PDF of Wireless and Mobile Technology
PDF of Wireless and Mobile Technology
SEMESTER - V (CBCS)
Module I
1. Wireless Technology Fundamentals 1
Module II
5. Bluetooth 71
Module III
Module IV
Module V
Module VI
Module VII
*****
SYLLABUS
Course Code Course Name
MCA501 Wireless and Mobile technology
*****
2
MODULE I
1
WIRELESS TECHNOLOGY
FUNDAMENTALS
Unit Structure
1.0 Objectives
1.1 Introduction
1.2 Introduction to Mobile and wireless communications
1.3 Overview of radio transmission frequencies
1.4 Signal Antennas
1.5 Signal Propagation
1.6 Multiplexing – SDM, FDM, TDM, CDM
1.7 Modulation – ASK, FSK, PSK
1.8 Advanced FSK
1.9 Advanced PSK
1.10 OFDM
1.11 Spread Spectrum – DSSS, FHSS
1.12 Questions
1.13 References
1.0 OBJECTIVES
Wireless Technology can be used for cellular telephony, wireless
access to the internet, wireless home networking, and so on.
Connecting and communicating between two or more devices using a
wireless signal through wireless communication technologies and
devices.
To understand the architectures of various access technologies and
methodologies.
To understand various protocols and services.
Demonstrating methods used by cybercriminals.
Describe the characteristics of Wireless Technology.
1.1 INTRODUCTION
Wireless Technology/communication is the transfer of information
between two or more points without the use of an electrical conductor,
optical fibre or other continuous guided medium for the transfer. The most
common wireless technologies use radio waves.
1
Wireless and Mobile Interconnection of systems, people or things with the help of a
Technology communication media can be referred to as a network. The type of
communication which uses electromagnetic waves as communication
media for transmitting and receiving data or voice is called wireless
communication.
Wireless Communication:
Wireless networks are further classified as wireless personal area network,
wireless local area network, wireless metropolitan network and wireless
wide area network.
22
2) Bluetooth: Wireless Technology
Fundamentals
In Bluetooth networks, wireless users use a pairing or association process
to establish encryption and authentication between two devices. The
association process takes 1 to 4 seconds. Bluetooth was standardized as
IEEE 802.15.1. Bluetooth provides theoretical data transfer speeds of up
to 24 Mbit/s. Bluetooth devices form a master slave like structure while
pairing and use 48-bit hardware address of a master, shared 128-bit
random number, and a user-specified PIN of up to 128 bits.
44
Applications: Wireless Technology
Fundamentals
Some of the areas of applications of radio waves are:
Broadcasting and multicasting
Marine communication
Wireless computer networks
Cordless phones
Fixed and mobile radio communications
AM and FM radio
Television
Will the same antenna work for both transmit and receive?
Yes. We call that antenna reciprocity. Any antenna will work for either
transmit or receive. In many wireless applications, the antenna is switched
between the transmitter and receiver.
66
Example: You can see a real-life example of Multiplexing in the Wireless Technology
telecommunication field where several telephone calls may be carried Fundamentals
using one wire. Multiplexing is also called muxing.
● Multiplexing is a technique that allows multiple simultaneous analogs
or digital signal transmission across a single data link.
● The main motive behind the development of Multiplexing is to
provide simple and easy communication, proper resource sharing and
its utilization.
This is the best way to utilize and share a limited resource equally among
multiple devices.
Advantages of SDM:
● In SDM, the data transmission rate is high.
● It uses Time and Frequency bands at its maximum potential.
Disadvantages of SDM:
● An inference may occur.
● It faces high inference losses.
Usage:
● It is used in GSM (Global Service for Mobile) Technology.
7
Wireless and Mobile 2) Frequency Division Multiplexing (FDM):
Technology
Frequency division multiplexing or FDM is inherently an analog
technology. As the name specifies, in Frequency Division Multiplexing,
the frequency dimension spectrum is split into smaller frequency bands. It
combines several smaller distinct frequency ranges signals into one
medium and sends them over a single medium. In FDM, the signals are
electrical signals.
FDM's most common applications are traditional radio or television
broadcasting, mobile or satellite stations, or cable television.
For example: In cable TV, you can see that only one cable is reached to
the customer's locality, but the service provider can send multiple
television channels or signals simultaneously over that cable to all
customers without any interference. The customers have to tune to the
appropriate frequency (channel) to access the required signal.
In FDM, several frequency bands can work simultaneously without any
time constraint.
Disadvantages:
● It is less flexible.
● In FDM, the bandwidth wastage may be high.
Usage:
It is used in Radio and television broadcasting stations, Cable TV etc.
88
3) Time Division Multiplexing (TDM): Wireless Technology
Fundamentals
The Time Division Multiplexing or (TDM) is a digital or analog
technology (in rare cases) that uses time, instead of space or frequency, to
separate the different data streams. It is used for a specific amount of time
in which the whole spectrum is used.
The Time frames of the same intervals are divided so that you can access
the entire frequency spectrum at that time frame.
Disadvantages:
● It isn't easy to implement.
Usage:
● It is mainly used in telephonic services.
9
Wireless and Mobile
Technology
Disadvantages:
● The data transmission rate is low.
● It is complex.
Usage:
● It is mainly used in Cell Phone Spectrum Technology (2G, 3G etc.).
Any modulated signal has a high frequency carrier. The binary signal
when ASK is modulated, gives a zero value for LOW input and gives the
carrier output for HIGH input.
11
Wireless and Mobile The output of a FSK modulated wave is high in frequency for a binary
Technology HIGH input and is low in frequency for a binary LOW input. The binary
1s and 0s are called Mark and Space frequencies.
13
Wireless and Mobile To find the process of obtaining this FSK modulated wave, let us know
Technology about the working of a FSK modulator.
FSK Modulator:
The FSK modulator block diagram comprises two oscillators with a clock
and the input binary sequence. Following is its block diagram.
The two oscillators, producing a higher and a lower frequency signal, are
connected to a switch along with an internal clock. To avoid the abrupt
phase discontinuities of the output waveform during the transmission of
the message, a clock is applied to both the oscillators, internally. The
binary input sequence is applied to the transmitter so as to choose the
frequencies according to the binary input.
AD:
FSK Demodulator:
There are different methods for demodulating a FSK wave. The main
methods of FSK detection are asynchronous detectors and synchronous
detectors. The synchronous detector is a coherent one, while an
asynchronous detector is a non-coherent one.
14
14
Wireless Technology
Fundamentals
Space and Mark frequencies. The output from these two BPFs look like
ASK signal, which is given to the envelope detector. The signal in each
envelope detector is modulated asynchronously.
The decision circuit chooses which output is more likely and selects it
from any one of the envelope detectors. It also re-shapes the waveform to
a rectangular one.
15
Wireless and Mobile BPSK Modulator:
Technology
The block diagram of Binary Phase Shift Keying consists of the balance
modulator which has the carrier sine wave as one input and the binary
sequence as the other input. Following is the diagrammatic representation.
The output sine wave of the modulator will be the direct input carrier or
the inverted 180°phaseshifted.
BPSK Demodulator:
The block diagram of BPSK demodulator consists of a mixer with local
oscillator circuit, a bandpass filter, a two-input detector circuit. The
diagram is as follows.
16
16
Wireless Technology
Fundamentals
Fi
g: BPSK Demodulator
17
Wireless and Mobile The following diagram plots FDM versus OFDM, to depict the saving in
Technology bandwidth obtained by OFDM:
Applications:
OFDM is used in the following area:
● Wi-Fi
● DSL internet access
● 4G wireless communications
● digital television
● radio broadcast services.
18
18
spread spectrum signals transmit at low power density and has a wide Wireless Technology
spread of signals. Fundamentals
1) Narrow-band Signals:
The Narrow-band signals have the signal strength concentrated as shown
in the following frequency spectrum figure.
19
Wireless and Mobile Following are some of its features:
Technology
● Band of signals occupy a wide range of frequencies.
With these features, the spread spectrum signals are highly resistant to
interference or jamming. Since multiple users can share the same spread
spectrum bandwidth without interfering with one another, these can be
called as multiple access techniques.
This is frequency hopping technique, where the users are made to change
the frequencies of usage, from one to another in a specified time interval,
hence called as frequency hopping. For example, a frequency was allotted
to sender 1 for a particular period of time. Now, after a while, sender 1
hops to the other frequency and sender 2 uses the first frequency, which
was previously used by sender 1. This is called as frequency reuse.
The frequencies of the data are hopped from one to another in order to
provide a secure transmission. The amount of time spent on each
frequency hop is called as Dwell time.
Whenever a user wants to send data using this DSSS technique, each and
every bit of the user data is multiplied by a secret code, called as chipping
code. This chipping code is nothing but the spreading code which is
multiplied with the original message and transmitted. The receiver uses
the same code to retrieve the original message.
Both the spread spectrum techniques are popular for their characteristics.
To have a clear understanding, let us take a look at their comparisons.
20
20
FHSS DSSS Wireless Technology
Multiple frequencies are used Single frequency is used Fundamentals
1.12 QUESTIONS
Q.1) Define Wireless Network with advantage & disadvantage.
Q.2) Explain in detail radio transmission frequencies.
Q.3) Define signal propagation.
Q.4) Define multiplexing , with their types.
21
Wireless and Mobile Q.5) Explain in-detail modulation & demodulation.
Technology
Q.6) Explain OFDM.
Q.7) Explain in detail FHSS.
1.13 REFERENCES
Mobile Communications, Second Edition, Jochen Schiller, Pearson
Education
*****
22
22
2
WIRELESS TECHNOLOGY
FUNDAMENTALS
Unit Structure
2.1 Wireless Transmission Impairments – Free Space Loss
2.2 Fadings.
2.3 Multipath Propagation .
2.4 Atmospheric Absorption.
2.5 Error Correction – Reed Solomon
2.6 BCH
2.7 Hamming code
2.8 Convolution Code (Encoding and Decoding)
2.9 Questions.
2.10 References.
1. Noise
2. Distortion
3. Attenuation
1) Noise:
Noise is the major factor for the transmission distortion as any unwanted
signal gets added to the transmitted signal by which the resulting
transmitted signal gets modified and at the receiver side it is difficult to
remove the unwanted noise signal. These noises are various kinds like shot
noise, impulse noise, thermal noise etc.
23
Wireless and Mobile Noise is diagrammatically represented as follows:
Technology
2) Distortion:
This kind of distortion is mainly appearing in case of composite signals in
which a composite signal has various frequency components in it and each
frequency component has some time constraint which makes a complete
signal.
But while transmitting this composite signal, if a certain delay happens
between the frequencies components, then there may be the chance that
the frequency component will reach the receiver end with a different delay
constraint from its original which leads to the change in shape of the
signal. The delay happens due to environmental parameters or from the
distance between transmitter and receiver etc.
3) Attenuation:
Attenuation is generally decreased in signal strength, by which the
received signal will be difficult to receive at the receiver end. This
attenuation happens due to the majority factor by environment as the
environment imposes a lot of resistance and the signal strength decreases
as it tries to overcome the resistance imposed.
24
24
The above picture shows that the signal loses power at its travel time. Wireless Technology
Fundamentals
Attenuation is diagrammatically represented as follows:
2.2 FADINGS:
In wireless communications, fading is the deviation of the signal
attenuation affecting a certain propagation media. Discoloration may vary
with time, the geographical position or frequency of the radio, which is
often modelled as a random process. A fading channel is a communication
channel experiencing fading.
Multipath Fading:
In wireless systems, fading can be either due to multipath, called as
multipath fading or due to shadowing from obstacles affecting the wave
propagation, known as shadow fading. Here in this chapter, we will
discuss how multipath fading affects the reception of signals in CDMA.
25
Wireless and Mobile Fading in CDMA System:
Technology
CDMA systems use a signal fast chip rate for spreading the spectrum. It
has a high time resolution, due to which it receives a different signal from
each path separately. The RAKE receiver prevents signal degradation by
summing all the signals.
26
26
2.3 MULTIPATH PROPAGATION: Wireless Technology
Fundamentals
Multipath propagation:
In wireless media, signals propagate using three principles, which are
reflection, scattering, and diffraction.
• Reflection occurs when the signal encounters a large solid surface,
whose size is much larger than the wavelength of the signal, e.g., a
solid wall.
• Diffraction occurs when the signal encounters an edge or a corner,
whose size is larger than the wavelength of the signal, e.g., an edge of
a wall.
• Scattering occurs when the signal encounters small objects of size
smaller than the wavelength of the signal.
One consequence of multipath propagation is that multiple copies of a
signal propagation along multiple different paths, arrive at any point at
different times. So the signal received at a point is not only affected by the
inherent noise, distortion, attenuation, and dispersion in the channel but
also the interaction of signals propagated along multiple paths.
Delay spread:
Suppose we transmit a probing pulse from a location and measure the
received signal at the recipient location as a function of time. The signal
power of the received signal spreads over time due to multipath
propagation.
The delay spread is determined by the density function of the resulting
spread of the delay over time. Average delay spread and root mean square
delay spread are the two parameters that can be calculated.
Doppler spread:
This is a measure of spectral broadening caused by the rate of change of
the mobile radio channel. It is caused by either relative motion between
the mobile and base station or by the movement of objects in the channel. 27
Wireless and Mobile When the velocity of the mobile is high, the Doppler spread is high, and
Technology the resulting channel variations are faster than that of the baseband signal,
this is referred to as fast fading. When channel variations are slower than
the baseband signal variations, then the resulting fading is referred to as
slow fading.
28
28
The atmosphere is transparent to specific wavelengths of radiation, in Wireless Technology
Fundamentals
contrast to the absorption bands. These bands are called atmospheric
"windows" because they allow radiation to easily pass through the
atmosphere to the Earth's surface.Most remote sensing instruments on
aircraft or space-based platforms work in one or more of these windows,
with detectors making measurements tuned to specific frequencies
(wavelengths) that pass through the atmosphere. When the remote sensing
instrument is in line of sight with an object that reflects sunlight or emits
heat, the instrument collects and records radiant energy.While most
remote sensing systems are designed to collect reflected radiation, some
sensors, especially those on meteorological satellites, directly measure
absorption phenomena such as those associated with carbon dioxide
(CO2) and other gases.
2.6 BCH
Binary-coded hexadecimal uses binary to express each digit of a
hexadecimal number. The following characters are used: 0, 1, 2, 3, 4, 5, 6,
7, 8, 9, A, B, C, D, E, F.
Examples:
Binary-coded hexadecimal
Hexadecimal
1 2 4 8
0 0 0 0 0
1 1 0 0 0
2 0 1 0 0
3 1 1 0 0
4 0 0 1 0
5 1 0 1 0
6 0 1 1 0
7 1 1 1 0
8 0 0 0 1
9 1 0 0 1
A 0 1 0 1
B 1 1 0 1
C 0 0 1 1
D 1 0 1 1
E 0 1 1 1
F 1 1 1 1
Dial Output
0
1 ●
2 ●
3 ● ●
4 ●
32
32
5 ● ● Wireless Technology
Fundamentals
6 ● ●
7 ● ● ●
8 ●
9 ● ●
A ● ●
B ● ● ●
C ● ●
D ● ● ●
E ● ● ●
F ● ● ● ●
35
Wireless and Mobile Binary Convolutional Codes:
Technology
In convolutional codes, messages consist of streams of data of any length
and output bits are generated by applying boolean functions to these
streams.In block codes, data consists of a block of data of a specific
length, however, in convolutional ciphers, the input data bits are not
divided into a block but rather fed as streams of data bits, which are
transformed into output bits based on the logical function of the encoder.
36
36
Example of Generating a Convolutional Code: Wireless Technology
Fundamentals
Let us consider a convolutional encoder with k = 1, n = 2 and K = 3.
The code-rate, Rc = k/n = 1/2 .
The input string is streamed from right to left into the encoder.
When the first bit, 1, is streamed in the encoder, the contents of encoder
will be −
When the next bit, 1 is streamed in the encoder, the contents of encoder
will be −
When the next bit, 0 is streamed in the encoder, the contents of encoder
will be −
37
Wireless and Mobile
Technology
When the last bit, 1 is streamed in the encoder, the contents of encoder
will be −
38
38
The corresponding state transition diagram will be: Wireless Technology
Fundamentals
2.9 QUESTIONS
Q.1) Explain in-detail wireless transmission impairments.
Q.2) Explain in detail multipath propagation.
Q.3) Define & explain Fading.
Q.4) Define Atmospheric Absorption.
Q.5) Explain in-detail Error Correction.
Q.6) Explain BCH & Give suitable e.g.
Q.7) Explain in detail Hamming code.
Q.8) Explain Convolution Code in detail.
2.10 REFERENCES
1. Mobile Communications, Second Edition, Jochen Schiller, Pearson
Education
2. Wireless Communications & Networks, Second Edition, William
Stallings, Pearson Education
3. Wireless Communications and Networks, 3G and Beyond, Second
Edition, ITI SahaMisra, McGraw Hill Education
4. Wireless and Mobile Network Architectures, Yi Bang Lin,
ImrichChlamtac, Wiley India.
5. Wireless and Mobile Networks, Concepts and Protocols, Dr.
Sunilkumar S. Manvi, Mahabaleshwar S. Kakkasageri, Wiley India
6. Multi-Carrier and Spread Spectrum Systems - From OFDM and MC-
CDMA to LTE and WiMAX, Second Edition, K. Fazel, S. Kaiser,
wiley publications
*****
39
MODULE II
3
INTRODUCTION TO WIRELESS
NETWORKS
Unit Structure
3.0 Objectives
3.1 Introduction to Wireless Networks
3.2 Wireless Network Architecture
3.3 Classification of Wireless Networks
3.3.1 Wireless Personal Area Networks (WPAN)
3.3.2 Wireless Local Area Networks (WLAN)
3.3.3 Wireless Metropolitan Area Network (WMAN)
3.3.4 Wireless Wide Area Network (WWAN)
3.4 Exercises
3.5 Additional References
3.0 OBJECTIVES
This chapter would make you understand the following concepts:
Introduction to Wired Network and Wireless Networks, Comparison
of wired and wireless networks, Issues in wireless Networks, ISM
Band, Essential components of a wireless network.
Wireless Network Architecture – Standalone Architecture (Ad-hoc
mode), Centrally Coordinated Architecture (Infrastructure mode),
Hybrid Architecture (Heterogenous mode)
Classification of Wireless Networks based on coverage
WPAN
WLAN
WMAN
WWAN
Wireless Network:
This type of network communicates through radio frequencies (RF
signals). Here, no cable restricts the user. This provides the freedom of
movement. User can roam along with the device between different
wireless networks. User mobility and Device mobility are important
features of wireless network. User mobility means user is mobile and
telecommunication services follow him/her. In device portability, device
moves with or without user and still the communication is possible. E.g.,
mobile phone system where the device is handed from one radio
transmitter to another as signal becomes too weak.
Digital and adaptive modulation and access multiplexing makes a wireless
network extremely portable. Examples of wireless networks include cell
phone networks, wireless local area networks (WLAN), wireless sensor
networks, satellite communication networks and terrestrial microwave
networks.
41
Wireless and Mobile
Technology
42
42
Installation of a wired network can be time consuming as it involves Introduction to Wireless
setting up hardware like cables, ports, switches, hubs etc. Setting up a Networks
wireless network is easier.
Maintenance of a wired network can be challenging as wired network
is more prone to breakage and wear & tear. So, maintenance of a
wired network can be a costly affair when compared with a wireless
network.
Space is another important characteristic of wireless networks.
Difficult-to-wire areas (like river, stream etc.) can also come under
communication network because of wireless connections.
ISM Band:
We are not allowed to transmit on any frequency we like. The
International Telecommunication Union – Radiocommunication Sector
(ITU-R) has prescribed a set of frequencies which we can use for
transmission in wireless networks. These frequency bands are called ISM
(Industrial, Scientific and Medical) bands. Anyone who wants to
implement a wireless network can use these prescribed frequencies
without requiring any license for its usage. This has a drawback as
everyone is using them, we are likely to experience interference.
