MC Unit1
MC Unit1
com
Unit 1- INTRODUCTION
UNIT I – INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile
Communication Technologies-- Multiplexing – Spread spectrum -MAC Protocols – SDMA-
TDMA- FDMA- CDMA
User mobility refers to a user who has access to the same or similar telecommunication
services at different places, i.e., users communicate (wireless) “anytime, anywhere, with
anyone”
With device portability,1 the communication device moves (with or without a user).
Many mechanisms in the network and inside the device have to make sure that
communication is still possible while the device is moving. devices can be connected
anytime, anywhere to the network
laptop from one hotel to the next, reconnecting to the company’s network via the
telephone network and a modem.
Fixed and wireless: This mode is used for installing networks, e.g., in historical
buildings to avoid damage by installing wires, or at trade shows to ensure fast
network setup.
Mobile and wireless: This is the most interesting case. No cable restricts the user,
who can roam between different wireless networks. Most technologies discussed
in this book deal with this type of device and the networks supporting them.
Today’s most successful example for this category is GSM with more than 800
million users.
accident.
• All the necessary steps for this particular type of accident can be prepared and
specialists can be consulted for an early diagnosis.
• Wireless networks are the only means of communication in the case of natural
disasters such as hurricanes or earthquakes. In the worst cases, only
decentralized, wireless ad-hoc networks survive.
c. Business:
Managers can use mobile computers say, critical presentations to major
customers. They can access the latest market share information. At a small
recess, they can revise the presentation to take advantage of this information.
They can communicate with the office about possible new offers and call
meetings for discussing responds to the new proposals. Therefore, mobile
computers can leverage competitive advantages.
A travelling salesman today needs instant access to the company’s database:
to ensure that files on his or her laptop reflect the current situation, to enable the
company to keep track of all activities of their travelling employees, to keep
databases consistent etc.
With wireless access, the laptop can be turned into a true mobile office, but
efficient and powerful synchronization mechanisms are needed to ensure data
consistency.
d. Credit Card Verification:
At Point of Sale (POS) terminals in shops and supermarkets, when customers
use credit cards for transactions, the intercommunication required between the
bank central computer and the POS terminal, in order to effect verification of the
card usage, can take place quickly and securely over cellular channels using a
mobile computer unit.
This can speed up the transaction process and relieve congestion at the POS
terminals.
e. Replacement of Wired Networks:
wireless networks can also be used to replace wired networks, e.g., remote
sensors, for tradeshows, or in historic buildings.
Physical layer: This is the lowest layer in a communication system and is responsible for
the conversion of a stream of bits into signals that can be transmitted on the sender
side. The physical layer of the receiver then transforms the signals back into a bit stream.
For wireless communication, the physical layer is responsible for frequency
selection, generation of the carrier frequency, signal detection (although heavy
interference may disturb the signal), modulation of data onto a carrier frequency and
(depending on the transmission scheme) encryption.
Data link layer: The main tasks of this layer include accessing the medium,
multiplexing of different data streams, correction of transmission errors, and
synchronization (i.e., detection of a data frame).
Altogether, the data link layer is responsible for a reliable point-to-point connection
between two devices or a point-to-multipoint connection between one sender and
several receivers.
Network layer: This third layer is responsible for routing packets through a network
or establishing a connection between two entities over many other intermediate systems.
Important functions are addressing, routing, device location, and handover between
different networks.
Transport layer: This layer is used in the reference model to establish an end-to-end
connection
Application layer: Finally, the applications (complemented by additional layers that can
support applications) are situated on top of all transmission oriented layers. Functions
are service location, support for multimedia applications, adaptive applications
that can handle the large variations in transmission characteristics, and wireless access
to the world-wide web using a portable device.
The GSM technology was continuously improved to provide better services which
led to development of advanced Technology between 2g and 3g
Provides phone calls
Send/receive e-mail messages
Web browsing
Speed : 64-144 kbps
Camera phones
Take a time of 6-9 mins. to download a 3 mins. MP3 song.
