Upload
kejrikatha
View
220
Download
0
Embed Size (px)
Citation preview
7/28/2019 Dmc 1630 - Mobile Computing
1/112
MCA(DISTANCE MODE)
DMC 1630
MOBILE COMPUTING
COURSE MATERIAL
Centre for Distance EducationAnna University Chennai
Chennai 600 025
7/28/2019 Dmc 1630 - Mobile Computing
2/112
Author
DrDrDrDrDr. P. P. P. P. P. Nar. Nar. Nar. Nar. NaraaaaayyyyyanasamyanasamyanasamyanasamyanasamyProfessor and Head,
Department of Computer Science & EngineeringAnna University
Chennai 600025
Reviewer
GGGGG. K. K. K. K. KousalyousalyousalyousalyousalyaaaaaProfessor
Department of Computer Science & EngineeringSri Krishna College of Engineering and Technology
Coimbatore - 641 008A
DrDrDrDrDr.T.T.T.T.T.V.V.V.V.V.Geetha.Geetha.Geetha.Geetha.GeethaProfessor
Department of Computer Science and EngineeringAnna University Chennai
Chennai - 600 025
DrDrDrDrDr.H.P.H.P.H.P.H.P.H.Pee reeree reereeru Mohamedu Mohamedu Mohamedu Mohamedu MohamedProfessor
Department of Management StudiesAnna University Chennai
Chennai - 600 025
DrDrDrDrDr.C.C.C.C.C. Chella. Chella. Chella. Chella. ChellappanppanppanppanppanProfessor
Department of Computer Science and EngineeringAnna University Chennai
Chennai - 600 025
DrDrDrDrDr.A.K.A.K.A.K.A.K.A.KannanannanannanannanannanProfessor
Department of Computer Science and EngineeringAnna University Chennai
Chennai - 600 025
Copyrights Reserved(For Private Circulation only)
Editorial Board
7/28/2019 Dmc 1630 - Mobile Computing
3/112
7/28/2019 Dmc 1630 - Mobile Computing
4/112
7/28/2019 Dmc 1630 - Mobile Computing
5/112
ACKNOWLEDGEMENT
Next generation communication networks have been focusing on ubiquitous multimedia computing. It
aims towards seamless integration of different devices and network technologies together. Mobility, now-a-days,
becomes an integral part of any networking system. This study material is intended to prepare the students towards
such a design and practice of future communication networks. Students are required to have the basic knowledge
of communication networks and also the application domains of Internet.
This study material introduces the field of mobile computing and focuses on digital data transfer. It starts
with an overview of wireless technologies which cover signal processing, multiplexing and modulation. Media access
schemes that are adaptable for wireless communication are discussed in detail.
Mobile technologies, such as GSM, UMTS, GPRS, etc., are covered in depth. Wireless LANs such as
IEEE 802.11, HIPERLAN and Bluetooth are introduced. Several approaches for extending IP and TCP to adapt
mobile communication are also discussed. Finally, WAP which enables wireless and mobile devices to use World
Wide Web services are also covered.
As an author, I am thankful to Dr.B.N.Sankar, Director, CDE and Dr.T.V.Geetha, Deputy Director, CDE
who gave me an opportunity to design this study material on MOBILE COMPUTING for the students of
M.C.A. Also, I express my sincere thanks to my Research Scholars Mr.V.Mariappan and Ms.G.Kousalya who
supported me throughout in preparing this study material.
Dr. P .Narayanasamy
Author
7/28/2019 Dmc 1630 - Mobile Computing
6/112
7/28/2019 Dmc 1630 - Mobile Computing
7/112
DMC 1630 MOBILE COMPUTING
1. INTRODUCTION
Medium Access Control : Motivation for Specialized MAC SDMA-FDMA- TDMA CDMA Comparison
of Access mechanisms Tele Communications :GSM DECT TETRA UMTS IMT 200 Satellite
Systems: Basics Routing Localization Handover Broadcast Systems: Overview Cyclic Repetition of
Data Digital Audio Broadcasting Digital Video Broadcasting
2. WIRELESS NETWORKS
Wireless LAN: Infrared - Radio Transmission Infrastructure Networks Ad hoc Networks IEEE
802.11 HIPERLAN Bluetooth Wireless ATM: Working Group Services Reference Model Functions
Radio Access Layer Handover Location Management Addressing Mobile Quality of Service Access
Point Control Protocol.
3. MOBILE NETWORK LAYER
Mobile IP: Goals Assumptions and Requirement Entities IP packet Delivery Agent Advertisement
and Discovery Registration Tunneling and Encapsulation Optimization Reverse Tunneling Ipv6
DHCP Ad hoc Networks.
4. MOBILE TRANSPORT LAYER
Traditional TCP Indirect TCP Snooping TCP Mobile TCP Fast retransmit/Fast Recovery
Transmission/Timeout Freezing Selective Retransmission Transaction Oriented TCP.
5. WAP
Architecture Datagram Protocol Transport Layer Security Transaction Protocol Session Protocol
Application Environment Wireless Telephony Application.
7/28/2019 Dmc 1630 - Mobile Computing
8/112
7/28/2019 Dmc 1630 - Mobile Computing
9/112
CONTENTS
UNIT I
INTRODUCTION
CHAPTER 1
MEDIA ACCESS CONTROL
1.1 INTRODUCTION 1
1.2 ACCESS MECHANISMS 1
1.2.1 SDMA 1
1.2.2 FDMA 21.2.3 TDMA 3
1.2.4 CDMA 4
1.2.5 Comparison of Access Mechanism 5
1.3 QUESTIONS 5
CHAPTER 2
CELLULAR NETWORKS
2.1 INTRODUCTION 6
2.2 HISTORY OF CELLULAR SERVICE 6
2.3 THE EVOLUTION OF CELLULAR SERVICE 6
2.3.1 Digital Cellular Service 7
2.3.2 Personal Communications Services 7
2.4 BASIC NETWORK OPERATIONS 8
2.4.1 Terminal 8
2.4.2 Base Station 8
2.4.3 Cell Organization 9
2.5 CHALLENGES OF CELLULAR COMMUNICATION 10
2.5.1 Network Routing 11
2.5.2 Signal Corruption 12
2.6 HANDOFF STRATEGIES 14
2.7 QUESTIONS 17
i
7/28/2019 Dmc 1630 - Mobile Computing
10/112
CHAPTER 3
TELECOMMUNICATIONS SYSTEMS3.1 INTRODUCTION 38
3.2 CELLULAR COMMUNICATION STANDARDS 19
3.2.1 AMPS 19
3.2.2 IS-54/136 20
3.2.3 GSM 21
3.2.4 IS-95 22
3.3 GSM 22
3.3.1 GSM Specifications 23
3.3.2 GSM Services 24
3.3.3 The GSM Network 26
3.3.4 GSM Network Areas 28
3.4 QUESTIONS 29
CHAPTER 4
SATELLITE SYSTEMS
4.1 INTRODUCTION 30
4.1.1 Purpose 30
4.1.2 Communications satellites 30
4.1.3 Other applications 30
4.2 GLOBAL SATELLITE SYSTEMS 314.3 TYPES OF SATELLITE SYSTEMS 32
4.3.1 GEO 32
4.3.2 LEO 33
4.3.3 MEO 35
4.3.4 HEO 36
4.4 QUESTIONS 36
CHAPTER 5
BROADCAST SYSTEMS
5.1 INTRODUCTION 37
5.2 BROADCAST DISK 38
5.3 DAB 38
5.3.1 DAB Systems 38
5.3.2 Benefits of DAB 40
5.4 DMB 41
5.4.1 DMB System 41
5.4.2 Benefits of DMB 42
5.5 QUESTIONS 42
ii
7/28/2019 Dmc 1630 - Mobile Computing
11/112
UNIT II
WIRELESS NETWORKS
CHAPTER 6
WIRELESS LAN
6.1 INTRODUCTION 43
6.2 IEEE 802 11 ARCHITECTURE 43
6.2.1 Architecture Components 43
6.2.2 IEEE 802.11 Layers Description 44
6.2.3 The MAC Layer 44
6.3 HOW DOES A STATION JOIN AN EXISTING CELL (BSS) 49
6.4 THE AUTHENTICATION PROCESS 49
6.5 THE ASSOCIATION PROCESS 496.6 ROAMING 49
6.6.1 Synchronization 50
6.7 SECURITY 50
6.7.1 Preventing Access to Network Resources 50
6.8 POWER SAVING 51
6.9 QUESTIONS 51
CHAPTER 7
BLUETOOTH
7.1 INTRODUCTION 52
7.2 BLUETOOTH CONCEPTS 52
7.2.1 Bluetooth Connections 53
7.2.2 Reliable and Secure Transmission 53
7.2.3 Low Power Architecture 54
7.2.4 Interoperability, standards, and specifications 54
7.3 BLUETOOTH TERMINOLOGY 55
7.3.1 Bluetooth Stack 55
7.3.2 Links and Channels 56
7.3.3 Protocols 57
7.3.4 Bluetooth Networking 58
7.4 QUESTIONS 59
iii
7/28/2019 Dmc 1630 - Mobile Computing
12/112
CHAPTER 8
WIRELESS ATM
8.1 INTRODUCTION 60
8.2 WIRELESS ATM REFERENCE MODELS 60
8.2.1 Fixed Wireless Components 60
8.2.2 Mobile End Users 61
8.2.3 Mobile Switches with Fixed End Users 61
8.2.4 Mobile Switches with Mobile End Users 61
8.2.5 Inter working with PCS 61
8.2.6 Wireless Ad Hoc Networks 61
8.3 WATM DESIGN ISSUES 62
8.3.1 Wireless ATM Protocol Architecture 62
8.3.2 Radio Access Layer 62
8.3.3 Mobile ATM 64
8.4 SUMMARY 65
8.5 QUESTIONS 65
UNIT III
MOBILE NETWORK LAYERCHAPTER 9
MOBILE NETWORK LAYER
9.1 INTRODUCTION 67
9.2 COMPONENTS OF MOBILE IP 67
9.3 HOW MOBILE IP WORKS 68
9.3.1 Agent Discovery 68
9.3.2 Registration 69
9.3.3 Tunneling 70
9.4 SECURITY 72
9.5 SOLUTION TO NETWORK MOBILITY 72
9.6 OVERVIEW OF AD-HOC NETWORKING 73
9.6.1 Routing in Ad Hoc Networks 73
9.7 QUESTIONS 74
iv
7/28/2019 Dmc 1630 - Mobile Computing
13/112
UNIT IV
MOBILE TRANSPORT LAYER
CHAPTER 10
MOBILE TRANSPORT LAYER
10.1 OVERVIEW 75
10.1.1 Slow Start and Congestion Avoidance 75
10.1.2 Fast Retransmit and Fast Recovery 77
10.1.3 TCP Options 77
10.1.4 Other Mechanisms 78
10.2 PROBLEMS WITH TCP IN WIRELESS NETWORKS 79
10.3 OPTIMIZATIONS 79
10.3.1 Link Layer 80
10.3.2 Snoop 80
10.3.3 Split Connection 81