43
Wireless and Mobile 802.11a 802.11b 802.11g 802.11n
Technology
Frequency 5 GHz 2.4 GHz 2.4 GHz 2.4 GHz and 5
GHz
Channels 8 non- 14 14 Depends
overlapping
Data Rate Up to Up to Up to Up to 300 – 600
54Mbps 11Mbps 54Mbps Mbps
Access Point:
The most important entity in a wireless network is the Access Point (AP)
device. The more generic name for AP is base station. The fundamental
duty of this device is to broadcast the radio signals into a frequency which
the communicating devices can identify and respond to. AP can handle
many different connections between various devices, all transmitting and
receiving simultaneously. But if more devices are working with an AP, the
slower they will function. System software with the AP bridges together
the wireless network and distribution sides of the AP. The system software
differentiates APs by providing varying degrees of management,
installation and security functions.
Network Adapter:
To connect an AP to create a wireless connection, devices must be
integrated with Wireless Network Adapters. Mostly the devices which
provide wireless functionality come with built-in adapters. If the device
does not have a built-in adapter, then an add-on adapter can be plugged in
into an USB port or expansion slot.
44
44
Introduction to Wireless
Networks
Radio NICs:
Radio NICs, also known as radio cards, operate from within the computer
device and provide wireless connectivity (mostly in wireless LANs). It
often implements 802.11 standard. These cards come in variety of forms
like ISA (Industry Standard Architecture) card, PCI (Peripheral
Component Interconnect) network card, USB (Universal Serial Bus) card
etc. PCs generally use ISA and PCI cards. PDAs (like digital cameras) and
laptops use CF (Compact Flash) cards.
Wireless Router:
A router along with AP (this unit is known as wireless router) disperse the
wireless signals to the devices. It is the heart of the wireless network. You
will need a wireless router when you build an all-wireless network for
your home or office. They use IP as well as internal protocols like
Network Address Translation (NAT) protocol, Dynamic Host
Configuration Protocol (DHCP). Routers are mostly used for small setups
45
Wireless and Mobile like home or small office etc. They are seldom used in larger settings like
Technology hospitals or company head office etc.
Wireless Antennas:
APs, repeaters and wireless routers have omnidirectional antennas which
increase the communication range of the radio signals. Omnidirectional
antennas satisfy most coverage requirements but we can also use directive
antenna to cover long, narrow area. To use extra directive antenna, AP
requires an external antenna connector.
Wireless Repeaters:
Wireless repeater helps in extending the reach/coverage of the network.
For this, it connects to a router or AP. Few APs have built-in repeater
mode. A repeater regenerates a network signal by boosting its energy. So,
it is also called as signal booster. It serves as a two-way relay station for
wireless radio signals. It is not physically connected to any part of the
network, instead it receives radio signals from APs, end-user device or
another repeater. Repeaters provide connectivity to remote areas that
normally would not have wireless network access. The wireless repeater
when placed appropriately fills the holes in the coverage thereby enabling
seamless roaming.
46
46
Introduction to Wireless
Networks
User Devices:
Users of wireless networks operate using host of devices like PCs, laptops,
PDAs, barcode scanners, patient monitoring devices etc. These devices are
commonly equipped with wireless connectivity because of their portable
nature. They may have specialized hardware also.
47
Wireless and Mobile
Technology
If a greater number of devices are added then it may affect the network
performance. In this type of network, the configuration of the network is
static and does not respond to changing network conditions. It’s a tough
job for a network administrator to manage an ad-hoc network as
disconnections of devices may happen more frequently. One more
limitation of this network is its inability to bridge to a wired LAN and to
access internet without special gateways.
As it does not need APs, it reduces the cost of setting it up. It can be a very
good backup option if centrally coordinated wireless network is
malfunctioning. This type of network is quite flexible as it can be set up
for unexpected meetings etc.
The IEEE 802.15 Working Group for Wireless Personal Area Networks
was formed to develop standards for short range wireless PANs. Devices
on a PAN may include portable and mobile devices like PCs, PDAs, cell
phones, pagers, and electronic devices. In case of Bluetooth, a Master
device initiates communications and polls all responding Slave devices for
data as and when needed. Here, the network is supposed to be plug-and-
play. So self-configuration and service discovery are the major issues. As
there is on base station or APs here, the devices have to discover one
another and also each other’s capabilities. This is achieved using specific
self-configuration mechanisms and service discovery protocols.
Mechanisms are also needed to authenticate devices to one another and
establish keys for encrypted communications.
50
50
Many different situations where WPAN is used are: Introduction to Wireless
Networks
Connection of peripheral devices: Peripheral devices like keyboard,
mouse, joystick, headset, speakers etc. are connected wirelessly to
PC/computer.
Support of ad-hoc networking: For e.g., few students may join a
lecture, with the teacher distributing data to their personal digital
assistants (PDAs). Wireless networks can support this type of
interaction as PDAs may have Bluetooth chips built-in them.
Bridging of networks: Mobile phone could have a Bluetooth chip.
This mobile phone can act as a bridge between local piconet (A
piconet is a collection of Bluetooth devices which are synchronized to
same hopping pattern) and a GSM network. For e.g., on arrival at an
airport, a person’s mobile phone could receive an e-mail via GSM and
the same can be forwarded to his laptop which is still in his bag.
Using a piconet, a fileserver can update information stored on a laptop
or PDA while the person is entering the office.
51
Wireless and Mobile
Technology
53
Wireless and Mobile 3.3.4 Wireless Wide Area Network (WWAN):
Technology
Wireless Wide Area Networks (WWAN) are wireless networks that cover
a very large geographical area like a state or a country. The wireless
connections between APs are usually point-to-point microwave links using
parabolic dishes using 2.4 GHz to 5.8 GHz bandwidth. Components of a
WWAN are base station gateways, access points and wireless bridging
relays.
A cellular telephone network is an example of a WWAN with
infrastructure mode. It also has by far the most complex architecture of all
wireless networks. WWAN services are typically delivered to smart
phones and other handheld devices sold by cellular service providers.
54
54
3.4 EXERCISES Introduction to Wireless
Networks
1. What is the primary purpose of having Access Points and Network
Adapters?
2. Compare Wired network with Wireless Network
3. Write a short on ISM bands.
4. What are the essential components that comprise a wireless network?
5. Write a short note on Ad-hoc network.
6. Discuss Infrastructure-based network in detail
7. Compare WPAN with WLAN
8. Compare WLAN with WWAN
9. Discuss WLAN along with their advantages and disadvantages.
*****
55
4
IEEE 802.11 & IEEE 802.16
Unit Structure
4.0 Objectives
4.1 Introduction to IEEE 802.11 standard
4.2 IEEE 802.11 System Architecture
4.3 IEEE 802.11 Protocol Architecture
4.4 IEEE 802.11 Medium Access Control Mechanisms
4.5 IEEE 802.11 MAC Frame Format
4.6 IEEE 801.11 MAC Management
4.7 Introduction to IEEE 802.16 standard
4.8 IEEE 802.16 Services
4.9 Amendments to IEEE 802.16 standard
4.10 Exercises
4.11 Additional References
4.0 OBJECTIVES
This chapter would make you understand the following concepts:
● Introduction to IEEE 802.11 standard.
● IEEE 802.11 System Architecture – Access Points, DS, BSS, ESS,
IBSS
● IEEE 802.11 Protocol Architecture – Physical Layer, Medium Access
Layer
● IEEE 802.11 Medium Access Control mechanisms - Basic
DFWMAC-DCF using CSMA/CA, DFWMAC-DCF with RTS/CTS
extension, DFWMAC-PCF with Polling
● IEEE 802.11 MAC Frame Format – Control Frames, Data Frames
● IEEE 802.11 MAC Management – Synchronization, Power
Management, Roaming, MIB
● Introduction to IEEE 802.16 standard
● IEEE 802.16 Services
● Amendments to IEEE 802.16 standard
56
IEEE 802.11 is the standard for wireless local area networks promoted by IEEE 802.11 & IEEE
Institute of Electrical and Electronics Engineers (IEEE). In 1990, a special 802.16
devoted IEEE 802.11 working group was formed to develop a MAC
protocol and physical medium specification. This technology can be used
to implement wireless ad hoc networks as well as wireless infrastructure
networks. This standard provides specifications for a simple and robust
WLAN which offers time-bounded and asynchronous services. The 2.4
GHz ISM band available in most parts of the world was chosen for the
original standard. The original standard has been enhanced to 802.11a
(54Mbps at 5 GHz) and 802.11b (most popular standard) for higher data
rates.
The given diagram shows two Basic Service Sets BSS1 and BSS2
connected via a distribution system. The AP functions as relay point or as
a bridge. If one station wants to communicate with another station in the
same BSS, a MAC frame is sent by the source station to AP which is then
forwarded by AP to destination station. Similarly, if a station wants to
communicate with a remote station, then a MAC frame is first sent from
local source station to AP which then relays it over distributed system on
57
Wireless and Mobile its way to remote destination. The DS handles data transfer between
Technology different APs. APs are responsible for synchronization within a BSS and
provide time-bounded service.
The Distribution System (DS) can be a switch, a wired network or a
wireless network. The DS connects multiple BSSs via the access points to
form a single large network thereby expanding the wireless coverage area.
This extended network now forms Extended Service Set (ESS). Each ESS
has its own ID (ESSID) which is the name of the network and it is used to
separate different networks. One requires the ESSID to access WLAN.
The distribution system connects the wireless networks via the access
points with a portal which forms the interworking unit to other LANs.
The below given diagram depicts the model of an ad-hoc wireless network
developed by IEEE 802.11 working group. This network is known as ‘ad-
hoc’ as it does not depend on a pre-existing infrastructure or APs as in
infrastructure-based wireless networks. Here there are independent BSSs
(IBSS). A single IBSS consists of a set of stations which use the same
radio frequency. The nodes within a single IBSS communicate with each
other directly (without any intervention of AP). We can create ad-hoc
networks in virtually any environment at any given time as it does not
need setting up any extra hardware.
58
58
Apart from the PHY and MAC layers, the standard also defines IEEE 802.11 & IEEE
Management layers and Station management. MAC Management controls 802.16
authentication mechanisms, encryption, synchronization of a station with
AP (association and re-association of a station to an AP and roaming
between various APs). The main job of PHY management is channel
tuning. Station management interacts with both management layers and
controls bridging and interaction with DS in case of AP.
61
Wireless and Mobile In this mechanism, collisions can occur when two stations start sending
Technology RTS simultaneously. This mechanism results in non-negligible overhead
leading to wastage of bandwidth and higher delays.
62
62
The problem with this method is overhead when the nodes have nothing to IEEE 802.11 & IEEE
transmit, but the AP polls them permanently. 802.16
The Transmitter Address (TA) and Receiver Address (RA) are the MAC
addresses of the stations connected to the BSS (Basic Service Set) that are
sending and receiving data over WLAN. The Basic Service Set ID
(BSSID) identifies the WLAN over which the frame is transmitted. The
Source Address (SA) and Destination Address (DA) are the MAC
addresses of stations, that are the final source and destination of the frame
being transmitted. The SA may be identical to TA and DA may be
identical to RA.
65
Wireless and Mobile Control Frames:
Technology
Control frames help in reliable delivery of the packets. There are 6 control
frames defined in this standard. They are as follows –
PS Poll (Power Save Poll):
This frame is sent by any station which was in power saving mode to AP.
Its sole purpose is to request AP to transmit frame that was buffered for
this station while the station was in sleep mode.
ACK (Acknowledgement):
ACK frame is used to acknowledge the error-free reception of a data,
management or PS Poll frame.
CF End + CF ACK:
This frame acknowledges CF End frame. This frame releases the stations
from the restrictions associated with Contention Free period.
Data Frames:
The four data carrying frames are:
● Data: This is the simplest data frame which carries data in contention
as well as contention free period.
● Data + CF ACK: This frame is sent only during the contention free
period. It carries data and acknowledgement of the previously
received data.
● Data + CF Poll: This frame is used by the point coordinator to
deliver data to a station and also to request the station to send the
buffered data frame.
66
66
● Data + CF ACK + CF Poll: This frame combines the functionality of IEEE 802.11 & IEEE
Data, CF ACK and CF poll frames into a single frame. 802.16
Synchronization:
This covers functions regarding synchronization of internal clocks, finding
a WLAN, generating beacon signals etc. Each node in wireless network
maintains an internal clock. Synchronization of these clocks needed for
power management and coordination of PCF. Within a BSS, timing is
conveyed by regularly transmitting a beacon frame. A beacon frame
contains a timestamp and information used for power management and
identification of BSS. The timestamp in beacon is used to stay
synchronized. In infrastructure-based networks AP sends the beacon
frame. The timestamp always reflects the real transmit time, not the
scheduled time. For ad-hoc networks, in the absence of AP, each station
maintains its own synchronization timer and transmits beacon frame after
the beacon interval.
Power Management:
This covers functions related to power conservation as wireless devices
are mostly battery powered. Power saving mechanisms involves two states
for a station – sleep and active/awake. If a source wants to communicate
with a sleeping receiver station, then it has to buffer the data. The sleeping
station should become active periodically and stay active for a certain time
period. During this time period, all source stations can announce the
destinations of the buffered frames. In infrastructure-based networks, the
AP buffers all the frames destined for sleeping destinations. In ad-hoc
networks, as there is no AP to buffer the frames, each station needs the
ability to buffer data if it wants to communicate with a sleeping station.
Roaming:
This covers functions regarding joining a network, changing APs and
scanning for APs. Roaming is nothing but moving between various APs
with uninterrupted service. If a station experiences poor quality link to its
AP, then the station starts scanning for another AP. Scanning can be
Passive or Active. Scanning involves searching for another new BSS. The
station then chooses the best AP for roaming (based on features like signal
strength etc) and sends an association request to the chosen AP. The new
AP responds by sending association response. If the response is successful
then the station gets associated with new AP otherwise it continues
scanning for new APs. The new AP (which responded positively) now
informs DS about the new station in its BSS. The DS then updates the
location of the station in its database. DS can also notify the old AP
regarding the change.
67
Wireless and Mobile Management Information Base (MIB):
Technology
Information regarding current state of a wireless station and AP are stored
within a MIB for internal and external access. Access to MIB can be done
using standard protocols like Simple Network Management Protocol
(SNMP).
● Transit delay: This is delay between SNI and BNI. It includes the
MAC delay combined with the processing at the MAC layer for
preparing transmission from STS or BTS and at the MAC layer for
reception at STS or BTS.
68
68
● End-to-End delay: The total delay between a subscriber terminal to IEEE 802.11 & IEEE
the ultimate service beyond the core network. This also includes 802.16
transit delay.
802.16f:
This was published as the first amendment to 802.16 standard at the end of
year 2005. It defines a Management Information Base (MIB) for the MAC
and PHY layers and associated management procedures. This provides a
means for a Service Flow Database containing current service flow and
quality of service (QoS) information to be transmitted to base stations and
subscriber stations when a new subscriber station enters into a base station
network. The addition of this functionality allows for meshed and multi-
hop networking to be used.
802.16e:
This was published as the second amendment to 802.16 standard in
January 2006. It addressed PHY and MAC layers for fixed and mobile
wireless operations in the licensed radio bands. It provides a means for
higher layer handover between base stations thereby providing better
support for mobile substations.
69
Wireless and Mobile There are multiple proposed amendments to 802.16 standard that are still
Technology in development. All these are seeking to improve various aspects of the
existing standard.
4.10 EXERCISES
1. Explain in brief what is IEEE 802.11 standard?
2. Explain the terms Access Points, Distribution System, Basic Service
Set, Extended Service Set and Independent BSS in detail.
3. What is the ad-hoc model developed by IEEE 802.11 working group?
4. Explain the Physical and MAC layer in the protocol stack of IEEE
802.11 standard.
5. Compare DCF with PCF
6. Explain the Distributed Foundation Wireless Medium Access Control
mechanisms in brief.
7. Explain the Frame Control field in detail.
8. What are the various types of Control Frames defined in this
standard?
9. Write a short note on MAC management.
10. Explain the different categories of delay w.r.t IEEE 802.16.
11. What are the various services provided by 802.16 standard?
12. What are the various ongoing research projects taken up by IEEE to
improve the various aspects of 802.16 standard?
4.11 ADDITIONAL REFERENCES
● 802.11 Wireless Networks The Definitive Guide by Matthew Gast –
Oreily Publications
● Wireless Networking – Introduction to Bluetooth and WiFi by
Gordon Colbach
● WiMAX Forum – An industry group promoting the interoperability of
802.16 products
● www.tutorialspoint.com/the-802-16-architecture
*****
70
70
5
BLUETOOTH
Unit Structure
5.0 Objectives
5.1 Introduction to Bluetooth standard
5.2 Bluetooth Network
5.3 Bluetooth Protocol Architecture
5.4 Bluetooth Device
5.5 Bluetooth Packet Format
5.6 Bluetooth Services
5.7 Future of Bluetooth Technology
5.8 Exercises
5.9 Additional References
5.0 OBJECTIVES
This chapter would make you understand the following concepts:
● Introduction to Bluetooth standard, History of Bluetooth, Bluetooth
standard documents
● Bluetooth Network, Bluetooth state transition, Connected State
● Bluetooth Protocol Architecture - Core protocols, Cable replacement
protocols, telephony control protocols and adopted protocols
● Bluetooth Device – SCO link and ACL link.
● Bluetooth Packet Format – Access Code, Packet Header, Payload
● Popular Bluetooth Services
● Future enhancements in Bluetooth technology
72
the same frequency range, as this technology provides us with a Bluetooth
robust link.
● Data or Voice: We can use this technology for data as well as voice
communication simultaneously.
● Range: Bluetooth is based on short-range radio transmission. The
normal range of Bluetooth radio is 10 meters but it can be extended to
100 meters with an optional amplifier.
● Bandwidth: A Bluetooth radio link has a maximum data transfer of
724 kbit/s. Data rate for voice channel is 64 kbit/s.
● Security: Authentication and Encryption ensure high level of
security. Link privacy is maintained and eavesdropping is prevented.
73
Wireless and Mobile The below given diagram shows a simple Bluetooth piconet:
Technology
Two piconets cannot have same master as then both piconets will have
same hopping pattern. Communication between various piconets takes
place by devices jumping back and forth between these piconets. Note that
scatternets are not yet supported by all devices.
The advantage of the piconet/scatternet scheme is that it allows multiple
devices to share and use the same physical area and make efficient use of
bandwidth.
75
Wireless and Mobile ● Inquiry Response: A device which had earlier issued inquiry
Technology receives an inquiry response.
Connected State:
Once the slave is in Connected state, it can be in one of the following
modes:
● Active: The slave actively participates in the piconet by listening,
transmitting and receiving packets. For maintaining synchronization,
the master periodically transmits to the slaves.
● Sniff: The slave listens (sniffs) only on specified slots for its
messages. It remains in reduced power status for the rest of the
duration thereby reducing its duty cycle. The sniff interval is
negotiated between master and slave.
● Hold: Here the device is in reduced power status. It does not support
ACL packets, supports only SCO packets. During periods of no
activity, the device is free to engage in another piconet exchanges.
● Park: In this mode, the device is still synchronized with the piconet
but does not participate in the traffic. It is a low power mode with
very little to no activity. Parked devices give up their active member
address (MAC address) and are given a parking member address.
76
between two hops is called as slot which is of 625µs. Each slot uses a Bluetooth
different frequency. This bandwidth is sufficient to define 79 1MHz
physical channels. Modulation for Bluetooth is Gaussian FSK with a
binary one represented by a positive frequency deviation and binary zero
represented by a negative frequency deviation from the center frequency.
The minimum deviation is 115kHz. Bluetooth transceivers are available in
3 classes:
● Class 1: Maximum power is 100mW and minimum is 1mW. Power
control is mandatory. Designed for long range (approx. 100m)
● Class 2: Maximum power is 2.5mW, nominal power is 1mW and
minimum power is 0.25mW. Power control is optional. Designed for
ordinary range (approx. 10m)
● Class 3: Maximum power is 1mW.
