SlideShare a Scribd company logo
1 of 88
Download to read offline
CS8601 MOBILE COMPUTING
UNIT – I
Dr.A.Kathirvel, Professor and Head, Dept of CSE
Misrimal Navajee Munoth Jain Engineering College, Chennai
Unit - I
INTRODUCTION
Introduction to Mobile Computing – Applications of
Mobile Computing- Generations of Mobile
Communication Technologies- Multiplexing –
Spread spectrum -MAC Protocols – SDMA- TDMA-
FDMA- CDMA
TEXT BOOKS:
1.Jochen Schiller, Mobile Communications, PHI,
Second Edition, 2003.
2
Basic Concepts
❑ Mobile Handsets, Wireless Communications, and server applications
❑ Cell Phone System
❑ Types of Telecommunication Networks
❑ Computer Networks
❑Controller Area Networks (CANs)
❑Network is used to connect the different components of an
embedded controller. Eg, Automobiles industry
❑LANs - private owned, building or campus operate at 1 Gbps
❑Internetworks – several LANs connected
❑ LAN Architecture – topologies (ring, mesh..)
3
Basic Concepts
❑ Components of a wireless communication system
❑Transmitter, receiver, filter, antenna, amplifier, mixers
❑ Wireless Networking Standards (Table1.1)
❑ITU, IEEE and ISO
❑IEEE 802.11 standards (a,bc,d,e,f…u)
❑ WLANArchitecture
❑Components ( Access point, bridge, and LANcard)
❑Applications
❑Campus WLANs
❑Streamlining inventory management
❑Providing LAN
❑WLAN connectivity to geographically dispersed computers
❑Advantages of wireless LAN over wired LAN
❑Mobility
❑Simplicity and speedy deployment
4
Wireless Networking Standards
5
What Is Mobile Computing?
• What is computing?
Operation of computers (oxfords advance learner’s dictionary)
• What is the mobile?
That someone /something can move or be moved easily and quickly from place
to place
• What is mobile computing?
Users with portable computers still have network connections while they move
• A simple definition could be:
Mobile Computing is using a computer (of one kind or another) while on the
move
• Another definition could be:
Mobile Computing is when a (work) process is moved from a normal fixed
position to a more dynamic position.
• A third definition could be:
Mobile Computing is when a work process is carried out somewhere where it
was not previously possible.
6
Comparison to Wired Networks
• Wired Networks
- high bandwidth
- low bandwidth variability
- can listen on wire
- high power machines
- high resource machines
- need physical
access(security)
- low delay
- connected operation
• Mobile Networks
- low bandwidth
- high bandwidth variability
- hidden terminal problem
- low power machines
- low resource machines
- need proximity
- higher delay
- disconnected operation
7
Why Go Mobile?
• Enable anywhere/anytime connectivity
• Bring computer communications to areas
without pre-existing infrastructure
• Enable mobility
• Enable new applications
• An exciting new research area
8
Mobile Computing
Vs
Wireless
Networking
9
Evolution of Wireless LAN
• In late 1980s, vendors started offering wireless
products, which were to substitute the
traditional wired LAN (Local Area Network)
products.
• The idea was to use a wireless local area
network to avoid the cost of installing LAN
cabling and ease the task of relocation or
otherwise modifying the network's structure.
10
Evolution of Wireless LAN
• The question of
different wireless
critical.
interoperability
LAN products
between
became
• IEEE standard
responsibility to
WLAN.
committee
form the
took the
standard for
• As a result IEEE 802.11 series of standards
emerged.
11
Evolution of Wireless LAN
• WLAN uses the unlicensed Industrial, Scientific,
and Medical (ISM) band that different products
can use as long as they comply with certain
regulatory rules
• WLAN is also known as Wireless Fidelity or
WiFi in short
• There are many products which use these
unlicensed bands along with WLAN.
12
Evolution of Wireless LAN
• Examples could be cordless telephone, microwave oven
etc.
• There are 3 bands within the ISM bands.
– These are 900-MHz ISM band, which ranges from 902
to 928 MHz;
– 2.4-GHz ISM band, which ranges from 2.4 to 2.4853
GHz; and
– the 5.4 GHz band, which range from 5.275 to 5.85
GHz.
• WLAN uses 2.4 GHz and 5.4 GHz bands.
• WLAN works both in infrastructure mode and ad hoc
mode
13
Evolution of Wireless PAN
• Techniques for WPANs are infrared and radio
waves.
• Most of the computers
communication
support
which
standards have
Laptop
through
been
infrared, for
formulated by IrDA
(Infrared Data Association-www.irda.org).
•Through WPAN, a PC can communicate with
another IrDA device like another PC or a
Personal Digital Assistant (PDA) or a Cellular
phone.
14
Evolution of Wireless PAN Cont.
• The other best known PAN technology
standard is Bluetooth.
• Bluetooth uses radio instead of infrared.
• It offers a peak over the air speed of about 1
Mbps over a short range of about 10 meters.
• The advantage of radio wave is
that unlike infrared it does not need a line
of sight.
• WPAN works in ad hoc mode only
15
New Forms of Computing
Wireless Computing
Nomadic Computing
Mobile Computing
Ubiquitous Computing
Pervasive Computing
Invisible Computing
Computing
16
MOBILE COMPUTING
• Mobile computing can be defined as a computing
environment over physical mobility.
• The user of a mobile computing environment will be
able to access data, information or other logical objects
from any device in any network while on the move.
• Mobile computing system allows a user to perform a
task from anywhere using a computing device in the
public (the Web), corporate (business information) and
personal information spaces (medical record, address
book).
17
MOBILE COMPUTING Cont.
• Mobile computing is used in different contexts
with different names. The most common
names are:
– Mobile Computing:
• The computing environment is mobile and moves along
with the user.
• This is similar to the telephone number of a GSM
(Global System for Mobile communication) phone,
which moves with the phone.
• The offline (local) and real-time (remote) computing
environment will move with the user.
• In real-time mode user will be able to use all his remote
data and services online.
18
MOBILE COMPUTING Cont.
generic definition of ubiquity, where
– Anywhere, Anytime Information: This is the
the
information is available anywhere, all the time.
–Virtual Home Environment: (VHE) is defined
as an environment in a foreign network such
that the mobile users can experience the same
computing experience as they have in their
home or corporate computing environment.
• For example, one would like to put ones room heater
on when one is about 15 minutes away from home.
19
MOBILE COMPUTING Cont.
– Nomadic Computing: The computing
environment is nomadic and moves along with the
mobile user.
• This is true for both local and remote services.
– Pervasive Computing: A computing environment,
which is pervasive in nature and can be made
available in any environment.
– Ubiquitous Computing: A disappearing (nobody
will notice its presence) everyplace computing
environment. User will be able to use both local
and remote services.
20
MOBILE COMPUTING Cont.
– Global Service Portability: Making a
service portable and available in every
environment. Any service of any
environment will be available globally.
– Wearable Computers: Wearable
computers are those computers that
may be adorned by humans like a hat,
shoe or clothes (these are wearable
accessories).
21
Mobile Computing Functions
• We can define a computing environment as mobile if it
supports one or more of the following characteristics:
• User Mobility:
– User should be able to move from one physical location to
another location and use the same service.
– The service could be in the home network or a remote
network.
– Example could be a user moves from London to New York
and uses Internet to access the corporate application the
same way the user uses in the home office.
22
Mobile Computing Functions Cont.
• Network Mobility:
– User should be able to move from one network to
another network and use the same service.
– Example could be a user moves from Hong Kong to
New Delhi and uses the same GSM phone to access
the corporate application through WAP (Wireless
Application Protocol). In home network he uses this
service over GPRS (General Packet Radio Service)
whereas in Delhi he accesses it over the GSM
network.
23
Mobile Computing Functions Cont.
• Bearer Mobility:
– User should be able to move from one bearer to
another and use the same service.
– Example could be a user was using a service
through WAP bearer in his home network in
Bangalore. He moves to Coimbatore, where WAP
is not supported, he switch over to voice or
SMS(Short Message Service) bearer to access the
same application.
24
Mobile Computing Functions Cont.
• Device Mobility:
–User should be able to move from one
device to another and use the same service.
–Example could be sales representatives
using their desktop computer in home
office. During the day while they are on the
street they would like to use their Palmtop
to access the application.
25
Mobile Computing Functions Cont.
• Session Mobility:
– A user session should be able to move from one
user-agent environment to another.
– Example could be a user was using his service
through a CDMA (Code Division Multiple Access)
IX network. The user entered into the basement to
park the car and got disconnected from his CDMA
network. User goes to home office and starts using
the desktop. The unfinished session in the CDMA
device moves from the mobile device to the desktop
computer.
26
Mobile Computing Functions Cont.
• Service Mobility:
– User should be able to move from one service to
another.
– Example could be a user is writing a mail. To
complete the mail user needs to refer to some
other information. In a desktop PC, user simply
opens another service (browser) and moves
between them using the task bar. User should be
able to switch amongst services in small footprint
wireless devices like in the desktop.
27
Mobile Computing Functions Cont.
• Host Mobility:
–The user device can be either a client or
server.
–When it is a server or host, some of the
complexities change.
–In case of host mobility the mobility of IP
needs to be taken care of.
28
Types of Wireless Devices
• Laptops
• Palmtops
• PDAs
• Cell phones
• Pagers
• Sensors
29
Applications for mobile computing
• There are several applications for mobile computing
including wireless remote access by travelers and
commuters, point of sale, stock trading, medical
emergency care, law enforcement, package delivery,
education, insurance industry, disaster recovery and
management, trucking industry, intelligence and
military.
• Most of these applications can be classified into:
– wireless and mobile access to the Internet
– wireless and mobile access to private Intranets
– wireless and adhocly mobile access between mobile
computers.
30
Mobile Computing - Characteristics
– Mobile devices
• Laptops
• Palmtops
• Smart cell phones
– Requirements
• Data access:
– Anywhere
– Anytime
• Nomadic users
– Constraints
• Limited ressources
• Variable connectivty:
– Performance
– Reliability
31
Ethernet
Ethernet
Ethernet
E-Fax-Order
Management
DB-Access
Firm
Branchoffice
ClientX
GSM
xDSL
Application
Resource
Mobile Station
Communicationpath
DBDistributed
Database
Distributed
Database
Cache
Application Structure
Internet
Content Provider
Infrastructure
GSM
Radio/Infrared
Beam Radio,
ISDN
Main Office
Content Provider
ATM
Traffic Telematics Systems
DAB: Digital Audio Broadcast
RDS/TMC: Radio Data System/ Traffic
Message Channel
GSM (Global System for Mobile Communications): worldwide standard
for digital, cellular Mobile Radio Networks
UMTS (Universal Mobile Telecommunications System): European
Standard for future digital Mobile Radio Networks
AMPS (Advanced Mobile Phone System): analog Mobile Radio Networks
in USA
DECT (Digital Enhanced Cordless Telecommunications): European
standard for cordless phones
TETRA (Terrestrial Trunked Radio): European standard for circuit
switched radio networks
ERMES (European Radio Message System): European standard for radio
paging systems (Pager)
802.11: International standard for Wireless Local Networks Bluetooth:
wireless networking in close/local area
Inmarsat: geostationary satellite systems
Teledesic: planned satellite system on a non-geostationary orbit
Mobile Communication Networks: Examples
Mobile Communication: Development
2005200019951990
D(GSM900)C
Cordless Telephony
Mobile Phone Networks
Packet Networks
Circuit Switched Networks
Satellite Networks
LocalNetworks
Modacom
Mobitex
Tetra
Inmarsat
IR-LAN
MBS
IMT2000
/ UMTS
IEEE802.11/
Hiperlan
Radio-LAN
Iridium/
Globalsta
r
E(GSM1800)
EDG
E
HSCSD
GPRS
CT2 DECT
35
Used Acronyms
CT2: Cordless Telephone 2. Generation HSCSD: High
Speed Circuit Switched Data GPRS: General Packet
Radio Service
EDGE: Enhanced Data Rates for GSM Evolution
IMT2000: International Mobile Telecommunications by
the year 2000
MBS: Mobile Broadband System
36
f
c
k1 k2 k3 k4 k5 k6
Time multiplex
❑ A channel gets the whole spectrum for a certain amount of
time.
Advantages:
❑only one carrier in the
medium at any time
Disadvantages:
❑ precise
synchronization
required
t
37
Frequency multiplex
❑ Separation of the whole spectrum into smaller frequency bands.
❑ A channel gets a certain band of the spectrum for the whole
time.
Advantages:
❑looser coordination
❑works also for analog signals
Disadvantages:
❑wastage of bandwidth if the
traffic is
distributed unevenly
❑ inflexible
❑ guard spaces
k1 k2 k3 k4 k5 k6
f
t
c
38
f
Time and frequency multiplex
❑ Combination of both methods.
❑ A channel gets a certain frequency band for a certain amount
of time.
Example: GSM
Advantages:
❑ more flexibility
❑ But: precise coordination
required
t
c
k1 k2 k3 k4 k5 k6
39
Code multiplex
❑ Each channel has a unique code
❑ All channels use the same spectrum at the
same time
❑ Advantages:
❑bandwidth efficient
❑good protection against interference
and eavesdropping
❑ Disadvantage:
❑more complex signal regeneration
❑ Implemented using spread spectrum
technology
k1 k2 k3 k4 k5 k6
f
t
c
40
TDMA/TDD – example: DECT
1 2 3 11 12 1 2 3 11 12
t
downlink uplink
417 µs
DECT: Digital Enhanced Cordless Telecommunications
TDD: Time Division Duplex
41
FDMA/FDD–example: GSM
f
t
124
1
124
1
20 MHz
200 kHz
890.2 MHz
935.2 MHz
915 MHz
960 MHz
downlink
uplink
FDD: Frequency Division Duplex
42
SpreadSpectrum principle
c(t) c(t)
( f )
 j ( f )
 r ( f)
~( f )
 t ( f)
Synchronization
Pseudo-random
code
FilterDecoderCoder
s ( f )
f
 s ( f)
sS
Bs
s ( f ) power density spectrum of the original signal
 j ( f ) power density spectrum of the jammingsignal
Ss power density of the original signal
Bs bandwidth of the original signal
43
SpreadSpectrum principle
 j ( f )
c(t) c(t)
( f )
 r ( f)
~( f )
 t ( f)
Synchronization
Pseudo-random
code
FilterDecoderCoder
s ( f )
f
 t ( f)
t
tB
S =
Ss Bs
Bt
44
SpreadSpectrum principle
 j ( f )
c(t) c(t)
( f )
 r ( f)
~( f )
 t ( f)
Synchronization
Pseudo-random
code
FilterDecoderCoder
s ( f )
Sj
f
 j ( f )
Bj 45
SpreadSpectrum principle
 j ( f )
c(t) c(t)
( f )
 r ( f)
~( f )
 t ( f)
Synchronization
Pseudo-random
code
FilterDecoderCoder
s ( f )
St
Sj
f
 r ( f )
Bj
Bt
46
Processing gain: Increase in received
signal power thanks to spreading
SpreadSpectrum principle
 j ( f )
c(t) c(t)
( f )
 r ( f)
~( f )
 t ( f)
Synchronization
Pseudo-random
code
FilterDecoderCoder
s ( f )
sS
f

