You are on page 1of 14

Wireless and Mobile Network (22622) IF6I

Chapter 2
GPRS and Mobile Data Communication
 GPRS Architecture

Fig: GPRS Architecture


 GPRS architecture works on the same procedure like GSM network, but, has additional entities that allow
packet data transmission.
 This data network overlaps a second generation GSM network providing packet data transport at the rates
from 9.6 to 171 kbps.
 Along with the packet data transport the GSM network accommodates multiple users to share the same air
interface resources concurrently.
 GPRS is usually attempts to reuse the existing GSM network elements as much as possible. There are new
entities called GPRS supports nodes (GSN) which are responsible for delivery and routing of data packets
between mobile stations and external packets networks. There are two types of GSNs,
1. Serving GPRS Support Node (SGSN)
2. Gateway GPRS Support Node (GGSN)
 There is also a new database called GPRS register which is located with HLR. It stores routing information’s
and maps the IMSI to a PDN (Packet Data Network) address.

1. GPRS Mobile Stations:


 New Mobile Stations (MS) are required to use GPRS services because existing GSM phones do not handle the
enhanced air interface or packet data.
 A high-speed version of current phones are used to support high-speed data access, a new PDA device with an
embedded GSM phone, and PC cards for laptop computers.
 These mobile stations are backward compatible for making voice calls using GSM.

2. GPRS Base Station Subsystem:


 Each BSC requires the installation of one or more Packet Control Units (PCUs) and a software upgrade.

Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 1 of 14


Wireless and Mobile Network (22622) IF6I

 The PCU provides a physical and logical data interface to the Base Station Subsystem (BSS) for packet data
traffic.
 The BTS can also require a software upgrade but typically does not require hardware enhancements.
 When either voice or data traffic is originated at the subscriber mobile, it is transported over the air interface
to the BTS, and from the BTS to the BSC in the same way as a standard GSM call.
 However, at the output of the BSC, the traffic is separated; voice is sent to the Mobile Switching Center (MSC)
per standard GSM, and data is sent to a new device called the SGSN via the PCU over a Frame Relay interface.

3. GPRS Support Nodes (GSN)


 A GSN is a network node which supports the use of GPRS in the GSM core network.
 All GSNs should have a GN interface and support the GPRS tunneling protocol. There are two key variants of
the GSN, namely Gateway and Serving GPRS support node.
 There are two new components, called Gateway GPRS Support Nodes (GGSNs) and, Serving GPRS Support
Node (SGSN) is added.
 Gateway GPRS Support Node (GGSN)
 The Gateway GPRS Support Node acts as an interface and a router to external networks.
 It contains routing information for GPRS mobiles, which is used to tunnel packets through the IP based
internal backbone to the correct Serving GPRS Support Node.
 The GGSN also collects charging information connected to the use of the external data networks and
can act as a packet filter for incoming traffic.
 Serving GPRS Support Node (SGSN)
 The Serving GPRS Support Node is responsible for
a. Authentication of GPRS mobiles,
b. Registration of mobiles in the network,
c. Mobility management, and
d. Collecting information on charging for the use of the air interface.
 At higher speeds GPRS is designed to provide packet-data Services at higher speeds than those
available with standard GSM circuit switched data services.
 In theory GPRS could provide speeds of up to 171 kbps over the air interface, although such speeds
are never achieved in practical network. In fact, the practical maximum speed is a little over 100 kbps.

 GPRS Bearer Services:


GPRS is a wireless extension of data networks. It can access to data networks, such as IP-based networks
(public internet, private intranet, and IPv4 and IPv6 protocols) and X.25 based networks.
 GPRS upgrades GSM data services and provides the following services.
1. Point-to-point (PTP) service: internetworking with the Internet (IP protocols) and X.25 networks.
2. Point-to-multipoint (PTM) service: point-to-multipoint multicast and point-to- multipoint group calls.
3. SMS service: Bearer for SMS
4. Anonymous service: Network doesn’t know the real identity of the mobile still it access to predefined services
5. Future Enhancements: Flexible to add new functions, such as more capacity, more users, new accesses, new
protocols, new radio networks.
6. Multimedia Messaging Service (MMS): It is a standard way to send messages that include TXT, a picture
message, or a Multimedia content including up to forty seconds of video, one image, a slideshow of multiple
images, or audio.
7. Wireless Application Protocol (WAP): It is a technical standard for accessing information over a mobile
wireless network. This is data Bearer Service over HTTP protocol. This service makes use of WML & WAP
gateway.
8. Push-to-talk over cellular (PoC): is a method of having conversations or talking on half-duplex communication
lines, using a momentary button to switch from voice reception mode to transmit mode.

Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 2 of 14


Wireless and Mobile Network (22622) IF6I

 GPRS Applications:
1. Mobility: The ability to maintain constant voice and data communications while on the move.
2. Immediacy: Allows subscribers to obtain connectivity when needed, regardless of location and without a
lengthy login session.
3. Localization: Allows subscribers to obtain information relevant to their current location.
4. Communications: E-mail, fax, unified messaging and intranet/internet access, etc.
5. Value-added services: Information services and games, etc.
6. E-commerce: Retail, ticket purchasing, banking and financial trading, etc.
7. Location-based applications: Navigation, traffic conditions, airline/rail schedules and location finder, etc.
8. Vertical applications: Freight delivery, fleet management, and sales-force automation.
9. Advertising: It may be location sensitive. For example, a user entering a mall can receive advertisements
specific to the stores in that mall.

 Explain the Quality of service parameters of GPRS.


 The QoS is a vital feature of GPRS services as there are different QoS support requirements for assorted GPRS
applications like real-time multimedia, web browsing, and e-mail transfer. GPRS allows defining QoS profiles
using the following parameters:
 Service Precedence
 The preference given to a service when compared to another service is known as Service Precedence.
This level of priority is classified into three levels called: 1. High 2.Normal 3.Low
 When there is network congestion, the packets of low priority are discarded as compared to high or
normal priority packets.
 Reliability
 This parameter signifies the transmission characteristics required by an application.
 The reliability classes are defined which guarantee certain maximum values for the probability of loss,
duplication, mis-sequencing, and corruption of packets.
 Delay
 The delay is defined as the end-to-end transfer time between two communicating mobile stations or
between a mobile station and the GI interface to an external packet data network.
 This includes all delays within the GPRS network, e.g., the delay for request and assignment of radio
resources and the transit delay in the GPRS backbone network.
 Transfer delays outside the GPRS network, e.g., in external transit networks, are not taken into
account.
 Throughput
 The throughput specifies the maximum/peak bit rate and the mean bit rate.
 Using these QoS classes, QoS profiles can be negotiated between the mobile user and the network for
each session, depending on the QoS demand and the available resources.

 GPRS Limitations:
 Limited Cell Capacity for All Users
 GPRS does impact a network's existing cell capacity. There are only limited radio resources that can be
deployed for different uses
 Speeds Much Lower in Reality
 Achieving the theoretical maximum GPRS data transmission speed of 172.2 kbps would require a single user
taking over all eight timeslots without any error protection.
 Transit Delays GPRS packets are sent in all different directions to reach the same destination. This opens up
the potential for one or some of those packets to be lost or corrupted during the data transmission over the
radio link.

Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 3 of 14


Wireless and Mobile Network (22622) IF6I

 Limited Cell Capacity for All Users


 GPRS does impact a network’s existing cell capacity.
 There are only limited radio resources that can deploy for different uses – use for one purpose
precludes simultaneous use for another.
 For example, voice and GPRS calls both use the same network resources. If tariffing and billing not
done properly, this may have an impact on revenue.
 Speeds Much Lower in Reality
 Achieving the theoretical maximum GPRS data transmission speed of 172.2 kbps would require a
single user taking over all eight timeslots without any error protection.
 Clearly, it unlikely that a network operator will allow all timeslots to use by a single GPRS user.
 Additionally, the initial GPRS terminals expected to severely limit – supporting only one, two or three
timeslots.
 The bandwidth available to a GPRS user will, therefore, severely limited.
 The reality is that mobile networks are always likely to have lower data transmission speeds than fixed
networks.
 Transit Delays
 GPRS packets sent in all different directions to reach the same destination.
 This opens up the potential for one or some of those packets to lost or corrupted during the data
transmission over the radio link.
 The GPRS standards recognize this inherent feature of wireless packet technologies and incorporate
data integrity and retransmission strategies.
 However, the result is that potential transit delays can occur.