WCDMA Network
1.6 Multiplexing
• Multiplexing describes how several users can share a medium with minimum
or no interference
• It is concerned with sharing the frequency range amongst the users
• Bands are split into channels
• Four main ways of assigning channels
• Space Division Multiplexing (SDM) : allocate according to location
• Time Division Multiplexing (TDM): allocate according to units of time
• Frequency Division Multiplexing (FDM): allocate according to the
frequencies
• Code Division Multiplexing (CDM) : allocate according to access codes
• Guard Space: gaps between allocations
For the remaining channels (k4 to k6) three additional spaces would be needed. In our
highway example this would imply that each driver had his or her own lane.
Drawback
Although this procedure clearly represents a waste of space, this is exactly the principle
used by the old analog telephone system: each subscriber is given a separate pair of
copper wires to the local exchange. In wireless transmission, SDM implies a separate
sender for each communication channel with a wide enough distance between
senders.
B. Frequency division multiplexing
Separation of the whole spectrum into smaller non overlapping
frequency bands (guard spaces are needed)
A channel gets a certain band of the spectrum for the whole time –
receiver has to tune to the sender frequency
Again, guard spaces are needed to avoid frequency band overlapping (also called
adjacent channel interference).
This scheme is used for radio stations within the same region, where each radio station
has its own frequency. This very simple multiplexing scheme does not need complex
coordination between sender and receiver: the receiver only has to tune in to the specific
sender.
• Advantages
No dynamic coordination necessary
Works also for analog signal
Disadvantages:
While radio stations broadcast 24 hours a day, mobile communication typically
takes place for only a few minutes at a time. Assigning a separate frequency for
The typical everyday example of CDM is a party with many participants from
different countries around the world who establish communication channels, i.e.,
they talk to each other, using the same frequency range (approx. 300–6000 Hz
depending on a person’s voice) at the same time. If everybody speaks the same
language, SDM is needed to be able to communicate (i.e., standing in groups,
talking with limited transmit power).
But as soon as another code, i.e., another language, is used, one can tune in to this
language and clearly separate communication in this language from all the other
languages. (The other languages appear as background noise.)
This explains why CDM has built-in security: if the language is unknown, the
signals can still be received, but they are useless. By using a secret code (or
language), a secure channel can be established in a ‘hostile’ environment. (At
parties this may cause some confusion.). Guard spaces are also of importance in
this illustrative example. Using, e.g., Swedish and Norwegian does not really work;
the languages are too close. But Swedish and Finnish are ‘orthogonal’ enough to
separate the communication channels.
Advantages
Bandwidth efficient
No coordination and synchronization necessary
step iii). During transmission, narrowband and broadband interference add to the signal
The sum of interference and user signal is received. The receiver now knows how to
despread the signal, converting the spread user signal into a narrowband signal again,
while spreading the narrowband interference and leaving the broadband interference.
In step v) the receiver applies a bandpass filter to cut off frequencies left and right of the
narrowband signal. Finally, the receiver can reconstruct the original data because the
power level of the user signal is high enough, i.e., the signal is much stronger than the
remaining interference.
Drawbacks:
(i) Increased complexity of receivers that have to despread a signal.
(ii) Large frequency band that is needed due to the spreading of the signal.
Although spread signals appear more like noise, they still raise the background noise level
and may interfere with other transmissions if no special precautions are taken.
• Spreading the spectrum can be achieved in two different ways as shown in
the following two sections
1.7.1 Direct sequence spread spectrum
Direct sequence spread spectrum (DSSS) systems take a user bit stream and
perform an (XOR) with a so-called chipping sequence as shown in below figure.
The example shows that the result is either the sequence 0110101 (if the user bit
equals 0) or its complement 1001010 (if the user bit equals 1). While each user bit has a
duration tb, the chipping sequence consists of smaller pulses, called chips, with a duration
tc.
If the chipping sequence is generated properly it appears as random noise: this
sequence is also sometimes called pseudo-noise sequence.
The spreading factor s = tb/tc determines the bandwidth of the resulting signal.
If the original signal needs a bandwidth w, the resulting signal needs s·w after spreading.
