Professional Documents
Culture Documents
Satellite Orbits
Satellite orbits may be classified in a number of ways:
1. The orbit may be circular, with the center of the circle at the center of the earth, or elliptical, with
the earth's center at one of the two foci of the ellipse.
2. A satellite may orbit around the earth in different planes. An equatorial orbit is directly above
the earth's equator. A polar orbit passes over both poles. Other Orbits are referred to as inclined
orbits.
3. The altitude of communications satellites is classified as geostationary orbit(GEO), medium earth
orbit (MEO), and low earth orbit (LEO).
I.TYPES OF SATELLITES (BASED ON ORBITS)
1) Geostationary or geosynchronous earth orbit (GEO)
🡺 GEO satellites are synchronous with respect to earth. Looking from a fixed point from
Earth, these satellites appear to be stationary.
🡺 These satellites are placed in the space in such a way that only three satellites are
sufficient to provide connection throughout the surface of the Earth (that is; their
footprint is covering almost 1/3rd of the Earth).
🡺 The orbit of these satellites is circular.
🡺 There are three conditions which lead to geostationary satellites.
🡺 Lifetime expectancy of these satellites is 15 years.
1) The satellite should be placed 37,786 kms (approximated to 36,000 kms) above the surface
of the earth.
2) These satellites must travel in the rotational speed of earth, and in the direction of motion
of earth, that is eastward.
3) The inclination of satellites with respect to earth must be 00.
🡺 Geostationary satellite in practical is termed as geosynchronous as there are multiple
factors which make these satellites shift from the ideal geostationary condition.
1) Gravitational pull of sun and moon makes these satellites deviate from their orbit. Over the
period of time, they go through a drag. (Earth‟s gravitational force has no effect on these
satellites due to their distance from the surface of the Earth.)
2) These satellites experience the centrifugal force due to the rotation of Earth, making them
deviate from their orbit.
3) The non-circular shape of the earth leads to continuous adjustment of satellite speed of
satellites. These satellites are used for TV and radio broadcast, weather forecast and also,
these satellites are operating as backbones for the telephone networks.
⮚ Disadvantages of GEO:
Northern or southern regions of the Earth (poles) have more problems receiving these
satellites due to the low elevation above a latitude of 60°, i.e., larger antennas are
needed in this case.
Shading of the signals is seen in cities due to high buildings and the low elevation
further away from the equator limit transmission quality.
The transmit power needed is relatively high which causes problems for battery
powered devices.
These satellites cannot be used for small mobile phones.
The biggest problem for voice and also data communication is the high latency as
without having any handovers, the signal has to at least travel 72,000 kms. Due to the
large footprint, either frequencies cannot be reused or the GEO satellite needs special
antennas focusing on a smaller footprint.
Transferring a GEO into orbit is very expensive.
🡺 MEOs can be positioned somewhere between LEOs and GEOs, both in terms of their
orbit and due to their advantages and disadvantages.
🡺 Using orbits around 10,000 km, the system only requires a dozen satellites which is
more than a GEO system, but much less than a LEO system.
🡺 These satellites move more slowly relative to the earth‟s rotation allowing a simpler
system design (satellite periods are about six hours).
🡺 Depending on the inclination, a MEO can cover larger populations, so requiring fewer
handovers.
Disadvantages:
∙ Due to the larger distance to the earth, delay increases to about 70–80 ms. ∙ The
satellites need higher transmit power and special antennas for smaller footprints.
Elevation angle θ
∙ The elevation angle θ of the earth station, which is the angle from the horizontal(i.e., a line
tangent to the surface of the earth at the antenna's location) to the point on the center of the
main beam of the antenna when the antenna is pointed directly at the satellite.
β defines a circle on the earth's surface centered on the point directed on the point directed below
the satellite.
