WMN All Units Notes
WMN All Units Notes
• 2 G- Digital
• 2.5 G
• 2.75G
• 3G
• CDMA2000
• 4G
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 1/ 39
WIMAX (Worldwide Interoperability for Microwave Access)
• 4.5G
• 5G
CELL
❖ SHAPE IS HEXAGONAL
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 2/ 39
GSM
Downlink
• A fixed station in a mobile radio system used for radio communication with mobile
stations. Base stations are located at the center or on the edge of a coverage region
and consist of radio channels and transmitter and receiver antennas mounted on a
tower.
Application of PCS
1. Voice Communication
2. Messaging
3. Internet access
4. Location based services
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 3/ 39
PCS Architecture
• Radio Network
Radio Network
• The radio network connects Mobile Stations (MS) and other network components via a
wireless network.
• MS connect with one another via the radio network's Base Stations (BS).
• The radio link protocols are handled by the BS in a radio network during
communication.
• MS can converse with one another both inside and outside the cell.
• The BSC serves as a link between the radio network's BTS and the Wireline Transport
network's MSC
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 4/ 39
Wireline Transport Network
• The Base Station Controller (BSC) in the Radio Network interfaces with the Mobile
Switching Center (MSC) in the Wireline Transport Network.
• MSC also communicates with a mobility database, which keeps track of where moving
devices are in the architecture.
Global System for Mobile (GSM) is a second generation cellular standard developed to
cater voice services and data delivery using digital modulation
GSM Architecture
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 5/ 39
Interfaces in GSM
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 6/ 39
Interfaces used for GSM network : (ref fig 2)
1)UM Interface –Used to communicate between BTS with MS
2)Abis Interface— Used to communicate BSC TO BTS
3)A Interface-- Used to communicate BSC and MSC
4)Singling protocol (SS7)- Used to communicate MSC with other network .
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 7/ 39
• Cell − Cell is the basic service area; one BTS covers one cell. Each cell is given a Cell
Global Identity (CGI), a number that uniquely identifies the cell.
• Location Area − A group of cells form a Location Area (LA). This is the area that is
paged when a subscriber gets an incoming call. Each LA is assigned a Location Area
Identity (LAI). Each LA is served by one or more BSCs.
• MSC/VLR Service Area − The area covered by one MSC is called the MSC/VLR
service area.
• PLMN − The area covered by one network operator is called the Public Land Mobile
Network (PLMN). A PLMN can contain one or more MSCs.
GSM Architecture
• GSM system consists of three major components:
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 8/ 39
The ME is the only part of the GSM network which the subscriber will really see.
There are three main types of ME, these are listed below:
1. Vehicle Mounted
• The SIM is a card which plugs into the ME. The SIM contains several pieces of
information:
– This number identifies the mobile subscriber. It uniquely identifies a given MS.
• The SIM is a card which plugs into the ME. The SIM contains several pieces of
information:
• The Um interface contains all mechanism for wireless interface (TDMA, FDMA etc.).
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 9/ 39
• The BTS is a radio equipment (transreceiver or antenna) needed to service each cell in
the network.
• Encodes, encrypts, multiplexes, modulates and feeds the RF signals to the antenna.
• BSC handles:
– Monitor Quality
– Handoffs
NSS is responsible for performing call processing and subscriber related functions.
It also includes:
• When provides interface between PSTN & BSS in GSM network then known as a
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 10/ 39
Gateway MSC(GMSC)
• Mobility management
- Registration
- Location Updating
• HLR stores permanent data of subscriber which include subscribers service profile,
prepaid/postpaid, roaming restrictions ,supplementary services, location information and
its activity.
• Home location register (HLR) is a database used for mobile user information
management. All permanent subscriber data are stored in this database.
– MSISDN
2. Location information
3. Service information
– Service subscription
– Service restrictions
– Supplementary services
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 11/ 39
• When a mobile station roams into a new MSC area, the VLR connected to that MSC will
request data about the mobile station from the HLR.
• Later, if the mobile station makes a call, the VLR will have the information needed for
call setup without having to interrogate the HLR each time
• Assigns a TMSI to each MS entering the VLR area which keeps on changing.
– IMSI
– MSISDN
– TMSI
2. Location information
– MSC number
3. Service information
• This database that contains information about the identity of mobile equipment that
prevents calls from stolen, unauthorized or defective mobile stations
• This database is concerned solely with MS equipment and not with the subscriber who
is using it to make or receive a call.
• The EIR database consists of lists of IMEIs (or ranges of IMEIs) organized as follows:
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 12/ 39
Authentication Center (AUC)
• The AuC is a processor system that performs the “authentication” function
• AUC provides authentication and encryption parameters to verify the users identity &
ensure the confidentiality of each call.
• Contains the algorithms for authentication as well as the keys for encryption.
• It is normally co-located with the HLR as it will be required to continuously access and
update, as necessary, the system subscriber records.
• The authentication process will usually take place each time the subscriber “initializes”
on
• It maintains operation of the GSM network by observing the handovers, system load,
blocking rates etc.
• OMC provides network overview and allow network engineers to monitor, diagnose and
troubleshoot every aspect of GSM network.
Features of GSM
• Improved spectrum efficiency
• International roaming
• High-quality speech
• Compatibility with Integrated Services Digital Network (ISDN) and other telephone
company services
• GSM Services
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 13/ 39
1. Bearer services
2. Teleservices
3. Supplementary Services
1. Bearer services are also called as Data services.
• GSM allowing for data rates of up to 9600 bit/s or 9.6 kbps for non-voice services
• Include various data services for information transfer between GSM and other networks
like PSTN, ISDN etc at rates from 300 to 9600 bps or 9.6 kbps
3. Offered services
1. Mobile telephony
2. Emergency calling
• Multiparty Service/Conferencing
• Call Waiting
• Call Hold
• Call Forwarding
• Call Barring
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 14/ 39
1. Conferencing − It allows a mobile subscriber to establish a multiparty conversation,
i.e., a simultaneous conversation between three or more subscribers to setup a
conference call. This service is only applicable to normal telephony.
2. Call Waiting − This service notifies a mobile subscriber of an incoming call during a
conversation. The subscriber can answer, reject, or ignore the incoming call.
3. Call Hold − This service allows a subscriber to put an incoming call on hold and resume
after a while. The call hold service is applicable to normal telephony.
4. Call Forwarding − Call Forwarding is used to divert calls from the original recipient to
another number. It is normally set up by the subscriber himself. It can be used by the
subscriber to divert calls from the Mobile Station when the subscriber is not available,
and so to ensure that calls are not lost.
5. Call Barring − Call Barring is useful to restrict certain types of outgoing calls such as
ISD or stop incoming calls from undesired numbers. Call barring is a flexible service that
enables the subscriber to conditionally bar calls.
6. Calling Line Identification Presentation − This service displays the telephone number
of the calling party on your screen.
7. Advice of Charge (AoC) − This service was designed to give the subscriber an
indication of the cost of the services as they are used. Furthermore, those service
providers who wish to offer rental services to subscribers without their own SIM can also
utilize this service in a slightly different form. AoC for data calls is provided on the basis
of time measurements.
8. Closed User Groups (CUGs) − This service is meant for groups of subscribers who
wish to call only each other and no one else.
1. GSM 900:
• 935-960MHz DOWNLINK
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 15/ 39
2.GSM 1800:
3. GSM 1900:
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 16/ 39
GSM Radio Aspects
• GSM utilizes two bands of 25 MHz which have been set aside for system use in all
member countries
• Two frequency bands 45 MHz apart have been reserved for GSM
• The GSM uses time division multiple access (TDMA) and frequency division multiple
access (FDMA)
• Each of these bands of 25 MHz spectrum is subdivided into 124 carriers ( with no guard
band) of 200 kHz. This 200 kHz band is called ARFCNs(Absolute Radio Frequency
Channel Number)
• Each user transmits periodically in every eighth time slot in an uplink radio carrier &
receives a corresponding time slot on the downlink carrier.
• Thus, several conversations can take place simultaneously at the same pair of
transmit/receive radio frequencies.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 17/ 39
Each of these bands of 25 MHz is subdivided into 124 single carrier channels of
200 KHz band is called ARFCNs(Absolute Radio Frequency Channel Number
Interleaving duration 40 ms
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 18/ 39
GSM CHANNELS
1. Physical channel –
Each timeslot on a carrier is referred to as a physical channel.
2. Logical channel –
Variety of information is transmitted between the MS and BTS. There are different
logical channels depending on the information sent. The logical channels are of two
types
i. Traffic channel
ii. Control channel
2. Logical channels (GSM)
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 19/ 39
• Read only by idle mobile at least once every 30 secs.
