0% found this document useful (0 votes)
7 views216 pages

Mobile Communication and Computing

The document outlines the syllabus for the Mobile Communication & Computing course (CSC702) for Semester VII of Computer Engineering at Mumbai University. It details the course objectives, outcomes, modules, and topics covered, including mobile networking, GSM, WLAN, and LTE. The book is authored by Dipali Y. Koshti and Nikahat Mulla and is dedicated to the memory of Late Shri. Pradeepji Lunawat.

Uploaded by

mgmevents45
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views216 pages

Mobile Communication and Computing

The document outlines the syllabus for the Mobile Communication & Computing course (CSC702) for Semester VII of Computer Engineering at Mumbai University. It details the course objectives, outcomes, modules, and topics covered, including mobile networking, GSM, WLAN, and LTE. The book is authored by Dipali Y. Koshti and Nikahat Mulla and is dedicated to the memory of Late Shri. Pradeepji Lunawat.

Uploaded by

mgmevents45
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 216

Mobile Communication &

Computing
(Code : CSC702)

(Semester VII : Computer Engineering)


(Mumbai University)

g e
io led
ic ow

Strictly as Per the Choice Based Credit and Grading System (Rev. 2016)
n
of Mumbai University w.e.f Academic Year 2019-2020
bl kn
at
Pu ch
Te

Dipali Y. Koshti Nikahat Mulla


Assistant Professor, Assistant Professor,
Department of Computer Engineering Department of Computer Engineering,
Fr. Conceicao Rodrigues College of Fr. Conceicao Rodrigues College of Engg.
Engg.(Fr.CRCE), Mumbai, (Fr.CRCE), Mumbai,
Maharashtra, India. Maharashtra, India.

(Book Code : MO81A)


Mobile Communication & Computing
Dipali Y. Koshti, Nikahat Mulla
(Semester VII : Computer Engineering) (Mumbai University)

Copyright © by Authors. All rights reserved. No part of this publication may be reproduced, copied, or stored in a
retrieval system, distributed or transmitted in any form or by any means, including photocopy, recording, or other
electronic or mechanical methods, without the prior written permission of the publisher.

This book is sold subject to the condition that it shall not, by the way of trade or otherwise, be lent, resold, hired out, or
otherwise circulated without the publisher’s prior written consent in any form of binding or cover other than which it is
published and without a similar condition including this condition being imposed on the subsequent purchaser and
without limiting the rights under copyright reserved above.

g e
io led
First Edition : July 2019
ic ow

This edition is for sale in India, Bangladesh, Bhutan, Maldives, Nepal, Pakistan, Sri Lanka and designated countries in
South-East Asia. Sale and purchase of this book outside of these countries is unauthorized by the publisher.
n
bl kn
at
Pu ch

ISBN 978-93-89424-36-2
Te

Published by
TechKnowledge Publications

Head Office : B/5, First floor, Maniratna Complex,


Taware Colony, Aranyeshwar Corner,
Pune - 411 009. Maharashtra State, India
Ph : 91-20-24221234, 91-20-24225678.

[CSC702] (FID : MO81) (Book Code : MO81A)

(Book Code : MO81A)


We dedicate this Publication soulfully and wholeheartedly,
in loving memory of our beloved founder director
Late Shri. Pradeepsheth Lalchandji Lunawat,
who will always be an inspiration, a positive force and strong support
behind us.

g e
io led
ic ow
n
bl kn
at
Pu ch
Te

Lt. Shri. Pradeepji L. Lunawat

Soulful Tribute and Gratitude for all Your


Sacrifices, Hardwork and 40 years of Strong Vision…….
Preface

Dear Students,

We are extremely happy to come out with this edition of “Mobile Communication &

Computing” for you. We have divided the subject into small chapters so that the topics can be

e
arranged and understood properly. The topics within the chapters have been arranged in a proper

g
io led
sequence to ensure smooth flow and understanding of the subject.

We present this book in the loving memory of Late Shri. Pradeepji Lunawat, our source
ic ow

of inspiration and a strong foundation of “TechKnowledge Publications”. He will always be


n
bl kn

remembered in our hearts and motivate us to achieve our new milestone.


at
Pu ch

We are thankful to Prof. Arunoday Kumar, Mr. Shital Bhandari & Shri. Chandroday Kumar

for the encouragement and support that they have extended. We are also thankful to the staff
Te

members of TechKnowledge Publications and others for their efforts to make this book as good as it

is. We have jointly made every possible efforts to eliminate all the errors in this book. However if

you find any, please let us know, because that will help us to improve the book quality further.

We are also thankful to our family members and friends for their patience and

encouragement.

- Authors


(Book Code : MO81A)


SYLLABUS

Course Code Course Name Credits

CSC702 Mobile Communication & Computing 4

Course Objectives (CO) :

1. To introduce the basic concepts and principles in mobile computing. This includes major techniques
involved, and networks & systems issues for the design and implementation of mobile computing systems and
applications.

e
2. To explore both theoretical and practical issues of mobile computing.

3.

g
To provide an opportunity for students to understand the key components and technologies involved and to gain
io led
hands-on experiences in building mobile applications.

Course Outcomes : On successful completion of course learner will be able :


ic ow

1. To identify basic concepts and principles in mobile communication & computing, cellular architecture.
n
2. To describe the components and functioning of mobile networking.
bl kn

3. To classify variety of security techniques in mobile network.


4. To apply the concepts of WLAN for local as well as remote applications.
at
Pu ch

5. To describe and apply the concepts of mobility management


6. To describe Long Term Evolution (LTE) architecture and its interfaces.
Te

Pre-requisites : Computer Networks

Module Unit
Topics Hrs.
No. No.

1.0 1.1 Introduction to Mobile Computing, Telecommunication Generations, Cellular systems, 6

1.2 Electromagnetic Spectrum, Antenna ,Signal Propagation, Signal Characteristics,


Multiplexing, Spread Spectrum: DSSS & FHSS

2.0 2.1 GSM Mobile services, System Architecture, Radio interface, Protocols , Localization and 10
Calling, Handover, security (A3,A5 & A8)

2.2 GPRS system and protocol architecture

2.3 UTRAN , UMTS core network ; Improvements on Core Network,

3.0 3.1 Mobile Networking : Medium Access Protocol, Internet Protocol and Transport layer 12

3.2 Medium Access Control: Motivation for specialized MAC, , Introduction to multiple
Access techniques (MACA)

(Book Code : MO81A)


Module Unit
Topics Hrs.
No. No.

3.3 Mobile IP: IP Packet Delivery, Agent Advertisement and Discovery, Registration,
Tunneling and Encapsulation, Reverse Tunneling, Routing (DSDV,DSR)

3.4 Mobile TCP : Traditional TCP, Classical TCP Improvements like Indirect TCP, Snooping
TCP & Mobile TCP, Fast Retransmit/ Fast Recovery, Transmission/Timeout Freezing,
Selective Retransmission

4.0 4.1 Wireless Local Area Networks : Introduction, Infrastructure and ad-hoc network 08

4.2 IEEE 802.11:System architecture , Protocol architecture, Physical layer, Medium access
control layer, MAC management, 802.11a, 802.11b

4.3 Wi-Fi security : WEP ,WPA, Wireless LAN Threats, Securing Wireless Networks

e
HiperLAN 1 & HiperLAN 2

g
4.4 io led
4.5 Bluetooth: Introduction, User Scenario, Architecture, protocol stack

5.0 5.1 Mobility Management : Introduction, IP Mobility, Optimization, IPv6 06


ic ow

5.2 Macro Mobility : MIPv6, FMIPv6,


n
5.3 Micro Mobility: CellularIP, HAWAII, HMIPv6,
bl kn

6.0 6.1 Long-Term Evolution (LTE) of 3GPP : LTE System Overview, Evolution from UMTS to 10
LTE
at
Pu ch

6.2 LTE/SAE Requirements, SAE Architecture


Te

6.3 EPS: Evolved Packet System, E-UTRAN, Voice over LTE (VoLTE), Introduction to LTE-
Advanced,

6.4 System Aspects, LTE Higher Protocol Layers, LTE MAC layer, LTE PHY Layer,

6.5 Self Organizing Network (SON-LTE),SON for Heterogeneous Networks (HetNet),


Introduction to 5G

Total 52



(Book Code : MO81A)


Mobile Communication & Computing (MU-Sem. 7-Comp) 1 Table of Contents

UNIT I 1.7.5 Code Division Multiplexing (CDM)..............................1-24

1.8 Spread Spectrum Techniques ...................................1-25


Chapter 1 : Introduction to Mobile Computing
1-1 to 1-33 1.8.1 Direct Sequence Spread Spectrum (DSSS)...............1-26

1.8.2 Frequency Hopping Spread Spectrum (FHSS) ..........1-30


Syllabus :
1.8.3 Comparison between DSSS and FHSS .....................1-32
Introduction to Mobile Computing, Telecommunication
Generations, Cellular systems, Electromagnetic Spectrum, UNIT II
Antenna, Signal Propagation, Signal Characteristics, Multiplexing,
Spread Spectrum : DSSS & FHSS Chapter 2 : GSM 2-1 to 2-40

1.1 Telecommunication Generations ................................ 1-1 Syllabus :

1.2 Cellular Systems......................................................... 1-5 GSM Mobile services, System Architecture, Radio interface,

1.2.1 Frequency Reuse in Cellular Systems ........................ 1-5 Protocols , Localization and Calling, Handover, security (A3,A5 &

e
A8), GPRS system and protocol architecture, UTRAN, UMTS core
1.2.1(a) Frequency Reuse Concept ......................................... 1-6 network; Improvements on Core Network.

g
1.2.1(b) Assignment of Frequencies to Cells ........................... 1-7 2.1 GSM ........................................................................... 2-1
io led
1.2.2 Advantages of Cellular Systems with Small Cells ....... 1-7 2.1.1 GSM Overview............................................................ 2-1

1.2.3 Disadvantages of Cellular System with Small Cells .... 1-8 2.1.2 Mobile Services .......................................................... 2-3
ic ow

1.2.4 Why Hexagonal Pattern is Preferred for Cellular 2.1.3 GSM System Architecture .......................................... 2-6
System ? .................................................................... 1-8 2.1.4 GSM Radio Interfaces ...........................................2-10
n
bl kn

1.2.5 Methods of Increasing Cell Capacity ........................... 1-9 2.1.5 GSM Protocols and Signaling Architecture ................2-12

1.2.6 Cellular System Using CDM ..................................... 1-10 2.1.6 Localization and Calling Description of the Call
at

Setup Procedure ........................................................2-14


Pu ch

1.3 Electromagnetic Spectrum ........................................ 1-11


2.1.6(a) Initialization................................................................2-15
1.4 Antennas .................................................................. 1-13
2.1.6(b) Registration and Location Update ..............................2-15
Te

1.4.1 Isotropic Antenna...................................................... 1-13 2.1.6(c) Mobile Terminated Call (MTC) ...................................2-17
1.4.2 Omnidirectional Antennas ......................................... 1-14 2.1.6(d) Mobile Originated Call (MOC) .................................2-19

1.5 Signal Propagation ................................................... 1-17 2.1.7 Handover in GSM ......................................................2-20

1.5.1 Path Loss of Radio Signals ....................................... 1-17 2.1.8 GSM Security ............................................................2-22

1.5.2 Additional Signal Propagation Effects ....................... 1-18 2.2 General Packet Radio System (GPRS) .....................2-24

2.2.1 Architecture ...............................................................2-26


1.5.3 Multi-path Propagation and Fading ........................... 1-18
2.2.2 GPRS Protocol Stack ................................................2-29
1.5.3(a) Multi-path propagation .............................................. 1-18
2.2.3 Comparison of GPRS architecture with GSM
1.5.3(b) Fading ...................................................................... 1-19 architecture................................................................2-30

1.6 Signal Characteristics ............................................... 1-20 2.3 UMTS Terrestrial Radio Active Network (UTRAN) .....2-31

1.7 Multiplexing............................................................... 1-21 2.3.1 UMTS (Universal Mobile Telecommunication


System) Core Network ..............................................2-31
1.7.1 Space Division Multiplexing (SDM) ........................... 1-21
2.3.2 UMTS System Architecture .......................................2-31
1.7.2 Frequency Division Multiplexing (FDM) ..................... 1-22
2.3.2(a) UTRA – FDD (W-CDMA) ...........................................2-35
1.7.3 Time Division Multiplexing (TDM).............................. 1-22
2.3.2(b) UTRA - TDD (TD-CDMA)...........................................2-38
1.7.4 Frequency and Time Division Multiplexing ................ 1-23 2.3.3 Improvement on Core Network ..................................2-40
Mobile Communication & Computing (MU-Sem. 7-Comp) 2 Table of Contents

UNIT III 3.3.8 Mobile IP and IPv6 ....................................................3-23

3.4 Routing ......................................................................3-24


Chapter 3 : Event Handling 3-1 to 3-44
3.4.1 Destination Sequence Distance Vector
Syllabus : Routing (DSDV) .........................................................3-26

Mobile Networking : Medium Access Protocol, Internet Protocol 3.4.2 Dynamic Source Routing (DSR) ................................3-28
and Transport layer, Medium Access Control : Motivation for 3.5 Mobile TCP ................................................................3-31
specialized MAC, Introduction to multiple Access techniques
3.5.1 Traditional TCP..........................................................3-31
(MACA), Mobile IP: IP Packet Delivery, Agent Advertisement and
Discovery, Registration, Tunneling and Encapsulation, Reverse 3.5.2 Classical TCP improvements .....................................3-33
Tunneling, Routing (DSDV,DSR), Mobile TCP : Traditional TCP,
3.5.2(a) Indirect TCP (I-TCP) ..................................................3-34
Classical TCP Improvements like Indirect TCP, Snooping TCP &
Mobile TCP, Fast Retransmit/ Fast Recovery, Transmission/ 3.5.2(b) Snooping TCP (S-TCP) .............................................3-36
Timeout Freezing, Selective Retransmission. 3.5.2(c) Mobile TCP (M-TCP) .................................................3-37

e
3.1 Mobile Networking ...................................................... 3-1 3.5.3 Fast Retransmit/Fast Recovery .................................3-39

g
3.1.1 Medium Access Protocols .......................................... 3-1 3.5.4 Transmission/ Time-out Freezing ..............................3-39

3.1.2
io led
Internet Protocols ....................................................... 3-1 3.5.5 Selective Retransmission ..........................................3-40

3.1.3 Transport Protocols .................................................... 3-2 3.5.6 Transaction oriented TCP (T/TCP) ............................3-40

3.2 Medium Access Control .............................................. 3-2


ic ow

3.5.7 Comparison of TCP Variants .....................................3-41

3.2.1 Motivation for Specialized MAC .................................. 3-2 3.6 IPv4 and IPv6 ............................................................3-42
n
3.2.1(a) Hidden Station Problem and Exposed Station UNIT IV
bl kn

Problem ...................................................................... 3-3

3.2.2 Multiple Access with Collision Avoidance (MACA) ...... 3-4 Chapter 4 : Networking Basics 4-1 to 4-48
at
Pu ch

3.3 Mobile IP .................................................................... 3-6 Syllabus :

3.3.1 Mobile IP : Basic Concept ........................................... 3-6 Wireless Local Area Networks : Introduction, Infrastructure and ad-
Te

3.3.1(a) Need for Mobile IP ...................................................... 3-6 hoc network, IEEE 802.11:System architecture, Protocol
architecture, Physical layer, Medium access control layer, MAC
3.3.1(b) Goals/Requirements of Mobile IP ............................... 3-6
management, 802.11a, 802.11b, Wi-Fi security : WEP, WPA,
3.3.1(c) Basic Terminology ...................................................... 3-7 Wireless LAN Threats, Securing Wireless Networks, HIPERLAN 1
and HIPERLAN 2, Bluetooth : Introduction, User Scenario,
3.3.2 IP Packet Delivery ...................................................... 3-9
Architecture, protocol stack
3.3.3 Agent Advertisement and Discovery ......................... 3-10
4.1 Wireless Local Area Networks .................................... 4-1
3.3.3(a) Agent Advertisement ................................................ 3-10
4.1.1 Introduction ................................................................. 4-1
3.3.3(b) Agent Solicitation ...................................................... 3-12
4.1.2 Types of WLAN .......................................................... 4-2
3.3.4 Registration .............................................................. 3-12
4.1.3 Difference between Ad-hoc Network and Infrastructure
3.3.5 Tunnelling and Encapsulation ................................... 3-15
based Wireless Networks ........................................... 4-3
3.3.5(a) IP-in-IP Encapsulation .............................................. 3-17
4.2 IEEE 802.11 ............................................................... 4-4
3.3.5(b) Minimal Encapsulation .............................................. 3-18
4.2.1 IEEE 802.11 System Architecture............................... 4-4
3.3.5(c) Generic Routing Encapsulation (GRE)...................... 3-18
4.2.2 IEEE 802.11 Protocol Architecture ............................. 4-6
3.3.5(d) Optimization ............................................................. 3-20
4.2.3 IEEE 802.11 Physical Layer ....................................... 4-8
3.3.6 Reverse Tunnelling ................................................... 3-21
4.2.3(a) Direct Sequence Spread Spectrum Physical Layer
3.3.7 Limitations of Mobile IP............................................. 3-22 (DSSS-PHY) ............................................................... 4-8
Mobile Communication & Computing (MU-Sem. 7-Comp) 3 Table of Contents

4.2.3(b) Frequency Hopping Spread Spectrum Physical Layer UNIT V


(FHSS – PHY) ............................................................ 4-9
Chapter 5 : Mobility Management 5-1 to 5-10
4.2.3(c) Infra Red Physical Layer ........................................... 4-10

4.2.4 IEEE 802.11 MAC Sublayer .................................... 4-10 Syllabus :

4.2.4(a) MAC Frame Format .................................................. 4-11 Mobility Management : Introduction, IP Mobility, Optimization,
IPv6; Macro Mobility : MIPv6, FMIPv6; Micro Mobility : CellularIP,
4.2.4(b) Access Mechanisms in IEEE 802.11 ........................ 4-13
HAWAII, HMIPv6
4.2.5 MAC Management .................................................... 4-18
5.1 Introduction to IP Mobility ........................................... 5-1
4.2.5(a) Synchronization in IEEE 802.11................................ 4-18 5.1.1 Mobile IP .................................................................... 5-1
4.2.5(b) Power Management in IEEE 802.11 ......................... 4-19 5.1.2 Optimization ............................................................... 5-2
4.2.5(c) Association/ Reassociation ......................................... 4-21 5.2 IPv6 – Internet Protocol Version 6 .............................. 5-4

4.2.5(d) MAC Management Information Base (MAC-MIB)...... 4-23 5.3 Macro Mobility ............................................................ 5-5

e
4.2.6 IEEE 802.11a ........................................................... 4-24 5.3.1 MIPv6 (Mobile IPv6) ................................................... 5-5

g 5.3.2 FMIPv6 (Fast Hand Over for Mobile IPV6) .................. 5-6
4.2.7
io led
802.11b .................................................................... 4-24

4.2.8 Comparison of Various IEEE 802.11x Standards ...... 4-25 5.4 Micro Mobility.............................................................. 5-6

4.3 Wi-Fi Security Standards .......................................... 4-25 5.4.1 Cellular IP ................................................................... 5-7
ic ow

4.3.1 WEP – Wired Equivalent Privacy .............................. 4-25 5.4.2 HAWAII ...................................................................... 5-9
n
5.4.3 HMIPv6 – Hierarchical Mobile IPv6 ............................5-10
4.3.2 WPA ......................................................................... 4-27
bl kn

4.3.3 Wireless LAN threats ................................................ 4-28 UNIT VI


at

4.3.4 Securing Wireless Network ....................................... 4-29 Chapter 6 : Long Term Evolution of 3GPP 6-1 to 6-32
Pu ch

4.4 HIPERLAN Standards .............................................. 4-31


Syllabus :
Te

4.4.1 HIPERLAN T-1 ......................................................... 4-31


Long-Term Evolution (LTE) of 3GPP : LTE System Overview,
4.4.1(a) HIPERLAN-1 MAC Sublayer ..................................... 4-32 Evolution from UMTS to LTE; LTE/SAE Requirements, SAE
Architecture; EPS: Evolved Packet System, E-UTRAN, Voice over
4.4.1(b) HIPERLAN-1 CAC Layer .......................................... 4-33
LTE (VoLTE), Introduction to LTE-Advanced; System Aspects,
4.4.1(c) HIPERLAN-1 Physical Layer .................................... 4-34 LTE Higher Protocol Layers, LTE MAC layer, LTE PHY Layer; Self
Organizing Network (SON-LTE),SON for Heterogeneous Networks
4.4.2 HIPERLAN -2 ........................................................... 4-35
(HetNet), Introduction to 5G
4.4.2(a) HIPERLAN-2 Physical Layer .................................... 4-37
6.1 Long Term Evolution : Overview ................................. 6-1
4.4.2(b) HIPERLAN-2 Data Link Control Layer ...................... 4-38
6.1.1 LTE System Overview ............................................... 6-1
4.5 Bluetooth .................................................................. 4-40
6.1.2 Evolution from UMTS to LTE ...................................... 6-1
4.5.1 Introduction ............................................................... 4-40
6.2 SAE/LTE Architecture................................................ 6-3
4.5.2 User Scenario ........................................................... 4-41
6.2.1 SAE Requirements ..................................................... 6-3
4.5.3 Architecture .............................................................. 4-41 6.2.2 SAE Architecture ........................................................ 6-3
4.5.4 Bluetooth Protocol Stack .......................................... 4-42 6.2.2(a) Evolved Packet System (EPS) ................................... 6-3

4.5.4(a) Bluetooth Baseband States ...................................... 4-45 6.2.2(b) The User Equipment (UE) .......................................... 6-3

4.6 Comparison of IEEE 802.11, HIPERLAN-1, 6.2.2(c) The E-UTRAN ............................................................ 6-4
HIPERLAN-2 and Bluetooth ...................................... 4-46
6.2.2 (d) Evolved Packet Core (EPC) (The core network) ......... 6-4
Mobile Communication & Computing (MU-Sem. 7-Comp) 4 Table of Contents

6.3 Voice over LTE (VoLTE) ............................................. 6-5 6.6.2 Logical Channels to Transport Channel Mapping.......6-18

6.4 Introduction to LTE-Advanced .................................... 6-7 6.6.3 Logical Channel Prioritization ....................................6-20

6.4.1 LTE Advanced Key Features ...................................... 6-7 6.6.4 Scheduling .................................................................6-20

6.4.2 LTE - Advanced : System Aspects ............................. 6-7 6.7 PHY Layer .................................................................6-20

6.4.2(a) Carrier Aggregation .................................................... 6-7 6.7.1 Generic Frame Structure ...........................................6-20

6.4.2(b) MIMO (Multiple Input and Multiple Output) .................. 6-9 6.7.2 Downlink Multiplexing ................................................6-21

6.4.2(c) Relay Nodes ............................................................... 6-9 6.7.3 Physical Channels .....................................................6-21

6.4.2(d) Coordinated Multipoint (CoMP) ................................. 6-10 6.7.4 Transport Channels ...................................................6-21

6.4.3 LTE Advanced Architecture ...................................... 6-11 6.7.5 Mapping Downlink Physical Channels to Transport
Channels ...................................................................6-22
6.4.3(a) Architecture .............................................................. 6-11
6.8 Self Organizing Network (SON-LTE)..........................6-22
6.4.3(b) Comparison of LTE and LTE-A ................................. 6-12

e
6.9 SON for Heterogeneous Networks (HetNet) ..............6-25
6.4.4 LTE Protocol Stack ................................................... 6-13

g
6.10 Introduction to 5G ......................................................6-28
6.5 Higher Protocol Layers ............................................. 6-15
io led
6.10.1 Overview....................................................................6-28
6.5.1 Radio Link Control (RLC) .......................................... 6-15
6.10.2 5GAA (Autonomous Association) ..............................6-29
6.5.2 Packet Data Convergence Protocol (PDCP) ............. 6-16
ic ow

6.10.3 The Key Technology : C-V2X (Cellular - Vehicle To


6.5.3 Radio Resource Control (RRC) ................................. 6-17
everything) .................................................................6-29
6.6 LTE MAC Layer ........................................................ 6-18
n
6.10.4 Applications of 5G Network........................................6-30
bl kn

6.6.1 Error Correction through Hybrid ARQ ....................... 6-18


6.10.5 Millimeter Wave .........................................................6-30

at
Pu ch
Te
11

Introduction to Mobile
1
1

Computing
1
1

Unit I
1
1
1
Syllabus

1.1 Introduction to Mobile Computing, Telecommunication Generations, Cellular systems,

1.2 Electromagnetic Spectrum, Antenna, Signal Propagation, Signal Characteristics, Multiplexing, Spread Spectrum :
DSSS & FHSS

e
1

g
io led
Introduction to mobile computing
ic ow

G5’W-q1(5234)WAF1WD1E1)q:PA5-5FS1)PE)1E--5UD1)NEAD2WDDW5A15910E)EL1B5W:q1EA0124-)W2q0WE1BWE1EAS1UWNq-qDD1qAE’-q01
0qBW:q1UW)P54)1PEBWAF1)51’q1:5AAq:)q01)51E19WRq013PSDW:E-1-WA8/1HPWD1:PE3)qN1’EDW:E--S1WA)N504:qD1)Pq1NqE0qN1UW)P1)Pq1’EDW:D1
n
59125’W-q1:5234)WAF1EA01:5224AW:E)W5A/1O)1E-D51:5BqND1)Pq1654NAqS1591UWNq-qDD1:5224AW:E)W5A19N521QX1)51%X1EA01195:4DqD1
bl kn

5A194A0E2qA)E-1ED3q:)D1591UWNq-qDD1)NEAD2WDDW5A1E)13PSDW:E-1-ESqN1D4:P1ED1DWFAE-DL1EA)qAAEL12504-E)W5AL124-)W3-qRWAF/1G5D)1
591 )50ESzD1 UWNq-qDD1 )q-q:5224AW:E)W5A1 DSD)q2D1 ENq1 ’EDq01 5A1 )Pq1 :5A:q3)1 591 :q--4-EN1 DSD)q2D/1 ;W)P1 ’W--W5AD1 591 25’W-q1
at

3P5AqD1WA14Dq1EN54A01)Pq1F-5’q1)50ESL1W)1WD1Aq:qDDENS1)51Nq>4Dq1)Pq1EBEW-E’-q19NqV4qA:WqD12EAS1)W2qD15BqN1UW)P54)124)4E-1
Pu ch

WA)qN9qNqA:q15915Aq1:q--13P5Aq1)51EA5)PqN/1

1.1 Telecommunication Generations


Te

HPq195--5UWAF1Dq:)W5A10WD:4DDqD10W99qNqA)125’W-q1FqAqNE)W5AD1+QXL1ZXL1‘XL7X1EA01%XK/1
First Generation (1G) : 1980s
 <AE-5F1:q--4-EN1DSD)q2D1UqNq1)Pq19WND)1FqAqNE)W5A159125’W-q1)q-q3P5Aq1:5224AW:E)W5A1DSD)q2D/1
 HPqS14Dq1UvUbλMRBAW(<WvHzR)λ:<bUSkλvREA01HkAH<kSR-0kSHLW:1)q:PAWV4qD195N1B5W:q1)NEAD2WDDW5A/1
 HPq1WA0WBW04E-1:E--D14Dq010W99qNqA)19NqV4qA:WqD1EA01DPENq01)Pq1EBEW-E’-q1D3q:)N421)PN54FP1=NqV4qA:S1–WBWDW5A1G4-)W3-q1
<::qDD1+=–G<K/1
 QX1DSD)q213N5BW0q015A-S1B5W:q1:5224AW:E)W5A/1
 QX1UED1A5)1D4335N)WAF1N5E2WAF1’q)UqqA10W99qNqA)1Aq)U5N8153qNE)5ND1EA01:54A)NWqD/11
1 √RE23-qD1591QX1Aq)U5N8D1ENq1"1
o <GλY1+<0BEA:q01G5’W-q1λP5Aq1YSD)q2K1ФY<1
o TGH1+T5N0W:1G5’W-q1Hq-q3P5AqK1YUq0qA1
Second Generation (2G) – 2.5 Generation (2.5G) : 1990s
 HPq1Dq:5A01FqAqNE)W5A1+ZXK159125’W-q1:q--4-EN1D)EN)q01WA1)Pq1qEN-S1QUUVD/1
 O)1 UED1 :523-q)q-S1 0WFW)E-1 EA01 4Dq01 qW)PqN1 HW2q1 –WBWDW5A1 G4-)W3-q1 <::qDD1 +H–G<K1 5N1 (50q1 –WBWDW5A1 G4-)W3-q1 <::qDD1
+(–G<K/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-2 Introduction to Mobile Computing

 O)13N5BW0qD1WA:NqEDq01:E3E:W)S1EA01Dq:4NW)S104q1)51)Pq14DqD15910WFW)E-1:q--4-EN1)q:PA5-5FS/1
 ZX1DSD)q2D1D4335N)1WA)qNAE)W5AE-1N5E2WAF/1
 ZX1DSD)q2D1A5)15A-S13N5BW0q1’q))qN1B5W:q1V4E-W)S14DWAF10WFW)E-1B5W:q1)q-q3P5AS1’4)1E-D51E1AqU1NEAFq1591-5U10E)E1NE)q1
DqNBW:qD1D4:P1ED125’W-q1=ERL1B5W:q12EW-L1DP5N)12qDDEFq1DqNBW:q1+YGYK/1
 OA1E00W)W5A1)510WFW)E-1B5W:q1)q-q3P5ASL1(5N0-qDDL134’-W:125’W-q1NE0W5L1DE)q--W)q1EA01UWNq-qDD>-5:E-1ENqE1Aq)U5N81+;W<TK1
D5-4)W5AD1’qFEA1)51q2qNFq/1
2.5G
 Xq)UqqA1ZX1EA01‘X1)PqNq1UED1A5)124:P1:PEAFq1WA1)Pq1)q:PA5-5FS1PqA:q1EA1WA)qN2q0WENS13PEDqL1Z/%X1UED1WA)N504:q01
WA1)Pq1-E)q1QUUVD/R
 >DEx1 WD1 4Dq01 )51 0qD:NW’q1 ZX>DSD)q2D1 )PE)1 PEBq1 W23-q2qA)q01 E1 3E:8q)>DUW):Pq01 052EWA1 WA1 E00W)W5A1 )51 )Pq1 :WN:4W)>
DUW):Pq01052EWA/R

e
XλYY1+XqAqNE-1λE:8q)1YE0W51YqNBW:qK1WD1E1ZX1DqNBW:qL1UPW:P10q-WBqND13E:8q)>DUW):Pq010E)E1:E3E’W-W)WqD1)51qRWD)WAF1XYG1

g
Aq)U5N8D/1O)1E--5UD14DqND1)51DqA01FNE3PW:D>NW:P10E)E1ED13E:8q)D/1R

io led
HPq1W235N)EA:q15913E:8q)>DUW):PWAF1WA:NqEDq01UW)P1)Pq1NWDq1591)Pq1OA)qNAq)1EA01)Pq1OA)qNAq)1λN5)5:5-1+OλK/1R
 <A5)PqN1qRE23-q1591Z/%X125’W-q1)q:PA5-5FS1WD1√–X√1+√APEA:q01–E)E1NE)qD195N1XYG1√B5-4)W5AK/1√–X√13N5BW0qD10E)E1
NE)q1431)51‘Z718’3D1UPW:P1WD1PWFPqN1)PEA1XYG/1R
ic ow

Advantages of 2G over 1G

n
ZX1D)EA0EN0D1D4335N)1N5E2WAF1’q)UqqA10W99qNqA)153qNE)5ND1EA01:54A)NWqD/11

bl kn

OA1 E00W)W5A1 )51 :WN:4W)>DUW):Pq01 B5W:q1 DqNBW:qDL1 ZX1 qAE’-q01 )Pq1 9WND)1 UEBq1 591 25’W-q1 0E)E1 EA01 OA)qNAq)1 DqNBW:qDL1 A5U1
UW0q-S1E053)q01’S14DqND/1
at


Pu ch

Z/%X1DqNBW:qD1qAE’-q1PWFP1D3qq010E)E1)NEAD9qN15BqN143FNE0q01qRWD)WAF1ZX1Aq)U5N8D/11
Y52q1ZX1D)EA0EN0D1ENq1"1
o
Te

XYG+H–G<>’EDq0K1
o –><GλY1
o OY>U%[(–G<5Aq1
o λ–(+λqND5AE-1–WFW)E-1(q--4-ENK1
o λ\Y1+λqND5AE-1\EA0S1λP5Aq1YSD)q2K1
o \Y(Y–1+\WFP1Y3qq01(WN:4W)D1YUW):Pq01–E)EK1+Z/%K1
o XλYY1+XqAqNE-1λE:8q)1YE0W51YqNBW:qK1+Z/%K1
o √–X√1+√APEA:q01–E)E1NE)qD195N1X-5’E-1√B5-4)W5AK+Z/%K1
Third Generation (3G) - 2000
 HPq1)PWN01FqAqNE)W5A1+‘XK1DSD)q2D1D)EN)q01WA1ZVVV/1
 HPq1‘X1NqB5-4)W5A1E--5Uq0125’W-q1)q-q3P5Aq1:4D)52qND1)514Dq1E40W5L1FNE3PW:D1EA01BW0q51E33-W:E)W5AD/11
 ]BqN1‘X1W)1WD135DDW’-q1)51UE):P1D)NqE2WAF1BW0q51EA01qAFEFq1WA1BW0q51)q-q3P5AS/1
 HPqS1 3N5BW0q1 )Pq1 E’W-W)S1 )51 )NEAD9qN1 DW24-)EAq54D-S1 ’5)P1 B5W:q1 0E)E1 +E1 )q-q3P5Aq1 :E--K1 EA01 A5A>B5W:q1 0E)E1 +D4:P1 ED1
05UA-5E0WAF1WA95N2E)W5AL1qR:PEAFWAF1q2EW-1EA01WAD)EA:q12qDDEFWAFK/11
 ‘X1 25’W-q1 )q:PA5-5FWqD1 D4335N)1 FNqE)qN1 A42’qN1 591 B5W:q1 EA01 0E)E1 :4D)52qND1 ED1 Uq--1 ED1 PWFPqN1 0E)E1 NE)qD1 E)1 -5UqN1
WA:Nq2qA)E-1:5D)1)PEA1ZX/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-3 Introduction to Mobile Computing

‘X1D)EA0EN0D1ENq1"1
o ;>(–G<1
o (–G<ZVVV1
o Ф;(>Q‘^1 1
o H–>(–G<1[1H–>Y(–G<1
o –√(H1
Fourth Generation (4G) - 2004
 HPq1954N)P1FqAqNE)W5A1UW--1’q194--S1Oλ>’EDq01WA)qFNE)q01DSD)q2D/1
 O)1 UW--1 E--5U1 E::qDDWAF1 )Pq1 OA)qNAq)1 EAS)W2q1 9N521 EASUPqNqL1 F-5’E-1 N5E2WAFL1 EA01 UW0qN1 D4335N)1 95N1 24-)W2q0WE1
E33-W:E)W5AD/1
 O)1UW--1’q1Aq)U5N81591Aq)U5N8D1E:PWqBq01E9)qN1)Pq1:5ABqNFqA:q1591UWNq01EA01UWNq-qDD1Aq)U5N8D1ED1Uq--1ED1:5234)qNL1

e
:5AD42qN1q-q:)N5AW:DL1:5224AW:E)W5A1)q:PA5-5FSL1EA01DqBqNE-15)PqN1:5ABqNFqA:qD/1

g
 HPqDq1Aq)U5N8D1UW--1’q1:E3E’-q15913N5BW0WAF1QVV1G’3D1WA154)055N1qABWN5A2qA)1EA01QX’3D1WA1WA055N1UW)P1qA0>)5>qA01
io led
_5Y1EA01PWFP1Dq:4NW)S/1
7X1D)EA0EN0D1ENq1"1
o WH√1+W5AF1HqN21√B5-4)W5AK1
ic ow

o ;WG<`1+;5N-0UW0q1OA)qN53qNE’W-W)S195N1GW:N5UEBq1<::qDDK1
n
Fifth Generation - 5G (2018)
bl kn

 %X1WD1A5)164D)15Aq1)q:PA5-5FSL1W)1WD1E:)4E--S1E1:52’WAE)W5A1591DqBqNE-1)q:PA5-5FWqD1WA15Aq/1HPq1DSD)q2L1P5UqBqNL1UW--1’q1
E1D2EN)1EA018A5U1UPqA1)512E8q14Dq1591UPW:P1)q:PA5-5FS195N12ERW2421q99W:WqA:S/1
at
Pu ch

 %X1UW--1’q124:P125Nq19ED)qN1)PEA17X/1O)1UW--13N5BW0q10E)E1NE)q1431)51QVX’3D/1O)1UW--13N5BW0q1QVVa1:5BqNEFq1ENqE/1HPE)1WD1
’q))qN1:5BqNEFq1qBqA1E)1)Pq1:q--1’54A0ENWqD/1
Te

 %X1UW--1E-D513N5BW0q1-5U1Aq)U5N81-E)qA:S1+431)51Q12Dq:K1UPW:P1UW--1’q1Pq-394-195N1)Pq1:NW)W:E-1E33-W:E)W5AD1-W8q1WA04D)NSL1
PqE-)P:ENq1 EA01 2q0W:E-/1 1 %X1 )q:PA5-5FS1 EW2D1 )51 3N5BW0q1 UW0q1 NEAFq1 591 94)4Nq1 WA04D)NWqD1 9N521 Nq)EW-1 )51 q04:E)W5AL1
)NEAD35N)E)W5A1)51qA)qN)EWA2qA)1EA01D2EN)1P52qD1)51PqE-)P:ENq/1
 %X1)q:PA5-5FS1UW--13N5BW0q14’WV4W)54D1:5AAq:)WBW)S12qEAD1qBqNS)PWAF19N521BqPW:-qD1)5125’W-q1Aq)U5N8D1)51WA04D)NWqD1
)51D2EN)1P52qD1UW--1’q1:5AAq:)q01)5Fq)PqN/1
 %X1UW--14)W-Wbq1√R)Nq2q-S1\WFP19NqV4qA:S1D3q:)N421’EA01’q)UqqA1‘X\b1)51‘V1X\b/1HPqDq1ENq1:E--q012W--W2q)Nq1UEBqD/1
HPqDq1UEBq1:EA1)NEBq-1E)1BqNS1PWFP1D3qq01’4)1:5BqND1DP5N)10WD)EA:q1DWA:q1)PqS1:EAA5)13qAq)NE)q15’D)E:-qD/1
 ФA-W8q17X1)PE)1NqV4WNqD1PWFP135UqNq01:q--4-EN1’EDq1D)E)W5AD1)51)NEAD2W)1DWFAE-15BqN1-5AF10WD)EA:qL1%X1UW--114Dq1E1-ENFq1
A42’qN1591D2E--1:q--1D)E)W5AD1)PE)12ES1’q1-5:E)q015A1D2E--1)5UqND15N1’4W-0WAF1N559D/1
 %X1 2E8qD1 )Pq1 4Dq1 591 GEDDWBq1 GOG]1 +G4-)W3-q1 OA34)1 G4-)W3-q1 ]4)34)K1 D)EA0EN0D1 )51 2E8q1 WD1 QVV1 )W2qD1 9ED)qN1 ED1
5335Dq01)51D)EA0EN01GOG]/1GEDDWBq1GOG]12E8qD1)Pq14Dq1591ED124:P1ED1QVV1EA)qAAED/1G4-)W3-q1EA)qAAED1E--5U195N1
’q))qN1EA019ED)qN10E)E1)NEAD2WDDW5A/1HPq1%X1Aq)U5N81UW--1:52q1UW)P1QVV1)W2qD125Nq10qBW:qD1WA12EN8q)/1
5G standards
 %X1)q:PA5-5FS1D)EA0EN01ENq1D)W--14A0qN10qBq-532qA)/1Y5L1A519WN21D)EA0EN0D1WD1WA13-E:q1E)1)PWD1)W2qc11)Pq12EN8q)1WD1D)W--1
9WF4NWAF154)1)Pq1qDDqA)WE-1%X19qE)4NqD1EA0194A:)W5AE-W)WqD/1
 HPq13NW2ENS1%X1D)EA0EN0D1’50WqD1WAB5-Bq01WA1)PqDq13N5:qDDqD1ENq1)Pq1‘N01XqAqNE)W5A1λEN)AqNDPW31λN56q:)1+‘XλλKL1)Pq1
OA)qNAq)1√AFWAqqNWAF1HED81=5N:q1+O√H=KL1EA01)Pq1OA)qNAE)W5AE-1Hq-q:5224AW:E)W5A1ФAW5A1+OHФK/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-4 Introduction to Mobile Computing

Table 1.1.1 : Comparison between 1G, 2G, 3G, 4G and 5G

NUAU)WSWAR :xR >xR ;xR <xR ExR


OA)N504:q01WA1 QUZV1 QUU‘1 ZVVQ1 ZVVU1 (4NNqA)-S14A0qN10qBq-532qA)1
qR3q:)q01)51N5--154)1’S1ZVZV1
Hq:PA5-5FS1 <GλY1 –><GλYL1 ;>(–G<1 WH√1L1;WG<`1 WH√1<0BEA:q01L1]G<1EA01
OY>U%L1XYG1 (–G<ZVVV1 T]G<L1;;;;1
Ф;(>Q‘^1
H–>(–G<1–√(H1
G4-)W3-qRWAF1 =–G<1 H–G<[1 (–G<1 (–G<1 (–G<1
(–G<1
YUW):PWAF1 (WN:4W)1 (WN:4W)1 λE:8q)1DUW):PWAF1 <--1λE:8q)1 <--1λE:8q)1DUW):PWAF1
)S3q1 DUW):PWAF1 DUW):PWAF195N1 DUW):PWAF1

e
B5W:q1L13E:8q)1

g
DUW):PWAF195N1
0E)E1
io led
Y3qq01 Z/718’3D1)51 Q7/718’3D1 ‘/Q12’3D1 QVV12’3D1 dQV1X’3D1
Q7/718’3D1
ic ow

YqNBW:qD1 e5W:q15A-S1 e5W:q1f10E)E1 e5W:q1f10E)E1f1 \WFP1D3qq01 Y43qN19ED)1WA)qNAq)1E::qDDL1W5U1


G4-)W2q0WEL1BW0q51 \WFP1V4E-W)S1 -E)qA:S1Aq)U5N8195N12WDDW5A1
n
:E--WAF1EA01BW0q51 B5W:q15BqN1OλL1 :NW)W:E-1E33-W:E)W5ADL1O5H1EA01
bl kn

D)NqE2WAF1 ‘–1FE22WAF1L1 D4NBqW--EA:qL1E4)5A5254D1


\–1BW0q51 0NWBWAF11EA012EAS125Nq/1
:5A9qNqA:WAFL1
at
Pu ch

\–1
24-)W2q0WE1
D)NqE2WAF1
Te

XEA0UW0)P1 <AE-5F1 Z%G\b1 Z%1G\b1 QVV1G\b1 ^VX\b1


]3qNE)WAF1 ZVV1GX\b1 XYG"1 ZQVV1G\b1 Z^VV1G\b1 ‘1H51UV1X\b1
=qE)4NqD1 UVVG\gL1
QZVVG\b1
(–G<"1
ZVVG\b1
XEA011 TENN5U1’EA01 TENN5U1XEA01 ;W0q1’EA01 Ф-)NE1;W0q1 √R)Nq2q-S1PWFP19NqV4qA:S1
+=NqV4qA:SK1 ’EA01
HS3q1
\EA015BqN1 T<1 \5NWb5A)E-1 \5NWb5A)E-1 \5NWb5A)E-[1 \5NWb5A)E-[1eqN)W:E-1
eqN)W:E-1
<0BEA)EFqD1 YW23-qN1 G4-)W2q0WE1 \WFP1Dq:4NW)SL1 Y3qq0L1\WFP1 Y43qN19ED)1WA)qNAq)L1W5U1
9qE)4NqD1 WA)qNAE)W5AE-1 D3qq01 Aq)U5N81-E)qA:S1L11Ф’WV4W)54D1
+YGYL1GGYKL1 N5E2WAF1 PEA0599DL1 :5AAq:)WBW)SL1X-5’E-1:5BqNEFq/11
OA)qNAq)1 GOG]1
E::qDD1EA01 )q:PA5-5FSL1
YOG1 X-5’E-1
WA)N504:q01 25’W-W)S1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-5 Introduction to Mobile Computing

NUAU)WSWAR :xR >xR ;xR <xR ExR


–WDE0BEA)EFqD1 WW2W)q01 W5U1Aq)U5N81 \WFP135UqN1 \EN01)51 \EN01)51W23-q2qA)L1GEAS1591
:E3E:W)SL1A5)1 NEAFqL1D-5U1 :5AD423)W5AL1 W23-q2qA)L1 )Pq15-010qBW:qD1U54-01A5)1’q1
Dq:4NqL1355N1 0E)E1NE)qD1 W5U1Aq)U5N81 :523-W:E)q01 :523q)qA)1)51%XL1–qBq-53WAF1
’E))qNS1-W9qL1 :5BqNEFqL1\WFP1 PEN0UENq1 WA9NED)N4:)4Nq1Aqq0D1PWFP1:5D)/1
-ENFq13P5Aq1 :5D)1591D3q:)N421 NqV4WNq01
DWbqL1 -W:qADq1
’E:8FN54A01
WA)qN9qNqA:q1
<33-W:E)W5AD1 e5W:q1(E--D1 e5W:q1:E--DL1 eW0q51 \WFP1D3qq01 Y43qN1\WFP1D3qq0125’W-q1
YP5N)1 :5A9qNqA:WAFL1 E33-W:E)W5ADL1 Aq)U5N8DL1Y2EN)1eqPW:-qDL1O5HL1
2qDDEFqDL1 25’W-q1HeL1XλY1 25’W-q1HeL1 eWN)4E-1EA01<4F2qA)q01YqE-W)SL1
’N5UDWAF1 ;qENE’-q1 W5U1-E)qA:S12WDDW5A1:NW)W:E-1
+3EN)WE-K1 0qBW:qD1 E33-W:E)W5AD1q):/1

g e
1.2 Cellular Systems io led
 (q--4-EN1 DSD)q2D1 ENq1 25’W-q1 DSD)q2D1 95N1 )U5>UES1 UWNq-qDD1 :5224AW:E)W5A1 ’q)UqqA1 )Pq1 9WRq01 3EN)1 591 )Pq1 DSD)q21
+)NEAD2W))qND15N1’EDq1D)E)W5ADK1EA01)Pq125’W-q13EN)1591)Pq1DSD)q21+25’W-q1D)E)W5ADK1UPW:P125Bq1WA1)Pq1ENqE1:5BqNq01’S1
ic ow

qE:P1’EDq1D)E)W5A/1
 OA1 E1 :q--4-EN1 DSD)q2L1 )Pq1 qA)WNq1 :5BqNEFq1 ENqE1 WD1 0WBW0q01 WA)51 h:q--Dz1 W/q/1 )PqS1 W23-q2qA)1 Y–G1 +Y3E:q1 –WBWDW5A1
n
G4-)W3-qRWAFK/1√E:P1:q--1WD1DqNBq01’S1E1DWAF-q1’EDq1D)E)W5A/1√E:P1:q--1PED1E1DWbq10q3qA0WAF15A1)Pq1A42’qN15914DqND/1G5Nq1
bl kn

)Pq14DqNDL1D2E--qN1)Pq1:q--1DWbq/1
 (q--1 NE0WW1 NEAFqD1 9N521 )qAD1 591 2q)qND1 WA1 ’4W-0WAFDL1 EA01 P4A0Nq0D1 591 2q)qND1 WA1 :W)WqDL1 431 )51 )qAD1 591 8W-52q)qND1 WA1 )Pq1
at
Pu ch

:54A)NS1DW0q/1
 HPq1DPE3qD1591:q--D1ENq1AqBqN13qN9q:)1:WN:-qD15N1PqREF5AD1E:)4E--SL1W)10q3qA0D15A1qABWN5A2qA)L15A1UPq)PqN1:5A0W)W5AD1
Te

q):/11\qREF5A1DPE3q1:q--4-EN1DSD)q21WD1DP5UA1WA1=WF/1Q/Z/Q/1

Fig.1.2.1 : Diagrammatic cell Fig. 1.2.2 : Cellular System with seven cell cluster
vs. actual cell coverage

1.2.1 Frequency Reuse in Cellular Systems


(MU - May 14)

Q. What is frequency reuse concept in cellular communication? (May 14, 5 Marks)

 =AW(<WvHzRAW<-W1WD1)Pq1)q:PAWV4q15914DWAF1)Pq1DE2q1NE0W51BAW(<WvHkW-15A1NE0W51)NEAD2W))qN1DW)qD1UW)PWA1E1Fq5FNE3PW:1
ENqE1)PE)1ENq1Dq3ENE)q01’S1D499W:WqA)10WD)EA:q1)51:E4Dq12WAW2E-1WA)qN9qNqA:q1UW)P1qE:P15)PqN/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-6 Introduction to Mobile Computing

 To avoid interference in cellular system, each cell uses a different set of frequencies as compared to its immediate
neighbors. In other words, no two neighbors use the same set of frequencies as there will be interference.
 A set of several cells are further grouped into clusters. Cells within the same cluster do not use the same frequency
sets.
 Fig. 1.2.3 shows 3 cell cluster and 7 cell cluster. In Fig 1.2.3 (a) one cell in a cluster uses frequency f1, another cell uses
f2 and the third cell uses f3. The same pattern is repeated for another cluster. Fig. 1.2.3 (b) shows a 7 cell cluster.

1.2.1(a) Frequency Reuse Concept


(MU - May 17)

Q. What is frequency reuse concept in cellular system? (May 17, 5 Marks)

 Consider a cellular system which has S full duplex channels available for use.
 Assume that the S channels are divided into N number of cells and each cell is allocated a group of K channels (K<S).

e
 Thus, total number of channels per cell is K = S/N.

g
 Therefore, the total number of available channels can be expressed as S = KN
io led
 The N cells which collectively use the complete set of available frequencies is called cluster.
 The factor N is called the cluster size and is typically 4, 7 or 12.
 Frequency reuse factor of a cellular system is given by reciprocal of the cluster size i.e. 1/N.
ic ow
n
bl kn
at
Pu ch
Te

(a) 3 cell cluster (b) 7 cell cluster (c) 3 cell cluster with 3 sector
per cell 3 sector antennas

Fig. 1.2.3 : 3 cell cluster, 7 Cell Cluster and 3 cell cluster with sectorized antennas

 If the cluster size N is reduced while the cell size remains constant, more clusters are required to cover that particular
area and hence more capacity is achieved.
 A large cluster size indicates that the ratio between cell radius and the distance between co channel cells is small.
Locating Co-channel cells in a cellular System
 For a hexagonal cell structure, it is possible to cluster cells so that no two adjacent cells use the same frequency. This
is only achievable for a certain cell-cluster sizes, which can be determined from the relationship

N = i2 + ij + j2 Where i,j = 0,1,2,3 etc.


 To find nearest co-channel neighbors of a particular cell
o Move i cells through the center of successive cells.
o
o Turn 60 in the counter clockwise direction.
o Move j cells forward through the center of successive cells.
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-7 Introduction to Mobile Computing

 =WF/1Q/Z/71DP5UD1)Pq13N5:qDD1591-5:E)WAF1)Pq1AqENqD)1:5>:PEAAq-1AqWFP’5ND1591:q--1971WA1:-4D)qN1Q/11
 ;q19WND)125Bq1WiZ1D4::qDDWBq1:q--D1WA105UAUEN010WNq:)W5A/1=N521)PqNq1Uq1)4NA1^V!1WA1:54A)qN:-5:81UWDq10WNq:)W5A/1<A01
)PqA125Bq16iQ1:q--195NUEN01)PN54FP1)Pq1:qA)Nq1591)Pq1:q--1)P4D1-5:E)WAF1:q--1971WA1:-4D)qN1‘/1YW2W-EN-S1Uq1:EA1-5:E)q1:q--1
971WA1AqWFP’5NWAF1:-4D)qND1j1:-4D)qN1Z1EA01:-4D)qN17/1

g e
io led
Fig. 1.2.4 : Method of locating co-channel cells in a cellular system (here i=2, j=1)

1.2.1(b) Assignment of Frequencies to Cells


ic ow

<DDWFA2qA)15919NqV4qA:WqD1)51:q--D1:EA1’q105Aq1WA195--5UWAF1)PNqq1UESD/1
n
1. Fixed Channel Allocation (FCA)
bl kn

 HPWD1D:Pq2q1EDDWFAD19WRq01Dq)15919NqV4qA:WqD1)51qE:P1:q--15N1:-4D)qN/1HPq1D:Pq2q1WD1qEDS1)51W23-q2qA)1’4)1A5)1BqNS1
at

q99W:WqA)1W91)NE99W:1-5E01BENWqD/1
Pu ch

 XYG1DSD)q214DqD1)PWD1D:Pq2q/1

2. Borrowing Channel Allocation (BCA)


Te

 OA1)PWD1D:Pq2qL1W91E15Aq1:q--1PED1PqEBS1-5E01)PqA1W)1:EA1’5NN5U19NqV4qA:WqD19N521EA5)PqN1AqWFP’5NWAF1:q--1UPW:P1WD1
PEBWAF1-WFP)1-5E0/11
 \qNq1:q--D1UW)P125Nq1)NE99W:1ENq10SAE2W:E--S1E--5))q0125Nq19NqV4qA:WqD/1
3. Dynamic Channel Allocation (DCA)
 HPWD1 D:Pq2q1 WD1 DW2W-EN1 )51 X(</1 <D1 WA1 X(<1 PqNq1 E-D51 9NqV4qA:WqD1 :EA1 ’q1 ’5NN5Uq01 9N521 E1 AqWFP’5NWAF1 :q--/1 OA1
E00W)W5A1)51)PE)L1)Pq1EDDWFA2qA)15919NqV4qA:WqD1WD10SAE2W:L1)PE)1WD19NqV4qA:WqD1:EA1’q1EDDWFAq019Nqq-S1)51:q--D/1
 YWA:q19NqV4qA:WqD1ENq1EDDWFAq010SAE2W:E--S1)51E1:q--L1)PqNq1WD1E1:PEA:q1591WA)qN9qNqA:q1UW)P1:q--D14DWAF1)Pq1DE2q1
9NqV4qA:WqD/11
 H51EB5W01WA)qN9qNqA:q1)Pq1h’5NN5Uq0z19NqV4qA:WqD1:EA1’q1’-5:8q01WA1)Pq1AqWFP’5NWAF1:q--D/1
 HPWD1D:Pq2q1WD14Dq01WA1–√(H/1

1.2.2 Advantages of Cellular Systems with Small Cells

1. Higher capacity

O23-q2qA)WAF1 Y–G1 E--5UD1 9NqV4qA:S1 Nq4Dq/1 O91 5Aq1 )NEAD2W))qN1 WD1 9EN1 EUES1 9N521 EA5)PqN1 )NEAD2W))qN1 )PqA1 )Pq1
)NEAD2W))qND1:EA14Dq1)Pq1DE2q19NqV4qA:S1UW)P54)1EAS1WA)qN9qNqA:q/1HP4D1D2E--qN1:q--D1E--5U125Nq1A42’qN15914DqND/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-8 Introduction to Mobile Computing

2. Less transmission power

O91)Pq1)NEAD2W))qN1WD19EN1EUES19N521)Pq1Nq:qWBqN1)PqA1W)1NqV4WNqD1PWFP135UqN1)51)NEAD2W)1)Pq1DWFAE-/1=5N125’W-q10qBW:qD1
35UqN1WD1)Pq12EWA1:5AD)NEWA)L1D51Nq04:q01:q--1DWbq1NqV4WNqD1-qDD1)NEAD2WDDW5A135UqN/1
3. Local interference only
;W)P1-ENFqN1:q--DL1)Pq10WD)EA:q1’q)UqqA1)Pq125’W-q1D)E)W5A1EA01)Pq1’EDq1D)E)W5A1WD125Nq1EA01PqA:q1)PqNq1ENq1:PEA:qD1
591 25Nq1 WA)qN9qNqA:q1 3N5’-q2D/1 ;W)P1 D2E--1 :q--DL1 25’W-q1 D)E)W5AD1 EA01 ’EDq1 D)E)W5AD1 5A-S1 PEBq1 )51 0qE-1 UW)P1 h-5:E-z1
WA)qN9qNqA:q/1
4. Robustness
(q--4-EN1DSD)q2D1ENq10q:qA)NE-Wbq01EA01D5125Nq1N5’4D)1EFEWAD)1)Pq19EW-4Nq1591DWAF-q1:5235AqA)D/1O915Aq1EA)qAAE19EW-DL1W)1
5A-S1E99q:)D1:5224AW:E)W5A1UW)PWA1E1D2E--1ENqE/1

1.2.3 Disadvantages of Cellular System with Small Cells

e
1. Complex infrastructure

g
(q--4-EN1 DSD)q2D1 NqV4WNq1 E1 :523-qR1 WA9NED)N4:)4Nq1 )51 :5AAq:)1 )51 E--1 ’EDq1 D)E)W5AD/1 O91 )Pq1 :q--1 DWbq1 WD1 D2E--L1 )PqA1 W)1
io led
NqV4WNqD12EAS1EA)qAAEDL1DUW):PqDL195N1:E--195NUEN0WAFL1-5:E)W5A1NqFWD)qND1)519WA01E125’W-q1D)E)W5A1q):/1HPWD1UW--12E8q1
)Pq1UP5-q1DSD)q21qR3qADWBq/1
2. Handover needed
ic ow

;PqA125’W-q1D)E)W5A125BqD19N5215Aq1:q--1)51EA5)PqN1:q--L1)Pq13N5:qDD1:E--q01PEA05BqN1WD1:ENNWq0154)/1–q3qA0WAF15A1
n
)Pq1:q--1DWbq1EA01)Pq1D3qq0159125Bq2qA)L1)PWD1:EA1PE33qA1V4W)q159)qA/1
bl kn

3. Frequency Planning
at

(q--4-EN1DSD)q21Aqq0D13N53qN13-EAAWAF15919NqV4qA:S10WD)NW’4)W5A1)51EB5W01WA)qN9qNqA:q1’q)UqqA1)NEAD2W))qND/1
Pu ch

1.2.4 Why Hexagonal Pattern is Preferred for Cellular System ?


Te

 ;PqA1:5ADW0qNWAF1Fq52q)NW:1DPE3qDL1UPW:P1:5BqN1EA1qA)WNq1NqFW5A1UW)P54)15BqN-E33WAF15N1-qEBWAF1FE3D1EA01UW)P1qV4E-1
ENqEDL1)PqNq1ENq1)PNqq1DqADW’-q1:P5W:qD/1
Q/1 √V4W-E)qNE-1)NWEAF-q1
Z/1 YV4ENq1
‘/1 \qREF5A1
 HPq1HE’-q1Q/Z/Q10qD:NW’qD1)Pq14AW)1:5BqNEFq1ENqE195N1qE:P1591)Pq1E’5Bq12qA)W5Aq01DPE3qD/1
Table 1.2.1 : Unit coverage area for Triangle, square and Hexagon shapes

>WbbRSz?WR >WvSAWRSλRHWvSAWR:k-SUvHWR @vkSRHλAWAUMWRUAWUR


HNWEAF-q1 Y1 Q/‘1Y"1
YV4ENq1 YkZ1 Z1Y"1
\qREF5A1 Yk‘1 Z/^1Y"1
 <1D)40S1591E’5Bq1)E’-q1NqBqE-D1)Pq195--5UWAF135WA)D/1
 <NqE1:5BqNEFq1591PqREF5A1WD1)UW:q1)PE)1591)NWEAF4-EN1ENqE/1
 H51:5BqN1EA1ENqE1591)PNqq1PqREF5AE-1:q--D1W/q/1l/Z1Y"##L1^1)NWEAF4-EN1:q--D15N171DV4ENq1:q--D1ENq1NqV4WNq0/1
 OA15)PqN1U5N0DL1W911PqREF5AE-1ENqE1591l/Z1Y"## NqV4WNqD1)PNqq19NqV4qA:WqDL1)Pq1)NWEAF4-EN1:q--D1NqV4WNq1^19NqV4qA:WqD1EA01
DV4ENq1:q--D1NqV4WNq1719NqV4qA:WqD/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-9 Introduction to Mobile Computing

OA1FqAqNE-1UW)P1)Pq1\qREF5A13E))qNA1"1
Q/1 HPq19qUqD)1A42’qN1591:q--D1:EA1:5BqN1E1FWBqA1Fq5FNE3PW:E-1NqFW5A1
Z/1 ;q1:EA1:-5Dq-S1E33N5RW2E)q1E1:WN:4-EN1NE0WE)W5A13E))qNA1UPW:P1U54-015::4N195N1EA152AW0WNq:)W5AE-1’EDq1D)E)W5A1
EA)qAAE/1

1.2.5 Methods of Increasing Cell Capacity


HPqNq1ENq1’EDW:E--S1)PNqq1UESD1591WA:NqEDWAF1:E3E:W)S1591:q--4-EN1DSD)q2/1
Q/1 (q--1Y3-W))WAF1
Z/1 (q--1Yq:)5NWbE)W5A1
‘/1 GW:N5:q--1g5AqD11

1. Cell Splitting

e
(q--1D3-W))WAF1WD1)Pq13N5:qDD15910WBW0WAF1)Pq1NE0W51:5BqNEFq1591E1:q--1WA1E1:q--4-EN1DSD)q21WA)51)U515N125Nq1AqU1:q--1DW)qD/11

g
(q--1D3-W))WAF1WD15Aq1591)Pq1UESD1)51WA:NqEDq1)Pq1:E3E:W)S1UW)PWA1)Pq1NqFW5A1591)Pq15NWFWAE-1:q--/11

io led
H512WAW2Wbq1WA)qN9qNqA:qL1E1:qN)EWA10WD)EA:q124D)1’q12EWA)EWAq01’q)UqqA1:q--D14DWAF1)Pq1DE2q19NqV4qA:WqD/1\5UqBqNL1
)PWD10WD)EA:q1:EA1’q1Nq04:q01UW)P54)10WD)4N’WAF1)Pq1:q--1Nq4Dq13E))qNA/11
 <D1 )Pq1 DWbq1 591 )Pq1 :q--D1 ENq1 Nq04:q0L1 )Pq1 DE2q1 9NqV4qA:WqD1 :EA1 ’q1 4)W-Wbq01 WA1 25Nq1 :q--DL1 UPW:P1 WA1 )4NA1 2qEAD1 25Nq1
ic ow

D4’D:NW’qND1:EA1’q1E::52250E)q015A1)Pq1DSD)q2/11
 λEN)W:4-EN-S1WA1:5AFqD)q01ENqEDL1)Pq1:q--4-EN153qNE)5N159)qA1D3-W)D1EA1qRWD)WAF1:q--1WA)51)U515N125Nq1D2E--qN1:q--D/11
n
 TqU1 )NEAD:qWBqND1 ENq1 3-E:q01 EA01 )Pq1 35UqN1 591 )Pq1 )NEAD2W))qND1 ENq1 Nq04:q01 WA1 5N0qN1 )51 :5A9WAq1 )Pq1 DWFAE-D1 )51 )Pq1
bl kn

AqU-S1:NqE)q01:q--D/1

at

=5N1qRE23-qL1E1:q--1)PE)15NWFWAE--S1PE01E1NE0W4D1591^121:54-01’q1D3-W)1WA)51)PNqq1:q--D1UW)P1qE:P1AqU1:q--1PEBWAF1E1Z121
Pu ch

NE0W4D/11
Te

Fig. 1.2.5 : Cell splitting

Cell Sectorization

Fig. 1.2.6 : Cell Sectorization


Mobile Communication & Computing (MU-Sem. 7-Comp) 1-10 Introduction to Mobile Computing

 <A5)PqN1UES1)51WA:NqEDq1:q--4-EN1DSD)q2zD1:E3E:W)S1WD1)51Nq3-E:q1)Pq152AW0WNq:)W5AE-1EA)qAAE1E)1qE:P1’EDq1D)E)W5A1’S1
)PNqq15N125Nq1Dq:)5N1EA)qAAED/R
 ФDq15910WNq:)W5AE-1Dq:)5N1EA)qAAED1D4’D)EA)WE--S1Nq04:qD1)Pq1WA)qN9qNqA:q1E25AF1:5>:PEAAq-1:q--D/1R
 HPWD1E--5UD10qADqN19NqV4qA:S1Nq4Dq/1R
 HPq1’EDq1D)E)W5A1:EA1qW)PqN1’q1-5:E)q01E)1)Pq1:qA)qN1591)Pq15NWFWAE-1+-ENFqK1:q--L15N1)Pq1:5NAqND1591)Pq15NWFWAE-1+-ENFqK1:q--/R
 Yq:)5NWbE)W5A1WD1-qDD1qR3qADWBq1)PEA1:q-->D3-W))WAFL1ED1W)105qD1A5)1NqV4WNq1)Pq1E:V4WDW)W5A1591AqU1’EDq1D)E)W5A1DW)qD/R
Using Micro cell zone
 HPq10WDE0BEA)EFq1591:q--1Dq:)5NWAF1:5A:q3)1WD1)Pq1Aqq0195N1EA1WA:NqEDq01A42’qN1591PEA0599D/1
 HPq1)q:PAWV4q18A5UA1ED12W:N5:q--1)PE)14DqD1b5AqD1WAD)qE01591Dq:)5ND1)51Nq04:q1)Pq1A42’qN1591PEA0599D/1
 <D1 DP5UA1 WA1 =WF/1 Q/Z/l1 )PWD1 )q:PAWV4q1 q23-5SD1 )PNqq1 EA)qAAED1 )PE)1 3N5BW0q1 :5BqNEFq1 WA)51 )Pq1 2W:N51 :q--/1 <--1 )PNqq1
EA)qAAED1ENq1:5AAq:)q01)51)Pq1DE2q1’EDq1D)E)W5A/1

g e
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 1.2.7 : Micro Cell Zone

 HPq1EA)qAAE1UW)P1)Pq1’qD)1Nq:q3)W5A1591)Pq125’W-q1WD14Dq0195N1’5)P1)Pq143-WA81EA01)Pq105UA-WA8/1<D1)Pq125’W-q1)NEBq-D1
UW)PWA1E1DE2q12W:N51:q--1W)14DqD1)Pq1DE2q1:PEAAq-1EA01)PqNq1WD1A51Aqq0195N1PEA0599/1
 <D1)Pq125’W-q125BqD1WA)51EA5)PqN1b5Aq1)Pq1’EDq1D)E)W5A1DW23-S1DUW):PqD1)Pq1:PEAAq-1)51E10W99qNqA)1b5Aq/1

1.2.6 Cellular System Using CDM


 OA1:q--4-EN1DSD)q2D14DWAF1(–G14DqND1ENq1Dq3ENE)q01)PN54FP1:50qD/1]Aq1591)Pq1E0BEA)EFqD1591)PqDq1DSD)q2D1WD1)PE)1)PqS1
05Az)1Aqq01:523-qR19NqV4qA:S13-EAAWAF1EA01:523-qR1:PEAAq-1E--5:E)W5A1D:Pq2qD/11
 X4)1:q--13-EAAWAF1UW)P1(–G19E:qD1EA5)PqN13N5’-q2/1OA1(–G1:q--1DWbq1WD1A5)19WRq0/1YE)PqN1DWbq1591:q--10q3qA0D15A1)Pq1
:4NNqA)1-5E0/11
 ФA0qN1E1-WFP)1-5E01E1:q--1’q:52qD1-ENFqN1UPW-q1W)1DPNWA8D1W91)Pq1-5E01WA:NqEDqD/11
 G5’W-q1D)E)W5A194N)PqN1EUES19N521)Pq1’EDq1D)E)W5A12ES10N53154)1591)Pq1:q--/11
 =WF/1Q/Z/Z1DP5UD1E14DqN1)NEAD2W))WAF1E1PWFP1’W)1NE)q1D)NqE21UW)PWA1(–G1:q--/11
 Xq:E4Dq1591)PWD1E00W)W5AE-14DqNL1)Pq1:q--1DPNWA8D/1<D1E1NqD4-)1)Pq1)U514DqND10N53154)1591)Pq1:q--/11(–G1:q--D1ENq1:5225A-S1
DEW01)5RBAWUSLW/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-11 Introduction to Mobile Computing

Fig. 1.2.8 : Cell breathing depending on the current load

1.3 Electromagnetic Spectrum


.MU – May 15, Dec. 15.

e
Q. Draw and explain electromagnetic spectrum for communication. (May 15, Dec. 15, 5 Marks)

g
 =5N1 NE0W51 )NEAD2WDDW5AL1 )PqNq1 ENq1 2EAS1 9NqV4qA:S1 ’EA0D/1 √E:P1 9NqV4qA:S1 ’EA01 PED1 D52q1 E0BEA)EFqD1 EA01
io led
0WDE0BEA)EFqD1EA01:EA1’q14Dq01ED13qN1)Pq1E33-W:E)W5A/1
 =WF/1 Q/‘/Q1 W--4D)NE)qD1 )Pq1 9NqV4qA:S1 D3q:)N421 95N1 NE0W51 )NEAD2WDDW5A/1 =NqV4qA:WqD1 D)EN)1 E)1 ‘VV\b1 EA01 F51 431 )51 5BqN1
‘VVH\b/11
ic ow
n
bl kn
at
Pu ch
Te

Fig. 1.3.1 : Frequency spectrum


 HPq1Nq-E)W5A1’q)UqqA19NqV4qA:S1B1EA01UEBq-qAF)PRCRWD1FWBqA1’S1)Pq1qV4E)W5A1
 = c/f where, c = 3 108 m/s (the speed of light in vacuum)
Frequency ranges for wired networks
Table 1.3.1 : Frequency ranges for wired networks

DW:k<)R =AW(<WvHzREUvMWR
HUWD)q01λEWN1 V>‘/%1m\b1
(5>ERWE-1:E’-q1 V1j1%VV1G\b1
=W’qN1]3)W:D1 QZ^1>11‘lV1H\b1
Frequency ranges for radio transmission
Table 1.3.2 : Frequency ranges for radio transmission

=AW(<WvHzR NAλ?UMUSkλvR
=AW(<WvHzREUvMW-R G??bkHUSkλvR
FUv:R >LUAUHSWAk-SkH-R
e=+e5W:q1 ‘VV1\b1j1‘m\b1 X;11 ФDq01’S1)q-q3P5Aq1DSD)q2195N1EAE-5F1D4’D:NW’qN1-WAqD1
=NqV4qA:SK1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-12 Introduction to Mobile Computing

Frequency Propagation
Frequency Ranges Application
Band Characteristics
VLF (Very Low 3 KHz – 30 KHz GW Long-range navigation; submarine communication
Frequency)
LF (Low 30 KHZ – 300KHz GW Long-range navigation; marine communication radio
Frequency) beacon
MF(medium 300 KHz – 3 MHz GW and night Maritime radio; direction fading; AM broadcasting
frequency) SW
HF(High 3 MHz – 30MHz SW Amateur radio; international broadcasting; military
Frequency) communication;
Long distance aircraft and ship communication.
VHF (Very High 30 MHz – 300 MHz LOS VHF television; FM broadcast and two-way radio, AM
Frequency) aircraft communication; aircraft navigational aids

e
UHF(Ultra High 300 MHz – 3GHz LOS UHF television; cellular telephone; radar; microwave links;

g
Frequency) personal communication systems
io led
SHF(Super High 3 GHz – 30 GHz LOS Satellite communication; radar; terrestrial microwave links;
Frequency) wireless local loop
EHF 30 GHZ – 300GHz LOS Experimental; wireless local loop
ic ow

Infrared 300GHz – 400THz LOS Infrared LANs; consumer electronic allocations


n
Visible light 400 THz – 900 THz LOS Optical communication
bl kn
at

Note : GW - Ground Wave, LOS - Line-of-Sight., SW - Sky Wave


Pu ch

Depending upon the frequency, the radio waves can exhibit following three types of behavior.
Te

1. Ground Wave (<2 MHz) : Low frequency waves usually follow the Earth’s surface and can propagate long distance.
These waves are used for submarine communication or AM radio.
2. Sky wave (2-30 MHz) : These waves are reflected at the atmosphere and hence can bounce back and forth between
the ionosphere and the Earth’s surface, traveling around the world. They are used for international broadcast.
3. Line-of-Sight (>30 MHz) : These waves follow a straight line of sight. They are used in Mobile phone systems. Also,
Satellite systems, cordless telephones etc. use these waves.

(a)

Fig. 1.3.2 : Contd…


Mobile Communication & Computing (MU-Sem. 7-Comp) 1-13 Introduction to Mobile Computing

(b)

g e
io led
ic ow
n
(c)
bl kn

Fig. 1.3.2 : Ground Wave propagation, Sky wave Propagation and Line-of –Sight propagation


at

=WF/1Q/‘/Z1DP5UD1E--1)PNqq1)S3qD1591DWFAE-13N53EFE)W5A/1
Pu ch

1.4 Antennas
Te

.MU – Dec. 14, May 17, Dec. 18.

Q. Write about types of antennas and their radiation pattern. (Dec. 14, 5 Marks)
Q. What is an antenna? Explain different types of antennae. (May 17, 5 Marks)
Q. Write a short note on antenna. (Dec. 18, 10 Marks)

 <A1UvSWvvU1WD1E10qBW:q1)PE)1:5ABqN)D1q-q:)N52EFAq)W:1NE0WE)W5A1WA1D3E:q1WA)51q-q:)NW:E-1:4NNqA)D1WA1:5A04:)5ND15N11
BW:q>BqNDEL10q3qA0WAF15A1UPq)PqN1W)1WD1’qWAF14Dq0195N1Nq:qWBWAF15N195N1)NEAD2W))WAFL1NqD3q:)WBq-S/1
 HPq1AU:kUSkλvR?USSWAv1591EA1EA)qAAE10qD:NW’qD1)Pq1Nq-E)WBq1D)NqAF)P1591)Pq1NE0WE)q019Wq-01WA1BENW54D10WNq:)W5AD19N521)Pq1
EA)qAAEL1E)1E1:5AD)EA)10WD)EA:q/11
 OA1NqE-W)S1)Pq1NE0WE)W5A13E))qNA1WD1)PNqq>0W2qADW5AE-L1’4)14D4E--S1)Pq12qED4Nq01NE0WE)W5A13E))qNAD1ENq1E11
)U5>0W2qADW5AE-1D-W:q1591)Pq1)PNqq>0W2qADW5AE-13E))qNAL1WA1)Pq1P5NWb5A)E-15N1BqN)W:E-13-EAqD/11
 HPqNq1ENq1BENW54D1)S3qD1591EA)qAAED10WD:4DDq01’q-5U/1

1.4.1 Isotropic Antenna


 <A1k-λSAλ?kHRUvSWvvU1WD1E1)Pq5Nq)W:E-1EA)qAAE1)PE)1NE0WE)qD1W)D135UqN14AW95N2-S1WA1E--10WNq:)W5AD/R
 OA15)PqN1U5N0DL1E1)Pq5Nq)W:E-1WD5)N53W:1EA)qAAE1PED1E13qN9q:)1‘^V10qFNqq1D3PqNW:E-1NE0WE)W5A13E))qNA/1YE0WE)W5A13E))qNA1
591WD5)N53W:1EA)qAAE1WD1DP5UA1WA1=WF/1Q/7/Q/1R
 O)1WD1EA1k:WUb1EA)qAAE1UPW:P1NE0WE)qD1qV4E--S1WA1E--10WNq:)W5AD1EA01PED1E1FEWA1591Q1+V10XKL1W/q/1bqN51FEWA1EA01bqN51-5DD/R
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-14 Introduction to Mobile Computing

 O)1WD14Dq01)51:523ENq1)Pq135UqN1-qBq-1591E1FWBqA1EA)qAAE1)51)Pq1)Pq5Nq)W:E-1WD5)N53W:1EA)qAAE/R
 =WF/1Q/7/Q1DP5UD1E1)U510W2qADW5AE-1:N5DD>Dq:)W5A1591)Pq1NqE-1)PNqq10W2qADW5AE-13E))qNA/R
 <A)qAAED1:EA1’q1’N5E0-S1:-EDDW9Wq01ED1λ)vk:kAWHSkλvUb1EA01:kAWHSkλvUb1EA)qAAED/1

Fig. 1.4.1 : Radiation pattern of Isotropic antenna

1.4.2 Omnidirectional Antennas


e
ФA-W8q1 WD5)N53W:1 EA)qAAEDL1 0W35-q1 EA)qAAED1 ENq1 NqE-1 EA)qAAED/1 HPq1 0W35-q1 NE0WE)W5A1 3E))qNA1 WD1 ‘^V1 0qFNqqD1 WA1 )Pq1

g
P5NWb5A)E-13-EAq1EA01E33N5RW2E)q-S1l%10qFNqqD1WA1)Pq1BqN)W:E-13-EAq/1
 O)1WD1E-D51:E--q01)Pq1nA5A>0WNq:)W5AE-n1EA)qAAE1’q:E4Dq1W)105qD1A5)19EB5N1EAS13EN)W:4-EN10WNq:)W5A/1R
io led
 –W35-q1EA)qAAED1ENq1DEW01)51PEBq1E1FEWA1591Z/Q710XL1UPW:P1WD1WA1:523ENWD5A1)51EA1WD5)N53W:1EA)qAAE/1HPq1PWFPqN1)Pq1FEWA1
591)Pq1EA)qAAEDL1)Pq1D2E--qN1)Pq1BqN)W:E-1’qE21UW0)P1WD/R

ic ow

HPWD1)S3q1591EA)qAAE1WD14Dq94-195N1’N5E0:ED)WAF1E1DWFAE-1)51E--135WA)D1591)Pq1:523EDD15N1UPqA1-WD)qAWAF195N1DWFAE-D19N521
E--135WA)D/1
n
Dipoles
bl kn

 HPq125D)1:5225A-S14Dq01EA)qAAE1WD1HWASIkUv10W35-q/1
 HPq10W35-q1:5ADWD)D1591)U51:5--WAqEN1:5A04:)5ND1591qV4E-1-qAF)PL1Dq3ENE)q01’S1E1D2E--19qq0WAF1FE3/11
at
Pu ch

 HPq1-qAF)P1591)Pq10W35-q1WD1PE-91)Pq1UEBq-qAF)P1o1591)Pq1DWFAE-1+95N1q99W:WqA)1NE0WE)W5A1591qAqNFSK/1
 =WF/1Q/7/Z1DP5UD1E1)S3W:E-1\qN)bWEA10W35-q/1
Te

Fig. 1.4.2 : Hertzian dipole


 <1o[Z10W35-q1PED1E14AW95N215N152AW0WNq:)W5AE-1NE0WE)W5A13E))qNA1WA15Aq13-EAq1EA01E19WF4Nq1WkMLS13E))qNA1WA1)Pq15)PqN1
)U513-EAqD/1HPWD1WD1DP5UA1WA1=WF/1Q/7/‘/1R
 HPWD1)S3q1591EA)qAAED1ENq14Dq01WA1ENqE1D4:P1ED1254A)EWAL1BE--qS1q):/R
 <-)P54FP1)PWD1WD1E1DW23-q1EA)qAAEL1W)1WD10W99W:4-)1)51254A)15A1E1N5591)531591E1BqPW:-q/1R

Fig. 1.4.3 : Radiation pattern of Hertzian dipole


Mobile Communication & Computing (MU-Sem. 7-Comp) 1-15 Introduction to Mobile Computing

Monopoles
 YP5UA1WA1=WF/1Q/7/71WD1)Pq1W0qE-1BqN)W:E-125A535-q1EA)qAAE/R
 O)1PED1)Pq1-qAF)P1o[71EA01E-D518A5UA1ED1DUAJλvk1EA)qAAE/R
 <125A535-q15BqN1EA1WA9WAW)q1FN54A013-EAq1WD1)Pq5Nq)W:E--S1)Pq1DE2q1ED1)Pq10W35-q1WA19Nqq1D3E:q/R
 HPq19-E)1D4N9E:q1591E1BqPW:-qzD1)N4A815N1N5591:EA1E:)1ED1EA1E0qV4E)q1FN54A013-EAq/R
 HPWD1)S3q1591EA)qAAE1WD1q99W:WqA)195N1254A)WAF15A1E1N5591)531591E1:EN/1R

Fig. 1.4.4 : Monopole

e
Directional Antenna

g
 <1:kAWHSkλvUbRUvSWvvU15N1BWU)RUvSWvvU1WD1EA1EA)qAAE1UPW:P1NE0WE)qD15N1Nq:qWBqD1FNqE)qN135UqN1WA1D3q:W9W:10WNq:)W5AD/1
io led
 HPWD1E--5UD1WA:NqEDq013qN95N2EA:q1EA01Nq04:q01WA)qN9qNqA:q19N5214AUEA)q01D54N:qD/1
 ФA-W8q152AW0WNq:)W5AE-1EA)qAAEDL10WNq:)W5AE-1EA)qAAED124D)1’q1EW2q01WA1)Pq10WNq:)W5A1591)Pq1)NEAD2W))qN15N1Nq:qWBqN/11

ic ow

√RE23-qD15910WNq:)W5AE-1EA)qAAED1ENq13ENE’5-W:1EA01pEFW1EA)qAAE1DP5UA1WA1=WF/1Q/7/%1EA01=WF/1Q/7/^1NqD3q:)WBq-S/11
 =WF/1Q/7/l1DP5UD1)Pq1NE0WE)W5A13E))qNA1591E10WNq:)W5AE-1EA)qAAE1UW)P1)Pq12EWA1-5’q1WA1)Pq10WNq:)W5A1591`>ERWD/1
n
bl kn
at
Pu ch
Te

Fig. 1.4.5 : Parabolic antenna

Fig. 1.4.6 : Yagi antenna


Mobile Communication & Computing (MU-Sem. 7-Comp) 1-16 Introduction to Mobile Computing

Fig. 1.4.7 : Radiation pattern of directional antennas

Sectorized Antenna
 YqBqNE-10WNq:)W5AE-1EA)qAAED1:EA1’q1:52’WAq015A1E1DWAF-q135-q1)51:5AD)N4:)1E1Dq:)5NWbq01EA)qAAE/11
 HPqS1 ENq1 UW0q-S1 4Dq01 WA1 :q--4-EN1 )q-q3P5AS1 WA9NED)N4:)4Nq/1 =5N1 qRE23-qL1 <1 :q--1 :EA1 ’q1 Dq:)5NWbq01 WA)51 )PNqq1 5N1 DWR1
Dq:)5ND/1=WF/1Q/7/Z1DP5UD1NE0WE)W5A13E))qNA1591)PqDq1Dq:)5NWbq01EA)qAAED/1

g e
io led
Fig. 1.4.8 : Radiation pattern of sectorized antennas
ic ow

Antenna arrays

n
<A1EA)qAAE1ENNES1WD1E1:5A9WF4NE)W5A159124-)W3-q1EA)qAAED1+q-q2qA)DK1ENNEAFq01)51E:PWqBq1E1FWBqA1NE0WE)W5A13E))qNA/1

bl kn

G4-)W3-q1EA)qAAED1E--5U10W99qNqA)10WBqNDW)S1D:Pq2qD1)51W23N5Bq1)Pq1V4E-W)S1EA01Nq-WE’W-W)S1591E1UWNq-qDD1-WA8/1
 <A)qAAE10WBqNDW)S1WD1qD3q:WE--S1q99q:)WBq1E)12W)WFE)WAF1q99q:)D159124-)W3E)P13N53EFE)W5A/11
at


Pu ch

HPWD1WD1’q:E4Dq124-)W3-q1EA)qAAED1E--5U1E1Nq:qWBqN1DqBqNE-15’DqNBE)W5AD1591)Pq1DE2q1DWFAE-/1
 √E:P1EA)qAAE1UW--1qR3qNWqA:q1E10W99qNqA)1WA)qN9qNqA:q1qABWN5A2qA)/1O915Aq1EA)qAAE1WD1qR3qNWqA:WAF1E10qq319E0qL1W)1WD1
Te

-W8q-S1)PE)1EA5)PqN1PED1E1D499W:WqA)1DWFAE-/1(5--q:)WBq-S1D4:P1E1DSD)q21:EA13N5BW0q1’q))qN1-WA8/1
 –W99qNqA)10WBqNDW)S1D:Pq2qD1ENq135DDW’-q/1
 ]Aq1D4:P1D:Pq2q1WD1-WbWHSkλvR:kAWA-kSz1UPqNq1)Pq1Nq:qWBqN1E-UESD14DqD1)Pq1EA)qAAE1q-q2qA)1UW)P1)Pq1-ENFqD)154)34)/1
 HPq1 5)PqN1 )S3q1 591 0WBqNDW)S1 WD1 :kAWA-kSzR Hλ)BkvkvM1 WA1 UPW:P1 E1 :52’WAE)W5A1 591 35UqN1 591 E--1 )Pq1 DWFAE-D1 WD1 )E8qA1 )51
3N504:q1FEWA/1
=WF/1Q/7/U1DP5UD1)U51D4:P10W99qNqA)1D:Pq2qD/1
o OA1=WF/1Q/7/U1+EK1)U51o[71EA)qAAED1ENq1ENNEAFq01UW)P1E10WD)EA:q1591o[Z1’q)UqqA1)Pq2/1
o OA1=WF/1Q/7/U1+’K1)PNqq1D)EA0EN01o[Z10W35-qD1ENq1:52’WAq01UW)P1E10WD)EA:q1591o[Z1’q)UqqA1)Pq2/1

(a) (b)
Fig. 1.4.9 : Diversity antenna systems
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-17 Introduction to Mobile Computing

1.5 Signal Propagation


.MU – Dec. 18.
Q. What are various issues in signal propagation ? (Dec. 18, 10 Marks)

 YWA:q1UWNq-qDD1Aq)U5N8D14Dq14AF4W0q012q0WE1D4:P1ED1NE0W51UEBqDL1)Pq1DWFAE-1PED1A51UWNqD1)510q)qN2WAq1)Pq10WNq:)W5A1591
3N53EFE)W5AL1UPqNq1ED1DWFAE-D1WA1UWNq01Aq)U5N815A-S1)NEBq-1E-5AF1)Pq1UWNq/11
 OA1UWNq01Aq)U5N8L15Aq1:EA1qEDW-S10q)qN2WAq1)Pq1’qPEBW5N1591E1DWFAE-1)NEBq-WAF1E-5AF1)PWD1UWNq1D4:P1ED1Nq:qWBq0135UqN1
0q3qA0WAF15A1)Pq1-qAF)P/11
 =5N1UWNq-qDD1)NEAD2WDDW5AL1)PWD13Nq0W:)E’-q1’qPEBW5N1WD15A-S1BE-W01WA1E1BE:442/1<D1DP5UA1WA1=WF/1Q/%/Q10q3qA0WAF1435A1
)Pq10WD)EA:q19N521)Pq1DqA0qNL1)Pq1)NEAD2W))q01DWFAE-1:EA19E--1WA)51)Pq195--5UWAF1NEAFqD/1
1. Transmission Range

e
;W)PWA1)PWD1NEAFq1)Pq1Nq:qWBqN1Nq:qWBqD1)Pq1DWFAE-D1UW)P1E1BqNS1-5U1qNN5N1NE)q1EA01PqA:q1E’-q1)51:5224AW:E)q/1
2. Detection Range

g
io led
;W)PWA1)PWD1NEAFq1)Pq1Nq:qWBqN1:EA10q)q:)1)Pq1)NEAD2WDDW5A1W/q/1)Pq1)NEAD2W))q0135UqN1WD1-ENFq1qA54FP1)510W99qN1DWFAE-1
9N521’E:8FN54A0/1
3. Interference Range
ic ow

;W)PWA1)PWD1NEAFqL1)Pq1DqA0qN12ES1WA)qN9qNq1UW)P15)PqN1)NEAD2WDDW5AD1’S1E00WAF1)51’E:8FN54A01A5WDq/1HPq1Nq:qWBqN1UW--1
n
A5)1’q1E’-q1)510q)q:)1)Pq1DWFAE-1’4)1)Pq1DWFAE-12ES10WD)4N’15)PqN1DWFAE-D/1
bl kn
at
Pu ch
Te

Fig. 1.5.1 : Ranges for transmission, detection and interference of signals

1.5.1 Path Loss of Radio Signals

Free Space Loss


 OA19Nqq1D3E:qL1)Pq1DWFAE-195--5UD1E1D)NEWFP)1-WAq/11O91D4:P1E1D)NEWFP)1-WAq1qRWD)D1’q)UqqA1)Pq1DqA0qN1EA01)Pq1Nq:qWBqNL1W)1WD1
:E--q01)Pq1-WAq1591DWFP)1+W]YK/11
 HPq1DWFAE-1qR3qNWqA:qD19Nqq13E)P1-5DD1qBqA1W91A515’6q:)1qRWD)D1’q)UqqA1)Pq1DqA0qN1EA01)Pq1Nq:qWBqN/1HPWD1WD1’q:E4Dq1)Pq1
Nq:qWBqN135UqN1λ$1WD13N535N)W5AE-1)51Q[0"1/1\qNq101WD1)Pq10WD)EA:q1’q)UqqA1)Pq1DqA0qN1EA01)Pq1Nq:qWBqN/1\qA:qL1ED101
WA:NqEDqDL1)Pq1Nq:qWBq0135UqN1λ$10q:NqEDqD/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-18 Introduction to Mobile Computing

Other Parameters affecting signal Strength


 HPq1Nq:qWBq0135UqN1E-D510q3qA0D15A1)Pq1UEBq-qAF)P1EA01)Pq1FEWA1591)Pq1Nq:qWBqN1EA01)NEAD2W))qN1EA)qAAE/1
 =5N1 -5AF1 0WD)EA:q1 :5224AW:E)W5AL1 25D)1 NE0W51 )NEAD2WDDW5A1 )E8qD1 3-E:q1 )PN54FP1 EWNL1 NEWAL1 DA5UL1 95FL1 q):/1 HPq1
E)25D3PqNq1PqEBW-S1WA9-4qA:qD1)Pq1V4E-W)S1591)Pq1DWFAE-/1√/F/1DE)q--W)q1)NEAD2WDDW5A/1

1.5.2 Additional Signal Propagation Effects

1. Blocking / Shadowing
 HPq1DWFAE-D1UW)P1PWFPqN19NqV4qA:S1’qPEBq1-W8q1E1D)NEWFP)1-WAq/11
 HPqDq1DWFAE-D1ENq1’-5:8q01’S1qBqA1D2E--15’D)E:-qD1-W8q1E1UE--L1E1:EN15N1E1)N4:815A1E1N5E0/1HPWD13PqA52qA5A1WD1:E--q01
’-5:8WAF15N1DPE05UWAF/1
2. Reflection
 ;PqA1 E1 DWFAE-1 qA:54A)qND1 E1 D4N9E:q1 )PE)1 WD1 -ENFq1 Nq-E)WBq1 )51 )Pq1 UEBq-qAF)P1 591 )Pq1 DWFAE-L1 E1 3PqA52qA5A1 :E--q01

e
Nq9-q:)W5A15::4ND/11
 HPq1Nq9-q:)q01DWFAE-1WD1A5)1ED1D)N5AF1ED1)Pq15NWFWAE-L1ED1)Pq15’6q:)1:EA1E’D5N’1D52q1591)Pq1DWFAE-zD135UqN/1

g
3. Refraction
io led
 HPWD1q99q:)15::4ND1’q:E4Dq1)Pq1Bq-5:W)S1591)Pq1q-q:)N52EFAq)W:1UEBqD10q3qA0D15A1)Pq10qADW)S1591)Pq12q0W421)PN54FP1
UPW:P1W)1)NEBq-D/11

ic ow

<D1DP5UA1WA1=WF/1Q/%/ZL1UEBqD1)PE)1)NEBq-1WA)51E10qADqN12q0W421ENq1’qA)1)5UEN0D1)Pq12q0W42/1
4. Scattering
n
 O91)Pq15’6q:)1DWbq1WD1WA1)Pq15N0qN1591)Pq1UEBq-qAF)P1591)Pq1DWFAE-15N1-qDDL1)PqA1)Pq1DWFAE-1:EA1’q1D:E))qNq01WA)512EAS1
bl kn

D2E--1DWFAE-D/11
 Y:E))qNq01DWFAE-D1ENq1UqE8qN1)PEA1)Pq15NWFWAE-1DWFAE-/1
at
Pu ch

5. Diffraction
–W99NE:)W5A15::4ND1E)1)Pq1q0Fq1591EA1W23qAq)NE’-q1’50S1)PE)1WD1-ENFq1ED1:523ENq01)51)Pq1UEBq-qAF)P1591E1NE0W51UEBq/1
Te

Fig. 1.5.2 : Blocking, reflection, refraction and diffraction of waves

1.5.3 Multi-path Propagation and Fading

1.5.3(a) Multi-path propagation


 HPq1UWNq-qDD1:PEAAq-1WD1E124-)W3E)P13N53EFE)W5A1:PEAAq-/1
 HPq1NE0W51UEBqD1)PE)1q2EAE)q19N521)Pq1)NEAD2W))qN1051A5)1NqE:P1)Pq1Nq:qWBqN15A-S1’S1E1DWAF-q13E)P/1HPq1DWFAE-1:EA1)E8q1
2EAS10W99qNqA)13E)PD19N521)Pq1DqA0qN1)51)Pq1Nq:qWBqN104q1)51Nq9-q:)W5AL1D:E))qNWAF1EA010W99NE:)W5A/1HPWD1q99q:)1WD1:E--q01
24-)W>3E)P13N53EFE)W5A/1
 G4-)W>3E)P13N53EFE)W5A1WD15Aq1591)Pq125D)1DqBqNq1NE0W51:PEAAq-1W23EWN2qA)D/1
 =WF/1Q/%/‘1DP5UD1E1DqA0qN15A1)Pq1-q9)1PEA01DW0q1EA015Aq135DDW’-q1Nq:qWBqN15A1)Pq1NWFP)1PEA01DW0q/11
 <1NE0W51UEBq1q2W))q01’S1E1DqA0qN1:EA1)E8q1)Pq1W]Y13E)P1+W/q/1)NEBq-1WA1D)NEWFP)1-WAqKL15N1W)12ES1’q1D:E))qNq01E)1D2E--1
5’D)E:-qD15N1Nq9-q:)q01E)1-ENFq1’4W-0WAFD/
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-19 Introduction to Mobile Computing

 As a result, we have multiple copies of the same signal being transmitted and received with different delays, different
amplitudes and phases.
 This effect caused by multi-path propagation is called delay spread i.e. the original signal is spread due to different
delays of parts of the signal.

g e
io led
ic ow
n
bl kn
at
Pu ch

Fig. 1.5.3 : Multi-path propagation and inter-symbol interference


Te

 As shown in Fig. 1.5.3, a short impulse will be smeared out into a broader impulse or into several weaker impulses. As
a result, energy intended for one symbol spills over the adjacent symbol. This effect is called inter symbol interference
(ISI).
 ISI makes detection of the signal difficult at the receiver. In real situation many weaker impulses arrive at the receiver.
Some of the received pulses are too weak to be detected and appear as noise.

