Mobile Communication and Computing
Mobile Communication and Computing
Computing
(Code : CSC702)
g e
io led
ic ow
Strictly as Per the Choice Based Credit and Grading System (Rev. 2016)
n
of Mumbai University w.e.f Academic Year 2019-2020
bl kn
at
Pu ch
Te
Copyright © by Authors. All rights reserved. No part of this publication may be reproduced, copied, or stored in a
retrieval system, distributed or transmitted in any form or by any means, including photocopy, recording, or other
electronic or mechanical methods, without the prior written permission of the publisher.
This book is sold subject to the condition that it shall not, by the way of trade or otherwise, be lent, resold, hired out, or
otherwise circulated without the publisher’s prior written consent in any form of binding or cover other than which it is
published and without a similar condition including this condition being imposed on the subsequent purchaser and
without limiting the rights under copyright reserved above.
g e
io led
First Edition : July 2019
ic ow
This edition is for sale in India, Bangladesh, Bhutan, Maldives, Nepal, Pakistan, Sri Lanka and designated countries in
South-East Asia. Sale and purchase of this book outside of these countries is unauthorized by the publisher.
n
bl kn
at
Pu ch
ISBN 978-93-89424-36-2
Te
Published by
TechKnowledge Publications
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
Dear Students,
We are extremely happy to come out with this edition of “Mobile Communication &
Computing” for you. We have divided the subject into small chapters so that the topics can be
e
arranged and understood properly. The topics within the chapters have been arranged in a proper
g
io led
sequence to ensure smooth flow and understanding of the subject.
We present this book in the loving memory of Late Shri. Pradeepji Lunawat, our source
ic ow
We are thankful to Prof. Arunoday Kumar, Mr. Shital Bhandari & Shri. Chandroday Kumar
for the encouragement and support that they have extended. We are also thankful to the staff
Te
members of TechKnowledge Publications and others for their efforts to make this book as good as it
is. We have jointly made every possible efforts to eliminate all the errors in this book. However if
you find any, please let us know, because that will help us to improve the book quality further.
We are also thankful to our family members and friends for their patience and
encouragement.
- Authors
1. To introduce the basic concepts and principles in mobile computing. This includes major techniques
involved, and networks & systems issues for the design and implementation of mobile computing systems and
applications.
e
2. To explore both theoretical and practical issues of mobile computing.
3.
g
To provide an opportunity for students to understand the key components and technologies involved and to gain
io led
hands-on experiences in building mobile applications.
1. To identify basic concepts and principles in mobile communication & computing, cellular architecture.
n
2. To describe the components and functioning of mobile networking.
bl kn
Module Unit
Topics Hrs.
No. No.
2.0 2.1 GSM Mobile services, System Architecture, Radio interface, Protocols , Localization and 10
Calling, Handover, security (A3,A5 & A8)
3.0 3.1 Mobile Networking : Medium Access Protocol, Internet Protocol and Transport layer 12
3.2 Medium Access Control: Motivation for specialized MAC, , Introduction to multiple
Access techniques (MACA)
3.3 Mobile IP: IP Packet Delivery, Agent Advertisement and Discovery, Registration,
Tunneling and Encapsulation, Reverse Tunneling, Routing (DSDV,DSR)
3.4 Mobile TCP : Traditional TCP, Classical TCP Improvements like Indirect TCP, Snooping
TCP & Mobile TCP, Fast Retransmit/ Fast Recovery, Transmission/Timeout Freezing,
Selective Retransmission
4.0 4.1 Wireless Local Area Networks : Introduction, Infrastructure and ad-hoc network 08
4.2 IEEE 802.11:System architecture , Protocol architecture, Physical layer, Medium access
control layer, MAC management, 802.11a, 802.11b
4.3 Wi-Fi security : WEP ,WPA, Wireless LAN Threats, Securing Wireless Networks
e
HiperLAN 1 & HiperLAN 2
g
4.4 io led
4.5 Bluetooth: Introduction, User Scenario, Architecture, protocol stack
6.0 6.1 Long-Term Evolution (LTE) of 3GPP : LTE System Overview, Evolution from UMTS to 10
LTE
at
Pu ch
6.3 EPS: Evolved Packet System, E-UTRAN, Voice over LTE (VoLTE), Introduction to LTE-
Advanced,
6.4 System Aspects, LTE Higher Protocol Layers, LTE MAC layer, LTE PHY Layer,
Total 52
1.2 Cellular Systems......................................................... 1-5 GSM Mobile services, System Architecture, Radio interface,
1.2.1 Frequency Reuse in Cellular Systems ........................ 1-5 Protocols , Localization and Calling, Handover, security (A3,A5 &
e
A8), GPRS system and protocol architecture, UTRAN, UMTS core
1.2.1(a) Frequency Reuse Concept ......................................... 1-6 network; Improvements on Core Network.
g
1.2.1(b) Assignment of Frequencies to Cells ........................... 1-7 2.1 GSM ........................................................................... 2-1
io led
1.2.2 Advantages of Cellular Systems with Small Cells ....... 1-7 2.1.1 GSM Overview............................................................ 2-1
1.2.3 Disadvantages of Cellular System with Small Cells .... 1-8 2.1.2 Mobile Services .......................................................... 2-3
ic ow
1.2.4 Why Hexagonal Pattern is Preferred for Cellular 2.1.3 GSM System Architecture .......................................... 2-6
System ? .................................................................... 1-8 2.1.4 GSM Radio Interfaces ...........................................2-10
n
bl kn
1.2.5 Methods of Increasing Cell Capacity ........................... 1-9 2.1.5 GSM Protocols and Signaling Architecture ................2-12
1.2.6 Cellular System Using CDM ..................................... 1-10 2.1.6 Localization and Calling Description of the Call
at
1.4.1 Isotropic Antenna...................................................... 1-13 2.1.6(c) Mobile Terminated Call (MTC) ...................................2-17
1.4.2 Omnidirectional Antennas ......................................... 1-14 2.1.6(d) Mobile Originated Call (MOC) .................................2-19
1.5.1 Path Loss of Radio Signals ....................................... 1-17 2.1.8 GSM Security ............................................................2-22
1.5.2 Additional Signal Propagation Effects ....................... 1-18 2.2 General Packet Radio System (GPRS) .....................2-24
1.6 Signal Characteristics ............................................... 1-20 2.3 UMTS Terrestrial Radio Active Network (UTRAN) .....2-31
Mobile Networking : Medium Access Protocol, Internet Protocol 3.4.2 Dynamic Source Routing (DSR) ................................3-28
and Transport layer, Medium Access Control : Motivation for 3.5 Mobile TCP ................................................................3-31
specialized MAC, Introduction to multiple Access techniques
3.5.1 Traditional TCP..........................................................3-31
(MACA), Mobile IP: IP Packet Delivery, Agent Advertisement and
Discovery, Registration, Tunneling and Encapsulation, Reverse 3.5.2 Classical TCP improvements .....................................3-33
Tunneling, Routing (DSDV,DSR), Mobile TCP : Traditional TCP,
3.5.2(a) Indirect TCP (I-TCP) ..................................................3-34
Classical TCP Improvements like Indirect TCP, Snooping TCP &
Mobile TCP, Fast Retransmit/ Fast Recovery, Transmission/ 3.5.2(b) Snooping TCP (S-TCP) .............................................3-36
Timeout Freezing, Selective Retransmission. 3.5.2(c) Mobile TCP (M-TCP) .................................................3-37
e
3.1 Mobile Networking ...................................................... 3-1 3.5.3 Fast Retransmit/Fast Recovery .................................3-39
g
3.1.1 Medium Access Protocols .......................................... 3-1 3.5.4 Transmission/ Time-out Freezing ..............................3-39
3.1.2
io led
Internet Protocols ....................................................... 3-1 3.5.5 Selective Retransmission ..........................................3-40
3.1.3 Transport Protocols .................................................... 3-2 3.5.6 Transaction oriented TCP (T/TCP) ............................3-40
3.2.1 Motivation for Specialized MAC .................................. 3-2 3.6 IPv4 and IPv6 ............................................................3-42
n
3.2.1(a) Hidden Station Problem and Exposed Station UNIT IV
bl kn
3.2.2 Multiple Access with Collision Avoidance (MACA) ...... 3-4 Chapter 4 : Networking Basics 4-1 to 4-48
at
Pu ch
3.3.1 Mobile IP : Basic Concept ........................................... 3-6 Wireless Local Area Networks : Introduction, Infrastructure and ad-
Te
3.3.1(a) Need for Mobile IP ...................................................... 3-6 hoc network, IEEE 802.11:System architecture, Protocol
architecture, Physical layer, Medium access control layer, MAC
3.3.1(b) Goals/Requirements of Mobile IP ............................... 3-6
management, 802.11a, 802.11b, Wi-Fi security : WEP, WPA,
3.3.1(c) Basic Terminology ...................................................... 3-7 Wireless LAN Threats, Securing Wireless Networks, HIPERLAN 1
and HIPERLAN 2, Bluetooth : Introduction, User Scenario,
3.3.2 IP Packet Delivery ...................................................... 3-9
Architecture, protocol stack
3.3.3 Agent Advertisement and Discovery ......................... 3-10
4.1 Wireless Local Area Networks .................................... 4-1
3.3.3(a) Agent Advertisement ................................................ 3-10
4.1.1 Introduction ................................................................. 4-1
3.3.3(b) Agent Solicitation ...................................................... 3-12
4.1.2 Types of WLAN .......................................................... 4-2
3.3.4 Registration .............................................................. 3-12
4.1.3 Difference between Ad-hoc Network and Infrastructure
3.3.5 Tunnelling and Encapsulation ................................... 3-15
based Wireless Networks ........................................... 4-3
3.3.5(a) IP-in-IP Encapsulation .............................................. 3-17
4.2 IEEE 802.11 ............................................................... 4-4
3.3.5(b) Minimal Encapsulation .............................................. 3-18
4.2.1 IEEE 802.11 System Architecture............................... 4-4
3.3.5(c) Generic Routing Encapsulation (GRE)...................... 3-18
4.2.2 IEEE 802.11 Protocol Architecture ............................. 4-6
3.3.5(d) Optimization ............................................................. 3-20
4.2.3 IEEE 802.11 Physical Layer ....................................... 4-8
3.3.6 Reverse Tunnelling ................................................... 3-21
4.2.3(a) Direct Sequence Spread Spectrum Physical Layer
3.3.7 Limitations of Mobile IP............................................. 3-22 (DSSS-PHY) ............................................................... 4-8
Mobile Communication & Computing (MU-Sem. 7-Comp) 3 Table of Contents
4.2.4(a) MAC Frame Format .................................................. 4-11 Mobility Management : Introduction, IP Mobility, Optimization,
IPv6; Macro Mobility : MIPv6, FMIPv6; Micro Mobility : CellularIP,
4.2.4(b) Access Mechanisms in IEEE 802.11 ........................ 4-13
HAWAII, HMIPv6
4.2.5 MAC Management .................................................... 4-18
5.1 Introduction to IP Mobility ........................................... 5-1
4.2.5(a) Synchronization in IEEE 802.11................................ 4-18 5.1.1 Mobile IP .................................................................... 5-1
4.2.5(b) Power Management in IEEE 802.11 ......................... 4-19 5.1.2 Optimization ............................................................... 5-2
4.2.5(c) Association/ Reassociation ......................................... 4-21 5.2 IPv6 – Internet Protocol Version 6 .............................. 5-4
4.2.5(d) MAC Management Information Base (MAC-MIB)...... 4-23 5.3 Macro Mobility ............................................................ 5-5
e
4.2.6 IEEE 802.11a ........................................................... 4-24 5.3.1 MIPv6 (Mobile IPv6) ................................................... 5-5
g 5.3.2 FMIPv6 (Fast Hand Over for Mobile IPV6) .................. 5-6
4.2.7
io led