DSSS need additional components as shown in the simplified block diagrams in below
figure
The first step in a DSSS transmitter, the spreading of the user data with the
chipping sequence (digital modulation).
Assuming for example a user signal with a bandwidth of 1 MHz. Spreading with the
above 11-chip Barker code would result in a signal with 11 MHz bandwidth. The
radio carrier then shifts this signal to the carrier frequency (e.g., 2.4 GHz in the ISM band).
The DSSS receiver is more complex than the transmitter. The receiver only
has to perform the inverse functions of the two transmitter modulation steps. However,
noise and multi-path propagation require additional mechanisms to reconstruct the
original data.
The first step in the receiver involves demodulating the received signal. This
is achieved using the same carrier as the transmitter reversing the modulation and
results in a signal with approximately the same bandwidth as the original spread
spectrum signal. Additional filtering can be applied to generate this signal.
If transmitter and receiver are perfectly synchronized and the signal is not too
distorted by noise or multi-path propagation, DSSS works perfectly well according to the
simple scheme shown. Sending the user data 01 and applying the 11-chip Barker code
10110111000 results in the spread ‘signal’ 1011011100001001000111. On the receiver
side, this ‘signal’ is XORed bit-wise after demodulation with the same Barker code as
chipping sequence. This results in the sum of products equal to 0 for the first bit and to
11 for the second bit. The decision unit can now map the first sum (=0) to a binary 0, the
second sum (=11) to a binary 1 – this constitutes the original user data.
1.7.2 Frequency hopping spread spectrum
For frequency hopping spread spectrum (FHSS) systems, the total available
bandwidth is split into many channels of smaller bandwidth plus guard spaces
between the channels.
Transmitter and receiver stay on one of these channels for a certain time and then
In slow hopping, the transmitter uses one frequency for several bit periods.
Above figure shows five user bits with a bit period tb. Performing slow hopping, the
transmitter uses the frequency f2 for transmitting the first three bits during the dwell
time td. Then, the transmitter hops to the next frequency f3. Slow hopping systems are
typically cheaper and have relaxed tolerances, but they are not as immune to narrowband
interference as fast hopping systems.
For fast hopping systems, the transmitter changes the frequency several times
during the transmission of a single bit. In the above figure, the transmitter hops three
times during a bit period. Fast hopping systems are more complex to implement because
the transmitter and receiver have to stay synchronized within smaller tolerances to
perform hopping at more or less the same points in time. However, these systems are
much better at overcoming the effects of narrowband interference and frequency
selective fading as they only stick to one frequency for a very short time.
The below Figures show simplified block diagrams of FHSS transmitters and
receivers respectively.
The first step in an FHSS transmitter is the modulation of user data according
to one of the digital-to analog modulation schemes, e.g., FSK or BPSK. This results in
a narrowband signal, if FSK is used with a frequency f0 for a binary 0 and f1 for a binary
1. In the next step, frequency hopping is performed, based on a hopping sequence.
The hopping sequence is fed into a frequency synthesizer generating the
Compared to DSSS, spreading is simpler using FHSS systems. FHSS systems only use a
portion of the total band at any time, while DSSS systems always use the total bandwidth
available. DSSS systems on the other hand are more resistant to fading and multi-path
effects. DSSS signals are much harder to detect – without knowing the spreading code,
detection is virtually impossible. If each sender has its own pseudo-random number
sequence for spreading the signal (DSSS or FHSS), the system implements CDM.
The two frequencies are also known as uplink, i.e., from mobile station to base station or
from ground control to satellite, and as downlink, i.e., from base station to mobile station
or from satellite to ground control.
The basic frequency allocation scheme for GSM is fixed and regulated by national
authorities.
All uplinks use the band between 890.2 and 915 MHz,
All downlinks use 935.2 to 960 MHz.
According to FDMA, the base station, shown on the right side, allocates a certain
frequency for up- and downlink to establish a duplex channel with a mobile phone.
Up- and downlink have a fixed relation. If the uplink frequency is fu = 890 MHz +
n·0.2 MHz, the downlink frequency is fd = fu + 45 MHz,
i.e., fd = 935 MHz + n·0.2 MHz for a certain channel n.