~
( f )
j
j
t
B
S
B
Bt
Bs
( )
Psignal Ss Bs Ss Bs
Bt Bs
Processi
ng gain
Bj
BPjamming
j s
Psignalt
Pjamming original
S j Bj
S
B
= = 
47
SpreadSpectrum principle
c(t) c(t)
( f )
 j ( f )
 r ( f)
~( f )
 t ( f)
Synchronization
Pseudo-random
code
FilterDecoderCoder
s ( f )
Ss
f
 ( f )
j
t
Bj
S
B
Bs
48
Frequency Hopping Spread Spectrum
(FHSS) (1/2)
❑ Signal broadcast over seemingly random series of frequencies
❑ Receiver hops between frequencies in sync with transmitter
❑ Eavesdroppers hear unintelligible blips
❑ Jamming on one frequency affects only a few bits
❑ Rate of hopping versus Symbol rate
❑ Fast Frequency Hopping: One bit transmitted in multiple
hops.
❑ Slow Frequency Hopping: Multiple bits are transmitted in a
hopping period
❑ Example: Bluetooth (79 channels, 1600 hops/s)
49
Frequency Hopping Spread Spectrum
tb
tc
Fast Frequency Hoppingt:b tctb : duration of one bit
tc : duration of one chip Chip: name of the sample period in spread-spectrum jargon
50
Direct Sequence Spread Spectrum(DSSS)
❑ XOR of the signal with pseudo-random number (chipping sequence)
❑ many chips per bit (e.g., 128) result in higher bandwidth of the signal
❑ Advantages
❑ reduces frequency selective fading
❑ in cellular networks
❑neighboring base stations can use
❑the same frequency range
❑neighboring base stations can
detect and recover the signal
❑enables soft handover
❑ Disadvantages
❑ precise power control necessary
❑ complexity of the receiver
user data
XOR
chipping
sequence
=
resulting
signal
0 1
0 1 1 0 1 0 1 0 1 1 0 1 0 1
0 1 1 0 1 0 1 1 0 0 1 0 1 0
tb
tc
tb: bit period
tc: chip period
51
Direct Sequence Spread Spectrum(DSSS)
X
user data
chipping
sequence
modulator
radio
carrier
spread
spectrum
signal
transmit
signal
transmitter
demodulator
received
signal
radio
carrier
X
chipping
sequence
lowpass
filtered
signal
receiver
integrator
products
decision
data
sampled
sums
correlator
52
Categories of spreading (chipping)
sequences
❑ Spreading Sequence Categories
– Pseudo-random Noise (PN) sequences
– Orthogonal codes
❑ For FHSS systems
– PN sequences most common
❑ For DSSS beside multiple access
– PN sequences most common
❑ For DSSS CDMA systems
– PN sequences
– Orthogonal codes
53
Orthogonal Codes
❑Orthogonal codes
❑All pairwise cross correlations are zero
❑Fixed- and variable-length codes used in CDMA
systems
❑For CDMA application, each mobile user uses
one sequence in the set as a spreading code
❑Provides zero cross correlation among all users
❑Types
❑Walsh codes
❑Variable-Length Orthogonal codes
54
WalshCodes
1 1
H =1 1 0
  H H
k
k−1H H 
H = 
k −1

