You are on page 1of 30
WIRELESS COMMUNICATION AND OF CELLULAR COMMUNICATION NETWORKS i AND SYSTEMS a . Multiple Choice Type Questions 1, The basic frequency region on GSM is [WBUT 2013, 2018] a) 900 MHz b) 1800 MHz c) 1900 MHz d) all of these Answer: (a) 2. In digital cellular tolephony GSM uses 1800 MHz frequency band which uses uplink and downlink frequency. The difference of frequency 75 MHz is divided into [WBUT 2013, 2018] a) 150 carrier channel b) 374 carrier channel C) 210 carrier channel d) 390 carrier channel Answer: (b) 3. A signal has a basic frequency of 1000 Hz. What will be the period? [WBUT 2014] a) 0.500 second —b) 0.001 second ¢)5second d) 1000 second Answer: (b) 4. Each carrier of the IS-95 standard occupies a bandwidth of [WBUT 2015] a) 25 KHz ¢) 200 kHz ¢) 30 kHz d) 1250 kHz Answer: (d) 5. The gross data rate of each carrier channel is GSM is, [WBUT 2015] a) 270.833 kbps —_b) 33.854 kbps ¢) 24.7 kbps d) 13.4 kbps Answer: (a) 6. Interference on voice channel usually causes [WBUT 2015, 2018] a) missed calls —_b) blocked calls ¢) dropped calls ) cross talk Answer: (d) . 7. Cell phone receives in the band from . [WBUT 2016] a) 860 to 880 MHz b) 870 to 890 MHz c) 870 to 880 MHz ) 860 to 890 MHz Answer: (b) Short Answer Type Questions 1, What is mobility management in wireless network? [WBUT 2016) Answer: Mobility management is one of the major functions of a GSM network that allows mobile phones to work. The aim of mobility management is to track where the subscribers are, allowing calls, SMS and other mobile phone services to be delivered to them. WCN-69 radio network of individual cel), A GSM network, like all cellular networks, is @ all geographical area which ig pa’ as base stations. Each base station covers @ St" cage of each of th Ni uniquely identified location area. By integrating e over amuch wider area. 4 Brot stations, a cellular network provides a radio coverags 7 ‘ base stations is named a location area, or a routing eae to inform the cellular ne, The location update provedure allows a mobile devi t, Mobiles are responsipy, “ Whenever it moves from one location area to the ah location area code is din, detecting location area codes. When a mobile finds that aid to the network, a Ipc from its last update, it performs another update by sen Ta jorary Mobile Subsc,: update request, together with its previous location, and its Temp Tih . Identity (TMSI), Cell selection, Location updating GSM Mobility Management 1. a) Draw and explain GSM architecture. : [WBUT 2013, 2016, 2017] b) Explain the signal processing technique in GSM. [WBUT 2013) ¢) Write down the name of the different channels used in GSM. [WBUT 2013, 2016, 2017) Answer: a) GSM system architecture: The GSM system consists of the following three major interconnected sub-systems as Base Station Subsystem (BSS), Network and Switching Suisystem (NSS) and the Operation Support Subsystem (OSS). Mobile Station (MS) i usually considered as a part of BSS, weeree an, (Operation support subsystem (OSS) Bae Station Subsystem Network Switching Public (Bss) : ‘Subsystem (NSS) networks Fig: GSM system architecture ‘The BSS (also known as radio subsystem) provides and manages radio transmission paths between MS and MSC, handoff management. The BSS consists of many BSCs which connect to 2 single MSC and each BSC typically controls upto several hundred Base Transceiver Stations (BTSs). Some of the BTSs may be co-located at the BSC and the other may remotely located and connected to the BSC by microware link or leased line. Handoffs between two BTSs under the control of the same BSC are handled by the BSC and not by the MSC. This reduces the load and hence switching burden of the MSC. This reduces the load and hence switching burden of the MSC. The NSS manages the switching functions of the system and allows the MSCs to communicate with other networks such as PSTN and ISDN. The OSS supports the operation and maintenance of GSM and allows system engineers to monitor, diagnose and troubleshoot all aspects of the GSM system. The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and in addition provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call ‘routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the public fixed network (PSTN or ISDN), and signalling between functional entities used in ISDN and widely used in current public networks. WCN-71 POPULAR PUBLICATIONS : Location Register (VLR), 1, (possi renee Pay Ps ion of each subserjj ‘ Je information a 1 ui GSM. The HLR contains all the administrauv’ it current location of the ,, me in the corresponding GSM network, nS of a Mobile Staton Roaming} : “te is i to the Mg, current location of the mobile is in the to route a Cal iC (MSRN) which is a regular ISDN number use LR per GSM network, aig; mobile is currently located. There is ee ~~. ey may be implemented as a distributed datal ic ted administrative information The Visitor Location Register contains selec he subscribed services, for gay °%4 HLR, necessary for call control and provision read by the VLR. Althoyn currently located in the geographical area | dependent unit, most manufgoa functional entity can be implemented on Sogetier with one MSC, 5 on switching equipment implement one : corresponds to that controlled by 4."4 geographical area controlled by the MS' the MSC contains no informatis simplifying the signalling required. Note that din the location registers. particular mobile stations - this information is stored 1 Visitor The Home Location Register (HLR) and the MSC, provide the calling/routing am #7. To, Data stored include: = IMSI (the subscriber's identity number). Authentication data. MSISDN (the subscriber's phone number). GSM services that the subscriber is allowed to access. access point (GPRS) subscribed. "The HLR address of the subscriber. The other two registers are used for authentication and security purposes. The Equipn Identity Register (EIR) is a database that contains a list of all valid mobile equipment the network, where each mobile station is identified by its International Moti Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolena is not type approved, The Authentication Center is a protected database that stores a coy of the secret key stored in each subscriber's SIM card, which is used for authentic and ciphering of the radio channel, b) The diagram below shows the signal processing techniques in GSM. WIRELESS COMMUNICATION AID LEIWOPLS Speech Speech Digitvation and source codina Channel coding, De-interleaving Burst formatting Burst