1.5.3(b) Fading
The term fading means rapid fluctuations of the amplitudes, phases, or multipath delays of a radio signal over a short
period or short travel distance.
1. Fading effect due to mobility
In addition to multipath propagation, another problem called fading occurs due to mobility. Following two types of
fading may occur due to mobility.
(i) Short-term fading
 Short term fading occurs when receivers or senders or both move. It occurs due to the quick changes in the received
power.
 The receiver now has to try to continuously adapt to the varying channel characteristics.
 However, if such changes are too fast then (e.g. driving on a highway through a city) receiver cannot adapt fast
enough and the error rate of the transmission increases dramatically. Short term fading is shown in Fig. 1.5.4.
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-20 Introduction to Mobile Computing

Fig. 1.5.4 : Short term and long term fading


(ii) Long-term fading
 HPq1-5AF1)qN219E0WAF15::4ND1UPqA1)Pq1DqA0qN1WD1D)E)W5AENS1EA01)Pq10WD)EA:q1591)Pq1Nq:qWBqN1)51)Pq1DqA0qN1BENWqD1D-5U-S/1
 O)15::4ND104q1)51D-5U1:PEAFqD1WA1)Pq1EBqNEFq135UqN1Nq:qWBq0/1HPWD1WD1DP5UA1ED1)Pq1EBqNEFq135UqN1WA1=WF/1Q/%/7/11
 YqA0qND1 :EA1 :523qADE)q1 95N1 -5AF1 )qN21 9E0WAF1 ’S1 WA:NqEDWAF[0q:NqEDWAF1 DqA0WAF1 35UqN1 D51 )PE)1 )Pq1 Nq:qWBq01 DWFAE-1

e
E-UESD1D)ESD1UW)PWA1:qN)EWA1-W2W)D/1

g
2. Fading Effects due to Multipath Time Delay Spread
io led
(i) Flat Fading
 =-E)19E0WAF15::4ND1UPqA1)Pq1’EA0UW0)P1591)Pq1)NEAD2W))q01DWFAE-1WD1-qDD1)PEA1)Pq1:5PqNqA:q1’EA0UW0)P1591)Pq1:PEAAq-/11

ic ow

√V4WBE-qA)-SL1 )Pq1 9E0WAF1 WD1 9-E)1 9E0WAF1 W91 )Pq1 DS2’5-1 3qNW501 591 )Pq1 DWFAE-1 WD1 25Nq1 )PEA1 )Pq1 N2D1 0q-ES1 D3NqE01 591 )Pq1
:PEAAq-/1
n
(ii) Frequency Selective Fading
bl kn

 =NqV4qA:S1 Dq-q:)WBq19E0WAF1 5::4ND1 UPqA1 )Pq1 DWFAE-1’EA0UW0)P1WD1 25Nq1)PEA1)Pq1:5PqNqA:q1’EA0UW0)P1591)Pq125’W-q1


NE0W51:PEAAq-/11
at


Pu ch

√V4WBE-qA)-S1)Pq1DS2’5-D104NE)W5A1591)Pq1DWFAE-1WD1-qDD1)PEA1)Pq1N2D10q-ES1D3NqE0/1

1.6 Signal Characteristics


Te

 YWFAE-D1 ENq1 )Pq1 3PSDW:E-1 Nq3NqDqA)E)W5A1 591 0E)E/1 –E)E1 WA1 E1 :5224AW:E)W5A1 DSD)q21 :EA1 ’q1 qR:PEAFq01 )PN54FP1 )Pq1
DWFAE-D/1YWFAE-D1ENq194A:)W5AD1591)W2q1EA01-5:E)W5A/1
 YWFAE-13ENE2q)qND1Nq3NqDqA)1)Pq10E)E1BE-4qD/1YWFAE-13ENE2q)qND1ENq1)Pq1<23-W)40q1+<KL19NqV4qA:S1+9K1EA013PEDq1DPW9)1
+qK/1HPq125D)1WA)qNqD)WAF1)S3q1591DWFAE-195N1NE0W51)NEAD2WDDW5A1WD13qNW50W:1DWFAE-1+qD3q:WE--S1DWAq1UEBqKL14Dq01ED1:ENNWqND/1
 HPq1FqAqNE-194A:)W5A1591E1DWAq1UEBq1WDL11D+)K1i1<)1DWA+Z119)1)1f1)K1

Fig. 1.6.1 : Time Domain representation of a signal (a sine wave without phase
shift and with a phase shift )
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-21 Introduction to Mobile Computing

1.7 Multiplexing
.MU - May 18.

Q. Discuss multiplexing in wireless communication. (May 18, 10 Marks)

 G4-)W3-qRWAF12qEAD1)Pq1E’W-W)S1)51DqA010E)E1:52WAF19N52124-)W3-q1D54N:qDL14DqND15N1:PEAAq-D15BqN1E1:5225A1DPENq01
)NEAD2WDDW5A1 2q0W421 UW)P1 2WAW2421 WA)qN9qNqA:q1 EA01 2ERW2421 4)W-WbE)W5A/1 H51 2E8q1 q99W:WqA)1 4Dq1 591 PWFP>D3qq01
:5224AW:E)W5A1-WAqDL1D52q195N2159124-)W3-qRWAF1WD14Dq0/11
 =54N1)S3qD159124-)W3-qRWAF1ENq1:5225A-S14Dq01WA1:5224AW:E)W5A1DSD)q2D/1
Q/1 Y3E:q1–WBWDW5A1G4-)W3-qRWAF1+Y–GK1
Z/1 HW2q1–WBWDW5A1G4-)W3-qRWAF1+H–GK1
‘/1 =NqV4qA:S1–WBWDW5A1G4-)W3-qRWAF1+=–GK1

e
7/1 (50q1–WBWDW5A1G4-)W3-qRWAF1+(–GK1

g
1 io led
1.7.1 Space Division Multiplexing (SDM)
 OA1D3E:q10WBWDW5A124-)W3-qRWAFL1)Pq1qA)WNq1NqFW5A1591)NEAD2WDDW5A1WD10WBW0q01WA)5124-)W3-q1D3E:qD/1=5N1qR:PEAFWAF10E)EL1
qE:P14DqN1WD1E--5:E)q01E1:5224AW:E)W5A1:PEAAq-/R
ic ow

 =WF/1Q/l/Q1DP5UD1DWR1:PEAAq-D18%# )518&1EA01E1)PNqq10W2qADW5AE-1:55N0WAE)q1DSD)q2/1HPq10W2qADW5AD1ENq1:50q1:L1)W2q1)1
EA019NqV4qA:S1+9K/11O)1E-D51DP5UD1D3E:q1Y'1Nq3NqDqA)q01BWE1:WN:-qD/1(PEAAq-18%1)518(1:EA1’q12E33q015A)51)Pq1)PNqq1D3E:qD1
n
Y%1)51Y(1UPW:P1:-qEN-S1Dq3ENE)qD1)Pq1:PEAAq-/1
bl kn

 O)1 :EA1 ’q1 A5)q01 )PE)1 )PqNq1 WD1 D52q1 D3E:q1 ’q)UqqA1 qE:P1 :PEAAq-/1 HPWD1 D3E:q1 WD1 :E--q01 E1 M<UA:R HLUvvWb/1 =5N1 )Pq1
Nq2EWAWAF1:PEAAq-DL1)PNqq1E00W)W5AE-1D3E:qD1U54-01’q1Aqq0q0/11
at
Pu ch
Te

Fig. 1.7.1 : Space Division Multiplexing

Application
 HPWD124-)W3-qRWAF1D:Pq2q1:EA1’q14Dq0195N1=G1NE0W51D)E)W5AD1W91E1DWAF-q1=G1D)E)W5A1)NEAD2W)D1WA1E1FWBqA1NqFW5A1+DES1D52q1
:W)SK1 5A-S/1 HPq1 DE2q1 )NEAD2WDDW5A1 NEAFqD1 :EA1 )PqA1 ’q1 DPENq01 ’S1 0W99qNqA)1 NE0W51 D)E)W5AD1 EN54A01 )Pq1 U5N-01 UW)P54)1
WA)qN9qNqA:q/11
 Y–G1WD1E-D514Dq01WA1:q--4-EN1DSD)q2D1UPqNq1)Pq1DqNBW:q1ENqE1WD10WBW0q01WA)510W99qNqA)1:q--D/1√E:P1:q--1WD1EDDWFAq010W99qNqA)1
9NqV4qA:S1’EA01D4:P1)PE)1)PqNq1WD1A51WA)qN9qNqA:q1WA1E06E:qA)1:q--D/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-22 Introduction to Mobile Computing

Advantage
Y–G1WD1qEDS1)51W23-q2qA)/1
Problem
O91)U515N125Nq1:PEAAq-D1ENq1qD)E’-WDPq01WA1)Pq1DE2q1D3E:q1+=5N1qRE23-qL1DqBqNE-1NE0W51D)E)W5AD1UEA)1)51’N5E0:ED)1WA)51
)Pq1DE2q1:W)SKL1)PqA1Y–G1E-5Aq1:EAA5)1’q14Dq0/1

1.7.2 Frequency Division Multiplexing (FDM)


 OA19NqV4qA:S10WBWDW5A124-)W3-qRWAFL1)Pq1qA)WNq19NqV4qA:S1NEAFq1WD10WBW0q01WA)519NqV4qA:S1’EA0D/R
 √E:P1:PEAAq-1Fq)D1E1:qN)EWA1’EA01591)Pq1D3q:)N42195N1)Pq1UP5-q1)W2q/1
 –W99qNqA)19NqV4qA:S1’EA0D1ENq1Dq3ENE)q01’S1F4EN01D3E:qD/1

g e
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 1.7.2 : Frequency Division Multiplexing


Application
HPWD1D:Pq2q1WD14Dq0195N1NE0W51D)E)W5AD1UW)PWA1)Pq1DE2q1NqFW5AL1UPqNq1qE:P1NE0W51D)E)W5A14DqD1W)D15UA19NqV4qA:S/1
Advantages
 T51:523-qR1:55N0WAE)W5A1’q)UqqA1DqA0qN1EA01Nq:qWBqN1WD1NqV4WNq0/1
 HPWD1D:Pq2q1U5N8D195N1EAE-5F1DWFAE-D1ED1Uq--/1
Disadvantages
 HPq1’EA0UW0)P1WD1UED)q01W91)Pq1)NE99W:1WD10WD)NW’4)q014AqBqA-S/1
 HPq1D:Pq2q1WD1WA9-qRW’-q/1

1.7.3 Time Division Multiplexing (TDM)


 OA1H–GL1)Pq1qA)WNq1D3q:)N421WD1FWBqA1)51E13EN)W:4-EN1:PEAAq-195N1E1:qN)EWA1)W2q1WA)qNBE-/1
 <D1DP5UA1WA1=WF/1Q/l/‘L1E1:PEAAq-18'1WD1FWBqA1)Pq1UP5-q1’EA0UW0)P195N1E1:qN)EWA1E254A)1591)W2q/11
 X4EN01D3E:qD1ENq1Aqq0q01WA1H–G1ED1Uq--L1UPW:P1ENq1A5U1Nq3NqDqA)q01’S1)W2q1FE3D/1
 HP4DL1WA1H–G1E--1)Pq1:PEAAq-D14Dq1)Pq1DE2q19NqV4qA:S1’4)1E)10W99qNqA)1)W2q/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-23 Introduction to Mobile Computing

1
Fig. 1.7.3 : Time division multiplexing

e
Advantage

g
io led
HPqNq1WD15A-S15Aq1:ENNWqN1WA1)Pq12q0W421E)1EAS1)W2q1UPW:P1NqD4-)D1WA1PWFP1)PN54FP34)1qBqA1W91)PqNq1ENq12EAS14DqND/R
Disadvantage
ic ow

Q/1 O91)U51)NEAD2WDDW5AD15BqN-E31WA1)W2qL1HλKHLUvvWbRkvSWABWAWvHW12ES15::4N/11
Z/1 H51EB5W01:5>:PEAAq-1WA)qN9qNqA:qL1W)1WD1NqV4WNq01)PE)10W99qNqA)1DqA0qND1ENq13Nq:WDq-S1DSA:PN5AWbq0/R
n
1.7.4 Frequency and Time Division Multiplexing
bl kn

 OA1)PWD124-)W3-qRWAF1D:Pq2qL19NqV4qA:S1EA01)W2q10WBWDW5A124-)W3-qRWAF1ENq1:52’WAq0/11
at


Pu ch

<D1 DP5UA1 WA1 =WF/1 Q/l/7L1 :PEAAq-1 8'1 4DqD1 :qN)EWA1 9NqV4qA:S1 ’EA01 95N1 E1 :qN)EWA1 E254A)1 591 )W2q/1 T5U1 F4EN01 D3E:qD1 ENq1
NqV4WNq01WA1’5)P10W2qADW5AD/11
Te

Fig. 1.7.4 : Frequency and time division multiplexing

Application
HPq1D:Pq2q1WD14Dq01WA1XYG1+X-5’E-1YSD)q2195N1G5’W-q1(5224AW:E)W5AK1
Advantages
Q/1 ]99qND1’q))qN13N5)q:)W5A1EFEWAD)1)E33WAF/R
Z/1 λN5BW0qD13N5)q:)W5A1EFEWAD)19NqV4qA:S1Dq-q:)WBq1WA)qN9qNqA:q/R
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-24 Introduction to Mobile Computing

Disadvantage
Tq:qDDENS1:55N0WAE)W5A1WD1NqV4WNq01’q)UqqA10W99qNqA)1DqA0qND/R

1.7.5 Code Division Multiplexing (CDM)


 OA1)PWD1D:Pq2qL1E--1:PEAAq-D14Dq1)Pq1DE2q19NqV4qA:S1E)1)Pq1DE2q1)W2q195N1)NEAD2WDDW5A/1
 ФDqND1ENq1A5U1Dq3ENE)q014DWAF1:50qD/1

g e
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 1.7.5 : Code division multiplexing

 OA1)PWDL1DWFAE-D19N52124-)W3-q1WA0q3qA0qA)1D54N:qD1:EA1’q1)NEAD2W))q01E)1)Pq1DE2q1)W2q15BqN1)Pq1DE2q19NqV4qA:S1’EA0/11
 HPWD1)ED81:EA1’q1E:PWqBq01BWE1D3NqE01D3q:)N421)q:PAWV4q1WA1UPW:P1D3q:WE-1:50qD1:E--q01ED15N)P5F5AE-1:50qD1ENq14Dq01)51
D3NqE01qE:P1DWFAE-15BqN1E1-ENFqL1:5225A19NqV4qA:S1’EA0/1
 Y5L1WA1(–GL1qE:P1:PEAAq-1WD1EDDWFAq01E13EN)W:4-EN15N)P5F5AE-1:50q1EA01)PWD1WD1P5U124-)W3-qRWAF1WD1E:PWqBq0/1
 X4EN01D3E:qD1ENq1A5U1NqV4WNq01WA1)Pq1:50q10W2qADW5A/11
Advantages
Q/1 O)1FWBqD1F55013N5)q:)W5A1EFEWAD)1WA)qN9qNqA:q1EA01)E33WAF/11
Z/1 XEA0UW0)P14)W-WbE)W5A1WD1BqNS1q99W:WqA)/1
‘/1 T51DSA:PN5AWbE)W5A1WD1Aqq0q01’q)UqqA1)Pq1DqA0qN1EA01)Pq1Nq:qWBqN/1
Disadvantages
Q/1 eENSWAF14DqN10E)E1NE)qD/1
Z/1 G5Nq1:523-qR1DWFAE-1NqFqAqNE)W5A1EA01PqA:q1PWFP1:523-qRW)S1E)1)Pq1Nq:qWBqN/1
‘/1 O)1WD1W23-q2qA)q014DWAF1D3NqE01D3q:)N421)q:PA5-5FS/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-25 Introduction to Mobile Computing

7/1 <1Nq:qWBqN124D)1’q13Nq:WDq-S1DSA:PN5AWbq01UW)P1)Pq1)NEAD2W))qN1)51E33-S10q:50WAF1:5NNq:)-S/11
%/1 λNq:WDq1 35UqN1 :5A)N5-1 WD1 NqV4WNq0/1 <--1 DWFAE-D1 DP54-01 NqE:P1 )Pq1 Nq:qWBqN1 UW)P1 25Nq1 5N1 -qDD1 )Pq1 DE2q1 35UqN1
5)PqNUWDq1-5U135UqN1DWFAE-D1:54-01’q10NEWAq01’S1PWFP135UqN15AqD/11

1.8 Spread Spectrum Techniques


.MU - May 12, Dec. 12, May 13, May 14.

Q. What are the main benefits of spread spectrum system ? Explain direct sequence spread spectrum in detail. How can
DSSS systems benefit from multipath propagation ? (May 12, 10 Marks)
Q. What are benefits of Spread Spectrum systems ? (Dec. 12, 5 Marks)
Q. Explain different types of Spread Spectrum technique used in cellular system. (May 13, 5 Marks)
Q. What is Spread Spectrum ? (May 14, 5 Marks)

 Y3NqE01D3q:)N421WD1EA1W235N)EA)195N21591qA:50WAF195N1UWNq-qDD1:5224AW:E)W5AD/11

e
 OA1:5A)NED)1)51NqF4-EN1AENN5U’EA01)q:PA5-5FSL1)Pq1D3NqE0>D3q:)N4213N5:qDD1WD1E1UW0q’EA01)q:PA5-5FS/1

g
 OA1)PWD1)q:PAWV4q1)Pq19NqV4qA:S1591)Pq1)NEAD2W))q01DWFAE-1WD10q-W’qNE)q-S1D3NqE01WA1)Pq19NqV4qA:S1052EWA/1HPq1NqD4-)EA)1
io led
DWFAE-1PED124:P1FNqE)qN1’EA0UW0)P1)PEA1)Pq15NWFWAE-1DWFAE-/1
 HPq13N5:qDD1591D3NqE0WAF1EA010q>D3NqE0WAF1WD1DP5UA1WA1=WF/1Q/Z/Q/1
ic ow
n
bl kn
at
Pu ch
Te

Fig. 1.8.1 : Spread Spectrum: Spreading and despreading

+WK1 =WF/1Q/Z/Q1+WK1DP5UD1AENN5U’EA01DWFAE-1)NEAD2W))q0195N21E1DqA0qN/1HPWD1WD1)Pq1DWFAE-14DqN1UEA)D1)51DqA0/1
+WWK1 0λ[091WD1)Pq135UqN10qADW)S1591)PWD1DWFAE-/1HPq1qAqNFS1NqV4WNq01)51)NEAD2W)1)Pq1DWFAE-1WD1qV4E-1)51)Pq1ENqE1:5BqNq01
’S1)Pq1DWFAE-/11
+WWWK1 Yq:5A01 D)q31 WD1 )51 D3NqE01 )Pq1 4DqN1 DWFAE-/1 HPq1 3N5:qDD1 591 D3NqE0WAF1 )Pq1 DWFAE-1 WD1 A5)PWAF1 ’4)1 :5ABqN)WAF1 E1
AENN5U’EA01DWFAE-1WA)51’N5E0’EA01DWFAE-/1HPWD1:EA1’q1E:PWqBq01’S124-)W3-SWAF1E1λT1DqV4qA:q1UW)P1)Pq14DqN10E)E/1
HPq1 qAqNFS1 NqV4WNq01 )51 )NEAD2W)1 )Pq1 DWFAE-1 WD1 DE2qL1 ’4)1 )Pq1 35UqN1 -qBq-1 WD1 24:P1 -5UqN1 )PEA1 )Pq1 AENN5U’EA01
DWFAE-/1
+WBK1 –4NWAF1 )Pq1 )NEAD2WDDW5AL1 AENN5U1 ’EA01 EA01 ’N5E0’EA01 WA)qN9qNqA:q1 Fq)1 E00q01 )51 )Pq1 DWFAE-1 +DP5UA1 WA11
=WF/1Q/Z/Q1+WWWKK/1
+BK1 <)1)Pq1Nq:qWBqN1D421591WA)qN9qNqA:q1EA014DqN1DWFAE-D1WD1Nq:qWBq01+DP5UA1WA1=WF/1Q/Z/Q1+WBKK/1
+BWK1 HPq1 Nq:qWBqN1 A5U1 0qD3NqE0D1 )Pq1 DWFAE-1 W/q/1 :5ABqN)D1 )Pq1 D3NqE01 4DqN1 DWFAE-1 WA)51 E1 AENN5U’EA01 DWFAE-/1 HPWD1 WD1
E:PWqBq01 ’S1 24-)W3-SWAF1 )Pq1 Nq:qWBq01 DWFAE-1 UW)P1 )Pq1 DE2q1 λT1 DqV4qA:q1 4Dq01 WA1 D)q31 Z1 EA01 ’S1 4DWAF1 ’EA03EDD1
9W-)qN1)51:4)159919NqV4qA:WqD1-q9)1EA01NWFP)1591)Pq1AENN5U’EA01DWFAE-1+DP5UA1WA1=WF/1Q/Z/Q1+BKK/R
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-26 Introduction to Mobile Computing

Advantages of Spread Spectrum Techniques


Q/1 X5501 3N5)q:)W5A1 EFEWAD)1 AENN5U’EA01 WA)qN9qNqA:q1 "1 <1 DWFAE-1 UW)P1 AENN5U1 9NqV4qA:S1 WD1 D4’6q:)1 )51 :E)ED)N53PW:1
WA)qN9qNqA:q1)PE)1:EA1UW3q154)1AENN5U1’EA01DWFAE-D195N1)Pq104NE)W5A1591)Pq1WA)qN9qNqA:q/11Y3NqE01D3q:)N421)q:PAWV4q1
D3NqE0D1)Pq1AENN5U1’EA01DWFAE-1WA)51E1’N5E01’EA01DWFAE-14DWAF1E1D3q:WE-1:50q1)51E:PWqBq1NqDWD)EA:q1EFEWAD)1)PWD1AENN5U1
’EA01WA)qN9qNqA:q/1
Z/1 YqDWD)EA:q1 )51 WA)qN:q3)W5A1 "1 <1 :5AD)EA)>9NqV4qA:S1 DWFAE-1 WD1 qEDS1 )51 WA)qN:q3)L1 EA01 WD1 )PqNq95Nq1 A5)1 Uq--1 D4W)q01 )51
E33-W:E)W5AD1WA1UPW:P1WA95N2E)W5A124D)1’q18q3)1:5A9W0qA)WE-/1OA1D3NqE01D3q:)N421)q:PAWV4qL1)Pq1DWFAE-1WD1D3NqE014DWAF1E1
D3q:W9W:L1 ’4)1 :523-W:E)q01 2E)Pq2E)W:E-1 94A:)W5A/1 OA1 5N0qN1 )51 WA)qN:q3)1 )Pq1 DWFAE-L1 E1 Nq:qWBqN1 24D)1 8A5U1 P5U1 )51 0q>
D3NqE01)Pq1DWFAE-/11
‘/1 Y3NqE01 Y3q:)N421 DSD)q2D1 :EA1 :5>qRWD)1 UW)P1 5)PqN1 NE0W51 DSD)q2DL1 UW)P54)1 ’qWAF1 0WD)4N’q01 ’S1 )PqWN1 3NqDqA:q1 EA01
UW)P54)10WD)4N’WAF1)PqWN1E:)WBW)S/1HP4D1)Pq1D3NqE01D3q:)N421DSD)q2D12ES1’q153qNE)q01UW)P54)1)Pq1Aqq0195N1-W:qADq/1
7/1 Y3NqE01D3q:)N421)q:PAWV4qD1:EA1NqDWD)124-)W>3E)P19E0WAF/1
Disadvantages of Spread Spectrum Techniques

g e
Q/1 (523-qRW)S1591Nq:qWBqN1WD1WA:NqEDq0/1
io led
Z/1 WENFq19NqV4qA:S1’EA01WD1Aqq0q0195N1D3NqE0WAF1)Pq1DWFAE-/11
‘/1 Y3NqE01DWFAE-D1UW)P1-5U1D)NqAF)P12ES1WA)qN9qNq1UW)P15)PqN1)NEAD2WDDW5AD1EA01E33qEN1ED1A5WDq/1
7/1 λNq:WDq135UqN1:5A)N5-1WD1Aqq0q0/1
ic ow

L?AWU:kvMRSLWR-?WHSA<)RHUvRBWRUHLkWAW:RkvRS0λR:kBBWAWvSR0Uz-R
n
Q/1 –WNq:)1YqV4qA:q1Y3NqE01Y3q:)N421+–YYYK11
bl kn

Z/1 =NqV4qA:S1\533WAF1Y3NqE01Y3q:)N421+=\YYK1

1.8.1 Direct Sequence Spread Spectrum (DSSS)


at
Pu ch

 =WF/1Q/Z/Z1DP5UD1)Pq1)NEAD2W))qN1591–YYY/1
Te

Fig. 1.8.2 : DSSS Transmitter

1. DSSS Transmitter
–YYY1)NEAD2W))qN1WAB5-BqD1)U512E65N1D)q3D/1
LSW?R:RMRL?AWU:kvMRSLWR-kMvUbRR
 Y3NqE0WAF1WA1–WNq:)1YqV4qA:q12504-E)W5A1WD1E:PWqBq01’S12504-E)WAF1)Pq1:ENNWqN1DWFAE-1+4DqN10E)EK1UW)P1E10WFW)E-1:50q1
DqV4qA:q1UPW:P1PED1E1’W)1NE)q124:P1PWFPqN1)PEA1)PE)1591)Pq12qDDEFq1)51’q1DqA)/11
 HPWD10WFW)E-1:50q1DqV4qA:q1WD1)S3W:E--S1E13Dq405NEA0521’WAENS1:50q/1O)1WD1E-D518A5UA1ED1λT1+n3Dq405>A5WDqnK1DqV4qA:q1
5N1:PW33WAF1DqV4qA:q/1
 Y3NqE0WAF1:EA1’q105Aq1’S1DW23-S1`]YWAF14DqN1’W)1D)NqE21UW)P1:PW33WAF1DqV4qA:q/1
 HPq1)W2q13qNW501591E1DWAF-q1’W)1WA1)Pq1λT1:50q1WD1)qN2q01E1!"#$L1EA01)Pq1’W)1NE)q1591)Pq1λT1:50q1WD1)qN2q01)Pq1!"#$%&'()/111
 HPq1D3NqE0WAF13N5:qDD1WD1DP5UA1WA1=WF/1Q/Z/‘/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-27 Introduction to Mobile Computing

g e
Fig. 1.8.3 : Spreading with DSSS
io led
 (5ADW0qN1)Pq1:PW33WAF1DqV4qA:q1ED1VQQVQVQ/11
 O91)Pq14DqN1’W)1WD1V1)Pq1NqD4-)1591`]YWAF1WD1)Pq1:PW33WAF1DqV4qA:q1W)Dq-9/11
ic ow

 O91)Pq14DqN1’W)1WD1Q1)Pq1NqD4-)1WD1)Pq1:523-q2qA)1591:PW33WAF1DqV4qA:q/1

n
O911)Pq11’W)104NE)W5A15914DqN10E)E1WD1))#EA01)Pq104NE)W5A15915Aq1:PW31WA1:PW33WAF1DqV4qA:q1WD1)*L1)PqA1)Pq1D3NqE0WAF19E:)5N11
bl kn

D1i1))+#)*#0q)qN2WAqD1)Pq1’EA0UW0)P1591E1DWFAE-/11
 O91)Pq15NWFWAE-1DWFAE-1PED1’EA0UW0)P101)PqA1)Pq1NqD4-)WAF1DWFAE-1Aqq0D1+-RDR0K1’EA0UW0)P/1
at
Pu ch

LSW?R>RMREU:kλR)λ:<bUSkλvR
 HPq1D3NqE01DWFAE-1WD1A5U12504-E)q01UW)P1E1NE0W51:ENNWqN/11

Te

HPq1NE0W51:ENNWqN1DPW9)D1)PWD1DWFAE-1)51)Pq1:ENNWqN19NqV4qA:S/11
 HPWD1DWFAE-1WD1)PqA1)NEAD2W))q0/1
2. DSSS Receiver
HPq1–YYY1Nq:qWBqN1WAB5-BqD1)PNqq1D)q3D1"1
+WK1 –q2504-E)W5A1
+WWK1 (5NNq-E)W5A1
+WWWK1 –q:WDW5A1GE8WAF1

Fig. 1.8.4 : DSSS Receiver


Mobile Communication & Computing (MU-Sem. 7-Comp) 1-28 Introduction to Mobile Computing

NkOR PW)λ:<bUSλAR
–q2504-E)W5A1591)Pq1Nq:qWBq01DWFAE-1WD1E:PWqBq01’S14DWAF1)Pq1DE2q1:ENNWqN1ED1)Pq1)NEAD2W))qNL1NqBqNDWAF1)Pq12504-E)W5A1
3N5:qDD/1XEA0UW0)P1591)Pq1NqD4-)EA)1DWFAE-1WD1E33N5RW2E)q-S1DE2q1ED1)PE)1591)Pq15NWFWAE-1D3NqE01D3q:)N421DWFAE-/1
NkkOR >λAAWbUSλAR
\qNq1 )Pq1 Nq:qWBqN1 4DqD1 )Pq1 DE2q1 3Dq4051 NEA0521 DqV4qA:q1 +(PW31 DqV4qA:qK1 ED1 )Pq1 )NEAD2W))qN/1 λDq4051 NEA0521
DqV4qA:qD1 E)1 )Pq1 DqA0qN1 EA01 )Pq1 Nq:qWBqN1 PEBq1 )51 ’q1 3Nq:WDq-S1 DSA:PN5AWbq01 ’q:E4Dq1 )Pq1 Nq:qWBqN1 :E-:4-E)qD1 )Pq1
3N504:)1591E1:PW31+`]Y153qNE)W5AK1UW)P1)Pq1WA:52WAF1DWFAE-/1–4NWAF1E1’W)13qNW501EA1WA)qFNE)5N1E00D1E--1)PqDq13N504:)D/11
NkkkOR PWHk-kλvR@vkSR
=WAE--S1)Pq10q:WDW5A14AW)10q:W0qD1W91)Pq1D421Nq3NqDqA)D1’WAENS1V15N1QL1’EDq015A1)Pq1D421FqAqNE)q01’S1)Pq1WA)qFNE)5N1
04NWAF1qE:P1’W)13qNW50/1
DSSS and Multipath fading

e
 ;q18A5U1)PE)1WA124-)W3E)P13N53EFE)W5A1)PqNq1qRWD)1DqBqNE-13E)PD1UW)P10W99qNqA)10q-ESD1’q)UqqA1E1)NEAD2W))qN1EA01E1

g
Nq:qWBqN/11<D1E1NqD4-)1)Pq1Nq:qWBqN12ES1Nq:qWBq124-)W3-q1:53WqD1591)Pq1DWFAE-L1qE:P1UW)P10W99qNqA)10q-ESD/1

io led
EUJWRAWHWkAWA-R:EA1’q14Dq01)512W)WFE)q1)Pq1q99q:)159124-)W3E)P13N53EFE)W5A/1
 <1NE8q1Nq:qWBqN14DqD1vR:5NNq-E)5ND1:E--q01BkvMWA-195N1vRD)N5AFqD)13E)PD/11
 √E:P1:5NNq-E)5N1WD1DSA:PN5AWbq01)51)Pq1)NEAD2W))qN13-4D1)Pq10q-ES15A1)PE)1D3q:W9W:13E)P/11
ic ow

 <D1D55A1ED1)Pq1Nq:qWBqN10q)q:)D1E1AqU13E)P1UPW:P1WD1D)N5AFqN1)PEA1)Pq1:4NNqA)-S1UqE8qD)13E)PL1W)1EDDWFAD1)PWD1AqU13E)P1
n
)51)Pq1:5NNq-E)5N1UW)P1)Pq1UqE8qD)13E)P/11

bl kn

HPq154)34)D1591)Pq1:5NNq-E)5ND1ENq1)PqA1:52’WAq01EA019q01WA)51)Pq10q:WDW5A14AW)/1
at
Pu ch
Te

Fig. 1.8.5 : Rake receivers

QRU)?bWRλBRPLLLRR
ФDqN1–E)E1"1VQ1
(PW31"1QVQQVQQQVVV1+QQ>:PW31XEN8qN1:50qK1
`]Y1591’W)1V1UW)P1:PW3"1QVQQVQQQVVV1
`]Y1591’W)1Q1UW)P1:PW3"1VQVVQVVVQQQ11
Y3NqE01DWFAE-11111"1QVQQVQQQVVVVQVVQVVVQQQ11
Yq:qWBq01DWFAE-1"1QVQQVQQQVVVVQVVQVVVQQQ11
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-29 Introduction to Mobile Computing

`]Y1591Nq:qWBq01DWFAE-1UW)P1:PW3"11
+QVQQVQQQVVVQVQQVQQQVVVK1`]Y1+QVQQVQQQVVVVQVVQVVVQQQ1K1i1+VVVVVVVVVVVQQQQQQQQQQQK1
YqD4-)1591OA)qFNE)5N"1V1L1QQ1
YqD4-)1591–q:WDW5A14AW)"1V1r171D51’W)1WD1V1
1 1 1 111111QQ1d1l1D51’W)1WD1Q1
–q:50q010E)E"1VQ1
√BqA1W91qNN5N15::4ND104NWAF1)NEAD2WDDW5AL1Nq:qWBq01DWFAE-1:EA1D)W--1’q10q:50q01:5NNq:)-S/11
=5N1 q/F/1 954N)PL1 9W9)PL1 DqBqA)P1 EA01 954N)qqA)P1 ’W)1 WA1 Nq:qWBq01 DWFAE-1 WD1 :PEAFq0L1 )PqA1 )Pq1 Nq:qWBq01 DWFAE-1 U54-01 ’q1
QVQS:QSQVVVVQ:VQVVVQQQ1
T5U1`]Y1591Nq:qWBq01DWFAE-1UW)P1:PW31"11
+QVQQVQQQVVVQVQQVQQQVVVK1`]Y1+QVQS:QSQVVVVQ:VQVVVQQQK1i1+VVVQQVQVVVV1QQVQQQQQQQQK1
YqD4-)1591WA)qFNE)5N"1‘L1QV1

e
YqD4-)1591–q:WDW5A14AW)"1‘1r171D51’W)1WD1V1

g
1 1 1 1 11111QV1d1l1D51’W)1WD1Q1
io led
–q:50q010E)E"1VQ1
Note : Decision maker decides on to 0 if the sum is between 0-4 and 1 if sum is between 7-11.
ic ow

Advantages of DSSS
n
Q/1 YqDWD)EA:q1)51AENN5U1’EA01WA)qN9qNqA:q1EA01EA)W>6E22WAF1q99q:)D/1
bl kn

Z/1 YqDWD)EA:q1)51OA)qN:q3)W5A/1
‘/1 YqDWD)EA:q1)51=E0WAF1+G4-)W3E)P1√99q:)DK/1
at
Pu ch

Disadvantages of DSSS
Q/1 λNq:WDq135UqN1:5A)N5-1Aq:qDDENS/1
Te

Z/1 ]BqNE--1DSD)q21WD1:523-qR/1
‘/1 OD1NqV4WNq01’q)UqqA1)Pq1DqA0qN1EA01)Pq1Nq:qWBqN/1
Applications of DSSS
HPq1–YYY1(5224AW:E)W5AD1ENq1UW0q-S14Dq01)50ES195N1GW-W)ENSL1OA04D)NWE-1Y:WqA)W9W:L1EA01(WBW-14DqD/1HPq1E33-W:E)W5AD1
WA:-40q1)Pq195--5UWAF1"R
:DR >PDGRAU:kλ-RR
1 O)1WD14Dq94-1WA124-)W3-q1E::qDD1:5224AW:E)W5AD1UPqNqWA12EAS14DqND1:5224AW:E)q15BqN1E1DPENq01:PEAAq-/11 1
=5N1qRE23-qL1(–G</1
>DR TUGVRR
R ;WNq-qDD1W<T1UW0q-S14Dq1D3NqE01D3q:)N421:5224AW:E)W5AD/1O√√√1ZVZ/QQ1WD1E1D)EA0EN01)PE)1WD10qBq-53q0195N125’W-q1
:5224AW:E)W5AL1 EA01 UW0q-S1 W23-q2qA)q01 )PN54FP54)1 )Pq1 U5N-0/1 HPq1 D)EA0EN01 0q9WAqD1 )PNqq1 )S3qD1 591 λPSDW:E-1
WESqN1 :5224AW:E)W5AD/1 HPqDq1 ENq1 1 OA9NENq01 +OYK1 (5224AW:E)W5ADL1 –WNq:)1 YqV4qA:q1 Y3NqE01 Y3q:)N421
(5224AW:E)W5ADL1=NqV4qA:S1\533WAF1Y3NqE01Y3q:)N421:5224AW:E)W5AD/1
;DR >λA:bW--RNLλvW-RR
R YqBqNE-1 2EA49E:)4NqND1 W23-q2qA)1 Y3NqE01 Y3q:)N421 WA1 (5N0-qDD1 3P5AqD1 04q1 )51 )PqWN1 E0BEA)EFqD1 -W8q1 Dq:4NW)SL1
W224AW)S1)51A5WDq1EA01-5AFqN1NEAFq/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-30 Introduction to Mobile Computing

1.8.2 Frequency Hopping Spread Spectrum (FHSS)


 =\YY1W23-q2qA)D1H–G13-4D1=–G/R
 OA1)PWD1D:Pq2q1)5)E-1EBEW-E’-q1’EA0UW0)P1WD1D3-W)1WA)512EAS1:PEAAq-D1591D2E--qN1’EA0UW0)P/1
 HNEAD2W))qN1EA01Nq:qWBqN1D)ES15A15Aq1591)PqDq1:PEAAq-D195N1D52q13Nq0q9WAq01)W2q1EA01)PqA1P531)51EA5)PqN1:PEAAq-/1
 HPq13E))qNA1591:PEAAq-14DqD1+9NqV4qA:S13E))qNAK1WD1:E--q01)Pq1Lλ??kvMR-W(<WvHW/1R
 HW2q1D3qA)15A1E1:PEAAq-1UW)P1:qN)EWA19NqV4qA:S1WD1:E--q01)Pq1:0WbbRSk)W/1
 HPqNq1ENq1)U51BENWEA)D1591=\YY1:E--q01D-5U1EA019ED)1P533WAF/1
1. Slow hopping
 HNEAD2W))qN14DqD15Aq19NqV4qA:S195N1DqBqNE-1’W)13qNW50D/1=WF/1Q/Z/^1DP5UD1DWR14DqN1’W)D1UW)P1E13qNW501))#/1HNEAD2W))qN14DqD1
9NqV4qA:S1 9"1 95N1 )NEAD2W))WAF1 )Pq1 9WND)1 )PNqq1 ’W)D1 EA01 )E8qD1 0Uq--1 )W2q1 ),-1 HPqA1 )NEAD2W))qN1 P53D1 )51 )Pq1 AqR)11
9NqV4qA:S19(/1
 Y-5U1P533WAF1WD1:PqE3qN1EA01PED1Nq-ERq01)5-qNEA:q/1

e
 O)1WD1-qDD1W224Aq1)51AENN5U’EA01WA)qN9qNqA:q/11

g
2. Fast hopping
io led
 HNEAD2W))qN1:PEAFqD19NqV4qA:S1DqBqNE-1)W2qD104NWAF1E1’W)13qNW50/1OA1=WF/1Q/Z/^1)Pq1)NEAD2W))qN1P53D1)PNqq1)W2qD104NWAF1
E1’W)13qNW50/11
ic ow
n
bl kn
at
Pu ch
Te

Fig. 1.8.6 : Slow and fast frequency hopping

 =ED)1 9NqV4qA:S1 P533WAF1 DSD)q2D1 ENq1 25Nq1 :523-qR1 )51 W23-q2qA)1 ’q:E4Dq1 )NEAD2W))qN1 EA01 Nq:qWBqN1 DP54-01 D)ES1
DSA:PN5AWbq0/1
 HPqDq1DSD)q2D1PEBq1’q))qN1NqDWD)EA:q1EFEWAD)1AENN5U’EA01WA)qN9qNqA:q1EA019NqV4qA:S1Dq-q:)WBq19E0WAF/1
FHSS Transmitter
=WF/1Q/Z/l1DP5UD1DW23-W9Wq01’-5:810WEFNE21591=\YY1)NEAD2W))qN/1
LSW?R:RM1 G504-E)q14DqN10E)E14DWAF10WFW)E->)5>EAE-5F12504-E)W5A1D4:P1ED1=Ym15N1XλYm/1=5N1qRE23-qL19NqV4qA:S19.1WD14Dq01
95N1E1’WAENS1V1EA019%1WD14Dq0195N1’WAENS1Q/11
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-31 Introduction to Mobile Computing

LSW?R>RM1 =NqV4qA:S1 P533WAF1 WD1 3qN95N2q01 ’S1 4DWAF1 P533WAF1 DqV4qA:q/1 HPq1 P533WAF1 DqV4qA:q1 WD1 9q01 WA)51 E1 9NqV4qA:S1
DSA)PqDWbqN1FqAqNE)WAF1)Pq1:ENNWqN19NqV4qA:S19'-1
LSW?R;RM1 Yq:5A01 2504-E)W5A1 WD1 05Aq/1 O)1 4DqD1 2504-E)q01 AENN5U’EA01 DWFAE-1 EA01 :ENNWqN1 9NqV4qA:S1 )51 FqAqNE)q1 E1 AqU1
D3NqE01DWFAE-1UW)P19NqV4qA:S15919'#f19.#95N1E1’W)1V1EA0119'-1f19%195N1E1’W)1Q/1

Fig. 1.8.7 : FHSS transmitter

=HLLREWHWkAWAR

e
=\YY1Nq:qWBqN13qN95N2D1NqBqNDq194A:)W5AD1)51Nq:5AD)N4:)14DqN10E)E/111

g
LSW?R:RMR –q2504-E)q1Nq:qWBq010E)E1’S14DWAF1P533WAF1DqV4qA:q1EA01:5ABqN)1DWFAE-1WA)51AENN5U’EA01DWFAE-/1
io led
LSW?R>RM1 λqN95N21EAE-5F>)5>0WFW)E-12504-E)W5A1)51Nq:5AD)N4:)14DqN10E)E/1
ic ow
n
bl kn
at
Pu ch

Fig. 1.8.8 : FHSS receiver

Slow hopping Vs. Fast hopping


Te

Table 1.8.1 : Slow hopping Vs. Fast Hopping

NUAU)WSWAR Lbλ0RHλ??kvMR =U-SRHλ??kvMR


GEWA1O0qE1 YqBqNE-1’W)D1ENq1)NEAD2W))q014DWAF1E1 ]Aq1’W)1WD1)NEAD2W))q014DWAF1DqBqNE-10W99qNqA)1
DE2q19NqV4qA:S/1 9NqV4qA:WqD/1
YqDWD)EA:q1)51AENN5U’EA01 λN5BW0qD1-qDDqN1NqDWD)EA:q1)51 Xq))qN1NqDWD)EA:q1)51AENN5U’EA01WA)qN9qNqA:q1
WA)qN9qNqA:q1 AENN5U’EA01WA)qN9qNqA:q/1 EA019NqV4qA:S1Dq-q:)WBq19E0WAF/1
Yq:4NW)S1 W5UqN1Dq:4NW)S1ED1:523ENq01)519ED)1 G5Nq1Dq:4Nq01DWA:q15Aq1’W)1WD1)NEAD2W))q014DWAF1
P533WAF/1 DqBqNE-10W99qNqA)19NqV4qA:WqD/1
(523-qRW)S1 WqDD1:523-qR1)51W23-q2qA)1ED1 G5Nq1:523-qR1ED1:523ENq01)51D-5U1P533WAF/1
:523ENq01)519ED)1P533WAF/1

Applications of FHSS
Q/1 XYG14DqD1D-5U19NqV4qA:S1P533WAF1)51EB5W01:5>:PEAAq-1WA)qN9qNqA:q1EA01)51WA:NqEDq1)Pq1:PEAAq-1:E3E:W)S/1
Z/1 X-4q)55)P14DqD1=\YY/1O)14DqD1lU19NqV4qA:WqD1UW)P1Q^VV1P53D[Dq:/1
‘/1 ;W<T1 "1 G5D)1 591 )Pq1 ;WNq-qDD1 W<T1 D)EA0EN0D1 0q9WAq1 )PNqq1 )S3qD1 591 λPSDW:E-1 WESqN1 :5224AW:E)W5AD/1 HPqDq1 ENq1
OA9NENq01 +OYK1 (5224AW:E)W5ADL1 –WNq:)1 YqV4qA:q1 Y3NqE01 Y3q:)N421 (5224AW:E)W5ADL1 =NqV4qA:S1 \533WAF1 Y3NqE01
Y3q:)N421:5224AW:E)W5AD/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-32 Introduction to Mobile Computing

1.8.3 Comparison between DSSS and FHSS

Table 1.8.2 : Difference between DSSS and FHSS

NUAU)WSWAR PLLLR =HLLR

(523-qRW)S1 Y3NqE0WAF1EA010WD3NqE0WAF1WD1DW23-q/1 O)1NqV4WNqD1E1:523-qR19NqV4qA:S1DSA)PqDWbqN1


WA15N0qN1)51FqAqNE)q1)Pq1P53D/11

XEA0UW0)P1 <-UESD14DqD1)5)E-1’EA0UW0)P/1 ФDq15A-S1E135N)W5A1591)5)E-1’EA0UW0)P1E)1E1


4)W-WbE)W5A1 )W2q/11

YqDWD)EA:q1)51 –YYY1U5N8D1’qD)195N1-ENFq10E)E13E:8q)D1WA1E1-5U1)51 =\YY1U5N8D1’qD)195N1D2E--10E)E13E:8q)D1WA1


WA)qN9qNqA:q1 2q0W421WA)qN9qNqA:q1qABWN5A2qA)/1 PWFP1WA)qN9qNqA:q1qABWN5A2qA)/1

√99q:)1591 –YYY1DSD)q2D153qNE)q15BqN1UW0qN1’EA0DL1 =\YY1DSD)q2D153qNE)q1UW)P1AENN5U1’EA01


24-)W3E)P19E0WAF1 )NEAD2W))WAF1)PqWN1DWFAE-15BqN1E1FN54315919NqV4qA:WqD1 DWFAE-D1-5:E)q01EN54A010W99qNqA)1:ENNWqN1

e
DW24-)EAq54D-S/1<D1-5AF1ED1)Pq1EBqNEFq1-qBq-1591)Pq1 9NqV4qA:WqD/1O91E)1E1D3q:W9W:1252qA)L1)Pq1

g
Nq:qWBq01DWFAE-1WD1PWFP1qA54FPL1)Pq1–YYY1Nq:qWBqN1UW--1
io led =\YY1DSD)q21WD14DWAF1E1:ENNWqN19NqV4qA:S1
’q1E’-q1)510q)q:)1)Pq1NE0W51DWFAE-/11 DWFAW9W:EA)-S19E0q01ED1E1NqD4-)159124-)W3E)PL1
)Pq1=\YY1Nq:qWBqN1:54-01A5)1Fq)1qA54FP1
qAqNFS1)510q)q:)1)Pq1NE0W51DWFAE-/1
ic ow

√99q:)15910q-ES1 OA1–YYY1DSD)q2DL1)Pq1:PW33WAF13N5:qDD1FqAqNE)qD1E1 =\YY1DSD)q2D1PEBq1’q))qN1:PEA:qD1)51’q1


D3NqE01 PWFP1NE)q1)NEAD2W))q01DWFAE-/1HPq1DS2’5-D1591)PWD1 4A0WD)4N’q01’S1)Pq13NqDqA:q159124-)W3E)P1
n
)NEAD2W))q01DWFAE-1ENq124:P1DP5N)qN1[1AENN5UqN1+WA1 q99q:)D1+0q-ES1D3NqE0K/1
bl kn

)W2qK1)PEA1)Pq1DS2’5-D1FqAqNE)q01’S1EA1=\YY1
DSD)q21)NEAD2W))WAF1)Pq1DE2q10E)E1NE)q/1HPqDq1
at
Pu ch

AENN5U134-DqD1ENq125Nq1DqADW)WBq1)510q-ESD1)PEA1E1
UW0qN134-Dq14Dq01WA1=\YY1DSD)q2D/1
Te

λ5UqN1:5A)N5-1 TqEN19EN13N5’-q21qRWD)D1WA1–YYY1EA01)PqNq95Nq1 O)1WD1A5)124:P1E99q:)q01’S1AqEN19EN13N5’-q21


3Nq:WDq135UqN1:5A)N5-1WD1NqV4WNq0/11 ED1WA1–YYY1PqA:q135UqN1:5A)N5-1WD1A5)1E1
3N5’-q21

<:V4WDW)W5A1HW2q1 –4q1)51-5AF1λT1:50qD1W)1NqV4WNqD1-5AF1E:V4WDW)W5A1 O)1PED1Nq-E)WBq-S1DP5N)1E:V4WDW)W5A1)W2q1


)W2q1 ’q:E4Dq1)Pq1:PW31NE)q1WD1:5ADW0qNE’-S1-qDD1WA1
)Pq19NqV4qA:S1P533WAF1DSD)q2/1

Review Questions

Q. 1 What types of mobile and wireless devices are available in the market ?

Q. 2 Explain the needs of mobile communication with its applications.

Q. 3 Explain multi-path propagation and Different types of path losses and signal propagation effects in wireless
transmission.

Q. 4 Explain various wideband modulation techniques employed in cellular / mobile technologies.

Q. 5 Draw the block diagram of FHSS transmitter and receiver. Differentiate between slow hopping and fast hopping.
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-33 Introduction to Mobile Computing

Q. 6 Explain what is spread spectrum? How spreading can be achieved? What are the merits of spread spectrum
technique?

Q. 7 Explain different methods to increase the capacity of an analog cellular system and without increasing number of
antennas.

Q. 8 What are the advantages of cellular System? Explain cellular system in detail also explain frequency reuse concept in
cellular system.

Q. 9 What do you mean by frequency reuse concept? Explain.

Q. 10 What is CDMA? How does it suit to mobile cellular systems ?

Q. 11 Discuss different multiplexing techniques.

e
!!!

g
!
!
io led
ic ow
n
bl kn
at
Pu ch
Te
99

GSM
2
9
9
9
9
Unit II
9
9
Syllabus

2.1 GSM Mobile services, System Architecture, Radio interface, Protocols , Localization and Calling, Handover,
security (A3, A5 & A8)
2.2 GPRS system and protocol architecture
2.2 UTRAN, UMTS core network; Improvements on Core Network

e
9

2.1 GSM
g
io led
TEDNPE9,2-8AC97D59HDNzEA9kDCC3UzkP8zDU9FT,HO9z-98KA9CD-89-3kkA--73E94zqz8PE9CDNzEA98AEAkDCC3UzkP8zDU9-2-8AC9zU9
ic ow

8KA9BD5E498D4P2x9/89z-93-A49N29D6A59W:::9CzEEzDU9RADREA9zU9CD5A98KPU9WL:9kD3U85zA-x9JKA9R5zCP529qDPE9D79T,H9BP-98D9R5D6z4A9
P9CDNzEA9RKDUA9-2-8AC98KP89PEEDB-93-A5-98D95DPC98K5D3qKD389V35DRA9PU49R5D6z4A-96DzkA9-A56zkA98KP89z-9kDCRP8zNEA98D9/,'X9
n
PU49“,JXx9JKz-9kKPR8A59qz6A-9PU9zU-zqK89D79T,H9-2-8AC9zUkE34zUq9z8-9-A56zkA-”9P5kKz8Ak835A”9kPEE9-A893R9R5DkA435A”9KPU4D6A59
bl kn

PU49D8KA59zCRD58PU89P-RAk8-9-3kK9P-9-Ak35z829PU49P38KAU8zkP8zDUx99

2.1.1 GSM Overview


at
Pu ch

(MU - Dec. 12)

Q. List and explain GSM services. (Dec. 12, 5 Marks)


Te

 TEDNPE9-2-8AC97D59CDNzEA9kDCC3UzkP8zDU9FT,HO9z-9P9qEDNPEE29PkkAR8A49-8PU4P5497D594zqz8PE9kAEE3EP59kDCC3UzkP8zDUx9/89z-9
PU9VJ,/9-8PU4P5497D59+T9RPUjV35DRAPU94zqz8PE9kAEE3EP59-2-8AC9Bz8K9zU8A5UP8zDUPE95DPCzUqx9
 JKA9NP-zk96A5-zDU9D79T,H9FzxAx9T,H9L::O9BP-97D3U4A49zU9WL’+x99
 XDB9z89z-98KA9CD-89-3kkA--73E9CDNzEA9kDCC3UzkP8zDU9-2-8AC9zU98KA9BD5E49PU49D6A59Wx+9NzEEzDU93-A5-93-A98KA9-2-8ACx99
 JKA9CPzU9qDPE9D79T,H9BP-98D9R5D6z4A96DzkA9-A56zkA-98KP89P5A9kDCRP8zNEA98D9/,'X9PU49D8KA59“,JX9-2-8AC-9P898KA9-PCA9
8zCA9PEEDBzUq93-A5-9D798KA9-2-8AC98D95DPC98K5D3qKD389V35DRAx9
 T,H9z-9P9-AkDU49qAUA5P8zDU9+T9-2-8AC”95AREPkzUq98KA97z5-89qAUA5P8zDU9PUPEDq9-2-8AC-x9
 JKA9zUz8zPE96A5-zDU9D79T,H9BP-94A-zqUA49zU9V35DRA93-zUq9):2f:rmDgt97D59CyFYTb9PU49:vmf:c2NDgL97D59jExTFYTbx9JKz-9
-2-8AC9z-9kPEEA49B.DN:22x9
 _UD8KA596A5-zDU9D79T,H9kPEEA49'zqz8PE9;AEE3EP59,2-8AC9W’::9F';,9W’::O93-A-9W"W:jW"’Q9H=–97D593REzUµ9PU499
 W’:QjW’’:9H=–97D594DBUEzUµx9
 T,H9 P89 WL::9 H=–9 FW’Q:jWLW:9 H=–9 3REzUµ9 PU49 WLQ:jWLL:9 H=–9 4DBUEzUµO9 3-A49 zU9 R,9 z-9 kPEEA49 “;,9 F“A5-DUPE9
;DCC3UzkP8zDU9,A56zkA-O9WL::x9
Modifications and Derivatives of GSM
 JKA9-2-8AC9A6DE38zDU9D79T,H9kPU9NA94z6z4A49zU8D98K5AA9RKP-A-x9
o UAI,KNrNOr::rfr::7/NR9JKA9NP-zk96A5-zDU9D798KA9T,H9-2-8AC9BP-9zU9DRA5P8zDUx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-2 GSM

o UAI,KNVNOr::7fr::m/NR9JKA9-2-8AC9-RAkz7zkP8zDU9BP-96A5z7zA49zU9D54A598D9PEEDB973835A9q5P43PE9CD4z7zkP8zDU-9PU49
UAB9zCR5D6ACAU8-x9
o UAI,KNvNOq[E]Nr::m/NRNJKA9CD4z7zkP8zDU-98D98KA9D5zqzUPE9T,HL::9P5A9NAzUq9zU85D43kA4x9
 SDEEDBzUq9P5A98KA94A5z6P8z6A-9D798KA9D5zqzUPE9T,H9L::x9

DCS 1800
 TUA9zCRD58PU89CD4z7zkP8zDU98D98KA9D5zqzUPE9T,HL::9BP-N8KA94A6AEDRCAU8ND7NFYGYHIFNIKFFCFI[N.J,HK]9F';,9W’::Ox99
 ';,9W’::9z-9R5zCP5zE294A6D8A498D98KA9DRA5P8zDU9zU9P5AP-9Bz8K9KzqK985P77zk9-3kK9P-935NPU9PU49-3N35NPU9P5AP-x99
 /89z-9kPEEA49P-9';,9zU9RUz8A49UzUq4DC9PU49“;,9zU9=DUq9UDUqx9
 JKA9CPzU94z77A5AUkA9NA8BAAU9T,HL::9PU49';,W’::9BP-9zU98KA9EDBA59RDBA59D798KA9NP-A9-8P8zDU9PU49CDNzEA9-8P8zDUx9_-9
P95A-3E898KA9kAEE9-z–A9NAkDCA-9-CPEEA5x99
 JKA9 NPU4Bz48K9 P--zqUA49 8D9 8KA9 ';,W’::9 BP-9 C3kK9 KzqKA59 8KPU9 8KA9 T,HL::x9 JKz-9 zCREzA-9 8KP89 3R9 8D9 Q"V9 kP55zA59
75AW3AUk29kKPUUAE-9kPU9NA9P--zqUA498D98KA9';,W’::x9JK3-98KA9kPRPkz829D79';,W’::9z-9C3kK9KzqKA598KPU98KA9T,HL::x9

e
X3898Kz-9PE-D9zCREzA-98BzkA9P-9KzqK9-AU-z8z6z8298D9'DRREA59A77Ak8-x9JKz-9EzCz8-98KA9CPYzC3C96AKzkEA9-RAA49zU9';,W’::93R9

g
8D9WQ:µCZK5x9 io led
 _UD8KA59A--AU8zPE9AUKPUkACAU89D798KA9';,W’::9z-98KA9RD--zNzEz829D795DPCzUq9zU-z4A98KA9kD3U852x9JKz-9BP-9UD89RD--zNEA9
Bz8K9zUz8zPE9T,HL::943A98D9D5qPUz–P8zDU95AP-DUx9
 JPNEA9+xWxW9-3CCP5z–A-98KA9NP-zk94z77A5AUkA9NA8BAAU9T,HL::9PU49';,W’::x9
ic ow

Table 2.1.1 : Difference between GSM 900 and DCS 1800


n
bl kn

KKIHC[KN B.DN:22N FI.Nr)22N

S5AW3AUk295PUqA9 RREzUµ9’L:jLWQ9H=–9 RREzUµ9W"W:jW"’Q9H=–9


at
Pu ch

'DBUEzUµ9LQQjL[:9H=–9 'DBUEzUµ9W’:QjW’’:9H=–9

X3CNA59D7943REAY9kKPUUAE-9 W+V9 Q"V9


Te

HPYzC3C9XP-A9-8P8zDU9RDBA59 Q+:\99 +:\99

HPYzC3C9HDNzEA9-8P8zDU9RDBA59 ’\9 W\9

,RPkzUq9NA8BAAU93REzUµ9PU494DBUEzUµ975AW3AUkzA-9 VQH=–9 LQH=–9

HPYzC3C96AKzkEA9-RAA49 +Q:µCZK59 WQ:µCZK59

H,9kEP--A-9 +:\9FUD89zCREACAU8A4O9 W\9FKPU4KAE4O9


’\9FkP5Z985PU-RD58PNEA9RKDUAO :x+Q9\9FKPU4KAE4O9
Q\9FkP5Z985PU-RD58PNEA9RKDUAO
+\9FKPU4KAE4O9
:x’9\9FKPU4KAE49

 JPNEA9+xWx+9Ez-8-98KA9µA29CzEA-8DUA-9D798KA9T,H9-2-8AC9PU49z8-94A5z6P8z6A-x9
GSM 400
 _UD8KA59R5DCz-zUq9CD4z7zkP8zDU9PU49AUKPUkACAU89D798KA9D5zqzUPE9T,H9L::9-2-8AC9BP-9T,H9V::x9/89KP-9NAAU9DN-A56A49
8KP898KA9PUPEDq9-2-8AC-9DRA5P8zUq9zU98KA9V::9H=–9NPU4-9P5A9UDB9NAkDCzUq9PN-DE38Ax9JKA29P5A9ED-zUq98KAz59k3-8DCA5-9
P-9CD-89D798KAC9CD6A498D98KA9+T9-2-8AC-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-3 GSM

 _78A59-K388zUq98KA-A9PUPEDq9-2-8AC-9kDCREA8AE2”98Kz-975AW3AUk295PUqA9kPU9NA93-A497D59PUD8KA59T,H96A5-zDUx9
 VJ,/9-8PU4P54z–A498KA9T,H9-2-8AC9DRA5P8zUq9zU98KA9NPU49P5D3U49VQ:9PU49V’:9H=–9kPEEA49T,H9V::x9
 JKA9BKDEA9zU75P-853k835A9BzEE95ACPzU9-PCA9KDBA6A59-D78BP5A9UAA4-98D9NA9kKPUqA4x9
 JKA9NP-zk97AP835A9D79T,H9V::9P5A9Ez-8A49NAEDB]9
o S5AW3AUk29PEEDkP8zDU9]99RREzUµ9]9VQ:xVjVQ"x[9H=–9
9 9 9'DBUEzUµ9]9V[:xVjVL[x:9H=–9
o '3REAY9-ARP5P8zDU9]9W:9H=–9
o ;P55zA59-RPkzUq9]9+::U=–9
Table 2.1.2 : Key milestones of the GSM system and its derivatives

LKI[N DYFK,HETKN
WL’+9 T5D3RA9,RAkzPE9HDNzEA9A-8PNEz-KA49N29;V^J98D94A6AEDR98KA9RPUjV35DRAPU9kAEE3EP59CDNzEA9-2-8AC9-8PU4P54-x9

e
WL’Q9 XP-zk9Ez-89D795AkDCCAU4P8zDU-98D9NA9qAUA5P8A49N298KA9q5D3R9BP-9P4DR8A4x9

g
WL’[9 SzAE498A-8-93U4A58PµAU98D9R5D6A9BKzkK98AkKUzW3A-9-KD3E49NA9P4DR8A497D598KA9UAB9-2-8ACx9
io led
WL’"9 J'H_9PRR5DPkK9P4DR8A49P-98KA9CPzU9PkkA--9CA8KD497D59T,Hx9S5AW3AUk294z6z-zDU9z-9PE-D93-A49NA8BAAU9kKPUUAE-”9
N3898zCA94z6z-zDU9z-93-A49zU9APkK9zU4z6z43PE975AW3AUk29kKPUUAEx999
ic ow

WL’’9 T,H9-2-8AC96PEz4P8zDU93U4A58PµAUx9
n
WL’L9 VJ,/”9V35DRAPU98AEAkDCC3UzkP8zDU-9,8PU4P54-9/U-8z838A98PµA-9DU95A-RDU-zNzEz8297D59CPUPqzUq98KA9T,H9-8PU4P54-x9
bl kn

WLL:9 “KP-A9W9D798KA9T,H9-RAkz7zkP8zDU-95AEAP-A4x9
WLLW9 ;DCCA5kzPE9EP3UkK9D798KA9T,H9-A56zkAx9
at
Pu ch

WLLQ9 ;D6A5PqA9D79CPzU95DP4-9T,H9-A56zkA-9-8P589D38-z4A9V35DRAx9
WLLQ9 “KP-A9+9D798KA9T,H9-RAkz7zkP8zDU-95AEAP-A4x9
Te

+::V9 T,H9-3N-k5zR8zDU-95APkK9W9NzEEzDUx99

2.1.2 Mobile Services


 T,H9z-9PU9zU8Aq5P8A496DzkAj4P8P9-A56zkA98KP89R5D6z4A-96P5zD3-9-A56zkA-9NA2DU49kAEE3EP598AEARKDUAx9
 T,H9HDNzEA9-A56zkA-9P5A94z6z4A49zU8D9kP8AqD5zA-x9
Wx9 XAP5A59-A56zkA-9
+x9 JAEA9-A56zkA-9
Qx9 'P8P9-A56zkA-9
Vx9 ,3RREACAU8P529-A56zkA-99
 Szqx9+xWxW9-KDB-98KA95A7A5AUkA9CD4AE9D79T,H9HDNzEA98AEA-A56zkA-9PU49NAP5A59-A56zkA-x9

Fig. 2.1.1 : GSM Mobile services


Mobile Communication & Computing (MU-Sem. 7-Comp) 2-4 GSM

1. Bearer services
 XAP5A59 -A56zkA-9 P5A9 8AEAkDCC3UzkP8zDU9 -A56zkA-9 8KP89 R5D6z4A9 kPRPNzEz8zA-9 8D9 85PU-7A59 3-A59 4P8P9 PU49 kDU85DE9 -zqUPE-9
NA8BAAU98BD9RzAkA-9D79AW3zRCAU89zU9P9UA8BD5µxN
 T,H9R5D6z4A-9NP-zkPEE297D35982RA-9D79NAP5A59-A56zkA-9]9
o J5PU-RP5AU89
o XDUj85PU-RP5AU89
o ,2UkK5DUD3-94P8P985PU-Cz--zDU9
o _-2UkK5DUD3-94P8P985PU-Cz--zDU99
OY/N M[IT,yI[KTHNNKI[K[N,K[OYPK,NN
 JKA-A982RA-9D79NAP5A59-A56zkA-93-A98KA973Uk8zDU-9D79RK2-zkPE9EP2A598D985PU-Cz894P8Px9
 JD9zCR5D6A98KA985PU-Cz--zDU9W3PEz82”9z893-A-97D5BP549A55D59kD55Ak8zDU9FSV;O9P89RK2-zkPE9EP2A5x9

e
OYY/N QETfH[IT,yI[KTHNNKI[K[N,K[OYPK,NN

g
XDU985PU-RP5AU89NAP5A59-A56zkA-93-A973Uk8zDU-9D79ND8K9EP2A59+9PU49EP2A59Q98D9zCR5D6A985PU-Cz--zDU9W3PEz82x9

io led
/89zCREACAU8-9EP2A59+9PU49EP2A59Q9R5D8DkDE-97D59A55D59kD55Ak8zDU9PU497EDB9kDU85DEx9
 /89PE-D93-A-95P4zDjEzUµ9R5D8DkDE9F^_“O98KP89kDCR5z-A-9CAkKPUz-C9D79gYGAN.yKKjNFIHINRYTbNIETH[EFNOgFRI/NPU49-RAkzPE9
,KFKPHYOKf[KSKPH9CAkKPUz-C98D985zqqA595A85PU-Cz--zDU9D794P8Px9

ic ow

!"
JKA9Nz8jA55D595P8A9z-9EA--98KPU9W: ”9PU498K5D3qKR389PU494AEP29CP296P5294ARAU4zUq93RDU985PU-Cz--zDU9W3PEz82x9
 'z77A5AU894P8P95P8A-97D596DzkA9PU494P8P98KP89kPU9NA9PkKzA6A49P5A9Ez-8A49NAEDBx9
n
2. Data Services
bl kn

OY/N FIHIN,K[OYPKNOPY[PCYHN,xYHPAKj/N
at
Pu ch

o ,2UkK5DUD3-9]9+xV”9Vx’9D59Lx[9µNz8Z-9
o _-2UkK5DUD3-]9Q::9j9W+::9Nz8Z-9
Te

OYY/N FIHIN,K[OYPKNOyIPbKHN,xYHPAKj/N
o ,2UkK5DUD3-9]9Wx+”9+xV”9Vx’9D59Lx[9µNz8Z-9
o _-2UkK5DUD3-9]9Q::9j9L[::9Nz8Z-9
3. Tele services
 JAEA9-A56zkA-9zUkE34A9AUk52R8A496DzkA985PU-Cz--zDU”9CA--PqA9-A56zkA-”9PU49NP-zk94P8P9kDCC3UzkP8zDU9Bz8K98A5CzUPE-x9
 JKA9T,H9BP-9NP-zkPEE294A-zqUA498D9R5D6z4A9KzqK9W3PEz8294zqz8PE96DzkA985PU-Cz--zDU”9D77A5zUq9P89EAP-898KA9NPU4Bz48K99
 QxW9µ=–9D79PUPEDq9RKDUA9-2-8AC-x9
JKA96P5zD3-98AEA-A56zkA-9P5A9]9
OY/N T]K[GKTPJNTC]NK[NN
 /89z-9CPU4P8D5297D59PEE9-A56zkA9R5D6z4A5-98D9zCREACAU89VCA5qAUk29U3CNA59-A56zkAx9
 JKz-9U3CNA59z-98KA9kDCCDU9U3CNA598KP89kPU9NA93-A498K5D3qKD389kD3U852x99
 _zµA9RDEzkA9FW::O9D59PCN3EPUkA9U3CNA59PU498Kz-9U3CNA59z-975AA9D79kKP5qAx9
 JKz-9kDUUAk8zDU9KP-98KA9KzqKA-89R5zD5z829PU49BzEE9P38DCP8zkPEE29NA9-A893R9Bz8K9kED-A-89ACA5qAUk29kAU8A5x99
OYY/N .AE[HN]K,,IGKN,K[OYPK,NO.D./NN
 ,H,9PEEDB-985PU-Cz--zDU9D798AY89CA--PqA-93R98D9W[:9kKP5Pk8A5-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-5 GSM

 ,H,93-A-93U3-A49kPRPkz829zU98KA9-zqUPEzUq9kKPUUAE-9zU-8AP49D79-8PU4P5494P8P9kKPUUAE-x9
 /89z-9RD--zNEA98D9-AU49D595AkAz6A9,H,9435zUq96DzkA9D594P8P985PU-Cz--zDUx9
 ,H,9kPU9NA93-A497D594z-REP2zUq95DP49kDU4z8zDU-”9AjCPzE9KAP4A5-9D59-8Dkµ9W3D8A-9A8kx9
 ,H,9P5A9PE-D93-A497D593R4P8zUq9CDNzEA9RKDUA9-D78BP5A9D597D59zCREACAU8P8zDU9D79R3-K9-A56zkA-x9
OYYY/N TTAITPKjNDK,,IGKN.K[OYPKNOTD./N
VUKPUkA49 CA--PqA9 -A56zkA9 FVH,O9 PEEDB-9 85PU-Cz--zDU9 D79 EP5qA59 CA--PqA-”9 7D5CP88A49 8AY8”9 PUzCP8A49 Rzk835A-”9 -CPEE9
zCPqA-”9PU495zUq8DUA-9zU9P9-8PU4P54z–A49BP2x99
OYO/N DCFHY]KjYINDK,,IGKN,K[OYPKNODD./NN
HH,9PEEDB-985PU-Cz--zDU9D79EP5qA59Rzk835A-9-3kK9P-9`“VT”9T/S”9\XH“97zEA-9PU49PE-D9-KD5896z4AD9kEzR-x9
OO/N B[ECyNvNKIUNN
 /U98Kz-9-A56zkA”97PY94P8P9z-985PU-Cz88A49P-94zqz8PE94P8P9D6A598KA9PUPEDq98AEARKDUA9UA8BD5µ93-zUq9CD4AC-x9

e
 /893-A-9/JRjJ9-8PU4P54-9JxV9PU49JxQ:97D5985PU-Cz--zDUx9

g
 SPY94P8P9PU497PY9-zqUPEzUq9z-985PU-Cz88A496zP985PU-RP5AU89NAP5A59-A56zkAx9
io led
4. Supplementary services
 ,3RREACAU8P529-A56zkA-9D77A596P5zD3-9AUKPUkACAU8-9D798KA9-8PU4P5498AEARKDU29-A56zkA-9PU49CP296P52975DC9R5D6z4A598D9
ic ow

R5D6z4A5x9
 ,3RREACAU8P529-A56zkA-9P5A9P44z8zDUPE9-A56zkA-98KP89P5A9R5D6z4A49N298KA9T,H9-2-8AC9D8KA598KPU98AEA-A56zkA-9D59NAP5A59
n
-A56zkA-x9
bl kn

 JKA-A9 -A56zkA-9 zUkE34A9 7PkzEz8zA-9 -3kK9 P-9 kPEE9 7D5BP54zUq”9 kPEEA59 z4AU8z7zkP8zDU”9 kPEE9 BPz8zUq”9 C3E8zjRP5829 kDU6A5-P8zDU-”9
PU49NP55zUq9D79D38qDzUq9FzU8A5UP8zDUPEO9kPEE-”9PCDUq9D8KA5-x9,DCA9-3RREACAU8P529-A56zkA-9P5A9]9
at
Pu ch

o H3E8zRP5829,A56zkA9D59kDU7A5AUkzUq99
o ;PEE9\Pz8zUq9
Te

o ;PEE9=DE49
o ;PEE9SD5BP54zUq9
o ;PEE9XP55zUq9
o X3CNA59/4AU8z7zkP8zDU9
o _46zkA9D79;KP5qA9F_D;O9
o ;ED-A49R-A59T5D3R-9F;RT-O9
o RU-853k835A49-3RREACAU8P529-A56zkA-94P8P9FR,,'O9]9JKz-9PEEDB-9DRA5P8D5j4A7zUA49zU4z6z43PE9-A56zkA-x9
Table 2.1.3 : GSM services

.K[OYPKNIIHKGE[JN .K[OYPKN
JAEA9-A56zkA-9 JAEARKDU29
VCA5qAUk29kPEE9
,KD589CA--PqA9-A56zkA-9
az4AD8AY89PkkA--9
JAEA8AY”9SPY9
=PE795P8A9-RAAkK9kD4A59
VUKPUkA4973EE95P8A99
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-6 GSM

.K[OYPKNIIHKGE[JN .K[OYPKN
XAP5A59-A56zkA-9 ,2UkK5DUD3-94P8P9
_-2UkK5DUD3-94P8P9
,2UkK5DUD3-9RPkµA894P8P9
,3RREACAU8P529-A56zkA-9 ;PEE97D5BP54zUq99
;PEE9NP55zUq9
;PEEzUq9EzUA9z4AU8z7zkP8zDU9
;DUUAk8A49EzUA9z4AU8z7zkP8zDU9
;PEE9BPz8zUq99
;PEE9KDE49
H3E8zRP5829kDCC3UzkP8zDU9

e
;ED-A493-A59q5D3R9
_46zkA9D79kKP5qA9

g
TRA5P8D594A8A5CzUA49kPEE9NP55zUq9
io led
2.1.3 GSM System Architecture
(MU - Dec. 12, May 13)
ic ow

Q. Draw a neat diagram of GSM system architecture and explain with different types of interfaces. (Dec. 12, 10 Marks)
n
Q. What is the use of HLR and VLR registers in Mobile computing? (May 13, 5 Marks)
bl kn

 Szqx9+xWx+9-KDB-98KA9-zCREz7zA496zAB9D798KA9T,H9-2-8AC9P5kKz8Ak835Ax99
at


Pu ch

JKA9T,H9UA8BD5µ9P5kKz8Ak835A9kPU9NA9q5D3RA49zU8D98K5AA9CPzU9-3N9-2-8AC-9]9
Wx9 ^P4zD9-3N-2-8AC9F^,,O9
Te

+x9 XA8BD5µ9PU49-Bz8kKzUq9-3N-2-8AC9FX,,O9
Qx9 TRA5P8zDU9-3N-2-8AC9FT,,O9

1. Radio subsystem
^P4zD9-3N-2-8AC9kDCR5z-A-9PEE95P4zD9AU8z8zA-x9VU8z8zA-9D79^,,9P5A9AYREPzUA49NAEDBx9
(i) Base station subsystem (BSS)
 _9T,H9UA8BD5µ9kDCR5z-A-9CPU29X,,-x9
 X,,9kDU8PzU-9DUA9D59CD5A95P4zD9kAEE-”9APkK9DUA9z-9kDU85DEEA49N29P9NP-A985PU-kAz6A59-8P8zDU9FXJ,Ox9
 TUA9D59CD5A9XJ,-9zU9835U9P5A9kDU85DEEA49N29PU9AEACAU89kPEEA49XP-A9-8P8zDU9kDU85DEEA59FX,;Ox9JK3-98KA5A9P5A98BD9CPzU9
P5kKz8Ak835PE9AEACAU8-9zU9APkK9X,,9VM.9PU49V.IWN9
 V..NqCTPHYET,9P5A98D9]9
o HPzU8PzU95P4zD9kDUUAk8zDU98D9H,9
o ;D4zUqZ4AkD4zUq9D796DzkA9
o ^P8A9P4PR8P8zDU98DZ75DC98KA9Bz5AEA--9UA8BD5µ9RP589
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-7 GSM

g e
io led
ic ow
n
bl kn
at
Pu ch

Fig. 2.1.2 : GSM system architecture


Te

(ii) Base transceiver station (BTS)


 _9XJ,9FPE-D9kPEEA49NP-A9-8P8zDUO9kDCR5z-A-9PEE95P4zD9AW3zRCAU8-”9zxAx9PU8AUUP-”9-zqUPE9R5DkA--zUq”9PCREz7zA5-9A8kx9
 XJ,9kPU97D5C9P9-zUqEA95P4zD9kAEE9D59-A6A5PE9kAEE-9N293-zUq9-Ak8D5z–A49PU8AUUP-x9
 XJ,9z-9kDUUAk8A498D9H,96zP98KA9X!NYTHK[qIPKNPU498D98KA9X,;96zP98KA9Y"#$NYTHK[qIPKx9
 KCTPHYET,NEqNVM.9P5A9]9
o VUkD4zUq”9AUk52R8zUq”9C3E8zREAYzUq”9CD43EP8zUq”9PU497AA4zUq98KA9^S9-zqUPE-98D98KA9PU8AUUP9
o J5PU-kD4zUq9PU495P8A9P4PR8P8zDU9
o JzCA9PU4975AW3AUk29-2UkK5DUz–P8zDU9
o aDzkA98K5D3qK973EEj9D59KPE7j5P8A9-A56zkA-9
o 'AkD4zUq”94Ak52R8zUq”9PU49AW3PEz–zUq95AkAz6A49-zqUPE-9
o ^PU4DC9PkkA--94A8Ak8zDU9
o RREzUµ9kKPUUAE9CAP-35ACAU8-9
(iii) Base station controller (BSC)
 JKA9X,;9CPUPqA-98KA95P4zD95A-D35kA-97D59DUA9D59CD5A9XJ,-x9N
 KCTPHYET,NEqNV.I9P5A9]9
o =PU4EA-95P4zD9kKPUUAE9-A83R”975AW3AUk29KDRRzUq”9PU49KPU4D6A5-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-8 GSM

o _--zqU-9PU495AEAP-A-975AW3AUkzA-9PU498zCA9-ED8-97D598KA9H,x9
o =PU4EA-9zU8A59kAEE9KPU4D6A5x9
o ;DU85DE-98KA9RDBA5985PU-Cz--zDU9D798KA9X,,9PU49H,9zU9z8-9P5APx9
 YjjYHYETIFNqCTPHYET,9zUkE34A9]9
o “A57D5CzUq985P77zk9kDUkAU85P8zDU98D95A43kA98KA9U3CNA59D79EzUA-975DC98KA9H,;9
o ^APEEDkP8zDU9D7975AW3AUkzA-9PCDUq9XJ,-9
o JzCA9PU4975AW3AUk29-2UkK5DUz–P8zDU9
o “DBA59CPUPqACAU89
o JzCAj4AEP29CAP-35ACAU8-9D795AkAz6A49-zqUPE-975DC98KA9H,9
(iv) Mobile station (MS)
 JKA9H,9kDCR5z-A-9PEE93-A59KP54BP5A9PU49-D78BP5A9UAA4A497D59kDCC3UzkP8zDU9Bz8K9P9T,H9UA8BD5µx9

e
 /U8A5UP8zDUPE9 CDNzEA9 AW3zRCAU89 z4AU8z829 F/HV/O9 z-9 3-A49 8D9 z4AU8z729 PU9 H,x9 'A6zkA9 -RAkz7zk9 CAkKPUz-C9 EzµA9 8KA789

g
R5D8Ak8zDU93-A-98KA9/HV/9U3CNA5x9

io led
H,9kDU-z-8-9D798BD9AEACAU8-9CDNzEA9AW3zRCAU89FHVO9PU49,/Hx9
 HDNzEA9AW3zRCAU89FHVO9z-98KA9KP54BP5A98KP89z-98KA9CDNzEA9KPU4-A8x99

ic ow

JKA9-AkDU49kDCRDUAU89D79H,9z-9,CN,P[YNK[NYjKTHYHJN]EjCFKNO.ZD/x99
 ,/H9-8D5A-9PEE93-A59-RAkz7zk94P8P95AEA6PU898D9T,Hx9
n
 _EE98KA9kPEE-9zU9T,H9P5A9,/H9NP-A49PU498KA29P5A94z5Ak8A498D98KA9,/H95P8KA598KPU98A5CzUPEx9
bl kn

 _EE98KA94P8P9EzµA9,H,”9kDU8Pk89U3CNA5-9P5A9PE-D9-8D5A49zU9,/H9kP54x9

at

R-A59-RAkz7zk973Uk8zDU-9EzµA9kKP5qzUq”9P38KAU8zkP8zDU9P5A9PE-D9NP-A49DU98KA9,/Hx9
Pu ch

 \z8KD389,/H9DUE29ACA5qAUk29kPEE-9P5A9RD--zNEAx9

Te

JKA9,/H9kP549kDU8PzU-9CPU29z4AU8z7zA5-”9PU498PNEA-9-3kK9P-9kP54982RA”9-A5zPE9U3CNA5”9P9Ez-89D79-3N-k5zNA49-A56zkA-”99
 YNUK[,ETIFNZjKTHYqYPIHYETNQC]NK[NOUZQ/[NUZQNXTNFEPbYTGN\KJYTGNOUX\/[9PU9ICHAKTHYPIHYETNbKJN\#9PU498KA9ZTHK[TIHYETIFN
DENYFKN.CN,P[YNK[NZjKTHYHJNOZD.Z/x99999
 JKA9CDNzEA9-8P8zDU9PE-D9-8D5A-98KA942UPCzk9zU7D5CP8zDU9BKzEA9EDqqA49DU8D98KA9T,H9-2-8AC9-3kK9P-9PYyAK[NbKJN\%#PU49P9
MK]yE[I[JNDENYFKN.CN,P[YNK[NZjKTHYHJNOMD.Z/”9PU498KA9REPIHYETNY[KINZjKTHYqYPIHYETNORYZ/x!
2. Network and Switching Subsystem (NSS)
 JKA9X,,9kDUUAk8-98KA95P4zD9UA8BD5µ9Bz8K98KA9-8PU4P549R3NEzk9CDNzEA9UA8BD5µ-x9
 JKA9X,,9zUkE34A-98KA9CPzU9-Bz8kKzUq973Uk8zDU-9D79T,H”9zCRD58PU894P8PNP-A-9F-3kK9P-9=_^”9a_^O95AW3z5A498D9CPUPqA9
3-A59R5D7zEA9PU493-A59CDNzEz82x9
 JKA9X,,9kDU8PzU-98KA97DEEDBzUq973Uk8zDUPE9AEACAU8-x9
(i) Mobile service switching center (MSC)
 H,;9z-98KA9KAP589D798KA9T,H9P5kKz8Ak835Ax99
 JKA29P5A9KzqKjRA57D5CPUkA94zqz8PE9/,'X9-Bz8kKA-x9
 VPkK9H,;9kDU85DE-9DUA9D59CD5A9X,,-x9
 H,;9-A8-93R98KA9kDUUAk8zDU-98D9D8KA59H,;-9PU498D98KA9X,;-96zP98KA9YNYTHK[qIPKx99
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-9 GSM

The MSC performs following functions


o ,Bz8kKzUq9D79kPEE-9NA8BAAU98KA9CDNzEA9PU49D8KA597zYA49D59CDNzEA9UA8BD5µ93-A5-9
o HPUPqACAU89D79CDNzEA9-A56zkA-9
o ^Aqz-85P8zDU9
o _38KAU8zkP8zDU9
o _DkP8zDU93R4P8zUq9
o =PU4D6A5-9
o ;PEE95D38zUq98D9P95DPCzUq9-3N-k5zNA59
o JDEE98zkµA8zUq9
o XA8BD5µ9zU8A57PkzUq9
o ;DCCDU9kKPUUAE9-zqUPEzUq9
 H,;-9P5A9kDUUAk8A49Bz8K9APkK9D8KA59PU49PE-D98D98KA9TP8ABP29H,;-9FTH,;Ox9

e
 BIHKxIJND.I9z-95A-RDU-zNEA97D59kDCC3UzkP8zDU9Bz8K98KA9AY8A5UPE97zYA49UA8BD5µ-9-3kK9P-9“,JX9PU49/,'Xx9

g
 H,;9kPU9PE-D9kDUUAk898D9R3NEzk94P8P9UA8BD5µ-9F“'XO9-3kK9P-9Yx+Q9N293-zUq9P44z8zDUPE9zU8A5BD5µzUq973Uk8zDU-9F/\SOx!
io led
(ii) Home Location Register (HLR)
 JKA9=_^95Aqz-8A59z-98KA9kAU85PE94P8PNP-A98KP89-8D5A-9PU49CPUPqA-98KA9RA5CPUAU89zU7D5CP8zDU9D798KA9-3N-k5zNA5x9
ic ow

 \KAU9PU9zU4z6z43PE9N32-9P9-3N-k5zR8zDU9zU98KA97D5C9D79,/H”9PEE98KA9zU7D5CP8zDU9PND3898Kz-9-3N-k5zR8zDU9z-95Aqz-8A5A49zU9
8KA9=_^9D798KP89DRA5P8D5x9
n
 =_^9kDU8PzU-98KA97DEEDBzUq9-8P8zk9PU4942UPCzk9zU7D5CP8zDUx9
bl kn

OI/N .HIHYPNYTqE[]IHYETN
o
at

HDNzEA9-3N-k5zNA59/,'X9U3CNA59FH,/,'XO99
Pu ch

o /U8A5UP8zDUPE9CDNzEA9-3N-k5zNA59z4AU8z829F/H,/O9
o
Te

_z-89D79-A56zkA-98D9BKzkK93-A59KP-9-3N-k5zNA49-3kK9P-9kPEE97D5BP54zUq”95DPCzUq95A-85zk8zDU”9T“^,9A8kx9
 _EE98KA-A93-A5j-RAkz7zk9zU7D5CP8zDU9z-9AU8A5A49DUkA97D59APkK93-A59zU9P9-zUqEA9=_^9P898KA98zCA9D79-3N-k5zR8zDUx9
 =_^9PE-D9CPzU8PzU-9-DCA942UPCzk9zU7D5CP8zDU98KP89z-93-A497D59EDkP8zUq98KA93-A5x9
ON/N FJTI]YPNYTqE[]IHYETN
o JKA9k355AU89EDkP8zDU9P5AP9F__O9D79H,9
o JKA9CDNzEA9-3N-k5zNA595DPCzUq9U3CNA59FH,^XO9
o ;355AU89a_^9PU49H,;9
 _-9 -DDU9 P-9 H,9 EAP6A-9 z8-9 k355AU89 __”9 8KA9 a_^9 8KP89 z-9 k355AU8E29 5A-RDU-zNEA9 7D59 8KA9 H,9 zU7D5C-9 =_^9 PND389 z8-9 UAB9
EDkP8zDUx9
(iii) Visitor Location Register (VLR)
 JKA9a_^9z-9P--DkzP8A498D9APkK9H,;x9
 /89z-9P94P8PNP-A9kDU8PzUzUq95AkD54-9D79PEE9CDNzEA9-8P8zDU-9k355AU8E295Aqz-8A5A49Bz8K98KA9P88PkKA49H,;x9
 \KAU9P9CDNzEA9-8P8zDU95DPC-9zU8D9P9UAB9H,;9P5AP”98KA9a_^9kDUUAk8A498D98KP89H,;9BzEE95AW3A-894P8P9PND3898KA9CDNzEA9
-8P8zDU975DC98KA9=_^x99
 _P8A59z798KA9CDNzEA9-8P8zDU9CPµA-9P9kPEE”98KA9a_^9UAA49UD89kDU8Pk89=_^9APkK98zCA9-zUkA98KA9a_^9KP-9PEE98KA9zU7D5CP8zDU9
UAA4A498D9-A893R98KA9kPEEx99
 JKA9a_^9P6Dz4-98KA975AW3AU89=_^9PkkA--Z3R4P8A-”9P-9PEE98KA93-A59zU7D5CP8zDU95AW3z5A49z-9P6PzEPNEA9zU9a_^x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-10 GSM

3. Operation Sub System (OSS)


 JKA9T,,9z-98KA973Uk8zDUPE9AU8z829BKzkK9z-93-A498D9CDUz8D59PU49kDU85DE98KA9D6A5PEE9T,H9UA8BD5µx99
 /89z-9PE-D93-A498D9kDU85DE98KA985P77zk9EDP49D798KA9X,,x9
 T,,9kDU8PzU-98KA97DEEDBzUq9AU8z8zA-x9
(i) Operation and Maintenance Center (OMC)
 JKA9DRA5P8zDU-9PU49CPzU8AUPUkA9kAU8A59FTH;O9z-9kDUUAk8A498D9PEE9AW3zRCAU89zU98KA9-Bz8kKzUq9-2-8AC9PU498D98KA9X,;x9
 JKA9TH;9CDUz8D5-9PU49kDU85DE-9PEE9D8KA59UA8BD5µ9AU8z8zA-96zP98KA9!"#$%&'()*&x9
 =A5A9P5A9-DCA9D798KA9TH;973Uk8zDU-9]9
o _4CzUz-85P8zDU9PU49kDCCA5kzPE9DRA5P8zDU9F-3N-k5zR8zDU”9AU498A5CzUPE-”9kKP5qzUq9PU49-8P8z-8zk-Ox9
o ,Ak35z829HPUPqACAU8x9
o XA8BD5µ9kDU7zq35P8zDU”9TRA5P8zDU9PU49“A57D5CPUkA9HPUPqACAU8x9

e
o HPzU8AUPUkA9JP-µ-x9

g
o J5P77zk9CDUz8D5zUq9 io led
o ,8P83-95ARD58-9D79UA8BD5µ9AU8z8zA-99
(ii) Authentication Center (AUC)

ic ow

JKA9_38KAU8zkP8zDU9;AU8A59z-9P9R5D8Ak8A494P8PNP-A98KP89-8D5A-9P9kDR29D798KA9-Ak5A89µA29-8D5A49zU9APkK9-3N-k5zNA5b-9,/H9
kP54”9BKzkK9z-93-A497D59P38KAU8zkP8zDU9PU49kzRKA5zUq9D798KA95P4zD9kKPUUAEx9
n
 JKA9_R;9R5D8Ak8-9UA8BD5µ9DRA5P8D5-975DC94z77A5AU8982RA-9D7975P34x9
bl kn

 _R;9kDU8PzU-98KA9PEqD5z8KC-97D59P38KAU8zkP8zDU9P-9BAEE9P-98KA9µA2-97D59AUk52R8zDU9PU49qAUA5P8A-98KA96PE3A-9UAA4A497D59
3-A59P38KAU8zkP8zDU9zU98KA9=_^x99
at
Pu ch

(iii) Equipment Identity Register (EIR)


 JKA9VW3zRCAU89/4AU8z829^Aqz-8A59FV/^O9z-9P94P8PNP-A98KP89kDU8PzU-9P9Ez-89D79PEE96PEz49CDNzEA9AW3zRCAU8-9DU98KA9UA8BD5µx9
Te

/89-8D5A-9/U8A5UP8zDUPE9HDNzEA9VW3zRCAU89/4AU8z829F/HV/O9U3CNA597D59APkK96PEz49CDNzEA9AW3zRCAU8x99
 JKA9V/^9KP-9P9NEPkµ9Ez-89D79-8DEAU9CDNzEA94A6zkA-x9
 /79P9RP58zk3EP59CDNzEA9z-9-8DEAU9D59z-9UD8982RA9PRR5D6A498KAU9kD55A-RDU4zUq9/HV/9z-9CP5µA49P-9zU6PEz49zU98KA9V/^x9

2.1.4 GSM Radio Interfaces (MU - Dec. 15)

Q. Explain the Um interface of GSM. (Dec. 15, 5 Marks)

'z77A5AU89AEACAU8-9D79T,H9UA8BD5µ9kDCC3UzkP8A98D9APkK9D8KA593-zUq9BAEE94A7zUA49zU8A57PkA9NA8BAAU98KACx9
X]NZTHK[qIPKNRN
 JKA!X!NYTHK[qIPK!z-98KA!IY[NYTHK[qIPK!7D598KA!B.D!CDNzEA98AEARKDUA9-8PU4P54xN
 /89z-98KA!YTHK[qIPK!NA8BAAU98KA9CDNzEA9-8P8zDU9FH,O9PU498KA9XP-A985PU-kAz6A59-8P8zDU9FXJ,Ox9N
 /89z-9kPEEA4!X]!NAkP3-A9z89z-98KA9CDNzEA9PUPEDq98D98KA9R!YTHK[qIPK!D79/,'Xx!!
 X]Nz-!jKqYTKj!zU98KA!B.D!:VxYY9PU49:QxYY9-A5zA-9D79-RAkz7zkP8zDU-xN
 JKA9T,H9Pz59zU8A57PkA9z-9NP-A49DU9JzCA9'z6z-zDU9H3E8zREA9_kkA--9FJ'H_O9Bz8K9S5AW3AUk29'z6z-zDU9'3REAY9FS''Ox9N
 J'H_9 PEEDB-9 C3E8zREA9 3-A5-9 8D9 -KP5A9 P9 kDCCDU9 ^S9 kKPUUAE9 DU9 P9 8zCAj-KP5zUq9 NP-z-”9 BKzEA9 S''9 AUPNEA-9 4z77A5AU89
75AW3AUkzA-98D9NA93-A49zU93REzUµ9FH,98D9XJ,O9PU494DBUEzUµ9FXJ,98D9H,O94z5Ak8zDU-x9N
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-11 GSM

 HD-89D798KA9zCREACAU8P8zDU-93-A9P975AW3AUk29NPU49D79L::9H=–x9JKA9D8KA594A5z6P8z6A9D79T,H9z-9kPEEA49'zqz8PE9kAEE3EP59
-2-8AC93-A-9W’::9H=–9F';HW’::OxN
 JKA93-A4975AW3AUk29NPU49z-94z6z4A49zU8D9+::U=–9kP55zA5-9D59^S9kKPUUAE-9zU9ND8K98KA93REzUµ9PU494DBUEzUµ94z5Ak8zDUx99
 VPkK9^S9kKPUUAE9z-98KAU97358KA59-3N4z6z4A49zU8D9AzqK894z77A5AU898zCA-ED8-”9zxAx”9:98D9"”9N29J'H_98AkKUzW3A-x99
 _9-A89D798KA-A9AzqK898zCA-ED8-9z-95A7A55A498D9P-9P9J'H_975PCAx99
 VPkK975PCA9EP-8-9Vx[WQ9C-Akx99
 JKA9 RK2-zkPE9 kKPUUAE-9 P5A9 7358KA59 CPRRA49 8D9 6P5zD3-9 EDqzkPE9 kKPUUAE-9 kP552zUq9 3-A59 85P77zk9 PU49 kDU85DE9 zU7D5CP8zDU9
NA8BAAU98KA9H,9PU498KA9XJ,x99
 JKA97DEEDBzUq9-Ak8zDU94A-k5zNA-98KA9RC9zU8A57PkA9R5D8DkDE-93-A49P898KA9H,9PU498KA9XJ,9-z4Ax9

g e
io led
ic ow
n
bl kn

Fig. 2.1.3 : The Um interface between MS and BTS


at
Pu ch

Physical layer
_P2A59W”9BKzkK9z-9P95P4zD9zU8A57PkA”9R5D6z4A-98KA973Uk8zDUPEz8295AW3z5A498D985PU-7A598KA9Nz89-85APC-9D6A598KA9RK2-zkPE9
Te

kKPUUAE-9DU98KA95P4zD9CA4z3Cx9JKA9-A56zkA-9R5D6z4A49N298Kz-9EP2A598D98KA9PND6A9EP2A5-9zUkE34A9]9
 ;KPUUAE9CPRRzUq9FEDqzkPE98D9RK2-zkPEO9
 ;KPUUAE9kD4zUq9PU49kzRKA5zUq9
 'zqz8PE9CD43EP8zDU9
 S5AW3AUk29KDRRzUq9
 JzCzUq9P46PUkA9PU49RDBA59kDU85DE9
Data link layer
 ,zqUPEzUq9_P2A59+9z-9NP-A49DU98KA9__“'C9R5D8DkDE”9BKzkK9z-9P96P5zP8zDU9D798KA9/,'X9__“j'9R5D8DkDEx99
 JKA9CPzU98P-µ9D79__“'C9z-98D9R5D6z4A9P95AEzPNEA9-zqUPEzUq9EzUµ9NA8BAAU98KA9UA8BD5µ9PU498KA9CDNzEA9-8P8zDUx99
 JKA9__“j'9R5D8DkDE9KP-9NAAU9CD4z7zA498D9P4PR89zU98KA9CDNzEA9AU6z5DUCAU8x99
Network layer
 ,zqUPEzUq9_P2A59Q98PµA-9kP5A9D79-zqUPEzUq9R5DkA435A-9NA8BAAU9PU9H,99PU498KA9UA8BD5µx9/89kDU-z-8-9D798K5AA9-3NEP2A5-9
Bz8K94z-8zUk89-zqUPEzUq9R5DkA435A-x9
o ^P4zD95A-D35kA9CPUPqACAU89F^^O9
o HDNzEz829CPUPqACAU89FHHO9
o ;DUUAk8zDU9CPUPqACAU89F;HO9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-12 GSM

 ^P4zD9 5A-D35kA9 CPUPqACAU89 F^^O9 kDCR5z-A-9 R5DkA435A-9 5AW3z5A49 8D9 A-8PNEz-K”9 CPzU8PzU”9 PU49 5AEAP-A9 8KA9 4A4zkP8A49
5P4zD9kDUUAk8zDU-x9JKA9^^9-3N9EP2A5973Uk8zDU-9zUkE34A9]9
o ;KPUUAE9P--zqUCAU89PU495AEAP-A9
o ;zRKA5zUq9
o HD4z7zkP8zDU9D79kKPUUAE9CD4A-”9Axqx”96DzkA9PU494P8P9
o =PU4D6A59NA8BAAU9kAEE-9
o S5AW3AUk295A4A7zUz8zDU98D9AUPNEA975AW3AUk29KDRRzUq9
o H,9CAP-35ACAU895ARD58-9
o “DBA59kDU85DE9PU498zCzUq9P46PUkA9
o “PqzUq9
o ^P4zD9kKPUUAE9PkkA--9

e
JKA9 CDNzEz829 CPUPqACAU89 FHHO9 -3NEP2A59 KPU4EA-9 73Uk8zDU-9 PU49 R5DkA435A-9 5AEP8A49 8D9 CDNzEz829 D79 8KA9 CDNzEA9 3-A5x9
JKz-9zUkE34A-9R5DkA435A-97D59_38KAU8zkP8zDU9PU49_DkP8zDU95Aqz-85P8zDU9PU49RA5zD4zk93R4P8zUqx9

g
 JKA9 kDUUAk8zDU9 CPUPqACAU89 F;HO9 -3NEP2A59 kDU8PzU-9 8KA9 73Uk8zDU-9 PU49 R5DkA435A-9 7D59 kPEE9 kDU85DEx9 JKz-9 zUkE34A-9
io led
R5DkA435A-98D9A-8PNEz-K”95AEAP-A”9PU49PkkA--9-A56zkA-9PU497PkzEz8zA-x9
OY/N Y"#$NZTHK[qIPKNR9X,;9PU49XJ,9kDCC3UzkP8A96zP9_$%&9zU8A57PkAx9JKA9_$%&9zU8A57PkA9z-9P--DkzP8A49Bz8K98KA9zU7D5CP8zDU9
AYkKPUqA9 5AEP8A49 8D9 8KA9 5P4zD9 85PU-Cz--zDU9 -3kK9 P-9 4z-85zN38zDU9 D79 5P4zD9 kKPUUAE-”9 kDUUAk8zDU9 -3RA56z-zUq”9 8KA9
ic ow

W3A3zUq9D79CA--PqA-9NA7D5A985PU-Cz--zDU”975AW3AUk29KDRRzUq9kDU85DE”9kKPUUAE9kD4zUq”94AkD4zUq9A8kx9
n
OYY/N YN YTHK[qIPKN R9 9 JKA9 _9 zU8A57PkA9 z-9 3-A49 8D9 R5D6z4A9 kDCC3UzkP8zDU9 NA8BAAU9 8KA9 X,,9 PU49 8KA9 H,;x9 /89 z-9 NP-A49 DU9
bl kn

PY[PCYHN,xYHPAKjNUIDfv29-2-8AC-x9/89kP55zA-93R98D9Q:[V9µNz8-Z-9kDUUAk8zDU-x9JKA9zU8A57PkA9kP55zA-9zU7D5CP8zDU98D9
AUPNEA9 8KA9 kKPUUAE-9 PU49 8zCA-ED8-9 PEEDkP8A49 8D9 8KA9 CDNzEA9 AW3zRCAU8-x9 JKA9 CA--PqzUq9 5AW3z5A49 Bz8KzU9 8KA9
at

UA8BD5µ98D9AUPNEA9KPU4D6A59z-9PE-D9kP55zA49D6A598Kz-9zU8A57PkAx9
Pu ch

OYYY/N ]NYTHK[qIPKNRNJKA9^,,9z-9kDUUAk8A49Bz8K9T,,9N29]NYTHK[qIPKx9T9zU8A57PkA93-A-98KA9.YGTIFYTGN,J,HK]NQEWN^NO..^/N
NP-A49DU9cx+Q9PU49kP55zA-9CPUPqACAU894P8P98DZ75DC98KA9^,,x9
Te