10.4 COMPARISON OF DIFFERENT APPROACHES 82
10.5 QUESTIONS 82
UNIT V
WIRELESS APPLICATION PROTOCOL
CHAPTER 11
WIRELESS APPLICATION PROTOCOL
11.1 INTRODUCTION 83
11.1.1 History 84
11.1.2 Benefits 85
11.2 ARCHITECTURE OVERVIEW 86
11.2.1 WWW Model 86
11.2.2 WAP Model 87
11.2.3 Example WAP network 88
11.2.4 WAP Network Elements 89
11.2.5 Device Architecture 90
11.2.6 Security Model 90
11.3 COMPONENTS OF THE WAP ARCHITECTURE 91
11.3.1 Bearer Layer 91
11.3.2 Transport Layer Wireless Datagram Protocol (WDP) 92
11.3.3 Transfer Services 92
11.3.4 Security Layer Wireless Transport Layer Security (WTLS) 92
11.3.5 Transaction Layer Wireless Transaction Protocol (WTP) 93v
7/28/2019 Dmc 1630 - Mobile Computing
14/112
11.3.6 Session Layer Wireless Session Protocol (WSP) 93
11.3.7 Application Layer Wireless Application Environment (WAE) 94
11.3.8 Security Services 94
11.3.9 Service Discovery 95
11.3.10 Other Service and Applications 95
11.4 SUMMARY 96
11.5 QUESTIONS 96
vi
7/28/2019 Dmc 1630 - Mobile Computing
15/112
MOBILE COMPUTING
NOTES
1 ANNA UNIVERSITY CHENNAI
UNIT I
INTRODUCTION
CHAPTER I
MEDIA ACCESS CONTROL
1.1 INTRODUCTION
The Media Access Control (MAC) data communication protocol sub-layer, also
known as the Medium Access Control, is a sub layer of the Data Link Layer specified in
the seven-layer OSI model (layer 2). It provides addressing and channel access control
mechanisms that make it possible for several terminals or network nodes to communicate
within a multipoint network, typically a local area network (LAN) or metropolitan area
network (MAN).
The MAC sub-layer acts as an interface between the Logical Link Control (LLC)
sub layer and the networks physical layer. The MAC layer emulates a full-duplex logicalcommunication channel in a multipoint network. This channel may provide unicast, multicast
or broadcast communication service.
1.2 ACCESS MECHANISMS
A limited amount of bandwidth is allocated for wireless services. A wireless system is
required to accommodate as many users as possible by effectively sharing the limited
bandwidth. Therefore, in the field of communications, the term multiple access could be
defined as a means of allowing multiple users to simultaneously share the finite bandwidth
with least possible degradation in the performance of the system. There are several techniques
how multiple accessing can be achieved. There are four basic schemes. Space Division Multiple Access (SDMA)
Frequency Division Multiple Access (FDMA)
Time Division Multiple Access (TDMA)
Code Division Multiple Access (CDMA)
1.2.1 SDMA
SDMA utilizes the spatial separation of the users in order to optimize the use of the
frequency spectrum. A primitive form of SDMA is when the same frequency is re-used in
different cells in a cellular wireless network. However for limited co-channel interference it
7/28/2019 Dmc 1630 - Mobile Computing
16/112
7/28/2019 Dmc 1630 - Mobile Computing
17/112
MOBILE COMPUTING
NOTES
3 ANNA UNIVERSITY CHENNAI
that separate neighboring channels. This leads to a waste of bandwidth. When continuous
transmission is not required, bandwidth goes wasted since it is not being utilized for a
portion of the time. In wireless communications, FDMA achieves simultaneous transmission
and reception by using Frequency Division Duplexing (FDD). In order for both thetransmitter and the receiver to operate at the same time, FDD requires duplexers. The
requirement of duplexers in the FDMA system makes it expensive.
Figure1.2 Channel Usage by FDMA
1.2.3 TDMA
In digital systems, continuous transmission is not required because users do not use
the allotted bandwidth all the time. In such systems, TDMA is a complimentary accesstechnique to FDMA. Global Systems for Mobile communications (GSM) uses the TDMA
technique. In TDMA, the entire bandwidth is available to the user but only for a finite
period of time. In most cases the available bandwidth is divided into fewer channels compared
to FDMA and the users are allotted time slots during which they have the entire channel
bandwidth at their disposal. This is illustrated in Figure 1.3. TDMA requires careful time
synchronization since users share the bandwidth in the frequency domain. Since the number
of channels are less, inter channel interference is almost negligible, hence the guard time
between the channels is considerably smaller. Guard time is spacing in time between the
TDMA bursts. In cellular communications, when a user moves from one cell to anotherthere is a chance that user could experience a call loss if there are no free time slots
available. TDMA uses different time slots for transmission and reception. This type of
duplexing is referred to as Time Division Duplexing (TDD). TDD does not require duplexers.
7/28/2019 Dmc 1630 - Mobile Computing
18/112
7/28/2019 Dmc 1630 - Mobile Computing
19/112
MOBILE COMPUTING
NOTES
5 ANNA UNIVERSITY CHENNAI
Figure 1.5 Walsh Code
1.2.5 Comparison of Access Mechanism
1.3 QUESTIONS
1. Define TDD & FDD
2. Explain & compare various access technologies.
7/28/2019 Dmc 1630 - Mobile Computing
20/112
DMC 1630
NOTES
6 ANNA UNIVERSITY CHENNAI
CHAPTER - 2
CELLULAR NETWORKS
2.1 INTRODUCTION
Cellular networks got their name because of the way they divide service areas into
cells. A cell is a relatively small area that is serviced by a single transmitter/receiver unit (cell
site). Mobile phones operating within this area use that cell site to communicate with the
rest of the cellular network and with the public phone network.
The basic premise of a cellular network is that user can have a communication device,
starting with car phones, which have evolved into hand-held phones. Over time, hand-heldphones have been getting smaller, gaining longer battery life, and getting new features like
paging. Network coverage and capacity have also increased to the point where cellular
service is available almost anywhere and at any time to those that want to use it. Cellular
service has seen tremendous acceptance, especially in the last few years, with millions of
new subscribers each year and the new subscriber rate growing.
2.2. HISTORY OF CELLULAR SERVICE
Cellular service was invented by Bell Laboratories and introduced around 1980,
based on radio-telephone systems that dated back to 1940s. The Bell Labs offeringbecame the basis for the Advanced Mobile Phone System (AMPS), which is the current
standard for U.S. cellular service. It is the least common denominator of U.S. cellular
service, and the FCC has mandated that all U.S. cellular phones must fall back to AMPS
service at least until the year 2002.
Many nations adopted variants of AMPS service, such as Nordic Mobile Telephone
(NMT), first introduced in Scandinavia, Total Access Communication System (TACS),
first introduced in Britain, and other systems introduced in France, Italy, and Germany.
The protocols and communications standards used by each of these varied slightly, so that
the various European analog systems were not compatible with each other.
2.3 THE EVOLUTION OF CELLULAR SERVICE
Most U.S. cellular service still uses the same AMPS analog technology that was used
in the earliest mobile telephones, although digital cellular service is rapidly gaining popularity.
The key motivator for this is that digital cellular networks can offer more subscriber channels
over the same radio bandwidth, although digital networks can offer additional services as
well.
7/28/2019 Dmc 1630 - Mobile Computing
21/112
MOBILE COMPUTING
NOTES
7 ANNA UNIVERSITY CHENNAI
Unlike ISDN, Asynchronous Transfer Mode (ATM) and other innovations in regular
telephony, cellular systems have fewer infrastructures to be replaced when new ideas are
developed. Coupled with the rapid growth of cellular service, it is possible to make sweeping
changes in the basic nature of cellular service. In fact, it is perhaps too easy to change,
causing much debate over what the cellular network of the future should look like. A large
division is over whether to use TDMA methods over existing analog frequencies or to use
spread-spectrum CDMA methods.