Used by the network to assign a signaling channel upon successful decoding of access
bursts.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 20/ 39
3. FACCH( Fast Associated Control Channel )
• Uplink and Downlink.
1. The MS sends the dialed number indicating service requested to the MSC(via BSS)
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 21/ 39
2. The MSC checks from the VLR if the MS is allowed the requested service. If so, MSC
asks BSS to allocate necessary resources for the call.
4. The GMSC routes the call to the local exchange of called user.
6. Answer back (ring back tone) from the called terminal to LE.
7. Answer back signal is routed back to the MS through the serving MSC which also
completes the speech path to the MS.
1. The PSTN user dials the MSISDN of the called user in GSM.
2. The LE routes the call to the GMSC of the called GSM user.
3. The GMSC uses the dialed MSISDN to determine the serving HLR for the GSM user
and interrogates it to obtain the required routing number.
4. The HLR requests the current serving VLR for the called MS for a MSRN(MS roaming
number) so that the call can be routed to the correct MSC.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 22/ 39
6. The HLR passes the MSRN to the GMSC.
7. Using the MSRN, the GMSC routes the call to the serving MSC.
8. The MSC interrogates the VLR for the current location area identity (LAI) for the MS.
10. The MSC pages MS via the appropriate BSS. The MS responds to the page and sets
up the necessary signaling links.
11. When the BSS has established the necessary radio links, the MSC is informed an the
call is delivered to the MS.
12. When the MS answers the call, the connection is completed to the calling PSTN user.
• Paging
• Location Update
• Handoff Mechanism
Roaming
Paging
• Paging is one to one communication between mobile and base station
Roaming
• Roaming is the ability for a customer of mobile communications to automatically make
and receive telephone calls, send and receive data, or access other services while
travelling outside the geographical coverage area of the home network, by means of
using a network of another operator.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 23/ 39
• National roaming means that mobile subscribers make use of another network in
geographical areas, where their own operator does not have coverage.
• This is, for example, used by operators, who do not have complete coverage in a
country.
• International roaming is used when mobile subscribers travel abroad and make use of
the network of an operator in the foreign country
• If a service provider does not have a network coverage in a particular city or country,
then this service provider makes a roaming agreement with another service provider
having network in that city or country.
• As per this agreement, another service provider provides all the available services to
the roaming customer of first service provider.
• CDRs(Call Detail Records) generated in one roaming partner's area are collected and
rated by that roaming partner and finally they are sent to the actual service provider of
the roaming customer. Actual service provider charges the end customer for all the
roaming services provided based on their predefined service charges.
• Two roaming partners settle their financials on monthly basis by exchanging actual
roaming CDRs and reports based on those CDRs.
Handoff
• Handoff (or handover) is a control process initiated when a mobile moves from its
current cell to its neighboring cell.
• A user of a mobile phone will be moving continuously. In such a situation, the mobile
connection should also remain intact especially if the user is currently using the phone.
This transfer of connection from one cell to another should be quick and in such a
manner that user doesn’t actually realize that a handoff has happened
➢ When mobile node move away from cell centre(tower/ BTS) towards cell edge, signal
level dropped. This can be continuously transferred through Measurement Reports to
BTS.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 24/ 39
Hard Hand-Off
Soft Hand-Off
Intra-BTS Handover
1. Intra-cell handover:
Such a kind of handover is performed to optimize the traffic load in the cell or to
improve quality of a connection by changing carrier frequency.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 25/ 39
1. Intra-BTS handover
2. Inter-BTS/Intra-BSC handover
3. Inter-BSC handover
4. Inter-MSC handover
2. Inter-cell handover:
• Here the mobile moves from one cell to another but remains within the same BSC
3. Inter-BSC handover:
• It is also called as Intra-MSC handover.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 26/ 39
• As BSC can control only a limited number of cells, we might usually need to
transfer a mobile from one BSC to another BSC.
4. Inter-MSC handover:
• It occurs when a mobile moves from one MSC region to another MSC.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 27/ 39
• Hard Handoff − In a hard handoff, an actual break in the connection occurs while
switching from one cell to another.
• The radio links from the mobile station to the existing cell is broken before establishing a
link with the next cell. It is generally an inter-frequency handoff.
• Eg GSM
• Soft Handoff −
• In soft handoff, at least one of the links is kept when radio links are added and removed
to the mobile station.
• This ensures that during the handoff, no break occurs. This is generally adopted in co-
located sites.
• Eg CDMA
GSM security
• Authentication (used for billing purposes)
• Confidentiality
• Security services
ACCESS CONTROL/AUTHENTICATION
• user SIM (Subscriber Identity Module): secret PIN (personal identification
number)
CONFIDENTIALITY
• voice and signaling encrypted on the wireless link (after successful
authentication)
ANONYMITY
• temporary identity TMSI
(Temporary Mobile Subscriber Identity)
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 28/ 39
• encrypted transmission
GSM – Authentication
• This validation of the authenticity of the user or device allows a service provider to deny
service to users that cannot be identified.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 29/ 39
• As part of a typical authentication process, a random number that changes periodically
(RAND) is sent from the base station.
• This number is regularly received and temporarily stored by the mobile radio.
• The secret number Ki is stored in both the mobile telephone and GSM system and it
is not transmitted over the radio link.
• This random number is used, along with other information including the secret data
value (Ki), to calculate a signed response (SRES).
• The authentication response is sent back to the system to validate the mobile radio.
• The system processes the same information to create its own authentication response.
• When the GSM system performs the authentication process, it compares the SRES it
calculates to the SRES returned by the mobile telephone.
• If both SRESs authentication responses match, service may be provided, the GSM
system allows call processing to continue.
• A mobile phone in motion keeps the network informed about changes in the location
area.
• If the mobile moves from a cell in one location area to a cell in another location area, the
mobile phone should perform a location area update to inform the network about the
exact location of the mobile phone.
• GSM networks keep track of the location area (LA) where the MS is operating.
• When receiving an incoming call, the MS is paged in all cell of its current location area.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 30/ 39
• The Location Area Identity (LAI) is broadcast in system information message and stored
in mobile station memory.
• When a new received location area identity does not match with the previously stored
location area identity, then MS does a location update.
2. Periodic update:
• As and when the timer expires, the MS does the location update.
• Mobile equipment do this update and send IMSI DETACH message when it is
deactivated.
• The network marks that MS as a deactivated and does not send paging message to for
MS until it is activated again.
• MS send IMSI ATTACH message does a location update when it is activated again.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 31/ 39
1. MS sends location update to new VLR
2. VLR sends location update msg to HLR with address of new VLR and IMSI of MS
1.Location area
2.Routing area
3.Tracking area
1.Location Area
• A "location area" is a set of base stations that are grouped together to optimize
signaling
• Typically, tens or even hundreds of base stations share a single Base Station
Controller (BSC) in GSM.
• A location area is controlled by one or more BSCs, but only by one MSC.
• Each location area has an assigned unique identifier, made up of numbers, called a
"location area code" (LAC).
• Within a location area, each base station is assigned a distinct "cell identifier" (CI)
number
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 32/ 39
2.Routing Area
• The routing area is the packet-switched domain
equivalent of the location area.
3. Tracking Area
• A tracking area is a set of cells
• The tracking area is the LTE counterpart of the location area and routing area.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 33/ 39
1.4. Network Signaling
Databases
– VLR (visitor location register)
Switches
– MSC (mobile switching center)
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 34/ 39
Radio systems
– BSC (base station controller)
– MS (mobile station)
The figure shows various network signaling protocols used by the entity interfaces in
GSM
• The software platform for implementing GSM network signaling protocol is GSM
MAP(Mobile Application Part)
• In terms of Network signaling, the GSM architecture can be partitioned into 3 parts
• It also consists of EIR which is used to maintain a list of legitimate , fraudulent mobile
station(faulty)
2. Switches :
• The GMSC performs necessary switching functions for mobile stations within the
geographical area it controls.
• An MSC area is partitioned into several location areas. Each LA consists of many BTS.
For originating a call from MS to a wireline user , the MSC communicates with SSP in
the PSTN using SS7ISUP protocol
• To deliver a call from PSTN to MS, the originating SSP in PSTN with Gateway MSC
using SS&ISUP protocol
• To perform Mobility and call handling tasks, the MSC needs to communicate with HLR
using the C interface and with VLR using B interface
• To prevent Fraudulent handset usage, MSC communicates with EIR using F interface
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 35/ 39
3. Radio system
It consists of BSc, BTS and MS.
BSC connects to BTS through A-Bis interface using ISDN link access protocol for D
channel(LAPD).
