SlideShare a Scribd company logo
1 of 31
Download to read offline
RAMCO INSTITUTE OF TECHNOLOGY
Department of Computer Science and Engineering
Academic Year: 2019- 2020 (Even Semester)
Degree, Semester & Branch: VI Semester B.E. CSE.
Course Code & Title: CS8601 Mobile Computing.
Name of the Faculty member: Dr.M.Kaliappan, Associate Professor/CSE
----------------------------------------------------------------------------------------------------------------
UNIT-I INTRODUCTION 9
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of
Mobile Communication Technologies- Multiplexing – Spread spectrum -MAC Protocols –
SDMA- TDMA- FDMA- CDMA
----------------------------------------------------------------------------------------------------------------
Credit: Jochen Schiller, “Mobile Communication”, PHI, Prasant Kumar Pattnaik, Rajib
Mall, “Fundamentals of Mobile Computing”, PHI
---------------------------------------------------------------------------------------------------------------
Objective:
 To enable the students to understand the basic concepts of mobile computing.
Outcome:
 Explain the basics of mobile computing and MAC protocols
----------------------------------------------------------------------------------------------------------------
1. Mobile computing (2 marks)
 Mobile computing is a technology in which computation performed remotely while
on move
 People can access information from anywhere at any time
 Mobility
 Change location while communicating to invoke computing service
 Computing
 Carryout process related to service invocations on a remote computer
1.1 Basics of Communication Technologies (4 marks)
 Mobile handset
 Individual users with handset directly communicate with each other over a
radio link or wired link formed through intermediaries such as base station and
fixed line.
 When all intermediaries are located in ground, the communication system is
called terrestrial radio system.
 If at least one of the intermediaries is satellite, then it is referred as satellite
radio system
 Cell phone system
 Provide data services like SMS,MMS, email and web browsing
 Current location of the user is maintained by mobile telecommunication
networks while move
 Types of communication networks (2 marks)
 Voice networks
 Data networks
 Voice networks
 Analog signal is modulated on a carrier signal for transmission
 Ex: Traditional Telephonic network-Circuit switching
 Data networks
 Data network is a telecommunications network that allows computers to
exchange digital data.
 Data refers to any information like text, documents, picture, movie, sound
 Example: packet switching
 Computer networks
 Controller area networks(CAN)
 LAN
 Internet
 Controller area networks(CAN) (2 marks)
 Very small networks used to connect different components of embedded
controller
 Less than 50 meters
 Ex : Automatic doors, coffee machines
 LAN (2 marks)
 Used to connect no. of computers connected within organization to share data
and other resources like printers, fax.
 Typically deployed in a building or a campus
 Operate from 10mbps to 1Gbps
 Now 100Gigabit Ethernet
 Internetworks
 Several LAN interconnected using switches
 Network of networks
 A node in LAN communicates with a node in another LAN using packet
switching
1.2 Components of wireless communication system (4 marks)
Transmitter
 It modulate or encode data, voice, video into higher frequency carrier signal, then it
can be radiated and propagated use of radio frequency spectrum
Receiver
 It receive the modulated signals and reverse the function of transmitter and thereby
recover the transmitted signal
Antenna
 It convert the electrical signal from transmitter to a electromagnetic RF wave or
conversely, to convert RF wave to an electrical signals
Filters
 It used to reject interfering signal lying outside the band of receiver and transmitter.
Amplifier
 Amplifies the strength of a signal. It minimize the noise
Mixer
 Used to achieve frequency conversion at the transmitters and receivers
1.3 Architecture of Mobile Telecommunication system
WLAN
 Connectivity between computers over short distance using wireless medium.
 Educational institute, office building
1.4 Mobile Computing vs Wireless networking (2 marks)
Mobile Computing Wireless Networking
It is a technology that access data
through wireless network
It is a network that Connectivity between
computers over short distance using wireless
medium
It refers to a device performing
computation that is not always
connected to a central network
It refers to the data communication without the use
of a landline. Eg. Cellular Telephone, Two way
radio, Satellite, Wireless Connection
It denotes accessing information and
remote computational services while
on the move
It provides the basic communication infrastructure
necessary for mobile computing
It refers to computing devices that are
not restricted to a desktop. Eg: Smart
Phone, PDA, Laptop etc
It is a method/technology of transferring
information between a computing devices such as
PDA & data sources without a physical connection
1.5 Applications of mobile computing (2 marks)
 Emergency services
 Stock Broker
 Vehicles
 Estate Agents
 courts
 companies
 Stock Information Collection/Control
 Credit Card Verification
 Taxi/Truck Dispatch
 Electronic Mail/Paging
1.6 Disadvantages of Mobile computing (2 marks)
 Battery consumption hindrance
 Interference
 Inefficient bandwidth in transmission.
 Connection losses over entire network.
1.7 Characteristics of Mobile computing (8 marks)
• Ubiquity
• Location awareness
• Adaptation
• Broadcast
• Personalization
Ubiquity
• Ability of user to perform computation from everywhere at any place
• Ex: Business executive receives notification and issue transaction in the
coverage area
Location awareness
• Handheld device equipped with GPS that provide current location of the users.
• Many application from strategic to personalized service require location based
service
• Ex: to locate the shop in nearby place
• Traffic control
• Fleet management
• Emergency service
Adaptation
• Ability of system to adjust to bandwidth fluctuation without inconveniencing
the user
• Intermittent disconnection and bandwidth fluctuation occur due to handoff,
obstacle and environment noise
Broadcast
• Delivery of data simultaneously to hundreds of mobile users
• Ex: users at specific location near a railway station may ne sent advertising
information of taxi
Personalization
• Services in mobile environment can be personalized according to user profile
1.8 Cellular Mobile communication (8 marks)
• Partition the region into smaller regions called cells.
• Each cell gets at least one base station or tower
• Users within a cell talks to the tower
• BS keep track of the calls
Properties of Cell structure
• Typical Cell sizes
– tens of meters in buildings
– some cites few hundred meters
– country side few tens of kilometers
• Advantages of cell structures:
– more capacity due to frequency reuse
– less transmission power needed
– more robust, tolerate failures
– deals interference, transmission area locally
• Problems:
– fixed network needed for the base stations
– handover (changing from one cell to another) necessary
– interference with other cells
Other common channel
Channel Reuse
• Cell structure can reuse frequency only when certain distance is maintained between
cells that use the same channels.
• Fixed Allocation schemes:
– certain frequencies are assigned to a certain cell
– problem: different traffic load in different cells
• Dynamic Allocation schemes:
– base station chooses frequencies depending on the frequencies already used in
neighbor cells
1.9. Generation of Mobile computing (8 marks)
• 1G - First generation (Analog and FM)
• 2G - Second generation (Digital, TDMA, CDMA)
• 3G - Third generation (Multi-media)
• 4G - Fourth generation (LTE)
• 5G - Fifth Generation(WWWW)
1G
• These phones were the first mobile phones to be used, which was introduced in 1982
and completed in early 1990.
• It was used for voice services
• It based on Advanced Mobile Phone System (AMPS) technology.
• Analog signals are modulated on higher frequency
• Signals transmitted by separate channels
– Incoming signal-25MHz
– Outgoing signal-25 MHz
• Frequency spectrum was split into sub channels, each used by different users
• 1G frequency band split into five band sub-band1, sub-band2, sub-band3, sub-band4,
sub-band5
• Each channel to be adjacent to each other, and separated from adjacent channel about
30khz called guard band
• Guard band reduce number of simultaneous calls in cell
• 1G Standards
– USA- AMPS(Advanced Mobile phone system)
– Europe-NMT450(Nordic Mobile Telephone)
– UK-TACS(Total access communication system)
• 1G follows multiple access type , once a caller hanged up, another caller use the same
frequency(FDMA)
• Call was dropped during handoff when another call use the channel in another cell
• Hand off or what happens when a user is mobile? (2 marks)
Especially, when crossing a cell boundary while continuing the call. Handoff
strategy is invoked. It finds a new base station and higher priority over new
call invocation.
– Hard handoff
• Mobile user is passed between disjoint towers that assign different
frequency or adapt different air-interface technology
– Soft handoff
– Mobile user communicates to two towers simultaneously and the signal is
treated as a multipath signal
Drawback of 1G
• Poor voice quality and battery life
• Large phone size
• Poor handoff reliability
• It has no security
• Offered very low level of spectrum efficiency
• The analogue signals are more to suffer interference problems
2G
• It uses digital signals for voice transmission, and provides services to deliver
text (SMS) and picture message at low speed (in kbps).
• It use the bandwidth of 30 to 200 KHz
• It reduction in call cost
• 2G follows some principles of 1G,
• 2G use CDMA and TDMA modulation techniques as channel access technology
• North America used IS-95 standard (CDMA), can multiplex up to 64calls per
channel in 800MHZ
• Europe used GSM, which used TDMA, can multiplex up to 8calls per channel
in 900 and 800MHz
• Advantages
– Provides better quality and capacity
– Provide higher voice quality
– Provide data service like SMS and email
– digital calls are free of static & background noise
– 2G technology offers improved privacy
• Disadvantages
– Unable to handle complex data such as videos.
– Required strong digital signals to help mobile phones work.
2.5G
• It used GPRS(General packet Radio service) , extension of GSM
• It based on packet switching technique
• Deployment began in 2000 followed by EDGE(Enhanced Data GSM Environment)
• Advantages and Disadvantages
• User remains connected to the internet without additional cost.
• Faster internet browsing
• Use streaming application
• Camera phones
• Did not offer multi-megabit data rate
• Cell towers had a limited coverage area.
• Built mainly for voice services and slow data
3G
• First 3G adopted in Japan in 2001 as DoCoMo
• It referred as IMT-2000(International Mobile Tele communication)
• It support purely data network, use packet switching
• UMTS (Universal Mobile Telephone system) is one of the 3G mobile system for
GSM networks.
• UMTS support various cell size from Pico cell to global cell like satellite
• Europe adopted UMTS, while the USA uses CDMA2000
• Advantages
• Higher data transmission rate
• Offered increased bandwidth
• High quality traditional voice call
• Provide cheaper calls
• Support applications like email, live-video buffering location based service,
video telephony, multimedia gaming
4G
• It make mobile broadband internet access
• It has high speed internet access from smart phone to laptop with USB wireless
modem
• It uses WiMAX and LTE standard
• 4G including IP telephony, video conferencing and 3D television
• Advantages
• Capable of provide 10Mbps-1Gbps speed
• High quality streaming video
• Combination of Wi-Fi and Wi-Max
• High security
• Provide any kind of service at any time as per user requirements anywhere
• Expanded multimedia services
• Low cost per-bit
• Battery uses is more
• Disadvantages
• Hard to implement and Need complicated hardware
• Expensive equipment required to implement next generation network
Comparison of Generation of cell phones or mobile computing (2 marks)
5G
• 5G will not only enable better usage of smartphones, but it will also start the era of
driverless smart cars and smart homes.
• In the smartphone sector, 5G is expected in the field of AR (Augmented Reality) and VR
(Virtual Reality)
• The main focus of 5G will be on world-Wireless World Wide Web (WWWW).
• It is a complete wireless communication with no limitations.
• Provides large broadcasting of data up to 20 Gbps.
• Multi-media newspapers, watch TV programs with the clarity(HD Clarity)
• Large phone memory, dialing speed, clarity in audio/video
• T-Mobile's LTE/LAA network(License Assisted Access)
Plan of 5G
• Although 5G will first launch in the U.S. probably by the end of 2018
• China will start their pre-commercial use from 2019.
• In India, we can expect the launch of 5G network by the end of 2019.
• By 2020 ,we can use the network commercially
1.10 Structure of Mobile Computing applications (8 Marks)
Functionalities provided by each tier structure of a mobile computing application
Presentation tier
 It describes the presentation of the information.
 Topmost level - Concerns the user interface
 Facilitates the users to issue requests and present the results to them meaningfully
 Programs run on the client‟s computer.
 Includes
 web browsers
 customized client programs for dissemination of information and
 For collection of data from users
Application Tier
 It responsible for making logical decisions and performing computation
 Moves and processes data between the presentation and data tier
 “engine” of an automobile
 It processing of user input, obtaining information and then making decisions
 Implemented using technologies like Java, .NET services, cold fusion, etc.
Data tier
• Responsible for basic facilities of data storage, access and manipulation
• Often contains a database
• Information is stored and retrieved from this database (file system can also be used to
store small amount of data)
• Implemented on a fixed server
1.10 Multiplexing (16 Marks)
Multiplexing (2 Marks)
• Multiplexing describes how several users can share a medium with minimum or no
interference.
• The task of multiplexing is to assign space, time, frequency, and code to each
communication channel with a minimum of interference and a maximum of medium
utilization.
