
Q.19 The probability of bluetooth hop occurrence at operating 'f' of FHSS system is
0.013. Assume a 1000 byte 802.11 packet at a rate of 2 Mbps, what will be the
probability of survice and collision in the system ?
Ans. :
Phit is = 0.013
= 4 msec.
Let bluetooth send 1-slot packets then, its packet length L BS is,
L BS = 625 ms and n = L Ie /L BS
n = 6
The Pn = 0.4, Pn + 1 = 0.6 then,
PS = 0.92
Q.20 Calculate the value of n, for the below case. The 802.11 b uses same frequency
band as the 802.11 DSSS for sending at a rate of 11 Mbps. (Assume a 1000
byte IEEE 802.11 packet at a rate of 11 Mbps)
Ans. : The length of 802.11 packet (L Ie ) is,
1000 bytes ´ 8 bits per byte
L Ie = = 727 msec.
11 Mbits per sec.
TM
L Ie 727 msec.
\ n = ~
- (approx.)
L BS 625 msec.
n ~
- 1
Q.21 Assume in a GSM control channel a block of 184 bits is being encoded into 224
bits of the code word before sending it to next convolutional encoder. If
number of parity checking bits are 40 find the code rate.
Ans. : Given : A block of 184 bits encoded into 224 bits. Parity check bits = 40. Hence
code rate (r) is = 184/224 = 0.82
Q.22 In IS-95 if the sync channel data operate at 1200 bps what will be the data
1
rate after a rate encoding ?
2
Ans. : In IS-95 2G standard it is given that the sync. Channel data operates at
1
1200 bps. After the process of rate convolutional encoding the data rate will be
2
increaded twice. New data rate = 2400 b/sec.
Q.23 Calculate the new data rate in IS-95 if the data rate over the access channel is
4800 b/sec. and it is passed through a rate 1/3 convolutional encoder.
Ans. : The given data rate over the access channel is 4800 b/sec.
1
If it is passed via a rate
convolutional encoder it will increase.
3
\ New data rate = 14.4 kb/sec.
Q.24 Consider a 64-ary orthogonal modulator. A long PN sequence is spreaded at
its output by a factor of 4. What is its chip rate ?
Ans. :
· A long PN sequence is spreaded at the output of a 64-ary orthogonal modulator.
· Factor used = 4
· 64-ary modulator performes a mapping process in which following a symbol
repetition every six bit is mapped into 64 bits.
· In IS-95 after modulation procedures the chip rate is = 1.288 Mchip/sec.
Q.25 In IS-95 closed loop reverse link power control on downlink traffic channel
assume a power control bit is sent for every 1-25 msec. What are the
indications given to the MS by a 0 and 1 in the signal ?
Ans. : Assuming a power control bit is transmitter for every 1.25 msec. In above case
then 0 and 1 bit indicates MS as below :
i) A zero bit indicates that the given mobile station should increase its power of
transmission.
ii) A one bit indicates that the given mobile station should decrease power of
transmission.
TM
Q.26 Consider a medium data rate in bluetooth standard. An asymmetric DM5 link
using five slot packets which carries 1792 bits per packet by the master
terminal whereas 1-slot packet that carries 136 bits per packet by the slave
terminal. Find the data rate of the slave terminal.
Ans. :
· Assume an asymmetric DM5 data link.
· 1792 bits/packet carried by master.
· 136 bits/packet carried by slave.
1600
Data rate of the slave terminal = 136 bits per packet ´ packets per second
6
Data rate = 36.3 Kb/sec.
Q.27 Consider an interference between DSSS 802.11 device with bluetooth device.
Assuming an open area having a as 2, minimum of S as 10 (10 dB),
PAP = 100 mW (20 dBm) and PBT = 1 mW (0 dBm) for d equal to 20 m and
processing gain 11 what will be the interference measured ?
Ans. : Given : a = 2
PBT = 1 mW (0 dB m)
d = 20 metres.
æ PBT ö
Interference I is = d a S min ç ÷× N
è PAP ø
Q.28 Find the length of the file in WLAN operating at 2 Mb/sec that can carry in
time that a mobile data service operating with a transmission rate of kb/sec.
carrying ints 20 kB data file ?