𝐶𝑜𝑠(β+θ)
= 𝐶𝑜𝑠θ
; R-earth’s radius , h - orbit height
𝑑 𝑆𝑖𝑛β 𝑆𝑖𝑛β
𝑅+ℎ
= 𝑆𝑖𝑛(θ+π/2)
= 𝐶𝑜𝑠θ
1. Distance
Distance Recall from Equation (5.2) that free space loss can be expressed as:
2.Satellite Footprint
3.Atmospheric Attenuation
∙ The primary causes of atmospheric attenuation are oxygen, which is of course always present,
and water.
∙ Attenuation due to water is present in humid air and is more pronounced with fog and rain.
Another factor that affects attenuation is the angle of elevation of the satellite from the earth
station (angle () in Figure 9.1).
∙ The smaller the angle of elevation, the more of the atmosphere that the signal must travel
through.
∙ Finally, atmospheric attenuation depends on frequency.
∙ In general, the higher the frequency, the greater the effect.
∙ Figure 9.7 shows the typical amount of attenuation as a function of angle of elevation for
frequencies in the C band.
∙ Of course, the attenuation due to fog and rain only occurs when those elements are present in
the atmosphere.
Inclination angle
⮚ The inclination angle δ is defined between the equatorial plane and the plane described by the
satellite orbit.
⮚ An inclination angle of 0 degrees means that the satellite is exactly above the equator.
⮚ If the satellite does not have a circular orbit, the closest point to the earth is called the
perigee.
2.1.2 Describe satellite configurations
∙ In the second, the satellite provides communications between one ground-based transmitter and
a number of ground based receivers.
⮚ A variation on the second configuration is one in which there is two-way communication
among earth stations, with one central hub and many remote stations.
⮚ This type of configuration, is used with the very small aperture terminal (VSAT) system.
⮚ A number of subscriber stations are equipped with low-cost VSAT antennas. Using some
discipline, these stations share a satellite transmission capacity for transmission to a hub station.
⮚ The hub station can exchange messages with each of the subscribers and can relay messages
between subscribers.
2.1.3 Explain capacity allocation frequency division
⮚ Typically, a single GEO satellite will handle a rather large bandwidth (e.g., 500 MHz)and
divide it into a number of channels of smaller bandwidth (e.g., 40 MHz).
⮚ Withineach of these channels, there is a capacity allocation task to be performed.
⮚ Each frequency assignment is used by two carriers with orthogonal polarization (vertical and
horizontal).
⮚ Each 40-MHz channel includes a 4-MHz guardband, so each channel is actually36 MHz
wide.
⮚ When used in a point-to-point configuration (Figure a), each channel could be used for one of
a number of alternative purposes.
⮚ The discussion in the preceding subsection suggests that the satellite is used as intermediate
device providing, in effect, a point-to-point link between two earth stations.Because of the
wide area coverage of the satellite, this is not necessarily the case.
⮚ For example, the INTELSAT4 series satellites allow a single 36-MHz channel to be divided
using FDM into a number of smaller channels, each of which uses FM.
⮚ Each of the smaller channels in turn carries a number of voice frequency (VF) signals using
FDM.
⮚ The ability of multiple earth stations to access the same channel is referred to as FDMA.
⮚ The number of sub-channels provided within a satellite channel via FDMA is limited by three
factors:
• Fixed-assignment multiple access (FAMA): The assignment of capacity within the overall
satellite channel is distributed in a fixed manner among multiple stations.This often results in
significant underuse of the capacity, as demand may fluctuate.
1. FAMA-FDMA
2. DAMA-FDMA
⮚ A single 36-MHz channel is subdivided into 800 45-kHz analog channels, each dedicated to a
simplex VF link,using FM.
⮚ There is also digital SCPC, using QPSK, which provides 64-kbps service in the same 45-kHz
bandwidth, enough for digitized voice.
⮚ With FAMA, pairs of channels (for full duplex) are assigned to pairs of earth stations.
⮚ Typically, eachearth station is multiplexed, supporting a small number of user stations.
⮚ With multiple user stations per earth station, a high degree of connectivity is achieved even
with FAMA.
⮚ As with conventional FDMA, the satellite accepts frequencies across the entire 36-MHz
channel, translates them to the 4-GHz band, and broadcasts the channel to all stations.