 k−1 k −1
H1 = 
1 1

1 0
❑ Set of Walsh codes of length n consists of the n rows of an n
x n Hadamard matrix:
❑ Sylvester's construction:
❑ Every row is orthogonal to every other row and to the logical not of every
other row
❑ Requires tight synchronization
❑ Cross correlation between different shifts of Walsh sequences
is not zero
1 1 1 1 
1 0 1
1 0
0 0
0
H2 = 
01

1 1

 
55
Typical Multiple Spreading
Approach
❑Spread data rate by an orthogonal code
(channelization code)
❑Provides mutual orthogonality among all users in the
same cell
❑Further spread result by a PN sequence (scrambling
code)
❑Provides mutual randomness (low cross correlation)
between users in different cells
56
Wireless MAC Protocols - Issues
57
Hidden Terminal Problem
• A sends to B, C cannot receive A
• C wants to send to B, C senses a “free” medium (CS
fails)
• collision at B, A cannot receive
the collision (CD fails)
• A is “hidden” for C
BA C
58
Exposed Terminal Problem
• B sends to A, C wants to send to D
• C has to wait, CS signals a medium in use
• since A is outside the radio range of C waiting is not
necessary
• C is “exposed” to B
BA C D
59
Near and FarTerminals
• Terminals A and B send, Creceives
– the signal of terminal B hides A’ssignal
– C cannot receiveA
• This is also a severe problem for CDMAnetworks
• precise power control required
A B C
60
Classification of
wireless MAC protocols
Wireless MAC protocols
Fixed-assignment
schemes
Eg. FDMA, TDMA
& CDMA
Random-access
schemes
Eg. Aloha & CSMA
Reservation based
schemes
Eg. MACA
Circuit-switched
Connectionless
packet-switched
CO packet-switched
61
International Cocktail Party
• FDMA – Large room divided up into small
rooms. Each pair of people takes turns
speaking.
• TDMA – Large room divided up into small
rooms. Three pairs of people per room,
however, each pair gets 20 seconds to speak.
• CDMA – No small rooms. Everyone is
speaking in different languages. If voice
volume is minimized, the number of people is
maximized.
62
Fixed-assignment schemes
• TDMA – Time Division MultipleAccess
• FDMA – Frequency Division MultipleAccess
• CDMA – Code Division MultipleAccess
63
TDMA
• Each user transmits data on a time slot on
multiple frequencies
• A time slot is a channel
• A user sends data at an accelerated rate
(by using many frequencies) when its
time slot begins
• Data is stored at receiver and played back
at original slow rate
64
General Specification of TDMA
• Rx: 869-894MHz Tx: 824-849MHz
• 832 Channels spaced 30kHz apart (3
users/channel)
• DQPSK modulation scheme
• 48.6kbps bit rate
• Interim Standard (IS) – 54
• Digital AMPS (Advanced Mobile Phone
System)
• Uses Time Division Duplexing (TDD) usually
65
TDMA Operation
• Efficiency of TDMAframe:
- overhead bits per framebOH
Nr - number of reference bursts perframe
Nt - number of traffic bursts perframe
br - number of overhead bits per referenceburst
bp - number of overhead bits per preamble per slot
bg - number of equivalent bits in each guard time interval
Tf - frame duration
Rrf - bit rate of the radio-frequency channel
bOH = Nrbr − Ntbp − (Nt − Nr )bg
btotal = Tf  Rrf
OH
f
b
b
=
 