formating Radio channel The speech coder used in GSM is based on Residually Excited Linear Predictive cocer (RELP). Channel coding is provided to TCH channels and control channels to provide better BER. Diagonal interleaving is used for TSH/SACCH/FACCH data. Ciphering modifies the contents of the interleaved blocks through the use of encryption techniques known only to the particular mobile station and base transceiver station. Security is enhanced further by changing the encryption algorithm from call to call. Two types of ciphering algorithms e.g. A3 and AS are used in GSM. Burst formatting adds binary data to the ciphered blocks. It helps synchronization and equalization of the received signal. GSM uses 0.3 GMSK modulation. The input Gaussian pulse-shaping filter has a 3 dB bandwidth with relation to the bit rate i-e., BT =03. In GSM, binary 1s and 0s are represented by shifting the RF carrier by 467.708 kHz.. The channel data rate of GSM is 270.833333 kbps being exactly four times the RF frequency shift. ©) Basically there are two types of GSM logical channels ~ traffic channels (TCH) and control channel (CCH). Traffic channels carry digitally encoded user speech or data Whereas control channels carry signalling and synchronizing commands between BS and MS. 2. Draw and explain GPRS network architecture. [WBUT 2014] ° R, ‘Draw and explain the block diagram of GPRS Network Architecture. [WBUT 2018] WCN-73 POPULAR PUBLICATIONS Answer: salled GPRS suppor, GPRS architecture introduces two new network elements ext as the gateway Cie (GSN). These nodes are in fact routers. The first nodes know Te steral packer 4 support node (GGSN) is the unit between the GPRS nelWOr” | Coreg users, Petar networks (PDN). This node contains routing informatio”) CGSN is conneciey address conversion and tunnels data to a user via eneapsuis nsfers packels to the Si, external networks (c.g. IP or X.25) via the Gy interface. ae : via an IP-based GPRS backbone network called G, interface SN). It supports the Mg The other new element is the serving GPRS support node (SCANT Bel cuister (cyt the Gp interface. The SGSN requests user addresses from rn for collecting bili keeps tracks of the individual MS's location and is responsible OF TT Tre ct information. It also performs several security functions such as accel © al is connected to a BSC via frame relay. It is basically of the same AUT Ma MSC. The GR is typically a part of the HLR and stores all GPRS- rel . , jagram below. A typical GPRS architecture reference model is shown in the block diagram below. PDN Oz wisrnee interface PDN: Packet Data Network EIR: Equipment Identity Register Fig: GPRS Architecture Packet data are transmitted from a PDN via the GGSN and SGSN dircetly to the BSS and finally to the MS. The MSC is only used for signalling in the GPRS scheme. In the traditional circuit-switched GSM, the MSC is responsible for data transport. 3. What are.the attach detach procedures in GPRS? [WBUT 2018] WCN-74 Anse tach procedure GPRS ANAT needs to signal its presence to the network ii in in order t wien it performs an IMSI attach procedure for GPRS services. During this oe ser contest is seated between the MS and the SGSN, iB this pr tte reare {WO of GPRS attach procedures: Normal GPRS attach. This procedure is used by the M GPRS services only. ; y the MS to be IMSI attached for 2. Combined attach procedure. This procedure is used by a cl; Cofhst attached for GPRS and non-GPRS services ha Be ot a in network operation mode I |ppo! GPRS Detach ‘When an MS does not need to access GPRS services anymore, an IMSI-detach proce’ dure jg initiated, either by the MS or by the SGSN. During thi is inte MS and the SGSN is removed. 2 this procedure, the MM context There are two types of GPRS-detach procedures: i 1. Normal GPRS detach. This procedure is used to IMSI detach only for GPRS services. », Combined detach procedure. This procedure is used to IMSI detach a class Aor B MS for GPRS or non-GPRS services in a cell that supports GPRS in network operation mode I. 4:Write short note on GPRS architecture. [WBuT 2015] OR, . Write short note on GPRS. : Answer: IWBUT 2017] Refer to Question No. 2 of Long Answer Type Questions. WCN-75 POPULAR PUBLICATIONS WLAN —_—_ ns Multiple Choice ype juestio: [weu: 1. The Collision avoidance technique '§ ya OHA 4) none on a)CSMAICA ——_b) CSMA/CD ™ Answer: (a) } (WeuT 2. What Is tho speed of WLAN Data service? GHz a7Hz a) 12 MHz b) 13 kHz o12 Answer: (a) ; [WBUT 29, 3. The Wi-Fi technology is specifies in 9) a) IEEE 802.11 WLAN standards b) IEEE 802.188 a andea ¢) IEEE 802.11b WLAN standards d) IEEE 802.119 Answer: (a) i 4. The size of a file transferred in 8 seconds in the IEEE 802.11 WLAN Sy8ten ‘ BUT 201, operating at 2 Mbps data transmission rate is, wi 8] a)2MB b) 4MB c)16.MB d) 32 MB Answer: (c) 5. Which multiple access technique is used by IEEE 802.11 standard for wireles, LAN? [WBUT 2016} a) CDMA b) CSMA/CA c) ALOHA d) none of these Answer: (b) 6. What is the maximum data rate for the 802.11g standard? [WBUT 2016} a) 6 Mbps b) 11 Mbps c) 22 Mbps d) 54 Mbps Answer: (d) 7. Bluetooth is [WBUT 2017] a) Wireless LAN b) WAN ¢) Short range infrared ad-hoc _d) Short range wireless ad-hoc LAN service Answer: (d) 8. In IEEE 802.11, a BSS without an AP is called [WBUT 2017] a) Ad-hoc architecture b) Infrastructure architecture c) Either (a) or (b) d) Neither (a) nor (b) Answer: (a) 9. The WiMAX PHY layer is based on a) FDM b) TDM c) CDMA ? d) OFDM =—o_ Answer: (d) WCN-76 Short Answer 4, How docs a wireloss LAN with 802.11 standard try to solve collisions or minimize the probability of collisions? [WBUT 2014, 2016, 2018] AACA protocol is designed to reduce the probability of collision when multiple users share a single channel for data transmission. Unlike CSMA/CD, in CSMA/CA a node first listens to the channel and then decides whether o transmit or not. If the channel is free, it starts transmitting immediately, but if the channel is busy, it waits for a random — amount of time and then senses the channel again. At the MAC layer, the 802.11 standard for CSMA/CA defines two different access methods- the distributed coordination function (DCF) and the optimal point coordination function. There are three types of interframe spacing in a MAC protocol SIFS: It stands for short interframe spacing. It is the smallest interval, and its value for 802.11 PHY is 28ms. PIFS; it stands for Point Coordination Function interframe spacing. It is equal to sum of SIFS and slot time. DIFS: it stands for Distributed