2. Baseband:
This layer manages connection establishment within a piconet apart from
other services like addressing, packet formatting, timing and power
control. This layer specifications are the most complex of the Bluetooth
documents.
Core Protocols:
SDP – Service Discovery Protocol
L2CAP – Logical Link Control and Adaption Protocol
LMP – Link Manager Protocol
Adopted Protocols:
IP – Internet Protocol
vCard/vCal – Virtual Card/ Virtual Calendar
OBEX – Object Exchange Protocol
WAE – Wireless Application Environment
WAP – Wireless Application Protocol
UDP – User Datagram Protocol
TCP – Transmission Control Protocol
PPP – Point-to-Point Protocol
78
5.4 BLUETOOTH DEVICE Bluetooth
There are two types of physical links that can be established between
Bluetooth devices – a synchronous connection-oriented (SCO) link and an
asynchronous connection-less (ACL) link.
79
Wireless and Mobile Asynchronous Connection-less (ACL) link:
Technology
This is a connection between master and all slaves participating in the
piconet. An ACL channel supports point-to-multipoint transmissions from
master to slaves.
It consists of 3 fields:
● Access Code: This field is used for timing synchronization, piconet
identification, offset compensation, paging and enquiry.
● Header: This field is used to determine the type of the packet. It also
carries protocol control information.
● Payload: Using this field data (or voice) of maximum 343 bytes can
be sent. The structure of this field depends on the link type. It also
contains payload header in most cases.
80
Access Code: Bluetooth
Packet Header:
The header consists of following 6 subfields:
● AM Address: This 3-bit subfield stands for Active Member Address.
It consists of the active address of the slave. Active address is the
temporary address assigned to a slave in a piconet. When a master
sends a packet to a specific slave then this subfield represents the
destination slave address. When a slave sends a packet to the master
then this subfield represents address of the source slave. This subfield
consists of value 0 when master broadcasts the packet to all slaves in
a piconet.
● Type: This 4-bit subfield determines the type of the packet.
81
Wireless and Mobile Type Physical Name No. of Description
Technology Link slots
0000 Common NUL 1 Has no payload. Used to return link
L information to the source regarding the
success of previous transmission ARQN
0001 Common POLL 1 Has no payload. Used by master to poll a
slave.
0010 Common FHS 1 Special control packet for exposing device
address and the sender’s clock.
0011 Common DM1 1 Supports control messages and can carry
user data.
0101 SCO HV1 1 Carries 10 bytes of information. Used
mainly for 64kbps voice.
0110 SCO HV2 1 Carries 20 bytes of information. Used
mainly for 64kbps voice.
0111 SCO HV3 1 Carries 30 bytes of information. Used
mainly for 64kbps voice.
1000 SCO DV 1 Combined data (150 bits) + voice (50 bits)
packet
0100 ACL DH1 1 Carries 28 bytes of information + 16-bit
CRC. Used for high-speed data.
1001 ACL AUX 1 Carries 30 bytes of information. Used for
1 high-speed data.
1010 ACL DM3 3 Carries 123 bytes of information + 16-bit
CRC
1011 ACL DH3 3 Carries 185 bytes of information + 16-bit
CRC
1110 ACL DM5 5 Carries 226 bytes of information + 16-bit
CRC
1111 ACL DH5 5 Carries 341 bytes of information + 16-bit
CRC
The packet can carry up to 343 bytes of payload. The format of payload
depends on the type of the link. For voice payloads, no header is defined.
Header is defined for all ACL packets and SCO DV packet. For data
payloads, this field consists of 3 sections:
● Payload Header: For single-slot packets, a 8-bit header is defined
whereas for multi-slot packets 16-bit header is defined.
● Payload Body: Contains user data.
● CRC: 16-bit CRC is used on all data payloads except AUX1 packet.
83
Wireless and Mobile ● Cordless Desktop: Most of the peripheral devices like mouse,
Technology keyboard, printer, speakers etc. are connected to PC cordlessly using
Bluetooth.
84
Bluetooth Long Range: Bluetooth
The LE Coded PHY multiples the range that can be achieved between LE
devices as compared to original LE 1M PHY. It allows whole home or
building coverage. The LE Coded PHY increases the achievable range
without increasing the transmit power and allows data recovery at the
receiver’s end without the need for retransmission.
5.8 EXERCISES
1. What is Bluetooth SIG?
13. What are the two types of links that can be established between
Bluetooth devices?
85
Wireless and Mobile 20. Under what frequency range does Bluetooth work?
Technology
21. Do Bluetooth devices need line-of-sight link to connect one device to
another?
*****
86
MODULE III
6
PRINCIPLES OF CELLULAR NETWORK
Unit Structure
6.0 Objectives
6.1 Introduction
6.2 Principles of Cellular Network
6.2.1 Cellular Network Organization
6.2.2 Frequency Reuse
6.2.3 Increasing Capacity
6.2.4 Operation of cellular System
6.2.5 Mobile Radio Propagation Effects
6.2.6 Handoff
6.2.6.1Types of Handoffs
6.2.6.2 Handoff Initiation
6.2.6.3 Power control
6.2.6.4 Effect of Handoff
6.3 Summary
6.4 Questions
6.5 References
6.0 OBJECTIVES
This chapter would make you understand the following concept:
What is Cellular Technology
Organizations of cellular Network
Shapes of cell
Importance of Frequency reuse
Ways to increase capacity of the cellular system
Operation of cellular network
Handoff
Effects of Handoff
6.1 INTRODUCTION
Cellular technology is the basis of mobile wireless communications. It
is a basic technology for mobile phones, personal communication
87
Wireless and Mobile systems, wireless internet and wireless Web applications, and much
Technology more.
All the base stations are connected to Mobile Switching Center which
connects cells to wide area network.
Combined FDMA/TDMA:
It divide spectrum in frequency channel and divide each channel into time
slots.
However, cells that are far away from each other can use the same
frequency range.
Shapes of Cell:
Square:
The first shape of the cells to cover an area is a matrix of square cells.
A square cell has four neighbors at distance d and four at distance √2d
where d is the width of a square cell as shown in fig 6.2.1(a).
Hexagon:
For a cell radius R, the distance between the cell center and each
adjacent cell center is d = √3R.
89
Wireless and Mobile
Technology
Because of this the same frequency range can be used for multiple
simultaneous conversations in different cells.
=
This can also be expressed as D/d = .
For these various patterns of frequency reuse are possible as shown in the
figure 6.2.2.
If the pattern consists of N cells and each cell is assigned the same number
of frequencies then each cell can have K/N frequencies, where K is the
total number of frequencies allotted to the system.
For AMPS (Advanced Mobile Phone System), K = 395, and N = 7 is the
smallest pattern that can provide sufficient isolation between two uses of
the same frequency. This implies that there can be at most 57 frequencies
per cell on average
91
Wireless and Mobile
Technology
Some of the approaches that have been used to increase the capacity
of the system are as follows:
1. Adding new channels: Typically, when a system is set up in a region,
not all of the channels are used. Therefore, growth and expansion can
be managed in an orderly fashion by adding new channels.
2. Frequency borrowing: In the simplest case, frequencies are taken
from adjacent cells by congested cells. The frequencies can also be
assigned to cells dynamically.
3. Cell splitting: The cell within a crowded area is subdivided into
smaller cells with new cell radius which is less than the previous one.
It requires a new base station and corresponding antenna with lower
height and lower transmitting power. This method is basically
addition of new cells to meet the additional need for coverage.
Generally, the original cells are about 6.5 to 13 km in size. The
smaller cells can themselves be split; however, l.5-km cells are close
to the practical minimum size as a general solution. Cell splitting is a
costly method due to the requirements of installation of towers and
antennas. The subdivision of large cells into small cells indicates that
the frequency reuse distance becomes smaller and the number of
channels within the same geographic area is increased providing large
system capacity. But smaller cells also require hand-off for moving
users that required large amount of signalling information to be used
92
92
and the overall spectral efficiency will be reduced. In the context of Principles of Cellular
cell splitting, the smallest cell is known as pico-cell, the medium size Network
cell is the micro-cell and the original large cell without splitting is
called the macro-cell.
Figure 6.2.3 indicates schematically how cells can be divided to provide
more capacity.
The controller is used to handle the call process between the mobile
unit and the rest of the network.
It assigns voice channel and performs handoffs and monitors calls for
billing information.
Two types of channels are available between mobile station and base
station
1. Control channels: This channel is used to exchanged
information regarding setting up and maintaining calls.
2. Traffic channels: This channel is used to carry voice or data
connection between user.
Both voice and control channels are further divided into forward
/downlink and reverse/uplink channels.
Other Functions:
1. Call blocking: On mobile-initiated call stage, if all the traffic
channels are busy, the mobile tries again and again. After numeral
retries, a busy tone will be returned.
2. Call termination: The User will hang up, MTSO is informed and the
traffic channels at two BSs are released.
95
Wireless and Mobile 3. Call drop: If the BS cannot maintain a required signal strength, then
Technology call drop will occur and the traffic channel is dropped and MTSO
informed.
4. Calls to/from fixed and remote mobile subscriber: Here the MTSO
connects to PSTN and can connect to mobile user and fixed
subscriber via PSTN. MTSO can also connect to remote MTSO via
PSTN or via dedicated line.
1. Signal strength:
The strength of the signal between the base station and the mobile
unit must be strong enough to maintain signal quality at the
receiver but not so strong as to create too much cochannel
interference with channels in another cell using the same frequency
band.
Fading:
6.2.6 Handoff:
As the mobile unit moves from one cell to another there is a need of
changing the assignment of a mobile unit from one BS to another, this
procedure is called as handoff.
96
96
Principles of Cellular
Network
Handoff delay: The distance the mobile unit moves from the point at
which the handoff should occur to the point at which it does occur.
97
Wireless and Mobile 6.2.6.1Types of Handoffs:
Technology
There are two types of handoffs:
1. Hard Handoff:
The radio links from the mobile station to the existing cell is broken
before establishing a link with the next cell.
2. Soft Handoff:
In soft handoff, at least one of the links is kept when radio links are
added and removed to the mobile station.
98
98
Principles of Cellular
Network
The mobile unit is handed off from Base station A to Base Station
B when the signal strength at B first exceeds that at A.
99
Wireless and Mobile 2. Relative signal strength with threshold:
Technology
This method allows a Mobile unit to hand off only if the current
signal is sufficiently weak that is current signal is less than
threshold and the other signal is the stronger of the two.
If the threshold is higher than this value, say T1, this scheme
performs exactly like the relative signal strength scheme, so the
handoff occurs at position A.
If the threshold is lower than this value, say T2, the Mobile unit
would delay handoff until the current signal level crosses the
threshold at position B.
In the case of T3, the delay may be so long that the Mobile unit
drifts too far into the new cell. This reduces the quality of the
communication link from BS1 and may result in a dropped call.
The only disadvantage of this scheme is that the first handoff may
still be unnecessary if BS A still has sufficient signal strength.
100
100
4. Relative signal strength with hysteresis and threshold: Principles of Cellular
Network
Handoff occurs only if the current signal level drops below a
threshold, and if the target base station is stronger than the current
one by a hysteresis margin H.
5. Prediction techniques:
101
Wireless and Mobile
Technology
The arrival rate of calls at a cell has two components: new calls
placed by mobile units in the cell (λ1) and calls handed off to the
cell for mobile units entering the cell while connected(λ2)
6.3 SUMMARY
Cellular technology is the basis of mobile wireless communications.
As the mobile unit moves from one cell to another there is a need of
changing the assignment of a mobile unit from one BS to another, this
procedure is called as handoff.
There are two types of hand off: Hard handoff and soft handoff.
6.4 QUESTIONS
1. What geometric shape is used in cellular system design?
2. Explain the frequency reuse in the context of a cellular network?
3. List five ways of increasing the capacity of a cellular system.
4. Explain the operation of cellular system.
5. Explain the difference between hard and soft handoff.
6. Explain the various situation in which hand off takes place.
6.5 REFERENCES
Wireless communications and networks second edition by william
stallings
Tutorialspoint.com
*****
103
7
GENERATION OF CELLULAR NETWORK
Unit Structure
7.0 Objective
7.1 Introduction
7.2 1G – First Generation
7.2.1 Overview of AMPS: Spectral Allocation
7.2.2 Operation of AMPS
7.3 2-G Second Generation
7.3.1 Key Difference between First- and Second-Generation Cellular
System
7.3.2 key characteristics of three most important second-generation
system: GSM, IS-136 and IS - 95
7.3.3 Time Division Multiple Access (TDMA)
7.3.4 Global System for Mobile Communication (GSM)
7.3.4.1 GSM Network Architecture
7.3.5 CDMA – Second Generation
7.3.6 IS-95
7.4 2.5-G (2.5 Generation)
7.4.1 High Speed Circuit Switched Data (HSCSD)
7.4.2 General Packet Radio Service (GPRS)
7.4.3 Enhanced Data rates for Global Evolution (EDGE)
7.5 Third Generation System (3G)
7.5.1 CDMA2000 1x EV-DO
7.6 Fourth Generation
7.7 Fifth Generation (5G)
7.8 Summary
7.9 Question
7.10 References
7.0 OBJECTIVE
This chapter would make you understand the following concept:
● Evolution of cellular technology from 1G to 5G.
● Key difference between first generation and second generation of
cellular network
● TDMA and CDMA
● GSM and IS -95
104
● Third generation Generation of Cellular
Network
● Fourth generation
● Fifth generation
7.1 INTRODUCTION
● The aim of wireless communication is to provide high quality, reliable
communication just like wired communication and each new
generation of services represents a big step in that direction.
● This evolution journey was started in 1980 from 1G and it is still
continuing to 5G.
● Each of the Generations has its own standards that must be met.
● We required cellular network every day from minute to minute to
fulfil our need for information.
● The cellular network is required to provides connectivity and
flexibility to our general operation.
105
Wireless and Mobile ● Each of these bands is split into two to inspire competition between
Technology two operators.
● An operator is allocated only 12.5 MHz in each direction for its
system.
● The channels are spaced 30 kHz apart.
● The total of 416 channels per operator is allocated. Out of this, 395
channels are allocated to carry calls and 21 are allocated for control.
● The control channels are data channels operating at 10 kbps. The
conversation channels carry the conversations in analog using
frequency modulation.
● Control information is also sent on the conversation channels in bursts
as data.
● This number of channels is not enough for most major markets, so
some way must be found either to use less bandwidth per
conversation or to reuse frequencies.
● For AMPS, frequency reuse is used.
The following table shows the AMPS Parameter
107
Wireless and Mobile 2. Encryption:
Technology
● It is a relatively simple to encrypt all of the traffic to prevent
eavesdropping in second generation system as all of the user traffic as
well as control traffic is digitized.
● All second-generation systems provide this capability whereas first-
generation systems send user traffic in the clear, providing no
security.
4. Channel access:
● In first-generation systems, each cell supports a number of channels.
At any given time, a channel is allocated to only one user.
● Second generation systems also provide multiple channels per cell,
but each channel is dynamically shared by a number of users using
time division multiple access (TDMA) or code division multiple
access (CDMA).
7.3.2 key characteristics of three most important second-generation
system: GSM, IS-136 and IS – 95:
Beginning around 1990, a number of different second-generation systems
have been organized. Following are the lists of some key characteristics of
three of the most important of second-generation systems.
Characteristics GSM IS-136 IS -95
Year introduced 1990 1991 1993
Access method TDMA TDMA CDMA
Base station transmission 935 to 960 869 to 894 869 to 894 MHz
band MHz MHz
Mobile station transmission 890 to 915 824 to 849 824 to 849 MHz
band MHz MHz
Spacing between forward and 45 MHz 45 MHz 45 MHz
reverse channel
Channel Bandwidth 200 kHz 30 kHz 1250 kHz
Number of duplex channels 125 832 20
Mobile Unit maximum 20W 3W 0.2W
power
Users per channel 8 3 35
Modulation GMSK π/4 DQPSK QPSK
Carrier bit rate 270.8 kbps 48.6kbps 9.6 kbps
Speech coder RPE – LTP VSELP QCELP
Speech coding bit rate 13 kbps 8 kbps 8,4,2,1 kbps
Frame size 4.6 ms 40 ms 20 ms
108
108
Error control coding Convolution Convolution Convolutional 1/2 Generation of Cellular
al ½ rate al 1/2 rate rate forward; Network
1/3 rate reverse
109
Wireless and Mobile
Technology
1. Mobile Station:
● A mobile station communicates with a base station transceiver in the
same cell in which the mobile unit is located through the Um
interface, also known as the air interface.
● The mobile equipment (ME) refers to the physical terminal, such as a
telephone or PCS (personal communications service) device, which
includes the radio transceiver, digital signal processors, and the
subscriber identity module (SIM).
● The SIM is a portable device in the form of a smart card or plug-in
module that stores the subscriber's identification number,
● The SIM provides personal mobility so that the user can have access
to all subscribed services irrespective of both the location of the
terminal and the use of a specific terminal. You need to insert the SIM
card into another GSM cellular phone to receive calls at that phone,
make calls from that phone, or receive other subscribed services.
110
110
● Each BTS has between 1 and 16 transceivers, depending on the Generation of Cellular
density of users in the cell. Network
● The BSC manages the radio resources for one or more BTSs. It
handles radio channel setup, frequency hopping, and handovers.
● The BSC is the connection between the mobile and the MSC. The
BSC also translates the 13 Kbps voice channel used over the radio
link to the standard 64 Kbps channel used by the Public Switched
Telephone Network (PSDN) or ISDN.
● It assigns and releases frequencies and time slots for the MS. The
BSC also handles intercell handover.
● The function of the BSC is to allocate the necessary time slots
between the BTS and the MSC
3. Network Subsystem:
● The network subsystem (NS) provides the link between the cellular
network and the public switched telecommunications networks.
● The NS controls handoffs between cells in different BSSs,
authenticates users and validates their accounts, and includes
functions for enabling worldwide roaming of mobile users.
● The operations and maintenance center (OMC) is connected to all
equipment in the switching system and to the BSC. The
implementation of OMC is called the operation and support system
(OSS).
● The central element of the NS is the mobile switching center (MSC).
● MSC is supported by four databases that it controls:
2. Multipath resistance:
In addition to the ability of DS-SS to overcome multipath fading by
frequency diversity, the chipping codes used for CDMA not only exhibit
low cross correlation but also low autocorrelation. Therefore, a version of
the signal that is delayed by more than one chip interval does not interfere
with the dominant signal as much as in other multipath environments.
3. Privacy:
Because spread spectrum is obtained by the use of noise like signals,
where each user has a unique code, privacy is inherent.
112
112
4. Graceful degradation: Generation of Cellular
Network
With FDMA or TDMA, a fixed number of users can access the system
simultaneously. However, with CDMA, as more users access the system
simultaneously, the noise level and hence the error rate increases; only
gradually does the system degrade to the point of an unacceptable error
rate.
2. Near-far problem:
Signals closer to the receiver are received with less tempering than signals
farther away. Given the lack of complete orthogonality, the transmissions
from the more remote mobile units may be more difficult to recover. Thus,
power control techniques are very important in a CDMA system.
3. Soft handoff:
A smooth handoff from one cell to the next requires that the mobile unit
acquires the new cell before it gives up the old cell. This is referred to as a
soft handoff and is more complex than the hard handoff used in FDMA
and TDMA schemes.
7.3.6 IS-95:
● The most widely used second-generation CDMA scheme is IS-95,
which is largely deployed in North America.
● Some key parameters of the IS-95 system are shown in section 7.3.2.
● The transmission structures on the forward and reverse links differ
and are described below.
114
114
● 2.5G provides some of the benefits of 3G and can use some of the Generation of Cellular
existing 2G infrastructure in GSM and CDMA networks. Network
Mission-critical communications:
5G can enable new services that can transform industries with ultra-
reliable, available, low-latency links like remote control of critical
infrastructure, vehicles, and medical procedures.