• Um – MS to BTS
• Abis – BTS-BSC
• A – BSC- GMSC
• B – GMSC-VLR
• C - GMSC-HLR
• D – VLR-HLR
• E – MSC-GMSC
• F - GMSC-EIR
• G - VLR-VLR
• H – HLR-AUC
Um
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 36/ 39
• LAPDm, a modified version of the ISDN LAPD, is used for signalling.
Abis
• This is a BSS internal interface linking the BSC and a BTS, and it has not been
standardised.
• The Abis interface allows control of the radio equipment and radio frequency allocation
in the BTS.
• The A interface manages the allocation of suitable radio resources to the MSs and
mobility management.
• The Mobile Application Part (MAP) is an SS7 protocol that provides an application layer
for the various nodes in GSM and UMTS mobile core networks and GPRS core
networks to communicate with each other in order to provide services to users.
• The B interface between the MSC and the VLR uses the MAP/B protocol.
• Most MSCs are associated with a VLR, making the B interface "internal". Whenever the
MSC needs access to data regarding a MS located in its area, it interrogates the VLR
using the MAP/B protocol over the B interface
• Each call originating outside of GSM (i.e., a MS terminating call from the PSTN) has to
go through a Gateway to obtain the routing information required to complete the call,
and the MAP/C protocol over the C interface is used for this purpose.
• Also, the MSC may optionally forward billing information to the HLR after call clearing
• The D interface is between the VLR and HLR, and uses the MAP/D protocol to
exchange the data related to the location of the MS and to the management of the
subscriber.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 37/ 39
• The E interface exchanges data related to handover between the anchor and relay
MSCs using the MAP/E protocol.
• The F interface connects the MSC to the EIR, and uses the MAP/F protocol to verify the
status of the IMEI that the MSC has retrieved from the MS.
• The G interface interconnects two VLRs of different MSCs and uses the MAP/G
protocol to transfer subscriber information, during e.g. a location update procedure.
• The H interface is between the MSC and the AUC, and uses the MAP/H protocol to
support the transfer of short messages.
• The I interface can be found between the MSC and the ME. Messages exchanged over
the I interface are relayed transparently through the BSS.
MSBTE QUESTIONS
1. Enlist two application of personal communication services. (l -R)
3. Draw the architecture of GSM and explain function of each block. (l -U)
10. Draw GSM architecture and list the logical channels in GSM.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 38/ 39
12. Draw the block diagram of the architecture of PCS (Personal Communication Services)
and explain.
13. Explain the Network signalling and radio interfaces in GSM (6M)
15. Describe the mobile originated call in GSM with neat diagram.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622) Pg 39/ 39
GPRS and Mobile data communication
(12 Marks)
Packet switching: GPRS uses packet switching to send and receive data, which means
that data is broken down into packets and transmitted over the network. This allows for
efficient use of network resources and enables faster data transfer rates.
High-speed data transfer: GPRS provides data transfer rates of up to 171 kbps, which is
significantly faster than traditional dial-up connections.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Support for multimedia services: GPRS supports multimedia services such as video
streaming, picture messaging, and mobile internet browsing.
Security: GPRS includes several security services such as authentication, access control,
user identity confidentiality, and user information.
Overall, GPRS provides a cost-effective and efficient way for mobile users to access data
services and stay connected to the internet while on the go.
GPRS Architecture
• GPRS is usually attempts to reuse the existing GSM network elements as much as
possible.
• There are new entities called GPRS that supports nodes (GSN) which are responsible
for delivery and routing of data packets between mobile stations and external packets
networks. There are two types of GSNs,
A. Mobile Station:
• GPRS Services required New Mobile Station as the existing GSM phones are not
capable of handling the enhanced air interface or the packet data.
• A wide variety of Mobile stations exist which includes a high-speed version of current
phones to support high-speed data access like PC cards for laptop computers.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Class – B : Terminals can monitor all services but operate either GPRS or GSM.
• Each BSC requires the installation of Packet Control Units in addition to software
upgrade.
• They provide physical and logical data interface to BSS to estimate packet data traffic.
• BTS too require a software upgrade but typically does not involve hardware
enhancements.
• When the traffic is originated at the subscriber mobile then it is transported over the air
interface to BTS and then from BTS to BSC, the same way in standard GSM call.
• But at output of BSC the traffic is separated, the voice is sent to the mobile switching
centre per standard GSM and the data is sent to the new device called the SGSN via
the PCU
• PCU
• The PCU or Packet Control Unit is a hardware router that is added to the BSC.
• It differentiates data destined for the standard GSM network (circuit switched data) and
data destined for the GPRS network (Packet Switched Data).
• The PCU itself may be a separate physical entity, or more often these days it is
incorporated into the base station controller, BSC, thereby saving additional hardware
costs.
MSC (Mobile Switching Controller) is the central unit of the network. It controls mobility
management, call set up, location updating, routing, basic switching and supplementary
services.
HLR (Home Location Register) is a database that stores subscriber information, such as the
mobile station's identity, the services to which it has access, and its current location.
VLR (Visitor Location Register) temporarily stores the IMSI of each roaming subscriber.
• SSGN:
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• The Serving GPRS Support Node is responsible for authentication of GPRS mobiles,
registration of mobiles in the network, mobility management, and collecting information
for charging for the use of the air interface.
• GGSN:
• The Gateway GPRS Support Node is the interface between the GPRS network and
external networks, such as the internet.
• Data Compression
• Mobility management
• Session management
• Charging data
• Access functionality
• Routing
• Charging data
GPRS Services
• Instant messaging and presence
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• SMS messaging and broadcasting
1. Service Precedence
• high
• normal
• low
2. Reliability
• This refers to the ability of the network to maintain a consistent level of performance and
availability over time.
3. Delay
• This refers to the time it takes for data to travel between the source and destination
devices, and it is typically measured in milliseconds (ms).
4. Throughput
• The throughput specifies the maximum/peak bit rate and the mean bit rate.
Mobility Management
• Procedures that handle mobility of user are called GPRS Mobility Management (GMM).
• Mobility management is the means by which GPRS keeps track of a mobile subscriber
location while connected to the Network.
• Different scenarios can exist when the MS enters a new cell and possibly a new routing
area
• Cell update
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Mobility Management states
• A GPRS MS has one of three mobility management states:
1. IDLE STATE
2. READY STATE
• When MS does not send any packets for longer period of time.
Routing in GPRS
• Intra – PLMN backbone networks connect GSNs of same PLMN or the same network
operator. These are private packet based networks of the GPRS network provider.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• These intra PLMN networks are connected to inter PLMN backbone
• An Inter PLMN backbone network connects GSNs of different PLMNs & Operators
• The SGSN encapsulates the IP packets coming from mobile station, examines the PDP
contexts and routes them through the intra – PLMN GPRS backbone to the GGSN
• The GGSN decapsulates the packets and sends them out on the IP network.
• Using IP routing mechanisms, packets are delivered to the host through Router
• Thus the MS‟s IP address has the same network prefix as the IP address of the GGSN
in PLMN2.
• The GGSN encapsulates the incoming IP packets and tunnels them through the inter-
PLMN GPRS backbone to the appropriate SGSN in PLMN 1.
• The HLR stores the user profile, current SGSN address and PDP(Packet Data
Protocol) addresses for every GPRS user in PLMN.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Packet broadcast control channel (PBCCH).
• The PBCCH broadcasts information relative to the cell in which the mobile camps and
information on the neighbour cells.
• When it is not present in the cell, the common control signalling for GPRS is handled on
the GSM common control channels (CCCH).
• PCCCH is composed of packet random access channel (PRACH), used for random
access, packet paging channel (PPCH), used for paging, and packet access grant
channel (PAGCH), used for access grant.
• The PRACH is used by the MS to initiate uplink access to the network. The PPCH is
used by the network to page the mobile in order to establish a downlink packet transfer.
• The PAGCH is used by the network to assign radio resources to the mobile for a
packet transfer.
• The PTCCH is a bidirectional channel that is used for TA update. The PTCCH is an
optional channel.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
How does GPRS architecture differ from GSM?
• Mobile user can access information and network resources through wireless LAN as
they attend meeting, collaborate with other users or move to other locations in the
premises.
• WLANs use various wireless communication standards, including IEEE 802.11, which
includes different versions like 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and
802.11ax
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Applications of WLAN
• Office/Campus Environment
• Homes
• Workgroup Environment
• Public Places
• War/Defense Sites
4. Network Expansion: Go where wires cannot. Penetrate through buildings and walls
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Disadvantages of WLANs
• Quality of service: WLANs offer lower quality than their wired counterparts.