802.11b .................................................................... 4-24
4.2.8 Comparison of Various IEEE 802.11x Standards ...... 4-25 5.4 Micro Mobility.............................................................. 5-6
4.3 Wi-Fi Security Standards .......................................... 4-25 5.4.1 Cellular IP ................................................................... 5-7
ic ow
4.3.1 WEP – Wired Equivalent Privacy .............................. 4-25 5.4.2 HAWAII ...................................................................... 5-9
n
5.4.3 HMIPv6 – Hierarchical Mobile IPv6 ............................5-10
4.3.2 WPA ......................................................................... 4-27
bl kn
4.3.4 Securing Wireless Network ....................................... 4-29 Chapter 6 : Long Term Evolution of 3GPP 6-1 to 6-32
Pu ch
4.5.4(a) Bluetooth Baseband States ...................................... 4-45 6.2.2(b) The User Equipment (UE) .......................................... 6-3
4.6 Comparison of IEEE 802.11, HIPERLAN-1, 6.2.2(c) The E-UTRAN ............................................................ 6-4
HIPERLAN-2 and Bluetooth ...................................... 4-46
6.2.2 (d) Evolved Packet Core (EPC) (The core network) ......... 6-4
Mobile Communication & Computing (MU-Sem. 7-Comp) 4 Table of Contents
6.3 Voice over LTE (VoLTE) ............................................. 6-5 6.6.2 Logical Channels to Transport Channel Mapping.......6-18
6.4 Introduction to LTE-Advanced .................................... 6-7 6.6.3 Logical Channel Prioritization ....................................6-20
6.4.1 LTE Advanced Key Features ...................................... 6-7 6.6.4 Scheduling .................................................................6-20
6.4.2 LTE - Advanced : System Aspects ............................. 6-7 6.7 PHY Layer .................................................................6-20
6.4.2(a) Carrier Aggregation .................................................... 6-7 6.7.1 Generic Frame Structure ...........................................6-20
6.4.2(b) MIMO (Multiple Input and Multiple Output) .................. 6-9 6.7.2 Downlink Multiplexing ................................................6-21
6.4.2(d) Coordinated Multipoint (CoMP) ................................. 6-10 6.7.4 Transport Channels ...................................................6-21
6.4.3 LTE Advanced Architecture ...................................... 6-11 6.7.5 Mapping Downlink Physical Channels to Transport
Channels ...................................................................6-22
6.4.3(a) Architecture .............................................................. 6-11
6.8 Self Organizing Network (SON-LTE)..........................6-22
6.4.3(b) Comparison of LTE and LTE-A ................................. 6-12
e
6.9 SON for Heterogeneous Networks (HetNet) ..............6-25
6.4.4 LTE Protocol Stack ................................................... 6-13
g
6.10 Introduction to 5G ......................................................6-28
6.5 Higher Protocol Layers ............................................. 6-15
io led
6.10.1 Overview....................................................................6-28
6.5.1 Radio Link Control (RLC) .......................................... 6-15
6.10.2 5GAA (Autonomous Association) ..............................6-29
6.5.2 Packet Data Convergence Protocol (PDCP) ............. 6-16
ic ow
Introduction to Mobile
1
1
Computing
1
1
Unit I
1
1
1
Syllabus
1.2 Electromagnetic Spectrum, Antenna, Signal Propagation, Signal Characteristics, Multiplexing, Spread Spectrum :
DSSS & FHSS
e
1
g
io led
Introduction to mobile computing
ic ow
G5’W-q1(5234)WAF1WD1E1)q:PA5-5FS1)PE)1E--5UD1)NEAD2WDDW5A15910E)EL1B5W:q1EA0124-)W2q0WE1BWE1EAS1UWNq-qDD1qAE’-q01
0qBW:q1UW)P54)1PEBWAF1)51’q1:5AAq:)q01)51E19WRq013PSDW:E-1-WA8/1HPWD1:PE3)qN1’EDW:E--S1WA)N504:qD1)Pq1NqE0qN1UW)P1)Pq1’EDW:D1
n
59125’W-q1:5234)WAF1EA01:5224AW:E)W5A/1O)1E-D51:5BqND1)Pq1654NAqS1591UWNq-qDD1:5224AW:E)W5A19N521QX1)51%X1EA01195:4DqD1
bl kn
5A194A0E2qA)E-1ED3q:)D1591UWNq-qDD1)NEAD2WDDW5A1E)13PSDW:E-1-ESqN1D4:P1ED1DWFAE-DL1EA)qAAEL12504-E)W5AL124-)W3-qRWAF/1G5D)1
591 )50ESzD1 UWNq-qDD1 )q-q:5224AW:E)W5A1 DSD)q2D1 ENq1 ’EDq01 5A1 )Pq1 :5A:q3)1 591 :q--4-EN1 DSD)q2D/1 ;W)P1 ’W--W5AD1 591 25’W-q1
at
3P5AqD1WA14Dq1EN54A01)Pq1F-5’q1)50ESL1W)1WD1Aq:qDDENS1)51Nq>4Dq1)Pq1EBEW-E’-q19NqV4qA:WqD12EAS1)W2qD15BqN1UW)P54)124)4E-1
Pu ch
WA)qN9qNqA:q15915Aq1:q--13P5Aq1)51EA5)PqN/1
HPq195--5UWAF1Dq:)W5A10WD:4DDqD10W99qNqA)125’W-q1FqAqNE)W5AD1+QXL1ZXL1‘XL7X1EA01%XK/1
First Generation (1G) : 1980s
<AE-5F1:q--4-EN1DSD)q2D1UqNq1)Pq19WND)1FqAqNE)W5A159125’W-q1)q-q3P5Aq1:5224AW:E)W5A1DSD)q2D/1
HPqS14Dq1UvUbλMRBAW(<WvHzR)λ:<bUSkλvREA01HkAH<kSR-0kSHLW:1)q:PAWV4qD195N1B5W:q1)NEAD2WDDW5A/1
HPq1WA0WBW04E-1:E--D14Dq010W99qNqA)19NqV4qA:WqD1EA01DPENq01)Pq1EBEW-E’-q1D3q:)N421)PN54FP1=NqV4qA:S1–WBWDW5A1G4-)W3-q1
<::qDD1+=–G<K/1
QX1DSD)q213N5BW0q015A-S1B5W:q1:5224AW:E)W5A/1
QX1UED1A5)1D4335N)WAF1N5E2WAF1’q)UqqA10W99qNqA)1Aq)U5N8153qNE)5ND1EA01:54A)NWqD/11
1 √RE23-qD1591QX1Aq)U5N8D1ENq1"1
o <GλY1+<0BEA:q01G5’W-q1λP5Aq1YSD)q2K1ФY<1
o TGH1+T5N0W:1G5’W-q1Hq-q3P5AqK1YUq0qA1
Second Generation (2G) – 2.5 Generation (2.5G) : 1990s
HPq1Dq:5A01FqAqNE)W5A1+ZXK159125’W-q1:q--4-EN1D)EN)q01WA1)Pq1qEN-S1QUUVD/1
O)1 UED1 :523-q)q-S1 0WFW)E-1 EA01 4Dq01 qW)PqN1 HW2q1 –WBWDW5A1 G4-)W3-q1 <::qDD1 +H–G<K1 5N1 (50q1 –WBWDW5A1 G4-)W3-q1 <::qDD1
+(–G<K/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-2 Introduction to Mobile Computing
O)13N5BW0qD1WA:NqEDq01:E3E:W)S1EA01Dq:4NW)S104q1)51)Pq14DqD15910WFW)E-1:q--4-EN1)q:PA5-5FS/1
ZX1DSD)q2D1D4335N)1WA)qNAE)W5AE-1N5E2WAF/1
ZX1DSD)q2D1A5)15A-S13N5BW0q1’q))qN1B5W:q1V4E-W)S14DWAF10WFW)E-1B5W:q1)q-q3P5AS1’4)1E-D51E1AqU1NEAFq1591-5U10E)E1NE)q1
DqNBW:qD1D4:P1ED125’W-q1=ERL1B5W:q12EW-L1DP5N)12qDDEFq1DqNBW:q1+YGYK/1
OA1E00W)W5A1)510WFW)E-1B5W:q1)q-q3P5ASL1(5N0-qDDL134’-W:125’W-q1NE0W5L1DE)q--W)q1EA01UWNq-qDD>-5:E-1ENqE1Aq)U5N81+;W<TK1
D5-4)W5AD1’qFEA1)51q2qNFq/1
2.5G
Xq)UqqA1ZX1EA01‘X1)PqNq1UED1A5)124:P1:PEAFq1WA1)Pq1)q:PA5-5FS1PqA:q1EA1WA)qN2q0WENS13PEDqL1Z/%X1UED1WA)N504:q01
WA1)Pq1-E)q1QUUVD/R
>DEx1 WD1 4Dq01 )51 0qD:NW’q1 ZX>DSD)q2D1 )PE)1 PEBq1 W23-q2qA)q01 E1 3E:8q)>DUW):Pq01 052EWA1 WA1 E00W)W5A1 )51 )Pq1 :WN:4W)>
DUW):Pq01052EWA/R
e
XλYY1+XqAqNE-1λE:8q)1YE0W51YqNBW:qK1WD1E1ZX1DqNBW:qL1UPW:P10q-WBqND13E:8q)>DUW):Pq010E)E1:E3E’W-W)WqD1)51qRWD)WAF1XYG1
g
Aq)U5N8D/1O)1E--5UD14DqND1)51DqA01FNE3PW:D>NW:P10E)E1ED13E:8q)D/1R
io led
HPq1W235N)EA:q15913E:8q)>DUW):PWAF1WA:NqEDq01UW)P1)Pq1NWDq1591)Pq1OA)qNAq)1EA01)Pq1OA)qNAq)1λN5)5:5-1+OλK/1R
<A5)PqN1qRE23-q1591Z/%X125’W-q1)q:PA5-5FS1WD1√–X√1+√APEA:q01–E)E1NE)qD195N1XYG1√B5-4)W5AK/1√–X√13N5BW0qD10E)E1
NE)q1431)51‘Z718’3D1UPW:P1WD1PWFPqN1)PEA1XYG/1R
ic ow
Advantages of 2G over 1G
n
ZX1D)EA0EN0D1D4335N)1N5E2WAF1’q)UqqA10W99qNqA)153qNE)5ND1EA01:54A)NWqD/11
bl kn
OA1 E00W)W5A1 )51 :WN:4W)>DUW):Pq01 B5W:q1 DqNBW:qDL1 ZX1 qAE’-q01 )Pq1 9WND)1 UEBq1 591 25’W-q1 0E)E1 EA01 OA)qNAq)1 DqNBW:qDL1 A5U1
UW0q-S1E053)q01’S14DqND/1
at
Pu ch
Z/%X1DqNBW:qD1qAE’-q1PWFP1D3qq010E)E1)NEAD9qN15BqN143FNE0q01qRWD)WAF1ZX1Aq)U5N8D/11
Y52q1ZX1D)EA0EN0D1ENq1"1
o
Te
XYG+H–G<>’EDq0K1
o –><GλY1
o OY>U%[(–G<5Aq1
o λ–(+λqND5AE-1–WFW)E-1(q--4-ENK1
o λ\Y1+λqND5AE-1\EA0S1λP5Aq1YSD)q2K1
o \Y(Y–1+\WFP1Y3qq01(WN:4W)D1YUW):Pq01–E)EK1+Z/%K1
o XλYY1+XqAqNE-1λE:8q)1YE0W51YqNBW:qK1+Z/%K1
o √–X√1+√APEA:q01–E)E1NE)qD195N1X-5’E-1√B5-4)W5AK+Z/%K1
Third Generation (3G) - 2000
HPq1)PWN01FqAqNE)W5A1+‘XK1DSD)q2D1D)EN)q01WA1ZVVV/1
HPq1‘X1NqB5-4)W5A1E--5Uq0125’W-q1)q-q3P5Aq1:4D)52qND1)514Dq1E40W5L1FNE3PW:D1EA01BW0q51E33-W:E)W5AD/11
]BqN1‘X1W)1WD135DDW’-q1)51UE):P1D)NqE2WAF1BW0q51EA01qAFEFq1WA1BW0q51)q-q3P5AS/1
HPqS1 3N5BW0q1 )Pq1 E’W-W)S1 )51 )NEAD9qN1 DW24-)EAq54D-S1 ’5)P1 B5W:q1 0E)E1 +E1 )q-q3P5Aq1 :E--K1 EA01 A5A>B5W:q1 0E)E1 +D4:P1 ED1
05UA-5E0WAF1WA95N2E)W5AL1qR:PEAFWAF1q2EW-1EA01WAD)EA:q12qDDEFWAFK/11
‘X1 25’W-q1 )q:PA5-5FWqD1 D4335N)1 FNqE)qN1 A42’qN1 591 B5W:q1 EA01 0E)E1 :4D)52qND1 ED1 Uq--1 ED1 PWFPqN1 0E)E1 NE)qD1 E)1 -5UqN1
WA:Nq2qA)E-1:5D)1)PEA1ZX/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-3 Introduction to Mobile Computing
‘X1D)EA0EN0D1ENq1"1
o ;>(–G<1
o (–G<ZVVV1
o Ф;(>Q‘^1 1
o H–>(–G<1[1H–>Y(–G<1
o –√(H1
Fourth Generation (4G) - 2004
HPq1954N)P1FqAqNE)W5A1UW--1’q194--S1Oλ>’EDq01WA)qFNE)q01DSD)q2D/1
O)1 UW--1 E--5U1 E::qDDWAF1 )Pq1 OA)qNAq)1 EAS)W2q1 9N521 EASUPqNqL1 F-5’E-1 N5E2WAFL1 EA01 UW0qN1 D4335N)1 95N1 24-)W2q0WE1
E33-W:E)W5AD/1
O)1UW--1’q1Aq)U5N81591Aq)U5N8D1E:PWqBq01E9)qN1)Pq1:5ABqNFqA:q1591UWNq01EA01UWNq-qDD1Aq)U5N8D1ED1Uq--1ED1:5234)qNL1
e
:5AD42qN1q-q:)N5AW:DL1:5224AW:E)W5A1)q:PA5-5FSL1EA01DqBqNE-15)PqN1:5ABqNFqA:qD/1
g
HPqDq1Aq)U5N8D1UW--1’q1:E3E’-q15913N5BW0WAF1QVV1G’3D1WA154)055N1qABWN5A2qA)1EA01QX’3D1WA1WA055N1UW)P1qA0>)5>qA01
io led
_5Y1EA01PWFP1Dq:4NW)S/1
7X1D)EA0EN0D1ENq1"1
o WH√1+W5AF1HqN21√B5-4)W5AK1
ic ow
o ;WG<`1+;5N-0UW0q1OA)qN53qNE’W-W)S195N1GW:N5UEBq1<::qDDK1
n
Fifth Generation - 5G (2018)
bl kn
%X1WD1A5)164D)15Aq1)q:PA5-5FSL1W)1WD1E:)4E--S1E1:52’WAE)W5A1591DqBqNE-1)q:PA5-5FWqD1WA15Aq/1HPq1DSD)q2L1P5UqBqNL1UW--1’q1
E1D2EN)1EA018A5U1UPqA1)512E8q14Dq1591UPW:P1)q:PA5-5FS195N12ERW2421q99W:WqA:S/1
at
Pu ch
%X1UW--1’q124:P125Nq19ED)qN1)PEA17X/1O)1UW--13N5BW0q10E)E1NE)q1431)51QVX’3D/1O)1UW--13N5BW0q1QVVa1:5BqNEFq1ENqE/1HPE)1WD1
’q))qN1:5BqNEFq1qBqA1E)1)Pq1:q--1’54A0ENWqD/1
Te
%X1UW--1E-D513N5BW0q1-5U1Aq)U5N81-E)qA:S1+431)51Q12Dq:K1UPW:P1UW--1’q1Pq-394-195N1)Pq1:NW)W:E-1E33-W:E)W5AD1-W8q1WA04D)NSL1
PqE-)P:ENq1 EA01 2q0W:E-/1 1 %X1 )q:PA5-5FS1 EW2D1 )51 3N5BW0q1 UW0q1 NEAFq1 591 94)4Nq1 WA04D)NWqD1 9N521 Nq)EW-1 )51 q04:E)W5AL1
)NEAD35N)E)W5A1)51qA)qN)EWA2qA)1EA01D2EN)1P52qD1)51PqE-)P:ENq/1
%X1)q:PA5-5FS1UW--13N5BW0q14’WV4W)54D1:5AAq:)WBW)S12qEAD1qBqNS)PWAF19N521BqPW:-qD1)5125’W-q1Aq)U5N8D1)51WA04D)NWqD1
)51D2EN)1P52qD1UW--1’q1:5AAq:)q01)5Fq)PqN/1
%X1UW--14)W-Wbq1√R)Nq2q-S1\WFP19NqV4qA:S1D3q:)N421’EA01’q)UqqA1‘X\b1)51‘V1X\b/1HPqDq1ENq1:E--q012W--W2q)Nq1UEBqD/1
HPqDq1UEBq1:EA1)NEBq-1E)1BqNS1PWFP1D3qq01’4)1:5BqND1DP5N)10WD)EA:q1DWA:q1)PqS1:EAA5)13qAq)NE)q15’D)E:-qD/1
ФA-W8q17X1)PE)1NqV4WNqD1PWFP135UqNq01:q--4-EN1’EDq1D)E)W5AD1)51)NEAD2W)1DWFAE-15BqN1-5AF10WD)EA:qL1%X1UW--114Dq1E1-ENFq1
A42’qN1591D2E--1:q--1D)E)W5AD1)PE)12ES1’q1-5:E)q015A1D2E--1)5UqND15N1’4W-0WAF1N559D/1
%X1 2E8qD1 )Pq1 4Dq1 591 GEDDWBq1 GOG]1 +G4-)W3-q1 OA34)1 G4-)W3-q1 ]4)34)K1 D)EA0EN0D1 )51 2E8q1 WD1 QVV1 )W2qD1 9ED)qN1 ED1
5335Dq01)51D)EA0EN01GOG]/1GEDDWBq1GOG]12E8qD1)Pq14Dq1591ED124:P1ED1QVV1EA)qAAED/1G4-)W3-q1EA)qAAED1E--5U195N1
’q))qN1EA019ED)qN10E)E1)NEAD2WDDW5A/1HPq1%X1Aq)U5N81UW--1:52q1UW)P1QVV1)W2qD125Nq10qBW:qD1WA12EN8q)/1
5G standards
%X1)q:PA5-5FS1D)EA0EN01ENq1D)W--14A0qN10qBq-532qA)/1Y5L1A519WN21D)EA0EN0D1WD1WA13-E:q1E)1)PWD1)W2qc11)Pq12EN8q)1WD1D)W--1
9WF4NWAF154)1)Pq1qDDqA)WE-1%X19qE)4NqD1EA0194A:)W5AE-W)WqD/1
HPq13NW2ENS1%X1D)EA0EN0D1’50WqD1WAB5-Bq01WA1)PqDq13N5:qDDqD1ENq1)Pq1‘N01XqAqNE)W5A1λEN)AqNDPW31λN56q:)1+‘XλλKL1)Pq1
OA)qNAq)1√AFWAqqNWAF1HED81=5N:q1+O√H=KL1EA01)Pq1OA)qNAE)W5AE-1Hq-q:5224AW:E)W5A1ФAW5A1+OHФK/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-4 Introduction to Mobile Computing
e
B5W:q1L13E:8q)1
g
DUW):PWAF195N1
0E)E1
io led
Y3qq01 Z/718’3D1)51 Q7/718’3D1 ‘/Q12’3D1 QVV12’3D1 dQV1X’3D1
Q7/718’3D1
ic ow
\–1
24-)W2q0WE1
D)NqE2WAF1
Te
g e
1.2 Cellular Systems io led
(q--4-EN1 DSD)q2D1 ENq1 25’W-q1 DSD)q2D1 95N1 )U5>UES1 UWNq-qDD1 :5224AW:E)W5A1 ’q)UqqA1 )Pq1 9WRq01 3EN)1 591 )Pq1 DSD)q21
+)NEAD2W))qND15N1’EDq1D)E)W5ADK1EA01)Pq125’W-q13EN)1591)Pq1DSD)q21+25’W-q1D)E)W5ADK1UPW:P125Bq1WA1)Pq1ENqE1:5BqNq01’S1
ic ow
qE:P1’EDq1D)E)W5A/1
OA1 E1 :q--4-EN1 DSD)q2L1 )Pq1 qA)WNq1 :5BqNEFq1 ENqE1 WD1 0WBW0q01 WA)51 h:q--Dz1 W/q/1 )PqS1 W23-q2qA)1 Y–G1 +Y3E:q1 –WBWDW5A1
n
G4-)W3-qRWAFK/1√E:P1:q--1WD1DqNBq01’S1E1DWAF-q1’EDq1D)E)W5A/1√E:P1:q--1PED1E1DWbq10q3qA0WAF15A1)Pq1A42’qN15914DqND/1G5Nq1
bl kn
)Pq14DqNDL1D2E--qN1)Pq1:q--1DWbq/1
(q--1 NE0WW1 NEAFqD1 9N521 )qAD1 591 2q)qND1 WA1 ’4W-0WAFDL1 EA01 P4A0Nq0D1 591 2q)qND1 WA1 :W)WqDL1 431 )51 )qAD1 591 8W-52q)qND1 WA1 )Pq1
at
Pu ch
:54A)NS1DW0q/1
HPq1DPE3qD1591:q--D1ENq1AqBqN13qN9q:)1:WN:-qD15N1PqREF5AD1E:)4E--SL1W)10q3qA0D15A1qABWN5A2qA)L15A1UPq)PqN1:5A0W)W5AD1
Te
q):/11\qREF5A1DPE3q1:q--4-EN1DSD)q21WD1DP5UA1WA1=WF/1Q/Z/Q/1
Fig.1.2.1 : Diagrammatic cell Fig. 1.2.2 : Cellular System with seven cell cluster
vs. actual cell coverage
=AW(<WvHzRAW<-W1WD1)Pq1)q:PAWV4q15914DWAF1)Pq1DE2q1NE0W51BAW(<WvHkW-15A1NE0W51)NEAD2W))qN1DW)qD1UW)PWA1E1Fq5FNE3PW:1
ENqE1)PE)1ENq1Dq3ENE)q01’S1D499W:WqA)10WD)EA:q1)51:E4Dq12WAW2E-1WA)qN9qNqA:q1UW)P1qE:P15)PqN/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-6 Introduction to Mobile Computing
To avoid interference in cellular system, each cell uses a different set of frequencies as compared to its immediate
neighbors. In other words, no two neighbors use the same set of frequencies as there will be interference.