Ans. : Considering a data rate around 10 kb/sec. For transferring a file of length
20 kB. The time taken is,
æ Bö
t = 20 (kB) ´ 8 ç ÷ ´ 10 Mb/sec.
è bø
In case of same WLAN file transfer in 16 seconds of time interval it transfers a file of
length 4 MB.
Length of file = 4 MB
Q.29 Find the maximum throughput of a pure ALOHA network assuming a larger
number of users with a transmission rate of 1 Mbps ?
Ans. :
· Transmission rate = 1 Mb/sec.
· Assume a pure ALOHA network.
· Data rate with which message transfers through base station = D = 180 kb/sec.
Q.30 What will be the difference between the signal strength received of the two
terminals located in 10 meters and 1 km from base station in given open area?
Ans. :
· Two terminals located in distances from base stations = 10 m and 1 km
· Received signal strengths will fall in the level (in open areas) = 40 dB/decade
· Hence received signal strengths from two terminals at 10 m and 1 m from base
station is = 80 dB apart.
Q.31 For the GSM frequency band diagram given below,
i) Calculate the possible number of carriers in a direction.
ii) If the transmission rate of the system is 270.8 kB/sec, find its modulation
efficiency.
MHz 890 905 915 935 950 960
Services Services
already Initial already Initial
existing GSM existing GSM
25 MHz
=
200 kHz/ Carrier signal
TM
25 ´ 10 6
=
200 ´ 10 3
\ N c = 125 Carriers.
Rate of transmisstion
ii) Modulation efficency = h =
Frequency spacing / Carrier signal
270.8 ´ 10 3
h =
200 ´ 10 3
\ h = 1.354 bits/Hz
Q.32 Consider in a wireless TDMA system the coding delay is 20 msec and an
encoded speech into blocks of 20 msec time duration is accepted by the system.
In second generation digital system, if the speech block length is 488 bits,
calculate the minimum bit rate required for a 12 channels system.
Ans. : Given : Coding delay = 20 msec = 20 ´ 10 - 3 sec
Number of channels = 12
(12) (488)
Substituting the given values, R b(min) =
20 ´ 10 - 3
Q.33 Calculate the number of radio channels available in the FDMA system with
following data. A US analog mobile phone system is allocated 12.8 MHz for
every simplex band. The total specturm allocated is 12.8 MHz, the guard
bandwidth is 10 kHz and the channel bandwidth is 30 kHz.
Ans. : We have total available spectrum
B t = 12.8 MHz
= 12.8 ´ 10 6
= 30 ´ 10 3
= 10 ´ 10 3
TM
( 12.8 ´ 10 6 ) - 2( 10 ´ 10 3 )
n =
30 ´ 10 3
\ n = 426 channels
Q.34 Consider the direct sequence spread spectrum (DSSS) system which has a data
sequence bit duration as 4.085 msec, PN chip duration is 1 msec and E b N o is
10 for the case of average probability lesser than 10 - 5 calculate processing
gain of the system.
Ans. : In PN sequence (pseudo noise) the one bit period is called as one chip duration.
T c = 1 msec = 1 ´ 10 - 6
T b = 4.085 ´ 10 - 3
Tb 4.085 ´ 10 - 3
\ Processing gain PG = =
Tc 1 ´ 10 - 6
\ PG = 4085
Q.35 For the above question, find the jamming margin value in dB for DSSS system.
Ans. : We have processing gain
PG = 4085
E b N 0 = 10
TM
Q.36 Consider a cellular system with four cell reuse pattern. Let the bandwidth
allocated is 60 MHz to a FDD cellular telephone system using two 30 kHz
simplex channels for providing full duplex control of one channel. Calculate
the total number of channels available in one cell.
Ans. : If cellular system uses 4 cell reuse pattern, then each cluster has four cells.
N = 4
Total bandwidthü
ý = 60 MHz
(BW) þ
Channel bandwidthü
\ ý = Twice the number of simplex channels
(B c ) þ
= 30 kHz ´ 2
A c = 1000 channels
Q.37 A CDMA mobile unit measures signal strength from the base station and it is
- 10 5 dBm. Find what should be the mobile unit's transmitter power, as a first
approximation.