• Restrictions:
– Senders and receivers are operated by laymen and, radiation has to be low.
All standards must offer (automatic) encryption, privacy mechanisms, support for secrecy etc
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Infrastructure Network Architecture
• Components of Architecture:
1. Stations
2. Access Points
3. Portal
6. Distributed System
Stations
• All components that can connect into a wireless medium in a network are referred to as
stations.
• Wireless stations can be mobile devices such as laptops, personal Digital Assistants, IP
phones and other smartphones or non portable devices such as desktop computers,
printers and workstations that are equipped with a wireless network interface
Access Points
• Access Points (APs) , normally wireless routers, are base stations for the wireless
network
• APs transmit and receive radio frequencies for wireless enabled devices to
communicate with
Portal:
• It is a typical access point which interconnects wired LAN and wireless LAN.
• BSS is a set of all stations that can communicate with each other at physical layer.
• Every BSS has an identification (ID) called the BSSID which is the MAC address of the
access point servicing the BSS.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Infrastructure BSS: Here, the devices communicate with other devices through access
points.
• Each ESS has an ID called the SSID which is a 32-byte (maximum) character string
Distributed System
• A distribution system (DS) connects access points in an extended service set.
• The concept of a distributed system can be used to increase network coverage through
roaming between cells
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
RFID
•RFID (Radio Frequency Identification) is a technology that uses radio waves to identify and
track objects.
1. Reader,
2. Antenna, and
3. Tag.
•The tag contains a unique identifier, which can be read by the reader when the tag is in range
of the antenna.
Ethernet
RFID
Reader
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
The components of the RFID system are explained in more detail below:
1.Reader /Interrogator:
•The reader is a device that transmits a radio signal to the antenna, which in turn sends the
signal to the tag.
•The reader also receives the data from the tag and sends it to a computer for processing.
•The reader can be either fixed or handheld and can be connected to a computer or other
device for data processing
2. Antenna:
•The antenna is a component that sends and receives radio signals to and from the tag.
•The antenna can be a simple wire or a complex array of antennas, depending on the specific
application.
3. Tag:
•The tag is a small electronic device that contains a unique identifier Electronic Product Code
(EPC)and can be attached to an object.
•A passive tag does not have its own power source and is powered by the radio signal from
the reader, while an active tag has its own power source and can transmit data over longer
distances
Computer:
• The computer is a device that receives data from the reader and processes it.
• The computer can be used to manage the data collected by the RFID system, such as
tracking inventory, monitoring equipment, or managing access to restricted areas.
Overall, an RFID system is a powerful technology that can be used in a variety of applications,
such as inventory management, supply chain management, and asset tracking.
By using radio waves to identify and track objects, RFID systems offer a flexible and efficient
way to manage and monitor assets and resources
RFID tags
• Tags can be attached to almost anything:
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Passive Tags Active Tags
Lower storage capacities (few bits to 1 KB) Higher storage capacities (512 KB)
Shorter read ranges (4 inches to 15 feet) Longer read range (300 feet)
Operating Frequency:
• RFID tags are classified based on the frequency at which they operate.
• Operating Frequency
Low-Frequency (LF):
•Operate at 125 kHz and 134 kHz.
•These are used in applications such as animal tracking, access control, and payment
systems.
High-Frequency (HF):
•Operate at 13.56 MHz.
•These are used in applications such as smart cards, public transport ticketing, and inventory
management.
Ultra-High-Frequency (UHF):
•Operate at 860 MHz to 960 MHz.
•These are used in applications such as supply chain management, asset tracking, and retail
inventory management
RFID applications
1. Manufacturing and Processing
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
2. Warehouse order fulfillment
2. Logistics management
3. Retail
4. Security
1. Access control
5. Location Tracking
• It was originally developed in the 1990s by Ericsson, but it is now maintained and
developed by the Bluetooth Special Interest Group (SIG), a consortium of companies
that includes many major technology companies.
• Bluetooth uses radio waves to transmit data over short distances, typically up to 10
meters (33 feet). It operates on the 2.4 GHz band, which is a globally available
frequency range that does not require a license to use.
• Bluetooth devices can connect and communicate with each other without the need for
cables or a Wi-Fi network.
It is also used in a variety of industrial and medical applications, such as wireless sensors,
remote monitoring devices, and medical equpment.
Bluetooth features
• Bluetooth technology has several key features that make it a popular choice for wireless
communication. Here are some of the main features of Bluetooth:
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
1. Wireless Communication: Bluetooth enables wireless communication between devices
without the need for cables or wires.
3. Compatibility:
Bluetooth is a widely adopted technology and is compatible with most modern
smartphones, tablets, and computers. This makes it easy to connect and use different
devices with each other.
4. Automatic Pairing: Bluetooth devices can be paired automatically once they are within
range, making it easy to connect and use new devices with each other.
5. Range: Bluetooth has a range of up to 10 meters (33 feet) which makes it ideal for use in
small to medium-sized rooms.
6. Security: Bluetooth uses encryption to secure the communication between devices. This
means that unauthorized users cannot easily access the data being transferred.
7. Multi-Device Support: Bluetooth technology can connect multiple devices at the same
time. This makes it ideal for use in environments where multiple devices need to be connected
and used simultaneously.
8. Audio Streaming: Bluetooth is commonly used for streaming audio from a mobile device to
wireless headphones or speakers. This allows for a more convenient and flexible listening
experience without the need for cables.
• Overall, Bluetooth technology has several key features that make it a popular choice for
wireless communication and device connectivity.
Architecture of Bluetooth
• There are two types of Bluetooth networks −
• Piconets
• Scatternets
• Architecture of Bluetooth
1. Piconets
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Piconets are small Bluetooth networks, formed by at
most 8 stations, one of which is the master node and the
rest slave nodes (maximum of 7 slaves).
• Besides the seven active slaves, there can be up to 255 numbers of parked nodes
(inactive slaves)
2. Scatternet
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
WiMAX (IEEE 802.16 )
• Acronym for Worldwide Interoperability for Microwave Access.
• A wireless technology optimized for the delivery of IP centric services over a wide area.
• The IEEE 802.16 Working Group develops standards that address two types of usage
models −A fixed usage model (IEEE 802.16-2004).
WIMAX Architecture
1. Core Network:
• It is the standard Internet network.
2. BS(Base Station)
• It is the WIMAX Cell Site.
• The communication between subscriber station and base station is two way.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
▪ Uplink (from SS to BS)
3. SS (Subscriber Station)
• It is the subscriber station equipped with an antenna. This antenna is usually mounted
on building.
4. TE (Terminal Equipment)
• It can be any device like mobile, laptop etc.
• Line-of-sight, a fixed dish antenna points directly at the receiver’s dish. This signal is
much stronger and uses higher frequencies, reaching a possible maximum frequency of
66GHz.
• Non-line-of-sight, much like Wi-Fi, where a small antenna on your computer connects to
the tower. These kinds of transmissions use a low frequency range, between 2 GHz to
11GHz.
WIFI
• WiFi stands for Wireless Fidelity
• Wireless fidelity is wireless technology that uses radio frequency to transmit data
through the air
• It is based on the IEEE 802.11 family of standards and is primarily a local area
networking (LAN) technology designed to provide in-building broadband coverage.
• Current WiFi systems support a peak physical-layer data rate of 54 Mbps and typically
provide indoor coverage over a distance of 100 feet.
• WiFi has become the de facto standard for last mile broadband connectivity in homes,
offices, and public hotspot locations.
Wi-Fi Technology
• Wi-Fi networks use Radio Technologies to transmit and receive data at high speed:
▪ IEEE 802.11b
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
▪ IEEE 802.11a
▪ IEEE 802.11g
IEEE 802.11b
• Appear in late 1999
Interference from mobile phones and Bluetooth devices which can reduce the transmission
speed
IEEE 802.11a
• Introduced in 2001
• More expensive
IEEE 802.11g
• Introduced in 2003
• 54 Mbps Speed
• The AP is a wireless LAN transceiver or “base station” that can connect one or many
wireless devices simultaneously to the Internet.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Wi-Fi cards - They accept the wireless signal and relay information. They can be
internal and external.
• Safeguards - Firewalls and anti-virus software protect networks from uninvited users
and keep information secure
2.Infrastructure network
• The client communicates through Access Point.
Wi-Fi Security
▪ Service Set Identifier (SSID):
▪ The SSID is the name of the Wi-Fi network that devices connect to.