A set of several cells are further grouped into clusters. Cells within the same cluster do not use the same frequency
sets.
Fig. 1.2.3 shows 3 cell cluster and 7 cell cluster. In Fig 1.2.3 (a) one cell in a cluster uses frequency f1, another cell uses
f2 and the third cell uses f3. The same pattern is repeated for another cluster. Fig. 1.2.3 (b) shows a 7 cell cluster.
Consider a cellular system which has S full duplex channels available for use.
Assume that the S channels are divided into N number of cells and each cell is allocated a group of K channels (K<S).
e
Thus, total number of channels per cell is K = S/N.
g
Therefore, the total number of available channels can be expressed as S = KN
io led
The N cells which collectively use the complete set of available frequencies is called cluster.
The factor N is called the cluster size and is typically 4, 7 or 12.
Frequency reuse factor of a cellular system is given by reciprocal of the cluster size i.e. 1/N.
ic ow
n
bl kn
at
Pu ch
Te
(a) 3 cell cluster (b) 7 cell cluster (c) 3 cell cluster with 3 sector
per cell 3 sector antennas
Fig. 1.2.3 : 3 cell cluster, 7 Cell Cluster and 3 cell cluster with sectorized antennas
If the cluster size N is reduced while the cell size remains constant, more clusters are required to cover that particular
area and hence more capacity is achieved.
A large cluster size indicates that the ratio between cell radius and the distance between co channel cells is small.
Locating Co-channel cells in a cellular System
For a hexagonal cell structure, it is possible to cluster cells so that no two adjacent cells use the same frequency. This
is only achievable for a certain cell-cluster sizes, which can be determined from the relationship
=WF/1Q/Z/71DP5UD1)Pq13N5:qDD1591-5:E)WAF1)Pq1AqENqD)1:5>:PEAAq-1AqWFP’5ND1591:q--1971WA1:-4D)qN1Q/11
;q19WND)125Bq1WiZ1D4::qDDWBq1:q--D1WA105UAUEN010WNq:)W5A/1=N521)PqNq1Uq1)4NA1^V!1WA1:54A)qN:-5:81UWDq10WNq:)W5A/1<A01
)PqA125Bq16iQ1:q--195NUEN01)PN54FP1)Pq1:qA)Nq1591)Pq1:q--1)P4D1-5:E)WAF1:q--1971WA1:-4D)qN1‘/1YW2W-EN-S1Uq1:EA1-5:E)q1:q--1
971WA1AqWFP’5NWAF1:-4D)qND1j1:-4D)qN1Z1EA01:-4D)qN17/1
g e
io led
Fig. 1.2.4 : Method of locating co-channel cells in a cellular system (here i=2, j=1)
<DDWFA2qA)15919NqV4qA:WqD1)51:q--D1:EA1’q105Aq1WA195--5UWAF1)PNqq1UESD/1
n
1. Fixed Channel Allocation (FCA)
bl kn
HPWD1D:Pq2q1EDDWFAD19WRq01Dq)15919NqV4qA:WqD1)51qE:P1:q--15N1:-4D)qN/1HPq1D:Pq2q1WD1qEDS1)51W23-q2qA)1’4)1A5)1BqNS1
at
q99W:WqA)1W91)NE99W:1-5E01BENWqD/1
Pu ch
XYG1DSD)q214DqD1)PWD1D:Pq2q/1
OA1)PWD1D:Pq2qL1W91E15Aq1:q--1PED1PqEBS1-5E01)PqA1W)1:EA1’5NN5U19NqV4qA:WqD19N521EA5)PqN1AqWFP’5NWAF1:q--1UPW:P1WD1
PEBWAF1-WFP)1-5E0/11
\qNq1:q--D1UW)P125Nq1)NE99W:1ENq10SAE2W:E--S1E--5))q0125Nq19NqV4qA:WqD/1
3. Dynamic Channel Allocation (DCA)
HPWD1 D:Pq2q1 WD1 DW2W-EN1 )51 X(</1 <D1 WA1 X(<1 PqNq1 E-D51 9NqV4qA:WqD1 :EA1 ’q1 ’5NN5Uq01 9N521 E1 AqWFP’5NWAF1 :q--/1 OA1
E00W)W5A1)51)PE)L1)Pq1EDDWFA2qA)15919NqV4qA:WqD1WD10SAE2W:L1)PE)1WD19NqV4qA:WqD1:EA1’q1EDDWFAq019Nqq-S1)51:q--D/1
YWA:q19NqV4qA:WqD1ENq1EDDWFAq010SAE2W:E--S1)51E1:q--L1)PqNq1WD1E1:PEA:q1591WA)qN9qNqA:q1UW)P1:q--D14DWAF1)Pq1DE2q1
9NqV4qA:WqD/11
H51EB5W01WA)qN9qNqA:q1)Pq1h’5NN5Uq0z19NqV4qA:WqD1:EA1’q1’-5:8q01WA1)Pq1AqWFP’5NWAF1:q--D/1
HPWD1D:Pq2q1WD14Dq01WA1–√(H/1
1. Higher capacity
O23-q2qA)WAF1 Y–G1 E--5UD1 9NqV4qA:S1 Nq4Dq/1 O91 5Aq1 )NEAD2W))qN1 WD1 9EN1 EUES1 9N521 EA5)PqN1 )NEAD2W))qN1 )PqA1 )Pq1
)NEAD2W))qND1:EA14Dq1)Pq1DE2q19NqV4qA:S1UW)P54)1EAS1WA)qN9qNqA:q/1HP4D1D2E--qN1:q--D1E--5U125Nq1A42’qN15914DqND/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-8 Introduction to Mobile Computing
O91)Pq1)NEAD2W))qN1WD19EN1EUES19N521)Pq1Nq:qWBqN1)PqA1W)1NqV4WNqD1PWFP135UqN1)51)NEAD2W)1)Pq1DWFAE-/1=5N125’W-q10qBW:qD1
35UqN1WD1)Pq12EWA1:5AD)NEWA)L1D51Nq04:q01:q--1DWbq1NqV4WNqD1-qDD1)NEAD2WDDW5A135UqN/1
3. Local interference only
;W)P1-ENFqN1:q--DL1)Pq10WD)EA:q1’q)UqqA1)Pq125’W-q1D)E)W5A1EA01)Pq1’EDq1D)E)W5A1WD125Nq1EA01PqA:q1)PqNq1ENq1:PEA:qD1
591 25Nq1 WA)qN9qNqA:q1 3N5’-q2D/1 ;W)P1 D2E--1 :q--DL1 25’W-q1 D)E)W5AD1 EA01 ’EDq1 D)E)W5AD1 5A-S1 PEBq1 )51 0qE-1 UW)P1 h-5:E-z1
WA)qN9qNqA:q/1
4. Robustness
(q--4-EN1DSD)q2D1ENq10q:qA)NE-Wbq01EA01D5125Nq1N5’4D)1EFEWAD)1)Pq19EW-4Nq1591DWAF-q1:5235AqA)D/1O915Aq1EA)qAAE19EW-DL1W)1
5A-S1E99q:)D1:5224AW:E)W5A1UW)PWA1E1D2E--1ENqE/1
e
1. Complex infrastructure
g
(q--4-EN1 DSD)q2D1 NqV4WNq1 E1 :523-qR1 WA9NED)N4:)4Nq1 )51 :5AAq:)1 )51 E--1 ’EDq1 D)E)W5AD/1 O91 )Pq1 :q--1 DWbq1 WD1 D2E--L1 )PqA1 W)1
io led
NqV4WNqD12EAS1EA)qAAEDL1DUW):PqDL195N1:E--195NUEN0WAFL1-5:E)W5A1NqFWD)qND1)519WA01E125’W-q1D)E)W5A1q):/1HPWD1UW--12E8q1
)Pq1UP5-q1DSD)q21qR3qADWBq/1
2. Handover needed
ic ow
;PqA125’W-q1D)E)W5A125BqD19N5215Aq1:q--1)51EA5)PqN1:q--L1)Pq13N5:qDD1:E--q01PEA05BqN1WD1:ENNWq0154)/1–q3qA0WAF15A1
n
)Pq1:q--1DWbq1EA01)Pq1D3qq0159125Bq2qA)L1)PWD1:EA1PE33qA1V4W)q159)qA/1
bl kn
3. Frequency Planning
at
(q--4-EN1DSD)q21Aqq0D13N53qN13-EAAWAF15919NqV4qA:S10WD)NW’4)W5A1)51EB5W01WA)qN9qNqA:q1’q)UqqA1)NEAD2W))qND/1
Pu ch
;PqA1:5ADW0qNWAF1Fq52q)NW:1DPE3qDL1UPW:P1:5BqN1EA1qA)WNq1NqFW5A1UW)P54)15BqN-E33WAF15N1-qEBWAF1FE3D1EA01UW)P1qV4E-1
ENqEDL1)PqNq1ENq1)PNqq1DqADW’-q1:P5W:qD/1
Q/1 √V4W-E)qNE-1)NWEAF-q1
Z/1 YV4ENq1
‘/1 \qREF5A1
HPq1HE’-q1Q/Z/Q10qD:NW’qD1)Pq14AW)1:5BqNEFq1ENqE195N1qE:P1591)Pq1E’5Bq12qA)W5Aq01DPE3qD/1
Table 1.2.1 : Unit coverage area for Triangle, square and Hexagon shapes
OA1FqAqNE-1UW)P1)Pq1\qREF5A13E))qNA1"1
Q/1 HPq19qUqD)1A42’qN1591:q--D1:EA1:5BqN1E1FWBqA1Fq5FNE3PW:E-1NqFW5A1
Z/1 ;q1:EA1:-5Dq-S1E33N5RW2E)q1E1:WN:4-EN1NE0WE)W5A13E))qNA1UPW:P1U54-015::4N195N1EA152AW0WNq:)W5AE-1’EDq1D)E)W5A1
EA)qAAE/1
1. Cell Splitting
e
(q--1D3-W))WAF1WD1)Pq13N5:qDD15910WBW0WAF1)Pq1NE0W51:5BqNEFq1591E1:q--1WA1E1:q--4-EN1DSD)q21WA)51)U515N125Nq1AqU1:q--1DW)qD/11
g
(q--1D3-W))WAF1WD15Aq1591)Pq1UESD1)51WA:NqEDq1)Pq1:E3E:W)S1UW)PWA1)Pq1NqFW5A1591)Pq15NWFWAE-1:q--/11
io led
H512WAW2Wbq1WA)qN9qNqA:qL1E1:qN)EWA10WD)EA:q124D)1’q12EWA)EWAq01’q)UqqA1:q--D14DWAF1)Pq1DE2q19NqV4qA:WqD/1\5UqBqNL1
)PWD10WD)EA:q1:EA1’q1Nq04:q01UW)P54)10WD)4N’WAF1)Pq1:q--1Nq4Dq13E))qNA/11
<D1 )Pq1 DWbq1 591 )Pq1 :q--D1 ENq1 Nq04:q0L1 )Pq1 DE2q1 9NqV4qA:WqD1 :EA1 ’q1 4)W-Wbq01 WA1 25Nq1 :q--DL1 UPW:P1 WA1 )4NA1 2qEAD1 25Nq1
ic ow
D4’D:NW’qND1:EA1’q1E::52250E)q015A1)Pq1DSD)q2/11
λEN)W:4-EN-S1WA1:5AFqD)q01ENqEDL1)Pq1:q--4-EN153qNE)5N159)qA1D3-W)D1EA1qRWD)WAF1:q--1WA)51)U515N125Nq1D2E--qN1:q--D/11
n
TqU1 )NEAD:qWBqND1 ENq1 3-E:q01 EA01 )Pq1 35UqN1 591 )Pq1 )NEAD2W))qND1 ENq1 Nq04:q01 WA1 5N0qN1 )51 :5A9WAq1 )Pq1 DWFAE-D1 )51 )Pq1
bl kn
AqU-S1:NqE)q01:q--D/1
at
=5N1qRE23-qL1E1:q--1)PE)15NWFWAE--S1PE01E1NE0W4D1591^121:54-01’q1D3-W)1WA)51)PNqq1:q--D1UW)P1qE:P1AqU1:q--1PEBWAF1E1Z121
Pu ch
NE0W4D/11
Te
Cell Sectorization
<A5)PqN1UES1)51WA:NqEDq1:q--4-EN1DSD)q2zD1:E3E:W)S1WD1)51Nq3-E:q1)Pq152AW0WNq:)W5AE-1EA)qAAE1E)1qE:P1’EDq1D)E)W5A1’S1
)PNqq15N125Nq1Dq:)5N1EA)qAAED/R
ФDq15910WNq:)W5AE-1Dq:)5N1EA)qAAED1D4’D)EA)WE--S1Nq04:qD1)Pq1WA)qN9qNqA:q1E25AF1:5>:PEAAq-1:q--D/1R