 IEEE 802:
 It is a collection of networking standards that cover the physical and data link layer specifications for
technologies such as Ethernet and wireless.
 Better-known specifications include 802.3 Ethernet, 802.11 Wi-Fi and 802.15 Bluetooth/Zigbee.

 WLAN (Wireless Local Area Network):


 WLAN includes an access point (AP) which is employed to attach to the web. AP sends and receives frequency
signal to the connected devices.
 It works with a bandwidth of 4 GHz (802.11b) or 5 GHZ (802.11 a). The devices to which WLAN connects also
are called clients.
 WLAN gives a high data transfer rate.
 It works better in homes and offices. Especially in offices no extra cables are required and arranging a
gathering is additionally easy. It’s a knowledge transfer rate of 1-10 Mbps. Wireless LAN uses security which
incorporates WEP or WPZ. It also uses infrared technology if required.
 It is a network that allows devices to connect and communicate wirelessly.
 In a traditional wired LAN, devices communicate over Ethernet cables but in WLAN devices communicate via
Wi-Fi.
 New devices are typically added and configured using DHCP (Dynamic Host Configuration Protocol). DHCP is a
protocol that automatically assigns a unique IP address to each device that connects to a network.
 Data is transmitted over the air using one of the IEEE 802.11 protocols.
 A wireless router serves as a base station, providing wireless connections to any Wi-Fi-enabled devices within
range of the router's wireless signal.
 This includes laptops, tablets, smartphones, and other wireless devices, such as smart appliances and smart
home controllers.
 Wireless routers often connect to a cable modem or other Internet-connected device to provide Internet
access to connected devices.
Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 4 of 14
Wireless and Mobile Network (22622) IF6I

Fig: WLAN
 Wireless routers act as a bridge, merging the Ethernet and Wi-Fi-connected devices into the same network.
This allows wired and wireless devices to communicate with each other through a single router.

 Architecture of WLAN:
 Stations:
 All components that can connect into a wireless medium in a network are referred to as stations
(STA).
 Wireless stations fall into two categories: wireless access points, and clients.
 Access points (APs), normally wireless routers, are base stations for the wireless network. They
transmit and receive radio frequencies for wireless enabled devices to communicate with.
 Wireless clients can be mobile devices such as laptops, personal digital assistants, IP phones and other
smartphones, or non-portable devices such as desktop computers, printers, and workstations that are
equipped with a wireless network interface.
 Basic service set (BSS):
 The basic service set (BSS) is a set of all stations that can communicate with each other at PHY layer.
 Every BSS has an identification (ID) called the BSSID, which is the MAC address of the access point
servicing the BSS.
 There are two types of BSS: Independent BSS (also referred to as IBSS), and infrastructure BSS.
 An independent BSS (IBSS) is an ad hoc network that contains no access points, which means they
cannot connect to any other basic service set.
 Independent BSS − Here, the devices communicate in peer-to-peer basis in an ad hoc manner.
 Infrastructure BSS − Here, the devices communicate with other devices through access points.
 Advantages of wireless local area network (WLAN) :
 It’s a reliable sort of communication.
 As WLAN reduces physical wires so it’s a versatile way of communication.
 WLAN also reduces the value of ownership.
 It’s easier to feature or remove workstation.
 It provides high rate thanks to small area coverage.
 You’ll also move workstation while maintaining the connectivity.
 The directions of connectivity are often anywhere i.e. you’ll connect devices in any direction unless it’s
within the range of access point.
 Easy installation and you would like don’t need extra cables for installation.
 WLAN are often useful in disasters situation e.g. earthquake and fire. Wireless network can connect
people in any disaster
 It’s economical due to the tiny area access.
Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 5 of 14
Wireless and Mobile Network (22622) IF6I