• Example, highways with several lanes.
– Many users (car drivers) use the same medium (the highways) with hopefully
no interference (i.e., accidents).
– This is possible due to the provision of several lanes (space division
multiplexing) separating the traffic.
– In addition, different cars use the same medium (i.e., the same lane) at
different points in time (time division multiplexing).
1.10.1 Types of Multiplexing
• Space division multiplexing
• Frequency division multiplexing
• Time division multiplexing
• Code division multiplexing
Space division multiplexing (8 Marks)
– The term communication channel refers to an association of sender(s) and
receiver(s) who want to exchange data.
– Figure shows six channels ki and introduces a three dimensional coordinate
system such as code c, time t and frequency.
• In space division multiplexing (SDM), the space si is represented as circles
indicating the interference range
• The channels k1to k3 can be mapped onto the three „spaces‟ s1 to s2 which
clearly separate the channels and prevent the interference ranges from
overlapping.
• Guard space (2 Marks)
– The space between the interference ranges is sometimes called guard space.
• For the remaining channels (k4 to k6), three additional spaces would be needed.
• EX: Telephone Exchange system
– Each subscriber is given a separate pair of copper wires to the local exchange
• Disadvantages (2 Marks)
– SDM implies a separate sender for each communication channel that clearly
represents a waste of space
Frequency division multiplexing (FDM) (8 Marks)
• It subdivides the frequency dimension into several non-overlapping frequency bands.
• Each channel ki is now allotted its own frequency band.
• Senders using a certain frequency band continuously.
• Guard spaces are needed to avoid frequency band overlapping or interference.
• Ex: This scheme is used for radio stations
– Within the same region, where each radio station has its own frequency.
Advantages (2 Marks)
• This scheme does not need coordination between sender and receiver: the receiver only
has to tune in to the specific sender
Disadvantages (2 Marks)
• While radio stations broadcast 24 hours a day, mobile communication typically takes
place for only a few minutes at a time.
• Assigning a separate frequency for each communication scenario would be a waste of
(scarce) frequency resources.
• Additionally, the fixed assignment of a frequency to a sender inflexible and limits the
number of senders.
Time division multiplexing (8 Marks)
In time division multiplexing (TDM), a channel ki is given the whole bandwidth for a
certain amount of time, i.e., all senders use the same frequency but at different points in
time.
Guard spaces
• Guard spaces represent time gaps, have to separate the different periods when the
senders use the medium.
• In our highway example, this would refer to the gap between two cars. If two
transmissions overlap in time, this is called co-channel interference.
To avoid interference, precise synchronization between senders is necessary.
Disadvantages (2 Marks)
• It needs complex coordinating system to avoid interference. In which all senders
need precise clocks or, distribute a synchronization signal to all senders.
• A receiver listens at exactly the right point in time.
Advantages (2 Marks)
• This scheme is flexible as one can assign more sending time to senders with a
heavy load and less to those with a light load
Frequency and time division multiplexing (4 Marks)
It can be combined, i.e., a channel ki can use a frequency band for a certain amount of
time.
Guard space
• Guard spaces are needed both in the time and in the frequency dimension.
Advantages
• This scheme is more robust against frequency selective interference efficiently.
Disadvantages (2 Marks)
• Need necessary coordination mechanism between different senders.
• Two senders will interfere when they select the same frequency at the same time.
• Interference in a certain small frequency band.
• A channel may use this band only for a short period of time.
• EX: GSM
• The mobile phone standard GSM uses this combination of frequency and time
division multiplexing for transmission between a mobile phone and a base station
Code division multiplexing (8 Marks)
Code division multiplexing (CDM) is a new scheme in commercial communication
systems.
First used in military applications due to its inherent security features it now features in
many civil wireless transmission scenarios.
All channels ki use the same frequency at the same time for transmission.
Separation is achieved by assigning each channel its own „code‟,
Guard spaces
• Guard spaces are realized by using codes. e.g., orthogonal codes.
• Advantages (2 Marks)
It gives good protection against interference and tapping. Different codes have to be
assigned.
Assigning individual codes to each sender does not usually cause problems.
• Disadvantages (2 Marks)
• A receiver has to know the code and must separate the channel with user data from the
background noise composed of other signals and environmental noise.
• Additionally, a receiver must be synchronized with the transmitter to apply the
decoding correctly.
1.11 Spread spectrum (16 marks)
Spread spectrum (2 marks)
Spread spectrum techniques involve spread across a wide bandwidth needed to
transmit data
i) The following figure shows an idealized narrowband signal from a sender of user data
(here power density dp/df versus frequency f).
ii) The sender now spreads the signal in which, narrowband signal converts into a broadband
signal
iii) During transmission, narrowband and broadband interference add to the signal
iv) The sum of interference and user signal is received. The receiver is converting the spread
user signal into a narrowband signal again.
v) The receiver applies a bandpass filter to cut off frequencies left and right of the
narrowband signal. Finally, the receiver can reconstruct the original data
• Example
• Six different channels use FDM for multiplexing, which means that each channel has
its own narrow frequency band for transmission.
• Between each frequency band a guard space is needed to avoid adjacent channel
interference.
• Channels 1, 2, 5, and 6 could be received while the quality of channels 3 and 4 is too
bad to reconstruct transmitted data. Narrowband interference destroys the
transmission of channels 3 and 4.
• All narrowband signals are now spread into broadband signals using the same
frequency range.
• CDM is now used instead of FDM. Spreading of a narrowband signal is achieved
using a special code
• Each channel is allotted its own code, which the receivers have to apply to recover the
signal. Without knowing the code, the signal cannot be recovered and behaves like
background noise.
• Spread spectrum now allows in license-free bands such as 850 MHz that use for TDM
and FDM systems
• Advantages of Spread Spectrum (2 marks)
– Cross-talk elimination
– Better output with data integrity
– Better security
– Reduction in noise
– Not easy to demodulate/decode
• Disadvantage (2 marks)
• Increased complexity of receivers that have to despread a signal.
• The large frequency band that is needed due to the spreading of the signal.
• Spread signals appear more like noise; they still raise the background noise
level.
Types of spread spectrum (2 marks)
• Frequency Hopping Spread Spectrum(FHSS)
• Direct Sequencing Spread Spectrum(DSSS)
Frequency Hopping Spread Spectrum (FHSS) (8 marks)
o In frequency hopping spread spectrum (FHSS) systems, the total available
bandwidth is split into many channels of smaller bandwidth plus guard spaces
between the channels.
o Transmitter and receiver stay on one of these channels for a certain time and
then hop to another channel. This system implements FDM and TDM.
o The pattern of channel usage in the frequency hopping spread spectrum is
called the hopping sequence,
o Dwell time (2 marks)
 The time spend on a channel with a certain frequency in the frequency
hopping spread spectrum is called the dwell time
Hopping pattern: F2-F5-F3-F6-F1-F6-F4
Types of FHSS (2 marks)
• Slow hopping
• Fast hopping
– Slow hopping
– In slow hopping, the transmitter uses one frequency for several bit periods.
– Figure shows five user bits with a bit period tb.
– Performing slow hopping, the transmitter uses the frequency f2 for
transmitting the first three bits during the dwell time td. Then, the transmitter
hops to the next frequency f3.
– Slow hopping systems are typically cheaper and have relaxed tolerances. It is
an option for GSM
– Fast hopping
– For fast hopping systems, the transmitter changes the frequency several times
during the transmission of a single bit.
– In the example, the transmitter hops three times during a bit period.
– Fast hopping systems are more complex to implement because the transmitter
and receiver have to stay synchronized within same points of time.
Example
– FHSS system is used in Bluetooth
– Bluetooth performs 1,600 hops per second and uses 79 hop carriers equally
spaced with 1 MHz in the 2.4 GHz ISM band
Transmitter
Receiver
Applications of FHSP or spread spectrum (2 marks)
– Military use
– Bluetooth
– Walkie-Talkies
– Other radios
• Ex YouTube Video: https://www.youtube.com/watch?v=CkhA7s5GIGc
Direct sequence spread spectrum (8 Marks)
• In Direct sequence spread spectrum (DSSS), a user bit stream XOR with a
sequence pattern or spreading factor. It is called chipping sequence
• While each user bit has a duration tb, the chipping sequence consists of smaller
pulses, called chips, with a duration tc.
• If the chipping sequence is generated properly that is called pseudo-noise sequence.
• The spreading factor s = tb/tc determines the bandwidth of the resulting signal.
• If the original signal needs a bandwidth w, the resulting signal needs s·w after
spreading
• Civil applications use spreading factors between 10 and 100, military applications
use factors of up to 10,000.
• Wireless LANs standard IEEE 802.11 the sequence 10110111000 that is called
Barker code.
• The DSSS Barker codes exhibit a good robustness against interference and
insensitivity to multi-path propagation.
• Other known Barker codes are 11, 110, 1110, 11101, 1110010, and 1111100110101
DSSS transmitter
Digital modulation (2 Marks)
• The spreading of the user data with the chipping sequence.
Radio modulation (2 Marks)
• The spread signal is then modulated with a radio carrier
• The receiver has to know the original chipping sequence generated from the
transmitter.
• The receiver only has to perform the inverse functions of the two transmitter
modulation steps.
• However, noise and multi-path propagation require additional mechanisms to
reconstruct the original data.
• The first step in the receiver involves demodulating the received signal. This is
achieved using the same carrier as the transmitter reversing the modulation.
• Additional filtering can be applied to generate this signal.
DSSS receiver
• During a bit period, which also has to be derived via synchronization, an integrator
adds all these products. Calculating the products of chips and signal, and adding the
products in an integrator are also called correlation, the device a correlator.
• Finally, in each bit period a decision unit samples the sums generated by the
integrator and decides if this sum represents a binary 1 or a 0
Example
• User data 01
• Applying the 11-chip Barker code 10110111000
• The results in the spread „signal‟ 1011011100001001000111.
• On the receiver side, this „signal‟ is XORed bit-wise after demodulation with the same
Barker code as chipping sequence.
• This results in the sum of products equal to
– 0 for the first bit
– 11 for the second bit.
• The decision unit map the first sum (=0) to a binary 0, the second sum (=11) to a
binary 1. This constitutes the original user data
What happens in case of multi-path propagation? (2 marks)
• Several paths with different delays exist between a transmitter and a receiver.
Additionally, the different paths may have different path losses.
• In this case, rake receivers are used to provide a possible solution. It take advantage of
the multi-path propagation by combining the different paths.
• A rake receiver uses n correlators for the n strongest paths. Each correlator is
synchronized to the transmitter plus the delay on that specific path.
• As soon as the receiver detects a new path which is stronger than the currently
weakest path, it assigns this new path to the correlator with the weakest path.
– The output of the correlators are then combined and fed into the decision unit.
Comparison between FHSS and DSSS (2 marks)
FHSS DSSS
Multiple frequencies are used Single frequency is used
Frequency reuse is allowed Frequency reuse is not allowed
Sender need not wait Sender has to wait if the spectrum is busy
Power strength of the signal is high Power strength of the signal is low
It is never affected by interference It can be affected by interference
It is cheaper It is expensive
1.12 MAC protocol (2 Marks)
• It enforces the discipline in the access of shared medium when multiple user content
to access that channel.
• The objectives of MAC protocol are maximization of the utilization of the channel
and minimization of the average latency of the transmission.
• MAC (Medium access control) protocol is sub layer of data link layer, it directly
invoke the physical layer.
Properties of MAC protocol (2 Marks)
• It helps maximize the utilization of channel
• Channel allocation need to be fair
• Support different types of traffic having different and average bitrate
• It should be robust when equipment failure and change network condition
• It enforce the discipline in the access of shared medium from multiple user
• 802.11 is the standard for MAC protocol
• –EX: 802.11 network card, router
Functionalities of MAC protocol (4 Marks)
• Roaming
o •Provide uninterrupted service when user walk from one place to another
within wireless station
• Point Coordination function
o •Provide guarantees on reduce access delay and minimum transmission
bandwidth and other QoS
• power conservation
o •Provide power management
o •Transceiver must be switched off whenever carrier sensing is not needed
o •Two state : sleep and wake
• Authentication
o •recognizing a user‟s identity. It is the mechanism of associating an incoming
request with a set of identifying credentials
Wireless Networks
• Infrastructure Based
• Infrastructure less
Infrastructure Based
o Access points are connected to existing wired network
o It interact with wireless node as well as existing wired node