119
Wireless and Mobile Massive IoT:
Technology
5G is meant to seamlessly connect a massive number of embedded sensors
in virtually everything through the ability to scale down in data rates,
power, and mobility—providing extremely lean and low-cost connectivity
solutions.
7.8 SUMMARY
● The cellular network is required to provides connectivity and
flexibility to our general operation.
● The evolution journey of cellular network was started in 1980 from
1G and it is still continuing to 5G.
● In the early 1980’s, the Advanced Mobile Phone Service (AMPS) was
the most common first-generation system that has been developed by
AT&T.
● First-generation cellular systems provide for the support of multiple
users with frequency division multiple access (FDMA).
● Two 25-MHz bands are allocated to AMPS.
● The main difference between the two mobile telephone systems that is
1G and 2G is that the radio signals used by 1G network are analog,
while 2G networks are digital.
● The three most important second generation system are: GSM, IS –
136 , IS-95.
● TDMA enables multiple users to share the same frequency by
dividing each cellular channel into different time slots.
● GSM network consist of Mobile unit, Base station substation and
Network subsystem.
● Code division multiple access (CDMA) is a spread spectrum-based
technique for multiplexing that provides an alternative to TDMA for
second generation cellular network.
● The most widely used second-generation CDMA scheme is IS-95,
which is largely deployed in North America.
● 2.5G describes the state of wireless technology and capability usually
associated with General Packet Radio Services (GPRS) that is
between the second and third generations of wireless technology.
● The first 3G wireless system to be deployed commercially is known
as CDMA2000 1x EV-DO, also known as CDMA/HDR (CDMA high
data rate) and as IS-856.
● 4G provides an all-IP packet switched network for transmission of
voice, data, signals and multimedia.
120
120
● 5G wireless technology is intended to deliver higher multi-Gbps peak Generation of Cellular
data speeds, ultra-low latency, more reliability, massive network Network
capacity, increased availability, and a more uniform user experience
to more users.
7.9 QUESTION
1. What are the key differences between first- and second-generation
cellular systems?
2. What are the advantages of using CDMA for a cellular network?
3. What are the disadvantages of using CDMA for a cellular network?
4. What are some key characteristics that distinguish third-generation
cellular systems from second-generation cellular systems?
5. Explain GSM architecture in detail.
6. Explain 5G of cellular system.
7.10 REFERENCES
● Wireless Communications and Networks Second Edition by William
Stallings
● http://net-informations.com/
● tutorialspoint.com
● www.qualcomm.com
*****
121
MODULE IV
8
MOBILE COMMUNICATION SYSTEMS
GSM
Unit Structure
8.0 Objectives
8.1 Introduction
8.2 GSM – Architecture
8.2.1 Radio subsystem
8.2.2 Network and Switching subsystem
8.2.3 Operation subsystem
8.3 Air Interface
8.4 Multiple Access Scheme
8.4.1 Multiple Access Techniques
8.4.2 Frequency Division Multiple Access (FDMA)
8.4.3 Time Division Multiple Access (TDMA)
8.4.4 Code Division Multiple Access (CDMA)
8.4.5 Space Division Multiple Access (SDMA)
8.4.6 Spread Spectrum Multiple Access
8.5 Localization and Calling
8.6 Protocol Signalling
8.7 Handover
8.7.1 Types of Handover
8.7.2 Situations for triggering handoff
8.7.3 Mobile assisted handoff
8.8 Security
8.8.1 Authentication
8.8.2 Encryption
8.9 GPRS – Architecture
8.9.1 Introduction to GPRS architecture
8.9.2 What is GPRS architecture?
8.9.3 Components of GPRS architecture
8.9.4 Advantages of GPRS architecture
8.10 GPRS signalling
8.10.1 Between MS and SGSN
8.10.2 Between two GSNs
8.11 Mobility management
8.11.1 Active state
122
8.11.2 Standby state Mobile Communication
8.11.3 Idle state Systems GSM
8.0 OBJECTIVES
● To understand the concept of GSM and how it is utilised for voice
traffic
● To gain insight about the multiple access techniques and its utilization
● To understand different security, authentication and encryption
techniques
8.1 INTRODUCTION
Digital cellular networks are the fastest-growing part of the market for
mobile and wireless devices. They are wireless extensions of standard
PSTN or ISDN networks, allowing for smooth roaming within the same
country or even globally. These systems are mostly utilised for voice
traffic nowadays. However, because data traffic is always increasing, this
chapter discusses many wireless data transfer strategies using cellular
systems.
The following are the global market figures for cellular networks (GSM
Association, 2002). GSM is the most widely used digital system,
accounting for over 70% of the market. The analogue AMPS system still
has 3% of the market, while the Japanese PDC has 5%. (60 million users).
The rest is split between CDMA (12%) and TDMA (10%) systems, as
well as other technologies. Nearly everyone in Europe (about 370 million
people) uses the digital GSM system, with almost no analogue systems
remaining. In the United States and several other countries that have
absorbed US technology, the situation is different (e.g., South Korea,
Canada). With 107 million TDMA, 135 million CDMA, and just 16
million GSM users (North America only), the digital market is divided
into TDMA, CDMA, and GSM systems. While Europe has only one
digital system, the US market is fragmented into numerous. This causes
serious coverage and service availability issues, and is an example of how
market forces failed to deliver better services (compared to the common
standard in Europe).
The figure below depicts the global number of subscribers to various
mobile phone technology (GSM Association, 2002). The illustration mixes
various versions of the same technology (e.g., GSM working on 900,
1,800, and 1,900 MHz). The graph's two upper lines depict the total
number of users and 1998 predictions. It's interesting to note that no one
predicted mobile communication technology's enormous success. The 123
Wireless and Mobile graph also demonstrates that analogue systems are no longer in use, with
Technology GSM dominating the present market. Second generation systems include
GSM, TDMA, CDMA, and PDC. It's worth noting that mobile phones are
now used by more people than landlines! In March 2002, the graphs of
mobile and fixed users crossed.
126
126
Authentication Centre (AuC): Mobile Communication
Systems GSM
Because the radio interface and mobile stations are particularly vulnerable,
a separate authentication centre (AuC) has been established to protect user
identity and data transmission. The AuC contains the authentication
methods as well as the encryption keys, and it generates the values
required for user authentication in the HLR. The AuC might be located in
a designated protected area within the HLR.
The TDM used is also shown in the figure. A GSM TDMA frame
separates each of the 248 channels in time, i.e., each 200 kHz carrier is
subdivided into frames that are repeated constantly. A frame lasts 4.615
milliseconds. A frame is split into 8 GSM time slots, each of which
represents a physical TDM channel and lasts 577 seconds. Every 4.615
ms, each TDM channel occupies the 200 kHz carrier for 577 seconds.
127
Wireless and Mobile
Technology
Narrowband systems:
Narrow band systems operate with channels that are significantly narrower
than the coherence bandwidth. Narrow band TDMA allows users to share
the same channel but assigns each user a distinct time slot, allowing a
small number of users to be separated in time on a single channel.
Wideband systems:
In wideband systems, a single channel's transmission bandwidth is
substantially wider than the channel's coherence bandwidth. As a result,
129
Wireless and Mobile multipath fading has a minor impact on the received signal in a wideband
Technology channel, and frequency selective fades only occur in a limited portion of
the signal bandwidth.
132
132
● Mobile station roaming number (MSRN): MSRN is another Mobile Communication
temporary address that hides a subscriber's identity and location. This Systems GSM
address is generated by the VLR in response to a request from the
MSC, and it is also kept in the HLR. The current visitor country code
(VCC), the visitor national destination code (VNDC), the current
MSC's identifier, and the subscriber number are all contained in the
MSRN. The MSRN assists the HLR in locating an incoming call
subscriber.
134
134
Mobile Communication
Systems GSM
8.7 HANDOVER
Handover or handoff refers to the procedure of transferring ongoing call or
data connectivity from one Base Station to another in cellular
telecommunications. When a phone goes to a different cell while a call is
in progress, the MSC (Mobile Switching Center) transfers the call to a
new channel associated with the new Base Station.
137
Wireless and Mobile When a mobile user A moves from one cell to another, the signal strength
Technology of BSC 1 decreases while the signal strength of BSC 2 improves, allowing
the mobile user to continue making calls or accessing data without
interruption.
2] Soft handoff:
When radio signals are added or removed from the Base Station, at least
one of the links is retained in Soft Handoff. The 'make before break'
principle was implemented by Soft Handoff. Hard Handoff is more
expensive than Soft Handoff.
● Each cell has a specified capacity, which means it can only serve a
certain number of subscribers. A handoff occurs when the number of
users using a particular cell hits its maximum capacity. If the
subscriber is within the overlapping service area of both cells, some
calls are moved to nearby cells.
● Microcells are often subdivided from larger cells. When
responsibilities are transferred from the large cell to the smaller cell
and vice versa, a handoff may occur. A travelling user, for example, is
moving inside the jurisdiction of a huge cell. If the traveller comes to
a halt, the jurisdiction is moved to a microcell to relieve the large
cell's load.
● Handoffs can also happen when multiple calls using the same
frequency for communication collide.
8.8 SECURITY
GSM provides a variety of security services based on information saved in
the AuC and individual SIMs (which is plugged into an arbitrary MS). The
SIM card stores personal and confidential information and is secured with
a PIN to prevent unwanted access. (The secret key Ki, for example, is
saved in the SIM and is used for authentication and encryption
procedures.) GSM's security services are described in detail below:
● Access control and authentication: The first step is to verify that the
SIM user is legitimate. To utilise the SIM, the user must enter a secret
PIN. The subscriber authentication is the next stage. A challenge-
response method is used in this step.
● Confidentiality: All user-related data is encrypted for privacy.
Following authentication, the BTS and MS encrypt speech, data, and
signalling. This level of confidentiality occurs just between MS and
BTS, not from end to end or throughout the entire fixed
GSM/telephone network.
139
Wireless and Mobile ● Anonymity: All data is encrypted before transmission to ensure user
Technology anonymity, and user identifiers (which might indicate an identity) are
not used over the air. Instead, GSM sends out a temporary
identification (TMSI) that the VLR assigns after each position update.
The TMSI can also be changed by the VLR at any moment.
In order to provide security services in GSM, three algorithms have been
specified. A3 is used for authentication, A5 is used for encryption, and A8
is used to generate a cypher key. Only algorithm A5 was publicly
disclosed in the GSM standard, but algorithms A3 and A8 were kept secret
but standardised with open interfaces. Both A3 and A8 are no longer
classified, having been made public in 1998 via the internet. This proves
that security by obscurity is ineffective. The algorithms, it turned out,
aren't very good. Users can employ greater end-to-end encryption or
network providers can utilise stronger authentication techniques.
Algorithms A3 and A8 (or their equivalents) are proprietary and can be
found on the SIM and in the AuC. Only A5 must be identical across all
providers in terms of device implementation.
8.8.1 Authentication:
A subscriber must be authenticated before he or she may utilise any GSM
network service. The SIM, which stores the individual authentication key
Ki, the user identity IMSI, and the authentication algorithm A3, is used for
authentication. The challenge-response approach is used for
authentication: the access control AC generates a random number RAND
as a challenge, and the SIM within the MS responds with SRES (signed
response) (Refer following Figure). For each IMSI, the AuC generates the
basic random values RAND, signed answers SRES, and cypher keys Kc,
then sends this information to the HLR. The present VLR asks the HLR
for the necessary RAND, SRES, and Kc values.
140
140 Figure: Subscriber authentication
The VLR delivers the SIM the random value RAND for authentication. Mobile Communication
With RAND and the key Ki, dubbed A3, both the network and subscriber Systems GSM
modules conduct the identical function. The MS returns the SIM's SRES,
allowing the VLR to compare the two values. The VLR approves the
subscriber if they are the same; otherwise, the subscriber is rejected.
8.8.2 Encryption:
All transmissions including user-related information are encrypted in
GSM over the air interface to preserve privacy. MS and BSS can start
employing encryption after authentication by applying the cypher key Kc
(the actual position of security functions for encryption, BTS and/or BSC,
is vendor dependant). The algorithm A8 is used to produce Kc from the
individual key Ki and a random value. It's worth noting that the SIM in the
MS and the network both use the same random number RAND to
calculate Kc. Over the air interface, the key Kc is not communicated.
The algorithm A5 and the cypher key Kc can now be used by MS and
BTS to encrypt and decode data. As seen in the diagram below, Kc should
be a 64-bit key, which isn't particularly strong but provides adequate
security against simple eavesdropping. However, the internet publishing of
A3 and A8 revealed that in some implementations, 10 of the 64 bits are
always set to 0, resulting in a key length of only 54 bits. As a result, the
encryption is significantly less secure.
141
Wireless and Mobile
Technology
8.9 GPRS - ARCHITECTURE
8.9.1 Introduction to GPRS architecture:
The GPRS Design is a network architecture that allows data to move via
it. It contains settings for 171 kbps packet data transmission. Multiple
users can join the network and make good use of the resources. General
Packet Radio Service, which is based on GPS, delivers packet service in
2G or 3G mobile data services. With adequate infrastructure, which offers
the connection to GSM infrastructure, small packets are accessed in a
short period of time. In order to provide data to 2G, more organisations are
required. GGSN and SGSN are their names. The architecture is provided
more provisions in order to improve itself.
145
Wireless and Mobile
Technology
8.11 MOBILITY MANAGEMENT
The GPRS network is partially independent from the GSM network. To
maximise efficiency and make the best use of free GSM resources, several
operations share network aspects with current GSM activities (such as
unallocated time slots).
In the GPRS system, an MS can be in any of the three states listed below.
Packet radio is the only technology that uses a three-state concept. GSM
operates on a two-state model: idle and active.
146
146
8.12 GPRS ROAMING Mobile Communication
Systems GSM
GPRS Roaming stands for General Packet Radio Service Roaming, which
allows packet mode communication between PMNs and network
interworking. Outside of their HPMN, GPRS Roaming allows service
subscribers to send and receive data in an end-to-end packet transfer
manner without consuming network resources in circuit switched mode.
For the avoidance of dispute, and in accordance with applicable licencing
requirements, GPRS Roaming does not preclude the user from using other
GSM Services.
8.13 SUMMARY
GSM has been shown as the most successful second generation digital
cellular network for the most part in this chapter. Although GSM was
originally developed for voice communication, the chapter demonstrated
how HSCSD and GPRS have evolved to allow for more data-oriented 147
Wireless and Mobile transmission. This evolution comprises the move from a circuit-switched
Technology network to a packet-switched system that is more similar to the internet
architecture. We have also studied the details of GPRS architecture and its
detailed overview about its signalling process; its mobility management
and its roaming process.
148
148
Wireless and Mobile Network Architectures, Yi Bang Lin, Mobile Communication
ImrichChlamtac, Wiley India. Systems GSM
https://gargicollege.in/wp-content/uploads/2020/03/Apr7.pdf
https://mobilepacketcore.com/gprs-mobility-management/
https://gpsult.org.in/wp-
content/uploads/2020/04/elex_6th_sem_and_cs_6th_sem_Multiple-
Access-Schemes-in-Mobile-Communication.pdf
http://icet.ac.in/Uploads/Downloads/4_Module%206.pdf
https://silo.tips/download/chapter-2-mobility-management-for-gprs-
and-umts
https://onlinelibrary.wiley.com/doi/epdf/10.1002/wcm.27
*****
149
9
MOBILE COMMUNICATION SYSTEMS
CDMA 2000
Unit Structure
9.0 Objectives
9.1 Introduction
9.2 Logical Channels
9.3 Forward Link and Reverse link physical channels
9.4 W-CDMA – Physical Layers
9.4.1 Bandwidth and spreading rates
9.4.2 Pilot channels
9.4.3 Cell sites
9.4.4 Channel
9.5 UMTS - System Architecture
9.6 UMTS Interfaces
9.7 Network Evolution
9.8 Release 5
9.9 FDD
9.10 TDD
9.11 UMTS frame structure
9.12 Protocol Architecture
9.13 Bearer Model
9.13.1 Radio Access Bearers (RAB)
9.13.2 Signalling Radio Bearer (SRB) parameters
9.14 Introduction to LTE
9.14.1 LTE Evolution
9.14.2 Facts about LTE
9.14.3 Advantages of LTE
9.14.4 LTE-QoS
9.15 Summary
9.16 List of References
9.17 Unit End Exercises
9.0 OBJECTIVES
● To understand the concept and background behind code division
multiple access
● To lay a basis for the spread spectrum's underlying mathematics
● To introduce wide range of network architecture and interfaces
150
9.1 INTRODUCTION Mobile Communication
Systems Cdma 2000
The International Telecommunication Union (ITU) is a global telecom
organisation that develops standards and promotes telecom services
around the world. For the development of 3G system standards and
specifications, the ITU established the International Mobile
Telecommunications - 2000 (IMT-2000) forum. IMT-2000 has released a
set of 3G radio interface specifications as well as criteria for assessing
prospective radio interfaces against these requirements. Both terrestrial
and satellite networks are covered by these concepts. The CDMA2000
proposal from the Telecommunications Industry Association (TIA) and
the W-CDMA proposal from the European Telecommunication Standards
Institute (ETS) are two CDMA-based terrestrial radio concepts that have
received considerable support. These two concepts have the potential to
become the de facto 3G standards.
CDMA2000 was certified as an IMT-2000 terrestrial standard, and
CDMA2000 1X and CDMA2000 1xEV (including 1xEVDO and 1xEV-
DV) are included in the CDMA Multi-Carrier UIT (MC).
CDMA2000 has been commercially available for more than three years,
and it was the first third-generation technology to make IMT-2000 a
reality. Korea launched the world's first 3G system at the end of the
millennium.
Today, 97 million people in Asia, Europe, and North America have access
to CDMA2000 networks. Other 35 CDMA2000 networks will be installed
around the world in the not-too-distant future.
154
154
9.4.1 Bandwidth and spreading rates: Mobile Communication
Systems Cdma 2000
The bandwidths offered are 5, 10, and 20 MHz. The base spreading rate of
W-CDMA is 4.096 Mcps. 4.096*N Mcps are the spreading rates. N can
have a value of 1, 2, or 4. The spreading rates are in 4.096 Mcps
increments.
Pilots are time multiplexed signals that are used in both traffic and
overhead channels in W-CDMA. W-CDMA pilots are hence dedicated
channels. Each traffic frame has a specified number of pilot bits, as shown
in Figure. Discontinuous waveform signals are used in W-CDMA pilots.
In both directions, W-CDMA uses pilot bits in each channel for channel
estimation and coherent demodulation. Pilots cannot be utilised for system
acquisition since they are dedicated. The synchronisation channel is used
in W-CDMA for system acquisition.
155
Wireless and Mobile
Technology
158
158
c] Iu –CS: Mobile Communication
Systems Cdma 2000
● This is the circuit-switched connection between the UTRAN and the
core voice network for carrying (usually) voice traffic and signalling.
● Radio Access Network Application Part is the primary signalling
protocol employed (RANAP).
● The A-interface is the comparable interface in GSM/GPRS networks.
d] Iub:
● The RNC uses this interface to control numerous Node Bs.
● Node B Application Part is the primary communications protocol
employed (NBAP).
● The A-bis interface is the comparable interface in GSM/GPRS
networks.
● Unlike the A-bis interface, the Iub interface is standardised and open.
e] Iu –PS:
● This is the packet-switched connection between the UTRAN and the
core data GPRS network for carrying (usually) data traffic and
signalling.
● RANAP is the most common signalling protocol.
● The Gb-interface is the comparable interface in GSM/GPRS
networks.
f] Iur:
● The Iur interface's principal goal is to facilitate inter-MSC mobility.
When a mobile user moves between locations served by multiple
RNCs, their data is now sent via Iur to the new RNC.
● The serving RNC is the original RNC, while the new RNC is known
as the drift RNC.
● Radio Network Subsystem Application Part is the primary signalling
protocol employed (RNSAP).
● In GSM/GPRS networks, there is no analogous interface.
