Cs8601 Unit 1 Notes Completed
Cs8601 Unit 1 Notes Completed
CS8601-Unit 1-Notes-Completed
UNIT – I: INTRODUCTION
Introduction to Mobile Computing –Applications of Mobile Computing – Generations of
Mobile Communication Technologies – Multiplexing – Spread Spectrum – MAC
Protocols – SDMA – TDMA – FDMA – CDMA.
(i) Expensive
(ii) Power Consumption
(iii) Small Screen Display
(iv) Slow Internet Speed
(v) Risky to carry
(vi) Security Concerns
(vii) Communication depends upon network
Application Tier: This layer has the vital responsibility of making logical
decisions and performing calculations. It also moves and processes data
between the presentation and data layers. We can consider the middle tier
to be like an <engine= of an automobile. It performs the processing of user
input, obtaining information and then makingdecisions. Thislayer is
implemented like java, .NET services, coldfusion, etc. The implementation
of this layer and functionality provided by this layer should be database
independent. This layer of functionalities is usually implemented on a fixed
server.
Data Tier:It is responsible for providing the basic facilities of data storage,
access and manipulation. Often this layer contains a database. The
information is stored and retrieved from this database. But, when small
amounts of data need to be stored, a file system can be used. This layer is
also implemented on a fixed server.
1.4: MULTIPLEXING
Multiplexing is a technique that allows the simultaneous transmission of
multiple communications over a single channel.
It describes how several users can share a medium with minimum (or) no
interference.
Multiplexing can be carried out in four
dimensions:
(1) Space
(2) Frequency
(3) Time
(4) Code
Goal of Multiplexing:
To assign space, frequency, time and code to
each communication channel with a
minimum interference and maximum
medium utilization. (i.e. Proper resource
sharing and its utilization).
Important:Guard Space is needed to avoid interference
Advantages:
Simple to implement
Does not need complex coordination between sender and receiver;
receiver only has to tune to the specific sender.
Disadvantages:
Assigning a separate frequency for each possible communication would
be a waste of frequency.
Inflexible.
Limits the number of senders.
Not suitable for mobile communication.
Example: Frequency Division Multiplexing can be used for radio station in
a particular region as every radio station will have their own frequency
and can work simultaneously without having any constraint of time.
Advantages:
Only one carrier in the medium at any time.
Throughput is high even for many users.
Disadvantages:
Precise synchronization is necessary
Common clock
Disadvantages of DSSS:
o The system becomes slow due to large acquisition time.
o Precise power control is necessary.
o The pseudo noise generator should generate sequence at high
rates.
Variants of FHSS:
1. Slow Hopping
2. Fast Hopping
2. Fast Hopping:
In fast hopping, the transmitter changes the frequency several times
during the transmission of a single bit.
The above figure shows five user bits with a bit period tb
In fast hopping, the transmitter hops three times during a bit period.
Advantage: Better in overcoming the effects of narrowband
interference and frequency selective fading as they stick to one
frequency for a very short time.
Disadvantage: More complex to implement because the transmitter
and receiver have to stay synchronized within smaller tolerances to
perform hopping at same point in time.
Application: Suitable for Bluetooth.
FHSS Transmitter:
FHSS Receiver:
The receiver has to know the hopping sequence and must stay
synchronized. It then performs the inverse operations of the modulation to
reconstruct user data. Several filters are also needed.
Disadvantages of FHSS:
o Not as robust as DSSS
o Needs complex frequency synthesizers
o Requires error correction
FHSS DSSS
Uses a radio carrier that hops from DS systems use a carrier that remains
frequency to frequency in a pattern fixed to a specific frequency band.
known to both transmitter and receiver
Available bandwidth is divided into many The data signal is spread onto a much
possible broadcast frequencies. larger range of frequencies (at a much
lower power level) using a specific
encoding scheme.
Hard to find the user?s frequency at any User frequency, once allotted is always
instant of time the same
Power strength of the signal is high Power strength of the signal is low
It is cheaper It is expensive
A MAC protocol in a wireless medium is much more complex than its wired
counterpart.