]HAK[NYTHK[qIPK,NHAIHNI[KNC,KjNYTNB.DNI[KNRN
OY/N VNYTHK[qIPKNR9X9zU8A57PkA9AYz-89NA8BAAU98KA9H,;9PU498KA9a_^x9/893-A-9P9R5D8DkDE9µUDBU9P-98KA9 DYU_VNy[EHEPEFx9\A9
µUDB9 8KP89 CD-89 a_^-9 P5A9 kDEEDkP8A49 Bz8K9 PU9 H,;x9 JKz-9 CPµA-9 8KA9 zU8A57PkA9 R35AE29 PU9 dzU8A5UPEe9 zU8A57PkAx9 JKA9
zU8A57PkA9 z-9 3-A49 BKAUA6A59 8KA9 H,;9 UAA4-9 8D9 kDCC3UzkP8A9 Bz8K9 8KA9 a_^9 zU9 D54A59 8D9 PkkA--9 4P8P9 5AqP54zUq9 PU9 H,9
EDkP8A49zU9z8-9P5APx99
OYY/N IN YTHK[qIPKN R9 JKA9 ;9 zU8A57PkA9 z-9 3-A49 8D9 R5D6z4A9 kDCC3UzkP8zDU9 NA8BAAU9 8KA9 =_^9 PU49 P9 TH,;x9 JKA9 kPEE9 8KP89 z-9
D5zqzUP8zUq9 75DC9 D38-z4A9 8KA9 UA8BD5µ9 KP-9 8D9 RP--9 8K5D3qK9 8KA9 qP8ABP29 -D9 8KP89 5D38zUq9 zU7D5CP8zDU9 5AW3z5A49 8D9
kDCREA8A98KA9kPEE9CP29NA9qPzUA4x9JKz-9zU8A57PkA93-A-9DYU_INy[EHEPEFWN
OYYY/N FNYTHK[qIPKNR9JKA9a_^9PU498KA9=_^9kDCC3UzkP8A-96zP9'9zU8A57PkAx9/893-A-98KA9DYU_F9R5D8DkDEx9JKA9zU7D5CP8zDU95AEP8A49
9 8D98KA9EDkP8zDU9D79H,9z-9AYkKPUqA49NA8BAAU98KA9a_^9PU49=_^9D6A598Kz-9zU8A57PkAx99
OYO/N TNYTHK[qIPKNR9JKA9V9zU8A57PkA9R5D6z4A-9kDCC3UzkP8zDU9NA8BAAU98BD9H,;-x9/893-A-9DYU_T9R5D8DkDE98D9AYkKPUqA94P8P9
5AEP8A498D9KPU4D6A59NA8BAAU98KA9PUkKD59PU495AEP29H,;x9

2.1.5 GSM Protocols and Signaling Architecture


(MU - May 14)

Q. Explain the GSM protocol architecture. (May 14, 10 Marks)

 999Szqx9+xWxV9R5A-AU8-98KA9R5D8DkDE9P5kKz8Ak835A9D79T,H9Bz8K9-zqUPEzUq9R5D8DkDE-9PU49zU8A57PkA-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-13 GSM

XP-A49DU98KA9zU8A57PkA”98KA9T,H9-zqUPEzUq9R5D8DkDE9z-9P--ACNEA49zU8D98K5AA9qAUA5PE9EP2A5-9]9

g e
Fig. 2.1.4 : GSM protocol stack for signaling
io led
RIJK[NrNRNMAKNyAJ,YPIFNFIJK[[NBKzkK93-A-98KA9kKPUUAE9-853k835A-9D6A598KA9Pz59zU8A57PkAx9
 JKA9CPzU973Uk8zDU-9D79RK2-zkPE9EP2A59P5A9]99
ic ow

o =PU4EA-9PEE95P4zDj-RAkz7zk973Uk8zDU-9
o ;5AP8zDU9D79N35-8-9
n
o H3E8zREAYzUq9D79N35-8-9zU8D9J'H_975PCA-9
bl kn

o ,2UkK5DUz–P8zDU9Bz8K98KA9XJ,9
o
at

'A8Ak8zDU9D79z4EA9kKPUUAE-9
Pu ch

o HAP-35ACAU89D798KA9kKPUUAE9W3PEz829DU94DBUEzUµx9
 JKA9RK2-zkPE9EP2A59P89R'9zU8A57PkA93-A-9TH,U97D594zqz8PE9CD43EP8zDU9PU49RA57D5C-9AUk52R8zDUZ4Ak52R8zDU9D794P8Px9
Te

RIJK[NVNRNMAKNjIHIfFYTbNFIJK[NN
 JKA94P8PjEzUµ9EP2A593-A-9__“'C9F_zUµ9PkkA--9R5D8DkDE9DU98KA9''9kKPUUAEO9R5D8DkDENPk5D--98KA9RC9zU8A57PkA”9
 __“'9F_zUµ9PkkA--9R5D8DkDE97D598KA9'9kKPUUAEO9z-98KA9/,'X9R5D8DkDE97D59'9kKPUUAEx999
 __“''9z-9P9CD4z7zA496A5-zDU9D79__“'97D59CDNzEA9-8P8zDU-x9/894DA-9UD89UAA49-2UkK5DUz–P8zDU97EPq-9D59kKAkµ9-3C97D59A55D59
4A8Ak8zDUx99
 __“''9D77A5-97DEEDBzUq973Uk8zDUPEz829]9
o ^AEzPNEA94P8P985PU-7A59D6A59kDUUAk8zDU-9
o ^Aj-AW3AUkzUq9D794P8P975PCA-9
o SEDB9kDU85DE9
o ,AqCAU8P8zDU9PU495AP--ACNE29D794P8P9
o _kµUDBEA4qA4Z3UPkµUDBEA4qA494P8P985PU-7A5x9
RIJK[NvNR9JKA98Kz549EP2A59D798KA9T,H9-zqUPEzUq9R5D8DkDE9z-94z6z4A49zU8D98K5AA9-3N9EP2A5-]9
 ^P4zD9^A-D35kA9CPUPqACAU89F^^O9
 HDNzEz829HPUPqACAU89FHHO9PU49
 ;DUUAk8zDU9HPUPqACAU89F;HOx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-14 GSM

The MS to BTS Protocols


 JKA9^^9EP2A598PµA-9kP5A9D798KA9A-8PNEz-KCAU89D79P9EzUµ”9ND8K95P4zD9PU497zYA4”9NA8BAAU98KA9H,9PU498KA9H,;x99
 JKA9CPzU973Uk8zDUPE9kDCRDUAU8-9zU6DE6A49P5A98KA9H,”98KA9X,,”9PU498KA9H,;x9
 JKA9 ``N FIJK[9 z-9 kDUkA5UA49 Bz8K9 8KA9 CPUPqACAU89 D79 PU9 ^^j-A--zDU”9 BKzkK9 z-9 8KA9 8zCA9 8KP89 P9 CDNzEA9 z-9 zU9 4A4zkP8A49
CD4A9PU49z-9kDU7zq35zUq98KA95P4zD9kKPUUAE-x9
 JKA9DDNFIJK[9z-9N3zE89DU98DR9D798KA9^^9EP2A59PU49KPU4EA-98KA973Uk8zDU-98KP89P5z-A975DC98KA9CDNzEz829D798KA9-3N-k5zNA5x9/89
PE-D9KPU4EA-9P38KAU8zkP8zDU9PU49-Ak35z829P-RAk8-x9
 JKA9 IDN FIJK[9 z-9 5A-RDU-zNEA9 7D59 kPEE9 kDU85DE9 F;;O”9 -3RREACAU8P529 -A56zkA9 CPUPqACAU8”9 PU49 ,KD589 HA--PqA9 ,A56zkA9
F,H,O9CPUPqACAU8x9VPkK9D798KA-A9CP29NA9kDU-z4A5A49P-9P9-ARP5P8A9-3N9EP2A59Bz8KzU98KA9;H9EP2A5x9
BSC Protocols
 _78A598KA9zU7D5CP8zDU9z-9RP--A4975DC98KA9XJ,98D98KA9X,;”98KA9+!"#9zU8A57PkA9z-93-A49NA8BAAU98KA9XJ,9PU498KA9X,;x99
 _89 8Kz-9 EA6AE”9 8KA9 5P4zD9 5A-D35kA-9 P89 8KA9 EDBA59 RD58zDU9 D79 _P2A59 Q9 P5A9 kKPUqA49 75DC9 8KA9 ^^9 8D9 8KA9 XP-A9 J5PU-kAz6A59

e
,8P8zDU9HPUPqACAU89FXJ,HOx99

g
 JKA9XJ,9CPUPqACAU89EP2A59z-9P95AEP2973Uk8zDU9P898KA9XJ,98D98KA9X,;x9
io led
 JKA9``Ny[EHEPEF,9R5D6z4A98KA9R5DkA435A-97D598KA93-A”9PEEDkP8zDU”95APEEDkP8zDU”9PU495AEAP-A9D798KA9T,H9kKPUUAE-x99
 JKA9X,;9-8zEE9KP-9-DCA95P4zD95A-D35kA9CPUPqACAU89zU9REPkA97D598KA975AW3AUk29kDD54zUP8zDU”975AW3AUk29PEEDkP8zDU”9PU49
ic ow

8KA9CPUPqACAU89D798KA9D6A5PEE9UA8BD5µ9EP2A597D598KA9_P2A59+9zU8A57PkA-x9
 S5DC9 8KA9 X,;9 8D9 H,;”9 8KA9 5AEP29 z-9 3-zUq9 ,,"9 R5D8DkDE-9 PU49 8KA9 X,,9 CDNzEA9 PRREzkP8zDU9 RP589 FX,,_“O9 z-9 3-A49 8D9
n
kDCC3UzkP8A975DC98KA9X,;98D9H,;x9
bl kn

MSC Protocols

at

_898KA9H,;”98KA9zU7D5CP8zDU9z-9CPRRA49Pk5D--98KA9_9zU8A57PkAx99
Pu ch

 =A5A98KA9AW3z6PEAU89-A89D795P4zD95A-D35kA-9z-9UDB9kPEEA498KA9X,,9_RREzkP8zDU9“P589FX,,_“Ox9
 JKz-9kDCREA8A-98KA95AEP29R5DkA--x9JK5D3qK98KA9kDU85DEj-zqUPEzUq9UA8BD5µ”9PEE98KA9H,;-9zU8A5Pk898D9EDkP8A9PU49kDUUAk89
Te

8D93-A5-98K5D3qKD3898KA9UA8BD5µx99
 _DkP8zDU95Aqz-8A5-9P5A9zUkE34A49zU98KA9H,;94P8PNP-A-98D9P--z-89zU98KA95DEA9D794A8A5CzUzUq9KDB9PU49BKA8KA59kDUUAk8zDU-9
P5A98D9NA9CP4A98D95DPCzUq93-A5-x9
Signaling system No. 7 (SS7)
,,"9 z-9 3-A49 7D59 -zqUPEzUq9 NA8BAAU9 H,;9 PU49 P9 X,;x9 JKz-9 R5D8DkDE9 z-9 3-A49 8D9 85PU-7A59 PEE9 CPUPqACAU89 zU7D5CP8zDU9
NA8BAAU9H,;-”9=_^”a_^-”9_3;”9V/^”9PU49TH;x9

2.1.6 Localization and Calling Description of the Call Setup Procedure


T,H9-3RRD58-9P38DCP8zk”9BD5E4Bz4A9EDkPEz–P8zDU9D793-A5-x9JKA9-2-8AC9PEBP2-9µUDB-9EDkP8zDU9D798KA93-A5”9PU498KA9
-PCA9RKDUA9U3CNA59z-96PEz49BD5E4Bz4Ax9_-9-DDU9P-9CDNzEA9-8P8zDU9CD6A-98D9P9UAB9P5AP”9z8-9a_^9kKPUqAx9JKA9=_^9-AU4-9PEE9
3-A594P8P9UAA4A498D98KA9UAB9a_^x9
JD9EDkP8A9CDNzEA9-8P8zDU9PU498D9P445A--98KA9H,”9-A6A5PE9U3CNA5-9P5A9UAA4A49]9
rWN DENYFKN.HIHYETNZTHK[TIHYETIFNZ.FQNQC]NK[NOD.Z.FQ/N
 JKz-9z-98KA9CDNzEA9RKDUA9U3CNA59D798KA93-A5x99
 JKz-9U3CNA59kDU-z-8-9D798KA9PECTH[JNPEjKNOII/97DEEDBA49N29UP8zDUPE9jK,HYTIHYETNPEjK9FX';O9FP445A--9D79-A56zkA9
R5D6z4A5O9PU498KA9,CN,P[YNK[NTC]NK[NO.Q/9FAxqx9fLW999L"Q999W+QVQ["Ox99
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-15 GSM

VWN ZTHK[TIHYETIFNDENYFKN.CN,P[YNK[NZjKTHYHJNOZD.Z/N
 T,H93-A-9/H,/97D59zU8A5UPE93UzW3A9z4AU8z7zkP8zDU9D79P9-3N-k5zNA5x99
 /H,/9kDU-z-8-9D79P9CDNzEA9kD3U8529kD4A9FH;;O”98KA9CDNzEA9UA8BD5µ9kD4A9FHX;O9F8KA9kD4A9D79-A56zkA9R5D6z4A5O”9PU49
8KA9CDNzEA9-3N-k5zNA59z4AU8z829U3CNA59FH,/XOx99
vWN MK]yE[I[JNDENYFKN.CN,P[YNK[NZjKTHYHJNOMD.Z/N
 JD9Kz4A98KA9/H,/9D6A595P4zD9zU8A57PkA”9T,H93-A-9V9N28A9JH,/97D59EDkPE9-3N-k5zNA59z4AU8z7zkP8zDUx9
 JH,/9z-9-AEAk8A49N298KA9k355AU89a_^9PU49z-96PEz497D598ACRD5P5zE29PU49Bz8KzU98KA9EDkP8zDU9P5AP9D798KA9a_^x9
 a_^9CP29kKPUqA9JH,/9RA5zD4zkPEE2xN
7WN DENYFKN.HIHYETN`EI]YTGNQC]NK[NOD.`Q/N
 H,^X9z-9P98ACRD5P529P445A--9qAUA5P8A49N29a_^98KP89z-93-A498D9Kz4A98KA9z4AU8z829PU49EDkP8zDU9D79P9-3N-k5zNA5x99
 JKA9a_^9qAUA5P8A-98Kz-9P445A--9DU95AW3A-8975DC98KA9H,;x9
 JKz-9H,^X9P445A--9z-9PE-D9-8D5A49zU98KA9=_^x9

e
 H,^X9kDU8PzU-98KA9k355AU89aY,YHE[NIECTH[JNIEjKNOaII/”98KA9z4AU8z7zkP8zDU9D798KA9PC[[KTHND.INPU498KA9,CN,P[YNK[N

g
TC]NK[x9

io led
_EE98KA-A9PND6A9CAU8zDUA49U3CNA5-9P5A9UAA4A498D9EDkP8A9P9CDNzEA9-8P8zDU9PU49CPzU8PzU9kDUUAk8zDU9Bz8K9z8x99

2.1.6(a) Initialization
ic ow

 \KAUA6A59P9CDNzEA9-8P8zDU9FH,O9z-9RDBA5A49DU”9-AW3AUkA9D79DRA5P8zDU-9KP6A98D9NA9RA57D5CA49zU9D54A598D9Pk8z6P8A98KA9
CDNzEA9zU98KA9qz6AU9UA8BD5µx9
n
 Sz5-8”9H,9EDDµ-97D598KA9kP55zA59DU9BKzkK98KA9N5DP4kP-89kKPUUAE9z-985PU-Cz88A4x9
bl kn

 /U9 D54A59 8D9 4D9 8Kz-”9 H,9 -kPU-9 PEE9 W+V9 kKPUUAE-9 PU49 CAP-35A-9 8KAz59 5AkAz6A49 RDBA59 EA6AEx9 JKA9 kP55zA59 kDU8PzUzUq9 8KA9
N5DP4kP-89kKPUUAE9z-9ACz88A49P89P9C3kK9KzqKA59RDBA598KPU9D8KA59kP55zA5-9zU98KA9-PCA9kAEEx9
at
Pu ch

 JKA9H,9Ez-8-98KA9CAP-35A49kP55zA5-9PkkD54zUq98D98KAz594Ak5AP-zUq9RDBA5x9
 /U9 8KA9 UAY89 -8AR”9 8KA9 H,9 Ez-8AU-9 8D9 8KA9 -3N-AW3AU89 kP55zA5-9 75DC9 8KA9 Ez-89 PU49 -AP5kKA-9 7D59 8KA9 75AW3AUk29 kD55Ak8zDU9
()
Te

kKPUUAE9FS;;=Ox9JKz-9z-94DUA9N29-kPUUzUq9: 9-ED89D798KA9N5DP4kP-89kP55zA5x9
 JKA9H,9kP55zA5975AW3AUk29z-98KAU9P4g3-8A498D98KP8975AW3AUk2x9
 H,98KAU97zU4-9D8KA59zCRD58PU89kDU85DE9zU7D5CP8zDU9N29-kPUUzUq9:()#-ED89D79-3N-AW3AU8975PCA-x9
 _898Kz-9CDCAU898KA9RP--z6A9RP589D798KA9H,9Pk8z6P8zDU9zU98KA9UA8BD5µ9z-9kDCREA8A4x9

2.1.6(b) Registration and Location Update


 /U9D54A598D9zUz8zP8A9P9kPEE9D598D9NA9RPqA4”9H,9KP-98D95Aqz-8A59z8-AE79Bz8K98KA9UA8BD5µx9
 ^Aqz-85P8zDU98PµA-9REPkA9z798KA9_DkP8zDU9_5AP9/4AU8z829F__/O9U3CNA595AkAz6A49N298KA9H,975DC98KA9XJ,9z-94z77A5AU898KPU9
BKP89z-9-8D5A49zU98KA9H,x9
 JKA9EDkP8zDU93R4P8A98PµA-9REPkA9zU97DEEDBzUq9kP-A-]9
o \KAU98KA9H,9KP-9NAAU9-Bz8kKA49D779PU49BPU8-98D9NAkDCA9Pk8z6A”9D599
o \KAU9z89z-9Pk8z6A9N389UD89zU6DE6A49zU9P9kPEE”9PU49z89CD6A-975DC9DUA9EDkP8zDU9P5AP98D9PUD8KA5x9
o _78A59P95Aq3EP598zCA9zU8A56PEx9
 JKA9REPIHYETNXyjIHKNy[EPK,,9kDU-z-8-9D798KA97DEEDBzUq9RKP-A-9]9
Wx9 ^AW3A-897D59-A56zkA9 +x9 _38KAU8zkP8zDU99
Qx9 ;zRKA5zUq99 9 9 Vx9 RR4P8A9=_^Za_^9
Qx9 JH,/95AjPEEDkP8zDU9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-16 GSM

g e
io led
ic ow
n
bl kn
at
Pu ch

Fig. 2.1.5 : Registration and location update

 _898Kz-9RDzU8”9BA9P5A95AP4298D9zU7D5C98KA9=_^98KP898KA9H,9z-93U4A59kDU85DE9D79P9UAB9a_^9PU498KP898KA9H,9kPU9NA94Aj
Te

5Aqz-8A5A4975DC98KA9DE49a_^x9JKA9EDkP8zDU9D798KA93-A59z-93R4P8A49zU98KA9=_^xN
 JKA9UAB9__/9PU49JH,/9z-9-AU898D98KA9H,x9H,9kDU7z5C-98KA9UAB9__/9PU49JH,/x9=A5A98KA9EDkP8zDU93R4P8A9R5DkA435A9z-9
kDCREA8Ax9JKA9,';;=9kKPUUAE9z-95AEAP-A4xN
 JKA9-8AR9N29-8AR9R5DkA435A9z-9zEE3-85P8A49zU9Szqx9+xWxQx9
 JKA97z5-898P-µ9PU9H,9KP-98D94D9z-98D9PkW3z5A9P9kKPUUAE97D595Aqz-85P8zDUx9JKA9H,94DA-98Kz-9N2985PU-Cz88zUq98KA9^_;=9zU9
BKzkK98KA9H,95AW3A-8-98KA9XJ,97D59P9kKPUUAE98D9NA93-A497D595Aqz-85P8zDUx9
 JKA9XJ,985PU-7A5-98Kz-95AW3A-898D98KA9X,;x9
 /U9835U98KA9X,;9zU7D5C-98KA9XJ,98D9P--zqU9P975AA9,8PU4PEDUA9'A4zkP8A49;DU85DE9;KPUUAE9F,';;=O98D98KA9H,x9
 JKA9XJ,9-AU4-98KA9kDU7z5CP8zDU98D9H,9DU9_kkA--9q5PU89kKPUUAE9F_T;=O9PU49PEEDkP8A-9,';;=98D9H,x9

 /U9835U98KA9H,9-AU4-98KA9EDkP8zDU93R4P8A95AW3A-89DU9UABE29P--zqUA49,';;=x9JKA95AW3A-89kDU8PzU-9JH,/9PU49DE49__/x9
 JKz-95AW3A-89z-97D5BP54A498D98KA9UAB9H,;9PU49kD55A-RDU4zUq9a_^98K5D3qK98KA9XJ,9PU49X,;x9

 /798KA9a_^9PE5AP429kDU8PzU-98KA93-A5h-9JH,/”9z893R4P8A-9z8-94P8Px9
 /79 UD9 JH,/9 AYz-89 7D59 8KP89 3-A59 8KAU9 8KA9 __/9 -AU89 N29 8KA9 3-A59 z-9 4AkD4A4x9 JKA9 __/9 zU4z5Ak8E29 4A-k5zNA-9 8KA9 a_^9 8KP89
R5A6zD3-E29-A56A498KA9H,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-17 GSM

 JKA9k355AU89a_^98PµA-9PEE98KA93-A5h-9RP5PCA8A5-9-3kK9P-9/H,/9U3CNA5”9P38KAU8zkP8zDU9PU49AUk52R8zDU9RP5PCA8A5-975DC9
8KA9R5A6zD3-9a_^x9

 /798KA9R5A6zD3-9a_^94DA-9UD89kDU8PzU98Kz-9zU7D5CP8zDU98KAU98KA9H,9UAA4-98D985PU-Cz89z8-9/H,/9DU9,';;=x9
 JKA9H,9-AU4-9z8-9/H,/98K5D3qK9Pz59DUE29DUkAx9JKz-9KPRRAU-9P898KA97z5-89AU85298D98KA9UA8BD5µx9

 JKA9/H,/9U3CNA594A8A5CzUA-98KA9),,'&--".("%/&"0-&'",)%)"#$"%/&"123x9JKz-9zU7D5CP8zDU975DC98KA9=_^9z-9EDP4A49zU98KA9
k355AU89a_^x9JKA9zU7D5CP8zDU9kDU8PzU-9P38KAU8zkP8zDU9RP5PCA8A5-97D598KA93-A5x9
 _78A598KP898KA9UAB9a_^9zUz8zP8A-98KA93-A59P38KAU8zkP8zDU9R5DkA--9PU498KA93-A595AREzA-9P5A96A5z7zA4x9
 JKA9UAB9H,;Za_^95AW3A-8-98KA9X,,98D9kzRKA598KA95P4zD9kKPUUAEx9JKA9X,,93RDU9kzRKA5zUq98KA94DBUEzUµ9kKPUUAE9-AU4-9P9
kzRKA59kDCREA8A9CA--PqA98D98KA9H,;xN

2.1.6(c) Mobile Terminated Call (MTC)

e
(MU - May 14, Dec. 15)

g
Q. Describe the call initiation and call termination procedure in GSM systems.
io led (May 14, 10 Marks)
Q. Explain Mobile Call termination in GSM, detailing the need and the use of MSRN, IMSI, TMSI nos.
(Dec. 15, 10 Marks)
ic ow

JKz-9z-98KA9-z83P8zDU9BKA5A9P98A5CzUPE975DC9P97zYA49UA8BD5µ9kPEE-9P9CDNzEA9-8P8zDUx9JKz-9zU6DE6A-98KA97DEEDBzUq9-8AR-9
FSzqx9+xWx[Ox9
n
.HKyNrNN RNN _9 “,JX9 3-A59 4zPE-9 8KA9 RKDUA9 U3CNA59 D79 P9 T,H9 -3N-k5zNA5x9 JKA9 7zYA49 UA8BD5µ9 F“,JXO9 UD8zkA-9 8KP89 8KA9
bl kn

U3CNA59z-9D798KA9T,H9UA8BD5µ9PU497D5BP54-9kPEE9-A83R98D98KA9TP8ABP29H,;9FTH,;Ox9
at

.HKyNVNN R9 TH,;9 z4AU8z7zA-9 8KA9 =_^9 F75DC9 8KA9 /H,/9 U3CNA59 D79 8KA9 kPEEA49 H,O9 7D59 8KA9 -3N-k5zNA59 PU49 -zqUPE-9 8KA9 kPEE9
Pu ch

-A83R98D98KA9=_^x9
Te

.HKyNvNN R99 JKA9 =_^9 UDB9 kKAkµ-9 BKA8KA59 8KA9 U3CNA59 AYz-8-9 PU49 BKA8KA59 8KA9 3-A59 KP-9 -3N-k5zNA49 8D9 8KA9 5AW3A-8A49
-A56zkAx99
.HKyN7NN NNN R99=_^95AW3A-8-9P9HDNzEA9-3N-k5zNA595DPCzUq9U3CNA59FH,^XO975DC98KA9k355AU89a_^x9
.HKyNmNN NNN R99=_^95AkAz6A-9H,^Xx9_U498KA9=_^9kPU94A8A5CzUA95A-RDU-zNEA9H,;97D598KA9H,x9
.HKyNcNN NNN R99JKA9=_^97D5BP54-98Kz-9zU7D5CP8zDU98D9TH,;x9
.HKyN^NN NNN R99JKA9TH,;97D5BP54-9kPEE9-A83R95AW3A-898D98KA9H,;x9
.HKyN)[N:NN NNN RN JKA9H,;97z5-895AW3A-8-98KA9k355AU89-8P83-9D798KA9H,975DC98KA9a_^x99
.HKyNr2NN NNN R99/798KA9H,9z-9P6PzEPNEA”98KA9H,;9zUz8zP8A-9RPqzUq9zU9PEE9kAEE-x9
.HKyNrrNN NNN R99JKA9XJ,-9D79PEE9X,,-985PU-Cz898Kz-9RPqzUq9-zqUPE98D98KA9H,x9
.HKyNrV[NrvNR9JKA9H,9PU-BA5-x9
.HKyNr7[NrmNR9JKA9a_^94DA-9-Ak35z829kKAkµ-x9
.HKyNrc[Nr^NR99JKA9;DUUAk8zDU9z-9-A83Rx9
Szqx9+xWx"9zEE3-85P8A-98KA9CA--PqA-9AYkKPUqA9NA8BAAU98KA9H,9PU498KA9XJ,98PµAU9REPkA9435zUq98KA9kDUUAk8zDU9-A83Rx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-18 GSM

g e
io led Fig. 2.1.6 : Mobile terminated call

9
ic ow
n
bl kn
at
Pu ch
Te

Fig. 2.1.7 : Message flow for MTC

 XD8A98KP898KA9EDkP8zDU9P5AP9z-9-A56A49N29CPU29NP-A9-8P8zDU-x9,D9P78A594A8A5CzUzUq98Kz-9P5AP”98KA9H,;9-AU4-9P9RPqzUq9
5AW3A-898D9PEE9X,;-9DRA5P8zUq9zU98KA94A8A5CzUA49EDkP8zDU9P5APx99
 /798KA9CDNzEA9-8P8zDU94A8Ak8-98KA9RPqzUq94z5Ak8A498D9z8”9z895AW3A-8-98KA9XJ,97D598KA9kKPUUAE9DU9^_;=x9
 JKA9X,;98KAU9P--zqU-98KA9,';;=9kKPUUAE98D98KA9H,9PU49zU7D5C-9H,;9PND3898KA9P--zqUCAU8x9
 H,9-AU4-98KA9RPqzUq95A-RDU-A9DU98Kz-9P--zqUA49,';;=x99
 XDB9a_^9zUz8zP8A-98KA9H,9ICHAKTHYPIHYET9R5DkA--98KP89zU6DE6A-98KA9H,;”9X,;9PU9H,x9
 _78A598KA9H,9KP-9NAAU9P38KAU8zkP8A4”98KA9a_^9z--3A-9P9kDCCPU498D9H,;98D9-8P589jIHINKTP[JyHYETx9JKA9H,;9zU9835U9
85PU-7A5-98Kz-9kDCCPU498D98KA9H,98K5D3qK9X,;9PU49XJ,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-19 GSM

 _78A598KA9zUz8zP8zDU9D798KA9AUk52R8zDU9zU98KA9H,”9P9UAB9JH,/9U3CNA59z-9P--zqUA498D98KA9H,97D598KA98zCA9D79kDUUAk8zDUx9
JKA9H,9PkµUDBEA4qA-95AkAR8zDU9D798Kz-9U3CNA5x99
 _89 8Kz-9 CDCAU89 8KA9 H,;9 zUz8zP8A-9 8KA9 PETTKPHYETN ,KHCy9 Bz8K9 8KA9 H,9 N29 -AU4zUq9 P9 -A89 3R9 CA--PqA9 8D9 z8x9 JKA9 H,9
PkµUDBEA4qA-98KA95AkAzR89D798Kz-9CA--PqAx99
 H,;98KAU9zU7D5C-9X,;98D9P--zqU9P985P77zk9kKPUUAE98D98KA9H,x9H,95AkAz6A-98KA9kP55zA59U3CNA5”9P98zCA9-ED89PU49P985PzUzUq9
-AW3AUkA97D598KA9kDUUAk8zDUx9H,9PkµUDBEA4qA-98KA-A9RP5PCA8A5-x9
 JKA9H,98KAU9-8P58-95zUqzUq9PU498KA9H,;9z-9zU7D5CA49PND389z8x9
 JKA9H,;98KAU9-AU4-98KA95zUqzUq9-zqUPE98D98KA9kPEEzUq93-A5x99
 _78A598KA9H,9PkkAR8-98KA9kPEE”9Pk83PE94P8P985PU-7A59-8P58-x9

2.1.6(d) Mobile Originated Call (MOC) (MU - May 16, Dec. 16)

Q. Explain how Mobile Originated Call (MOC) work. (May 16, Dec. 16, 10 Marks)

e
/89 z-9 C3kK9 -zCREA59 8D9 RA57D5C9 P9 CDNzEA9 D5zqzUP8A49 kPEE9 FHT;O9 kDCRP5A49 8D9 HJ;x9 JKz-9 7DEEDB-9 8KA9 7DEEDBzUq9 -8AR-99

g
F^A7A59Szqx9+xWx’Ox9 io led
.HKyNrN RN N N JKA9 H,9 85PU-Cz8-9 8KA9 5AW3A-89 7D59 P9 UAB9 kDUUAk8zDUx9 JKz-9 z-9 5APEz–A49 N29 8KA9 H,9 -AU4zUq9 P9 5PU4DC9 PkkA--9
N35-89DU9^_;=9EDqzkPE9kKPUUAEx9
.HKyNVNN RNN JKA9X,,97D5BP54-98Kz-95AW3A-898D98KA9H,;x9
ic ow

.HKyNv[N7NN R99 H,;98KAU9kKAkµ-9z798Kz-93-A59z-9PEEDBA498D9-A83R9P9kPEE9Bz8K98KA95AW3A-8A49-A56zkAx9


n
bl kn
at
Pu ch
Te

Fig. 2.1.8 : Mobile originated call

.HKyNmf)NN NRNN9JKA9H,;9kKAkµ-98KA9P6PzEPNzEz829D795A-D35kA-98K5D3qK9T,H9UA8BD5µ9PU49zU8D98KA9“,JXxNN
.HKyN:[Nr2N NRNN /79PEE95A-D35kA-9P5A9P6PzEPNEA”98KA9H,;9-A8-93R9P9kDUUAk8zDU9NA8BAAU9H,9PU498KA97zYA49UA8BD5µx9
/U9 P44z8zDU9 8D9 8KA9 PND6A9 -8AR-”9 D8KA59 CA--PqA-9 P5A9 AYkKPUqA49 NA8BAAU9 PU9 H,9 PU49 XJ,9 435zUq9 kDUUAk8zDU9 -A83Rx99
Szqx9+xWxL9-KDB-98KA9CA--PqA-97D59HT;x9
 H,9KP-98D95AkAz6A9PU9PkkA--9q5PU89DU9_T;=9zU95A-RDU-A98D98KA9kKPUUAE95AW3A-89-AU89DU9^_;=x9JKz-9_T;=9kDU8PzU-98KA9
U3CNA59D798KA9,';;=9P--zqUA498D98KA9H,98D9NA93-A497D59kDUUAk8zDU9-A893Rx99
 _EE9-3N-AW3AU89kDCC3UzkP8zDU9NA8BAAU98KA9H,9PU498KA9XJ,9BzEE9KPRRAU9DU98Kz-9P--zqUA49,';;=x9
 JKA9H,9-AU4-9kPEE9-A893R95AW3A-898D98KA9X,;96zP9XJ,x9
 JKA9X,;985PU-7A5-98Kz-9CA--PqA98D98KA9H,;x9
 H,;9zU9835U9zU7D5C-98KA9a_^9P--DkzP8A49Bz8K9z89PND3898KA9kPEE9-A893R95AW3A-89z--3A49N298KA9H,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-20 GSM

g e
io led
Fig. 2.1.9 : Message flow for MOC


ic ow

/U9835U9a_^9zUz8zP8A-9P38KAU8zkP8zDU9R5DkA--x9
 _78A598KA9H,9KP-9NAAU9P38KAU8zkP8A4”98KA9AUk52R8zDU9R5DkA435A9z-9-8P58A49N298KA9a_^x9
n

bl kn

_9UAB9JH,/9U3CNA59z-9P--zqUA498D98KA9H,x9JKA9H,9PkµUDBEA4qA-98KA95AkAR8zDU9D79JH,/x9JKA9H,;98KAU9P--zqU-9P97zYA49
EzUµ98D98KA9kPEE9PU49P985P77zk9kKPUUAE98D98KA9H,x9

at
Pu ch

H,9PkµUDBEA4qA-98KA9kKPUUAE9P--zqUCAU8x9JKz-9zU7D5CP8zDU95APkKA-98KA9H,;x9
 H,;9-AU4-98KA9PEA589CA--PqA98D98KA9H,98K5D3qK9X,;9PU49XJ,9BKAU98KA9kPEEA49CDNzEA9-8P8zDU9-8P58-95zUqzUqx9

Te

\KAU98KA9kPEEA49CDNzEA9-8P8zDU9PkkAR8-98KA9kPEE”98KA9H,9z-9zU7D5CA49PND389z89N29-AU4zUq9kDUUAk89CA--PqAx9
 SzUPEE29H,9PkµUDBEA4qA-98Kz-9kDUUAk89CA--PqA9PU494P8P985PU-7A59-8P58-x9

2.1.7 Handover in GSM


(MU - May 15, May 16)
Q. Explain various types of handoffs in GSM network. (May 15, 5 Marks)
Q. What are the different types of handover in GSM ?Explain in detail intra-MSC handover ? (May 16, 10 Marks)

 \KAU9P9CDNzEA93-A59z-9AUqPqA49zU9kDU6A5-P8zDU”98KA9H,9z-9kDUUAk8A498D98KA9XJ,96zP95P4zD9EzUµx9/798KA9CDNzEA93-A59CD6A-9
8D98KA9kD6A5PqA9P5AP9D79PUD8KA59XJ,”98KA95P4zD9EzUµ98D98KA9DE49XJ,9z-9A6AU83PEE294z-kDUUAk8A4”9PU49P95P4zD9EzUµ98D98KA9
UAB9XJ,9z-9A-8PNEz-KA498D9kDU8zU3A98KA9kDU6A5-P8zDUx9JKz-9R5DkA--9z-9kPEEA49KPU4D6A59D59KPU4D77x9999
 =PU4D6A59z-95AW3z5A49zU9kAEE3EP59UA8BD5µ-”9P-9P9-zUqEA9NP-A9-8P8zDU94D9UD89kD6A598KA9BKDEA9-A56zkA9P5APx9
 JKA9U3CNA59D79KPU4D6A5-98D9NA9RA57D5CA4994ARAU4-9DU98BD97Pk8D5-9]9
o IKFFN,YLKNR9JKA9-CPEEA59z-98KA9-z–A9D79kAEE9CD5A98KA9KPU4D6A5-95AW3z5A4x9
o .yKKjNEqND.NR9=zqKA598KA9-RAA49D79H,9CD5A9KPU4D6A5-9P5A95AW3z5A4x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-21 GSM

JKA5A9P5A98BD9NP-zk95AP-DU-97D59KPU4D6A59]9
rWN D.N]EOK,NECHNEqNHAKN[ITGKNEqNVM.N
 _-9 P9 CDNzEA9 -8P8zDU9 z-9 CD6A49 D389 D79 8KA9 5PUqA9 D79 XJ,”9 8KA9 5AkAz6A49 -zqUPE9 EA6AE9 7PEE-9 NAEDB9 8KA9 CzUzCPE9
5AW3z5ACAU89D79kDCC3UzkP8zDUx9
 JKA9A55D595P8A9q5DB-943A98D9zU8A57A5AUkA9PU49EDB9-zqUPE9-85AUq8Kx9
 _EE98KA-A9A77Ak8-9CP294zCzUz-K98KA9W3PEz829D795P4zD9EzUµ9PU49CPµA9kDCC3UzkP8zDU9zCRD--zNEAx9
VWN REIjNNIFITPYTGNN
 /798KA985P77zk9zU9DUA9kAEE9z-98DD9KzqK98KAU98KA9H,;9D59X,;9-Kz78-9-DCA9H,98D9D8KA59kAEE-x9
 Szqx9+xWxW:9-KDB-98KA97D359RD--zNEA9KPU4D6A59-kAUP5zD-9zU9T,Hx9

g e
io led
ic ow
n
bl kn

Fig. 2.1.10 : Handover scenario in GSM

OY/N ZTH[IfPKFFNAITjEOK[NRNJKz-9KPU4D6A598PµA-9REPkA9Bz8KzU9P9kAEEx9JKz-9KPU4D6A59z-9RA57D5CA49zU9D54A598D9DR8zCz–A98KA9
at
Pu ch

85P77zk9EDP49zU98KA9kAEE9D598D9zCR5D6A98KA9W3PEz829D798KA9kDUUAk8zDU9N29kKPUqzUq98KA9kP55zA5975AW3AUk29F-kAUP5zD9WOx9
OYY/N ZTHK[fPKFF[NYTH[IfV.INAITjEOK[NR9JKz-9KPU4D6A59Dkk35-9BKAU9P9CDNzEA9-8P8zDU9CD6A-975DC9DUA9kAEE98D9PUD8KA59kAEE”9
Te

N389-8P2-9Bz8KzU98KA9kDU85DE9D79-PCA9X,;x9JKA9X,;98KAU9RA57D5C-98KA9KPU4D6A5”9z89P--zqU-9P9UAB95P4zD9kKPUUAE9zU9
8KA9UAB9kAEE9PU495AEAP-A-9DE49DUA9F-kAUP5zD9+Ox9
OYYY/N ZTHK[fV.I[NYTH[IfD.INAITjEOK[NRNJKz-9KPU4D6A598PµA-9REPkA9NA8BAAU98BD9kAEE-9CPUPqA49N294z77A5AU89X,;-x9JKz-9
KPU4D6A59z-9kDU85DEEA49N29H,;9F-kAUP5zD9QOx9
OYO/N ZTHK[ND.INAITjEOK[NR9/U8A59H,;9KPU4D6A598PµA-9REPkA9NA8BAAU98BD9kAEE-9NAEDUqzUq98D94z77A5AU89H,;-x9XD8K9H,;-9
RA57D5C98KA9KPU4D6A598DqA8KA59F-kAUP5zD9VOx9
Inter-BSC, Intra-MSC handover
 Szqx9+xWxWW9-KDB-98KA982RzkPE9-zqUPE97EDB9435zUq9PU9zU8A5jX,;”9zU85PjH,;9KPU4D6A5x9
 JKA9H,9-AU4-9z8-9RA5zD4zk9CAP-35ACAU895ARD58-98D98KA9XJ,*+,x9
 JKA9XJ,*+,97D5BP54-98KA-A95ARD58-98D98KA9X,;*+,98DqA8KA59Bz8K9z8-9DBU9CAP-35ACAU8-x9
 XP-A49DU98KA-A96PE3A-98KA9X,;*+,94Akz4A-98D9RA57D5C9P9KPU4D6A59PU49-AU4-98KA9CA--PqA9=Ti5AW3z5A498D98KA9H,;x9
 JKA9H,;98KAU95AW3A-8-98KA95A-D35kA-9UAA4A497D598KA9KPU4D6A5975DC98KA9UAB9X,;x9
 JKz-9X,;-./9kKAkµ-”9z79AUD3qK95A-D35kA-9P5A9P6PzEPNEAx9/798KA95A-D35kA-9P5A9P6PzEPNEA98KAU9z89Pk8z6P8A-9P9RK2-zkPE9kKPUUAE9
P898KA9XJ,-./97D598KA9H,x9
 XJ,-./9 -AU4-9 PkµUDBEA4qACAU89 D79 -3kkA--73E9 kKPUUAE9 Pk8z6P8zDU9 8D9 X,;-./x9 PU49 X,;-./9 PkµUDBEA4qA-9 8KA9 KPU4D6A59
5AW3A-8x9
 JKA9H,;98KAU9z--3A-9P9KPU4D6A59kDCCPU498KP89z-97D5BP54A498D98KA9H,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-22 GSM

g e
io led
Fig. 2.1.11 : Intra MSC, inter BSC Handover process

 JKA9H,9UDB9N5APµ-98KA9DE49kDUUAk8zDU9PU49PkkA--A-98KA9UAB9XJ,x9XDB9P9UAB95P4zD9EzUµ9z-9A-8PNEz-KA49NA8BAAU98KA9
H,9PU49XJ,-./x9
ic ow

 _EE98KA95A-A56A495A-D35kA-9P898KA9DE49X,;9PU49XJ,9P5A95AEAP-A4x999

n
XD8A98KP89zU98KA9T,H9-2-8AC-98KA9CAP-35ACAU8-9P5A9RA57D5CA49N29ND8K9H,9PU498KA9XJ,x9
bl kn

 JKA9W3PEz829PU498KA9RDBA59EA6AE9D798KA95AkAz6A49-zqUPE9P5A9CAP-35A49zU9ND8K98KA94z5Ak8zDU-x9JKA9H,9RA57D5C-95Aq3EP59
CAP-35ACAU8-9D798KA9W[9-85DUqA-89kP55zA5-985PU-Cz88zUq98KA9X;;=x9
at
Pu ch

 JKA9CAP-35ACAU8-9D798KA9-zY9NA-89kP55zA5-9P5A985PU-Cz88A498D98KA9XJ,9A6A529:xV’9-Akx9

2.1.8 GSM Security (MU - May 12, Dec. 14, May 15, Dec. 16)
Te

Q. What are the functions of Authentication and Encryption in GSM ? (May 12, 10 Marks)
Q. Describe how data encryption is done is GSM system, with diagram explaining the role of SIM, A3, A5 and A8
algorithm. (Dec. 14, 10 Marks)
Q. Write a short note on Privacy and authentication in GSM. (May 15, 10 Marks)
Q. Explain in detail how Subscriber Authentication is done GSM. (Dec. 16, 10 Marks)

T,H9D77A5-9-A6A5PE9-Ak35z829-A56zkA-93-zUq9kDU7z4AU8zPE9zU7D5CP8zDU9-8D5A49zU98KA9YCINPU498KA9.ZDx9JKA-A9-Ak35z829
-A56zkA-9D77A5A49N29T,H9P5A9AYREPzUA49P-97DEEDB-x9
1. Access control and authentication

 JKz-9zUkE34A-98KA9P38KAU8zkP8zDU9D79P96PEz493-A597D598KA9,/Hx9JKA93-A59UAA4-98D9AU8A59P9-Ak5A89“/X98D9PkkA--9P9,/Hx9
 JKA9 T,H9 UA8BD5µ9 PE-D9 P38KAU8zkP8A-9 8KA9 -3N-k5zNA5x9 JKz-9 z-9 4DUA9 8K5D3qK9 8KA9 3-A9 D79 P9 kKPEEAUqAj5A-RDU-A9
CAkKPUz-Cx9
2. Confidentiality

 /U9T,H”9kDU7z4AU8zPEz829D793-A594P8P9z-9PkKzA6A49N29AUk52R8zUq98KA94P8P9D6A59Pz59zU8A57PkAx9
 _78A59P38KAU8zkP8zDU9H,9PU49XJ,9PRRE29AUk52R8zDU98D96DzkA”94P8P”9PU49-zqUPEzUq9zU7D5CP8zDUx9
 JKA9kDU7z4AU8zPEz829AYz-8-9NA8BAAU9H,9PU49XJ,9DUE2x9/894DA-9UD89AYz-89AU4j8DjAU4x999999
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-23 GSM

3. Anonymity
 JD9 R5D6z4A9 PUDU2Cz829 8KA9 z4AU8z829 D79 P9 -3N-k5zNA59 z-9 PEBP2-9 Kz44AU9 D6A59 8KA9 Pz59 zU8A57PkAx9 _EE9 4P8P9 z-9 AUk52R8A49
NA7D5A985PU-Cz--zDU9PU493-A59z4AU8z7zA5-9P5A9UD893-A49D6A598KA9Pz5x9
 JD9AU-35A9-3N-k5zNA59z4AU8z829kDU7z4AU8zPEz82”98KA9JACRD5P529HDNzEA9,3N-k5zNA59/4AU8z829FJH,/O9z-93-A4x9a_^9CP29
kKPUqA98Kz-9JH,/9P89PU298zCAx99
 JK5AA9PEqD5z8KC-9P5A93-A498D9R5D6z4A9-Ak35z829-A56zkA-9zU9T,Hx9
o YFGE[YHA]NYv9z-93-A497D59P38KAU8zkP8zDUx9
o YFGE[YHA]NYm9z-93-A497D59AUk52R8zDUx9
o YFGE[YHA]NY)9z-93-A497D59qAUA5P8zDU9D79kzRKA59µA2x9
 VP5EzA59DUE29PEqD5z8KC9_Q9BP-9R3NEzkPEE29P6PzEPNEA”9BKA5A9P-9_Q9PU49_’9BA5A9-Ak5A8x9=DBA6A59_Q9PU49_’9P5A9UD9
EDUqA59-Ak5A898KA29BA5A9R3NEz-KA49DU98KA9/U8A5UA89zU9WLL’x9
 JKA-A9PEqD5z8KC-9P5A9UD896A529-85DUq9KDBA6A59UA8BD5µ9R5D6z4A5-9kPU93-A9-85DUqA59PEqD5z8KC-x9

e
 _EqD5z8KC9_Q9PU49_’9P5A9EDkP8A49DU98KA9,/H9PU49zU98KA9_3;x999

g
 _EqD5z8KC9_Q9z-9zCREACAU8A49zU98KA94A6zkAx99
io led
 =AUkA9PEqD5z8KC9_Q9PU49_’9kPU94z77A59N389PEqD5z8KC9_Q9z-9kDCCDU97D59PEE9-A56zkA9R5D6z4A5-x9
Authentication
ic ow

 XA7D5A9PkkA--zUq9PU29T,H9-A56zkA98KA93-A59C3-89NA9P38KAU8zkP8A4x9
 _38KAU8zkP8zDU9z-9NP-A49DU9,/H98KP89-8D5A-98KA9zU4z6z43PE9ICHAKTHYPIHYETNbKJN\Y[NHAKNC,K[NYjKTHYqYPIHYETNZD.ZNPU498KA9
n
IFGE[YHA]NYvx9
bl kn

 _38KAU8zkP8zDU9R5DkA--93-A-9kKPEEAUqAj5A-RDU-A9CA8KD4x99
at
Pu ch
Te

Fig. 2.1.12 : Authentication in GSM

 ,8AR-9zU6DE6A49zU9P38KAU8zkP8zDU9R5DkA--9P5A9zEE3-85P8A49zU9Szqx9+xWxW+x9
Wx9 JKA9PkkA--9kDU85DE9F_;O9qAUA5P8A-9P9W+’9Nz895PU4DC9U3CNA59^_X'9P-9kKPEEAUqAx9
+x9 a_^9-AU4-98Kz-9W+’jNz895PU4DC9U3CNA59F^_X'O98D98KA9H,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-24 GSM

3. The MS computes the 32-bit signed response (SRES) based on the random number (RAND) with the
authentication algorithm (A3) using the individual subscriber authentication key (Ki).
4. MS sends this SRES to the MSC.
5. Similarly, access control also calculates the signed response called SRES.
6. Now MSC compares the values of signed response received by AC and MS. If the values are same then the
subscriber is accepted, otherwise subscriber is rejected.
Encryption

To ensure privacy, all messages containing user-related information are encrypted in GSM over the air interface.
 Once authentication is done, MS and BSS can initiate encryption.
 Steps involved in Encryption process are described in Fig. 2.1.13.

g e
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 2.1.13 : Data encryption in GSM

 The SIM and access control (AC) generate the 64 bit cipher key Kc by using the authentication key Ki and 128 bit
random number RAND and applying algorithm A8.
 The MS and BTS can now encrypt and decrypt data using algorithm A5 and the cipher key Kc.
 The Kc which is 64 bit is not very strong but just enough to provide protection against simple eavesdropping.
 In certain implementations it so happen that 10 out of 64 bits are always set to 0, so that the real length of the key
now is only 54. Hence the encryption is much weaker.

2.2 General Packet Radio System (GPRS)


(MU - May 12, Dec. 12, Dec. 13, Dec. 14)

Q. How much of the original GSM network does GPRS need? Which elements of the network perform the data transfer?

(May 12, 5 Marks)

Q. Short note on GPRS. (Dec. 12, 5 Marks)


Mobile Communication & Computing (MU-Sem. 7-Comp) 2-25 GSM

Q. Which components are new in GPRS as compared to GSM ? What is their purpose? (Dec. 13, 10 Marks)

Q. What are the modifications require to an existing GSM network to be upgraded to GPRS ? Explain with the help of
diagram. (Dec. 14, 10 Marks)

 TAUA5PE9 “PkµA89 ^P4zD9 ,2-8AC9 FT“^,O9 -8PU4P549 BP-9 4A7zUA49 N29 V35DRAPU9 JAEAkDCC3UzkP8zDU-9 -8PU4P54-9 /U-8z838A9
FVJ,/Ox9
 /89z-9P9CPgD59zCR5D6ACAU89PU49AY8AU-zDU98D98KA9-8PU4P549T,H9-2-8ACx9
 T,H9z-9P9kz5k3z8j-Bz8kKA49UA8BD5µ9BKzkK9z-9z4APE97D598KA94AEz6A529D796DzkA9N389UD89-3z8PNEA97D5985PU-Cz88zUq94P8P98KP89z-9
N35-829PU49P-2CCA85zk9zU9UP835Ax9
 T“^,9 P44A49 RPkµA8j-Bz8kKA49 73Uk8zDUPEz829 8D9 AYz-8zUq9 UA8BD5µ-9 P-9 P9 5A-3E89 8KA9 3-A5-9 D79 8KA9 -2-8AC9 kPU9 NA9 DUEzUA”9
PEEDBzUq98D9CPµA96DzkA9kPEE-9PU49PkkA--9zU8A5UA89DUj8KAjqDx9
 T“^,93-A-93U3-A498zCA9-ED8-9D79T,H9-2-8AC98D985PU-Cz89RPkµA894P8Px9

e
T“^,9kPU9PEEDkP8A9DUA98D9AzqK898zCA9-ED8-9Bz8KzU9P9J'H_975PCAx9

g
_EEDkP8zDU9D798zCA9-ED8-9z-9PU9DU94ACPU49NP-z-9zU-8AP49D797zYA49PU49R5A4A8A5CzUA4x9JKz-9PEEDkP8zDU94ARAU4-9DU9k355AU89
io led
UA8BD5µ9EDP49PU498KA9DRA5P8D59R5A7A5AUkAx9
 'ARAU4zUq93RDU98KA9kD4zUq”98KA985PU-7A595P8A93R98D9r^rWVNbNYH,_,9z-9RD--zNEAx99
 T“^,9DRA5P8D5-9D77A59P9CzUzC3C9D79DUA98zCA9-ED89RA59kAEE98D9AU-35A9P89EAP-89CzUzC3C94P8P95P8Ax9
ic ow

 ;KP5qzUq9zU9T“^,9z-9NP-A49DU98KA96DE3CA9D794P8P9AYkKPUqA49PU49UD89DU98KA9kDUUAk8zDU98zCAx9
 T“^,9PE-D9zUkE34A-9-A6A5PE9-Ak35z829-A56zkA-9-3kK9P-9P38KAU8zkP8zDU”9PkkA--9kDU85DE”9kDU7z4AU8zPEz829D793-A59z4AU8z829PU49
n
3-A594P8Px9
bl kn

 JKA9 P6PzEPNEA9 3-A59 4P8P9 5P8A9 4ARAU4-9 3RDU9 8KA9 kD4zUq9 -kKACA9 PU49 8KA9 U3CNA59 D79 J'H_9 8zCA9 -ED8-9 PEEDkP8A4x99
at

JPNEA9+xWxQ9Ez-8-98KA94P8P95P8A-9P6PzEPNEA9zU9T“^,9z79z893-A49Bz8K9T,Hx9
Pu ch

Table 2.1.3 : GPRS data rates


Te

IEjYTGN,PAK]KN rN,FEHN VN,FEH,N vN,FEH,N 7N,FEH,N mN,FEH,N cN,FEH,N ^N,FEH,N )N,FEH,N

;,jW9 Lx:Q9 W’xW9 +"xWQ9 Q[x+9 VQx+Q9 QVxQ9 [QxQQ9 "+xV9

;,j+9 WQxV9 +[x’9 V:x+9 QQx[9 ["9 ’:xV9 LQx’9 W:"x+9

;,jQ9 WQx[9 QWx+9 V[x’9 [+xV9 "’9 LQx[9 W:Lx+9 W+Vx’9

;,jV9 +WxV9 V+x’9 [Vx+9 ’Qx[9 W:"9 W+’xV9 WVLx’9 W"Wx+9

Key Features of GPRS


rWN YFxIJ,NETFYTKNqKIHC[KNRN,zUkA9T“^,93-A-9RPkµA89-Bz8kKA49UA8BD5µ”9z895ACD6A-98KA94zPEj3R9R5DkA--x9R-A5-9UDB9kPU9NA9
DUEzUA9PEE98KA98zCAx9
VWN YTNCyG[IjKNHENKUY,HYTGN,J,HK],NR9TRA5P8D5-94D9UD89KP6A98D95AREPkA98KAz59AW3zRCAU8j95P8KA5”9T“^,9z-9P44A49DU98DR9D79
8KA9AYz-8zUq9zU75P-853k835Ax9
vWN aEFC]KN NI,KjN PAI[GYTGN R9 /U9 kz5k3z89 -Bz8kKA49 -A56zkA-”9 NzEEzUq9 z-9 NP-A49 DU9 8KA9 435P8zDU9 D79 8KA9 kDUUAk8zDUx9 JKz-9 z-9
3U-3z8PNEA97D59PRREzkP8zDU-9Bz8K9N35-82985P77zkx9JKA93-A59C3-89RP297D598KA9AU8z5A9Pz58zCA”9A6AU97D59z4EA9RA5zD4-9BKAU9UD9
RPkµA8-9 P5A9 -AU8x9 \z8K9 RPkµA89 -Bz8kKA49 -A56zkA-”9 NzEEzUq9 kPU9 NA9 NP-A49 DU9 8KA9 PCD3U89 D79 85PU-Cz88A49 4P8Px9 JKA9
P46PU8PqA97D598KA93-A59z-98KP89KA9D59-KA9kPU9NA9kDUEzUAk9D6A59P9EDUq9RA5zD49D798zCAxN
7WN YTNYTHKG[IFNyI[HNEqNqCHC[KNvBN,J,HK],NR9T“^,9z-98KA9RPkµA894P8P9kD5A9UA8BD5µ97D59QT9-2-8AC-9V'TV9PU49\;'H_x9
9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-26 GSM

2.2.1 Architecture
(MU - May 12, May 13, Dec. 13, Dec. 14, May 15, May 16, Dec. 16)
Q. Draw and explain architecture of GPRS network. (May 12, 5 Marks)
Q. Draw a neat diagram of GPRS system architecture and explain with different types of interfaces. (May 13, 10 Marks)
Q. Which components are new in GPRS as compared to GSM ? What is their purpose ? (Dec. 13, 10 Marks)
Q. What are the modifications required by an existing GSM network to be upgraded to GPRS ? Explain with the help of
diagram. (Dec. 14, May 16, Dec. 16, 10 Marks)
Q. Explain GPRS architecture in detail. Compare it with GSM architecture. (May 15, 10 Marks)

Szqx9 +x+xW9 -KDB-9 -zCREz7zA49 T“^,9 UA8BD5µ9 P5kKz8Ak835Ax9 _-9 -8P8A49 AP5EzA5”9 T“^,9 z-9 PU9 AY8AU-zDU9 8D9 85P4z8zDUPE9 T,H9
-2-8ACx99

g e
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 2.2.1 : GPRS Network architecture

Fig. 2.2.2 : Upgrading GSM to GPRS Diagram


Mobile Communication & Computing (MU-Sem. 7-Comp) 2-27 GSM

JKA97DEEDBzUq9UA8BD5µ9UD4A-9KP6A9NAAU9P44A498D98KA9AYz-8zUq9T,H9UA8BD5µ98D9-3RRD589RPkµA89-Bz8kKA49UA8BD5µx9
1. GPRS Support Nodes (GSNs)
 JKA9CD-89zCRD58PU89UA8BD5µ9UD4A9P44A498D98KA9T,H9UA8BD5µ9z-9T,X9FT“^,9,3RRD589XD4AOx9
 /89z-9P9UA8BD5µ9UD4A9BKzkK9-3RRD58-98KA93-A9D79T“^,9zU98KA9T,H9kD5A9UA8BD5µx9_EE9T,X-9-KD3E49KP6A9P9!"9zU8A57PkA9
PU49-3RRD5898KA9T“^,983UUAEzUq9R5D8DkDE9FTJ“Ox9JKA5A9P5A98BD9µA296P5zPU8-9D798KA9T,X”9UPCAE29-A56zUq9PU49qP8ABP29
T“^,9-3RRD589UD4Ax9
2. Serving GPRS Support Node (SGSN)
 /89z-9-zCzEP598D9H,;9D79T,H9UA8BD5µx9,T,X973Uk8zDU-9P5A9Ez-8A49NAEDBx99
o “A57D5C-94P8P9kDCR5A--zDU9BKzkK9KAER-98D9CzUzCz–A98KA9-z–A9D7985PU-Cz88A494P8P93Uz8-x99
o “A57D5C-9P38KAU8zkP8zDU9D79T“^,9-3N-k5zNA5-9PU49PE-D9CPzU8PzU-9zU7D5CP8zDU9D79PEE98KA9T“^,9-3N-k5zNA5-x99
o ,3kK9zU7D5CP8zDU9kDU8PzU-98KA9k355AU89kAEE”98KA9k355AU89a_^9PU49P9-3N-k5zNA5h-9R5D7zEA9kDU-z-8zUq9/H,/9U3CNA59PU49

e
8KA9P445A--93-A49zU9RPkµA89UA8BD5µx9
o

g
'A8A5CzUA-98KA95D38A9D7985PU-Cz88A49RPkµA8-9PU4985PU-7A598KAC98D9PRR5DR5zP8A9UD4A-x9
o
io led
HPUPqA-9H,9CDNzEz829P-98KA9-3N-k5zNA59CD6A-975DC9DUA9“_HX9P5AP98D9PUD8KA59“_HX”9PU49RD--zNE29DUA9,T,X98D9
PUD8KA59,T,Xx99
o HPzU8PzU-98KA9-8P8z-8zk-9D7985P77zk9kDEEAk8zDU-x99
ic ow

3. Gateway GPRS Support Node (GGSN)


 TT,X9z-98KA9qP8ABP298D9AY8A5UPE9UA8BD5µ-9-3kK9P-9“'X9F“PkµA89'P8P9XA8BD5µO9D59/“9UA8BD5µx9/89z-9-zCzEP598D9TH,;9D79
n
bl kn

T,H9UA8BD5µx99
 /894DA-98BD9CPzU973Uk8zDU-x9
at

o
Pu ch

^D38A-9RPkµA89kDCzUq975DC9AY8A5UPE9/“9UA8BD5µ-98D98KA95AEA6PU89,T,X9Bz8KzU98KA9T“^,9UA8BD5µx99=A5A9z89kDU6A58-9
zUkDCzUq9RPkµA898D98KA9T,H97D5CP89PU49-AU4-98KA9R5DkA--A49RPkµA898D9,T,Xx9
o ^D38A-9 RPkµA8-9 D5zqzUP8A49 75DC9 P9 T“^,9 3-A59 8D9 8KA9 5A-RAk8z6A9 AY8A5UPE9 /“9 UA8BD5µx9 =A5A9 z89 RA57D5C-9 8KA9
Te

kDU6A5-zDU9D798KA9T“^,9RPkµA898D98KA9PRR5DR5zP8A97D5CP89D798KA9“PkµA894P8P9R5D8DkDE9F“'“O94ARAU4zUq93RDU98KA9
4A-8zUP8zDU9UA8BD5µx9
4. Packet Control Unit (PCU)
 “;R9z-98KA9kD5A93Uz898D9-Aq5AqP8A9NA8BAAU9T,H9PU49T“^,985P77zkx99
 /89 -ARP5P8A-9 8KA9 kz5k3z89 -Bz8kKA49 PU49 RPkµA89 -Bz8kKA49 85P77zk9 75DC9 8KA9 3-A59 PU49 -AU4-9 8KAC9 8D9 8KA9 T,H9 PU49 T“^,9
UA8BD5µ-95A-RAk8z6AE2x99
 /U9T“^,”9“;R9KP-97DEEDBzUq98BD9RP8K-x99
FzO9 “;RjH,;jTH,;j“,JX99
FzzO9 “;Rj,T,XjTT,Xj/U8A5UA89FRPkµA894P8P9UA8BD5µO9N
5. Border Gateway (BG)
 /89Pk8-9P-9PU9zU8A57PkA9NA8BAAU94z77A5AU89DRA5P8D5-9D79T“^,9UA8BD5µ-x99
 JKA9kDUUAk8zDU9NA8BAAU98BD9ND54A59qP8ABP2-9z-9kPEEA49T“^,983UUAEx99
 /89z-9CD5A9-Ak35A98D985PU-7A594P8P9NA8BAAU98BD9DRA5P8D5-93-zUq98KAz59DBU9“_HX9UA8BD5µ-98K5D3qK9P94z5Ak89kDUUAk8zDU9
5P8KA598KPU96zP98KA9R3NEzk9/U8A5UA89BKzkK9z-9EA--9-Ak35Ax9
 SD598Kz-9ND8K9DRA5P8D5-9UAA498D9Pq5AA98D9R5D6z4A9-3kK9kDUUAk8z6z829PU498A5C-9PU49kDU4z8zDU-9zUkE34zUq9kKP5qzUq98A5C-x99
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-28 GSM

6. Charging Gateway (CG)


 ;KP5qzUq9qP8ABP29z-95A-RDU-zNEA97D59PkkD3U8zUq9PU49NzEEzUq97D598KA93-A9D798KA9UA8BD5µx9
 ;KP5qzUq9z-94DUA9NP-A49DU9l3PEz829D79,A56zkA9D59REPU93-A59KP-9DR8A4x9
 JKz-9 kKP5qzUq9 4P8P9 qAUA5P8A49 N29 PEE9 8KA9 ,T,X-9 PU49 TT,X-9 zU9 8KA9 UA8BD5µ9 z-9 5A7A55A49 8D9 P-9 ;KP5qzUq9 'P8P9 ^AkD54-9
F;'^-Ox99
 JKA9;KP5qzUq9TP8ABP29F;TO9kDEEAk8-9PEE9D798KA-A9;'^-”9R5DkA--A-98KA9-PCA9PU49RP--A-9z89DU98D98KA9XzEEzUq9,2-8ACx99
7. DNS server
/89kDU6A58-94DCPzU9UPCA98D9/“9P445A--A-95AW3z5A498D9A-8PNEz-K9zU8A5UA89kDUUAk8zDU9PU498D94AEz6A59BAN9RPqA-9DU93-A5b-9
8A5CzUPE9-k5AAUx99
8. PLMN
N OY/N ZTH[INURDQN

e
99_U9/“9NP-A49UA8BD5µ9zU8A5jkDUUAk8zUq9PEE98KA9PND6A9CAU8zDUA49T“^,9UA8BD5µ9AEACAU8-9zU9DUA9“_HX9P5APx99

g
N OYY/N ZTHK[NURDQN io led
9/U8A59“_HX9z-9P9kDUUAk8zDU9NA8BAAU98BD94z77A5AU89“_HX9P5AP-x9
9. HLR Register
=_^9 -8D5A-9 zU7D5CP8zDU9 PU49 8KA9 3-A59 R5D7zEA9 D79 PEE9 T“^,9 -3N-k5zNA5-x9 JKA9 4P8P9 zUkE34A-9 8KA9 k355AU89 ,T,X9 PU49 “'“9
ic ow

P445A--A-x9JKA-A94P8P9P5A93R4P8A49APkK98zCA9P93-A595Aqz-8A5-9Bz8K9P9UAB9,T,Xx9
10. SMS-GMSC and SMS-IWMSC
n

bl kn

JKA9T“^,9-2-8AC9PEEDB-9,H,9CA--PqA-98D9NA9-AU89P-9BAEEx9SD598KP894P8P9AYkKPUqA9NA8BAAU9,H,jTH,;9PU499
 ,H,j/\H,;9NEDkµ-9PU498KA9PRR5DR5zP8A9,T,X98PµA-9REPkAx9
at

11. GPRS Interfaces


Pu ch

'z77A5AU89zU8A57PkA-9KP6A9NAAU94A7zUA49NA8BAAU94z77A5AU89UA8BD5µ9kDCRDUAU8-9D798KA9T“^,x9,DCA9UAB9zU8A57PkA-98D9
Te

T,H9KP6A9NAAU9P44A49zU9T“^,98D9-3RRD589RPkµA89-Bz8kKA494P8P9CPzUE29NA8BAAU9TT,X-”9,T,X-9PU49D8KA59UA8BD5µ9
kDCRDUAU8-x9JKA97DEEDBzUq9zU8A57PkA-9KP6A9NAAU94A7zUA4x9
OY/N X]NYTHK[qIPKNRN9XA8BAAU9H,9PU49XJ,98KA5A9z-9PU9X]9zU8A57PkA9BKzkK9z-96A529-zCzEP598D9T,H9PU494A7zUA-98KA9CD43EP8zDU9
82RA”9A55D59kD55Ak8zDUZ4A8Ak8zDU98AkKUzW3A”9RDBA59kDU85DE9zU7D5CP8zDU9A8kx99
OYY/N YN YTHK[qIPKN R9 XJ,9 PU49 X,;9 kDCC3UzkP8A-9 6zP9 _9 zU8A57PkA9 PU49 4A7zUA-9 8KA9 kKPUUAE9 PEEDkP8zDU”9 RDBA59 CAP-35ACAU89
zU7D5CP8zDU9A8kx99
OYYY/N BNNYTHK[qIPKNR9/89kDUUAk8-9X,;-98D9,T,Xx99
OYO/N BTN YTHK[qIPKN RN TU9 zU8A57PkA9 AYz-8N NA8BAAU9 T,X-9 D79 -PCA9 “_HXx9 /89 z-9 3-A49 8D9 AYkKPUqA9 3-A59 R5D7zEA9 BKAU9 8KA9 3-A59
CD6A-975DC9DUA9,T,X98D9PUD8KA5x99
OO/N ByNYTHK[qIPKNRNJBD9T,X-9D794z77A5AU89“_HX9kDCC3UzkP8A96zP9TR9zU8A57PkAWN/8Nz-93-A497D59AYkKPUqzUq98KA93-A59R5D7zEA9
PU49D8KA59-zqUPEzUq9zU7D5CP8zDU9NA8BAAU9P9,T,X9PU49TT,X9D79PUD8KA59P5APx99
OOY/N BqNYTHK[qIPKNRN/89z-93-A49NA8BAAU9,T,X9PU49V/^x9/89z-93-A498D9W3A5298KA9/HV/9zU7D5CP8zDU9z79PU9H,985zA-98D95Aqz-8A59Bz8K9
8KA9UA8BD5µx99
OOYY/N B[NYTHK[qIPKNRN9,T,X9PU49=_^9kDCC3UzkP8A96zP9B[9zU8A57PkAx9/89z-93-A498D9qA898KA93-A59R5D7zEA”98KA9k355AU89,T,X9P445A--9
PU498KA9“'“9P445A--FA-O97D59APkK93-A59zU9“_HXx99
OOYYY/NBPNYTHK[qIPKNR9XA8BAAU9TT,X9PU49=_^98KA5A9z-9BP9zU8A57PkAx9/89z-93-A49N29TT,X98D9W3A5293-A5b-9EDkP8zDU9PU49R5D7zEA98D9
3R4P8A9z8-9EDkP8zDU95Aqz-8A5x99
OYU/N BYNYTHK[qIPK9R9;DUUAk8-9TT,X98D9AY8A5UPE9“'Xx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-29 GSM

(x) Gs interface : Between SGSN and MSC/VLR is used to perform paging request of circuit switched GSM call for
combined attachment procedure.
(xi) Gd interface : Between SMS-Gateway (SMS-GMSC) and SGSN is used to exchange short message service (SMS)
messages.
(xii) GPRS Tunneling protocol (GTP) : All GSNs forming a GPRS backbone network are connected over IP. Within this
backbone the GSNs encapsulate and transmit PDN packets by using GPRS Tunneling Protocol (GTP).

2.2.2 GPRS Protocol Stack

g e
io led
ic ow
n
bl kn

Fig. 2.2.3 : GPRS protocol architecture

The following various protocols are involved in GPRS :


at
Pu ch

1. GPRS tunneling protocol (GTP)


It is responsible for all the data transfer between GSNs.
Te

2. TCP/UDP
 Depending on the requirement, GTP can use either TCP or UDP as the transport layer protocol.
 UDP is used in case non-reliable data transfer is required (IP packet transfer).
 TCP is used in case reliable data transfer is required (X.25 packet transfer).
3. Subnetwork dependent convergence protocol (SNDCP)
 It is used between the SGSN and the MS to adapt to the characteristics of the underlying networks.
 User data packet is tunneled between the MS and the GGSN on top of SNDCP and GTP.
4. Logical link control
 It is used to provide reliable data transfer between the MS and the SGSN.
 It comprises ARQ and FEC mechanism for PTP (Point-To-Point) services.
5. Base station subsystem GPRS protocol (BSSGP)
 This protocol is used to convey routing and QoS-related information between the BSS and SGSN.
 It works on the top of a frame relay (FR).
6. Radio link protocol (RLC)
It is responsible for providing a reliable link between the MS and the BSS.
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-30 GSM

7. Medium access control (MAC)


 It is responsible for controlling the medium access and the signaling procedure for the radio channel.
 Performs mapping of the LLC frames onto the GSM physical channels.

2.2.3 Comparison of GPRS Architecture with GSM Architecture


 The existing GSM nodes are upgraded with GPRS functionality.
 The GSM network only provides circuit switched services and thus two new network nodes GSN (GPRS Support Nodes)
nodes were defined to support packet switched services. They are GGSN and SGSN.
 GPRS uses GSM’s BSS but with enhanced functionality to support GPRS. The GSMs BSS now is used for both circuit
switched and packet switched network elements to ensure backward compatibility.
 Additional PCU (Packet control Unit) unit has been added to BSC to segregate voice and data packets.
 Circuit switched data are sent to A interface on the MSC and packet switched data are sent to the SGSN into the GPRS
backbone.

e
 The BSC of GSM is given new functionality for mobility management for handling GPRS paging. The new traffic and

g
signaling interface form the SGSN is now terminated in the BSC.
io led
 GPRS uses the MSC/VLR interface provided by GSM, between the MSC and SGSN coordinated signaling for mobile
stations which have both circuit switched and packet switched capabilities.

ic ow

The HLR of GSM is modified to contain GPRS subscription data and routing information and is accessible from the
SGSN. It also maps each subscriber to one or more GGSNs. The HLR may be in a different PLMN than the current SGSN
n
for roaming terminals
bl kn

Advantages of GPRS
 Very flexible.
at
Pu ch

 Suitable for bursty Internet traffic and fully packet oriented.


 Better quality of data services measured in terms of reliability, response time.
Te

 No connection is required to be set up prior to data transfer.


 All GPRS services can be used in parallel to the conventional GSM services.
 Users of GPRS benefit from shorter access times and higher data rates.
 GPRS packet transmission offers a more user friendly billing than that offered by circuit switched services.
Disadvantages of GPRS
 The real available data rate depends on the current load of the cell as GPRS only uses idle time slots.
 Additional network elements are required to implement GPRS.
 GPRS exhibits a large jitter as compared to fixed networks.
Application of GPRS
1. Communications : E-mail, fax, unified messaging and intranet/Internet access etc.
2. Value-added services : Information services and games etc.
3. E-commerce : Retail, ticket purchasing, banking and financial trading etc.
4. Location-based applications : Navigation, traffic conditions, airline/rail schedules and location finder etc.
5. Vertical applications : Freight delivery, fleet management and sales-force automation.
6. Advertising : Advertising may be location sensitive. For example, a user entering a mall can receive advertisements
specific to the stores in that mall.
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-31 GSM

^WN .D.NRN/89z-9PE-D9RD--zNEA98D9-AU49,H,9CA--PqA-9D6A59T“^,x99
)WN .CyyFK]KTHI[JN ,K[OYPK,N R9 T“^,9 PE-D9 D77A5-9 -3RREACAU8P529 -A56zkA-”9 -3kK9 P-9 kPEE9 7D5BP54zUq9 PU49 kED-A49 3-A59 q5D3R9
F;RTOx9

2.3 UMTS Terrestrial Radio Active Network (UTRAN)


2.3.1 UMTS (Universal Mobile Telecommunication System) Core Network
 RUz6A5-PE9HDNzEA9JAEAkDCC3UzkP8zDU9,2-8AC9FRHJ,O9z-98KA9V35DRAPU9R5DRD-PE97D59/HJj+:::9R5ARP5A49N29VJ,/x99
 JKA9RHJ,9-RAkz7zkPEE294A7zUA-9UAB95P4zD9zU8A57PkA9kPEEA49RHJ,9JA55A-85zPE9^P4zD9/U8A57PkA9FRJ^_Ox9
 JBD95P4zD9zU8A57PkA-9KP6A9NAAU94A7zUA4]9RJ^_jS''9PU49RJ^_jJ''x9
 RHJ,94DA-9UD894A7zUA9P9kDCREA8A9UAB9QT9-2-8AC95P8KA59z89-RAkz7zA-9P9-CDD8K985PU-z8zDU975DC9-AkDU49qAUA5P8zDU9T,H9
D59J'H_9-2-8AC-98D98KA98Kz549qAUA5P8zDUx99
 HPU29-DE38zDU-9KP6A9NAAU9R5DRD-A497D59QT9UA8BD5µ-x99

e
 TUA9 zUz8zPE9 AUKPUkACAU89 D79 T,H9 8DBP54-9 RHJ,9 BP-9 VUKPUkA49 'P8P9 5P8A-9 7D59 TEDNPE9 V6DE38zDU9 FV'TVO9 BKzkK9 3-A-9

g
AUKPUkA49CD43EP8zDU98AkKUzW3A-x9
io led
UMTS services
RHJ,9-KD3E49R5D6z4A97DEEDBzUq9-A56zkA-9P-9P9QT9UA8BD5µ9]9
ic ow

Wx9 “5D6z4A96P5zD3-9NAP5A59-A56zkA-x9
+x9 ,3RRD5895APEj8zCA9PU49UDU95APEj8zCA9-A56zkA-x9
n
Qx9 ,3RRD589;z5k3z89-Bz8kKA49PU49RPkµA89-Bz8kKA4985PU-Cz--zDUx9
bl kn

Vx9 =PU4D6A59-KD3E49RD--zNEA9NA8BAAU9RHJ,9kAEE-”9N389PE-D9NA8BAAU9D8KA59UDUjRHJ,9-2-8AC-9-3kK9P-9T,H9D59-P8AEEz8A9
at

UA8BD5µ-x9
Pu ch

Qx9 JKA9-2-8AC9-KD3E49NA9kDCRP8zNEA9Bz8K9T,H”9_JH”9/“9PU49/,'XjNP-A49UA8BD5µ-x9
[x9 ,KD3E49R5D6z4A96P5zPNEA94P8P95P8A-97D593REzUµ9PU494DBU9EzUµx9
Te

2.3.2 UMTS System Architecture


(MU - May 12, May 15)

Q. Write a short note on UMTS architecture and its domain. (May 12, 5 Marks)
Q. Explain UMTS architecture. (May 15, 5 Marks)

 Szqx9+xQxW9-KDB-98KA9-zCREz7zA49RHJ,95A7A5AUkA9P5kKz8Ak835Ax9

Fig. 2.3.1 : Main components of the UMTS reference architecture


Mobile Communication & Computing (MU-Sem. 7-Comp) 2-32 GSM

JK5AA9CPzU9kDCRDUAU8-9D79RHJ,9P5A9]9
Wx9 JKA9RJ^_9UA8BD5µ9FRJ^_XO99
+x9 ;D5A9XA8BD5µ9F;XO9
Qx9 R-A59VW3zRCAU89FRVO9
9
1. UTRAN
 JKA9 RHJ,9 JA55A-85zPE9 UA8BD5µ9 FRJ^_XO9 KPU4EA-9 8KA9 kAEE9 EA6AE9 CDNzEz829 PU49 kDCR5z-A-9 -A6A5PE9 5P4zD9 UA8BD5µ9
-3N-2-8AC-9F^X,Ox9
 ^X,9kDU-z-8-9D798BD9CPzU9kDCRDUAU8-]9^X;F^P4zD9XA8BD5µ9;DU85DEEA5O9PU49XD4A9Xx9
 XD4A9X9z-9-zCzEP598D98KA9NP-A9-8P8zDU9zU9T,H9-2-8AC”9BKzkK9RA57D5C-9RK2-zkPE9EP2A59R5DkA--zUq9-3kK9P-9kKPUUAE9kD4zUq”9
CD43EP8zDU”94P8P9zU8A5EAP6zUq9A8kx9

e
^X;9 kDU85DE-9 DUA9 D59 CD5A9 XD4A9 X-x9 /89 CPUPqA-9 5P4zD9 5A-D35kA-9 P--zqUA49 8D9 8KACx9 JK3-9 z89 RA57D5C-9 4P8P9 EzUµ9 EP2A59
R5DkA--zUq9PU49PE-D9RP58zkzRP8A-9zU9KPU4D6A59R5DkA--x99

g
 ^X;9z-9kDUUAk8A498D9H,;9PU49,T,X98D95D38A9kz5k3z89-Bz8kKA49PU49RPkµA89-Bz8kKA494P8Px99
io led
 /U9qAUA5PE98KA973Uk8zDU-9D79^X,9zUkE34A-9]9
o ^P4zD9kKPUUAE9kzRKA5zUq9PU494AkzRKA5zUq9
ic ow

o =PU4D6A59kDU85DE9
o ^P4zD95A-D35kA9CPUPqACAU89
n
o _4Cz--zDU9kDU85DE99
bl kn

o ;DUqA-8zDU9kDU85DE9
o
at

,2-8AC9zU7D5CP8zDU9N5DP4kP-8zUq9
Pu ch

o ^P4zD9UA8BD5µ9kDU7zq35P8zDU9A8kx9

Te

RJ^_X9 z-9 kDUUAk8A49 8D9 R-A5-9 VW3zRCAU89 6zP9 8KA9 5P4zD9 zU8A57PkA9 R3x9 R39 zU8A57PkA9 z-9 kDCRP5PNEA9 8D9 RC9 zU8A57PkA9 zU9
T,Hx9
 RJ^_X9kDCC3UzkP8A-9Bz8K98KA9;D5A9XA8BD5µ9F;XO96zP9/39zU8A57PkA9BKzkK9z-9-zCzEP598D98KA9_9zU8A57PkA9zU9T,Hx9
(i) Core Network (CN)
 ;D5A9UA8BD5µ9z-9-KP5A49Bz8K9T,H9PU49T“^,x9
 /89kDU8PzU-9kDCRDUAU8-9-3kK9P-9=_^”9a_^”9H,;9”9TH,;9”9,T,X9PU49TT,Xx9
 ;D5A9 UA8BD5µ9 kDU8PzU-9 73Uk8zDU-9 7D59 zU8A5j-2-8AC9 KPU4D6A5”9 qP8ABP2-9 8D9 D8KA59 UA8BD5µ-”9 PU49 RA57D5C-9 EDkP8zDU9
CPUPqACAU8x99
(ii) User Equipment (UE)
 JKA9 3-A59 AW3zRCAU89 FRVO9 kDU8PzU-9 8BD9 kDCRDUAU8-]9 HDNzEA9 AW3zRCAU89 FHVO9 PU49 RHJ,9 -3N-k5zNA59 /4AU8z829 HD43EA9
FR,/HOx99
 HV9z-98KA95P4zD98A5CzUPE9kDUUAk8zUq98D98KA95P4zD9zU8A57PkA93-zUq9R39zU8A57PkAx999
 R,/H9z-9P9-CP589kP549-zCzEP598D9,/H9zU9T,H9-2-8AC98KP89kDU8PzU-98KA9-3N-k5zNA59z4AU8z82”9P38KAU8zkP8zDU9PEqD5z8KC-”9
AUk52R8zDU9µA2-9A8kx9
 RHJ,97358KA59-3N4z6z4A-98KA9PND6A9P5kKz8Ak835A9zU8D98BD94DCPzU-9P-9-KDBU9zU9Szqx9+xQx+x!
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-33 GSM

Fig. 2.3.2 : UMTS domain and interfaces

The user equipment domain


 JKA93-A59AW3zRCAU894DCPzU9z-9P--zqUA498D9P9-zUqEA93-A59PU49kDCR5z-A-9PEE98KA9kDCRDUAU8-9UAA4A498D9PkkA--9RHJ,9
-A56zkA-x9

e
 JKA9AU494A6zkA9z8-AE79z-9zU9P9CDNzEA9AW3zRCAU894DCPzUx9_EE973Uk8zDU-97D595P4zD985PU-Cz--zDU9P-9BAEE9P-93-A59zU8A57PkA-9

g
P5A9EDkP8A49KA5Ax9
io led
 JKz-94DCPzU9z-97358KA594z6z4A49zU8D98BD9-3N94DCPzU-]9JKA9X.ZDNjE]IYT9PU49]ENYFKNKbCYy]KTHNjE]IYTx9
 JKA9R,/H94DCPzU9kDU8PzU-98KA9,/H97D59RHJ,9PU49-8D5A-9PEE98KA9UAkA--P5293-A595AEP8A494P8Px9/89PE-D9RA57D5C-973Uk8zDU-9
ic ow

7D59AUk52R8zDU9PU49P38KAU8zkP8zDU9D793-A5-x9
The infrastructure domain
n
 JKA9zU75P-853k835A94DCPzU9z-9-KP5A49PCDUq9PEE98KA93-A5-x9
bl kn

 /89D77A5-9RHJ,9-A56zkA-98D9PEE98KA9-3N-k5zNA493-A5-x9

at

/89z-97358KA594z6z4A49zU8D98BD9-3N94DCPzU-x9JKA9IPPK,,NTKHxE[b,NjE]IYTNPU498KA9PE[KNTKHxE[bNjE]IYTWN
Pu ch

 _kkA--9UA8BD5µ94DCPzU9kDU8PzU-98KA95P4zD9PkkA--9UA8BD5µ-9F^_XO9PU49R5D6z4A-95P4zD9PkkA--98D98KA9RHJ,93-A5-x9
 ;D5A9UA8BD5µ94DCPzU9kDU8PzU-973Uk8zDU-98KP89P5A9zU4ARAU4AU89D79PkkA--9UA8BD5µx99
Te

 JKA9kD5A9UA8BD5µ94DCPzU9kPU9NA9-ARP5P8A49zU8D98K5AA94DCPzU-9Bz8K9-RAkz7zk98P-µ-x9
o JKA9-A56zUq9UA8BD5µ94DCPzU9
o JKA9KDCA9UA8BD5µ94DCPzU9
o JKA985PU-z89UA8BD5µ94DCPzU9
 JKA9,K[OYTGNTKHxE[b9jE]IYT9kDCR5z-A-9PEE973Uk8zDU-9k355AU8E293-A49N29P93-A597D59PkkA--zUq9RHJ,9-A56zkA-x9
 JKA9gE]KNTKHxE[bNjE]IYT9kDU8PzU-9PEE973Uk8zDU-95AEP8A498D98KA9KDCA9UA8BD5µ9D79P93-A597D59AYPCREA”93-A594P8P9EDDµj
3R”93-A59R5D7zEAx9
 /798KA9-A56zUq9UA8BD5µ9kPUUD894z5Ak8E29kDU8Pk898KA9KDCA9UA8BD5µ98KAU9H[IT,YHNTKHxE[bNjE]IYT9CP29NA93-A4x9
UMTS radio interface
 JKA9RHJ,94A7zUA-9P9UAB95P4zD9zU8A57PkA9#$%NA8BAAU98KA93-A59AW3zRCAU89PU498KA9RJ^_9UA8BD5µx9
 JKA9RHJ,93-A-94z5Ak89-AW3AUkA9F',O9;'H_98AkKUDEDq2x9
 /U9',j;'H_9APkK93-A59z-9-ARP5P8A493-zUq9P9-RAkzPE9kD4A9kPEEA49kKzRRzUq9-AW3AUkAx999
 /89C3E8zREzA-9P9-85APC9D79Nz8-9Bz8K9P9kKzRRzUq9-AW3AUkA98D9-R5AP4-98KA9-zqUPEx9
 JD9-ARP5P8A94z77A5AU893-A5-98KA9kD4A-98KA9kD4A-98KP89P5A93-A497D59-R5AP4zUq9-KD3E49NA9D58KDqDUPEx9
 _EE9-zqUPE-93-A98KA9-PCA975AW3AUk29NPU4x9RHJ,93-A-98KA9kDU-8PU89kKzRRzUq95P8A9D79Qx’V9HkKzR-Z-x99
 'z77A5AU894P8P95P8A-9kPU9NA9PkKzA6A49N293-zUq94z77A5AU89-R5AP4zUq97Pk8D5-x9,R5AP4zUq97Pk8D59z-94A7zUA49P-98KA9U3CNA59D79
kKzR-9RA59Nz8x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-34 GSM

 Szqx9+xQxQ9-KDB-9NP-zk9z4AP9D79-R5AP4zUq9PU49-ARP5P8zDU9D793-A594P8P93-zUq9D58KDqDUPE9-R5AP4zUq9kD4A-x9
 JKA97z5-89-8AR9z-9-R5AP4zUq98KA93-A594P8P93-zUq9D58KDqDUPE9-R5AP4zUq9kD4A-x9

g e
Fig. 2.3.3 : Spreading and scrambling of user data
io led
 RHJ,93-A-9D58KDqDUPE96P5zPNEA9-R5AP4zUq97Pk8D59FTa,SO9kD4A-x9
Working of OVSF
ic ow

 T58KDqDUPE9kD4A-9P5A9qAUA5P8A49N294D3NEzUq9P9kKzRRzUq9-AW3AUkA9c9Bz8K9PU49Bz8KD3897EzRRzUq98KA9-zqU9D798KA9kKzRx99

n
SD59 AYPCREA9 z79 P9 kKzRRzUq9 -AW3AUkA9 z-9 c9 8KA9 UAY89 -A89 D79 D58KDqDUPE9 kD4A-9 BD3E49 NA9 Fc”cO9 PU49 Fc”jcO9 P-9 -KDBU9 zU99
bl kn

Szqx9+xQxV9FPOx9
at
Pu ch
Te

Fig. 2.3.4 (a) : Generation of orthogonal codes

Fig. 2.3.4 (b) : Generation of orthogonal codes

 XDB9 kKzRRzUq9 -AW3AUkA9 cc9 z-9 4D3NEA49 Bz8KD389 7EzRRzUq9 8KA9 -zqU-9 PU49 Bz8K9 7EzRRzUq9 8KA9 -zqU-x9 \A9 qA89 8BD9 CD5A9 -A8-9
Fc”c”c”cO9PU49Fc”c”jc”jcO9FSzqx9+xQxV9FNOOx!
 JKA9BKDEA9R5DkA--9D79qAUA5P8zUq9Ta,S9kD4A-9z-9-KDBU9zU9Szqx9+xQxQ9P--3CzUq98KA9-8P58zUq9kKzRRzUq9-AW3AUkA9P-9Wx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-35 GSM

g e
Fig. 2.3.5 : OVSF code tree used for orthogonal spreading

io led
'D3NEzUq98KA9kKzRRzUq9-AW3AUkA9PE-D95A-3E8-9zU9-R5AP4zUq98KA9Nz898BzkA9P-9C3kK9P-9NA7D5Ax9JKA9-R5AP4zUq97Pk8D59,SmU9
NAkDCA-9,Sm+Ux9
 JBD9kD4A-9P5A9D58KDqDUPE9P-9EDUq9P-9DUA9kD4A9z-9UD898KA9RP589D79PUD8KA59kD4Ax9JK3-9D58KDqDUPEz829kPU9NA9q3P5PU8AA49z79
ic ow

DUA9kD4A9z-9UD89qAUA5P8A4975DC98KA9D8KA59kD4Ax9
 JK3-9z79P9-AU4A593-A-98KA9kD4A9FW”nWO9Bz8K9-R5AP4zUq97Pk8D59P-9+”9z89z-9UD89PEEDBA498D93-A9PU29D798KA9kD4A-9EDkP8A499zU98KA9
n
-3N985AA9qAUA5P8A49D389D79FW”nWOx9
bl kn

Supporting different data rates



at

RHJ,93-A-9kDU-8PU89kKzRRzUq95P8A9D79Qx’VHkKzRZ-x9
Pu ch

 'z77A5AU894P8P95P8A-9P5A9PkKzA6A49N296P52zUq9-R5AP4zUq97Pk8D5x99
 /798KA9kKzRRzUq95P8A9z-9kDU-8PU89PU49z79BA94D3NEA98KA9-R5AP4zUq97Pk8D598Kz-9BzEE95A-3E89zU9-R5AP4zUq98KA9Nz898BzkA9P-9C3kK9
Te

P-9NA7D5Ax9JK3-”9z894z6z4A-98KA94P8P95P8A9N298BDx9!
 JK3-”9N293-zUq94z77A5AU89-R5AP4zUq97Pk8D5-9BA9kPU9PkKzA6A94z77A5AU894P8P95P8A-x!
Spreading and scrambling of user data
 _-9 -KDBU9 zU9 Szqx9 +xQxQ9 APkK9 3-A59 -R5AP4-9 z8-9 4P8P9 -85APC9 3-zUq9 Ta,S9 kD4Ax9 _78A59 -R5AP4zUq”9 PEE9 kKzR9 -85APC-9 P5A9
-3CCA493R9PU49-k5PCNEA4x9,k5PCNEzUq9z-9UD8KzUq9N389cT^zUq9kKzR-9NP-A49DU9P9kD4Ax9
 /U98KA9S''9CD4A”98KA9-k5PCNEzUq9kD4A9z-93UzW3A97D59APkK9-AU4A5x9JK3-”9KA5A9-k5PCNEzUq9kD4A9z-93-A498D9-ARP5P8A-9PEE9
-AU4A5-9zU9P9kAEEx9
 _78A59-k5PCNEzUq98KA9-zqUPE-9D794z77A5AU89-AU4A5-9P5A9W3P–zjD58KDqDUPE-x9
 SD59J''98KA9-k5PCNEzUq9kD4A9z-9kAEE9-RAkz7zk9zxAx9PEE98KA9-8P8zDU-9zU9P9kAEE93-A98KA9-PCA9-k5PCNEzUq9kD4Ax9
 JKA9-k5PCNEA49kKzR-9P5A98KAU9CD43EP8A493-zUq9l“,U9PU498KAU985PU-Cz88A4x!