2.3.1 Digital Cellular Service
Europe was the first to embrace digital service with the Global System for Mobile
communication (GSM). The incompatible existing analog system in the 1980s made it
impossible to use a single mobile phone in several European countries. With the European
Union and increased trade and commerce throughout Europe, a need was seen for a single
European standard. To choose one of the existing standards would have given an unfair
advantage to those that already provided that service, so it made sense to create an entirely
new service that could take advantage of technological advances since the advent of cellular
service. Thus, the Group Special Mobile, European Telecommunication Standard Institute
(ETSI) committee was formed. It established the GSM standard in the 1980s; GSM was
first implemented in 1992-1993. This all-digital standard became the least common
denominator of service in Europe, and is quickly replaced the analog systems currently in
place.
U.S. digital systems have also recently emerged, with IS-54 (also called D-AMPS or
U.S. TDMA) systems already in place, and replaced by IS-136 systems (the successor to
IS-54). One more major cellular service provider putting a competing system in place
called IS-95 (or U.S. CDMA). Other two important Japanese digital standards are: Personal
Hand phone System (PHS) and Personal Digital Cellular (PDC), which both use TDMA
like IS-54/136 and GSM.
2.3.2 Personal Communications Services
There is a great deal of talk about Personal Communications Services (PCS). FCC
auctioned off 160 MHz of radio spectrum for PCS services, which defined as a broad
range of radio communication services freeing users from the limitations of wired phone
networks. These are essentially cellular phone systems, although the intent of PCS systems
is not to supplement the existing phone system but rather to become an integral part of it.
The first specification for a Personal Communication Network was actually made in
1990 based on the GSM cellular standard at the request of the United Kingdom. It became
part of the GSM standard, which includes GSM-900 (the cellular standard) and DCS-
1800 (the PCN standard). A variant, PCS-1900, is one of the contending standards for
PCS service in the United States.
7/28/2019 Dmc 1630 - Mobile Computing
22/112
DMC 1630
NOTES
8 ANNA UNIVERSITY CHENNAI
2.4 BASIC NETWORK OPERATIONS
Traditional mobile phone service has used only terrestrial radio. In other words, it
relies on ground-based cell sites, which are usually small towers with three antennae arranged
in a triangle. Satellite implementations are possible, although they cannot use radio bandwidth
as efficiently. Thus, they are used commercially primarily for pager, broadcast, and some
specific site-to-site links.
A cellular network is designed to connect to the existing phone system (Public Switched
Telephone Network (PSTN)) or potentially to a data network (Public Data Network
(PDN)). The connection to the PSTN is not much different than the connection to other
telephone switching equipment such as a Public Branch Exchange (PBX).
Cellular networks are comprised of terminals and base stations. Terminals are the
end-user equipment (Mobile Stations). Everything else in a cellular network is consideredto be base station equipment.
2.4.1 Terminal
There are three types of cellular terminals. Each type has different output power
restrictions, based on how near the antenna is to people when it is in operation. They are
summarized in Table 2.1.
Table 2.1 Type of Terminals
Fixed installations might be used in dwellings that cannot be reached via landlines or
where landlines would be impractical. These are not too power-constrained, although the
vast majority of terminals face strict power constraints. In addition, portable phones are
usually running on very limited battery power.
Most terminals are extremely cost-constrained as well. The sheer number of consumers
and competitors in the market is the primary reason for this. When the basic requirements
for the GSM standard were written in 1985, there was even a specific requirement thatthe system parameters shall be chosen with a view to limit the cost of the complete system,
in particular the mobile units.
2.4.2 Base Station
There are three components of base stations.
Base Transceiver Station (BTS): BTS communicates directly with the end-user terminals and also called as cell site.
Base Station Controller (BSC): BSC controls the base transceiver stations
either over land links (typically) or over radio links.
Type Output Power
Portable (hand-held) Less than 0.6 WattsMobile (car or bag phones) Less than 3 WattsFixed No fixed limit
7/28/2019 Dmc 1630 - Mobile Computing
23/112
MOBILE COMPUTING
NOTES
9 ANNA UNIVERSITY CHENNAI
Mobile Switching Center (MSC): MSC controls the base station controllers,usually over land links and also called as mobile telephone switching office.
There is no fixed ratio of BTS to BSC to MSC, although there are typically about five
to ten BTSs per BSC and anywhere from one to ten BSCs per MSC, depending on the
capacity needs and geographic distribution of an area. In fact, base station functions may
be combined into a single site, especially in the more remote areas where a single site might
serve as BTS, BSC, and MSC.
Figure 2.1 demonstrates six cell sites communicating over radio links to two BSCs,
which in turn communicate with a single MSC, which is connected to PSTN.
Figure 2.1 Base Station Organization
Cell sites have one antenna for upload (transmitting to the terminals) and two download
antennas (receiving from the terminals). The download antennas allow to work as a bigger
antenna and help counter multipath effects (which are described later). They generally
operate around 900MHz, though other frequencies are also used (especially for PCS).
BSC-BTS communication uses a low-speed link, (may be a radio link). MSC-BSC and
PSTN-MSC communication is at a much higher rate (land-lines).
As can be seen by examining the type of data carried between them, the three types
of base stations each perform different types of operations. Rather than performing all
cellular operations in a single unit, base stations divide the operations and perform them
where they make the most sense. The cell sites perform operations that need to be doneindependently on each channel while the base station controllers and mobile switching
centers can perform certain operations on multiple channels simultaneously.
2.4.3 Cell Organization
Cellular communication got its name because of the cell structure of the BTS service
areas. For convenience, a service area is often subdivided into an array of hexagonal cells,
each containing a single BTS. The service areas of individual BTSs are being calculated
more precisely and they are being placed where they can be the most effective rather than
in traditional cells, although the term cellular is still used.
7/28/2019 Dmc 1630 - Mobile Computing
24/112
DMC 1630
NOTES
10 ANNA UNIVERSITY CHENNAI
The arrangement of the cells is basically a form of SDMA, since frequencies can be
reused by other cells that are far enough away not to interfere with the current cell. The
degree of reuse (determined by how far apart cells must be to reuse the same frequency)
is dependent upon the actual implementation of the radio link.
Traditional AMPS-type cell sites are called macro cells as shown in Figure 2.2. These
are spaced anywhere from 3 to 60 km apart (averaging around 6 km), depending on
population density, terrain and other factors. Newer networks are adding micro cells as
shown in Figure 2.2, which are smaller cells (perhaps as close as a few hundred feet apart)
that can be used for spot coverage (e.g., near a tunnel) or to increase the level of SDMA
(adding capacity). Both macro cells and micro cells are part of a service providers network.
Figure 2.2 Macro Cells Vs Micro Cells
Another type of cell is a Pico cell. Pico cells are just small micro cells, although they
need not be part of a service providers network. Individual buildings or even floors within
a building can use Pico cells to have their own cellular service. For example, a company
could provide local cellular service to its employees without paying per-minute airtime
charges to a service provider.
It is also possible to have hybrid arrangements, with micro cells and Pico cells existing
inside of macro cells, as is shown in the Figure 2.3.
Figure 2.3 A Micro Cell with a Macro Cell
2.5 CHALLENGES OF CELLULAR COMMUNICATION
Cellular networks must deal with all of the challenges of traditional telephony, such as
call setup, switching, and so on. However, cellular networks must face additional challenges
due to the mobile, wireless nature of the terminals. They also have to deal with many types
of signal corruption caused by sending the signals through the air.
7/28/2019 Dmc 1630 - Mobile Computing
25/112
7/28/2019 Dmc 1630 - Mobile Computing
26/112
DMC 1630
NOTES
12 ANNA UNIVERSITY CHENNAI
This is called discontinuous transmission (DTX) and in the form of power control. Cellular
networks often have complicated power control procedures, which use location
management as well as transmitted power level information to more finely control the
output power of terminals. This is especially important for CDMA networks in order toprevent the signals from nearby terminals from blanking out the signals of further ones.
Cellular networks have additional routing concerns regarding billing, especially when
terminals are in roaming and billing must go through another service provider. Ironically,
billing issues can be even worse when calls are made between two terminals using the
same cell site (especially when one is roaming).
2.5.2 Signal Corruption
There are six major types of signal corruptions that are individually addressed by
most cellular networks. Multipath effects (signal reflections) cause two of them: Riceanfading and Rayleigh fading. Doppler effects are caused by the mobility of terminals. Blocking
is caused by the fact that terminals may be at different distances from the cell sites. Signal
loss can be caused by a variety of things, usually physical barriers. All other types of signal
corruption can be classified as noise.
2.5.2.1. Ricean Fading
Ricean fading, the most general multipath effect, results when a transmitted signal
follows multiple paths to the receiver. After the direct transmission is received, echoes of
the signal reach the receiver. These can cause transmitted symbols to interfere with future
symbols. In Figure 2.4, the direct transmission would reach the car first, followed by anecho off of the building.
Figure 2.4 Ricean Fading
2.5.2.2. Rayleigh Fading
Rayleigh fading is a very similar multipath effect as shown in Figure 2.5, except it
results when obstacles block the direct path from the transmitter to the receiver. Since the
direct transmission is blocked, the reflected signals are not echoes, but the first signals
received. Deconstructive interference (anti-nodes) can cause short-term amplitude dips,
or even complete loss, in the received signal.