Coordination Function interframe spacing. It is equal to sum of PIFS and slot time. 2. Discuss briefly the relative advantages and disadvantages of WLAN network. [WBUT 2016, 2017] Answer: The advantages of wireless LAN are given below: Mobility: WLAN can provide mobility to the users. There are two different types of mobility — full-mobility and weak mobility. Full mobility is the ability to send and receive information while moving inside the area covered by the WLAN. Weak mobility is the capacity of having a connection to the network by placing a fixed terminal in the network. (ii) Installation speed and simplicity: WLAN can be easily installed because of the absence of physical wire. . (iii) Installation flexibility: WLAN can be installed in a place where it is impossible to install a wired LAN. ; (iy) Reduced cost of ownership: Equipment for WLAN is more expensive but the cabling cost is not there. Moreover, WLAN has an almost zero reconfiguration cost. (») Scalability: WLAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. The disadvantages of wireless LAN are given below: 1. It’s a bit more difficult to setup WLAN properly 2. There is a Risk of accessing ‘outsiders’ to the WLAN network unless robust security Protocols are-enabled (e.g. WPA, WPA2) Significantly slower than a wired network The network can be less stable. 3. 4 WCN-17 POPULAR PUBLICATIONS d-off and Soft hand-off. Meu, * its features. [WByy 2%; 3. Differentiate betwoen Hard hant Answer: wpe Questions. Refer to Question No. 4(a) of Long Answer Type ©! 5s ii 4, What do you mean by IEEE 802.11 standard? Discus: Answer: fions. e Questi Refer to Question No. 2(a) & (6) of Long Answer T)P a 1. a) Discuss the challenges for implementation of WLAN. Answer: " There are two important challenges for the implementation of WLAN. These challenges are: (i) Security and (ii) Multiple Access System. A wireless network requires packets of data to travel prone to interception. This is a security issue and pose: of WLAN. : ee a call ; The choice of suitable multiple access system in WLAN is also a cha'lenge. This i, because of the Hidden Node Problem in WLAN. CSMA/CD is not possible in WLAN, This challenge has been overcome by using CSMA/CA i.e., the collision avoidance of multiple access in WLAN. [weut ig | through the air. This makes .5 a challenge to the implementaiog b) Explain the differences between CSMA/CD and CSMAICA technique ing wireless environment emphasizing on difficulties of implementation. [WBUT 2014 Answer: . CSMAICD enables participating stations to physically monitor the traffic on the line. If there is no traffic on the line, the particular station can transmit. However, if two stations attempt to. transmit simultaneously, this causes a collision, which is detected by all participating stations. After a random time interval, the stations that collided attempt to transmit again. If another collision occurs, the random waiting time earlier used is increased step by step. This is known as exponential back off CSMA/CD method is a very effective mechanism in a wired environment, enabling speeds of 10 (T-base), 100 (Fast-Ethernet), or 1000 (Gi; it-Ethernet). However, this mechanism reduces the throughput in a very competitive environment with a high number of active uses. There are several reasons why this method is not suitable for the WLAN standard. © Firstly, for CSMAJCD, a station must.be able to send data and receive collision signals at the same time. This may lead to costly stations and increased bandwidth requirements. * Secondly, collision may not be detected because of the hidden station problem where the station hears the AP, but does not hear all other members of the on WCN-78 WIRELESS COMMUNICATION AND NETWORKS between stations can be great. Signal fading could prevent a the distance ns hearing a collision at the other end. irdly, eat ne end from station ato! .d and the mechanism is as follows: less station (a wireless LAN device) wants to communicate, it first ) to check if it can senses radio wave from any CSMAICA is use’ © When a wireless n listens to its media (radio spectrum other wireless station. ; «Ifthe medium is free for a specified time then the station is allowed to transmit. This time interval is called Distributed Inter Frame Space (DIFS). If the current device senses carrier signal of another wireless device on the same frequency, as it wants transmit on, it backs off (does not transmit) and initiates @ random timeout. ‘After the timeout has expired, the wireless station again listens to the radio spectrum and if still senses another wireless station transmitting, continues to initiate random timeouts until it does not detect or senses another wireless station transmitting on the same frequency. “When it does not sense another wireless station transmitting, the cur station starts transmitting its own carrier signal to communicate will wireless station, and once synchronized, transmits the data. « The receiving station checks the CRC of the received packet and sends an acknowledgement packet (ACK). Receipt of the ‘acknowledgement indicates to the transmitter that no collision occurred. If the sender does not receive the acknowledgement then it retransmits the fragment until it receives acknowledgement or is abandoned after a given number of retransmissions. c) Enumerate the differerices between wireless cellular and ad-hoc networks. [WBUT 2014] rrent wireless fh the other Answer: Wireless cellular is an infrastructure network for a wide area. In these networks, communication takes place between the mobile nodes and the base stations where the base stations act like access points in WLAN. The communication does not take place directly between the mobile stations. ‘Ad-hoc wireless networks do not require any infrastructure to work, in such networks, each node can communicate directly with other nodes. So, no access point controlling medium access is necessary. Nodes within an ad-hoc network can only communicate if they can reach each other physically i.e, if they are within each other’s range or if other nodes can forward the message. The diagrams below show the two types of networks. WCN-79 Wireless celular net network Ads nett (Infrastructure) [WBUT 2014) 2, a) Describe IEEE 802,11 logical architecture. Answer: ind medium access IEEE 802,11 defines the physical (PHY), logical link control (ue rk can work 3° () control (MAC) layers for a wircless local area network. 