The base station selects the channel. Each channel (uplink and downlink) has a
bandwidth of 200 kHz.
This scheme also has disadvantages. While radio stations broadcast 24 hours
a day, mobile communication typically takes place for only a few minutes at a time.
Assigning a separate frequency for each possible communication scenario would
be a tremendous waste of (scarce) frequency resources.
Additionally, the fixed assignment of a frequency to a sender makes the scheme
very inflexible and limits the number of senders.
3.TDMA
A more flexible multiplexing scheme for typical mobile communications is time division
multiplexing (TDM). Compared to FDMA, time division multiple access (TDMA) offers
a much more flexible scheme, which comprises all technologies that allocate certain
time slots for communication.
Now synchronization between sender and receiver has to be achieved in the time
domain. Again this can be done by using a fixed pattern similar to FDMA techniques, i.e.,
allocating a certain time slot for a channel, or by using a dynamic allocation scheme.
Listening to different frequencies at the same time is quite difficult, but listening to
many channels separated in time at the same frequency is simple. Fixed schemes do not
need identification, but are not as flexible considering varying bandwidth requirements.
3.1 Fixed TDM
The simplest algorithm for using TDM is allocating time slots for channels in a
fixed pattern. This results in a fixed bandwidth and is the typical solution for
wireless phone systems.
MAC is quite simple, as the only crucial factor is accessing the reserved time slot
at the right moment.
If this synchronization is assured, each mobile station knows its turn and no
interference will happen.
The fixed pattern can be assigned by the base station, where competition
between different mobile stations that want to access the medium is solved.
The above figure shows how these fixed TDM patterns are used to implement
multiple access and a duplex channel between a base station and mobile station.
Assigning different slots for uplink and downlink using the same frequency
is called time division duplex (TDD).
As shown in the figure, the base station uses one out of 12 slots for the downlink,
whereas the mobile station uses one out of 12 different slots for the uplink. Uplink
and downlink are separated in time. Up to 12 different mobile stations can use the
same frequency without interference using this scheme. Each connection is
allotted its own up- and downlink pair.
This general scheme still wastes a lot of bandwidth.
It is too static, too inflexible for data communication. In this case,
connectionless, demand-oriented TDMA schemes can be used
This is a random access scheme, without a central arbiter controlling access and
without coordination among the stations.
If two or more stations access the medium at the same time, a collision occurs and
the transmitted data is destroyed.
Resolving this problem is left to higher layers (e.g., retransmission of data). The
simple Aloha works fine for a light load and does not require any complicated
access mechanisms.
3.3Slotted Aloha
The first refinement of the classical Aloha scheme is provided by the introduction
of time slots (slotted Aloha).
In this case, all senders have to be synchronized, transmission can only start at
the beginning of a time slot as shown below.
If a station misses the time-slot, the station must wait until the beginning of the
next time-slot
The introduction of slots raises the throughput from 18 per cent to 36 per cent, i.e.,
slotting doubles the throughput. Both basic Aloha principles occur in many systems that
implement distributed access to a medium. Aloha systems work perfectly well under a
light load, but they cannot give any hard transmission guarantees, such as maximum
delay before accessing the medium or minimum throughput.
1) 1-Persistent
• Before sending a frame, a station senses the line (Figure 12.10a).
i) If the line is idle, the station sends immediately (with probability = 1).
ii) If the line is busy, the station continues sensing the line.
• This method has the highest chance of collision because 2 or more stations:
→ may find the line idle and
→ send the frames immediately.
2) Non-persistent
• Before sending a frame, a station senses the line (Figure 12.10b).
i) If the line is idle, the station sends immediately.
ii) If the line is busy, the station waits a random amount of time and then
senses the line again.
• This method reduces the chance of collision because 2 or more stations:
→ will not wait for the same amount of time and
→ will not retry to send simultaneously.
3) P-Persistent
• This method is used if the channel has time-slots with a slot-duration equal to or
greater than the maximum propagation time (Figure 12.10c).
• Advantages:
i)It combines the advantages of the other 2 methods.
ii) It reduces the chance of collision and improves efficiency.