⮚ SCPC is attractive for remote areas where there are few user stations near each site.
⮚ Whereas FDMA is used as a trunk facility in the long-haul telecommunications system, SCPC
provides direct end-user service.
⮚ Although SCPC is more efficient bandwidth than FDMA, it does suffer from the inefficiency
of fixed assignment.
⮚ This is especially unsuitable in very remote areas, where it is typical thateach earth station
serves one or a very few user stations.
⮚ To achieve greater efficiency,DAMA is used.
⮚ With DAMA, the set of sub-channels in a channel is treated as a pool of available links.
⮚ To establish a full-duplex link between two earth stations,a pair of sub-channels is
dynamically assigned on demand.
🡺 The first commercially available DAMA SCPC system was SPADE (single channel per
carrier, pulse code modulation, multiple-access, demand-assignment equipment), introduced
in the early 1970s and currently available on INTELSATsatellites.
⮚ Although FDM techniques are still quite common in satellite transmission, TDMtechniques
are in increasingly widespread use.
⮚ The reasons include
• The continuing drop in the cost of digital components
• The advantages of digital techniques, including the use of error correction
• The increased efficiency of TDM due to the lack of intermodulation noise
⮚ As with FDM, all of the techniques to be discussed provide for multiple access and include
FAMA-TDMA and DAMA-TDMA.
⮚ FAMA-TDMA is the same as synchronous TDM.
⮚ Transmission is in the form of a repetitive sequence of frames, each of which is divided into a
number of timeslots.
⮚ Each slot position across the sequence of frames is dedicated to a particular transmitter. Frame
periods range from 100 µs to over 2 ms and consist of from 3 to over 100 slots.
⮚ Data rates range from 10 Mbps to over 100 Mbps.
⮚ Figure 9.13 depicts a typical frame format.
⮚ Typically, aframe begins with two reference bursts to define the beginning of the frame.
∙ Two Bursts are used, provided by two different earth stations, so that the system can continue
to function even if one reference station is lost due to malfunction.
⮚ Each reference burst begins with a carrier and bit timing recovery pattern
🡪 which is a unique pattern that allows all stations to synchronize to a master clock.
⮚ Each of the N stationsis assigned one or more slots in the frame. The station uses an assigned
slot to transmit bursts of data, consisting of a preamble and user information. The preamble
contains control and timing information, plus the identification of the destination station.
⮚ The Individual bursts are separated by guard times to ensure that there is no overlap.
FAMA-TDMA
⮚ Even greater efficiencies can be achieved at the higher frequency bands (Ku andK bands).
⮚ At these frequencies, satellite transmission beams can be quite narrowly focused, allowing
multiple beams on the same frequency transmitted to different areas.
⮚ Thus a satellite can service a number of areas, each containing a number of earth stations.
⮚ Communication among the stations within a single area is accomplished with ordinary
FAMA-TDMA.
⮚ Communication among stations indifferent areas can be achieved if the satellite has the ability
to switch time slots from one beam to another. This is known as satellite switchedTDMA
(SS/TDMA).
❖ Figure 9.16 shows a simple SS/TDMA system serving two areas, each with two stations.
❖ As with ordinary TDMA, only one station at a time may transmit within an area.
❖ Thus, within area A, either station 1 or 2 may transmit in any given time slot.
❖ Similarly, either station 3 or station 4 may transmit in area B at any time. Stations From the
two areas do not interfere either through the use of polarized signals or different frequencies.
❖ At the satellite, data that are received are immediately retransmitted on a downlink frequency.
❖ Two separate downlink beams are used.
❖ The satellite contains a switch for interconnecting input beams and output beams.
❖ The connections through the switch may change over time.
❖ In the figure, downlink beam A repeats uplink beam A during periods 1 and 3 and repeats
uplink beam B during period 2.
❖ Thus any station in any area can send data to any other station in any area.
❖ For a satellite serving N areas, there are N TDM input streams.
❖ At any giventime, the switch is configured to route these uplink beams in a particular fashion
to the N downlink beams.