2.3.2(a) UTRA – FDD (W-CDMA)


MU - May 13, May 15)

Q. Explain UTRA FDD in detail. (May 13, May 15, 5 Marks)

 JKA9S''9CD4A97D59RJ^_93-A-9Bz4ANPU49;'H_9F\j;'H_O9Bz8K94z5Ak89-AW3AUkA9-R5AP4zUqx9
 /U9S''”93REzUµ9PU494DBUEzUµ93-A-94z77A5AU8975AW3AUkzA-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-36 GSM

Features of W-CDMA
 1920-1980 MHz uplink
 2110-2170 MHz downlink
 Uses constant chipping rate of 3.840 Mchip/s
 Provides soft handover
 Uses QPSK for modulation
 Requires complex power control (1500 power control cycles/s)
 Spreading : Up Link : 4-256;Down Link:4-512
UTRA-FDD Frame structure
 Fig. 2.3.6 shows UTRA-FDD frame structure.
 A radio frame contains 15 time slots. The duration of each frame is 10 msec.

e
 A radio frame consists of 38,400 chips.

g
 Each time slot is of 666.6 µs and consists of 2,560 chips.
io led
 Each W-CDMA channel occupies 4.4 to 5 MHz bandwidth.
 Time slots in W-CDMA are not used for user separation but to support periodic functions. In contrast to GSM where
time slots are used to separate users.
ic ow
n
bl kn
at
Pu ch
Te

FBI : Feedback Information


TPC : Transmit Power Control
TFCI : Transport Format Combination Indicator
DPCCH : Dedicated Physical Control Channel
DPDCH : Dedicated Physical Data Channel
DPCH : Dedicated Physical Channel

Fig. 2.3.6 : UTRA –FDD (W-CDMA) frame structure

Similar to GSM, UMTS also defines many logical and physical channels and their mapping.
Physical Channels in UMTS
 UMTS supports three physical channels which are used for data transport.
o Dedicated Physical Data Channel (DPDCH)
o Dedicated Physical Control Channel (DPCCH)
o Dedicated Physical Channel (DPCH)
 And additionally a Random Access Channel (RACH) to control the media access in uplink.
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-37 GSM

1. Dedicated Physical Data Channel (DPDCH)


 JKz-9kKPUUAE9z-93-A497D5985PU-7A55zUq93-A594P8P9PU49-zqUPEzUq94P8Px9
 JKA9-R5AP4zUq97Pk8D59D798Kz-9kKPUUAE9kPU96P529NA8BAAU9V9PU49+Q[x9JKz-94z5Ak8E29-3RRD58-94z77A5AU894P8P95P8A-x9
 JPNEA9+xQxW94A-k5zNA-94z77A5AU89-R5AP4zUq97Pk8D5-9PU49kD55A-RDU4zUq94P8P95P8A9-3RRD58A49N29'“';=x9
Table 2.3.1 : Spreading and corresponding data rates supported by DPDCH

.y[KIjYTGNqIPHE[N FIHIN[IHKNObNYH,_,/N
V9 L[:9
’9 V’:9
W[9 +V:9
Q+9 W+:9

e
[V9 [:9

g
io led W+’9 Q:9
+Q[9 WQ9

 JK3-”9CPYzC3C94P8P95P8A9-3RRD58A49z-9L[:9µNz8Z-9Bz8K9-R5AP4zUq97Pk8D59Vx9
ic ow

 JKA9 R5DNEAC9 D79 3-zUq9 T,aS9 z-9 8KP89 DUE29 kA58PzU9 C3E8zREzA-9 D79 8KA9 NP-zk9 4P8P9 5P8A9 FzxAx9 WQ9 µNz8Z-O9 kPU9 NA9 3-A4x99
SD59 AYPCREA”9 +Q:9 µNz8Z-9 4P8P9 5P8A9 z-9 5AW3z5A49 8KAU9 8KA9 4A6zkA9 KP-9 8D9 kKDD-A9 V’:9 µNz8Z-”9 BKzkK9 BP-8A-9 8KA9
n
NPU4Bz48Kx9
bl kn

 /U9 APkK9 kDUUAk8zDU9 zU9 EP2A5W”9 z89 kPU9 KP6A9 NA8BAAU9 –A5D9 PU49 -zY9 '“';=-x9 JKz-9 5A-3E8-9 zU9 P9 8KAD5A8zkPE9 CPYzC3C9
4P8P95P8A9D79Q”"V:9µNz8Z-9FL[:99[9m9Q”"V:Ox9
at
Pu ch

 JPNEA9+xQx+9-KDB-982RzkPE93-A594P8P95P8A-98DqA8KA59Bz8K98KA95AW3z5A494P8P95P8A-9DU98KA9RK2-zkPE9kKPUUAEx9
Table 2.3.2 : UTRA-FDD uplink data rates
Te

X,K[NjIHIN[IHKNcbNYH_,dN W+x+9F6DzkAO9 [V9 WVV9 Q’V9

FUFIgN [:9 +V:9 V’:9 L[:9

FUIIgN WQ9 WQ9 WQ9 WQ9

.y[KIjYTGN [V9 W[9 ’9 V9

2. Dedicated Physical Control Channel (DPCCH)


 /U9APkK9kDUUAk8zDU”9EP2A59W9UAA4-9AYPk8E29DUA9'“;;=x9
 JKz-9kKPUUAE9kDU6A2-9kDU85DE94P8P97D598KA9RK2-zkPE9EP2A5x9
 /893-A-9kDU-8PU89-R5AP4zUq97Pk8D59+Q[x9
 JKA9kKPUUAE9kDU8PzU-97DEEDBzUq97D3597zAE4-x9
OY/N UYFEHNR9JKA9RzED8Nz-N3-A4N7D59kKPUUAE9A-8zCP8zDUx99
OYY/N M[IT,yE[HNqE[]IHNPE]NYTIHYETNYjKTHYqYK[9OMKIZ/NR99JS;/9-RAkz7zA-98KA9kKPUUAE985PU-RD58A49Bz8KzU98KA9'“';=-x9
OYYY/N KKKjNIPbNYTqE[]IHYETNqYKFjNOKVZ/NRN/89-3RRD58-9-zqUPEzUqN7D59P9-D789KPU4D6A5x9
OYO/N M[IT,]YHNyExK[NPETH[EFNOMUI/NR9J“;9z-93-A497D59kDU85DEEzUq98KA985PU-Cz--zDU9RDBA59D79P9-AU4A5x9“DBA59kDU85DE9z-9
RA57D5CA49zU9APkK9-ED8”98K3-9WQ::9RDBA59kDU85DE9k2kEA-9P5A9P6PzEPNEA9RA59-AkDU4x9JzqK89RDBA59kDU85DE9z-9UAkA--P529
8D9Cz8zqP8A9UAP5j7P5jA77Ak8-x9,zY94z77A5AU89'“;;=9N35-8-9KP6A9NAAU94A7zUA49BKzkK94z77A59zU98KA9-z–A9D798KA97zAE4-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-38 GSM

3. Dedicated Physical Channel (DPCH)


 JKz-9z-94DBUEzUµ9kKPUUAEx99
 /89C3E8zREAYA-9kDU85DE9PU493-A594P8Px99
 ,R5AP4zUq9 7Pk8D5-9 NA8BAAU9 V9 8D9 QW+9 P5A9 P6PzEPNEAx9 JKA9 P6PzEPNEA9 4P8P9 5P8A-9 7D59 4P8P9 kKPUUAE-9 F'“';=O9 Bz8KzU9 P9
'“;=9P5A9[9F-R5AP4zUq97Pk8D59m9QW+O”9+V”9QW”9L:”9+W:”9VQ+”9LW+9PU49W’"+9F-R5AP4zUq97Pk8D59mVOx9
4. Physical Random Access Channel (RACH)
 /89z-93-A498D9kDU85DE9CA4z3C9PkkA--9DU98KA93REzUµx99RJ^_9nS''94A7zUA-9WQ95PU4DC9PkkA--9-ED8-9Bz8KzU9+:C-x99
 \z8KzU9APkK9PkkA--9-ED89W[94z77A5AU89PkkA--9R5APCNEA-9kPU9NA93-A497D595PU4DC9PkkA--x99
 R-zUq9-ED88A49_EDKP”9R-A59VW3zRCAU89FRVO9kPU9PkkA--9PU9PkkA--9-ED89N29-AU4zUq9P9R5APCNEAx99
 RV9 -8P58-9 Bz8K9 8KA9 EDBA-89 P6PzEPNEA9 RDBA59 8D9 P6Dz49 zU8A57A5zUq9 Bz8K9 D8KA59 -8P8zDU-x9 /79 UD9 RD-z8z6A9 5A-RDU-A9 z-9
5AkAz6A49 8KAU9 RV9 85zA-9 7D59 PUD8KA59 -ED89 Bz8K9 PUD8KA59 R5APCNEA9 Bz8K9 8KA9 UAY89 KzqKA59 RDBA59 EA6AEx9 JKz-9 z-9 kPEEA49

e
RDBA595PCRzUqx99

g
JKA9U3CNA59D79P6PzEPNEA9-ED8-9kPU9NA94A7zUA49RA59kAEE9PU49z-985PU-Cz88A496zP9P9N5DP4kP-89kKPUUAE98D9PEE9R-A5-x9
Steps for searching a cell
io led
_9RV9KP-98D9RA57D5C97DEEDBzUq9-8AR-9435zUq98KA9-AP5kK97D59P9kAEE9P78A59P9RDBA59DUx9
rWN U[Y]I[JN,JTPA[ETYLIHYETN
ic ow

_9RV9KP-98D9-2UkK5DUz–A9Bz8K98KA9KAER9D79P9+Q[9kKzR9R5zCP529-2UkK5DUz–P8zDU9kD4Ax9JKz-9kD4A9z-9-PCA97D59PEE98KA9kAEE-9
n
PU49KAER-98D9-2UkK5DUz–A9Bz8K98KA98zCA9-ED89-853k835Ax9
bl kn

VWN .KPETjI[JN,JTPA[ETYLIHYETN
'35zUq9 8Kz-9 -AkDU49 RKP-A”9 8KA9 RV9 5AkAz6A-9 P9 -AkDU4P529 -2UkK5DUz–P8zDU9 kD4A9 BKzkK9 4A7zUA-9 P9 q5D3R9 D79 -k5PCNEzUq9
at
Pu ch

kD4A-93-A49zU98Kz-9kAEEx9JKA9RV9z-9UDB9-2UkK5DUz–A49Bz8K98KA975PCA9-853k835Ax9
vWN ZjKTHYqYPIHYETNEqNHAKN,P[I]NFYTGNPEjKN
Te

JKA9RV985zA-9PEE9-k5PCNEzUq9kD4A-9Bz8KzU98KA9q5D3R9D79kD4A-98D97zU498KA95zqK89kD4A9Bz8K98KA9KAER9D79P9kD55AEP8D5x9

2.3.2(b) UTRA - TDD (TD-CDMA)


MU - May 13, May 15)

Q. Explain UTRA TDD mode in detail. (May 13, May 15, 5 Marks)

Features of UTRA-TDD
 RJ^_jJ''9-ARP5P8A-93R9EzUµ9PU494DBU9EzUµ9zU98zCA94DCPzUx9JKA9S5PCA9-853k835A9D79J''9z-9-zCzEP598D9S''x9
 WQ9-ED8-9Bz8K9+”Q[:9kKzR-9RA59-ED897D5C9P95P4zD975PCA9Bz8K9435P8zDU9D79W:C-x9JKA9kKzRRzUq95P8A9z-9PE-D9Qx’V9HkKzRZ-x9
 JKA9J''975PCA9-853k835A9kPU9NA9,J]]KH[YPIF9D59P,J]]KH[YPIFx9
 /U9-2CCA85zkPE975PCA9-853k835A9U3CNA59D793REzUµ9PU494DBUEzUµ9-ED8-9z-9-PCAx9
 /U9P-2CCA85zkPE975PCA9-853k835A9PU29P5Nz85P529kDCNzUP8zDU9z-93-A4x9
 JKA9-2-8AC9kPU9kKPUqA9-R5AP4zUq97Pk8D59NA8BAAU9W98D9W[98D9PkKzA6A94A-z5A494P8P95P8Ax9
 JK3-93-zUq98KA985P77zk9N35-89-KDBU9zU9Szqx99+xQx"94P8P95P8A-9D79[[+V”99QQW+”9W[Q[”99’+’9PU49VWV9µNz8Z-9kPU9NA9PkKzA6A497D59
-R5AP4zUq97Pk8D5-9W”+”V”[”’”9PU49W[95A-RAk8z6AE2x9
 “DBA59kDU85DE9z-9AP-2943A98D98zqK89-2UkK5DUz–P8zDU9PU493-A9D79D58KDqDUPE9kD4A-x9_9-zCREA9RDBA59kDU85DE9-kKACA9Bz8K9
W::j’::9RDBA59kDU85DE9k2kEA-Z-9z-9-377zkzAU8x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-39 GSM

Fig. 2.3.7 : UTRA – TDD (TD- CDMA) frame structure

UTRA - TDD Frame format


 RJ^_j9J''975PCA9-853k835A9z-9-KDBU9zU9Szqx9+xQx"x9
 /89zUkE34A-97DEEDBzUq9N35-8-x9
Data Fields

e

g
Szqx9+xQx"9-KDB-9P9N35-89D7982RA+9BKzkK9kDCR5z-A-98BD9jIHI97zAE4-9APkK9D79W”W:V9kKzR-x99

io led
,R5AP4zUq9z-9PRREzA498D98KA-A94P8P97zAE4-9DUE2x9
Midample

ic ow

Hz4PCREA9z-93-A497D5985PzUzUq9PU49kKPUUAE9A-8zCP8zDUx9
Guard period (GP)
n
 _-9J''93-A-98KA9-PCA9-k5PCNEzUq9kD4A-97D59PEE9-8P8zDU-j98KA9-8P8zDU-9C3-89NA98zqK8E29-2UkK5DUz–A49PU498KA9-R5AP4zUq9
bl kn

kD4A-9P5A9P6PzEPNEA9DUE29DUkA9RA59-ED8x99
 JD9EDD-AU98KA98zqK89-2UkK5DUz–P8zDU9Ez88EA9Nz8”9P9q3P549RA5zD49KP-9NAAU9zU85D43kA49P898KA9AU49D79APkK9-ED8x9
at
Pu ch

Table 2.3.3 : Comparison of UTRA-FDD and UTRA-TDD


Te

UI[I]KHK[N XM`YfKFFN XM`YfMFFN

/4AP9 R-A-9Bz4ANPU49;'H_9F\j;'H_O9Bz8K94z5Ak89 R-A-9JzCA94DCPzU9;'H_99


-AW3AUkA9-R5AP4zUqx9

,ARP5P8zDU9D79 ,ARP5P8A-93R9PU494DBUEzUµ9zU975AW3AUk29 ,ARP5P8A-93R9PU494DBU9EzUµ9zU98zCA94DCPzUx9


kKPUUAE-9 4DCPzU9

,2UkK5DUz–P8zDU9 ,2UkK5DUz–P8zDU9z-9UD895AW3z5A49zU98zCA94DCPzU9 JzqK89-2UkK5DUz–P8zDU9z-9UAA4A49zU98zCA9


4DCPzUx9

“DBA59kDU85DE9 ;DCREAY9RDBA59kDU85DE9-kKACA95AW3z5A4x9FWQ::9 ,zCREA9RDBA59kDU85DE9-kKACA9z-9-377zkzAU8x9


RDBA59kDU85DE999k2kEA-Z-O9 FW::j’::9RDBA59kDU85DE9k2kEA-Z-O9

,R5AP4zUq99 ,R5AP4zUq9]9RR9_zUµ9]9Vj+Q[j99999'DBU9_zUµ9]VjQW+9 ,R5AP4zUq9NA8BAAU9WjW[9

HPYzC3C9'P8P95P8A9 L[:9µNz8Z-9 [[+V9µNz8Z-9

,k5PCNEzUq9kD4A9 VPkK9-8P8zDU9Bz8KzU9P9kAEE93-A-98KA94z77A5AU89 _EE98KA9-8P8zDU-9zU9P9kAEE93-A98KA9-PCA9


-k5PCNEzUq9kD4Ax9 -k5PCNEzUq9kD4Ax9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-40 GSM

2.3.3 Improvement on Core Network


 JKA9Pk8z6z8zA-9D79QT94A6AEDRCAU8-9KP6A9PEBP2-97Dk3-A49DU94A6AEDRCAU89D79RK2-zkPE9PU49H_;9EP2A5-x9
 JKA97DEEDBzUq98K5AA95P4zD9CD43EA-9BA5A9-AEAk8A497D59QT95P4zD9PkkA--x9
FzO9 'z5Ak89-AW3AUkA9F',O975AW3AUk294z6z-zDU943REAYFS''O9
FzzO9 H3E8z9kP55zA59FH;O975AW3AUk294z6z-zDU943REAY9FS''O9
FzzzO9 JzCA94z6z-zDU943REAY9FJ''O9
 JKA9',9CD4A9z-9NP-A49DU98KA9\j;'H_9R5DRD-PE9PU498KA9H;9CD4A9z-9NP-A49DU9k4CP+:::9R5DRD-PEx9JKA9J''9CD4A9z-9
NP-zkPEE29-3z8PNEA97D59kD54EA--9kDCC3UzkP8zDU-x9
 JK5AA9CPgD59CD43EA-9D79kD5A9UA8BD5µ97D59QT9-2-8AC9KP6A9NAAU9z4AU8z7zA49]9
FzO9 _X,/jVW9
FzzO9 T,H9H_“9

e
FzzzO9 PU49/“jNP-A49UA8BD5µ9

g
_EE98KA95P4zD9PkkA--9CD4A-9D79RJ^_X9-KD3E4973EE29-3RRD589_X,/9VW9PU49T,H9H_“x9
io led
 _U9DRA5P8D59CP29-AEAk89DUA9D59CD5A95P4zD9CD43EA-98DqA8KA59Bz8K9DUA9D59CD5A9kD5A9UA8BD5µ9CD43EA-98D9zCREACAU89
QT9-2-8ACx9

ic ow

HD5AD6A5”9UA8BD5µ95AEP8A49R5DkA435A-9P5A9DR8zCz–A498D95A43kA9-zqUPEzUq985P77zk9zU9QTx9
 _U9 P44z8zDUPE9 zCR5D6ACAU89 8D9 8KA9 ;D5A9 XA8BD5µ9 zU9 RJ^_X9 BP-9 P44z8zDU9 D79 P9 UAB9 AU8z829 T_^9 FTP8ABP29 _DkP8zDU9
n
^Aqz-8A5O9NA8BAAU9=_^9PU49a_^x9
bl kn

 S5DC98KA96zAB9RDzU89D79a_^9EDkP8A49zU96z-z8A49UA8BD5µ”9T_^9z-985AP8A49P-95DPCzUq93-A5h-9=_^9zU9KDCA9UA8BD5µx9

at

S5DC98KA96zAB9RDzU89D79=_^9zU9KDCA9UA8BD5µ”98KA9T_^9Pk8-9P-98KA9a_^9P898KA96z-z8A49UA8BD5µx9
Pu ch

Review Questions
Te

Q. 1 Explain mobile terminated and mobile originated call in GSM.

Q. 2 Explain various security services offered by GSM.

Q. 3 Explain how the location update occurs in GSM.


!!!
!
!
AA

Mobile Networking
3
A
A
A
A
Unit III
A
A
Syllabus

3.1 Mobile Networking : Medium Access Protocol, Internet Protocol and Transport layer
3.2 Medium Access Control : Motivation for specialized MAC, Introduction to multiple Access techniques (MACA)
3.3 Mobile IP: IP Packet Delivery, Agent Advertisement and Discovery, Registration, Tunneling and Encapsulation,
Reverse Tunneling, Routing (DSDV,DSR)

e
3.4 Mobile TCP : Traditional TCP, Classical TCP Improvements like Indirect TCP, Snooping TCP & Mobile TCP, Fast
Retransmit/ Fast Recovery, Transmission/Timeout Freezing, Selective Retransmission.

g
A
io led
Introduction
CIPNAPN(A)LOIHAS/LD(ABFAOB)PLR'(AH(3I’(/5A?BRI'IPjANL/AR(’B?(ALzAI?OB)PLzPAFL’PB)AIzAPN(A/S’’(//ABFA?BRI'(Az(P2B)1/“A
ic ow

”:I/PIzDAz(P2B)1AO)BPB’B'/APNLPAL)(AH(3('BO(HAFB)AFI:(HAz(P2B)1AHBAzBPA2B)1A2(''AIFAS/(HAHI)(’P'jAIzA2I)('(//Az(P2B)1/“AUNI/A
I/A R(’LS/(A PN(A 2I)('(//A z(P2B)1/A I?OB/(A 3L)IBS/A ’NL''(zD(/A 'I1(A HjzL?I’A PBOB'BDj5A L/j??(P)I’A 'Iz1/5A F)(‘S(zPA
n
HI/’Bzz(’PIBz/5A/(’S)IPj5ANIDNA())B)A)LP(A(P’“AUBA/SOOB)PA ?BRI'IPj5A(IPN()Az(2AO)BPB’B'/ANL3(APBAR(AH(3('BO(HAB)A(:I/PIzDA
bl kn

O)BPB’B'/A z((HA PBA R(A ?BHIFI(H“A UNI/A ’NLOP()A HI/’S//(/A O)BR'(?/A 2IPNA /B?(A BFA PN(A (:I/PIzDA 4675A -zP()z(PA LzHA U7–A 'Lj()A
O)BPB’B'ALzHA)(‘SI)(HA?BHIFI’LPIBz/APBA/SOOB)PA?BRI'IPj“A
at
Pu ch

3.1 Mobile Networking



Te

9B2ALAHLj5AO(BO'(A2LzPAPBAL’’(//APN(A/()3I’(/AF)B?ALzj2N()(5ALzjPI?(AI))(/O(’PI3(ABFAPN(I)A'B’LPIBz“AUNI/AF(LPS)(ABFA
?B3IzDALzj2N()(ALzHA/PI''AR(ALR'(APBAL’’(//APN(A/()3I’(/AI/A’L''(HA?BRI'IPj“A
 4L1IzDA/S’NA/()3I’(/A?BRI'(5A)(‘SI)(/A?BHIFI’LPIBzAPBA(:I/PIzDAO)BPB’B'/ALzHALPA/B?(A(:P(zPAPBA(:I/PIzDAL)’NIP(’PS)(“A
UN(AFB''B2IzDA/(’PIBzAHI/’S//(/APN(AI?O)B3(?(zP/AB)A?BHIFI’LPIBz/Az((HAPBAR(AHBz(AIzA4(HILA6’’(//A7BzP)B'5A-zP()z(PA
LzHAU)Lz/OB)PA'Lj()AO)BPB’B'/APBA?L1(ALAz(P2B)1AB)A/()3I’(/A?BRI'(“AA
3.1.1 Medium Access Protocols
 4(HIS?AL’’(//AO)BPB’B'/ARL/I’L''jA’BzP)B'/AL’’(//APBAPN(A/NL)(HA?(HIS?“A
 C(A1zB2A?LzjABFAPN(A467AO)BPB’B'/AFB)A2I)(HA0B)AFI:(H+Az(P2B)1A/S’NAL/A6*G=65A;'BPP(HA6*G=65A7;465A7;4687V5A
UB1(zA RS/5A PB1(zA )IzDA (P’“A ;Iz’(A 2I)('(//A ?(HIS?A I/A LA /NL)(HA ?(HIS?A 467A O)BPB’B'/A R(’B?(A LzA I?OB)PLzPA H(/IDzA
H(’I/IBzAFB)A2I)('(//Az(P2B)1“A
 KSPA L''A PNI/A 467A O)BPB’B'/A F)B?A 2I)(HA z(P2B)1/A ’LzzBPA R(A HI)(’P'jA S/(HA FB)A 2I)('(//A z(P2B)1/“A =()(5A 2(A NL3(A
IzP)BHS’(HA/(3()L'ADvyUgEx2NNv33xp4fL54HxhD2p6xL'DB)IPN?/A2NI’NAL)(A/O(’IFI’L''jALHLOP(HAPBAPN(A2I)('(//AHB?LIz“AA
 4(HIS?AL’’(//A’BzP)B'A’B?O)I/(/AL''A?(’NLzI/?/APNLPA)(DS'LP(AS/()AL’’(//APBALA?(HIS?AS/IzDA;V45AUV45AQV45AB)A
7V4“A467AI/APNS/A/I?I'L)APBAP)LFFI’A)(DS'LPIBz/AIzAPN(A?S'PIO'(:IzD“A
 -zAPNI/A’NLOP()A2(A2I''AHI/’S//A3L)IBS/A467AO)BPB’B'/A/O(’IL''jAH(/IDz(HAFB)A2I)('(//Az(P2B)1/“A

3.1.2 Internet Protocols


 -zA P)LHIPIBzL'A -–A )BSPIzD5A -–A LHH)(//(/A )(O)(/(zPA LAPBOB'BDj“A XBSPIzDA ?(’NLzI/?/A )('jA BzA PN(A L//S?OPIBzA PNLPA (L’NA
z(P2B)1AzBH(A2I''A L'2Lj/A NL3(A PN(A /L?(A OBIzPA BFA LPPL’N?(zPA PBA PN(A -zP()z(P“A ”L’NA zBH(Z/A -–A LHH)(//A IH(zPIFI(/A PN(A
z(P2B)1A'Iz1A2N()(AIPAI/A’Bzz(’P(H“Ax
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-2 Mobile Networking

 UN(A-zP()z(PA)BSP()/A'BB1ALPAPN(A-–ALHH)(//AO)(FI:5A2NI’NAIH(zPIFI(/ALAH(3I’(Z/Az(P2B)1“Ax
 6PAPN(Az(P2B)1A'(3('5A)BSP()/A'BB1ALPAPN(Az(:PAF(2ARIP/APBAIH(zPIFjAPN(ALOO)BO)ILP(A/SRz(P“AQIzL''j5ALPAPN(A/SRz(PA'(3('5A
)BSP()/A'BB1ALPAPN(ARIP/AIH(zPIFjIzDALAOL)PI’S'L)AH(3I’(“Ax
 -zAPNI/A)BSPIzDA/’N(?(5AIFAjBSAHI/’Bzz(’PALA?BRI'(AH(3I’(AF)B?APN(A-zP()z(PALzHA2LzPAPBA)(’Bzz(’PAPN)BSDNALAHIFF()(zPA
/SRz(P5A jBSA NL3(A PBA’BzFIDS)(APN(A H(3I’(A 2IPNA LA z(2A -–A LHH)(//5A LzHA PN(A LOO)BO)ILP(Az(P?L/1ALzHA H(FLS'PA )BSP()“A
GPN()2I/(5A )BSPIzDA O)BPB’B'/A NL3(A zBA ?(Lz/A BFA H('I3()IzDAOL’1(P/“A UNI/A I/A R(’LS/(A PN(A H(3I’(Z/A -–A LHH)(//A HB(/zZPA
’BzPLIzAPN(Az(’(//L)jAIzFB)?LPIBzALRBSPAPN(A’S))(zPAOBIzPABFALPPL’N?(zPAPBAPN(A-zP()z(P“x
 UN(Az(’(//IPjAFB)ASzIzP())SOP(HA’B??SzI’LPIBzA2N(zAPN(A?BRI'(AH(3I’(A?B3(/AF)B?ABz(A'B’LPIBzAPBALzBPN()A’L''/AFB)A
LAz(2AP(’NzB'BDj“x
 UNI/A 1IzHA BFA ’B??SzI’LPIBzA ’LzA R(A (FFI’I(zP'jA I?O'(?(zP(HA S/IzDA 4BRI'(A -–“A D47UHvx kOA0B)A 4-–+A I/A LzA -”UQA /PLzHL)HA
’B??SzI’LPIBz/AO)BPB’B'APNLPAI/AH(/IDz(HAPBAL''B2AE47UHvxH(3I’(AS/()/APBA?B3(AF)B?ABz(Az(P2B)1APBALzBPN()A2NI'(A
?LIzPLIzIzDALAO()?Lz(zPAkOALHH)(//“Ax
 ;(’PIBzAY“YAHI/’S//(/AH(PLI'A4BRI'(A-–AO)BPB’B'/ALzHAIP>/AFSz’PIBzL'IPI(/“x

e
3.1.3 Transport Protocols

g

io led
U)Lz/?I//IBzA’BzP)B'A–)BPB’B'A0U7–+AI/APjOI’L''jAH(/IDz(HAFB)AFI:(HAz(P2B)1“A
 -FA2(AS/(APN(A/L?(AU7–AB3()A?BRI'(Az(P2B)15APN(AO()FB)?Lz’(ABFAPN(AU7–AH(D)LH(/“A
 ”:I/PIzDAU7–A’LzAR(A?BHIFI(HAPBA/SOOB)PA?BRI'IPj“A
ic ow

 ;(’PIBzA Y“<A HI/’S//(/A 2B)1IzDA BFA (:I/PIzDA U7–5A O)BR'(?/A 2IPNA (:I/PIzDA U7–A IFA S/(HA IzA ?BRI'(A z(P2B)1A LzHA /B?(A
n
?BHIFI’LPIBz/APBAPN(A(:I/PIzDAU7–APNLPA’LzAR(AS/(HAFB)A?BRI'(Az(P2B)1/“AA
bl kn

3.2 Medium Access Control


at

3.2.1 Motivation for Specialized MAC


Pu ch

MU – May 18
Te

Q. Explain the need of specialized MAC in wireless communication. (May 18, 10 Marks)

 7;4687VA I/A PN(A ?B/PA ’B??Bz'jA S/(HA 467A O)BPB’B'A FB)A 2I)(HA z(P2B)1“A UN(A ‘S(/PIBzA I/5A ’LzA 2(A S/(A PN(A /L?(A
7;4687VAFB)A2I)('(//Az(P2B)1/APBA’BzP)B'APN(A?(HIS?AL’’(//A2IPNBSPALzjA?BHIFI’LPIBz/!A
 *(PAS/A’Bz/IH()A’L))I()A/(z/(A?S'PIO'(AL’’(//A2IPNA’B''I/IBzAH(P(’PIBz5A07;4687V+A2NI’NA2B)1/AL/AFB''B2/“AA
 6A/(zH()A/(z/(/APN(A?(HIS?A0LA2I)(+APBA/((AIFAIPAI/AF)((“A-FAPN(A?(HIS?AI/ARS/j5APN(A/(zH()A2LIP/ASzPI'AIPAI/AF)((“A-FAPN(A
?(HIS?AI/AF)((5APN(A/(zH()A/PL)P/AP)Lz/?IPPIzDAHLPLALzHA’BzPIzS(/APBA'I/P(zAIzPBAPN(A?(HIS?“A-FAPN(A/(zH()AH(P(’P/ALA
’B''I/IBzA2NI'(A/(zHIzD5AIPA/PBO/ALPABz’(ALzHA/(zH/ALAUL??IzDA/IDzL'“A
 KSPAPNI/A/’N(?(AFLI'/AIzA2I)('(//Az(P2B)1/“AUNI/AI/AR(’LS/(5A7;4687VAI/AzBPA)(L''jAIzP()(/P(HAIzA’B''I/IBz/ALPAPN(A/(zH()5A
RSPA)LPN()AIzAPNB/(ALPAPN(A)(’(I3()“AUN(A/IDzL'A/NBS'HA)(L’NAPN(A)(’(I3()A2IPNBSPA’B''I/IBz/“AKSPAPN(A/(zH()AI/APN(ABz(A
2NBAH(P(’P/APN(A’B''I/IBz/“AA
 UNI/AI/AzBPALAO)BR'(?AS/IzDALA2I)(5AL/APN(A/L?(A/IDzL'A/P)(zDPNA’LzAR(AL//S?(HAL''AB3()APN(A2I)(AIFAPN(A'(zDPNABFAPN(A
2I)(A/PLj/A2IPNIzA’()PLIzA/PLzHL)HIV(HA'I?IP/“A-FALA’B''I/IBzAB’’S)/A/B?(2N()(AIzAPN(A2I)(5A(3()jRBHjA2I''AzBPI’(AIP“AA
 UN(A/IPSLPIBzAI/AHIFF()(zPAIzA2I)('(//Az(P2B)1/“AU2BAO)BR'(?/ANIHH(zAP()?IzL'ALzHA(:OB/(HAP()?IzL'AO)BR'(?AB’’S)AIzA
2I)('(//Az(P2B)1A2NI’NAL)(AHI/’S//(HABzAFB''B2IzDA/(’PIBz/“x
 7B''I/IBzA H(P(’PIBzA I/A 3()jA HIFFI’S'PA IzA 2I)('(//A /’(zL)IB/A L/A PN(A P)Lz/?I//IBzA OB2()A IzA PN(A L)(LA BFA PN(A P)Lz/?IPPIzDA
LzP(zzLA I/A /(3()L'A ?LDzIPSH(/A NIDN()A PNLzA PN(A )(’(I3IzDA OB2()“A ;B5A PNI/A 3()jA ’B??BzA 467A /’N(?(A F)B?A 2I)(HA
z(P2B)1AFLI'/AIzALA2I)('(//A/’(zL)IB“Ax
 UN(AFB''B2IzDA/(’PIBz/A/NB2A/’(zL)IB/A2N()(A7;4687VA/’N(?(AFB)?AFI:(HAz(P2B)1/AFLI'AIzA’L/(ABFA2I)('(//Az(P2B)1“x
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-3 Mobile Networking

3.2.1(a) Hidden Station Problem and Exposed Station Problem


(MU – May 12, Dec. 12, Dec. 13, May 15, May 16, May 17, Dec. 17)

Q. What is Hidden and Exposed terminal problem? Discuss solutions to these problems. (May 12, Dec. 13, 10 Marks)
Q. What do you mean by Exposed terminal problem ? (Dec. 12, 5 Marks)
Q. What do you mean by Hidden terminal problem? (Dec. 12, May 16, 5 Marks)
Q. Explain hidden station and exposed station problems in WLAN. (May 15, May 16, 5 Marks)
Q. What is hidden and exposed terminal problems? Discuss solution to these problems. (May 17, 5 Marks)
Q. Why do hidden terminal and exposed terminal problems arise? How would you propose to solve it?
(Dec. 17, 10 Marks)

 CI)('(//A ?(HIS?A I/A LzA BO(z5A /NL)(H5A LzHA R)BLH’L/PA ?(HIS?“A 4S'PIO'(A zBH(/A ?LjA L’’(//A PN(A ?(HIS?A LPA PN(A /L?(A
PI?(“AA

e
 U)LHIPIBzL'A*69/AS/(/A7;4687VA?(’NLzI/?APBA’BzP)B'A?(HILAL’’(//“AUNI/A/’N(?(A2B)1/AFB)A2I)(HAz(P2B)1ARSPAzBPAFB)A

g
2I)('(//“AA io led
 7;4687VAFLI'/AIzA’L/(ABFA2I)('(//Az(P2B)1/AHS(APBAPN(AFB''B2IzDA)(L/Bz“A
 -zAPN(A2I)(HAz(P2B)1APN(A/IDzL'A/P)(zDPNA’LzAR(AL//S?(HAPBAR(A/L?(AL''AB3()APN(A2I)(AIFAPN(A'(zDPNABFAPN(A2I)(A/PLj/A
2IPNIzA ’()PLIzA /PLzHL)HIV(HA 'I?IP/“A -FA LA ’B''I/IBzA B’’S)/A /B?(2N()(A IzA PN(A 2I)(5A (L’NA /PLPIBzA 2I''A zBPI’(A IP“A KSPA PN(A
ic ow

/IPSLPIBzA I/A HIFF()(zPA IzA LA 2I)('(//A *69“A =()(5A PN(A /P)(zDPNA BFA LA /IDzL'A H(’)(L/(/A O)BOB)PIBzL''jA PBA PN(A /‘SL)(A BFA PN(A
HI/PLz’(APBAPN(A/(zH()“AA
n

bl kn

VS(APBAPNI/A)(L/Bz5A467A/’N(?(/AFB)A2I)(HAz(P2B)1/A?LjAFLI'A2N(zAS/(HAFB)A2I)('(//Az(P2B)1/“AA
 QB''B2IzDAP2BA/’(zL)IB/A/NB2A2N()(A’Bz3(zPIBzL'A7;4687VAFLI'/A2N(zAS/(HAIzA2I)('(//Az(P2B)1/“A
at

1. Hidden Station (or Terminal) Problem


Pu ch

7Bz/IH()APN(A/’(zL)IBA2IPNAPN)((A?BRI'(AONBz(/A65AKALzHA7AL/A/NB2zAIzAQID“AY“W“XA
Te

Fig. 3.2.1 : Hidden station problem

 UN(AP)Lz/?I//IBzA)LzD(ABFA6A)(L’N(/AK5ARSPAzBPA7“AA
 UN(AP)Lz/?I//IBzA)LzD(ABFA7A)(L’N(/AK5ARSPAzBPA6“AA
 QIzL''j5APN(AP)Lz/?I//IBzA)LzD(ABFA6A)(L’N(/ARBPNA6ALzHA7“AUNLPAI/5A6A’LzzBPAH(P(’PA7ALzHA3I’(A3()/L“A
0I+AA -zIPIL''j5A6A/(z/(/APN(A’NLzz('ALzHA/Iz’(AIPAFIzH/APN(A’NLzz('AF)((5A6AP)Lz/?IP/APBAK“A
0II+AA CNI'(A6AI/AP)Lz/?IPPIzD5A7AL'/BA2LzP/APBAP)Lz/?IPAPBAKALzHAN(z’(A/(z/(/APN(A’NLzz('“A
0III+AA 7AHB(/AzBPAN(L)A6>/AP)Lz/?I//IBzA0R(’LS/(A6AI/ABSPABFA)LzD(ABFA7+“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-4 Mobile Networking

0I3+AA 7A’Bz’'SH(/APNLPAPN(A’NLzz('AI/AF)((ALzHA/PL)P/AP)Lz/?IPPIzDAPBAK“A
03+AA ;IDzL'/AF)B?A6ALzHA7ARBPNA’B''IH(ALPAK“A
03I+AA Y6ZAI/ANIHH(zAFB)AY7Z“A
2. Exposed Station Problem
A 7Bz/IH()APN(A/IPSLPIBzA/NB2zAIzAQID“AY“W“W“A6'BzDA2IPNAPN(AO)(3IBS/A/IPSLPIBzAzB2AzBH(AVAI/ALHH(HA2NI’NAI/AIzAPN(A)LzD(A
BFA7“A

g e
io led
ic ow

Fig. 3.2.2 : Exposed Station (or Terminal) Problem


0I+A KA2LzP/APBA/(zHAHLPLAPBA6“AKA/(z/(/APN(A’NLzz('ALzHAFIzH/AIPAF)((ALzHAN(z’(AP)Lz/?IP/APBA6“A
n
bl kn

0II+A 9B2A7AL'/BA2LzP/APBAPL'1APBAV“A
0III+A 7A/(z/(/APN(A’NLzz('ALzHAFIzH/AIPAPBAR(ARS/jA07A’LzAN(L)AK>/AP)Lz/?I//IBzA/Iz’(AKAI/AIzA7>/A)LzD(+“A
at

0I3+A 7A’Bz’'SH(/APNLPAPN(A’NLzz('AI/ARS/jALzHAHB(/AzBPAP)Lz/?IPA02N(zAIPA’BS'HANL3(AIH(L''jAP)Lz/?IPP(HAPBAVAR(’LS/(A6AI/A
Pu ch

BSP/IH(APN(A)LHIBA)LzD(ABFA7+“A
03+A Y7ZAI/A(:OB/(HAPBAYKZ“A
Te

UN(A=IHH(zAU()?IzL'AO)BR'(?A'(LH/APBA[A
0I+A 4B)(A’B''I/IBz/A
0II+A CL/PLD(ABFA)(/BS)’(/A
GzAPN(ABPN()ANLzH5A”:OB/(HAU()?IzL'AO)BR'(?A'(LH/APBA[A
0I+A \zH()SPI'IVLPIBzABFA’NLzz('A
0II+A *B2()A(FF(’PI3(APN)BSDNOSPA

3.2.2 Multiple Access with Collision Avoidance (MACA)


(MU - May 16, May 17, Dec. 17)

Q. Explain in short how Hidden station problem is avoided in WLAN. (May 16, 5 Marks)
Q. What is hidden and exposed terminal problems? Discuss solution to these problems. (May 17, 5 Marks)
Q. Why do hidden terminal and exposed terminal problems arise? How would you propose to solve it?
(Dec. 17, 10 Marks)

 =IHH(zA LzHA (:OB/(HA P()?IzL'A O)BR'(?/A ’LzA R(A /B'3(HA RjA S/IzDA ?S'PIO'(A L’’(//A 2IPNA ’B''I/IBzA L3BIHLz’(A 04676+A
O)BPB’B'“AA
 C(A1zB2APNLP5AY6R/(z’(ABFA’L))I()AHB(/AzBPAL'2Lj/A?(LzALzAIH'(A?(HIS?ZAIzAPN(A’BzP(:PABFANIHH(zAP()?IzL'AO)BR'(?A
LzHAY–)(/(z’(ABFA’L))I()AHB(/AzBPAL'2Lj/A?(LzALARS/jA?(HIS?ZAIzAPN(A’BzP(:PABFA(:OB/(HAP()?IzL'AO)BR'(?5A4676A
/B'3(/ARBPNAPN(AO)BR'(?/“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-5 Mobile Networking

 4676AS/(/AP2BA/NB)PA/IDzL'IzDAOL’1(P/A’L''(HAXU;ALzHA7U;AFB)A’B''I/IBzAL3BIHLz’(“A
hU6x -#Bxh5vGgv3LxL4x3vfy6xVA6A/(zH()A)(‘S(/P/APN(A])IDNPAPBA/(zH>AF)B?ALA)(’(I3()ARjAP)Lz/?IPPIzDAXU;AOL’1(PAR(FB)(A
HLPLAP)Lz/?I//IBz“A
hUU6x p#BxhNHvK5xL4x3vfy6xVAUN(A)(’(I3()AD)LzP/APN(A])IDNPAPBA/(zH>AL/A/BBzAL/AIPAI/A)(LHjAPBA)(’(I3(ARjA/(zHIzDARL’1ALA7U;A
OL’1(P“A
 UN(/(AOL’1(P/A’BzPLIzA/(zH()ALHH)(//5A)(’(I3()ALHH)(//ALzHA'(zDPNABFAFSPS)(AP)Lz/?I//IBz“A
 4676A/B'3(/A=IHH(zA;PLPIBzA–)BR'(?“A

e
Fig. 3.2.3 : MACA solves Hidden station problem


g
io led
4676AL3BIH/APN(AO)BR'(?ABFANIHH(zA/PLPIBz/“A7Bz/IH()APN(A/’(zL)IBA/NB2zAIzAQID“AY“W“Y“A
X“A 6ALzHA7A2LzPAPBA’B??SzI’LP(APBAK“A
W“A 6A/(zH/AXU;AFI)/P“A
ic ow

Y“A KA)(’(I3(/AXU;APNLPA’BzPLIz/AzL?(ABFAPN(A/(zH()A06+5A)(’(I3()A0K+ALzHAPN(A'(zDPNABFAFSPS)(AP)Lz/?I//IBz“AUNI/AXU;AI/A
n
zBPAN(L)HARjA7A09BPAIzA7>/A)LzD(+“A
bl kn

^“A KA )(/OBzH/A PBA XU;A RjA /(zHIzDA 7U;“A 7U;A OL’1(PA ’BzPLIz/A PN(A /(zH()A 06+5A PN(A )(’(I3()A 0K+A LzHA PN(A '(zDPNA BFA PN(A
FSPS)(AP)Lz/?I//IBz“AUNI/A7U;AI/A)(’(I3(HARjARBPNA6ALzHA7A0KAI/AIzA)LzD(ABFARBPNA6ALzHA7+“A
at
Pu ch

<“A 7A2LIP/ALFP()A)(’(I3IzDA7U;AF)B?AKALzHAI/AzBPAL''B2(HAPBAP)Lz/?IPALzjPNIzDAFB)APN(AHS)LPIBzAIzHI’LP(HAIzA)(’(I3(HA
7U;“A

Te

;PI''APN()(AL)(A’NLz’(/ABFA’B''I/IBzAHS)IzDAPN(A/(zHIzDABFALzAXU;“AKBPNA6ALzHA7A’BS'HA/(zHALzAXU;ALPAPN(A/L?(API?(APNLPA
’B''IH(/ALPAK“A6zAXU;AOL’1(PAI/A3()jA/?L''AL/A’B?OL)(HAPBAHLPLAOL’1(P5A/BAPN(AO)BRLRI'IPjABFALA’B''I/IBzAI/A?S’NA'B2()“AA
-zA/S’NA’L/(/5AKA)(/B'3(/APNI/A’BzP(zPIBzALzHA/(zH/A7U;APBABz'jABz(A/PLPIBz“A
 4676A;B'3(/A”:OB/(HAU()?IzL'A–)BR'(?AA!
 4676AL'/BAL3BIH/APN(AO)BR'(?ABFA(:OB/(HAP()?IzL'/“A

Fig. 3.2.4 : MACA solves exposed terminal problem

 7Bz/IH()APN(A/’(zL)IBA/NB2zAIzAQID“AY“W“^“A
X“A KA2LzP/APBA/(zHAHLPLAPBA6“A
W“A 7AL'/BA2LzP/APBA/(zHAHLPLAPBA/B?(Bz(A('/(A09BPAPBA6ALzHAK+A
Y“A KA/(zH/AXU;A2IPNA/(zH()AL/AK5AX(’(I3()AL/A6ALzHA'(zDPNABFAPN(AHLPLAOL’1(P“AUNI/AXU;AI/A)(’(I3(HARjARBPNA6ALzHA7“A
^“A 7AHB(/AzBPA)(L’PAPBAPNI/AXU;AL/AIPAI/AzBPAPN(A)(’(I3()“A
<“A 6A)(/OBzH/APBAXU;ARjA/(zHIzDA7U;“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-6 Mobile Networking

_“A UNI/A7U;AI/AzBPA)(’(I3(HARjA7A06AI/AzBPAIzA7>/A)LzD(+ALzHA7A’Bz’'SH(/APNLPA6AI/ABSP/IH(APN(AH(P(’PIBzA)LzD(“A
`“A 7A’LzAzB2A/PL)PAIP/AP)Lz/?I//IBzAL//S?IzDAIPA2I''AzBPA’LS/(ALA’B''I/IBzALPA6“A
Drawbacks of MACA
X“A Gz(AO)BR'(?A2IPNA4676AI/APN(AB3()N(LH/AL//B’ILP(HA2IPNAXU;ALzHA7U;AP)Lz/?I//IBzAFB)A/NB)PALzHAPI?(A’)IPI’L'AHLPLA
OL’1(P/“AA
W“A 4676A L'/BA L//S?(/A PNLPA PN(A P)Lz/?I//IBzA 'Iz1/A L)(A /j??(P)I’L'A IzA RBPNA PN(A SO'Iz1A LzHA PN(A HB2z'Iz1A HI)(’PIBz/“A
GPN()2I/(ALA/P)BzDA/(zH()5AHI)(’P(HALzP(zzLA(P’“A’BS'HA’BzP)L’PA2IPNAPN(ALRB3(A/’N(?(“A

3.3 Mobile IP
3.3.1 Mobile IP : Basic Concept
 4BRI'(A-–A0B)A-–A?BRI'IPj+AI/ALA’B??SzI’LPIBzAO)BPB’B'AH(3('BO(HARjA-zP()z(PA”zDIz(()IzDAUL/1AQB)’(A0-”UQ+A/PLzHL)H“AA

e
-zA ?BRI'(A -–5A zBH(/A ’BzPIzS(A PBA )(’(I3(A OL’1(P/A IzH(O(zH(zPA BFA PN(I)A 'B’LPIBzA 2NI’NA I/A L’NI(3(HA RjA ?BHIFjIzDA PN(A
/PLzHL)HA -–A IzA LA ’()PLIzA 2Lj“A -PA I/A H(/IDz(HA /S’NA PNLPA ?BRI'(A S/()/A ’LzA ?B3(A F)B?A Bz(A z(P2B)1A PBA LzBPN()A 2NI'(A

g
?LIzPLIzIzDALAO()?Lz(zPA-–ALHH)(//“A
io led
3.3.1(a) Need for Mobile IP

 UBASzH()/PLzHAPN(Az((HAFB)A4BRI'(A-–5A'(PAS/AFI)/PASzH()/PLzHAPN(AO)BR'(?A2IPNAPN(AIzP()z(PAO)BPB’B'A0-–+“A
ic ow

 -zAPN(A/PLzHL)HA-–5ALANB/P>/A-–ALHH)(//AI/A?LH(ASOABFALAz(P2B)1AIH(zPIFI()ALzHALANB/PAIH(zPIFI()“AUNI/Az(P2B)1AIH(zPIFI()A
n
/O(’IFI(/APN(Az(P2B)1APN(ANB/PAI/ALPPL’N(HAPB“A
bl kn

 6A NB/PA /(zH/A LzA -–A –L’1(PA 2IPNA PN(A N(LH()A ’BzPLIzIzDA LA H(/PIzLPIBzA LHH)(//5A ?LH(A SOA BFA IP/A z(P2B)1A IH(zPIFI()A LzHA
H(/PIzLPIBzAIH(zPIFI()“AA
at
Pu ch

 6/A'BzDAL/APN(A)(’(I3()A)(?LIz/A’Bzz(’P(HAPBAIP/AB)IDIzL'Az(P2B)15AIPA’LzA)(’(I3(AOL’1(P/“AA
 9B2A/SOOB/(APN(A)(’(I3()AHI/’Bzz(’P/AIP/('FAF)B?AIP/AB)IDIzL'Az(P2B)1ALzHAUBIz/ALzBPN()Az(P2B)15APN(A)(’(I3()A2BS'HA
Te

z(3()A )(’(I3(A LzjA OL’1(P/“A UNI/A I/A R(’LS/(5A PN(A -–A LHH)(//A BFA PN(A NB/PA I/A zB2A PBOB'BDI’L''jA zBPA ’B))(’PA IzA PN(A z(2A
z(P2B)1“A
 =(z’(5ALANB/PAz((H/ALA/Ba’L''(HAPBOB'BDI’L''jA’B))(’PALHH)(//ALzHA4BRI'(A-–A/PLzHL)HA2L/AH(3('BO(H“A

3.3.1(b) Goals/Requirements of Mobile IP


.MU – Dec. 18.

Q. What is the goal of Mobile IP? (Dec. 18, 5 Marks)

89x 0HK,Hv33xWv/UNvxD47UHULzxC3UfDxEFU3LUfDxWv/UNvx2yy5v33x
A 4BRI'(AH(3I’(/A’LzA’BzPIzS(APBAS/(APN(I)A(:I/PIzDA-–ALHH)(//A(3(zA2NI'(A’NLzDIzDAPN(I)AL’PSL'A'B’LPIBzAB)APN(I)AB)IDIzL'A
z(P2B)1“AA
G9x H4xKyyULU4fKHx2yy5v33UfDx45x-4gLUfDx-vGgU5vEvfL3x
o UN(A /L?(A B3()L''A /’N(?(A FB)A LHH)(//IzDA LzHA )BSPIzDA ?S/PA R(A ?LIzPLIz(HA L/A IzA )(DS'L)A -–“A UN(A B2z()A BFA (L’NA
H(3I’(A?S/PAL//IDzA-–ALHH)(//(/AIzAPN(AS/SL'A2Lj“A
o 9(2A)BSPIzDA)(‘SI)(?(zP/A?S/PAzBPAR(AO'L’(HABzAPN(AIzP()z(P2B)15A'I1(ANB/Pa/O(’IFI’A)BSP(/“AA
I9x kfLv54Jv5K7UHULzx
A 4BRI'(A-–AH(3I’(/A’LzA’BzPIzS(APBA’B??SzI’LP(A2IPNABPN()A-–AH(3I’(/APNLPANL3(AzBAIH(LALRBSPANB2A4BRI'(A-–A2B)1/5A
LzHA3I’(a3()/L“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-7 Mobile Networking

K9x #5Kf3JK5vfNzx4LxMKzv53x
o 6''A’NLzD(/A?LH(ARjA4BRI'(A-–A?S/PA)(?LIzA’BzFIz(HAPBAPN(Az(P2B)1A'Lj()“AA
o GPN()A'Lj()/A'I1(APN(AP)Lz/OB)PA'Lj()ALzHALOO'I’LPIBz/A?S/PAR(ALR'(APBAFSz’PIBzAIzAPN(A/L?(A2LjAL/A)(DS'L)A-–3^“A
N9x -v3L5KUfUfDxOK5y,K5vxpPKfDv3x
o 6AF(2A’NLzD(/AL)(A)(‘SI)(HAPBAPN(A)BSP()/APNLPAL)(AS/(H5ARjAPN(A?BRI'(AH(3I’(ALzHAPN(A?BRI'(AH(3I’(A/BFP2L)(AFB)A
4BRI'(A-–“AA
o UN(/(A’NLzD(/A?S/PAR(A1(OPAPBALA?IzI?S?“AGPN()AH(3I’(/5ANB2(3()5A'I1(A)BSP()/AR(P2((zAPN(ABz(/ABzAPN(ANB?(A
LzHA3I/IP(HAz(P2B)1/5AHBAzBPAz((HA’NLzD(/“A
Q9x BNKHK7UHULzx
o 4BRI'(A-–A?S/PAL''B2ALzjAH(3I’(APBA’NLzD(AF)B?ABz(Az(P2B)1APBALzBPN()Az(P2B)15ALzHAPNI/A?S/PAR(A/SOOB)P(HAFB)A
LzAL)RIP)L)jAzS?R()ABFAH(3I’(/“AA

e
o UN(A /’BO(A BFA PN(A ’Bzz(’PIBzA ’NLzD(A ?S/PA R(A D'BRL'“A QB)A (:L?O'(5A jBSA ’LzA S/(A jBS)A 'LOPBOA F)B?A LzA BFFI’(A IzA

g
*BzHBzALzHAL'/BAS/(AIPAIFAjBSA?B3(APBA4S?RLI“A
io led
R9x BvNg5ULzx
A 4BRI'(A -–A ?S/PA Iz’'SH(A LSPN(zPI’LPIBzA O)B’(HS)(/A PBA O)(3(zPA SzLSPNB)IV(HA H(3I’(/A F)B?A ’LS/IzDA L’’(//IzDA PN(A
ic ow

z(P2B)1ALzHAPN()(RjA’LS/IzDAO)BR'(?/“A

3.3.1(c) Basic Terminology


n
bl kn

. MU – May 12, Dec. 16)

Q. List the entities of mobile IP and describe data transfer from a mobile node to a fixed node and vice versa.
at
Pu ch

(May 12, Dec. 16, 10 Marks)


Te

89x D47UHvxH4yvxhDH6x
A 6zA (zHa/j/P(?A B)A LA )BSP()A 0zBH(+A PNLPA ’LzA ’NLzD(A IP/A OBIzPA BFA ’Bzz(’PIBzA PBA PN(A z(P2B)1A 2IPNBSPA ’NLzDIzDA IP/A -–A
LHH)(//“x
G9xx p455v3J4fyvfLxH4yvxhpH6x
A -PAI/APN(A’B??SzI’LPIBzAOL)Pz()AFB)APN(A?BRI'(AzBH(“AUN(A79A’LzAR(AFI:(HAB)A?BRI'(“x
I9x O4EvxHvL,45SxhOH6x
A UN(ANB?(Az(P2B)1AI/APN(A/SRz(PAPBA2NI’NAPN(A49AR('BzD/APBA2IPNA)(/O(’PAPBAIP/A-–ALHH)(//“x
K9xx 045vUDfxHvL,45Sxh0H6x
A UN(AFB)(IDzAz(P2B)1AI/APN(A’S))(zPA/SRz(PAPN(A49A3I/IP/ALzHA2NI’NAI/AzBPAPN(ANB?(Az(P2B)1“x
N9xx 045vUDfx2DvfLxh026x
o UN(AQ6AI/APjOI’L''jALA)BSP()AIzAPN(AFB)(IDzAz(P2B)1APBA2NI’NAPN(A?BRI'(AzBH(AI/A’S))(zP'jALPPL’N(H“AA
o UN(AQ6AS/SL''jAI?O'(?(zP/A4BRI'(A-–AFSz’PIBz/A'I1(AO)B3IHIzDA/(’S)IPjA/()3I’(/APBAPN(A49AHS)IzDAIP/A3I/IPAPBAPN(AQ9A
LzHAFB)2L)HIzDAPN(AHLPLD)L?/A)(’(I3(HAF)B?APN(ANB?(ALD(zPAPBAPN(A49“AA
o -PAL'/BA/SOOB)P/APN(A/NL)IzDABFA?BRI'IPjAIzFB)?LPIBzA/BAPNLPA4BRI'(A-–ABO()LP(/A/?BBPN'j“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-8 Mobile Networking

Q9x O4Evx2DvfLxhO26x
o =6AI/ALA/j/P(?AIzAPN(ANB?(Az(P2B)1ABFAPN(A49“A
o =6A ’LzA R(A I?O'(?(zP(HA BzA )BSP()A PNLPA I/A )(/OBz/IR'(A FB)A PN(A NB?(A z(P2B)15A B)A L'P()zLPI3('j5A IPA ’LzA R(A
I?O'(?(zP(HABzALAzBH(AIzALANB?(A/SRz(P“A
o =6A?LIzPLIz/ALA'B’LPIBzA)(DI/P)jAI“(“AIPAI/AIzFB)?(HABFAPN(A49>/A'B’LPIBz“A
o UN(APSzz('AFB)AOL’1(P/APB2L)H/APN(A49A/PL)P/ALPAPN(A=6“AA
R9x pK5vx4Lx2yy5v33xhpT26x
o UN(A7G6AH(FIz(/APN(A’S))(zPA'B’LPIBzABFAPN(A49“A
o –L’1(PAH('I3()jAPB2L)H/APN(A49AI/AHBz(AS/IzDALAPSzz('“A
o 6''A-–A–L’1(P/A/(zPAPBAPN(A49AL)(AH('I3()(HAPBAPN(A7G6“A
UN()(AL)(AWAHIFF()(zPAOB//IRI'IPI(/AFB)APN(A'B’LPIBzABFAPN(A7G6“A

e
hU6x 045vUDfx2DvfLxpT2x

g
A UN(A7G6A’BS'HAR(APN(A-–ALHH)(//ABFAPN(AQ6“A-zAPNI/A’L/(5APN(APSzz('A(zHOBIzPAI/APN(AQ6“AUN(AQ6AFB)2L)H/AOL’1(P/APBA
io led
PN(A49“A
hUU6x p4UxH4NKLvyxpT2x
ic ow

A -FAPN(A49AL’‘SI)(/ALAP(?OB)L)jA-–ALHH)(//APBAL’PAL/APN(A7G65APN(A7G6AI/A/LIHAPBAR(A’BAbA'B’LP(H“AUNI/ALHH)(//AI/ALA
PBOB'BDI’L''jA’B))(’PALHH)(//ALzHAPN(A49>/APBOB'BDI’L''jA’B))(’PA-–ALHH)(//AI/AzB2APN(APSzz('A(zHOBIzP“A

n
-zAQID“AY“Y“X5ALzA(:L?O'(Az(P2B)1AI/A/NB2z“AA
bl kn

 6A79A’Bzz(’P/APBAPN(AIzP()z(PA3ILALA)BSP()“A6zBPN()A)BSP()AI?O'(?(zP/APN(A=65APNS/A’Bzz(’PIzDAPN(ANB?(Az(P2B)1ALzHA
PN(AIzP()z(P“AA
at


Pu ch

UN(AFB)(IDzAz(P2B)1>/A)BSP()AL’P/AL/APN(AQ6“A7S))(zP'j5APN(A49AI/AIzAPN(AFB)(IDzAz(P2B)1“AUN(APSzz('>/A/PL)PAOBIzPAI/ALPA
=6ALzHA(zHAOBIzPAI/ALPAQ65AFB)APN(AOL’1(P/AHI)(’P(HAPB2L)H/APN(A49“A
Te

Fig. 3.3.1 : An example mobile IP network

Note : Tunnel for a packet sent to the MN always starts at HA and ends at either FA or MN depending upon the mode
of COA. If the COA is foreign agent COA, then the tunnel ends at FA. If the COA is co-located, then the tunnel
ends at MN.
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-9 Mobile Networking

3.3.2 IP Packet Delivery


(MU – May 12, Dec. 13, Dec. 16, Dec. 18.)

Q. List the entities of mobile IP and describe data transfer from a mobile node to a fixed node and vice versa.
(May 12, Dec. 16, 10 Marks)
Q. Explain the IP Packet Delivery with respect to mobile IP. (Dec. 13, 5 Marks)
Q. How is packet delivery achieved to and from mobile node? (Dec. 18, 5 Marks)

7Bz/IH()AHLPLAP)Lz/?I//IBzAR(P2((zA79ALzHA49“AUN()(AL)(AFBS)A/’(zL)IB/“A
X“A 79AI/ALAFI:(HAzBH(ALzHAHLPLAI/APBAR(AP)Lz/F())(HAF)B?A79APBA49“A
W“A 79AI/ALAFI:(HAzBH(ALzHAHLPLAI/APBAR(AP)Lz/F())(HAF)B?A49APBA79“A
Y“A 79AI/ALA?BRI'(AzBH(ALzHAHLPLAI/APBAR(AP)Lz/F())(HAF)B?A79APBA49“A
^“A 79AI/ALA?BRI'(AzBH(ALzHAHLPLAI/APBAR(AP)Lz/F())(HAF)B?A49APBA79“A

e
A QID“AY“Y“WA/NB2/APN(AOL’1(PAH('I3()jAPBALzHAF)B?A49“A

g
io led
ic ow
n
Fig. 3.3.2 : Packet delivery to and from the mobile node
bl kn

hK6x WKLKxL5Kf3Lv5xL54Ex0UFvyxpHxL4xDHx
at

BLvJx8xVA CN(zAPN(A79A2LzP/APBA/(zHALzA-–AOL’1(PAPBAPN(A495APN(A79AHB(/z>PA1zB2ALRBSPAPN(A49>/A’S))(zPA'B’LPIBzA
Pu ch

LzHA/(zH/APN(AOL’1(PAPBAPN(A-–ALHH)(//ABFA49“A=()(5APN(A/BS)’(ALHH)(//ABFAPN(AOL’1(PAI/A79>/A-–ALHH)(//ALzHA
PN(AH(/PIzLPIBzALHH)(//AI/A49>/AB)IDIzL'A-–ALHH)(//“A
Te

BLvJxGxVA UN(AOL’1(PAI/A)BSP(HA3ILAPN(A/PLzHL)HA)BSPIzDA?(’NLzI/?ABFAPN(A-zP()z(PAPBAPN(A)BSP()A)(/OBz/IR'(AFB)A49>/A
NB?(Az(P2B)1“AUN(ANB?(Az(P2B)1>/A)BSP()AI?O'(?(zP/APN(A=6“AA
BLvJxIxVA UN(A=6AzB2AH(P(’P/APNLPAPN(A49AI/A’S))(zP'jAzBPAIzAIP/ANB?(Az(P2B)1“A-z/P(LHABFAFB)2L)HIzDAPN(AOL’1(PAIzPBA
PN(A/SRz(PAL/AS/SL'5APN(AOL’1(PAI/A(z’LO/S'LP(HALzHAI/APSzz('(HAPBAPN(A7G6ABFAPN(A49“A6Az(2AN(LH()AI/ALHH(HA
IzA F)BzPA BFA PN(A B'HA -–A N(LH()A IzHI’LPIzDA 49>/A 7G6A L/A PN(A z(2A H(/PIzLPIBzA LzHA =6A L/A PN(A /BS)’(A BFA PN(A
(z’LO/S'LP(HAOL’1(P“A
BLvJxKxVA Q6AzB2AH(’LO/S'LP(/APN(AOL’1(PALzHAFB)2L)H/APN(AB)IDIzL'AOL’1(PA2IPNA79AL/A/BS)’(ALzHA49AL/AH(/PIzLPIBz“AAA
h76x WKLKxL5Kf3Lv5xL54ExDHxL4xLUFvyxpHx
BLvJx8xVx UN(A OL’1(PA I/A /(zPA RjA PN(A 49A 2IPNA IP/A B)IDIzL'A -–A LHH)(//A L/A PN(A /(zH()A LzHA PN(A 79>/A -–A LHH)(//A L/A PN(A
)(’(I3()“A
BLvJxGxVx UN(A Q6A )(/OBz/IR'(A FB)A PN(A FB)(IDzA z(P2B)1A L’P/A L/A LA H(FLS'PA )BSP()A LzHA FB)2L)H/A PN(A OL’1(PA PBA PN(A )BSP()A
)(/OBz/IR'(AFB)APN(A79A0UN(A)BSP()AI/A'B’LP(HAIzA79>/ANB?(Az(P2B)1+“A
BLvJxIxVx UN(A)BSP()A)(/OBz/IR'(AFB)A79APN(zAFB)2L)H/APN(AOL’1(PAPBA79“A
hN6x WKLKxL5Kf3Lv5xL54ExD47UHvxpHxL4xLPvxDHx
BLvJx8xVx UN(A79A/(zH/APN(AOL’1(PA2IPNAIP/AB)IDIzL'A-–ALHH)(//AL/APN(A/BS)’(ALHH)(//ALzHA49>/AB)IDIzL'A-–ALHH)(//AL/APN(A
H(/PIzLPIBzALHH)(//“A
BLvJxGxVx ;Iz’(A PN(A 79A I/A L'/BA IzA PN(A 3I/IPIzDA z(P2B)15A PN(A Q6A )(/OBz/IR'(A FB)A PN(A 79A /(zH/A PN(A OL’1(PA PBA PN(A )BSP()A
)(/OBz/IR'(AFB)APN(ANB?(Az(P2B)1ABFA49“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-10 Mobile Networking

BLvJxIxVx UN(A=6ABFA49A)(L'IV(/APNLPAPN(A49AI/AzBPAIzAPN(ANB?(Az(P2B)1“A-PAPN(zA(z’LO/S'LP(APN(A)(’(I3(HAOL’1(PALzHA
FB)2L)H/AIPAPBAPN(A7G6A2IPNA/BS)’(ALHH)(//AL/A=6>/A-–ALHH)(//ALzHAPN(AH(/PIzLPIBzALHH)(//AL/A7G6“A
BLvJxKxVx UN(AFB)(IDzALD(zPA0Q6+ABFAPN(A49A)(’(I3(/APNI/AOL’1(P5AH(’LO/S'LP(/AIPALzHAFB)2L)H/AIPAPBAPN(A49“A
hy6x WKLKxL5Kf3Lv5xL54ExDHxL4xKxE47UHvxpHxx
BLvJx8xVx UN(A 49A /(zH/A PN(A OL’1(PA L/A S/SL'A 2IPNA IP/A B2zA FI:(HA -–A LHH)(//A L/A LA /BS)’(A LHH)(//A LzHA 79>/A LHH)(//A L/A
H(/PIzLPIBz“A
BLvJxGxVx UN(AFB)(IDzALD(zPA0Q6+A)BSP()A)(/OBz/IR'(AFB)A49A/(zH/APNI/AOL’1(PAPBAPN(ANB?(Az(P2B)1ABFAPN(A79“A
BLvJxIxVx UN(A=6A)(/OBz/IR'(AFB)A79A)(’(I3(/APN(AOL’1(PALzHA)(L'IV(/APNLPAPN(A79AI/AzBPAIzAPN(ANB?(Az(P2B)1ALzHAN(z’(A
PSzz('APN(AOL’1(PAPB2L)H/A7G6ABFAPN(A79“A
BLvJxKxVx UN(AQ6A)(/OBz/IR'(AFB)A79A)(’(I3(/APN(AOL’1(P5AH(’LO/S'LP(/AIPALzHAFB)2L)H/AIPAPBAPN(A79“A
A ;B?(A LHHIPIBzL'A ?(’NLzI/?/A L)(A z((H(HA FB)A ?BRI'(A -–A PBA 2B)1“A UN(A FB''B2IzDA /(’PIBzA HI/’S//(/A LRBSPA PN(/(A
(zNLz’(?(zP/“A

e
3.3.3 Agent Advertisement and Discovery

g
io led .MU - May 18.

Q. Explain agent advertisement and discovery registration in mobile networks. (May 18, 5 Marks)

 CN(zALA?BRI'(AzBH(AI/AFI)/PAPS)z(HABz5AIPA’LzA(IPN()AR(AIzAIP/ANB?(Az(P2B)1AB)ALAFB)(IDzAz(P2B)1“A

ic ow

=(z’(5APN(AFI)/PAPNIzDAPNLPAIPA?S/PAHBAI/APBAH(P()?Iz(A2N()(AIPAI/5ALzHAIFAIPAI/AzBPALPANB?(5A?S/PAR(DIzAPN(AO)B’(//ABFA
/(PPIzDASOAHLPLD)L?AFB)2L)HIzDAF)B?AIP/ANB?(Az(P2B)1APBAPN(A’S))(zPA'B’LPIBz“AA

n
UNI/AO)B’(//AI/AL’’B?O'I/N(HARjA’B??SzI’LPIzDA2IPNALA'B’L'A)BSP()A/()3IzDAL/ALzALD(zPA0Q6+5APN)BSDNAPN(AO)B’(//A’L''(HA
bl kn

"#$%&!'()*+,$-.“AA
 6D(zPAHI/’B3()jAO)B’(//A?L1(/AIPAOB//IR'(AFB)ALzA49APBAH(P()?Iz(A[A
at
Pu ch

o CN(PN()AIPAI/A’Bzz(’P(HAPBAIP/ANB?(Az(P2B)1AB)APBALAFB)(IDzAz(P2B)1“A
o CN(PN()AIPANL/A’NLzD(HAIP/AOB/IPIBz“A
Te

o UBABRPLIzALA7G6A2N(zAIPA’NLzD(/APBALAHIFF()(zPAFB)(IDzAz(P2B)1“A
6FP()A ?B3IzDA PBA LzBPN()A z(P2B)1A Bz(A IzIPIL'A O)BR'(?A I/A NB2A PBA FIzHA LA FB)(IDzA LD(zP“A QB)A PNI/A OS)OB/(5A ?BRI'(A -–A
H(/’)IR(/AP2BA?(//LD(/[A!"#$%&!'(#)%*+#,#$%ALzHA!"#$%&-./*0*%1%*.$“A

3.3.3(a) Agent Advertisement


(MU – Dec. 15, Dec. 17)

Q. Explain Agent advertisement in Mobile IP. (Dec. 15, 5 Marks)


Q. How the agent could be discovered using Mobile IP? Give the overlay of agent advertisement packet which includes
mobility extension. (Dec. 17, 10 Marks)

 =B2AHB(/ALA?BRI'(AzBH(A?L1(ABSPAPNLPAIPANL/A’NLzD(HAz(P2B)1A)(’(zP'j!AUNI/AI/AL’NI(3(HARjA?(//LD(/AF)B?ANB?(A
LD(zP/ALzHAFB)(IDzALD(zP/“A
 =B?(ALD(zP/ALzHAFB)(IDzALD(zP/ALH3()PI/(APN(I)AO)(/(z’(ALzHA/()3I’(/AS/IzDA?(//LD(/A’L''(HA1"#$%&1'(#)%*+#,#$%“AA
 6D(zPALH3()PI/(?(zPA?(//LD(/AL)(AO()IBHI’L''jAR)BLH’L/PALzHA’BzPLIzAPN(AFB''B2IzDAH(PLI'/A
o *I/PABFA7G6/AL3LI'LR'(AFB)APN(A49“A
o ;O(’IL'A F(LPS)(/A LzHA /()3I’(/A O)B3IH(HA RjA Q6A /S’NA L/A HIFF()(zPA PjO(/A BFA (z’LO/S'LPIBzA L3LI'LR'(“A QB)A (:L?O'(5A
?IzI?L'A(z’LO/S'LPIBzAB)AD(z()I’A(z’LO/S'LPIBz“A
o 6''B2/A49APBAH(P(’PAPN(Az(P2B)1AzS?R()ALzHA’BzD(/PIBzAH(PLI'/ABFALA'Iz1APBAPN(A-zP()z(P“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-11 Mobile Networking

 QB)ALD(zPALH3()PI/(?(zPA-74–A?(//LD(/A2IPNA/B?(A?BRI'IPjA(:P(z/IBzAL)(AS/(H“AUN(ALD(zPALH3()PI/(?(zPAOL’1(PAI/A
/NB2zAIzAQID“AY“Y“Y“AA

g e
Fig. 3.3.3 : Agent advertisement message
io led
 UN(A3L)IBS/AFI('H/ABFA-74–AOL)PABFAPN(AOL’1(PAL)(A[A
o #zJvxVA-PAI/A/(PAPBAcAFB)A-74–“A
ic ow

o p4yvx VA ;(PA PBA d5A IFA PN(A LD(zPA L'/BA )BSP(/A P)LFFI’A F)B?A zBza?BRI'(A zBH(“A 6zHA /(PA PBA X_A IFA PN(A LD(zPA Bz'jA )BSP(/A
?BRI'(AP)LFFI’“A
n
o VKyy5v33v3x VA -zHI’LP(/A PN(A zS?R()A BFA LHH)(//(/A LH3()PI/(HA 2IPNA PNI/A OL’1(P“A UN(A L’PSL'A LHH)(//(/A FB''B2A L/A
bl kn

/NB2zAIzAQID“AY“Y“Y“AA
o MULvLUEvxVAV(zBP(/APN(A'(zDPNABFAPI?(AFB)A2NI’NAPN(ALH3()PI/(?(zPAI/A3L'IHA
at
Pu ch

o O5vLv5vfNvx Hv/vHx VA –)(F()(z’(A FB)A (L’NA )BSP()A LHH)(//A I/A /O(’IFI(H“A -PA N('O/A LA zBH(A PBA ’NBB/(A PN(A )BSP()“A UN(A
’NB/(zA)BSP()A2I''AL’PAL/ALzAQ6AFB)APN(A49“A
Te

 UN(A3L)IBS/AFI('H/ABFA?BRI'IPjA(:P(z/IBzAOL)PAL)(A[A
o #zJvxVx-PAI/A/(PAPBAX_AFB)A)BSPIzDABz'jA?BRI'(AOL’1(P/“x
o MvfDLPxVx*(zDPNAH(O(zH/ABzAPN(AzS?R()ABFA7G6/AO)B3IH(HA2IPNAPN(A?(//LD(ALzHAIPAI/A(‘SL'APBA_AeA^AfA0zS?R()ABFA
LHH)(//(/+“x
o BvGgvfNvxfgE7v5xVx-PAIzHI’LP(/APN(APBPL'AzS?R()ABFALH3()PI/(?(zP/A/(PA/Iz’(AIzIPIL'IVLPIBz“x
o -vDU3L5KLU4fxHULvLUEvxVxA;O(’IFI(/APN(A?L:I?S?A'IF(PI?(AIzA/(’BzH/ALAzBH(A’LzA)(‘S(/PAHS)IzDA)(DI/P)LPIBz“x
 UN(AFB''B2IzDARIP/A/O(’IFjAPN(A’NL)L’P()I/PI’/ABFALzALD(zPA[A
o -x7ULxVx-PAI/APN(A)(DI/P)LPIBzARIPALzHAIzHI’LP(/AIFALA)(DI/P)LPIBzA2IPNAPNI/ALD(zPAI/A)(‘SI)(HA(3(zA2N(zAS/IzDAA
’Ba'B’LP(HA7G6ALPAPN(A49“A
o Wx7ULxVAUNI/ARIPAI/A/(PAIFAPN(ALD(zPAI/A’S))(zP'jAPBBARS/jAPBAL’’(OPAz(2A)(DI/P)LPIBz“A
o Ox7ULxVAUNI/ARIPAI/A/(PAIFAPN(ALD(zPABFF()/A/()3I’(/AL/ALANB?(ALD(zP“A
o 0x7ULxVAUNI/ARIPAI/A/(PAIFAPN(ALD(zPABFF()/A/()3I’(/AL/AFB)(IDzALD(zPABzAPN(A'Iz1A2N()(APN(ALH3()PI/(?(zPANL/AR((zA
/(zP“A
o DxKfyxXx7ULxVx4ALzHAgARIP/A/O(’IFjAPN(A?(PNBHABFA(z’LO/S'LPIBzAS/(HAFB)APN(APSzz('“A4AFB)A?IzI?L'A(z’LO/S'LPIBzA
LzHAgAFB)AD(z()I’A)BSPIzDA(z’LO/S'LPIBz“A
o 5x7ULxVAUNI/AI/A)(/()3(HALzHA/(PAPBAV()B“AA
o #x7ULxVA-PAIzHI’LP(/APNLPA)(3()/(APSzz(''IzDAI/A/SOOB)P(HARjAPN(AQ6“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-12 Mobile Networking

3.3.3(b) Agent Solicitation


(MU – Dec. 15, Dec. 17)

Q. Explain Agent advertisement in Mobile IP. (Dec. 15, 5 Marks)


Q. How the agent could be discovered using Mobile IP? Give the overlay of agent advertisement packet which includes
mobility extension. (Dec. 17, 10 Marks)

 6D(zPA/B'I’IPLPIBzA?(//LD(/AL)(A/(zPARjA49AIP/('FAPBA/(L)’NALzAQ6AIzABz(ABFAPN(AFB''B2IzDA’BzHIPIBz/“A
o CN(zAzBALD(zPALH3()PI/(?(zP/AL)(AO)(/(zPAB)A
o UN(AIzP()aL))I3L'API?(ABFALH3()PI/(?(zPA?(//LD(AI/APBBANIDNAB)5A
o 6zA49ANL/AzBPA)(’(I3(HALA7G6ARjABPN()A?(Lz/“AA
 UBA)(HS’(APN(A’BzD(/PIBzABzAPN(A'Iz1APN(A49A’LzA/(zHABSPAPN)((A/B'I’IPLPIBz/5AO()A/(’BzH5AL/A/BBzAL/AIPA(zP()/ALAz(2A
z(P2B)1“A

e
6zjALD(zPAPNLPA)(’(I3(/APN(A/B'I’IPLPIBzA?(//LD(5AP)Lz/?IP/ALA/IzD'(ALD(zPALH3()PI/(?(zPAIzA)(/OBz/(“A-FALAzBH(AHB(/A
zBPA)(’(I3(ALzALz/2()APBAIP/A/B'I’IPLPIBz/5AIPA?S/PAH(’)(L/(APN(A)LP(ABFA/B'I’IPLPIBz/A(:OBz(zPIL''jAPBAL3BIHAF'BBHIzDAPN(A

g
z(P2B)1“A io led
 6FP()APN(/(A/P(O/ABFALH3()PI/(?(zP/ALzHA/B'I’IPLPIBz/5APN(A49A’LzAzB2A)(’(I3(A7G65A(IPN()ABz(AFB)ALzAQ6AB)ALAA
’Ba'B’LP(HA7G6“AA
 9B2APN(Az(:PA/P(OAI/5APN(A49ANL/APBA)(DI/P()A2IPNAPN(A=6AIFAPN(A49AI/AIzALAFB)(IDzAz(P2B)1“A
ic ow

3.3.4 Registration
(MU – Dec. 13)
n
bl kn

Q. Explain registration with respect to mobile IP. (Dec. 13, 5 Marks)

 6FP()ALD(zPAHI/’B3()jAI/AHBz(ARjALA?BRI'(AzBH(5AIPA1zB2/A2N(PN()AIPAI/AIzAIP/ANB?(Az(P2B)1AB)AIzALAFB)(IDzAz(P2B)1“A-FAIPA
at
Pu ch

I/A IzA IP/A NB?(A z(P2B)15A IPA ’B??SzI’LP(/A 'I1(A LA )(DS'L)A -–A H(3I’(5A RSPA IFA IPA NL/A ?B3(HA PBA LA FB)(IDzA z(P2B)15A IPA ?S/PA
L’PI3LP(A4BRI'(A-–“A

Te

QB)AL’PI3LPIzDA4BRI'(A-–5ALAO)B’(//A’L''(HANB?(ALD(zPA)(DI/P)LPIBz5AB)A/I?O'jA)(DI/P)LPIBzAI/AS/(H“AQB)A)(DI/P)LPIBz5APN(A
49A (:’NLzD(/A IzFB)?LPIBzA LzHA Iz/P)S’PIBz/A 2IPNA PN(A NB?(A LD(zP“A UN(A ?LIzA OS)OB/(A BFA )(DI/P)LPIBzA I/A PBA D(PA PN(A
4BRI'(A-–A2B)1IzD“AAUN(A?BRI'(AzBH(A?S/PAIzFB)?APN(ANB?(APNLPAIPAI/ABzALAFB)(IDzAz(P2B)1A/BAPNLPAL''AHLPLD)L?/A?S/PA
R(AFB)2L)H(HAPBAIP/AFB)(IDzAz(P2B)1“AA
 -PA L'/BA ?S/PA IzFB)?A PN(A NB?(A LD(zPA LRBSPA IP/A ’L)(A BFA LHH)(//A 07G6+A /BA PN(A NB?(A LD(zPA ’LzA /(zHA PN(A FB)2L)H(HA
HLPLD)L?/ALOO)BO)ILP('j“A
 CN(zA)(DI/P)LPIBzAI/AO()FB)?(H5APN(ANB?(ALD(zP5AIzAPS)z5Az((H/APBA’B??SzI’LP(A3L)IBS/APjO(/ABFAIzFB)?LPIBzARL’1APBA
PN(A?BRI'(AzBH(“AA
 X(DI/P)LPIBzA’LzAR(AHBz(AIzAP2BAHIFF()(zPA2Lj/AH(O(zHIzDABzAPN(A'B’LPIBzABFAPN(A7G6“A
x 89x pT2xKLxLPvx02xVx-zAPNI/A’L/(5A)(DI/P)LPIBzAI/AHBz(AL/A/NB2zAIzAQID“AY“Y“^“AA
 UN(A49A/(zH/AIP/A)(DI/P)LPIBzA)(‘S(/PAPBAPN(AQ6A0’BzPLIzIzDA7G6+“AA
 UN(AQ6AFB)2L)H/APN(A)(‘S(/PAPBAPN(A=6“A
 UN(A=6AzB2A/(PSOALA?BRI'IPjARIzHIzDA’BzPLIzIzDAPN(A?BRI'(AzBH(>/ANB?(A-–ALHH)(//5AAPN(A’S))(zPA7G6ALzHAPN(A
'IF(PI?(ABFAPN(A)(DI/P)LPIBz“AA
 UN(A )(DI/P)LPIBzA (:OI)(/A LSPB?LPI’L''jA LFP()A PN(A 'IF(PI?(A LzHA I/A H('(P(H“A ;BA PN(A 49A /NBS'HA )()(DI/P()A R(FB)(A
(:OI)LPIBz“A
 6FP()A?BRI'IPjARIzHIzD5APN(A=6A/(zH/A)(O'jA?(//LD(ARL’1APBAPN(AQ6A2NI’NAFB)2L)H/AIPAPBA49“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-13 Mobile Networking

g e
io led
ic ow

Fig. 3.3.4 : Registration procedure of mobile node via FA (COA at FA)


n
bl kn

x G9x pT2xU3xN4UH4NKLvyxVA-zAPNI/A’L/(5APN(A)(DI/P)LPIBzAI/A3()jA/I?O'(ALzHA/NB2zAIzAQID“AY“Y“<A
 UN(A49A?LjA/(zHA)(DI/P)LPIBzA)(‘S(/PAHI)(’P'jAPBAPN(A=6ALzHA3I’(A3()/L“A
at
Pu ch

 -FA PN(A 49A )(’(I3(HA LzA LD(zPA LH3()PI/(?(zPA F)B?A PN(A Q65A IPA /NBS'HA )(DI/P()A 3ILA PNI/A Q6A IFA PN(A XA RIPA I/A /(PA IzA PN(A
LH3()PI/(?(zP“A
Te

Fig. 3.3.5 : Registration procedure of mobile node via HA (Co- located COA)
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-14 Mobile Networking

1. Registration request message

Fig. 3.3.6 : Registration request message

A UN(A)(DI/P)LPIBzA)(‘S(/PA?(//LD(AI/A/NB2zAIzAQID“AY“Y“_ALzHA3L)IBS/AFI('H/AL)(AH(/’)IR(HAL/AFB''B2/A[A
o #zJvxVx-PAI/A/(PAPBAXAFB)A)(DI/P)LPIBzA)(‘S(/P“x
o

e
Bx7ULxVx-FA/(P5AIzHI’LP(/APNLPAPN(A49AL'/BA2LzP/APN(AQ6APBA)(PLIzAO)IB)IPjARIzHIzD“x
o

g
Wx7ULxVx-FA/(P5AIzHI’LP(/APNLPALzA49AL'/BA2LzP/APBA)(’(I3(APN(AR)BLH’L/PAOL’1(P/A2NI’NANL3(AR((zA)(’(I3(HARjAPN(A
=6AIzANB?(Az(P2B)1“x
io led
o Wx7ULxVx-FA/(P5AIPAIzHI’LP(/APNLPAPN(AH(a’LO/S'LPIBzABFAOL’1(P/AI/AO()FB)?(HARjAPN(A49“x
o MULvLUEvxVxV(zBP(/APN(A3L'IHIPjABFAPN(A)(DI/P)LPIBzAIzA/(’BzH/“x
o
ic ow

O4EvxKyy5v33xVxUN(ANB?(ALHH)(//AI/APN(AFI:(HA-–ALHH)(//ABFAPN(A49“x
o O4EvxKDvfLxVA-PAI/APN(A-–ALHH)(//ABFAPN(ANB?(ALD(zP“x
n
o kyvfLULUNKLU4f3x VA _^A RIPA IH(zPIFI’LPIBzA I/A D(z()LP(HA RjA 49A PBA IH(zPIFjA LA )(‘S(/PA LzHA ?LP’NA IPA 2IPNA )(DI/P)LPIBzA
bl kn

)(O'I(/“x
2. Registration reply message
at
Pu ch
Te

Fig. 3.3.7 : Registration reply message

A UN(A)(DI/P)LPIBzA)(O'jA?(//LD(AI/A/NB2zAIzAQID“AY“Y“`ALzHA3L)IBS/AFI('H/AL)(AH(/’)IR(HAL/AFB''B2/A[x
 #zJvxVx-PAI/A/(PAPBAY“x
 p4yvx Vx 7BH(A IzHI’LP(/A PN(A )(/S'PA BFA PN(A )(DI/P)LPIBzA )(‘S(/P“A -PA /O(’IFI(/A 2N(PN()A PN(A )(DI/P)LPIBzA )(‘S(/PA 2L/A
/S’’(//FS'AB)AH(zI(HARjAPN(A=65AB)AH(zI(HARjAPN(AQ6“A
”:L?O'(A’BH(/AL)(A[A
 X(DI/P)LPIBzA/S’’(//FS'A
o 7BH(AhAdiAA )(DI/P)LPIBzAI/AL’’(OP(HA
o 7BH(AhXiA )(DI/P)LPIBzAI/AL’’(OP(H5ARSPA/I?S'PLz(BS/A?BRI'IPjAAARIzHIzD/ASz/SOOB)P(HA
 X(DI/P)LPIBzAH(zI(HARjAQ6A
o 7BH(AhA_<iA LH?IzI/P)LPI3('jAO)BNIRIP(HA
o 7BH(AhA__iA Iz/SFFI’I(zPA)(/BS)’(/A
o 7BH(AhA_`iA ?BRI'(AzBH(AFLI'(HALSPN(zPI’LPIBzA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-15 Mobile Networking

o 7BH(AhA_jiA NB?(ALD(zPAFLI'(HALSPN(zPI’LPIBzA
o 7BH(AhA_ciAA )(‘S(/P(HA'IF(PI?(APBBA'BzDA
 X(DI/P)LPIBzAH(zI(HARjA=6x
o 7BH(AhAXWciA LH?IzI/P)LPI3('jAO)BNIRIP(HA
o 7BH(AhAXYXiA ?BRI'(AzBH(AFLI'(HALSPN(zPI’LPIBzA
o 7BH(AhAXYYiA )(DI/P)LPIBzAIH(zPIFI’LPIBzA?I/?LP’NA
o 7BH(AhAXY<iA PBBA?LzjA/I?S'PLz(BS/A?BRI'IPjARIzHIzD/A
Extensions
A -PA’BzPLIz/APN(AOL)L?(P()/AFB)ALSPN(zPI’LPIBzALzHA?LjAL'/BA’BzPLIzABPN()AIzFB)?LPIBzAL/A)(‘SI)(H“AA

3.3.5 Tunnelling and Encapsulation


(MU – May 12, Dec. 13, May 14, May 15, Dec. 15, May 16, May 17, Dec. 17)

e
Q. Explain how tunnelling works for mobile IP using IP-in-IP, minimal and generic routing encapsulation respectively.

g
Discuss the advantages and disadvantages of these three methods. (May 12, 10 Marks)
Q. Explain encapsulation with respect to mobile IP. (Dec. 13, 5 Marks)
io led
Q. Describe tunnelling and encapsulation in Mobile IP. (May 14, 5 Marks)
Q. Why is Mobile IP packet required to be forwarded through a tunnel ? (May 15, 5 Marks)
ic ow

Q. Why is mobile IP packet required to be forwarded through tunnel? Explain minimal and generic technique of
encapsulation of mobile IP. (May 15, Dec. 15, May 16, May 17, 10 Marks)
n
Q. Discuss how tunnelling work for mobile IP using IP-In-IP encapsulation. (Dec. 17, 5 Marks)
bl kn

What is tunneling ?
at
Pu ch

 CN(zALA?BRI'(AzBH(A?B3(/ABSPAF)B?ANB?(Az(P2B)15APN(A=6A/(zH/AOL’1(PAPBA7G6ABFAPN(A49A3ILALAPSzz('“AA
 6APSzz('A(/PLR'I/N(/ALA3I)PSL'AOIO(AFB)AHLPLAOL’1(P“A
Te

 -zA4BRI'(A-–5APN(A/PL)PABFAPN(APSzz('AI/APN(ANB?(ALD(zP5A2NI’NAHB(/APN(A(z’LO/S'LPIBz“AUN(A(zHABFAPN(APSzz('AH(O(zH/A
BzA2NLPA/B)PABFA’L)(ABFALHH)(//AI/AR(IzDAS/(HA2NI’NAH(’LO/S'LP(/AHLPLAOL’1(P“AA
 -FAFB)(IDzALD(zPA7G6AI/AS/(HAPN(zAQ6AL’P/AL/APN(APSzz('A(zHAOBIzPALzHAIFA’Ba'B’LP(HA7G6AI/AS/(HAPN(zA49AL’P/AL/APN(A
PSzz('A(zHAOBIzP“A
 -FALA79A2LzP/APBA/(zHAHLPLAOL’1(PAPBA49A0’S))(zP'jAzBPAIzANB?(Az(P2B)1+APN(AHLPLAOL’1(PAI/AFI)/PA(z’LO/S'LP(HALPA=6A
LzHA/(zPA3ILALAPSzz('ALzHAPN(zAH(’LO/S'LP(HALPAQ6ALzHAFIzL''jAFB)2L)H(HAPBAPN(A49“A
 UN(A(z’LO/S'LPIBzAO)B’(//AI/A/NB2zAIzAPN(AQID“AY“Y“j“A

Fig. 3.3.8 : IP encapsulation

o EfNKJ3gHKLU4fA?(Lz/AOSPPIzDALAOL’1(PA?LH(ASOABFALAOL’1(PAN(LH()ALzHAHLPLAIzPBAPN(AHLPLAFI('HABFALAz(2AOL’1(P“A
o WvNKJ3gHKLU4fxI/APN(A)(3()/(AO)B’(//ABFA(z’LO/S'LPIBz5APNLPAI/A)(?B3IzDAPN(AOL’1(PAF)B?APN(AHLPLAOL)PABFALzBPN()A
OL’1(P“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-16 Mobile Networking

 UN(AHI/LH3LzPLD(/ABFA(z’LO/S'LPIBzAL)(A[A
o –L’1(PA/IV(AI/A'L)D()APNLzAPN(AB)IDIzL'AOL’1(P“A
o ”z’LO/S'LPIBzA’LzAR(AHBz(ABz'jA2N(zAPN()(AI/ALzA(zPIPjALPAPN(APSzz('A(zHAPNLPAH(’LO/S'LP(/APN(A-–AHLPLD)L?“A
o 6FP()ALA79>/A-–AHLPLD)L?/AL)(A’LOPS)(H5AHLPLD)L?/APSzz('(HAPBAPN(AQ6AFB)AH('I3()jAPBAPN(A49“AUN(APSzz('IzDA’LzA
R(AHBz(ARjABz(ABFAPN)((A(z’LO/S'LPIBzAP(’NzI‘S(/“AUN(/(AL)(AHI/’S//(HAR('B2“A
Why Tunneling is required?
CNjAHB(/APN(A4BRI'(A-–AOL’1(PA)(‘SI)(HAPBAR(AFB)2L)H(HAPN)BSDNALAPSzz('A!A

g e
io led
ic ow

Fig. 3.3.9 : Mobile IP


n

bl kn

7Bz/IH()ALA/IPSLPIBzA2N(zALA7B))(/OBzH(zPA9BH(A079+A2LzP/APBA/(zHALzA-–AOL’1(PAPBALA4BRI'(A9BH(A049+“A6''APN(A79A
1zB2/ALRBSPAPNI/A49AI/5AIP/A-–ALHH)(//“A
at


Pu ch

UN(A79AI/APBPL''jASzL2L)(ABFAPN(A49>/A'B’LPIBzALzHA/BA/(zH/AIPAL/AS/SL'APBA49>/A-–ALHH)(//“A
 UN(AIzP()z(P5A)BSP(/APNI/AOL’1(PAPBAPN(A=B?(A)BSP()ABFAPN(A49AL'/BA’L''(HAL/A=B?(A6D(zPA0=6+“A

Te

UN(A=6AzB2A1zB2IzDAPNLPAPN(A49AI/AzBPAIzAIP/ANB?(Az(P2B)1A(z’LO/S'LP(/ALzHAPSzz('/APN(AOL’1(PAPBAPN(A7G6“A
 UN(A7L)(aBFaLHH)(//A07G6+AH(FIz(/APN(A’S))(zPA'B’LPIBzABFAPN(A49AF)B?ALzA-–AOBIzPABFA3I(2“A
 ;Iz’(AIzP()z(PA)BSP(/AL)(A’)(LP(HARL/(HABzAPN(AN(LH()A’BzP(zP/ABFALzA-–AOL’1(P5APBA)BSP(AIPAF)B?A=6APBA7G65A2(Az((HALA
z(2AN(LH()AFB)APN(AOL’1(PAPBAR(AP)Lz/?IPP(H“A
 UN(Az(2AN(LH()ABzAPBOABFAPN(AB)IDIzL'AN(LH()AI/A?LH(A0QID“AY“Y“Xd+“A9B2APNI/A2I''A(zLR'(AS/APBA/(PALAz(2AHI)(’PA)BSP(A
A0LAPSzz('+APBAPN(A49AF)B?APN(A=6AL/AIPAI/A)BL?IzD“A

Fig. 3.3.10 : Encapsulation

UNS/APSzz(''IzDAI/APN(AO)B’(//ABFA’)(LPIzDALAPSzz('ARjAPN(A=6APBAPN(A7G6APBA)BSP(AOL’1(P/APBAPN(A4BRI'(A9BH(AL/AIPA
)BL?/“A-PA(/PLR'I/N(/ALAOIO(A0LAHLPLA/P)(L?AR(P2((zAP2BA’Bzz(’P(HA(zH/+A2N()(IzAPN(AHLPLAI/AIz/()P(HALzHA?B3(/AIzAQ-QGA
B)H()“
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-17 Mobile Networking

3.3.5(a) IP-in-IP Encapsulation (MU - May 16, Dec. 17)

Q. Explain IP-in-IP technique of encapsulation of mobile IP. (May 16, 5 Marks)


Q. Discuss how tunneling work for mobile IP using IP-In-IP encapsulation. (Dec. 17, 5 Marks)

 -–aIza-–A(z’LO/S'LPIBzAI/AH(FIz(HAIzAXQ7AWddY“A-PAI/APN(A/I?O'(/PALOO)BL’NALzHA?S/PAL'2Lj/AR(A/SOOB)P(H“AA
 -zAPNI/APjO(ABFA(z’LO/S'LPIBz5APN(A(zPI)(A-–AHLPLD)L?A/(zPARjAPN(AIzP()z(PANB/PAI/AIz/()P(HAIzALAz(2A-–AHLPLD)L?AL/APN(A
OLj'BLH“AA
 6/A/NB2zAIzAPN(AQID“AY“Y“XXAAPN(A=6A(z’LO/S'LP(/APN(A)(’(I3(HA-–AHLPLD)L?A2IPNIzALzBPN()A-–AHLPLD)L?“A

g e
io led
ic ow
n
Fig. 3.3.11 : IP-in-IP encapsulation
bl kn

A UN(A3L)IBS/AFI('H/AIzAPN(ABSP()AN(LH()AL)(A[A
at
Pu ch

89x /v59xhYv53U4f6xVAk()/IBzAFI('HAH(zBP(/APN(A3()/IBzAzS?R()ALzHA/(PAPBA^AFB)A-–3^“A
G9x kOMxhkfLv5fvLxPvKyv5xHvfDLP6xVx-=*AIzHI’LP(/APN(A'(zDPNABFAPN(ABSP()AN(LH()“A
Te

I9x WBxh#TB6xVA-PAI/AUS/PA’BOI(HAF)B?APN(AIzz()AN(LH()“A
K9x MvfDLPxVA-PAH(zBP(/APN(A’B?O'(P(A'(zDPNABFAPN(A(z’LO/S'LP(HAOL’1(P“A
N9x ##MxhLUEvxL4xHU/v6xVA-PAIzHI’LP(/APN(AO()IBHABFA3L'IHIPjABFAPN(AOL’1(P“AUU*A/NBS'HAR(ANIDNA(zBSDNA/BAPN(AOL’1(PA’LzA)(L’NA
PN(APSzz('A(zHOBIzP“A
Q9x kOUUfUkOxVxUNI/AH(zBP(/APN(APjO(ABFAO)BPB’B'AS/(HAIzAPN(A-–AOLj'BLH“A
R9x kOxNPvNS3gExVAUNI/AI/AS/(HAFB)A())B)AH(P(’PIBzA?(’NLzI/?“AA
A UN(AFI('H/ABFAIzz()AN(LH()AL)(AL'?B/PA/L?(AL/APN(ABSP()AN(LH()APN(ABz'jAHIFF()(z’(/AL)(A[A
 UN(ALHH)(//AFI('H/A’Bz/I/PABFAPN(ALHH)(//ABFAPN(AB)IDIzL'A/(zH()ALzHA)(’(I3()“A
 UN(A UU*A 3L'S(A BFA PN(A Izz()A N(LH()A I/A H(’)(?(zP(HA RjA X“A UNI/A ?(Lz/A PNLPA PN(A 2NB'(A PSzz('A ’Bz/IH()(HA LA /IzD'(A NBOA
F)B?APN(AB)IDIzL'AOL’1(P>/AOBIzPABFA3I(2“A
A UN(AU7–8\V–AOLj'BLHA’BzPLIz/APN(AL’PSL'AS/()AHLPLAPBAR(AP)Lz/?IPP(H“A
2y/KfLKDvx
A -PAI/A/I?O'(APBAI?O'(?(zPALzHAIPAI/ALAH(FLS'PA(z’LO/S'LPIBzA?(’NLzI/?“A
WU3Ky/KfLKDvx
A 4B/PABFAPN(ABSP()AN(LH()AFI('H/AL)(A/L?(AL/AIzz()AN(LH()A/BAPNI/A?(PNBHAIz’)(L/(/A)(HSzHLz’j“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-18 Mobile Networking

3.3.5(b) Minimal Encapsulation


(MU – May 12, May 15, May 17)

Q. Explain minimal encapsulation. Also discuss merits and demerits. (May 12, 5 Marks)
Q. Explain minimal techniques of encapsulation of Mobile IP packet. (May 15, May 17, 5 Marks)

g e
io led
ic ow
n
bl kn

Fig. 3.3.12 : Minimal encapsulation


 4IzI?L'A(z’LO/S'LPIBzAI/AH(FIz(HAIzAXQ7AWdd^“A-PAIz3B'3(/AF(2()AFI('H/AIzA-–AOL’1(P“A-PA’LzAR(AS/(HAIFAPN(A=65A495ALzHAQ6A
at
Pu ch

L''ALD)((APBAS/(“AQID“AY“Y“XWA/NB2/APN(A?IzI?L'A(z’LO/S'LPIBz“AA
 UN(ABSP()AN(LH()AFI('H/AL)(AL'?B/PA/L?(AL/AFB)A-–A(z’LO/S'LPIBziAPN(ABz'jAHIFF()(z’(AI/AIzAPN(A#zJvAFI('H“A-PAI/A/(PAPBA<<“A

Te

UN(AIzz()AN(LH()AI/A?S’NA/?L''()APNLzA-–A(z’LO/S'LPIBzAOL’1(P“AA
 UN(ABx7ULAIzHI’LP(/A2N(PN()APN(AB)IDIzL'A/(zH()>/A-–ALHH)(//AI/AIz’'SH(HAIzAPN(AN(LH()AB)AzBP“AkL'S(AdAIzHI’LP(/A/(zH()>/A
-–ALHH)(//A’LzAR(AB?IPP(H“A
 2y/KfLKDvxVx*B2()AB3()N(LHAL/A’B?OL)(HAPBA-–aIza-–A(z’LO/S'LPIBzAL/AIPAL3BIH/A)(HSzHLz’j“x
 WU3Ky/KfLKDvxVx-PAHB(/AzBPA/SOOB)PAF)LD?(zPLPIBzAPBAH(L'A2IPNAPSzz('A2IPNA/?L''()AOLPNA?L:I?S?AP)Lz/?I//IBzASzIP/A
04U\+“x

3.3.5(c) Generic Routing Encapsulation (GRE)


MU – May 12, Dec. 15)
Q. Explain Generic encapsulation. Also discuss merits and demerits. (May 12, 5 Marks)
Q. Explain Generic technique of encapsulation of mobile IP. (Dec. 15, 10 Marks)

 gX”AI/AH(FIz(HAIzAXQ7AX`dX“A
 -PAI/ALAD(z()I’A(z’LO/S'LPIBzA?(’NLzI/?AH(3('BO(HAR(FB)(APN(AH(3('BO?(zPABFA?BRI'(A-–“A
 gX”AL''B2/APN(A(z’LO/S'LPIBzABFAOL’1(P/ABFABz(AO)BPB’B'A/SIP(AIzPBAPN(AOLj'BLHAOB)PIBzABFALAOL’1(PABFALzBPN()AO)BPB’B'A
/SIP(“AA
 QID“AY“Y“XYA/NB2/APN(AD(z()I’A)BSPIzDA(z’LO/S'LPIBz“AUN(AgX”AN(LH()AI/AO)(O(zH(HAPBAPN(AOL’1(PABFABz(AO)BPB’B'A/SIP(A
2IPNAPN(AB)IDIzL'AN(LH()ALzHAHLPL“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-19 Mobile Networking

Fig. 3.3.13 : Generic routing encapsulation


QID“A Y“Y“XYA /NB2/A PN(A N(LH()A BFA PN(A OL’1(PA Iz/IH(A PN(A PSzz('A R(P2((zA NB?(A LD(zPA 0=6+A LzHA 7G6A S/IzDA gX”A
(z’LO/S'LPIBz“AA
UN(A3L)IBS/AFI('H/ABFAPN(AgX”AN(LH()APNLPAFB''B2APN(ABSP()AN(LH()AL)(AH(/’)IR(HAL/AFB''B2/A[A
89x O54L4N4HxLzJvxVA–)BPB’B'APjO(AI/A/(PAPBA^`AFB)AgX”A(z’LO/S'LPIBz“A
G9x px7ULxVx-FA7ARIPAI/A/(P5APN(A’N(’1/S?AFI('HA’BzPLIz/APN(A3L'IHA-–A’N(’1/S?ABFAPN(AgX”AN(LH()ALzHAPN(AOLj'BLH“x
I9x -x7ULxVx-FA/(P5AIPAIzHI’LP(/APNLPAPN(ABFF/(PALzHA)BSPIzDAFI('H/AL)(AO)(/(zPALzHA’BzPLIz/A3L'IHAIzFB)?LPIBz“x

e
K9x Zx7ULxVx-FAIPAI/A/(P5AIzHI’LP(/APN(A1(jAFI('HAI/AO)(/(zPALzHA?LjAR(AS/(HAFB)ALSPN(zPI’LPIBz“x

g
N9x Bx7ULxVx-FA/(P5AIzHI’LP(/APNLPAPN(A/(‘S(z’(AzS?R()AFI('HAI/AO)(/(zP“x
Q9x 3x7ULxVx-FA/(P5AIzHI’LP(/APNLPAPN(A/P)I’PA/BS)’(A)BSPIzDAI/AS/(H“Ax
io led
R9x 5vN9xh5vNg53U4fxN4fL54H6xVx-PA)(O)(/(zP/ALA’BSzP()APNLPA/NB2/APN(AzS?R()ABFAL''B2(HA)(’S)/I3(A(z’LO/S'LPIBz/“AA
ic ow
n
bl kn
at
Pu ch
Te

Fig. 3.3.14 : Generic routing encapsulation

[9x 5v/9xh5v3v5/vy6xVxUNI/AFI('HAI/A)(/()3(HAFB)AFSPS)(AS/(HALzHA?S/PAR(A/(PAPBAd“x
\9x /v59xh/v53U4f6xVx-PAI/A/(PAPBA]xFB)APN(AgX”A3()/IBz“x
8]9x O54L4N4HxVx-zHI’LP(/APN(AO)BPB’B'AS/(HARjAPN(AOL’1(PAFB''B2IzDAPN(AgX”AN(LH()“x
889x pPvNS3gExVx7BzPLIz/ALA3L'IHA-–A’N(’1/S?ABFAPN(AgX”AN(LH()ALzHAPN(AOLj'BLHA0O)(/(zPABz'jA2N(zA7ARIPAI/A/(P+“x
8G9x TLL3vLxVx-PA)(O)(/(zP/APN(ABFF/(PAIzARjP(/AFB)APN(AFI)/PA/BS)’(A)BSPIzDA(zP)jA0O)(/(zPABz'jA2N(zAXARIPAI/A/(P+“x
8I9x ZvzxVx7BzPLIz/ALA1(jAPNLPA’LzAR(AS/(HAFB)ALSPN(zPI’LPIBzA0O)(/(zPABz'jA2N(zAlARIPAI/A/(P+“x
8K9x -4gLUfDxVx-PAI/ALA3L)ILR'(A'(zDPNAFI('HALzHA’BzPLIz/APN(AFI('H/AFB)A/BS)’(A)BSPIzD“Ax
Advantage
 gX”A/SOOB)P/ABPN()Az(P2B)1A'Lj()AO)BPB’B'/AIzALHHIPIBzAPBA-–“A
 -PAL''B2/A?B)(APNLzABz(A'(3('ABFA(z’LO/S'LPIBz“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-20 Mobile Networking

3.3.5(d) Optimization
.MU – May 18.