159
Wireless and Mobile
Technology
CDMA2000 1x:
1x refers to the CDMA2000 implementation within the existing
CDMAOne (trademark for IS-95) spectrum allotment, which employs a
1.25-MHz carrier. One times 1.25 MHz is the technical phrase 1x. In
mobile contexts, the CDMA2000 1x system may double the voice
capacity of CDMAOne networks and give a peak packet data rate of 307
Kbps. Improved voice codec, better channel coding and modulation
algorithms, and improved power control approaches are among the
improvements.
In October 2000, SK Telecom of Korea introduced the world's first
commercial 3G (CDMA2000 1x) system. Since then, CDMA2000 Ix has
been installed in Asia, North and South America, and Europe, with an
increasing subscriber base.
160
160
CDMA2000 1xEV: Mobile Communication
Systems Cdma 2000
The abbreviation 1xEV stands for "1x Evolution." 1xEV-DO (Data Only)
and 1xEV-DV are included (Data and Voice). 1xEV-DO has previously
been standardised [RevO][RevA], and SK Telecom and KT Freetel in
Korea built the first commercial network in 2002. The peak data rate of
the 1xEV-DO system is 2.4 Mbps.
9.8 RELEASE 5
The fundamental network in Release 5 is completely changed. The
GSM/GPRS network will be replaced by an almost entirely IP-based
network. While the radio interfaces remain same, the changes in the core
are significant for telecommunication network operators that have long
relied on traditional telephone technologies. This specification's content
was locked in March 2002. This standard brings IP-based multimedia
services (IMS) under the authority of the IETF's session initiation protocol
(SIP, RFC 3261; Rosenberg, 2002; SIP Forum, 2002).
For improved audio quality, a high-speed downlink packet access
(HSDPA) with speeds of 8–10 Mbit/s was included, as well as a wideband
16 kHz AMR codec. End-to-end QoS messaging and many data
compression methods are also included.
The 3GPP is currently working on Release 6 (and considering Release 7)
and expects to freeze it in March 2003. MIMO antennas, enhanced MMS,
security enhancements, WLAN/UMTS interworking, broadcast/multicast
services, upgraded IMS, IP emergency calls, and many more management
features are all included in this edition (3GPP, 2002a). It is important to
remember that many companies are still trying to generate money off of
release 99, thus it is unclear when and to what extent the new releases will
be deployed.
9.9 FDD
FDD involves the use of two independent wireless communication
channels, one for transmitting data and the other for receiving data, on
separate frequencies.
161
Wireless and Mobile
Technology
For the uplink and downlink channels, FDD requires two symmetrical
spectrum segments.
The receiver in a radio with a transmitter and reception working in such
close proximity must filter out as much of the transmitter signal as
feasible. The filters are more effective when the spectrum separation is
higher.
FDD, on the other hand, requires a lot of frequency spectrum, usually at
least twice as much as TDD. Furthermore, the transmit and receive
channels must have sufficient spectrum separation. Because these so-
called guard bands are useless, they are a waste of money. These are
significant disadvantages, given the scarcity and high cost of spectrum.
FDD, on the other hand, is commonly utilised in cellular telephone
systems like the widely used GSM system. The downlink (DL) spectrum
from the cell site tower to the handset is used in certain systems, whereas
the uplink (UL) spectrum from the handset to the cell site is used in others.
Another drawback of FDD is the difficulties in employing advanced
antenna techniques such as multiple-input multiple-output (MIMO) and
beamforming. These technologies are a key component of the new LTE
4G cell phone strategy for improving data speeds. Making antenna
bandwidths large enough to encompass both types of spectrums is
difficult. Dynamic tuning circuitry that is more complicated is necessary.
FDD also works with cable TV systems, when broadcast and receive,
channels are assigned to distinct sections of the cable spectrum. Filters are
utilised once again to keep the channels separate.
9.10 TDD
TDD transmits and receives on the same frequency range. The band is
then shared by assigning transmission and receive activities to alternate
time slots. The data to be communicated is in serial binary format, whether
it's speech, video, or computer data. Each time slot could be a single byte
or a frame of many bytes.
The following wireless systems employ TDD:
● Wireless Networks
162
162
● Several 4G/LTE networks exist (some use FDD) Mobile Communication
Systems Cdma 2000
TDD alternates station data transmission and reception over time. The
length of time periods may vary.
The alternate time slots in some TDD systems are the same length or have
equal DL and UL periods. The system, however, does not have to be 50/50
balanced. As needed, the system can be asymmetrical.
163
Wireless and Mobile
Technology
164
164
Mobile Communication
Systems Cdma 2000
166
166
The SRB is established by an RRC Connection Setup operation during Mobile Communication
connection formation. The SRB is then used to send all following Systems Cdma 2000
signalling to initiate and establish the desired service's radio bearers. The
radio bearers are established through the RB Setup method. The RB Setup
technique determines how the DCCH and DTCH will be transmitted on
the radio bearers.
When only an SRB was present, the RB Setup might specify a different
DCCH RLC block size than when only an SRB was present. The default
3.4k DCCH SRB's DCCH RLC block size is 144 bits, while all RMCs
(Reference Measurement Channels) require a DCCH RLC block size of 96
bits. The UE and network must alter the DCCH RLC block size and then
run an RLC Re-establishment operation to reset the RLC buffers if the RB
Setup specifies a change from the stand-alone SRB configuration. If your
UE does not allow you to change the DCCH RLC block size during
connection setup, you must make the call using an SRB that has the same
DCCH RLC block size as the DCCH RLC block size established for the
service you want to establish.
167
Wireless and Mobile 9.14.1 LTE Evolution:
Technology
168
168
● When capacity restrictions are reached, a Quality of Service (QoS) Mobile Communication
mechanism has been standardised on all interfaces to ensure that voice Systems Cdma 2000
calls with a constant delay and bandwidth can still be met.
● Uses existing 2G and 3G spectrum as well as new spectrum with
GSM/EDGE/UMTS systems. Handover and roaming to existing
mobile networks are supported.
9.14.4 LTE-QoS:
End-to-end quality of service and guaranteed bit rate (GBR) for radio
carriers are supported by the LTE architecture. Different degrees of QoS
can be applied to LTE traffic for different applications, just as different
forms of QoS can be applied to Ethernet and the internet. QoS is a perfect
fit for the LTE MAC because it is fully scheduled.
Bearers of the Evolved Packet System (EPS) communicate with RLC
radio bearers one-on-one and enable Traffic Flow Templates (TFT). EPS
bearers are divided into four categories:
● Admission control allocates GBR Bearer resources on a permanent
basis.
● No admittance control for non-GBR bearers
● Bearer who is assigned to a specific TFT (GBR or non-GBR)
● Bearer by Default Non-GBR, unassigned traffic catch-all 169
Wireless and Mobile
Technology
9.15 SUMMARY
This chapter provided an overview of third-generation systems, both
current and future. The proposal of operators and companies in the GSM
business, UMTS, was discussed in greater depth. This standard is more of
a progression than a revolution. UMTS seeks to reuse as much
infrastructure as feasible while delivering new services and greater data
rates based on CDMA technology to prevent even higher installation
costs. The early deployments will mostly rely on GSM/GPRS
infrastructure and provide relatively moderate data rates. A UMTS cell's
initial capacity is around 2 Mbit/s, and cell widths are around 500 metres.
As a first stage, UMTS will be utilised to offload GSM networks and
provide higher data rates in cities. The infrastructure will be replaced by a
(nearly) all-IP network in future editions.
Also, we have studied about FDD and TDD. Depending on the
application, both FDD and TDD have advantages. The usage of FDD or
TDD is frequently dictated by industry standards and spectrum regulation
requirements. Although TDD appears to be the better overall option, FDD
is significantly more extensively used due to previous frequency spectrum
assignments and earlier technologies. For the time being, FDD will
continue to dominate the cellular market. TDD will become more
commonly utilised when spectrum becomes more expensive and scarcer as
it is shifted and repurposed.
*****
171
MODULE V
10
MOBILE NETWORK LAYER
Unit Structure
10.0 Objective
10.1 Introduction
10.2 Mobile IP
10.2.1 Goals of mobile IP
10.2.2 Mobile Ip Topology
10.2.3 IP Packet Delivery
10.2.4 Components of Mobile IP
10.2.5 Working of mobile IP
10.2.5.1 Agent Discovery
10.2.5.2 Registration
10.2.5.3 Tunneling
10.2.6 Optimization of Mobile IP
10.2.7 Advantages of Mobile IP
10.2.8 Disadvantages of Mobile IP
10.2.9 Application of Mobile IP
10.3 Dynamic Host Configuration Protocol
10.3.1 Working of DHCP
10.3.2 Components of DHCP
10.3.3 Advantages of use DHCP
10.4 Mobile Ad Hoc Routing Protocols
10.4.1 Multicast Routing
10.5 Summary
10.6 Unit and Questions
10.7 Bibliography
10.0 OBJECTIVE
1) Understanding the concepts of Network layer.
2) Learn what is use of mobile IP and DHCP.
3) Learn different agent’s information while using mobile IP.
4) Know the advantages and disadvantages of mobile IP and DHCP
5) Different application of Mobile IP.
6) Knowledge gain regarding ad hoc routing protocols.
172
10.1 INTRODUCTION Mobile Network Layer
Network Layer is the part of the online communication that allows us the
transfer our data packets between different devices or network. This layer
is layer3 in the open-source interconnection model that is OSI that
provides the way of routing for network communication.
Mobile network Protocol is developed and for network layer to support the
mobility. It provides protocol enhancement that allows transparent routing
of TP datagrams to mobile nodes on the internet. One of the examples of
mobile network layer is mobile internet protocol that is mobile IP. Which
adds mobility to support to the internet network layer protocol IP.
The Network layer is layer3 in the open-source interconnection model that
is OSI that provides the way of routing for network communication.
Mobile Network Layer is used when this layer uses mobile IP. Mobile
Internet Protocol is Mobile network Protocol is developed and for network
layer to support the mobility. It provides protocol enhancement that allows
transparent routing of TP datagrams to mobile nodes on the internet.
When temporary address used by a mobile node while it is moving away
from its home network. All datagram or IP packets are sent to mobile node
are deliver to the care of address instead of sent directly to the IP address
of mobile node. This care of address co-located if the mobile node
temporary assigned one more IP address and that is treats as care of
address. Which is topological correct and tunnel end point being the
mobile node.co-located care of address can be acquired service using
DHCP (Dynamic Host Configuration Protocols). DHCP (Dynamic Host
Configuration Protocols) protocol is that automatically assigns a unique IP
address (internet Protocol) to each device that connects to the network.
With the DHCP (Dynamic Host Configuration Protocols) there is no need
to assign manually IP address to each device as DHCP automatically
assigned.
There are many versions of DHCP are available that can be use with the
IPV4(Internet protocol version 4) and IPV6(Internet Protocol version 6).
Users are traveling through anywhere IP is common base for different
application and runs over different networks. For this we have required
mobility for heterogenous networks.
In mobile IP or whenever we must use internet, we must know IP address
means what?
10.2 MOBILE IP
Mobile IP adds mobility support to the internet network layer protocol.
Mobile Internet Protocol is designed to allow devices like laptop, mobile
phone, PDA (Personal digital assistant) users move from one network to
another network while maintaining permanent Internet protocol (IP).
Mobile IP defined by the Internet Engineering Task Force (IETF) and
described in the IETF -RFC3344.
Reference defined in RFC-2002(Request for comment) mobile IP that
enhancement of the Internet Protocol (IP) that add mechanism for
forwarding internet traffic to mobile devices or mobile nodes when they
are connection to the other network rather than home network.
Mobile IP or MIP is the communication protocol that allows users to move
from one network to another network with the same IP address. When
users leave the home network and enters another network called foreign
network. That another network uses mobile IP to inform home network of
care of address to which packets for user’s device should be sent.
174
174
Home address-It is the permanent IP address assigned to the mobile node Mobile Network Layer
and that uses address in home address.
Care -of-address-It is the temporary address used by a mobile node while
it is moving away from its home network.
By using mobile IP, we can solve the problems like
1. If a node changes its IP address, it will have to terminate and restart
its ongoing connections every time it moves to a new network area.
2. If nodes move without changing its IP address, it will be unable to
receive its packets.
From the diagram, through Internet host send datagrams to mobile node
with its IP address that is through home address. If the mobile node on its
home address the datagram delivery using IP address. If mobile node not
on home address, then home agent picks up datagram. Home agent
forward to the foreign agent then deliver .by that agent datagram 175
Wireless and Mobile 10.2.3 Components of Mobile IP:
Technology
1) Mobile Node (MN):
The mobile node is the end system like laptop, mobile phone, PDA
(Personal digital assistant) users move from one network to another
network.
Those devices whose software allows network roaming capabilities (Host
or Router also)
176
176
There are two ways care of address used: Mobile Network Layer
6) Home Network:
It is the subset the mobile node to with its respective IP address. Home
network is which mobile node belongs as per its assigned IP address (That
is home address). No mobile IP support is needed within this network.
7) Foreign Network:
It is the current network to which mobile node is visiting. Not in its home
network.
8) Foreign Agent:
It treats as router in a foreign network to which the mobile node is
connected. The packets from the home agent are sent to the foreign agent
and then deliver to the mobile node.
177
Wireless and Mobile 9) Co-located care of address:
Technology
It’s an externally obtained local address which is gets from mobile host.
10) Binding:
It is association of the home address with a care of address.
a) Agent Advertisement:
Agent advertisement to advertise their services on a network. For this
home agent (HA) and foreign agent (FA) advertise their services so that
your devices know advertisement and discover in which network zone.
Agent advertises their presence by periodically broadcasting their agent
advertisement message. Your devices find the current point of attachment
if not possible its send to home agent and foreign agent to send their
advertisements.
An agent advertisement is an Internet Control Message Protocol (ICMP)
router advertisement that has been extended to also carry a mobility agent
advertisement extension.
b) Agent Solicitation:
In the absence of agent advertisement, a mobile node can solicit
advertisements this is agent solicitation. Every mobile node should
implement this. The mobile node uses same procedure which is used by
Internet Control Message Protocol (ICMP) router solicitation message.
The rate at which a mobile node send solicitation messages is limited by
the mobile node.
10.2.5.2 Registration:
The mobile node registers its current location with its home agent and
foreign agent. When your device enters the foreign network, your devices
need to register itself by sending its care of address to home agent through
foreign agent other way directly take care of address (COA) which is
temporary address.
179
Wireless and Mobile When mobile node receives an agent advertisement then its register
Technology through foreign agent. It might be able to acquire co-located care of
address (COA).
Registration provides mechanism to mobile node to communicate their
current reachability information to the home agent. This process performs
some tasks that are
● Requesting forwarding services when visiting a foreign network.
● Inform their home agent of their care of address.
● Renew a registration that is due to expire.
● Request reverse tunnel.
During this phase, mobile node sends a registration request message to the
foreign agent which forwards the message to the home agent. The home
agent sends back a reply after updating its registration table with the home
address and care of addressing mapping.
When mobile node registers directly to with its home agent (HA) then
registration process require
i) Mobile nodes require deregistration request to the home agent.
ii) The home agents send a registration replay to the mobile node,
granting or denying the request.
After the successful registration and authenticated, the foreign and home
agents add your device to their visitors list.
180
180
10.2.5.3 Tunneling: Mobile Network Layer
It is the set up by home agent to the care of address to route packets to the
mobile node as its roams. Means you can say this phase creates a virtual
connection as a pipe for moving the data packets between tunnel entry and
endpoint.
Reverse Tunnel:
It is tunnel that starts at the mobile nodes care of address and end with
home agent. A mobile node can request a reverse tunnel between foreign
agent and its home agent when mobile node registered.
181
Wireless and Mobile The below diagram is tunneling called reverse tunneling.
Technology
183
Wireless and Mobile Host- PC or Computer or devices connected to network-Setup some
Technology setting
Protocol-It means set of rules. Which is followed for data transfer between
two devices.
It is network management protocol that can dynamically assign IP address
to device, node, or network so they can connect using IP (Internet
Protocol). With the help of this provides services such as DNS (Domain
Name Server), NTP (Network Time Protocol) and any protocol which is
used for communication based on TCP and UDP.
Basically, DHCP is application layer protocol which is used for providing
1) Subnet Mask
2) Router Address
3) DNS Address
4) Class identifier
DHCP automates and centrally handles these configurations. There is no
need for any user configuration to connect to DHCP based network.
DHCP acts as essential role in handling small web where mobile devices
are used and needed IP addresses on a non-permanent support.
DHCP can be implemented on local networks as well as large network
enterprise network. DHCP is the default protocol used by most routers and
networking equipment.
DHCP is also called RFC (Request for comments) 2131.
● DHCP manages the provision of all the nodes or devices added or
dropped from the network.
● DHCP maintain the unique IP with the help of DHCP server.
● It sends request to the DHCP server whenever device or node or any
client, which is configured to the DHCP, connects to the network and
server acknowledge the same.
184
184
2) DHCPOFFER: When server accept the new device it sends message Mobile Network Layer
DHCPOFFER to the client. Which contains MAC address of client
device.
3) REQUEST: DHCP client request IP address means client send
message of request that is DHCPREQUEST.
4) PACK: Assign an available IP address to the client with other details
that is DHCPPACK. DHCP server response to the client request by
providing IP address and other configuration information. This
configuration information has time called Lease
5) RELEASE: When client wants to live the network.
2) DHCP Server:
It is networked devices running DHCP service hold IP address and other
configuration details. This is the server or router treats as a host.
3) DHCP Relay:
It is agent works as devices or routers that take clients messages
broadcasted by the client on network and forward message to the
configured to the DHCP server. And return message to the client through
relay agent.
4) IP Address Pool:
It is processed by the DHCP server. It is the range addresses that are
available to the DHCP clients.
The time duration client holds IP address information provided by the
DHCP server. When this lease time expired client must renew from server.
5) Subnet:
IP network logically divided into two or more segments called subnet or
subnetworks.
6) Accuracy of IP setting.
187
Wireless and Mobile Characteristics of MANET:
Technology
1. It uses dynamic topologies this is network topology which is typically
multichip may change randomly and rapidly with time, it can form
unidirectional or bi-directional links.
2. Wireless links usually have lower reliability, efficiency, stability, and
capacity as compared to a wired network
3. Each node can act as a host and router, which shows its autonomous
behavior. Energy Constrained Operation.
4. As some or all the nodes rely on batteries or other exhaustible means
for their energy. Mobile nodes are characterized by less memory,
power, and lightweight features.
5. It provides low security wireless networks are more prone to security
threats. A centralized firewall is absent due to the distributed nature of
the operation for security, routing, and host configuration.
6. They required minimum human intervention to configure the network,
therefore they are dynamically autonomous in nature.
Advantages of MANET:
1. Separation from central network administration.
2. Each node can play both the roles that are of router and host showing
autonomous nature.
3. Self-configuring and self-healing nodes do not require human
intervention.
Disadvantages of MANET:
1. Resources are limited due to various constraints like noise,
interference conditions, etc.
2. Lack of authorization facilities.
3. More prone to attacks due to limited physical security.
188
188
● Specific underlying characteristics that could serve as heuristics in Mobile Network Layer
finding the pat effectively.
b. Route Discovery:
This phase determines the most optimal path for the transmission of data
packets between the source and the destination mobile nodes.
Route Maintenance:
This phase performs the maintenance work of the route as the topology in
the mobile ad-hoc network is dynamic in nature and hence, there are many
cases of link breakage resulting in the network failure between the mobile
nodes.
191
Wireless and Mobile 3. Hybrid Routing protocol:
Technology
It basically combines the advantages of both, reactive and pro-active
routing protocols. These protocols are adaptive in nature and adapts
according to the zone and position of the source and destination mobile
nodes. One of the most popular hybrid routing protocols is Zone Routing
Protocol (ZRP).
The whole network is divided into different zones and then the position of
source and destination mobile node is observed. It the source and
destination mobile nodes are present n the same zone, then proactive
routing is used for the transmission of the data packets between them. And
if the source and destination mobile nodes are present in different zones,
then reactive routing is used for the transmission of the data packets
between them.