 This allows homes and businesses to create local networks without wiring the building with Ethernet.
 It also provides a way for small devices, such as smartphones and tablets, to connect to the network
 WLANs are not limited by the number of physical ports on the router and therefore can support
dozens or even hundreds of devices.
 The range of a WLAN can easily be extended by adding one or more repeaters.
 WLAN can be easily upgraded by replacing routers with new versions which is a much easier and
cheaper solution than upgrading old Ethernet cables.
 Disadvantages of wireless local area network (WLAN) :-
 WLAN requires license.
 It’s a limited area to hide.
 The Government agencies can control the flow of signals of WLAN and can also limit it if required. This
will affect data transfer from connected devices to the web.
 If the amount of connected devices increases then data transfer rate decreases.
 WLAN uses frequency which may interfere with other devices which use frequency.
 If there’s rain or thunder then communication may interfere.
 Due to Low security as attackers can get access to the transmitted data.
 Signals could also be suffering from the environment as compared to using fiber optics.
 The radiation of WLAN are often harmful to the environment
 WLAN is expensive than wires and hubs as it access points.
 Signals can get from nearest signals by access points.
 It’s required to vary the network card and access point when standard changes.
 LAN cable remains required which acts because the backbone of the WLAN
 Low data transfer rate than wired connection because WLAN uses frequency.
 Chances of errors are high.
 Communication isn’t secure and may be accessed by unauthorized users
 Wireless networks are naturally less secure than wired networks.
 Any wireless device can attempt to connect to a WLAN, so it is important to limit access to the
network if security is a concern.
 This is typically done using wireless authentication such as WEP or WPA, which encrypts the
communication.
 Additionally, wireless networks are more susceptible to interference from other signals or physical
barriers, such as concrete walls.
 Since LANs offer the highest performance and security, they are still used for many corporate and
government networks.

 Wi-Fi / IEEE 802.11:-


 It is part of the IEEE 802 set of LAN protocols
 It specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless
local area network (WLAN) Wi-Fi computer communication in various frequencies.
 To deliver services in wired networks
 To achieve high throughput
 To achieve highly reliable data delivery
 To achieve continuous network connection.
 It including frequencies 2.4 GHz, 5 GHz, and 60 GHz frequency bands.
 IEEE 802 divides the data link layer into two sub layers:
-Medium access control (MAC) layer – responsible for controlling how devices in a network gain access to a
medium and permission to transmit data.
-Logical link control (LLC) layer – responsible for identifying and encapsulating network layer protocols, and
controls error checking and frame synchronization.

Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 6 of 14


Wireless and Mobile Network (22622) IF6I

 IEEE 802.11 Architecture:

 The components of an IEEE 802.11 architecture are as follows


 1) Stations (STA) –
 Stations comprise all devices and equipment’s that are connected to the wireless LAN. A station can
be of two types:
 Wireless Access Point (WAP) − WAPs or simply access points (AP) are generally wireless routers that
form the base stations or access.
 Client. − Clients are workstations, computers, laptops, printers, smartphones, etc.
 Each station has a wireless network interface controller.
 2) Basic Service Set (BSS) –
 A basic service set is a group of stations communicating at physical layer level. BSS can be of two
categories depending upon mode of operation:
 Infrastructure BSS − Here, the devices communicate with other devices through access points.
 Independent BSS − Here, the devices communicate in peer-to-peer basis in an ad hoc manner.
 3) Extended Service Set (ESS) –
 It is a set of all connected BSS.
 4) Distribution System (DS) –
 It connects access points in ESS.

 RFID:-
 Radio Frequency Identification or RFID is a specific type of radio technology that uses radio waves to identify
tags attached to an object and thus identify the object.
 Tags can be passive or active.
 RFID belongs to a group of technologies called automatic identification and data collection (AIDC). AIDC tools
used to identify items, collect data about them, and send that data to a computer system, with little human
interaction.

 Readers
 RFID readers are connected to the antenna and receive data from the RFID tag. The reader is what
receives and converts the radio waves into digital data on a computer database.
 There are two types of readers. There are Fixed Readers and Mobile Readers.

Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 7 of 14


Wireless and Mobile Network (22622) IF6I

 Fixed readers are typically mounted to walls or other objects and stay in one location to read data
stored in a tag. For example, you can check out at Amazon Go without going to a cashier. You just
walk through an RF zone and the reader receives the tag data.
 Mobile readers can be installed or carried anywhere it is needed.

 Tags
 RFID tags are what stores and transmit the data that needs to be deciphered. The tags can be
attached to assets to send data to the antenna. The microchip embedded in the tag is what stores the
tag's ID and programmable data related to the asset. This stored data is then transferred to the
reader through antennas.
 Active tags: Tags that have their own power source and can read in a range of 100+ meters. Active
tags are used by companies where asset location or logistics improvements are important.
 Passive tags: Passive tags are only powered by the incident electromagnetic wave from the reader.
Tags that don’t have a power source. This gives them a read distance from close contact to 25 meters.
 Antennas
 Antennas are necessary elements in an RFID system because they transmit the RFID tag’s data to the
reader. Without RFID antenna, RFID reader cannot correctly send and receive signals to RFID tags.
 Computer Database
 The RFID system requires a computer database to process data stored in tags. This software can
program tags, manage devices and data, remote monitoring and hardware configuration.
 Application
 Animal Tracking, Access Control, Car Key-Fob, Asset Tracking, and Healthcare, Library Books,
Personal ID Cards, Airline Baggage, and Credit Cards, Supply Chain Tracking, Manufacturing,
Pharmaceuticals and Electronic Tolling, Vehicle Tracking, Auto Manufacturing, and Construction.
 Types of RFID
 RFIDs are categorized on the basis of
 1. Frequency 2. Application area 3. Power level
 Frequency There is 6 basic frequencies on which RFID operates. These are 132.4 KHz, 13.56 MHz, 433
MHz, 918 MHz, 2.4 GHz & 5.8 GHz. Low frequency systems (30 KHz – 500 KHz) systems. High
Frequency (850 MHz – 950 MHz & 2.4 GHz – 2.5 GHz) systems
 Application area Speed of object and distance to read determines the type of tag to be used. RFID
used for livestock will be different from the tag used in rail road.
 Power Level There are 2 types based on power requirements. These are active and passive tags.

Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 8 of 14


Wireless and Mobile Network (22622) IF6I

 Passive: tags are generally in low frequency range whereas tags at higher frequency range can be
active or passive. Active: They are powered by an internal battery and are typically read/ write type.
The life of active tag is limited to the life of battery. The memory can vary from few bytes to 1 MB.
 Applications of RFID:
1. Automotive:
 Auto makers have added security and convenience to automobiles by using RFID technology for anti-
theft immobilizers and passive entry systems.
 Some auto manufacturers use RFID systems to move cars through an assembly line. At each
successive stage of production, the RFID tag tells the computers what the next step of the automated
assembly is.
2. Animal tracking:
 Ranchers and livestock producers use RFID technology to meet export regulations and optimize
livestock value.
 Wild animals are tracked in ecological studies, and many pets that are tagged are returned to their
owners. Thus a tag can carry information as simple as a pet owner’s name and address.
3. Assets tracking:
 Hospitals and pharmacies meet tough product accountability legislation with RFID; libraries limit theft
and keep books in circulation more efficiently.
4. Supply chain:
 Wal-Mart, Target, Best Buy, and other retailers have discovered that RFID technology can keep
inventories at the optimal level, reduce out of stock losses, limit shoplifting, and speed customers
through check-out lines.

 Bluetooth:-
 It is a Wireless Personal Area Network (WPAN) technology and is used for exchanging data over smaller
distances.
 Bluetooth ranges up to 10 meters.
 It operates in the unlicensed, industrial, scientific, and medical (ISM) band from 2.4 GHz to 2.485 GHz.
 Bluetooth can connect up to “eight devices” simultaneously
 It provides data rates up to 1 Mbps or 3 Mbps depending upon the version.
 A Bluetooth network is called a piconet and a collection of interconnected piconets is called scatternet.
 The spreading technique that it uses is FHSS (Frequency-hopping spread spectrum).