Q. What is triangular routing problem? How do you optimize mobile IP for avoiding triangular routing ?
Q. Why and how can optimization in Mobile IP be achieved. (May 18, 5 Marks)

Triangular routing

 6/AHI/’S//(HAIzA/(’PIBzAY“Y“W5APN(A-–AOL’1(PAF)B?ALA79AH(/PIz(HAPBALzA49Az((H/APBAR(A)BSP(HAPBAIP/A=6AFI)/PALzHAPN(zA
PSzz('(HAPBAPN(AFB)(IDzALD(zPABFAPN(A49ALzHA-–AOL’1(PAF)B?APN(A49A’LzAR(AHI)(’P'jA)BSP(HAPBAPN(A79“AA
 -FA PN(A 79A LzHA 49A L)(A 3()jA z(L)5A PN(zA L'/BA PN(A -–A OL’1(PA NL/A PBA P)L3('A LA 'BzDA 2LjA PBA )(L’NA PN(A 49“A UNI/A Iz(FFI’I(zPA
R(NL3IB)ABFALAzBzABOPI?IV(HA?BRI'(A-–AI/A’L''(HA2)*1$"3/1)&4.3%*$"“AA
 UN(AP)ILzD'(AI/A?LH(ABFAPN(APN)((A/(D?(zP/5A79APBA=65A=6APBA7G68495ALzHA49ARL’1APBA79“A0X(F()AQID“AY“Y“X<+A

g e
io led
ic ow
n
bl kn
at
Pu ch

Fig. 3.3.15 : Triangular Routing


Te

Route optimization to avoid triangular routing


UBA/B'3(AP)ILzDS'L)A)BSPIzDAO)BR'(?5ALA)BSP(ABOPI?IVLPIBzAO)BPB’B'ANL/AR((zAIzP)BHS’(H“AKL/I’L''jAPNI/AO)BPB’B'AH(FIz(/A
/B?(A?(//LD(A/BAL/APBAIzFB)?A79ABFALzASOAPBAHLP(A'B’LPIBzABFA49“AAGz’(APN(A’S))(zPA'B’LPIBzABFAPN(A49AI/A1zB2z5APN(A79A
IP/('FAO()FB)?/APSzz('IzDALzHA/(zH/AOL’1(PAHI)(’P'jAPBA49“A
UN(ABOPI?IV(HA?BRI'(A-–AO)BPB’B'Az((H/AFBS)ALHHIPIBzL'A?(//LD(/iAPN(/(AL)(A[A
89x WUfyUfDx5vGgv3Lxxx
A -FALAzBH(A2LzP/APBA1zB2A2N()(APN(A49AI/A’S))(zP'jA'B’LP(H5AIPA’LzA/(zHALARIzHIzDA)(‘S(/PAPBAPN(A=6“AA
G9x WUfyUfDxgJyKLvx
A UN(A=6A/(zH/ALARIzHIzDASOHLP(APBAPN(A79ALzHAIzFB)?/APN(A79APN(A’S))(zPA'B’LPIBzABFALzA49“AUN(ARIzHIzDASOHLP(A’LzA
)(‘S(/PALzAL’1zB2'(HD(?(zP“AA
I9x WUfyUfDxKNSf4,HvyDvEvfLxx
A GzA)(‘S(/P5ALFP()A)(’(I3IzDALARIzHIzDASOHLP(A?(//LD(5ALAzBH(A)(PS)z/ALARIzHIzDAL’1zB2'(HD(?(zP“A
K9x WUfyUfDx,K5fUfD3xx
o 6ARIzHIzDA2L)zIzDA?(//LD(AI/A/(zPARjALAzBH(AIFAIPAH(’LO/S'LP(/ALAOL’1(PAFB)ALzA49ARSPAIPAI/AzBPAPN(AQ6AFB)APNLPA49A
’S))(zP'j“A
o -FA79A)(’(I3(/APN(ARIzHIzDA2L)zIzD5AIPA)(‘S(/P/APN(A=6AFB)ALAz(2ARIzHIzDASOHLP(“A
o -FAPN(A=6A)(’(I3(/APN(A2L)zIzDAIPAHI)(’P'jA/(zH/ALARIzHIzDASOHLP(APBAPN(A79“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-21 Mobile Networking

UN(AQID“AY“Y“X_A(:O'LIz/APN(AFBS)A?(//LD(/APBD(PN()A2IPNAPN(A’L/(ABFALzA49A’NLzDIzDAIP/AQ6ALzHA/NB2/APN(A(:’NLzD(ABFA
?(//LD(/AIzABOPI?IVLPIBzAO)BPB’B'“A

g e
io led
Fig. 3.3.16 : Optimized mobile IP working

 UN(A79A)(‘S(/P/APN(A’S))(zPA'B’LPIBzABFA49AF)B?APN(A=6“A
ic ow

 =6A)(PS)z/APN(A7G6ABFAPN(A49A3ILASOHLP(A?(//LD(“A

n
79AL’1zB2'(HD(APNI/ASOHLP(HA?(//LD(ALzHA/PB)(/A?BRI'IPjARIzHIzD“A

bl kn

9B2A79A’LzA/(zHAHLPLAHI)(’P'jAPBAPN(A’S))(zPAFB)(IDzALD(zPAQ6!"#“AQ6!"#AzB2AFB)2L)H/APN(/(AHLPLAPBA49“A
 UN(A49A?IDNPAzB2A’NLzD(AIP/A'B’LPIBzALzHA)(DI/P()A2IPNALAz(2AFB)(IDzALD(zPAQ6$%&“A
at


Pu ch

Q6$%&AIzFB)?/AQ6!"#ALRBSPAz(2A)(DI/P)LPIBzABFA49A3ILALzASOHLP(A?(//LD(ALzHAQ6!"#'L’1zB2'(HD(HAPNI/ASOHLP(A?(//LD(“AA
 79AHB(/z>PA1zB2ALRBSPAPN(A’S))(zPA'B’LPIBzABFA495AIPA/PI''APSzz('/AIP/AOL’1(P/AFB)A49APBAPN(AB'HAFB)(IDzALD(zPAQ6!"#“A

Te

UN(AQ6!"#AzBPI’(/AOL’1(P/AH(/PIz(HAPBA49ARSPAL'/BA1zB2/A49A’S))(zP'jAzBPAIzA’S))(zPAQ6“A
 Q6!"#A?IDNPAzB2AFB)2L)HAPN(/(AOL’1(P/APBAPN(Az(2A7G6ABFA49A2NI’NAI/Az(2AFB)(IDzALD(zP“A
 UNS/APN(AOL’1(P/APNLPAL)(AIzAP)Lz/IPAL)(AzBPA'B/P“AUNI/AR(NL3IB)AI/ALzBPN()ABOPI?IVLPIBzAPBARL/I’A?BRI'(A-–ALzHAO)B3IH(/A
/?BBPNANLzHB3()“A
 Q6!"#A/(zH/ARIzHIzDA2L)zIzDA?(//LD(APBA79“A79APN(zA)(‘S(/P/ALARIzHIzDASOHLP(“A
 UN(A=6A/(zH/ALzASOHLP(APBAIzFB)?APN(A79ALRBSPAPN(Az(2A'B’LPIBz5A2NI’NAI/AL’1zB2'(HD(H“A9B25A79A’LzA/(zHAHLPLA
HI)(’P'jAPBAQ6$%&5ALzHAL3BIHAP)ILzDS'L)ARIzHIzD“A
 =B2(3()5APN(ABOPI?IVLPIBzA2I''AzBPA2B)1AIFAPN(A49AHB(/AzBPA2LzPAPBA)(3(L'AIP/A’S))(zPA'B’LPIBzAPBAPN(A79AR(’LS/(ABFA
/(’S)IPj“A

3.3.6 Reverse Tunnelling


 UN()(A?LjAR(ALA/IPSLPIBzA2N()(AIPAI/AzBPAF(L/IR'(AB)AH(/I)(HAPBANL3(APN(A?BRI'(AzBH(A049+A/(zHAOL’1(P/AHI)(’P'jAPBAPN(A
IzP()z(P2B)1A3ILAQ6“A
 -zAPNLPA’L/(5ALzABOPIBzL'AF(LPS)(A’L''(HA5v/v53vxLgffvHUfDAI/AS/(HAIFAIPAI/A/SOOB)P(HARjA?BRI'(AzBH(5ANB?(ALD(zPALzHA
FB)(IDzALD(zP“AA
 6/A/NB2zAIzAQID“AY“Y“X`A5ALA)(3()/(APSzz('AI/A/(PSOAR(P2((zA49ALzHA=6A0-FA7G6AI/A’Ba'B’LP(H+5AB)AR(P2((zAQ6ALzHA=6A
0IFAQ6AL’P/AL/A7G6+A
 6''AP)Lz/?I//IBzAF)B?A49AL)(AzB2APSzz('(HARL’1APBAPN(ANB?(Az(P2B)1A2N()(A=6AP)Lz/?IP/APN(?AB3()APN(A-zP()z(P“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-22 Mobile Networking

g e
Fig. 3.3.17 : Reverse tunneling
io led
A X(3()/(APSzz('IzDAI/AS/(HAIzAFB''B2IzDA/’(zL)IB“A
1. Ingress Filtering/Firewalls
ic ow

 -FA PN(A z(P2B)1A 2N()(A ?BRI'(A zBH(A 'B’LP(HA NL/A I?O'(?(zP(HA ’()PLIzA /(’S)IPjA ?(L/S)(/A PNLPA O)BNIRIP/A PN(A zBH(A
F)B?A/(zHIzDAOL’1(P/AS/IzDAIP/AzB)?L'A-–ALHH)(//“A
n
 CIPNALA)(3()/(APSzz('APN(AOL’1(PAI/AFI)/PA(z’LO/S'LP(HARjAQ6ALzHA/(zPAPBAPN(A=6“A
bl kn

2. Multi-cast
at
Pu ch

A X(3()/(APSzz('IzDAI/A)(‘SI)(HAFB)A?S'PI’L/PIzDA2N()(APN(AzBH(/AIzA?S'PI’L/PAD)BSOAL)(AIzAPN(ANB?(Az(P2B)15AL/ALzA49A
IzALAFB)(IDzAz(P2B)1A’LzzBPAP)Lz/?IPA?S'PI’L/PAOL’1(P/AHI)(’P'jAIzAPNI/A’L/(5AL/APN(AFB)(IDzAz(P2B)1A?IDNPAzBPAO)B3IH(A
PN(AP(’NzI’L'AIzF)L/P)S’PS)(AFB)A?S'PI’L/PA’B??SzI’LPIBz“A
Te

3. TTL (time to live)


 CN(zALzA49AI/AIzANB?(Az(P2B)15ALzHAIFAA49AzBH(A?B3(/APBALAFB)(IDzAz(P2B)15AIP/AUU*A?IDNPAR(APBBA'B2AFB)APN(A
OL’1(P/APBA)(L’NAPN(A/L?(AzBH(AL/AR(FB)(“AA
 6A)(3()/(APSzz('AI/Az((H(HAPNLPA)(O)(/(zP/ABz(ANBOAP)Lz/?I//IBz“A
Problems with reverse tunneling
 X(3()/(APSzz('IzDA?LjA’LS/(ALAP)ILzDS'L)A)BSPIzDAO)BR'(?AIzAPN(A)(3()/(AHI)(’PIBz“A6''AOL’1(P/AF)B?A49APBA79AzB2ADBA
PN)BSDNAPN(A=6“AUN(A79A?IDNPAzBPAR(ALR'(APBAH(’LO/S'LP(APN(AOL’1(PAL/APN(A79A’BS'HAR(ALAzBzA4BRI'(A-–AH(3I’(5A/BAPN(A
XQ7AYdW^AHB(/AzBPABFF()A/B'SPIBzAPBAPNI/A)(3()/(AP)ILzDS'L)A)BSPIzD“A
 X(3()/(A PSzz('IzDA ?LjA )LI/(A /B?(A /(’S)IPjA I//S(/“A QB)A (:L?O'(5A LA PSzz('A 2NI’NA /PL)P/A IzA PN(A O)I3LP(A z(P2B)1A BFA LA
’B?OLzjALzHA)(L’NIzDABSPAIzPBAPN(AIzP()z(PA’BS'HAR(ANIUL’1(HALzHALRS/(HAFB)A/(zHIzDAOL’1(P/APN)BSDNAFI)(2L''“A
 X(3()/(APSzz('IzDA?LjAL'/BAIzP)BHS’(APN(AOB//IRI'IPjABFAH(zIL'aBFa/()3I’(ALPPL’1“A

3.3.7 Limitations of Mobile IP

1. Frequent Mobility
A 4BRI'(A-–A2L/AH(/IDz(HAPBANLzH'(A?BRI'IPjABFAH(3I’(/5ARSPABz'jA)('LPI3('jAIzF)(‘S(zPA?BRI'IPj“AUNI/AI/AHS(APBAPN(A2B)1A
Iz3B'3(HA2IPNA(L’NA’NLzD(“AUNI/AB3()N(LHAI/zZPALARIDAH(L'A2N(zAjBSA?B3(ALA’B?OSP()ABz’(ALA2((15ALAHLjAB)A(3(zALzA
NBS)“A -PA ’LzA R(A LzA I//S(A FB)A Y)(L'aPI?(ZA ?BRI'IPjA /S’NA L/A )BL?IzDA IzA LA 2I)('(//A z(P2B)15A 2N()(A NLzHaBFFA FSz’PIBz/A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-23 Mobile Networking

BO()LPIzDALPAPN(AHLPLA'Iz1A'Lj()A?LjAR(A?B)(A/SIPLR'(“A4BRI'(A-–A2L/AH(/IDz(HASzH()APN(A/O(’IFI’AL//S?OPIBzAPNLPAPN(A
LPPL’N?(zPAOBIzPA2BS'HAzBPA’NLzD(A?B)(APNLzABz’(AO()A/(’BzH“A
2. Issue with DHCP
A 4BRI'(A-–AI/AIzP(zH(HAPBAR(AS/(HA2IPNAH(3I’(/APNLPA?LIzPLIzALA/PLPI’A-–A’BzFIDS)LPIBz“A;Iz’(APN(AH(3I’(Az((H/APBAR(ALR'(A
PBAL'2Lj/A1zB2APN(AIH(zPIPjABFAIP/ANB?(Az(P2B)1ALzHAzB)?L'A-–ALHH)(//5AIPAI/A?S’NA?B)(AHIFFI’S'PAPBAS/(AIPA2IPNALAH(3I’(A
PNLPABRPLIz/ALzA-–ALHH)(//AHjzL?I’L''j5AS/IzDA/B?(PNIzDA'I1(AV=7–“A
3. Security Issue
A QI)(2L''/5A’LS/(/AHIFFI’S'PjAFB)A?BRI'(A-–AR(’LS/(APN(jAR'B’1AL''A’'L//(/ABFAIz’B?IzDAOL’1(P/APNLPAHBAzBPA?((PA/O(’IFI(HA
’)IP()IL“A ”zP()O)I/(A FI)(2L''/A L)(A PjOI’L''jA ’BzFIDS)(HA PBA R'B’1A OL’1(P/A F)B?A (zP()IzDA 3ILA PN(A IzP()z(P“A -zA ?LzjA ’L/(/A
LSPN(zPI’LPIBzA2IPNAQ6AI/AO)BR'(?LPI’AL/APN(AQ6APjOI’L''jAR('BzD/APBALzBPN()AB)DLzIVLPIBzAB)Az(P2B)1“A
4. QoS Issue

e
 UN(A mB;A /B'SPIBzA FB)A ?BRI'(A -–A /NBS'HA /LPI/FjA )(‘SI)(?(zP/A /S’NA L/A /’L'LRI'IPj5A ’Bz/()3LPIBzA BFA 2I)('(//A

g
RLzH2IHPN5A'B2AO)B’(//IzDAB3()N(LH5ALSPNB)IVLPIBzALzHAL’’BSzPIzDA(P’“AA

io led
CN(zANLzHB3()AB’’S)/AIzA?BRI'(A-–A(z3I)Bz?(zP5A/B?(ALOO'I’LPIBz/A/S’NAL/A2(RAR)B2/()ALzHAFI'(AP)Lz/F()AS/IzDA
U7–A’Bzz(’PIBzA2I''AFL’(AHI/’Bzz(’PIBzAB)ALAH(D)LHLPIBzABFAPN(AO()FB)?Lz’(“AAA
 6zBPN()AO)BR'(?AI/A2IPNAPN(APSzz('ARL/(HA’B??SzI’LPIBz“A-zAPSzz('ARL/(HA’B??SzI’LPIBz/AHIFF()(zPAHLPLAF'B2/A
ic ow

LHH)(//(HAPBAPN(A/L?(A-–ALHH)(//AL)(AP)(LP(HAIzAPN(A/L?(A?Lzz()“AUNS/APSzz('IzDA?L1(/AIPANL)HAPBADI3(ALAF'B2ABFA
OL’1(P/ALA/O(’IL'AP)(LP?(zPAz((H(HAFB)AmB;“A
n
bl kn

3.3.8 Mobile IP and IPv6


at


Pu ch

kJ/Kx VA UN(A z(P2B)1A 'Lj()A O)BPB’B'A IzA PN(A U7–8-–A O)BPB’B'A /SIP(A I/A ’S))(zP'jA -–3^“A -–3^A O)B3IH(/A PN(A NB/PaPBaNB/PA
’B??SzI’LPIBzA R(P2((zA /j/P(?/A IzA PN(A -zP()z(P“A -–3^A NL/A /B?(A H(FI’I(z’I(/A PNLPA ?L1(A IPA Sz/SIPLR'(A FB)A PN(A FL/PA
Te

D)B2IzDA-zP()z(P5AIz’'SHIzDAPN(AFB''B2IzD[A
o V(/OIP(AL''A/NB)PAP()?A/B'SPIBz/5A/S’NAL/A/SRz(PPIzD5A’'L//'(//ALHH)(//IzD5ALzHA96U5ALHH)(//AH(O'(PIBzAI/A/PI''ALA'BzDA
P()?AO)BR'(?AIzA-zP()z(P“A
o UN(A -zP()z(PA ?S/PA L’’B??BHLP(A )(L'A PI?(A LSHIBA LzHA 3IH(BA P)Lz/?I//IBz“A UNI/A PjO(A BFA P)Lz/?I//IBzA )(‘SI)(/A
?IzI?S?AH('LjA/P)LP(DI(/ALzHA)(/()3LPIBzABFA)(/BS)’(/AzBPAO)B3IH(HARjA-–3^AH(/IDz“A
o UN(A-zP()z(PA?S/PAL’’B??BHLP(A(z’)jOPIBzALzHALSPN(zPI’LPIBzABFAHLPLAFB)A/B?(ALOO'I’LPIBz/“A9BA(z’)jOPIBzAB)A
LSPN(zPI’LPIBzAI/AO)B3IH(HARjA-–3^“A
 kJ/Qx Vx UBA B3()’B?(A PN(/(A O)BR'(?/5A -–3_A L'/BA 1zB2zA L/A -–zDA 0-zP()z(PA –)BPB’B'A z(:PA D(z()LPIBz+A 2L/A O)BOB/(H“A -zA
-–3_5APN(A-zP()z(PAO)BPB’B'A2L/A(:P(z/I3('jA?BHIFI(HAPBAL’’B??BHLP(APN(AD)B2PNALzHAz(2AH(?LzH/ABFAPN(A-zP()z(P“AA
o UN(AFB)?LPALzHAPN(A'(zDPNABFAPN(A-–ALHH)(//(/A2()(A’NLzD(HAL'BzDA2IPNAPN(AOL’1(PAFB)?LPA
o X('LP(HAO)BPB’B'/A/S’NAL/A-74–A2()(AL'/BA?BHIFI(H“AA
o GPN()A O)BPB’B'/A IzA PN(A z(P2B)1A 'Lj()5A /S’NA L/A 6X–5A X6X–5A -g4–A 2()(A (IPN()A H('(P(HA B)A Iz’'SH(HA IzA -74–3_A
O)BPB’B'“AXBSPIzDAO)BPB’B'/A/S’NAL/AX-–ALzHAG;–QA2()(A/'IDNP'jA?BHIFI(HAPBAL’’B??BHLP(APN(/(A’NLzD(/“A
UN(AFL/PA/O)(LHIzDAS/(ABFA-zP()z(PALzHAz(2A/()3I’(/A/S’NAL/A?BRI'(A-–5A-–AP('(ONBzj5ALzHA-–a’LOLR'(A?BRI'(AP('(ONBzj5A
?LjA)(‘SI)(APN(APBPL'A)(O'L’(?(zPABFA-–3^ARjA-–3_“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-24 Mobile Networking

Advantages of IPv6
 *L)D()ALHH)(//A/OL’(a6zA-–3_ALHH)(//AI/AXWjARIPA'BzD“A7B?OL)(HA2IPNAPN(AYWARIPA'BzDA-–3^ALHH)(//5APNI/AI/ANSD(AIz’)(L/(A
IzALHH)(//A/OL’(“A
 K(PP()A =(LH()A FB)?LPa-–3_A S/(/A LA z(2A N(LH()A FB)?LPA IzA 2NI’NA BOPIBz/A L)(A /(OL)LP(HA F)B?A PN(A RL/(A N(LH()A LzHA
Iz/()P(HA2N(zAz((H(H5AR(P2((zAPN(ARL/(AN(LH()ALzHAPN(ASOO()A'Lj()AHLPL“AUNI/A/I?O'IFI(/ALzHA/O((H/ASOAPN(A)BSPIzDA
O)B’(//AR(’LS/(A?B/PABFAPN(ABOPIBz/AHBAzBPAz((HAPBAR(A’N(’1(HARjA)BSP()/“A
 9(2AGOPIBz/a-–3_ANL/Az(2ABOPIBz/APBAL''B2AFB)ALHHIPIBzL'AFSz’PIBzL'IPI(/“A
 6''B2Lz’(A FB)A (:P(z/IBza-–3_A I/A H(/IDz(HA PBA L''B2A PN(A (:P(z/IBzA BFA O)BPB’B'A IFA )(‘SI)(HA RjA z(2A P(’NzB'BDI(/A B)A
LOO'I’LPIBz/“A
 ;SOOB)PAFB)A)(/BS)’(AL''B’LPIBza-zA-–3_5APN(A%56#7.87+#)(*0#AFI('HANL/AR((zA)(?B3(H5ARSPA?(’NLzI/?A’L''(HA9/.:&/1;#/&
NL/AR((zALHH(HAPBA(zLR'(APN(A/BS)’(APBA)(‘S(/PA/O(’IL'ANLzH'IzDABFAOL’1(P“AUNI/A?(’NLzI/?A’LzAR(AS/(HAPBA/SOOB)PA
P)LFFI’A/S’NAL/A)(L'aPI?(ALSHIBALzHA3IH(B“A

e
;SOOB)PAFB)A?B)(A/(’S)IPjaUN(A(z’)jOPIBzALzHALSPN(zPI’LPIBzABOPIBz/AIzA-–3_AO)B3IH(A’BzFIH(zPIL'IPjALzHAIzP(D)IPjABFA

g
PN(AOL’1(P“A
Features of Ipv6 to support mobility
io led
 9BA/O(’IL'A?(’NLzI/?/AL)(Az((H(HAFB)A/(’S)IzDA?BRI'(A-–A)(DI/P)LPIBz“A-zA(3()jA-O3_AzBH(AKyy5v33xKgL4xN4fLUDg5KLU4fA
I“(“APN(A?(’NLzI/?AFB)AL’‘SI)IzDALA7G6AI/AIzRSI'P“A
ic ow

 HvUDP745xyU3N4/v5zA?(’NLzI/?AI/AL'/BA?LzHLPB)jAFB)A(3()jA-O3_AzBH(“A;BA/O(’IL'AFB)(IDzALD(zP/AL)(AzBA'BzD()Az((H(HA
PBALH3()PI/(A/()3I’(/“A
n

bl kn

7B?RIzIzDA PN(A F(LPS)(/A BFA LHH)(//A LSPBA ’BzFIDS)LPIBzA LzHA z(IDNRB)A HI/’B3()jA (zLR'(/A (3()jA -O3_A ?BRI'(A zBH(A PBA
’)(LP(ALzHABRPLIzALAPBOB'BDI’L''jA’B))(’PALHH)(//AB)APN(A’S))(zPAOBIzPABFALPPL’N?(zP“A

at

”3()jA-O3_AzBH(A’LzA/(zHARIzHIzDASOHLP(/APBALzBPN()AzBH(5A/BAPN(A49A’LzA/(zHAIP/A7G6AHI)(’P'jAPBAPN(A79ALzHA=6“AUN(A
Pu ch

Q6AI/AzBA'BzD()Az((H(H“AUN(A79AAAO)B’(//(/APN(ARIzHIzDASOHLP(/ALzHA?L1(/A’B))(/OBzHIzDA(zP)I(/AIzAIP/A)BSPIzDA’L’N(“A
 UN(A49AI/AzB2ALR'(APBA[A
Te

o V(’LO/S'LP(/APN(AOL’1(P/A
o UBAH(P(’PA2N(zAIPAz((H/ALAz(2A7G6ALzHA
o UBAH(P()?Iz(A2N(zAPBA/(zHARIzHIzDASOHLP(/APBAPN(A=6ALzHA79A
 6A34LLxPKfy4/v5xI/AOB//IR'(A2IPNA-O3_“AUN(A49A/(zH/AIP/Az(2A7G6APBAPN(AB'HA)BSP()A/()3IzDAPN(A49ALPAPN(AB'HA7G65ALzHA
PN(AB'HA)BSP()A’LzA(z’LO/S'LP(AL''AIz’B?IzDAOL’1(P/AFB)APN(A49ALzHAFB)2L)H/APN(?APBAz(2A7G6“A

3.4 Routing
 XBSPIzDA IzA 2I)('(//A LHaNB’A z(P2B)1/A I/A HIFF()(zPA LzHA ’B?O'I’LP(HA PNLzA 2I)(HA z(P2B)1/A B)A 2I)('(//A z(P2B)1/A 2IPNA
IzF)L/P)S’PS)(“AUNI/AHIFF()(z’(A’LzAR(A(:O'LIz(HARjA(:L?O'(A/NB2zAIzAQID“AY“^“X“A
 QID“AY“^“XA/NB2/APN(Az(P2B)1APBOB'BDjALPAP2BAHIFF()(zPAPI?(AP(ALzHAP)*AA
 ;(3(zAzBH(/AL)(A’Bzz(’P(HAH(O(zHIzDASOBzAPN(A’S))(zPAP)Lz/?I//IBzA’NL)L’P()I/PI’/AR(P2((zAPN(?“AA
 6PAPI?(AP!AzBH(A9^A’LzA)(’(I3(A9XAB3()ALADBBHA'Iz15ARSPA9XA)(’(I3(/A9^A3ILALA2(L1A'Iz1“A*Iz1/A?LjAzBPANL3(APN(A/L?(A
’NL)L’P()I/PI’/AIzARBPNAHI)(’PIBz/“AA
 UN(A /IPSLPIBzA ?LjA ’NLzD(A LPA PI?(A P)A 9XA ’LzzBPA )(’(I3(A 9^A LzjA 'BzD()5A 9^A ’LzA )(’(I3(A 9XA 3ILA LA 2(L1A 'Iz1“A 9(P2B)1A
PBOB'BDjAI/AF)(‘S(zP'jA’NLzD(HAIzALHaNB’Az(P2B)1/“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-25 Mobile Networking

Fig. 3.4.1 : Ad-hoc network example

e
A UN(A?LIzAHIFF()(z’(AR(P2((zALHaNB’ALzHA2I)(HAz(P2B)1/AHS(APBAPNI/A)BSPIzDAIzALHaNB’Az(P2B)1/AL)(AHIFF()(zPAL)(AL/A
FB''B2/A[A

g
1. Asymmetric links
io led
 *Iz1/AL)(AzBPA/j??(P)I’AIzARBPNAHI)(’PIBz/AL/A2(ANL3(A/((z“A9BH(A9WA’LzA)(’(I3(A9XARSPA9XA’LzzBPA)(’(I3(A/IDzL'/A
F)B?A9W“AA
ic ow

 UNS/A)BSPIzDAIzFB)?LPIBzA’B''(’P(HAFB)ABz(AHI)(’PIBzAI/AzBPAS/(FS'AFB)ABPN()AHI)(’PIBz“A
 =B2(3()A?LzjA)BSPIzDAL'DB)IPN?/AFB)A2I)(HAz(P2B)1/A)('jABzALA/j??(P)I’A/’(zL)IB“A
n
2. Redundant links
bl kn

 CI)(HAz(P2B)1ANL3(A)(HSzHLzPA'Iz1APBA/S)3I3(A'Iz1AFLI'S)(5ARSPAPNI/A)(HSzHLz’jAI/A'I?IP(H“A
at


Pu ch

-zALHaNB’Az(P2B)1/APN()(A?IDNPAR(A?LzjA)(HSzHLzPA'Iz1/ASOAPBANIDNA’B?O'(:IPj“A
 XBSPIzDA L'DB)IPN?/A IzA 2I)(HA z(P2B)1A ’LzA NLzH'(A SOA PBA /B?(A )(HSzHLz’j5A RSPA LA 'L)D(A )(HSzHLz’jA ’LzA ’LS/(A LA
Te

'L)D(A’B?OSPLPIBzL'AB3()N(LHAFB)A)BSPIzDAPLR'(ASOHLP(/“A
3. Interference
 -zA LHaNB’A z(P2B)1/A 'Iz1/A ’B?(/A LzHA DBA H(O(zHIzDA BzA PN(A P)Lz/?I//IBzA ’NL)L’P()I/PI’/5A Bz(A P)Lz/?I//IBzA ?LjA
IzP()F()(A2IPNABPN()5ALzHAzBH(/A?IDNPAB3()N(L)APN(AP)Lz/?I//IBz/ABFABPN()AzBH(/“AA
 -zP()F()(z’(A’NLz’(/AIzA2I)('(//ALHaNB’Az(P2B)1/AL)(A3()jANIDN“A
4. Dynamic topology
 UNI/AI/APN(AD)(LP(/PAO)BR'(?AIzA)BSPIzDAFB)ALHaNB’Az(P2B)1/“A
 4BRI'(A zBH(/A ?B3(/A B)A ?(HIS?A ’NL)L’P()I/PI’/A ?IDNPA ’NLzD(A F)(‘S(zP'j“A UNI/A )(/S'P/A F)(‘S(zPA ’NLzD(/A IzA
PBOB'BDjA L/A /NB2zA IzA QID“A Y“^“XA 0LPA PI?(hP)+“A VS(A PBA ’NLzD(A IzA PBOB'BDj5A IzA LHaNB’A z(P2B)1/A PN(A )BSPIzDA PLR'(/A
NL3(APBAR(ASOHLP(HAF)(‘S(zP'j“A
#Pv5vxK5vx7K3UNKHHzxL,4xNHK33v3x4LxLHKLx54gLUfDxKHD45ULPE3xVx
1. Table-Driven routing protocols (Proactive)
 UN(/(AO)BPB’B'/AL)(AL'/BA’L''(HAL/AO)BL’PI3(AO)BPB’B'/A/Iz’(APN(jA?LIzPLIzAPN(A)BSPIzDAIzFB)?LPIBzA(3(zAR(FB)(AIPA
I/Az((H(H“AA
 ”L’NALzHA(3()jAzBH(AIzAPN(Az(P2B)1A?LIzPLIz/A)BSPIzDAIzFB)?LPIBzAPBA(3()jABPN()AzBH(AIzAPN(Az(P2B)1“AXBSP(/A
IzFB)?LPIBzAI/AD(z()L''jA1(OPAIzAPN(A)BSPIzDAPLR'(/ALzHAI/AO()IBHI’L''jASOHLP(HAL/APN(Az(P2B)1APBOB'BDjA’NLzD(/“AA
 4LzjABFAPN(/(A)BSPIzDAO)BPB’B'/A’B?(AF)B?APN(A'Iz1a/PLP(A)BSPIzD“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-26 Mobile Networking

Examples of proactive routing protocols


 Destination Sequence Distance Vector (DSDV)
 Optimized Link State Routing (OLSR)
 Fisheye State Routing (FSR)
 Wireless Routing Protocol (WRP)
Advantage
 These protocols can give good real time traffic QoS.
 Route availability reduces delay (no route acquisition delay)
Disadvantage
 The proactive protocols are not suitable for larger networks, as they need to maintain node entries for each and every
node in the routing table of every node. This causes more overhead in the routing table leading to consumption of

e
more bandwidth.

g
 Possibly inefficient (due to unnecessary signaling message overhead)
io led
 Redundant routes may exist
 Some computed routes may not be needed
2. On Demand routing protocols (Reactive)
ic ow

 These protocols are also called reactive protocols since they don’t maintain routing information or routing activity at
n
the network nodes if there is no communication.
bl kn

 If a node wants to send a packet to another node then this protocol searches for the route in an on-demand manner
and establishes the connection in order to transmit and receive the packets.
at
Pu ch

 The route discovery usually occurs by flooding the route request packets throughout the network.
Examples of Reactive routing protocols
Te

 Dynamic Source Routing (DSR)


 Ad-hoc On demand Distance Vector (AODV)
Advantage
 Eliminates periodic route advertisements
 May reduce power and bandwidth requirements.
Disadvantage
 Adds route-acquisition delay
 May cause more signaling if route expiration times are too short

3.4.1 Destination Sequence Distance Vector Routing (DSDV)


DSDV is a proactive table driven mobile ad-hoc network routing protocol. It is an enhancement of distance vector
routing (Bellman Ford algorithm).
Problems with Distance Vector
 In Distance vector routing each node exchanges its routing table periodically with its neighbors.
 Each node uses its local information for creating its routing table.
 However, the local information may be old and invalid. This is because changes at one node in the network propagate
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-27 Mobile Networking

 =B2(3()5APN(A'B’L'AIzFB)?LPIBzA?LjAR(AB'HALzHAIz3L'IH“AUNI/AI/AR(’LS/(A’NLzD(/ALPABz(AzBH(AIzAPN(Az(P2B)1AO)BOLDLP(A
/'B2'jA PN)BSDNA PN(A z(P2B)1A 0/P(OaRja/P(OA 2IPNA (3()jA (:’NLzD(+“A UNS/A PN(A 'B’L'A IzFB)?LPIBzA ?LjA zBPA R(A SOHLP(HA
O)B?OP'j“A
 UNI/ADI3(/A)I/(APBA'BBO/“A6A?(//LD(A?LjA'BBOAL)BSzHALA’j’'(AFB)ALA'BzDAPI?(A0’BSzPaPBaIzFIzIPjAO)BR'(?+“AA
 ;B'SPIBz/AS/(HAFB)APNI/AO)BR'(?AIzA2I)(HAz(P2B)1/A/S’NAL/AOBI/Bz(HA)(3()/(ALzHA/O'IPANB)IVBzAHBAzBPA2B)1AIzA’L/(ABFA
LHaNB’Az(P2B)1/AHS(APBAPN(A)LOIH'jA’NLzDIzDAPBOB'BDj“A
DSDV now adds two things to the distance vector algorithm.
1. Sequence numbers
 ”L’NAzBH(ALH3()PI/(A)BSPIzDAPLR'(A2IPNALA/(‘S(z’(AzS?R()“A
 UNI/A /(‘S(z’(A zS?R()A S/(HA PBA HI/PIzDSI/NA /PL'(A )BSP(A 2IPNA PN(A F)(/NA )BSP(A LzHA N('OA PN(A zBH(/A PBA O)B’(//A
LH3()PI/(?(zP/AIzA’B))(’PAB)H()APNS/AL3BIH/A'BBO/APNLPAL)(A'I1('jAIzAHI/PLz’(A3(’PB)“A
2. Damping

e
 -PAO)(3(zP/AP(?OB)L)jA’NLzD(AIzAPN(Az(P2B)1APBOB'BDjAF)B?AH(/PLRI'IV(APN(A)BSPIzD“AUN(/(A’NLzD(/AL)(ABFA/NB)PA

g
HS)LPIBzABz'j“A
io led
 CN(zA LA zBH(A )(’(I3(/A LzA LH3()PI/(?(zPA ’BzPLIzIzDA LA ’NLzD(A IzA PN(A ’S))(zPA z(P2B)1A PBOB'BDj5A IPA 2LIP/A FB)A LA
’()PLIzAPI?(AR(FB)(AFB)2L)HIzDAPN(ASOHLP(/AIzA)BSPIzDAPLR'(APBABPN()AzBH(/“A

ic ow

CLIPIzDAPI?(AH(O(zH/ABzAPN(API?(AIzP()3L'AR(P2((zAPN(AFI)/PALzHAPN(AR(/PALzzBSz’(?(zPABFALAOLPNAPBALA’()PLIzA
H(/PIzLPIBz“A
n
DSDV algorithm
bl kn

 ”L’NAzBH(A?LIzPLIz/ALA)BSPIzDAPLR'(A2NI’NA/PB)(/A
o
at

9(:PANBOALzHA’B/PA?(P)I’APB2L)H/A(L’NAH(/PIzLPIBz“A
Pu ch

o 6'/BALA/(‘S(z’(AzS?R()APNLPAI/A’)(LP(HARjAPN(AH(/PIzLPIBzAIP/('F“A
 -zA V;VkA (L’NA zBH(A O()IBHI’L''jA FB)2L)H/A IP/A B2zA )BSPIzDA PLR'(A PBA IP/A z(IDNRB)/“A 6zHA (L’NA zBH(A Iz’)(?(zP/A LzHA
Te

LOO(zH/AIP/A/(‘S(z’(AzS?R()A2N(zA/(zHIzDAIP/A'B’L'A)BSPIzDAPLR'(“A
 ”L’NA)BSP(AI/APLDD(HA2IPNALA/(‘S(z’(AzS?R()5APN(A)BSP(/A2IPNAD)(LP()A/(‘S(z’(AzS?R()/AL)(AO)(F())(H“A
 ”L’NAzBH(ALH3()PI/(/ALA?BzBPBzI’L''jAIz’)(L/IzDA(3(zA/(‘S(z’(AzS?R()AFB)AIP/('F“A
 CN(zA LA zBH(A FIzH/A PNLPA LA )BSP(A I/A R)B1(z5A IPA Iz’)(?(zP/A PN(A /(‘S(z’(A zS?R()A BFA PN(A )BSP(A LzHA LH3()PI/(/A IPA 2IPNA
IzFIzIP(A?(P)I’“AUNS/AIzFIzIP(A?(P)I’AIzHI’LP(/APN(A)BSP(AI/AR)B1(z“A
 V(/PIzLPIBzALH3()PI/(/Az(2A/(‘S(z’(AzS?R()“A
EFKEJHvxx

 *(PA;0n+AR(APN(AH(/PIzLPIBzA/(‘S(z’(AzS?R()AFB)AoAL')(LHjAO)(/(zPAIzAn>/A)BSPIzDAPLR'(“A
 9B2A/LjAnA)(’(I3(/AIzFB)?LPIBzALRBSPA)BSP(APBAoA2IPNAPN(AH(/PIzLPIBzA/(‘S(z’(AzS?R()A;0p+AFB)?AzBH(Ap“AUNS/A;0p+AI/A
PN(AH(/PIzLPIBzA/(‘S(z’(AzS?R()A/(zPAF)B?Ap“A
 nAzB2A’B?OL)(/A;0n+ALzHA;0p+“A
o -FAA;0n+AqA;0p+5APN(zAnAIDzB)(/APN(A)BSPIzDAIzFB)?LPIBzA)(’(I3(HAF)B?Ap“A
o -FA;0n+AhA;0p+5ALzHA’B/PABFADBIzDAPN)BSDNApAI/A/?L''()APNLzAPN(A)BSP(A1zB2zAPBAn5APN(zAnA/(P/ApAL/APN(Az(:PANBOAPBAo“A
o -FA;0n+ArA;0p+5APN(zAnA/(P/ApAL/APN(Az(:PANBOAPBAo5ALzHA;0n+AI/ASOHLP(HAPBA(‘SL'A;0p+“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-28 Mobile Networking

Advantages of DSDV
 V;VkAI/ALzA(FFI’I(zPAO)BPB’B'AFB)A)BSP(AHI/’B3()j“ACN(z(3()ALA)BSP(APBALAz(2AH(/PIzLPIBzAI/A)(‘SI)(H5AIPAL')(LHjA(:I/P/A
LPAPN(A/BS)’(“AA
 =(z’(5A'LP(z’jAFB)A)BSP(AHI/’B3()jAI/A3()jA'B2“AA
 V;VkAL'/BADSL)LzP((/A'BBOaF)((AOLPN/“A
Disadvantages of DSDV
 =B2(3()5AV;VkAz((H/APBA/(zHALA'BPABFA’BzP)B'A?(//LD(/“AUN(/(A?(//LD(/AL)(AI?OB)PLzPAFB)A?LIzPLIzIzDAPN(Az(P2B)1A
PBOB'BDjALPA(L’NAzBH(“AA
 UNI/A?LjAD(z()LP(ANIDNA3B'S?(ABFAP)LFFI’AFB)ANIDNaH(z/IPjALzHANIDN'jA?BRI'(Az(P2B)1/“AA
 ;O(’IL'A’L)(A/NBS'HAR(APL1(zAPBA)(HS’(APN(AzS?R()ABFA’BzP)B'A?(//LD(/“A

3.4.2 Dynamic Source Routing (DSR)

e
 V;XAI/ALA5vKNLU/vx54gLUfDAO)BPB’B'A2NI’NAI/ALR'(APBA?LzLD(ALA469”U“AA

g
 V;XA2L/A/O(’IFI’L''jAH(/IDz(HAFB)AS/(AIzAEgHLUUP4Jx,U5vHv33xKyxP4NxfvL,45S3ABFA?BRI'(AzBH(/“AA
io led
 -PAS/(/ALzA4fUyvEKfyxLOO)BL’NAFB)AFIzHIzDA)BSP(/5APNLPAI/5ALA)BSP(AI/A(/PLR'I/N(HABz'jA2N(zAIPAI/A)(‘SI)(HARjALA/BS)’(A
zBH(AFB)AP)Lz/?IPPIzDAHLPLAOL’1(P/“AUNI/ALOO)BL’NA/L3(/APN(ARLzH2IHPNA

ic ow

-PAS/(/AB4g5Nvx54gLUfDAFB)A)BSP(AHI/’B3()jAPNLPAI/APN(A/BS)’(AzBH(AH(P()?Iz(/APN(A2NB'(AOLPNAF)B?APN(A/BS)’(APBAPN(A
H(/PIzLPIBzAzBH(ALzHAH(OB/IP/APN(ALHH)(//(/ABFAPN(AIzP()?(HILP(AzBH(/ABFAPN(A)BSP(AIzAPN(AOL’1(P/“A
n
DSR contains 2 phases
bl kn

X“A XBSP(AVI/’B3()jA0FIzHALAOLPN+A
at

W“A XBSP(A4LIzP(zLz’(A0?LIzPLIzALAOLPN+A
Pu ch

1. Route Discovery

Te

6AzBH(ABz'jAP)I(/APBAHI/’B3()ALA)BSP(APBALAH(/PIzLPIBzAIFAIPANL/APBA/(zHA/B?(PNIzDAPBAPNI/AH(/PIzLPIBzALzHAPN()(AI/AzBA
1zB2zA)BSP(“A

Fig. 3.4.2 : Route Discovery example

 -FAzBH(A6ANL/AIzANI/AXBSP(A7L’N(ALA)BSP(APBAPN(AH(/PIzLPIBzA”5APNI/A)BSP(AI/AI??(HILP('jAS/(H“A-FAzBP5APN(AXBSP(A
VI/’B3()jAO)BPB’B'AI/A/PL)P(HA[A
X“A 9BH(A6A0IzIPILPB)+A/(zH/ALAXBSP(AX(‘S(/PAOL’1(PARjAF'BBHIzDAPN(Az(P2B)1A
W“A -FA zBH(A KA NL/A )(’(zP'jA /((zA LzBPN()A XBSP(A X(‘S(/PA F)B?A PN(A /L?(A PL)D(PA B)A IFA PN(A LHH)(//A BFA zBH(A KA I/A
L')(LHjA'I/P(HAIzAPN(AXBSP(AX(’B)H5AUN(zAzBH(AKAHI/’L)H/APN(A)(‘S(/PsA
Y“A -FA zBH(A KA I/A PN(A PL)D(PA BFA PN(A XBSP(A VI/’B3()j5A IPA )(PS)z/A LA XBSP(A X(O'jA PBA PN(A IzIPILPB)“A UN(A XBSP(A X(O'jA
’BzPLIz/A LA 'I/PA BFA PN(A YR(/PZA OLPNA F)B?A PN(A IzIPILPB)A PBA PN(A PL)D(P“A CN(zA PN(A IzIPILPB)A )(’(I3(/A PNI/A XBSP(A
X(O'j5AIPA’L’N(/APNI/A)BSP(AIzAIP/AXBSP(A7L’N(AFB)AS/(AIzA/(zHIzDA/SR/(‘S(zPAOL’1(P/APBAPNI/AH(/PIzLPIBz“A
^“A GPN()2I/(AzBH(AKAI/z>PAPN(APL)D(PALzHAIPAFB)2L)H/APN(AXBSP(AX(‘S(/PAPBANI/Az(IDNRB)/A0(:’(OPAPBAPN(AIzIPILPB)+“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-29 Mobile Networking

2. Route Maintenance
 -zAV;XA(3()jAzBH(AI/A)(/OBz/IR'(AFB)A’BzFI)?IzDAPNLPAPN(Az(:PANBOAIzAPN(A;BS)’(AXBSP(A)(’(I3(/APN(AOL’1(P“A6'/BA(L’NA
OL’1(PAI/ABz'jAFB)2L)H(HABz’(ARjALAzBH(A0NBOaRjaNBOA)BSPIzD+“AA
 -FALAOL’1(PA’Lz>PAR(A)(’(I3(HARjALAzBH(5AIPAI/A)(P)Lz/?IPP(HASOAPBA/B?(A?L:I?S?AzS?R()ABFAPI?(/ASzPI'ALA’BzFI)?LPIBzA
I/A )(’(I3(HA F)B?A PN(A z(:PA NBO“A Gz'jA IFA )(P)Lz/?I//IBzA )(/S'P/A PN(zA IzA LA FLI'S)(5A LA XBSP(A ”))B)A ?(//LD(A I/A /(zPA PBA PN(A
IzIPILPB)A PNLPA ’LzA )(?B3(A PNLPA ;BS)’(A XBSP(A F)B?A IP/A XBSP(A 7L’N(“A ;BA PN(A IzIPILPB)A ’LzA ’N(’1A NI/A XBSP(A 7L’N(A FB)A
LzBPN()A)BSP(APBAPN(APL)D(P“AA
 -FAPN()(AI/AzBA)BSP(AIzAPN(A’L’N(5ALAXBSP(AX(‘S(/PAOL’1(PAI/AR)BLH’L/P(H“A

Fig. 3.4.3 : Route maintenance example

e
EFKEJHvxVx

g
X“A -FAzBH(A7AHB(/AzBPA)(’(I3(ALzAL’1zB2'(HD(?(zPAF)B?AzBH(AVALFP()A/B?(AzS?R()ABFA)(‘S(/P/5AIPA)(PS)z/ALAXBSP(A”))B)A
io led
PBAPN(AIzIPILPB)A6“A
W“A 6/A/BBzAL/AzBH(A)(’(I3(/APN(AXBSP(A”))B)A?(//LD(5AIPAH('(P(/APN(AR)B1(za'Iz1a)BSP(AF)B?AIP/A’L’N(“A-FA6ANL/ALzBPN()A
ic ow

)BSP(APBA”5AIPA/(zH/APN(AOL’1(PAI??(HILP('jAS/IzDAPNI/Az(2A)BSP(“A
Y“A GPN()2I/(APN(AIzIPILPB)A6AI/A/PL)PIzDAPN(AXBSP(AVI/’B3()jAO)B’(//ALDLIz“A
n
Optimization to route discovery
bl kn

UBAL3BIHAPBBA?LzjAR)BLH’L/P/5APNLPA’LS/(/AF'BBHIzDABFAPN(Az(P2B)1iA(3()jAzBH(ANL/ALzA’BSzP()ALzHAIPAI/AH(’)(?(zP(HA
at

(L’NAPI?(APN(AOL’1(PAI/AR)BLH’L/P(H“A9BH(/A’LzAH)BOALA)(‘S(/PAIFAPN(A’BSzP()A)(L’N(/AV()B“A
Pu ch

DSR Advantages

Te

XBSP(/A?LIzPLIz(HABz'jAR(P2((zAzBH(/A2NBAz((HAPBA’B??SzI’LP(A
 X(HS’(/AB3()N(LHABFA)BSP(A?LIzP(zLz’(A
 XBSP(A’L’NIzDA’LzAFS)PN()A)(HS’(A)BSP(AHI/’B3()jAB3()N(LH“A
 6A /IzD'(A )BSP(A HI/’B3()jA ?LjA jI('HA ?LzjA )BSP(/A PBA PN(A H(/PIzLPIBz5A HS(A PBA IzP()?(HILP(A zBH(/A )(O'jIzDA F)B?A 'B’L'A
’L’N(/“A
DSR Disadvantages
 –L’1(PAN(LH()A/IV(AD)B2/A2IPNA)BSP(A'(zDPNAHS(APBA/BS)’(A)BSPIzDA
 Q'BBHABFA)BSP(A)(‘S(/P/A?LjAOBP(zPIL''jA)(L’NAL''AzBH(/AIzAPN(Az(P2B)1“A
 –BP(zPIL'A’B''I/IBz/AR(P2((zA)BSP(A)(‘S(/P/AO)BOLDLP(HARjAz(IDNRB)IzDAzBH(/A
o -z/()PIBzABFA)LzHB?AH('Lj/AR(FB)(AFB)2L)HIzDAXX”mA
o -z’)(L/(HA’BzP(zPIBzAIFAPBBA?LzjA)BSP(A)(O'I(/A’B?(ARL’1AHS(APBAzBH(/A)(O'jIzDAS/IzDAPN(I)A'B’L'A’L’N(A
o XBSP(AX(O'jA/&+-0AO)BR'(?A
 ;PL'(A’L’N(/A2I''A'(LHAPBAIz’)(L/(HAB3()N(LHA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-30 Mobile Networking

EFKEJHvx4LxWB-x

g e
io led
ic ow
n
bl kn
at
Pu ch
Te
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-31 Mobile Networking

g e
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 3.4.4 : DSR route discovery, Step1 to Step7

3.5 Mobile TCP


MU – May 12, Dec. 12, Dec. 13, May 14, May 15)

Q. Explain snooping TCP and mobile TCP with their merits and demerits. (May 12, Dec. 13, 10 Marks)
Q. Discuss Mobile Transport Layer. (Dec. 12, 5 Marks)
Q. Explain merits and demerits of snooping TCP and indirect TCP? (May 14, 5 Marks)
Q. Explain the functioning of I-TCP and SNOOP -TCP, giving advantages and disadvantages of both.(May 15, 10 Marks)

3.5.1 Traditional TCP


 U)LHIPIBzL'AU7–>/AO()FB)?Lz’(AI/AH(P()IB)LP(HAIzA2I)('(//Az(P2B)1/A’LS/IzDA?LzjA())B)/ALzHAHI/’Bzz(’PIBz/AL/AIPA2L/A
H(/IDz(HAPBAO()FB)?A2(''AIzA2I)(HAz(P2B)1/ALzHA/PLPIBzL)jAzBH(A(z3I)Bz?(zP/5ALzHAzBPAIzA2I)('(//Az(P2B)1/“AA
 UN(AP)LHIPIBzL'AU7–AHB(/AzBPA’Bz/IH()AO)BO()PI(/ABFA2I)('(//Az(P2B)1A/S’NAL/A'I?IP(HARLzH2IHPN5A'BzDA'LP(z’j5ANIDNARIPA
())B)A )LP(5A LzHA F)(‘S(zPA HI/’Bzz(’PIBz/A LzHA N(z’(5A HB(/A zBPA DSL)LzP((A )('ILR'(A LzHA (FFI’I(zPA HLPLA P)Lz/?I//IBzA IzA
2I)('(//A(z3I)Bz?(zP“AA
 U7–A L//S?(/A PNLPA ?B/PA BFA PN(A OL’1(PA 'B//(/A IzA 2I)(HA z(P2B)1A L)(A HS(A PBA ’BzD(/PIBz“A KSPA IzA 2I)('(//A (z3I)Bz?(zP5A
PN()(A’BS'HAR(A?LzjA)(L/Bz/AFB)AOL’1(PA'B//(/APNB/(Az((HAPBAR(A’Bz/IH()(H“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-32 Mobile Networking

 UN(A FB''B2IzDA /(’PIBzA H(/’)IR(/A PN(A P)LHIPIBzL'A U7–A H(/IDz(HA FB)A LA 2I)(HA z(P2B)1A LzHA L'/BA HI/’S//(/A PN(A z((HA FB)A
?BHIFI’LPIBzAPBAPN(AP)LHIPIBzL'AU7–AIzAB)H()APBAS/(AIPA(FFI’I(zP'jAIzA2I)('(//Az(P2B)1/“A
1. Congestion Control
 U7–A2L/AB)IDIzL''jAH(/IDz(HAFB)AFI:(HAz(P2B)1/A2IPNAFI:(HA(zHA/j/P(?/“A
 XBSP()/AL)(A)(/OBz/IR'(APBAP)Lz/F()AOL’1(P/AF)B?A/BS)’(APBAH(/PIzLPIBz“A
 -FA LA OL’1(PA I/A 'B/PA IzA PN(A 2I)(HA z(P2B)15A PN(A O)BRLR'(A )(L/BzA BFA PNLPA I/A ’BzD(/PIBz“A 7BzD(/PIBzA I/A zBPNIzDA RSPA LA
P(?OB)L)jAB3()'BLHALPA/B?(AOBIzPAIzAPN(AP)Lz/?I//IBzAOLPN5AI“(“ALA/PLP(ABFA’BzD(/PIBzALPALAzBH(“A
 ”L’NA )BSP()A ?LIzPLIz/A RSFF()/A FB)A OL’1(P/“A -FA PN(A /S?A BFA PN(A OL’1(P/>A IzOSPA )LP(A H(/PIz(HA FB)A Bz(A BSPOSPA 'Iz1A
(:’((H/A PN(A ’LOL’IPjA BFA PN(A BSPOSPA 'Iz15A PN(zA PN(A RSFF()A R(’B?(/A FS''A LzHA IPA ’LzzBPA FB)2L)HA PN(A OL’1(P/A FL/PA
(zBSDN5A/BAPN(AOL’1(P/AL)(AH)BOO(HARjAPN(A)BSP()“A
 6AH)BOO(HAOL’1(PAI/A'B/PALzHALADLOAI/AzBPI’(HARjAPN(A)(’(I3()AIzAPN(AOL’1(PA/P)(L?“A
 UN(A)(’(I3()A’BzPIzS(/APBAL’1zB2'(HD(AL''AIza/(‘S(z’(AOL’1(P/ASOAPBAPN(A?I//IzDABz(“AAAA

e
 UN(A )(’(I3()A zBPI’(/A PN(A ?I//IzDA L’1zB2'(HD(?(zPA BFA PN(A 'B/PA OL’1(PA LzHA L//S?(/A LA OL’1(PA I/A 'B/PA HS(A PBA

g
’BzD(/PIBz“A

io led
X(P)Lz/?IPPIzDAPN(A'B/PAOL’1(PALzHA’BzPIzSIzDAPBA/(zHAOL’1(P/ALPAFS''A/(zHIzDA)LP(A2BS'HABz'jAIz’)(L/(A’BzD(/PIBz“A
 UBA)(HS’(A’BzD(/PIBz5APN(AP)Lz/?I//IBzA)LP(AI/A/'B2(HAHB2zA’Bz/IH()LR'jARjAU7–“A
 6''A BPN()A U7–A ’Bzz(’PIBz/A 2IPNA PN(A /L?(A O)BR'(?A FB''B2A PN(A /L?(A O)B’(//“A KjA HBIzDA PNI/5A PN(A ’BzD(/PIBzA I/A
ic ow

)(/B'3(HA/BBz“A
 UNI/AR(NL3IB)ABFAU7–AHS)IzDA’BzD(/PIBzAI/A’L''(HA3H4,U3LK5L“AA
n

bl kn

U7–A(z/S)(/APNLPA(3(zASzH()AN(L3jA'BLHAPN(AL3LI'LR'(ARLzH2IHPNA2I''AR(A/NL)(HA(‘SL''j“AA
2. Slow start
at


Pu ch

UN(AR(NL3IB)ABFAU7–ALFP()AH(P(’PIBzABFA’BzD(/PIBzAI/A’L''(HA/'B2A/PL)P“AA
 -PAI/AS/(HAPBA)(/B'3(A’BzD(/PIBzA‘SI’1'j“A
Te

Slow-start working
 ;(zH()A’L'’S'LP(/ALA’BzD(/PIBzA2IzHB2AFB)APN(A)(’(I3()“AUN(A/PL)PA/IV(ABFA2IzHB2AI/ABz(A/(D?(zPA0U7–AOL’1(P+“A
 UN(A /(zH()A /(zH/A Bz(A OL’1(PA LzHA 2LIP/A FB)A LzA L’1zB2'(HD(?(zP“A -FA PNI/A L’1zB2'(HD(?(zPA L))I3(/5A PN(A /(zH()A
Iz’)(L/(/APN(A’BzD(/PIBzA2IzHB2ARjABz(“A6zHAzB2A/(zH/AP2BAOL’1(P/A0’BzD(/PIBzA2IzHB2AhAW+“AA
 6FP()A L))I3L'A BFA P2BA ’B))(/OBzHIzDA L’1zB2'(HD(?(zP/5A PN(A /(zH()A LHH/A WA IzA PN(A ’BzD(/PIBzA 2IzHB25A Bz(A FB)A (L’NA
L’1zB2'(HD(?(zP“A
 UNI/A/’N(?(AHBSR'(/APN(A’BzD(/PIBzA2IzHB2A(3()jAPI?(APN(AL’1zB2'(HD(?(zPAL))I3(/“AUNI/AI/A’L''(HAL/ALzAvFJ4fvfLUKHx
UfN5vK3v^xLzHAIPA’BzPIzS(/API''ALA’()PLIzA3L'S(A’L''(HAL/AN4fDv3LU4fxLP5v3P4Hy“A
 Gz’(A ’BzD(/PIBzA 2IzHB2A ’)B//(/A PN(A ’BzD(/PIBzA PN)(/NB'H5A FS)PN()A Iz’)(L/(A IzA P)Lz/?I//IBzA )LP(A I/A 'Iz(L)A I“(“A
’BzD(/PIBzA2IzHB2AI/AIz’)(L/(HARjABz(A(L’NAPI?(APN(AL’1zB2'(HD(?(zPAI/A)(’(I3(H“A
 UNI/A'Iz(L)AIz’)(L/(A’BzPIzS(/API''APN(A/(zH()AH(P(’P/APN(AOL’1(PA'B//“A
 Gz’(APN(AOL’1(PA'B//AI/AH(P(’P(HiAPN(A/(zH()A/(P/APN(A’BzD(/PIBzAPN)(/NB'HAPBANL'FABFAIP/A’S))(zPA’BzD(/PIBzA2IzHB2A
LzHA’BzD(/PIBzA2IzHB2AI/A/(PAPBABz(“AUN(ALRB3(A/P(O/AL)(A)(O(LP(HALDLIz“A
3. Fast retransmit/fast recovery
 UN(A/(zH()AH(P(’P/APN(A'B//ABFAOL’1(P/AIzAP2BA2Lj/“A
A 0I+A -FALAPI?(aBSPAB’’S)/ALPAPN(A)(’(I3()5AIzAPNLPA’L/(APN(A/(zH()AL’PI3LP(/AzB)?L'A/'B2A/PL)P“A
A 0II+A -FAPN(A/(zH()A)(’(I3(/A’BzPIzSBS/AL’1zB2'(HD(?(zP/AFB)APN(A/L?(AOL’1(PA0VSO'I’LP(AL’1zB2'(HD(?(zP/+“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-33 Mobile Networking

 -FA PNI/A I/A PN(A ’L/(5A PN(zA PN(A /(zH()A ’LzA H(HS’(A P2BA PNIzD/A aA Bz(A I/A PNLPA PN(A )(’(I3()A DBPA L''A OL’1(P/A SOA PBA PN(A
L’1zB2'(HD(?(zPA IzA /(‘S(z’(A LzHA /(’BzHA I/A PNLPA PN(A )(’(I3()A I/A ’BzPIzSBS/'jA )(’(I3IzDA /B?(PNIzDA F)B?A PN(A
/(zH()“AAUN()(FB)(5APN(AOL’1(P/A?S/PANL3(AR((zA'B/PAHS(APBA/I?O'(AP)Lz/?I//IBzA())B)ALzHAzBPAHS(APBAz(P2B)1A
’BzD(/PIBz“A
 UN(A/(zH()A’LzAzB2A)(P)Lz/?IPAPN(A?I//IzDAOL’1(P0/+AR(FB)(APN(API?()A(:OI)(/“AUNI/AR(NL3IB)AI/A’L''(HAL/ALALK3Lx
5vL5Kf3EUL“AA
 UN(A )(’(IOPA BFA LzA L’1zB2'(HD(?(zP/A /NB2A PNLPA PN()(A I/A zBA ’BzD(/PIBzA PBA US/PIFjA LA /'B2A /PL)P“A UN(A /(zH()A ’LzA
’BzPIzS(A2IPNAPN(A’S))(zPA’BzD(/PIBzA2IzHB2“AUN(A/(zH()AO()FB)?/ALAFL/PA)(’B3()jAF)B?APN(AOL’1(PA'B//“A
 UNI/A?(’NLzI/?AI?O)B3(/APN(A(FFI’I(z’jABFAU7–AH)L?LPI’L''j“A
4. Implication on mobility
UN()(AL)(A?LzjAO)BR'(?/APNLPAH(D)LH(APN(AO()FB)?Lz’(ABFAU7–“A
Transmission errors

e
A U7–AL//S?(/A’BzD(/PIBzAIFAOL’1(P/AL)(AH)BOO(H“AUNI/AI/AzBPAL'2Lj/AP)S(AFB)A2I)('(//Az(P2B)1/5A2N()(ABFP(z5AOL’1(PA'B//A

g
I/AHS(APBAP)Lz/?I//IBzA())B)/“AA
io led
Mobility (i.e. handoff)
A 4BRI'IPjA 0I“(“A NLzHBFF+A IP/('FA ’LzA ’LS/(A OL’1(PA 'B//5A IFA (“D“A LA ?BRI'(A zBH(A )BL?/A F)B?A Bz(A L’’(//A OBIzPA 0(“D“A FB)(IDzA
ic ow

LD(zPAIzA4BRI'(A-–+APBALzBPN()A2NI'(APN()(AL)(A/PI''AOL’1(P/AIzAP)Lz/IPAPBAPN(A2)BzDAL’’(//AOBIzPALzHAFB)2L)HIzDAI/AzBPA
OB//IR'(“A
n
High delay
bl kn

A CI)('(//Az(P2B)1/ANL3(ALA’Bz/IH()LR'jA'BzD()A'LP(z’jA0H('Lj+APNLzA2I)(HAz(P2B)1“A
Battery powered devices
at
Pu ch

4BRI'(A H(3I’(/A L)(A RLPP()jA OB2()(HA LzHA N(z’(A OB2()A I/A LA /’L)’(A /BS)’(“A –)BPB’B'A H(/IDz(HA FB)A ?BRI'(A B)A 2I)('(//A
z(P2B)1/A/NBS'HAR(AOB2()A(FFI’I(zP“AAA
Te

Limited Bandwidth
 63LI'LR'(ARLzH2IHPNA2IPNIzALA’(''A?LjA’NLzD(AH)L?LPI’L''j“AUNI/A'(LH/APBAHIFFI’S'PI(/AIzADSL)LzP((IzDAmB;AOL)L?(P()/A
/S’NAL/AH('LjARBSzH/ALzHARLzH2IHPNADSL)LzP((/“A
 BH4,x 3LK5LA I/A PN(A ?(’NLzI/?A BFA P)LHIPIBzL'A U7–A FB)A 2I)(HA z(P2B)1A PBA H(L'A ’BzD(/PIBz“A -zA PNLP5A U7–A L//S?(/A OL’1(PA
'B//(/AHS(APBA’BzD(/PIBz“A=B2(3()5AIzA2I)('(//Az(P2B)1APN()(A’BS'HAR(A/B?(ABPN()A)(L/Bz/APNLPA’LS/(AOL’1(PA'B//A/S’NA
L/AK”X5ALzHAF)(‘S(zPAHI/’Bzz(’PIBz/ARjANLzHBFF“AAAA
 -FA2(AS/(AP)LHIPIBzL'AU7–AIzA2I)('(//A(z3I)Bz?(zP5AIPAH)L/PI’L''jA)(HS’(/APN(A’BzD(/PIBzA2IzHB2A/IV(ALzHAHBSR'(/APN(A
P)Lz/?I//IBzA PI?(BSPA 3L'S(“A UNI/A Szz(’(//L)jA ’BzD(/PIBzA ’BzP)B'A )(HS’(/A PN(A SPI'IVLPIBzA )LP(A BFA PN(A RLzH2IHPN5A
)(HS’(/APN(Az(P2B)1AO()FB)?Lz’(A/(3()('j“A
 ;()IL'A PI?(aBSPA LPA U7–A /(zH()A H(D)LH(/A B3()L''A PN)BSDNOSPA ?B)(A PNLzA 'B//(/A HS(A PBA RIPA ())B)/A B)A /?L''A ’BzD(/PIBzA
2IzHB2AHB“A
 =(z’(A2(A)(‘SI)(HAPBA’NLzD(AU7–AFB)A?BRI'(A(z3I)Bz?(zP“AUN()(AL)(A'L)D(AzS?R()ABFAH(3I’(/ALzHALOO'I’LPIBz/APNLPA
L)(AS/IzDA’S))(zPAU7–iAIPAI/AzBPAOB//IR'(APBA’NLzD(AU7–A’B?O'(P('jAUS/PAPBA/SOOB)PA?BRI'(AS/()/AB)A2I)('(//A'Iz1/“A
 UN()(FB)(ALzjA(zNLz’(?(zPAPBAU7–ANL/APBAR(A’B?OLPIR'(A2IPNAPN(A/PLzHL)HAU7–“AA

3.5.2 Classical TCP improvements


 -zA?BHIFI(HAU7–5AFB''B2IzDA’NL)L’P()I/PI’/AL)(AH(/I)(HA[A
X“A -?O)B3(APN(AU7–AO()FB)?Lz’(AFB)A?BRI'(A(zPIPI(/“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-34 Mobile Networking

W“A 4LIzP(zLz’(ABFA(zHaPBa(zHAU7–A/(?LzPI’/“A
Y“A 4IzI?IV(APN(AO)BR'(?A’LS/(HARjA'(zDPNjAHI/’Bzz(’PIBz/AB)ARjAF)(‘S(zPAHI/’Bzz(’PIBz/“A
^“A 6HUS/PA2IPNAHjzL?I’L''jA’NLzDIzDARLzH2IHPNAB3()APN(AL')(LHjA/PL)3(HA2I)('(//A'Iz1“A
<“A 4L1(A/S)(APNLPAPN(ANLzHBFFA?LzLD(?(zPAI/A(FFI’I(zP“A
 UN(A FB''B2IzDA /(’PIBz/A O)(/(zPA /B?(A ’'L//I’L'A /B'SPIBz/A PNLPA ’LzA R(A S/(HA PBA ?BHIFjA /PLzHL)HA U7–A PBA I?O)B3(A PN(A
O()FB)?Lz’(ABFA2I)('(//A(z3I)Bz?(zP“A

3.5.2(a) Indirect TCP (I-TCP)


MU - May 13, May 14, May 15, Dec. 15, May 17, May 18)

Q. Explain I-TCP in detail. (May 13, 10 Marks)


Q. Explain merits and demerits of indirect TCP ? (May 14, 5 Marks)
Q. Explain functioning of I-TCP and Snooping TCP. Giving advantages and disadvantages of both.
(May 15, May 17, 10 Marks)

e
Q. Explain the functioning of Mobile TCP. (Dec. 15, 5 Marks)

g
Q. Explain any two TCP for Mobile communication. (May 18, 5 Marks)
io led
 UN()(AL)(AP2BAFL’P/[ABz(AI/APNLPAU7–AO()FB)?/AOBB)'jAPBD(PN()A2IPNA2I)('(//A'Iz1/ALzHA/(’BzHAI/APNLPAU7–A2IPNIzAPN(A
FI:(HAz(P2B)1A’LzzBPAR(A’NLzD(H“A
ic ow

 QID“AY“<“XA/NB2/ALzA(:L?O'(A2IPNALA?BRI'(ANB/PA’Bzz(’P(HA3ILALA2I)('(//A'Iz1ALzHALzAL’’(//AOBIzPAPBAPN(A2I)(HAIzP()z(PA
2N()(APN(A’B))(/OBzH(zPAzBH(A)(/IH(/“AUN(A’B))(/OBzH(zPAzBH(A’BS'HAL'/BAS/(A2I)('(//AL’’(//“A
n
 -aU7–A/(OL)LP(/ALAU7–A’Bzz(’PIBzAIzPBAP2BAOL)P/A[ALAFI:(HALzHALA2I)('(//AOL)P“A
bl kn

o 0UFvyxJK5LxU3AR(P2((zAPN(A?BRI'(A/SOOB)PA)BSP()A0L’’(//AOBIzP+ALzHAPN(AFI:(HANB/PAB3()APN(AFI:(HAz(P2B)1“A
o
at

_U5vHv33xJK5LAI/AR(P2((zAPN(A4=A04BRI'(ANB/P+ALzHAIP/AL’’(//AOBIzPAB3()APN(A2I)('(//A?(HIS?“A
Pu ch

 ;PLzHL)HAU7–AI/AS/(HAR(P2((zAPN(AFI:(HA’B?OSP()ALzHAPN(AL’’(//AOBIzP“AA
 6ADBBHAOBIzPAFB)A/(D?(zPIzDAPN(A’Bzz(’PIBzAR(P2((zA?BRI'(ANB/PALzHA’B))(/OBzH(zPANB/PAI/ALPAPN(AFB)(IDzALD(zPABFA
Te

?BRI'(A-–“A
 UN(A FB)(IDzA LD(zPA I/A )(/OBz/IR'(A FB)A ’BzP)B''IzDA PN(A S/()A ?BRI'IPj“A 6zHA HS)IzDA NLzHB3()5A FB)(IDzA LD(zPA P)Lz/F()/A PN(A
’Bzz(’PIBzAPBAPN(Az(2AFB)(IDzALD(zP“A
 UN(AFB)(IDzALD(zPAL’P/AL/ALAO)B:jALzHA)('Lj/AL''AHLPLAIzARBPNAHI)(’PIBz/“AA

Fig. 3.5.1 : Indirect TCP

UN()(A?LjAR(AFB''B2IzDA/’(zL)IB/“A
1. Correspondent host sends a packet to mobile host
 ;Iz’(APN(A’B))(/OBzH(zPAzBH(AI/ALAFI:(HAzBH(5AIPA/(zH/ALAU7–AOL’1(PA3ILALA/PLzHL)HAU7–“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-35 Mobile Networking

 6zAL’’(//AOBIzPA)(’(I3(/APNLPAOL’1(PALzHA/(zH/ALzAL’1zB2'(HD(?(zPAPBALAFI:(HANB/PAFB)APN(A)(’(I3(HAOL’1(P“A
 UN(AL’’(//AOBIzPARSFF()/APN(AOL’1(PALzHAFB)2L)H/APNI/AOL’1(PAPBALA?BRI'(ANB/PAS/IzDA2I)('(//AU7–“A
 -FAPN()(AI/ALzjAP)Lz/?I//IBzA())B)ABzA2I)('(//A'Iz1APN(zAL’’(//AOBIzPA)(P)Lz/?IP/APNLPAOL’1(PAIz/P(LHABFAFI:(HANB/PA
)(P)Lz/?IPPIzDAIP“A0UNI/AI/AL'/BA’L''(HA'B’L'A)(P)Lz/?I//IBz+“AA
 Gz’(APN(AL’1zB2'(HD(?(zPAI/A)(’(I3(HAFB)APN(AOL’1(PAFB)?APN(A?BRI'(ANB/PiAPN(AL’’(//AOBIzPAPN(zA)(?B3(/APNLPA
OL’1(PAF)B?AIP/ARSFF()“A
 UNS/APN(AL’’(//AOBIzPAL’P/AL/ALAO)B:j“A
2. Mobile host transmits a packet to a fixed host
 4BRI'(ANB/PA/(zH/ALAU7–AOL’1(PALzHAL’’(//AOBIzPA)(’(I3(/APNLPAOL’1(PALzHA/(zH/ALzAL’1zB2'(HD(?(zPAPBA?BRI'(A
NB/P“A
 -FALAOL’1(PAI/A'B/PALPA2I)('(//A'Iz1APN(zAPN(A?BRI'(ANB/PAzBPI’(/APNI/A(3(zPA?S’NAFL/P()ALzHA)(P)Lz/?IP/APN(AOL’1(P“A
 UN(AL’’(//AOBIzPAPN(zAP)Lz/?IP/APNLPAOL’1(PAPBAPN(AFI:(HANB/PA3ILA/PLzHL)HAU7–A’Bzz(’PIBz“A

e
 -FALAOL’1(PAI/A'B/PAIzA2I)(HAz(P2B)1APN(zAQ6ANLzH'(/APN(A)(P)Lz/?I//IBz/“A

g
 6FP()A)(’(I3IzDAPN(AL’1zB2'(HD(?(zPAPN(AOL’1(PAI/A)(?B3(HAF)B?APN(ARSFF()“A
io led
3. The mobile host moves to a new location and handover takes place
 CN(zA?BRI'(ANB/PA?B3(/APBALAz(2A'B’LPIBz5AIPA)(DI/P()/A2IPNAz(2AFB)(IDzALD(zP“A6FP()A)(DI/P)LPIBzAPN(Az(2AFB)(IDzA
ic ow

LD(zPAIzFB)?/APN(AB'HAFB)(IDzALD(zPALRBSPAIP/A’S))(zPA'B’LPIBz“A
 UN(A B'HA FB)(IDzA LD(zPA FB)2L)H/A L''A PN(A RSFF()(HA OL’1(P/A PBA z(2A FB)(IDzA LD(zPA L/A PN(A OL’1(PA IzA PN(A RSFF()A NL3(A
n
L')(LHjAR((zAL’1zB2'(HD(H“A
bl kn

 CIPNAPN(ARSFF()(HAHLPLAPN(A/B’1(P/ABFAPN(AL’’(//AOBIzPA?S/PAL'/BA?ID)LP(APBAPN(Az(2AFB)(IDzALD(zP“AUNI/AI/A/NB2zA
IzAQID“AY“<“W“A
at
Pu ch
Te

Fig. 3.5.2 : Socket migration after handover of a mobile host

 UN(A/B’1(PA)(F'(’P/APN(A’S))(zPA/PLP(ABFAPN(AU7–A’Bzz(’PIBzAI“(“A/(‘S(z’(AzS?R()5ALHH)(//(/5AOB)PAzS?R()/A(P’“A
 UN(ANLzHB3()AI/AP)Lz/OL)(zPAPBAPN(A’B))(/OBzH(zPANB/PALzHAzBAz(2A’Bzz(’PIBzAI/A(/PLR'I/N(HAFB)APN(A?BRI'(ANB/P“A
Advantages of I-TCP
 -aU7–AHB(/AzBPA)(‘SI)(ALzjA’NLzD(/AIzAPN(A/PLzHL)HAU7–AS/(HAFB)A2I)(HAz(P2B)1/“A
 VS(APBAPN(AOL)PIPIBzIzDAP)Lz/?I//IBzA())B)/ABzAPN(A2I)('(//A'Iz1A’LzzBPAO)BOLDLP(AIzPBAPN(AFI:(HAz(P2B)1“A
 -PAI/A/I?O'(APBA’BzP)B'5A?BRI'(AU7–AI/AS/(HABz'jAFB)ABz(ANBOAR(P2((z5A(“D“5ALAFB)(IDzALD(zPALzHA?BRI'(ANB/P“A
 6A3()jAFL/PA)(P)Lz/?I//IBzABFAOL’1(P/AI/AOB//IR'(5APN(A/NB)PAH('LjABzAPN(A?BRI'(ANBOAI/A1zB2z“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-36 Mobile Networking

 VS(APBAPN(A/(D?(zPLPIBzABFAPN(AU7–A’Bzz(’PIBz5APN(A?BRI'(ANB/PALzHA’B))(/OBzH(zPANB/PA’LzAS/(AHIFF()(zPAP)Lz/OB)PA
'Lj()AO)BPB’B'/“A
 VIFF()(zPA/B'SPIBz/APBABOPI?IV(APN(AP)Lz/F()AB3()APN(A2I)('(//A'Iz1A’LzAR(AP(/P(HAB)A’L))I(HABSPA2IPNBSPAOSPPIzDABFAPN(A
-zP()z(PALPA)I/1“A
Disadvantages of I-TCP
 -PA'B//(/A(zHaPBa(zHA/(?LzPI’/iALzAL’1zB2'(HD(?(zPA/(zPARjAL’’(//AOBIzPAPBALA/(zH()AHB(/AzB2AzBA'BzD()A?(LzAPNLPALA
)(’(I3()A )(L''jA DBPA LA OL’1(P“A -FA LA FB)(IDzA LD(zPA ’)L/N(/A R(FB)(A /(zHIzDA L’1zB2'(HD(HA OL’1(PA PBA LA ?BRI'(A NB/PiA PN(A
/(zH()ANL/AzBA2LjAPBAFIzHABSPA2N(PN()AOL’1(P/ANL3(AR((zA)(’(I3(HAB)AzBP“A
 =IDN()A NLzHB3()A 'LP(z’jA I/A ?B)(A O)BR'(?LPI’“A 6''A OL’1(P/A /(zPA RjA ’B))(/OBzH(zPA NB/PA L)(A RSFF()(HA RjA PN(A FB)(IDzA
LD(zP“A-FALA?BRI'(ANB/PA’NLzD(/AIP/A'B’LPIBz5AB'HAFB)(IDzALD(zPANL/APBAFB)2L)HAPN(ARSFF()(HAOL’1(P/APBAPN(Az(2AFB)(IDzA
LD(zPAL/APN(jANL3(AL')(LHjAR((zAL’1zB2'(HD(HARjAPN(AB'HAL’’(//AOBIzP“A
 UN(AFB)(IDzALD(zPA?S/PAR(ALAP)S/P(HA(zPIPjAR(’LS/(AU7–A’Bzz(’PIBzA(zH/ALPAPNI/AOBIzP“A

e
3.5.2(b) Snooping TCP (S-TCP)

g
io led (MU – May 12, Dec. 13, May 14, May 15, May 17, May 18)

Q. Explain snooping TCP with its merits and demerits. (May 12, Dec. 13, May 14, 5 Marks)
Q. Explain the functioning of SNOOP -TCP, give advantages and disadvantages. (May 15, 10 Marks)
Q. Explain functioning of I-TCP and Snooping TCP. Giving advantages and disadvantages of both.
ic ow

(May 15, May 17, 10 Marks)


n
Q. Explain any two TCP for Mobile communication. (May 18, 5 Marks)
bl kn

 ;zBBOIzDAU7–A2B)1/A’B?O'(P('jAP)Lz/OL)(zP'jALzHA'(L3(/APN(AU7–A(zHaPBa(zHA’Bzz(’PIBzAIzPL’P“AA

at

-PAB3()’B?(/APN(A/B?(AH)L2RL’1/ABFAPN(A-aU7–“A
Pu ch
Te

Fig. 3.5.3 : Snooping TCP

A ;zBBOIzDAU7–A2B)1/AL/AFB''B2/A[A
1. Correspondent host sends a packet to mobile host
 7B))(/OBzH(zPANB/PA/(zH/ALAOL’1(PAPBA?BRI'(ANB/PA3ILA2I)(HAU7–A’Bzz(’PIBz“AUN(AL’’(//AOBIzPARSFF()/APN(AOL’1(PA
/(zPARjA’B))(/OBzH(zPANB/P“A
o 6’’(//AOBIzPAL'/BA/zBBO/ABzAPN(AOL’1(PAIzARBPNAHI)(’PIBz/APBA)(B)DLzIV(AL’1zB2'(HD(?(zP/“AA
o Gz’(A PN(A ?BRI'(A NB/PA )(’(I3(/A PN(A OL’1(P5A IPA /(zH/A LzA L’1zB2'(HD(?(zPA LzHA PNI/A L’1zB2'(HD(?(zPA L'/BA
OL//(/APN)BSDNAPN(AL’’(//AOBIzP“A
o -FAPN(AL’’(//AOBIzPAHB(/z>PA)(’(I3(ALzjAL’1zB2'(HD(?(zPAF)B?ALA?BRI'(ANB/PA2IPNIzA’()PLIzAL?BSzPABFAPI?(5A
PN(zA IPA )(P)Lz/?IP/A PN(A OL’1(PA F)B?A IP/A RSFF()5A O()FB)?IzDA LA ?S’NA FL/P()A )(P)Lz/?I//IBzA ’B?OL)(HA PBA PN(A
FI:(HANB/P“A
o UN(API?(aBSPAFB)AL’1zB2'(HD(?(zP/A’LzAR(A?S’NA/NB)P()5AR(’LS/(AIPA)(F'(’P/ABz'jAPN(AH('LjABFABz(ANBOAO'S/A
O)B’(//IzDAPI?(“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-37 Mobile Networking

o -PA I/A L'/BA OB//IR'(A PNLPA ?BRI'(A NB/PA /(zH/A HSO'I’LP(A L’1zB2'(HD(?(zP/A FB)A PN(A /L?(A OL’1(PA PBA IzHI’LP(A LA
OL’1(PA 'B//iA PN(A FB)(IDzA LD(zPA ’LzA FI'P()A PN(/(A HSO'I’LP(A L’1zB2'(HD(?(zP/A /B5A PNLPA Szz(’(//L)jA
)(P)Lz/?I//IBz/AF)B?APN(A’B))(/OBzH(zPANB/PA’LzAR(AL3BIH(H“A
2. Mobile host transmits a packet to a correspondent host
 CN(zA LA ?BRI'(A NB/PA /(zH/A LA OL’1(PA PBA ’B))(/OBzH(zPA NB/P5A PN(A FB)(IDzA LD(zPA 1((O/A A P)L’1A BFA PN(A /(‘S(z’(A
zS?R()/ABFAPN(/(AOL’1(P/“AA
 CN(zA LA FB)(IDzA LD(zPA H(P(’P/A LA DLOA IzA PN(A /(‘S(z’(A zS?R()/5A I“(“A OL’1(PA 'B//5A IPA /(zH/A LA z(DLPI3(A
L’1zB2'(HD(?(zPA0967l+APBAPN(A?BRI'(ANB/P“A
 Gz’(APN(A?BRI'(ANB/PA)(’(I3(/APN(A967l5AIPA’LzA)(P)Lz/?IPAPN(A?I//IzDAOL’1(PAI??(HILP('j“A
 X(B)H()IzDABFAPN(AOL’1(P/AI/AHBz(ALSPB?LPI’L''jALPAPN(A’B))(/OBzH(zPAzBH(ARjAU7–“A
A 9BP(A PNLPA PBA ?LIzPLIzA (zHaPBa(zHA /(?LzPI’/A BFA U7–5A FB)(IDzA LD(zPA ?S/PA zBPA L’1zB2'(HD(A HLPLA IP/('FA PBA PN(A
’B))(/OBzH(zPANB/PA0Iz/P(LHAQ6AFB)2L)H/APN(A67lA)(’(I3(HAF)B?APN(A4=+“AUNI/A(z/S)(/APN(A’B))(/OBzH(zPANB/PAPNLPA

e
PN(A ?BRI'(A NB/PA NL/A L’PSL''jA )(’(I3(HA PN(A HLPL“A 9B2A IFA FB)(IDzA LD(zPA ’)L/N(/5A PN(A PI?(aBSPA ?(’NLzI/?A BFA

g
’B))(/OBzH(zPANB/PA/PI''A2B)1/ALzHAP)IDD()/ALA)(P)Lz/?I//IBzABFALA'B/PAOL’1(P“A
Advantages of Snooping-TCP
io led
 UN(A(zHaPBa(zHA/(?LzPI’/AL)(AO)(/()3(H“A
 7B))(/OBzH(zPANB/PAz((HAzBPAPBAR(A’NLzD(HiA?B/PABFAPN(A(zNLz’(?(zP/AL)(AHBz(AIzAPN(AFB)(IDzALD(zP“A
ic ow

 -PAHB(/z>PAz((HANLzHB3()ABFAPN(A/PLP(AL/A/BBzAL/APN(A?BRI'(ANB/PA?B3(/APBALzBPN()AFB)(IDzALD(zP“A6//S?(APN()(A?IDNPA
n
/PI''AR(AHLPLAIzAPN(ARSFF()AzBPAP)Lz/F())(HAPBAPN(Az(2AFB)(IDzALD(zP“A6''APNLPANLOO(z/AI/ALAPI?(aBSPALPAPN(A’B))(/OBzH(zPA
bl kn

NB/PALzHAPN(A)(P)Lz/?I//IBzABFAPN(AOL’1(P/APBAPN(Az(2AFB)(IDzALD(zP“A
 -PAHB(/z>PA?LPP()AIFAPN(Az(2AFB)(IDzALD(zPAS/(/APN(A(zNLz’(?(zPAB)AzBP“A-FAzBP5A/zBBOIzDAU7–ALSPB?LPI’L''jAFL''/ARL’1A
at

PBAPN(A/PLzHL)HA/B'SPIBz“A
Pu ch

Disadvantages of snooping TCP



Te

\/IzDA 967lA R(P2((zA FB)(IDzA LD(zPA LzHA PN(A ?BRI'(A NB/PA L//S?(/A LHHIPIBzL'A ?(’NLzI/?/A BzA ?BRI'(A NB/P“A UNI/A
LOO)BL’NAI/AzBA'BzD()AP)Lz/OL)(zPAFB)AL)RIP)L)jA?BRI'(ANB/P/“A
 ;zBBOIzDA U7–A HB(/A zBPA I/B'LP(A PN(A R(NL3IB)A BFA PN(A 2I)('(//A 'Iz1A F)B?A 2I)(HA 'Iz1A L/A IzA ’L/(A BFA -aU7–“A -FA PN(A H('LjA IzA
2I)('(//A'Iz1AI/A3()jANIDNAL/A’B?OL)(HAPBA2I)(HA'Iz15APN(API?()/ABFAPN(AL’’(//AOBIzPALzHAPN(A’B))(/OBzH(zPANB/PA2BS'HA
L'?B/PA R(A /L?(“A UNS/5A PN(A H('LjA BzA 2I)('(//A 'Iz1A LSPB?LPI’L''jA P)IDD()/A PI?(aBSPA IzA ’B))(/OBzH(zPA NB/PA LzHA ’LS/(/A
)(P)Lz/?I//IBz/“AUNS/APN(A(FF(’PI3(z(//ABFA;aU7–A’B?O'(P('jAH(O(zH/ABzAPN(A‘SL'IPjABFA2I)('(//A'Iz1“A
 -FAS/()ALOO'I(/A(zHaPBa(zHA(z’)jOPIBz5A;aU7–AFLI'/“AK(’LS/(AU7–AN(LH()A2BS'HAR(A(z’)jOP(HALzHAN(z’(A/zBBOIzDABzAPN(A
/(‘S(z’(AzS?R()/AI/A?(LzIzD'(//“AA

3.5.2(c) Mobile TCP (M-TCP)


MU – May 12, Dec. 13, May 13, Dec. 17, May 18)

Q. Explain M-TCP in detail. (May 13, 5 Marks)


Q. Explain mobile TCP with its merits and demerits. (May 12, Dec. 13, 5 Marks)
Q. Write a short note on M-TCP. (Dec. 17, 5 Marks)
Q. Explain any two TCP for Mobile communication. (May 18, 5 Marks)

 UN(AB’’S))(z’(ABFA'(zDPNjALzH8B)AF)(‘S(zPAHI/’Bzz(’PIBzAI/APN(A?LUB)AO)BR'(?AIzA2I)('(//Az(P2B)1/“A4a-7–AH(L'/A2IPNA
PN(A'(zDPNjALzH8B)AF)(‘S(zPAHI/’Bzz(’PIBz/“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-38 Mobile Networking

 4aU7–ALI?/A[A
o UBAI?O)B3(AB3()L''APN)BSDNOSPA
o UBA'B2()APN(AH('LjA
o UBA?LIzPLIzA(zHaPBa(zHA/(?LzPI’/ABFAU7–AA
o UBAO)B3IH(ALA?B)(A(FFI’I(zPANLzHB3()A
 UN(A’Bzz(’PIBzAI/A/O'IPASOAIzPBAWAOL)P/ARjA4aU7–A/I?I'L)APBA-aU7–“A
 UN(A’B))(/OBzH(zPANB/PALzHA/SO()3I/B)jANB/PA’B??SzI’LP(A3ILAPN(ASz?BHIFI(HA/PLzHL)HAU7–“A
 UN(A’B??SzI’LPIBzAR(P2((zA/SO()3I/B)jANB/PA0;=+ALzHA?BRI'(ANB/PA04=+AI/AHBz(ARjAPN(A?BHIFI(HA/O(’IL'AU7–“A
 QB)AP)Lz/F())IzDAHLPLAR(P2((zARBPNAOL)P/5APN(A/SO()3I/B)jANB/PAI/AS/(H“A
 ;=AHB(/AzBPAO()FB)?A’L’NIzDAB)A)(P)Lz/?I//IBzABFAAHLPLAL/ALA)('LPI3('jA'B2ARIPA())B)A)LP(AI/AL//S?(HARjA4aU7–ABzAPN(A
2I)('(//A'Iz1“ACN(z(3()ALAOL’1(PAI/A'B/PABzAPN(A2I)('(//A'Iz15APN(AB)IDIzL'A/(zH()A?S/PA)(P)Lz/?IPAIP“AU7–A(zHaPBa(zHA
/(?LzPI’/AL)(APNS/A?LIzPLIz(H“AQB)AFLI)A/NL)IzDAB3()APN(A2I)('(//A'Iz15A4aU7–Az((H/ALARLzH2IHPNA?LzLD()“A

e
Working of M-TCP

g
 –L’1(P/AL)(A/(zPAPBAPN(A?BRI'(ANB/PARjALA’B))(/OBzH(zPANB/P“A
io led
 -FALzjAOL’1(PAI/A'B/PABzAPN(A2I)('(//A'Iz15APN(zAPN(AB)IDIzL'A/(zH()A)(P)Lz/?IP/APN(AOL’1(P“AUNS/5A(zHaPBa(zHA/(?LzPI’/A
L)(A?LIzPLIz(H“A

ic ow

6''APN(AOL’1(P/A/(zPAPBA4=AL)(A?BzIPB)(HARjAPN(A;=ALzHAL)(AL’1zB2'(HD(HARjAPN(A4=A3ILA67lAOL’1(P/“A
 6FP()ALA/(PAL?BSzPABFAPI?(5AIFAPN(A;=A/PI''AHB(/AzBPA)(’(I3(ALzjA67l5AIPAL//S?(/APNLPAPN(A4=AI/AHI/’Bzz(’P(H“A
n
 ;=A/(P/A/(zH()>/A2IzHB2A/IV(APBAV()BALzHAPNS/A’NB1(/APN(A/(zH()“AGz’(APN(A2IzHB2A/IV(AI/A/(PAPBAV()B5APN(A/(zH()AI/A
bl kn

FB)’(HA PBA DBA IzPBA LA O()/I/P(zPA ?BH(“A -zA PN(A O()/I/P(zPA ?BH(5A IzH(O(zH(zPA BFA PN(A )(’(I3()>/A O()IBHA BFA HI/’Bzz(’P(HA
/PLP(5APN(A/PLP(ABFAPN(A/(zH()A2I''AzBPA’NLzD(“A
at
Pu ch

 Gz’(APN(A;=AH(P(’P/APN(A’Bzz(’PI3IPjALDLIz5APN(A/(zH()>/A2IzHB2A/IV(AI/ALDLIzA/(PAPBAPN(AB'HA3L'S(5A(zLR'IzDAPN(A/(zH()A
PBA/(zHALPAFS''A/O((H“A
Te

Fig. 3.5.4 : Mobile TCP (M-TCP)

Advantages of M-TCP
 ”zHaPBa(zHA/(?LzPI’/AL)(A?LIzPLIz(H“A;=AIP/('FAHB(/z>PA/(zHALzjA67l5AIPABz'jAFB)2L)H/A67l/APNLPA2()(A)(’(I3(HAF)B?A
PN(A4=“A
 -PAL3BIH/ASzz(’(//L)jA)(P)Lz/?I//IBz/5AIFAPN(A4=AI/AHI/’Bzz(’P(H“AA
 -PAI/AzBPAz(’(//L)jAPBAFB)2L)HAL''AHLPLAPBALAz(2A;=AR(’LS/(A;=AHB(/AzBPARSFF()ALzjAHLPL“A
Disadvantages of M-TCP
 *B//(/ABzA2I)('(//A'Iz1AL)(AO)BOLDLP(HAPBAPN(A2I)(HA'Iz1“AUNI/AI/AR(’LS/(A;=AHB(/AzBPAL’PAL/ALAO)B:jALzHAHB(/AzBPARSFF()A
PN(AOL’1(P/ALzHAI/AzBPA)(/OBz/IR'(AFB)A'B’L'A)(P)Lz/?I//IBz“A
 -PA)(‘SI)(/Az(2Az(P2B)1A('(?(zP/A'I1(ARLzH2IHPNA?LzLD()“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-39 Mobile Networking

3.5.3 Fast Retransmit/Fast Recovery


 UNI/A/’N(?(AI?O)B3(/APN(AO()FB)?Lz’(AHS)IzDANLzHB3()“AA
 4B3IzDAPBALAz(2AQ6A’LzA’LS/(AOL’1(PA'B//AB)API?(ABSPALPA?BRI'(ANB/PAB)A’B))(/OBzH(zPANB/P“A-zA/S’NA’L/(A/PLzHL)HAU7–A
L//S?(/A’BzD(/PIBzALzHADB(/AIzPBA/'B2A/PL)PA?BH(AL'PNBSDNAPN()(AI/AzBA’BzD(/PIBzA0=()(AOL’1(PA'B//AI/A’LS/(HAHS(APBA
NLzHB3()+“AA
 6A NB/PA ’LzA S/(A FL/PA )(P)Lz/?IP8FL/PA )(’B3()jA LFP()A IPA )(’(I3(/A HSO'I’LP(A L’1zB2'(HD(?(zP/“A UN(A IH(LA N()(A I/A PBA
LSPB?LPI’L''jAFB)’(APN(AFL/PA)(P)Lz/?IPAR(NL3IB)ABzAPN(A?BRI'(ANB/PALzHA’B))(/OBzH(zPANB/P“A
Correspondent host enters in fast retransmit mode
 6/A/BBzAL/A?BRI'(ANB/PA)(DI/P()/ALPALAz(2AFB)(IDzALD(zP5AIPA/PL)P/A/(zHIzDAHSO'I’LP(AL’1zB2'(HD(?(zP/A0PN)((AHSO'I’LP(A
67l/+APBAPN(A’B))(/OBzH(zPANB/P“A
 GzA)(’(I3IzDAPN(/(AHSO'I’LP(/APN(A’B))(/OBzH(zPANB/PA’BzPIzS(/APBA/(zHA2IPNAPN(A/L?(A)LP(AIPAHIHAR(FB)(APN(A?BRI'(A
NB/PA?B3(HAPBAz(2AFB)(IDzALD(zP“A

e
 UNS/APN(A’B))(/OBzH(zPANB/PADB(/AIzPBAFL/PAP)Lz/?IPA?BH(ALzHAzBPAPBAPN(A/'B2A/PL)P“A

g
Mobile host enters in fast retransmit mode
io led
 4BRI'(ANB/PA?LjAL'/BA(zP()AIzA/'B2A/PL)PALFP()A?B3IzDAPBALAz(2AFB)(IDzALD(zP“AA
 UBAL3BIHAPNI/5ALFP()ANLzHB3()ALA?BRI'(ANB/PALSPB?LPI’L''jAL’PI3LP(/AFL/PA)(P)Lz/?IPA?BH(“A
ic ow