▪ The SSID can be changed by the network administrator to make the network easier to
identify or to improve security.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
▪ Wired Equivalent Privacy (WEP)
Advantages of Wi-Fi
• Mobility
• Ease of Installation
• Flexibility
• Cost
• Reliability
• Security
• Roaming
• Speed
Limitations
• Interference
• Degradation in performance
• Limited range
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
BASIS FOR BLUETOOTH WIFI
COMPARISON
Hardware Bluetooth adapter on all Wireless adapter on all the devices of the
requirement the devices connecting network and a wireless router.
with each other.
Ease of Use Fairly simple to use and It is more complex and requires
switching between configuration of hardware and software.
devices is easier.
Security Less secure Security features are better. Still, there are
comparatively some risks.
Frequency range 2.400 GHz and 2.483 2.4 GHz and 5 GHz
GHz
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
MSBTE QUESTIONS
1. Write the IEEE standard for WIFI and WIMAX (2-A)
2. Explain any 4 GPRS Services (2-U)
3. How does GPRS architecture differ from GSM (2-A)
4. Differentiate between Bluetooth and WIFI on the basis of Range, Bandwidth, Modulation
technique and number of devices connected (2-A)
5. Explain operational principle of Mobile IP in detail (2-U)
6. List any two GPRS Services.
7. Write IEEE standard for Bluetooth and WiFi.
8. Draw GPRS architecture and list the logical channels in GPRS.
9. Describe the terms home agent and foreign agent.
10. State the processes involved in the use of RFID in student attendance in a college.
11. Explain the functions performed by GPRS support nodes.
12. Explain the Quality of service parameters of GPRS.
13. Compare GSM networks with GPRS networks.
14. Explain the Logical channels in a GPRS system in short.
15. List any two applications of GPRS
16. Describe Mobility Management in GPRS
17. Enlist the GPRS network nodes
18. Draw the architecture of WLAN and describe it
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Wireless Application Protocol and 3G
Mobile Services (20 Marks)
• To understand the challenges (and pitfalls) of moving to a Mobile Internet, first consider
the fixed line Internet!
• Early approaches to providing content had to contend with new technical challenges:
3. Intermittent connectivity
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• A “standard” created by wireless and Internet companies to enable Internet access from
a cellular phone
• It is a protocol designed for micro-browsers and it enables the access of internet in the
mobile devices.
• wapforum.org:
– Goals
Application Layer:
▪ This layer contains the Wireless Application Environment (WAE)
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
▪ It defines the user interface on the phone It contains WML and WTA (Wireless
Telephony Application)
▪ WML script
▪ Content formats
2. Session Layer:
3. Transaction Layer:
This layer contains Wireless Transaction Protocol (WTP)
4. Security Layer:
This layer contains Wireless Transaction Layer Security (WTLS).
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Features
• Data Integrity
• Privacy
• Authentication
5. Transport Layer:
This layer contains Wireless Datagram Protocol (WDP).
• THE WAP datagram protocol is the transport layer that sends and receives messages
via any available bearer n/w including SMS ,USSD,IS-136 packet data and GPRS
• Operates above the data capable bearer services supported by various n/w types
• Provides a common interface to the upper layer protocols and hence they function
independent of the underlying wireless n/w
Bearers:
• Differing levels of quality of services with respect to throughput error rate and delays
• WAP protocols are designed to compensate for tolerate these varying levels of service
• WAP specification lists the bearers that are supported and techniques used to allow
WAP protocols to run over each bearer.
• It takes care of the small screen and the low bandwidth of transmission
• WAP sites are written in WML while websites are written in HTML
• It is similar to HTML, both of them use tags and written in plain text format
• The main difference between HTML and WML is that of basic unit of navigation in
HTML is a page while that in WML is a card
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• A WML contains multiple cards and they form a deck
• When a WML page is accessed from a mobile phone all the cards in the page are
downloaded from WML server
• So if the user goes to another card of the same deck the mobile browser does not have
to send any request to the server since the files that contains the deck is already stored
in wireless device
• You can put links text images i/p fields many other elements in the cards
<?xml version="1.0"?>
<wml>
<p>
Welcome to WML!
</p>
</card>
</wml>
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Wireless Application Protocol and 3G
Mobile Services (20 Marks)
• To understand the challenges (and pitfalls) of moving to a Mobile Internet, first consider
the fixed line Internet!
• Early approaches to providing content had to contend with new technical challenges:
3. Intermittent connectivity
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• A “standard” created by wireless and Internet companies to enable Internet access from
a cellular phone
• It is a protocol designed for micro-browsers and it enables the access of internet in the
mobile devices.
• wapforum.org:
– Goals
Application Layer:
▪ This layer contains the Wireless Application Environment (WAE)
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
▪ It defines the user interface on the phone It contains WML and WTA (Wireless
Telephony Application)
▪ WML script
▪ Content formats
2. Session Layer:
3. Transaction Layer:
This layer contains Wireless Transaction Protocol (WTP)
4. Security Layer:
This layer contains Wireless Transaction Layer Security (WTLS).
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Features
• Data Integrity
• Privacy
• Authentication
5. Transport Layer:
This layer contains Wireless Datagram Protocol (WDP).
• THE WAP datagram protocol is the transport layer that sends and receives messages
via any available bearer n/w including SMS ,USSD,IS-136 packet data and GPRS
• Operates above the data capable bearer services supported by various n/w types
• Provides a common interface to the upper layer protocols and hence they function
independent of the underlying wireless n/w
Bearers:
• Differing levels of quality of services with respect to throughput error rate and delays
• WAP protocols are designed to compensate for tolerate these varying levels of service
• WAP specification lists the bearers that are supported and techniques used to allow
WAP protocols to run over each bearer.
• It takes care of the small screen and the low bandwidth of transmission
• WAP sites are written in WML while websites are written in HTML
• It is similar to HTML, both of them use tags and written in plain text format
• The main difference between HTML and WML is that of basic unit of navigation in
HTML is a page while that in WML is a card
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• A WML contains multiple cards and they form a deck
• When a WML page is accessed from a mobile phone all the cards in the page are
downloaded from WML server
• So if the user goes to another card of the same deck the mobile browser does not have
to send any request to the server since the files that contains the deck is already stored
in wireless device
• You can put links text images i/p fields many other elements in the cards
<?xml version="1.0"?>
<wml>
<p>
Welcome to WML!
</p>
</card>
</wml>
• Date rates of :
9.6 Kbps or higher for global (mega cell),144 Kbps or higher for vehicular(macro
cell),384 Kbps or higher for pedestrian (micro cell) and up to 2 Mbps for indoor environments
(pico cell)
• Multiple environments, that are not only confined to cellular, but also includes cellular,
cordless, satellite, LANs, wireless Local loop (WLL)
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Wide range of telecommunications services (voice, data, multimedia etc)
• Common spectrum for IMT 2000 world-wide is from 1.8 GHz-2.2 GHz band or
• For Uplink: 1885-2025 MHz (Mobile satellite services) Downlink: 2110-2200 MHz
(Mobile satellite services)
• The term is used in contrast to the competitive CDMA system, CDMA2000 and its
predecessor cdmaOne, which make use of radio channels of 1.25 MHz width
• Common spectrum for IMT 2000 world-wide is from 1.8 GHz-2.2 GHz band or
• For Uplink: 1885-2025 MHz (Mobile satellite services) Downlink: 2110-2200 MHz
(Mobile satellite services)
• The term is used in contrast to the competitive CDMA system, CDMA2000 and its
predecessor cdmaOne, which make use of radio channels of 1.25 MHz width.
• Chip rate: 3.84 Mcps can be extended to 8.192 or 16.384 Mcps (Megachips per second)
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Code division multiple access ( CDMA 2000 )
• Features of CDMA 2000
• It supports much higher data rates as compared to those of 2G and 2.5G systems.
• Fundamental principle is the high speed data packet network designed for mobility
using internet protocol.
• It has improved capabilities over W-CDMA at each cell can be introduced without
changing the base station entirely.
• Number of users that can be supported by 3G CDMA 2000 is almost twice the users
supported by 2G CDMA system.
• W-CDMA
• IMT 2000
• CDMA 2000
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
COMPARISON BETWEEN 3G and 4G
Parameters 3G Technology 4G Technology
Switching Techniques It utilises the packet It utilises both the message switching as
switching technique. well as the packet switching techniques.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Quality of Service in 3G Communication
• Network Services are considered end-to-end, this means from a Terminal Equipment
(TE) to another TE. An End-to-End Service may have a certain Quality of Service (QoS)
which is provided for the user of a network service.
• It is the user that decides whether he is satisfied with the provided QoS or not. To
realise a certain network QoS a Bearer Service with clearly defined characteristics and
functionality is to be set up from the source to the destination of a service.