Ans. : The transmitted power of mobile is = Pt = – 76 dB – Pr
where Pr is received power in dBm Converting p t in dBm to W,
x
Pt = – 76 dB – Pr 10 log = 29
1 ´ 10 - 3
= – 76 dB – (– 105 dBm) log (x × 10 3 ) = 2.9
antilog (2.9)
= 29 dBm x=
10 3
Converting 29 dBm to watts, x = 0.7943
Pt = 794 mW x = 794 mW
Q.38 Find the maximum distance present between base station and mobile unit
which can be accommodated with a guard time period of 125 msec. The guard
time has to include the round-trip propagation time.
TM
Ans. : The radio waves travel at speed of light energy and hence the total round-trip
time distance (D) will be
= 300 ´ 125
= 37500
\ Distance = D = 375 km
Q.39 What will be maximum data rate that can be transmitted if the signal to noise
ratio is 20 dB and channel bandwidth is 40 kHz ?
Ans. : Channel bandwidth = B = 40 kHz
Signal to noise ratio = 20 dB = 100
æ Sö
Channel capacity = C = B log 2 ç 1 + ÷
è Nø
æ ln 101ö
= 40 kHz ç ÷
è ln 2 ø
S (D /R ) n
The signal to interference ratio is = =
( 3N )n
I i0 i0
S ( 4.583 ) 3
For n = 3 case =
I 6
= 16.04
TM
S
\ = 12.05 dB
I
But for minimum performance the S/I should be atleast 14 dB as per the requirement
of cellular system.
Hence n = 3 is not suitable since 12.05 dB is less than standard value 14 dB.
Let n = 4
Consider a seven cell reuse pattern and N = 7.
D
Co-channel reuse factor = Q = = 4.583
R
S
Signal to interference ratio =
I
1
= ´ ( 4.583 ) 4
6
= 73.52
S
\ = 18.66 dB
I
The signal to interference is greater than the minimum requirement standard value
14 dB and n = 4 is a better value that can be applied, for real time performance.
qqq
TM
Notes
TM
Sinc sin x
Sb (x) =
x
Triangular ì |t|
ætö ï1 -
T
for| t| £ T
^ç ÷ = í
èT ø
ïî 0 for | t | > T
Impulse ì1 for t = 0
d (t) = í
î0 for t ¹ 0
Bessel function p
1
In (b ) = ò e j (b sin q - nq) dq
2p
-p
Variance of X ¥
s2 = ò (x - m )2 PX (x) dx ;
-¥
in which m = E [X] , E ® Expectation.
= 0 otherwise
0 < p < 1, q = 1–p
(C - 1)
TM
n
p(x) = å p m q n - m d (x - m)
m= 0
x = np and
s 2x = npq
Poisson :
lm × e - l
Pr(m) = ; m = 0, 1, 2, 3 .....
m!
n
lm × e - l
p(x) = å m!
d (x - m)
m= 0
x = l and
s 2x = l
b) Continuous distribution :
Gaussian (Normal)
1 é (x - x)2 ù
p(x) = × exp ê - ú ; -¥ £ x £ ¥
sx 2p êë 2 s 2x úû
{
E (x - x)2 } = s 2x and E {x} = x
Exponential
p(x) = be - bx x>0
= 0 otherwise
and s 2x = a - 2 and x = a - 1
c) Rayleigh distribution :
The probability density function of the envelope of the Gaussian random noise signal
with variance s 2n and zero mean.