o It is bridge between other network and provide authentication mechanism
Infrastructure less network
• The network set up on the fly at any place. Nodes networked among themselves.
Nodes communicate directly each other, or forward message through intermediate
nodes. It is called scatternet.
• Difficulty in Collision detection and other Problems
• Piconet : Set up personal area network using blutooth technology
1.8 MAC Protocol Issues (8 Marks)
Identify the specific reasons as to why the MAC protocols designed for
infrastructure-based wireless networks may not work satisfactorily in infrastructure
less environment. Because, collisions detect scheme is difficult to implement in a wireless
environment since collisions are hard to be detected by the transmitting nodes. Hidden and
Exposed terminal problems makes MAC protocols inefficient.
• Hidden terminal problem
• Exposed terminal problem
Hidden terminal problem (2 Marks)
• Transmission of A reaches B, but not C
• Transmission of C reaches B, but not A
• However, the radio signal of B reaches both A and C in the range of B
• The effect is A can not detect C and C can not detect A
• A starts sending to B, C does not receive this transmission, C also wants send to B
and sense the medium. To C the medium appears to be free, Thus C starts sending
to B that cause collision.
• But now A cannot detect collision and continue with its transmission
• A is hidden for C and vice versa
• Exposed terminal problem (2 Marks)
• The radio Transmission of A reaches B, and C
• The radio Transmission of C reaches D, and A
• A want to communicate B , A stars sending data to B
• C wants to communicate with D, C sense the carrier and finds that A is talking
to B
• C has to wait till A finishes with B, However D is outside of A waiting is not
necessary
• In fact, A,B and C,D can communicate with each other in parallel with out any
collision, but according to protocol that is not possible.
• A and S are exposed terminals
Solutions
• Collision detection mechanism are good idea on wired LAN , but they cannot used
in wireless LAN
• Reason
– CD mechanism requires the implementation of Full duplex technique for
transmitting and receiving at the same time
– In wireless LAN, we cannot assume that all the stations will be able to
receive signal from each other(hidden terminal problem)
– Collision Avoidance mechanism is a solution
1.9 Taxonomy of MAC protocols (2 Marks)
• Fixed assignment schemes
– Circuit switched method
– Resources are assigned for entire duration of the call
• Random assignment schemes
– Connection less Packet switched technique
– The node start to transmit as soon as they have a packet to send
• Reservation based assignment schemes
– Connection based Packet switched technique
– A node make a explicit reservation of the channel for a call before
transmitting
– Suitable for varying traffic
1.9.1 Fixed assignment schemes (16 Marks)
– Frequency division multiple access(FDMA)
– Time division multiple access(TDMA)
– Code division multiple access(CDMA)
1.9.1.1 Frequency division multiple access(FDMA) (8 Marks)
– The available bandwidth (frequency) is divided in to many frequency band called
channel(coaxial cable or microwave beam)
– Full duplex communication is take place, each user is allocated a forward
channel for communication from handset to base station and reverse
channel(Backward) for communicating from BS to hand set
– Each user is allocated two unique frequency channel, one for transmitting , other
for receiving
– When a call is underway, no other user would be allocated the same frequency
band
– Unused transmission time occurs when the user pauses between the transmission, it
does not achieve the high channel utilization
– It is used in satellite communication systems and telephone trunklines.(First
Generation)
The two frequencies: uplink and Downlink
– Uplink
From mobile station to base station or from ground control to satellite
– Downlink
From base station to mobile station or from satellite to ground control
Advantages (2 Marks)
• Reduces the bit rate information
• It reduces the cost and lowers the inter symbol interference
• An FDMA system can be easily implemented.
• Since the transmission is continuous, less number of bits are required for
synchronization and framing
Disadvantages (2 Marks)
• The maximum flow rate per channel is fixed and small
• Guard bands lead to a waste of capacity.
• Unused transmission time occurs when the user pauses between the transmission, it
does not achieve the high channel utilization
1.9.1.2 Time division multiple access (8 Marks)
• Multiple nodes are allotted different time slots to access the channel
• Time line is divided into fixed time slot and these are allocated multiple users
• All users use the same channel, but take turn in transmitting
• Time slots are allocated in round robin manner
• Each user assigned one time slot per frame, unused time slots goes ideal, leading low
channel utilization
• The fundamental unit of time is called a burst period and it lasts for approximately
0.577 ms.
• Eight of these burst periods are grouped into what is known as a TDMA frame
• A 25 MHz frequency range holds 124 single bandwidth of each kHz; each of these
frequency channels contains 8 TDMA conversation channels
Advantages of TDMA (2 Marks)
– Permits flexible data rates.
– No guard band required for the wideband system.
Disadvantages (2 Marks)
– Call time is needed in each slot to accommodate time to inaccuracies (due to
clock instability).
– Electronics operating at high bit rates increase energy consumption.
– Complex signal processing is required to synchronize within short slots.
1.9.1.3 Code Division Multiple Access (CDMA) (8 Marks)
• CDMA is a sort of multiplexing that facilitates multiple users to occupy a single
transmission channel. It optimizes the use of available bandwidth.
• Multiple users are allotted different code(sequence of 0 and 1) to access same channel
• Special coding scheme is used that allows signal from multiple users to be
multiplexed over the channel
• Multiple users use the same frequency at the same time
• CDMA employs analog-to-digital conversion (ADC) in combination with spread
spectrum technology
• It used m-bit pseudo noise (PN) code sequence to generate different code.
• Using m-bits, 2 m
-1 different codes can be obtained. From this code , each user will
use one code
• CDMA used in second-generation (2G) and third-generation
(3G) wireless communications
• The technology is commonly used in ultra-high-frequency (UHF) cellular
telephone systems, bands ranging between the 800-MHz and 1.9-GHz.
CDMA code generation
• A code for a user is orthogonal that refers the vector inner product is zero
• Two vector: p=(2,5,0), q=(0,0,17)
• Inner product p*q=(2*0 + 5*0 + 0*17) =0
• Bipolar notation: 0 represented as -1, 1 represented as +1
• Sender
– Unique random number key
– XOR the signal with random number key
• Receiver
– Knows the random number key
– Demodulate the signal to get data
• Sender
– X_data = 1, X_key = 010011
– Bipolar representation of X_key = -1,+1,-1,-1,+1,+1
– Calculated signal at sender Xs= X_data * X_key
– +1* X_key = +1 * (-1,+1,-1,-1,+1,+1)= (-1,+1,-1,-1,+1,+1)
– Y_data = 0, Y_key = 110101
– Bipolar representation of X_key = +1,+1,-1,-1,+1 ,-1,+1
– Calculated signal at sender Ys= Y_data * Y_key
– -1* Y_key = -1 * (+1,+1,-1,-1,+1 ,-1,+1)= (- 1,-1,+1,+1,-1 ,+1,-1)
• Receiver
– Xs+Ys= (-1,+1,-1,-1,+1,+1) + (- 1,-1,+1,+1,-1 ,+1,-1)
– (-2, 0, 0, -2, +2, 0)
• Z wants to get information of sender X and sender Y
• Z * X_key = (-2, 0, 0, -2, +2, 0) * (-1,+1,-1,-1,+1,+1)
= (2 +0+0+2+2+0)=6 > 0 (positive)
X_data = 1
• Z * Y_key = (-2, 0, 0, -2, +2, 0) * (+1,+1,-1,-1,+1 ,-1,+1)
= (-2 +0+0-2-2+0)=-6 < 0 (negative)
Y_data = 0
Advantages (2 Marks)
• CDMA provide a power control
• Flexible transfer may be used.
• Reduces interference.
Disadvantages (2 Marks)
• The code length must be carefully selected. A large code length can induce delay or
may cause interference.
• Time synchronization is required.
Space Division Multiple Access (SDMA) (4 Marks)
• It is used for allocating a separated space to users in wireless networks.
• Application
– Application involves assigning an optimal base station to a mobile phone user.
The mobile phone receives several base stations with different quality. A MAC
algorithm decide which base station is best, taking into account which
frequencies (FDM), time slots (TDM) or code (CDM) are still available.
– SDMA is always in combination with .one or more other schemes
– The SDMA algorithm is formed by cells and antennas which constitute the
infrastructure implementing space division multiplexing (SDM).
– A new application of SDMA comes up with beam-forming antenna arrays.
Single users are separated in space by individual beams.
– This improves the overall capacity of a cell
– e.g., measured in bit/s/m2 or voice calls/m2.
1.9.2 Random assignment schemes (16 Marks)
• Pure ALOHA
• Slotted ALOHA
• CSMA
• CSMA/CD
• CSMA/CA
Pure ALOHA
• Developed at university of Hawai
• If a node has data to send , it begins to transmit
• It does not check whether the channel is busy before transmitting
• If the frame successfully reaches the destination , it send next frame
• If the frame fails at destination , it is resent after a random amount of time to
reduce the probability of re-collision
• Suitable for small network, not suitable for large network. It leads collision.
Slotted ALOHA
• The time divided into equal size slots in which a packet can be sent, the size of the
packet is restricted
• A node wants to send a packet, start transmission at beginning of the slot
• The slotted ALOHA employs beacon signal that are sent at precise interval that mark
the beginning of the slot at which point the nodes can start to transmit
• Transmission time is broken into slots equivalent to the transmission time of a single
packet. Stations are only allowed to transmit at slot boundaries
• Does not work well in large network
Problem of Slotted ALOHA (2 Marks)
– The random retransmission of the packet will have an effect on the delay
associated with successful packet delivery.
– If the limit is too short, the probability of re-collision is high.
– If the limit is too long the probability of re-collision less but there is
unnecessary delay in the retransmission.
CSMA (Carrier sense Multiple Access)
• A node senses the medium before transmit, It the medium is busy, wait before
transmitting
– CSMA/CD
– CSMA/CA
– CSMA/CD does not work well in wireless network, it difficult for a
transmitting node to detect collision since received signal from other node
would be too feeble
– Only destination node notice the corrupted frame after it computes checksum.
This leads to retransmission and wastage of channel utilization
– In contrast, in wired network when node detects a collision , it immediately
stop transmission, thereby minimize the channel wastage
Do you agree with the following statement: “In CSMA/CD protocol, when two nodes
transmit on a shared medium, a collision can occur only when two nodes start
transmitting exactly at the same time instant”, Explain your answer.
• Yes. A collision may occur only when two nodes start transmitting exactly at the
same time instant because a node senses the medium before transmit, It the medium
is free, it sends data immediately
Why are collision detection based MAC protocols not suitable for wireless networks? (2
Marks)
 CD mechanism requires the implementation of Full duplex technique for transmitting
and receiving at the same time
 In wireless LAN, we cannot assume that all the stations will be able to receive signal
from each other(hidden terminal problem)
 Collision Avoidance mechanism is a solution
CSMA/CA (8 Marks)
• Idea is prevent collision
• When node is transmitting on the channel, other nodes might be waiting to
transmit until channel become free
• When transmitting node complete its transmission , the waiting nodes start
transmitting at a same time,
• To overcome collision, all the nodes are forced to wait for a random time and
then sense the medium again
• The chances of two nodes starting to transmit at the same time is greatly
reduced
• Non persistent
• 1-persistent
• P-Persistent
• Non persistent
• Channel transmit frame if it is ideal, otherwise it wait a random time and again
sense line
1-persistent
• When the station detects an idle-channel, it immediately transmits the frame with
probability 1
P-Persistent
• If time slot <= propagation time slot, send data if channel is ideal
• With the probability q=l-p, the station then waits for the beginning of the next time
slot
1.9.3 Reservation based scheme (8 Marks)
• It is the RTS/CTS scheme
• A sender transmits an RTS(Request to send) packet to receiver before transmission
• The receiver sends a CTS (clear to send) packet, the data transmission commences
only after that.
• When the other node senses the CTS packet, they wait until the transmission is
complete.
• Reservation is achieved by sending RTS/CTS packets between sender and receiver,
other nodes defer its transmission in specified period to avoid collision.
• RTS/CTS based MAC protocol
– MACA, MACAW, MACA-BI, PAMAS,DBTMA,MARCH,S-MAC –
designed for wireless sensor networks
• MACA
– Multiple access collision avoidance
– MACA solves the hidden/exposed terminal problem
– A node requests to use the medium by sending RTS to receiver. Since radio
signals propagate Omni directional , every node within the senders range will
hear RTS and then refrain from transmitting
– The receiver is ready to receive data, it sends CTS
Solution for Hidden terminal problem (2 Marks)
• RTS contain sender‟s name and receiver‟s name as well as length of the future
transmission
• CTS contain sender‟s name and receiver‟s name as well as length of the planned
transmission
• CTS hear by C also, the medium is reserved by A with specified time, C refrains from
transmitting for time indicated in CTS
• The collision cannot occur at B during data transmission
• Issues
• Collision can occur during the sending of RTS. A and C could send RTS at the same
time. But an RTS occurs over a very small time compared to data transmission. The
probability of collision occur less
Solution for exposed terminal problem (2 Marks)
Issues
• Collision can occur during the sending of RTS. A and C could send RTS at the same
time. But an RTS occurs over a compared to data transmission. Thevery small time
probability of collision occur less
Application oriented questions
1 Consider a user data 101. What is the spreading signal when applying the 11-chip
Barker code 11110111001?