 Transmissions by slave devices are governed by the master device (i.e., the master device dictates when a
slave device may transmit).
 This technique utilizes 79 channels of particular frequency band, with each device accessing the channel for
only 625 microseconds, i.e. the device must toggle between transmitting and receiving data from one time
slot to another. This implies the transmitters change frequencies 1,600 times every second, meaning that
Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 9 of 14
Wireless and Mobile Network (22622) IF6I

more devices can make full use of a limited slice of the radio spectrum. This ensures that the interference
won’t take place as each transmitter will be on different frequencies.
 The frequency hopping sequence is defined by the Bluetooth device address (BD_ADDR) of the master device.
 The master device first sends a radio signal asking for response from the particular slave devices within the
range of addresses.
 The slaves respond and synchronize their hop frequency as well as clock with that of the master device.
 Scatternets are created when a device becomes an active member of more than one piconet. Essentially, the
adjoining device shares its time slots among the different piconets.
 Bluetooth Architecture:-
 The architecture of Bluetooth defines two types of networks:
1. Piconet 2. Scatternet

 Piconet:
 Piconet is a type of Bluetooth network that contains one primary node called the master node
and seven active secondary nodes called slave nodes.
 Thus, we can say that there are a total of 8 active nodes which are present at a distance of 10 meters.
 The communication between the primary and secondary nodes can be one-to-one or one-to-many.
 Possible communication is only between the master and slave; Slave-slave communication is not
possible.
 It also has 255 parked nodes; these are secondary nodes and cannot take participation in
communication unless it gets converted to the active state.
 Scatternet:
 It is formed by using various piconets.
 A slave that is present in one piconet can act as master or we can say primary in another piconet.
 This kind of node can receive a message from a master in one piconet and deliver the message to its
slave in the other piconet where it is acting as a master.
 This type of node is referred to as a bridge node. A station cannot be mastered in two piconets.
 The core specification consists of 5 layers:
 Radio: Radio specifies the requirements for radio transmission – including frequency, modulation,
and power characteristics – for a Bluetooth transceiver.
 Baseband Layer: It specifies point to point or point to multipoint links. It specifies various packet
formats, transmit and receive timing, channel control, and the mechanism for frequency hopping
(hop selection) and device addressing. The length of a packet can range from 68 bits (shortened
access code) to a maximum of 3071 bits.
 LMP- Link Manager Protocol (LMP): defines the procedures for link set up and ongoing link
management. It is responsible for creating the links, monitoring their health, and terminating them
gracefully upon command or failure.
 Logical Link Control and Adaptation Protocol (L2CAP): It allows the communication between upper
and lower layers of the Bluetooth protocol stack. It packages the data packets received from upper
layers into the form expected by lower layers. It also performs segmentation and multiplexing.

Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 10 of 14


Wireless and Mobile Network (22622) IF6I

 Service Discovery Protocol (SDP): allows a Bluetooth device to query other Bluetooth devices for
device information, services provided, and the characteristics of those services.

 When the Bluetooth enabled device is within the range of transmission, paging starts in
synchronization with the device and a link establishes between them. The different stages of this are
 1. The Link Manager Protocol (LMP) uses the technique called “Service Discovery Protocol or SDP” to
detect whether service is available from the access point or not.
 2. When the service is available, the Bluetooth device creates an L2CAP channel with the access point
using the information present in the SDP.
 3. Then an RF COMM channel is created over the L2CAP channel depending on the application.
 4. The access point will then send a security request for connection. If the user knows the security PIN
code, access will be allowed. The PIN code will not be transmitted through the wireless line, but a key
generated is used to identify the user.
 5. The network protocols like TCP/IP, IPX, Apple talk etc then send and receive the data’s between
the Bluetooth and the host device using the link.
 Advantages of Bluetooth Technology:
 It removes the problem of radio interference by using a technique called Speed Frequency Hopping.
 The power consumption of the chip (consisting of transceiver) is low, at about 0.3mW, which makes it
possible for least utilization of battery life.
 It guarantees security at bit level. The authentication is controlled using a 128bit key.
 It is possible to use Bluetooth for both transferring of data and verbal communication as Bluetooth
can support data channels of up to 3 similar voice channels.
 It overcomes the constraints of line of sight and one to one communication as in other mode of
wireless communications like infrared.
 It is a low-cost and easy-to-use device.
 It can also penetrate through walls.
 It creates an Ad-hoc connection immediately without any wires.
 It is used for voice and data transfer.
 Disadvantages:
 It can be hacked and hence, less secure.
 It has a slow data transfer rate: of 3 Mbps.
 It has a small range: 10 meters.
 Bluetooth communication does not support routing.
 The issues of handoffs have not been addressed.
 Bluetooth Applications:
 Cordless Desktop: All (or most) of the peripheral devices (e.g., mouse, keyboard, printer, speakers, etc.)
are connected to the PC cordlessly.
Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 11 of 14
Wireless and Mobile Network (22622) IF6I