a æ - a2 ö
P(a) = exp ç ÷ ; a ³ 0
s 2n è 2 s 2n ø
E{a} = a = s n p2
æ pö
{
E (a - a)2 } = s 2a = ç 2 - ÷ s 2n
è 2ø
TM
d) Uniform distribution
ì 1
ï x < a < y
P(a) = í y - x
ïî 0 elsewhere
(y - x)2
s 2x = and
12
x+ y
x =
2
III. Trigonometry
cos (A ± B) = cos A cos B m sin A sin B
sin (A ± B) = sin A cos B ± cos A sin B
1
cos A cos B = [cos (A + B) + cos (A - B)]
2
1
sin A sin B = [cos (A - B) - cos (A + B)]
2
æ A + Bö æ A - Bö
sin A + sin B = 2 sin ç ÷ cos ç ÷
è 2 ø è 2 ø
æ A - Bö æ A + Bö
sin A – sin B = 2 sin ç ÷ cos ç ÷
è 2 ø è 2 ø
æ A + Bö æ A - Bö
cos A – cos B = - 2 sin ç ÷ sin ç ÷
è 2 ø è 2 ø
æ A + Bö æ A - Bö
cos A + cos B = 2 cos ç ÷ cos ç ÷
è 2 ø è 2 ø
= cos 2 A - sin 2 A
TM
e jx + e - jx
cos x = ; e jx = cos x + j sin x
2
e jx - e - jx
sin x = ; e jx = cos x + j sin x
2j
é x sin f 1 + y sin f 2 ù
f 3 = tan - 1 ê ú
ë x cos f 1 + y cos f 2 û
Differentiation
d
(e x ) = e x
dx
d
dx
(log e x) = 1x
d
(sin x) = cos x
dx
d
(tan x) = sec 2 x
dx
d
(sec x) = sec x tan x
dx
d 1
(sin - 1 x) =
dx (1 - x 2 )
d 1
(tan - 1 x) =
dx 1 + x2
d
(sinh x) = cosh x
dx
d 1
(sec - 1 x) =
dx x (x 2 - 1)
du dv
d æ uö v -u
dx dx
ç ÷ =
dx è v ø v 2
TM
d
(ax + b)n = n (ax + b)n - 1 × a
dx
d
(a x ) = a x log e a
dx
d
(cos x) = - sin x
dx
d
(cot x) = - cosec 2 x
dx
d 1
(log a x) =
dx x log a
d 1
(cos - 1 x) = -
dx (1 - x 2 )
d
(cosh x) = sinh x
dx
d -1
(cot - 1 x) =
dx 1 + x2
d du dy
= ´ (It is known as chain rule)
dx dy dx
d dv du
(uv) = u +v
dx dx dx
D n log (ax + b) = ( - 1)n - 1 ×(n - 1) ! a n (ax + b)n
D n (e mx ) = m n × e mx
Integration
1
ò x
dx = log e x
ò sinx dx = – cos x
ò a xdx = a x log e a
TM
ò sec 2 x dx = tan x
ò cos x dx = sin x
1 1 x
ò dx = tan - 1
a2 + x2 a a
1 1 a+ x
ò a -x 2 2
dx =
2a
log
a- x
1 1 x- a
ò x -a 2 2
dx =
2a
log
x+ a
ò cosec 2 dx = – cot x
x a2 - x2 a2 x
ò (a 2 - x 2 ) dx = + sin - 1
2 2 a
x x2 - a2 a2 x
ò x 2 - a 2 dx = - cosh - 1
2 2 a
x a2 + x2 a2 x
ò a 2 + x 2 dx = + sinh - 1
2 2 a
e ax
ò e ax cos bx dx = (a cos bx + b sin bx)
a2 + b2
e ax
ò e ax sin bx dx = (a sin bx - b cos bx)
a2 + b2
ò sinh x dx = cosh x
ò cosh x dx = sinh x
1 x
ò dx = sin - 1
a2 - x2 a
1 x
ò dx = sinh - 1
a2 + x2 a
TM
1 x
ò dx = cosh - 1
x -a2 2 a
p 2
(m - 1) (m - 3) (m - 5) ... x (n - 1) (n - 3) (n - 5) .... p
ò sin m x cos n x dx = ´
(m + n) (m + n - 2) (m + n - 4) ..... 2
0
e ax