More Related Content

What's hot

Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniquesBibhu Prasad
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
2.4 code division multiple access
2.4   code division multiple access2.4   code division multiple access
2.4 code division multiple accessJAIGANESH SEKAR
 
Third generation (3g)wireless technology
Third generation (3g)wireless technologyThird generation (3g)wireless technology
Third generation (3g)wireless technologySardar Kaukaz
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSjunnubabu
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....pptbalu008
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Jay Nagar
 
Noma-5G technology
Noma-5G  technologyNoma-5G  technology
Noma-5G technologygouthami3616
 

What's hot (20)

Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Ch5
Ch5Ch5
Ch5
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
2.4 code division multiple access
2.4   code division multiple access2.4   code division multiple access
2.4 code division multiple access
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Third generation (3g)wireless technology
Third generation (3g)wireless technologyThird generation (3g)wireless technology
Third generation (3g)wireless technology
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
GSM: Handovers
GSM: HandoversGSM: Handovers
GSM: Handovers
 
Gsm radio-interface
Gsm radio-interfaceGsm radio-interface
Gsm radio-interface
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
 
PPT
PPTPPT
PPT
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
 
Noma-5G technology
Noma-5G  technologyNoma-5G  technology
Noma-5G technology
 

Similar to Mobile computing unit-I-notes 07.01.2020

Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
Early Mobile Telephone System Architecture.docx
Early Mobile Telephone System Architecture.docxEarly Mobile Telephone System Architecture.docx
Early Mobile Telephone System Architecture.docxPaulMuthenya
 
Lecture 2 evolution of mobile cellular
Lecture 2  evolution of mobile cellular Lecture 2  evolution of mobile cellular
Lecture 2 evolution of mobile cellular Chandra Meena
 
cellular communication
cellular communicationcellular communication
cellular communicationjhcid
 
INTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATIONINTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATIONSANDIP BURNWAL
 
Telecommunication basics
Telecommunication basicsTelecommunication basics
Telecommunication basicsKUNTAL BANERJEE
 
Cellular concept
Cellular conceptCellular concept
Cellular conceptgetvibha
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
 
Telecommunications
TelecommunicationsTelecommunications
TelecommunicationsAlisha Dash
 
Wireless in local loop
Wireless in local loopWireless in local loop
Wireless in local loopMustahid Ali
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and NetworksChAwais15
 
It infrastructure
It infrastructureIt infrastructure
It infrastructureraptrovic
 
Basics of wireless communication
Basics of wireless communicationBasics of wireless communication
Basics of wireless communicationRAVIKIRAN ANANDE
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 

Similar to Mobile computing unit-I-notes 07.01.2020 (20)

Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
438lecture1
438lecture1438lecture1
438lecture1
 
Early Mobile Telephone System Architecture.docx
Early Mobile Telephone System Architecture.docxEarly Mobile Telephone System Architecture.docx
Early Mobile Telephone System Architecture.docx
 
Lecture 2 evolution of mobile cellular
Lecture 2  evolution of mobile cellular Lecture 2  evolution of mobile cellular
Lecture 2 evolution of mobile cellular
 
cellular communication
cellular communicationcellular communication
cellular communication
 
INTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATIONINTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATION
 
Telecommunication basics
Telecommunication basicsTelecommunication basics
Telecommunication basics
 
Cellular concept
Cellular conceptCellular concept
Cellular concept
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
 