7/28/2019 Dmc 1630 - Mobile Computing
27/112
7/28/2019 Dmc 1630 - Mobile Computing
28/112
DMC 1630
NOTES
14 ANNA UNIVERSITY CHENNAI
2.5.2.5 Loss of Signal
There are several possible causes for loss of signal, including over-aggressive power
management as shown in Figure 2.8. The most likely cause is simply due to obstacles. Ifthe direct transmission blocked and there are no reflected signals to receive, the signal is
lost and must be renegotiated.
Figure 2.8 Loss of Signal
2.5.2.6 Noise
There are many types of noise, the most common noise is general background noise,
which is additive white Gaussian noise that is dependent only on temperature and cannot
be avoided. The cellular network also introduces its own noise. For example, the blocking
effect can be felt on a smaller scale, when a cell that has greater power (i.e., is closer) than
the cell with which a terminal is communicating is using a nearby frequency, only causing
noise rather then blanking out the other signal. This is called cell-to-cell adjacent channelnoise. Co-channel noise is also present, and is caused by the reuse of frequencies. There
can be additional noise problems when two terminals are using the same cell to communicate
with each other (a type of crosstalk problem). Cellular networks usually deal with all types
of noise by simply protecting the data with error correction techniques. A major effect of
the different types of noise is the limits that they place upon cellular networks (e.g., number
of terminals per cell, frequency reuse factors, etc.).
2.6 HANDOFF STRATEGIES
When a mobile moves into a different cell while a conversation is in progress, the
MSC automatically transfers the call to a new channel belonging to the new base station.This handoff operation not only involves in identifying a new base station, but also requires
that the voice and control signals be allocated to channels associated with the new base
station.
Processing handoffs is an important task in any cellular radio system. Many handoff
strategies prioritize handoff requests over call initiation requests when allocating unused
channels in a cell site. Handoffs must be performed successfully and as in frequently as
possible, and be imperceptible to the users. In order to meet these requirements, system
designers must specify an optimum signal level at which to initiate a handoff. Once a particular
signal level is specified as the minimum usable signal for acceptable voice quality at the
7/28/2019 Dmc 1630 - Mobile Computing
29/112
7/28/2019 Dmc 1630 - Mobile Computing
30/112
7/28/2019 Dmc 1630 - Mobile Computing
31/112
MOBILE COMPUTING
NOTES
17 ANNA UNIVERSITY CHENNAI
MSC engages in an intersystem handoff when a mobile signal becomes weak in a given
cell and the MSC cannot find another cell within its system to which it can transfer the call
in progress. There are many issues that must be addressed when implementing an
intersystem handoff. For instance, a local call may become a long-distance call as themobile moves out of its home system and becomes a roamer in a neighboring system.
Also, compatibility between the two MSCs must be determined before implementing an
intersystem handoff.
Different systems have different policies and methods for managing handoff requests.
Some systems handle handoff requests in the same way they handle originating calls. In
such systems, the probability that a handoff request will not be served by a new base
station is equal to the blocking probability of incoming calls. However, from the users
point of view, having a call abruptly terminated while in the middle of a conversation is
more annoying than being blocked occasionally on a new call attempt. To improve thequality of service as perceived by the users, various methods have been devised to prioritize
handoff requests over call initiation requests when allocating voice channels.
2.7 QUESTIONS
1. Explain the common base station subsystem
2. Briefly discuss about the cell organization
3. Explain the challenges for cellular communication
4. Explain the handover process with neat diagram
7/28/2019 Dmc 1630 - Mobile Computing
32/112
DMC 1630
NOTES
18 ANNA UNIVERSITY CHENNAI
CHAPTER 3
TELECOMMUNICATIONS SYSTEMS
3.1 INTRODUCTION
Cellular is one of the fastest growing and most demanding telecommunications
applications. Today, it represents a continuously increasing percentage of all new telephone
subscriptions around the world. It is forecasted that cellular systems using a digital technology
will become the universal method of telecommunications. By the year 2005, forecasters
predict that there will be more than 100 million cellular subscribers worldwide.
Figure 3.1 Cellular Subscriber Growth Worldwide
In the early 1980s, most mobile telephone systems were analog rather than digital,
like todays newer systems. One challenge facing analog systems was the inability to handle
the growing capacity needs in a cost-efficient manner. As a result, digital technology was
welcomed. The advantages of digital systems over analog systems include ease of signaling,
lower levels of interference, integration of transmission and switching, and increased abilityto meet capacity demands. Table 3.1 shows the worldwide development of mobile
telephone systems.
7/28/2019 Dmc 1630 - Mobile Computing
33/112
7/28/2019 Dmc 1630 - Mobile Computing
34/112
7/28/2019 Dmc 1630 - Mobile Computing
35/112
7/28/2019 Dmc 1630 - Mobile Computing
36/112
DMC 1630
NOTES
22 ANNA UNIVERSITY CHENNAI
enhanced full-rate coding, which is finding its way into the IS-54/136 and IS-95 specifications
as well.
3.2.4 IS-95
IS-95 is a DSSS CDMA standard that was developed by QUALCOMM and is
being put into service primarily by Bell South. It uses Pseudo Noise (PN), sequences to
encode channels into pairs of 1.23 MHz bands and is fundamentally different from any of
the TDMA standards. Unlike the TDMA standards, call quality in an IS-95 system improves
when other channels are idle, even if they are being used but have no voice activity in one
direction on a channel. CDMA supporters frequently use theoretical calculations to show
a tremendous increase in capacity, but in actuality there can never be more than 63 traffic
channels per band, and the realistic limit is 45 (the true numbers will be known when a real
system is operational). Thus, 900 IS-95 channels may be carried in the 50 MHz allocatedto a service provider.
IS-95 literature is deceptive about reuse factors. Theoretically, IS-95 has a reuse
factor of 1, meaning that every cell can use every frequency. However, some of the available
PN sequences are not available to all of the cells. For example, if a terminal is directly
between two cells, they will both communicate with it using the same PN sequence. This is
referred to as part of loading, and reduces the number of available channels, likely to at
most 25 per 1.23 MHz band, or 500 per cell.
Since channels are isolated through a CDMA mechanism, the framing structure underIS-95 is much simpler. The traffic channels are divided into 20 ms frames with no super
frames. Two synchronization channels are each also divided into 20 ms frames and use 3-
frame super frames. Layer 2 services are provided that split the physical channels into sub
channels. The type of modulation used is QPSK.
The IS-95 down-link encodes 64 chips per bit with a PN sequence to create 64
channels, each with a maximum bit rate of 19.2 kbps. The up-link uses a more complicated
encoding method to get 64 channels with a maximum bit rate of 28.8 kbps. Of this, at most
9.6 kbps is used for speech and varying amounts are used for error protection and
embedded control (the uplink uses more error protection bits than the downlink). Lowerbit rates may also be used to decrease the overall noise in the system.
3.3 GSM
Throughout the evolution of cellular telecommunications, various systems have been
developed without the benefit of standardized specifications. This presented many problems
directly related to compatibility, especially with the development of digital radio technology.
The GSM standard is intended to address these problems.
7/28/2019 Dmc 1630 - Mobile Computing
37/112
7/28/2019 Dmc 1630 - Mobile Computing
38/112
7/28/2019 Dmc 1630 - Mobile Computing
39/112
7/28/2019 Dmc 1630 - Mobile Computing
40/112
7/28/2019 Dmc 1630 - Mobile Computing
41/112
MOBILE COMPUTING
NOTES
27 ANNA UNIVERSITY CHENNAI
Visitor Location Register (VLR): VLR is a database that contains temporaryinformation about subscribers that is needed by the MSC in order to service visitingsubscribers. The VLR is always integrated with the MSC. When a mobile station
roams into a new MSC area, the VLR connected to that MSC will request dataabout the mobile station from the HLR. Later, if the mobile station makes a call,the VLR will have the information needed for call setup without having to interrogatethe HLR each time.
Authentication Center (AUC):AUC provides authentication and encryptionparameters that verify the users identity and ensure the confidentiality of each call.AUC protects network operators from different types of fraud found in todayscellular world.
Equipment Identity Register (EIR): EIR is a database that contains informationabout the identity of mobile equipment that prevents calls from stolen, unauthorized,
or defective mobile stations.AUC and EIR are implemented as stand-alone nodes or as a combined AUC/EIR
node.
3.3.3.2 Base Station System
All radio-related functions are performed in the BSS, which consists of BSCs and
BTSs.
BSC: BSC provides all the control functions and physical links between the MSCand BTS. It is a high-capacity switch that provides functions such as handover,cell configuration data, and control of radio frequency (RF) power levels in base
transceiver stations. A number of BSCs are served by an MSC. BTS: BTS handles the radio interface to the mobile station. BTS is the radio
equipment (transceivers and antennas) needed to service each cell in the network.A group of BTSs are controlled by a BSC.
3.3.3.3 Operation and Support System
Operations and Maintenance Center (OMC) is connected to all equipment in the
switching system and to the BSC. The implementation of OMC is called the Operation
and Support System (OSS). The OSS is the functional entity from which the network
operator monitors and controls the system. The purpose of OSS is to offer cost-effective
support for centralized, regional and local operational and maintenance activities that arerequired for a GSM network. An important function of OSS is to provide a network
overview and support the maintenance activities of different operation and maintenance
organizations.