First, a collision detection scheme is difficult to implement in a wireless
environment, since collisions are hard to be detected by the transmitting
nodes.
Also, in infrastructure–less networks, the issue of hidden and exposed
terminals make a MAC protocol extremely inefficient unless special care is
taken to overcome these problems.
Hidden Terminal or Node: A hidden node is a node that does not hear the
transmission that another node within its range is receiving and due to the
fear of collision it does not attempting to gain access.
The Hidden Terminal Problem arises when at least three nodes (A, B and C)
communicating.
In this figure,
B is in the radio range of A, and B is also with the radio range of C. The
nodes A and C are not in the radio range of
each other.
1) If A sends data to B, C cannot hear this
transmission.
2) C wants to send to B. C senses a <free=
medium (Carrier Sense fails) and starts
transmitting.
3) Now both A and C start transmit to B at the
same time. Collision at B occurs and the
data received at B would get garbled. A
cannot detect this collision (Collision Detection fails) and continues with its
transmission to B.
4) This situation arises because A and C are <hidden= from each other, because
they are outside each other?s transmission range.
Note:- Hidden Terminal causes Collisions.
Advantages:
1. Channel bandwidth is narrow.
2. Simple to implement.
3. Efficient when the number of stations is small & the traffic is
uniformly constant.
Disadvantages:
1. Unused transmission time in the frequency band that occurs when
the allocated caller pauses between transmissions
2. When no user is allocated a band, goes idle and is wasted.
3. FDMA does not achieve high channel utilization.
Figure shows the situation where time slots are allocated to users in a round
robin manner, with each user being assigned one time slot per frame.
Obviously, unused time slots go idle, leading to low channel utilization.
In TDMA, each user of the channel owns the channel for exclusive use
for one time slot at a time in a round robin fashion.
Advantages:
1. It carries data rates of 64 kbps to 120 Mbps.
2. It provides the user with extended battery life and talk time.
3. Cost effective for upgrading analog system to digital system.
4. Efficiently carries multiple calls at the same time.
5. Shares carrier frequency with multiple users.
Disadvantages:
1. Unused time slots go idle.
2. Low channel utilization.
Disadvantages:
1. Does not coordinate medium access.
2. Collision can become high if the number of contenders for
transmission is high.
Basic Idea: Prevent collisions at the moment they are most likely to
occur, that is, when the bus is released after a packet transmission.
Problem:
During the time a node is transmitting on the channel, several nodes
might want to transmit. These nodes would be monitoring the
channel and waiting for it to become free.
The moment the transmitting node completes its transmission, these
waiting nodes would sense the channel to be free, and would all start
transmitting at the same time and collision occurs.
To overcome, such collisions, in the collision avoidance scheme, all
nodes are forced to wait for a random time and then sense the
medium again, before starting their transmission.
If the medium is sensed to be busy, a node waiting to transmit
waits for a further random amount of time and so on. Thus,
the chance of two nodes starting to transmit at the same time
and so on.
If the medium is free, start transmitting the frame.
o All stations receiving this vector will know which slot is occupied
and which slot is currently free.
o In the example, a successful transmission of data is indicated by
the station?s name (A to F).
o The base station broadcasts the reservations status >ACDABA-F?
to all stations.
o All stations wishing to transmit can now compete for the seventh
slot in Aloha fashion. Since more than one station wants to
access this slot, collision occurs.
o The base station returns the reservation status >ACDABA-F?
indicating that the reservation of slot seven is failed.
o Again stations can compete for this sot.
o Additionally, station D has stopped sending in slot 3 and station F
in slot 8.
o This is noticed by the base station after the second frame.
o Before the 3rd starts, the base station indicates that slots 3 and 8
are now idle.
o Station F has succeeded in reserving slot 7. As soon as a station
has succeeded with a reservation, all future slots are implicitly
reserved for this station.
This scheme allows for the combination of, isochronous traffic with
fixed bit-rates and best-effort traffic without any guarantees.
To avoid collision: When the other nodes sharing the medium sense the
CTS packet, they refrain from transmitting until the transmission from the
sending node is complete.
MACA solves the hidden/exposed terminal problems by regulating the
transmitter power.