• After the station finds the line idle, it follows these steps:
1) With probability p, the station sends the frame.
2) With probability q=1-p, the station waits for the beginning of the next
time-slot and checks the line again.
i) If line is idle, it goes to step 1.
ii) If line is busy, it assumes that collision has occurred and uses the
back off procedure.
3.5 Reservation algorithms
1. DAMA - Demand Assigned Multiple Access
• Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming
Poisson distribution for packet arrival and packet length)
In a fixed TDM scheme N mini-slots followed by N·k data-slots form a frame that
is repeated.
Each station is allotted its own mini-slot and can use it to reserve up to k data-
slots. This guarantees each station a certain bandwidth and a fixed delay. Other
stations can now send data in unused data-slots as shown.
Using these free slots can be based on a simple round-robin scheme or can be
uncoordinated using an Aloha scheme.
This scheme allows for the combination of, e.g., isochronous traffic with fixed
bitrates and best-effort traffic without any guarantees.
3.5 MACA - collision avoidance
• MACA (Multiple Access with Collision Avoidance) uses short signaling
packets for collision avoidance
• RTS (request to send): a sender request the right to send from a
receiver with a short RTS packet before it sends a data packet
• CTS (clear to send): the receiver grants the right to send as soon as it
is ready to receive
• Signaling packets contain
• sender address
• receiver address
• packet size
• MACA avoids the problem of hidden terminals
4.CDMA
Code division multiple access systems apply codes with certain characteristics
to the transmission to separate different users in code space and to enable access
to a shared medium without interference.
All terminals send on the same frequency probably at the same time and can
use the whole bandwidth of the transmission channel.
Each sender has a unique random number, the sender XORs the signal with
this random number.
The receiver can “tune” into this signal if it knows the pseudo random
number, tuning is done via a correlation function
Disadvantages:
higher complexity of a receiver (receiver cannot just listen into the medium and
start receiving if there is a signal)
all signals should have the same strength at a receiver
Advantages:
all terminals can use the same frequency, no planning needed
huge code space (e.g. 232) compared to frequency space
interferences (e.g. white noise) is not coded
forward error correction and encryption can be easily integrated
Example:
The following figure shows a sender A that wants to transmit the bits 101. The key of A is
shown as signal and binary sequence Ak. The binary “0” is assigned a positive signal value,
the binary “1” a negative signal value. After spreading, i.e., XORing Ad and Ak, the
resulting signal is As.
The same happens with data from sender B with bits 100. The result is Bs. As and Bs now
superimpose during transmission. The resulting signal is simply the sum As + Bs as
shown above. A now tries to reconstruct the original data from Ad. The receiver applies
A’s key, Ak, to the received signal and feeds the result into an integrator. The integrator
adds the products, a comparator then has to decide if the result is a 0 or a 1 as shown
below. As clearly seen, although the original signal form is distorted by B’s signal, the
result is quite clear. The same happens if a receiver wants to receive B’s data.
Soft handover or soft handoff refers to a feature used by the CDMA and WCDMA
standards, where a cell phone is simultaneously connected to two or more cells (or cell
sectors) during a call. If the sectors are from the same physical cell site (a sectorised site),
it is referred to as softer handoff. This technique is a form of mobile-assisted handover,
for IS-95/CDMA2000 CDMA cell phones continuously make power measurements of a
list of neighboring cell sites, and determine whether or not to request or end soft
handover with the cell sectors on the list.
Soft handoff is different from the traditional hard-handoff process.
With hard handoff, a definite decision is made on whether to hand off or not. The
handoff is initiated and executed without the user attempting to have simultaneous
traffic channel communications with the two base stations. With soft handoff, a
conditional decision is made on whether to hand off. Depending on the changes in pilot
signal strength from the two or more base stations involved, a hard decision will
eventually be made to communicate with only one. This normally happens after it is
evident that the signal from one base station is considerably stronger than those from the
others. In the interim period, the user has simultaneous traffic channel communication
with all candidate base stations. It is desirable to implement soft handoff in power-
controlled CDMA systems because implementing hard handoff is potentially difficult in
such systems.