Telecommunications
TelecommunicationsTelecommunications
Telecommunications
 
Jaya ppt(2)
Jaya ppt(2)Jaya ppt(2)
Jaya ppt(2)
 
Wireless in local loop
Wireless in local loopWireless in local loop
Wireless in local loop
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and Networks
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
Basics of wireless communication
Basics of wireless communicationBasics of wireless communication
Basics of wireless communication
 
Smart grid communications and measurement technology
Smart grid communications and measurement technologySmart grid communications and measurement technology
Smart grid communications and measurement technology
 
Wc unit1
Wc unit1Wc unit1
Wc unit1
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 

More from Ramco Institute of Technology, Rajapalayam, Tamilnadu, India

More from Ramco Institute of Technology, Rajapalayam, Tamilnadu, India (20)

AD3251-Data Structures Design-Notes-Tree.pdf
AD3251-Data Structures  Design-Notes-Tree.pdfAD3251-Data Structures  Design-Notes-Tree.pdf
AD3251-Data Structures Design-Notes-Tree.pdf
 
AD3251-Data Structures Design-Notes-Searching-Hashing.pdf
AD3251-Data Structures  Design-Notes-Searching-Hashing.pdfAD3251-Data Structures  Design-Notes-Searching-Hashing.pdf
AD3251-Data Structures Design-Notes-Searching-Hashing.pdf
 
ASP.NET-stored procedure-manual
ASP.NET-stored procedure-manualASP.NET-stored procedure-manual
ASP.NET-stored procedure-manual
 
Neural networks using tensor flow in amazon deep learning server
Neural networks using tensor flow in amazon deep learning serverNeural networks using tensor flow in amazon deep learning server
Neural networks using tensor flow in amazon deep learning server
 
Mobile Computing-Unit-V-Mobile Platforms and Applications
Mobile Computing-Unit-V-Mobile Platforms and ApplicationsMobile Computing-Unit-V-Mobile Platforms and Applications
Mobile Computing-Unit-V-Mobile Platforms and Applications
 
CS8601 mobile computing Two marks Questions and Answer
CS8601 mobile computing Two marks Questions and AnswerCS8601 mobile computing Two marks Questions and Answer
CS8601 mobile computing Two marks Questions and Answer
 
Mobile computing Unit III MANET Notes
Mobile computing Unit III MANET NotesMobile computing Unit III MANET Notes
Mobile computing Unit III MANET Notes
 
Virtual lab - Routing in Mobile Adhoc Networks
Virtual lab - Routing in Mobile Adhoc NetworksVirtual lab - Routing in Mobile Adhoc Networks
Virtual lab - Routing in Mobile Adhoc Networks
 
Flipped class collaborative learning-kaliappan-rit
Flipped class collaborative learning-kaliappan-ritFlipped class collaborative learning-kaliappan-rit
Flipped class collaborative learning-kaliappan-rit
 
Web services-Notes
Web services-NotesWeb services-Notes
Web services-Notes
 
Building Service Oriented Architecture based applications
Building Service Oriented Architecture based applicationsBuilding Service Oriented Architecture based applications
Building Service Oriented Architecture based applications
 
Innovative Practice-ZigSaw
Innovative Practice-ZigSaw Innovative Practice-ZigSaw
Innovative Practice-ZigSaw
 
SOA unit-3-notes-Introduction to Service Oriented Architecture
SOA unit-3-notes-Introduction to Service Oriented ArchitectureSOA unit-3-notes-Introduction to Service Oriented Architecture
SOA unit-3-notes-Introduction to Service Oriented Architecture
 
Innovative practice -Three step interview-Dr.M.Kaliappan
Innovative practice -Three step interview-Dr.M.KaliappanInnovative practice -Three step interview-Dr.M.Kaliappan
Innovative practice -Three step interview-Dr.M.Kaliappan
 
Service Oriented Architecture-Unit-1-XML Schema
Service Oriented Architecture-Unit-1-XML SchemaService Oriented Architecture-Unit-1-XML Schema
Service Oriented Architecture-Unit-1-XML Schema
 
IT6801-Service Oriented Architecture-Unit-2-notes
IT6801-Service Oriented Architecture-Unit-2-notesIT6801-Service Oriented Architecture-Unit-2-notes
IT6801-Service Oriented Architecture-Unit-2-notes
 
Innovative Practice-Think-pair-share-Topic: DTD for TV schedule
Innovative Practice-Think-pair-share-Topic: DTD for TV scheduleInnovative Practice-Think-pair-share-Topic: DTD for TV schedule
Innovative Practice-Think-pair-share-Topic: DTD for TV schedule
 
IT6801-Service Oriented Architecture- UNIT-I notes
IT6801-Service Oriented Architecture- UNIT-I notesIT6801-Service Oriented Architecture- UNIT-I notes
IT6801-Service Oriented Architecture- UNIT-I notes
 
Soa unit-1-well formed and valid document08.07.2019
Soa unit-1-well formed and valid document08.07.2019Soa unit-1-well formed and valid document08.07.2019
Soa unit-1-well formed and valid document08.07.2019
 
Soa unit-1-xml namespaces 09.07.2019
Soa unit-1-xml namespaces 09.07.2019Soa unit-1-xml namespaces 09.07.2019
Soa unit-1-xml namespaces 09.07.2019
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