ò e ax dx = ; ò e x dx = e x
a
e ax xn + 1
ò xe ax dx = (ax - 1) ; ò x n dx = , n¹ - 1
a2 n+ 1
e ax
ò x 2 e ax dx = (a 2 x 2 - 2ax + 2)
a3
e ax
ò e ax sin (bx) dx = (a sin (bx) - b cos (bx))
a2 + b2
e ax
ò e ax cos (bx) dx = (a cos (bx) + b sin (bx))
a2 + b2
x sin 2 ax
ò cos 2 ax dx = +
2 4a
æ 1ö
ò x cos (ax) dx = ç 2 ÷ (cos (ax) + ax sin (ax))
èa ø
æ 1ö
ò x 2 cos (ax) dx = ç 3 ÷ (2ax cos ax - 2 sin ax + a 2 x 2 sin ax)
èa ø
æ 1ö
ò sin (ax) dx = - ç ÷ cos ax
è aø
æ 1ö
ò cos (ax) dx = ç ÷ sin ax
è aø
æ x ö sin 2ax
ò sin 2 (ax) dx = ç ÷ -
è 2ø 4a
æ 1ö
ò x sin (ax) dx = ç 2 ÷ (sin ax - ax cos ax)
èa ø
TM
æ 1ö
ò x 2 sin (ax) dx = ç 3 ÷ (2ax cos ax + 2 cos ax - a 2 x 2 cos ax)
èa ø
sin (a - b) x sin (a + b) x
ò sin (ax) sin (bx) dx = - ; (a 2 ¹ b 2 )
2 (a - b) 2 (a + b)
é cos (a - b) x cos (a + b) x ù 2 2
ò sin (ax) cos (bx) dx = - ê
ë 2 (a - b)
+
2 (a + b) ú ; (a ¹ b )
û
¥
sin ax p -p
ò x
dx =
2
, 0,
2
for a > 0, a < 0, a = 0.
0
¥
sin 2 x
ò x
dx = p 2
0
¥
sin 2 x
ò x2
dx = p 2
0
¥
sin 2 ax
ò x2
dx = |a| p 2
0
¥
n!
ò x n e - ax dx = n+ 1
0
a
¥
2 x2 p
ò e- r dx =
2r
0
¥
2 x2 1
ò x e- r dx =
0
2r 2
¥
2 x2 p
ò x2 e - r dx =
0
4r 3
¥
2 x2 G [(n + 1) 2]
ò xn e - r dx =
0
2 rn+ 1
TM
Duality W(t) w (+ f)
Bandpass signal {
R e P(t) ejwct } 1
2
[P (f - fc ) + P * ( - f - fc )]
Unit step D ì
+ 1, for t > 0 1 1
u(T) = í d (t) +
2 j 2p f
î - 1, for t < 0
TM
sinc Sa (2 p W t) 1 æ f ö
rectan ç ÷
2W è2W ø
Impulse at time t = t 0 d (t - t 0 ) e- j 2 p f t 0
Gaussian e- p ( t t 0 )2 t 0 e - p (f t 0 )2
Impulse train ¥ m= ¥
1
å d (t - kT) f0 å ( d - mf0 ), for f0 =
T
k= - ¥ m= - ¥
TM
Time reversal m (– n) æ 1ö
Mç ÷
è Zø
Multiplication by an g(n) æ zö
Mç ÷
exponention sequence è aø
2) Progressions :
i) The numbers b, br, br 2 , br 3 .... is said to be in a Geometric progression (G.P.); It
b (1 - r n ) b
has n th term T n = br n - 1 and sum s n = , s¥ = (r < 1)
1- r 1- r
ii) The numbers b, b + c, b + 2c .... is said to be in Arithmatic progression (A.P.).
n
It has n th term T n = b + (n –1) C and sum S n = [2b + (n - 1) c]
2
iii) The numbers b 1 , b 2 , b 3 ..... are said to be in harmonic progression (H.P.) if the,
1 1 1 1
, , , ..... are in Arithmetic progression.
b1 b2 b3 b4
TM
x3 x5
b) sinh x = x + + + .... ¥
3! 5!
x2 x4
c) cos x = 1 - + - .... ¥
2 ! 4!
x2 x4
d) cosh x = 1 + + + .... ¥
2! 4!