HPWD1E--5UD10qADqN19NqV4qA:S1Nq4Dq/1R
HPq1’EDq1D)E)W5A1:EA1qW)PqN1’q1-5:E)q01E)1)Pq1:qA)qN1591)Pq15NWFWAE-1+-ENFqK1:q--L15N1)Pq1:5NAqND1591)Pq15NWFWAE-1+-ENFqK1:q--/R
Yq:)5NWbE)W5A1WD1-qDD1qR3qADWBq1)PEA1:q-->D3-W))WAFL1ED1W)105qD1A5)1NqV4WNq1)Pq1E:V4WDW)W5A1591AqU1’EDq1D)E)W5A1DW)qD/R
Using Micro cell zone
HPq10WDE0BEA)EFq1591:q--1Dq:)5NWAF1:5A:q3)1WD1)Pq1Aqq0195N1EA1WA:NqEDq01A42’qN1591PEA0599D/1
HPq1)q:PAWV4q18A5UA1ED12W:N5:q--1)PE)14DqD1b5AqD1WAD)qE01591Dq:)5ND1)51Nq04:q1)Pq1A42’qN1591PEA0599D/1
<D1 DP5UA1 WA1 =WF/1 Q/Z/l1 )PWD1 )q:PAWV4q1 q23-5SD1 )PNqq1 EA)qAAED1 )PE)1 3N5BW0q1 :5BqNEFq1 WA)51 )Pq1 2W:N51 :q--/1 <--1 )PNqq1
EA)qAAED1ENq1:5AAq:)q01)51)Pq1DE2q1’EDq1D)E)W5A/1
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
HPq1EA)qAAE1UW)P1)Pq1’qD)1Nq:q3)W5A1591)Pq125’W-q1WD14Dq0195N1’5)P1)Pq143-WA81EA01)Pq105UA-WA8/1<D1)Pq125’W-q1)NEBq-D1
UW)PWA1E1DE2q12W:N51:q--1W)14DqD1)Pq1DE2q1:PEAAq-1EA01)PqNq1WD1A51Aqq0195N1PEA0599/1
<D1)Pq125’W-q125BqD1WA)51EA5)PqN1b5Aq1)Pq1’EDq1D)E)W5A1DW23-S1DUW):PqD1)Pq1:PEAAq-1)51E10W99qNqA)1b5Aq/1
e
Q. Draw and explain electromagnetic spectrum for communication. (May 15, Dec. 15, 5 Marks)
g
=5N1 NE0W51 )NEAD2WDDW5AL1 )PqNq1 ENq1 2EAS1 9NqV4qA:S1 ’EA0D/1 √E:P1 9NqV4qA:S1 ’EA01 PED1 D52q1 E0BEA)EFqD1 EA01
io led
0WDE0BEA)EFqD1EA01:EA1’q14Dq01ED13qN1)Pq1E33-W:E)W5A/1
=WF/1 Q/‘/Q1 W--4D)NE)qD1 )Pq1 9NqV4qA:S1 D3q:)N421 95N1 NE0W51 )NEAD2WDDW5A/1 =NqV4qA:WqD1 D)EN)1 E)1 ‘VV\b1 EA01 F51 431 )51 5BqN1
‘VVH\b/11
ic ow
n
bl kn
at
Pu ch
Te
DW:k<)R =AW(<WvHzREUvMWR
HUWD)q01λEWN1 V>‘/%1m\b1
(5>ERWE-1:E’-q1 V1j1%VV1G\b1
=W’qN1]3)W:D1 QZ^1>11‘lV1H\b1
Frequency ranges for radio transmission
Table 1.3.2 : Frequency ranges for radio transmission
=AW(<WvHzR NAλ?UMUSkλvR
=AW(<WvHzREUvMW-R G??bkHUSkλvR
FUv:R >LUAUHSWAk-SkH-R
e=+e5W:q1 ‘VV1\b1j1‘m\b1 X;11 ФDq01’S1)q-q3P5Aq1DSD)q2195N1EAE-5F1D4’D:NW’qN1-WAqD1
=NqV4qA:SK1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-12 Introduction to Mobile Computing
Frequency Propagation
Frequency Ranges Application
Band Characteristics
VLF (Very Low 3 KHz – 30 KHz GW Long-range navigation; submarine communication
Frequency)
LF (Low 30 KHZ – 300KHz GW Long-range navigation; marine communication radio
Frequency) beacon
MF(medium 300 KHz – 3 MHz GW and night Maritime radio; direction fading; AM broadcasting
frequency) SW
HF(High 3 MHz – 30MHz SW Amateur radio; international broadcasting; military
Frequency) communication;
Long distance aircraft and ship communication.
VHF (Very High 30 MHz – 300 MHz LOS VHF television; FM broadcast and two-way radio, AM
Frequency) aircraft communication; aircraft navigational aids
e
UHF(Ultra High 300 MHz – 3GHz LOS UHF television; cellular telephone; radar; microwave links;
g
Frequency) personal communication systems
io led
SHF(Super High 3 GHz – 30 GHz LOS Satellite communication; radar; terrestrial microwave links;
Frequency) wireless local loop
EHF 30 GHZ – 300GHz LOS Experimental; wireless local loop
ic ow
Depending upon the frequency, the radio waves can exhibit following three types of behavior.
Te
1. Ground Wave (<2 MHz) : Low frequency waves usually follow the Earth’s surface and can propagate long distance.
These waves are used for submarine communication or AM radio.
2. Sky wave (2-30 MHz) : These waves are reflected at the atmosphere and hence can bounce back and forth between
the ionosphere and the Earth’s surface, traveling around the world. They are used for international broadcast.
3. Line-of-Sight (>30 MHz) : These waves follow a straight line of sight. They are used in Mobile phone systems. Also,
Satellite systems, cordless telephones etc. use these waves.
(a)
(b)
g e
io led
ic ow
n
(c)
bl kn
Fig. 1.3.2 : Ground Wave propagation, Sky wave Propagation and Line-of –Sight propagation
at
=WF/1Q/‘/Z1DP5UD1E--1)PNqq1)S3qD1591DWFAE-13N53EFE)W5A/1
Pu ch
1.4 Antennas
Te
Q. Write about types of antennas and their radiation pattern. (Dec. 14, 5 Marks)
Q. What is an antenna? Explain different types of antennae. (May 17, 5 Marks)
Q. Write a short note on antenna. (Dec. 18, 10 Marks)
<A1UvSWvvU1WD1E10qBW:q1)PE)1:5ABqN)D1q-q:)N52EFAq)W:1NE0WE)W5A1WA1D3E:q1WA)51q-q:)NW:E-1:4NNqA)D1WA1:5A04:)5ND15N11
BW:q>BqNDEL10q3qA0WAF15A1UPq)PqN1W)1WD1’qWAF14Dq0195N1Nq:qWBWAF15N195N1)NEAD2W))WAFL1NqD3q:)WBq-S/1
HPq1AU:kUSkλvR?USSWAv1591EA1EA)qAAE10qD:NW’qD1)Pq1Nq-E)WBq1D)NqAF)P1591)Pq1NE0WE)q019Wq-01WA1BENW54D10WNq:)W5AD19N521)Pq1
EA)qAAEL1E)1E1:5AD)EA)10WD)EA:q/11
OA1NqE-W)S1)Pq1NE0WE)W5A13E))qNA1WD1)PNqq>0W2qADW5AE-L1’4)14D4E--S1)Pq12qED4Nq01NE0WE)W5A13E))qNAD1ENq1E11
)U5>0W2qADW5AE-1D-W:q1591)Pq1)PNqq>0W2qADW5AE-13E))qNAL1WA1)Pq1P5NWb5A)E-15N1BqN)W:E-13-EAqD/11
HPqNq1ENq1BENW54D1)S3qD1591EA)qAAED10WD:4DDq01’q-5U/1
O)1WD14Dq01)51:523ENq1)Pq135UqN1-qBq-1591E1FWBqA1EA)qAAE1)51)Pq1)Pq5Nq)W:E-1WD5)N53W:1EA)qAAE/R
=WF/1Q/7/Q1DP5UD1E1)U510W2qADW5AE-1:N5DD>Dq:)W5A1591)Pq1NqE-1)PNqq10W2qADW5AE-13E))qNA/R
<A)qAAED1:EA1’q1’N5E0-S1:-EDDW9Wq01ED1λ)vk:kAWHSkλvUb1EA01:kAWHSkλvUb1EA)qAAED/1
e
ФA-W8q1 WD5)N53W:1 EA)qAAEDL1 0W35-q1 EA)qAAED1 ENq1 NqE-1 EA)qAAED/1 HPq1 0W35-q1 NE0WE)W5A1 3E))qNA1 WD1 ‘^V1 0qFNqqD1 WA1 )Pq1
g
P5NWb5A)E-13-EAq1EA01E33N5RW2E)q-S1l%10qFNqqD1WA1)Pq1BqN)W:E-13-EAq/1
O)1WD1E-D51:E--q01)Pq1nA5A>0WNq:)W5AE-n1EA)qAAE1’q:E4Dq1W)105qD1A5)19EB5N1EAS13EN)W:4-EN10WNq:)W5A/1R
io led
–W35-q1EA)qAAED1ENq1DEW01)51PEBq1E1FEWA1591Z/Q710XL1UPW:P1WD1WA1:523ENWD5A1)51EA1WD5)N53W:1EA)qAAE/1HPq1PWFPqN1)Pq1FEWA1
591)Pq1EA)qAAEDL1)Pq1D2E--qN1)Pq1BqN)W:E-1’qE21UW0)P1WD/R
ic ow
HPWD1)S3q1591EA)qAAE1WD14Dq94-195N1’N5E0:ED)WAF1E1DWFAE-1)51E--135WA)D1591)Pq1:523EDD15N1UPqA1-WD)qAWAF195N1DWFAE-D19N521
E--135WA)D/1
n
Dipoles
bl kn
HPq125D)1:5225A-S14Dq01EA)qAAE1WD1HWASIkUv10W35-q/1
HPq10W35-q1:5ADWD)D1591)U51:5--WAqEN1:5A04:)5ND1591qV4E-1-qAF)PL1Dq3ENE)q01’S1E1D2E--19qq0WAF1FE3/11
at
Pu ch
HPq1-qAF)P1591)Pq10W35-q1WD1PE-91)Pq1UEBq-qAF)P1o1591)Pq1DWFAE-1+95N1q99W:WqA)1NE0WE)W5A1591qAqNFSK/1
=WF/1Q/7/Z1DP5UD1E1)S3W:E-1\qN)bWEA10W35-q/1
Te
Monopoles
YP5UA1WA1=WF/1Q/7/71WD1)Pq1W0qE-1BqN)W:E-125A535-q1EA)qAAE/R
O)1PED1)Pq1-qAF)P1o[71EA01E-D518A5UA1ED1DUAJλvk1EA)qAAE/R
<125A535-q15BqN1EA1WA9WAW)q1FN54A013-EAq1WD1)Pq5Nq)W:E--S1)Pq1DE2q1ED1)Pq10W35-q1WA19Nqq1D3E:q/R
HPq19-E)1D4N9E:q1591E1BqPW:-qzD1)N4A815N1N5591:EA1E:)1ED1EA1E0qV4E)q1FN54A013-EAq/R
HPWD1)S3q1591EA)qAAE1WD1q99W:WqA)195N1254A)WAF15A1E1N5591)531591E1:EN/1R
e
Directional Antenna
g
<1:kAWHSkλvUbRUvSWvvU15N1BWU)RUvSWvvU1WD1EA1EA)qAAE1UPW:P1NE0WE)qD15N1Nq:qWBqD1FNqE)qN135UqN1WA1D3q:W9W:10WNq:)W5AD/1
io led
HPWD1E--5UD1WA:NqEDq013qN95N2EA:q1EA01Nq04:q01WA)qN9qNqA:q19N5214AUEA)q01D54N:qD/1
ФA-W8q152AW0WNq:)W5AE-1EA)qAAEDL10WNq:)W5AE-1EA)qAAED124D)1’q1EW2q01WA1)Pq10WNq:)W5A1591)Pq1)NEAD2W))qN15N1Nq:qWBqN/11
ic ow
√RE23-qD15910WNq:)W5AE-1EA)qAAED1ENq13ENE’5-W:1EA01pEFW1EA)qAAE1DP5UA1WA1=WF/1Q/7/%1EA01=WF/1Q/7/^1NqD3q:)WBq-S/11
=WF/1Q/7/l1DP5UD1)Pq1NE0WE)W5A13E))qNA1591E10WNq:)W5AE-1EA)qAAE1UW)P1)Pq12EWA1-5’q1WA1)Pq10WNq:)W5A1591`>ERWD/1