 Ultimate headset: It can be used to allow one headset to be used with myriad devices, including
telephones, portable computers, stereos, etc.
 Automatic synchronization: This usage model makes use of the hidden computing paradigm, which
focuses on applications in which devices automatically carry out certain tasks on behalf of the user
without user intervention or awareness.
 Multimedia Transfer:- Exchanging of multimedia data like songs, videos, pictures can be transferred
among devices using Bluetooth.
 It can be used in laptops, and in wireless PCs, printers.
 It can be used in wireless headsets, wireless PANs, and LANs.
 It can connect a digital camera wirelessly to a mobile phone.
 It can transfer data in terms of videos, songs, photographs, or files from one cell phone to another cell
phone or computer.
 It is used in the sectors of Medical health care, sports and fitness, Military.

 Wi Max/ IEEE 802.16:-


 WiMAX, the Worldwide Interoperability for Microwave Access, is a telecommunications technology aimed at
providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular
type access.
 It is based on MAN (Metropolitan Area Network) technology.
 Its range is upto 50 Km.
 It may provide speed upto 70 Mbps and it can operate in Non-Line-of-Sight.
 This technology is fast, convenient and cost effective.

 Architecture:
 Physical Layer:
 This layer specifies frequency band, synchronization between transmitter and receiver data rate and
multiplexing scheme.
 This layer is responsible for encoding and decoding of signals and manages bit transmission and reception. It
converts MAC layer frames into signals to be transmitted. Modulation schemes which are used on this layer
includes: QPSK, QAM-16 and QAM-64.

 MAC Layer:
This layer provides and interfaces between convergence layer and physical layer of WiMax protocol stack. It
provides point to multipoint communication and is based on CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance). The MAC layer is responsible for transmitting data in frames and controlling access to
shared wireless medium. The MAC protocol defines how and when a subscriber may initiate a transmission on
the channel.
 Convergence Layer:
This layer provides the information of the external network. It accepts higher layer protocol data unit (PDU) and
converts it to lower layer PDU. It provides functions depending upon the service being used.

Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 12 of 14


Wireless and Mobile Network (22622) IF6I

Sr.
Parameters WiFi WiMax
No.
WiFi is defined under IEEE 802.11x WiMAX is defined under IEEE 802.16y
1. Defined standards where x stands for various WiFi standards where y stands for various
versions. WiMAX versions.
Type of WiFi is for LAN (Local Area Network) WiMAX is for MAN (Metropolitan Area
2.
Network applications. Network) applications.
WiFi does not guarantee any Quality of WiMAX guarantees Quality of Service
3. Guarantee
Service (QoS). (QoS).
The WiFi network range is around 100
4. Distance WiMAX network can reach about 50-90 km.
meters.
WiFi uses the conflict-
Connection WiMAX networks operate on a connection-
5. based CSMA/CA protocol which is not
oriented oriented MAC.
connection-oriented.
6. Range WiFi is short-range technology. WiMAX is long-range technology.
WiFi connection can transmit up to 54 WiMAX connection can transmit up to 70
7. Transmit
Mbps. Mbps.
A signal will be sent from the WiMAX base
WiFi access points transmit signals to the
8. Signal station or tower station to the WiMAX
receiving device.
receiver.
It is inexpensive compared to WiMAX It is expensive because of high installation
9. Cost
technology. cost.
WiFi is utilized for domestic use and short- WiMAX supports a broader interoperable
10. Usage
distance connections. network,

 Difference between Bluetooth and Wi-Fi:-

Parameters WiFi Bluetooth


Full Form Full-form of WiFi is Wireless Fidelity. Bluetooth has no full-form.