100% 1− 
 total 
66
Advantages of TDMA
• Flexible bit rate
• No frequency guard band required
• No need for precise narrowband filters
• Easy for mobile or base stations
to initiate and execute hands off
• Extended battery life
• TDMA installations offer savings in base
station equipment, space and maintenance
• Themost cost-effective technology for
upgrading a current analog system to digital
67
Disadvantages to using TDMA
• Requires network-wide timing
synchronization
• Requires signal processing for matched
filtering and correlation detection
• Demands high peak power on uplink in
transient mode
• Multipath distortion
68
FDMA
• Similar to broadcast radio and TV, assign a
different carrier frequency per call
• Modulation technique determines the
required carrier spacing
• Each communicating wireless user gets
his/her own carrier frequency on which to
send data
• Need to set aside some frequencies that
are operated in random-access mode to
enable a wireless user to request and
receive a carrier for data transmission
69
General Specification of FDMA
• Rx: 869-894MHz Tx: 824-849MHz
• 832 Channels spaced 30kHz apart (3
users/channel)
• DQPSK modulation scheme
• 48.6kbps bit rate
• Used in analog cellular phone systems (AMPS)
• Uses Frequency Division Duplexing (FDD)
• ISI (Intersymbol Interference) is low
70
FDMA Operation
• Number of FDMAChannels −2 guard
c
f - total spectrum
- guard band
N =
 f
guard
c - channel bandwidth
•In the U.S. each cellular carrier is allocated
416 channels where: 
f
=12.5MHz
guard =10kHz
c = 30kHz
N =
12.5MHz − 2 10kHz
= 416
30kHz
71
Advantages of FDMA
• If channel is not in use, it sits idle
• Channel bandwidth is relatively narrow (30kHz)
• Simple algorithmically, and from a hardware
standpoint
• Fairly efficient when the number of stations is small
and the traffic is uniformly constant
• Capacity increase can be obtained by
reducing the information bit rate and using efficient
digital code
• No need for network timing
• No restriction regarding the type of baseband or type
of modulation
76
Disadvantages to using FDMA
• The presence of guard bands
• Requires right RF filtering to minimize
adjacent channel interference
• Maximum bit rate per channel is fixed
• Small inhibitingflexibilityin bit rate
capability
• Does not differ significantly from analog
system
73
Frequency vs Time
Frequency
Time
CarrierFDMA
Time
Frequenc
y
TDMA
Time
Frequency
Hybrid FDMA/TDMA
Basic principle of communication: Two regions in the time-
frequency plane with equal areas can carry the same amount of
information
74
General Specification of CDMA
• Rx: 869-894MHz Tx: 824-849MHz
• 20 Channels spaced 1250kHz apart (798
users/channel)
• QPSK/(Offset) OQPSK modulation scheme
• 1.2288Mbps bit rate
• IS-95 standard
• Operates at both 800 and 1900 MHz
frequency bands
75
CDMA Operation
• Spread Spectrum Multiple Access Technologies
76
Advantages of CDMA
• Many users of CDMA use the same frequency,
TDD or FDD may be used
• Multipath fading may be substantially reduced
because of large signal bandwidth
• No absolute limit on the number of users
• Easy addition of more users
• Impossible for hackers to decipher the code sent
• Better signal quality
• No sense of handoff when changing cells
77
Disadvantages to using CDMA
• As the number of users increases, the
overall quality of service decreases
• Self-jamming
• Near- Far- problem arises
78
CDMA(CodeDivision Multiple Access)
❑Principles
❑ all terminals send on the same frequency and can use the whole bandwidth of
the transmission channel
❑ each sender has a unique code
❑ The sender XORs the signal with this code
❑ the receiver can “tune” into this signal if it knows the code of the sender
❑ tuning is done via a correlation function
❑Disadvantages:
❑ higher complexity of the receiver (receiver cannot just listen into the medium
and start receiving if there is a signal)
❑ all signals should have approximately the same strength at the receiver
❑Advantages:
❑ all terminals can use the same frequency, no planning needed
❑ huge code space (e.g., 232) compared to frequency space
❑ more robust to eavesdropping and jamming (military applications…)
❑ forward error correction and encryption can be easily integrated
79
CDMA:principle (verysimplified)
Ak
X AsAd
Bk
X BsBd
As +Bs
Ak
Bk
X
C+D
X
C+D
Ad
Bd
C+D: Correlation and Decision
Spreading Despreading
80
CDMA:example
❑ SenderA
❑ sendsAd=1, keyAk=010011 (assign:„0“= -1, „1“= +1)
❑ sending signalAs=Ad* Ak=(-1, +1,-1, -1, +1,+1)
❑ SenderB
❑ sendsBd=0, keyBk=110101 (assign:„0“= -1, „1“= +1)
❑ sending signal Bs=Bd* Bk=(-1, -1, +1,-1, +1,-1)
❑ Both signalssuperimpose in space
❑ interference neglected(noise etc.)
❑ As+Bs=(-2, 0, 0, -2, +2,0)
❑ Receiverwants to receive signal from senderA
❑ apply keyAkbitwise (innerproduct)
❑Ae=(-2, 0, 0, -2, +2,0) Ak=2+0 +0+2 +2+0 =6
❑result greater than 0, therefore, original bitwas„1“
❑ receivingB
❑Be=(-2, 0, 0, -2, +2,0) Bk=-2 +0 +0- 2 - 2+0 =-6, i.e. „0“
81
Spreadingof signalA
dataAd
signalAs
1 0 1
0 1 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1
1 0 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0
key sequenceAk
Ad+Ak
Real systems use much longer keys resulting in a larger distance
between single code words in code space.
1
-1
82
Spreadingof signalB
signalAs
As +Bs
1 0 0
0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1
1 1 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1
data Bd
signal Bs
key sequence Bk
Bd+Bk
1
-1
1
-1
2
0
-2
83
Despreadingof signalA
Ak
(As + Bs)
*Ak
correlator
output
decision
output
As +Bs
1 0 1
0 1 0
dataAd
2
0
-2
1
0
-1
2
0
-2
Note: the received signal is inverted 84
Despreadingof signalB
correlator
output
decision
output
Bk
(As +Bs)
* Bk
As +Bs
1 0 0
0 1 1
data Bd
2
0
-2
1
0
-1
2
0
-2
Note: the received signal is inverted 85
125
Despreadingwith awrongkey
correlator
output
decision
output (1) (1) ?
wrong
key K
(As +Bs)
* K
As +Bs
2
0
-2
1
0
-1
2
0
-2
86
ComparisonSDMA/TDMA/FDMA/CDMA
Approach SDMA TDMA FDMA CDMA
Idea segment space into
cells/sectors
segment sending
time into disjoint time-
slots, demand driven
or fixed patterns
segment the frequency
band into disjoint sub-
bands
spread the spectrum using
orthogonal codes
Terminals only one terminal can be
active in one cell/one
sector
all terminals are
active for short
periods of time on the
same frequency
every terminal has its
own frequency,
uninterrupted
all terminals can be active at
the same place at the same
moment, uninterrupted
Signal
separation
cell structure, directed
antennas
synchronization in the
time domain
filtering in the
frequency domain
code plus special receivers
Advantages very simple, increases
capacity per km²
established, fully
digital, flexible
simple, established,
robust
flexible, less frequency
planning needed, soft
handover
Dis-
advantages
inflexible, antennas
typically fixed
guard space needed
(multipath
propagation),
synchronization
difficult
inflexible, frequencies
are a scarce resource
complex receivers, needs
more complicated power
control for senders
Comment used in all cellular
systems
standard in fixed
networks, together
with FDMA/SDMA
used in many mobile
networks
typically combined with
TDMA (frequency
hopping patterns) and
SDMA (frequency
reuse)
higher complexity
In practice, several access methods are used in combination
Example: SDMA/TDMA/FDMA for GSM 87
Questions ?