TM
· cos 2 A + sin 2 A = 1
· sin 2a = 2 sin A cos B
2 tan A
=
1 + tan 2 A
= 1 - 2 sin 2 A
= 2 cos 2 A - 1
1 - tan 2 A
=
1 + tan 2 A
tan A ± tan B
· tan (A ± B) =
1 m tan A tan B
2 tan A
· tan 2A =
1 - tan 2 A
where c = r cosq
r = c2 + d 2
æ dö
q = tan - 1 ç ÷
è cø
a2 + b 2 - c2
and cos C =
2ab
4) Binomial series :
n (n - 1) 2 n (n - 1) (n - 2) x 3
a) (1 + x)n = 1 + nx + x +
1× 2 1× 2 × 3
n (n - 1) (n - 2) (n - 3) x 4
+ + ... ¥
1× 2 × 3 × 4
TM
n (n + 1) 2 n (n + 1) (n + 2) 3
b) (1 + x)- n = 1 - nx + x - x
1× 2 1× 2 × 3
n (n + 1) (n + 2) (n + 3)× x 4
+ + ..... ¥
1× 2 × 3 × 4
5) tan x series :
x 3 x 5 x7
a) tan - 1 x = x - + - + ..... ¥
3 5 7
1 1+ x
b) tanh - 1 x = log
2 1- x
x 3 x 5 x7
= x+ + + + .... ¥
3 5 7
Vectors
i) A ×B = a 1b 1 + a 2 b 2 + a 3b 3
I J K
where A = a 1I + a 2 J + a 3K
ii) A ´ B = a1 a2 a3 ;
and B = b 1I + b 2 J + b 3K
b1 b2 b3
¶f ¶f ¶f
iii) grad f = Ñf = I+ J+ K
¶x ¶y ¶z
iv) div F = Ñ ×F
¶f1 ¶f2 ¶f3
= + +
¶x ¶y ¶z
v) curl F = Ñ ´ F
I J K
¶ ¶ ¶
= ; where F = f1I + f2 J + f3K
¶x ¶y ¶z
f1 f2 f3
Co-ordinate systems
TM
Volume-element dV = r dr × df dz dV = r2 sin q dr dq df
The MKS system mentioned above is also called as International system of Units (SI
system).
2. Some important data
e = 0.4343
log 10
e = 2.3046 log 10
3. Conversion factors
2. 1 ft = 30.48 cm = 0.3048 m
3. 1 m = 100 cm = 3.2804 ft
4. 1 ft2 = 0.0929 m2
TM
5. 1 ft3 = 0.0283 m3
7. 1 m3 = 35.32 ft3
14. ° F = ° (C ´ 1.8) + 32
10 9 G giga
10 6 M Mega
10 3 K Kilo
10 2 h hecto
10 da deca
10 - 1 d deci
10 - 2 c Centi
10 - 3 m milli
10 - 6 m micro
10 - 9 n nano
10 - 12 p pico
Note The prefix terms deci and centi are used with metre (Centimetre is a standardized unit
of length).
TM
5. Greek letters
a alpha
b beta
g gamma
d delta
e epsilon
i lota
q theta
f phi
y psi
h eta
x xi
z zeta
l lambda
m mu
p pi
r rho
s sigma
t tau
w omega
c chi
G Capital gamma
D Capital delta
S Capital sigma
6. Useful constants
i) Physical constants :
1) Plank's constant h = 6.626 ´ 10 - 34 joule-sec.
2) Boltzmann's constant k = 1.38 ´ 10 - 23 joule/deg.kelvin.
TM
5) Pi or p = 3.141592
qqq
TM
Time : 3 Hours]
[Maximum Marks : 100
Answer ALL Questions
PART A - (10 ´ 2 = 20 Marks)
Q.1 State the significance of radio transmission over infrared. (Refer section 1.2.1)
Q.2 OFDM uses a set of orthogonal sub-carriers for transmission of data. OFDM is
used in WLANs. Consider an OFDM system that uses 52 sub-carriers out of
which 48 are pilot sub-carriers. System bandwidth is 20 MHz and OFDM symbol
duration including cyclic prefix is 4 ms if code rate is 3 4 and 64 QAM is used.