• A bearer service includes all aspects to enable the provision of a contracted QoS.
1. Conversational class
2. Streaming class
3. Interactive class
4. Background class
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
3.5. UMTS
Features /Specifications of UMTS
• Frequency spectrum: Uplink 1920-1980 MHz
• It gives signals of higher voice and data quality and also small bit-error rates.
• It can operate in multiple radio environments such as cellular, cordless, satellite, LAN
etc.
UMTS architecture
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• User Equipment (UE):
The User Equipment or UE is the name given to what was previous termed the mobile, or
cellphone.
The new name was chosen because the considerably greater functionality that the UE could
have.
It provides and manages the air interface for the overall network.
• Core Network:
The core network provides all the central processing and management for the system. It is the
equivalent of the GSM Network Switching Subsystem or NSS.
The core network is then the overall entity that interfaces to external networks including the
public phone network and other cellular telecommunications networks.
UMTS system uses the same core network as the GPRS and uses entirely new radio
interface.
The new radio network in UMTS is called UTRAN (UMTS Terrestrial Radio Access Network)
and is connected to the core network (CN) of GPRS via Iu interface.
The Iu is the UTRAN interface between the Radio network controller RNC and CN.
The Node-B are the equivalent of BTS in GSM and typically serve a cell site.
Several Node-Bs are controlled by a single RNCs over the Iub interface.
The packet switched data is transmitted through Iu-PS interface and circuit switched data is
transferred over Iu-CS interface.
One of the new interfaces in UTRAN is Iur interface which connects two RNCs and has no
equivalent in GSM system.
The Iur interface facilitates handling of 100 percent of RRM (Radio Resource Management)
and eliminates the burden from CN.
UMTS also supports GSM mode connections in which case the MS connect to the CN through
Um interface to BSS and BSS connects through A (Gb interface in GPRS) interface to CN.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Applications of UMTS
• Multimedia Messaging Service (MMS)
• Multimedia streaming
• Video telephony
• Computer Games
5. Migration paths.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
7. Supports multiple service performances.
Downlink – 1Gbps;
Uplink -300Mbps
Downlink -30bps/Hz;
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Uplink – 15bps / Hz
Features
1) Network based on the user experience.
6) For computing and achieving low latency, high mobility, high scalability and real time
executing.
4G Architecture
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• User Equipment (UE): It could be any device capable of establishing communication
functions like mobile phones, tabs, computers, etc.
• LTE mobile can connect with just one cell and one base station at a time. Main
operations performed by EBS(Evolved Base Station)
– Analog and digital processing functions of LTE air interface are used to transmit
and receive radio transmission to all the LTE-enabled devices.
• It communicates with internal and external packet data networks and IP multimedia
subsystem. It consists of following blocks:
– HSS: Home Subscriber Server holds all the information about all the network
operator’s subscribers in a central database.
– performs mobility anchoring and forward data between PDN Gateway and Base
Station.
Applications of 4G Technology
• 4G Ultra high speed internet access - E-mail or general web browsing is available
• 4G Data intensive interactive user services - Services such as online satellite mapping
will load instantly
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• 4G Multiple User Video conferencing - subscribers can see as well as talk to more than
one person.
• 4G Location-based services - a provider sends wide spread, real time weather or traffic
conditions to the computer or phone, or allows the subscriber to find and view nearby
businesses or friends whilst communicating with them
• 4G Video games on demand - a provider sends game data directly to the subscriber
where they can play in real time
VoLTE
• VoLTE stands for voice over Long Term Evolution.
• It is a digital packet voice service that is delivered over IP via an LTE access network.
Voice calls over LTE are recognised as the industry-agreed progression of voice services
across mobile networks, deploying LTE radio access technology
Benefits of VoLTE
• The implementation of VoLTE offers many benefits, both in terms of cost and operation.
• Eliminates the need to have Voice on one network and data on another;
• Unlocks new revenue potential, utilising IMS(IP Multimedia Subsystem) as the common
service platform;
• Can be deployed in parallel with video calls over LTE and RCS (Rich Communication
Services) multimedia services, including video share, multimedia messaging, chat and
file transfer;
• Ensures that video services are fully interoperable across the operator community, just
as voice services are, as demand for video calls grows;
• Delivers an unusually clear calling experience; and Provides rapid call establishment
time
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
5G Features
• Up to 10Gbps data rate - > 10 to 100x speed improvement over 4G and 4.5G networks
• 1-millisecond latency
• Packet switching
• CDMA multiplexing
• Up to 100x number of connected devices per unit area (compared with 4G LTE)
• 99.999% availability
• 100% coverage
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
QUESTIONS
1. What is Wireless application protocol? (4M)
3. Draw the WAP protocol stack and state the functions of any four protocols.
5. Compare WCDMA and CDMA 2000 on the basis of channel Bandwidth, Chip rate,
Duplex mode, Modulation, Frame length and Power Control rate
i) Data rate
ii) Bandwidth
17. iv)latency
18. v) Mobility
20. Draw the architecture of UMTS and explain function of each block (6 M)
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Unit IV: WLL, Signal encoding techniques
and Spread spectrum modulation(10 Marks)
Microwave wireless link can be used to create a wireless local loop such as shown in figure.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
PSTN:
It is Public Switched Telephone Network which is a circuit switched network. It is a collection of
world’s interconnected circuit switched telephone networks.
Switch Function:
WANU:
It is short for Wireless Access Network Unit.
It is present at the local exchange office. All local WASUs are connected to it.
• Authentication,
• Routing,
ii. WLL Controller: It controls the wireless local loop component with WASU.
iv. HLR: It is short for Home Location Register. It stores the details of all local WASUs
WASU:
• It is short for Wireless Access Subscriber Units. It is present at the house of the
subscriber.
• It connects the subscriber to WANU and the power supply for it is provided locally
• WLL can greatly improve telecommunication facility and services in an expensive way.
• Faster deployment
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Lower deployment costs
Applications of WLL
There are two types of WLL :-
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Fiber backbone infrastructure consists of SONET, OC-12, OC-3, DS3 optical links, CO
equipments etc. Moreover NOC is interfaced with ATM, IP systems, PSTN and Internet.
• BS is interfaced with optical equipments on one side and wireless on the other.
• CPEs are installed at customer premises and are linked with BS using wireless
microwave links. They are available from multiple vendors.
• CPEs utilize multiple access schemes viz. TDMA, FDMA and CDMA for communication
with BSs in the LMDS network.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
The figure-2 depicts MMDS architecture.
• Hub consists of antenna tower, RF equipments, Modem, Router for connection with
internet and network management system (i.e. NMS).
• Customer side equipments include antenna, wireless modem, ethernet switch, PCs etc.
• Hub antenna tower receives wireless signals from multiple users similar to
P2MP (Point-to-multipoint communication) topology.
• Each user premise antenna and Hub antenna is connected with P2P (Point-to-point)
microwave link
• Fixed Wireless Terminal (FWT) units differ from conventional mobile terminal units
operating within cellular networks – such as GSM – in that a fixed wireless terminal or
desk phone will be limited to an almost permanent location with almost
no roaming abilities.
• The Fixed Wireless Terminal (FWT) will be wall mounted and provided with an indoor
type or outdoor type antenna depending on the location of the premises keeping in view
the strength of the radio signal to be transmitted and received.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• A conventional telephone instrument is connected to the wall set through a short
telephone cable. The wall set is powered by 230 V commercial A.C. supply available in
the subscriber’s premises.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
WT with mobility
• WT WLL is a communication system that connects
customers to the Landline network using radio
frequency signals instead of conventional copper
wires, for the full or part connection between the
subscriber and the exchange
• In accordance with the rules provided by the telephone commission, they are to assist
with number portability and provide all technical help as and when needed.
• Dialing parity:
• It is the responsibility of the local exchange carrier for providing dialing parity to all
telecommunication service providers without any possible delays and with all possible
assistance.
• They must comply to the standards and policies along with setting the monitoring
requirements as mentioned by the public service commission.
• Reciprocal compensation:
• In order to transport and end telecommunication services, arrangements for reciprocal
compensation must be made as needed.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
4.4. Line Coding Techniques
• Data as well as signals that represents data can either be digital or analog.
• At the sender side digital data are encoded into a digital signal and at the receiver side
the digital data are recreated by decoding the digital signal.