3.3.3.4 Additional Functional Elements
Other functional elements are as follows:
Message Center (MXE): MXE is a node that provides integrated voice, fax,and data messaging. Specifically, the MXE handles short message service, cell
broadcast, voice mail, fax mail, email, and notification.
7/28/2019 Dmc 1630 - Mobile Computing
42/112
7/28/2019 Dmc 1630 - Mobile Computing
43/112
7/28/2019 Dmc 1630 - Mobile Computing
44/112
7/28/2019 Dmc 1630 - Mobile Computing
45/112
7/28/2019 Dmc 1630 - Mobile Computing
46/112
7/28/2019 Dmc 1630 - Mobile Computing
47/112
7/28/2019 Dmc 1630 - Mobile Computing
48/112
7/28/2019 Dmc 1630 - Mobile Computing
49/112
7/28/2019 Dmc 1630 - Mobile Computing
50/112
7/28/2019 Dmc 1630 - Mobile Computing
51/112
7/28/2019 Dmc 1630 - Mobile Computing
52/112
7/28/2019 Dmc 1630 - Mobile Computing
53/112
MOBILE COMPUTING
NOTES
39 ANNA UNIVERSITY CHENNAI
Figure 5.1 Generation of DAB Signal
5.3.1.2 Reception of a DAB signal
Figure 5.2demonstrates a conceptual DAB receiver. The DAB ensemble is selected
in the analogue tuner, the digitized output of which is fed to the OFDM demodulator and
channel decoder to eliminate transmission errors. The information contained in the FIC is
passed to the user interface for service selection and is used to set the receiver appropriately.
The MSC data is further processed in an audio decoder to produce the left and right audio
signals or in a data decoder (Packet Demux) as appropriate.
Figure 5.2 Conceptual DAB Receiver
7/28/2019 Dmc 1630 - Mobile Computing
54/112
7/28/2019 Dmc 1630 - Mobile Computing
55/112
7/28/2019 Dmc 1630 - Mobile Computing
56/112
DMC 1630
NOTES
42 ANNA UNIVERSITY CHENNAI
All together, this chain represents a classical combination of MPEG-4 elements
transported with an MPEG-2 Transport Stream. BIFS as one of those MPEG elements/
norms represents quite a powerful tool for data provision and interactivity.
5.4.2 Benefits of DMB
A wide range of TV and interactive services to be broadcast simultaneously on thesame multiplex (video services, DAB and DAB+ radio services, file downloading(podcasting), electronic programme guide, slide show, broadcast website, BIFS)
Existing DAB transmitter network to be adapted to carry these new services
Robust reception of mobile TV at highway speeds (>300km/h)
Multimedia content to be delivered without the risk of network congestion
Both DMB and DAB services to be accessed on the same receiver
DMB is an open European Standard
DMB demands less spectrum commitment than other mobile TV standards, which
typically use 6-8 MHz blocks. In contrast, DMB can offer both TV and radio services
within a multiplex of just 1.5 MHz. Whilst this spectrum would deliver a range of
approximately 7 DMB services, extra services can be made available simply by adding
further multiplexes.
DMB has the further benefit of being broadcast in Band III or L-Band, where higher
powers give rise to broader and more comprehensive coverage. Other mobile TV
standards must use UHF Bands IV or V. As a result, transmitter powers are low andcoverage areas from a single transmitter are typically small. However, since DMB is in
Band III and L-Band higher powers give rise to broader and more comprehensive coverage.
5.5 QUESTIONS
1. What is broadcast disk?
2. What is podcast?
3. Define scheduling
4. Briefly discuss about DAB
5. Explain about DMB
7/28/2019 Dmc 1630 - Mobile Computing
57/112
7/28/2019 Dmc 1630 - Mobile Computing
58/112
DMC 1630
NOTES
44 ANNA UNIVERSITY CHENNAI
The standard also defines the concept of a Portal. A portal is a device that interconnects
between a 802.11 and another 802 LAN. This concept is an abstract description of part
of the functionality of a translation bridge.
6.2.2 IEEE 802.11 Layers Description
As any 802.x protocol, the 802.11 protocol covers the MAC and Physical Layer.
The Standard currently defines a single MAC which interacts with three PHYs ( as shown
in Figure 6.2) (all of them running at 1 and 2 Mbit/s) as follows:
Frequency Hopping Spread Spectrum in the 2.4 GHz Band
Direct Sequence Spread Spectrum in the 2.4 GHz Band
Figure 6.2 802.11 Layered Architecture
Beyond the standard functionality usually performed by MAC Layers, the 802.11MAC performs other functions that are typically related to upper layer protocols, such as
Fragmentation, Packet Retransmissions, and Acknowledges.
6.3.2 The MAC Layer
The MAC Layer defines two different access methods, they are: Distributed
Coordination Function (DCF) and Point Coordination Function (PCF).
6.3.2.1 The Basic Access Method: CSMA/CA
DCF is the basic access mechanism. Basically DCF is a Carrier Sense Multiple Accesswith Collision Avoidance (CSMA/CA). CSMA protocols are well-known in the industry,
the most popular being the Ethernet, which is a CSMA/CD protocol (CD standing for
Collision Detection).
A CSMA protocol works as follows: A station desiring to transmit senses the medium.
If the medium is busy (i.e. some other station is transmitting) then the station defers its
transmission to a later time. If the medium is sensed free then the station is allowed to
transmit.
7/28/2019 Dmc 1630 - Mobile Computing
59/112
MOBILE COMPUTING
NOTES
45 ANNA UNIVERSITY CHENNAI
These kinds of protocols are very effective when the medium is not heavily loaded
since it allows stations to transmit with minimum delay. But there is always a chance of
stations simultaneously sensing the medium as being free and transmitting at the same time,
causing a collision.
These collision situations must be identified, so the MAC layer can retransmit the
packet by itself and not by upper layers, which would cause significant delay. In the Ethernet
case this collision is recognized by the transmitting stations which will get into a retransmission
phase based on an exponential random backoff algorithm.
While these Collision Detection mechanisms are good on a wired LAN, they cannot
be used on a Wireless LAN environment for two main reasons:
Implementing a Collision Detection mechanism would require the implementation
of a Full Duplex radio capable of transmitting and receiving at once, an approachthat would increase the price significantly.
In a Wireless environment we cannot assume that all stations hear each other(which is the basic assumption of the Collision Detection scheme), and the factthat a station wants to transmit and senses the medium as free doesnt necessarilymean that the medium is free around the receiver area.
In order to overcome these problems, the 802.11 uses a Collision Avoidance (CA)
mechanism together with a Positive Acknowledge scheme, as follows:
A station wanting to transmit senses the medium. If the medium is busy then itdefers. If the medium is free for a specified time called Distributed Inter FrameSpace (DIFS), then the station is allowed to transmit.
The receiving station checks the CRC of the received packet and sends anacknowledgment packet (ACK). Receipt of the acknowledgment indicates to thetransmitter that no collision occurred. If the sender does not receive theacknowledgment then it retransmits the fragment until it receives acknowledgmentor is thrown away after a given number of retransmissions.
6.2.3.2 Virtual Carrier Sense
In order to reduce the probability of two stations colliding because they cannot heareach other, the standard defines a Virtual Carrier Sense mechanism:
A station wanting to transmit a packet first transmits a short control packet called
RTS (Request To Send), which includes the source, destination, and the duration of the
following transaction (i.e. the packet and the respective ACK), the destination station
responds (if the medium is free) with a response control Packet called CTS (Clear to
Send), which includes the same duration information.
7/28/2019 Dmc 1630 - Mobile Computing
60/112
7/28/2019 Dmc 1630 - Mobile Computing
61/112
7/28/2019 Dmc 1630 - Mobile Computing
62/112
7/28/2019 Dmc 1630 - Mobile Computing
63/112
MOBILE COMPUTING
NOTES
49 ANNA UNIVERSITY CHENNAI
6.3 HOW DOES A STATION JOIN AN EXISTING CELL (BSS)
When a station wants to access an existing BSS (either after power-up, sleep mode,
or just entering the BSS area), the station needs to get synchronization information fromthe Access Point (or from the other stations when in ad-hoc mode, which will be discussed
later). The station can get this information by one of two means:
Passive Scanning: In this case the station just waits to receive a Beacon Framefrom the AP, (the beacon frame is a frame sent out periodically by the AP containingsynchronization information) or
Active Scanning: In this case the station tries to locate an Access Point bytransmitting Probe Request Frames, and waits for Probe Response from the AP
Both methods are valid. A method is chosen according to the power consumption/
performance trade-off.
6.4 THE AUTHENTICATION PROCESS
Once the station has located an Access Point, and decides to join its BSS, it goes
through the Authentication Process. This is the interchange of information between the AP
and the station, where each side proves the knowledge of a given password.
6.5 THE ASSOCIATION PROCESS
Once the station is authenticated, it then starts the Association Process, which is the
exchange of information about the stations and BSS capabilities, and which allows theDSS (the set of APs) to know about the current position of the station). A station is capable
of transmitting and receiving data frames only after the association process is completed.
6.6 ROAMING
Roaming is the process of moving from one cell (or BSS) to another without losing
connection. This function is similar to the cellular phones handover, with two main differences:
On a packet-based LAN system, the transition from cell to cell may be performedbetween packet transmissions, as opposed to telephony where the transition may
occur during a phone conversation, this makes the LAN roaming a little easier On a voice system, a temporary disconnection may not affect the conversation,
while in a packet based environment it significantly reduces performance becauseretransmission is then performed by the upper layer protocols
The 802.11 standard does not define how roaming should be performed, but defines
the basic tools. These include active/passive scanning, and a re-association process, where
a station which is roaming from one Access Point to another becomes associated with the
new one1.