n
bl kn
at
Pu ch
Te
Sectorized Antenna
YqBqNE-10WNq:)W5AE-1EA)qAAED1:EA1’q1:52’WAq015A1E1DWAF-q135-q1)51:5AD)N4:)1E1Dq:)5NWbq01EA)qAAE/11
HPqS1 ENq1 UW0q-S1 4Dq01 WA1 :q--4-EN1 )q-q3P5AS1 WA9NED)N4:)4Nq/1 =5N1 qRE23-qL1 <1 :q--1 :EA1 ’q1 Dq:)5NWbq01 WA)51 )PNqq1 5N1 DWR1
Dq:)5ND/1=WF/1Q/7/Z1DP5UD1NE0WE)W5A13E))qNA1591)PqDq1Dq:)5NWbq01EA)qAAED/1
g e
io led
Fig. 1.4.8 : Radiation pattern of sectorized antennas
ic ow
Antenna arrays
n
<A1EA)qAAE1ENNES1WD1E1:5A9WF4NE)W5A159124-)W3-q1EA)qAAED1+q-q2qA)DK1ENNEAFq01)51E:PWqBq1E1FWBqA1NE0WE)W5A13E))qNA/1
bl kn
G4-)W3-q1EA)qAAED1E--5U10W99qNqA)10WBqNDW)S1D:Pq2qD1)51W23N5Bq1)Pq1V4E-W)S1EA01Nq-WE’W-W)S1591E1UWNq-qDD1-WA8/1
<A)qAAE10WBqNDW)S1WD1qD3q:WE--S1q99q:)WBq1E)12W)WFE)WAF1q99q:)D159124-)W3E)P13N53EFE)W5A/11
at
Pu ch
HPWD1WD1’q:E4Dq124-)W3-q1EA)qAAED1E--5U1E1Nq:qWBqN1DqBqNE-15’DqNBE)W5AD1591)Pq1DE2q1DWFAE-/1
√E:P1EA)qAAE1UW--1qR3qNWqA:q1E10W99qNqA)1WA)qN9qNqA:q1qABWN5A2qA)/1O915Aq1EA)qAAE1WD1qR3qNWqA:WAF1E10qq319E0qL1W)1WD1
Te
-W8q-S1)PE)1EA5)PqN1PED1E1D499W:WqA)1DWFAE-/1(5--q:)WBq-S1D4:P1E1DSD)q21:EA13N5BW0q1’q))qN1-WA8/1
–W99qNqA)10WBqNDW)S1D:Pq2qD1ENq135DDW’-q/1
]Aq1D4:P1D:Pq2q1WD1-WbWHSkλvR:kAWA-kSz1UPqNq1)Pq1Nq:qWBqN1E-UESD14DqD1)Pq1EA)qAAE1q-q2qA)1UW)P1)Pq1-ENFqD)154)34)/1
HPq1 5)PqN1 )S3q1 591 0WBqNDW)S1 WD1 :kAWA-kSzR Hλ)BkvkvM1 WA1 UPW:P1 E1 :52’WAE)W5A1 591 35UqN1 591 E--1 )Pq1 DWFAE-D1 WD1 )E8qA1 )51
3N504:q1FEWA/1
=WF/1Q/7/U1DP5UD1)U51D4:P10W99qNqA)1D:Pq2qD/1
o OA1=WF/1Q/7/U1+EK1)U51o[71EA)qAAED1ENq1ENNEAFq01UW)P1E10WD)EA:q1591o[Z1’q)UqqA1)Pq2/1
o OA1=WF/1Q/7/U1+’K1)PNqq1D)EA0EN01o[Z10W35-qD1ENq1:52’WAq01UW)P1E10WD)EA:q1591o[Z1’q)UqqA1)Pq2/1
(a) (b)
Fig. 1.4.9 : Diversity antenna systems
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-17 Introduction to Mobile Computing
YWA:q1UWNq-qDD1Aq)U5N8D14Dq14AF4W0q012q0WE1D4:P1ED1NE0W51UEBqDL1)Pq1DWFAE-1PED1A51UWNqD1)510q)qN2WAq1)Pq10WNq:)W5A1591
3N53EFE)W5AL1UPqNq1ED1DWFAE-D1WA1UWNq01Aq)U5N815A-S1)NEBq-1E-5AF1)Pq1UWNq/11
OA1UWNq01Aq)U5N8L15Aq1:EA1qEDW-S10q)qN2WAq1)Pq1’qPEBW5N1591E1DWFAE-1)NEBq-WAF1E-5AF1)PWD1UWNq1D4:P1ED1Nq:qWBq0135UqN1
0q3qA0WAF15A1)Pq1-qAF)P/11
=5N1UWNq-qDD1)NEAD2WDDW5AL1)PWD13Nq0W:)E’-q1’qPEBW5N1WD15A-S1BE-W01WA1E1BE:442/1<D1DP5UA1WA1=WF/1Q/%/Q10q3qA0WAF1435A1
)Pq10WD)EA:q19N521)Pq1DqA0qNL1)Pq1)NEAD2W))q01DWFAE-1:EA19E--1WA)51)Pq195--5UWAF1NEAFqD/1
1. Transmission Range
e
;W)PWA1)PWD1NEAFq1)Pq1Nq:qWBqN1Nq:qWBqD1)Pq1DWFAE-D1UW)P1E1BqNS1-5U1qNN5N1NE)q1EA01PqA:q1E’-q1)51:5224AW:E)q/1
2. Detection Range
g
io led
;W)PWA1)PWD1NEAFq1)Pq1Nq:qWBqN1:EA10q)q:)1)Pq1)NEAD2WDDW5A1W/q/1)Pq1)NEAD2W))q0135UqN1WD1-ENFq1qA54FP1)510W99qN1DWFAE-1
9N521’E:8FN54A0/1
3. Interference Range
ic ow
;W)PWA1)PWD1NEAFqL1)Pq1DqA0qN12ES1WA)qN9qNq1UW)P15)PqN1)NEAD2WDDW5AD1’S1E00WAF1)51’E:8FN54A01A5WDq/1HPq1Nq:qWBqN1UW--1
n
A5)1’q1E’-q1)510q)q:)1)Pq1DWFAE-1’4)1)Pq1DWFAE-12ES10WD)4N’15)PqN1DWFAE-D/1
bl kn
at
Pu ch
Te
1. Blocking / Shadowing
HPq1DWFAE-D1UW)P1PWFPqN19NqV4qA:S1’qPEBq1-W8q1E1D)NEWFP)1-WAq/11
HPqDq1DWFAE-D1ENq1’-5:8q01’S1qBqA1D2E--15’D)E:-qD1-W8q1E1UE--L1E1:EN15N1E1)N4:815A1E1N5E0/1HPWD13PqA52qA5A1WD1:E--q01
’-5:8WAF15N1DPE05UWAF/1
2. Reflection
;PqA1 E1 DWFAE-1 qA:54A)qND1 E1 D4N9E:q1 )PE)1 WD1 -ENFq1 Nq-E)WBq1 )51 )Pq1 UEBq-qAF)P1 591 )Pq1 DWFAE-L1 E1 3PqA52qA5A1 :E--q01
e
Nq9-q:)W5A15::4ND/11
HPq1Nq9-q:)q01DWFAE-1WD1A5)1ED1D)N5AF1ED1)Pq15NWFWAE-L1ED1)Pq15’6q:)1:EA1E’D5N’1D52q1591)Pq1DWFAE-zD135UqN/1
g
3. Refraction
io led
HPWD1q99q:)15::4ND1’q:E4Dq1)Pq1Bq-5:W)S1591)Pq1q-q:)N52EFAq)W:1UEBqD10q3qA0D15A1)Pq10qADW)S1591)Pq12q0W421)PN54FP1
UPW:P1W)1)NEBq-D/11
ic ow
<D1DP5UA1WA1=WF/1Q/%/ZL1UEBqD1)PE)1)NEBq-1WA)51E10qADqN12q0W421ENq1’qA)1)5UEN0D1)Pq12q0W42/1
4. Scattering
n
O91)Pq15’6q:)1DWbq1WD1WA1)Pq15N0qN1591)Pq1UEBq-qAF)P1591)Pq1DWFAE-15N1-qDDL1)PqA1)Pq1DWFAE-1:EA1’q1D:E))qNq01WA)512EAS1
bl kn
D2E--1DWFAE-D/11
Y:E))qNq01DWFAE-D1ENq1UqE8qN1)PEA1)Pq15NWFWAE-1DWFAE-/1
at
Pu ch
5. Diffraction
–W99NE:)W5A15::4ND1E)1)Pq1q0Fq1591EA1W23qAq)NE’-q1’50S1)PE)1WD1-ENFq1ED1:523ENq01)51)Pq1UEBq-qAF)P1591E1NE0W51UEBq/1
Te
As a result, we have multiple copies of the same signal being transmitted and received with different delays, different
amplitudes and phases.
This effect caused by multi-path propagation is called delay spread i.e. the original signal is spread due to different
delays of parts of the signal.
g e
io led
ic ow
n
bl kn
at
Pu ch
As shown in Fig. 1.5.3, a short impulse will be smeared out into a broader impulse or into several weaker impulses. As
a result, energy intended for one symbol spills over the adjacent symbol. This effect is called inter symbol interference
(ISI).
ISI makes detection of the signal difficult at the receiver. In real situation many weaker impulses arrive at the receiver.
Some of the received pulses are too weak to be detected and appear as noise.
1.5.3(b) Fading
The term fading means rapid fluctuations of the amplitudes, phases, or multipath delays of a radio signal over a short
period or short travel distance.
1. Fading effect due to mobility
In addition to multipath propagation, another problem called fading occurs due to mobility. Following two types of
fading may occur due to mobility.
(i) Short-term fading
Short term fading occurs when receivers or senders or both move. It occurs due to the quick changes in the received
power.
The receiver now has to try to continuously adapt to the varying channel characteristics.
However, if such changes are too fast then (e.g. driving on a highway through a city) receiver cannot adapt fast
enough and the error rate of the transmission increases dramatically. Short term fading is shown in Fig. 1.5.4.
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-20 Introduction to Mobile Computing
e
E-UESD1D)ESD1UW)PWA1:qN)EWA1-W2W)D/1
g
2. Fading Effects due to Multipath Time Delay Spread
io led
(i) Flat Fading
=-E)19E0WAF15::4ND1UPqA1)Pq1’EA0UW0)P1591)Pq1)NEAD2W))q01DWFAE-1WD1-qDD1)PEA1)Pq1:5PqNqA:q1’EA0UW0)P1591)Pq1:PEAAq-/11
ic ow
√V4WBE-qA)-SL1 )Pq1 9E0WAF1 WD1 9-E)1 9E0WAF1 W91 )Pq1 DS2’5-1 3qNW501 591 )Pq1 DWFAE-1 WD1 25Nq1 )PEA1 )Pq1 N2D1 0q-ES1 D3NqE01 591 )Pq1
:PEAAq-/1
n
(ii) Frequency Selective Fading
bl kn
Pu ch
√V4WBE-qA)-S1)Pq1DS2’5-D104NE)W5A1591)Pq1DWFAE-1WD1-qDD1)PEA1)Pq1N2D10q-ES1D3NqE0/1
YWFAE-D1 ENq1 )Pq1 3PSDW:E-1 Nq3NqDqA)E)W5A1 591 0E)E/1 –E)E1 WA1 E1 :5224AW:E)W5A1 DSD)q21 :EA1 ’q1 qR:PEAFq01 )PN54FP1 )Pq1
DWFAE-D/1YWFAE-D1ENq194A:)W5AD1591)W2q1EA01-5:E)W5A/1
YWFAE-13ENE2q)qND1Nq3NqDqA)1)Pq10E)E1BE-4qD/1YWFAE-13ENE2q)qND1ENq1)Pq1<23-W)40q1+<KL19NqV4qA:S1+9K1EA013PEDq1DPW9)1
+qK/1HPq125D)1WA)qNqD)WAF1)S3q1591DWFAE-195N1NE0W51)NEAD2WDDW5A1WD13qNW50W:1DWFAE-1+qD3q:WE--S1DWAq1UEBqKL14Dq01ED1:ENNWqND/1
HPq1FqAqNE-194A:)W5A1591E1DWAq1UEBq1WDL11D+)K1i1<)1DWA+Z119)1)1f1)K1
Fig. 1.6.1 : Time Domain representation of a signal (a sine wave without phase
shift and with a phase shift )
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-21 Introduction to Mobile Computing
1.7 Multiplexing
.MU - May 18.