Mobile computing unit-I-notes 07.01.2020

  • 1. RAMCO INSTITUTE OF TECHNOLOGY Department of Computer Science and Engineering Academic Year: 2019- 2020 (Even Semester) Degree, Semester & Branch: VI Semester B.E. CSE. Course Code & Title: CS8601 Mobile Computing. Name of the Faculty member: Dr.M.Kaliappan, Associate Professor/CSE ---------------------------------------------------------------------------------------------------------------- UNIT-I INTRODUCTION 9 Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile Communication Technologies- Multiplexing – Spread spectrum -MAC Protocols – SDMA- TDMA- FDMA- CDMA ---------------------------------------------------------------------------------------------------------------- Credit: Jochen Schiller, “Mobile Communication”, PHI, Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI --------------------------------------------------------------------------------------------------------------- Objective:  To enable the students to understand the basic concepts of mobile computing. Outcome:  Explain the basics of mobile computing and MAC protocols ---------------------------------------------------------------------------------------------------------------- 1. Mobile computing (2 marks)  Mobile computing is a technology in which computation performed remotely while on move  People can access information from anywhere at any time  Mobility  Change location while communicating to invoke computing service  Computing  Carryout process related to service invocations on a remote computer 1.1 Basics of Communication Technologies (4 marks)  Mobile handset  Individual users with handset directly communicate with each other over a radio link or wired link formed through intermediaries such as base station and fixed line.  When all intermediaries are located in ground, the communication system is called terrestrial radio system.  If at least one of the intermediaries is satellite, then it is referred as satellite radio system  Cell phone system  Provide data services like SMS,MMS, email and web browsing  Current location of the user is maintained by mobile telecommunication networks while move  Types of communication networks (2 marks)  Voice networks  Data networks  Voice networks  Analog signal is modulated on a carrier signal for transmission  Ex: Traditional Telephonic network-Circuit switching
  • 2.  Data networks  Data network is a telecommunications network that allows computers to exchange digital data.  Data refers to any information like text, documents, picture, movie, sound  Example: packet switching  Computer networks  Controller area networks(CAN)  LAN  Internet  Controller area networks(CAN) (2 marks)  Very small networks used to connect different components of embedded controller  Less than 50 meters  Ex : Automatic doors, coffee machines  LAN (2 marks)  Used to connect no. of computers connected within organization to share data and other resources like printers, fax.  Typically deployed in a building or a campus  Operate from 10mbps to 1Gbps  Now 100Gigabit Ethernet
  • 3.  Internetworks  Several LAN interconnected using switches  Network of networks  A node in LAN communicates with a node in another LAN using packet switching 1.2 Components of wireless communication system (4 marks) Transmitter  It modulate or encode data, voice, video into higher frequency carrier signal, then it can be radiated and propagated use of radio frequency spectrum Receiver  It receive the modulated signals and reverse the function of transmitter and thereby recover the transmitted signal Antenna  It convert the electrical signal from transmitter to a electromagnetic RF wave or conversely, to convert RF wave to an electrical signals Filters  It used to reject interfering signal lying outside the band of receiver and transmitter. Amplifier  Amplifies the strength of a signal. It minimize the noise Mixer  Used to achieve frequency conversion at the transmitters and receivers 1.3 Architecture of Mobile Telecommunication system WLAN  Connectivity between computers over short distance using wireless medium.  Educational institute, office building
  • 4. 1.4 Mobile Computing vs Wireless networking (2 marks) Mobile Computing Wireless Networking It is a technology that access data through wireless network It is a network that Connectivity between computers over short distance using wireless medium It refers to a device performing computation that is not always connected to a central network It refers to the data communication without the use of a landline. Eg. Cellular Telephone, Two way radio, Satellite, Wireless Connection It denotes accessing information and remote computational services while on the move It provides the basic communication infrastructure necessary for mobile computing It refers to computing devices that are not restricted to a desktop. Eg: Smart Phone, PDA, Laptop etc It is a method/technology of transferring information between a computing devices such as PDA & data sources without a physical connection 1.5 Applications of mobile computing (2 marks)  Emergency services  Stock Broker  Vehicles  Estate Agents  courts  companies  Stock Information Collection/Control  Credit Card Verification  Taxi/Truck Dispatch  Electronic Mail/Paging 1.6 Disadvantages of Mobile computing (2 marks)  Battery consumption hindrance  Interference  Inefficient bandwidth in transmission.  Connection losses over entire network.
  • 5. 1.7 Characteristics of Mobile computing (8 marks) • Ubiquity • Location awareness • Adaptation • Broadcast • Personalization Ubiquity • Ability of user to perform computation from everywhere at any place • Ex: Business executive receives notification and issue transaction in the coverage area Location awareness • Handheld device equipped with GPS that provide current location of the users. • Many application from strategic to personalized service require location based service • Ex: to locate the shop in nearby place • Traffic control • Fleet management • Emergency service Adaptation • Ability of system to adjust to bandwidth fluctuation without inconveniencing the user • Intermittent disconnection and bandwidth fluctuation occur due to handoff, obstacle and environment noise Broadcast • Delivery of data simultaneously to hundreds of mobile users • Ex: users at specific location near a railway station may ne sent advertising information of taxi Personalization • Services in mobile environment can be personalized according to user profile 1.8 Cellular Mobile communication (8 marks) • Partition the region into smaller regions called cells. • Each cell gets at least one base station or tower • Users within a cell talks to the tower • BS keep track of the calls Properties of Cell structure • Typical Cell sizes – tens of meters in buildings – some cites few hundred meters – country side few tens of kilometers
  • 6. • Advantages of cell structures: – more capacity due to frequency reuse – less transmission power needed – more robust, tolerate failures – deals interference, transmission area locally • Problems: – fixed network needed for the base stations – handover (changing from one cell to another) necessary – interference with other cells Other common channel Channel Reuse • Cell structure can reuse frequency only when certain distance is maintained between cells that use the same channels. • Fixed Allocation schemes: – certain frequencies are assigned to a certain cell – problem: different traffic load in different cells • Dynamic Allocation schemes: – base station chooses frequencies depending on the frequencies already used in neighbor cells
  • 7. 1.9. Generation of Mobile computing (8 marks) • 1G - First generation (Analog and FM) • 2G - Second generation (Digital, TDMA, CDMA) • 3G - Third generation (Multi-media) • 4G - Fourth generation (LTE) • 5G - Fifth Generation(WWWW) 1G • These phones were the first mobile phones to be used, which was introduced in 1982 and completed in early 1990. • It was used for voice services • It based on Advanced Mobile Phone System (AMPS) technology. • Analog signals are modulated on higher frequency • Signals transmitted by separate channels – Incoming signal-25MHz – Outgoing signal-25 MHz • Frequency spectrum was split into sub channels, each used by different users • 1G frequency band split into five band sub-band1, sub-band2, sub-band3, sub-band4, sub-band5 • Each channel to be adjacent to each other, and separated from adjacent channel about 30khz called guard band • Guard band reduce number of simultaneous calls in cell • 1G Standards – USA- AMPS(Advanced Mobile phone system) – Europe-NMT450(Nordic Mobile Telephone) – UK-TACS(Total access communication system) • 1G follows multiple access type , once a caller hanged up, another caller use the same frequency(FDMA) • Call was dropped during handoff when another call use the channel in another cell • Hand off or what happens when a user is mobile? (2 marks) Especially, when crossing a cell boundary while continuing the call. Handoff strategy is invoked. It finds a new base station and higher priority over new call invocation. – Hard handoff • Mobile user is passed between disjoint towers that assign different frequency or adapt different air-interface technology – Soft handoff – Mobile user communicates to two towers simultaneously and the signal is treated as a multipath signal Drawback of 1G • Poor voice quality and battery life • Large phone size • Poor handoff reliability • It has no security • Offered very low level of spectrum efficiency • The analogue signals are more to suffer interference problems 2G • It uses digital signals for voice transmission, and provides services to deliver text (SMS) and picture message at low speed (in kbps). • It use the bandwidth of 30 to 200 KHz
  • 8. • It reduction in call cost • 2G follows some principles of 1G, • 2G use CDMA and TDMA modulation techniques as channel access technology • North America used IS-95 standard (CDMA), can multiplex up to 64calls per channel in 800MHZ • Europe used GSM, which used TDMA, can multiplex up to 8calls per channel in 900 and 800MHz • Advantages – Provides better quality and capacity – Provide higher voice quality – Provide data service like SMS and email – digital calls are free of static & background noise – 2G technology offers improved privacy • Disadvantages – Unable to handle complex data such as videos. – Required strong digital signals to help mobile phones work. 2.5G • It used GPRS(General packet Radio service) , extension of GSM • It based on packet switching technique • Deployment began in 2000 followed by EDGE(Enhanced Data GSM Environment) • Advantages and Disadvantages • User remains connected to the internet without additional cost. • Faster internet browsing • Use streaming application • Camera phones • Did not offer multi-megabit data rate • Cell towers had a limited coverage area. • Built mainly for voice services and slow data 3G • First 3G adopted in Japan in 2001 as DoCoMo • It referred as IMT-2000(International Mobile Tele communication) • It support purely data network, use packet switching • UMTS (Universal Mobile Telephone system) is one of the 3G mobile system for GSM networks. • UMTS support various cell size from Pico cell to global cell like satellite • Europe adopted UMTS, while the USA uses CDMA2000 • Advantages • Higher data transmission rate • Offered increased bandwidth • High quality traditional voice call • Provide cheaper calls • Support applications like email, live-video buffering location based service, video telephony, multimedia gaming 4G • It make mobile broadband internet access • It has high speed internet access from smart phone to laptop with USB wireless modem • It uses WiMAX and LTE standard • 4G including IP telephony, video conferencing and 3D television • Advantages
  • 9. • Capable of provide 10Mbps-1Gbps speed • High quality streaming video • Combination of Wi-Fi and Wi-Max • High security • Provide any kind of service at any time as per user requirements anywhere • Expanded multimedia services • Low cost per-bit • Battery uses is more • Disadvantages • Hard to implement and Need complicated hardware • Expensive equipment required to implement next generation network Comparison of Generation of cell phones or mobile computing (2 marks) 5G • 5G will not only enable better usage of smartphones, but it will also start the era of driverless smart cars and smart homes. • In the smartphone sector, 5G is expected in the field of AR (Augmented Reality) and VR (Virtual Reality) • The main focus of 5G will be on world-Wireless World Wide Web (WWWW). • It is a complete wireless communication with no limitations. • Provides large broadcasting of data up to 20 Gbps. • Multi-media newspapers, watch TV programs with the clarity(HD Clarity) • Large phone memory, dialing speed, clarity in audio/video • T-Mobile's LTE/LAA network(License Assisted Access) Plan of 5G • Although 5G will first launch in the U.S. probably by the end of 2018 • China will start their pre-commercial use from 2019. • In India, we can expect the launch of 5G network by the end of 2019. • By 2020 ,we can use the network commercially
  • 10. 1.10 Structure of Mobile Computing applications (8 Marks) Functionalities provided by each tier structure of a mobile computing application Presentation tier  It describes the presentation of the information.  Topmost level - Concerns the user interface  Facilitates the users to issue requests and present the results to them meaningfully  Programs run on the client‟s computer.  Includes  web browsers  customized client programs for dissemination of information and  For collection of data from users Application Tier  It responsible for making logical decisions and performing computation  Moves and processes data between the presentation and data tier  “engine” of an automobile  It processing of user input, obtaining information and then making decisions  Implemented using technologies like Java, .NET services, cold fusion, etc. Data tier • Responsible for basic facilities of data storage, access and manipulation • Often contains a database • Information is stored and retrieved from this database (file system can also be used to store small amount of data)