802. ; . fal architecture of the basic service set (BSS) or extended service set (ESS). The IOBieR 2 rie bela IEEE 802.11 standard is meant for defining the network's operation. shows the logical architecture. Upper layers Osta ical Lin fa Logical Link Layer (LLC) Layer mai Medium Access Control (MAC) The data link layer (DLL) is divided into two sublayers, LLC and MAC layers. The MAC layer provides access control functions. It controls access coordination, authentication and privacy. LLC provides addressing and data link control. b) What are the services that the IEEE 802.11 standard can offer? {WBUT 2014] Answer: Services provided by IEEE 802.11 can be grouped under two sub-headings: « Station Services: These include Authentication De-authentication, Privacy and MSDU delivery «Distribution System Services: These include Association, Disassociation, Distribution, Integration, and Re-association, 3. What is hidden terminal problem and exposed terminal proble: problems can be solved? With a flow chart describe hew bach ofl tae contention window is set in CSMAICA for WLAN, How Mobile Station (MS) rencts thoir Access Points (APs) in WLAN environment. Explain the WLAN senses architecture. (WBUT 2015] WCN-80 ps wert tt i blem, a terminal may not be ssi y"Par terminal pro iy aware of trans) if anothe nt ti re to some obstacles or range problems, In such a case, collision ra beta but in eno! pe defected. inals, Termi 7 wil rand To ‘are three terminals. Terminal B and terminal C are not in each other's Tp * seminal Aisin the area covered by both 7, or J. Let verninal T, is sending data to the terminal 7,. While this the mission i going on, the terminal 7. is out of 7,’s range mission from T, cannot reach 7. Therefore 7. thinks and trans 7 the medium is free and thus starts to send data to 7, which results in a collision at 7,- that stations 7, and 7, are hidden from each other with respect to 7, ‘Thus we can say ‘This is hidden terminal problem. ; temminal problem, a terminal refrains from using a channel when it is, in i ate ® © } Let A, B,C Dare four terminals. Terminal A is transmitting to terminal B. Terminal C some data to send to terminal D. The terminal C is exposed to transmission from A- It hears what A.is sending t0 B and thus refrains from sending, Thus C is too conservative ‘and wastes the capacity of the channel. The communication between C and D cannot cause a collision in the zone between A and C. This is exposed terminal problem. 2 Part: IEEE 802.11 uses 802.1 1 RTS / CTS acknowledgement and handshake packets to partly overcome the hidden node / exposed node problem. There are other methods to overcome the hidden node problems. There are: 1. Increasing transmitting power from the nodes 2, Using omni-directional antennas 3. Removing obstacles 4. Moving the node 5, Using the protocol enhancement software 6. . Using antenna diversity. 3" Part: The flow chart below shows how back-off timer of contention window is set in CSMA/CA for WLAN. : WCN-81 POPULAR PUBLICATIONS famewo nd Station hes ® ae umber or stems carter sense a? channel free? ese Inertia sro Contention window RTS = Requestiosend TS received TS =Clear tosend before time out? Ty Back off time Transmission Tre Kslimi? “ _e ACK received before time out? Trerement back off False ‘The contention window is an amount of time divided into slots. If a station is ready tc send chooses a random number 2 bet in tween O and 2' -1 . ‘one slot the first time and then doubles each time the oe, ee Se eal letect an idle channel after the IFS. A binary exponential back-off strategy is followed. 4 Part: In a wirel it i i ‘ 7 ae ant ts ee a mobile stations can have access t mode, a base station or access point ‘ae aE (or Ad-hoe) node tn inf wet mates a8 a a hub and ni . In infrastructure jess access points are usually fixed and otis erie eee through this ¢ to their clients’ nades WCN-82 WIRELESS COMMUNICATION AND NETWORKS ¢ mobile stations, such as, laptops, smart phones cte., connect to the itn join the NEWT at yoo PO nication between the mobile stations and the access point may be through ‘the com! ice set. It is a set of all stations that can communicate with each other at PHY n identification (ID) called BSSID, which is the MAC address of pasic i ry BSS has an i ) jevel Pigs point servicing the BSS wireless LAN uses CSMA/CA protocol to the nical ‘with the Access Point. con! «ean i nt C0 3 parti ‘i Thesystom section (STA) point (AP): A special central traffic relay station that normally operates 07 @ fixed hannel and is stationary — can be partially seen as the coordinator within a group © xed ene AP is analogous to the base station in a cellular communication network. WLANs and wired hitectures- constituted of the following entities: : The object of the communication, in general, a mobile station. portal (PO) A special access point that interconnects IEEE 802.11 302.2 LANs ‘and thus provides the logical connection between both types of arc! ith’ each other. asic service set | ‘ The basic service set (BSS) is a set of all stations that can communicate Ww! Every BSS has an identification (ID) called the BSSID, which is the MAC address of the access point servicing the BSS. . ‘There are two types of BSS: Independent BSS (also referred to as IBSS), and infrastructure BSS. ‘An independent BSS (IBS) is an ad hoc network that contains no access points, which means they can not transmit data to any other basic service set. in Infrastructure BSS, an AP exists and it acts as the coordinator of the BSS. Extended service set . +t (ESS) is_a set of two or more BSSs. Each ESS has an ID called An extended service sel the SSID which is a 32-byte (maximum) character string. Distribution system A distribution system (DS) connects access points in an extended service’set. The concept of aDS can be used to increase network coverage through roaming between cells. 