Line coding
Unipolar Polar Bipolar
Differential
NRZ NRZ RZ Machester NRZ (AMI)
Manchester
RZ NRZ-L RZ
NRZ-I Pseudoternary
Unipolar Signaling
• Unipolar signaling is also called as On-Off Keying or simply OK.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Unipolar Non-Return to Zero NRZ
In this type of unipolar signaling, a High in data is represented by a positive pulse called
as Mark, which has a duration T0 equal to the symbol bit duration. A Low in data input has no
pulse
• a High in data, though represented by a Mark pulse, its duration T0 is less than the
symbol bit duration.
• Half of the bit duration remains high but it immediately returns to zero and shows the
absence of pulse during the remaining half of the bit duration.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Polar Signaling
• Polar NRZ
• Polar RZ
• Polar NRZ
In this type of Polar signaling, a High in data is represented by a positive pulse,
while a Low in data is represented by a negative pulse. The following figure
depicts this well.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Polar RZ
a High in data, though represented by a Mark pulse, its duration T0 is less than the symbol bit
duration.
Half of the bit duration remains high but it immediately returns to zero and shows the absence
of pulse during the remaining half of the bit duration.
However, for a Low input, a negative pulse represents the data, and the zero level remains
same for the other half of the bit duration. The following figure depicts this clearly.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Bipolar Signaling
• This is an encoding technique which has three voltage levels namely +, - and 0. Such a
signal is called as duo-binary signal.
2. Bipolar RZ
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Manchester
In this Manchester encoding
1 is represented as high-to-low.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Modulation
• Modulation is the process of varying one or more properties of a periodic waveform
called the carrier signals with a modulating signal that digitally contains information to
be transmitted
• The process of varying any of the three characteristics as the Amplitude, Frequency or
the Phase of a carrier signal is called as modulation
• In this modulation, the amplitude of the carrier signal varies in accordance with the
message signal, and other factors like phase and frequency remain constant.
In digital modulation, a message signal is converted from analog to digital message, and then
modulated by using a carrier wave
Digital Modulation
In Amplitude shift keying, the amplitude of the carrier signal is varied to create signal elements.
Both frequency and phase remain constant while the amplitude changes.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Amplitude Shift Keying Principle
ASK Modulator
ASK Demodulator
• The digital signal from the computer acts as the modulating signal
• The ASK modulator is nothing but a multiplier followed by a band pass filter.
• Due to the multiplication, the ASK output will be present only when a binary “1” is to be
transmitted
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• The ASK output corresponding to a binary “0” is zero.
In this technique, the sine wave carrier takes two phase reversals such as 0° and 180°.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• PSK is used to represent digital information, such as binary digits zero (0) and one (1).
The modulation of PSK is done using a balance modulator, which multiplies the two signals
applied at the input.
• Here, the carrier undergoes two phase reversal such as 0° and 180°
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• In Frequency shift keying, the frequency of the carrier signal is varied to create signal
elements.
• Both amplitude and phase remain constant while the frequency changes
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Types of Modulation
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Pulse Code Modulation (PCM)
• Pulse code Modulation is used to convert Analog Signals into Digital Data
• Steps:
1. Sampling:
• In PCM first we do sampling to convert analog signal into discrete signal
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Number of samples of the signal are taken at regular intervals at a higher frequency of
signal
• 2. Quantization: After that we do quantization to convert discreet signal into digital signal
• 3. Line coding:
• Binary digits are then transferred into digital signal using digital to digital encoding
techniques
2. Quantization
• The digitization of analog signals involves the rounding off of the values which are
approximately equal to the analog values.
• The method of sampling chooses a few points on the analog signal and then these
points are joined to round off the value to a near stabilized value.
Advantages
• Pulse Code Modulation is used in long-distance communication.
• Efficient method.
Disadvantages
• The bandwidth requirement is high.
• PCM is a complex process, since it involves encoding, decoding and quantisation of the
circuit
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Differential Pulse Code Modulation (DPCM)
• PCM is a straightforward system, but it is not very efficient as it generates
many bits and thus requires so much bandwidth.
• This technique samples the analog signal and then quantizes the difference between
the sampled value and its predicted value
• Since this difference (prediction error) is much smaller than the sample value, fewer bits
are required to quantize it.
• This means that DPCM can achieve performance levels at lower bit rates than PCM
Delta Modulation
• A modulation technique that converts or encodes message signal into a binary bit
stream is known as Delta Modulation
• Delta Modulation is a simplified form of DPCM technique, also viewed as 1-bit DPCM
scheme.
• Here only 1 bit is used to encode 1 voltage level thus, the technique allows transmission
of only 1 bit per sample.
• The type of modulation, where the sampling rate is much higher and in which the step
size (Δ delta) after quantization is of a smaller value, such a modulation is termed
as delta modulation.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Features of Delta Modulation
• An over-sampled input is taken to make full use of the signal correlation.
• It is a 1-bit quantizer.
• As only 1 bit is transmitted per sample, the ultimate transmission rate required is very
much less as compared to PCM
• When the value of delta is large, granular noise is seen, which is a type of noise.
Quantization Error & Depends on Level Present but less Slope overload
Distortion than PCM distortion and
Granular Noise
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Bandwidth for Highest Lesser than Lowest
transmission PCM
Area of Application Audio and Video Telephony Speech & Video Speech and Images
– The bandwidth of the transmitted signal is much greater than the bandwidth of
the original message is known as Spread Spectrum
• The signals modulated with these techniques are hard to interfere and cannot be
jammed.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Frequency Hopping Spread Spectrum (FHSS)
• This is frequency hopping technique, where the users are made to change the
frequencies of usage, from one to another in a specified time interval, hence called
as frequency hopping.
• The amount of time spent on each frequency hop is called as Dwell time.
• For example, a frequency was allotted to sender 1 for a particular period of time.
• Now, after a while, sender 1 hops to the other frequency and sender 2 uses the first
frequency, which was previously used by sender 1.
• The frequencies of the data are hopped from one to another in order to provide a secure
transmission.
▪ Slow Hopping:
In slow hopping, multiple bits are transmitted on a particular or same frequency
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
▪ Fast Hopping:
In fast hopping, individual bits are split and are transmitted on different frequencies
Advantages of FHSS:
• Secure
• High efficiency
Disadvantages:
• Less Robust
• This chipping code is nothing but the spreading code which is multiplied with the original
message and transmitted.
• The receiver uses the same code to retrieve the original message.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• FHSS
– Bluetooth
• DSSS
– CDMA
– GPS
– LAN Technology
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Questions
1. Explain the principle of working of ASK and BPSK with suitable waveforms for the bit
sequence 110101100. (S-2022)
5. Differentiate between PCM and DPCM on the basis of Bitrate, quantization Error &
Distortion, Application and Feedback
i) RZ Bipolar
ii)AMI
iii)Manchester
iv)NRZ-unipolar
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
10. Draw the labeled wireless local loop architecture and list the two functions of each
i) WANU ii) WASU
12. Explain the working principle of ASK and FSK with suitable waveforms using the given
bit sequence 10110
i) Unipolar RZ
iii)AMI
iv)Manchester
v) Polar RZ
vi)Polar NRZ
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
UNIT-V Mobile Ad-hoc Network & Wireless
Sensor Network (16 Marks)
ADHOC NETWORK
A kind of Wireless Network which can be designed for fulfilling particular purposes that is
served by establishment of the whole setup on the fly.
Various Types:
5.1. MANET
• A Mobile Adhoc Network (MANET) is a continuously self-configuring, infrastructure-less
network of mobile devices connected without wires.
• Each mobile node is equipped with a wireless transmitter and receiver with an antenna.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Topology preferably suitable for MANET is dynamic autonomous topology
2. Dynamic topologies: The network topology may change randomly and unpredictably as
nodes are free to move arbitrarily; thus, links may be bidirectional or unidirectional.
3. Autonomous Behavior: Each node can act as a host and router, which shows its
autonomous behavior.
In MANET mobile devices can communicate and send data to each other autonomously, no
hardware or physical infrastructure is involved;
Each node behaves as a router and they forward traffic to other specified nodes in the network
8. Energy-Constrained Operation:
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Mobile nodes are characterized by less memory, less power, and lightweight features.
Therefore, almost all the nodes rely on batteries or other exhaustible means for their energy
MANET Topologies
• MANET may operate as standalone fashion or they can be the part of larger internet.
• They form highly dynamic autonomous topology with the presence of one or multiple
different transceivers between nodes.
• Autonomous Behavior:
• Each node can act as a host and router, which shows its autonomous behavior.
Types of MANET
1. Vehicular Ad hoc Network (VANETs) –
Enable effective communication with another vehicle or with the roadside equipments.
2. Intelligent vehicular ad hoc networks(InVANETs) deals with another vehicle or with the
roadside equipment.