 UN(A?BRI'(ANB/PA)(P)Lz/?IP/AL''ASzL’1zB2'(HD(HAOL’1(PAS/IzDAPN(A’S))(zPA’BzD(/PIBzA2IzHB2A/IV(A2IPNBSPADBIzDAIzPBA
/'B2A/PL)P“A
n
Advantages of fast retransmit/fast recovery
bl kn

 QB)(IDzALD(zPAB)A’B))(/OBzH(zPANB/PAz((HAzBPAPBAR(A’NLzD(H“A
at


Pu ch

4IzB)A’NLzD(/AL)(A)(‘SI)(HAIzA?BRI'(ANB/P>/A/BFP2L)(“A
 k()jA;I?O'(“A
Te

Disadvantages of fast retransmit/fast recovery


 -z/SFFI’I(zPAI/B'LPIBzABFAOL’1(PA'B//(/“A-FAPN(ANLzHB3()AF)B?ABz(AQ6APBALzBPN()APL1(/ALA'BzD()API?(5APN(A’B))(/OBzH(zPA
zBH(A2I''ANL3(AL')(LHjA/PL)P(HA)(P)Lz/?I//IBz/“A
 UNI/A LOO)BL’NA FB’S/(/A BzA PN(A OL’1(PA 'B//A HS(A PBA NLzHB3()“A –L’1(PA 'B//A HS(A PBA O)BR'(?/A BzA PN(A 2I)('(//A 'Iz1A I/A zBPA
’Bz/IH()(H“A
 UNI/ALOO)BL’NA)(‘SI)(/A’BBO()LPIBzAR(P2((zA4BRI'(A-–ALzHAU7–“A-PAI/APN()(FB)(ANL)H()APBA’NLzD(ABz(A2IPNBSPALFF(’PIzDA
PN(ABPN()“A

3.5.4 Transmission/ Time-out Freezing


 UNI/ALOO)BL’NA’LzANLzH'(A'BzDAHI/’Bzz(’PIBz/ABFA4=“A
 mSIP(A )(DS'L)'j5A IPA NLOO(z/A PNLPA PN(A 467A 'Lj()A O)(HI’PA PN(A ’Bzz(’PIBzA O)BR'(?/5A R(FB)(A PN(A ’Bzz(’PIBzA I/A L’PSL''jA
IzP())SOP(HAF)B?AU7–AOBIzPABFA3I(2“A
 6HHIPIBzL''j5A PN(A 467A 'Lj()A 1zB2/A PN(A L’PSL'A )(L/BzA BFA PN(A HI/’Bzz(’PIBzA LzHA HB(/A zBPA L//S?(A ’BzD(/PIBzA L/A U7–A
HB(/“A
 467A'Lj()A’LzAzB2AIzFB)?APN(AU7–A'Lj()AFB)APN(ASO’B?IzDA'B//AIzA’Bzz(’PIBz“A
 U7–A’LzAzB2A/PBOAOL’1(PA/(zHIzDALzHAF)((V(APN(A’S))(zPA/PLP(ABFA’BzD(/PIBzA2IzHB2ALzHAL''API?()/ABFAU7–“A
 -FAPN(AHI/’Bzz(’PIBz/AB’’S)AF)(‘S(zP'jAPN(zALHHIPIBzL'A?(’NLzI/?AIzAPN(AL’’(//AOBIzPA?S/PAR(AIz’'SH(HAPBAIzFB)?APN(A
’B))(/OBzH(zPANB/PALRBSPAPN(A)(L/BzABFAIzP())SOPIBz“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-40 Mobile Networking

 6/A/BBzAL/APN(A467A'Lj()AH(P(’P/A’Bzz(’PI3IPjALDLIz5AIPAIzFB)?/APN(AU7–APBA)(/S?(ABO()LPIBzA2IPNAPN(A/L?(A’BzD(/PIBzA
2IzHB2ALzHAPN(API?()/“A
Advantages of transmission/time-out freezing
 -PABFF()/ALA2LjAPBA)(/S?(AU7–A’Bzz(’PIBzA(3(zALFP()ALA'BzD()AIzP())SOPIBzABFAPN(A’Bzz(’PIBz“A
 UNI/A/’N(?(AI/AIzH(O(zH(zPABFALzjABPN()AU7–A?(’NLzI/?/A/S’NAL/AL’1zB2'(HD(?(zP/AB)A/(‘S(z’(AzS?R()/“A;BAIPA’LzA
R(AS/(HAPBD(PN()A2IPNA(z’)jOP(HAHLPL“A
Disadvantages of transmission/time-out freezing
 4BRI'(ANB/PAL/A2(''AL/A’B))(/OBzH(zPANB/PAz((H/APBAR(A’NLzD(H“A
 6''A?(’NLzI/?/AL)(ARL/(HABzAPN(A’LOLRI'IPjABFA467A'Lj()APBAH(P(’PAFSPS)(AIzP())SOPIBz“A
 -FA PN(A (z’)jOPIBzA I/A S/(HA PNLPA H(O(zH/A BzA PI?(aH(O(zH(zPA )LzHB?A zS?R()/5A PN(zA PNI/A /’N(?(A )(‘SI)(HA
)(/jz’N)BzIVLPIBzALFP()AIzP())SOPIBz“A

e
3.5.5 Selective Retransmission

g
 -zAPN(A/PLzHL)HAU7–AL’1zB2'(HD?(zP/AL)(AIzA/(‘S(z’(“A
io led
 -FA LA OL’1(PA I/A 'B/P5A PN(A /(zH()A NL/A PBA )(P)Lz/?IPA L''A PN(A OL’1(P/A /PL)PIzDA F)B?A PN(A 'B/PA OL’1(P“A 0gGaK67lA 9A
)(P)Lz/?I//IBz+“AUNI/A2L/P(/APN(ARLzH2IHPN“A
ic ow

 UN(A/('(’PI3(A)(P)Lz/?I//IBzALOO)BL’NAL''B2/ALA)(P)Lz/?I//IBzABFALA/('(’PI3(AOL’1(PAI“(“APN(A/(zH()A’LzAzB2AH(P()?Iz(A
2NI’NAOL’1(PAI/APBAR(A)(P)Lz/?IPP(H“A
n
Advantages of Selective retransmission
bl kn

 ;(zH()A z((HA PBA )(P)Lz/?IPA 'B/PA OL’1(PA Bz'j“A UNS/5A RLzH2IHPNA )(‘SI)(?(zPA I/A ?S’NA 'B2()A LzHA IPA I/A LH3LzPLD(BS/A IzA
at
Pu ch

/'B2A2I)('(//A'Iz1/“A
 -?O)B3(/APN(AO()FB)?Lz’(ABFAU7–AIzA2I)('(//AL/A2(''AL/AIzA2I)(Az(P2B)1/“A
Te

Disadvantages of Selective retransmission


 7B?O'(:IPjABFA)(’(I3()A/IH(AIz’)(L/(/“A
 4B)(ARSFF()A/OL’(AI/A)(‘SI)(HALPAPN(A)(’(I3()A/IH(APBA/PB)(AL''APN(AOL’1(P/AFB''B2IzDAPN(A?I//IzDAOL’1(PALzHA2LIPAFB)APN(A
DLOAPBAR(AFI''(H“A

3.5.6 Transaction oriented TCP (T/TCP)


 -FA LA ?BRI'(A NB/PA 2LzP/A PBA /(zHA LA OL’1(PA 3ILA U7–5A IPA )(‘SI)(/A PN)((A /P(O/[A ’Bzz(’PIBzA /(PSO5A HLPLA P)Lz/?I//IBz5A LzHA
’Bzz(’PIBzA)('(L/(“AA
 KBPNA’Bzz(’PIBzA/(PSOALzHA’Bzz(’PIBzA)('(L/(A)(‘SI)(APN)((A2LjANLzH/NL1IzD“A
 -FALA?BRI'(ANB/PANL/APBA/(zHABz(AOL’1(P5AU7–A)(‘SI)(/A/(3(zAOL’1(P/“AUN)((AFB)A’Bzz(’PIBzA/(PASO5ABz(AFB)AHLPLALzHA
LDLIzAPN)((AFB)A’Bzz(’PIBzA)('(L/(A0QID“AY“<“<+“A
 QB)APN(A'L)D(AP)Lz/?I//IBzAPNI/AB3()N(LHAI/Az(D'IDIR'(ARSPAFB)A/?L''AL?BSzPABFAHLPLAIPAI/AzBPAz(D'IDIR'(“A
 UN(AP)Lz/L’PIBzAB)I(zP(HAU7–AO)B3IH(/ALA/B'SPIBz“A-PA’B?RIz(/APN(A’Bzz(’PIBzA/(PSOALzHA’Bzz(’PIBzA)('(L/(A2IPNAPN(A
S/()AHLPLAOL’1(P“AA
 UNI/A’LzA)(HS’(APN(AzS?R()ABFAOL’1(P/APBAP2BAF)B?A/(3(z“A
A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-41 Mobile Networking

g e
Fig. 3.5.5 : Example of TCP connection setup and release
io led
Advantage of transaction-oriented TCP
A X(HS’(AB3()N(LH“A
ic ow

Disadvantage of transaction-oriented TCP



n
-PA)(‘SI)(/A’NLzD(AIzA?BRI'(ANB/PALzHAL''A’B))(/OBzH(zPANB/P/“A
bl kn

 UN(A?BRI'IPjAI/AzBA'BzD()AP)Lz/OL)(zP“A
 -PAOB/(/A?LzjA/(’S)IPjA)I/1/“A
at
Pu ch

3.5.7 Comparison of TCP Variants

Table 3.5.1 : Comparison of the TCP enhancements


Te

B59x 2JJ54KNPx DvNPKfU3Ex 2y/KfLKDv3x WU3Ky/KfLKDv3x


H49x

89x kfyU5vNLx#pOx ;O'IP/AU7–A’Bzz(’PIBzAIzPBA -/B'LPIBzABFA2I)('(//A'Iz15A *B//ABFAU7–A/(?LzPI’/5ANIDN()A


P2BA’Bzz(’PIBz/A /I?O'(A 'LP(z’jALPANLzHB3()A

G9x Bf44JUfDx#pOx Y;zBBO/ZAHLPLALzHA U)Lz/OL)(zPAFB)A(zHaPBa(zHA –)BR'(?LPI’A2IPNA(z’)jOPIBz5A


L’1zB2'(HD(?(zP/5A'B’L'A ’Bzz(’PIBz5A467AIzP(D)LPIBzA RLHAI/B'LPIBzABFA2I)('(//A'Iz1A
)(P)Lz/?I//IBzA OB//IR'(A

I9x DU#pOx ;O'IP/AU7–A’Bzz(’PIBz5A’NB1(/A 4LIzPLIz/A(zHaPBa(zHA KLHAI/B'LPIBzABFA2I)('(//A'Iz15A


/(zH()A3ILA2IzHB2A/IV(A /(?LzPI’/5ANLzH'(/A'BzDAP()?A O)B’(//IzDAB3()N(LHAHS(APBA
LzHAF)(‘S(zPAHI/’Bzz(’PIBz/A RLzH2IHPNA?LzLD(?(zPA

K9x 0K3Lx 5vL5Kf3EUL`x 63BIH/A/'B2a/PL)PALFP()A ;I?O'(ALzHA(FFI’I(zPA 4I:(HA'Lj()/5AzBPAP)Lz/OL)(zPA


LK3Lx5vN4/v5zx )BL?IzDA

N9x #5Kf3EU33U4f`x Q)((V(/AU7–A/PLP(ALPA -zH(O(zH(zPABFA’BzP(zPAB)A 7NLzD(/AIzAU7–A)(‘SI)(H5A467A


LUEvU4gLx HI/’Bzz(’P5A)(/S?(/ALFP()A (z’)jOPIBz5A2B)1/AFB)A'BzD()A H(O(zHLzPA
L5vvaUfDx )(’Bzz(’PIBzA IzP())SOP/A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-42 Mobile Networking

B59x 2JJ54KNPx DvNPKfU3Ex 2y/KfLKDv3x WU3Ky/KfLKDv3x


H49x

Q9x BvHvNLU/vx X(P)Lz/?IPABz'jA'B/PAHLPLA k()jA(FFI’I(zPA ;'IDNP'jA?B)(A’B?O'(:A)(’(I3()A


5vL5Kf3EU33U4fx /BFP2L)(5A?B)(ARSFF()Az((H(HA

R9x #5Kf3KNLU4fx 7B?RIz(A’Bzz(’PIBzA ”FFI’I(zPAFB)A’()PLIzA 7NLzD(/AIzAU7–A)(‘SI)(H5AzBPA


45UvfLvyx#pOx /(PSO8)('(L/(ALzHAHLPLA LOO'I’LPIBz/A P)Lz/OL)(zPA
P)Lz/?I//IBzA

3.6 IPv4 and IPv6


(MU - May 12)

Q. What advantages does the use of IPV6 offer for mobility? (May 12, 5 Marks)

e
Ipv4

g
UN(A z(P2B)1A 'Lj()A O)BPB’B'A IzA PN(A U7–8-–A O)BPB’B'A /SIP(A I/A ’S))(zP'jA -–3^“A -–3^A O)B3IH(/A PN(A NB/PaPBaNB/PA
io led
’B??SzI’LPIBzAR(P2((zA/j/P(?/AIzAPN(A-zP()z(P“A-–3^ANL/A/B?(AH(FI’I(z’I(/APNLPA?L1(AIPASz/SIPLR'(AFB)APN(AFL/PAD)B2IzDA
-zP()z(P5AIz’'SHIzDAPN(AFB''B2IzD[A
 V(/OIP(A L''A /NB)PA P()?A /B'SPIBz/5A /S’NA L/A /SRz(PPIzD5A ’'L//'(//A LHH)(//IzD5A LzHA 96U5A LHH)(//A H(O'(PIBzA I/A /PI''A LA 'BzDA
ic ow

P()?AO)BR'(?AIzAPN(A-zP()z(P“A

n
UN(A-zP()z(PA?S/PAL’’B??BHLP(A)(L'API?(ALSHIBALzHA3IH(BAP)Lz/?I//IBz“AUNI/APjO(ABFAP)Lz/?I//IBzA)(‘SI)(/A?IzI?S?A
bl kn

H('LjA/P)LP(DI(/ALzHA)(/()3LPIBzABFA)(/BS)’(/AzBPAO)B3IH(HARjA-–3^AH(/IDz“A
 UN(A -zP()z(PA ?S/PA L’’B??BHLP(A (z’)jOPIBzA LzHA LSPN(zPI’LPIBzA BFA HLPLA FB)A /B?(A LOO'I’LPIBz/“A 9BA (z’)jOPIBzA B)A
at
Pu ch

LSPN(zPI’LPIBzAI/AO)B3IH(HARjA-–3^“A
Ipv6

Te

UBAB3()’B?(APN(/(AO)BR'(?/5A-–3_AL'/BA1zB2zAL/A-–zDA0-zP()z(PA–)BPB’B'Az(:PAD(z()LPIBz+A2L/AO)BOB/(H“AA
 -zA-–3_5APN(A-zP()z(PAO)BPB’B'A2L/A(:P(z/I3('jA?BHIFI(HAPBAL’’B??BHLP(APN(AD)B2PNALzHAz(2AH(?LzH/ABFAPN(A-zP()z(P“AA
 UN(AFB)?LPALzHAPN(A'(zDPNABFAPN(A-–ALHH)(//(/A2()(A’NLzD(HAL'BzDA2IPNAPN(AOL’1(PAFB)?LP“A
 X('LP(HAO)BPB’B'/A/S’NAL/A-74–A2()(AL'/BA?BHIFI(H“AA
 GPN()A O)BPB’B'/A IzA PN(A z(P2B)1A 'Lj()5A /S’NA L/A 6X–5A X6X–5A LzHA -g4–A 2()(A (IPN()A H('(P(HA B)A Iz’'SH(HA IzA -74–3_A
O)BPB’B'“AXBSPIzDAO)BPB’B'/A/S’NAL/AX-–ALzHAG;–QA2()(A/'IDNP'jA?BHIFI(HAPBAL’’B??BHLP(APN(/(A’NLzD(/“A
 UN(AFL/PA/O)(LHIzDAS/(ABFA-zP()z(PALzHAz(2A/()3I’(/A/S’NAL/A?BRI'(A-–5A-–AP('(ONBzj5ALzHA-–a’LOLR'(A?BRI'(AP('(ONBzj5A
?LjA)(‘SI)(APN(APBPL'A)(O'L’(?(zPABFA-–3^ARjA-–3_“A
Advantages of IPv6
hU6x MK5Dv5x Kyy5v33x 3JKNvx VA 6zA -–3_A LHH)(//A I/A XWjA RIPA 'BzD“A 7B?OL)(HA 2IPNA PN(A YWA RIPA 'BzDA -–3^A LHH)(//iA PNI/A I/A NSD(A
Iz’)(L/(AIzALHH)(//A/OL’(“A
hUU6x WvLLv5x OvKyv5x L45EKLx VA -–3_A S/(/A LA z(2A N(LH()A FB)?LPA IzA 2NI’NA BOPIBz/A L)(A /(OL)LP(HA F)B?A PN(A RL/(A N(LH()A LzHA
Iz/()P(HA2N(zAz((H(H5AR(P2((zAPN(ARL/(AN(LH()ALzHAPN(ASOO()A'Lj()AHLPL“AUNI/A/I?O'IFI(/ALzHA/O((H/ASOAPN(A)BSPIzDA
O)B’(//AR(’LS/(A?B/PABFAPN(ABOPIBz/AHBAzBPAz((HAPBAR(A’N(’1(HARjA)BSP()/“A
hUUU6x Hv,xTJLU4f3xVA-–3_ANL/Az(2ABOPIBz/APBAL''B2AFB)ALHHIPIBzL'AFSz’PIBzL'IPI(/“A
hU/6x 2HH4,KfNvx L45x vFLvf3U4fx VA -–3_A I/A H(/IDz(HA PBA L''B2A PN(A (:P(z/IBzA BFA O)BPB’B'A IFA )(‘SI)(HA RjA z(2A P(’NzB'BDI(/A B)A
LOO'I’LPIBz/“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-43 Mobile Networking

(v) Support for resource allocation : In IPv6, the type-of-service field has been removed, but mechanism called Flow
label has been added to enable the source to request special handling of packet. This mechanism can be used to
support traffic such as real-time audio and video.
(vi) Support for more security : The encryption and authentication options in IPv6 provide confidentiality and integrity of
the packet.
Features of Ipv6 to support mobility
 No special mechanisms are needed for securing mobile IP registration. In every Ipv6 node address auto-configuration
i.e. the mechanism for acquiring a COA is inbuilt.
 Neighbor discovery mechanism is also mandatory for every Ipv6 node. So special foreign agents are no longer needed
to advertise services.
 Combining the features of address auto-configuration and neighbor discovery enable every Ipv6 mobile node to create
and obtain a topologically correct address or the current point of attachment.

e
Every Ipv6 node can send binding updates to another node, so the MN can send its COA directly to the CN and HA. The
FA is no longer needed. The CN processes the binding updates and makes corresponding entries in its routing cache.
The MN is now able to :

g
io led
o Decapsulate the packets
o Detect when it needs a new COA and
ic ow

o Determine when to send binding updates to the HA and CN


 A soft handover is possible with Ipv6. The MN sends its new COA to the old router serving the MN at the old COA, and
n
the old router can encapsulate all incoming packets for the MN and forwards them to new COA.
bl kn

Ipv6 Header
at
Pu ch

Fig. 3.6.1 shows both Ipv4 and Ipv6 header format.


Te

Fig. 3.6.1 : Comparison of Ipv4 and Ipv6 Header format

Fields of Ipv6 header


(i) Version : 4 bits. IPv6 version number.
(ii) Traffic Class : 8 bits. Used to specify different classes or priorities of IPv6 packets.
(iii) Flow Label : 20 bits. Used for specifying special router handling from source to destination(s) for a sequence of
packets. It distinguishes the different types of packets such as audio, video, txt etc. and accordingly provides Quality
of services to them.
(iv) Payload Length : 16 bits unsigned. Specifies the length of the data in the packet.
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-44 Mobile Networking

h/6x HvFLxOvKyv5xVAjARIP/“A;O(’IFI(/APN(Az(:PA(z’LO/S'LP(HAO)BPB’B'“AUN(A3L'S(/AL)(A’B?OLPIR'(A2IPNAPNB/(A/O(’IFI(HAFB)APN(A
-–3^AO)BPB’B'AFI('H“A
h/U6x O4JxMUEULxVAjARIP/ASz/IDz(H“AQB)A(L’NA)BSP()APNLPAFB)2L)H/APN(AOL’1(P5APN(ANBOA'I?IPAI/AH(’)(?(zP(HARjAX“ACN(zAPN(A
NBOA'I?IPAFI('HA)(L’N(/AV()B5APN(AOL’1(PAI/AHI/’L)H(H“AUNI/A)(O'L’(/APN(AUU*AFI('HAIzAPN(A-–3^AN(LH()APNLPA2L/AB)IDIzL''jA
IzP(zH(HAPBAR(AS/(HAL/ALAPI?(ARL/(HANBOA'I?IP“A
h/UU6x B4g5NvxKyy5v33xVAX_ARjP(/“AUN(A-–3_ALHH)(//ABFAPN(A/(zHIzDAzBH(“A
h/UUU6xxWv3LUfKLU4fxKyy5v33xVAX_ARjP(/“AUN(A-–3_ALHH)(//ABFAPN(AH(/PIzLPIBzAzBH(“A

Review Questions

Q. 1 Explain working of DRS with a suitable example.

Q. 2 Explain DSDV routing protocol.

e
Q. 3 Compare M-TCP and Snooping TCP.

g
Q. 4 Write a short note on DSR.
io led
Q. 5 Explain any two routing algorithms used for MANET.

Q. 6 Explain the errors in wireless networks that degrade the performance of TCP.
ic ow

Q. 7 Explain various types of transmission errors in wired and wireless networks.


n
bl kn

Q. 8 Explain the errors in wireless networks that degrade the performance of TCP and how TCP snooping can improve the
performance.
at
Pu ch

Q. 9 Discuss the problems of using traditional TCP in wireless networks? Explain I-TCP.

Q. 10 What are the problems with IPv4 protocol? What advantages does IPv6 provide over IPv4?
Te

Q. 11 What are the features of IPv6? Explain IPv6 packet format.

!!!
!
!
A
SS
S
S 4 Wireless Local Area Networks
S
Unit IV
S
S
Syllabus

4.1 Wireless Local Area Networks : Introduction, Infrastructure and ad-hoc network
4.2 IEEE 802.11:System architecture, Protocol architecture, Physical layer, Medium access control layer, MAC
management, 802.11a, 802.11b
4.3 Wi-Fi security : WEP, WPA, Wireless LAN Threats, Securing Wireless Networks

e
4.4 HIPERLAN 1 and HIPERLAN 2

g
4.5 Bluetooth : Introduction, User Scenario, Architecture, protocol stack
io led
S
Introduction
ic ow

M,PRSU,ymE80SP2E01H/U8RSy21E,80SUFyRRS1CSBP08F8RRS28EB10xSE8U,21F1qP8RSUyFF8HS-P08F8RRSO1UyFSz08ySD8EB10xRS4-OzDR’jS
32S U12E0yRES E1S E,8S E8U,21F1qP8RS H8RU0P58HS P2S E,8S m086P1/RS U,ymE80RS R/U,S yRS 7:Y–S 7+K:–S QYM:S 8EUjS -OzDRS y08S EJmPUyFFJS
n
08RE0PUE8HSP2SE,8P0SHPy98E80SE1S5/PFHP2qR–SySUy9m/RS10SySRP2qF8S0119Sy2HSy08S1m80yE8HS5JSP2HP6PH/yFRSy2HS21ES5JSFy0q8SRUyF8S
bl kn

28EB10xSm016PH80RjSM,8S9yP2Sq1yFS1CS-OzDSPRSE1S08mFyU8S1CCPU8SUy5FP2q–SE1S82y5F8SE8E,80F8RRSyUU8RRSE1SE,8S32E8028ESy2HSE1S
yFF1BS yHS ,1US U199/2PUyEP12jS M,8S U,ymE80S HPRU/RR8RS 6y0P1/RS -OzDS E8U,21F1qP8RS R/U,S yRS 3………S V;"j‘‘–S X3+…KOzD“‘S y2HS
at

X3+…KOzD“"jS”10S8yU,S-OzDSRJRE89–SE,8SH8EyPFRS1CSy0U,PE8UE/08–SE,8Sm,JRPUyFSFyJ80Sy2HSYz'SFyJ80S,y68S5882SHPRU/RR8HjS
Pu ch

K89yP2H80S 1CS E,8S U,ymE80S C1U/R8RS 12S —F/8E11E,S E8U,21F1qJS y2HS U19my0PR12S 1CS yFFS 1CS E,8S y5168S 982EP128HS -OzDS
E8U,21F1qP8RjS
Te

4.1 Wireless Local Area Networks


4.1.1 Introduction
 zSBP08F8RRSOzDS410S-OzD–SC10SBP08F8RRSF1UyFSy08yS28EB10x’SPRS128SP2SB,PU,SyS915PF8S/R80SUy2SU1228UESE1SySF1UyFSy08yS
28EB10xS4OzD’SE,01/q,SySBP08F8RRS40yHP1’SU1228UEP12jS!
 M,8S3………SV;"j‘‘–Sq01/mS1CSREy2Hy0HRSRm8UPCJSE,8SE8U,21F1qP8RSC10SBP08F8RRSOzDRj!!
 X198S/R80RSUy2S U08yE8S yS BP08F8RRS 28EB10xS 1/ES 1CS y2S 8=PREP2qS BP08HS 28EB10xS y2HS BP08F8RRFJS 8=E82HS E,8S 08yU,S 1CS E,8S
32E8028ESE,01/q,1/ESE,8S,198S12S9/FEPmF8SU19m/E80RjS
 —JS/RP2qSBP08F8RRSOzD–SPESPRS21BS21ES08µ/P08HSE,yES8680JSB10xREyEP12Sy2HSU12C8082U8S0119S58SBP08HS/mSE1S,/5RSy2HS
RBPEU,8RSBPE,SUy5F8RjS
Advantages of Wireless LAN

4R5 CvLhqQqvqMN5I5-PE,P2S0yHP1SU1680yq8–SyS/R80SUy2S8yRPFJSU199/2PUyE8SBPE,1/ESy2JS08RE0PUEP12jS5
kR5 -qE8vq0qLP58vHYYqYD5I5-P08F8RRSyHZ,1US28EB10xRSH1S21ES08µ/P08Sy2JSmFy22P2qSC10SU12CPq/0P2qSyS28EB10xj5
GR5 zWvEjTM/5Yj56q7qYD5Pq00q9OvMqLT5I5—8Uy/R8S21SBP0P2qSPRS08µ/P08H–SPESUy2S58S8yRPFJSP2REyFF8HSB,808SBP0P2qSPRSHPCCPU/FESS

5 48jqjS,PRE10PUS5/PFHP2qR–SCP08ByFFR’j5
,R5 VjQOTM5I5-P08F8RRSOzDSPRS9108S015/RESyqyP2RESHPRyRE80RSFPx8–S8jqj–S8y0E,µ/yx8R–SCP08–S10S/R80RSm/FFP2qSySmF/qjSS
UR5 XjTM5L00L9MqKL5I5<2U8SySBP08F8RRS28EB10xSPRSP2REyFF8H–SyHHP2qS28BSyHHPEP12yFS/R80SBPFFS21ESP2U08yR8SC/0E,80SU1REjSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-2 Wireless Local Area Networks

Disadvantages of wireless LAN

4R5 Bj6L75 QHYP6qPMF5 HYP5 M7HYTEqTTqjY5 GOHvqMN5 IS -P08F8RRS OzDS 1CC80RS KL7N5 vj65 QHYP6qPMFS 4‘Z‘;S Y5PE“R’S U19my08HS E1S
BP08HS28EB10xRSH/8SE1SR,y08HS98HP/9jSzFR1SPES,yRS,Pq,S80010S0yE8RSH/8SE1SP2E80C8082U8jSX82U8SPES1CC80RSvj65Hj-SyRS
U19my08HSE1SBP08HS28EB10xjS

kR5 IHYN587j87qLMH7N5TjvOMqjYT58=PRE–SH/8SE1SRF1BSREy2Hy0HPVyEP12Sm01U8H/08j5
GR5 Bj9Hv5 7LDOvHMj7N5 7LTM7q9MqjYT5 I5 :8680yFS U1/2E0P8RS P9m1R8S HPCC8082ES Rm8UE0yFS 08RE0PUEP12RjS W/8S E1S E,PRS PES PRS HPCCPU/FES E1S
8REy5FPR,SqF15yFS-OzDSR1F/EP12RjS
,R5 Bj6L75 TH0LMN5 HYP5 TL9O7qMN5 IS S :8U/0PEJS U12U802RS y08S ,Pq,S P2S BP08F8RRS 28EB10xRjS M,8S 1m82S 0yHP1S P2E80CyU8S 9yx8RS
8y68RH01mmP2qS9/U,S8yRP80SP2S-OzDRSE,y2SBP08HS28EB10xjSS

4.1.2 Types of WLAN

e
—yR8HS12SE,8S28EB10xSU12CPq/0yEP12–SBP08F8RRSOzDRSUy2S58SUFyRRPCP8HSP2E1SEB1SUyE8q10P8RjS

g
‘jS 32C0yRE0/UE/08S5yR8HSBP08F8RRS28EB10xRS
io led
S "jS zHS,1USBP08F8RRS28EB10xRS
!

1. Infrastructure based wireless network


ic ow

 z2SP9m10Ey2ES8F8982ES1CSE,PRSEJm8S1CS28EB10xSPRSzUU8RRSm1P2ES4z+’jS
n
 z+Sm016PH8RSy2SP2E80CyU8S58EB882SE,8SBP08F8RRSE809P2yFRSy2HSBP08HS28EB10xSP2C0yRE0/UE/08jS
bl kn

 X808SBP08F8RRS21H8RSU199/2PUyE8SBPE,S8yU,S1E,80S6PySy2SyUU8RRSm1P2EjSS
 zFFS E,8S 28EB10xS U12E01FS m01U8H/08RS FPx8S 98HP/9S yUU8RRS U12E01F–S RJ2U,012PVyEP12–S m1B80S 9y2yq8982ES ,yRS 5882S
at
Pu ch

H128S5JSE,8Sz+jSS
 ”PqjSXj‘j‘SR,1BRSE,088SyUU8RRSm1P2ERSBPE,SE,088SBP08F8RRS28EB10xRSy2HSySBP08HS28EB10xjS

Te

M,8S H8RPq2S 1CS P2C0yRE0/UE/08S 5yR8HS BP08F8RRS 28EB10xS PRS 680JS RP9mF80S E,y2S yHZ,1US 28EB10xRjS :P2U8S z+S m80C109RS
91RES1CSE,8SE0y2R9PRRP12SU12E01FSm01U8H/08R–SE,8SU19mF8=PEJS1CSP2HP6PH/yFS21H8SPRSF8RRjS
 32C0yRE0/UE/08S 5yR8HS BP08F8RRS 28EB10xS PRS F8RRS CF8=P5F8jS ”10S 8=y9mF8–S P2S E,8S UyR8S 1CS HPRyRE80S E,8JS Uy221ES 58S /R8HS
B,82S21SP2C0yRE0/UE/08SPRSF8CEjSS
 ”10S…=y9mF8–5'8FF/Fy0Sm,128S28EB10xjS

Fig. 4.1.1 : Infrastructure based wireless networks


Mobile Communication & Computing (MU-Sem. 7-Comp) 4-3 Wireless Local Area Networks

2. Ad-hoc wireless networks


 zHS,1USBP08F8RRS28EB10xRSH1S21ES,y68Sy2JSBP08HSP2C0yRE0/UE/08jS
 zFFS21H8RSUy2SU199/2PUyE8SHP08UEFJSBPE,1/ES288HS1CSyUU8RRSm1P2EjS
 M,8SU19mF8=PEJS1CS21H8RSP2Sy2SyHZ,1US28EB10xSPRS,Pq,80S58Uy/R8SyFFS28EB10xSC/2UEP12yFPEP8RSFPx8S98HP/9SyUU8RRS
98U,y2PR9R–SB,PU,S,PHH82Sy2HS8=m1R8HSE809P2yFSm015F89RS,y68SE1S58SP9mF8982E8HSBPE,P2SE,8S21H8SPER8FCjS
 ”PqjSXj‘j"SR,1BRSEB1SyHZ,1US28EB10xRSBPE,SE,088S21H8RS8yU,jS

g e
io led
Fig. 4.1.2 : Ad-hoc wireless networks

 32SyHS,1US28EB10xR–S21H8RSUy2S12FJSU199/2PUyE8SB,82SE,8JSy08SBPE,P2S8yU,S1E,80YRS0yHP1S0y2q8S10SPCS1E,80S21H8RS
ic ow

Uy2SC10By0HSE,8S98RRyq8jS
 3ES1CC80RS,Pq,80SCF8=P5PFPEJSyRSE,8R8S28EB10xRSUy2S58SP2REyFF8HSP2REy2EFJSBPE,1/ES288HS1CSy2JSP2C0yRE0/UE/08jSS
n
bl kn

4.1.3 Difference between Ad-hoc Network and Infrastructure based Wireless Networks
at

MU – Dec. 15
Pu ch

Q. Explain Difference between Ad-hoc Network and Infrastructure based Wireless Networks. (Dec. 15, 5 Marks)
Te

-7R5JjR5 KY07HTM7O9MO7L5QHTLP5JLM6j7L5 WPMFj95YLM6j7LT5

‘jS W86PU8RS 12S E,PRS EJm8S 1CS 28EB10xS yFFS U199/2PUyE8S zHZ,1US 28EB10xRS H12YES 08µ/P08S yS U82E0yFPV8HS yUU8RRS
E,01/q,SySRP2qF8SyUU8RRSm1P2E–SB,PU,SPRSq8280yFFJSE,8S m1P2EjS32RE8yH–SH86PU8RS12SE,8SBP08F8RRS28EB10xSU1228UES
BP08F8RRS01/E80jS HP08UEFJSE1S8yU,S1E,80jS

"jS 32C0yRE0/UE/08S 91H8S PRS PH8yFS PCS R8EEP2qS /mS yS 9108S zHZ,1US91H8SUy2S58S8yRP80SE1SR8ES/mSPCSJ1/SZ/RESBy2ESE1S
m809y282ES28EB10xjSS U1228UESC8BSH86PU8RSE1S8yU,S1E,80SBPE,1/ES08µ/P0P2qSyS
U82E0yFPV8HSyUU8RRSm1P2EjS

[jS -P08F8RRS 01/E80RS E,yES C/2UEP12S yRS yUU8RRS m1P2ERS Ky2q8S1CSzHZ,1US28EB10xRSy08SFP9PE8HS5JSE,8Sm1B80S1CS


q8280yFFJS ,y68S ,Pq,80Zm1B80S BP08F8RRS 0yHP1RS y2HS BP08F8RRS H86PU8RS U1228UE8HS P2S E,8S 28EB10xjS zHZ,1US
y2E822yRSR1SE,8JSUy2SU1680SySBPH80Sy08yjS 28EB10xRSH12YESRUyF8SB8FFjS

XjS 3CSySH86PU8SPRS1/ES1CS0y2q8S1CSy21E,80SH86PU8SPESBy2ERS 3CSySH86PU8SPRS1/ES1CS0y2q8S1CSy21E,80SH86PU8SPESBy2ERSE1S


E1S U1228UES E1–S E,82S C10By0HP2qS 1CS myUx8ERS PRS H128S U1228UESE1–SPESBPFFSmyRRSE,8SHyEySE,01/q,S1E,80SH86PU8RS
6PySyUU8RRSm1P2EjSS 12S E,8S ByJjS +yRRP2qS E,8S HyEyS E,01/q,S R8680yFS
U19m/E80RS PRS Z/RES RF1B80S E,y2S myRRP2qS PES E,01/q,S yS
RP2qF8SyUU8RRSm1P2EjSS

\jS M,8S H8RPq2S 1CS P2C0yRE0/UE/08S 5yR8HS 28EB10xS PRS '19mF8=PEJS 1CS P2HP6PH/yFS 21H8S P2S yHS ,1US 28EB10xRS PRS
RP9mF80SE,y2SyHS,1US28EB10xR–SRP2U8Sy2SyUU8RRSm1P2ES ,Pq,80S 58Uy/R8S yFFS 28EB10xS C/2UEP12yFPEJS R/U,S yRS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-4 Wireless Local Area Networks

-7R5JjR5 KY07HTM7O9MO7L5QHTLP5JLM6j7L5 WPMFj95YLM6j7LT5


m80C109RS 91RES 1CS E,8S E0y2R9PRRP12S U12E01FS 98HP/9S yUU8RRS 98U,y2PR9–S m1B80S 9y2yq8982E–S
m01U8H/08R–S E,/RS 08H/UP2qS E,8S U19mF8=PEJS 1CS RJ2U,012PVyEP12S 8EUjS ,y68S E1S 58S P9mF8982E8HS BPE,P2S
P2HP6PH/yFS21H8jS E,8S21H8SPER8FCjS

]jS 32C0yRE0/UE/08S 5yR8HS BP08F8RRS 28EB10xS PRS F8RRS 3ES 1CC80RS ,Pq,80S CF8=P5PFPEJS yRS E,8R8S 28EB10xRS Uy2S 58S
CF8=P5F8jS ”10S 8=y9mF8–S P2S UyR8S 1CS HPRyRE80–S E,8JS P2REyFF8HSP2REy2EFJSBPE,1/ES288HS1CSy2JSP2C0yRE0/UE/08jS
Uy221ES58S/R8HSB,82S21SP2C0yRE0/UE/08SPRSF8CEjS

^jS K8µ/P08RS9108SmFy22P2qSy2HSEyx8RSEP98SE1SR8ES/mjS D1SmFy22P2qSPRS288H8HSy2HS…yRJSE1SR8ES/mjS

VjS z0U,PE8UE/08S 1CS 32C0yRE0/UE/08S 5yR8HS 28EB10xS PRS z0U,PE8UE/08S1CSyHZS,1US28EB10xSPRSR,1B2SP2S”PqjSXj‘j"jS


R,1B2SP2S”PqjSXj‘j‘jS

4.2 IEEE 802.11

e

g
KNNN5OPkR44SPRSySR8ES1CSREy2Hy0HRSC10SP9mF8982EP2qSBP08F8RRSF1UyFSy08yS28EB10xS4-OzD’SP2S"jX–S[j]Sy2HS\S7XVSC08µ/82UJS
5y2HRjSS
io led
 M,8JSy08SU08yE8HSy2HS9yP2EyP28HS5JSE,8S3………SOzD“YzDS:Ey2Hy0HRS'199PEE88S43………SV;"’jS
 3………SV;"j‘‘SP2E01H/U8HS6y0P1/RS680RP12RS1CSV;"j‘‘SZSV;"j‘‘y–SV;"j‘‘5–SV;"j‘‘q–S8EUjSSS
ic ow

 M1S 9yP2EyP2S P2E801m80y5PFPEJ–S E,PRS REy2Hy0HS /R8RS E,8S Ry98S P2E80CyU8S yRS E,8S 1E,80RS E1S ,Pq,80S FyJ80R–S 5/ES Rm8UPCP8RS E,8S
8FNTq9Hv5vHNL7Sy2HSELPqOE5H99LTT5vHNL7SyHymE8HSE1SE,8SRm8UPyFS08µ/P08982ES1CSBP08F8RRSOzDRjS
n
4.2.1 IEEE 802.11 System Architecture
bl kn
at

3………SV;"j‘‘SOzDRSUy2S58SU12CPq/08HSyRSP2C0yRE0/UE/08S5yR8HS28EB10xS10SyRSyHS,1US28EB10xRjS
Pu ch

1. Architecture of Infrastructure based network


Te

”Pqj5Xj"j‘SR,1BRSE,8Sy0U,PE8UE/08S1CS3………SV;"j‘‘SP2C0yRE0/UE/08S5yR8HS28EB10xjS

Fig. 4.2.1 : Architecture of an infrastructure based IEEE 802.11


Mobile Communication & Computing (MU-Sem. 7-Comp) 4-5 Wireless Local Area Networks

Basic Service Set (BSS)

 M,8S5yRPUS5/PFHP2qS5F1UxS1CS3………SV;"j‘‘Sy0U,PE8UE/08SPRSE,8S—yRPUS:806PU8S:8ES4—::’jS
 M,8SREyEP12RSy2HSyUU8RRSm1P2ESB,PU,Sy08SBPE,P2SE,8SRy98S0yHP1SU1680yq8SC109SyS—yRPUS:806PU8S:8ES4—::’jS
 zFFSREyEP12RSBPE,P2SyS—::SU199/2PUyE8SBPE,SE,8SRy98SyUU8RRSm1P2ESy2HSU19m8E8SC10SR,y08HS98HP/9jS
 zUU8RRSm1P2ESUy2S58SU1228UE8HSE1S1E,80SyUU8RRSm1P2ERS6PySHPRE0P5/EP12SRJRE89jS

Station (STA)

 M,8SREyEP12SPRSySBP08F8RRS21H8Sy2HSPESPRSU1228UE8HSE1Sy2SyUU8RRSm1P2EjS5
 zFFSREyEP12RSy08S8µ/Pmm8HSBPE,SBP08F8RRS28EB10xSP2E80CyU8SUy0HRS4-D3'R’Sy2HSU12EyP2SE,8SC/2UEP12yFPEP8RS1CSE,8SV;"j‘‘S
m01E1U1FjS
 -P08F8RRSREyEP12SUy2S58S915PF8SH86PU8RSR/U,SyRSFymE1mR–Sm80R12yFSHPqPEyFSyRRPREy2ER–S3+Sm,128RSy2HS1E,80SR9y0ESm,128R–S

e
10SCP=8HSH86PU8RSR/U,SyRSH8RxE1mRSy2HSB10xREyEP12RSE,yESy08S8µ/Pmm8HSBPE,SySBP08F8RRS28EB10xSP2E80CyU8jS

g
Access Point (AP)
io led
 zUU8RRSm1P2ERS4z+R’Sy08S5yR8SREyEP12RSC10SE,8SBP08F8RRS28EB10xjSS
 MB1SE809P2yFRSP2SE,8SRy98S—::SU199/2PUyE8S6PySz+jSS
ic ow

 z+YRSC/2UEP12RSy08S_S
n
‘jS :/mm10ERS01y9P2qS4Pj8jSU,y2qP2qSyUU8RRSm1P2ER’S
bl kn

"jS +016PH8RSRJ2U,012PVyEP12SBPE,P2SyS—::S
[jS :/mm10ERSm1B80S9y2yq8982ESS
at
Pu ch

XjS 'y2SU12E01FS98HP/9SyUU8RRSE1SR/mm10ESEP98S51/2H8HSR806PU8RS

Extended Service Set (ESS)


Te

 zSR8ES1CSU1228UE8HS—::RSE1q8E,80SC109S…::S4z2S…=E82H8HS:806PU8S:8ES4…::’’S
 zUU8RRSm1P2ERSP2Sy2S…::Sy08SU1228UE8HS5JSySHPRE0P5/EP12SRJRE89jSS
 …yU,S…::S,yRSy2S3WSUyFF8HSE,8S…::3WSB,PU,SPRSyS["Z5JE8S49y=P9/9’SU,y0yUE80SRE0P2qjS

Portal
3ESyUERSyRSy2SP2E8028ESB10xP2qS/2PESE1SU1228UES1E,80SOzDRjS
Distribution System (DS)
 zS HPRE0P5/EP12S RJRE89S B10xRS yRS yS 5yUx5128S 28EB10xS y2HS ,y2HF8RS HyEyS E0y2RC80S 58EB882S HPCC8082ES z+YRjS 3ES U1228UERS
R8680yFS—::YRS6PySz+YRSE1Sm10EyFSE,/RSC109P2qSySRP2qF8S28EB10xjS
 M,8SW:SPRS21ES08yFFJSE,8Smy0ES1CS3………V;"j‘‘SREy2Hy0HjS
 M,8SW:SU1/FHSU12RPRES1CS50PHq8HS3………SOzDSBP08F8RRSFP2xRS10Sy2JS1E,80S28EB10xjS

2. Architecture of ad hoc network

32SyHZ,1USBP08F8RRS28EB10xR–SE,808Sy08S128S10S9108SP2H8m82H82ES—::RS43—::’SyRSR,1B2SP2S”PqjSXj"j"jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-6 Wireless Local Area Networks

e
Fig. 4.2.2 : Architecture of IEEE 802.11 ad-hoc wireless LAN

g
3—::SU19m0PR8RSySq01/mS1CSREyEP12RS/RP2qSE,8SRy98S0yHP1SC08µ/82UJjS”10S8=y9mF8–SyRSR,1B2SP2S”PqjSXj"j"S:Mz!–S:Mz"–Sy2HS
io led
:Mz#Sy08SP2S3—::!–SB,808SyRS:Mz$Sy2HS:Mz%&P2S3—::"jSM,PRS98y2–S:Mz"SUy2SU199/2PUyE8SHP08UEFJSBPE,S:Mz#S5/ES21ESBPE,S:Mz$jSS
4.2.2 IEEE 802.11 Protocol Architecture
(MU – May 13)
ic ow

Q. Explain protocol architecture of 802.11. (May 13, 10 Marks)


n

bl kn

zRSR,1B2SP2S”PqjSXj"j[Sy2SV;"j‘‘SBP08F8RRSOzDSU1228UE8HSE1SySRBPEU,8HS3………SV;"j[S…E,8028ES6PySyS50PHq8S4zUU8RRSm1P2E’jS
 M,8S,Pq,80SFyJ80RS4zmmFPUyEP12–SM'+–S3+’S1CSBP08F8RRS21H8SB10xRSRy98SyRSBP08HS21H8jSS

at

M,8S /mm80S my0ES 1CS HyEyS FP2xS U12E01FS FyJ80S Pj8jS F1qPUyFS FP2xS U12E01FS 4OO'’S U1680RS E,8S HPCC8082U8RS 1CS E,8S 98HP/9S yUU8RRS
Pu ch

U12E01FSFyJ80RS288H8HSC10SHPCC8082ES98HPyjSS
 3………SV;"j‘‘SREy2Hy0HS12FJSU1680RSE,8SRm8UPCPUyEP12S1CS8FNTq9Hv5vHNL75HYP5IWX5vHNL7RS
Te

Fig. 4.2.3 : IEEE 802.11 protocol architecture and bridging


Mobile Communication & Computing (MU-Sem. 7-Comp) 4-7 Wireless Local Area Networks

Fig. 4.2.4 : IEEE protocol architecture and management


Physical Layer
 M,8S+,JRPUyFSFyJ80S4QRS’SPRSR/5HP6PH8HSP2E1S"Smy0ERS_S
o +,JRPUyFSFyJ80SU12680q82U8Sm01E1U1FS4+O'+’Sy2HS
o +,JRPUyFS98HP/9SH8m82H82ES4+YW’SR/5SFyJ80jSS

e
+01E1U1FSy0U,PE8UE/08SPRSR,1B2SP2S”PqjSXj"jXS_S

g
o M,8SQBXQSR/5SFyJ80Sm016PH8RSS
io led
S 4y’S zSUy00P80SR82R8SRPq2yF–SUyFF8HSUF8y0SU,y228FSyRR8RR982ES4''z’SSS

S 45’S zSU19912S+X`SR806PU8SyUU8RRSm1P2ES4:z+’S
o
ic ow

M,8SQITSR/5SFyJ80S,y2HF8RSS

S 4y’S Y1H/FyEP12SS
n
bl kn

S 45’S …2U1HP2q“H8U1HP2qS1CSRPq2yFRS
MAC layer
at
Pu ch

M,8S5yRPUSEyRxRS1C5IWX5FyJ80S_S
4y’S Y8HP/9SyUU8RRS
Te

45’S ”0yq982EyEP12S1CS/R80SHyEyS
4U’S …2U0JmEP12S1CS/R80SHyEyS
MAC management
MyRxRS1CSYz'SYy2yq8982ES_S
4y’S :/mm10ERSE,8SyRR1UPyEP12Sy2HS08ZyRR1UPyEP12S1CSySREyEP12SE1Sy2SyUU8RRSm1P2ES

45’S K1y9P2qS58EB882SHPCC8082ESyUU8RRSm1P2ERS
4U’S '12E01FRSy/E,82EPUyEP12S98U,y2PR9RS
4H’S …2U0JmEP12S
48’S :J2U,012PVyEP12S1CSySREyEP12SBPE,S08qy0HSE1Sy2SyUU8RRSm1P2ESSS
PHY management
MyRxRS1CS+X`S9y2yq8982ES_SS S
4y’S ',y228FSE/2P2qS

45’S +,JRPUyFSY3—S9yP2E82y2U8SS
4U’S :EyEP12S9y2yq8982ES
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-8 Wireless Local Area Networks

4.2.3 IEEE 802.11 Physical Layer


32S5yRPUS3………V;"j‘‘S680RP12SE,088SHPCC8082ESm,JRPUyFSFyJ80RS,y68S5882SREy2Hy0HPV8HjS
4y’S W:::S+,JRPUyFSFyJ80S4W:::Z+X`’S
S 45’S ”X::S+,JRPUyFSFyJ80S4”X::SaS+X`’S
S 4U’S 32C0yS08HS+,JRPUyFSOyJ80S

4.2.3(a) Direct Sequence Spread Spectrum Physical Layer (DSSS-PHY)


(MU – Dec. 14)

Q. Discuss the PHY frame format of an IEEE 802.11 using the spread spectrum technique, which separates by code.
(Dec. 14, 10 Marks)

e
M,PRSEJm8S1CSm,JRPUyFSFyJ80S/R8RS0yHP1SBy68SC10SE0y2R9PRRP12j5

g
zRSE,8S2y98SR/qq8RER–SPES/R8RSHP08UESR8µ/82U8SRm08yHSRm8UE0/9SE8U,2Pµ/8j5

io led
3………SV;"j‘‘SW:::SRm08yHRSE,8SRPq2yFS5JS/RP2qS‘‘S5PES5y0x80SU1H8SS4bS‘–SaS‘–SbS‘–SbS‘–SaS‘–SbS‘–SbS‘–SbS‘–SaS‘–SaS‘–SaS‘’jSS
 3ESyFR1S/R8RSkR,5URVS3:YS5y2HS4Ry98SyRS”X::’Sy2HS1CC80RS51E,S‘SY5PE“RSy2HS"SY5PE“RSHyEyS0yE8jS
 3ES/R8RSWPCC8082EPyFS—P2y0JS+,yR8S:,PCESc8JP2qS4W—+:c’SC10S‘SY5PE“RSE0y2R9PRRP12Sy2HSWPCC8082EPyFSd/yH0yE/08S+,yR8S:,PCES
ic ow

c8JP2qS4Wd+:c’SC10S"SY5PE“RjS
 Yy=P9/9SE0y2R9PESm1B80SPRS‘-S4P2SE,8SQ:’–S‘;;9-S…3K+SP2SE,8S…/01m8Sy2HS‘;9-“YXVSP2Seymy2jSS
n

bl kn

M,8SRJ951FS0yE8SPRS‘SYXVSy2HSU,PmmP2qS0yE8SPRS‘‘SYXVjS
 39mF8982EyEP12SPRSHPCCPU/FEjS

at
Pu ch

+016PH8RSyS58EE80SU1680yq8Sy2HSyS9108SREy5F8SRPq2yFS4F8RRSP2E80C8082U8Sy2HSF8RRS9/FEPmyE,Sm01myqyEP12’jS
Frame structure of DS-SS physical layer

Te

78280yFSmyUx8ESR82ES1680SE,8SU,y228FSU12RPRERS1CSE,088Smy0ERS_SM,8S+O'+Sm08y95F8–SM,8S+O'+S,8yH80Sy2HSE,8S+yJF1yHS
R,1B2SP2S”PqjSXj"j\jS

Fig. 4.2.5 : IEEE 802.11 DS-SS PLCP Physical layer packet format

 M,8SW:Z::S+,JRPUyFSFyJ80S+O'+SmyUx8ESC109yES1CS3………SV;"j‘‘SPRSR,1B2SP2S”PqjSXj"j\jSS
 M,8S+O'+Smy0ESPRSyFByJRSE0y2R9PEE8HSyESE,8S0yE8S1CS‘SY5PE“RjSS
 +yJF1yHSUy2S58SE0y2R9PEE8HSyES8PE,80S‘S10S"SY5PE“RSH8m82HP2qS/m12SE,8S91H/FyEP12SE8U,2Pµ/8S/R8HjS
S M,8SCP8FHRS1CSySC0y98S,y68SE,8SC1FF1BP2qSC/2UEP12RjS
o -NY9F7jYqVHMqjY5I53ESPRSyS‘"VS5PESCP8FHS4yFE802yEP2qS;Sy2HS‘’S/R8HSC10SRJ2U,012PVyEP12–SqyP2SR8EEP2q–S8280qJSH8E8UEP12–S
y2HSC10SC08µ/82UJS1CCR8ESU19m82RyEP12jSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-9 Wireless Local Area Networks

o -MH7M5 07HEL5 PLvqEqML75 z-TC/5 I5 M,PRS CP8FHS P2HPUyE8RS E,8S REy0EP2qS 1CS yS C0y98S y2HS U12RPRES E,8S myEE802S
‘‘‘‘;;‘‘‘;‘;;;;;jS
o -qDYHv5I5M,PRSCP8FHSP2HPUyE8RSE,8SHyEyS0yE8S1CSE,8SmyJF1yHjSM,8S6yF/8S;=;zSPRSC10S‘SY5PE“RSy2HS;=‘XSPRSC10S"SY5PER“R–S
1E,80S6yF/8RSy08S08R8068HSC10SC/E/08S/R8jS
o -L7Kq9L5I5M,PRSCP8FHSPRS08R8068HSC10SC/E/08S/R8jSS
o BLYDMF5I5M,PRS‘]S5PESCP8FHSPRS/R8HSE1SP2HPUyE8SE,8SF82qE,S1CSySmyJF1yHSP2S9PU01R8U12HRjS
o RLHPL75N77j75XFL9L5zRNX/5I5X…'SPRS/R8HSE1Sm01E8UES+O'+S,8yH80jS
 M,8S+O'+Smy0ES1CSE,8SmyUx8ESPRSC1FF1B8HS5JSE,8SmyJF1yHSUy00JP2qSYz'SmyUx8ESHyEyS/2PES4Y+WQ’S1CSE,8SF82qE,S58EB882S‘S
E1S";XVS1UE8ERjS
 32RE8yHS1CS‘‘a5PES—y0x80SU1H8SymmFP8HSBPE,SW—+:cS10SWd+:cS91H/FyEP12–SE,8S'19mF8982Ey0JS'1H8Sc8JP2qS4''c’SUy2S
58S/R8HSE1SyU,P868S,Pq,80SHyEyS0yE8RS1CS\j\S10S‘‘SY5PE“RjS
 M,8SW:Z::S680RP12S1CSE,8Sm,JRPUyFSFyJ80S82R/08RS,Pq,SHyEyS0yE8Sy2HS,Pq,S0y2q8–S5/ESPRSU1REFP80SE,y2S”XZ::SE8U,2Pµ/8SH/8S

e
E1SE,8S,Pq,SU1RES1CSW:ZK”SU19m1282ERjSY108S1680SW:ZK”SU19m1282ERSyFR1S/R8S9108Sm1B80jS

g
4.2.3(b) Frequency Hopping Spread Spectrum Physical Layer (FHSS – PHY)
io led
 M,PRSEJm8S1CSm,JRPUyFSFyJ80S/R8RS0yHP1SBy68SC10SE0y2R9PRRP12j5
 zRSE,8S2y98SR/qq8RER–SPES/R8RSC08µ/82UJS,1mmP2qSRm08yHSRm8UE0/9j5

ic ow

'19my08HSE1SW:Z::Sm,JRPUyFSFyJ80–S”XZ::Sm,JRPUyFSFyJ80Sm016PH8RS,Pq,SHPRE10EP12SP99/2PEJ–S,Pq,SRJRE89SUymyUPEJ–SF1BS
m1B80S/R8Sy2HS/R8RSF1BSU1RESK”SU19m1282ERj5
n
 3ESyFR1S/R8RSE,8SkR,5URVS3:YS5y2HjS
bl kn

 +016PH8RS5y2HBPHE,S1CS4IRVjS

at

3ES/R8RS7y/RRPy2S”08µ/82UJS:,PCESc8JP2qS47”:c’SC10S91H/FyEP12jS
Pu ch

 "ZF868FS 7”:cS PRS /R8HS C10S ‘S Y5PE“RS 4‘S 5PES PRS 9ymm8HS 12S 128S C08µ/82UJ’jS XZF868FS 7”:cS PRS /R8HS C10S "S Y5PE“RS 4"S 5PERS y08S
9ymm8HS12S128SC08µ/82UJ’jS
Te

 <m80yEP12SyES‘SY5PE“RSPRS9y2HyE10JSB,PF8SyES"SY5PE“RSPRS1mEP12yFjS
 ^fSX1mmP2qSU,y228FRSC10SD10E,Sz980PUySy2HS…/01m8Sy2HS"[S,1mmP2qSU,y228FRSC10Seymy2jS
 Yy=P9/9SE0y2R9PESm1B80SPRS‘S-“YXVSP2SQ:–S‘;;S9-S…3K+SP2S…/01m8Sy2HS‘;9-“YXVSP2Seymy2jS
 ”X::SPRS8yRP80SE1SP9mF8982EjS
Frame structure of FH-SS Physical layer
 ”PqjSXj"j]SR,1BRSE,8SC0y98SRE0/UE/08S1CSE,8Sm,JRPUyFSFyJ80SBPE,S”XZ::S+X`jS
 M,8SC0y98SU12RPRERS1CSE,088S5yRPUSmy0ERS_SE,8S+O'+Sm08y95F8–S+O'+S,8yH80Sy2HSE,8SmyJF1yHSmy0EjSS

Fig. 4.2.6 : IEEE 802.11 FH-SS PLCP Physical layer packet format

S
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-10 Wireless Local Area Networks

M,8SCP8FHRS1CSySC0y98Sy08SyRSC1FF1BRS_S
4R5 -NY9F7jYqVHMqjY5I5M,PRSmyEE802SPRS/R8HSC10SE,8SRJ2U,012PVyEP12S1CSE,8S08U8P680RSy2HSRPq2yFSH8E8UEP12S5JSE,8S''zS4'F8y0S
',y228FSyRR8RR982E’jS3ESPRSV;S5PESCP8FHSB,PU,SPRSyS;‘;‘;‘;‘;gjS—PESmyEE802jS

kR5 -MH7M507HEL5PLvqEqML75z-CT/5I5M,PRSPRSyS‘]S5PESCP8FHSP2HPUyE8RSE,8SREy0ES1CSC0y98Sy2HSm016PH8RSC0y98SRJ2U,012PVyEP12jSM,8S
myEE802S1CS:”WSPRS;;;;‘‘;;‘;‘‘‘;‘jS

GR5 QH9LLM5vLYDMF56j7P5zQBW/5I5M,8S‘"S5PESmyUx8ESF82qE,SBPHE,SR,1BRSE,8SF82qE,S1CSE,8SmyJF1yHjSM,8SF82qE,S1CSySmyUx8ES
U1/FHS58S/mSE1SXxS5JE8RjS

,R5 QBXQ5 TqDYHvqYD5 0qLvP5 zQ-C/5 I5XS 5PES +:”S CP8FHS Rm8UPCP8RS E,8S HyEyS 0yE8S 1CS E,8S myJF1yHS C1FF1BP2qjS 3CS yFFS 5PERS y08S R8ES E1S V801S
4;;;;’SPES98y2RSE,8SF1B8RESHyEyS0yE8S4‘SY5PE“R’jS"SY5PE“RSHyEyS0yE8SPRS08m08R82E8HS5JS;;‘;S5PESR8µ/82U8jSYy=P9/9S
HyEyS0yE8SVj\SY5PER“RSPRS08m08R82E8HS5JS‘‘‘‘jS

UR5 RLHPL75 L77j75 9FL9L5 zRNX/5 I5 ‘]S 5PES X”'S PRS yHH8HS E1S m01E8UES E,8S +O'+S ,8yH80jS 3ES Uy2S 08U1680S 80010RS 1CS /mS E1S "S 5PER–S

e
1E,80BPR8SPH82EPCJSB,8E,80S+O'+S5PERSy08SU100/mE8HjS

g
4.2.3(c) Infra Red Physical Layer
io led
 M,8Sm,JRPUyFSFyJ80S/R8RS!"#$%&$'(SC10SE0y2R9PRRP12jS
 WPqPEyFSRPq2yFRSy08SR82ES/RP2qSP2C0yS08HS0yJRS1CSE,8SBy68SF82qE,SV\;Zf\;29S0y2q8Sy2HS+/FR8S+1RPEP12SY1H/FyEP12S4++Y’jS
ic ow

 MB1SHyEyS0yE8R–S‘Sy2HS"SY5PE“RS,y68S5882SREy2Hy0HPV8HjSS
o
n
”10S‘SY5PE“RSHyEyS0yE8–SE0y2R9PEE8HS5PERSy08Sq01/m8HSP2SXZ5PES5F1UxRSy2HS‘]Z++YSPRSymmFP8HjS
o
bl kn

”10S"SY5PE“R–SE,8SHyEySRE08y9SPRSHP6PH8HSP2E1S"Z5PES5F1UxRSy2HSXZ++YSPRSymmFP8HjS
Frame structure of Infra red physical layer
at
Pu ch

M,8S+O'+SmyUx8ESC109yES1CS32C0yS08HSm,JRPUyFSFyJ80S,yRS5882SR,1B2SP2S”PqjSXj"j^jS
Te

Fig. 4.2.7 : IEEE 802.11 Infrared PLCP Physical layer packet format
 X808S E,8S CP8FHS TX5 vLKLv5 HPXOTMELYMS U12EyP2RS myEE802S B,PU,S 82y5F8RS E,8S 08U8P6P2qS REyEP12S E1S R8ES E,8S W'S F868FS 1CS E,8S
RPq2yFjS
 M,8S3KSP2E80CyU8SPRSE,8SU,8ym8RES1CSyFFSV;"j‘‘Sm,JRPUyFSP2E80CyU8RjSS
 3ESH18RS21ES288HSy2JSC08µ/82UJS08q/FyEP12RjS
 3ESPRS08RPREy2ESE1S8y68RH01mmP2qjS—/ESPES,yRSF1B80SU1680yq8jS
 zRS 32C0yS 08HS FPq,ES P2E80C808RS BPE,S 1E,80S 08R1/0U8RS FPx8S R/2FPq,ES 10S ,8yES R1/0U8RS 8EUjS R/U,S 28EB10xRS Uy2S 12FJS 58S /R8HS
BPE,P2S5/PFHP2qR–S8jqjSUFyRR0119R–S988EP2qS,yFF–SU12C8082U8S,yFFS8EUjS
 ”08µ/82UJS08/R8SPRS680JSRP9mF8jSM,8SRy98SC08µ/82UJSUy2S58S/R8HSP2SHPCC8082ESUFyRR0119RjS

4.2.4 IEEE 802.11 MAC Sublayer (MU – Dec. 16)


Q. Explain in Detail IEEE 802.11 MAC sublayer. (Dec. 16, 10 Marks)

S
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-11 Wireless Local Area Networks

M,8SYz'SFyJ80S08Rm12RP5PFPEP8RSy08SHP6PH8HS58EB882SYz'SR/5SFyJ80Sy2HSYz'SFyJ80S9y2yq8982ESR/5SFyJ80jSS
 K8Rm12RP5PFPEP8RS1CSYz'SR/5SFyJ80S_S
o M1S,y2HF8SyUU8RRS98U,y2PR9S
o W8CP28SyHH08RRP2qSy2HSC0y98SC109yES
 K8Rm12RP5PFPEP8RS1CSYz'SFyJ80S9y2yq8982ESR/5SFyJ80S_S
o K1y9P2qSP2SE,8SW::S
o +1B80S9y2yq8982ES
o z/E,82EPUyEP12S
o :8U/0PEJS

g e
io led
ic ow

Fig. 4.2.8 : IEEE 802.11 MAC Layer Responsibilities


n
4.2.4(a) MAC Frame Format
bl kn

(MU – May 14)


at
Pu ch

Q. Explain IEEE 802.11 MAC frame format in detail. (May 14, 10 Marks)

”PqjSXj"jfSR,1BRSE,8Sq8280yFSYz'SC0y98SC109yES1CS3………SV;"j‘‘jS
Te

Fig. 4.2.9 : IEEE 802.11 MAC frame format

4R5 C7HEL59jYM7jv5I5M,PRSCP8FHSUy00P8RSE,8SP2RE0/UEP12RS12SE,8S2yE/08S1CSE,8SmyUx8EjS3ESHPREP2q/PR,8RSHyEySC019SU12E01FSy2HS
9y2yq8982ESC0y98RjS”0y98SU12E01FSU12EyP2RSR8680yFSR/5ZCP8FHRjS
kR5 Q7jMj9jv5KL7TqjY5IS:,1BRSE,8SU/0082ESm01E1U1FS680RP12Sy2HSPRSCP=8HS5JS;jS
GR5 YN8L5ISW8E809P28RSE,8SC/2UEP12RS1CSySC0y98_S9y2yq8982ES4;;’–SU12E01FS4;‘’Sy2HSHyEyS4‘;’jSM,8S6yF/8S‘‘SPRS08R8068HjS
,R5 -OQMN8L5IShyF/8RS;;;;SC10SyRR1UPyEP12S08µ/8RE–S‘;;;SC10S58yU12–S‘;‘‘SC10SKM:SU12E01FSC0y98–S‘‘;;SPRSC10S'M:SC0y98jS
QR80SHyEySE0y2R9PERSBPE,S;;;;SR/5EJm8jS
UR5 Yj5T-ZC7jE5T-5ISQR8HSE1SU12E01FS98y2P2qS1CSE,8SyHH08RRSCP8FHSP2SE,8SYz'SC0y98jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-12 Wireless Local Area Networks

[R5 Ij7L5 07HDELYMT5 IS hyF/8S ‘S 08m08R82ERS E,yES E,808S y08S 9108S HyEyS 10S 9y2yq8982ES C0yq982ERS 1CS E,8S U/0082ES Y:WQS E1S
C1FF1BjS
\R5 VLM7N5ISM,PRSCP8FHSPRSR8ESE1S‘SPCSE,8SC0y98SPRSE,8S08E0y2R9PRRP12S1CSm086P1/RSC0y98jSS
OR5 Qj6L75EHYHDLELYM5I5hyF/8S‘SP2HPUyE8RSE,8SREyEP12Sq18RSP2Sm1B80SRy68S91H8–S;S08m08R82ERSE,8SREyEP12S089yP2RSyUEP68jS
]R5 Ij7L5PHMH5ISM,PRSCP8FHSP2HPUyE8RSyS08U8P680SE,yESR82H80S,yRS9108SHyEySE1SR82HSE,y2SE,8SU/0082ESC0y98jS
4PR5 Wq7LP5NGOqKHvLYM5Q7qKH9N5zWNQ/5IS32HPUyE8RSE,yESE,8SREy2Hy0HSR8U/0PEJS98U,y2PR9S1CS3………SV;"j‘‘SPRS/R8HjS
44R5 ^7PL75IShyF/8S‘SP2HPUyE8RSE,8S08U8P68HSC0y98RS9/RES58Sm01U8RR8HSP2SRE0PUES10H80jSSS
4kR5 TO7HMqjYZKT5ISM,PRSCP8FHSPRS/R8HSE1SH8CP28SE,8Sm80P1HS1CSEP98SP2SB,PU,SE,8S98HP/9SPRS1UU/mP8HjSM,PRSCP8FHSPRS/R8HSE1SR8ES
DzhSP2SKM:“'M:S98U,y2PR9jS
4GR5 WPP7LTT545Mj5,5I55”1/0SyHH08RRSCP8FHRS4XVS5PERS8yU,’Sy08S/R8HSE1SPH82EPCJSE,8SR1/0U8–SH8REP2yEP12Sy2HSyUU8RRSm1P2ESE1S
B,PU,SE,8JSy08SU1228UE8HjS
4,R5 -LGOLY9L59jYM7jv5I5QR8HSC10SC0yq982EyEP12S2/9580P2qSE1SU12E01FSR8µ/82U8S2/9580P2qjS

e
4UR5 XFL9LTOE5I5QR8HSE1Sm01E8UESC0y98jSS

g
 Yz'SC0y98RSUy2S58SE0y2R9PEE8HS_S
io led
o —8EB882S915PF8SREyEP12RS
o —8EB882S915PF8SREyEP12Sy2HSyUU8RRSm1P2ES
o —8EB882SyUU8RRSm1P2ERS/RP2qSW:SS
ic ow

 M,8S EB1S 5PERS BPE,P2S ”0y98S '12E01FS CP8FHS Yj5 T-5 y2H5 C7jE5 T-5 HPCC8082EPyE8S E,8R8S UyR8RS y2HS H8CP28S E,8S C1/0S yHH08RRS
n
CP8FHRjS
bl kn

5 zq/5 WPP7LTT54SPH82EPCP8RSE,8Sm,JRPUyFS08U8P680jS…680JSREyEP12–SyUU8RRSm1P2ES10SBP08F8RRS21H8SCPFE80RS12SyHH08RRS‘jS
5 zqq/5 WPP7LTT5kS08m08R82ERSE,8SE0y2R9PEE80S1CSySC0y98jS
at
Pu ch

5 zqqq/5 WPP7LTT5GSy2HSWPP7LTT5,Sy08S9yP2FJS28U8RRy0JSC10SE,8SF1qPUyFSyRRPq2982ES1CSC0y98RjSS
Table 4.2.1: MAC addresses in IEEE 802.11
Te

-9LYH7qj5 Yj5 07jE5 HPP7LTT545 HPP7LTT5k5 HPP7LTT5G5 HPP7LTT5,5


T-5 T-5
zHS,1US28EB10xS ;S ;S WzS :zS —::3WS ZS

P2C0yRE0/UE/08S28EB10x–SC019S ;S ‘S WzS —::3WS :zS ZS


z+S
P2C0yRE0/UE/08S28EB10x–SE1Sz+S ‘S ;S —::3WS :zS WzS ZS
P2C0yRE0/UE/08S28EB10x–S ‘S ‘S KzS MzS WzS :zS
BPE,P2SW:S

Note : DS : Distribution System , AP : Access Point, DA : Destination Address, SA : Source Address


BSSID : Basic Service Set Identifier, RA : Receiver Address, TA : Transmitter Address

IWX5XjYM7jv58H9LLMT55

”PqjSXj"j‘;SR,1BRSE,088SHPCC8082ESEJm8RS1CSU12E01FSmyUx8ERS_SzUx21BF8Hq8982ESmyUx8E–SKM:–Sy2HS'M:SmyUx8EjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-13 Wireless Local Area Networks

e
Fig. 4.2.10 : IEEE 802.11 special control packets ACK, RTS and CTS

g
 KM:S myUx8ES U12EyP2RS E,8S 08U8P680S yHH08RRS 1CS E,8S P2E82H8HS 08UPmP82ES y2HS E,8S E0y2R9PEE80S yHH08RRS 1CS E,8S REyEP12S
io led
E0y2R9PEEP2qSE,8SKM:jSS

 M,8SH/0yEP12SRm8UPCP8RSE,8SEP98S08µ/P08HSE1SR82HS'M:–SHyEySy2HSPERSz'cSmF/RSE,088S:3”:jS
ic ow

 M,8SP998HPyE8FJSC1FF1BP2qS'M:SC0y98SU1mP8RSE,8SE0y2R9PEE80SyHH08RRSC019SE,8SKM:SmyUx8ESP2SE1SE,8S08U8P680SyHH08RRS
n
CP8FHjS
bl kn

4.2.4(b) Access Mechanisms in IEEE 802.11


at
Pu ch

S 3………SV;"j‘‘S1CC80RSEB1SEJm8RS1CSYz'SR806PU8R–S

4R5 TXC5 zTqTM7qQOMLP5 Xjj7PqYHMqjY5 COY9MqjY/5 IS W'”S 1CC80RS 12FJS yRJ2U,0121/RS HyEyS R806PU8S y2HS PES P2UF/H8RS EB1S
Te

98U,y2PR9RjS

 XjYMLYMqjYS98U,y2PR9SR/mm10E8HS5JS':Yz“'zSm01E1U1FjS
 XjYMLYMqjY507LLS98U,y2PR9S5JS/RP2qSKM:“'M:jS
S 3ESPRS9y2HyE10JSR806PU8jS
kR5 QXC5zQjqYM5Xjj7PqYHMqjY5COY9MqjY/5IS+'”S1CC80RSyRJ2U,0121/RSHyEySR806PU8SyRSB8FFSyRSEP98S51/2H8HSR806PU8jS3ESP2UF/H8RS_S
 XjYMLYMqjY507LLSm1FFP2qS98E,1HjS3ESPRSy2S1mEP12yFSR806PU8jS
 zHS,1US28EB10xRSUy2S1CC80S12FJSHTNY9F7jYjOT5PHMH5TL7Kq9LT54Uy2S12FJS/R8SW'”’jS
 32C0yRE0/UE/08S5yR8HS28EB10xRSUy2S1CC80S51E,SHTNY9F7jYjOT5zTXC/5yRSB8FFSyRSMqEL5QjOYPLP5TL7Kq9LT5zQXC/jS
 M,8S Yz'S 98U,y2PR9RS U1FF8UEP68FJS y08S yFR1S UyFF8HS WPRE0P5/E8HS ”1/2HyEP12S -P08F8RRS Y8HP/9S zUU8RRS '12E01FS
zTCWIWX/jSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-14 Wireless Local Area Networks

Fig. 4.2.11 : MAC mechanisms

e
Inter-Frame Spacing

g
 3………SV;"j‘‘S1CC80RSE,088SP2E80ZC0y98SRmyUP2qS43”:’S58EB882SE0y2R9PRRP12RS1CSC0y98jSS
io led
 zCE80SU19mF8EP12S1CSE0y2R9PRRP12–S8yU,SREyEP12S,y6P2qSySmyUx8ESByPERSC10S128S1CSE,8SE,088S3”:Sm80P1HRSH8m82HP2qS12SE,8S
EJm8S1CSE,8SmyUx8EjS
ic ow

zq/5 -Fj7M5KYML7MC7HEL5-8H9qYD5z-KC-/5555
o M,PRSPRSE,8SR,10E8RESByPEP2qSEP98SC10S98HP/9SyUU8RRj5
n
o M,8S ,Pq,80S m0P10PEJS myUx8ERS R/U,S yRS R,10ES U12E01FS 98RRyq8R–S yUx21BF8Hq8982ES 1CS HyEyS myUx8ERS 10S m1FFP2qS
bl kn

08Rm12R8RS,y68SE1SByPESC10S:3”:S58C108S98HP/9SyUU8RRj5
at

zqq/5 TqTM7qQOMLP5Xjj7PqYHMqYD5COY9MqjY5KC-5zTKC-/555
Pu ch

o M,PRSH821E8RSE,8SF12q8RESByPEP2qSEP98Sy2HS,yRSE,8SF1B8RESm0P10PEJSC10S98HP/9SyUU8RRjSS
o O1B8RES m0P10PEJS myUx8ERS R/U,S yRS myJF1yHS myUx8ERS 4myUx8ERS U12EyP2P2qS HyEy’S ,y68S E1S ByPES C10S W3”:S 58C108S E,8S
Te

98HP/9SyUU8RRjS
o W3”:SPRSyS:3”:SmF/RSEB1SRF1ESEP98RjS

zqqq/5 QjqYM5Xjj7PqYHMqYD5COY9MqjY5KC-5zQKC-/5
o M,PRSPRSE,8SByPEP2qSEP98S58EB882SW3”:Sy2HS:3”:jS5
o 3ESPRS/R8HS5JSE,8SyUU8RRSm1P2EjS5
o —8C108Sm1FFP2qS1E,80S21H8R–SE,8SyUU8RRSm1P2ES,yRSE1SByPESC10S+3”:SEP98SC10S98HP/9SyUU8RRj5

Fig. 4.2.12 : Medium access and inter-frame spacing

Basic DFWMAC-DCF using CSMA/CA


 3ESPRSyS9y2HyE10JS98E,1HSy2HSPRS/R8HSC10S12FJSyRJ2U,0121/RSHyEySR806PU8Rj5
 3ESPRS5yR8HS12S':Yz“'zS4'y00P80S:82R8SY/FEPmF8SzUU8RRSBPE,S'1FFPRP12Sz61PHy2U8’j5
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-15 Wireless Local Area Networks

Fig. 4.2.13 : Contention window and waiting time


KM56j7LT5HT50jvvj6T5
 3CSE,8S98HP/9SPRSPHF8SC10SyESF8yRESW3”:SEP98SH/0yEP12SyS21H8SUy2SyUU8RRSE,8S98HP/9jSS
 D1H8SU,8UxRSB,8E,80SE,8S98HP/9SPRSC088S10S21ESBPE,SE,8S,8FmS1CSE,8S''zS4'F8y0S',y228FSzRR8RR982ESRPq2yF’SP2SE,8S+X`S

e
FyJ80jS

g
 3CSE,8S98HP/9SPRS5/RJ–SE,82SyFFSE,8S21H8RSBy2EP2qSE1SyUU8RRSE,8S98HP/9SByPES/2EPFSE,8S98HP/9S58U198RSC088jS
io led
 <2U8SE,8S98HP/9SPRSC088–SyFFSE,8SU19m8EP2qS21H8RSByPESC10SW3”:SEP98Sm80P1HjSzCE80SByPEP2qSC10SySW3”:SEP98–SU19m8EP2qS
21H8RS82E80SP2S9jYMLYMqjY58FHTLjS

ic ow

D1BS8yU,S21H8SU,11R8RSyS0y2H19S5yUxZ1CCSEP98SBPE,P2SE,8SU12E82EP12SBP2H1BSy2HSH18RS21ESE0JSE1SyUU8RRSE,8S98HP/9S
C10SE,PRS0y2H19Sy91/2ES1CSEP98jSS

n
<2U8SE,8S0y2H19PV8HSByPEP2qSEP98SC10SyS21H8SPRS1680–SE,8S21H8SU12EP2/8RSE1SR82R8SE,8S98HP/9jSzRSR112SyRSE,8S21H8S
bl kn

R82R8RSE,8SU,y228FSPRS5/RJ–SPES,yRSF1RESE,PRSUJUF8Sy2HS,yRSE1SByPESC10SyS28=ESU,y2U8SPj8jS/2EPFSE,8S98HP/9S58U198RSPHF8S
C10SyESF8yRESW3”:SEP98jSS
at


Pu ch

—/ESPCSE,8S0y2H19PV8HSyHHPEP12yFSByPEP2qSEP98SC10SyS21H8SPRS1680Sy2HSE,8S98HP/9SPRSREPFFSPHF8–SE,8S21H8SUy2SyUU8RRSE,8S
98HP/9SP998HPyE8FJSy2HSUy2SREy0ESE0y2RC800P2qSHyEyjS

Te

M1Sm016PH8SCyP0SyUU8RRS98U,y2PR9–S3………SV;"j‘‘SyHHRSySQH9L5j005MqEL7RS
 …yU,SREyEP12S21BSU,11R8RSyS5yUxZ1CCSEP980SP2SE,8S0y2q8S1CSU12E82EP12SBP2H1BjSS
 3CSySREyEP12SH18RS21ESq8ESyUU8RRSE1SE,8S98HP/9SP2SE,8SCP0RESUJUF8–SE,8S5yUxZ1CCSEP980SqT5YjM59vLH7LP_5qYTMLHP5qM5qT5XOTM5
8HOTLPjS
 32SE,8S28=ESU12E82EP12SUJUF8–SE,8S21H8SH18RS21ESU,11R8SyS28BS0y2H19S5yUxZ1CCSEP98–SE,8SEP980SU12EP2/8RSC019SB,808S
PESByRSmy/R8HjS
 M,/RSE,8SREyEP12RSE,yES,y68SByPE8HSC10SySF12q80SEP98SyUU8RRSE,8S98HP/9SCP0REjSS
 ”PqjSXj"j‘XSR,1BRS/2PUyRESHyEySE0y2RC80S/RP2qSW”-Yz'ZW'”jS

Fig. 4.2.14 : IEEE 802.11 unicast data transfer


Mobile Communication & Computing (MU-Sem. 7-Comp) 4-16 Wireless Local Area Networks

 zRSR,1B2SP2S”PqjSXj"j‘X–SE,8SR82H80SyUU8RR8RSE,8S98HP/9SyCE80SByPEP2qSC10SW3”:SEP98Sy2HSE0y2R9PERSHyEyjS
 M,8S 1E,80S REyEP12RS 08yHS E,8S Yz'S C0y98S y2HS H8E8UES C019S E,8S ()$%*!+"& #!',(S ,1BS F12qS E,8S U,y228FS BPFFS 58S 5/RJjS
M,808C108SE,8JSUy2SR8ESE,8P0SDzhS4D8ESyFF1UyEP12S68UE10’SC10SE,8Symm01m0PyE8SEP98Sm80P1HjSS
 zCE80SByPEP2qSC10S:3”:SE,8S08U8P680SyUx21BF8Hq8RSPCSE,8SmyUx8ESByRS08U8P68HSU1008UEFJjS
 3CS21Sz'cSPRS08E/028HS5JSE,8SR82H80–SyCE80SE,8SEP980S8=mP08R–SE,8SR82H80S08E0y2R9PERSE,yESmyUx8EjS
 M,8S U12E82EP12S BP2H1BS REy0ERS yCE80S DzhS bS W3”:S m80P1HjS zFFS 1E,80S REyEP12RS U19m8EP2qS C10S E,8S U,y228FS 21BS U,11R8S yS
0y2H19PV8HS5yUxS1CCSEP980SyCE80SB,PU,SE,8JSR82R8SySU,y228FjSS
 M,8SREyEP12SBPE,SE,8SR,10E8RES5yUxS1CCSEP98SCP2HRSE,8SU,y228FSPHF8Sy2HSREy0ERSE1SE0y2R9PESHyEyjS
DFWMAC-DCF with RTS/CTS extension
 M1Sy61PHS,PHH82SE809P2yFSm015F89–S3………SV;"j‘‘SH8CP28RSKM:“'M:Sm01E1U1FRjS3ESB10xRSyRSC1FF1BRjSS
 M,8Sm01U8RRS1CS/2PUyRESHyEySE0y2RC80S/RP2qSKM:“'M:SPRSPFF/RE0yE8HSP2S”PqjSXj"j‘\jS

e
3CS yS E809P2yFS PRS BPFFP2qS E1S R82HS HyEy–S yCE80S ByPEP2qS C10S W3”:S 4mF/RS yS 0y2H19S 5yUx1CCS EP98S PCS E,8S 98HP/9S ByRS 5/RJ’–S PES
R82HRSySR,10ESKM:SU12E01FSmyUx8EjS

g
 M,8S KM:S myUx8ES U12EyP2RS E,8S R1/0U8S yHH08RR–S H8REP2yEP12S yHH08RRS y2HS E,8S H/0yEP12S 1CS E,8S B,1F8S HyEyS E0y2R9PRRP12S
io led
P2UF/HP2qSE,8SyUx21BF8Hq8982EjS
 zFFS1E,80S21H8RS08U8P6P2qSKM:SmyUx8ERSR8ESE,8P0S28ESyFF1UyEP12S68UE10S4Dzh’jSDzhSPRSR8ESP2SyUU10Hy2U8SBPE,SE,8SH/0yEP12S
CP8FHSRm8UPCP8HSP2SE,8SKM:SmyUx8EjSM,8R8SREyEP12RSBPFFS21ESE0JSE1SyUU8RRSE,8S98HP/9SC10SE,PRSH/0yEP12jS
ic ow

 M,8SH8REP2yEP12SREyEP12S08Rm12HRSE1SE,PRSmyUx8ES5JSR82HP2qS'M:SU12E01FSmyUx8ESyCE80Sy2S:3”:Sm80P1HjS

n
M,PRS 'M:S myUx8ES U12EyP2RS E,8S H/0yEP12S CP8FHS yqyP2S y2HS yFFS REyEP12RS 08U8P6P2qS E,8S 'M:S C019S E,8S 08U8P680S 1CS E,8S HyEyS
bl kn

E0y2R9PRRP12SR8ESE,8P0SDzhSS

Note : This is needed because the set of stations receiving RTS can be different from the set of stations
at
Pu ch

receiving CTS, thus separate NAV has to be set by the receivers of RTS and the receivers of CTS).