❖ Each configuration is referred to as a mode and N! different modes are required for full
connectivity.
⮚ TheSS/TDMA system is to some extent a DAMA system if the mode pattern can be changed
by ground command.
⮚ More commonly DAMA in the TDM context refers to multiple-access techniques for sharing
a single channel.
⮚ With such techniques, the ground stations typically cooperate to use the channel.
Cordless systems provide users with mobility within a residence or small office by separating
the handset from the rest of the telephone (called the base station) and providing a simple analog or
digital wireless link.
1. Cordless systems can support multiple users from the same base station, which could include
either multiple telephone handsets or both voice and data devices (e.g., fax or printer).
2. Cordless systems can operate in a number of environments:
• Residential – a single base station can provide voice and data support enabling in
house communication as well as connection to public telephone network
• Office - A single base station can support a small office to provide service for a
number of telephone handsets and data devices. Multiple base stations in a cellular
configuration can support a larger office.
• Telepoint – a base station set up in a public place, such as an airport or shopping malls.
DESIGN CONSIDERATIONS
🡺 In the technique of TDD, also known as time-compression multiplexing (TCM), data are
transmitted in one direction at a time, with transmission alternating between the two
directions.
🡪Data transmitted in one direction at a time, with transmission between the two directions
▪ Simple TDD
▪ TDMA TDD
Simple TDD
🡺 To achieve the desired subscriber data rate with simple TDD, the transmitter's bit stream is
divided into equal segments, compressed in time to a higher transmission rate, and
transmitted in bursts, which are expanded at the other end to the original rate.
🡺 Each side sends blocks of some fixed length, which takes time 𝑡𝑏.
🡺 The actual data rate on the channel must be greater than twice the data rate required by the two
end systems.
🡺 R = effective data rate
B = size of block in bits
Tp = propagation delay
Tb = burst transmission time
Tg = guard time
The effective number of bits transmitted per second,or effective data rate, is
TDMA TDD
🡺TDD was developed for use on wired subscriber system but also can use in wireless configuration.
🡺 Wireless TDD typically used with TDMA in which a number of users receive forward channel signals
in turn and then transmit reverse channel signals in turn, all on the same carrier frequency.
🡺 Advantages of TDMA/TDD:
▪ Improved ability to cope with fast fading : Pattern of fading changes as the frequency
changes. One way to cope with fading is to use two antennas at receiver.So if one antenna
experiences fading, the other will not.The receiver selects the strongest signal.
▪ Improved capacity allocation : For many data oriented applications, volume of traffic is
greater than the reverse connection.On TDD system, it is possible to allocate dynamically the
number of TDMA slots in each direction.So gets more slots on the forward channel when
needed. In FDMA, equal bandwidth is used for forward and reverse channels.
Mobility management:
a) Q channel – used to broadcast general system information from base station to all terminals b) P
channel – provides paging from the base station to terminals
c) M channel – used by terminal to exchange medium access control messages with base station d) N
channel – provides handshaking protocol
e) C channel – provides call management for active connections
🡺 WLL alternatives are narrowband,which offer a replacement for existing telephony services, and
broadband, which provide high-speed two-way voice and data service.
🡺 In telephone networks , the circuit between the subscriber’s equipment (telephone set) and the local
exchange is called local loop. Wireless local loop is the use of wireless communication links , which
provide high speed two way voice and data service.
🡺 Table 11.4, based on one in, compares WLL and other alternatives for fixed subscriber support.
❖ Figure 11.8 illustrates a simpleWLL configuration.
• Installation WLL systems typically can be installed rapidly. The key stumbling blocks are obtaining
time permission to use a given frequency band and finding a suitable elevated site for the
base station antennas. Once these hurdles are cleared, a WLL system can be installed in
a small fraction of the time required for a new wired system.
● Selective Radio units are installed only for those subscribers who want the service at a given time
installation with a wired system, cable is laid out in anticipation in a local area.