Find the data rate. (Refer Appendix B)
Q.3 What is care of address in mobile IP ? (Refer section 2.2.1)
Q.4 What is encapsulation in mobile IP ? (Refer section 2.4)
Q.5 List out the disadvantages of indirect TCP. (Refer Q.51 of Appendix A)
Q.6 Mention the advantages of Mobile TCP. (Refer Q.52 of Appendix A)
Q.7 What is the purpose of firewall used in UMTS network ?
(Refer Q.53 of Appendix A)
Q.8 Name the 3G radio access scheme identified to support different spectrum scenario.
(Refer sections 3.2 and 3.2.1)
Q.9 Mention the features and challenges of 4G. (Refer section 5.4.2)
Q.10 Define multi carrier modulation. (Refer section 5.6.1)
PART B - (5 ´ 16 = 80 Marks)
Q.11 a) Explain and compare the medium access mechanism of DCF methods adopted in
IEEE 802.11 WLAN. (Refer section 1.3.2) [16]
OR
b) Describe the user scenario architecture and protocol stack of bluetooth technology.
(Refer section 1.9.6) [16]
(S - 1)
TM
Q.12 a) State the entities and terminologies used in Mobile IP along with tunneling and
also explain the three types of encapsulation mechanisms used in mobile IP.
(Refer sections 2.2.1 and 2.4) [16]
OR
b) Explain and compare the working mechanism of both destination sequence distance
vector and dynamic source routing protocol when applied on a mobile ad-hoc
network scenario. (Refer section 2.10.3 and Q.54 of Appendix A) [16]
Q.13 a) Describe the working mechanism of traditional TCP.
(Refer Q.55 of Appendix A) [16]
OR
b) Write your understanding on indirect TCP, snooping TCP, Mobile TCP and
transaction-oriented TCP. (Refer Q.51, 52, 56 and 57 of Appendix A) [16]
Q.14 a) Explain the UMTS network architecture with GSM, 3G and also explain the
reference architecture. (Refer sections 3.3 and 3.5) [16]
OR
b) Explain UMTS core network architecture. (Refer section 3.4) [16]
Q.15 a) Write your understanding on behavior of smart techniques.
(Refer section 5.6.2) [16]
OR
b) Explain adaptive modulation and coding with time-slot scheduler along with
cognitive radio concept. (Not in new syllabus) [16]
qqq
TM
(S - 3)
TM
Q.13 a) Describe the basic concepts of congestion control. What are the implications on
mobility in traditional TCP ? (Refer Q.55 of Appendix A)
OR
b) What is meant by snooping TCP ? Explain in detail about the basic concepts of
TCP over 2.5/3.G wireless networks. (Refer Q.56 and Q.59 of Appendix A)
OR
Q.14 a) Discuss the role of the access link control application part (ALCAP) in the UMTS.
(Refer section 3.3)
OR
b) Discuss two evolution paths for the GSM to offer 3G services.
(Not in new syllabus)
Q.15 a) What is a multi-input-multi-output (MIMO) system ? Explain in detail.
(Not in new syllabus)
OR
b) Describe the basic concepts of adaptive modulation and coding time-slot scheduler.
(Not in new syllabus)
qqq
TM
(S - 5)
TM
OR
b) Explain with neat diagram and example the destination sequence distance vector
routing algorithm of adhoc networks. (Refer section 2.10.3) [16]
Q.13 a) i) Draw the overview of classical enhancements to TCP for mobility.
(Not in new syllabus) [6]
ii) Explain in detail about traditional TCP and its significance.
(Refer Q.55 of Appendix A) [10]
OR
b) How the mobile TCP is playing the important role in mobile transport layer ?
Explain with overview of the classical enhancements to TCP for mobility and
compare with 2.5/3G wireless networks.
(Refer Q.52 and Q.59 of Appendix A ) [5 + 5 + 6]
Q.14 a) Explain in detail about LTE wireless systems.
(Refer sections 5.7.1 and 5.7.2) [16]
OR
Q.14 b) i) Explain the techniques about UMTS network reference architecture.
(Refer section 3.4) [8]
ii) Describe channel structure in UMTS terrestrial radio.
(Refer section 3.3) [8]
Q.15 a) i) Define 4G and compare the key parameters of 4G with 3G.