More Related Content

What's hot

Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationasadkhan1327
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7Ramesh Babu
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile CommunicationNoushad Hasan
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALASaikiran Panjala
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communicationMuhammad Uzair Rasheed
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 

What's hot (20)

Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
CELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMSCELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMS
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
Imt 2000
Imt 2000Imt 2000
Imt 2000
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 

Similar to CS8601 MOBILE COMPUTING

Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxkarthiksmart21
 
1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.ppt1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.pptShashankMishra393695
 
IT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I IntroductionIT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I Introductionpkaviya
 
Mobile Computing.pdf
Mobile Computing.pdfMobile Computing.pdf
Mobile Computing.pdfYASINMOLLAH2
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile ComputingMadhuri Badgujar
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and180192
 
M.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxM.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxMeymunaMohammed1
 
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxvibhore jain
 
Mobile computing
Mobile computingMobile computing
Mobile computingpooja s p
 
IT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit IIT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit Ipkaviya
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notesgouse_1210
 
Lecture-5 Transmission sprectrum WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
Lecture-5 Transmission sprectrum  WIRELESS NETWORK AND MOBILE TECHNOLOGY.pptLecture-5 Transmission sprectrum  WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
Lecture-5 Transmission sprectrum WIRELESS NETWORK AND MOBILE TECHNOLOGY.pptMujahidHasan4
 
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsAngel G Diaz
 

Similar to CS8601 MOBILE COMPUTING (20)

CS8601 Unit-1.pptx
CS8601 Unit-1.pptxCS8601 Unit-1.pptx
CS8601 Unit-1.pptx
 
unit-1 notes
unit-1 notesunit-1 notes
unit-1 notes
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
MOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptxMOBILE COMPUTING Unit 1.pptx
MOBILE COMPUTING Unit 1.pptx
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.ppt1.INTRO MOBILE AND WIRELESS COMMN.ppt
1.INTRO MOBILE AND WIRELESS COMMN.ppt
 
IT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I IntroductionIT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I Introduction
 
Mobile Computing.pdf
Mobile Computing.pdfMobile Computing.pdf
Mobile Computing.pdf
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and
 
M.Sc Mobile computing.pptx
M.Sc Mobile computing.pptxM.Sc Mobile computing.pptx
M.Sc Mobile computing.pptx
 
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptx
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
IT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit IIT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit I
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Lecture-5 Transmission sprectrum WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
Lecture-5 Transmission sprectrum  WIRELESS NETWORK AND MOBILE TECHNOLOGY.pptLecture-5 Transmission sprectrum  WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
Lecture-5 Transmission sprectrum WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
 
Unit 1
Unit 1Unit 1
Unit 1
 
5G 2
5G 25G 2
5G 2
 
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications
 
MIS
MISMIS
MIS
 

More from Kathirvel Ayyaswamy

22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTUREKathirvel Ayyaswamy
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2Kathirvel Ayyaswamy
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 