4. Write short notes on the following: 2) Soft and hard hand-off : [WBUT 2014] b) Wimax architecture [WBUT 2015, 2018] . [WBUT 2017] *)CSMA-CD WCN-83 POPULAR PUBLICATIONS Answer: : ication fr a) Soft and hard hand-off: ile communication Tom ¢ Hand-off or hand over is the process of transfer of ‘atom when the received pe a, source to another without disconnecting the cals, THS ni fevel and will not prog from a able base station falls below a particular thresho! : * strong RF link to deliver the required bit error rate. fi hand-off. In There are two main types Seem These are hi hand-off and $0 making cima hand-off, connection with the source channel is first broken oft, In hard hand-off, with the target channel. It is called break before make type hand established. GSM uy, existing connection must be broken before the new connection 15 hard hand-off. In soft hand-off, connection with the sé connection with the target channel is establishe! make before break type hand-off. ‘ ined for sometime befig, ource channel is eof hand-of. It is calle, .d. CDMA uses b) Wimax architecture: WIMAX has a physical layer that is commonly. referred 10 85 wma HY Tie WiMAX physical layer is based on orthogonal frequency division multiple Ss DM ie the transmission scheme, which enables high speed data, video 2% mulled communications. WIMAX supports a variety of modulation and coding schemes, which include BPSK, QPSK and QAM. In OFDM, the high-rate data stream 'S divided into several lower bit-rate data stream and each stream is modulated on separate carriers called the sub-carriers. All the sub-carriers are divided into several groups of sub-carriers known as subchannels. The fixed WIMAX OFDM PHY allows the formation of sixteen channels in the uplink direction. Now, these channels are assigned to the subscriber stations in powers of 2. The mobile WIMAX OFDM PHY allows sub-channelization both for uplink and downlink. Different sub-channels may be allocated to different users as a multiple access scheme. WIMAX techniques includes two main duplexing techniques: _ © Time division duplexing ¢ Frequency division duplexing FDD mode: In an FDD system, the uplink and downlink channels are on separate frequencies. The FDD system ‘simultaneously supports full duplex SSs and half duplex SSs. A full duplex SS is capable of continuously listening to the downlink channel, while 2 half duplex SS can listen to the downlink channel only when it is not transmi ng on the uplink channel. TDD mode: In case of TDD, the uplink and downlink transmissions share the same frequency but they take place at different time. Here, the frame is divided int sit slots, The frame is adaptive in the in the sense that the tan tee physi WCN-84 EL ‘i 7 us the uplink can change. There is a gap between the i is called T1G (TransmiUReceiver transition i barat UL-PHY-PDU) UL-PHY-PDU TG a Uplink subframe (ame durationy/4 ink vers! i * down prst. This BAP oplink Fig: TDD frame structure Downlink PHY The downlink channel is TDM, with the information for each SS multiplexed onto a - single stream of data (a burst of MAC Protocol Data Units (PDUs)) and received by all $Ss within the same sector. Since the transmission is broadcast, all SSs listen to the data transmitted by the BS. However, an SS is only required to process PDUs that are addressed to itself or that are explicitly intended for all the SSs. The TDD downlink subframe begins with a Frame Start Preamble used by the PHY for synchronization and . equalization; and the frame control section, DL-MAP, follows the UL-MAP. Figure below shows the TDD downlink subframe structure. The DL-MAP message defines the usage of the downlink intervals for a burst mode PHY. The UL-MAP defines the uplink usage in terms of the offset of the burst relative to the allocation start time (units PHY- specific). ‘WCN-85 T TDM BROADCAST ‘CONTROL DIUC =0 meoz>ans meoz>mas > FRAME CONTROL Fig: TDD Downlink sub-frame structure i maps fot The BS at the beginning of each downlink subframe transmits both ag Car an FOp and TDD modes. Based on measurements at the physical layer, any ©" ASAP OVA ting the Interval Usage Code (IUC) in use, that is, the modulation, ral ak ‘ward Eng, Correction (FEC) scheme, for both downlink IUC (DIUC) and up! in aes (Ulu transmissions. Each SS receives and decodes the control information of the downling data for that SS in the remainder of (DL-MAP) and looks for MAC headers indicating o ‘ Her downlink subframe. Each SS also leams the boundaries of its allocation within th current uplink subframe by decoding the UL-MAP message. On the other hand, the DL MAP message contains the timetable of the downlink grants in the forthcoming downlint subframé. More specifically, downlink grants directed to SSs with the same DIUC (Downlink Interval Usage Code) are advertised by the DL-MAP as a single burst. Uplink PHY The uplink subframe is used by the SS to transmit to the BS. The uplink PHY is based: a combination of TDMA and DAMA. In particular, the uplink channel is divided into: number of time slots. The number of slots assigned for various uses (registration contention, and guard or user traffic) is controlled by the MAC in th a ‘an over time for optimal performance, in the BS and may va WCN-86 SMIRELISS COMMUNICATION AND NETWORKS ssTG Initial Request SS-1 ranging contention scheduled ‘2 schedulee opportunities | opportunities dota (UIUC = 2) (UIUC = 1) (UIUC = i) ie ) i) ‘Access Collision Access . burst burst a Cots Bani Fig: Uplink subframe structure ‘est contention opportunities may be The bandwidth allocated for initial ranging and requ k burst profiles specified for initial grouped together and is always used with the uplin! ranging intervals quluc = 2) and request intervals (UIUC = 1), respectively. The SS groups the remaining transmission slots. During its scheduled bandwidth, an SS transmits with the burst profile specified by the BS. The SSTGs (Subscriber Station Transition Gap) separate the transmissions of the various SSs during the uplink subframe. The gap allows for ramping down of the previous burst, followed by a preamble allowing the BS to synchronise to the new SS. The preamble and gap lengths are broadcast periodically in the UCD message. ¢) CSMA-CD Refer to Question No. I(b) (1" Part) of Long Answer Type Questions. POPULAR PUBLICATIONS MOBILE INTERNET pROTOCOL tions Multiple Choice TYP gues! . [WBUT 2013, 2017, » pile IP refers to ithin IP d) all Of thet . ") rmobilly b) IP tuning c) IP WI “ Answer: (c) [weur 20 2.1Pv4 uses b) 8 bit addross "1 ddress a} 2 at address. d) 64 bit addross Answer: (c) ort protocol. 