❖ Most high-speed WLL schemes use millimeter wave frequencies (10 GHz to about 300 GHz)
Fresnel Zone
🡺 The definition of Fresnel zones is based on the theory that any small element of space in the path of
an electromagnetic wave may be considered the source of secondary wavelet, and that the radiated
field can be built up by the superposition of all these wavelets.
🡺 On the basis of this theory, it can be shown that objects lying within a series of concentric circles
around the direct line of sight between two transceivers have constructive or destructive effects on
communication.
🡺 How much space around direct path between transmitter and receiver should be clear of obstacles?
🡺 Objects within a series of concentric circles around the line of sight between transceivers have
constructive/destructive effects on communication
🡺 Consider a point along the direct path between a transmitter and receiver, thatis, a distance S from the
transmitter and a distance D from the receiver, with the total distance along the path equal to S + D
(Figure 11.9).
❖ Although the shapes of these two curves remain the same, the actual values vary, especially with
temperature and relative humidity.
❖ Favorable windows for communication:
• From 28 GHz to 42 GHz
• From 75 GHz to 95 GHz
A = attenuation (dB/km)
R = rain rate (mm/hr)
a and b depend on drop sizes and frequency
Effects of Vegetation
❖ Trees near subscriber sites can lead to multipath fading
❖ Multipath effects from the tree canopy are diffraction and scattering
❖ Measurements in orchards found considerable attenuation values when the foliage is within 60% of
the first Fresnel zone
❖ Multipath effects are highly variable due to wind .
The work on 802.16 in Table is the farthest along and is the one most likely to generate the most
industry interest, as it is targeted at available LMDS frequency bands.
>> IEEE 802.16 Architecture
● An 802.16 wireless service provides a communication path between subscriber site (subscriber
device) and core network (network to which 802.16 provides access eg- telephone network,
internet)
● Three interfaces
Air interface: Interface between Base transceiver station (BTS) and subscriber’s transceiver
station (STS).
SNI( STS Network Interface)- Interface between STS & Subscriber network.
BNI (Base transceiver Station) - Interface between BTS & Core network.
● System reference model includes the optional use of repeater.Air interface allows repeaters,
reflectors to bypass obstruction and extend cell coverage.
● Medium Access Delay: Once a transceiver station is ready to transmit, the medium access
delay measures the amount of time that the station must wait before it can transmit.
● Transmit Delay: This is delay from SNi to BNI or BNI to SNI .It includes the MAC delay plus
the processing at MAC layer for preparing transmission and at MAC layer for reception.
● End to End Delay: Total delay between a terminal in the subscriber network, to the ultimate
service beyond the core network.This includes the transit delay.
Protocol Architecture
Data transmitted over 802.16 air interface from or to a given subscriber are structured as used
in this context refers to the PDU that includes MAC protocol control information and higher level
data.
TDMA frames consist of a sequence of time slots dedicated to a given subscriber.A TDMA timeslot
may contain exactly one MAC frame , or multiple MAC frames and MAC frames are transmitted
over a logical channel.
The 802.16 MAC protocol is connection oriented. Ie, a logical connection is set up
between peer entities( MAC users) prior to exchange of data between those entities.
MAC frame includes connection ID( used by MAC protocol to deliver to MAC user)
FRAME FORMAT
– Downstream Transmission
IEEE 802.16a
● IEEE 802.16 operates in the 10 to 66 GHz frequency band and requires a line of sight antenna.
● IEEE 802.16a operates in 2 to 11 GHz and it does not require a line of sight antenna.It
supports 50km range and data rates over 70Mbps.
● 802.16a has a new physical layer and some modification to the MAC layer.
● 802.16a standard specifies that systems implement one of three interface specifications.
Wireless MAN -SCa: uses single carrier modulation format.
Wireless MAN - OFDM- This uses orthogonal frequency division multiplexing with 256
point transform.
Wireless MAN- OFDMA - Uses orthogonal FDM with 2048 point transform.
● 802.16a upgrades MAC to provide Automatic Repeat Request.
● 802.16a support both TDD and FDD modes of operation.