WiFi demands a wireless router to set up the Bluetooth demands a Bluetooth setting or
Component
connectivity and adapter on the devices. adapter on all devices to set up connectivity.
Power
It consumes high power. It consumes low power.
Consumption

Security WiFi is more secure than Bluetooth. Bluetooth is less secure than WiFi.

WiFi can hold a large number of users to be Bluetooth holds a smaller number of users to
Multi User
connected. be connected.

Bandwidth WiFi requires high bandwidth. Bluetooth demands low bandwidth.

Bluetooth can cover an area up to 10


Coverage WiFi can cover an area up to 32 meters.
meters.

Frequency range 2.4GHz to 5 GHz 2.4 GHz to 2.483 GHz

Modulation OFDM (Orthogonal Frequency Division


GFSK (Gaussian frequency shift keying)
technique Multiplexing) and QAM (Quadrature Amplitude
1. Consumer
1. Wifi analyzer
2. Games
Applications 2. Wifi inspector
3. Industry
4. sport training

Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 13 of 14


Wireless and Mobile Network (22622) IF6I

 The Principles of Mobile IP:-


 Mobile IP is a communication protocol (created by extending Internet Protocol, IP) that allows the users to
move from one network to another with the same IP address. It ensures that the communication will continue
without the user’s sessions or connections being dropped.
 Terminologies:
 Mobile Node (MN) is the hand-held communication device that the user carries e.g. Cell phone.
 Home Network is a network to which the mobile node originally belongs as per its assigned IP address (home
address).
 Home Agent (HA) is a router in-home network to which the mobile node was originally connected
 Home Address is the permanent IP address assigned to the mobile node (within its home network).
 Foreign Network is the current network to which the mobile node is visiting (away from its home network).
 Foreign Agent (FA) is a router in a foreign network to which the mobile node is currently connected. The
packets from the home agent are sent to the foreign agent which delivers them to the mobile node.
 Correspondent Node (CN) is a device on the internet communicating to the mobile node.
 Care-of Address (COA) is the temporary address used by a mobile node while it is moving away from its home
network.
 Foreign agent COA, the COA could be located at the FA, i.e., the COA is an IP address of the FA. The FA is the
tunnel end-point and forwards packets to the MN.
 Co-located COA, the COA is co-located if the MN temporarily acquired an additional IP address which acts as
COA. This address is now topologically correct, and the tunnel endpoint is at the MN.
 A home agent (HA) stores information about mobile nodes whose permanent home address is in the home
agent's network. The HA acts as a router on a mobile host's (MH) home network which tunnels datagrams for
delivery to the MH when it is away from home, maintains a location directory (LD) for the MH.
 A foreign agent (FA) stores information about mobile nodes visiting its network. Foreign agents also advertise
care-of addresses, which are used by Mobile IP. The FA acts as a router on a MH’s visited network which
provides routing services to the MH while registered.
 The following is a diagram that gives the ideas of mobile IP.

1. The Mobile Node (MN) travels to a foreign network and gets a new care-of-address.
2. The MN performs a binding update to its Home Agent (HA) (the new care-of-address gets registered at HA).
HA sends a binding acknowledgement to MN.
3. A Correspondent Node (CN) wants to contact the MN. The HA intercepts packets destined to the MN.
4. The HA then tunnels all packets to the MN from the CN using MN's care-of-address.
5. When the MN answers the CN, it may use its current care-of-address (and perform a binding to the CN) and
communicate with the CN directly (“route optimization”) or it can tunnel all its packets through the HA.
Prepared By: Prof. C. S. Mogare (MET Polytechnic,Nashik) 9595159287 Page 14 of 14

You might also like