3. The registration process of Mobile IP usos... 2-88 trans HODEL QUESTIO d) nono of thog, a) UDP b) TCP c) IP Answer: (b) ‘Short Answer Type Questions involved in Data transfer from mobile node to a fixed nodo and vice versa with re [MODEL QUESTION) vice versa with respect to respect to mobile IP? Answer: Steps involved in data transfer from mobile node to fixed node and vice versa: In case fixed and mobile node both is in home network © CN (it is a fixed node) message transmits for connection establishment or a packet using the IP protocol. ¢ HA (the home agent for MN (mobile node)) receives the message or packet and, using the information that the destined MN is at the home network itself, it delivers the message or packet to MN. « Receives the response message or packet from MN. ¢ Delivers it to the CN using the IP protocol. In case fixed and mobile node is in foreign network "CN transmits a message for connection establishment or a packet using the IP protocol * HA receives the packets and uses the information that the destined mobile node MN is not at the home network and is presently visiting a foreign network and is reachable via a foreign agent FA. * HA encapsulates the received IP packet using a new header, " Care-of address (COA) at the new header over the IP packet sent by HA. * Handover— Packet encapsulated with the new header with COA transmits to FA by tunneling, "The FA reads the COA and decapsulates the IP packet, WCN-88 Ww IMI = Reads the destination IP address and transfers the packet to MN. «Receives the response message or packet from MN. Delivers it to the CN using the IP protocol. Ga, 2. Explain steps of communication using mobile IP. [MODEL QUESTION] Answer: ‘A corresponding node CN wants to send an IP packet to the MN, One of the requirements of mobile IP was to support hiding the mobility of the MN. CN does not necd to know anything about the MN’s current location and sends the packet as usual to the IP address of MN (step 1). This means that CN sends an IP packet with MN as a destination address and CN as a source address. The internet, not having information on the current location of MN, routes the packet to the router responsible for the home network of MN. This is done using the standard routing mechanisms of the internet. ok The HA now intercepts the packet, knowing that MN is currently not in its home network. The packet is not forwarded into the subnet as usual, but encapsulated and tunneled to the COA. A new header is put in front of the old IP header showing the COA as new destination and HA as source of the encapsulated packet (step 2). The foreign agent now decapsulates the packet i.e., removes the additional header, and forwards the original packet with CN as source and MN as destination to the MN (step 3). Again, for the MN mobility is not visible. It receives the packet with the same sender and receiver address as it would have done in the home network. * Ox Fig: Packet delivery to and from the mobile node At first glance, sending packets from the MN to the CN is much simpler. The MN sends the packet as usual with its own fixed IP address as source and CN’s address as destination (step 4). The router with the FA acts as default router and forwards the packet in the same way as it would do for any other node in the foreign network. As long as CN is'a fixed node the reminder is in the fixed internet as usual. If CN were also a mobile WCN-89 RORULAR PUBLICATIONS :, i! in ste nade residing in a foreign network, the same mechanisms as described in steps 1 throug, 3 woul apply now in the other direction. ; . The Ruloning secon present some addonal mechanisms needed f9" MHP IP ig Work same enhancements to the protocol, and some efficiency and secunty problems, in Mobile IP? ‘X.What are the functions of home agent and foreign agent in [MODEL QUESTION, 7 ae og Foreign Agent (FA): The FA can provide several services to the MN during its visit tg the foreign network, The FA can have the COA (defined below), acting as tunnel endpoint and forwarding packets to the MN. The FA can be the default router for the MIN. FAs can also provide security services because they belong to the foreign network 88 oppesed to the MN. which is only visiting. For mobile IP functioning. FAs are not necessarily needed. Typically an FA is implemented on a router for the subnet the MN attaches ta. Home-Agent (HA): The HA provides several services for the MN and is located in the home network. The tunnel for packets toward the MN starts at the HA. The HA maintains 3 oestion registry, i.e. it is informed of the MN’s location by the current COA. Three altemstives for the implementation of an HA exist. © The HA can be implemented on a router that is responsible for the home network. This is obviously the best position, because without optimizations to mobile IP, all packets for the MN have to go through the router anyway. © If chsnging the router's software is not possible, the HA could also be implemented ca an arbitrary node in the subnet. One disadvantage of this solution is the double crossing of the router by the packet if the MN is in a foreign network. A packet for the MN comes in viva the router, the HA sends it though the tunnel which again crosses the rotiter. © Finally, a home network is not necessary at all. The HA could be again on the’ . ‘router’ but this time only acting as a manager for MNs belonging to a virtual home network. All MNs are always in a foreign network with this solution. » 4. What is intemet protocol? Explain IP class and addressing. [WBUT 2013, 2017] What do you mean by subnet mask? Explain the concept of MIPV4 and MIPV6. Whit is the limitation of MIP? oR, [WBUT 2013] What is intemet protocol? Explain IP class and addressing. Explain the concept of MIPV4 and MIPV6. : [WBUT 2016] Answer: 1” Part: Mobile IP is a protocol that adds to the already existing intemet protocol by making the movement of a node transparent to applications on its original network. WCN-90 WIRELESS COMMUNICATION AND NETWORKS Part: . a IP address is defined as a logical address at the network layer of the TCP/IP protocol suite. An IPv4 address is a unique 32-bit long address universally defined for the connection of a device such as any computer, or to any router within the Internet domain. ‘An IP address is unique in the sense that two devices on the Internet cannot have the same IP address; otherwise an IP conflict will result, It is universal in the sense that the addressing pattern is acceptable by any host (computer) on the Internet worldwide. ‘Example: 1Pv4 uses a 32-bit address, its address space is 2” or 4294967299. But due to the address schemes and restrictions imposed, the actual number of devices that can be connected to the Internet at a given point of time is much less than this number. 