Te

M,8SR1/0U8SE809P2yFS08U8P68RSE,8S'M:Sy2HSR82HRSHyEySyCE80SByPEP2qSC10S:3”:jS
 M,8SH8REP2yEP12SE809P2yFSR82HRSz'cSyCE80Sy21E,80S:3”:jS
 zCE80SU19mF8EP12S1CSE0y2R9PRRP12–SDzhS1CS8yU,SREyEP12SE809P2yE8HSy2HSU,y228FSPRSy6yPFy5F8SC10S1E,80S/R80RjSS

Fig. 4.2.15 : Implementation of RTS/CTS mechanisms in the IEEE 802.11

Fragmented mode of DFWMAC-DCF with RTS/CTS


 3CSB8SC0yq982ESE,8SFy0q8SC0y98RS4myUx8ER’SP2E1SR,10E80SC0y98RSE,82SE,8SQqM5L77j757HMLSBPFFS089yP2SE,8SRy98S5/ES21BS
R,10ESC0y98RSy08SH8RE01J8HSy2HS,82U8SE,8S07HEL5L77j757HMLS40yE8S1CS80010Sm80SC0y98’SH8U08yR8RjS”PqjSXj"j‘]SR,1BRSE,8S
C0yq982EyEP12S91H8S1CSKM:“'M:jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-17 Wireless Local Area Networks

 X808SE,8SHyEySC0y98SPRSC0yq982E8HSP2E1SR9yFF80SC0y98RjS
 :82H80SR82HRSy2SKM:SyCE80SByPEP2qSW3”:SEP98jSM,PRSKM:SP2UF/H8RSE,8SH/0yEP12SC10SE,8SE0y2R9PRRP12S1CSE,8SCP0RESC0yq982ES
y2HSE,8SU1008Rm12HP2qSyUxjS
 <E,80SREyEP12RS08U8P6P2qSE,PRSKM:SR8ERSE,8P0SDzhS4C10SKM:’SyUU10HP2qSE1SE,8SH/0yEP12SRm8UPCP8HSP2SKM:jS

g e
Fig. 4.2.16 : IEEE 802.11 fragmentations of data
io led
 M,8S08U8P680S21BSy2RB80RSBPE,S'M:–SyqyP2SP2UF/HP2qSH/0yEP12SCP8FHjS
 K8U8P680RS1CS'M:SR8ESE,8P0SDzhS4C10S'M:’SyUU10HP2qSE1SE,8SH/0yEP12SCP8FHjS

ic ow

M,8SR82H80SUy2S21BSR82HSE,8SCP0RESC0yq982ES4C0yq‘’SyCE80SByPEP2qSC10S:3”:SEP98jS
 M,8SC0yq982ES‘SP2UF/H8RSH/0yEP12S6yF/8jSM,PRSH/0yEP12SCP8FHS08R8068RSE,8S98HP/9SC10SE,8SE0y2R9PRRP12S1CSE,8SC1FF1BP2qS
n
C0yq982ERS4E,yESPRSC10SR8U12HSC0yq982ESy2HSPERSyUx’jS
bl kn

 zqyP2–SyFFS1E,80SREyEP12RS08U8P68SE,PRS08R806yEP12Sy2HSyHZ/RESE,8P0SDzhS4C10SC0yq‘’SyUU10HP2qFJjS

at

M,8S 08U8P680S 1CS C0yq‘S R82HRS yUxS C10S C0yq‘S yCE80S ByPEP2qS C10S :3”:S EP98jS M,PRS yUxS P2UF/H8RS 08R806yEP12S C10S E,8S 28=ES
Pu ch

C0yq982EjS
 <E,80SREyEP12RS08U8P6P2qSE,PRSyUxSR8ESE,8P0SDzhSC10S4yUx‘’SyUU10HP2qFJjS
Te

 3CSE,8SC0yq982ESPRSE,8SFyRESC0yq982ESE,82SPESH18RS21ES08R8068SE,8S98HP/9S4W/0yEP12SCP8FHSPRS89mEJ’Sy2HSE,8S98HP/9SPRS
21BSC088SC10S1E,80SREyEP12RjS
DFWMAC-PCF with polling
 +1P2ESU110HP2yEP2qSC/2UEP12S4+'”’SPRS/R8HSE1Sm016PH8SEP98Z51/2H8HSR806PU8RjSS
 +'”S08µ/P08RSy2SyUU8RRSm1P2ESE,yESU12E01FRSE,8S98HP/9SyUU8RRSy2HSm1FFRSySRP2qF8S21H8jS
 +'”S1m80yEP12SPRSy6yPFy5F8S12FJSC10SP2C0yRE0/UE/08S28EB10xRjS
YFL5QXC58jvvqYD5ELMFjP56j7LT5HT50jvvj6T5
 +1P2ESU110HP2yE10SP2SE,8SyUU8RRSm1P2ESRmFPERSE,8S82EP08SyUU8RRSEP98SP2E1SR/m80SC0y98Sm80P1HRjS
 zSR/m80SC0y98SU12EyP2RSyS-+"*'"*!+"&#$''&.'$!+(Sy2HSyS-+"*'"*!+"&.'$!+(jSS
 ”PqjSXj"j‘^SR,1BRSR8680yFSBP08F8RRSREyEP12RSy2HSE,8P0SDzhjSS
 zESEP98SE'SE,8SU12E82EP12ZC088Sm80P1HS1CSySR/m80C0y98SR,1/FHSE,8108EPUyFFJSREy0ES5/ES58Uy/R8SE,8S98HP/9SPRS5/RJSPESPRS
m1REm128HSEPFFSE!jS
 zCE80SByPEP2qSC10SyS+3”:SEP98–SE,8Sm1P2ESU110HP2yE10S4z+’SR82HRSW!SHyEySE1Sm1FFSCP0RESREyEP12jSM,PRSREyEP12SUy2S08mFJS12U8S
yCE80S:3”:jS
 zCE80S ByPEP2qS C10S :3”:S EP98–S E,8S m1P2ES U110HP2yE10S R82HRS W"S HyEyS E1S m1FFS R8U12HS REyEP12jS M,PRS REyEP12S 9yJS y2RB80S 5JS
R82HP2qSQ"SHyEySyCE80S:3”:jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-18 Wireless Local Area Networks

 M,8S m1P2ES U110HP2yE10S 21BS R82HRS W#S E1S m1FFS E,P0HS REyEP12jS M,PRS EP98S E,P0HS REyEP12S ,yRS 21E,P2qS E1S R82HjS M,8S m1P2ES
U110HP2yE10SBPFFS21ES08U8P68Sy2JE,P2qSyCE80S:3”:SEP98jSS
 D1B–SE,8Sm1P2ESU110HP2yE10SUy2Sm1FFS1E,80SREyEP12RSyCE80SByPEP2qS+3”:SEP98jS
 M,8Sm1P2ESU110HP2yE10SUy2SR82HS82HS9y0x80S4'”()*’SE,yESP2HPUyE8RSE,8S82HS1CSU12E82EP12ZC088Sm80P1HSy2HSE,8SREy0ES1CS
U12E82EP12Sm80P1HjS
 M,8SU12E82EP12Sm80P1HSUy2S58S/R8HSC10S—z:3'ZSW”-Yz'S10SW-”Yz'SBPE,SKM:“'M:jS
 <2U8SE,8SU12E82EP12Sm80P1HSPRS1680S4yCE80SE#’SE,8S28=ESR/m80C0y98SREy0ERSy2HSE,8Sy5168Sm01U8RRSREy0ERSyqyP2jSSSSSS

g e
io led
ic ow

Fig. 4.2.17 : DFWMAC-PCF with polling


n
4.2.5 MAC Management
bl kn

”1FF1BP2qSy08SE,8S08Rm12RP5PFPEP8RS1CSIWX5IHYHDLELYM5TOQ5vHNL75IS
at
Pu ch

4y’S :J2U,012PVyEP12SS

45’S +1B80SYy2yq8982ESS
Te

4U’S zRR1UPyEP12“K8yRR1UPyEP12S
4H’S Yz'SYy2yq8982ES32C109yEP12S—yR84Yz'SY3—’SS

4.2.5(a) Synchronization in IEEE 802.11


(MU – May 15)

Q. Explain synchronization in 802.11 MAC management layer for both infrastructure as well Ad-hoc WLANs.
(May 15, 10 Marks)

 …yU,S21H8S1CSy2S3………SV;"j‘‘S28EB10xS9yP2EyP2RSy2SP2E802yFSUF1UxjS
 M1SRJ2U,012PV8SE,8SUF1UxRS1CSyFFS21H8R–S3………SV;"j‘‘SRm8UPCP8RSySEP9P2qSRJ2U,012PVyEP12SC/2UEP12S4M:”’jSS
 M,8R8SRJ2U,012PV8HSUF1UxRSy08S288H8HSC10S_S
o +1B80S9y2yq8982ES
o '110HP2yEP12S1CSE,8S+'”SS
o :J2U,012PVyEP12SP2S”X::S,1mmP2qSR8µ/82U8jS

Synchronization process for infrastructure based networks

 32SP2C0yRE0/UE/08S5yR8HS28EB10xR–Sy2SyUU8RRSm1P2ESU110HP2yE8RSE,8SRJ2U,012PVyEP12Sm01U8RRjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-19 Wireless Local Area Networks

 M,8Sz+SE0y2R9PERSySRm8UPyFSC0y98SUyFF8HSQLH9jYSm80P1HPUyFFJjS
 zS 58yU12S C0y98S U12RPRERS 1CS yS EP98S REy9mS y2HS 1E,80S 9y2yq8982ES P2C109yEP12S /R8HS C10S m1B80S 9y2yq8982ES y2HS
01y9P2qjS
 <E,80SBP08F8RRS21H8RSyHZ/RESE,8P0SF1UyFSUF1UxRSBPE,S58yU12SEP98SREy9mjS
 M,8S21H8SPRS21ES08µ/P08HSE1S,8y0S8680JS58yU12SE1SREyJSRJ2U,012PV8H–S,1B8680SC019SEP98SE1SEP98SPERSUF1UxSR,1/FHS58S
yHZ/RE8HjS
 M,8S E0y2R9PRRP12S 1CS E,8S 58yU12S PRS 21ES yFByJRS m80P1HPUjS 3CS E,8S 98HP/9S PRS 5/RJ–S E,8S yUU8RRS m1P2ES m1REm128HS E,8S
E0y2R9PRRP12S1CSE,8S58yU12SC0y98jS

g e
io led
Fig. 4.2.18 : Beacon transmission in 802.11 infrastructure network
ic ow

Synchronization process for ad-hoc networks


n
 zRSE,808SPRS21SyUU8RRSm1P2ESP2SyHS,1US28EB10x–S8yU,S21H8SBPE,P2SE,8S28EB10xSPRS08Rm12RP5F8SC10SE,8SRJ2U,012PVyEP12S
bl kn

m01U8RRjS
 zCE80S8yU,S58yU12SP2E806yF–SyFFSREyEP12RSU,11R8S0y2H19S5yUxZ1CCSEP98jS
at
Pu ch

 <2FJS 128S REyEP12S B,1R8S 0y2H19S H8FyJS EP98S PRS F8RRS 58U198RS E,8S BP2280S y2HS Uy2S R82HS E,8S 58yU12S C0y98jS zFFS 1E,80S
REyEP12RSyHZ/RESE,8P0SF1UyFSUF1UxSyUU10HP2qFJjSS
Te

Fig. 4.2.19 : Beacon transmission in 802.11 ad-hoc networks

4.2.5(b) Power Management in IEEE 802.11


(MU – May 12, Dec. 13, Dec.17)

Q. Explain how the power management is done in IEEE 802.11 infrastructure based and ad-hoc networks.
(May 12, Dec. 13, Dec. 17, 10 Marks)

 :P2U8SBP08F8RRSH86PU8RSy08Sm1B808HS5JS5yEE80JiSm1B80SRy6P2qSPRSyS5PqSU,yFF82q8SP2S3………SV;"j‘‘jS
 M,8S5yRPUSPH8ySE1SRy68Sm1B80SP2S-OzDSPRSE1SRBPEU,S1CCSE,8SE0y2RU8P680SB,828680SPESPRS21ES288H8HjSS
 …yU,SREyEP12SUy2S58SP2S128S1CSE,8SEB1SREyE8RSz4/5TvLL85zk/5H6HLLRS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-20 Wireless Local Area Networks

 3CSySR82H80SPRSBPFFP2qSE1SU199/2PUyE8SBPE,SySm1B80SRy6P2qSREyEP12S4REyEP12SP2SRF88mS91H8’SE,82SE,8SR82H80S,yRSE1S5/CC80S
HyEyjS
 M,8SRF88mP2qSREyEP12SyByx8RSm80P1HPUyFFJSy2HS089yP2RSyByx82SC10SySU80EyP2Sm80P1HS1CSEP98jS
 W/0P2qSE,PRSEP98SyFFSREyEP12RSy221/2U8SH8REP2yEP12RS1CSE,8P0S5/CC808HSHyEyjS
 3CSySREyEP12SR88RSE,yESPESPRSySH8REP2yEP12S1CSyS5/CC808HSHyEy–SE,82SPESREyJRSyByx8S/2EPFSE,8SE0y2R9PRRP12SEyx8RSmFyU8jS
 zFFSREyEP12RSR,1/FHSByx8/mS10S58SyByx8SyESE,8SRy98SEP98jS”10SE,PR–SMP98S:J2U,012PVyEP12S”/2UEP12S4M:”’SPRS/R8HjS
Power management in infrastructure based networks
 32SP2C0yRE0/UE/08S28EB10xR–Sy2SyUU8RRSm1P2ESPRS08Rm12RP5F8SC10SE,8Sm1B80S9y2yq8982ESC/2UEP12jS
 zUU8RRSm1P2ES5/CC80RSHyEySmyUx8ERSC10SyFFSRF88mP2qSREyEP12RjS
 M,8SyUU8RRSm1P2ESE0y2R9PERSySM0yCCPUS32HPUyEP12SYymS4M3Y’SBPE,SyS58yU12SC0y98jSM3YSU12RPRERS1CSySFPRES1CSH8REP2yEP12RS1CS
5/CC808HSHyEyjS
 zHHPEP12yFFJ–S E,8S yUU8RRS m1P2ES yFR1S 9yP2EyP2RS yS W8FP680JS M0yCCPUS 32HPUyEP12S YymS 4WM3Y’S P2E806yFjS WM3YS PRS /R8HS C10S

e
R82HP2qS501yHUyRE“9/FEPUyRESC0y98RjS
 M,8SWM3YSP2E806yFSPRSyFByJRSyS9/FEPmF8S1CSM3YSP2E806yFRjS

g
io led
ic ow
n
bl kn
at
Pu ch

Fig. 4.2.20 : Power management in IEEE 802.11 infrastructure networks



Te

zFFSREyEP12RSByx8S/mSm0P10SE1Sy2S8=m8UE8HSM3YSy2HSWM3YjSS
 zRS R,1B2S P2S ”PqjS Xj"j";–S yES E,8S REy0ES 1CS E,8S WM3YS P2E806yF–S E,8S yUU8RRS m1P2ES ,yRS E1S E0y2R9PES yS 501yHUyRES C0y98jS
M,808C108–SE,8SREyEP12SREyJRSyByx8S/2EPFSPES08U8P68RSE,yESyS501yHUyRESC0y98jS
 zCE80S08U8P6P2qSE,8S501yHUyRESC0y98–SySREyEP12Sq18RS5yUxSE1SE,8SRF88mS91H8jS
 M,8SREyEP12SByx8RS/mSyqyP2S58C108SE,8S28=ESM3YSE0y2R9PRRP12jS—/ESE,8SyUU8RRSm1P2ESH8FyJRSE,8SE0y2R9PRRP12S1CSE,8S28=ES
M3YSH/8SE1SE,8S5/RJS98HP/9–SR1SE,8SREyEP12SREyJRSyByx8jS
 M,PRSEP98–SE,8SyUU8RRSm1P2ES,yRS21E,P2qSE1SR82HjSX82U8SE,8SREyEP12Sq18RS5yUxSE1SRF88mSyCE80SR198SEP98jS
 zESE,8S28=ESM3Y–SE,8SyUU8RRSm1P2ESP2HPUyE8RSE,yESE,8SREyEP12SPRSE,8SH8REP2yEP12S1CS5/CC808HSHyEyjSS
 M,8SH8REP2yEP12SREyEP12S08mFP8RS5JSR82HP2qSQ-S4m1B80SRy6P2q’SQjvvRSz2HSE,8SREyEP12SREyJRSyByx8SE1S08U8P68SE,yESHyEyjS
 zCE80S08U8P6P2qSHyEy–SE,8SREyEP12SR82HRSy2SyUx21BF8Hq8982ES10S9yJSR82HSR198SHyEySy2HSq18RS5yUxSE1SRF88mjS
 32SE,8S28=ESWM3Y–SE,8SyUU8RRSm1P2ES,yRS9108S501yHUyRESHyEySE1SR82HSy2HSE,8SREyEP12S,yRSE1SyByx8SE1S08U8P68SE,yESHyEyjS
Power management in ad-hoc networks
 32SyHZ,1US28EB10xR–Sm1B80S9y2yq8982ESPRS9108SHPCCPU/FESE,y2SP2SP2C0yRE0/UE/08S28EB10xRS58Uy/R8SE,808SPRS21SyUU8RRS
m1P2ESE1S5/CC80SHyEySC10Sm1B80SRy6P2qSREyEP12RjSS
 X808–S8yU,SREyEP12S5/CC80RSHyEySE,yESPESBy2ERSE1SR82HSE1Sm1B80SRy6P2qSREyEP12RjS
 32SyHZ,1US28EB10xR–SyFFSREyEP12RSy221/2U8SySFPRES1CS5/CC808HSC0y98SH/0P2qSySm80P1HSB,82SE,8JSy08SyFFSyByx8jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-21 Wireless Local Area Networks

 zFFSREyEP12RSy221/2U8SH8REP2yEP12RSC10SB,PU,SmyUx8ERSy08S5/CC808HS/RP2qSzM3YS4zHZ,1USE0yCCPUSP2HPUyEP12S9ym’SH/0P2qS
E,8SzM3YSP2E806yFjS
 zRSR,1B2SP2S”PqjSXj"j"‘SyFFSREyEP12RSyByx8SyESE,8SRy98SEP98Sy2HSREyJSyByx8SC10SzM3YSP2E806yFjSS

g e
io led
Fig. 4.2.21 : Power management in IEEE 802.11 ad-hoc networks

 32SE,8SCP0RESEB1SzM3YSP2E806yFR–SREyEP12RS,y68S21E,P2qSE1SR82H–S,82U8–SREyEP12RSREyJSyByx8SC10SzM3YSP2E806yFSy2HSFyE80Sq1S
ic ow

5yUxSE1SRF88mjS
32S E,8S E,P0HS zM3YS P2E806yF–S REyEP12!S ,yRS 5/CC808HS HyEyS C10S REyEP12"S ,82U8S REyEP12!S R82HRS zM3YS 4:,1B2S yRS WS P2SS
n
”PqjSXj"j"‘’jS
bl kn

 :EyEP12"SyUx21BF8Hq8RSE,PRSzM3YS4:,1B2SyRSPSP2S”PqjSXj"j"‘’Sy2HSREyJRSyByx8SC10SE0y2R9PRRP12jSzCE80SE,8SzM3YSBP2H1B–S
at

:EyEP12!SUy2SE0y2R9PES5/CC808HSHyEyS4:,1B2SyRSTSP2S”PqjSXj"j"‘’Sy2HSREyEP12"SR82HRSyUx21BF8Hq8982ES4R,1B2SyRSPSP2S
Pu ch

”PqjSXj"j"‘’S10SHyEyS4PCSPES,yR’SP2S08mFJjSSSS

4.2.5(c) Association/ Reassociation


Te

1. Association
 <2U8Sy/E,82EPUyEP12SPRSU19mF8E8H–SREyEP12RSUy2SyRR1UPyE8SBPE,Sy2SyUU8RRSm1P2ES410S08yRR1UPyE8SBPE,SyS28BSyUU8RRSm1P2E’SE1S
qyP2SC/FFSyUU8RRSE1SE,8S28EB10xjSS
 zRR1UPyEP12SyFF1BRSE,8SHPRE0P5/EP12SRJRE89SE1SE0yUxSE,8SF1UyEP12S1CS8yU,S915PF8SREyEP12jS
 M,8S5yRPUSm01U8H/08S1CSyRR1UPyEP12SPRSR,1B2SP2S”PqSXj"j""jS

Fig. 4.2.22 : Association

WTTj9qHMqjY5Q7j9LPO7L5I5
4P’S <2U8SyS915PF8SREyEP12S,yRSy/E,82EPUyE8HSE1Sy2SyUU8RRSm1P2E–SPESUy2SPRR/8Sy2SzRR1UPyEP12SK8µ/8RESC0y98jSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-22 Wireless Local Area Networks

4PP’S M,8SyUU8RRSm1P2ESE,82Sm01U8RR8RSE,8SyRR1UPyEP12S08µ/8REjSS
4y’S -,82SE,8SyRR1UPyEP12S08µ/8RESPRSq0y2E8H–SE,8SyUU8RRSm1P2ES08Rm12HRSBPE,SySREyE/RSU1H8S1CS;S4R/UU8RRC/F’Sy2HS
E,8S zRR1UPyEP12S 3WS 4z3W’jS M,8S z3WS PRS yS 2/980PUyFS PH82EPCP80S /R8HS E1S F1qPUyFFJS PH82EPCJS E,8S 915PF8S REyEP12S E1S
B,PU,S5/CC808HSC0y98RS288HSE1S58SH8FP6808HjSS
45’S Q2R/UU8RRC/FSyRR1UPyEP12S08µ/8RERSP2UF/H8S12FJSySREyE/RSU1H8–Sy2HSE,8Sm01U8H/08S82HRjS
2. Reassociation

S K8yRR1UPyEP12SPRSE,8Sm01U8RRS1CS916P2qSy2SyRR1UPyEP12SC019Sy2S1FHSyUU8RRSm1P2ESE1SyS28BS128jSS

g e
io led
ic ow
n
bl kn

Fig. 4.2.23 : Reassociation procedure


at

VLHTTj9qHMqjY5Q7j9LPO7L5I5
Pu ch

 M,8SREyEP12S912PE10RSE,8Sµ/yFPEJS1CSE,8SRPq2yFSPES08U8P68RSC019SE,yESyUU8RRSm1P2E–SyRSB8FFSyRSE,8SRPq2yFSµ/yFPEJSC019S1E,80SyUU8RRS
m1P2ERSP2SE,8SRy98S…::jSS
Te

 -,82S E,8S 915PF8S REyEP12S H8E8UERS E,yES PEYRS 08U8P6P2qS 58EE80S RPq2yFS C019S 1E,80S yUU8RRS m1P2E–S PES P2PEPyE8RS E,8S 08yRR1UPyEP12S
m01U8H/08jSS
”PqjSXj"j"[SH8mPUERSE,8SC1FF1BP2qSRE8mRS_S
‘jS M,8S915PF8SREyEP12SPRR/8RSySK8yRR1UPyEP12SK8µ/8RESE1SE,8S28BSyUU8RRSm1P2EjSS
"jS M,8S28BSyUU8RRSm1P2ES9/RESU199/2PUyE8SBPE,SE,8S1FHSyUU8RRSm1P2ESE1S680PCJSE,yESE,8S1FHSyUU8RRSm1P2ESy/E,82EPUyE8HS
E,8SREyEP12jS3CSE,8S680PCPUyEP12SCyPFRSE,82SE,8S28BSyUU8RRSm1P2ES08Rm12HRSBPE,SySW8y/E,82EPUyEP12SC0y98Sy2HS82HRSE,8S
m01U8H/08jS
[jS M,8S yUU8RRS m1P2ES m01U8RR8RS E,8S K8yRR1UPyEP12S K8µ/8REjS +01U8RRP2qS K8yRR1UPyEP12S K8µ/8RERS PRS RP9PFy0S E1S m01U8RRP2qS
zRR1UPyEP12SK8µ/8RERS_S
S 4y’S 3CSE,8SK8yRR1UPyEP12SK8µ/8RESPRSq0y2E8H–SE,8SyUU8RRSm1P2ES08Rm12HRSBPE,SyS:EyE/RS'1H8S1CS;S4R/UU8RRC/F’Sy2HS
E,8Sz3WjS
S 45’S Q2R/UU8RRC/FSK8yRR1UPyEP12SK8µ/8RERSP2UF/H8SZ/RESyS:EyE/RS'1H8–Sy2HSE,8Sm01U8H/08S82HRjS
XjS M,8S28BSyUU8RRSm1P2ESU12EyUERSE,8S1FHSyUU8RRSm1P2ESE1SCP2PR,SE,8S08yRR1UPyEP12Sm01U8H/08jSM,PRSU199/2PUyEP12SPRSmy0ES
1CSE,8S3z++jS
\jS M,8S1FHSyUU8RRSm1P2ESR82HRSy2JS5/CC808HSC0y98RSC10SE,8S915PF8SREyEP12SE1SE,8S28BSyUU8RRSm1P2EjSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-23 Wireless Local Area Networks

]jS M,8S1FHSyUU8RRSm1P2ESE809P2yE8RSPERSyRR1UPyEP12SBPE,SE,8S915PF8SREyEP12jSS
^jS M,8S 28BS yUU8RRS m1P2ES 58qP2RS m01U8RRP2qS C0y98RS C10SE,8S 915PF8S REyEP12jS -,82S PES 08U8P68RS yS C0y98S H8REP28HS C10S E,8S
915PF8SREyEP12jS
Roaming/ Scanning
-,82SyS915PF8SREyEP12S9168RSC019S128SyUU8RRSm1P2ESE1Sy21E,80SyUU8RRSm1P2ESE,82SPES,yRSSE1SyRR1UPyE8SBPE,S28BSyUU8RRS
m1P2ES C10S /2P2E800/mE8HS R806PU8–S E,PRS 916P2qS 58EB882S yUU8RRS m1P2ERS UyFF8HS 01y9P2qS 4Xy2H1CC’jS M,8S RE8mRS C10S 01y9P2qS
,y2H1CCS58EB882SyUU8RRSm1P2ERSy08SyRSC1FF1BRS4K8C80S”PqjSXj"j"X’S_S

g e
io led
ic ow
n
bl kn
at
Pu ch

Fig. 4.2.24 : Roaming in IEEE 802.11 WLAN

 -,82S REyEP12S 9168RS C019S 128S —::S E1S y21E,80S PERS FP2xS µ/yFPEJS C019S E,8S yUU8RRS m1P2ES z+!S 58U198RS m110jS M,8S REyEP12S
Te

E,82SREy0ERSRUy22P2qSC10Sy21E,80SyUU8RRSm1P2EjS
 :Uy22P2qS P261F68RS R8y0U,S C10S y21E,80S —::S 10S R8EEP2qS /mS 28BS —::S P2S E,8S UyR8S 1CS yHZ,1US 28EB10xRjS :Uy22P2qS 9yJS 58S
yUEP68S 10S myRRP68jS 32S W9MqKL5 T9HYYqYD5 REyEP125 R82HRS yS 87jQL5 12S 8yU,S U,y228FS y2HS ByPES C10S yS 08Rm12R8jS 32S QHTTqKL5
T9HYYqYDSE,8SREyEP12SFPRE82SE1SE,8S98HP/9SPj8jSREyEP12S08U8P68RS58yU12SRPq2yFS1CSy21E,80S28EB10xjS+0158Sy2HS58yU12S
U12EyP2RSE,8S28U8RRy0JSP2C109yEP12SE1SZ1P2SE,8S28BSyUU8RRSm1P2EjS
 M,8S REyEP12S E,82S R8F8UES E,8S 58RES yUU8RRS m1P2ES z+#S BPE,S E,8S RE012q8RES m0158“S 58yU12S RPq2yFS RE082qE,–S y2HS R82HS
7LHTTj9qHMqjY57LGOLTMSE1SE,8SR8F8UE8HSyUU8RRSm1P2EjS
 M,8S28BSyUU8RRSm1P2ESy2RB80RSBPE,S7LHTTj9qHMqjY57LT8jYTLR53CSE,8S08Rm12R8SPRSR/UU8RRC/F–SE,8SREyEP12S,yRS01y98HSE1S
E,8S28BSyUU8RRSm1P2EjS
 M,8S28BSyUU8RRSm1P2ES/R8HS3z++S432E80SzUU8RRS+1P2ES+01E1U1F’SE1SP2C109SE1SE,8S1FHSyUU8RRSm1P2ESz+!Sy51/ESE,8SU,y2q8S1CS
yUU8RRSm1P2EjS!

4.2.5(d) MAC Management Information Base (MAC-MIB)


3………S V;"j‘‘SYy2yq8982ES 32C109yEP12S —yR8S4Y3—’S PRS yS HyEy5yR8S /R8HS C10S 9y2yqP2qS E,8S 82EPEP8RS P2S yS-P08F8RRS OzDjS 3ES
Uy2S58SU12RE0/8HSyRSy2S:DY+SYy2yq8HS15Z8UESBPE,SR8680yFSU12CPq/0yEP12SU12E01FR–S1mEP12SR8F8UE10R–SU1/2E80R–Sy2HSREyE/RS
P2HPUyE10RjSM,8R8SHPCC8082ESyEE0P5/E8RSm809PESy2S8=E802yFS9y2yq8982ESyq82ESE1SH8E809P28SE,8SREyE/RSy2HSU12CPq/0yEP12S1CS
y2S3………SV;"j‘‘SREyEP12jSM,8SY3—SP2SySREyEP12SU19m0PR8RSR8my0yE8SR8UEP12RSC10SYz'Sy2HS+X`jSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-24 Wireless Local Area Networks

4.2.6 IEEE 802.11a


 3ES1m80yE8RSyESU5URVSC08µ/82UJS5y2HjS
 3ES1CC80RS9y=P9/9SHyEyS0yE8S1CSU,5IQqMTZTjS
 QR8RS^CTIS4<0E,1q12yFS”WY’S91H/FyEP12SRU,898SC10SyU,P86P2qSR/U,SyS,Pq,SHyEyS0yE8jS
 M0y2R9PRRP12S0y2q8SPRS‘;;9S1/EH110–S‘;9SP2H110jS
 X808SE11–SyFFSE,8SYz'SRU,898RSy2HS9y2yq8982ESm01U8H/08RSy08SRy98SyRSE,yES1CSE,8S10PqP2yFS3………SV;"j‘‘jS
 M,8S,8y0ES1CSE,8SRJRE89SPRSPERS91H/FyEP12SRU,898RSy2HSU1HP2qSRU,898RjS
 M1S 1CC80S ,Pq,S HyEyS 0yE8–S E,8S RJRE89S /R8RS Uk5 TOQ5 9H77qL7TS E,yES y08S 91H/FyE8HS /RP2qS 6y0P1/RS 91H/FyEP12S RU,898RS FPx8S
—+:c–Sd+:c–S‘]ZdzYSy2HS]XZdzYjS
 M1S9PEPqyE8SE0y2R9PRRP12S80010R–SPES/R8RSCNX54”10By0HS…0010S'1008UEP12SU1HP2q’S/RP2qSU1HP2qS0yE8S1CS‘“"–S"“[S10S[“XjS
 QRP2qS6y0P1/RSU195P2yEP12S1CS91H/FyEP12S4—+:c–Sd+:cS8EUj’Sy2HSU1HP2qSRU,898RSPESyU,P868RS6y0P1/RSHyEyS0yE8RSR/U,SyRS

e
]–Sf–S‘"–S‘V–S"X–S[]–SXVSy2HS\XSY5PER“RjS

g
Usage of OFDM in IEEE802.11a io led
 M,8S5yRPUSPH8yS1CS<”WYSPRSE,8S08H/UEP12S1CSE,8SRJ951FS0yE8S5JSHPRE0P5/EP2qS5PERS1680S2/9801/RSR/5Uy00P80RjS
 3………SV;"j‘‘yS/R8RSCP=8HSRJ951FS0yE8S1CS"\;–;;;SRJ951FRSm80SR8U12HSP2H8m82H82ES1CSE,8SHyEyS0yE8jS
ic ow
n
bl kn
at
Pu ch
Te

Fig. 4.2.25 : Usage of OFDM in IEEE 802.11a

 ”PqjS Xj"j"\S R,1BRS \"S R/5Uy00P80RS 8µ/yFFJS RmyU8HS y01/2HS yS U82E08S C08µ/82UJjS M,8S RmyUP2qS 58EB882S E,8S R/5Uy00P80RS PRS
[‘"j\ScXVjS
 M,8SU82E80SC08µ/82UJSPER8FCSPRS21ES/R8HSyRSySR/5SUy00P80jS:/5Uy00P80RS2/95808HSZ"‘–Z^–S^–S"‘Sy08S/R8HSC10SmPF1ESRPq2yFRSE1S
9yx8SE,8SRPq2yFSR8F8UEP12S015/RESyqyP2RESC08µ/82UJS1CCR8EjS
 '19my08HS E1S 3………S V;"j‘‘5S E,yES 1m80yE8RS P2S "jXS 7XVS E,8S 3………V;"j‘‘yS 1CC80RS ,Pq,80S HyEyS 0yE8S y2HS 9108S U1680yq8–S
,1B8680SR,yHP2qSyES\7XVSPRS9/U,S9108SR86808SU19my08HSE1S"jXS7XVjS

4.2.7 802.11b
 Q2FPx8S3………SV;"j‘‘y–S3………SV;"j‘‘5S1m80yE8RSyES"jXS7XVj5
 3ESm016PH8RS0yBSHyEyS0yE8RS/mSE1S‘‘SY5mRj5
 3ESm016PH8RSySBP08F8RRS0y2q8S1CS01/q,FJS[\S98E80RSP2H110RSy2HS‘X;S98E80RS1/EH110Rj5
 3ES/R8RSE,8S':Yz“'zSE8U,2Pµ/8j5
 M,8SK”SRPq2yFSC109yES/R8HSC10SV;"j‘‘5SPRS''cS10SU19mF8982Ey0JS'1H8Sc8JP2qj5
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-25 Wireless Local Area Networks

 IEEE 802.11b supports Adaptive Rate selection. The system monitors the signal quality. If the signal falls or
interference levels rise, then system adopt a slower data rate with more error correction. The system will first fall back
to a rate of 5.5 Mbps, then 2, and finally 1 Mbps. This scheme is known as Adaptive Rate Selection (ARS).

4.2.8 Comparison of Various IEEE 802.11x Standards


(MU – Dec. 15)

Q. Compare various IEEE 802.11x standards. (Dec. 15, 10 Marks)

Parameters IEEE IEEE IEEE IEEE 802.11g IEEE 802.11n


802.11 802.11a 802.11b

Operates at 2.4GHz 5GHz 2.4GHz 2.4 GHz 5 GHz or 2.4 GHz

Maximum data 2 Mbps 54 Mbps 11 Mbps 54 Mbps 300 Mbps


rate

e
Modulation DSSS, OFDM DSSS or DSSS or CCK or OFDM DSSS or CCK or OFDM

g
FHSS CCK
io led
Channel width 20 MHz 20 MHz 20 MHz 20 MHz 20 MHz or 40 MHz

Typical range 66 feet 75 feet 100 feet 150 feet 150 feet
ic ow

Antenna 1x1 SISO 1x1 SISO 1x1 SISO 1x1 SISO(Single Input- 4x4 MIMO (Multiple Input-
configuration Single Output) Multiple Output)
n
bl kn

IEEE 802.11 is mainly designed for enhanced security purposes. It addresses two main weaknesses of wireless security
networks which are encryption and authentication. Encryption is accomplished by replacing WEP’s original PRNG RC4
at

algorithm by stronger cipher that performs three steps on every block of data. The authentication and key management is
Pu ch

accomplished by the IEEE 802.1x standard.


Te

4.3 Wi-Fi Security Standards


 Since wireless networks transmit data over radio waves, it is easy to intercept data or "eavesdrop" on wireless data
transmissions.
 Several Wi-Fi security algorithms have been developed since the inception of Wi-Fi.
 The wireless security protocols prevent unwanted parties from connecting to your wireless network and also encrypt
your private data sent over the airwaves.
 Different types of wireless security protocols have been discussed below.

4.3.1 WEP – Wired Equivalent Privacy


 WEP stands for ‘Wired Equivalent Privacy’.
 WEP is specified by IEEE 802.11 for encryption and authentication of Wi-Fi networks.
 It operates at physical and data link layer.
 The goal of WEP is to make wireless networks as secure as wired networks.
 WEP is having two main parts. Authentication and Encryption.
(i) WEP Authentication
 Fig. 4.3.1 shows an example of WEP authentication:
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-26 Wireless Local Area Networks

Fig. 4.3.1 : WEP authentication

 ”P0RESyS08µ/8REP2qSREyEP12SR82HRSy2Sz/E,82EPUyEP12SK8µ/8RESE1SE,8SyUU8RRSm1P2ES4z+’jS
 <2S08U8P6P2qSE,8S08µ/8RE–SE,8Sz+–S08mFP8RSBPE,SyS‘"VS5JE8S0y2H19SU,yFF82q8SE8=ESq8280yE8HS5JS-…+SyFq10PE,9jS
 M,8S08µ/8REP2qS21H8SE,82SU1mP8RSE,8SE8=ESP2E1SE,8Sy/E,82EPUyEP12SC0y98Sy2HSS82U0JmERSPESBPE,SySR,y08HSx8JS–Sy2HSE,82S
R82HRSE,8SC0y98S5yUxSE1SE,8Sz+jS

e
 M,8Sz+SE,82SBPFFSH8U0JmESE,8S6yF/8S1CSE,8SU,yFF82qP2qSE8=ES/RP2qSE,8SRy98SR,y08HSx8JSy2HSU19my08SPESE1SE,8SU,yFF82qP2qS

g
E8=ESR82ES8y0FP80jS

io led
3CS9yEU,S1UU/0R–SE,8Sz+SBPFFS08mFJSBPE,SySm1RPEP68Sy/E,82EPUyEP12SP2HPUyEP2qSySR/UU8RRC/FSy/E,82EPUyEP12jSS
 3CSE,808SPRS21ESyS9yEU,–SE,8Sz+SBPFFSR82HS5yUxSyS28qyEP68Sy/E,82EPUyEP12jS
(ii) WEP Encryption
ic ow

NY97N8MqjY587j9LTT5
n
 -…+S/R8RSK'XS82U0JmEP12SB,PU,SPRSySRJ998E0PUSRE08y9SUPm,80SE1Sm016PH8SU12CPH82EPyFPEJjS
bl kn

 M,8SX;Z5PESR8U08ESx8JSPRSU1228UE8HSBPE,SyS"XZ5PES32PEPyFPVyEP12S68UE10S43h’S08R/FEP2qSP2SySE1EyFS]XSa5PESx8J4R,1B2SyRSySR88HS
at

P2S”PqjSXj[j"’jSS
Pu ch

 M,8S08R/FEP2qSx8JS4R88H’SPRSE,8SP2m/ESC10SE,8S+R8/H1SKy2H19SD/9580S78280yE10S4+KD7’jSM,8S+KD7S4K'X’S1/Em/ERSyS
mR8/H1S0y2H19Sx8JSR8µ/82U8S5yR8HS12SE,8SP2m/ESx8JjS
Te

 M,8S08R/FEP2qSR8µ/82U8SPRS/R8HSE1S82U0JmESE,8SHyEyS5JSH1P2qSyS5PEBPR8Sj<KjSS

Fig. 4.3.2 : WEP Encryption

 M,8S08R/FESPRS82U0JmE8HS5JE8RS8µ/yFSP2SF82qE,SE1SE,8S2/9580S1CSHyEyS5JE8RSE,yESy08SE1S58SE0y2R9PEE8HSP2SE,8S8=my2H8HS
HyEySmF/RSC1/0S5JE8RjSM,PRSPRS58Uy/R8SE,8Sx8JSR8µ/82U8SPRS/R8HSE1Sm01E8UESE,8S["Z5PES32E8q0PEJS',8UxShyF/843'h’SSyRSB8FFS
yRSE,8SHyEyjS
 ”PqjSSXj[j"SR,1BRSE,8S82U0JmEP12SyFq10PE,9Sy2HS”PqjSXj[j[SR,1BRSE,8SH8U0JmEP12SyFq10PE,9jS
 M1Sm08682ES/2y/E,10PV8HSHyEyS91HPCPUyEP12Sy2SP2E8q0PEJSyFq10PE,9–S'K'Z["S1m80yE8RS12SE,8SmFyP2SE8=ESE1Sm01H/U8S3'hjS
 M,8S1/Em/ES1CSE,8SB,1F8Sm01U8RRSPRSyS98RRyq8SU12EyP2P2qSE,088Smy0ER_SE,8S08R/FEP2qSUPm,80E8=E–SE,8S3h–Sy2HSE,8S3'hjS5
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-27 Wireless Local Area Networks

Decryption process

Fig. 4.3.3 : WEP Decryption


 M,8SP2U19P2qS98RRyq8S,yRSE,088Smy0ER_S'Pm,80E8=E–S3hSy2HS3'hjS
 M,8S3hS1CSE,8SP2U19P2qS98RRyq8SPRS/R8HSE1Sq8280yE8SE,8Sx8JSR8µ/82U8SE1SH8U0JmESE,8SP2U19P2qS98RRyq8jSS
 '195P2P2qSE,8SUPm,80E8=ESBPE,SE,8Sm01m80Sx8JSR8µ/82U8SBPFFSqP68SE,8S10PqP2yFSmFyP2E8=ESy2HS3'hjSS

e
 M,8S H8U0JmEP12S PRS 680PCP8HS 5JS m80C109P2qS P2E8q0PEJS U,8UxS yFq10PE,9S 12S E,8S 08U16808HS mFyP2S E8=ES y2HS U19my0P2qS E,8S

g
1/Em/ES1CSE,8S3'hYS4'yFU/FyE8HS3'h’SE1SE,8S3'hSR/59PEE8HSBPE,SE,8S98RRyq8jS3CSUyFU/FyE8HS3'hS43'hY’SPRS21ESRy98SyRS3'hS–S
io led
E,8S08U8P68HS98RRyq8SPRSP2S80010jS5
WEP vulnerabilities
zFE,1/q,S-…+SyEE89mERSE1SyU,P868SBP08HS8µ/P6yF82ESR8U/0PEJ–SE,808Sy08SREPFFS9y2JSB8yx28RR8RSP2S-…+SB,PU,S9yJS58S
ic ow

/R8HS5JSE,8S9yFPUP1/RS/R80SE1SU19m019PR8SE,8SR8U/0PEJS1CS-OzDjS
n
zq/5 YFL5K`5qT5Mjj5TEHvv5HYP5qY59vLH75MLhMR5
bl kn

S 32PEPyFSh8UE10S/R8HSP2S-…+SPRS"XZ5PESCP8FHSR82ESP2SE,8SUF8y0SE8=ESm10EP12S1CSyS98RRyq8jSM,PRS"XZ5PESRE0P2q–S/R8HSE1SP2PEPyFPV8S
E,8Sx8JSRE08y9Sq8280yE8HS5JSE,8SK'XSyFq10PE,9–SPRSyS08FyEP68FJSR9yFFSCP8FHSB,82S/R8HSC10SU0JmE1q0ym,PUSm/0m1R8RjS
at
Pu ch

zqq/5 YFL5K`5qT5TMHMq9R55
S M,8SRy98S3hSPRS/R8HSE1Sm01H/U8SE,8Sx8JS8680JSEP98jSK8/R8S1CSE,8SRy98S3hS9yJSm01H/U8SPH82EPUyFSx8JSRE08y9RSy2HSRP2U8S
Te

3hSPRSR,10E–SPESq/y0y2E88RSE,yESE,1R8SRE08y9RSBPFFS08m8yESyCE80SyS08FyEP68FJSR,10ESEP98jS
zqqq/5 YFL5K`5EHLLT5MFL5LLN5TM7LHE5KOvYL7HQvLR5
S SM,8SV;"j‘‘SREy2Hy0HSH18RS21ESRm8UPCJS,1BSE,8S3hRSy08SR8ES10SU,y2q8H–Sy2HSP2HP6PH/yFSBP08F8RRSyHymE80RSC019SE,8SRy98S
682H10S9yJSyFFSq8280yE8SE,8SRy98S3hSR8µ/82U8R–S10SR198SBP08F8RRSyHymE80RS9yJSm1RRP5FJS/R8SySU12REy2ES3hjSzRSyS08R/FE–S
,yUx80RSUy2S08U10HS28EB10xSE0yCCPU–SH8E809P28SE,8Sx8JSRE08y9–Sy2HS/R8SPESE1SH8U0JmESE,8SUPm,80SE8=EjS
zqK/5 WNQ587jKqPLT5Yj597N8MjD7H8Fq95qYMLD7qMN587jML9MqjYR5
S M,8S U195P2yEP12S 1CS 212ZU0JmE1q0ym,PUS U,8UxR/9RS BPE,S RE08y9S UPm,80RS PRS Hy2q801/RS ZS y2HS 1CE82S P2E01H/U8RSS
6/F280y5PFPEP8RjSMS
zK/5 WNQ5aTLT5-M7LHE5Xq8FL7R5
S M,8S5yRPUSm015F89SBPE,S-…+SPRSE,yESPES/R8RSySRE08y9ZUPm,80Sx21B2SyRSK'XSP2SRJ2U,0121/RS91H8SC10S82U0JmEP2qSHyEyS
myUx8ERjS QRP2qS E,8S RJ2U,0121/RS RE08y9S UPm,80R–S E,8S F1RRS 1CS yS RP2qF8S 5PES 1CS yS HyEyS RE08y9S Uy/R8RS E,8S F1RRS 1CS yFFS HyEyS
C1FF1BP2qSE,8SF1RES5PEjSM,/RSE,8SRE08y9SUPm,80SPRS21ESR/PEy5F8SC10SBP08F8RRS98HP/9SB,808SmFyUx8ESF1RRSPRSBPH8Rm08yHj5

4.3.2 WPA
 -+zSREy2HRSC10Sk-PZ”PS+01E8UE8HSzUU8RRljSS
 -+zSByRSH868F1m8HS5JSE,8S-PZ”PSzFFPy2U8SE1Sm016PH8S58EE80S/R80Sy/E,82EPUyEP12SE,y2S-P08HS…µ/P6yF82ES+0P6yUJS4-…+’–SSS
 <28S9yZ10SP9m0168982ESP2S-+zS1680S-…+SPRSE,8SM89m10yFSc8JS32E8q0PEJS+01E1U1FS4Mc3+’–SB,PU,SHJ2y9PUyFFJSU,y2q8RS
x8JRSyRSE,8SRJRE89SPRS/R8HjSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-28 Wireless Local Area Networks

 3ES/R8RSK'XSRE08y9SUPm,80SBPE,SyS‘"VS5PESx8JSy2HSySXVS5PES3hjSM,8SF12q80Sx8JSy2HS3hSE1q8E,80SH8C8yESE,8Sx8JS08U1680JS
yEEyUxRS12S-…+jS
 32SyHHPEP12SE1Sy/E,82EPUyEP12Sy2HS82U0JmEP12–S-+zSyFR1Sm016PH8RS6yREFJSP9m0168HSmyJF1yHSP2E8q0PEJjSS
 M,8SUJUFPUS08H/2Hy2UJSU,8UxS4'K'’S/R8HSP2S-…+SPRSP2R8U/08iSPESPRSm1RRP5F8SE1SyFE80SE,8SmyJF1yHSy2HS/mHyE8SE,8S98RRyq8S
'K'SBPE,1/ESx21BP2qSE,8S-…+Sx8JjSS
 -+zS/R8RSySR1F/EP12SUyFF8HSYPU,y8F–SB,PU,SPRSySY8RRyq8S32E8q0PEJS',8UxS4Y3'’–SE1SE,8SU,8UxR/9S58P2qSU100/mE8HSPRR/8jS
-+zS/R8RSyS["S5PES32E8q0PEJS',8UxShyF/8S43'h’jSM,PRSPRSP2R80E8HSyCE80SmyJF1yHSy2HS58C108S3hjSM,8SY3'SP2UF/H8RSySC0y98S
U1/2E80–SB,PU,S,8FmRSE1Sm08682ES08mFyJSyEEyUxRjS
WPA Modes

S-+zSR/mm10ERSEB1S91H8RS1CS1m80yEP12j
1. Pre-Shared Key Mode or Personal Mode

e
S M,PRS91H8SPRS/R8HSC10Sm80R12yFS/R8jSM,8Sm08R,y08HS91H8SH18RS21ES08µ/P08Sy/E,82EPUyEP12SR80680jS3ES/EPFPV8RSySR,y08HS

g
x8JSE,yESPRSU199/2PUyE8HSE1S51E,SRPH8RS4z+Sy2HSUFP82E’S58C108S8REy5FPR,P2qSySBP08F8RRSU1228UEP12iSE,PRSx8JSPRSE,82S/R8HS
E1SR8U/08SE,8SE0yCCPUjSS
io led
2. Enterprise Mode

S …2E80m0PR8SY1H8S08µ/P08RSy2Sy/E,82EPUyEP12SR80680jS3ES/R8RS9108SRE0P2q82ESV;"j‘=Sy/E,82EPUyEP12SBPE,SE,8S…=E82RP5F8S
ic ow

z/E,82EPUyEP12S +01E1U1FS 4…z+’j!!"! QR8RS KzW3Q:S m01E1U1FRS C10S y/E,82EPUyEP12S y2HS x8JS HPRE0P5/EP12jS 32S E,PRS 91H8–S E,8S
n
/R80SU08H82EPyFRSy08S9y2yq8HSU82E0yFFJjSS
bl kn

WPA2 vs. WPA and WEP


 z912qS yFFS E,088S BP08F8RRS OzDS R8U/0PEJS m01E1U1FR–S -…+S PRS E,8S F8yRES R8U/08S B,PU,S m016PH8RS R8U/0PEJS 8µ/yFS E1S E,yES 1CS yS
at
Pu ch

BP08HSU1228UEP12jSS
 -…+S501yHUyRERS98RRyq8RS/RP2qS0yHP1SBy68RSy2HSPRS9/U,S8yRP80SE1SU0yUxjSM,PRSPRS58Uy/R8SPES/R8RSE,8SRy98S82U0JmEP12SS
C10S 8680JS HyEyS myUx8EjS 3CS 821/q,S HyEyS PRS y2yFJV8HS 5JS y2S 8y68RH01mm80–S E,8S x8JS Uy2S 58S 8yRPFJS C1/2HS BPE,S y/E19yE8HS
Te

R1CEBy08jS
 -+zSP9m0168RS12S-…+S5JS/RP2qSE,8SMc3+S82U0JmEP12SRU,898SE1SRU0y95F8SE,8S82U0JmEP12Sx8JSy2HS680PCJSE,yESPES,yR2mES
5882SyFE808HSH/0P2qSE,8SHyEySE0y2RC80jSS
 ”/0E,80–S-+z"SP9m0168RSE,8SR8U/0PEJS1CSyS28EB10xS5JS/RP2qSRE012q80S82U0JmEP12S98E,1HSUyFF8HSz…:jS

4.3.3 Wireless LAN threats


M,808Sy08SyS2/9580S1CSE,08yERSE,yES8=PRESE1SBP08F8RRSOzD:–SE,8R8SP2UF/H8_S
 K1q/8SzUU8RRS+1P2ER“zHZX1USD8EB10xRS
 …6PFSMBP2Sz+RS
 W82PyFS1CS:806PU8S
 '12CPq/0yEP12S+015F89RSyFR1SUyFF8HSYPRZ'12CPq/0yEP12RS10S32U19mF8E8S'12CPq/0yEP12RS
 +yRRP68S'ymE/0P2qS
 YPR58,y6P2qS'FP82ERS
1. Rogue Access Points/Ad-Hoc Networks
 <28SByJSE,yESPRSE,8SyEEyUx80RSEy0q8ESBP08F8RRSOzDRSPRS5JSR8EEP2qS/mSyS01q/8SyUU8RRSm1P2EjSS
 zS01q/8SyUU8RRSm1P2ES4z+’SPRSySBP08F8RRSz+SE,yES,yRS5882SP2REyFF8HS12SySR8U/08HS28EB10xSBPE,1/ESy2JSy/E,10PVyEP12S
C019SE,8S28EB10xSyH9P2PRE0yE10jSS
 M,8SPH8ySPRSE1SmC11FmSR198S1CSE,8SF8qPEP9yE8SH86PU8RSy2HSE1S9yx8SE,89SU1228UESE1SE,8S01q/8SyUU8RRSm1P2EjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-29 Wireless Local Area Networks

2. Evil Twin Aps


 32SE,PRSEJm8S1CSyEEyUx–SE,8SC0y/H/F82ESz+SyH680EPR8RSE,8SRy98S28EB10xS2y98S4::3W’SyRSySF8qPEP9yE8S-OzD–SUy/RP2qS
28y05JS-PZ”PSUFP82ERSE1SU1228UESE1SE,89jS
 M,8S12FJS8CC8UEP68SH8C82R8SyqyP2RES…6PFSMBP2RSPRSR80680Sy/E,82EPUyEP12SC019SV;"j‘jjS
3. Denial of Service
 M,PRSPRSE,8S91RESU19912Sy2HSRP9mF8RESyEEyUxjSS3ESUy2SU0PmmF8S10SHPRy5F8SySBP08F8RRS28EB10xS5JSFP9PEP2qSE,8SyUU8RRSE1S
E,8SR806PU8RjSS
 M,PRSUy2S58SH128S5JSRP9mFJSR82HP2qSySFy0q8Sy91/2ES1CSE0yCCPUSyESySRm8UPCPUSEy0q8EjSS
 X808S E,8S y91/2ES 1CS E0yCCPUS q8280yE8HS E1S yCC8UES yS Ey0q8ES H86PU8S PRS 9/U,S ,Pq,80S E,y2S E,8S Uymy5PFPEP8RS 1CS yS Ey0q8ES
9yU,P28jS
 zSH82PyFS1CSR806PU8SyEEyUxSUy2SyFR1S58S/R8HSP2SU12Z/2UEP12SBPE,SyS01q/8SyUU8RRSm1P2EjS”10S8=y9mF8–SyS01q/8SyUU8RRS

e
m1P2ESU1/FHS58SR8E/mSP2SySU,y228FSE,yESPRS21ES/R8HS5JSE,8SF8qPEP9yE8SyUU8RRSm1P2EjSSM,82SE,8SH82PyFS1CSR806PU8SyEEyUxS
U1/FHS 58S Fy/2U,8HS yES E,8S U,y228FS U/0082EFJS 58P2qS /R8HS Uy/RP2qS 82Hm1P2ES H86PU8RS E1S E0JS E1S 08ZyRR1UPyE8S 12E1S yS

g
HPCC8082ESU,y228FSB,PU,SPRS/R8HS5JSE,8S01q/8SyUU8RRSm1P2EjS
io led
4. Configuration Problems
 :P9mF8SU12CPq/0yEP12Sm015F89RSy08S1CE82SE,8SUy/R8S1CS9y2JS6/F280y5PFPEP8RjSSzS216PU8S/R80SUy2SR8ES/mS128S1CSE,8R8S
ic ow

H86PU8RS µ/PUxFJS y2HS qyP2S yUU8RRjS S X1B8680–S E,8JS yFR1S 1m82S /mS E,8P0S 28EB10xS E1S 8=E802yFS /R8S BPE,1/ES C/0E,80S
U12CPq/0yEP12jS
n
 <E,80S PRR/8RS BPE,S U12CPq/0yEP12S P2UF/H8S B8yxS myRRm,0yR8R–S B8yxS R8U/0PEJS yFq10PE,9S H8mF1J982ERS 4Pj8jS -…+S 6RS
bl kn

-+zS6RS-+z"’–Sy2HSH8Cy/FES::3WS/Ryq8jS
5. Passive Capturing
at
Pu ch

 +yRRP68SUymE/0P2qSPRSm80C1098HS5JSRP9mFJSq8EEP2qSBPE,P2SE,8S0y2q8S1CSySEy0q8ESBP08F8RRSOzDSy2HSE,82SFPRE82P2qSy2HS
UymE/0P2qSHyEyjSS
Te

 M,PRSP2C109yEP12SUy2S58S/R8HSC10SyS2/9580S1CSE,P2qRSP2UF/HP2qSyEE89mEP2qSE1S508yxS8=PREP2qSR8U/0PEJSR8EEP2qRSy2HS
y2yFJVP2qS212ZR8U/08HSE0yCCPUjSS
 3ESPRSyF91RESP9m1RRP5F8SE1S08yFFJSm08682ESE,PRSEJm8S1CSyEEyUxS58Uy/R8S1CSE,8S2yE/08S1CSySBP08F8RRS28EB10xiSB,yESUy2S
58SH128SPRSE1SP9mF8982ES,Pq,SR8U/0PEJSREy2Hy0HRS/RP2qSU19mF8=Smy0y98E80RjS
6. Misbehaving Clients
 :198EP98RS UFP82ERS C109S /2y/E,10PV8HS -PZ”PS U1228UEP12RS yUUPH82EyFFJS 10S P2E82EP12yFFJjS —JS H1P2qS E,PR–S E,8JS m/ES
E,89R8F68RSy2HSU10m10yE8SHyEySyES0PRxjSS
 :198S 82E80m0PR8RS /R8S 701/mS +1FPUJS <5Z8UERS E1S U12CPq/08S y/E,10PV8HS -PZ”PS U1228UEP12RS y2HS m08682ES 82HZ/R80S
U,y2q8RjS<E,80RS/R8S,1REZ08RPH82ESyq82ERSE1S912PE10S-PZ”PSUFP82ESyUEP6PEJSy2HSHPRU1228UES,Pq,Z0PRxSU1228UEP12RjSS

4.3.4 Securing Wireless Network


M,8SC1FF1BP2qSy08SR198S1CSE,8SByJRS5JSB,PU,SJ1/SUy2SR8U/08SBP08F8RRS28EB10xjS
4R5 aTL5HY5qY9jYT8q9OjOT5YLM6j7L5YHEL5z--KT/5
o M,8S:806PU8S:8ES3H82EPCP80S4::3W’SPRS128S1CSE,8S91RES5yRPUS-PZ”PS28EB10xSR8EEP2qRjSz61PHS/RP2qSE11SU19912S::3W–S
FPx8SkBP08F8RRlS10SE,8S682H10YRSH8Cy/FES2y98jS
o M,PRSUy2S9yx8SPES8yRP80SC10SR198128SE1SU0yUxSE,8Sm80R12yFS91H8S1CS-+zSR8U/0PEJjSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-30 Wireless Local Area Networks

kR5 aTL5NYML787qTL5WQWk56qMF5OPkR4b5HOMFLYMq9HMqjY5
o QR8S82E80m0PR8S91H8S1CS-PZ”PSR8U/0PEJ–S58Uy/R8SPESy/E,82EPUyE8RS8680JS/R80SP2HP6PH/yFFJSZS…680J128SUy2S,y68SE,8P0S
1B2S-PZ”PS/R802y98Sy2HSmyRRB10HjS:1SPCSySFymE1mS10S915PF8SH86PU8SPRSF1RES10SRE1F82–S10Sy2S89mF1J88SF8y68RSE,8S
U19my2J–SyFFSJ1/S,y68SE1SH1SPRSU,y2q8S10S0861x8SE,yESmy0EPU/Fy0S/R80YRSF1qZP2RjS
o 32SU12E0yRE–SP2Sm80R12yFS91H8–SyFFS/R80RSR,y08SE,8SRy98S-PZ”3SmyRRB10H–SR1SB,82SH86PU8RSq1S9PRRP2qS10S89mF1J88RS
F8y68SJ1/S,y68SE1SU,y2q8SE,8SmyRRB10HS12S8680JSRP2qF8SH86PU8jS
o z21E,80SyH6y2Eyq8S1CS82E80m0PR8S91H8SPRSE,yES8680JS/R80SPRSyRRPq28HS,PRS10S,80S1B2S82U0JmEP12Sx8JjSM,yES98y2RS
/R80RSUy2S12FJSH8U0JmESHyEySE0yCCPUSC10SE,8P0S1B2SU1228UEP12SnS21SR211mP2qS12Sy2J128S8FR8YRSBP08F8RRSE0yCCPUjS
GR5 aTL50q7L6HvvT5Mj5TL9O7L5NjO75WqM0q5YLM6j7L5
o QR8SzS,y0HBy08SCP08ByFFjSzS,y0HBy08SCP08ByFFSH18RSE,8SRy98SE,P2qSyRSySR1CEBy08S128–S5/ESPESyHHRS128S8=E0ySFyJ80S1CS
R8U/0PEJjS
o

e
M,8S 58RES my0ES y51/ES ,y0HBy08S CP08ByFFRS PRS E,yES 91RES 1CS E,8S58RES BP08F8RRS 01/E80RS ,y68S yS 5/PFEZP2S CP08ByFFSE,yES
R,1/FHSm01E8UESJ1/0S28EB10xSC019Sm1E82EPyFSUJ580SyEEyUxRjS5

g
o
io led
3CS J1/0S 01/E80S H18R2YES ,y68S 128–S J1/S Uy2S P2REyFFS yS q11HS CP08ByFFS H86PU8S E1S J1/0S 01/E80S P2S 10H80S E1S m01E8UES J1/0S
RJRE89SC019S9yFPUP1/RS,yUxP2qSyEE89mERSyqyP2RESJ1/0S,198S28EB10xjS
,R5 VLTM7q9M5H99LTT5
ic ow

S <2FJS yFF1BS y/E,10PV8HS /R80RS E1S yUU8RRS J1/0S 28EB10xjS …yU,S mP8U8S 1CS ,y0HBy08S U1228UE8HS E1S yS 28EB10xS ,yRS yS 98HPyS
yUU8RRSU12E01FS4Yz'’SyHH08RRjS`1/SUy2S08RE0PUESyUU8RRSE1SJ1/0S28EB10xS5JSCPFE80P2qSE,8R8SYz'SyHH08RR8RjSS
n
bl kn

UR5 NY97N8M5MFL5PHMH5jY5NjO75YLM6j7L5
S QR8S RE012qS 82U0JmEP12S yFq10PE,9S E1S 82U0JmES HyEyjS M,808S y08S R8680yFS 82U0JmEP12S m01E1U1FRS y6yPFy5F8S E1S m016PH8S E,PRS
at
Pu ch

m01E8UEP12jS -P08HS …µ/P6yF82ES +0P6yUJS 4-…+’–S -PZ”PS +01E8UE8HS zUU8RRS 4-+z’–S y2HS -+z"S 82U0JmES P2C109yEP12S 58P2qS
E0y2R9PEE8HS58EB882SBP08F8RRS01/E80RSy2HSBP08F8RRSH86PU8RjS-+z"SPRSU/0082EFJSE,8SRE012q8RES82U0JmEP12jSS
Te

[R5 IHqYMHqY5HYMqKq7OT5Tj0M6H7L5
S 32REyFFS y2EP6P0/RS R1CEBy08S y2HS x88mS E,8S 6P0/RS H8CP2PEP12RS /mZE1ZHyE8jS Yy2JS y2EP6P0/RS m01q0y9RS yFR1S ,y68S yHHPEP12yFS
C8yE/08RSE,yESH8E8UES10Sm01E8UESyqyP2RESRmJBy08Sy2HSyHBy08jS
\R5 aTL50qvL5TFH7qYD56qMF59HOMqjY5
S ”PF8SR,y0P2qS58EB882SH86PU8RSR,1/FHS58SHPRy5F8HSB,82S21ES288H8HjSzFF1BSCPF8SR,y0P2qS1680S,198S10SB10xS28EB10xR–S
28680S 12S m/5FPUS 28EB10xRjS '08yE8S yS H8HPUyE8HS HP08UE10JS C10S CPF8S R,y0P2qS y2HS 08RE0PUES yUU8RRS E1S yFFS 1E,80S HP08UE10P8RjS
z2JE,P2qSE,yESPRS5882SR,y08HSR,1/FHS58SmyRRB10HSm01E8UE8HjSS
OR5 cLL85NjO75H99LTT58jqYM5Tj0M6H7L58HM9FLP5HYP5O8MMjMPHML5
5 M,8S9y2/CyUE/080S1CSJ1/0SBP08F8RRSyUU8RRSm1P2ESSm80P1HPUyFFJS08F8yR8S/mHyE8RjSQmHyE8SyUU8RRSm1P2ESR1CEBy08SB85RPE8S
08q/Fy0FJjS
]R5 XjYYL9M5OTqYD5H5Kq7MOHv587qKHML5YLM6j7L5
S Yy2JSU19my2P8RSy2HS10qy2PVyEP12RS,y68SyShP0E/yFS+0P6yE8SD8EB10xS4h+D’jSh+DRSyFF1BS89mF1J88RSE1SU1228UESR8U/08FJS
E1SE,8P0S28EB10xSB,82SyByJSC019SE,8S1CCPU8jSh+DRS82U0JmESU1228UEP12RSyESE,8SR82HP2qSy2HS08U8P6P2qS82HRSy2HSx88mS
1/ESE0yCCPUSE,yESPRS21ESm01m80FJS82U0JmE8HjS!
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-31 Wireless Local Area Networks

4.4 HIPERLAN Standards


 M,808Sy08SEB1S9yP2SREy2Hy0HSCy9PFP8RSB,PU,Sy08S/R8HSC10S-P08F8RRSOzDS_S

4P’S 3………SV;"j‘‘S4V;"j‘‘5–SV;"j‘‘y–SV;"j‘‘qjjj’SS
4PP’S …M:3SX3+…KOzDS4X3+…KOzDSMJm8S‘–SMJm8S"–SXPm80zUU8RR–SXPm80OP2x’S
 X3+…KOzDSPRSyS…/01m8y2S4…M:3’SREy2Hy0HPVyEP12SP2PEPyEP68SC10SySXPq,S+80C109y2U8S-P08F8RRSO1UyFSz08ySD8EB10xjSS
 …M:3SH8CP28HSC1/0SEJm8RS1CSX3+…KOzDR_SX3+…KOzD“‘–SX3+…KOzD“"–SX3+…Kz''…::Sy2HSX3+…KO3DcjSSS

4.4.1 HIPERLAN T-1

(MU – May 12)

Q. Write a short note on HIPERLAN. (May 12, 5 Marks)

e

g
X3+…KOzDZ‘S1m80yE8RSP2SE,8SH8HPUyE8HS5y2HBPHE,SUR4U5Mj5URG5URV5HP6PH8HSP2E1S\SCP=8HSU,y228FRjS

io led
3ESR/mm10ERSHyEyS0yE8S/mSE1SkGRU5IQ8TSBPE,SU1680yq8S1CS\;9jS
 X3+…KOzDZ‘SE809P2yFRSUy2S9168SyESE,8S9y=P9/9SRm88HS1CS4R,EZTjS
 3ESR/mm10ERS51E,SqY07HTM7O9MO7L5QHTLPSy2HSHPMFj95YLM6j7LTjS
ic ow

 3ESR/mm10ERSmyUx8ES10P82E8HSRE0/UE/08Sy2HS/R8RSyS6y0Py2ES1CSX-IWZXW587jMj9jvjS
n
 :/mm10ERSyRJ2U,0121/RSyRSB8FFSyRSPR1U,0121/RSE0yCCPUjS
bl kn

 M,8Sm01E1U1FSP2UF/H8RS1mEP12yFSm08ZR8RRP12S82U0JmEP12Sy2HSm1B80SRy6P2qS98U,y2PR9jS

at

”PqjS XjXj‘S m08R82ERS E,8S X3+…KOzDZ‘S 08C8082U8S FyJ80S 91H8FS 4+01E1U1FS REyUx’jS ”PqjS XjXj"S R,1BRS E,8S X3+…KOzDS
Pu ch

U199/2PUyEP12S91H8FjS
Te

Y8HP/9SzUU8RRS'12E01FS
4Yz'’SR/5FyJ80S

',y228FSzUU8RRS'12E01FS4'z'’SR/5FyJ80S

+,JRPUyFS4+X`’SOyJ80S

Fig. 4.4.1 : HIPERLAN -1 protocol stack

 M,8SYz'SFyJ80S08U8P68RSYz'SR806PU8SHyEyS/2PERS4Y:WQ’SC109SE,8S,Pq,80SFyJ80RSE,01/q,SYz'SR806PU8SyUU8RRSm1P2EjS
 3ESm01U8RR8RSY:WQSy2HSq8280yE8RSXY+WQS4X3+…KOzDSYz'S+01E1U1FSWyEySQ2PE’S
 M,PRSXY+WQSE,82S82E80RSX3+…KOzDS'z'SFyJ80SE,01/q,SySX3+…KOzDa'z'SR806PU8SyUU8RRSm1P2ES4X':z+’jS
 M,8S',y228FSzUU8RRS'12E01FS4'z'’SR/5SFyJ80SH8E809P28RSB,PU,S21H8RSy08SyFF1B8HSE1SE0y2R9PESy2HSRm8UPCP8RSE,8SyUU8RRS
m0P10PEP8RjSS
 M,PRSFyJ80S1CC80RSyS-+""'-*!+"&,'//&/'$0!-'SE1SE,8SYz'SR/5SFyJ80jS
 'z'Sm01E1U1FSm01U8RR8RSE,8SXY+WQSy2HSm01H/U8SX'+WQS4X3+…KOzDZ'z'S+01E1U1FSWyEySQ2PE’SB,PU,SCP2yFFJSU12REPE/E8SyS
myJF1yHS1CSySm,JRPUyFSHyEyS5/0REjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-32 Wireless Local Area Networks

Fig. 4.4.2 : HIPERLAN Communication model

e
4.4.1(a) HIPERLAN-1 MAC Sublayer

g (MU – May 18)


io led
Q. Explain HIPERLAN 1 MAC Layer. (May 18, 10 Marks)
ic ow

Yz'SR/5FyJ80SC/2UEP12RSy08SFPRE8HS58F1BjS
1. MAC address mapping
n

bl kn

M,8SREy2Hy0HSH8CP28RSP2E802yFSyHH08RRSRE0/UE/08jSS
 M,8SyHH08RRS1CSySX3+…KOzDSE809P2yFSU12EyP2RSEB1Smy0ERjSM,8SCP0RESmy0ESH8CP28RSE,8S28EB10xS2y98Sy2HSE,8SR8U12HSmy0ES
at
Pu ch

H8E809P28RSE,8SREyEP12jS
2. Security
Te

 M1S82R/08SU199/2PUyEP12SR8U/0PEJ–SE,8S…2U0JmEP12“W8U0JmEP12SyFq10PE,9RSy08S/R8HjSS
 M,8SyFq10PE,9S08µ/P08RSy2SPH82EPCPUyEP12Sx8JSy2HSySU19912SP2PEPyFPVyEP12S68UE10SC10SHyEyS82U0JmEP12Sy2HSH8U0JmEP12jS
 M,8SmR8/H10y2H19Sq8280yE10SyUU8mERSE,8SPH82EPCPUyEP12Sx8JSy2HSE,8SP2PEPyFS68UE10Sy2HSq8280yE8RSySR8µ/82U8jSS
 M,8S91H/F1Z"SyHHPEP12SPRSm80C1098HS12SE,8SR8µ/82U8S1CS/R80SHyEySy2HSE,8SR8µ/82U8Sq8280yE8HS5JSE,8SmR8/H10y2H19S
q8280yE10jS
 32PEPyFPVyEP12S68UE10RSy2HSPH82EPCPUyEP12Sx8JRSUy2S58SC08µ/82EFJSU,y2q8HSP2S10H80SE1SyU,P868S,Pq,SR8U/0PEJjS
3. Addressing of MAC service access point (MSAP)

S Y:z+Sy08SyHH08RR8HS/RP2qSXVS5PESOzDZYz'SyHH08RRSB,PU,Sy08SU19myEP5F8SE1S3………SV;"j=SOzDRjS
4. Data forwarding
 M,8S ymm8yFP2qS C8yE/08S 1CS X3+…KOzD“‘S PRS y5PFPEJS E1S C10By0HS HyEyS myUx8ERS /RP2qS R8680yFS 08FyJRjS K8FyJRS Uy2S 8=E82HS E,8S
U199/2PUyEP12S12SE,8SYz'SFyJ80S58J12HSE,8S0yHP1S0y2q8jSS
 M,8SC10By0HP2qSUy2S58S1CSEB1SEJm8RZm1P2EZm1P2ES4/2PUyRE’S10Sm1P2EZ9/FEPm1P2ES49/FEPUyRE“501yHUyRE’jSS
 …yU,S08FyJSREyEP12S9yP2EyP2RSyS01/EP2qSEy5F8Sy2HSySFPRES1CS9/FEPm1P2ES08FyJRjSS
5. Power saving

S :BPEU,S1CCSE809P2yFRSB,828680SE,8JSy08S21ESP2S/R8S10Sx88mSP2SRF88mS91H8SB,82SE,8JSH12YES,y68SHyEySE1SR82HjSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-33 Wireless Local Area Networks

4.4.1(b) HIPERLAN-1 CAC Layer


”/2UEP12RS1CS',y228FSzUU8RRS'12E01FS4'z'’SR/5SFyJ80Sy08SFPRE8HS58F1BS_S
 zRR/08RSE,yESE809P2yFSH18RS21ESyUU8RRSPFF8qyFSU,y228FRjS
 W8CP28RS,1BSySqP682SU,y228FSUy2S58SyUU8RR8HjS
 W8CP28RSE,8Sm0P10PEJSRU,898jS3ES/R8RS…`ZD+YzS4NFP9P2yEP12SSP8FHSJ12Zm0889mEP68SQ0P10PEJSI/FEPmF8SWUU8RR’jS…`ZD+YzS
R/mm10ERS 51E,S yRJ2U,0121/RS y2HS PR1U,0121/RS 461PU8Z10P82E8H’S E0y2R9PRRP12jS …`ZD+YzS 82y5F8RS 28EB10xS E1S C/2UEP12S
BPE,SC8BSU1FFPRP12RjS
 +016PH8RSCP68Sm0P10PEJSF868FRSC10Sd1:SR/mm10ERjSM,8S9ymmP2qS1CSySd1:S12SySm0P10PEJSF868FSPRSH128SBPE,SE,8S,8FmS1CSmyUx8ES
FPC8SEP98jS
 +016PH8RS,P80y0U,PUyFSP2H8m82H82U8SBPE,S…`ZD+YzjSS

EY-NPMA

e
M,8S 91RES P9m10Ey2ES my0ES 1CS 'z'S R/5S FyJ80S PRS E,8S …FP9P2yEP12S `P8FHS +0889mEP68S +0P10PEJS Y/FEPmF8S zUU8RRS 4…`ZS D+Yz’S

g
m01E1U1FjSS

io led
3ESPRSyS6y0Py2ES1CS':YzSm01E1U1FSBPE,Sm0P10PEPVyEP12jS
 3ESHP6PH8RSE,8S98HP/9SyUU8RRS1CSHPCC8082ESU19m8EP2qS21H8RSP2E1SE,088Sm,yR8RjS
‘jS +0P10PEPVyEP12S "jS '12E82EP12S [jS M0y2R9PRRP12S
ic ow

S
n
bl kn
at
Pu ch
Te

Fig. 4.4.3 : EY-NPMA protocol (Channel access cycle)

1. Prioritization
 MP98SPRSHP6PH8HSP2E1SU,y228FSyUU8RRSUJUF8RjS…yU,SUJUF8SREy0ERSBPE,SE,8SU,y228FSyUU8RRSRJ2U,012PVyEP12jS
 M,8SRJ2U,012PVyEP12SPRSC1FF1B8HS5JSE,8Sm0P10PEPVyEP12Sm,yR8jSM,PRSm,yR8SU12EyP2RSCP68S‘]VZ5PESRF1ERSREy0EP2qSC019SE,8S
RF1ES1CS,Pq,8RESm0P10PEJS4mo‘’jS
 3CSE,8SE809P2yFS,yRSE,8Sm0P10PEJ–S!SPESR82R8RSE,8SU,y228FSC10SE,8SCP0RES4!Z‘’SRF1ERjS
 3CSE,8SU,y228FS089yP2RSPHF8–SE,8S21H8SR82HRSy2SyUU8RRSmyEE802jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-34 Wireless Local Area Networks

 3CSE,8S21H8SCP2HRSE,yESE,8SU,y228FSPRS5/RJ–SPESByPERSC10SE,8S58qP22P2qS1CSE,8S28=ESyUU8RRSUJUF8jS
 Y108SE,y2S128SREyEP12SUy2S,y68SE,8SRy98Sm0P10PEJjS
 :1–S28=ESU12E82EP12Sm,yR8SPRSUy00P8HS1/ESE1S08R1F68SU12E82EP12Sm015F89jS

2. Contention
 M,PRSm,yR8SPRSC/0E,80SHP6PH8HSP2E1SEB1Sm,yR8RS_S…FP9P2yEP12Sm,yR8Sy2HS`P8FHSm,yR8jS
 M,8SLvqEqYHMqjY58FHTLSPRSHP6PH8HSP2E1S;Z‘"SRF1ERjS…yU,SE809P2yFSB,PU,S,yRS21ES5882S8FP9P2yE8HSP2SE,8Sm0P10PEPVyEP12S
m,yR8SR82HRSE,8S8FP9P2yEP12S5/0REjSM,8SF82qE,S1CSE,PRS5/0RESPRS0y2H19S58EB882S;SE1S‘"jS
 zCE80S R82HP2qS y2S 8FP9P2yEP12S 5/0RE–S 8yU,S REyEP12S R82R8RS E,8S U,y228FS H/0P2qS 8FP9P2yEP12S R/06P6yFS 680PCPUyEP12S
P2E806yFjSSS
 zSREyEP12SqP68RS/mSPCSE,8SU,y228FSPRS1UU/mP8HS5JSR198S1E,80SREyEP12SH/0P2qSE,PRSP2E806yFjS
 M,85NqLvP58FHTLSU12EyP2RSE82S‘]VZ5PESRF1ERjS…yU,SREyEP12SR82R8RSU,y228FSH/0P2q"#SRF1ERS4;Zf’jSS

e
M,8Sm015y5PFPEJSE,yESE,8SqP682SREyEP12SR82R8RSE,8SU,y228FSC10S#SU12R8U/EP68SRF1ERSPRS‘“‘;jS
3. Transmission

g
io led
3CSE,8SREyEP12SH18RS21ESH8E8UESy2JSyUEP6PEJSP2SE,8SU,y228FSH/0P2qSFPRE82P2q–SPESP998HPyE8FJSREy0ERSE0y2R9PEEP2qSy2HS
82E80RSE0y2R9PRRP12Sm,yR8jS
 3CSE,8SREyEP12S,yRSH8E8UE8HSE,yESE,8SU,y228FSPRS5/RJ–SPES,yRSF1RESPERSUJUF8Sy2HSByPERSEPFFSE,8S58qP22P2qS1CSE,8S28=ES
ic ow

yUU8RRSUJUF8jS

4.4.1(c) HIPERLAN-1 Physical Layer


n
bl kn

MU – May 16)

Q. Explain in detail HIPERLAN-1 physical layer. (May 16, 10 Marks)


at
Pu ch

”/2UEP12RS1CSE,8Sm,JRPUyFSFyJ80S1CSX3+…KOzDSy08SFPRE8HS58F1BS_S
Te

 Y1H/FyEP12–SH891H/FyEP12S4/R8RS”:c–7Y:c’S
 —PESy2HSC0y98SRJ2U,012PVyEP12S
 ”10By0HS80010SU1008UEP12S98U,y2PR9RS4/R8RS—'XSU1H8R’S
 Y8yR/08982ERS1CSRPq2yFSRE082qE,S
 ',y228FSR82RP2qS
 X3+…KOzDZ‘Sm016PH8RS[S9y2HyE10JSy2HS"S1mEP12yFSU,y228FRSyUU10HP2qSE1SE,8P0SUy00P80SC08µ/82UP8RjS
zq/5 IHYPHMj7N59FHYYLvT5
o ',y228FS;_S\j‘^]X]V;S7XVS
o ',y228FS‘_S\j‘ffff^XS7XVS
o ',y228FS"_S\j""[\"]VS7XVS
zqq/5 ^8MqjYHv59FHYYLvT5
o ',y228FS[_S\j"X^;\]"S7XVS
o ',y228FSX_S\j"^;\V\]S7XVS
 X3+…KOzDZ‘S/R8RS212SHPCC8082EPyFS7y/RRPy2S9P2P9/9S:,PCESc8JP2qS4212SHPCC8082EPyFS7Y:c’jS
 3ES /R8RS yHymEP68S 8µ/yFPV80S UyFF8HS H8UPRP12S C88H5yUxS 8µ/yFPV80S 4W”…’S E1S 089168S P2E80S RJ951FS P2E80C8082U8S 43:3’S Uy/R8HS
H/8SE1S9/FEPmyE,Sm01myqyEP12jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-35 Wireless Local Area Networks

 X3+…KOzDZ‘SyFR1S89mF1JRS—'XS80010SU1008UEP2qSU1H8RSE1S9P2P9PV8SE,8S80010RSyESm,JRPUyFSFyJ80jS
 M,PRSU1H8SPRSy5F8SE1SU1008UESySRP2qF8S80010Sy2HSH8E8UESEB1S0y2H19S80010R–SyFFS80010RS5/0RERS21ESF12q80SE,y2S\SaS5PERjS
 ”PqjSXjXjXSm08R82ERSX3+…KOzDZ‘SHyEySmyUx8ESC109yES/R8HSyESm,JRPUyFSFyJ80jS

e
Fig. 4.4.4 : HIPERLAN-1 physical layer packet format for data and acknowledgement

g
4.4.2 HIPERLAN -2
io led
MU – Dec. 18)

Q. Explain HIPERLAN-2 Data link control. (Dec. 18, 10 Marks)


ic ow

X3+…KOzD"SyFF1BRSP2E80U1228UEP12SP2SyF91RESy2JSEJm8S1CSCP=8HS28EB10xjS
n
Features of HIPERLAN- 2
bl kn

 <m80yE8RSyESU5URVSC08µ/82UJS5y2HS

at

+016PH8RS'1228UEP12Z10P82E8HSR806PU8S
Pu ch

 XPq,SRm88HSE0y2R9PRRP12S/mSE1SU,5IQqMZTS4Ry98SyRS3………SV;"j‘‘y’S

Te

d/yFPEJZ1CZ:806PU8S4d1:’SR/mm10ES
 z/E19yEPUSC08µ/82UJSyFF1UyEP12S
 :8U/0PEJSR/mm10ES
 Y15PFPEJSR/mm10ES
 D8EB10xSy2HSymmFPUyEP12SP2H8m82H82ES
 +1B80SRy6P2qS
Reference model and configuration of HIPERLAN-2
 X3+…KOzDZ"SPRSH8RPq28HSE1SB10xSP2SEB1SU12CPq/0yEP12R_S5/RP28RRS826P012982ESy2HS,198S826P012982EjS
 —/RP28RRS826P012982ESPRSy2SyUU8RRS28EB10xSB,PU,SU12RPRERS1CSR8680yFSz+RSU1228UE8HS5JSySU108S28EB10xjS…yU,Sz+SR8068RS
yS2/9580S1CS915PF8SE809P2yFRjSX3+…KOzDZ"SyFR1SyFF1BRS01y9P2qS58EB882SE,8Sz+RjSS
 32S,198S826P012982E–Sy2SyHZ,1US28EB10xSPRSU08yE8HjS
 ”PqjSXjXj\Sm08R82ERSE,8SREy2Hy0HSy0U,PE8UE/08S1CSX3+…KOzDZ"S28EB10xjSSS
 MB1SyUU8RRSm1P2ERSy08SU1228UE8HSE1SyS9j7L5YLM6j7LjSS
 M,8S'108S28EB10xS9Pq,ES58Sy2SzMYS28EB10x–S…E,8028ESOzDR–SQYM:S[7SU8FF/Fy0S28EB10xS8EUjS
 …yU,S yUU8RRS m1P2ES U12EyP2RS EB1S my0ER_S y2S W99LTT5 QjqYM5 XjYM7jvvL75 zWQX/S y2HS 128S 10S 9108S W99LTT5 QjqYM5 Y7HYT9LqKL75
zWQY/RS
 ”1/0SEjQqvL5ML7EqYHvT5zIY/Sy08SyFR1SR,1B2SP2S”PqjSXjXj\jSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-36 Wireless Local Area Networks

 M,8R8S YMRS Uy2S 9168S C019S 128S U8FFS y08yS E1S y21E,80jS M,8S yUU8RRS m1P2ES y/E19yEPUyFFJS R8F8UERS yS C08µ/82UJS 5JS /RP2qS
4HJ2y9PUSC08µ/82UJSR8F8UEP12’SW”:jS

Fig. 4.4.5 : HIPERLAN/2 Basic structure and Handoff scenario

e
M,808Sy08SE,088SEJm8RS1CS,y2H1680SB,PU,S9Pq,ES1UU/0S_S

g
1. Sector Handover (Inter sector)
io led
 3CSE,8SR8UE10PV8HSy2E822yRSy08S/R8HSC10SyUU8RRSm1P2ESE,82Sz+SR/mm10ERSE,PRS,y2H1680jSYMS9168RSC019S128SR8UE10S
E1Sy21E,80SR8UE10SE,yESPRSU12E01FF8HS5JSE,8SRy98Sz+MjSS

ic ow

:8UE10S,y2H1680SPRS,y2HF8HSP2RPH8SE,8SWO'SFyJ80SE,808C108S21ES6PRP5F8S1/ERPH8SE,8Sz+jS5
2. Radio Handover (Inter-APT/Intra-AP)
n

bl kn

KyHP1S,y2H1680SPRSyFR1S,y2HF8HSBPE,P2SE,8Sz+jS
 zRSR,1B2SP2S”PqjSXjXj\–SYM#&9168RSC019S128Sz+MSE1Sy21E,80Sz+MS1CSE,8SRy98Sz+jS
at
Pu ch

3. Network Handover (Inter-AP/ Intra network)


 M,PRS,y2H1680S1UU/0SB,82SYMS9168RSC019S128Sz+SE1Sy21E,80Sz+S4P2S”PqjSXjXj]SYM"’jS
Te

 32SE,PRSUyR8–SE,8SU108S28EB10xSy2HS,Pq,80SFyJ80RSy08SyFR1SP261F68HjS
HIPERLAN-2 networks operate in two modes

‘jS '82E0yFPV8HSY1H8S4'Y’SS
"jS WP08UESY1H8S4WY’SS

1. Centralized Mode (CM)


 M,PRSPRSy2SP2C0yRE0/UE/08S5yR8HSy2HS9y2HyE10JS91H8jSS
 zFFSz+RSy08SU1228UE8HSE1SySU108S28EB10xSy2HSYMRSy08SyRR1UPyE8HSBPE,Sz+RjS
 3CSEB1SYMRSR,y08SE,8SRy98SU8FFSE,82SyFFSHyEySPRSE0y2RC8008HS5JSz+jS
 z+SEyx8RSU19mF8E8SU12E01FS1CS8680JE,P2qjS
2. Direct Mode (DM)
 M,PRSPRSy2SyHZ,1USy2HS1mEP12yFS91H8jS
 32S E,PRS 91H8–S HyEyS PRS HP08UEFJS 8=U,y2q8HS 58EB882S YMRS PCS E,8JS Uy2S 08U8P68S 8yU,S 1E,80jS —/ES E,8S 28EB10xS PRS REPFFS
U12E01FF8HS 5JS z+S E,yES U12EyP2RS yS U82E0yFS U12E01FF80S 4''’jS S M,8S U82E0yFS U12E01FF80S Uy2S 58S U1228UE8HS E1S yS U108S
28EB10xSy2HSUy2S1m80yE8SP2S51E,SU82E0yFPV8HSy2HSHP08UES91H8RjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-37 Wireless Local Area Networks

HIPERLAN-2 Protocol Stack


S

MAC – Medium Access Control

DLC- Data Link Control

RRC-Radio Resource Control

ACF- Association Control Function

DCC-DLC connection control

RLC- Radio Link Control

EC – Error Control

CL – Convergence LayerS

e
Fig. 4.4.6 : HIPERLAN-2 reference Model

g
4.4.2(a) HIPERLAN-2 Physical Layer
io led
 Yy2JSC/2UEP12RSy2HSC8yE/08RS1CS+X`SFyJ80S1CSX3+…KOzDZ"Sy08SPH82EPUyFSE1S3………SV;"j‘‘yjS3ES/R8RSE,8SRy98S91H/FyEP12S
RU,898Sy2HSm016PH8RSE,8SRy98SHyEyS0yE8SyRS3………SV;"j‘‘yjS
ic ow

 +,JRPUyFSFyJ80S1CSX3+…KOzDZ"Sm80C109RSE,8SC1FF1BP2qSC/2UEP12RjS
n
o Y1H/FyEP124<”WY’S
bl kn

o ”10By0HS…0010S'1008UEP12S
at

o
Pu ch

:Pq2yFSW8E8UEP12S
o :J2U,012PVyEP12S8EUjS
Key features
Te

 X3+…KOzDZ"S1m80yE8RSyESUURVSC08µ/82UJS
 Yy=P9/9SHyEyS0yE8S1CS/mSE1SU,IQqMZTS
 3ES/R8RSHPCC8082ES91H/FyEP12SRU,898RSR/U,SyRS—+:c–Sd+:c–S‘]ZdzY–S]XSadzYSE1SyU,P868SHPCC8082ESHyEyS0yE8RjS
 3ES89mF1JRS^CTIjS
 <”WYSRJ951FSH/0yEP12SZSXSpRS
 D/9580S1CSR/5SUy00P80RSZS\"S
 D/9580S1CSmPF1ESRJ951FRSZSSXS
 :/5Uy00P80SRmyUP2qSZS[‘"j\cXVS
 ',y228FSRmyUP2qSZS";YXVS
 Yy=P9/9SE0y2R9PESm1B80SPRS";;9-S…3K+SC10SE,8SF1B80SC08µ/82UJS5y2HjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-38 Wireless Local Area Networks

”PqjSXjXj^SPFF/RE0yE8RSE,8S08C8082U8SU12CPq/0yEP12S1CSE,8SE0y2R9PRRP12SU,yP2S1CSySX3+…KOzDZ"SH86PU8jSS

1. Information bits 2. Scrambled bits

3. Encoded bits 4. Interleaved bits

5. Sub-carrier symbols 6. Complex baseband OFDM symbols 7. PHY bursts

Fig. 4.4.7 : HIPERLAN-2 Physical Layer reference configuration

g e
M,8SX3+…KOzDZ"Sm,JRPUyFSFyJ80S08U8P68RSE,8S+:WQSC019SWO'SOyJ80jSS
io led
-ML8545I55 -97HEQvqYD5
S S M,8S CP0RES RE8mS E,82S PRS RU0y95FP2qS 1CS yFFS HyEyS 5PERS BPE,S E,8S q8280yE10S m1FJ219PyFS =+b=$b‘jS M,PRS PRS H128S C10S W'S
5F1UxP2qSy2HSB,PE82P2qS1CSE,8SRm8UE0/9jSM,8S1/EU198S1CSE,PRSRE8mSPRSE,8SRU0y95F8HS5PERjS
ic ow

-ML85k5I55 CNX5XjPqYD5
n
S S M,8S28=ESRE8mSPRSE1SymmFJS”…'SU1HP2qS12SE,8R8SRU0y95F8HS5PERjSM,PRSPRSH128SC10S80010SH8E8UEP12Sy2HSU1008UEP12jS
bl kn

M,8S08R/FES1CSE,PRSRE8mSPRS82U1H8HS5PERjS
-ML85G5I5 KYML7vLHKqYD5
at
Pu ch

S S D8=E–S82U1H8HS5PERSy08SP2E80F8y68HSE1S9PEPqyE8SE,8SC08µ/82UJSR8F8UEP68SCyHP2qjSM,8S08R/FESPRSP2E80F8y68HS5PERjS
-ML85,5I5 IH88qYD5
Te

S S M,8S9ymmP2qSm01U8RRSCP0RESHP6PH8RSE,8S5PESR8µ/82U8SP2Sq01/mS1CS‘–S"–SXS10S]S5PERSH8m82HP2qS12SE,8S91H/FyEP12S
RU,898RS /R8HS R/U,S yRS —+:c–S d+:c–S ‘]ZdzY–]XZdzYS 08Rm8UEP68FJjS M,8R8S q01/mRS y08S 9ymm8HS 12S E1S E,8S
ymm01m0PyE8S91H/FyEP12SRJ951FjSM,8S08R/FES1CSE,PRSRE8mSPRSR/5SUy00P80S91H/FyEP12SRJ951FRjS
-ML85U5I55 ^CTI5IjPOvHMqjY5 5
S S M,8S<”WYS91H/FyEP12SU12680ERSE,8R8SRJ951FRSP2E1SyS5yR85y2HSRPq2yFjSM,8SRJ951FSP2E806yFSPRSXpRjS
-ML85[5I55 QRS5QO7TM5
S S 32SE,PRSRE8mSE,8Sm,JRPUyFS5/0RESPRSU08yE8HjSM,PRS5/0RESU12EyP2RSm08y95F8Sy2HSmyJF1yHjS
-ML85\5I55 VHPqj5M7HYTEqTTqjY5
S S ”P2yFFJS0yHP1SE0y2R9PRRP12SR,PCERSE,8S5yR85y2HSRPq2yFSP2E1SySUy00P80SC08µ/82UJjS

4.4.2(b) HIPERLAN-2 Data Link Control Layer


 M,8SWyEySOP2xSU12E01FS4WO'’SFyJ80SPRSRPE/yE8HS12SE1mS1CSE,8Sm,JRPUyFSFyJ80jS
 WO'SOyJ80SU12EyP2RSE,8SC1FF1BP2qSR/5SC/2UEP12RS_S
‘jS Yz'SC/2UEP12S
"jS …0010S'12E01FS4…'’S
[jS KO'SR/5SFyJ80SE,yESP2SE/02SPRSR/5SHP6PH8HSP2E1SKO'–SKK'–Sz'”Sy2HSW''jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-39 Wireless Local Area Networks

 WO'SFyJ80Sm016PH8RSC10SySF1qPUyFSFP2xS58EB882SYMSy2HSz+S1680SE,8S<”WYSm,JRPUyFSFyJ80jS
 WyEySFP2xSU12E01FSPRSHP6PH8HSP2E1SE,088Smy0ER_SYz'–SE,8S'12E01FS+Fy28Sy2HSE,8SQR80SmFy28jS
 M,8S/R80SmFy28SU12EyP2RS…0010S'12E01FS98U,y2PR9S4…'’jS
 z2HSE,8SU12E01FSmFy28SU12EyP2RSKO'SR/5SFyJ80SE,yESm016PH8RS91RES1CSE,8SU12E01FSC/2UEP12RSqP682S58F1BjSS
4P’S z'”S 4zRR1UPyEP12S '12E01FS ”/2UEP12’S U12E01FRS yRR1UPyEP12S y2HS y/E,82EPUyEP12S 1CS 28BS YMRS yRS B8FFS yRS m80C109RS
RJ2U,012PVyEP12SEyRxjS
4PP’S W''S4WO'SQR80S'1228UEP12S'12E01F’SU12E01FRSU1228UEP12SR8E/m–S91HPCPUyEP12Sy2HS08F8yR8jS
4PPP’S KK'S4VHPqj57LTjO79L59jYM7jv/5C/2UEP12Sm80C109RSE,8SC1FF1BP2qSEyRxRS
o WJ2y9PUSC08µ/82UJSR8F8UEP12S
o Y8yR/08982ERSm80C1098HS5JSYMS
o K8m10EP2qS98yR/08982ERSE1SE,8Sz+S
o ”08µ/82UJSU,y2q8S5JSE,8Sz+Sy2HSPERSyRR1UPyE8HSYMRS

e
o +1B80SRy6P2qSm01U8H/08S

g
o M0y2R9PESm1B80SU12E01FS
io led
o Xy2H1680S58EB882Sz+RSy2HSBPE,P2Sz+S
 ”PqjSXjXjVSR,1BRSX3+…KOzDZ"SYz'S”0y98SC109yEjSS
ic ow
n
bl kn
at
Pu ch
Te

Fig. 4.4.8 : MAC frame structure of HIPERLAN-2

 X3+…KOzDZ"S98HP/9SyUU8RRSU12E01FSPRS5yR8HS12SE,8SMWYz“MWWjS
 …yU,SYz'SC0y98SPRS1CS"9RSH/0yEP12Sy2HSPESPRSC/0E,80SHP6PH8HSP2E1SC1/0Sm,yR8RjSS

o d7jHP9HTM5QFHTL5IS'y00P8RSE,8S—01yHUyRES'12E01FS',y228FS4—''X’Sy2HS”0y98S'12E01FS',y228FS4”''X’jSS

o Tj6YvqYL58FHTL5IS'y00P8RSP2C109yEP12SC019SyUU8RRSm1P2ES4z+’S10S'82E0yFS'12E01FF80S4''’SE1SE,8SRm8UPCP8HS915PF8S
E809P2yFjS

o a8vqYL58FHTL5IS'y00P8RSP2C109yEP12SC019S915PF8SE809P2yFSE1Sz+S10S''jS

o VHYPjE5H99LTT58FHTL5ISQR8HSE1SE0y2R9PES0y2H19SyUU8RRSU,y228FS4K'X’SjS
 X3+…KOzDZ"SH8CP28RSRP=SHPCC8082ESE0y2Rm10ESU,y228FRS

o dXR5zd7jHP9HTM59FHYYLv/5ISM,PRSU,y228FSU1268JRS5yRPUSP2C109yEP12SC10SE,8S0yHP1SU8FFSE1SyFFSYMRjS

o CXR5 zC7HEL5 9FHYYLv/5 IS '12EyP2RS E,8S 8=yUES H8RU0PmEP12S 1CS E,8S yFF1UyEP12S 1CS 08R1/0U8RS BPE,P2S E,8S U/0082ES Yz'S
C0y98jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-40 Wireless Local Area Networks

o WXR5zW99LTT50LLPQH9L59FHYYLv/5IS7P68RSC88H5yUxSE1SYMRS08qy0HP2qS0y2H19SyUU8RRSH/0P2qSE,8SK'XS1CSE,8Sm086P1/RS
C0y98jS

o BXRSzBjYD5TO88j7M59FHYYLv/5ISM0y2Rm10ERS/R80Sy2HSU12E01FSHyEySC10SH1B2FP2xRSy2HS/mFP2xRjS

o :'XS4:,10ESE0y2Rm10ESU,y228F’S_SSM0y2Rm10ERSU12E01FSHyEySC10SH1B2FP2xRSy2HS/mFP2xRj5

o VXR5zVHYPjE59FHYYLv/5ISQRP2qSE,PRSU,y228F–SYMRSUy2SR82HSP2C109yEP12SE1Sz+“''S6PySRF1EE8HSzF1,yj5
 X3+…KOzDZ"SyFR1SH8CP28RSR198SF1qPUyFSU,y228FRSC10SRPq2yFP2q–SU12E01FSy2HSP2C109yEP12SE0y2RC80jSM,8R8SF1qPUyFSU,y228FRS
y08S9ymm8HS12S:'X–SO'X–Sy2HSK'XSE0y2Rm10ESU,y228FRjSS

o -dXR5 I5 QR8HS 12FJS P2S H1B2FP2xS E1S 501yHUyRES U12E01FS P2C109yEP12S 08FyE8HS E1S E,8S U8FFjS 3ES ,8FmRS P2S ,y2H1680–S
yRR1UPyEP12–SR8U/0PEJSy2HS0yHP1SFP2xSU12E01FSC/2UEP12RjS

o TXXR5I5'1268JRSKO'SR/5SFyJ80SRPq2yFRS58EB882Sy2Sz+Sy2HSE,8SYMjS

e
o aTXR5I5'y00P8RSWO'S+WQSC10SU12680q82U8SFyJ80SHyEyjS

g
o BXXR5I53ESPRS/R8HSC10S80010SU12E01FSC/2UEP12RSC10SySRm8UPCPUSQW'XjS
io led
o W-XR5I53ESPRS/R8HSC10SyRR1UPyEP12Sy2HS08ZyRR1UPyEP12S08µ/8RE598RRyq8Rj555

4.5 Bluetooth
ic ow

4.5.1 Introduction
n

bl kn

—F/8E11E,SPRSySBP08F8RRSOzDSE8U,21F1qJSBPE,S680JSFP9PE8HSU1680yq8S4y51/ES‘;9’Sy2HSPESH18RS21ES288HSy2JSP2C0yRE0/UE/08S
4—F/8E11E,SPRSy2S8=y9mF8S1CSyHS,1US28EB10xR’jS
at
Pu ch

 —F/8E11E,SE8U,21F1qJSByRSCP0RESH868F1m8HS5JS…0PURR12jSS3ESByRSE,82SC109yFPV8HS5JSySq01/mS1CS8F8UE012PURS9y2/CyUE/080RS
R/U,SyRS…0PURR12–S3—Y–S32E8F–SD1xPy–Sy2HSM1R,P5ySB,1SZ1P2EFJSC109SE,8S—F/8E11E,S:m8UPyFS32E808RES701/mS4:37’jS
Te

 —F/8E11E,SE8U,21F1qJSByRSH8RPq28HSm0P9y0PFJSE1SR/mm10ESRP9mF8SBP08F8RRS28EB10xP2qS1CSm80R12yFSU12R/980SH86PU8RSy2HS
m80Pm,80yFR–SP2UF/HP2qSU8FFSm,128R–S+WzR–Sy2HSBP08F8RRS,8yHR8ERS4+80R12yFSz08ySD8EB10xSaS+zD’jS
 '19my08HSE1S-PZ”P–S—F/8E11E,S28EB10xP2qSPRS9/U,SRF1B80–SyS5PES9108SFP9PE8HSP2S0y2q8–Sy2HSR/mm10ERSC8B80SH86PU8RjS

Features of Bluetooth
 —F/8E11E,SH86PU8RSq8280yFFJSU199/2PUyE8SyESF8RRSE,y2S‘SY5mRjS
 <m80yE8RSP2SE,8SkR,5URVS3:YS5y2HSBPE,S^fS10S"[SK”SU,y228FRjS
 7”:cS 47y/RRPy2S ”08µ/82UJS :,PCES c8JP2q’S 91H/FyEP12S PRS /R8HS y2HS MWWS 4MP98S WP6PRP12S W/mF8=’S PRS /R8HS C10S /mFP2xS y2HS
H1B2FP2xSR8my0yEP12jS
 3ESymmFP8RSCR--SBPE,SyS4[PPS,1mR“RS,1mmP2qS0yE8jS
 3ES/R8RS:'<S4:J2U,0121/RS'1228UEP12S<0P82E8H’SFP2xRSC10S61PU8Sy2HSz'OS4zRJ2U,0121/RS'1228UEP12SF8RR’SFP2xRSC10SWyEyjS
 QR8RS”…'S4C10By0HS80010SU1008UEP12’SBPE,S21S08E0y2R9PRRP12jS
 QR8RS]XSx5PE“RSH/mF8=–Sm1P2EZE1Zm1P2E–SUP0U/PESRBPEU,8HSU,y228FRjS
 M1m1F1qJS_S<680FymmP2qSmPU128ERS4REy0R’SC109P2qSySRUyEE8028EjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-41 Wireless Local Area Networks

4.5.2 User Scenario


Yy2JSHPCC8082ESU12CPq/0yEP12RSBPE,S—F/8E11E,S5yR8HSmPU128ESy08Sm1RRP5F8jS
4R5 XjYYL9MqjY5j058L7q8FL7Hv5PLKq9LT5I5M1HyJS91RES1CSE,8SH86PU8RS/R8SBP08RSE1SU1228UESE1SE,8Sm80Pm,80yFSH86PU8RSR/U,SyRS
x8J51y0H–S 91/R8–S ,8yHR8E–S Rm8yx80RS 8EUjS …yU,S EJm8S 1CS H86PU8S ,yRS PERS 1B2S EJm8S 1CS Uy5F8–S U1228UE10R–S mF/qRS 8EUjS 32S yS
BP08F8RRS 28EB10xRS 21S BP08RS y08S 288H8HS E1S U1228UES R/U,S H86PU8RjS —F/8E11E,S mPU128ES Uy2S 58S /R8HS E1S U1228UES R/U,S
m80Pm,80yFRSBPE,1/ESBP08RSE1SE,8SBP08F8RRSE809P2yFRSR/U,SyRSFymE1mS10S+WzjS

kR5 -O88j7M5 0j75 HP5 Fj95 YLM6j7LqYD5 I5 zHZ,1US 28EB10xRS y08S /R8C/FS C10S E0yH8R,1BRS y2HS 8=,P5PEP12RS B,808S R8680yFS m81mF8S
U198SE1q8E,80Sy2HS8=U,y2q8SHyEyjS-P08F8RRS28EB10xRSUy2SR/mm10ESE,PRSEJm8S1CSP2E80yUEP12jS:9yFFSH86PU8RS9yJS21ES,y68S
-OzDSyHymE80RS1CS3………V;"j‘‘SREy2Hy0H–S5/ESU,8ym80S—F/8E11E,SU,PmRS5/PFESP2jS
GR5 d7qPDqYD5j05JLM6j7LT5I5QRP2qSBP08F8RRSmPU128ER–SyS915PF8Sm,128SUy2S58SU1228UE8HSE1SyS+WzS10SFymE1mSP2SySRP9mF8SByJjS
M,8S 915PF8S m,128S E,yES ,yRS 5F/8E11E,S U,PmS Uy2S 21BS yUES yRS yS 50PHq8S 58EB882S E,8S F1UyFS mPU128ES y2HS E,8S qF15yFS 7:YS

e
28EB10xjS

g
4.5.3 Architecture
io led
(MU – May 14)

Q. With respect to Bluetooth protocol explain piconet and scatternet. (May 14, 10 Marks)
ic ow

Piconet and Scatternet


n
4R5 Qq9jYLM5
bl kn

 Qq9jYLMSPRSySU1FF8UEP12S1CS—F/8E11E,SH86PU8RSB,PU,Sy08SRJ2U,012PV8HSE1SE,8SRy98S,1mmP2qSR8µ/82U8jSS
at


Pu ch

…yU,SmPU128ES,yRS128SH86PU8SUyFF8HSYyRE80S4Y’jSzFFS1E,80SH86PU8RSUyFF8HSRFy68RS4:’Sy08SU1228UE8HSE1SE,8S9yRE80jS

 M,8S9yRE80SH8E809P28RSE,8S,1mmP2qSR8µ/82U8SP2SE,8SmPU128ESy2HSyFFSRFy68RS,y68SE1SRJ2U,012PV8SE1SE,PRSmyEE802jS3CSyS
Te

H86PU8SBy2ERSE1Smy0EPUPmyE8SPES,yRSE1SRJ2U,012PV8SE1SE,PRjS

 M,808Sy08SEB1S9108SEJm8RS1CSH86PU8R_S+y0x8HSH86PU8S4+’Sy2HS:Ey2HZ5JSH86PU8R4:—’jS

o +y0x8HS H86PU8RS Uy2S 21ES yUEP68FJS my0EPUPmyE8S P2S E,8S mPU128ES 5/ES y08S x21B2S y2HS Uy2S 58S 08yUEP6yE8HS BPE,P2S
R198S9PFFPR8U12HRjS

o :Ey2HZ5JS4:—’SH86PU8RSH1S21ESmy0EPUPmyE8SP2SE,8SmPU128EjSS

 zSYyRE80S4Y’SUy2SU1228UESR8682SyUEP68SRFy68RSy2HS/mSE1S"\\Smy0x8HSRFy68RSm80SmPU128EjSS

 zFFS yUEP68S H86PU8RS P2S yS mPU128ES y08S yRRPq28HS yS [Z5PES yUEP68S 989580S yHH08RRS 4zYz’jS z2HS yFFS my0x8HS H86PU8RS y08S
yRRPq28HSVZ5PESmy0x8HS989580SyHH08RRS4+Yz’jS

 M,8S9yRE80S4Y’SqP68RSPERSUF1UxSy2HSXVZ5PESH86PU8S3WSE1SyFFSRFy68RSP2SySmPU128EjSX1mmP2qSR8µ/82U8SPRSH8E809P28HS5JS
H86PU8S3WSy2HS,1mmP2qSmyEE802SPRSH8E809P28HS5JS9yRE80YRSUF1UxjS

 zFFSyUEP68SH86PU8RS/R8SE,8SRy98S,1mmP2qSR8µ/82U8Sy2HS,1mRSE1q8E,80jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-42 Wireless Local Area Networks

(a)

g e
io led
ic ow
n
bl kn

M= Master device
at

S= Slave device
Pu ch

P = Parked device
SB = Standby device
Te

(b)
Fig. 4.5.1 : (a) Piconet (b) Scatternet

kR5 -9HMML7YLM5
 -9HMML7YLMSPRSySq01/mS1CSmPU128ERjSY108SE,y2S128SmPU128ESUy2S58SU1228UE8HSE1SC109SySRUyEE8028ESE,01/q,SE,8SR,y0P2qS
1CSU19912S9yRE80S10SRFy68SH86PU8RjS
 W86PU8RSUy2S58SRFy68SP2S128SmPU128ESy2HS9yRE80SP2Sy21E,80jSS
 '199/2PUyEP12S58EB882SmPU128ERSUy2SEyx8SmFyU8S5JSZ/9mP2qSH86PU8RS5yUxSy2HSC10E,S58EB882SE,8SmPU128ERjSS
 …yU,S mPU128ES P2S yS RUyEE8028ES /R8RS yS HPCC8082ES ,1mmP2qS R8µ/82U8S E,yES PRS yFByJRS H8E809P28HS 5JS E,8S 9yRE80S 1CS E,yES
mPU128EjS

4.5.4 Bluetooth Protocol Stack


MU – May 12, Dec. 12, Dec. 13, May 16, Dec. 16, May 17, Dec. 17, May 18, Dec. 18

Q. Draw and explain Bluetooth protocol stack in detail. (May 12, Dec. 12, Dec. 13, Dec. 18, 10 Marks)

Q. Explain in detail Bluetooth protocol architecture. (May 16, Dec. 16, May 17, May 18, 10 Marks)

Q. Describe Bluetooth architecture and protocol stack. Also discuss its limitations. (Dec. 17, 10 Marks)
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-43 Wireless Local Area Networks

e
o zMS_SzEE82EP12SR8µ/82U8S

g
o <—…jS_S<5Z8UES8=U,y2q8S
io led
o M':S—3DS_SM8F8m,12JSU12E01FSm01E1U1FSRm8UPCPUyEP12SaS5P2y0JS
o —D…+S_S—F/8E11E,S28EB10xS82UymR/FyEP12Sm01E1U1FS
o
ic ow

:W+S_S:806PU8SHPRU1680JSm01E1U1FS
o K”'<YYS_SKyHP1SC08µ/82UJSU199jS
n
Fig. 4.5.2 : Bluetooth protocol stack
bl kn