More from Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 

Recently uploaded

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

CS8601 MOBILE COMPUTING

  • 1. CS8601 MOBILE COMPUTING UNIT – I Dr.A.Kathirvel, Professor and Head, Dept of CSE Misrimal Navajee Munoth Jain Engineering College, Chennai
  • 2. Unit - I INTRODUCTION Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile Communication Technologies- Multiplexing – Spread spectrum -MAC Protocols – SDMA- TDMA- FDMA- CDMA TEXT BOOKS: 1.Jochen Schiller, Mobile Communications, PHI, Second Edition, 2003. 2
  • 3. Basic Concepts ❑ Mobile Handsets, Wireless Communications, and server applications ❑ Cell Phone System ❑ Types of Telecommunication Networks ❑ Computer Networks ❑Controller Area Networks (CANs) ❑Network is used to connect the different components of an embedded controller. Eg, Automobiles industry ❑LANs - private owned, building or campus operate at 1 Gbps ❑Internetworks – several LANs connected ❑ LAN Architecture – topologies (ring, mesh..) 3
  • 4. Basic Concepts ❑ Components of a wireless communication system ❑Transmitter, receiver, filter, antenna, amplifier, mixers ❑ Wireless Networking Standards (Table1.1) ❑ITU, IEEE and ISO ❑IEEE 802.11 standards (a,bc,d,e,f…u) ❑ WLANArchitecture ❑Components ( Access point, bridge, and LANcard) ❑Applications ❑Campus WLANs ❑Streamlining inventory management ❑Providing LAN ❑WLAN connectivity to geographically dispersed computers ❑Advantages of wireless LAN over wired LAN ❑Mobility ❑Simplicity and speedy deployment 4
  • 6. What Is Mobile Computing? • What is computing? Operation of computers (oxfords advance learner’s dictionary) • What is the mobile? That someone /something can move or be moved easily and quickly from place to place • What is mobile computing? Users with portable computers still have network connections while they move • A simple definition could be: Mobile Computing is using a computer (of one kind or another) while on the move • Another definition could be: Mobile Computing is when a (work) process is moved from a normal fixed position to a more dynamic position. • A third definition could be: Mobile Computing is when a work process is carried out somewhere where it was not previously possible. 6
  • 7. Comparison to Wired Networks • Wired Networks - high bandwidth - low bandwidth variability - can listen on wire - high power machines - high resource machines - need physical access(security) - low delay - connected operation • Mobile Networks - low bandwidth - high bandwidth variability - hidden terminal problem - low power machines - low resource machines - need proximity - higher delay - disconnected operation 7
  • 8. Why Go Mobile? • Enable anywhere/anytime connectivity • Bring computer communications to areas without pre-existing infrastructure • Enable mobility • Enable new applications • An exciting new research area 8
  • 10. Evolution of Wireless LAN • In late 1980s, vendors started offering wireless products, which were to substitute the traditional wired LAN (Local Area Network) products. • The idea was to use a wireless local area network to avoid the cost of installing LAN cabling and ease the task of relocation or otherwise modifying the network's structure. 10
  • 11. Evolution of Wireless LAN • The question of different wireless critical. interoperability LAN products between became • IEEE standard responsibility to WLAN. committee form the took the standard for • As a result IEEE 802.11 series of standards emerged. 11
  • 12. Evolution of Wireless LAN • WLAN uses the unlicensed Industrial, Scientific, and Medical (ISM) band that different products can use as long as they comply with certain regulatory rules • WLAN is also known as Wireless Fidelity or WiFi in short • There are many products which use these unlicensed bands along with WLAN. 12
  • 13. Evolution of Wireless LAN • Examples could be cordless telephone, microwave oven etc. • There are 3 bands within the ISM bands. – These are 900-MHz ISM band, which ranges from 902 to 928 MHz; – 2.4-GHz ISM band, which ranges from 2.4 to 2.4853 GHz; and – the 5.4 GHz band, which range from 5.275 to 5.85 GHz. • WLAN uses 2.4 GHz and 5.4 GHz bands. • WLAN works both in infrastructure mode and ad hoc mode 13
  • 14. Evolution of Wireless PAN • Techniques for WPANs are infrared and radio waves. • Most of the computers communication support which standards have Laptop through been infrared, for formulated by IrDA (Infrared Data Association-www.irda.org). •Through WPAN, a PC can communicate with another IrDA device like another PC or a Personal Digital Assistant (PDA) or a Cellular phone. 14
  • 15. Evolution of Wireless PAN Cont. • The other best known PAN technology standard is Bluetooth. • Bluetooth uses radio instead of infrared. • It offers a peak over the air speed of about 1 Mbps over a short range of about 10 meters. • The advantage of radio wave is that unlike infrared it does not need a line of sight. • WPAN works in ad hoc mode only 15
  • 16. New Forms of Computing Wireless Computing Nomadic Computing Mobile Computing Ubiquitous Computing Pervasive Computing Invisible Computing Computing 16
  • 17. MOBILE COMPUTING • Mobile computing can be defined as a computing environment over physical mobility. • The user of a mobile computing environment will be able to access data, information or other logical objects from any device in any network while on the move. • Mobile computing system allows a user to perform a task from anywhere using a computing device in the public (the Web), corporate (business information) and personal information spaces (medical record, address book). 17
  • 18. MOBILE COMPUTING Cont. • Mobile computing is used in different contexts with different names. The most common names are: – Mobile Computing: • The computing environment is mobile and moves along with the user. • This is similar to the telephone number of a GSM (Global System for Mobile communication) phone, which moves with the phone. • The offline (local) and real-time (remote) computing environment will move with the user. • In real-time mode user will be able to use all his remote data and services online. 18
  • 19. MOBILE COMPUTING Cont. generic definition of ubiquity, where – Anywhere, Anytime Information: This is the the information is available anywhere, all the time. –Virtual Home Environment: (VHE) is defined as an environment in a foreign network such that the mobile users can experience the same computing experience as they have in their home or corporate computing environment. • For example, one would like to put ones room heater on when one is about 15 minutes away from home. 19
  • 20. MOBILE COMPUTING Cont. – Nomadic Computing: The computing environment is nomadic and moves along with the mobile user. • This is true for both local and remote services. – Pervasive Computing: A computing environment, which is pervasive in nature and can be made available in any environment. – Ubiquitous Computing: A disappearing (nobody will notice its presence) everyplace computing environment. User will be able to use both local and remote services. 20
  • 21. MOBILE COMPUTING Cont. – Global Service Portability: Making a service portable and available in every environment. Any service of any environment will be available globally. – Wearable Computers: Wearable computers are those computers that may be adorned by humans like a hat, shoe or clothes (these are wearable accessories). 21
  • 22. Mobile Computing Functions • We can define a computing environment as mobile if it supports one or more of the following characteristics: • User Mobility: – User should be able to move from one physical location to another location and use the same service. – The service could be in the home network or a remote network. – Example could be a user moves from London to New York and uses Internet to access the corporate application the same way the user uses in the home office. 22
  • 23. Mobile Computing Functions Cont. • Network Mobility: – User should be able to move from one network to another network and use the same service. – Example could be a user moves from Hong Kong to New Delhi and uses the same GSM phone to access the corporate application through WAP (Wireless Application Protocol). In home network he uses this service over GPRS (General Packet Radio Service) whereas in Delhi he accesses it over the GSM network. 23
  • 24. Mobile Computing Functions Cont. • Bearer Mobility: – User should be able to move from one bearer to another and use the same service. – Example could be a user was using a service through WAP bearer in his home network in Bangalore. He moves to Coimbatore, where WAP is not supported, he switch over to voice or SMS(Short Message Service) bearer to access the same application. 24
  • 25. Mobile Computing Functions Cont. • Device Mobility: –User should be able to move from one device to another and use the same service. –Example could be sales representatives using their desktop computer in home office. During the day while they are on the street they would like to use their Palmtop to access the application. 25
  • 26. Mobile Computing Functions Cont. • Session Mobility: – A user session should be able to move from one user-agent environment to another. – Example could be a user was using his service through a CDMA (Code Division Multiple Access) IX network. The user entered into the basement to park the car and got disconnected from his CDMA network. User goes to home office and starts using the desktop. The unfinished session in the CDMA device moves from the mobile device to the desktop computer. 26