7/28/2019 Dmc 1630 - Mobile Computing
64/112
DMC 1630
NOTES
50 ANNA UNIVERSITY CHENNAI
6.6.1 Synchronization
Stations need to keep synchronization, which is necessary for keeping hopping
synchronized and other functions like Power Saving. On an infrastructure BSS, this isachieved by all the stations updating their clocks according to the APs clock, using the
following mechanism: The AP periodically transmits frames called Beacon Frames. These
frames contain the value of the APs clock at the moment of transmission (note that this is
the moment when transmission actually occurs, and not when it is put in the queue for
transmission. Since the Beacon Frame is transmitted using CSMA rules, transmission may
be delayed significantly). The receiving stations check the value of their clocks at the moment
the signal is received, and correct it to keep in synchronization with the APs clock. This
prevents clock drifting which could cause loss of synch after a few hours of operation.
6.7 SECURITY
Security is one of the first concerns that people have when deploying a Wireless
LAN. The 802.11 committee has addressed the issue by providing what is called WEP
(Wired Equivalent Privacy). Users are primarily concerned that an intruder should not be
able to:
Access the Network resources by using similar Wireless LAN equipment
Capture Wireless LAN traffic (eavesdropping)
6.7.1 Preventing Access to Network Resources
This is done by the use of an Authentication mechanism where a station needs to
prove knowledge of the current key. This is very similar to Wired LAN privacy, in the
sense that an intruder needs to enter the premises (by using a physical key) in order to
connect his workstation to the wired LAN.
6.7.1.1 Eavesdropping
Eavesdropping is prevented by using the WEP algorithm which is a Pseudo Random
Number Generator initialized by a shared secret key. This PRNG outputs a key sequence
of pseudo-random bits equal in length to the largest possible packet which is combinedwith the outgoing/incoming packet producing the packet transmitted in the air.
The WEP is a simple algorithm based on RSAs RC4 which has the following properties:
Reasonably strong: Brute-force attack to this algorithm is difficult because everyframe is sent with an Initialization Vector which restarts the PRNG for each frame.
Self Synchronizing: The algorithm re-synchronizes for each message. This isnecessary in order to work in a connection-less environment, where packets mayget lost (as any LAN).
7/28/2019 Dmc 1630 - Mobile Computing
65/112
7/28/2019 Dmc 1630 - Mobile Computing
66/112
7/28/2019 Dmc 1630 - Mobile Computing
67/112
MOBILE COMPUTING
NOTES
53 ANNA UNIVERSITY CHENNAI
7.2.1 Bluetooth Connections
The major difference between Bluetooth wireless connectivity and the cellular radio
architecture is that Bluetooth enables ad hoc networking. Rather than depending on abroadband system, which relies on terminals and base stations for maintaining connections
to the network via radio links, Bluetooth implements peer-to-peer connectivity, no base
stations or terminals are involved. A typical Bluetooth network scenario is shown in Figure
7.1.
Using peer-to-peer connectivity, Bluetooth technology simplifies personal area wireless
connections, enabling all digital devices to communicate spontaneously. Early applications
are expected to include cable replacement for laptops, PDAs, mobile phones, and digital
cameras. Because Bluetooth supports voice transmissions, headsets also are in line to
become wireless. The Bluetooth technology offers the following advantages: Voice/data access points
Cable is replaced by a Bluetooth chip that transmits information at a special radiofrequency to a receiver Bluetooth chip
Ad hoc networking enables personal devices to automatically exchange informationand synchronize with each other.
Figure 7.1 Connecting with Bluetooth
7.2.2 Reliable and Secure Transmission
Bluetooth technology also provides fast, secure voice and data transmissions. The
range for connectivity is up to 10 meters, and line of sight is not required. The Bluetooth
radio unit
7/28/2019 Dmc 1630 - Mobile Computing
68/112
DMC 1630
NOTES
54 ANNA UNIVERSITY CHENNAI
Functions even in noisy radio environments, ensuring audible voice transmissionsin severe conditions
Protects data by using error-correction methods
Provides a high transmission rate
Encrypts and authenticates for privacy
As with any wireless interface, Bluetooth must address issues involving reliable delivery
of information. To help deliver accurate information, Bluetooth provides two error-correction
mechanisms: Forward Error Correction (FEC) and Automatic Repeat Request (ARQ).
Typically, FEC is applied to voice traffic for which the timeliness of the delivery takes
precedence over the accuracy. ARQ mechanisms are used for data applications.
Bluetooth operates in the unlicensed ISM frequency band, it competes with signals
from other devices, such as garage door openers and microwave ovens. In order forBluetooth devices to operate reliably, each Bluetooth network is synchronized to a specific
frequency pattern. The Bluetooth unit moves through 1,600 different frequencies per second,
and the pattern is unique to each network.
Bluetooth also implements various security measures, including authentication and
encryption. Authentication is used to verify the identity of the device sending information,
and encryption is used to ensure the integrity of the data.
7.2.3 Low Power Architecture
Bluetooth is intended for mobile devices, it implements low power architecture in
which units move into lower power modes when not actively participating on the network.
Bluetooth units also consume less power during operation. For example, the Bluetooth
radio consumes less than 3 percent of the power that a mobile phone consumes.
7.2.4 Interoperability, standards, and specifications
Another key concept in the Bluetooth environment is the idea of interoperability among
Bluetooth units regardless of manufacturer. Because Bluetooth is an open specification for
short range wireless communication, all Bluetooth products must conform to a standard.
This ensures that wireless connections will be globally available, and Bluetooth units madeanywhere in the world will be able to connect with and communicate information and
services to other Bluetooth devices.
To this end, the Bluetooth SIG has developed detailed specifications for the hardware
and software elements of Bluetooth units. The specifications consist of Core and Profile
documentations. The Core document discusses elements such as the radio, baseband, link
manager, and interoperability with different communication protocols. The Profile document
delineates the protocols and procedures to be used for specific classes of applications.
The specifications are intended to prevent discrepancies in end products due to different
7/28/2019 Dmc 1630 - Mobile Computing
69/112
MOBILE COMPUTING
NOTES
55 ANNA UNIVERSITY CHENNAI
interpretations of the Bluetooth standard. The SIG also has implemented a qualification
process. This process defines criteria for Bluetooth product qualification, ensuring the
Bluetooth standards are met in any product that sports the Bluetooth name.
7.3 BLUETOOTH TERMINOLOGY
Bluetooth draws heavily on existing radio communications and networking technologies,
which enables it to be operationally compatible with the existing devices that also use these
technologies. Many of the various terms and concepts used in Bluetooth are borrowed
from other areas and included in the specification of Bluetooths elements, such as baseband,
RF communications, and many of the upper and lower layer protocols. What makes
Bluetooth unique is how it applies its proprietary components and the existing technologies
to define its central core operations and its application profiles. Regardless of their source,
the terms that are integral to Bluetooth are worth examining a little more closely.
7.3.1 Bluetooth Stack
Baseband or radio module is the hardware that enables wireless communication
between devices. The building block of this technology is the Bluetooth stack, which includes
the hardware and software portions of the system. Figure 7.2 shows a graphic representation
of the stack. The stack contains a physical level protocol (baseband) and a link level
protocol (Link Manager Protocol, or LMP) with an adaptation layer (Logical Link Control
and Adaptation Layer Protocol, or L2CAP), enabling upper layer protocols to interact
with the lower layer.The Bluetooth stack has the following components:
The radio frequency (RF) portion provides the digital signal processing componentof the system, and the baseband processes these signals
The link controller handles all the baseband functions and supports the link manager.It sends and receives data, identifies the sending device, performs authentication,and determines the type of frame to use for sending transmissions. The link controlleralso directs how devices listen for transmissions from other devices and can movedevices into power-saving modes
7/28/2019 Dmc 1630 - Mobile Computing
70/112
7/28/2019 Dmc 1630 - Mobile Computing
71/112
7/28/2019 Dmc 1630 - Mobile Computing
72/112
7/28/2019 Dmc 1630 - Mobile Computing
73/112
7/28/2019 Dmc 1630 - Mobile Computing
74/112
DMC 1630
NOTES
60 ANNA UNIVERSITY CHENNAI
CHAPTER 8
WIRELESS ATM
8.1 INTRODUCTION
Asynchronous Transfer Mode (ATM) has been advocated as an important technology
for all types of services and networks. Most people believe that ATM will be the standard
for the future Broadband Integrated Services Digital Network (B-ISDN). From the service
point of view, ATM combines both the data and multimedia information into the wired
networks while scales well from backbones to the customer premises networks. To ensure
the success of ATM, lots of the design issues have been standardized by ATM Forum.
A wireless personal communication network has been growing very fast in the last
decade. Now a day, laptop, cellular phone, and pagers are very popular. Many systems
have been developed to provide different services, such as, Personal Communications
Service (PCS), Portable Telephone Systems, and Satellite Communications System. Usually,
these services do not guarantee QoS, so they are not suitable for the fast growing multimedia
applications.
Due to the success of ATM on wired networks, wireless ATM (WATM) is a direct
result of the ATM everywhere movement. WATM can be viewed as a solution for next-generation personal communication networks, or a wireless extension of the B-ISDN
networks, which will support integrated data transmission (data, voice, and video) with
guaranteed QoS.