❖ In response to the increasing popularity of palm-top and other mobile computers, Mobile IP
was developed to enable computers to maintain Internet connectivity while moving from one
Internet attachment point to another.
❖ Although Mobile IP can work with wired connections, in which a computer is unplugged
from one physical attachment point and plugged into another, it is particularly suited to
wireless connections.
❖ The term mobile in this context implies that a user is connected to one or more applications
across the Internet, that the user's point of attachment changes dynamically, and that all
connections are automatically maintained despite the change.
❖ This is in contrast to a user, such as a business traveler, with a portable computer of some sort
who arrives at a destination and uses the computer's notebook to dial into an ISP (Internet
service provider).
❖ In this latter case, the user's Internet connection is terminated each time the user moves and a
new connection is initiated when the user dials back in.
❖ Each time an Internet connection is established, software at the point of attachment (typically
an ISP) is used to obtain a new, temporarily assigned IP address.
❖ This temporary IP address is used by the user's correspondent for each application-level
connection (e.g., FTP, Web connection).
Mobile IP Uses
🡺 Enable computers to maintain Internet connectivity while moving from one Internet
attachment point to another
🡺 Mobile – user's point of attachment changes dynamically and all connections are automatically
maintained despite the change
🡺 Nomadic - user's Internet connection is terminated each time the user moves and a new
connection is initiated when the user dials back in
∙ New, temporary IP address is assigned
Operation of Mobile IP
❖ A mobile node is assigned to a particular network, known as its home network. Its IP
address on that network, known as its home address, is static.
❖ When the mobile node moves its attachment one point to another network, that network is
considered a foreign network for this host.
❖ Once the mobile node is reattached, it makes its presence known by registering with a
network node, typically a router, on the foreign network known as a foreign agent.
❖ The mobile node then communicates with a similar agent on the user's home network, known
as a home agent, giving the home agent the care-of address of the mobile node; the care-of
address identifies the foreign agent's location.
❖ Typically, one or more routers on a network will implement the roles of both home and
foreign agents.
When IP datagrams are exchanged over a connection between the mobilenode and another host (a
server in Figure 12.1), the following operations occur:
1. Server X transmits an IP datagram destined for mobile node A, with A's home address in the IP
header. The IP datagram is routed to A's home network.
2. At the home network, the incoming IP datagram is intercepted by the home agent. The home
agent encapsulates the entire datagram inside a new IPdatagram that has the A's care-of address in
the header, and retransmits the datagram. The use of an outer IP datagram with a different
destination IPaddress is known as tunneling. This IP datagram is routed to the foreign agent.
3. The foreign agent strips off the outer IP header, encapsulates the original IPdatagram in a
network-level PDU (e.g., a LAN LLC frame), and delivers the original datagram to A across the
foreign network.
4. When A sends IP traffic to X, it uses X's IP address. In our example, this is a fixed address; that
is, X is not a mobile node. Each IP datagram is sent by A to a router on the foreign network for
routing to X. Typically, this router is also the foreign agent.