G4-)W3-qRWAF12qEAD1)Pq1E’W-W)S1)51DqA010E)E1:52WAF19N52124-)W3-q1D54N:qDL14DqND15N1:PEAAq-D15BqN1E1:5225A1DPENq01
)NEAD2WDDW5A1 2q0W421 UW)P1 2WAW2421 WA)qN9qNqA:q1 EA01 2ERW2421 4)W-WbE)W5A/1 H51 2E8q1 q99W:WqA)1 4Dq1 591 PWFP>D3qq01
:5224AW:E)W5A1-WAqDL1D52q195N2159124-)W3-qRWAF1WD14Dq0/11
=54N1)S3qD159124-)W3-qRWAF1ENq1:5225A-S14Dq01WA1:5224AW:E)W5A1DSD)q2D/1
Q/1 Y3E:q1–WBWDW5A1G4-)W3-qRWAF1+Y–GK1
Z/1 HW2q1–WBWDW5A1G4-)W3-qRWAF1+H–GK1
‘/1 =NqV4qA:S1–WBWDW5A1G4-)W3-qRWAF1+=–GK1
e
7/1 (50q1–WBWDW5A1G4-)W3-qRWAF1+(–GK1
g
1 io led
1.7.1 Space Division Multiplexing (SDM)
OA1D3E:q10WBWDW5A124-)W3-qRWAFL1)Pq1qA)WNq1NqFW5A1591)NEAD2WDDW5A1WD10WBW0q01WA)5124-)W3-q1D3E:qD/1=5N1qR:PEAFWAF10E)EL1
qE:P14DqN1WD1E--5:E)q01E1:5224AW:E)W5A1:PEAAq-/R
ic ow
=WF/1Q/l/Q1DP5UD1DWR1:PEAAq-D18%# )518&1EA01E1)PNqq10W2qADW5AE-1:55N0WAE)q1DSD)q2/1HPq10W2qADW5AD1ENq1:50q1:L1)W2q1)1
EA019NqV4qA:S1+9K/11O)1E-D51DP5UD1D3E:q1Y'1Nq3NqDqA)q01BWE1:WN:-qD/1(PEAAq-18%1)518(1:EA1’q12E33q015A)51)Pq1)PNqq1D3E:qD1
n
Y%1)51Y(1UPW:P1:-qEN-S1Dq3ENE)qD1)Pq1:PEAAq-/1
bl kn
O)1 :EA1 ’q1 A5)q01 )PE)1 )PqNq1 WD1 D52q1 D3E:q1 ’q)UqqA1 qE:P1 :PEAAq-/1 HPWD1 D3E:q1 WD1 :E--q01 E1 M<UA:R HLUvvWb/1 =5N1 )Pq1
Nq2EWAWAF1:PEAAq-DL1)PNqq1E00W)W5AE-1D3E:qD1U54-01’q1Aqq0q0/11
at
Pu ch
Te
Application
HPWD124-)W3-qRWAF1D:Pq2q1:EA1’q14Dq0195N1=G1NE0W51D)E)W5AD1W91E1DWAF-q1=G1D)E)W5A1)NEAD2W)D1WA1E1FWBqA1NqFW5A1+DES1D52q1
:W)SK1 5A-S/1 HPq1 DE2q1 )NEAD2WDDW5A1 NEAFqD1 :EA1 )PqA1 ’q1 DPENq01 ’S1 0W99qNqA)1 NE0W51 D)E)W5AD1 EN54A01 )Pq1 U5N-01 UW)P54)1
WA)qN9qNqA:q/11
Y–G1WD1E-D514Dq01WA1:q--4-EN1DSD)q2D1UPqNq1)Pq1DqNBW:q1ENqE1WD10WBW0q01WA)510W99qNqA)1:q--D/1√E:P1:q--1WD1EDDWFAq010W99qNqA)1
9NqV4qA:S1’EA01D4:P1)PE)1)PqNq1WD1A51WA)qN9qNqA:q1WA1E06E:qA)1:q--D/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-22 Introduction to Mobile Computing
Advantage
Y–G1WD1qEDS1)51W23-q2qA)/1
Problem
O91)U515N125Nq1:PEAAq-D1ENq1qD)E’-WDPq01WA1)Pq1DE2q1D3E:q1+=5N1qRE23-qL1DqBqNE-1NE0W51D)E)W5AD1UEA)1)51’N5E0:ED)1WA)51
)Pq1DE2q1:W)SKL1)PqA1Y–G1E-5Aq1:EAA5)1’q14Dq0/1
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
1
Fig. 1.7.3 : Time division multiplexing
e
Advantage
g
io led
HPqNq1WD15A-S15Aq1:ENNWqN1WA1)Pq12q0W421E)1EAS1)W2q1UPW:P1NqD4-)D1WA1PWFP1)PN54FP34)1qBqA1W91)PqNq1ENq12EAS14DqND/R
Disadvantage
ic ow
Q/1 O91)U51)NEAD2WDDW5AD15BqN-E31WA1)W2qL1HλKHLUvvWbRkvSWABWAWvHW12ES15::4N/11
Z/1 H51EB5W01:5>:PEAAq-1WA)qN9qNqA:qL1W)1WD1NqV4WNq01)PE)10W99qNqA)1DqA0qND1ENq13Nq:WDq-S1DSA:PN5AWbq0/R
n
1.7.4 Frequency and Time Division Multiplexing
bl kn
OA1)PWD124-)W3-qRWAF1D:Pq2qL19NqV4qA:S1EA01)W2q10WBWDW5A124-)W3-qRWAF1ENq1:52’WAq0/11
at
Pu ch
<D1 DP5UA1 WA1 =WF/1 Q/l/7L1 :PEAAq-1 8'1 4DqD1 :qN)EWA1 9NqV4qA:S1 ’EA01 95N1 E1 :qN)EWA1 E254A)1 591 )W2q/1 T5U1 F4EN01 D3E:qD1 ENq1
NqV4WNq01WA1’5)P10W2qADW5AD/11
Te
Application
HPq1D:Pq2q1WD14Dq01WA1XYG1+X-5’E-1YSD)q2195N1G5’W-q1(5224AW:E)W5AK1
Advantages
Q/1 ]99qND1’q))qN13N5)q:)W5A1EFEWAD)1)E33WAF/R
Z/1 λN5BW0qD13N5)q:)W5A1EFEWAD)19NqV4qA:S1Dq-q:)WBq1WA)qN9qNqA:q/R
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-24 Introduction to Mobile Computing
Disadvantage
Tq:qDDENS1:55N0WAE)W5A1WD1NqV4WNq01’q)UqqA10W99qNqA)1DqA0qND/R
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
OA1)PWDL1DWFAE-D19N52124-)W3-q1WA0q3qA0qA)1D54N:qD1:EA1’q1)NEAD2W))q01E)1)Pq1DE2q1)W2q15BqN1)Pq1DE2q19NqV4qA:S1’EA0/11
HPWD1)ED81:EA1’q1E:PWqBq01BWE1D3NqE01D3q:)N421)q:PAWV4q1WA1UPW:P1D3q:WE-1:50qD1:E--q01ED15N)P5F5AE-1:50qD1ENq14Dq01)51
D3NqE01qE:P1DWFAE-15BqN1E1-ENFqL1:5225A19NqV4qA:S1’EA0/1
Y5L1WA1(–GL1qE:P1:PEAAq-1WD1EDDWFAq01E13EN)W:4-EN15N)P5F5AE-1:50q1EA01)PWD1WD1P5U124-)W3-qRWAF1WD1E:PWqBq0/1
X4EN01D3E:qD1ENq1A5U1NqV4WNq01WA1)Pq1:50q10W2qADW5A/11
Advantages
Q/1 O)1FWBqD1F55013N5)q:)W5A1EFEWAD)1WA)qN9qNqA:q1EA01)E33WAF/11
Z/1 XEA0UW0)P14)W-WbE)W5A1WD1BqNS1q99W:WqA)/1
‘/1 T51DSA:PN5AWbE)W5A1WD1Aqq0q01’q)UqqA1)Pq1DqA0qN1EA01)Pq1Nq:qWBqN/1
Disadvantages
Q/1 eENSWAF14DqN10E)E1NE)qD/1
Z/1 G5Nq1:523-qR1DWFAE-1NqFqAqNE)W5A1EA01PqA:q1PWFP1:523-qRW)S1E)1)Pq1Nq:qWBqN/1
‘/1 O)1WD1W23-q2qA)q014DWAF1D3NqE01D3q:)N421)q:PA5-5FS/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-25 Introduction to Mobile Computing
7/1 <1Nq:qWBqN124D)1’q13Nq:WDq-S1DSA:PN5AWbq01UW)P1)Pq1)NEAD2W))qN1)51E33-S10q:50WAF1:5NNq:)-S/11
%/1 λNq:WDq1 35UqN1 :5A)N5-1 WD1 NqV4WNq0/1 <--1 DWFAE-D1 DP54-01 NqE:P1 )Pq1 Nq:qWBqN1 UW)P1 25Nq1 5N1 -qDD1 )Pq1 DE2q1 35UqN1
5)PqNUWDq1-5U135UqN1DWFAE-D1:54-01’q10NEWAq01’S1PWFP135UqN15AqD/11
Q. What are the main benefits of spread spectrum system ? Explain direct sequence spread spectrum in detail. How can
DSSS systems benefit from multipath propagation ? (May 12, 10 Marks)
Q. What are benefits of Spread Spectrum systems ? (Dec. 12, 5 Marks)
Q. Explain different types of Spread Spectrum technique used in cellular system. (May 13, 5 Marks)
Q. What is Spread Spectrum ? (May 14, 5 Marks)
Y3NqE01D3q:)N421WD1EA1W235N)EA)195N21591qA:50WAF195N1UWNq-qDD1:5224AW:E)W5AD/11
e
OA1:5A)NED)1)51NqF4-EN1AENN5U’EA01)q:PA5-5FSL1)Pq1D3NqE0>D3q:)N4213N5:qDD1WD1E1UW0q’EA01)q:PA5-5FS/1
g
OA1)PWD1)q:PAWV4q1)Pq19NqV4qA:S1591)Pq1)NEAD2W))q01DWFAE-1WD10q-W’qNE)q-S1D3NqE01WA1)Pq19NqV4qA:S1052EWA/1HPq1NqD4-)EA)1
io led
DWFAE-1PED124:P1FNqE)qN1’EA0UW0)P1)PEA1)Pq15NWFWAE-1DWFAE-/1
HPq13N5:qDD1591D3NqE0WAF1EA010q>D3NqE0WAF1WD1DP5UA1WA1=WF/1Q/Z/Q/1
ic ow
n
bl kn
at
Pu ch
Te
+WK1 =WF/1Q/Z/Q1+WK1DP5UD1AENN5U’EA01DWFAE-1)NEAD2W))q0195N21E1DqA0qN/1HPWD1WD1)Pq1DWFAE-14DqN1UEA)D1)51DqA0/1
+WWK1 0λ[091WD1)Pq135UqN10qADW)S1591)PWD1DWFAE-/1HPq1qAqNFS1NqV4WNq01)51)NEAD2W)1)Pq1DWFAE-1WD1qV4E-1)51)Pq1ENqE1:5BqNq01
’S1)Pq1DWFAE-/11
+WWWK1 Yq:5A01 D)q31 WD1 )51 D3NqE01 )Pq1 4DqN1 DWFAE-/1 HPq1 3N5:qDD1 591 D3NqE0WAF1 )Pq1 DWFAE-1 WD1 A5)PWAF1 ’4)1 :5ABqN)WAF1 E1
AENN5U’EA01DWFAE-1WA)51’N5E0’EA01DWFAE-/1HPWD1:EA1’q1E:PWqBq01’S124-)W3-SWAF1E1λT1DqV4qA:q1UW)P1)Pq14DqN10E)E/1
HPq1 qAqNFS1 NqV4WNq01 )51 )NEAD2W)1 )Pq1 DWFAE-1 WD1 DE2qL1 ’4)1 )Pq1 35UqN1 -qBq-1 WD1 24:P1 -5UqN1 )PEA1 )Pq1 AENN5U’EA01
DWFAE-/1
+WBK1 –4NWAF1 )Pq1 )NEAD2WDDW5AL1 AENN5U1 ’EA01 EA01 ’N5E0’EA01 WA)qN9qNqA:q1 Fq)1 E00q01 )51 )Pq1 DWFAE-1 +DP5UA1 WA11
=WF/1Q/Z/Q1+WWWKK/1
+BK1 <)1)Pq1Nq:qWBqN1D421591WA)qN9qNqA:q1EA014DqN1DWFAE-D1WD1Nq:qWBq01+DP5UA1WA1=WF/1Q/Z/Q1+WBKK/1
+BWK1 HPq1 Nq:qWBqN1 A5U1 0qD3NqE0D1 )Pq1 DWFAE-1 W/q/1 :5ABqN)D1 )Pq1 D3NqE01 4DqN1 DWFAE-1 WA)51 E1 AENN5U’EA01 DWFAE-/1 HPWD1 WD1
E:PWqBq01 ’S1 24-)W3-SWAF1 )Pq1 Nq:qWBq01 DWFAE-1 UW)P1 )Pq1 DE2q1 λT1 DqV4qA:q1 4Dq01 WA1 D)q31 Z1 EA01 ’S1 4DWAF1 ’EA03EDD1
9W-)qN1)51:4)159919NqV4qA:WqD1-q9)1EA01NWFP)1591)Pq1AENN5U’EA01DWFAE-1+DP5UA1WA1=WF/1Q/Z/Q1+BKK/R
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-26 Introduction to Mobile Computing
g e
Q/1 (523-qRW)S1591Nq:qWBqN1WD1WA:NqEDq0/1
io led
Z/1 WENFq19NqV4qA:S1’EA01WD1Aqq0q0195N1D3NqE0WAF1)Pq1DWFAE-/11
‘/1 Y3NqE01DWFAE-D1UW)P1-5U1D)NqAF)P12ES1WA)qN9qNq1UW)P15)PqN1)NEAD2WDDW5AD1EA01E33qEN1ED1A5WDq/1
7/1 λNq:WDq135UqN1:5A)N5-1WD1Aqq0q0/1
ic ow
L?AWU:kvMRSLWR-?WHSA<)RHUvRBWRUHLkWAW:RkvRS0λR:kBBWAWvSR0Uz-R
n
Q/1 –WNq:)1YqV4qA:q1Y3NqE01Y3q:)N421+–YYYK11
bl kn
Z/1 =NqV4qA:S1\533WAF1Y3NqE01Y3q:)N421+=\YYK1
=WF/1Q/Z/Z1DP5UD1)Pq1)NEAD2W))qN1591–YYY/1
Te
1. DSSS Transmitter
–YYY1)NEAD2W))qN1WAB5-BqD1)U512E65N1D)q3D/1
LSW?R:RMRL?AWU:kvMRSLWR-kMvUbRR
Y3NqE0WAF1WA1–WNq:)1YqV4qA:q12504-E)W5A1WD1E:PWqBq01’S12504-E)WAF1)Pq1:ENNWqN1DWFAE-1+4DqN10E)EK1UW)P1E10WFW)E-1:50q1
DqV4qA:q1UPW:P1PED1E1’W)1NE)q124:P1PWFPqN1)PEA1)PE)1591)Pq12qDDEFq1)51’q1DqA)/11
HPWD10WFW)E-1:50q1DqV4qA:q1WD1)S3W:E--S1E13Dq405NEA0521’WAENS1:50q/1O)1WD1E-D518A5UA1ED1λT1+n3Dq405>A5WDqnK1DqV4qA:q1
5N1:PW33WAF1DqV4qA:q/1
Y3NqE0WAF1:EA1’q105Aq1’S1DW23-S1`]YWAF14DqN1’W)1D)NqE21UW)P1:PW33WAF1DqV4qA:q/1
HPq1)W2q13qNW501591E1DWAF-q1’W)1WA1)Pq1λT1:50q1WD1)qN2q01E1!"#$L1EA01)Pq1’W)1NE)q1591)Pq1λT1:50q1WD1)qN2q01)Pq1!"#$%&'()/111
HPq1D3NqE0WAF13N5:qDD1WD1DP5UA1WA1=WF/1Q/Z/‘/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-27 Introduction to Mobile Computing
g e
Fig. 1.8.3 : Spreading with DSSS
io led
(5ADW0qN1)Pq1:PW33WAF1DqV4qA:q1ED1VQQVQVQ/11
O91)Pq14DqN1’W)1WD1V1)Pq1NqD4-)1591`]YWAF1WD1)Pq1:PW33WAF1DqV4qA:q1W)Dq-9/11
ic ow
O91)Pq14DqN1’W)1WD1Q1)Pq1NqD4-)1WD1)Pq1:523-q2qA)1591:PW33WAF1DqV4qA:q/1
n