8.2 WIRELESS ATM REFERENCE MODELS
The overall system consists of a fixed ATM network infrastructure and a radio access
segment. In the fixed ATM network, the switches, which communicate directly with wireless
station or wireless end user devices, are mobility enhanced ATM switches. These switches
setup connections on behalf of the wireless devices. They serve as entrance to the
infrastructure wired ATM networks. The other ATM switching elements in the wired ATM
networks remain unchanged.
Based on the different types of wireless applications, the radio access segment falls
into a number of areas which may need different solutions.
8.2.1 Fixed Wireless Components
In fixed wireless LANs, or network interconnection via satellite or microwaves links,
the end user devices and switching devices are fixed. They establish connections with each
other via wireless channel, not through cable. In these kinds of applications, the data
7/28/2019 Dmc 1630 - Mobile Computing
75/112
7/28/2019 Dmc 1630 - Mobile Computing
76/112
7/28/2019 Dmc 1630 - Mobile Computing
77/112
7/28/2019 Dmc 1630 - Mobile Computing
78/112
DMC 1630
NOTES
64 ANNA UNIVERSITY CHENNAI
8.3.2.3 Data Link Control (DLC)
Data Link Control is responsible for providing service to ATM layer. Mitigating the
effect of radio channel errors should be done in this layer before cells are sent to the ATM
layer. In order to fulfill this requirement, error detection/retransmission protocols and forwarderror correction methods are recommended.
8.3.2.4 Radio Resource Control (RRC)
RRC is needed for support of control plane functions related to the radio access
layer. It should support radio resource control and management functions for PHY, MAC,
and DLC layers. The design issues of RRL will include control/management syntax for
PHY, MAC and DLC layers; meta-signaling support for mobile ATM; and interface to
ATM control plane.
8.3.3 Mobile ATM
To support mobility, new higher layer control/signaling functions are needed to handling
handover, location management, routing, addressing, and traffic management. The item,
which defines the design the functions of control/signaling, are called Mobile ATM.
8.3.3.1 Handover
In WATM networks, a mobile end user establishes a virtual circuit (VC) to
communicate with another end user (either mobile or ATM end user). When the mobile
end user moves from one AP (access point) to another AP, proper handover is required.
To minimize the interruption to cell transport, an efficient switching of the active VCs from
the old data path to new data path is needed. Also the switching should be fast enough tomake the new VCs available to the mobile users.
When the handover occurs, the current QoS may not be support by the new data
path. In this case, a negotiation is required to set up new QoS. Since a mobile user may be
in the access range of several APs, it will select the one which can provide the best QoS.
During the handover, an old path is released and a new path is then re-established.
There is a possibility that some cells will get lost during this process (when the connection
is broken). In case no cell lost is allowed. Cell buffering is used to guarantee that no cell is
lost and cell sequence is preserved. Cell buffering consists of Uplink Buffering and DownlinkBuffering. If VC is broken when the mobile user is sending cells to APs, Uplink Buffering
is required. The mobile user will buffer all the outgoing cells. When the connection is up, it
sends out all the buffered cells so no cells are lost unless the buffers are overflowed.
Downlink Buffering is performed by APs to preserve the downlink cells for sudden link
interruptions, congestion, or retransmissions. It may also occur when handover is executed.
8.3.3.2 Location Management
When a connection is needed to be established between a mobile ATM end point and
another ATM end point, the mobile ATM end point is needed to be located. There are two
7/28/2019 Dmc 1630 - Mobile Computing
79/112
7/28/2019 Dmc 1630 - Mobile Computing
80/112
DMC 1630
NOTES
66 ANNA UNIVERSITY CHENNAI
7/28/2019 Dmc 1630 - Mobile Computing
81/112
7/28/2019 Dmc 1630 - Mobile Computing
82/112
DMC 1630
NOTES
68 ANNA UNIVERSITY CHENNAI
2. Home Agent: Home Agent is a router on the home network serving as the anchorpoint for communication with the Mobile Node; it tunnels packets from a deviceon the Internet, called a Correspondent Node, to the roaming Mobile Node. (A
tunnel is established between the Home Agent and a reachable point for the MobileNode in the foreign network.)
3. Foreign Agent: Foreign Agent is a router that may function as the point ofattachment for the Mobile Node when it roams to a foreign network, deliveringpackets from the Home Agent to the Mobile Node
Figure 9.1 Mobile IP Components and Relationship
The care-of address is the termination point of the tunnel toward the Mobile Node
when it is on a foreign network. The Home Agent maintains an association between thehome IP address of the Mobile Node and its care-of address, which is the current location
of the Mobile Node on the foreign or visited network.
9.3 HOW MOBILE IP WORKS
This section explains how Mobile IP works. The Mobile IP process has three main
phases, which are discussed in the following sections.
1. Agent Discovery: A Mobile Node discovers its Foreign and Home Agents duringagent discovery
2. Registration: The Mobile Node registers its current location with the ForeignAgent and Home Agent during registration
3. Tunneling: A reciprocal tunnel is set up by the Home Agent to the care-of address(current location of the Mobile Node on the foreign network) to route packets tothe Mobile Node as it roams
9.3.1 Agent Discovery
During the agent discovery phase, the Home Agent and Foreign Agent advertise their
services on the network by using the ICMP Router Discovery Protocol (IRDP). The
7/28/2019 Dmc 1630 - Mobile Computing
83/112
MOBILE COMPUTING
NOTES
69 ANNA UNIVERSITY CHENNAI
Mobile Node listens to these advertisements to determine if it is connected to its home
network or foreign network.
The IRDP advertisements carry Mobile IP extensions that specify whether an agent isa Home Agent, Foreign Agent, or both; its care-of address; the types of services it will
provide such as reverse tunneling and Generic Routing Encapsulation (GRE) and the allowed
registration lifetime or roaming period for visiting Mobile Nodes. Rather than waiting for
agent advertisements, a Mobile Node can send out an agent solicitation. This solicitation
forces any agents on the link to immediately send an agent advertisement. If a Mobile
Node determines that it is connected to a foreign network, it acquires a care-of address.
There are two types of care-of addresses exist:
1. Care-of address acquired from a Foreign Agent
2. Co-located care-of address
A Foreign Agent care-of address is an IP address of a Foreign Agent that has an
interface on the foreign network being visited by a Mobile Node. A Mobile Node that
acquires this type of care-of address can share the address with other Mobile Nodes. A
co-located care-of address is an IP address temporarily assigned to the interface of the
Mobile Node itself. A co-located care-of address represents the current position of the
Mobile Node on the foreign network and can be used by only one Mobile Node at a time.
When the Mobile Node hears a Foreign Agent advertisement and detects that it has moved
outside of its home network, it begins registration.
9.3.2 Registration
The Mobile Node is configured with the IP address and mobility security association
(which includes the shared key) of its Home Agent. In addition, the Mobile Node is
configured with either its home IP address, or another user identifier, such as a Network
Access Identifier.
The Mobile Node uses this information along with the information that it learns from
the Foreign Agent advertisements to form a Mobile IP registration request. It adds the
registration request to its pending list and sends the registration request to its Home Agent
either through the Foreign Agent or directly if it is using a co-located care-of address and
is not required to register through the Foreign Agent. If the registration request is sent
through the Foreign Agent, the Foreign Agent checks the validity of the registration request,
which includes checking that the requested lifetime does not exceed its limitations, the
requested tunnel encapsulation is available, and that reverse tunnel is supported. If the
registration request is valid, the Foreign Agent adds the visiting Mobile Node to its pending
list before relaying the request to the Home Agent. If the registration request is not valid,
the Foreign Agent sends a registration reply with appropriate error code to the Mobile
Node.
7/28/2019 Dmc 1630 - Mobile Computing
84/112
DMC 1630
NOTES
70 ANNA UNIVERSITY CHENNAI
The Home Agent checks the validity of the registration request, which includes
authentication of the Mobile Node. If the registration request is valid, the Home Agent
creates a mobility binding (an association of the Mobile Node with its care-of address), a
tunnel to the care-of address, and a routing entry for forwarding packets to the homeaddress through the tunnel.
The Home Agent then sends a registration reply to the Mobile Node through the
Foreign Agent (if the registration request was received via the Foreign Agent) or directly to
the Mobile Node. If the registration request is not valid, the Home Agent rejects the request
by sending a registration reply with an appropriate error code.
The Foreign Agent checks the validity of the registration reply, including ensuring that
an associated registration request exists in its pending list. If the registration reply is valid,
the Foreign Agent adds the Mobile Node to its visitor list, establishes a tunnel to the HomeAgent, and creates a routing entry for forwarding packets to the home address. It then
relays the registration reply to the Mobile Node.
Finally, the Mobile Node checks the validity of the registration reply, which includes
ensuring an associated request is in its pending list as well as proper authentication of the
Home Agent. If the registration reply is not valid, the Mobile Node discards the reply. If a
valid registration reply specifies that the registration is accepted, the Mobile Node is confirmed
that the mobility agents are aware of its roaming. In the co-located care-of address case,
it adds a tunnel to the Home Agent. Subsequently, it sends all packets to the Foreign
Agent.
The Mobile Node reregisters before its registration lifetime expires. The Home Agent
and Foreign Agent update their mobility binding and visitor entry, respectively, during re-
registration. In the case where the registration is denied, the Mobile Node makes the
necessary adjustments and attempts to register again. For example, if the registration is
denied because of time mismatch and the Home Agent sends back its time stamp for
synchronization, the Mobile Node adjusts the time stamp in future registration requests.