  • 11. • Implemented on a fixed server 1.10 Multiplexing (16 Marks) Multiplexing (2 Marks) • Multiplexing describes how several users can share a medium with minimum or no interference. • The task of multiplexing is to assign space, time, frequency, and code to each communication channel with a minimum of interference and a maximum of medium utilization. • Example, highways with several lanes. – Many users (car drivers) use the same medium (the highways) with hopefully no interference (i.e., accidents). – This is possible due to the provision of several lanes (space division multiplexing) separating the traffic. – In addition, different cars use the same medium (i.e., the same lane) at different points in time (time division multiplexing). 1.10.1 Types of Multiplexing • Space division multiplexing • Frequency division multiplexing • Time division multiplexing • Code division multiplexing Space division multiplexing (8 Marks) – The term communication channel refers to an association of sender(s) and receiver(s) who want to exchange data. – Figure shows six channels ki and introduces a three dimensional coordinate system such as code c, time t and frequency. • In space division multiplexing (SDM), the space si is represented as circles indicating the interference range • The channels k1to k3 can be mapped onto the three „spaces‟ s1 to s2 which clearly separate the channels and prevent the interference ranges from overlapping. • Guard space (2 Marks) – The space between the interference ranges is sometimes called guard space.
  • 12. • For the remaining channels (k4 to k6), three additional spaces would be needed. • EX: Telephone Exchange system – Each subscriber is given a separate pair of copper wires to the local exchange • Disadvantages (2 Marks) – SDM implies a separate sender for each communication channel that clearly represents a waste of space Frequency division multiplexing (FDM) (8 Marks) • It subdivides the frequency dimension into several non-overlapping frequency bands. • Each channel ki is now allotted its own frequency band. • Senders using a certain frequency band continuously. • Guard spaces are needed to avoid frequency band overlapping or interference. • Ex: This scheme is used for radio stations – Within the same region, where each radio station has its own frequency. Advantages (2 Marks) • This scheme does not need coordination between sender and receiver: the receiver only has to tune in to the specific sender Disadvantages (2 Marks) • While radio stations broadcast 24 hours a day, mobile communication typically takes place for only a few minutes at a time. • Assigning a separate frequency for each communication scenario would be a waste of (scarce) frequency resources. • Additionally, the fixed assignment of a frequency to a sender inflexible and limits the number of senders. Time division multiplexing (8 Marks) In time division multiplexing (TDM), a channel ki is given the whole bandwidth for a certain amount of time, i.e., all senders use the same frequency but at different points in time. Guard spaces • Guard spaces represent time gaps, have to separate the different periods when the senders use the medium. • In our highway example, this would refer to the gap between two cars. If two transmissions overlap in time, this is called co-channel interference.
  • 13. To avoid interference, precise synchronization between senders is necessary. Disadvantages (2 Marks) • It needs complex coordinating system to avoid interference. In which all senders need precise clocks or, distribute a synchronization signal to all senders. • A receiver listens at exactly the right point in time. Advantages (2 Marks) • This scheme is flexible as one can assign more sending time to senders with a heavy load and less to those with a light load Frequency and time division multiplexing (4 Marks) It can be combined, i.e., a channel ki can use a frequency band for a certain amount of time. Guard space • Guard spaces are needed both in the time and in the frequency dimension. Advantages • This scheme is more robust against frequency selective interference efficiently. Disadvantages (2 Marks) • Need necessary coordination mechanism between different senders. • Two senders will interfere when they select the same frequency at the same time. • Interference in a certain small frequency band. • A channel may use this band only for a short period of time. • EX: GSM • The mobile phone standard GSM uses this combination of frequency and time division multiplexing for transmission between a mobile phone and a base station
  • 14. Code division multiplexing (8 Marks) Code division multiplexing (CDM) is a new scheme in commercial communication systems. First used in military applications due to its inherent security features it now features in many civil wireless transmission scenarios. All channels ki use the same frequency at the same time for transmission. Separation is achieved by assigning each channel its own „code‟, Guard spaces • Guard spaces are realized by using codes. e.g., orthogonal codes. • Advantages (2 Marks) It gives good protection against interference and tapping. Different codes have to be assigned. Assigning individual codes to each sender does not usually cause problems. • Disadvantages (2 Marks) • A receiver has to know the code and must separate the channel with user data from the background noise composed of other signals and environmental noise. • Additionally, a receiver must be synchronized with the transmitter to apply the decoding correctly. 1.11 Spread spectrum (16 marks) Spread spectrum (2 marks) Spread spectrum techniques involve spread across a wide bandwidth needed to transmit data i) The following figure shows an idealized narrowband signal from a sender of user data (here power density dp/df versus frequency f).
  • 15. ii) The sender now spreads the signal in which, narrowband signal converts into a broadband signal iii) During transmission, narrowband and broadband interference add to the signal iv) The sum of interference and user signal is received. The receiver is converting the spread user signal into a narrowband signal again. v) The receiver applies a bandpass filter to cut off frequencies left and right of the narrowband signal. Finally, the receiver can reconstruct the original data • Example • Six different channels use FDM for multiplexing, which means that each channel has its own narrow frequency band for transmission. • Between each frequency band a guard space is needed to avoid adjacent channel interference. • Channels 1, 2, 5, and 6 could be received while the quality of channels 3 and 4 is too bad to reconstruct transmitted data. Narrowband interference destroys the transmission of channels 3 and 4.
  • 16. • All narrowband signals are now spread into broadband signals using the same frequency range. • CDM is now used instead of FDM. Spreading of a narrowband signal is achieved using a special code • Each channel is allotted its own code, which the receivers have to apply to recover the signal. Without knowing the code, the signal cannot be recovered and behaves like background noise. • Spread spectrum now allows in license-free bands such as 850 MHz that use for TDM and FDM systems • Advantages of Spread Spectrum (2 marks) – Cross-talk elimination – Better output with data integrity – Better security – Reduction in noise – Not easy to demodulate/decode • Disadvantage (2 marks) • Increased complexity of receivers that have to despread a signal. • The large frequency band that is needed due to the spreading of the signal. • Spread signals appear more like noise; they still raise the background noise level. Types of spread spectrum (2 marks) • Frequency Hopping Spread Spectrum(FHSS) • Direct Sequencing Spread Spectrum(DSSS) Frequency Hopping Spread Spectrum (FHSS) (8 marks) o In frequency hopping spread spectrum (FHSS) systems, the total available bandwidth is split into many channels of smaller bandwidth plus guard spaces between the channels. o Transmitter and receiver stay on one of these channels for a certain time and then hop to another channel. This system implements FDM and TDM. o The pattern of channel usage in the frequency hopping spread spectrum is called the hopping sequence, o Dwell time (2 marks)  The time spend on a channel with a certain frequency in the frequency hopping spread spectrum is called the dwell time
  • 17. Hopping pattern: F2-F5-F3-F6-F1-F6-F4 Types of FHSS (2 marks) • Slow hopping • Fast hopping – Slow hopping – In slow hopping, the transmitter uses one frequency for several bit periods. – Figure shows five user bits with a bit period tb. – Performing slow hopping, the transmitter uses the frequency f2 for transmitting the first three bits during the dwell time td. Then, the transmitter hops to the next frequency f3. – Slow hopping systems are typically cheaper and have relaxed tolerances. It is an option for GSM – Fast hopping – For fast hopping systems, the transmitter changes the frequency several times during the transmission of a single bit. – In the example, the transmitter hops three times during a bit period. – Fast hopping systems are more complex to implement because the transmitter and receiver have to stay synchronized within same points of time. Example – FHSS system is used in Bluetooth
  • 18. – Bluetooth performs 1,600 hops per second and uses 79 hop carriers equally spaced with 1 MHz in the 2.4 GHz ISM band Transmitter Receiver Applications of FHSP or spread spectrum (2 marks) – Military use – Bluetooth – Walkie-Talkies – Other radios • Ex YouTube Video: https://www.youtube.com/watch?v=CkhA7s5GIGc Direct sequence spread spectrum (8 Marks) • In Direct sequence spread spectrum (DSSS), a user bit stream XOR with a sequence pattern or spreading factor. It is called chipping sequence • While each user bit has a duration tb, the chipping sequence consists of smaller pulses, called chips, with a duration tc. • If the chipping sequence is generated properly that is called pseudo-noise sequence. • The spreading factor s = tb/tc determines the bandwidth of the resulting signal. • If the original signal needs a bandwidth w, the resulting signal needs s·w after spreading
  • 19. • Civil applications use spreading factors between 10 and 100, military applications use factors of up to 10,000. • Wireless LANs standard IEEE 802.11 the sequence 10110111000 that is called Barker code. • The DSSS Barker codes exhibit a good robustness against interference and insensitivity to multi-path propagation. • Other known Barker codes are 11, 110, 1110, 11101, 1110010, and 1111100110101 DSSS transmitter Digital modulation (2 Marks) • The spreading of the user data with the chipping sequence. Radio modulation (2 Marks) • The spread signal is then modulated with a radio carrier • The receiver has to know the original chipping sequence generated from the transmitter. • The receiver only has to perform the inverse functions of the two transmitter modulation steps.
  • 20. • However, noise and multi-path propagation require additional mechanisms to reconstruct the original data. • The first step in the receiver involves demodulating the received signal. This is achieved using the same carrier as the transmitter reversing the modulation. • Additional filtering can be applied to generate this signal. DSSS receiver • During a bit period, which also has to be derived via synchronization, an integrator adds all these products. Calculating the products of chips and signal, and adding the products in an integrator are also called correlation, the device a correlator. • Finally, in each bit period a decision unit samples the sums generated by the integrator and decides if this sum represents a binary 1 or a 0 Example • User data 01 • Applying the 11-chip Barker code 10110111000 • The results in the spread „signal‟ 1011011100001001000111. • On the receiver side, this „signal‟ is XORed bit-wise after demodulation with the same Barker code as chipping sequence. • This results in the sum of products equal to – 0 for the first bit – 11 for the second bit. • The decision unit map the first sum (=0) to a binary 0, the second sum (=11) to a binary 1. This constitutes the original user data What happens in case of multi-path propagation? (2 marks) • Several paths with different delays exist between a transmitter and a receiver. Additionally, the different paths may have different path losses. • In this case, rake receivers are used to provide a possible solution. It take advantage of the multi-path propagation by combining the different paths. • A rake receiver uses n correlators for the n strongest paths. Each correlator is synchronized to the transmitter plus the delay on that specific path. • As soon as the receiver detects a new path which is stronger than the currently weakest path, it assigns this new path to the correlator with the weakest path. – The output of the correlators are then combined and fed into the decision unit. Comparison between FHSS and DSSS (2 marks) FHSS DSSS Multiple frequencies are used Single frequency is used Frequency reuse is allowed Frequency reuse is not allowed
  • 21. Sender need not wait Sender has to wait if the spectrum is busy Power strength of the signal is high Power strength of the signal is low It is never affected by interference It can be affected by interference It is cheaper It is expensive 1.12 MAC protocol (2 Marks) • It enforces the discipline in the access of shared medium when multiple user content to access that channel. • The objectives of MAC protocol are maximization of the utilization of the channel and minimization of the average latency of the transmission. • MAC (Medium access control) protocol is sub layer of data link layer, it directly invoke the physical layer. Properties of MAC protocol (2 Marks) • It helps maximize the utilization of channel • Channel allocation need to be fair • Support different types of traffic having different and average bitrate • It should be robust when equipment failure and change network condition • It enforce the discipline in the access of shared medium from multiple user • 802.11 is the standard for MAC protocol • –EX: 802.11 network card, router Functionalities of MAC protocol (4 Marks) • Roaming o •Provide uninterrupted service when user walk from one place to another within wireless station • Point Coordination function o •Provide guarantees on reduce access delay and minimum transmission bandwidth and other QoS • power conservation o •Provide power management o •Transceiver must be switched off whenever carrier sensing is not needed o •Two state : sleep and wake • Authentication o •recognizing a user‟s identity. It is the mechanism of associating an incoming request with a set of identifying credentials Wireless Networks • Infrastructure Based • Infrastructure less Infrastructure Based o Access points are connected to existing wired network o It interact with wireless node as well as existing wired node o It is bridge between other network and provide authentication mechanism