10.3 SUMMARY
In this chapter we learned about Mobile Internet Protocol that is Mobile IP
which is Communicated network layer. Mobile network Protocol is
developed and for network layer to support the mobility. One of the
examples of mobile network layer is mobile internet protocol that is
mobile IP. When works with mobile IP we have require components like
home agent, foreign agent, correspondent node, mobile node, care of
address. Home address, foreign network, when packets reached at home
network, but it moves to the home agent to the foreign network. The
foreign agent sends care of address (COA) to home agent etc. when your
device enters the foreign network, your devices need to register itself by
sending its care of address to home agent through foreign agent other way
directly take care of address (COA) which is temporary address.
DHCP is used to handle small web where mobile devices are used and
needed IP addresses on a non-permanent support. DHCP works on
client/server protocol in which DHCP server manages a pool of unique IP
address, information about configuration parameters and assign addresses
out of those address pool. MANET stands for Mobile Ad hoc Network
also called a wireless Ad hoc Network or Ad hoc wireless network that
usually has a routable networking environment on top of a Link Layer ad
hoc network. Multicast routing uses spanning tree protocol for avoid
looping and reverse path forwarding technique to detect and discards
duplicates and loop.
10.5 BIBLIOGRAPHY
1) https://www.geeksforgeeks.org/mobile-internet-protocol-or-mobile-
ip/
2) https://www.javatpoint.com/mobile-ip
3) https://slideplayer.com/slide/14494837/
4)
https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsd
GRvbWFpbnxhd2ttYmNzMm5kfGd4OjU1YjI3YmE0ZTQ3OTliNmI
5) http://multinet.ivyro.net/recruit/lecture/1-2/mbc-8.pdf
6) http://mobnet.epfl.ch/slides/E-NWlayer.pdf
7) https://www.educba.com/mobile-ip/
8) https://en.wikipedia.org/wiki/Mobile_IP
9) https://docs.oracle.com/cd/E19455-01/806-6542/6jffqf5sb/index.html
10) https://lnct.ac.in/wp-content/uploads/2020/04/Unit-4-Mobile-Internet-
Protocol-converted.pdf
11)
https://www.techtarget.com/searchmobilecomputing/definition/Mobi
le-IP
12) https://www.tutorialspoint.com/mobile-ip-a-complete-solution-for-
emerging-communications
13) Wireless Communications & Networks, Second Edition, William
Stallings, Pearson Education
14) https://www.efficientip.com/what-is-dhcp-and-why-is-it-important/
193
Wireless and Mobile 15) https://docs.microsoft.com/en-us/windows-
Technology server/networking/technologies/dhcp/dhcp-top
16) https://www.networkworld.com/article/3299438/dhcp-defined-and-
how-it-works.html
17) https://www.brainkart.com/article/Dynamic-Host-Configuration-
Protocol_9938/
18) https://www.metaswitch.com/knowledge-center/reference/what-is-
multicast-ip-routing
20) https://networklessons.com/multicast/multicast-routing
*****
194
194
MODULE VI
11
MOBILE TRANSPORT LAYER
Unit Structure
11.0 TCP over Wireless Networks
11.0.1 Characteristics of Wireless Media
11.0.2 Wireless TCP Mechanisms
11.0.3 What are the problems with TCP over wireless network?
11.1 Indirect TCP
11.1.1 Introduction
11.1.2 Indirect Model for Mobile Hosts
11.1.3 I-TCP Basics
11.1.4 I-TCP Interface at the MH
11.2 Snooping TCP
11.2.1 Introduction
11.2.2 Need for optimized transport layer protocols
11.2.3 Limitation of I-TCP
11.2.4 Snooping TCP : Design of Snoop Protocol
11.2.5 Additional mechanisms required to implement Snoop
Protocol
11.2.6 Working of Snooping TCP
11.2.7 Advantages
11.2.8 Disadvantages
11.3 Mobile TCP
11.3.1 Mobile TCP in mobile computing
11.3.2 Need for mobile TCP
11.3.3 How can mobile TCP solve disconnection problem
11.3.4 Advantages
11.4 Summary
11.5 Model Questions
11.6 Reference for further reading
Channel Losses:
Signals carried by wireless media are subject to significant interference
from other signals, and subsequently, losses due to modification of bits
while frames are being transmitted. These losses are difficult to recover
from at the link layer despite the presence of error correction techniques
and typically require retransmission. Retransmission can be performed at
the link layer or at the transport layer (TCP). TCP performance is affected
by the frequent losses occurring at the link layer, because TCP inherently
assumes all losses occur due to congestion and invokes the congestion
control algorithms upon detecting any loss.
Low Bandwidth: Bandwidth of wireless links may be low, which can
sometimes result in excessive buffering at the base station. This could lead
to packets being dropped at the base station, or transmitted back-to-back
on the wireless link, which in turn results in high observed round trip
times.
Signal Fading:
Fading typically occurs when a wireless host is mobile. Interference from
physical factors like weather, obstacles, unavailability of channels,
overlapping areas of different cells, could result in signal fading and
blackouts. Such blackouts can exist for prolonged periods of time.
196
196
Movement across Cells: Mobile Transport Layer
Channel Asymmetry:
Resolving channel contention is usually asymmetric. The sending entity
gets more transmission time than the receiving entity. This could lead to
TCP acknowledgments being queued for transmission at the link layer of
the receiving entity and sent back to back when channel access is
permitted. This can lead to larger round trip times measured by the TCP
sender and to bursty traffic, which subsequently reduces the throughput of
the TCP connection.
Link Latency:
Wireless links may exhibit high latencies and when such delays are a
significant fraction of the total round trip times observed by TCP, the
retransmission timeouts of TCP are set to high values, which subsequently
affects TCP performance. Such conditions occur in wireless WANs and
satellite networks. In addition, high variance in the measured round trip
times have been observed, which impact the TCP round-trip-time (RTT)
estimation algorithm
197
Wireless and Mobile A.2 SMART Retransmissions:
Technology
A Simple Method to Aid ReTransmissions (SMART) decouples flow and
error control. Each ACK packet from the receiver carries both the standard
cumulative ACK and the sequence number of the packet that initiated the
ACK. This informs the sender of the packets that are lost, so that the
sender can selectively retransmit. The scheme uses a different heuristic to
detect lost retransmissions. It also avoids the dependence on timers for the
most part except for the worst case when all packets and all ACKs are lost.
The scheme uses two different windows, one called the error-control
window at the receiver for buffering the out-of-sequence packets, and
another one called the flow-control window at the sender for buffering
unacknowledged packets. Thus, error control and flow control are
decoupled.
11.0.3 What are the problems with TCP over wireless network?
Frequent disconnection is considered as one of the major issues in the
Wireless Network. WLAN uses IEEE 802.11 MAC protocol and it uses
retransmission policy to hide the wireless losses from TCP sender. Over
an erroneous wireless link, recovery of the packet loss is attempted first
using local retransmission policy.
203
Wireless and Mobile services such as WWW which may otherwise require a full TCP/IP stack
Technology running on the mobile.
Centralized Proxy:
The base station or the foreign agent acts as a proxy forwarding the
packets in both the directions therefore whole scheme fails if foreign agent
is crashed
Security Threat:
The foreign agent acting as a proxy receives all the packets so it should be
a trusted entity Snooping TCP is one of the classical TCP improvement
approaches. This approach is designed to solve the end-to-end semantics
loss in I-TCP. The basic concept is to buffer packets close to the mobile
node and retransmit them locally if a packet is lost.
In sequence Packet:
The packet arrivesin the normal in sequence. The packet is added to snoop
cache and forwarded to the mobile host (MH). A time stamp is placed on
one packet per transmitted window in order to estimate the round trip time
of wireless link.
208
208
Snoop Acknowledge (): Mobile Transport Layer
Handoffs:
In case of handoffs, the new base station (BS) should perform the task of
snooping so the new base station (BS) should prepare their snoop cache
for the mobile host. This is the transition state called ―buffering‖ state and
the base station (BS) cannot snoop onto the acknowledgements. As soon
as hand off occurs, snoop cache is synchronized to the new base station
(BS) and the process continues.
11.2.7 Advantages:
1. End-to-end semantics is preserved: The FA does not acknowledge the
packet. Even if the foreign agent (FA) or base station (BS) crashes,
the approach automatically fall into standard TCP
2. No Modifications at Fixed Host:The fixed computer TCP does not
require any modifications. Most of the modifications are at foreign
agent (FA) / base station (BS) and some on mobile host.
3. No packet loss during handovers: In case of handovers, if there is
some data not transferred to the new foreign agent, there will be a
time-out at fixed host triggering retransmission of packet, following
mobile IP, to a new COA.If the new base station does not comply
with scheme, approach will fall back to standard TCP.
11.2.8 Disadvantages:
1. If the packet is lost or delayed during the retransmission from buffer
of the foreign agent, due to error on wireless link, time-out will occur
at fixed host (FH).Therefore problems on wireless link are not
isolated.
2. The wireless links offers very high delay as compared to wired link
almost by a factor of 10. In this case the timers in foreign agent (FA)
and fixed host are almost equal and approach is almost ineffective.
211
Wireless and Mobile 3. Use of NAK between foreign agent and mobile host assumes
Technology additional mechanism on the mobile host.
4. Snooping and buffering won‘t be applicable if there is end-end
encryption between fixed host and mobile host. As per RFC 2406 in
IP encapsulation security payload TCP protocol header are encrypted
and the snooping on sequence numbers won‘t be possible.
5. Retransmission from foreign agent (FA)/ base station (BS) may not
work because many schemes prevent replay attacks and
retransmission may be interpreted as replay. Therefore snooping
protocol is used only when encryption is used above transport layers.
6. Architecture of snooping protocol to overcome limitations of I- TCP.
7. Functioning Snoop-module at base station (BS)/ foreign agent (FA).
The M-TCP approach assumes a relatively low bit error rate on the
wireless link. Therefore, it does not perform caching/retransmission of
data via the SH. If a packet is lost on the wireless link, it has to be
retransmitted by the original sender. This maintains the TCP end-to-end
semantics. The SH monitors all packets sent to the MH and ACKs
returned from the MH. If the SH does not receive an ACK for some time,
it assumes that the MH is disconnected. It then chokes the sender by
setting the sender‟s window size to 0. Setting the window size to 0 forces
the sender to go into persistent mode, i.e., the state of the sender will not
change no matter how long the receiver is disconnected. This means that
212
212 the sender will not try to retransmit data. As soon as the SH (either the old
SH or a new SH) detects connectivity again, it reopens the window of the Mobile Transport Layer
sender to the old value. The sender can continue sending at full speed.
This mechanism does not require changes to the sender‟s TCP. The
wireless side uses an adapted TCP that can recover from packet loss much
faster. This modified TCP does not use slow start, thus, M-TCP needs a
bandwidth manager to implement fair sharing over the wireless link.
The M-TCP (mobile TCP)1 approach has the same goals as I-TCP and
snooping TCP: to prevent the sender window from shrinking if bit errors
or disconnection but not congestion cause current problems.
11.3.4 Advantages:
It maintains the TCP end-to-end semantics. The SH does not send any
ACK itself but forwards the ACKs from the MH.
If the MH is disconnected, it avoids useless retransmissions, slow starts or
breaking connections by simply shrinking the sender‗s window to 0.Since
it does not buffer data in the SH as I-TCP does, it is not necessary to
forward buffers to a new SH. Lost packets will be automatically
retransmitted to the new SH.
The lack of buffers and changing TCP on the wireless part also has some
disadvantages:
213
Wireless and Mobile 1. As the SH does not act as proxy as in I-TCP, packet loss on the
Technology wireless link due to bit errors is propagated to the sender. M-TCP
assumes low bit error rates, which is not always a valid assumption.
2. A modified TCP on the wireless link not only requires modifications
to the MH protocol software but also new network elements like the
bandwidth manager.
11.6 SUMMARY
The link layer approaches use link layer retransmissions to increase the
reliability provided to TCP. The requirements on the link layer service
may vary depending on the application. This is, for example, considered in
UMTS, since the radio link protocol allows configuration of many
parameters, such as the maximum number of retransmissions. There are
many types of split connection proposals, only some of which are
described in this report. Performance improvements are often significant,
but at the cost of violating the end-to-end semantics of TCP. The
intermediate node which divides the connection must process data up to
the transport layer and all TCP segments belonging to the same connection
are required to pass that node.
The TCP-aware link layer proposals have similar limitations as the split
connection proposals. However, the link layer proposals preserve the end-
to-end semantics of TCP. Most of the explicit notification proposals
require TCP-awareness of the intermediate node that is responsible for
transmitting explicit notifications. These proposals seem to be intended for
wireless links with low reliability. A link ARQ with higher persistence
would reduce or eliminate data loss due to an unreliable wireless link.
However, another application of explicit notifications could be to signal to
the TCP sender that a handover has been initiated. End-to-end proposals
are based on the idea that complexity belongs in the end hosts rather than
in the network. The end-to-end semantics of TCP are preserved.
Intermediate nodes do not have to be TCP-aware, as in many of the other
proposals. The data transferred between the end hosts is not required to
pass the same intermediate node.
11.8 REFERENCES
https://www.cs.kau.se/cs/prtp/docarchive/publications/techreports/
2004_21_TCP_over _Wireless/aw_sa-20
https://www.cs.purdue.edu/homes/fahmy/reports/wireless.pdf
04_21.pdf
https://www.cse.wustl.edu/~jain/cse574-10/ftp/j_kwtc.pdf
https://www.cs.purdue.edu/homes/fahmy/reports/wireless.pdf
https://www.cse.wustl.edu/~jain/cse574-10/ftp/j_kwtc.pdf
https://dl.acm.org/doi/10.1145/215530.215544
https://www.sfu.ca/~ljilja/cnl/projects/packet_control/WM-
195.PacketControl_edited.pdf
https://www.tutorialspoint.com/wireless_communication/
wireless_communication _tcp_ ip .htm
https://www.diva-portal.org/smash/get/diva2:24680/FULLTEXT02
https://link.springer.com/content/pdf/10.1007/978-0-387-35620-
4_41.pdf
https://www.neliti.com/publications/239693/tcp-for-wireless-
environments
*****
215
12
MOBILE TRANSPORT LAYER
Unit Structure
12.1 Fast Retransmit
12.1.1 What is the meaning of Fast Retransmit?
12.1.3 Why does Fast Retransmit help to improve the performance
of TCP?
12.1.4 What triggers a fast retransmission?
12.1.5 "Fast Retransmit" in TCP
12.1.6 What is the advantage of Fast Retransmit?
12.1.7 What is a Fast Retransmit in networking?
12.1.8 What causes TCP fast retransmission?
12.2 Fast Recovery Transmission
12.2.1 What does fast recovery do?
12.2.2 Why TCP performs a fast recovery only after getting exactly
3 duplicate ACKs?
12.2.3 What is the difference between Fast Retransmit and fast
recovery?
12.2.4 Fast Retransmit and Fast Recovery
12.2. 5 Fast Recovery Technique For Loss Recovery in TCP
12.2.6 How can fast recovery takes place in the congestion
avoidance phase?
12.3 Timeout Freezing
12.3.1 Disadvantage
12.3.2 Significance
12.4 Selective Retransmission
12.4.1 What is selective retransmission explain?
12.4.2 Comparision of different approaches for a “mobile” TCP
12.5 Summary
12.6 Unit and Questions
12.7 References
There are some loss of packets when cwnd=16 and ssthresh =20.
The sender gets to know that there was a collision when it receives third
duplicated ACK. By the time the cwnd and ssthresh values are..
218
218
cwnd = 20.199 Mobile Transport Layer
ssthresh = 20
After receiving 3rd ACK, the sender retransmit that lost packet and change
cwnd and ssthresh values as follows.
cwnd = 10
ssthresh = 10
(Notice, ssthresh value is decreased half of cwnd before congestion. cwnd
was 20.199 )
The sender receives an ACK. As it is not a duplicated ACK nor the last
frame ACK the sender sent, the sender should wait till the time out.
cwnd = 10.10
ssthresh = 10
219
Wireless and Mobile
Technology
Then the sender increases its window size by 1 each time it gets the whole
ACKs for the previous packets untill cwnd value reaches ssthresh value.
Once cwnd value reaches ssthresh, it follows "congestion window
avoidance" algorithm. So, the sender increases its window size by 1/cwnd
whenever it receives ACK.
With nam-graph, we could see the whole traffic pattern.
220
220
1st RED Circle: As you see, after 3rd duplicated ACK, the sender Mobile Transport Layer
retransmit the packet (which is indicated in red color).
2nd RED Circle: It is retransmitted because of timeout. And after then,
the sender increases its window size by 1.
The left most points mean the packets that the sender sends.
The followed right points mean ACKs of each packets.
The red points mean retransmitted packets.
12.2.2 Why TCP performs a fast recovery only after getting exactly 3
duplicate ACKs why not 2 or 1?
Since TCP does not know whether a duplicate ACK is caused by a lost
segment or just a reordering of segments, it waits for a small number of
duplicate ACKs to be received.
221
Wireless and Mobile 12.2.3 What is the difference between Fast Retransmit and fast
Technology recovery?
With using only Fast Retransmit, the congestion window is dropped down
to 1 each time network congestion is detected. Thus, it takes an amount of
time to reach high link utilization as before. Fast Recovery, however,
alleviates this problem by removing the slow-start phase.
FRR works most efficiently when there are isolated packet losses. It does
not work efficiently when there are multiple data packet losses occurring
over a short period of time. The fast retransmit/fast recovery algorithm
was introduced in 4.3BSD Reno release and is described in RFC 2001 and
RFC 2581.
FRR also stands for false rejection rate, a term used in biometric security
systems.
When the RTO timer expires but an ACK is not received, the sender
confirms that the packet is lost due to congestion at intermediary devices.
Now sender has to tackle this congestion state carefully. Fast Recovery is
the packet loss recovery technique. Recovery means becoming inactive
and not transmitting any new packet for some time.
When there is a packet loss detected, the TCP sender does 4 things:
222
222
Fast Recovery Phase: Mobile Transport Layer
The half window of silence is the amount of time the sender becomes
silent(inactive) and waits for inflight to become equal to cwnd. Because
cwnd is reduced to its half when packet loss is detected. Before that
inflight was exactly equal to cwnd, but now inflight is approximately
double of cwnd value. So, the sender doesn‟t transmit any new packet
neither it increases its cwnd by 1 per ACK. The sender will keep on
getting DUP-ACK until the receiver receives the retransmitted packet.
After the inflight becomes equal to cwnd, the half window of silence ends
here, now also DUP-ACK will keep coming, so the sender doesn‟t
increase its cwnd but it will maintain an inflight value equal to cwnd.
When one DUP-ACK comes, the inflight becomes 1 less than the previous
value, so to maintain inflight=cwnd sender transmits one new packet into
the network. When finally the receiver gets the retransmitted packet and it
sends a new ACK to the sender, then the sender will come out of the Fast
Recovery phase and immediately enter the AIMD phase. The sender
comes out of the recovery phase because it has confirmed that the lost
packet is received by the receiver and thus the network is no longer
congested. But, it has to carefully increase the cwnd to avoid subsequent
congestion too early, thus entering AIMD hereafter.
223
Wireless and Mobile Fast Recovery without SACK:
Technology
Initial state:
pipe = 5 segments
cwnd= 5 segments
ssthresh = 5 segments
This is the case when half the window of silence is over and pipe=cwnd.
DUP-ACK arrives with SACK blocks, SACK block tells that 3 packets are
lost.
pip= 5-1-3= 1
pipe < cwnd
New packets need to be transmitted = cwnd-pipe
Now, the sender will send 4 new packets. This is called burst transmission.