3” Part: IP Subnet Mask: Borrowing bits from the host field creates a subnet address. The number of borrowed bits varies and is specified by the subnet mask. Although the netid and hostid are predetermined for classful addressing, default masking can still be used which a 32-bit number is made of contiguous Is and 0s. The mask helps to determine the netid and hosted. Subnet masks are used to determine the network number. First, the router extracts the IP destination address from the incoming packet and retrieves the internal subnet mask. It then perfornis a logical AND operation to obtain the network number. This causes the host portion of the IP destination address to be Operation to obtain the network number. This causes the host portion of the IP destination address to be removed, while the destination network number remains, 4° Part: Mobile IPv4: Mobile IPy4 (MIPv4), specified in RFC 3344, provides a network-level indirection to the actual location of a mobile node, indirection that hides the mobility to its correspondent nodes. Although the mobile node, an IP-host with a MIP stack, is located at a transient Care Of ‘Address (CoA), a correspondent node reaches the device at its permanent Home Address (HoAddr). The indirection is maintained by a home agent that intercepts all the packets destined to the HoAddr of the mobile node and tunnels them to the CoA that the mobile node acquires locally at its new location. The LETF Mobile IP working group (MIF v4) took a number of shortcuts to produce a specification, leaving room for future work and improvements. Some of these unresolved issues (fast movement detection and handoff, home discovery, initial bootstrap configuration, and so on) are now addressed in the MIPv6-related working groups. MIPv4 operations imply a triangular routing — the so-called dogleg issue. The flows toward the mobile node are routed via its dedicated home agent, although only the return path is direct. The home agent is therefore a potential single point of failure for MIPv4 operations and a bottleneck for the forward traffic, which experiences additional latency and increased path length. WCN-91 POPULAR PUBLICATIONS Sf jo. Another issue with MIPv4 is the requirement for # peer aimee nn agents, for movement detection and CoA allocation. i aed loyability of IPv4 mobin? “ places where a foreign agent is available. This imi the deployable Ubi, Another concem about MIP is the path from mobile node 10 1 fet 8 node, Because packets on this path are not tunneled, the mobile no rect during a porti ss IPv4 address in all packets. This address is not topologically co! ket can appear oe the packet journey (until it leaves the foreign network). The pac (for example, ui ea spoofing attempt. Border routers typically perform ingress filtering (fO" exer Uni reverse path for check), analyze source address, and prevent pac! ree address outside the internal subnet range to be forwarded. Li These limitations can be alleviated with the optional support of reverse vit nn and collocated CoA by the mobile node. These improvements to the basic MIPv4 are the default behaviour in the case of IPv6 mobility. Mobile IPv6: An IPV6 address specifies a node and a location. A 128-bit Mobile IPv6 (MIPv6) address consists of a 64-bit subnet prefix (location and a 64-bit interface ID (identity within the location indicated by the prefix). [Pv6 addresses of mobile nodes and stationary nodes are indistinguishable. A mobile node is always addressable at its home address (HoA) whether it is currently attached to its home link or away from home. The home address is an IP address assigned to the mobile node within its home link. The mobile node and its home agent have a preconfigured IP security association that constitutes a secure tunnel. RFC 3776 specifies the use of ESP to protect MIPv6 signaling between mobile and home agent. While a mobile node is attached to some foreign link away from home, it is also addressable at a care-of address (CoA). This care- of address is an IP address with a subnet prefix from the visited foreign link. 5* part: " : : TCP/IP network was designed for fixed computer networks. Some of the limitations of TCP/IP for internet mobility are: i) Limitation of link layer: The wireless access techniques only provide the mobility of homogeneous network at link layer. This is not appropriate for internet mobility across heterogeneous networks which demands mobility at higher level also. Moreover, radio channels show limitations when’ compared to fixed networks. They are characterized by lower bandwidth higher bit error rate, faded and interfered signal. There limitations degrade the performance of transport protocols, ij) Limitation of IP layer: IP addresses play the roles of both locator and identifier. In a mobile environment, the IP address of a mobile node must be changed when moving to another network to reflect the change in point of attachment. These features are in conflict with the situation at fixed network, where the IP address never change. iti) Lack of cross-layer awareness: The congestion control mechanism’ of TCP is not able to distinguish packet losses due to link properties from those due to handover. Because of this, TCP does not perform well for seamless roaming. Again, the lack of L2/L3 cross-layer interaction further deteriorates the performance. WCN-92 LI Ke) jv) Limitations of applications: Many applications based on traditional TCP/IP are Timited in use in the mobile environment. For example, the fully qualified domain name is usually statically bound to a nodc’s IP address, Thus, the tight binding between FQDN and IP address will be invalid because of the dynamic change of IP address of the MN. 2. a) How is an IP address acquired by the mobile node in a transparent access method? [WBUT 2014] Answer: ‘ In the transparent access mechanism a mobile sends and receives IP packets to external networks over the packet switching core network (PSCN). The mechanism involves two important steps: (@ GPRS attach: Here, the mobile registers with SGSN and a signalling connection is established between the mobile and the SGSN, after authentication of the mobile. Now SGSN and the mobile exchange control messages to perform the GPRS attach procedure. Gi) PDP Context activation: The mobile node acquires the IP address from the local PS domain as'its PDP address statically, or during PDP context activation dynamically. During this phase, PS domain also checks the authenticity of mobile. Now, the mobile registers with the extemal IP network using IP based protocols. The local PS domain carries IP packets over IP networks. IP is used as the packet data protocol over the PS domain between GGSN and the external IP network. b) What are the limitations of Mobile IPv4? [WBUT 2014] Answer: . Mobile IPv4 suffers from following limitations: . “e Limited address space ¢ Lack of support for route optimization e Requirement of Foreign agent. 