O911)Pq11’W)104NE)W5A15914DqN10E)E1WD1))#EA01)Pq104NE)W5A15915Aq1:PW31WA1:PW33WAF1DqV4qA:q1WD1)*L1)PqA1)Pq1D3NqE0WAF19E:)5N11
bl kn
D1i1))+#)*#0q)qN2WAqD1)Pq1’EA0UW0)P1591E1DWFAE-/11
O91)Pq15NWFWAE-1DWFAE-1PED1’EA0UW0)P101)PqA1)Pq1NqD4-)WAF1DWFAE-1Aqq0D1+-RDR0K1’EA0UW0)P/1
at
Pu ch
LSW?R>RMREU:kλR)λ:<bUSkλvR
HPq1D3NqE01DWFAE-1WD1A5U12504-E)q01UW)P1E1NE0W51:ENNWqN/11
Te
HPq1NE0W51:ENNWqN1DPW9)D1)PWD1DWFAE-1)51)Pq1:ENNWqN19NqV4qA:S/11
HPWD1DWFAE-1WD1)PqA1)NEAD2W))q0/1
2. DSSS Receiver
HPq1–YYY1Nq:qWBqN1WAB5-BqD1)PNqq1D)q3D1"1
+WK1 –q2504-E)W5A1
+WWK1 (5NNq-E)W5A1
+WWWK1 –q:WDW5A1GE8WAF1
NkOR PW)λ:<bUSλAR
–q2504-E)W5A1591)Pq1Nq:qWBq01DWFAE-1WD1E:PWqBq01’S14DWAF1)Pq1DE2q1:ENNWqN1ED1)Pq1)NEAD2W))qNL1NqBqNDWAF1)Pq12504-E)W5A1
3N5:qDD/1XEA0UW0)P1591)Pq1NqD4-)EA)1DWFAE-1WD1E33N5RW2E)q-S1DE2q1ED1)PE)1591)Pq15NWFWAE-1D3NqE01D3q:)N421DWFAE-/1
NkkOR >λAAWbUSλAR
\qNq1 )Pq1 Nq:qWBqN1 4DqD1 )Pq1 DE2q1 3Dq4051 NEA0521 DqV4qA:q1 +(PW31 DqV4qA:qK1 ED1 )Pq1 )NEAD2W))qN/1 λDq4051 NEA0521
DqV4qA:qD1 E)1 )Pq1 DqA0qN1 EA01 )Pq1 Nq:qWBqN1 PEBq1 )51 ’q1 3Nq:WDq-S1 DSA:PN5AWbq01 ’q:E4Dq1 )Pq1 Nq:qWBqN1 :E-:4-E)qD1 )Pq1
3N504:)1591E1:PW31+`]Y153qNE)W5AK1UW)P1)Pq1WA:52WAF1DWFAE-/1–4NWAF1E1’W)13qNW501EA1WA)qFNE)5N1E00D1E--1)PqDq13N504:)D/11
NkkkOR PWHk-kλvR@vkSR
=WAE--S1)Pq10q:WDW5A14AW)10q:W0qD1W91)Pq1D421Nq3NqDqA)D1’WAENS1V15N1QL1’EDq015A1)Pq1D421FqAqNE)q01’S1)Pq1WA)qFNE)5N1
04NWAF1qE:P1’W)13qNW50/1
DSSS and Multipath fading
e
;q18A5U1)PE)1WA124-)W3E)P13N53EFE)W5A1)PqNq1qRWD)1DqBqNE-13E)PD1UW)P10W99qNqA)10q-ESD1’q)UqqA1E1)NEAD2W))qN1EA01E1
g
Nq:qWBqN/11<D1E1NqD4-)1)Pq1Nq:qWBqN12ES1Nq:qWBq124-)W3-q1:53WqD1591)Pq1DWFAE-L1qE:P1UW)P10W99qNqA)10q-ESD/1
io led
EUJWRAWHWkAWA-R:EA1’q14Dq01)512W)WFE)q1)Pq1q99q:)159124-)W3E)P13N53EFE)W5A/1
<1NE8q1Nq:qWBqN14DqD1vR:5NNq-E)5ND1:E--q01BkvMWA-195N1vRD)N5AFqD)13E)PD/11
√E:P1:5NNq-E)5N1WD1DSA:PN5AWbq01)51)Pq1)NEAD2W))qN13-4D1)Pq10q-ES15A1)PE)1D3q:W9W:13E)P/11
ic ow
<D1D55A1ED1)Pq1Nq:qWBqN10q)q:)D1E1AqU13E)P1UPW:P1WD1D)N5AFqN1)PEA1)Pq1:4NNqA)-S1UqE8qD)13E)PL1W)1EDDWFAD1)PWD1AqU13E)P1
n
)51)Pq1:5NNq-E)5N1UW)P1)Pq1UqE8qD)13E)P/11
bl kn
HPq154)34)D1591)Pq1:5NNq-E)5ND1ENq1)PqA1:52’WAq01EA019q01WA)51)Pq10q:WDW5A14AW)/1
at
Pu ch
Te
QRU)?bWRλBRPLLLRR
ФDqN1–E)E1"1VQ1
(PW31"1QVQQVQQQVVV1+QQ>:PW31XEN8qN1:50qK1
`]Y1591’W)1V1UW)P1:PW3"1QVQQVQQQVVV1
`]Y1591’W)1Q1UW)P1:PW3"1VQVVQVVVQQQ11
Y3NqE01DWFAE-11111"1QVQQVQQQVVVVQVVQVVVQQQ11
Yq:qWBq01DWFAE-1"1QVQQVQQQVVVVQVVQVVVQQQ11
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-29 Introduction to Mobile Computing
`]Y1591Nq:qWBq01DWFAE-1UW)P1:PW3"11
+QVQQVQQQVVVQVQQVQQQVVVK1`]Y1+QVQQVQQQVVVVQVVQVVVQQQ1K1i1+VVVVVVVVVVVQQQQQQQQQQQK1
YqD4-)1591OA)qFNE)5N"1V1L1QQ1
YqD4-)1591–q:WDW5A14AW)"1V1r171D51’W)1WD1V1
1 1 1 111111QQ1d1l1D51’W)1WD1Q1
–q:50q010E)E"1VQ1
√BqA1W91qNN5N15::4ND104NWAF1)NEAD2WDDW5AL1Nq:qWBq01DWFAE-1:EA1D)W--1’q10q:50q01:5NNq:)-S/11
=5N1 q/F/1 954N)PL1 9W9)PL1 DqBqA)P1 EA01 954N)qqA)P1 ’W)1 WA1 Nq:qWBq01 DWFAE-1 WD1 :PEAFq0L1 )PqA1 )Pq1 Nq:qWBq01 DWFAE-1 U54-01 ’q1
QVQS:QSQVVVVQ:VQVVVQQQ1
T5U1`]Y1591Nq:qWBq01DWFAE-1UW)P1:PW31"11
+QVQQVQQQVVVQVQQVQQQVVVK1`]Y1+QVQS:QSQVVVVQ:VQVVVQQQK1i1+VVVQQVQVVVV1QQVQQQQQQQQK1
YqD4-)1591WA)qFNE)5N"1‘L1QV1
e
YqD4-)1591–q:WDW5A14AW)"1‘1r171D51’W)1WD1V1
g
1 1 1 1 11111QV1d1l1D51’W)1WD1Q1
io led
–q:50q010E)E"1VQ1
Note : Decision maker decides on to 0 if the sum is between 0-4 and 1 if sum is between 7-11.
ic ow
Advantages of DSSS
n
Q/1 YqDWD)EA:q1)51AENN5U1’EA01WA)qN9qNqA:q1EA01EA)W>6E22WAF1q99q:)D/1
bl kn
Z/1 YqDWD)EA:q1)51OA)qN:q3)W5A/1
‘/1 YqDWD)EA:q1)51=E0WAF1+G4-)W3E)P1√99q:)DK/1
at
Pu ch
Disadvantages of DSSS
Q/1 λNq:WDq135UqN1:5A)N5-1Aq:qDDENS/1
Te
Z/1 ]BqNE--1DSD)q21WD1:523-qR/1
‘/1 OD1NqV4WNq01’q)UqqA1)Pq1DqA0qN1EA01)Pq1Nq:qWBqN/1
Applications of DSSS
HPq1–YYY1(5224AW:E)W5AD1ENq1UW0q-S14Dq01)50ES195N1GW-W)ENSL1OA04D)NWE-1Y:WqA)W9W:L1EA01(WBW-14DqD/1HPq1E33-W:E)W5AD1
WA:-40q1)Pq195--5UWAF1"R
:DR >PDGRAU:kλ-RR
1 O)1WD14Dq94-1WA124-)W3-q1E::qDD1:5224AW:E)W5AD1UPqNqWA12EAS14DqND1:5224AW:E)q15BqN1E1DPENq01:PEAAq-/11 1
=5N1qRE23-qL1(–G</1
>DR TUGVRR
R ;WNq-qDD1W<T1UW0q-S14Dq1D3NqE01D3q:)N421:5224AW:E)W5AD/1O√√√1ZVZ/QQ1WD1E1D)EA0EN01)PE)1WD10qBq-53q0195N125’W-q1
:5224AW:E)W5AL1 EA01 UW0q-S1 W23-q2qA)q01 )PN54FP54)1 )Pq1 U5N-0/1 HPq1 D)EA0EN01 0q9WAqD1 )PNqq1 )S3qD1 591 λPSDW:E-1
WESqN1 :5224AW:E)W5AD/1 HPqDq1 ENq1 1 OA9NENq01 +OYK1 (5224AW:E)W5ADL1 –WNq:)1 YqV4qA:q1 Y3NqE01 Y3q:)N421
(5224AW:E)W5ADL1=NqV4qA:S1\533WAF1Y3NqE01Y3q:)N421:5224AW:E)W5AD/1
;DR >λA:bW--RNLλvW-RR
R YqBqNE-1 2EA49E:)4NqND1 W23-q2qA)1 Y3NqE01 Y3q:)N421 WA1 (5N0-qDD1 3P5AqD1 04q1 )51 )PqWN1 E0BEA)EFqD1 -W8q1 Dq:4NW)SL1
W224AW)S1)51A5WDq1EA01-5AFqN1NEAFq/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-30 Introduction to Mobile Computing
e
O)1WD1-qDD1W224Aq1)51AENN5U’EA01WA)qN9qNqA:q/11
g
2. Fast hopping
io led
HNEAD2W))qN1:PEAFqD19NqV4qA:S1DqBqNE-1)W2qD104NWAF1E1’W)13qNW50/1OA1=WF/1Q/Z/^1)Pq1)NEAD2W))qN1P53D1)PNqq1)W2qD104NWAF1
E1’W)13qNW50/11
ic ow
n
bl kn
at
Pu ch
Te
=ED)1 9NqV4qA:S1 P533WAF1 DSD)q2D1 ENq1 25Nq1 :523-qR1 )51 W23-q2qA)1 ’q:E4Dq1 )NEAD2W))qN1 EA01 Nq:qWBqN1 DP54-01 D)ES1
DSA:PN5AWbq0/1
HPqDq1DSD)q2D1PEBq1’q))qN1NqDWD)EA:q1EFEWAD)1AENN5U’EA01WA)qN9qNqA:q1EA019NqV4qA:S1Dq-q:)WBq19E0WAF/1
FHSS Transmitter
=WF/1Q/Z/l1DP5UD1DW23-W9Wq01’-5:810WEFNE21591=\YY1)NEAD2W))qN/1
LSW?R:RM1 G504-E)q14DqN10E)E14DWAF10WFW)E->)5>EAE-5F12504-E)W5A1D4:P1ED1=Ym15N1XλYm/1=5N1qRE23-qL19NqV4qA:S19.1WD14Dq01
95N1E1’WAENS1V1EA019%1WD14Dq0195N1’WAENS1Q/11
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-31 Introduction to Mobile Computing
LSW?R>RM1 =NqV4qA:S1 P533WAF1 WD1 3qN95N2q01 ’S1 4DWAF1 P533WAF1 DqV4qA:q/1 HPq1 P533WAF1 DqV4qA:q1 WD1 9q01 WA)51 E1 9NqV4qA:S1
DSA)PqDWbqN1FqAqNE)WAF1)Pq1:ENNWqN19NqV4qA:S19'-1
LSW?R;RM1 Yq:5A01 2504-E)W5A1 WD1 05Aq/1 O)1 4DqD1 2504-E)q01 AENN5U’EA01 DWFAE-1 EA01 :ENNWqN1 9NqV4qA:S1 )51 FqAqNE)q1 E1 AqU1
D3NqE01DWFAE-1UW)P19NqV4qA:S15919'#f19.#95N1E1’W)1V1EA0119'-1f19%195N1E1’W)1Q/1
=HLLREWHWkAWAR
e
=\YY1Nq:qWBqN13qN95N2D1NqBqNDq194A:)W5AD1)51Nq:5AD)N4:)14DqN10E)E/111
g
LSW?R:RMR –q2504-E)q1Nq:qWBq010E)E1’S14DWAF1P533WAF1DqV4qA:q1EA01:5ABqN)1DWFAE-1WA)51AENN5U’EA01DWFAE-/1
io led
LSW?R>RM1 λqN95N21EAE-5F>)5>0WFW)E-12504-E)W5A1)51Nq:5AD)N4:)14DqN10E)E/1
ic ow
n
bl kn
at
Pu ch
Applications of FHSS
Q/1 XYG14DqD1D-5U19NqV4qA:S1P533WAF1)51EB5W01:5>:PEAAq-1WA)qN9qNqA:q1EA01)51WA:NqEDq1)Pq1:PEAAq-1:E3E:W)S/1
Z/1 X-4q)55)P14DqD1=\YY/1O)14DqD1lU19NqV4qA:WqD1UW)P1Q^VV1P53D[Dq:/1
‘/1 ;W<T1 "1 G5D)1 591 )Pq1 ;WNq-qDD1 W<T1 D)EA0EN0D1 0q9WAq1 )PNqq1 )S3qD1 591 λPSDW:E-1 WESqN1 :5224AW:E)W5AD/1 HPqDq1 ENq1
OA9NENq01 +OYK1 (5224AW:E)W5ADL1 –WNq:)1 YqV4qA:q1 Y3NqE01 Y3q:)N421 (5224AW:E)W5ADL1 =NqV4qA:S1 \533WAF1 Y3NqE01
Y3q:)N421:5224AW:E)W5AD/1
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-32 Introduction to Mobile Computing
e
DW24-)EAq54D-S/1<D1-5AF1ED1)Pq1EBqNEFq1-qBq-1591)Pq1 9NqV4qA:WqD/1O91E)1E1D3q:W9W:1252qA)L1)Pq1
g
Nq:qWBq01DWFAE-1WD1PWFP1qA54FPL1)Pq1–YYY1Nq:qWBqN1UW--1
io led =\YY1DSD)q21WD14DWAF1E1:ENNWqN19NqV4qA:S1
’q1E’-q1)510q)q:)1)Pq1NE0W51DWFAE-/11 DWFAW9W:EA)-S19E0q01ED1E1NqD4-)159124-)W3E)PL1
)Pq1=\YY1Nq:qWBqN1:54-01A5)1Fq)1qA54FP1
qAqNFS1)510q)q:)1)Pq1NE0W51DWFAE-/1
ic ow
)W2qK1)PEA1)Pq1DS2’5-D1FqAqNE)q01’S1EA1=\YY1
DSD)q21)NEAD2W))WAF1)Pq1DE2q10E)E1NE)q/1HPqDq1
at
Pu ch
AENN5U134-DqD1ENq125Nq1DqADW)WBq1)510q-ESD1)PEA1E1
UW0qN134-Dq14Dq01WA1=\YY1DSD)q2D/1
Te
Review Questions
Q. 1 What types of mobile and wireless devices are available in the market ?
Q. 3 Explain multi-path propagation and Different types of path losses and signal propagation effects in wireless
transmission.
Q. 5 Draw the block diagram of FHSS transmitter and receiver. Differentiate between slow hopping and fast hopping.
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-33 Introduction to Mobile Computing
Q. 6 Explain what is spread spectrum? How spreading can be achieved? What are the merits of spread spectrum
technique?
Q. 7 Explain different methods to increase the capacity of an analog cellular system and without increasing number of
antennas.
Q. 8 What are the advantages of cellular System? Explain cellular system in detail also explain frequency reuse concept in
cellular system.
e
!!!
g
!