  • 27. Mobile Computing Functions Cont. • Service Mobility: – User should be able to move from one service to another. – Example could be a user is writing a mail. To complete the mail user needs to refer to some other information. In a desktop PC, user simply opens another service (browser) and moves between them using the task bar. User should be able to switch amongst services in small footprint wireless devices like in the desktop. 27
  • 28. Mobile Computing Functions Cont. • Host Mobility: –The user device can be either a client or server. –When it is a server or host, some of the complexities change. –In case of host mobility the mobility of IP needs to be taken care of. 28
  • 29. Types of Wireless Devices • Laptops • Palmtops • PDAs • Cell phones • Pagers • Sensors 29
  • 30. Applications for mobile computing • There are several applications for mobile computing including wireless remote access by travelers and commuters, point of sale, stock trading, medical emergency care, law enforcement, package delivery, education, insurance industry, disaster recovery and management, trucking industry, intelligence and military. • Most of these applications can be classified into: – wireless and mobile access to the Internet – wireless and mobile access to private Intranets – wireless and adhocly mobile access between mobile computers. 30
  • 31. Mobile Computing - Characteristics – Mobile devices • Laptops • Palmtops • Smart cell phones – Requirements • Data access: – Anywhere – Anytime • Nomadic users – Constraints • Limited ressources • Variable connectivty: – Performance – Reliability 31
  • 33. Internet Content Provider Infrastructure GSM Radio/Infrared Beam Radio, ISDN Main Office Content Provider ATM Traffic Telematics Systems DAB: Digital Audio Broadcast RDS/TMC: Radio Data System/ Traffic Message Channel
  • 34. GSM (Global System for Mobile Communications): worldwide standard for digital, cellular Mobile Radio Networks UMTS (Universal Mobile Telecommunications System): European Standard for future digital Mobile Radio Networks AMPS (Advanced Mobile Phone System): analog Mobile Radio Networks in USA DECT (Digital Enhanced Cordless Telecommunications): European standard for cordless phones TETRA (Terrestrial Trunked Radio): European standard for circuit switched radio networks ERMES (European Radio Message System): European standard for radio paging systems (Pager) 802.11: International standard for Wireless Local Networks Bluetooth: wireless networking in close/local area Inmarsat: geostationary satellite systems Teledesic: planned satellite system on a non-geostationary orbit Mobile Communication Networks: Examples
  • 35. Mobile Communication: Development 2005200019951990 D(GSM900)C Cordless Telephony Mobile Phone Networks Packet Networks Circuit Switched Networks Satellite Networks LocalNetworks Modacom Mobitex Tetra Inmarsat IR-LAN MBS IMT2000 / UMTS IEEE802.11/ Hiperlan Radio-LAN Iridium/ Globalsta r E(GSM1800) EDG E HSCSD GPRS CT2 DECT 35
  • 36. Used Acronyms CT2: Cordless Telephone 2. Generation HSCSD: High Speed Circuit Switched Data GPRS: General Packet Radio Service EDGE: Enhanced Data Rates for GSM Evolution IMT2000: International Mobile Telecommunications by the year 2000 MBS: Mobile Broadband System 36
  • 37. f c k1 k2 k3 k4 k5 k6 Time multiplex ❑ A channel gets the whole spectrum for a certain amount of time. Advantages: ❑only one carrier in the medium at any time Disadvantages: ❑ precise synchronization required t 37
  • 38. Frequency multiplex ❑ Separation of the whole spectrum into smaller frequency bands. ❑ A channel gets a certain band of the spectrum for the whole time. Advantages: ❑looser coordination ❑works also for analog signals Disadvantages: ❑wastage of bandwidth if the traffic is distributed unevenly ❑ inflexible ❑ guard spaces k1 k2 k3 k4 k5 k6 f t c 38
  • 39. f Time and frequency multiplex ❑ Combination of both methods. ❑ A channel gets a certain frequency band for a certain amount of time. Example: GSM Advantages: ❑ more flexibility ❑ But: precise coordination required t c k1 k2 k3 k4 k5 k6 39
  • 40. Code multiplex ❑ Each channel has a unique code ❑ All channels use the same spectrum at the same time ❑ Advantages: ❑bandwidth efficient ❑good protection against interference and eavesdropping ❑ Disadvantage: ❑more complex signal regeneration ❑ Implemented using spread spectrum technology k1 k2 k3 k4 k5 k6 f t c 40
  • 41. TDMA/TDD – example: DECT 1 2 3 11 12 1 2 3 11 12 t downlink uplink 417 µs DECT: Digital Enhanced Cordless Telecommunications TDD: Time Division Duplex 41
  • 42. FDMA/FDD–example: GSM f t 124 1 124 1 20 MHz 200 kHz 890.2 MHz 935.2 MHz 915 MHz 960 MHz downlink uplink FDD: Frequency Division Duplex 42
  • 43. SpreadSpectrum principle c(t) c(t) ( f )  j ( f )  r ( f) ~( f )  t ( f) Synchronization Pseudo-random code FilterDecoderCoder s ( f ) f  s ( f) sS Bs s ( f ) power density spectrum of the original signal  j ( f ) power density spectrum of the jammingsignal Ss power density of the original signal Bs bandwidth of the original signal 43
  • 44. SpreadSpectrum principle  j ( f ) c(t) c(t) ( f )  r ( f) ~( f )  t ( f) Synchronization Pseudo-random code FilterDecoderCoder s ( f ) f  t ( f) t tB S = Ss Bs Bt 44
  • 45. SpreadSpectrum principle  j ( f ) c(t) c(t) ( f )  r ( f) ~( f )  t ( f) Synchronization Pseudo-random code FilterDecoderCoder s ( f ) Sj f  j ( f ) Bj 45
  • 46. SpreadSpectrum principle  j ( f ) c(t) c(t) ( f )  r ( f) ~( f )  t ( f) Synchronization Pseudo-random code FilterDecoderCoder s ( f ) St Sj f  r ( f ) Bj Bt 46
  • 47. Processing gain: Increase in received signal power thanks to spreading SpreadSpectrum principle  j ( f ) c(t) c(t) ( f )  r ( f) ~( f )  t ( f) Synchronization Pseudo-random code FilterDecoderCoder s ( f ) sS f  ~ ( f ) j j t B S B Bt Bs ( ) Psignal Ss Bs Ss Bs Bt Bs Processi ng gain Bj BPjamming j s Psignalt Pjamming original S j Bj S B = =  47
  • 48. SpreadSpectrum principle c(t) c(t) ( f )  j ( f )  r ( f) ~( f )  t ( f) Synchronization Pseudo-random code FilterDecoderCoder s ( f ) Ss f  ( f ) j t Bj S B Bs 48
  • 49. Frequency Hopping Spread Spectrum (FHSS) (1/2) ❑ Signal broadcast over seemingly random series of frequencies ❑ Receiver hops between frequencies in sync with transmitter ❑ Eavesdroppers hear unintelligible blips ❑ Jamming on one frequency affects only a few bits ❑ Rate of hopping versus Symbol rate ❑ Fast Frequency Hopping: One bit transmitted in multiple hops. ❑ Slow Frequency Hopping: Multiple bits are transmitted in a hopping period ❑ Example: Bluetooth (79 channels, 1600 hops/s) 49
  • 50. Frequency Hopping Spread Spectrum tb tc Fast Frequency Hoppingt:b tctb : duration of one bit tc : duration of one chip Chip: name of the sample period in spread-spectrum jargon 50
  • 51. Direct Sequence Spread Spectrum(DSSS) ❑ XOR of the signal with pseudo-random number (chipping sequence) ❑ many chips per bit (e.g., 128) result in higher bandwidth of the signal ❑ Advantages ❑ reduces frequency selective fading ❑ in cellular networks ❑neighboring base stations can use ❑the same frequency range ❑neighboring base stations can detect and recover the signal ❑enables soft handover ❑ Disadvantages ❑ precise power control necessary ❑ complexity of the receiver user data XOR chipping sequence = resulting signal 0 1 0 1 1 0 1 0 1 0 1 1 0 1 0 1 0 1 1 0 1 0 1 1 0 0 1 0 1 0 tb tc tb: bit period tc: chip period 51
  • 52. Direct Sequence Spread Spectrum(DSSS) X user data chipping sequence modulator radio carrier spread spectrum signal transmit signal transmitter demodulator received signal radio carrier X chipping sequence lowpass filtered signal receiver integrator products decision data sampled sums correlator 52
  • 53. Categories of spreading (chipping) sequences ❑ Spreading Sequence Categories – Pseudo-random Noise (PN) sequences – Orthogonal codes ❑ For FHSS systems – PN sequences most common ❑ For DSSS beside multiple access – PN sequences most common ❑ For DSSS CDMA systems – PN sequences – Orthogonal codes 53
  • 54. Orthogonal Codes ❑Orthogonal codes ❑All pairwise cross correlations are zero ❑Fixed- and variable-length codes used in CDMA systems ❑For CDMA application, each mobile user uses one sequence in the set as a spreading code ❑Provides zero cross correlation among all users ❑Types ❑Walsh codes ❑Variable-Length Orthogonal codes 54
  • 55. WalshCodes 1 1 H =1 1 0   H H k k−1H H  H =  k −1   k−1 k −1 H1 =  1 1  1 0 ❑ Set of Walsh codes of length n consists of the n rows of an n x n Hadamard matrix: ❑ Sylvester's construction: ❑ Every row is orthogonal to every other row and to the logical not of every other row ❑ Requires tight synchronization ❑ Cross correlation between different shifts of Walsh sequences is not zero 1 1 1 1  1 0 1 1 0 0 0 0 H2 =  01  1 1    55
  • 56. Typical Multiple Spreading Approach ❑Spread data rate by an orthogonal code (channelization code) ❑Provides mutual orthogonality among all users in the same cell ❑Further spread result by a PN sequence (scrambling code) ❑Provides mutual randomness (low cross correlation) between users in different cells 56
  • 57. Wireless MAC Protocols - Issues 57
  • 58. Hidden Terminal Problem • A sends to B, C cannot receive A • C wants to send to B, C senses a “free” medium (CS fails) • collision at B, A cannot receive the collision (CD fails) • A is “hidden” for C BA C 58
  • 59. Exposed Terminal Problem • B sends to A, C wants to send to D • C has to wait, CS signals a medium in use • since A is outside the radio range of C waiting is not necessary • C is “exposed” to B BA C D 59