Fast Retransmit/Fast Recovery Moving to a new foreign agent can cause
packet loss or time out at mobile hosts or corresponding hosts. TCP
concludes congestion and goes into slow start, although there is no
congestion. The mechanisms of fast recovery/fast retransmit in traditional
TCP a host can use after receiving duplicate acknowledgements, thus
concluding a packet loss without congestion. But the idea on Classical
TCP Fast retransmit/ Fast recovery is to artificially force the fast
retransmit behavior on the mobile host and correspondent host side. As
225
Wireless and Mobile soon as the mobile host registers at a new foreign agent using mobile IP, it
Technology starts sending duplicated acknowledgements to correspondent hosts. The
proposal is to send three duplicates. This force the corresponding host to
go into fast retransmit mode and not to start slow start, i.e., the
correspondent host continues to send with the same rate it did before the
mobile host moved to another foreign agent.
12.2.6 How can fast recovery takes place in the congestion avoidance
phase?
A fast retransmit is sent, half of the current CWND is saved as ssthresh
and as new CWND, thus skipping slow start and going directly to the
congestion avoidance algorithm. The overall algorithm here is called fast
recovery. Slow start assumes that unacknowledged segments are due to
network congestion.
12.3.1 Disadvantage:
TCP on mobile host has to be changed, mechanism depends on MAC
layer
12.3.2 Significance:
Scheme is independent of data
227
Wireless and Mobile
Technology
12.5 SUMMARY
The idea behind fast retransmit is straightforward. Every time a packet
arrives out of order because the previous packet was lost or delayed, the
receiver sends an acknowledgment that is the same as the one sent the last
time. The subsequent transmissions of the same acknowledgment is called
a duplicate ACK. When the sender detects a duplicate ACK, it knows that
the receiver must have received a packet out of order, implying that the
earlier packet was lost or delayed. To detect reliably the packets that are
lost, the sender waits until it sees some number of duplicate ACKs before
retransmitting the missing packet. In practice, the sender waits until it has
seen three duplicate ACKs, then retransmits the packet without waiting for
its timer to expire.
12.7 REFERENCES
1. https://www.techtarget.com/searchnetworking/definition/fast-
retransmit-and-recovery
228
228
2. https://www.eventhelix.com/networking/tcp/tcp-fast-retransmit-and- Mobile Transport Layer
recovery-overview.pdf
3. https://andreybleme.com/2021-08-11/rfc-2001-tcp-slow-start-
congestion-avoidance-fast- retransmit-and-fast-recovery-algorithms-
summary/
4. https://www.researchgate.net/figure/Fast-retransmit-mechanism-of-
Tahoe_fig1_257517254
5.
https://www.researchgate.net/publication/2285832_TCP_and_Succe
ssive_Fast_Retransmits
6. https://medium.com/tcp-ip/tcp-fast-re-transmit-and-recovery-
d6ec031c9ca5
7. https://www.diva-portal.org/smash/get/diva2:4867/FULLTEXT01.pdf
8.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.866.1603&
rep=rep1&type=pdf
9. https://www.cse.wustl.edu/~jain/atmf/ftp/atm96-1761.pdf
*****
229
13
MOBILE TRANSPORT LAYER
Unit Structure
13.1 Transaction Oriented TCP
13.1.1 What is Transmission Control Protocol (TCP)?
13.1.2 How Transmission Control Protocol works?
13.1.3 TCP vs. UDP
13.1.4 What for TCP is used ?
13.1.5 Why TCP is important?
13.1.6 Location in the TCP/IP stack
13.1.7 TCP/IP vs. OSI model
13.1.8 What is transaction oriented TCP?
13.1.9 How does a transaction take place in TCP?
13.1.10 How is the state model used in T / TCP?
13.1.11 What do you need to know about T / TCP?
13.1.12 Advantage
13.1.13 Disadvantage
13.1.14 T/TCP: TCP for Transactions
13.2 TCP over 2.5 / 3G wireless Networks
13.2.1 Introduction
13.2.2 2.5G and 3G Link Characteristics
13.2.3 Example 2.5G and 3G Deployments
13.2.4 Configuration parameters to adapt TCP to wireless
environments
13.2.5 Optimization Mechanisms
13.2.6 Applications
13.2.7 Open Issues
13.3 Summary
13.4 Unit End Questions
13.5 References
230
However, Internet protocols under-utilize wireless wide area network Mobile Transport Layer
(WWAN) link resources, mainly due to large round trip times (RTTs) and
request–reply protocol patterns. Web browsing is a popular service that
suffers significant performance degradation over 2.5G and 3G. Two main
approaches for improving web browsing performance over wireless links:
(i) using adequate end-to-end parameters and mechanisms and
(ii) interposing a performance enhancing proxy (PEP) between the
wireless and wired parts.
The TCP/IP stack is a model that represents how data is organized and
exchanged over networks using the TCP/IP protocol. It depicts a series of
layers that represent the way data is handled and packaged by a series of
protocols as it makes its way from client to server and vice versa.
TCP exists in the transport layer with other protocols, such as UDP.
Protocols in this layer ensure the error free transmission of data to the
source, except for UDP because it has more limited error checking
capability.
Like the OSI model, the TCP/IP stack is a conceptual model for data
exchange standards. Data is repackaged at each layer based on its
functionality and transport protocols. Requests come down to the server
through the stack, starting at the application layer as data. From there, the
information is broken into packets of different types at each layer. The
data moves the following ways:
● from the application to the transport layer, where it is sorted into TCP
segments;
● to the internet layer where it becomes a datagram;
● to the network interface layer where it breaks apart again into bits and
frames; and
● as the server responds, it travels up through the stack to arrive at the
application layer as data.
234
234
13.1.11 What do you need to know about T / TCP? Mobile Transport Layer
13.1.12 Advantage:
● Efficient for certain applications
13.1.13 Disadvantage:
● Changes in TCP required not transparent
● security problems
Latency:
The latency of 2.5G/3G links is high mostly due to the extensive
processing required at the physical layer of those networks, e.g., for FEC
and interleaving, and due to transmission delays in the radio access
network (including link-level retransmissions). A typical RTT varies
between a few hundred milliseconds and one second. The associated radio
channels suffer from difficult propagation environments. Hence, powerful
but complex physical layer techniques need to be applied to provide high
capacity in a wide coverage area in a resource efficient way. Hopefully,
rapid improvements in all areas of wireless networks ranging from radio
layer techniques over signal processing to system architecture will
ultimately also lead to reduced delays in 3G wireless systems.
240
240
Data Rates: Mobile Transport Layer
The main incentives for transition from 2G to 2.5G to 3G are the increase
in voice capacity and in data rates for the users. 2.5G systems have data
rates of 10-20 kbps in uplink and 10-40 kbps in downlink. Initial 3G
systems are expected to have bit rates around 64 kbps in uplink and 384
kbps in downlink. Considering the resulting bandwidth-delay product
(BDP) of around 1-5 KB for 2.5G and 8-50 KB for 3G, 2.5G links can be
considered LTNs and 3G links approach LFNs (Long Fat Networks as
exemplified by some satellite networks. Accordingly, interested readers
might find related and potentially relevant issues discussed in RFC 2488.
For good TCP performance both LFNs and LTNs require maintaining a
large enough window of outstanding data.
For LFNs, utilizing the available network bandwidth is of particular
concern. LTNs need a sufficiently large window for efficient loss
recovery. In particular, the fast retransmit algorithm cannot be triggered if
the window is less than four segments. This leads to a lengthy recovery
through retransmission timeouts. The Limited Transmit algorithm RFC
3042 helps avoid the deleterious effects of timeouts on connections with
small windows. Nevertheless, making full use of the SACK RFC 2018
information for loss recovery in both LFNs and LTNs may require twice
the window otherwise sufficient to utilize the available bandwidth.
Data rates are dynamic due to effects from other users and from mobility.
Arriving and departing users can reduce or increase the available
bandwidth in a cell. Increasing the distance from the base station
decreases the link bandwidth due to reduced link quality.
Finally, by simply moving into another cell the user can experience a
sudden change in available bandwidth. For example, if upon changing
cells a connection experiences a sudden increase in available bandwidth, it
can underutilize it, because during congestion avoidance TCP increases
the sending rate slowly. Changing from a fast to a slow cell normally is
handled well by TCP due to the self- clocking property. However, a
sudden increase in RTT in this case can cause a spurious TCP timeout . In
addition, a large TCP window used in the fast cell can create congestion
resulting in overbuffering in the slow cell.
Asymmetry:
2.5G/3G systems may run asymmetric uplink and downlink data rates. The
uplink data rate is limited by battery power consumption and complexity
limitations of mobile terminals. However, the asymmetry does not exceed
3-6 times, and can be tolerated by TCP without the need for techniques
like ACK congestion control or ACK filtering . Accordingly, this
document does not include recommendations meant for such highly
asymmetric networks.
241
Wireless and Mobile Delay Spikes:
Technology
A delay spike is a sudden increase in the latency of the communication
path. 2.5G/3G links are likely to experience delay spikes exceeding the
typical RTT by several times due to the following reasons.
1. A long delay spike can occur during link layer recovery from a link
outage due to temporal loss of radio coverage, for example, while
driving into a tunnel or within an elevator.
2. During a handover the mobile terminal and the new base station must
exchange messages and perform some other time-consuming actions
before data can be transmitted in a new cell.
3. Many wide area wireless networks provide seamless mobility by
internally re-routing packets from the old to the new base station
which may cause extra delay.
4. Blocking by high-priority traffic may occur when an arriving circuit-
switched call or higher priority data temporarily preempts the radio
channel. This happens because most current terminals are not able to
handle a voice call and a data connection simultaneously and suspend
the data connection in this case.
5. Additionally, a scheduler in the radio network can suspend a low-
priority data transfer to give the radio channel to higher priority users.
Delay spikes can cause spurious TCP timeouts, unnecessary
retransmissions and a multiplicative decrease in the congestion window
size.
Intersystem Handovers:
In the initial phase of deployment, 3G systems will be used as a 'hot spot'
technology in high population areas, while 2.5G systems will provide
lower speed data service elsewhere. This creates an environment where a
mobile user can roam between 2.5G and 3G networks while keeping
ongoing TCP connections. The inter-system handover is likely to trigger a
high delay spike, and can result in data loss. Additional problems arise
because of context transfer, which is out of scope of this document, but is
being addressed elsewhere in the IETF in activities addressing seamless
mobility.
242
242
Intersystem handovers can adversely affect ongoing TCP connections Mobile Transport Layer
since features may only be negotiated at connection establishment and
cannot be changed later. After an intersystem handover, the network
characteristics may be radically different, and, in fact, may be negatively
affected by the initial configuration. This point argues against premature
optimization by the TCP implementation.
Bandwidth Oscillation:
Given the limited RF spectrum, satisfying the high data rate needs of
2.5G/3G wireless systems requires dynamic resource sharing among
concurrent data users. Various scheduling mechanisms can be deployed in
order to maximize resource utilization. If multiple users wish to transfer
large amounts of data at the same time, the scheduler may have to
repeatedly allocate and de-allocate resources for each user.
Periodic allocation and release of high-speed channels is referred as
Bandwidth Oscillation. Bandwidth Oscillation effects such as spurious
retransmissions were identified elsewhere as factors that degrade
throughput. There are research studies which show that in some cases
Bandwidth Oscillation can be the single most important factor in reducing
throughput. For fixed TCP parameters the achievable throughput depends
on the pattern of resource allocation. When the frequency of resource
allocation and de-allocation is sufficiently high, there is no throughput
degradation. However, increasing the frequency of resource allocation/de-
allocation may come at the expense of increased signaling, and, therefore,
may not be desirable. Standards for 3G wireless technologies provide
mechanisms that can be used to combat the adverse effects of Bandwidth
Oscillation. It is the consensus of the PILC Working Group that the best
approach for avoiding adverse effects of Bandwidth Oscillation is proper
wireless sub-network design .
243
Wireless and Mobile 3G Technology: W-CDMA:
Technology
The International Telecommunication Union (ITU) has selected Wideband
Code Division Multiple Access (W-CDMA) as one of the global telecom
systems for the IMT-2000 3G mobile communications standard. W-
CDMA specifications are created in the 3rd Generation Partnership
Project (3GPP). The link layer characteristics of the 3G network which
have the largest effect on TCP performance over the link are error
controlling schemes such as layer two ARQ (L2 ARQ) and FEC (forward
error correction). W-CDMA uses RLC (Radio Link Control) , a Selective
Repeat and sliding window ARQ. RLC uses protocol data units (PDUs)
with a 16 bit RLC header. The size of the PDUs may vary. Typically,
336 bit PDUs are implemented .This is the unit for link layer
retransmission. The IP packet is fragmented into PDUs for transmission
by RLC.
In W-CDMA, one to twelve PDUs (RLC frames) constitute one FEC
frame, the actual size of which depends on link conditions and bandwidth
allocation. The FEC frame is the unit of interleaving. This accumulation
of PDUs for FEC adds part of the latency . For reliable transfer, RLC has
an acknowledged mode for PDU retransmission. RLC uses checkpoint
ARQ with "status report" type acknowledgments; the poll bit in the header
explicitly solicits the peer for a status report containing the sequence
number that the peer acknowledges. The use of the poll bit is controlled
by timers and by the size of available buffer space in RLC. Also, when
the peer detects a gap between sequence numbers in received frames, it
can issue a status report to invoke retransmission. RLC preserves the
order of packet delivery.
The maximum number of retransmissions is a configurable RLC
parameter that is specified by RRC (Radio Resource Controller) through
RLC connection initialization. The RRC can set the maximum number of
retransmissions (up to a maximum of 40). Therefore, RLC can be
described as an ARQ that can be configured for either HIGH-
PERSISTENCE or LOW-PERSISTENCE, not PERFECT-
PERSISTENCE, according to the terminology.
Since the RRC manages RLC connection state, Bandwidth Oscillation can
be eliminated by the RRC's keeping RF resource on an RLC connection
with data in its queue. This avoids resource de-allocation in the middle of
transferring data.
3G Technology:
CDMA2000 1X-EV: One of the Terrestrial Radio Interface standards for
3G wireless systems, proposed under the International Mobile
Telecommunications- 2000 umbrella, is cdma2000. It employs Multi-
Carrier Code Division Multiple Access (CDMA) technology with a single-
carrier RF bandwidth of 1.25 MHz. cdma2000 evolved from IS-95, a 2G
standard based on CDMA technology. The first phase of cdma2000
utilizes a single carrier and is designed to double the voice capacity of
244
244
existing CDMA (IS-95) networks and to support always-on data Mobile Transport Layer
transmission speeds of up to 316.8 kbps. As mentioned above, these
enhanced capabilities are delivered by cdma2000 1XRTT. 3G speeds of 2
Mbps are offered by cdma2000 1X-EV. At the physical layer, the
standard allows transmission in 5,10,20,40 or 80 ms time frames. Various
orthogonal (Walsh) codes are used for channel identification and to
achieve higher data rates.
Radio Link Protocol Type 3 (RLP) is used with a cdma2000 Traffic
Channel to support CDMA data services. RLP provides an octet stream
transport service and is unaware of higher layer framing. There are
several RLP frame formats. RLP frame formats with higher payload were
designed for higher data rates. Depending on the channel speed, one or
more RLP frames can be transmitted in a single physical layer frame.
RLP can substantially decrease the error rate exhibited by CDMA traffic
channels. When transferring data, RLP is a pure NAK- based finite
selective repeat protocol. The receiver does not acknowledge successfully
received data frames. If one or more RLP data frames are missing, the
receiving RLP makes several attempts (called NAK rounds) to recover
them by sending one or more NAK control frames to the transmitter.
Each NAK frame must be sent in a separate physical layer frame. When
RLP supplies the last NAK control frame of a particular NAK round, a
retransmission timer is set. If the missing frame is not received when the
timer expires, RLP may try another NAK round. RLP may not recover all
missing frames. If after all RLP rounds, a frame is still missing, RLP
supplies data with a missing frame to the higher layer protocols.
13.2.4 Configuration parameters to adapt TCP to wireless
environments:
Based on these characteristics following configuration parameters are
suggested to adapt TCP to wireless environments:
● Large windows: TCP should support large enough window sizes; A
larger initial window may increase performance particularly for short
transmissions. With the help of the windows scale option (RFC 1323)
and larger buffer sizes this can be accomplished
● Limited transmit: It is an extension of Fast Retransmission/Fast
Recovery and is particularly useful when small amounts of data are to
be transmitted
● Large MTU: The larger the MTU (Maximum Transfer Unit) the
faster TCP increases the congestion window. large MTUs may be
used to increase performance. MTU path discovery should be used to
employ larger segment sizes instead of assuming the small default
MTU.
● Selective Acknowledgement (SACK): SACK allows the selective
retransmission of packets and is almost always beneficial compared to
the standard cumulative scheme.
245
Wireless and Mobile ● Explicit Congestion Notification (ECN): allows a receiver to inform
Technology a sender of congestion in the network by setting the ECN-Echo flag
on receiving an IP packet that has experienced congestion. This
mechanism makes it easier to distinguish packet loss due to
transmission errors from packet loss due to congestion
● Timestamp: With the help of timestamps higher delay spikes can be
tolerated by TCP without experiencing a spurious timeout. The effect
of bandwidth oscillation is also reduced.
● No header compression: Header compression is not compatible with
TCP options such as SACK or timestamps.
Selective Acknowledgments:
The selective acknowledgment option (SACK) is effective when multiple
TCP segments are lost in a single TCP window . In particular, if the link
has a large BDP and a certain amount of packet loss rate, the ratio of
multiple segment losses grows high. In such cases, SACK performs better
than traditional and Reno TCP . TCP over 2.5G/3G MUST support SACK.
13.2.6 Applications:
i-mode:
Mobile terminal users want to enjoy the Internet experience on their
handset. This market is emerging and growing rapidly. A deployment
example is i-mode, a wireless Internet service. As of this writing, it is the
largest single wireless internet service in the world, with 19 million
subscribers in Japan.
The next version of i-mode that operates over W-CDMA will be launched
at the end of May 2001. It will deploy the profiled TCP that is described in
this document. The browser embedded in the handset will utilize the
higher speed of 3G infrastructure that can provide up to 384kbps packet
mode service. From the perspective of transport layer, the underlying W-
CDMA network can be viewed as a network with a relatively large BDP
and jitter. The loss rate of IP packets is low due to the ARQ, but the
recovery in the layer two appears as jitter to the higher layers.
The i-mode infrastructure directly conveys IP packets to the gateway for
accessing the Internet. In addition to the operation by the embedded
browser, the i-mode handset can be connected to a computer, a PDA and
the like as a wireless modem. In this mode, most of data communication
facilities can be controlled via AT modem commands. The W-CDMA
infrastructure, whose core network uses GPRS (General Packet Radio
Service), can be viewed as a large PPP link to GGSN (Gateway GPRS
Supporting Node). The other side of GGSN is connected to fixed networks
of ISPs using, for example, leased lines.
WAP:
The WAP Forum is an industry association that has developed standards
for wireless information and telephony services on digital mobile phones
and other wireless terminals. In order to address WAP functionalities for
high speed networks such as 2.5G and 3G networks and to aim at
convergence to the Internet standards, the WAP Forum has been
addressing adoption of TCP as its transport protocol, benefiting from
relevant documents and discussions within IETF and, in particular, its
PILC working group.
WAP Forum is about to release a new generation of specifications for
public review, subject to membership approval. These specifications may
include the profiled TCP that is described in this submission. The WAP
248
248
forum specification profiling TCP is expected to be available for public Mobile Transport Layer
review in the March 2001 timeframe.
249
Wireless and Mobile 13.2.7 Open Issues:
Technology
Other ideas to enhance the performance of TCP over the 2.5G/3G
networks may include the use of T/TCP, ROHC for TCP, Active Queue
Management, Eifel Algorithm and so on. We have been interested in
T/TCP because the Web browsing on a smart phone tends to require short
TCP connection duration and small amount of data transfer. The pattern of
such use is more transactional rather than streaming. Because T/TCP is
regarded as being weak for attacks and not widely deployed, we did not
recommend T/TCP in this document.
In this document, RFC2414 is treated as an experimental status. RFC2414
is now up for reconsideration to become a proposed standard. Should it get
approved as a proposed standard, we can drop the restriction that
CWND=3 or 4 may only be used with gateway. There are some fairly
recent results on using a larger initial cwnd in our web server.