(Refer section 5.3) [11]
ii) Write a note on cognitive radio. (Not in new syllabus) [5]
OR
b) What is a multi-input multi-output (MIMO) system ? Explain and compare.
(Not in new syllabus) [16]
qqq
TM
(S - 7)
TM
qqq
TM
(S - 9)
TM
OR
b) Describe the snooping TCP and points out the advantages and disadvantages.
(Refer Q.56 of Appendix A) [13]
Q.14 a) Outline the overview of UMTS terrestrial radio access network.
(Refer sections 3.3 and 3.5) [13]
OR
b) Illustrate the theory of High-Speed Downlink Packet Access (HSDPA).
(Not in new syllabus) [13]
Q.15 a) Categorize the four types of smart antenna technique and explain in detail.
(Refer section 5.6.2) [13]
OR
b) Summarize the 4G key challenges and mention the proposed solutions.
(Refer section 5.4.2) [13]
PART B - (1 ´ 15 = 15 Marks)
Q.16 a) Analyse all possible solutions to be adopted for giving mobility support in the
network layer such that both delay constraints along with throughput levels are
achieved. (Refer sections 2.7, 2.7.1 and 2.8) [15]
OR
b) How doest the 3G GGSN/MSC differ from the GPRS architecture elements (2G
GGSN/MSC) ? What sort of enhancement are carried out in UMTS to meet out
its specifications. (Refer sections 4.4 and 4.4.2) [15]
qqq
TM
Wireless Networks
Semester - VI (ECE) Elective - II
Q.4 What is SIP ? Mention the functions of SIP ? (Refer section 2.8)
Q.5 What are the functions provided by the 3G-GGSN ? (Refer section 3.4.3)
Q.6 List the physical channels in cdma 2000 ? (Refer section 3.5.1.1)
Q.7 What are the objectives of internet working principle ? (Refer section 4.1.1)
PART B - (5 ´ 13 = 65 MARKS)
Q.11 a) i) Compare Infrared with radio transmission techniques. (Refer section 1.2.1) [6]
ii) Explain Zigbee in detail. (Refer section 1.13) [7]
OR
b) i) Explain the architecture of IEEE 802.11 standard with neat sketch.
(Refer section 1.3) [8]
ii) Explain 802.11 b standard. (Refer section 1.4.2) [5]
Q.12 a) Explain IP packet delivery, agent discovery tunneling and encapsulation in mobile
IP in detail. (Refer sections 2.3 and 2.4) [13]
(S - 11)
Wireless Networks S - 12 Solved Model Question Papers
OR
PART C - (1 ´ 15 = 15 MARKS)
Q.16 a) Explain the WATM and Hiper LAN 2 in detail. (Refer sections 1.7 and 1.9) [15]
OR
b) Explain LTE in detail with a neat block diagram.
(Refer sections 5.7.1 and 5.7.2) [15]
qqq
Solved Model Question Paper - 2
(As per New Syllabus)
Wireless Networks
Semester - VI (ECE) Elective - II
PART B - (5 ´ 13 = 65 MARKS)
Q.11 a) Explain the IEEE 802.11a and IEEE.11 b standards in detail ?
(Refer sections 1.4.1 and 1.4.2) [13]
OR
b) i) Explain Zigbee technology. (Refer section 1.13) [7]
ii) What is BRAN in wireless networks ? Explain. (Refer section 1.8) [6]
Q.12 a) Explain packet delivery, agent discovery tunneling and encapsulation in mobile IP
in detail. (Refer section 2.7.1) [13]
(S - 13)
Wireless Networks S - 14 Solved Model Question Papers
OR
PART C - (1 ´ 15 = 15 MARKS)
Q.16 b) i) Draw and explain the following
IEEE 802.11 MAC control. (Refer section 1.3.2) [10]
ii) Explain the security issues in 802.11 standard.
(Refer sections 1.3.4, 1.3.4.1 and 1.3.4.2) [5]
OR
b) i) Explain the IMS architecture in detail. (Refer section 5.6.3) [10]
ii) Describe the Advanced braodband wireless access and services ?
(Refer section 5.8) [5]
qqq