Radio Layer

at
Pu ch

KyHP1SFyJ80SH8CP28RSE,8SUy00P80SC08µ/82UP8RSy2HS1/Em/ESm1B80jS
 —F/8E11E,S/R8RS"jXS7XqSFPU82R8SC088S5y2HjS

Te

”08µ/82UJS,1mmP2qSy2HSMWWS4EP98SHP6PRP12SH/mF8=’SPRS/R8HSC10SE0y2R9PRRP12SBPE,SCyRES,1mmP2qS0yE8S1CS‘];;S,1mR“RjS
 3ES/R8RS^fS,1mSUy00P80RS8µ/yFFJSRmyU8HSBPE,S‘SYXVjS
 7y/RRPy2S”:cS/R8HSC10S91H/FyEP12jS
Baseband Layer
 —yR85y2HSFyJ80Sm80C109RSC08µ/82UJS,1mmP2qSE1Sy61PHSP2E80C8082U8Sy2HSE1SyUU8RRSE,8S98HP/9jS
 W8CP28RSm,JRPUyFSFP2xRSy2HS9y2JSmyUx8ESC109yERjS
 3ESU12E01FRS_S
o W86PU8SzHH08RRP2qS
o ',y228FSU12E01FS4,1BSH86PU8RSCP2HS8yU,S1E,80’SE,01/q,SmyqP2qSy2HSP2µ/P0JS98E,1HRS
o +1B80ZRy6P2qS1m80yEP12RS
o ”F1BSU12E01FSy2HSRJ2U,012PVyEP12Sy912qS—F/8E11E,SH86PU8RjS
Link Manager Protocol (LMP)
 M,8SFP2xS9y2yq80Sm01E1U1FS4OY+’S9y2yq8RS6y0P1/RSyRm8UERS1CSE,8S0yHP1SFP2xS58EB882S9yRE80Sy2HSRFy68jS
 M,8SC1FF1BP2qSC/2UEP12RSy08SU16808HS5JSOY+S_S
o z/E,82EPUyEP12–SmyP0P2q–Sy2HS82U0JmEP12S
o :J2U,012PVyEP12S
o 'ymy5PFPEJS28q1EPyEP12S
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-44 Wireless Local Area Networks

o d1:S28q1EPyEP12S
o +1B80SU12E01FS
o OP2xSR/m806PRP12S
o :EyE8Sy2HSE0y2R9PRRP12S91H8SU,y2q8S
Logical Link Control and Adaptation Layer Protocol (L2CAP)
 O"'z+SPRSFyJ808HS1680SE,8S—yR85y2HS+01E1U1FSy2HS08RPH8RSP2SE,8SHyEySFP2xSFyJ80jSS
 O"'z+Sm016PH8RS_S
o '1228UEP12Z10P82E8HS y2HS U1228UEP12F8RRS HyEyS R806PU8RS E1S /mm80S FyJ80S m01E1U1FRS BPE,S m01E1U1FS 9/FEPmF8=P2qS
Uymy5PFPEJjS
o :8q982EyEP12Sy2HS08yRR895FJS1m80yEP12jS
o 701/mSy5RE0yUEP12RjS

e
O"'z+Sm016PH8RSE,088SHPCC8082ESEJm8RS1CSF1qPUyFSU,y228FRSE,yESy08SE0y2Rm10E8HS6PySz'OSFP2xS58EB882S9yRE80Sy2HSRFy68–S
E,8R8Sy08S_S

g
o '1228UEP12F8RRS/R8HSC10S501yHUyREjS
io led
o '1228UEP12Z10P82E8HSC10SHyEySE0y2RC80SBPE,Sd1:SCF1BSRm8UPCPUyEP12jS
o :Pq2yFP2qS/R8HSE1S8=U,y2q8SRPq2yFP2qS98RRyq8RS58EB882SO"'z+S82EPEP8RjS
ic ow

Host Controller Interface (HCI)



n
M,8SX'3Sm016PH8RSySU199y2HSP2E80CyU8SE1SE,8S5yR85y2HSU12E01FF80Sy2HSFP2xS9y2yq80S

bl kn

3ESm016PH8RSyUU8RRSE1S,y0HBy08SREyE/RSy2HSU12E01FS08qPRE80RjS
 …RR82EPyFFJSE,PRSP2E80CyU8Sm016PH8RSyS/2PC109S98E,1HS1CSyUU8RRP2qSE,8S—F/8E11E,S5yR85y2HSUymy5PFPEP8RjS
at


Pu ch

M,8SX'3S8=PRERSyU01RRS[SR8UEP12R–SYFL5RjTM–SY7HYT8j7M5BHNL7_5RjTM5XjYM7jvvL7jS…yU,S1CSE,8SR8UEP12RS,yRSySHPCC8082ES01F8S
E1SmFyJSP2SE,8SX'3SRJRE89jS

Te

X'3SH8CP28RSE,8SR8ES1CSC/2UEP12RS1CSyS—F/8E11E,S91H/F8SE,yESy08SyUU8RRP5F8SE1SE,8S,1RESy2HSPERSymmFPUyEP12jS
 X'3SUy2S58SR882SyRSySR1CEBy08“,y0HBy08S51/2Hy0JjS
RFCOMM
 M,8SK”'<YYSm01E1U1FSm016PH8RS89/FyEP12S1CSR80PyFSm10ERS1680SE,8SO"'z+Sm01E1U1FjS
 3ESPRSySUy5F8S08mFyU8982ESm01E1U1FSE,yESm016PH8RSySR80PyFSFP28SP2E80CyU8SE1SyFFSE,8SymmFPUyEP12RjS
 M,8Sm01E1U1FSPRS5yR8HS12SE,8S…M:3SREy2Hy0HSM:S;^j‘;jS
 3ESR/mm10ERS9/FEPmF8SR80PyFSm10ERS1680SySRP2qF8Sm,JRPUyFSU,y228FjS

Service Discovery Protocol (SDP)


 M,8SR806PU8SHPRU1680JSm01E1U1FS4:W+’S,8FmRSE,8SymmFPUyEP12RSE1SHPRU1680SB,PU,SR806PU8RSy08Sy6yPFy5F8Sy2HSE1SH8E809P28S
E,8SU,y0yUE80PREPURS1CSE,1R8Sy6yPFy5F8SR806PU8RjS
 :W+SH8CP28RS12FJSE,8SHPRU1680JS1CSR806PU8RS21ESy51/ESE,8P0S/Ryq8jS
 D8BSR806PU8SPRSHPRU16808HSyRSC1FF1BRS
o 'FP82ESR82HRSyS08µ/8RESE1SR8y0U,SC10Sy2SP2E808RE8HSR806PU8jS
o M,82SR80680S08Rm12HRSE1SE,8SUFP82ESBPE,SE,8SFPRES1CSy6yPFy5F8SR806PU8RSE,yES9yEU,SE1SUFP82EYRSU0PE80PyjS
o M,8SUFP82ES/R8RSE,PRSFPRESE1S08E0P868SyHHPEP12yFSR806PU8SyEE0P5/E8SC10SE,8SR806PU8S1CSP2E808REjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-45 Wireless Local Area Networks

Profiles
 +01CPF8RSy08SRm8UPCPUyEP12RSB,PU,SH8RU0P58S,1BS—F/8E11E,SR,1/FHS58S/R8HSP2SySRm8UPCPUSymmFPUyEP12Sy2HSyRSE,/RS82R/08RS
E,yESyFFSH86PU8RSC019SHPCC8082ES9y2/CyUE/080RSUy2SR8y9F8RRFJSB10xSBPE,S128Sy21E,80jSM,808Sy08Sy51/ESySH1V82Sm01CPF8R_S
 78280PUSzUU8RR–S:80PyFS+10E–SWPyF/mSD8EB10xP2q–S”zj–SX8yHR8E–SOzDSzUU8RRS+1P2E–S78280PUS<5Z8UES…=U,y2q8S4<—…j’–S”PF8S
M0y2RC80–S<5Z8UES+/R,–S:J2U,012PVyEP12–S'10HF8RRSM8F8m,12J–Sy2HS32E80U19jSS
 Y108Sm01CPF8RSy08S/2H80SHPRU/RRP12SBPE,P2S6y0P1/RS—F/8E11E,S:37Sq01/mRjS
 M,8S m01CPF8S U12U8mES PRS /R8HS E1S H8U08yR8S E,8S 0PRxS 1CS P2E801m80y5PFPEJS m015F89RS 58EB882S HPCC8082ES 9y2/CyUE/080RmS
m01H/UERjS
Telephony Control Protocol Specification Binary (TCS-BIN)
M1S H8CP28S UyFFS U12E01FS RPq2yFP2qS C10S E,8S 8REy5FPR,982ES 1CS 61PU8S y2HS HyEyS UyFFRS 58EB882S —F/8E11E,S H86PU8RS M':Z—3DS
H8RU0P58RSyS5P2y0J–SmyUx8ES5yR8H–S5PEZ10P82E8HSm01E1U1FjS

4.5.4(a) Bluetooth Baseband States

e
MU – Dec. 15

g
Q. Explain how a Bluetooth network is established using baseband state transitions. (Dec. 15, 10 Marks)
io led
 zSEJmPUyFS—F/8E11E,SH86PU8S,yRSySm1B80S1CS‘;;9-Sy2HSUy2S,y68SyS0y2q8S1CS/mE1S‘;;9jS
 Xy6P2qSR/U,S,/q8Sm1B80Sy2HS08FJP2qS12S5yEE80JSyRSPERSR1/0U8SBPFFS08R/FESP2SyS,/q8SByREyq8SPCSE,8SH86PU8SFP8RSPHF8SC10SF12qS
ic ow

EP98jS
 —F/8E11E,SH8CP28RSR8680yFSF1BZm1B80SREyE8RSC10SySH86PU8jSM,8S9yZ10SREyE8RSm08R82ESUy2S58SR882SP2SE,8S”PqjSXj\j[jS
n

bl kn

-MHYPQN5ISzSH86PU8SB,PU,SPRSU/0082EFJS<DSy2HS21ESmy0ES1CSy2JSmPU128ESPRSP2SREy2H5JS91H8jS32SE,PRSF1BZm1B80S91H8S12FJS
E,8S2yEP68ZUF1UxS0/2RjS

at

KYGOq7N5ISD1BSE,8S9168982ESE1SE,8S28=ES21H8SPj8jSP2µ/P0JSREyE8SPRS5yR8HS12S8PE,80S1CSEB1SByJRS_S
Pu ch

4R5 W5 PLKq9L5 6HYMT5 Mj5 LTMHQvqTF5 H5 8q9jYLM5 IS M,8S /R80S By2ERS E1S RUy2S yFFS E,8S H86PU8RS P2S PERS 0y2q8jS M,PRS P2µ/P0JS
m01U8H/08SPRSREy0E8HS5JSR82HP2qSy2S32µ/P0JSyUU8RRS'1H8S43z'’SE1SyFFSH86PU8RSP2S0y2q8jS
Te

kR5 TLKq9L5 qY5 -MHYPQN5 MFHM5 vqTMLYT5 8L7qjPq9HvvN5 IS zS H86PU8S B,PU,S PRS P2S :Ey2H5JS 9yJS 82E80S E,8S 32µ/P0JS REyE8S
m80P1HPUyFFJSE1SR8y0U,SC10S3z'S98RRyq8RjS3CSPESCP2HRS128SR/U,–SE,82SPESE0y2RC80RSE,8S28U8RRy0JSP2C109yEP12Sy51/ES
PER8FCSy2HS58U198RSySRFy68jS
 QHDL5EjPL5IS<2SR/UU8RRC/FSP2µ/P0J–SE,8SH86PU8S82E80RSE,8Smyq8S91H8jS32SE,8Smyq8SREyE8SEB1SHPCC8082ES01F8RSy08SH8CP28HjS
‘jS zCE80SE,8S9yRE80SCP2HRSyFFSE,8SH86PU8RS08µ/P08HSC10SySU1228UEP12–SPESR8ERS/mSySmPU128EjS
"jS M,8S9yRE80SE,82SUyFU/FyE8RSRm8UPyFS,1mmP2qSR8µ/82U8RS5yR8HS12SE,8SH86PU8SyHH08RR8RS08U8P68HSE1SU12EyUES8yU,S
H86PU8SP2HP6PH/yFFJjS
[jS M,8SRFy68RSy2RB80SE1SUyFFRS5JSE,8S9yRE80Sy2HSRJ2U,012PV8SE,8P0SUF1UxRSyUU10HP2qFJjS
XjS 32SE,8S98y2EP98–SE,8S9yRE80S9yJSU12EP2/8SE1Smyq8S9108SH86PU8RSE1SE,8SmPU128EjS
\jS zRSR112SyRSE,8SH86PU8S4RFy68’SRJ2U,012PV8RSE1SE,8S,1mmP2qSmyEE802S1CSE,8SmPU128E–SPES82E80RSE,8SU1228UE8HSREyE8jS
 XjYYL9MLP5ISM,8SU1228UE8HSREyE8SU12EyP2RSE,8SyUEP68SREyE8Sy2HSE,088SF1BSm1B80SREyE8RjS
 W9MqKL5I55
o 32SyUEP68SREyE8SE,8SRFy68Smy0EPUPmyE8RSP2SE,8SmPU128ES5JSFPRE82P2q–SE0y2R9PEEP2qSy2HS08U8P6P2qjSzS9yRE80Sm80P1HPUyFFJS
RJ2U,012PV8RSBPE,SE,8R8SRFy68RjS
o M,8SU199/2PUyEP12SPRSH128S6PySz'OSy2HS:'<SFP2xRjS
o …680JSH86PU8SB,PU,SPRSyUEP68S288HRSE1S,y68SyS[Z5PESzUEP68SY89580SzHH08RRS4zYz’jSS
o 32SE,8SyUEP68SREyE8–SPCSE,8SH86PU8SPRS21ESE0y2R9PEEP2q–SPESUy2SHPRU1228UESPER8FCSy2HSq1SE1SREy2H5JS5JSPLMH9FS98E,1HjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-46 Wireless Local Area Networks

 zS—F/8E11E,SyFR1S,yRSE,8SU,1PU8SE1Sq1SP2E1S8PE,80S1CSE,8SE,088SF1BZm1B80SREyE8RSB,PU,Sy08S_S
4R5 -Yq00555
o </ES1CSyFFSE,8SE,088SF1BSm1B80SREyE8R–SE,PRS128S,yRS9y=jSm1B80SU12R/9mEP12jS
o Q2FPx8SP2SyUEP68SREyE8SB,808SE,8SRFy68SFPRE82RSE1SmPU128ESyES8680JSRF1E–S,808SPESFPRE82RSyESyS08H/U8HS0yE8SB,PU,SUy2S
58Sm01q0y998HSyRSm80SE,8S288HjS
o M,8S9yRE80SyFR1SyFF1UyE8RSyS08H/U8HS2/9580S1CSRF1ERSC10SE,8SRFy68SP2SR2PCCS91H8jS
kR5 RjvP55
o M,8SH86PU8S,808SRE1mRSyFFSz'OSFP2xSE0y2R9PRRP12RSy08SRE1mm8HjS
o 3CS21SyUEP6PEJSPRSE,808SP2SE,8SmPU128E–SE,8SRFy68S08H/U8SE,8Sm1B80SU12R/9mEP12S10Smy0EPUPmyE8RSP2Sy21E,80SmPU128EjS
GR5 QH7L55
o M,PRSREyE8S,yRSE,8SF1B80SH/EJSUJUF8Sy2HSF1B8RESm1B80SU12R/9mEP12S1CSE,8SE,088jS

e
o 3ESyFR1S08F8yR8SPES[Z5PESzYzSyHH08RRjS32RE8yHSPESq8ERSySVZ5PES+YzS4+y0x8HSY89580SzUU8RR’jS

g
o 3ES089yP2RSyS989580S1CSE,8SmPU128ES5/ESqP68RSySU,y2U8SC10Sy21E,80SH86PU8SE1S58U198SyUEP68jS
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 4.5.3 : Bluetooth baseband states

4.6 Comparison of IEEE 802.11, HIPERLAN-1, HIPERLAN-2 and Bluetooth


.MU - Dec. 12, Dec. 13, May 15, Dec. 15, May 16, Dec. 16, Dec. 17.

Q. Compare between IEEE 802.11 and HIPERLAN-2. (Dec. 12, Dec. 13, Dec. 17, 10 Marks)
Q. Compare HIPERLAN-1, HIPERLAN-2 and 802.11 W-LAN. (May 15, 10 Marks)
Q. Write a short note on HIPER LAN-1 VS HIPERLAN-2. (Dec. 15, 5 Marks)
Q. Compare HIPERLAN 2, BLUETOOTH, IEEE 802.11. (May 16, Dec. 16, 10 Marks)

Table 4.6.1 : Comparison of IEEE 802.11, HIPERLAN and Bluetooth

XFH7H9ML7qTMq9 KNNN5OPkR445 KNNN5OPkR44H5 RKQNVBWJM45 RKQNVBWJMk5 dvOLMjjMF5


”08µ/82UJS "jXS7XVS \7XVS \S7XVS \7XVS "jXS7XVS
Yy=SHyEyS0yE8S "SY5mRS4‘‘S \XSY5mRS "[j\Y5mRSS \XSY5mRS r‘Y5mRS
Y5mRSBPE,S''c’S
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-47 Wireless Local Area Networks

XFH7H9ML7qTMq9 KNNN5OPkR445 KNNN5OPkR44H5 RKQNVBWJM45 RKQNVBWJMk5 dvOLMjjMF5

QR80S ]SY5mRS [XY5mRS r";Y5mRS [XY5mRS r‘Y5mRS


E,01/q,m/ES

'1228UEP12S +1P2EZE1Zm1P2ES +1P2EZE1Z +016PH8S9/FEPZ,1mS +1P2EZE1Z +1P2EZE1ZY/FEPm1P2ES


Y/FEPm1P2ES 01/EP2qS Y/FEPm1P2ES

+,JRPUyFSFyJ80S ”X::“W:::S <”WYS aS <”WYS ”X::S

z/E,82EPUyEP12SD128S D128S D128S =j\;fS `8RS

Y8HP/9S ':Yz“'zS ':Yz“'zS hy0Py2ES1CS':Yz“'zSPj8jS ':Yz“'zS YyRE80SPRS08Rm12RP5F8SC10S


yUU8RRS …`D+YzSm01E1U1FS Y8HP/9SyUU8RRjS

M0y2R9PES ‘;;9-S ;j;\“;j"\“‘-S ;j;‘“;j‘“‘S-S ;j"SE1S‘S-S ‘SE1S‘;;S9-S

e
m1B80S M+'S

g
…0010SU12E01FS zKdS zKd–”…'SyES+X`S ”…'SyES+,JRPUyFSFyJ80jS3ES zKd“”…'SyES+X`S zKd“”…'SyESYz'SFyJ80S
io led
FyJ80S /R8RS—'XSU1H8RjS FyJ80S

z0U,PE8UE/08S 32C0yRE0/UE/08S 32C0yRE0/UE/08S 32C0yRE0/UE/08S5yR8HS 32C0yRE0/UE/08S zHS,1US28EB10xS


ic ow

5yR8HS 5yR8HS y0U,PE8UE/08SBPE,S 5yR8HS


y0U,PE8UE/08S y0U,PE8UE/08S yHHPEP12yFSR/mm10ESC10SyHS y0U,PE8UE/08S
n
BPE,SyHHPEP12yFS BPE,SyHHPEP12yFS ,1US28EB10xRS BPE,SyHHPEP12yFS
bl kn

R/mm10ESC10SyHS R/mm10ESC10SyHS R/mm10ESC10SyHS


,1US28EB10xRS ,1US28EB10xRS ,1US28EB10xRS
at
Pu ch

d1:SR/mm10ES <mEP12yFSZd1:SPRS <mEP12yFSZd1:SPRS 'z'SR/5SFyJ80S1CS `8R_SQR8RS OP2xSYy2yq80Sm01E1U1FS


R/mm10E8HS5JS R/mm10E8HS5JS X3+…KOzD‘Sm016PH8RSCP68S U1228UEP12S m016PH8RS98y2RSE1S28q1EPyE8S
Te

m016PHP2qS+1P2ES m016PHP2qS+1P2ES m0P10PEJSF868FRSC10Sd1:S 10P82E8HSR806PU8S d1:SSR/U,SyRSCF1BS


'110HP2yEP12S '110HP2yEP12S R/mm10EjSM,8S9ymmP2qS1CS E1Sm016PH8Sd1:S Rm8UPCPUyEP12jS
”/2UEP12S4+'”’S ”/2UEP12S4+'”’S ySd1:S12SySm0P10PEJSF868FS R/U,SyRS
PRSH128SBPE,SE,8S,8FmS1CS 5y2HBPHE,–S
myUx8ESFPC8SEP98S H8FyJ–SZPEE80S8EUjS

'1228UEP6PEJS '1228UEP12F8RRS '1228UEP12F8RRS '1228UEP12SF8RRS '1228UEP12Z '1228UEP12F8RRbU1228UEP12Z


10P82E8HS 10P82E8HS

Review Questions

Q. 1 Discuss the advantages and disadvantages of WLAN over wired network. Explain two basic types of WLAN
architecture.

Q. 2 Explain in detail function of HIPERLAN-1 CAC sublayer.

Q. 3 Draw and explain IEEE 802.11 protocol architecture.

Q. 4 Discuss the PHY frame format of an IEEE 802.11 using FHSS technique.

Q. 5 Describe IEEE 802.11 MAC frame format.


Mobile Communication & Computing (MU-Sem. 7-Comp) 4-48 Wireless Local Area Networks

Q. 6 Describe MAC mechanism schemes used in IEEE802.11. Explain in detail MAC scheme that uses DCF with
RTS/CTS extension.

Q. 7 Discuss Basic MAC schemes used in IEEE 802.11.

Q. 8 Write a short note on HIPERLAN-2.

Q. 9 Explain HIPERLAN-2 data link control layer.


!!!

g e
io led
ic ow
n
bl kn
at
Pu ch
Te
Mobility Management
5
Unit V

Syllabus

5.1 Mobility Management : Introduction, IP Mobility, Optimization, IPv6


5.2 Macro Mobility : MIPv6, FMIPv6,

e
5.3 Micro Mobility : CellularIP, HAWAII, HMIPv6,

g
Introduction
io led
IP Mobility is a mechanism that allows mobile device to move from one network to another network without
changing its permanent IP address. This chapter discusses various protocols to support IP Mobility. Mobile IP was the first
ic ow

communication protocol developed by IETF to support IP mobility with the current version of IPV4. Later Mobile IPV6
(MIPV6) was developed as an update to IPV6 protocols to supports IP mobility. IPV6 header has some new features and
n
options that supports IP mobility. The chapter also discusses various Micro mobility mechanisms to support fast and
bl kn

seamless handover while mobile device is changing its network or point of attachment.
at

5.1 Introduction to IP Mobility


Pu ch

 IP mobility refers to the set of mechanisms that allow an IP mobile node to move freely between
Te

different IP networks while maintaining IP connectivity in a transparent way.


 Current versions of the Internet Protocol (IPV4) assume that the point at which a computer attaches to the Internet or
a network is fixed and its IP address identifies the network to which it is attached.
 Packets are sent to a mobile device based on the location information contained in the IP address.
 If a mobile device, or mobile node, moves to a new network while keeping its IP address unchanged, its address does
not reflect the new point of attachment.
 Consequently, existing routing protocols cannot route packets to the mobile node correctly.
 In this situation, we must reconfigure the mobile node with a new IP address representing its new location. Thus,
under the current Internet Protocol (IPV4) , if the mobile node moves without changing its address, it loses routing;
and if it does change its address, it loses connections.
 One of the most desirable features of IP mobility mechanisms is the ability of maintaining connectivity without
interrupting ongoing communications.

5.1.1 Mobile IP
 Mobile IP (or MIP) is an IETF standard communications protocol that is designed to allow mobile device users to move
from one network to another while maintaining a permanent IP address.
Mobile IP is an enhancement of the internet protocol (IP) that adds mechanisms for forwarding internet traffic to
mobile devices when they are connecting through other than their home network. Fig. 5.1.1 shows generic Mobile IP
topology.
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-2 Mobility Management

 Every host will have a "Home Address (Permanent IP)” within a "Home Network". A home network has a "Home
Agent" that provides several services for the mobile node
 Traffic destined to the "Home Address" of mobile node (MN) will always be routed to the "Home Agent."
 If the mobile node is in its "Home Network", traffic will be forwarded directly the mobile node.
 If the mobile node has moved to some other network called "Foreign Network", traffic will be IP tunneled by the
"Home Agent" to a "Care-of- Address". The Care- of- address defines the current location of the mobile node.
 Every Foreign network has ‘Foreign agent (FA) ’. The foreign agent can provide several services to the mobile node
during its visit to the foreign network. The FA can have the COA (care or address) acting as a tunnel endpoint when
forwarding packets to the MN.

g e
io led
ic ow
n
Fig. 5.1.1 : Mobile IP topology
bl kn

5.1.2 Optimization
at
Pu ch

Triangular routing
 With Mobile IPv4 there is always a triangular traffic pattern. As shown in Fig. 5.1.2 the IP packet from a CN
Te

(Correspondent Node) destined to an MN needs to be routed to its HA first and then tunneled to the foreign agent of
the MN.
 If the Corresponding Node (CN)and MN are very near, then also the IP packet has to travel a long way to reach the
MN. This in efficient behavior of a non optimized mobile IP is called Triangular Routing.
 The triangle is made of the three segments : CN to HA, HA to COA/MN and MN back to CN.

Fig. 5.1.2 : Triangular Routing


Mobile Communication & Computing (MU-Sem. 7-Comp) 5-3 Mobility Management

Route optimization to avoid triangular routing


To solve triangular routing problem, a route optimization protocol has been introduced. Basically this protocol
defines some messages as to inform CN of an upto date location of MN. Once the current location of the MN is known, the
CN itself performs tunneling and sends packet directly to MN.
The optimized mobile IP protocol needs four additional messages; these are :
1. Binding request
If a node wants to know where the MN is currently located, it can send a binding request to the HA.
2. Binding update
The HA sends a binding update to the CN and informs the CN the current location of an MN. The binding update can
request an acknowledgement.
3. Binding acknowledgement
On request, after receiving a binding update message, anode returns a binding acknowledgement.

e
4. Binding warnings

g
A binding warning message is sent by anode if it decapsulates a packet for an MN but it is not the FA for that MN
io led
currently.
 If CN receives the binding warning, it requests the HA for a new binding update.
ic ow

 If the HA receives the warning it directly sends a binding update to the CN.
 Fig. 5.1.3 explains how these four messages are used together when an MN changes its FA and also shows the
n
exchange of messages in optimization protocol.
bl kn
at
Pu ch
Te

Fig. 5.1.3 : Optimized mobile IP working


 The CN requests the current location of MN from the HA.
 HA returns the COA of the MN via update message.
 CN acknowledge this updated message and stores mobility binding.
 Now CN can send data directly to the current foreign agent FAold. FAold now forwards these data to MN.
 The MN might now change its location and register with an new foreign agent FAnew.
 FAnew informs FAold about new registration of MN via an update message and FAold acknowledged this update
message.
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-4 Mobility Management

 CN doesn’t know about the current location of MN, its till tunnels its packets for MN to the old foreign agent FAold.
 The FAold notices packets destined to MN but also knows MN currently not in current FA.
 FAold might now forward these se packets to the new COA of MN which is new foreign agent.
 Thus the packets that are in transit are not lost. This behavior is another optimization to basic mobile IP and provides
smooth handover.
 FAold sends binding warning message to CN. CN then requests a binding update.
 The HA sends an update to inform the CN about the new location, which is acknowledged. Now CN cans end data
directly to FAnew, and avoid triangular binding.
 However, the optimization will not work if the MN does not want to reveal its current location to the CN because of
security.

5.2 IPv6 – Internet Protocol Version 6


 To overcome these problems, IPv6 also known as IPng (Internet Protocol next generation) was proposed. In IPv6, the

e
Internet protocol was extensively modified to accommodate the growth and new demands of the Internet. The format

g
and the length of the IP addreses were changed along with the packet format.
io led
 Related protocols such as ICMP were also modified. Other protocols in the network layer, such as ARP, RARP, IGMP
were either deleted or included in ICMPv6 protocol. Routing protocols such as RIP and OSPF were slightly modified to
accommodate these changes. The fast spreading use of Internet and new services such as mobile IP, IP telephony, and
ic ow

IP-capable mobile telephony, may require the total replacement of IPv4 by IPv6.
Advantages of IPv6
n
bl kn

1. Larger address space : An IPv6 address is 128 bit long. Compared with the 32 bit long IPv4 address, this is huge
increase in address space.
at
Pu ch

2. Better Header format : IPv6 uses a new header format in which options are separated from the base header and
inserted when needed, between the base header and the upper layer data. This simplifies and speeds up the routing
process because most of the options do not need to be checked by routers.
Te

3. New Options : IPv6 has new options to allow for additional functionalities.
4. Allowance for extension : IPv6 is designed to allow the extension of protocol if required by new technologies or
applications.
5. Support for resource allocation : In IPv6, the type-of-service field has been removed, but mechanism called Flow label
has been added to enable the source to request special handling of packet. This mechanism can be used to support
traffic such as real-time audio and video.
6. Support for more security : The encryption and authentication options in IPv6 provide confidentiality and integrity of
the packet.
Features of Ipv6 to support mobility
 No special mechanisms are needed for securing mobile IP registration. In every Ipv6 node address auto configuration
i.e. the mechanism for acquiring a COA is inbuilt.
 Neighbor discovery mechanism is also mandatory for every Ipv6 node. So special foreign agents are no longer needed
to advertise services.
 Combining the features of address auto configuration and neighbor discovery enables every Ipv6 mobile node to
create and obtain a topologically correct address or the current point of attachment.
 Every Ipv6 node can send binding updates to another node, so the MN can send its COA directly to the CN and HA. The
FA is no longer needed. The CN processes the binding updates and makes corresponding entries in its routing cache.
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-5 Mobility Management

 The MN is now able to decapsulates the packets


o To detect when it needs a new COA and
o To determine when to send binding updates to the HA and CN
 A soft handover is possible with Ipv6. The MN sends its new COA to the old router serving the MN at the old COA, and
the old router can encapsulate all incoming packets for the MN and forwards them to new COA.
Limitation of Ipv6
It does not solve any firewall or privacy problems. Additional mechanisms on higher layers are needed for this.
Ipv6 Header
Fig. 5.2.1 shows both Ipv4 and Ipv6 header format.

g e
io led
ic ow
n
bl kn

Fig. 5.2.1 : Comparison of Ipv4 and Ipv6 Header format


at
Pu ch

Fields of Ipv6 header :


1. Version : 4 bits - IPv6 version number.
Te

2. Traffic Class : 8 bits - Used to specify different classes or priorities of IPv6 packets.
3. Flow Label : 20 bits - Used for specifying special router handling from source to destination(s) for a sequence of
packets. It distinguish the different types of packets such as audio, video, txt etc. and accordingly provides quality of
services to them.
4. Payload Length : 16 bits unsigned - Specifies the length of the data in the packet.
5. Next Header : 8 bits - Specifies the next encapsulated protocol. The values are compatible with those specified for the
IPv4 protocol field.
6. Hop Limit : 8 bits unsigned - For each router that forwards the packet, the hop limit is decremented by 1. When the
hop limit field reaches zero, the packet is discarded. This replaces the TTL field in the IPv4 header that was originally
intended to be used as a time based hop limit.
7. Source address : 16 bytes - The IPv6 address of the sending node.
8. Destination address : 16 bytes - The IPv6 address of the destination node.

5.3 Macro Mobility


5.3.1 MIPv6 (Mobile IPv6)
 The first IP Mobility protocol, Mobile IP (discussed in Section 5.1.1) was developed for IPv4. The Mobile IP protocol
solves the TCP/IP Layer 3 mobility problem, by assigning a permanent IP address to the mobile node.
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-6 Mobility Management

 Mobile IP supports of both MIPv4 and MIPv6, but IPv4 has a couple of drawbacks. The main drawback of IPV4 is
address exhaustion, making MIPv6 the future option for mobility protocol in IP Networks.
 Mobile IPv6 (MIPv6) is a protocol developed as a subset of IPv6 to support mobility.
 MIPv6 is an update of the Mobile IP standard designed to authenticate mobile devices using IPv6 addresses.
 In traditional IP routing, IP addresses represent a topology. Routing mechanisms rely on the assumption that each
network node will always have the same point of attachment to the Internet, and that each node's IP address
identifies the network link where it is connected.
 In this routing scheme, if you disconnect a mobile device from the Internet and want to reconnect through a different
network, you have to configure the device with a new IP address, and the appropriate netmask and default router.
 Otherwise, routing protocols have no means of delivering packets, because the device's network address doesn't
contain the necessary information about the node's network point of attachment to the Internet.
 Mobile IPv6 allows a mobile node to transparently maintain connections while moving from one subnet to another.

e
Each device is identified by its home address although it may be connecting to through another network. When
connecting through a foreign network, a mobile device sends its location information to a home agent, which

g
intercepts packets intended for the device and tunnels them to the current location.
io led
5.3.2 FMIPv6 (Fast Hand Over for Mobile IPV6)
 Mobile IPv6 (MIPv6) enables a Mobile Node (MN) to maintain its connectivity to the Internet when moving from one
ic ow

Access point to another. This process is referred to as ‘handover’.


 During handover, there is a period during which the Mobile Node is unable to send or receive packets. This period is
n
called ‘Hand over latency’.
bl kn

 Hand over latency results from the standards handover procedure such as movement detection, new Care of address
configuration, binding updates etc.
at
Pu ch

 This Hand over latency is often unacceptable to real-time traffic such as Voice over IP (VoIP).
 The fast handover for mobile IPv6 (FMIPv6) aims at reducing the long handover latency in mobile IPv6 by fast
Te

movement detection and fast binding update.


 It uses anticipation based on layer 2 trigger information of the mobile node (MN) to obtain a new care-of address at
the new link while still connected to the previous link, thus reducing handover delay.
 Furthermore, it also reduces packet loss by buffering before the real link layer handover takes place.

5.4 Micro Mobility


 Mobile IP represents a simple and scalable global mobility solution but lacks the support for fast handoff control and
paging.
 Imagine a large number of mobile devices changing networks quite frequently ; a high load on the home agents as well
as on the networks is generated by registration and binding update messages.
 IP micro-mobility protocols can complement mobile IP by offering fast and almost seamless handover control in
limited geographical areas.
 The basic underlying idea is the same for all micro-mobility protocols: Keep the frequent updates generated by local
changes of the points of attachment away from the home network and only inform the home agent about major
changes, i.e., changes of a region.
 In some sense all micro-mobility protocols establish a hierarchy.
 The following section presents three of the most commonly used approaches.
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-7 Mobility Management

5.4.1 Cellular IP

Why Cellular IP ?
 Mobile IP exhibits several problems when there is a large number of mobile devices changing network frequently and
moving very fast. In such cases, a high load on home agents and on the network is generated by registration and
binding update messages.
 Mobile IP is basically designed only for macro level mobility and relatively slow moving hosts.
 Cellular IP (CIP) is a new robust, simple, and flexible protocol for highly mobile hosts.
 CIP complements Mobile IP by supporting local mobility.
 It can accommodate large number of users by separating idle hosts from active hosts.
CIP architecture
The architecture of Cellular IP is shown in Fig. 5.4.1. It consists of three major components.

e
o Cellular IP gateway (GW),

g
o Cellular IP node or the base station (BS)
io led
o Cellular IP mobile host (MH)
ic ow
n
bl kn
at
Pu ch
Te

Fig. 5.4.1 : Cellular IP access network (architecture)

 An important component of a Cellular IP network is the base station (BS). A cellular IP network consists of several
interconnected BSs.
 The BSs communicate with mobile hosts (MHs) via wireless interface and also route IP packets inside the cellular
network. The base stations are built on regular IP forwarding engines, but IP routing is now replaced by Cellular IP
routing and cellular location management.
 CIP gateway router connects a cellular IP network and the regular Internet.
 Mobility between gateways is managed by Mobile IP while mobility within access networks is handled by Cellular IP.
 Now the IP address of gateway serves as the care-of-address for all mobile hosts that are currently attached to the
network.
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-8 Mobility Management

Routing in CIP
 Uplink packets (packets originated from mobile host) are routed from mobile host to the gateway on a hop-by-hop
basis.
 The path taken by these packets is cached in base stations. This cache is called routing cache.
 To route downlink packets addressed to a mobile host the path used by recent packets transmitted by the host (that
are already stored in route cache) is reversed.
 A mobile host may wants to maintain its routing cache mappings even though it is not regularly transmitting data
packets.
 Such mobile hosts transmit route-update packets at regular interval to keep their routing cache mappings valid. These
packets are empty data packets addressed to the gateway.
Paging in CIP
 In Cellular IP, an idle mobile host is one that has not received data packets for a system specific time.

e
 For such idle hosts, their downlink soft state routes timeout and are removed from the routing cache.

g
 These hosts transmit paging-update packets at regular intervals. The paging update packet is an empty IP packet
io led
addressed to the gateway. It is distinguished from route update packet by its IP type parameter.
 Similar to data and route update packets, paging update packets are routed on a hop-by-hop basis to the gateway.
Base stations may optionally maintain paging cache.
ic ow

 Thus all idle mobile hosts have mappings in paging caches but not in routing caches.

n
In addition, active mobile hosts will have mappings in both routing as well as paging cache.
bl kn

 Packets addressed to a mobile host are normally routed by routing cache mappings. Paging occurs when a packet is
addressed to an idle mobile host and the gateway or base stations find no valid routing cache mapping for the
at

destination.
Pu ch

 The paging cache is used to avoid broadcast search procedures found in cellular systems.

Te

If there is no entry in the paging cache, then the packet addressed to an idle mobile host is broadcast in the access
network. This may happen when transmitting first packet to the any host.
 Idle mobile hosts that receive a packet, move from idle to active state and immediately transmit a route-update
packet.
Handover in CIP
 CIP implements MCHO (Mobile controlled handover) thus, in CIP, handoff is initiated by Mobile Host (MH).
 MH listens to the beacon transmitted by BSs and initiates handover based on signal strength measurements.
 To perform a handoff, an MH tunes its radio to the new BS. It then sends a route update packet to this new BS.
 This creates entry in a routing cache on route to the gateway, thus, configuring the downlink route to the new BS.
 During the handoff process time, downlink packets may be lost. The mappings associated with the old base station are
not cleared at handover, rather, they timeout as the associated soft-state timers expire.
 The mappings associated with the old BS are cleared after the expiry of a timer.
 Before the timeout, both the old and new downlink routes remain valid and packets are delivered through both the
BSs. Thus, Cellular IP uses semisoft handover to improve handoff performance.
Advantages of CIP
1. Provides easy Global migration
2. Cheap Passive Connectivity
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-9 Mobility Management

3. Efficient Location Management


4. Flexible Handoff
5. Simple Memory less Mobile hosts

5.4.2 HAWAII
HAWAII (Handoff-Aware Wireless Access Internet Infrastructure) tries to keep micro-mobility support as transparent
as possible for both home agent and MN.
Working
Step 1 : On entering an HAWAII domain, a mobile node obtains a co-located COA.
Step 2 : MN registers with the HA.
Step 3 : When MN moving another cell inside the foreign domain, the MN sends a registration request to the new base
station as to a foreign agent.
Step 4 : The base station interprets the registration request and sends out a handoff update message, which

e
reconfigures all routers on the paths from the old and new base station to the crossover router. When the

g
routing has been reconfigure successfully, the base station sends a registration reply to the MN, again as if it
were a foreign agent.
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 5.4.2 : Basic architecture of HAWAII

Advantages
1. Security : Challenge response extensions are mandatory. In contrast to cellular IP, routing changes are always initiated
by the foreign domain’s infrastructure.
2. Transparency : HAWAII is mostly transparent to mobile nodes.
Disadvantages
 Co-located COA raises DHCP security issues(DHCP has no strong authentication).
 Decentralized security-critical functionality(Mobile IP registration processing during handover)in base stations.
 Authentication of HAWAII protocol messages unspecified (potential attackers: stationary nodes in foreign network).
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-10 Mobility Management

 MN authentication requires PKI or AAA infrastructure.


 There are no provisions regarding the setup of IPsec tunnels.
 No private address support is possible because of co-located COAs.

5.4.3 HMIPv6 – Hierarchical Mobile IPv6


 Hierarchical Mobile IPV6 (HMIPv6) provides micro-mobility support by installing a mobility anchor point (MAP). MAP
is an entity which is responsible for a certain domain and acts as a local HA within this domain for visiting MNs.
 Fig. 5.4.3 shows basic architecture of Hierarchical Mobile IP.
 The MAP receives all packets on behalf of the MN, encapsulates and forwards them directly to the MN’s current
address LCOA (Link COA).

g e
io led
ic ow
n
bl kn

Fig. 5.4.3 : Basic architecture of hierarchical mobile IP


Advantages
at
Pu ch

1. Security : MNs can have (limited) location privacy because LCOAs can be hidden.
2. Efficiency : Direct routing between CNs sharing the same link is possible
Te

Disadvantages
1. Transparency : Additional infrastructure component (MAP).
2. Security : Routing tables are changed based on messages sent by mobile nodes. This requires strong authentication
and protection against denial of service attacks. Additional security functions might be necessary in MAPs

Review Questions

Q. 1 What is a need of Micro Mobility? Explain HAWAII in details.

Q. 2 Draw a neat sketch of IPv6 header. Compare IPv4 and IPv6 with respect to IP mobility.

Q. 3 What advantages IPv6 offer over IPv4.

Q. 4 Explain MIPv6 and FMIPv6 for Micro mobility.

Q. 5 What is Cellular IP. Explain CIP architecture along with routing and paging procedure in CIP.

Q. 6 What are the problems with standard Mobile IP protocol? Explain how MIPv6 overcome these problems.



6 Long Term Evolution of 3GPP
Unit VI

Syllabus

6.1 Long-Term Evolution (LTE) of 3GPP : LTE System Overview, Evolution from UMTS to LTE
6.2 LTE/SAE Requirements, SAE Architecture
6.3 EPS: Evolved Packet System, E-UTRAN, Voice over LTE (VoLTE), Introduction to LTE-Advanced,
6.4 System Aspects, LTE Higher Protocol Layers, LTE MAC layer, LTE PHY Layer,

e
6.5 Self Organizing Network (SON-LTE),SON for Heterogeneous Networks (HetNet), Introduction to 5G

g
io led
Introduction
In chapter 2 we discussed about 2G (GSM , GPRS) and 3G (UMTS) networks. This chapter focuses on 4G network
ic ow

architecture LTE (Long Term Evolution). The chapter discusses detailed system architecture and other system aspects of
Long Term Evolution (LTE). With LTE providing much higher data rate and low latency, it is also important that it supports
n
voice transmission. VoLTE is a technology that transmits Voice over LTE network. Also Self Organizing Networks (SON)
bl kn

which supports dynamic configuration of LTE base stations (eNB) to automate the human efforts for setting up network has
been discussed.
at
Pu ch

6.1 Long Term Evolution : Overview


Te

6.1.1 LTE System Overview


 3GPP stands for Third Generation Partnership Project.
 Under 3GPP, widely used 3G standards UMTS WCDMA/HSPA were developed.
 LTE (Long Term Evolution) is the 4G successor to the 3G UMTS system.
 LTE Provides much higher data speeds, low latency and greatly improved performance as well as lower operating
costs.
 LTE came into market around in 2010. Initial deployments gave little improvement over 3G HSPA and were sometimes
treated as 3.5G or 3.99G.
 Later the full capability of LTE was realized. It provided a full 4G level of performance.
 The first deployments were simply known as LTE, but later deployments were designated 4G LTE Advanced.

6.1.2 Evolution from UMTS to LTE


 Since the inception of cell phone technologies, many mobile generations have been seen.
 The first generation was analog (FM) technology, which is no longer available.
 The second generation (2G) brought digital technology into this. Multiple incompatible 2G standards were developed.
Only two of them, GSM and IS-95A CDMA, have survived.
 Next, the third generation (3G) standards came into market. Again, multiple standards were developed, mainly
WCDMA by the 3GPP and cdma 2000 by Qualcomm. Both have survived and are still used today.
 The 3G standards were continually updated into what is known as 3.5G.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-2 Long Term Evolution of 3GPP

 WCDMA was upgraded to HSPA, and cdma 2000 was expanded with 1xRTT EV-DO releases A and B. Both are still
widely deployed.
 The Third Generation Partnership Project (3GPP), developed the widely used UMTS WCDMA/HSPA 3G standards. As a
4G successor to WCDMA, 3GPP developed Long-Term Evolution (LTE). Thus, LTE was created as an upgrade to the 3G
standards.
 Release 8 of LTE was completed in 2010, followed by release 9. Now, release 10 is also available which defines
 LTE-Advanced (LTE-A) is also under development.

g e
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 6.1.1 : Evolution from UMTS to LTE

Table 6.1.1 : Comparison of all 3G and 4G technologies

Technology WCDMA HSPA HSPA+ LTE LTE-A

Release Rel 99/4 Rel 5,6 Rel 7 Rel 8 Rel 9,10

Rollout 2003/4 2005-8 2009 2010 2014

Down link Rate 384Kbps 14 Mbps 28Mbps 150 Mbps 1Gbps

Uplink Rate 128 kbps 5,7 kbps 11Mbps 75M bps

Delay 150 ms 100 ms 50 ms 10 ms <10


Mobile Communication & Computing (MU-Sem. 7-Comp) 6-3 Long Term Evolution of 3GPP

6.2 SAE/LTE Architecture


6.2.1 SAE Requirements
 As the mobile communication generations evolved, radio interfaces also evolved.
 Soon it was realized that, the system architecture needs to be also evolved in order to support very high data rate and
low latency requirements for 3G LTE.
 Requirement of SAE architecture for LTE includes:
1. Flat architecture consisting of just one type of node, the base station, known as eNodeB in LTE.
2. Effective protocols for the support of packet-switched services.
3. Open interfaces and support of multivendor equipment interoperability.
4. Efficient mechanisms for operation and maintenance, including self-optimization functionalities
5. Support of easy deployment and configuration.

e
6.2.2 SAE Architecture

g
System Architecture Evolution (SAE) is a new network architecture designed to simplify LTE networks. It establish a flat
io led
architecture similar to other IP based communications networks.
 SAE uses an eNB and Access Gateway (aGW) and removes the RNC and SGSN from the equivalent 3G network
ic ow

architecture. This allows the network to be built with an “All-IP” based network architecture.
 SAE also includes entities to allow full inter-working with other related wireless technology (WCDMA, WiMAX, WLAN,
n
etc.). These entities can specifically manage and permit the non-3GPP technologies to interface directly with the
bl kn

network.
 The high-level network architecture of LTE is comprised of following three main components :
at
Pu ch

(i) The User Equipment (UE)


(ii) The Evolved UMTS Terrestrial Radio
Te

Access Network (E-UTRAN)


(iii) The Evolved Packet Core (EPC)

Fig. 6.2.1 : LTE reference model ( High level network architecture)

 The evolved packet core (EPC) provides the means to communicate with packet data networks in the outside world
such as the internet, private corporate networks or the IP multimedia subsystem.
 Between EU and E-UTRAN there is Uu interface,
 EPC is connected to E-UTRAN via S1 interface and to the outside world via SGi interface.

6.2.2(a) Evolved Packet System (EPS)


 EPS refers to the architecture of the LTE mobile standard.
 It includes the Evolved Packet Core (EPC), the Radio Networks (E-UTRAN), the End User Equipment (UE) and the
Services.
 EPS is based entirely on packet switching unlike legacy UMTS and GSM technologies that still use circuit switching .

6.2.2(b) The User Equipment (UE)


 UE is nothing but the mobile equipment.
 The internal architecture of the UE for LTE is identical to the one used by UMTS and GSM.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-4 Long Term Evolution of 3GPP

 The mobile equipment comprised of the following important modules:


o Mobile Termination (MT) : This handles all the communication functions.
o Terminal Equipment (TE) : This terminates the data streams.
o Universal Integrated Circuit Card (UICC) : This is also known as the SIM card for LTE equipment. It runs an
application known as the Universal Subscriber Identity Module (USIM).
 A USIM stores user-specific data very similar to 3G SIM card. This keeps information about the user's phone number,
home network identity and security keys etc.

6.2.2(c) The E-UTRAN


The architecture of evolved UMTS Terrestrial Radio Access Network (E-UTRAN) has been illustrated in Fig. 6.2.2.

g e
io led
ic ow
n
bl kn

Fig. 6.2.2 : Architecture of E-UTRAN


 The E-UTRAN handles the radio communications between the mobile equipment (ME) and the evolved packet core
at
Pu ch

(EPC). It contains only one component, the evolved base stations, called eNodeB or eNB.
 Each eNB is a base station that controls the mobiles in one or more cells.
Te

 The base station that is currently communicating with a mobile is known as its serving eNB.
 Each eBN connects with the EPC by means of the S1 interface.
 Two nearby base stations can be connected via the X2 interface, which is mainly used for signaling and packet
forwarding during handover.

6.2.2 (d) Evolved Packet Core (EPC) (The core network)


The architecture of Evolved Packet Core (EPC) is fully IP based has been illustrated in Fig. 6.2.3.

Fig. 6.2.3 : Basic EPS architecture


Mobile Communication & Computing (MU-Sem. 7-Comp) 6-5 Long Term Evolution of 3GPP

Evolved Packet Core (EPC) components


It contains following important components :
1. Serving GW
 The serving gateway (S-GW) acts as a router, and forwards data between the base station and the PDN gateway.
 It is also responsible for inter-eNB handovers in the U-plane.
 It provides mobility between LTE and other types of networks (such as between 2G/3G and P-GW).
 The SGW keeps context information such as parameters of the IP bearer and routing information, and stores the UE
contexts when paging happens.
 It is also responsible for replicating user traffic for lawful interception.
2. PDN GW
The PDN GW is the point of interconnect between the EPC and the external IP networks. PDN GW routes packets to
and from the PDNs. The functions of the PGW include :

e
 Policy enforcement

g
 Packet filtering
io led
 Charging support
 Lawful interception

ic ow

Packet screening
3. HSS
n
 The HSS (for Home Subscriber Server) is a database that contains user-related and subscriber-related information.
bl kn

 It is similar to - Home Location Register (HLR) and Authentication Centre (AuC) used in 3G networks.
at

4. MME
Pu ch

 The MME (for Mobility Management Entity) deals with the control plane.

Te

It handles the signaling related to mobility and security for E-UTRAN access. The MME is responsible for the tracking
and the paging of UE in idle-mode. It is the termination point of the Non-Access Stratum (NAS).
 Fig. 6.2.4 shows the entire SAE architecture.

Fig. 6.2.4 : LTE/SAE Architecture

6.3 Voice over LTE (VoLTE)


 VoLTE stands for Voice Over Long Term Evolution.
 It is a digital packet voice service that is delivered over IP via an LTE access network.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-6 Long Term Evolution of 3GPP

 When 3GPP started designing the LTE system, prime focus was to create a system which can achieve high data
throughput with low latency.
 LTE is an all IP network and the ability to carry voice was not given much importance. Therefore, for LTE networks to
carry traditional circuit switched voice calls, a different solution was required.
 This solution to carry voice over IP in LTE networks is commonly known as “VoLTE”. Basically VoLTE systems covert
voice into data stream, which is then transmitted using the data connection.
 VoLTE is based on the IMS(IP multimedia system).
 IMS is an architectural framework for delivering multimedia communications services such as voice, video and text
messaging over IP networks.
Voice over LTE - VoLTE basics
 VoLTE, Voice over LTE is an IMS (IP multimedia System) based technique.
 VoLTE enables the system to be integrated with the suite of other applications for LTE.

e
 To make implementation of VoLTE easy and cost effective to operators, cut down version of IMS network was defined.

g
This not only reduced the number of entities required in the IMS network, but it also simplified the interconnectivity.
io led
 This considerably reduced the costs for network operators as this had been a major issue for acceptance of IMS. The
reduced IMS network for LTE has been shown in Fig. 6.3.1.
ic ow
n
bl kn

Fig. 6.3.1 : Reduced IMS network for VoLTE


at
Pu ch

The entities within the reduced IMS network used for VoLTE are explained below :
(i) IP-CAN IP, Connectivity Access Network : This consists of the EUTRAN and the MME.
Te

(ii) P-CSCF, Proxy Call State Control Function : The P-CSCF is the user to network proxy. All SIP signaling to and from the
user runs via the P-CSCF whether in the home or a visited network.
(iii) I-CSCF, Interrogating Call State Control Function : The I-CSCF is used for forwarding an initial SIP request to the
S-CSCF. When the initiator does not know which S-CSCF should receive the request.
(iv) S-CSCF, Serving Call State Control Function : The S-CSCF performs a variety of actions within the overall system, and it
has a number of interfaces to enable it to communicate with other entities within the overall system.
(v) AS, Application Server : It is the application server that handles the voice as an application.
(vi) HSS, Home Subscriber Server : The IMS HSS or home subscriber server is the main subscriber database used within
IMS. The IMS HSS provides details of the subscribers to the other entities within the IMS network, enabling users to be
granted access or not dependent upon their status.
The IMS calls for VoLTE are processed by the subscriber's S-CSCF in the home network. The connection to the S-CSCF is
via the P-CSCF.
Benefits of VoLTE
The implementation of VoLTE offers many benefits, both in terms of cost and operation.
VoLTE provides following benefits :
 Provides a more efficient use of spectrum than traditional voice;
 Meets the rising demand for richer, more reliable services;
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-7 Long Term Evolution of 3GPP

 Eliminates the need to have voice on one network and data on another;
 Can be deployed in parallel with video calls over LTE and multimedia services, including video share, multimedia
messaging, chat and file transfer;
 Ensures that video services are fully interoperable across the operator community, just as voice services are,
 Increases handset battery life by 40 % (compared with VoIP);
 Provides rapid call establishment time.

6.4 Introduction to LTE-Advanced


 LTE Advanced adds a number of additional capabilities to the basic LTE to provide very much higher data rates and
much better performance.
 LTE provides improved performance particularly at cell edges and other areas where performance would not normally
have been so good.

e
6.4.1 LTE Advanced Key Features

g
The main aims for LTE Advanced :
io led
 Peak data rates : Downlink - 1 Gbps; uplink - 500 Mbps.
 Spectrum efficiency : 3 times greater than LTE.

ic ow

Peak spectrum efficiency : Downlink - 30 bps/Hz; uplink - 15 bps/Hz.


 Spectrum use : The ability to support scalable bandwidth use and spectrum aggregation where non-contiguous
n
spectrum needs to be used.
bl kn

 Latency : From Idle to Connected in less than 50 ms.


 Cell edge user throughput to be twice that of LTE.
at
Pu ch

 Average user throughput to be 3 times that of LTE.


 Mobility : Same as that in LTE
Te

 Compatibility : LTE Advanced shall be capable of interworking with LTE and 3GPP legacy systems.
These are many of the development aims for LTE Advanced.

6.4.2 LTE - Advanced : System Aspects


 The main new functionalities introduced in LTE-Advanced are;
o Carrier Aggregation (CA)
o Enhanced use of multi-antenna techniques (MIMO)
o Support for Relay Nodes (RN)
 LTE-Advanced is the all IP based cellular networks that can offer higher user data rates and lower latency.
 In LTE-Advanced lower latency can be achieve by adopting terminal state of being idle or active. This can significantly
reduce control plane latency and signaling compare to earlier generation.
 Higher user data rates can be achieved by adopting several techniques including: MIMO support, Modulation
techniques like OFDM, bandwidth flexibility, and the support of FDD (Frequency Division Duplex) and TDD (Time
Division Duplex) modes of operation.

6.4.2(a) Carrier Aggregation


 The increase in bandwidth in LTE-Advanced is achieved through aggregation of carriers. Carrier aggregation can be
used for both FDD and TDD.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-8 Long Term Evolution of 3GPP

 Each aggregated carrier is referred to as a ‘component carrier’. The component carrier can have a bandwidth of 1.4, 3,
5, 10, 15 or 20 MHz.
 Maximum of five component carriers can be aggregated, hence the maximum bandwidth is 100 MHz.
 The number of aggregated carriers can be different in DownLink and UpLink; however the number of UpLink
component carriers is never larger than the number of DownLink component carriers.

g e
io led
ic ow
n
bl kn
at
Pu ch

Fig. 6.4.1 : Carrier aggregation


 There are two types of carrier aggregation: continuous and non-continuous.

Te

In continuous aggregation, contiguous component carriers within the same operating frequency band are aggregated
so called intra-band contiguous.
 For non-contiguous allocation it could either be intra-band, (i.e. the component carriers belong to the same operating
frequency band, but are separated by a frequency gap) or it could be inter-band, in which case the component carriers
belong to different operating frequency bands (Refer Fig. 6.4.2)

Fig. 6.4.2 : Intra and Inter band carrier aggregation


 For each component carrier there is a one serving cell.
 The coverage of the serving cells may differ due to the component carrier frequencies.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-9 Long Term Evolution of 3GPP

 The RRC connection is handled by one cell called the Primary serving cell, served by the Primary component carrier.
 The other component carriers are all referred to as Secondary component carrier serving the Secondary serving cells.

6.4.2(b) MIMO (Multiple Input and Multiple Output)


MIMO is used to increase the overall bitrate through transmission of two or more different data streams on two or
more different antennas.

Fig. 6.4.3 : MIMO


A major change in LTE-Advanced is the introduction of 8x8 MIMO in the Down Link and 4x4 in the Up link.

e
6.4.2(c) Relay Nodes

g
 In LTE-Advanced, the heterogeneous network planning i.e. a mix of large and small cells is possible through Relay
io led
Nodes (RNs).
 The Relay Nodes are low power base stations that provides enhanced coverage and capacity at cell edges. It also
serves as hot-spot areas and it can also be used to connect to remote areas without fiber connection.
ic ow

 The Relay Node is connected to the Donor eNB (DeNB) via a radio interface, Un.
n
 Un is a modification of the E-UTRAN air interface Uu.
bl kn

 In the Donor cell the radio resources are shared between UEs served directly by the DeNB and the Relay Nodes.
 When the Uu and Un use different frequencies the Relay Node is referred to as a Type 1a RN
at
Pu ch

 When Uu and Un uses the same frequencies, it is called Type 1 RN.


 In case of Type 1RN, there is a high risk for self interference in the Relay Node, when receiving on Uu and transmitting
Te

on Un at the same time (or vice versa). This can be avoided through time sharing between Uu and Un, or having
different locations of the transmitter and receiver.

f=f, inband, type 1 Relay Node – risk for self interference


f f, outband, type 1a Relay Node
Fig. 6.4.4 : Network extension using Relay Node

 Fig. 6.4.4 shows the Relay Node (RN) is connected to the DeNB via the radio interface Un. UEs at the edge of the donor
cell are connected to the RN via Uu, while UEs closer to the DeNB are directly connected to the DeNB via the Uu
interface. The frequencies used on Un and Un can be different, outband, or the same, inband.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-10 Long Term Evolution of 3GPP

6.4.2(d) Coordinated Multipoint (CoMP)

One of the key issues with many cellular systems is that of poor performance at the cell edges. To improve the
performance at cell edges, LTE-Advanced introduces coordinated multipoint (CoMP) scheme.
In CoMP there are two important components :
1. TX (Transmit) points
2. RX (Receive) Points
 A number of TX points provide coordinated transmission in the DL (DownLink).
 Similarly a number of RX points provide coordinated reception in the UL (UpLink).
 A TX/RX-point constitutes of a set of co-located TX/RX antennas providing coverage in the same sector.
 The set of TX/RX-points used in CoMP can either be at different locations, or co-sited but providing coverage in

e
different sectors. They can also belong to the same or different eNBs.

g
 In Fig. 6.4.5 two simplified examples for DL CoMP is shown.
io led
ic ow
n
bl kn

(a)
at
Pu ch
Te

(b)

Fig. 6.4.5 : Down Link CoMP (a) Joint Transmission (b) Dynamic point selection

 In both these cases Down link (DL) data is available for transmission from two TX-points. When two, or more,
 TX-points, transmit on the same frequency in the same subframe it is called Joint Transmission.
 When data is available for transmission at two or more TX-points but only scheduled from one TX-point in each
subframe it is called Dynamic Point Selection.
 In case of Uplink (UL) CoMP, there is a Joint Reception i.e. a number of RX-points receive the UL data from one UE, and
the received data is combined to improve the quality.
 When CoMP is used additional radio resources for signaling is required e.g. to provide UE scheduling information for
the different DL/UL resources.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-11 Long Term Evolution of 3GPP

6.4.3 LTE Advanced Architecture


6.4.3(a) Architecture

g e
io led
ic ow
n
bl kn

Fig. 6.4.6 : LTE Advanced architecture


at


Pu ch

The Fig. 6.4.6 depicts LTE Advanced (LTE-A) Architecture for E-UTRAN.
 It consists of P-GW, S-GW, MME, S1-MME, eNB, HeNB, HeNB-GW and Relay Node etc. Following are the functions of
these architecture entities.
Te

P-GW
 It stands for PDN Gateway.
 It interfaced with S-GW using S5 interface and with operator's IP services using SGi interface.
 It has connectivity with PCRP using Gx interface.
 It connects UE to packet data networks.
 P-GW assigns IP address to the UE. One UE can have connectivity with more than one PGWs in order to have access to
multiple PDNs.
 It takes care of packet filtering, policy enforcement and charging related services. Moreover it fulfils connectivity
between 3GPP (LTE, LTE-A) and non 3GPP (WiMAX, CDMA etc.) technologies.
S-GW
 It stands for Serving Gateway.
 It interfaces with MME using S11 interface and with SGSN using S4 interface.
 It connects with PDN-GW using S5 interface as mentioned above.
 EPC gets terminated at this node/entity. It is connected with E-UTRAN via S1-U interface.
 Each UE in LTE-A is associated to unique S-GW which has several functions.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-12 Long Term Evolution of 3GPP

 It helps in inter-eNB handover as well as inter-3GPP mobility.


 It helps in inter-operator charging. It does packet routing and packet forwarding.
MME
 It stands for Mobility Management Entity.
 It is major control plane element in LTE advanced architecture.
 It takes care of authentication, authorization and NAS signaling related security functions.
 It takes care of selecting either S-GW or PDN-GW or P-GW.
S1-MME
It provides connectivity between EPC and eNBs.
eNB
 It is main building block or system in LTE-A.

e
 It provides interface with UEs or LTE-A phones.

g
 It has similar functionality as base station used in GSM or other cellular systems.
io led
 Each of the eNBs serve one or several E-UTRAN cells. Interface between two eNBs is known as X2 interface.
HeNB

ic ow

It stands for Home eNodeB or Home eNB.


 It is known as Fem to cell.
n
 It is used to improve coverage in the indoor region of office or home premises.
bl kn

 It can be interfaced directly to EPC or via Gateway.


at

HeNB-GW
Pu ch

 It provides connectivity of HeNB with S-GW and MME.



Te

It aggregates all the traffic from number of Home eNBs to core network.
 It uses S1 interface to connect with HeNBs.
Relay Node :
It is used for improving network performance.

6.4.3(b) Comparison of LTE and LTE-A


 Both the LTE and LTE-Advanced are fourth generation wireless technologies designed to use for high speed broadband
internet access.
 The specifications are published by 3rd Generation Partnership Project (3GPP).
 LTE is specified in 3GPP release 8 and LTE Advanced is specified in 3GPP release 10.
 LTE is the short form of Long Term Evolution. It uses FDD and TDD duplex modes for the UEs to communicate with the
eNodeB. The LTE uses OFDMA modulation in the downlink (from eNodeB to UEs) and SC-FDMA modulation in the
uplink. Various physical channels and logical channels are designed to take care of data as well as control information.
It supports peak data rate of 300MBPS in the downlink and 75MBPS in the uplink (theoretically).
 TE-Advanced is the upgraded version of LTE technology to increase the peak data rates to about 1GBPS in the
downlink and 500MBPS in the uplink. In order to increase the data rates LTE-Advanced utilizes higher number of
antennas and added carrier aggregation feature.
 Table 6.4.2 summarizes the key differences between LTE and LTEA.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-13 Long Term Evolution of 3GPP

Table 6.4.2 : Difference between LTE and LTEA

Specifications LTE LTE Advanced


Standard 3GPP Release 9 3GPP Release 10
Bandwidth Supports 1.4MHz, 3.0MHz, 5MHz, 10MHz, 70MHz Downlink(DL), 40MHz
15MHz, 20MHz Uplink(UL)
Data rate 300 Mbps Downlink(DL) 4x4MIMO and 20MHz, 1Gbps Downlink(DL), 500 Mbps
75 Mbps Uplink(UL) Uplink(UL)
Theoretical Throughput About 100Mbps for single chain 2 times than LTE
(20MHz,100RB,64QAM), 400Mbps for 4x4
MIMO. 25% of this is used for control/signaling
(OVERHEAD)
Maximum No. of Layers 2(category-3) and 4(category-4,5) in the 8 in the downlink, 4 in the uplink
downlink, 1 in the uplink

e
Maximum No. of 2 in the downlink, 1 in the uplink 2 in the downlink, 2 in the uplink

g
codewords
io led
Spectral 16.3 for 4x4 MIMO in the downlink, 4.32 for 30 for 8x8 MIMO in the downlink, 15
Efficiency(peak,b/s/Hz) 64QAM SISO case in the Uplink for 4x4 MIMO in the Uplink
PUSCH and PUCCH Simultaneously not allowed Simultaneously allowed
ic ow

transmission
n
Modulation schemes QPSK, 16QAM, 64QAM QPSK, 16QAM, 64QAM
bl kn

supported
Access technique OFDMA (DL),DFTS-OFDM (UL) Hybrid OFDMA(DL), SC-FDMA(UL)
at
Pu ch

Carrier aggregation Not supported Supported


Applications Mobile broadband and VOIP Mobile broadband and VOIP
Te

6.4.4 LTE Protocol Stack

Fig. 6.4.7 : LTE Protocol stack


Mobile Communication & Computing (MU-Sem. 7-Comp) 6-14 Long Term Evolution of 3GPP

 Fig. 6.4.7 depicts LTE protocol stack. It is divided into two main parts - NAS (Non-Access Stratum) and AS (Access
Stratum).
 Further it is categorized into control plane and user plane.
 User plane of eNB consists of PHY, MAC, RLC and PDCP layers.
 Control plane of eNB consists of these 4 layers and in addition RRC layer also.
Following are functions of each layer.
PHY
 This layer takes care of frame formation as per TDD or FDD topology and as per OFDMA structure.
 Moreover, it takes care of modulation and coding of different control and traffic channels.
 It covers scrambling and codeword to layer mapping functionalities.
 It incorporates reference signals which are used for channel estimation and channel equalization.
MAC-Medium Access Control

e
It takes care of following functions :

g
 Multiplexing/demultiplexing of RLC Packet Data Units (PDUs).
io led
 Scheduling information reporting.
 Error correction through Hybrid ARQ (HARQ).
 Local Channel Prioritization.
ic ow

 Padding.
n
RLC-Radio Link Control
bl kn

 Error correction through Automatic Repeat reQuest (ARQ).


 Segmentation according to the size of the transport block and re-segmentation in case a retransmission is needed.
at
Pu ch

 Concatenation of SDUs for the same radio bearer.


 Protocol error detection and recovery.
Te

 In-sequence delivery.
PDCP-Packet Data Convergence Protocol
 Header compression.
 In-sequence delivery and retransmission of PDCP Session Data Units (SDUs).
 Duplicate detection.
 Ciphering and integrity protection.
RRC-Radio Resource Control
 Broadcast system information related to Non-Access Stratum (NAS) and Access Stratum (AS).
 Establishment, maintenance, and release of RRC connection.
 Security functions including key management.
 Mobility functions.
 QoS management functions.
 UE measurement reporting and control of the reporting.
 NAS direct message transfer between UE and NAS.
NAS-Non Access Stratum
Connection/session management between UE and the core network.
 Authentication.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-15 Long Term Evolution of 3GPP

 Registration.
 Bearer context activation/deactivation.
 Location registration management.

6.5 Higher Protocol Layers


Higher layer protocols include :
(i) Radio Link Control - RLC
(ii) Packet Data Convergence Protocol - PDCP and
(iii) Radio Resource Control - RRC

6.5.1 Radio Link Control (RLC)


 RLC – Radio Link Control protocol is a data link layer protocol (Layer 2 protocol).
 An RLC entity receives/delivers RLC SDUs from/to upper layer and sends/receives RLC PDUs to/from its peer RLC entity

e
via lower layers.

g
 If RLC entity configured at the eNB, there is a peer RLC entity configured at the UE and vice versa. (Fig 6.5.1 (b)) RLC
performs following major functions :
io led
o Error correction through Automatic Repeat reQuest (ARQ).
o Segmentation according to the size of the transport block and re-segmentation in case a retransmission is
ic ow

needed.
o Concatenation of SDUs for the same radio bearer.
n
o Protocol error detection and recovery.
bl kn

o In-sequence delivery.
RLC Modes :
at
Pu ch

An RLC entity can be configured to perform data transfer in one of the following three modes.
1. Transparent Mode (TM)
Te

 As the name suggests the Transparent mode entity in RLC does not add any overhead to the upper layer SDUs.
 The entity just transmits the SDUs coming from upper layer to MAC.
In this mode :
o Segmentation or reassembly of RLC SDUs is not allowed
o No RLC headers are added.
o Does not guarantees delivery
 RLC TM is used for transmission of paging messages on PCCH, system information transmitted on BCCH and SRB0
messages transmitted on CCCH.
2. Unacknowledged Mode (UM)
RLC Unacknowledged Mode is used for transmission of delay sensitive packets, such as VoIP packets or audio/video
streams.
In this mode :
o Segmentation or reassembly of RLC SDUs is allowed
o RLC headers are added.
o Does not guarantees delivery
o This mode is suitable for carrying streaming traffic.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-16 Long Term Evolution of 3GPP

3. Acknowledged Mode (AM)


RLC AM is used both in user plane and control plane packets. But in both the cases PDCP is the upper layer. So all the
SDUs which come to RLC AM entity are security protected.
In this mode :
o Segmentation or reassembly of RLC SDUs is allowed
o RLC headers are added.
o Guarantees In-sequence delivery of SDUs. It supports HARQ mechanism to retransmit lost PDUs.
o This mode is suitable for carrying TCP traffic.
RLC PDU (Protocol Data Unit)
 RLC PDUs can be categorized into RLC data PDUs and RLC control PDUs.
 RLC data PDUs are used by TM, UM and AM RLC entities to transfer upper layer PDUs (i.e. RLC SDUs).
 RLC control PDUs are used by AM RLC entity to perform ARQ procedures.

e
6.5.2 Packet Data Convergence Protocol (PDCP)

g
io led
The PDCP layer is located above the RLC layer and below the IP layer (in the user plane) or the RRC layer (in the
control plane).
 PDCP is a kind of interface between inside world and outside world.
ic ow

 In other words, the data coming into the eNB first go through PDCP and then gets into RLC (Downlink). Data waiting in
RLC trying to go out to the outside world has to go through PDCP to reach outside world(Uplink Path)
n
The major functions of PDCP layer
bl kn

The major functions of PDCP layer are as follows.


at

o Header compression
Pu ch

o In-sequence delivery and retransmission of PDCP Session Data Units (SDUs)


o
Te

Duplicate detection
o Ciphering and integrity protection

Fig. 6.5.1 : PDCP layer, structure view


 PDCP is directly connected to RLC Layer (RLC UM and RLC AM). Note that PDCP has no connection to RLC TM mode,
meaning RLC TM mode data does not go through PDCP.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-17 Long Term Evolution of 3GPP

 Fig. 6.5.2 gives the complete functional overview of the PDCP

g e
io led
ic ow
n
bl kn
at
Pu ch
Te

Fig. 6.5.2 : Functional overview of PDCP

6.5.3 Radio Resource Control (RRC)


 The RRC is the highest layer in the control plane of the Access Stratum (AS).
 The RRC layer controls communications between a UE and an eNB at the radio interface and the mobility of a UE
crossing cells.
 The RRC also transfers messages of the Non-Access Stratum (NAS), which is located above the RRC layer.
 NAS messages are used to control communications between a UE and the Evolved Packet Core (EPC).
The main services and functions of the RRC sublayer include :
 Broadcast of System Information related to the non-access stratum (NAS)
 Broadcast of System Information related to the access stratum (AS)
 Paging
 Establishment, maintenance and release of an RRC connection between the UE and E-UTRAN
 Security functions including key management
 Establishment, configuration, maintenance and release of point to point Radio Bearers
 Mobility functions
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-18 Long Term Evolution of 3GPP

 QoS management functions


 UE measurement reporting and control of the reporting
 NAS direct message transfer to/from NAS from/to UE.

6.6 LTE MAC Layer


As discussed earlier the MAC layer of LTE performs following functions.
 Error correction through Hybrid ARQ (HARQ).
 Logical channel to transport channel mapping
 Logical Channel Prioritization.
 Scheduling information reporting.
 Multiplexing/demultiplexing of RLC Packet Data Units (PDUs).

6.6.1 Error Correction through Hybrid ARQ

g e
 The Hybrid Automatic Repeat-reQuest (HARQ) process is done in combination between the MAC and the PHY layer.
io led
 The PHY performs the retention and re-combination and the MAC performs the management and signaling.
 The MAC indicates a NACK whenever there’s a transport block (TB) CRC failure; the PHY usually indicates that failure.
 Retransmission is done by the eNodeB or the sender on the downlink using a different type of coding.
ic ow

 The coding is sent and maintained in buffers in the eNodeB. Eventually, after one or two attempts, there will be
n
enough data to reconstruct the signal.
bl kn

 In HARQ operation, the retransmission does not have to be fully correct. It has to be correct enough that it can be
combined mathematically with the previous transport block (TB) in order to produce a good transport block.
at
Pu ch

These are the basic steps of the HARQ process :


1. MAC sends “NACK” message when transport block (TB) fails CRC check.
Te

2. Transport blocks with errors are retained.

3. PHY retransmits with different puncturing code


4. Retransmission is combined with saved transport block(s)

5. When correct transport block is decoded, MAC signals “ACK”

6. Multiple HARQ processes can run in parallel to retry several outstanding TBs.

6.6.2 Logical Channels to Transport Channel Mapping


 Logical channels exist at the top of the MAC. Types of logical channels include control channels (for control plane
data) and traffic channels (for user plane data)
 Transport channels are in the transport blocks at the bottom of the MAC. They represent data transfer services
offered by the PHY and are defined by how the information is carried, different physical layer modulations and the
way they are encoded. Figure 3.2
 When a valid transport block is available from the HARQ process, the transport channels are mapped to logical
channels.
 Fig. 6.6.1 shows the mapping of logical channels to transport channels.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-19 Long Term Evolution of 3GPP

g e
io led
Logical Channels Transport Channels
o PCCH : Paging Control Channel o PCH : Paging Channel
o BCCH : Broadcast Control Channel o BCH : Broadcast Channel
ic ow

o CCCH : Common Control Channel o DL-SCH : Downlink Shared Channel


o DCCH : Dedicated Control Channel o MCH : Multicast Channel
n
o DTCH : Dedicated Traffic Channel
bl kn

o MCCH : Multicast Control Channel


o MTCH : Multicast Traffic Channel
at
Pu ch

Fig. 6.6.1 : Logical channels to Physical channel mapping for Down link

 Fig. 6.6.1 shows the physical layer control channel at the bottom of the picture.
Te

 It is used for scheduling, signaling and other low-level functions.


 The downlink shared channel contains both a transport channel for paging and for downlink. The physical broadcast
channel goes all the way through for broadcast.
 Multicast channels are grayed out in Fig. 6.6.1 because they are not being specified in Release 8 of the LTE standard.
These channels will be re-addressed in Release 9.
Fig. 6.6.1 illustrates the following logical channels :
(i) Dedicated Traffic Channel (DTCH) : A point-to-point channel, dedicated to one UE, for the transfer of user
information. A DTCH can exist in both uplink and downlink.

(ii) Broadcast Control Channel (BCCH) : A downlink channel for broadcasting system control information.

(iii) Paging Control Channel (PCCH) : A downlink channel that transfers paging information. This channel is used
when the network does not know the location cell of the UE.

(iv) Common Control Channel (CCCH) : Uplink channel for transmitting control information between UEs and
network. This channel is used by the UEs having no RRC connection with the network.

(v) Dedicated Control Channel (DCCH) : A point-to-point bi-directional channel that transmits dedicated control
information between a UE and the network. Used by UEs that have an RRC connection.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-20 Long Term Evolution of 3GPP

6.6.3 Logical Channel Prioritization


 When the radio resources for a new transmission are allocated, the logical channel prioritization entity instructs the
multiplexing and de-multiplexing entity to generate MAC PDUs from the MAC SDUs.
 The logical channel prioritization entity also decides how much data from each configured logical channel should be
included in each MAC PDU whenever radio resource for a new transmission is available.

6.6.4 Scheduling
 Scheduling is a process through which eNodeB decides which UEs should be given resources (RBs), how much resource
(RBs) should be given to send or receive data.
 In LTE, scheduling is done at per subframe basis i.e. every 1 mili second.
 Resources are composed of Physical Resource Blocks (PRB) and Modulation Coding Scheme (MCS).
 The MCS determines the bit rate, and thus the capacity, of PRBs.

e
An LTE scheduler performs following function for efficient scheduling :

g
(i) Link Adaptation : It selects the optimal combination of parameters such as modulation, channel Coding and
transmit schemes.
io led
(ii) Rate Control : It is in charge of resource allocation among radio bearers of the same UE which are available at the
eNB for DL and at the UE for UL.
ic ow

(iii) Packet Scheduler : It controls access to air interface resources amongst all active Users.
n
(iv) Resource Assignment : It allocates air interface resources to selected active users on per TTI basis.
bl kn

(v) Power Control : Provides the desired SINR level for achieving the desired data rate, but also controls the
interference to the neighbouring cells.
at
Pu ch

(vi) HARQ (ARQ + FEC) : It allows recovering from residual errors by link adaptation.

6.7 PHY Layer


Te

6.7.1 Generic Frame Structure


 The LTE specifications define both FDD and TDD modes of operation.
 The generic frame structure shown in Fig. 6.7.1 applies to both the DL and UL for FDD operation.

Fig. 6.7.1 : LTE Generic Frame Structure

 In OFDMA, users are allocated a specific number of subcarriers for a predetermined amount of time. These are
referred to as physical resource blocks (PRBs) in the LTE specifications.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-21 Long Term Evolution of 3GPP

 PRBs thus have both a time and frequency dimension.


 Allocation of PRBs is handled by a scheduling function at eNodeB.
 LTE transmissions are segmented into frames, which are 10 msec in duration.
 One frames consist of 20 slot periods of 0.5 msec.
 Sub-frames contain two slot periods and are 1.0 msec in duration.
Downlink
 The LTE PHY specification accommodates bandwidths from 1.25 MHz to 20 MHz.
 The basic modulation scheme is OFDM which is very robust in the presence of severe multipath fading.
 Downlink multiplexing is accomplished via OFDMA.
 The DL supports physical channels, which convey information from higher layers in the LTE stack.
 Physical channels map to transport channels, which are service access points (SAPs) for the L2/L3 layers.

e
 Depending on the assigned task, physical channels and signals use different modulation and coding parameters.

g
6.7.2 Downlink Multiplexing
io led
 OFDMA is the basic multiplexing scheme employed in the LTE downlink.
 In OFDMA, groups of 12 adjacent subcarriers are grouped together on a slot-by-slot basis to form physical resource
ic ow

blocks (PRBs).
 A PRB is the smallest unit of bandwidth assigned by the base station scheduler.
n
bl kn

6.7.3 Physical Channels

 Three different types of physical channels are defined for the LTE downlink.
at
Pu ch

 LTE DL physical channels are :


o Physical Downlink Shared Channel (PDSCH)
Te

o Physical Downlink Control Channel (PDCCH)


o Common Control Physical Channel (CCPCH)
 Physical channels are mapped to specific transport channels.
 Transport channels are SAPs for higher layers.
 Each physical channel has defined algorithms for: Bit scrambling , Modulation, Layer mapping , CDD precoding ,
Resource element assignment Layer mapping and pre-coding are related to MIMO applications.

6.7.4 Transport Channels


Transport channels are included in the LTE PHY and act as service access points (SAPs) for higher layers.
Downlink Transport channels
1. Broadcast Channel (BCH)
 Fixed format
 Must be broadcast over entire coverage area of cell
2. Downlink Shared Channel (DL-SCH)
 Supports Hybrid ARQ (HARQ)
 Supports dynamic link adaption by varying modulation, coding and transmit power
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-22 Long Term Evolution of 3GPP

 Suitable for transmission over entire cell coverage area


 Suitable for use with beam forming
 Support for dynamic and semi-static resource allocation
 Support for discontinuous receive (DRX) for power save
3. Paging Channel (PCH)
 Support for UE DRX
 Requirement for broadcast over entire cell coverage area
 Mapped to dynamically allocated physical resources
4. Multicast Channel (MCH)
 Requirement for broadcast over entire cell coverage area
 Support for MB-SFN

e
Support for semi-static resource allocation

g
6.7.5 Mapping Downlink Physical Channels to Transport Channels
io led
Transport channels are mapped to physical channels as shown in Fig. 6.7.2 Supported transport channels are :
1. Broadcast channel (BCH)
ic ow

2. Paging channel (PCH)


3. Downlink shared channel(DL-SCH)
n
4. Multicast channel (MCH)
bl kn

Transport channels provide the following functions :


at

 Structure for passing data to/from higher layers


Pu ch

 Mechanism by which higher layers can configure the PHY



Te

Status indicators (packet error, CQI etc.) to higher layers


 Support for higher-layer peer-to-peer signaling

6.8 Self Organizing Network (SON-LTE)

 SON stands for Self Organizing Network.


 It means that just add an eNB wherever you want to put and just connect power and switch on, it would configure all
of its configuration by itself and makes itself ready for service.
 SON is like a 'Plug-and-Play' functionality.
Normally when a system operator constructs a network, they go through following steps.
(i) Network Planning
(ii) Bring the hardware (e.g., eNB) to the locations determined at Network Planning Process
(iii) Hardware installation
(iv) Basic configuration
(v) Optimizing parameters
 The main goal of SON is to automate large portions of human efforts involved in above mentioned process.
 In a more general way SON frame work can be illustrated in Fig. 6.8.1.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-23 Long Term Evolution of 3GPP

g e
io led
ic ow

Fig. 6.8.1 : SON Framework

SON Architectures
n
bl kn

 The self-organization functionality can be located at one place even split in different nodes.
 Self-Optimization algorithms can be located in OAM or eNB or both of them.
at
Pu ch

 According to the location of optimization algorithms, SON can be divided into the three main architectures:
1. Centralized SON
Te

2. Distributed SON
3. Hybrid SON
 The all three versions differ with respect to data acquisition, data processing and configuration management.
1. Centralized SON

 In Centralized SON, optimization algorithms are stored and executed from the OAM System. Here, the SON
functionality resides in a small number of locations, at a high level in the architecture.
 Fig. 6.8.2 shows an example of Centralized SON. Here, all SON functions are located in OAM systems, so it is easy to
deploy them but does not support those simple and quick optimization cases.
 To implement Centralized SON, existing Northbound Interface (Itf-N), which is the interface between the Element
Manager and the Network Manager, needs to be extended.
 Also, as the number of nodes in the network increases, computational requirements will also increase, which might
cause problems in scalability.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-24 Long Term Evolution of 3GPP

g e
Fig. 6.8.2 : Centralized SON
io led
2. Distributed SON
 In Distributed SON, optimization algorithms are executed in eNBi. SON functionality resides in many locations at a
ic ow

relatively low level in the architecture.


 This increases the deployment efforts.
n
 Fig. 6.8.3 shows an example of Distributed SON. When this architecture is implemented in large number of nodes, it
bl kn

has to be ensured that there is a coordination between them so that the network as a whole is optimised.
at
Pu ch
Te

Fig. 6.8.3 : Distributed SON

3. Hybrid SON
 In Hybrid SON, part of the optimization algorithms are executed in the OAM system, while others are executed in eNB.
 Fig. 6.8.4 shows an example of Hybrid SON.
 In Hybrid SON, simple and quick optimization schemes are implemented in eNB and complex optimization schemes
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-25 Long Term Evolution of 3GPP

are implemented in OAM so as to provide flexibility to support different kinds of optimization cases.
 But on the other hand, it costs lots of deployment effort and interface extension work.

g e
io led
Fig. 6.8.4 : Hybrid SON
ic ow

6.9 SON for Heterogeneous Networks (HetNet)


n
bl kn

 It is assumed that there will be 50 billion connected devices by 2020. Demands for higher data rates continues to
increase.
at


Pu ch

High-quality video streaming, social networking and M2M communication over wireless networks are growing
exponentially.
 Hence, a new paradigm called heterogeneous networks (HetNet) are being considered by network operators.
Te

 HetNet stands for Heterogeneous Network, which involves a mix of radio technologies, different cell types, distributed
antenna systems, and WiFi working together seamlessly.
The HetNet involves several aspects :
o Use of multiple radio access technologies
o Operation of different cell sizes
o Backhaul
Multiple Size cells
HetNet introduces two main types of cells : Small cells and Macro cells.
1. Small cells :
 Small cells have smaller coverage and capacity and are of three types. Micro , Pico and Femto cells. (Listed as in order
of decreasing base station power).
 The idea of merging small cells with the macro cell network has the advantage of offloading traffic from the macro cell
sites to the smaller cells while the macro cell operates at its normal capacity.
 Table 6.9.1 compared all the cells based on certain characteristics.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-26 Long Term Evolution of 3GPP

Table 6.9.1 : Properties of different cells

Characteristics Femto Pico Micro Macro


Indoor/Outdoor Indoor Indoor or out door Out door Outdoor
Number of users 4 to 16 32 to 100 200 200 to 1000++
Maximum output power 20 to 100mW 250 mW 2 to 10 W 40 to 100 W
Maximum cell radius 10 to 50 m 200 m 2km 10 to 40 km
Bandwidth 10 MHz 20 MHz 20 to 40 MHz 60 to 75 MHz
Technology 3G/4G/WiFi 3G/4G/WiFi 3G/4G/WiFi 3G/4G
Backhauls DSL, Cable, fiber Microwave, millimeter wave Fiber, Microwave Fiber, Microwave
 Small cells are deployed in hotspots to increase capacity. Hotspots are the areas where user density is more. They are
also deployed to fill in the areas not covered by the macro network (E.g. cell edges) – both out doors and indoors.
 These small cells can also be deployed within the user premises, residential or official, thereby bringing the network

e
closer to the customer.

g
(i) Microcells
io led
 Microcells, typically cover smaller areas maybe up to a kilometre.
 They usually transmit within a range of milliwatts to a few watts.
 Microcells are deployed for providing temporary cellular coverage and capacity to places like sports stadiums,
ic ow

convention centres etc.



n
Sometimes, microcells may use distributed antenna systems (DAS) to improve bandwidth and reliability.
bl kn

(ii) Pico Cells


 Pico cells are deployed on the macro cell edges or hotspots to improve coverage or throughput.
at
Pu ch

 Pico sells are open to all User Equipments (UEs)


 Pico sells can be used for both indoor and outdoor purpose.
Te

 This coverage area is around 200m. And us usually they served around 32 to 100 users.
(iii) Femto Cells
 Femto cells are typically user-installed to improve coverage area within a small vicinity, such as home office or a
dead zone within a building.
 Femto cells can be obtained through the service provider or purchased from a reseller.
 Femto cells are open to specific UEs – called CSG (Closed Subscription group) .
 A UE close to femto can’t connect to femto if it is not in CSG. In that case it connects to macro instead.
 Femto cell usually serves to 4 to 16 users.
 Its coverage area is 10 to 50 m.
2. Macro cells
Macro cells have large coverage and capacity and are controlled by High power base stations. These are the cells
which have been traditionally used in all cellular systems.
Base stations in HetNets
 Heterogeneous networks consist of different types of base stations supporting different types of cells such as Macro,
Micro, Pico and Femto cells.
o Macro cells are controlled by High Power eNBs.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-27 Long Term Evolution of 3GPP

o Small Cells (Micro, Pico and Femto) are controlled by Low power eNBs. Low Power nodes include micro, pico,
Remote Radio Heads (RRH), relay nodes and femto nodes.
 These can use the same or different technologies.
 In LTE networks, the actual cell size depends not only on the eNodeB power but also on antenna position, as well as
the location environment; e.g. rural or city, indoor or outdoor etc.
Different nodes, for small cells, used in LTE/LTE-A HetNets are listed below :
1. Home eNodeB (HeNB)
 These nodes are used to form Femto cells.
 It is a low power eNodeB which is mainly used to provide indoor coverage, for Closed Subscriber Groups (CSG).
For example, in office premises.
 HeNBs are privately owned and deployed without coordination with the macro-network.
2. Relay Node (RN)

e
 Relay 4 interface Uu.
3. RRHs (Remote Radio Head)
g
io led
 RRH is connected to an eNB via fibre can also be used to provide small cell coverage.
 It is an alternative solution to a BTS housed in a shelter at the bottom of the tower.
ic ow

 It is a distributed base station, in which the majority of the base station equipment is no longer located in the
shelter, but in an enclosure at the top of the tower near the antenna.
n
 This separate but integrated radio frequency (RF) unit is called a remote radio unit or remote radio head.
bl kn

 It is compact in size. RRH is generally used to extend the coverage of a base station sub-system in the remote
rural areas.
at
Pu ch

 Fig. 6.9.1 shows the typical HetNet architecture.


Te

Fig. 6.9.1 : Heterogeneous Network Architecture


Mobile Communication & Computing (MU-Sem. 7-Comp) 6-28 Long Term Evolution of 3GPP

 A key component of such heterogeneous networks, which helps in meeting the above requirements is network
intelligence via the SON (Self Organizing Network).
 SON is automation technology that enables the network to set itself up and self-manage resources and
configuration to achieve optimal performance in an integrated network approach.
 The self-organizing and self-optimizing capability of the small cell smoothen the path for implementation of such
heterogeneous networks.
 A self-organizing micro base station can automatically detect the surrounding radio environment conditions and
automatically plan and configure radio parameters such as frequency, scrambling code, and transmission power.
 A traditional base station cannot do this.

6.10 Introduction to 5G

e
6.10.1 Overview

g
 5G is not just one technology, it is actually a combination of several technologies in one. The system, however, will be
io led
a smart and know when to make use of which technology for maximum efficiency.
 5G will be much more faster than 4G. It will provide data rate up to 10Gbps.
ic ow

 It will provide 100% coverage area. That is better coverage even at the cell boundaries.
 5G will also provide low network latency (up to 1 msec) which will be helpful for the critical applications like industry,
n
healthcare and medical.
bl kn

 5G technology aims to provide wide range of future industries from retail to education, transportation to
at

entertainment and smart homes to healthcare.


Pu ch

 5G technology will provide ubiquitous connectivity means everything. from vehicles to mobile networks to industries
Te

to smart homes will be connected together.


 5G will utilize Extremely High frequency spectrum band between 3GHz to 30 GHz. These are called millimetre waves.
These wave can travel at very high speed but covers short distance since they cannot penetrate obstacles..
 Unlike 4G that requires high powered cellular base stations to transmit signal over long distance, 5G will use a large
number of small cell stations that may be located on small towers or building roofs.
 5G makes the use of Massive MIMO (Multiple Input Multiple Output) standards to make is 100 times faster as
opposed to standard MIMO. Massive MIMO makes the use of as much as 100 antennas. Multiple antennas allow for
better and faster data transmission.
 The 5G network will come with 100 times more devices in market.
5G standards

 5G technology standard are still under development. So, no firm standards is in place at this time; the market is still
figuring out the essential 5G features and functionalities.
 The primary 5G standards bodies involved in these processes are the 3rd Generation Partnership Project (3GPP), the
Internet Engineering Task Force (IETF), and the International Telecommunication Union (ITU).
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-29 Long Term Evolution of 3GPP

6.10.2 5GAA (Autonomous Association)


 The 5G Automotive Association (5GAA) is a global, cross-industry organization of companies that work together to
develop end–to-end solution for future mobility and transportation services.
 These companies include the automotive, technology, and telecommunications industries (ICT).
 5GAA was created on September 2016. It consists of 8 founding members: AUDI AG, BMW Group, Daimler AG,
Ericsson, Huawei, Intel, Nokia, and Qualcomm Incorporated. More than 110 companies have now joined 5GAA.
 The 5G Automotive Association is a strong advocate of Cellular-Vehicle 2X (C-V2X). The following are the key
objectives of 5GAA.
1. Making vehicles smarter
 Communication and connectivity are key to the development of autonomous vehicles.
 Cellular based technologiesV2X : vehicle-to-everything communication protocol allows vehicles to communicate

e
with other vehicles (V2V), pedestrians (V2P), networks (V2N), and the surrounding infrastructure (V2I).

g
2. Making Vehicle Safer io led
 Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicle-to-vehicle (V2V),
vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
 C-V2X will improve safety on roads by tremendously facilitating the flow of information between vehicles,
ic ow

pedestrians and road infrastructure. This will enable connected vehicles to anticipate and avoid dangerous
situations, reducing collisions and potentially saving lives.
n
bl kn

3. Improving driving experience


C-V2X will provide real-time traffic information to optimize user’s trip, finding the closest free parking space or
at
Pu ch

enabling predictive maintenance to save drivers both time and money.

6.10.3 The Key Technology : C-V2X (Cellular - Vehicle To everything)


Te

Cellular-V2X (C-V2X) as initially defined as LTE V2X in 3GPP Release 14 is designed to operate in several modes.
It provides one solution for integrated V2V, V2I and V2P operation with V2N by using existing cellular network
infrastructure :
1. Device-to-Device Communication
 Device-to-device communication is Vehicle-to-Vehicle (V2V), Vehicle-to-(Roadway) Infrastructure (V2I) and
Vehicle-to-Pedestrian (V2P) direct communication.
 In the device-to-device mode (V2V, V2I, V2P) operation, C-V2X does not necessarily require any network
infrastructure. It can operate without a SIM, without network assistance and uses GNSS as its primary source of
time synchronization.
2. Device-to-Cell Tower Communication
Device-to-cell tower is another communication link which enables network resources and scheduling and utilizes
existing operator infrastructure.
3. Device-to-Network Communication
 Device-to-network is the V2N solution using traditional cellular links to enable cloud services to be part and parcel
of the end-to-end solution.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-30 Long Term Evolution of 3GPP

 Collectively, the transmission modes of shorter-range direct communications (V2V, V2I, V2P) and longer-range
network-based communications (V2N) comprise what we call Cellular-V2X

6.10.4 Applications of 5G Network

5GAA focuses on more than simply providing faster data rate. 5G technology aims to provide wide range of future
industries from retail to education, transportation to entertainment and smart homes to healthcare.
1. High Speed Mobile Networks
 5G will revolutionize the mobile experience with data rate up to 10 to 20 GBPS download speed. It is equivalent
to a fiber optic Internet connection accessed wirelessly.
 Another important feature of 5G technology is Low latency which is significant for autonomous driving and
mission critical applications. 5G networks are capable of latency less than a millisecond.
2. Entertainment and Multimedia

e
 Almost 50 percentage of mobile Internet traffic is used for video downloads globally. This trend will increase in

g
future and high definition video streaming will be common in future.
io led
 5G will offer a high definition virtual world on your mobile phone. Live events can be streamed via wireless
network with high definition.
 HD TV channels can be accessed on mobile devices without any interruptions. Entertainment industry will hugely
ic ow

benefit from 5G wireless networks. Augmented reality and virtual reality requires HD video with low latency. 5G
network is powerful enough to power AR and VR with amazing virtual experience.
n
3. Internet of Things - Connecting everything
bl kn

 Internet of Things (IoT) is another broad area that will use 5G wireless network. Internet of Things will connect
at

every objects, appliances, sensors, devices and applications into Internet.


Pu ch

 IoT applications will collects huge amount of data from millions of devices and sensors. 5G is the most efficient
candidate for Internet of Things due to its flexibility, unused spectrum availability and low cost solutions for
Te

deployment.
 IoT can benefit from 5G networks in many areas like: Smart Homes, Smart Cities, Industrial IoT, Fleet
Management etc.
4. Virtual reality and Augmented Reality
As Virtual reality (VR) and Augmented Reality (AR) needs faster data rate, low latency and reliability. 5G networks will
unlock the potentials of VR and AR.

6.10.5 Millimeter Wave


 We all know that frequency spectrum is a scarce resource. The existing bands are crowded. One way to get around
this problem is to simply transmit signals on a whole new swath of the spectrum, one that’s never been used for
mobile service before.
 So now, all 5G service providers are experimenting with broadcasting on millimeter waves, Millimeter waves are
higher frequency waves than the radio waves. Millimeter wave is the band of spectrum between 30 gigahertz (Ghz)
and 300 Ghz (Extremely High Frequency). It lies between the super high frequency (SHF) band, and the far infrared
(IR) band. They are called millimeter waves because their wavelength vary from 1 to 10 mm, compared to the radio
waves that serve today’s smartphones. The radio waved wavelength is in tens of centimeters.
 Millimetre waves were first investigated in the 1890s by Indian scientist Jagadish Chandra Bose.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-31 Long Term Evolution of 3GPP

 Until now, only operators of satellites and radar systems used millimeter waves for real-world applications.
 There is one major drawback to millimeter waves, though – they can’t easily travel through buildings or obstacles and
they can be absorbed by foliage and rain. That’s why 5G networks will likely augment traditional cellular towers with
another new technology, called small cells.

Review Questions

Q. 1 With a neat sketch explain SAE architecture.

Q. 2 What is the need of VoLTE. Explain VoLTE in details.

Q. 3 What additional features does LTE advanced contain compared to LTE? Explain LTE-A architecture in detail.

Q. 4 Explain protocol stack of LTE.

Q. 5 What are the functions of LTE – MAC layer? Explain in detail.

e
Q. 6 Explain the Generic frame structure of LTE.

g
Q. 7 Explain different transport and logical channels used by LTE.
io led
Q. 8 What do you mean by Self Organizing Networks? Explain SOIN architecture.

Q. 9 What are heterogeneous networks? Explain HetNet architecture in details.


ic ow

Q. 10 What are the applications of 5G networks? What is millimeter wave?


n
Q. 11 Compare between LTE and LTE Advanced.
bl kn


at
Pu ch
Te

You might also like