1. A node running MACA requests to use the medium by sending an RTS
to the receiver.
2. Since radio signals propagate Omni-directionally, every terminal within
the sender>s radio range will hear this and them refrain from
transmitting.
3. As soon as the receiver is ready to receive data, it responds with CTS.
Figure schematically shows how MACA avoids the hidden terminal problem.
Assume that A has data to transfer to node B:
1. Before the start of its transmission, node A sends a RTS.
2. B receives the RTS that contains the sender’s name and the receiver’s
name, as well as the length of the future transmission. In response
to the RTS, an acknowledgment from B is triggered indicating CTS.
3. The CTS contains the names of the sender and receiver, and the
length of the planned transmission.
4. This CTS is heard by C and the medium is reserved for use by A for the
duration of the transmission.
5. On receipt of CTS from, B, C refrains from transmitting anything for the
time indicated in the CTS.
Thus, a collision cannot occur at B during data transmission, and the hidden
terminal problem is solved. Though this is a collision avoidance protocol, a
collision can occur during the sending of an RTS. Both A and C could send
an RTS at same time .But an RTS occurs over a very small duration
compared to the duration of data transmission. Thus the probability of
collision remains much less. B resolves this contention problem by
acknowledging only one station in the CTS. No transmission occurs without
an appropriate CTS.
3.9) Polling
Where one station is to be heard by all others (e.g., the base station of a
mobile phone network or any other dedicated station0, polling schemes
can be applied.
Polling is a strictly centralized scheme with one master station and several
slave stations.
The master can poll the slaves according to many schemes:
o Round Robin: only efficient if traffic patterns are similar over all
stations
o Randomly Addressed Polling:
Terminals ready to send can now transmit a random
number.
The base station now chooses one address for polling from
the list of all random numbers.
The base station acknowledges correct packets and
continues polling the next terminal.
This cycle starts again after polling all terminals of the list.
The bandwidth of this medium is much larger than the space that
would be allocated to each packet transmission during FDMA and the
signals can be distinguished from each other by means of a special
coding scheme that is used.
Coding Scheme used in CDMA:
Coding is done with the help of a frequency spreading code known as the m-
bit pseudo –noise code sequence. Using, m bits, 2m-1 different codes can be
obtained. From these codes, each user will use only one code.
Example:
Assume all nodes transmit on the same frequency at the same time using
entire bandwidth of the transmission channel.
Each sender has a unique random number key.
The receiver can tune to the original signal if it knows the Pseudo-Noise
(PN) sequence.
Transmitter: A, B Receiver: C
Sender: A Sender: B
Data, Ad = 1 Data, Bd = 0
Key, Ak = (010011) Key, Bk = (110101)
Autocorrelation Matrix: Autocorrelation Matrix:
Ad = (+1) Bd = (-1)
Ak = (-1, +1, -1, -1, +1, +1) Bk = (+1, +1, -1, +1, -1, +1)
As: Signal at A: Bs: Signal at B:
As = Ad * Ak Bs = Bd * Bk
= (+1) * (-1, +1, -1, -1, +1, +1) = (-1) * (+1, +1, -1, +1, -1, +1)
As = (-1, +1, -1, -1, +1, +1) Bs = (-1, -1, +1, -1, +1, -1)
Signal received by receiver C is As + Bs
As + Bs = (-1, +1, -1, -1, +1, +1) + (-1, -1, +1, -1, +1, -1)
= (-2, 0, 0, -2, +2, 0)
Decoding data of A: Decoding data of B:
In order to receive the data sent by A, In order to receive the data sent by B,
extract using Ak: C * Ak extract using Bk: C * Bk
= (-2, 0, 0, -2, +2, 0) * (-1, +1, -1, -1, = (-2, 0, 0, -2, +2, 0) * (+1, +1, -1, +1,
+1, +1) -1, +1)
= (2+0+0+2+2+0) = 6 > 0 (Positive) = (-2+0+0-2-2+0) = -6 > 0 (Negative)
That is the original bit was 1 and it is That is the original bit was 0 and it is
the data sent by A the data sent by B
Representa
tion