13.3 SUMMARY
Analysis of T/TCP shows that it benefits small, transaction-oriented
transfers more than large-scale information transfers. Aspects of
transactions can be seen in such cases as the World Wide Web, Remote
Procedure Calls and DNS. These applications can benefit from the use of
T/TCP in efficiency and speed. T/TCP reduces on average both the
numbers of segments involved in a transaction and the time taken to
complete the transaction. As T/TCP is still an experimental protocol, there
are problems that need to be addressed. Security problems encountered
include the vulnerability to SYN flood attacks and rlogin authentication
bypassing. Operational problems include the possibility of duplicate
transactions occurring. Problems that occur less frequently would be the
wrapping of the CC values on high-speed connections, thus opening up a
destination host to accepting segments on the wrong connection.
Many people recognize the need for a protocol that favors transaction-
style processing and are willing to accept T/TCP as the answer. Security
considerations lead to the conclusion that T/TCP would be more useful in
a controlled environment, one where there is little danger from a would-be
attacker who can exploit the weaknesses of the standard. Examples of
enclosed environments would be company intranets and networks
protected by firewalls. With many companies seeing the Web as the future
of doing business, internal and external, a system employing T/TCP and
some of the improvements to HTTP, such as compression and delta
encoding, would result in a dramatic improvement in speed within a
company intranet.
Where programmers are willing to accept T/TCP as a solution to their
applications, only minor modifications are needed for the application to
become T/TCP-aware. For client-side programming, it involves the
elimination of the connect and shutdown function calls, which can be
replaced by adding the MSG_EOF flag to the sendto command. Server-
250
250
side modifications involve simply adding the MSG_EOF flag to the send Mobile Transport Layer
function.
13.4 REFERENCES
https://www.linuxjournal.com/article
https://ids-water.com/2020/10/14/what-is-transaction-oriented-tcp/
https://www.slideshare.net/amardeepsingh1902/transaction-tcp-
28115566
https://en.wikipedia.org/wiki/T/TCP
https://linuxgazette.net/issue47/stacey.html
https://datatracker.ietf.org/doc/html/rfc1644
251
Wireless and Mobile https://www.linuxjournal.com/article/3075
Technology
https://www.computer.org/csdl/proceedings-
article/icii/2001/00983568/12OmNzkMlRu
https://snscourseware.org/snsctnew/files/1584119310.pdf
https://www.researchgate.net/publication/3935820_TCP_over_25G_a
nd_3G_ wireless_networks
https://ieeexplore.ieee.org/abstract/document/983568
https://www.academia.edu/22263767/TCP_over_Second_2_5G_and_
Third_3G_Generation_Wireless_Networks
*****
252
252
MODULE VII
14
APPLICATION LAYER
Unit Structure
14.0 Objective
14.1 Introduction
14.2 WAP Wireless Application Protocol
14.2.1 Significance of WAP
14.2.2 Working model of WAP
14.3 WAP Architecture
14.3.1 Advantages of WAP
14.3.2 Disadvantages of WAP
14.3.3 Applications of WAP
14.4 Location based technology
14.4.1 How does location technology track your movements?
14.4.2 Examples of technologies used to track location
14.4.3 Applications of location-based services
14.5 WAP Gateway
14.6 User Agent Profile
14.6.1 Catching mode
14.7 Wireless Bearers for WAP
14.8 Summary
14.9 Unit End Questions
14.0 OBJECTIVE
This chapter will able you to understand the following concept:
● WAP (Wireless Application Protocol
● Working of Wireless Application Protocol or WAP Mode
● WAP architecture
● Advantages of Wireless Application Protocol (WAP)
● Disadvantages of Wireless Application Protocol (WAP)
● Applications of Wireless Application Protocol (WAP)
● Location-based technology with its applications
● WAP user agent profile
● Catching mode
● Wireless bearers for WAP
253
Wireless and Mobile
Technology
14.1 INTRODUCTION
The below figure justify the overall operations perform on WAP
architecture, the WAP protocols and components gets compares with the
architecture of the typical internet architecture which is using the world
wide web. The comparison made mislead not all components and
protocols are shown at the same layer. For a better consistency reasons
they are with the existing specification, which shown in below figure. The
bearer services are used as basis for transmission of data which can be
formed. The further integrated services are specifying by the WAP as it
does not specify bearer services and it uses existing data services.
Examples like message services, such as short message service (SMS) of
GSM, circuit-switched data, such as high-speed circuit switched data
(HSCSD) in GSM, or packet switched data, such as general packet radio
service (GPRS) in GSM. There are many bearers are there like, CDPD, IS-
136, PHS. There is no special interface present between the bearer service
and the next higher layer, the transport layer with its wireless datagram
protocol (WDP) and the additional wireless control message protocol
(WCMP), as it adopted these protocol with bearer specification.
254
14.2.1 Significance: Application Layer
255
Wireless and Mobile
Technology
1. Application Layer:
In this layer the Wireless Application Environment (WAE) is involved,
mobile device specifications, and content development programming
languages, i.e., WML.
256
then run, and WML doesn’t contain WMLScript, just references to Application Layer
WMLScript URLs.
*WTA, WTAI (Wireless Telephony Aplication): programming
interfaces and telephony services.
*Content Formats: Images, calendar information, phone book records
and more in well-defined data formats.
2. Session Layer:
WSP Wireless Session Protocol is involved in session layer. It’s always
deals with or responsible for fast connection suspension and reconnection.
Significance:
● Session management: the long lived connection establishment is
done through the WSP sessions between a client and server. Sessions
can be released at any time. In the mobile application the suspending
and resuming a session are important task.
● Capability negotiation: the client and server is mutually agreed upon
a common level of protocol functionality during session
establishment. Such service like parameter change, outstanding
request process, protocol options, SDU size.
● Content encoding: the binary encoding service is the major feature
provided by the WSP for the content transfer.
3. Transaction Layer:
As the implies this layer is responsible for transmitting the message or
doing the transaction with the support of TCP/IP protocol. This layer is
consisting of Wireless Transaction Protocol (WTP) and runs on top of
UDP (User Datagram Protocol).
257
Wireless and Mobile asynchronous transactions, three classes of transaction service, and more.
Technology The equivalent of WTP in the Internet environment is HTTP.
4. Security Layer:
When the data is transmitted over a network Wireless Transaction Layer
Security (WTLS) is responsible for data integrity, privacy and
authentication.
5. Transport Layer:
Wireless Datagram Protocol (WDP) is involved in this layer. It gives a
consistent data format to higher layers of the WAP protocol stack.
6. Network Layer:
The WAP protocol suite is designed to operate over a variety of bearer
services, like SMS, CDMA, CSD and more. Each bearer offers its own
level of quality of service with respect to delays, throughput and error rate.
The WAP protocol suite is of course designed to tolerate or compensate
for these differing levels of service.
258
Network independent in nature. Application Layer
259
Wireless and Mobile Mobile devices are mainly used Location-based technology, but it can be
Technology applied to any device able to provide a location, including desktop PCs.
GPS:
This process lets your phone know precisely where you are and provide
turn-by-turn navigation. A widespread business use for GPS technology is
GPS fleet tracking software, which businesses use to remotely keep tabs
on their company vehicles and their drivers’ performance.
Wi-Fi:
Cellular technology:
Cellular tracking is much similar with the GPS. Here the mobile is
connected to cellular tower instead of connecting to satellites. you’ll
usually be in the range of at least two towers, enough for the system to use
triangulation to find your location.
QR codes:
260
code is established, its physical location can be recorded. That location Application Layer
can then be tagged anytime the code is scanned.
RFID:
● Store locators: the nearest store location can be find by the customer.
● Fraud prevention: the exact location of the user will know by the
authorize agency hence the fraud can be preventing by the Location-
based service.
Following are some LBS apps which are used by many people
In this application GPRS is established in the bus, when the bus is running
the GPRS is calculating the distance and track where the bus is. The
expected arrival time of bus is shows in the application.
261
Wireless and Mobile 3. Carrot Weather:
Technology
This is the weather indicating app. The nearby sources are calculating the
present forecast. Carrot Weather uses location-based services and APIs.
When you open the Carrot Weather app on your phone, it collates weather
data from several sources into a forecast unique to your exact location.
4. Pokemon Go:
The WAP gateway is act as server to access request. The server gets data
from the requested web site by HTTP and coverts it into an encrypted
form that goes out to the client endpoint.
WML, a Wireless or WAP Protocol Stack determines how data are sent
between the gateway and the user’s device. This type of networking
provides a more capable environment for Internet use as the Internet
grows and expands.
262
Application Layer
A WAP Gateway
263
Wireless and Mobile
Technology
14.6 USER AGENT PROFILE
The schema for WAP User Agent Profiles consists of description blocks
for the following key components:
HardwarePlatform: the terminal device is a collection hardware and
software and some of properties that adequately describe. This description
includes, model number, display size, the type of device, , input and
output methods, etc.
SoftwarePlatform: the software platform consist a collection of
attributes associated with the operating environment of the device. The
information includes things like operating system software, video and
audio encoders supported by the device, and user s preference on
language.
BrowserUA: HTML browser is default browser that uses a set of
applications.
NetworkCharacteristics: the information related to the network is
considered under this scenario and the network-related infrastructure and
environment such as bearer information can also specify.
WapCharacteristics: A set of attributes pertaining to WAP capabilities
supported on the device. This includes details on the capabilities and
characteristics related to the WML Browser, WTA [WTA], etc.
14.8 SUMMARY
The problem with WAP is supposedly the WAP Gateway. Since you want
to have access to data on the Internet and the fact that the WAP protocol
suite isn’t directly compatible to TCP/ IP, HTML and so on, you have to
convert it nearly. That’s where the data security is low, and that’s where it
could be altered due to crimes in hard and software. In numerous WAP
services, getting the rearmost information is essential. That means that
caching data on the gateway might be good for speed, but really not in the
265
Wireless and Mobile case where the data has been streamlined and the old data that's cached is
Technology transferred anyway. Another problem that presumably will grow in the
nearest future is traffic in the gateway because of all the data reused
(encryption, decryption and so on). These are some goods on the end- to-
end geste of a WAP network. Allowing about this and facing the fact that
the computers of moment are snappily getting lower, briskly and less
energy consuming, it’s not far down to suppose that with the new IPv6,
the coming generation of mobile network, and the small handheld
computers, like for case the Cassiopeia 105 by Casio, WAP should enough
soon grow obsolete. Right now WAP works enough well compared to
browsing the internet with a Windows CE computer, since the bandwidth
on the GSM net is so small, but the difference is really not that emotional,
the services and operations not that numerous, and the clientele not that
big. WAP is still to decelerate to sluice any media, let alone present it in a
meaningful way. Hopefully in the coming many times we will see if WAP
is strong enough to survive alongside handheld computers supporting
HTTP and HTML, and a briskly mobile net.
*****
266
15
APPLICATION LAYER
Unit Structure
15.0 Objective
15.1 Introduction
15.1.1WML scripts advantages
15.1.2 WML characteristics
15.2 WML script operator
15.2.1 WML script operator
15.2.2 WML Script Control Statements
15.2.3 WML Scripts Comments
15.3 WML Script Standard Libraries
15.3.1 How to Call a Function in the WML Script Standard Libraries
15.3.2 WML script compiler
15.4 WML script data types
15.5 WML script functions
15.5.1 Calling a Function Located in the Same WMLScript File
15.5.2 Calling a Function Located in a Different WMLScript File
15.6 Distinguish between token base and non-token base algorithm
15.6.1 Applications
15.6.2 WTA logical architecture
15.7 Summary
15.8 Unit End Questions
15.0 OBJECTIVE
This chapter will able you to understand the following concept
● WML scripts with its advantages
● WML Script Operators
● WML Script Control Statements & WML Scripts Comments
● WML Scripts Standard Libraries
● WML Script Functions
● WML Script Compilers
● WML Script Data Types
● WTA
267
Wireless and Mobile
Technology
15.1 INTRODUCTION
WML Scripts:
WML (Wireless Markup Language), is also called as HDML (Handheld
Devices Markup Languages), which is a language that allows to show the
text of Web pages are presented on mobile telephones and personal digital
assistants (PDAs) through wireless access. Several vendors are proposed
and utilise a WML which is part of the Wireless Application Protocol
(WAP) and it sends to the standards bodies. The Wireless Application
Protocol works with the help of standard data link protocols, like Global
System for Mobile communication, Time Division Multiple Access and
code-division multiple access which provides a complete communication
network programs are comparable to and supportive of the Internet set of
protocols.
The free royalty is the characteristics provided by WML. All the
specifications of the WML are available at website named Phone.com's. as
per the Phone.com, a WML is used by any programmer who has the
working knowledge of HTML, common gateway interface, and Structured
Query Language to used presentation layer using WML. HTML pages can
be convert into WML pages through a filter program and can be written or
may be available from a vendor.
15.1.1 Advantages:
1. Because of its User interface WML is much more preferred than the
HTML.
2. WMLScript (Wireless Markup Language Script) is the client-side
scripting language of WML (Wireless Markup Language).
3. A scripting language and programming language are similar in nature,
except it’s lighter weight.
4. WMLScript, can also use by the wireless device to do processing and
computation. Which can reduce the number of requests and responses
to/from the server.
5. WML Script is very similar to Java Script. WML Script components
have almost similar meaning as they have in Java Script
Statement Description
if-else Conditional branching
for Making self-incremented fixed iteration loop
while Making variable iteration loop
break Terminates a loop
continue Quit the current iteration of a loop
while Statement:
In WMLScript's while statement is used to repeat the execution of a block
of statements when a condition is true. It has the following syntax:
while (condition)
{
WMLScript statement(s)
}
The loop will continue until and unless the statement(s) enclosed in the
curly brackets {} will be executed true. The loop stops when condition
evaluates to false or invalid. while statement example:
270
270
var counter = 0; Application Layer
var result = 0;
for loop:
The for loop is executed repeatedly as long as a condition is satisfied. If
you know the number of times the loop is executed, then you can specify
that number in the loop. Syntax
for ([expression1]; [expression2]; [expression3])
{
WMLScript statement(s)
}
The following WML Script example shows how to use the for statement to
execute a block of code 10 times:
var result = 0;
for (var counter=0; counter<10; counter++)
{
result += 2;
}
Break statement:
To quit the loop, the break statement is used. It must be put inside while
loops or for loops. The following WML Script example gives
demonstration of break statement:
var result = 0;
for (var counter=0; counter<10; counter++)
{
break;
result += 2;
}
271
Wireless and Mobile continue Statement:
Technology
The continue statement is used to quit the current iteration of a loop in
WML Script. The next iteration will be started if the loop's conditional
expression evaluates to true. The continue statement must be put inside
while loops or for loops. The following script gives demonstration of
using continue statement:
var result1 = 0;
var result2 = 0;
for (var counter=0; counter<10; counter++)
{
result1 += 2;
continue;
result2 += 2;
}
272
272
Example Function: sqrt(), round(), pow(), ceil(), floor(), int(), Application Layer
maxFloat(), minFloat()
3 String: The manipulation of the String is done through functions
provided by string library.
Example Function − length(), charAt(), find(), replace(), trim(),
compare(), format(), isEmpty(), squeeze(), toString(), elementAt(),
elements(), insertAt(), removeAt(), replaceAt()
4 URL: The manipulation of the URL’s is done through functions
provided by URL library.
Example Function − getPath(), getReferer(), getHost(), getBase(),
escapeString(), isValid(), loadString(), resolve(), unescapeString(),
getFragment()
5 WMLBrowser: The WMLBrowser library provides a group of
functions to control the WML browser or to get information from it.
Example Function: go(), prev(), next(), getCurrentCard(), refresh(),
getVar(), setVar()
6. Dialogs: user interface function involved in Dialogs library with user
can interact with the application.
Example Function − prompt(), confirm(), alert()
273
Wireless and Mobile For example:
Technology
WMLBrowser.go("wmlscript_tutorial.wml");
The go () function have the url as parameter, whereas prev() function does
not take any parameters.
WMLBrowser.prev();
If the program is working fine Both go () and prev() return an empty string
otherwise the function return an invalid value.
2. getCurrentCard() Function:
the current card's URL address can be get through getCurrentCard()
function. if the URL base of the current WML file and the current WML
Script file are the same then the URL returned will be in the relative form,
otherwise the URL returned will be in the absolute form.
If there is no current card, then getCurrentCard() returns invalid.
Example:
extern function func1()
{
var url_str = WMLBrowser.getCurrentCard();
}
Getting and Setting WML Variable Values: getVar() and setVar()
Functions
274
274
The frequently using function getVar() and setVar() functions to write a Application Layer
script code in the WML Script standard library. The value is taken from
the user with the help of getVar() function of a WML variable and the
setVar() function helps us set the value of a WML variable.
Syntax: getVar():
WMLBrowser.getVar(variable_name);
This is the syntax of setVar():
WMLBrowser.setVar(variable_name, value);
The setVar() function is used to set the value to the WML variable
variable_name. setVar() and the function returns true if everything runs
successfully, whereas returns false if value cannot be assigned to
variable_name, and it return invalid if variable_name or value is of the
wrong syntax
Example:
function example_func()
{
WMLBrowser.setVar("message", "Welcome to our WMLScript
tutorial.");
var message = WMLBrowser.getVar("message");
}
275
Wireless and Mobile
Technology
15.4 WML SCRIPTS DATA TYPES
WML script and Java scripts are similar in nature as they are weakly
typed. As it is having only one type of variable, which is var. but
WMLScript variables are carefully handled with five primitive data
types.as we know a variable are used to store a value of any of the five
primitive data types.
276
276
15.5 WML SCRIPTS FUNCTIONS Application Layer
278
278
... Application Layer
wmlscript_variable = Script1#wmlscript_function();
...
}
Since both files wmlscript_1.wmls and wmlscript_2.wmls are located in
the same directory, we just need to use the file name as the URL in the
"use url" statement.
Notice that the function definition of wmlscript_function() starts with the
extern keyword. The extern keyword is required here. It specifies that
wmlscript_function() is allowed to be called from outside
wmlscript_1.wmls.
15.6.1 Applications:
To connect portable computing with the wireless local area network over
the Internet WIFI is used. Standardized as IEEE 802.11 a,b,g,n, Wi-Fi
approaches speeds of some types of wired Ethernet. Wi-Fi can be
279
Wireless and Mobile available in wide range because of its feature of de facto standard.and it is
Technology easily access in private homes, within offices, and at public hotspots.
Cellular data service offers coverage within a range of 10-15 miles from
the nearest cell site. Speeds have increased as technologies have evolved,
from earlier technologies such as GSM, CDMA and GPRS, to 3G
networks such as W-CDMA, EDGE or CDMA2000.
Wherever the other wireless connections are unavailable at that time
Mobile Satellite Communications may be used, like in largely rural
areasor remote locations. Satellite communications are especially
important for transportation, aviation, maritime and military use
Wireless Sensor Networks are responsible for sensing noise, interference,
and activity in data collection networks. This allows us to detect relevant
quantities, monitor and collect data, formulate meaningful user displays,
and to perform decision-making functions.
15.7 SUMMARY
WML (Wireless Markup Language), is also called as HDML (Handheld
Devices Markup Languages), which is a language that allows to show the
text of Web pages are presented on mobile telephones and personal digital
280
280
assistants (PDAs) through wireless access. Several. There are three script Application Layer
operators logical, comparative, airthmatic. When the program is running
the decision making can be done through Conditional statements to run a
script smoothly. If any specific condition occurs with conditional
statements, you can specify different actions to be done. Some conditional
statements like If else, for loop, break, continue, while loop, do while.
There are six standard libraries available in WML script. To move forward
and backword respectively he go() function and the prev() function of the
WMLBrowser standard library are used. The user-defined specified
functions are declared in a separate file with the extension.wmls. The most
common wireless technologies use radio. With radio waves distances can
be short, such as a few meters for television or as far as thousands or even
millions of kilometers for deep-space radio communications.
*****
281