5. The IP datagram from A to X travels directly across the Internet to X, usingX's IP address.
Operation of Mobile IP
Capabilities of Mobile IP
1. Discovery – mobile node uses discovery procedure to identify prospective home and
foreign agents
2. Registration – mobile node uses an authenticated registration procedure to inform home
agent of its care-of address
3. Tunneling – used to forward IP datagrams from a home address to a care-of address
1. Discovery
Agent Solicitation
❖ Foreign agents are expected to issue agent advertisement messages periodically ❖ If a mobile
node needs agent information immediately, it can issue ICMP router solicitation message
Move Detection
❖ Mobile node may move from one network to another due to some handoff mechanism
without IP level being aware
• Agent discovery process is intended to enable the agent to detect such a move
❖ Algorithms to detect move:
o Use of lifetime field – mobile node uses lifetime field as a timer for agent
advertisements
o Use of network prefix – mobile node checks if any newly received agent advertisement
messages are on the same network as the node's current care-of address
Co-Located Addresses
🡺 If mobile node moves to a network that has no foreign agents, or all foreign agents are busy, it
can act as its own foreign agent
🡺 Mobile agent uses co-located care-of address
• IP address obtained by mobile node associated with mobile node's current network
interface
🡺 Means to acquire co-located address:
• Temporary IP address through an Internet service, such as DHCP
• May be owned by the mobile node as a long-term address for use while visiting a
given foreign network
Registration Process
❖ Mobile node sends registration request to foreign agent requesting forwarding service
❖ Foreign agent relays request to home agent
❖ Home agent accepts or denies request and sends registration reply to foreign agent
❖ Foreign agent relays reply to mobile node
3. Tunneling
🡺 Home agent intercepts IP datagrams sent to mobile node's home address • Home agent
informs other nodes on home network that datagrams to mobile node should be
delivered to home agent
🡺 Datagrams forwarded to care-of address via tunneling
• Datagram encapsulated in outer IP datagram
Tunneling
❖ For example, suppose that R3 in Figure is acting as the home agent for a mobile node that is
attached to a foreign network elsewhere on the Internet.
❖ That is, there is a host H whose home network is LAN Z that is now attached to some foreign
network.
❖ If host D has traffic for H, it will generate an IP datagram with H's home address in the IP
destination address field.
❖ The IP module in D recognizes that this destination address is on LAN Z and so passes the
datagram down to the link layer with instructions to deliver it to a particular MAC-level
address on Z.
❖ Prior to this time, R3 has informed the IP layer at D that datagrams destined for that
particular address should be sent to R3.
❖ Thus, D inserts the MAC address of R3 in the destination MAC address field of the outgoing
MAC frame.
❖ Similarly, if an IP datagram with the mobile node's home address arrives at router R2, it
recognizes that the destination address is on LAN Z and will attempt to deliver the datagram
to a MAC-level address on Z.
❖ Again, R2 has previously been informed that the MAC-level address it needs corresponds to
R3.
❖ For traffic that is routed across the Internet and arrives at R3 from the Internet, R3 must
simply recognize that for this destination address, the datagram is to be captured and
forwarded.
Architectural Overview
• The WAP Programming Model is based on three elements: the client, the gateway,and the
original server (Figure).
• HTTP is used between the gateway and the original server to transfer content.
• The gateway acts as a proxy server for thewireless domain.
• Its processor(s) provide services that offload the limited capabilities of the hand-held, mobile,
wireless terminals.
• For example, the gateway providesDNS services, converts between WAP protocol stack and
the WWW stack (HTTPand TCP/IP), encodes information from the Web into a more
compact form that minimizes wireless communication, and, in the other direction, decodes the
compacted form into standard Web communication conventions.
• The gateway also coaches frequently requested information.
● Using WAP, a mobile user can browse web content on an ordinary web server. The web server
provides content in the form of HTML coded pages that are transmitted using the standard web
protocol stack. The HTML content is translated to WML content by the HTML filter. This
WML content is co-located with a WAP proxy or in a separate physical module. The proxy
converts the WML to binary WML and delivers it to a mobile user over a wireless network
using the WAP protocol stack.
● If the web server is capable of directly generating WML content, then the WML is delivered
using HTTP/TCP/IP to the proxy, which converts the WML to binary WML and then delivers it
to the mobile node using WAP protocols.
Features
WML was designed to describe content and format for presenting data on devices with limited
bandwidth, limited screen size and limited user input capability.
Important features:
WMLScript
• Scripting language for defining script-type programs in a user device with limited processing
power and memory
• WMLScript capabilities:
▪ Check validity of user input before it’s sent
▪ Access device facilities and peripherals
▪ Interact with user without introducing round trips to origin server
• WMLScript features:
▪ JavaScript-based scripting language
▪ Procedural logic
▪ Event-based : invoke response on certain events
▪ Compiled implementation : WML scripts can be compiled down to byte code.
▪ Integrated into WAE : Allows to construct service using WML and WML script.
▪ Efficient library support:
Supports statements like for, break, if, if..else….