  • 60. Near and FarTerminals • Terminals A and B send, Creceives – the signal of terminal B hides A’ssignal – C cannot receiveA • This is also a severe problem for CDMAnetworks • precise power control required A B C 60
  • 61. Classification of wireless MAC protocols Wireless MAC protocols Fixed-assignment schemes Eg. FDMA, TDMA & CDMA Random-access schemes Eg. Aloha & CSMA Reservation based schemes Eg. MACA Circuit-switched Connectionless packet-switched CO packet-switched 61
  • 62. International Cocktail Party • FDMA – Large room divided up into small rooms. Each pair of people takes turns speaking. • TDMA – Large room divided up into small rooms. Three pairs of people per room, however, each pair gets 20 seconds to speak. • CDMA – No small rooms. Everyone is speaking in different languages. If voice volume is minimized, the number of people is maximized. 62
  • 63. Fixed-assignment schemes • TDMA – Time Division MultipleAccess • FDMA – Frequency Division MultipleAccess • CDMA – Code Division MultipleAccess 63
  • 64. TDMA • Each user transmits data on a time slot on multiple frequencies • A time slot is a channel • A user sends data at an accelerated rate (by using many frequencies) when its time slot begins • Data is stored at receiver and played back at original slow rate 64
  • 65. General Specification of TDMA • Rx: 869-894MHz Tx: 824-849MHz • 832 Channels spaced 30kHz apart (3 users/channel) • DQPSK modulation scheme • 48.6kbps bit rate • Interim Standard (IS) – 54 • Digital AMPS (Advanced Mobile Phone System) • Uses Time Division Duplexing (TDD) usually 65
  • 66. TDMA Operation • Efficiency of TDMAframe: - overhead bits per framebOH Nr - number of reference bursts perframe Nt - number of traffic bursts perframe br - number of overhead bits per referenceburst bp - number of overhead bits per preamble per slot bg - number of equivalent bits in each guard time interval Tf - frame duration Rrf - bit rate of the radio-frequency channel bOH = Nrbr − Ntbp − (Nt − Nr )bg btotal = Tf  Rrf OH f b b =   100% 1−   total  66
  • 67. Advantages of TDMA • Flexible bit rate • No frequency guard band required • No need for precise narrowband filters • Easy for mobile or base stations to initiate and execute hands off • Extended battery life • TDMA installations offer savings in base station equipment, space and maintenance • Themost cost-effective technology for upgrading a current analog system to digital 67
  • 68. Disadvantages to using TDMA • Requires network-wide timing synchronization • Requires signal processing for matched filtering and correlation detection • Demands high peak power on uplink in transient mode • Multipath distortion 68
  • 69. FDMA • Similar to broadcast radio and TV, assign a different carrier frequency per call • Modulation technique determines the required carrier spacing • Each communicating wireless user gets his/her own carrier frequency on which to send data • Need to set aside some frequencies that are operated in random-access mode to enable a wireless user to request and receive a carrier for data transmission 69
  • 70. General Specification of FDMA • Rx: 869-894MHz Tx: 824-849MHz • 832 Channels spaced 30kHz apart (3 users/channel) • DQPSK modulation scheme • 48.6kbps bit rate • Used in analog cellular phone systems (AMPS) • Uses Frequency Division Duplexing (FDD) • ISI (Intersymbol Interference) is low 70
  • 71. FDMA Operation • Number of FDMAChannels −2 guard c f - total spectrum - guard band N =  f guard c - channel bandwidth •In the U.S. each cellular carrier is allocated 416 channels where:  f =12.5MHz guard =10kHz c = 30kHz N = 12.5MHz − 2 10kHz = 416 30kHz 71
  • 72. Advantages of FDMA • If channel is not in use, it sits idle • Channel bandwidth is relatively narrow (30kHz) • Simple algorithmically, and from a hardware standpoint • Fairly efficient when the number of stations is small and the traffic is uniformly constant • Capacity increase can be obtained by reducing the information bit rate and using efficient digital code • No need for network timing • No restriction regarding the type of baseband or type of modulation 76
  • 73. Disadvantages to using FDMA • The presence of guard bands • Requires right RF filtering to minimize adjacent channel interference • Maximum bit rate per channel is fixed • Small inhibitingflexibilityin bit rate capability • Does not differ significantly from analog system 73
  • 74. Frequency vs Time Frequency Time CarrierFDMA Time Frequenc y TDMA Time Frequency Hybrid FDMA/TDMA Basic principle of communication: Two regions in the time- frequency plane with equal areas can carry the same amount of information 74
  • 75. General Specification of CDMA • Rx: 869-894MHz Tx: 824-849MHz • 20 Channels spaced 1250kHz apart (798 users/channel) • QPSK/(Offset) OQPSK modulation scheme • 1.2288Mbps bit rate • IS-95 standard • Operates at both 800 and 1900 MHz frequency bands 75
  • 76. CDMA Operation • Spread Spectrum Multiple Access Technologies 76
  • 77. Advantages of CDMA • Many users of CDMA use the same frequency, TDD or FDD may be used • Multipath fading may be substantially reduced because of large signal bandwidth • No absolute limit on the number of users • Easy addition of more users • Impossible for hackers to decipher the code sent • Better signal quality • No sense of handoff when changing cells 77
  • 78. Disadvantages to using CDMA • As the number of users increases, the overall quality of service decreases • Self-jamming • Near- Far- problem arises 78
  • 79. CDMA(CodeDivision Multiple Access) ❑Principles ❑ all terminals send on the same frequency and can use the whole bandwidth of the transmission channel ❑ each sender has a unique code ❑ The sender XORs the signal with this code ❑ the receiver can “tune” into this signal if it knows the code of the sender ❑ tuning is done via a correlation function ❑Disadvantages: ❑ higher complexity of the receiver (receiver cannot just listen into the medium and start receiving if there is a signal) ❑ all signals should have approximately the same strength at the receiver ❑Advantages: ❑ all terminals can use the same frequency, no planning needed ❑ huge code space (e.g., 232) compared to frequency space ❑ more robust to eavesdropping and jamming (military applications…) ❑ forward error correction and encryption can be easily integrated 79
  • 80. CDMA:principle (verysimplified) Ak X AsAd Bk X BsBd As +Bs Ak Bk X C+D X C+D Ad Bd C+D: Correlation and Decision Spreading Despreading 80
  • 81. CDMA:example ❑ SenderA ❑ sendsAd=1, keyAk=010011 (assign:„0“= -1, „1“= +1) ❑ sending signalAs=Ad* Ak=(-1, +1,-1, -1, +1,+1) ❑ SenderB ❑ sendsBd=0, keyBk=110101 (assign:„0“= -1, „1“= +1) ❑ sending signal Bs=Bd* Bk=(-1, -1, +1,-1, +1,-1) ❑ Both signalssuperimpose in space ❑ interference neglected(noise etc.) ❑ As+Bs=(-2, 0, 0, -2, +2,0) ❑ Receiverwants to receive signal from senderA ❑ apply keyAkbitwise (innerproduct) ❑Ae=(-2, 0, 0, -2, +2,0) Ak=2+0 +0+2 +2+0 =6 ❑result greater than 0, therefore, original bitwas„1“ ❑ receivingB ❑Be=(-2, 0, 0, -2, +2,0) Bk=-2 +0 +0- 2 - 2+0 =-6, i.e. „0“ 81
  • 82. Spreadingof signalA dataAd signalAs 1 0 1 0 1 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1 1 0 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0 key sequenceAk Ad+Ak Real systems use much longer keys resulting in a larger distance between single code words in code space. 1 -1 82
  • 83. Spreadingof signalB signalAs As +Bs 1 0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1 1 1 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1 data Bd signal Bs key sequence Bk Bd+Bk 1 -1 1 -1 2 0 -2 83
  • 84. Despreadingof signalA Ak (As + Bs) *Ak correlator output decision output As +Bs 1 0 1 0 1 0 dataAd 2 0 -2 1 0 -1 2 0 -2 Note: the received signal is inverted 84
  • 85. Despreadingof signalB correlator output decision output Bk (As +Bs) * Bk As +Bs 1 0 0 0 1 1 data Bd 2 0 -2 1 0 -1 2 0 -2 Note: the received signal is inverted 85
  • 86. 125 Despreadingwith awrongkey correlator output decision output (1) (1) ? wrong key K (As +Bs) * K As +Bs 2 0 -2 1 0 -1 2 0 -2 86
  • 87. ComparisonSDMA/TDMA/FDMA/CDMA Approach SDMA TDMA FDMA CDMA Idea segment space into cells/sectors segment sending time into disjoint time- slots, demand driven or fixed patterns segment the frequency band into disjoint sub- bands spread the spectrum using orthogonal codes Terminals only one terminal can be active in one cell/one sector all terminals are active for short periods of time on the same frequency every terminal has its own frequency, uninterrupted all terminals can be active at the same place at the same moment, uninterrupted Signal separation cell structure, directed antennas synchronization in the time domain filtering in the frequency domain code plus special receivers Advantages very simple, increases capacity per km² established, fully digital, flexible simple, established, robust flexible, less frequency planning needed, soft handover Dis- advantages inflexible, antennas typically fixed guard space needed (multipath propagation), synchronization difficult inflexible, frequencies are a scarce resource complex receivers, needs more complicated power control for senders Comment used in all cellular systems standard in fixed networks, together with FDMA/SDMA used in many mobile networks typically combined with TDMA (frequency hopping patterns) and SDMA (frequency reuse) higher complexity In practice, several access methods are used in combination Example: SDMA/TDMA/FDMA for GSM 87