4. Here peer can join or leave the network without destroying it.
6. Hub-Spoke MANET:
Multiple sub MANET’s may be connected in hub-spoke VPN to create a geographically
distributed MANET.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
7. Normal Ad-hoc routing algorithm does not apply directly.
Advantages
• Separation from central network administration.
• Each nodes can play both the roles ie. of router and host showing autonomous nature.
• Self configuring and self healing nodes, does not require human intervention.
Disadvantages
• Resources are limited due to various constraints like noise, interference conditions, etc.
• The effect of fading, multiple accesses, interference condition is very low in ADHOC
networks in comparison to maximum radio transmission rate.
2. Dynamic topology - Due to dynamic topology the nodes has less trust between
them.
3. High Routing - In ADHOC networks due to dynamic topology some nodes changes
their position which affects the routing table
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
6. Mobility –
Due to the dynamic behaviour and changes in the network topology by the movement of the
nodes ,ADHOC networks faces path breaks and it also changes in the route frequently.
7. Security threats –
New security challenges bring by Adhoc networks due to its wireless nature.
In Adhoc networks or wireless networks the trust management between the nodes leads to the
numerous security attacks
Applications of MANET
1. Personal area networking - cell phone, laptop, ear phone, wristwatch
• These networks certainly cover a huge number of spatially distributed, little, battery-
operated, embedded devices that are networked to caringly collect, process, and
transfer data to the operators, and it has controlled the capabilities of computing &
processing. Nodes are the tiny computers, which work jointly to form the networks.
• The sensor node is a multi-functional, energy efficient wireless device. The applications
of motes in industrial are widespread.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• A collection of sensor nodes collects the data from the surroundings to achieve specific
application objectives. The communication between motes can be done with each other
using transceivers.
• In a wireless sensor network, the number of motes can be in the order of hundreds/
even thousands. In contrast with sensor n/ws, Ad Hoc networks will have fewer nodes
without any structure.
• A WSN system incorporates a gateway that provides wireless connectivity back to the wired
world and distributed nodes
Sensors: Sensors are used by wireless sensor nodes to capture data from their environment.
They are hardware devices that produce a measurable response to a change in a physical
condition Like temperature or pressure.
• Sensors are classified into two categories: Passive and Active sensors.
§ Passive sensors sense the data without actually manipulating the environment by active
probing. They are self-powered, that is, energy is needed only to amplify their analog signal.
§ Active sensors actively probe the environment, for example, a sonar or radar sensor, and
they require continuous energy from a power source.
Microcontroller: The controller performs tasks, processes data and controls the functionality of
other components in the sensor node. While the most common controller is a microcontroller,
other alternatives that can be used as a controller are: a general purpose desktop
microprocessor, digital signal processors, FPGAs (Field Programmable Gate Array) and ASICs
(Application Specific Integrated Circuits).
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
— Digital signal Processors may be chosen for broadband wireless communication
applications, but in Wireless Sensor Networks the wireless communication is often modest:
i.e., simpler, easier to process modulation and the signal processing tasks of actual sensing of
data is less complicated
— Transceivers:
Sensor nodes often make use of ISM band, which gives free radio, spectrum allocation and
global availability.
The possible choices of wireless transmission media are radiofrequency (RF), optical
communication (laser) and infrared.
— Memory:
Flash memories are used due to their cost and storage capacity. Memory requirements are
very much application dependent.
— Power source:
Two power saving policies used are Dynamic Power Management (DPM) and Dynamic
voltage Scaling (DVS).
DPM conserves power by shutting down parts of the sensor node which are not currently used
or active.
DVS scheme varies the power levels within the sensor node depending on the non-
deterministic workload
2. Clustered Architecture
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• The 5 layers are:
1. Application Layer–
Responsible for traffic management and provide software for different applications that
translate the data in an understandable form or send queries to obtain certain information
2. Transport Layer-
The function of this layer is to provide reliability and congestion avoidance where a lot of
protocols designed to provide this function are either applied on the upstream or downstream.
3. Network Layer-
The major function of this layer is routing, handling the major challenges are in the power
saving, limited memory and buffers, sensor does not have a global ID and have to be self
organized.
The basic idea of the routing protocol is to define a reliable path and redundant paths.
Responsible for multiplexing data streams, data frame detection, MAC, and error control,
ensure reliability of Point–point or point– multipoint. Errors or unreliability comes from.
5. Physical Layer –
Responsible for frequency selection, carrier frequency generation, signal detection, Modulation
and data encryption
These layers are used to manage the network and make the sensors work together in order to
increase the overall efficiency of the network
• Node can keep track of neighbors and power levels (for power balancing )
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• In Clustered Network Architecture, Sensor Nodes autonomously clubs into groups
called clusters.
It is based on the Leach Protocol which makes use of clusters. Leach Protocol stands for Low
Energy Adaptive Clustering Hierarchy.
• It is a distributed algorithm for organizing the sensor nodes into groups called clusters.
• The cluster head nodes in each of the autonomously formed clusters create the Time-
division multiple access (TDMA) schedules.
• It makes use of the concept called Data Fusion which makes it energy efficient
• Cross-layer design
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Some mobility of nodes and Heterogeneity of nodes
• Apt for the non-reachable places like mountains, over the sea, rural areas and deep
forests.
• Wireless sensor networks may comprise of numerous different types of sensors like low
sampling rate, seismic, magnetic, thermal, visual, infrared, radar, and acoustic, which
are clever to monitor a wide range of ambient situations.
• Military Applications
• Health Applications
• Environmental Applications
• Home Applications
• Commercial Applications
• Area monitoring
• Environmental/Earth sensings
• Landslide detection
• Industrial monitoring
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
Q. Explain the energy constraints in sensor nodes in WSN and name the
protocols to design energy efficiency in WSN
• Wireless sensor node is microelectronic device means it is equipped with a limited number
of power source.
• Due to this reason researchers are focusing on the design of power aware protocols and
algorithm for sensors network.
• Protocol used:
• Hierarchal routing protocols are considered more energy efficient when compared with flat
and location based routing protocols.
• A number of hierarchal based energy efficient routing protocols have been referred to in the
literature review such as LEACH , TEEN and APTEEN , PEGASIS , MECN and SMECN ,
SOP , HPAR , VGA , Sensor Aggregate, TTDD , Energy Efficient Self-Healing , Energy
Efficient Position Based , and CELRP.
As all the data flows through the hub, it plays an important role in the
network and a failure in the hub can result in failure of entire network
• Tree Topology -
A tree topology is a hierarchical network where
there is a single root node at the top and this
node is connected to many nodes in the next
level and this continues.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
• Mesh Topology –
In mesh topology, apart from
transmitting its own data, each
node also acts as a relay for
transmitting data of other
connected nodes.
Depending on characteristics and functionalities of sensor nodes there are various clustering
algorithms.
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
i)Heuristic Algorithms: It refers to finding algorithm with reasonable runtime and the
optimal solution eg Linked Cluster Algorithm (LCA)
ii) Weighted algorithms: These algorithms use a combination of metrics such as the
remaining energy, transmission Power etc to satisfy more generalized goals than single
criterion protocols
iii) Hierarchical Algorithms: In this there is a competition in the CH selection for a given
round
Eg LEACH, HEED
iv) Grid Algorithms: In the grid algorithm one of the sinks(primary sink) dynamically and
randomly builds the cluster Grid. The CHs are arranged in a grid like manner
Eg. Power efficient Gathering in Sensor Information Systems (PEGASIS) and GROUP are grid
algorithm
eg. HEED(Hybrid Energy Efficient Distributed Clustering) and LEACH (Low Energy Adaptive
Clustering Hierarchy protocol)
ii) Variance Convergence Time Algorithms: These algorithms enable more control of
the cluster properties than the constant time it has suitability for networks which have a large
number of nodes
Depending on the parameters which will be used for the cluster heads selection and the
clusters formation the distributed algorithms are classified into 4 subtypes namely
Probabilistic approach: Clustering relies upon pre-assigned probability values for sensor nodes
eg LEACH, EEHC (Energy Efficient Hierarchical Clustering) and HEED
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)
ii) Centralized Clustering Algorithms:
With the help of vector quantization, in this method the base station node manages the
clustering.
The criteria for CH selection and cluster formation based on the nodes proximity and on the
information received from other closely located nodes
Eg.
LEACH-C
QUESTIONS
1. Draw the MANET Topology and explain. State two applications of MANET. (S-2022)
2. Draw the block diagram of a sensor node in WSN and state the function of various
components (S-2022)
6. Draw the block diagram of a sensor node in WSN and state the function of various
components
Prepared by: Ms. M. S. Karande Wireless and Mobile Networks (Sub Code: 22622)