✔ The WAE specifies an application framework for wireless devices such as mobile telephones,
pagers, and PDAs.
✔ In essence, the WAE consists of tools and formats that are intended to ease the task of
developing applications and devices supportedbyWAP.
1. WAE user agents: Software that executes in the user's wireless device and that provides
specific functionality (e.g., display content) to the end user.
2. Content generators: Applications (or services) on origin servers (e.g., CGIscripts) that
produce standard content formats in response to requests from user agents in the mobile
terminal. WAE does not specify any standard content generators but expects that there will be
a variety available running on typical HTTP origin servers commonly used inWWW today.
3. Standard content encoding: Defined to allow aWAE user agent (e.g., a browser)to
conveniently navigate Web content.
4. Wireless telephony applications (WTA): A collection of telephony-specific extensions for
call and feature control mechanisms that provide authors with advanced mobile network
services. Using WTA, applications developers can use the microbrowser to originate
telephone calls and to respond to events from the telephone network.
⮚ In essence,WSP is based on HTTP with some additions and modifications to optimize its use
over wireless channels.
⮚ The principal limitations addressed are low data rate and susceptibility to loss of connection
due to poor coverage or cell overloading.
⮚ WSP is a transaction-oriented protocol based on the concept of a request and reply.
⮚ Each WSP protocol data unit (PDU) consists of a body, which may containWML,
WMLScript, or images, and a header, which contains information about the data in the body and
about the transaction.
⮚ WSP also defines a server Push operation,in which the server sends unrequested content to a
client device.
⮚ This may be used for broadcast messages or for services, such as news headlines or stock
quotes,that may be tailored to each client device.
✔ Session establishment – client WSP user requests session with server WSP user
✔ Session termination – client WSP user initiates termination
✔ Session suspend and resume – initiated with suspend and resume requests
✔ Transaction – exchange of data between a client and server
✔ Non-confirmed data push – used to send unsolicited information from server to client
✔ Confirmed data push – server receives delivery confirmation from client
⮚ Lightweight protocol suitable for "thin" clients and over low-bandwidth wireless links
⮚ WTP features
o Three classes of transaction service
o Optional user-to-user reliability: WTP user triggers confirmation of each received
message
o Optional out-of-band data on acknowledgments
o PDU concatenation and delayed acknowledgment to reduce the number of messages
sent
o Asynchronous transactions
🡺 Data integrity – ensures that data sent between client and gateway are not modified, using
message authentication
🡺 Privacy – ensures that the data cannot be read by a third party, using encryption 🡺
Authentication – establishes authentication of the two parties, using digital certificates 🡺
Denial-of-service protection – detects and rejects messages that are replayed or not successfully
verified
⮚ First phase – used to initiate a logical connection and establish security capabilities
⮚ Second phase – used for server authentication and key exchange
⮚ Third phase – used for client authentication and key exchange
⮚ Forth phase – completes the setting up of a secure connection
Wireless Datagram Protocol (WDP)
∙ Used to adapt higher-layer WAP protocol to the communication mechanism used between
mobile node and WAP gateway
∙ WDP hides details of the various bearer networks from the other layers of WAP ∙
Adaptation may include:
✔ Partitioning data into segments of appropriate size for the bearer
✔ Interfacing with the bearer network
WDP Service
The WDP service is defined by two service primitives. The T-DUnitdataprimitive provides a non
confirmed service with the following parameters:
• Source address: Address of the device making a request to the WDP layer
• Source port: Application address associated with the source address
• Destination address: Destination address for the data submitted to WDP
• Destination port: Application address associated with the destination address • User data: User
data from the next higher layer, submitted to WDP for transmission to the destination port
WDP Protocol
✔ Performs the same support function for WDP as ICMP does for IP
✔ Used in environments that don’t provide IP bearer and don’t lend themselves to the use of
ICMP Used by wireless nodes and WAP gateways to report errors encountered in processing
WDP datagrams
✔ Can also be used for informational and diagnostic purposes
Repeatedly asked Question in Previous Years