Thus, a successful Mobile IP registration sets up the routing mechanism for transporting
packets to and from the Mobile Node as it roams.
9.3.3. Tunneling
The Mobile Node sends packets using its home IP address, effectively maintaining
the appearance that it is always on its home network. Even while the Mobile Node is
roaming on foreign networks, its movements are transparent to correspondent nodes.
Data packets addressed to the Mobile Node are routed to its home network, where
the Home Agent now intercepts and tunnels them to the care-of address toward the Mobile
Node. Tunneling has two primary functions: encapsulation of the data packet to reach the
7/28/2019 Dmc 1630 - Mobile Computing
85/112
MOBILE COMPUTING
NOTES
71 ANNA UNIVERSITY CHENNAI
tunnel endpoint, and de-capsulation when the packet is delivered at that endpoint. The
default tunnel mode is IP Encapsulation within IP Encapsulation. Optionally, GRE and
minimal encapsulation within IP may be used.
Typically, the Mobile Node sends packets to the Foreign Agent, which routes them
to their final destination, the Correspondent Node, as shown in Figure 9.2.
Figure 9.2 Packet Forwarding
However, this data path is topologically incorrect because it does not reflect the true
IP network source for the data-rather, it reflects the home network of the Mobile Node.
Because the packets show the home network as their source inside a foreign network, anaccess control list on routers in the network called ingress filtering drops the packets
instead of forwarding them. A feature called reverse tunneling solves this problem by having
the Foreign Agent tunnel packets back to the Home Agent when it receives them from the
Mobile Node as shown in Figure 9.3.
Tunnel MTU discovery is a mechanism for a tunnel encapsulate such as the Home
Agent to participate in path MTU discovery to avoid any packet fragmentation in the
routing path between a Correspondent Node and Mobile Node. For packets destined to
the Mobile Node, the Home Agent maintains the MTU of the tunnel to the care-of address
and informs the Correspondent Node of the reduced packet size. This improves routingefficiency by avoiding fragmentation and reassembly at the tunnel endpoints to ensure that
packets reach the Mobile Node.
7/28/2019 Dmc 1630 - Mobile Computing
86/112
DMC 1630
NOTES
72 ANNA UNIVERSITY CHENNAI
Figure 9.3 Reverse Tunnel
9.4 SECURITY
Mobile IP uses a strong authentication scheme for security purposes. All registration
messages between a Mobile Node and Home Agent are required to contain the Mobile-
Home Authentication Extension (MHAE). The integrity of the registration messages is
protected by a pre-shared 128-bit key between a Mobile Node and Home Agent. The
keyed Message Digest Algorithm 5 (MD5) in prefix+suffix mode is used to compute the
authenticator value in the appended MHAE, which is mandatory. Mobile IP also supports
the Hash-based Message Authentication Code (HMAC-MD5). The receiver compares
the authenticator value it computes over the message with the value in the extension to
verify the authenticity. Optionally, the Mobile-Foreign Authentication Extension and Foreign-
Home Authentication Extension are appended to protect message exchanges between a
Mobile Node and Foreign Agent and between a Foreign Agent and Home Agent,
respectively. Replay protection uses the identification field in the registration messages as a
timestamp and sequence number. The Home Agent returns its time stamp to synchronize
the Mobile Node for registration.
9.5 SOLUTION TO NETWORK MOBILITY
Network mobility is enabled by Mobile IP, which provides a scalable, transparent,
and secure solution. It is scalable because only the participating components need to be
Mobile IP aware -the Mobile Node and the endpoints of the tunnel. No other routers in
the network or any hosts with which the Mobile Node is communicating need to be changed
or even aware of the movement of the Mobile Node. It is transparent to any applications
while providing mobility. Also, the network layer provides link-layer independence; interlink
layer roaming, and link-layer transparency. Finally, it is secure because the set up of packet
redirection is authenticated.
7/28/2019 Dmc 1630 - Mobile Computing
87/112
MOBILE COMPUTING
NOTES
73 ANNA UNIVERSITY CHENNAI
9.6 OVERVIEW OF AD-HOC NETWORKING
Ad Hoc networks are multi-hop wireless networks, where nodes may be mobile.
These types of networks are used in situations where temporary network connectivity isneeded. Ad hoc networks are formed on a dynamic basis, i.e. a number of users may wish
to exchange information and services between each other on an ad hoc basis, in order to
do this they will need to form an Ad Hoc network. An example of this may be found in a
disaster relief situation. Here an Ad Hoc network could enable emergency services to co-
ordinate emergency services more effectively. Smart spaces are defined as environments
that allow people to perform tasks efficiently by offering unprecedented levels of access to
information and assistance from computers. Ad Hoc networks will play a significant part in
these environments, allowing people to exchange information and services; for example,
people at a meeting could create an Ad Hoc network using their PDAs or Laptops and
exchange information relevant to the meeting. Indeed there are endless examples of wheretheir use could be found.
9.6.1 Routing in Ad Hoc Networks
An Ad Hoc network consists of wireless hosts that move around, i.e. they have no
permanent physical location. In order to facilitate communication within the network, a
routing protocol is used to discover routes between nodes before the exchange of IP data
packets. The routing protocols in Ad Hoc wireless networks are generally categorized as:
1. Proactive
2. Reactive
3. Hybrid
9.5.1.1 Proactive
These protocols require each node to maintain one or more tables to store up to date
routing information and to propagate updates throughout the network. These protocols try
and maintain valid routes to all communication mobile nodes all the time, which means
before a route is actually needed. Periodic route updates are exchanged in order to
synchronize the tables. Some examples of table driven ad hoc routing protocols includeDynamic Destination Sequenced Distance-Vector Routing Protocol (DSDV), Optimized
Link State Routing Protocol (OLSR) and Fisheye State Routing Protocol (FSR). These
protocols differ in the number of routing related tables and how changes are broadcasted
in the network structure. The problem with these protocols is the overhead; the protocols
propagate and maintain routing information, regardless of whether or not it is needed.
9.5.2.1 Reactive
These protocols create routes only when desired by a source node, therefore a route
discovery process is required within the network. Once a route has been established, it is
7/28/2019 Dmc 1630 - Mobile Computing
88/112
DMC 1630
NOTES
74 ANNA UNIVERSITY CHENNAI
maintained by a route maintenance procedure until either the destination becomes
inaccessible or until the route isnt needed any longer. Some examples of source initiated
ad hoc routing protocols include the Dynamic Source Routing Protocol (DSR), Ad Hoc
On Demand Distance Vector Routing Protocol (AODV) and Temporally Ordered RoutingAlgorithm (TORA). No periodic updates are required for these protocols but routing
information is only available when needed.
9.5.3.1 Hybrid
These protocols try to incorporate various aspects of proactive and reactive routing
protocols. They are generally used to provide hierarchical routing; routing in general can
be either flat or hierarchical. In a flat approach, the nodes communicate directly with each
other. The problem with this is that it does not scale well, it also does not allow for route
aggregation of updates. In a hierarchical approach, the nodes are grouped into clusters,within each cluster there is a cluster head, this acts as a gateway to other clusters, it serves
as a sort of default route. The advantage of a hierarchical structure is that within a cluster,
an on demand routing protocol could be used which is more efficient in small-scale networks.
For inter cluster communication then a table driven protocol could be used which, would
allow the network to scale better. An example of such a hybrid routing protocol is the Zone
Routing Protocol (ZRP).
9.7 QUESTIONS
1. Explain the components of Mobile IP
2. Explain the working principle of Mobile IP
3. What is the difference between care of address and co-located care of address
4. Explain reverse tunneling
5. Explain various ad-hoc routing techniques
7/28/2019 Dmc 1630 - Mobile Computing
89/112
MOBILE COMPUTING
NOTES
75 ANNA UNIVERSITY CHENNAI
UNIT IV
MOBILE TRANSPORT LAYER
CHAPTER 10
MOBILE TRANSPORT LAYER
10.1 OVERVIEW
TCP is a connection oriented transport protocol which provides a reliable byte stream
to the application layer. Application data submitted to TCP is divided into Protocol Data
Units (PDUs) (called segments) before transmission. Reliability is achieved since TCP
uses an ARQ mechanism based on positive acknowledgments. Each byte is numbered
and the number of the first byte in a segment is used as a sequence number in the TCP
header. A receiver transmits a cumulative acknowledgment in response to an incoming
segment which implies that many segments can be acknowledged at the same time.
TCP manages a retransmission timer which is started when a segment is transmitted.
If the timer expires before the segment is acknowledged, then TCP retransmits the segment.
The Retransmission Time Out (RTO) value is calculated dynamically based on measurements
of the Round Trip Time (RTT) (i.e. the time it takes from the transmission of a segment until
the acknowledgment is received). In October 1986 the Internet had its first congestion
collapse. The end hosts transmitted more data than the routers were able to handle, and
did not lower the transmission rate even though many packets were lost. Hence the
congested state persisted in the routers. Since then TCP has been extended with mechanismsfor congestion control. Today all TCP implementations are required to use algorithms for
congestion control, namely, slow start, congestion avoidance, fast retransmit, and fast
recovery.
10.1.1. Slow Start and Congestion Avoidance
The purpose of slow start and congestion avoidance is to control the transmission
rate in order to prevent congestion from occurring. TCP is described as a self-clocking
protocol, since the transmission rate is determined by the rate of incoming acknowledg