3. What are the main three phases of MIPv4? Explain with neat diagram how Mobile Node registers its current location with Foreign Agent and Home Agent in MIPv4. What is Denial-of-Service Attack in MIPv4 and how it can be solved? What is tunneling in MIPv4? [WBUT 2015] Answer: 1* Part: The Mobile IPV4 performs the following operations: 1. Agent discovery . Agent discovery refers to the process in which MH discovers the mobility agent and receives information from it. Here, the mobility agents issue agent advertisement messages periodically. The mobile node listens for agent advertisement messages and compares the network portion of the agent’s IP address with the network portion of its home address. If there is a match, then the mobile node knows that it is in its home Network, otherwise it is in foreign network. A mobile node can alternatively solicit an WCN-93 POPULAR PUBLICATIONS locally attach agent advertisement message from any | Solicitation message, All mobility agents reply local mobile node receives this message and decides ! ress for communication purpose. As a result of this p gare a network, the foreign agent gives its IP address as 4 can route the traffic to this address. 2. Registration . a a special registray When inobile node finds itself to be in a foreign network, Ht was a registration reg process to inform its home agent about its current location. © the hor . : 2 : irectly or Via FA. ‘When IME age, with COA information to the home agent wither directly 0! de. If the node is foung receives the request, it checks the authenticity of the mobile no. es fodicating its a to be authentic, it sends a registration reply back to the mobile hos! ‘ques, acceptance. 3. Tunneling Tunneling is the process by which datagram are forwarded by the home Sauk to the care of address of the destined node. In mobile IP, the home agent intercepts IP datagrams ang redirects them to the care of address by encapsulating them in an outer IP datagram, During this encapsulation process, the mobile node’s home address is included as source address and the care of address as destination address. Three types of mobile IP encapsulation are: i) IP within IP: Entire IP datagram becomes payload in new IP datagram and a new IP header is created. This header is full IP header. ii) Minimal encapsulation: A new header is inserted between original IP header and original IP payload and the original IP header becomes the full IP header. iii) Generic routing encapsulation (GRE): It was developed prior to the development of mobile IP. ed mobility agent through ap ¥ the agent solicitation Mesa n, This information is Necege, 4 if a mobile node is in a f address” so that home age! 2" Part: . The figure below shows how mobile IPv4 carries out the registration process. network HA = Home Agent FA = Foreign Agent MH= Mobile Host network When a mobilé node moves from its home network to a forei; it ei ign network, it chooses foreign agent (FA) on the new network and uses it to forward a eget: message to its WCN-94 WIRELESS COMMUNICATION AND NETWORKS (HA). To choose a foreign agent, MH makes an agent advertiscment..In the , the mobile host (MH) acquires a temporary care-of-address (CoA) from the The mobile host passes this information to the home agent, home agent new networl new network, 3 Part: . ' ‘a donial-of service (DoS) attack is an attempt by attackers to prevent legitimate users of a service from using that service, Such an attack can temporarily or indefinitely interrupt or suspend services of a host connected to a network. An attacker, in this way, may prevent the uses from accessing e-mail, websites, on-line banking a/cs or other services. The most common types of DoS attack occurs when an attacker floods a network with information. An attacker can use spam e-mail messages to launch a similar attack on user's €-mail account. If an attacker uses one computer to attack another computer, there is distributed denial-of-service (DDoS) attack. The common symptoms of DoS attack are (i) unusually slow network performance (ii) unavailability of a particular website (iii) inability to access any website and (iv) dramatic increase in the amount of spam. Some of the steps to avoid DoS attack are 1, Installation and maintenance of anti-virus software 2. Installing firewall and configuring it to restrict traffic inflow and outflow. 3.. Following of good security practices for distributing the e-mail address. Applying e-mail filters may help to manage unwanted traffic. 4" Part: Tunneling is the process by which datagram are forwarded by the home agent to the care of address of the destined node. In mobile IP, the home agent intercepts IP datagrams and redirects them to the care of address by encapsulating them in an outer IP datagram. During this encapsulation process, the mobile node’s home address is included as source address and the care of address as destination address. Three types of mobile IP encapsulation are: i) IP within IP: Entire IP datagram becomes payload in new IP datagram and a new IP header is created. This header is full IP header. ii) Minimal encapsulation: A new header is inserted between original IP header and original IP payload and the original IP header becomes the full IP header. iii) Generic routing encapsulation (GRE): It was developed prior to the development of mobile IP. 4. a) What is mobile IP and why is it needed? b) Explain the main three phases of MIPv4. ©) Explain with neat diagram how mobile node registers its current location with Foreign Agent and Home Agent in MIPv4. 4) What is Tunneling in MIPv4? [WBUT 2018] WCN-95 PUBLIC, Answer: a) Mobile IP (or MIP) is an Inte communications protocol that is design’ 1 IP address. network to another while maintaining a permancn' outers, such as lapto It enables the transfer of information to and from pias change its location to 5 2% wireless communications. The mobile computer | ‘hrough the mobile computer oreiy network and still access and communicate with an Shon network, sneering Task Force (IETF) met Engineering : t , ed to allow mobile device users to move Fry Mobile IP for better Mobilit 7 icati Mobile IP - A technology which supports mobile data and Qprlications a are deat with wireless connectivity. A user may now disconnect his — a e Office a reconnect from another site within the same office Or elsewhere. Hei se it b) Refer to Question No. 3(Ist part) Long Answer Type Questions. ¢) Refer to Question No. 3(2nd part) of Long Answer Type Questions, 4) Refer to Question No. 3(last part) of Long Answer Type Questions, WCN-96

You might also like