  • 22. Infrastructure less network • The network set up on the fly at any place. Nodes networked among themselves. Nodes communicate directly each other, or forward message through intermediate nodes. It is called scatternet. • Difficulty in Collision detection and other Problems • Piconet : Set up personal area network using blutooth technology 1.8 MAC Protocol Issues (8 Marks) Identify the specific reasons as to why the MAC protocols designed for infrastructure-based wireless networks may not work satisfactorily in infrastructure less environment. Because, collisions detect scheme is difficult to implement in a wireless environment since collisions are hard to be detected by the transmitting nodes. Hidden and Exposed terminal problems makes MAC protocols inefficient. • Hidden terminal problem • Exposed terminal problem Hidden terminal problem (2 Marks) • Transmission of A reaches B, but not C • Transmission of C reaches B, but not A
  • 23. • However, the radio signal of B reaches both A and C in the range of B • The effect is A can not detect C and C can not detect A • A starts sending to B, C does not receive this transmission, C also wants send to B and sense the medium. To C the medium appears to be free, Thus C starts sending to B that cause collision. • But now A cannot detect collision and continue with its transmission • A is hidden for C and vice versa • Exposed terminal problem (2 Marks) • The radio Transmission of A reaches B, and C • The radio Transmission of C reaches D, and A • A want to communicate B , A stars sending data to B • C wants to communicate with D, C sense the carrier and finds that A is talking to B • C has to wait till A finishes with B, However D is outside of A waiting is not necessary • In fact, A,B and C,D can communicate with each other in parallel with out any collision, but according to protocol that is not possible. • A and S are exposed terminals Solutions • Collision detection mechanism are good idea on wired LAN , but they cannot used in wireless LAN • Reason – CD mechanism requires the implementation of Full duplex technique for transmitting and receiving at the same time – In wireless LAN, we cannot assume that all the stations will be able to receive signal from each other(hidden terminal problem) – Collision Avoidance mechanism is a solution
  • 24. 1.9 Taxonomy of MAC protocols (2 Marks) • Fixed assignment schemes – Circuit switched method – Resources are assigned for entire duration of the call • Random assignment schemes – Connection less Packet switched technique – The node start to transmit as soon as they have a packet to send • Reservation based assignment schemes – Connection based Packet switched technique – A node make a explicit reservation of the channel for a call before transmitting – Suitable for varying traffic 1.9.1 Fixed assignment schemes (16 Marks) – Frequency division multiple access(FDMA) – Time division multiple access(TDMA) – Code division multiple access(CDMA) 1.9.1.1 Frequency division multiple access(FDMA) (8 Marks) – The available bandwidth (frequency) is divided in to many frequency band called channel(coaxial cable or microwave beam) – Full duplex communication is take place, each user is allocated a forward channel for communication from handset to base station and reverse channel(Backward) for communicating from BS to hand set – Each user is allocated two unique frequency channel, one for transmitting , other for receiving – When a call is underway, no other user would be allocated the same frequency band – Unused transmission time occurs when the user pauses between the transmission, it does not achieve the high channel utilization – It is used in satellite communication systems and telephone trunklines.(First Generation) The two frequencies: uplink and Downlink – Uplink From mobile station to base station or from ground control to satellite – Downlink From base station to mobile station or from satellite to ground control
  • 25. Advantages (2 Marks) • Reduces the bit rate information • It reduces the cost and lowers the inter symbol interference • An FDMA system can be easily implemented. • Since the transmission is continuous, less number of bits are required for synchronization and framing Disadvantages (2 Marks) • The maximum flow rate per channel is fixed and small • Guard bands lead to a waste of capacity. • Unused transmission time occurs when the user pauses between the transmission, it does not achieve the high channel utilization 1.9.1.2 Time division multiple access (8 Marks) • Multiple nodes are allotted different time slots to access the channel • Time line is divided into fixed time slot and these are allocated multiple users • All users use the same channel, but take turn in transmitting • Time slots are allocated in round robin manner • Each user assigned one time slot per frame, unused time slots goes ideal, leading low channel utilization • The fundamental unit of time is called a burst period and it lasts for approximately 0.577 ms. • Eight of these burst periods are grouped into what is known as a TDMA frame • A 25 MHz frequency range holds 124 single bandwidth of each kHz; each of these frequency channels contains 8 TDMA conversation channels Advantages of TDMA (2 Marks) – Permits flexible data rates. – No guard band required for the wideband system. Disadvantages (2 Marks) – Call time is needed in each slot to accommodate time to inaccuracies (due to clock instability). – Electronics operating at high bit rates increase energy consumption. – Complex signal processing is required to synchronize within short slots. 1.9.1.3 Code Division Multiple Access (CDMA) (8 Marks) • CDMA is a sort of multiplexing that facilitates multiple users to occupy a single transmission channel. It optimizes the use of available bandwidth. • Multiple users are allotted different code(sequence of 0 and 1) to access same channel • Special coding scheme is used that allows signal from multiple users to be multiplexed over the channel • Multiple users use the same frequency at the same time
  • 26. • CDMA employs analog-to-digital conversion (ADC) in combination with spread spectrum technology • It used m-bit pseudo noise (PN) code sequence to generate different code. • Using m-bits, 2 m -1 different codes can be obtained. From this code , each user will use one code • CDMA used in second-generation (2G) and third-generation (3G) wireless communications • The technology is commonly used in ultra-high-frequency (UHF) cellular telephone systems, bands ranging between the 800-MHz and 1.9-GHz. CDMA code generation • A code for a user is orthogonal that refers the vector inner product is zero • Two vector: p=(2,5,0), q=(0,0,17) • Inner product p*q=(2*0 + 5*0 + 0*17) =0 • Bipolar notation: 0 represented as -1, 1 represented as +1 • Sender – Unique random number key – XOR the signal with random number key • Receiver – Knows the random number key – Demodulate the signal to get data • Sender – X_data = 1, X_key = 010011 – Bipolar representation of X_key = -1,+1,-1,-1,+1,+1 – Calculated signal at sender Xs= X_data * X_key – +1* X_key = +1 * (-1,+1,-1,-1,+1,+1)= (-1,+1,-1,-1,+1,+1) – Y_data = 0, Y_key = 110101 – Bipolar representation of X_key = +1,+1,-1,-1,+1 ,-1,+1 – Calculated signal at sender Ys= Y_data * Y_key – -1* Y_key = -1 * (+1,+1,-1,-1,+1 ,-1,+1)= (- 1,-1,+1,+1,-1 ,+1,-1) • Receiver – Xs+Ys= (-1,+1,-1,-1,+1,+1) + (- 1,-1,+1,+1,-1 ,+1,-1) – (-2, 0, 0, -2, +2, 0) • Z wants to get information of sender X and sender Y • Z * X_key = (-2, 0, 0, -2, +2, 0) * (-1,+1,-1,-1,+1,+1) = (2 +0+0+2+2+0)=6 > 0 (positive) X_data = 1 • Z * Y_key = (-2, 0, 0, -2, +2, 0) * (+1,+1,-1,-1,+1 ,-1,+1) = (-2 +0+0-2-2+0)=-6 < 0 (negative) Y_data = 0
  • 27. Advantages (2 Marks) • CDMA provide a power control • Flexible transfer may be used. • Reduces interference. Disadvantages (2 Marks) • The code length must be carefully selected. A large code length can induce delay or may cause interference. • Time synchronization is required. Space Division Multiple Access (SDMA) (4 Marks) • It is used for allocating a separated space to users in wireless networks. • Application – Application involves assigning an optimal base station to a mobile phone user. The mobile phone receives several base stations with different quality. A MAC algorithm decide which base station is best, taking into account which frequencies (FDM), time slots (TDM) or code (CDM) are still available. – SDMA is always in combination with .one or more other schemes – The SDMA algorithm is formed by cells and antennas which constitute the infrastructure implementing space division multiplexing (SDM). – A new application of SDMA comes up with beam-forming antenna arrays. Single users are separated in space by individual beams. – This improves the overall capacity of a cell – e.g., measured in bit/s/m2 or voice calls/m2. 1.9.2 Random assignment schemes (16 Marks) • Pure ALOHA • Slotted ALOHA • CSMA • CSMA/CD • CSMA/CA Pure ALOHA • Developed at university of Hawai • If a node has data to send , it begins to transmit • It does not check whether the channel is busy before transmitting • If the frame successfully reaches the destination , it send next frame • If the frame fails at destination , it is resent after a random amount of time to reduce the probability of re-collision • Suitable for small network, not suitable for large network. It leads collision.
  • 28. Slotted ALOHA • The time divided into equal size slots in which a packet can be sent, the size of the packet is restricted • A node wants to send a packet, start transmission at beginning of the slot • The slotted ALOHA employs beacon signal that are sent at precise interval that mark the beginning of the slot at which point the nodes can start to transmit • Transmission time is broken into slots equivalent to the transmission time of a single packet. Stations are only allowed to transmit at slot boundaries • Does not work well in large network Problem of Slotted ALOHA (2 Marks) – The random retransmission of the packet will have an effect on the delay associated with successful packet delivery. – If the limit is too short, the probability of re-collision is high. – If the limit is too long the probability of re-collision less but there is unnecessary delay in the retransmission. CSMA (Carrier sense Multiple Access) • A node senses the medium before transmit, It the medium is busy, wait before transmitting – CSMA/CD – CSMA/CA – CSMA/CD does not work well in wireless network, it difficult for a transmitting node to detect collision since received signal from other node would be too feeble – Only destination node notice the corrupted frame after it computes checksum. This leads to retransmission and wastage of channel utilization – In contrast, in wired network when node detects a collision , it immediately stop transmission, thereby minimize the channel wastage Do you agree with the following statement: “In CSMA/CD protocol, when two nodes transmit on a shared medium, a collision can occur only when two nodes start transmitting exactly at the same time instant”, Explain your answer. • Yes. A collision may occur only when two nodes start transmitting exactly at the same time instant because a node senses the medium before transmit, It the medium is free, it sends data immediately Why are collision detection based MAC protocols not suitable for wireless networks? (2 Marks)  CD mechanism requires the implementation of Full duplex technique for transmitting and receiving at the same time  In wireless LAN, we cannot assume that all the stations will be able to receive signal from each other(hidden terminal problem)
  • 29.  Collision Avoidance mechanism is a solution CSMA/CA (8 Marks) • Idea is prevent collision • When node is transmitting on the channel, other nodes might be waiting to transmit until channel become free • When transmitting node complete its transmission , the waiting nodes start transmitting at a same time, • To overcome collision, all the nodes are forced to wait for a random time and then sense the medium again • The chances of two nodes starting to transmit at the same time is greatly reduced • Non persistent • 1-persistent • P-Persistent • Non persistent • Channel transmit frame if it is ideal, otherwise it wait a random time and again sense line 1-persistent • When the station detects an idle-channel, it immediately transmits the frame with probability 1 P-Persistent • If time slot <= propagation time slot, send data if channel is ideal • With the probability q=l-p, the station then waits for the beginning of the next time slot
  • 30. 1.9.3 Reservation based scheme (8 Marks) • It is the RTS/CTS scheme • A sender transmits an RTS(Request to send) packet to receiver before transmission • The receiver sends a CTS (clear to send) packet, the data transmission commences only after that. • When the other node senses the CTS packet, they wait until the transmission is complete. • Reservation is achieved by sending RTS/CTS packets between sender and receiver, other nodes defer its transmission in specified period to avoid collision. • RTS/CTS based MAC protocol – MACA, MACAW, MACA-BI, PAMAS,DBTMA,MARCH,S-MAC – designed for wireless sensor networks • MACA – Multiple access collision avoidance – MACA solves the hidden/exposed terminal problem – A node requests to use the medium by sending RTS to receiver. Since radio signals propagate Omni directional , every node within the senders range will hear RTS and then refrain from transmitting – The receiver is ready to receive data, it sends CTS Solution for Hidden terminal problem (2 Marks) • RTS contain sender‟s name and receiver‟s name as well as length of the future transmission • CTS contain sender‟s name and receiver‟s name as well as length of the planned transmission • CTS hear by C also, the medium is reserved by A with specified time, C refrains from transmitting for time indicated in CTS • The collision cannot occur at B during data transmission • Issues
  • 31. • Collision can occur during the sending of RTS. A and C could send RTS at the same time. But an RTS occurs over a very small time compared to data transmission. The probability of collision occur less Solution for exposed terminal problem (2 Marks) Issues • Collision can occur during the sending of RTS. A and C could send RTS at the same time. But an RTS occurs over a compared to data transmission. Thevery small time probability of collision occur less Application oriented questions 1 Consider a user data 101. What is the spreading signal when applying the 11-chip Barker code 11110111001?