!
io led
ic ow
n
bl kn
at
Pu ch
Te
99
GSM
2
9
9
9
9
Unit II
9
9
Syllabus
2.1 GSM Mobile services, System Architecture, Radio interface, Protocols , Localization and Calling, Handover,
security (A3, A5 & A8)
2.2 GPRS system and protocol architecture
2.2 UTRAN, UMTS core network; Improvements on Core Network
e
9
2.1 GSM
g
io led
TEDNPE9,2-8AC97D59HDNzEA9kDCC3UzkP8zDU9FT,HO9z-98KA9CD-89-3kkA--73E94zqz8PE9CDNzEA98AEAkDCC3UzkP8zDU9-2-8AC9zU9
ic ow
8KA9BD5E498D4P2x9/89z-93-A49N29D6A59W:::9CzEEzDU9RADREA9zU9CD5A98KPU9WL:9kD3U85zA-x9JKA9R5zCP529qDPE9D79T,H9BP-98D9R5D6z4A9
P9CDNzEA9RKDUA9-2-8AC98KP89PEEDB-93-A5-98D95DPC98K5D3qKD389V35DRA9PU49R5D6z4A-96DzkA9-A56zkA98KP89z-9kDCRP8zNEA98D9/,'X9
n
PU49“,JXx9JKz-9kKPR8A59qz6A-9PU9zU-zqK89D79T,H9-2-8AC9zUkE34zUq9z8-9-A56zkA-”9P5kKz8Ak835A”9kPEE9-A893R9R5DkA435A”9KPU4D6A59
bl kn
PU49D8KA59zCRD58PU89P-RAk8-9-3kK9P-9-Ak35z829PU49P38KAU8zkP8zDUx99
TEDNPE9-2-8AC97D59CDNzEA9kDCC3UzkP8zDU9FT,HO9z-9P9qEDNPEE29PkkAR8A49-8PU4P5497D594zqz8PE9kAEE3EP59kDCC3UzkP8zDUx9/89z-9
PU9VJ,/9-8PU4P5497D59+T9RPUjV35DRAPU94zqz8PE9kAEE3EP59-2-8AC9Bz8K9zU8A5UP8zDUPE95DPCzUqx9
JKA9NP-zk96A5-zDU9D79T,H9FzxAx9T,H9L::O9BP-97D3U4A49zU9WL’+x99
XDB9z89z-98KA9CD-89-3kkA--73E9CDNzEA9kDCC3UzkP8zDU9-2-8AC9zU98KA9BD5E49PU49D6A59Wx+9NzEEzDU93-A5-93-A98KA9-2-8ACx99
JKA9CPzU9qDPE9D79T,H9BP-98D9R5D6z4A96DzkA9-A56zkA-98KP89P5A9kDCRP8zNEA98D9/,'X9PU49D8KA59“,JX9-2-8AC-9P898KA9-PCA9
8zCA9PEEDBzUq93-A5-9D798KA9-2-8AC98D95DPC98K5D3qKD389V35DRAx9
T,H9z-9P9-AkDU49qAUA5P8zDU9+T9-2-8AC”95AREPkzUq98KA97z5-89qAUA5P8zDU9PUPEDq9-2-8AC-x9
JKA9zUz8zPE96A5-zDU9D79T,H9BP-94A-zqUA49zU9V35DRA93-zUq9):2f:rmDgt97D59CyFYTb9PU49:vmf:c2NDgL97D59jExTFYTbx9JKz-9
-2-8AC9z-9kPEEA49B.DN:22x9
_UD8KA596A5-zDU9D79T,H9kPEEA49'zqz8PE9;AEE3EP59,2-8AC9W’::9F';,9W’::O93-A-9W"W:jW"’Q9H=–97D593REzUµ9PU499
W’:QjW’’:9H=–97D594DBUEzUµx9
T,H9 P89 WL::9 H=–9 FW’Q:jWLW:9 H=–9 3REzUµ9 PU49 WLQ:jWLL:9 H=–9 4DBUEzUµO9 3-A49 zU9 R,9 z-9 kPEEA49 “;,9 F“A5-DUPE9
;DCC3UzkP8zDU9,A56zkA-O9WL::x9
Modifications and Derivatives of GSM
JKA9-2-8AC9A6DE38zDU9D79T,H9kPU9NA94z6z4A49zU8D98K5AA9RKP-A-x9
o UAI,KNrNOr::rfr::7/NR9JKA9NP-zk96A5-zDU9D798KA9T,H9-2-8AC9BP-9zU9DRA5P8zDUx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-2 GSM
o UAI,KNVNOr::7fr::m/NR9JKA9-2-8AC9-RAkz7zkP8zDU9BP-96A5z7zA49zU9D54A598D9PEEDB973835A9q5P43PE9CD4z7zkP8zDU-9PU49
UAB9zCR5D6ACAU8-x9
o UAI,KNvNOq[E]Nr::m/NRNJKA9CD4z7zkP8zDU-98D98KA9D5zqzUPE9T,HL::9P5A9NAzUq9zU85D43kA4x9
SDEEDBzUq9P5A98KA94A5z6P8z6A-9D798KA9D5zqzUPE9T,H9L::x9
DCS 1800
TUA9zCRD58PU89CD4z7zkP8zDU98D98KA9D5zqzUPE9T,HL::9BP-N8KA94A6AEDRCAU8ND7NFYGYHIFNIKFFCFI[N.J,HK]9F';,9W’::Ox99
';,9W’::9z-9R5zCP5zE294A6D8A498D98KA9DRA5P8zDU9zU9P5AP-9Bz8K9KzqK985P77zk9-3kK9P-935NPU9PU49-3N35NPU9P5AP-x99
/89z-9kPEEA49P-9';,9zU9RUz8A49UzUq4DC9PU49“;,9zU9=DUq9UDUqx9
JKA9CPzU94z77A5AUkA9NA8BAAU9T,HL::9PU49';,W’::9BP-9zU98KA9EDBA59RDBA59D798KA9NP-A9-8P8zDU9PU49CDNzEA9-8P8zDUx9_-9
P95A-3E898KA9kAEE9-z–A9NAkDCA-9-CPEEA5x99
JKA9 NPU4Bz48K9 P--zqUA49 8D9 8KA9 ';,W’::9 BP-9 C3kK9 KzqKA59 8KPU9 8KA9 T,HL::x9 JKz-9 zCREzA-9 8KP89 3R9 8D9 Q"V9 kP55zA59
75AW3AUk29kKPUUAE-9kPU9NA9P--zqUA498D98KA9';,W’::x9JK3-98KA9kPRPkz829D79';,W’::9z-9C3kK9KzqKA598KPU98KA9T,HL::x9
e
X3898Kz-9PE-D9zCREzA-98BzkA9P-9KzqK9-AU-z8z6z8298D9'DRREA59A77Ak8-x9JKz-9EzCz8-98KA9CPYzC3C96AKzkEA9-RAA49zU9';,W’::93R9
g
8D9WQ:µCZK5x9 io led
_UD8KA59A--AU8zPE9AUKPUkACAU89D798KA9';,W’::9z-98KA9RD--zNzEz829D795DPCzUq9zU-z4A98KA9kD3U852x9JKz-9BP-9UD89RD--zNEA9
Bz8K9zUz8zPE9T,HL::943A98D9D5qPUz–P8zDU95AP-DUx9
JPNEA9+xWxW9-3CCP5z–A-98KA9NP-zk94z77A5AUkA9NA8BAAU9T,HL::9PU49';,W’::x9
ic ow
'DBUEzUµ9LQQjL[:9H=–9 'DBUEzUµ9W’:QjW’’:9H=–9
JPNEA9+xWx+9Ez-8-98KA9µA29CzEA-8DUA-9D798KA9T,H9-2-8AC9PU49z8-94A5z6P8z6A-x9
GSM 400
_UD8KA59R5DCz-zUq9CD4z7zkP8zDU9PU49AUKPUkACAU89D798KA9D5zqzUPE9T,H9L::9-2-8AC9BP-9T,H9V::x9/89KP-9NAAU9DN-A56A49
8KP898KA9PUPEDq9-2-8AC-9DRA5P8zUq9zU98KA9V::9H=–9NPU4-9P5A9UDB9NAkDCzUq9PN-DE38Ax9JKA29P5A9ED-zUq98KAz59k3-8DCA5-9
P-9CD-89D798KAC9CD6A498D98KA9+T9-2-8AC-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-3 GSM
_78A59-K388zUq98KA-A9PUPEDq9-2-8AC-9kDCREA8AE2”98Kz-975AW3AUk295PUqA9kPU9NA93-A497D59PUD8KA59T,H96A5-zDUx9
VJ,/9-8PU4P54z–A498KA9T,H9-2-8AC9DRA5P8zUq9zU98KA9NPU49P5D3U49VQ:9PU49V’:9H=–9kPEEA49T,H9V::x9
JKA9BKDEA9zU75P-853k835A9BzEE95ACPzU9-PCA9KDBA6A59-D78BP5A9UAA4-98D9NA9kKPUqA4x9
JKA9NP-zk97AP835A9D79T,H9V::9P5A9Ez-8A49NAEDB]9
o S5AW3AUk29PEEDkP8zDU9]99RREzUµ9]9VQ:xVjVQ"x[9H=–9
9 9 9'DBUEzUµ9]9V[:xVjVL[x:9H=–9
o '3REAY9-ARP5P8zDU9]9W:9H=–9
o ;P55zA59-RPkzUq9]9+::U=–9
Table 2.1.2 : Key milestones of the GSM system and its derivatives
LKI[N DYFK,HETKN
WL’+9 T5D3RA9,RAkzPE9HDNzEA9A-8PNEz-KA49N29;V^J98D94A6AEDR98KA9RPUjV35DRAPU9kAEE3EP59CDNzEA9-2-8AC9-8PU4P54-x9
e
WL’Q9 XP-zk9Ez-89D795AkDCCAU4P8zDU-98D9NA9qAUA5P8A49N298KA9q5D3R9BP-9P4DR8A4x9
g
WL’[9 SzAE498A-8-93U4A58PµAU98D9R5D6A9BKzkK98AkKUzW3A-9-KD3E49NA9P4DR8A497D598KA9UAB9-2-8ACx9
io led
WL’"9 J'H_9PRR5DPkK9P4DR8A49P-98KA9CPzU9PkkA--9CA8KD497D59T,Hx9S5AW3AUk294z6z-zDU9z-9PE-D93-A49NA8BAAU9kKPUUAE-”9
N3898zCA94z6z-zDU9z-93-A49zU9APkK9zU4z6z43PE975AW3AUk29kKPUUAEx999
ic ow
WL’’9 T,H9-2-8AC96PEz4P8zDU93U4A58PµAUx9
n
WL’L9 VJ,/”9V35DRAPU98AEAkDCC3UzkP8zDU-9,8PU4P54-9/U-8z838A98PµA-9DU95A-RDU-zNzEz8297D59CPUPqzUq98KA9T,H9-8PU4P54-x9
bl kn
WLL:9 “KP-A9W9D798KA9T,H9-RAkz7zkP8zDU-95AEAP-A4x9
WLLW9 ;DCCA5kzPE9EP3UkK9D798KA9T,H9-A56zkAx9
at
Pu ch
WLLQ9 ;D6A5PqA9D79CPzU95DP4-9T,H9-A56zkA-9-8P589D38-z4A9V35DRAx9
WLLQ9 “KP-A9+9D798KA9T,H9-RAkz7zkP8zDU-95AEAP-A4x9
Te
+::V9 T,H9-3N-k5zR8zDU-95APkK9W9NzEEzDUx99
1. Bearer services
XAP5A59 -A56zkA-9 P5A9 8AEAkDCC3UzkP8zDU9 -A56zkA-9 8KP89 R5D6z4A9 kPRPNzEz8zA-9 8D9 85PU-7A59 3-A59 4P8P9 PU49 kDU85DE9 -zqUPE-9
NA8BAAU98BD9RzAkA-9D79AW3zRCAU89zU9P9UA8BD5µxN
T,H9R5D6z4A-9NP-zkPEE297D35982RA-9D79NAP5A59-A56zkA-9]9
o J5PU-RP5AU89
o XDUj85PU-RP5AU89
o ,2UkK5DUD3-94P8P985PU-Cz--zDU9
o _-2UkK5DUD3-94P8P985PU-Cz--zDU99
OY/N M[IT,yI[KTHNNKI[K[N,K[OYPK,NN
JKA-A982RA-9D79NAP5A59-A56zkA-93-A98KA973Uk8zDU-9D79RK2-zkPE9EP2A598D985PU-Cz894P8Px9
JD9zCR5D6A98KA985PU-Cz--zDU9W3PEz82”9z893-A-97D5BP549A55D59kD55Ak8zDU9FSV;O9P89RK2-zkPE9EP2A5x9
e
OYY/N QETfH[IT,yI[KTHNNKI[K[N,K[OYPK,NN
g
XDU985PU-RP5AU89NAP5A59-A56zkA-93-A973Uk8zDU-9D79ND8K9EP2A59+9PU49EP2A59Q98D9zCR5D6A985PU-Cz--zDU9W3PEz82x9
io led
/89zCREACAU8-9EP2A59+9PU49EP2A59Q9R5D8DkDE-97D59A55D59kD55Ak8zDU9PU497EDB9kDU85DEx9
/89PE-D93-A-95P4zDjEzUµ9R5D8DkDE9F^_“O98KP89kDCR5z-A-9CAkKPUz-C9D79gYGAN.yKKjNFIHINRYTbNIETH[EFNOgFRI/NPU49-RAkzPE9
,KFKPHYOKf[KSKPH9CAkKPUz-C98D985zqqA595A85PU-Cz--zDU9D794P8Px9
ic ow
!"
JKA9Nz8jA55D595P8A9z-9EA--98KPU9W: ”9PU498K5D3qKR389PU494AEP29CP296P5294ARAU4zUq93RDU985PU-Cz--zDU9W3PEz82x9
'z77A5AU894P8P95P8A-97D596DzkA9PU494P8P98KP89kPU9NA9PkKzA6A49P5A9Ez-8A49NAEDBx9
n
2. Data Services
bl kn
OY/N FIHIN,K[OYPKNOPY[PCYHN,xYHPAKj/N
at
Pu ch
o ,2UkK5DUD3-9]9+xV”9Vx’9D59Lx[9µNz8Z-9
o _-2UkK5DUD3-]9Q::9j9W+::9Nz8Z-9
Te
OYY/N FIHIN,K[OYPKNOyIPbKHN,xYHPAKj/N
o ,2UkK5DUD3-9]9Wx+”9+xV”9Vx’9D59Lx[9µNz8Z-9
o _-2UkK5DUD3-9]9Q::9j9L[::9Nz8Z-9
3. Tele services
JAEA9-A56zkA-9zUkE34A9AUk52R8A496DzkA985PU-Cz--zDU”9CA--PqA9-A56zkA-”9PU49NP-zk94P8P9kDCC3UzkP8zDU9Bz8K98A5CzUPE-x9
JKA9T,H9BP-9NP-zkPEE294A-zqUA498D9R5D6z4A9KzqK9W3PEz8294zqz8PE96DzkA985PU-Cz--zDU”9D77A5zUq9P89EAP-898KA9NPU4Bz48K99
QxW9µ=–9D79PUPEDq9RKDUA9-2-8AC-x9
JKA96P5zD3-98AEA-A56zkA-9P5A9]9
OY/N T]K[GKTPJNTC]NK[NN
/89z-9CPU4P8D5297D59PEE9-A56zkA9R5D6z4A5-98D9zCREACAU89VCA5qAUk29U3CNA59-A56zkAx9
JKz-9U3CNA59z-98KA9kDCCDU9U3CNA598KP89kPU9NA93-A498K5D3qKD389kD3U852x99
_zµA9RDEzkA9FW::O9D59PCN3EPUkA9U3CNA59PU498Kz-9U3CNA59z-975AA9D79kKP5qAx9
JKz-9kDUUAk8zDU9KP-98KA9KzqKA-89R5zD5z829PU49BzEE9P38DCP8zkPEE29NA9-A893R9Bz8K9kED-A-89ACA5qAUk29kAU8A5x99
OYY/N .AE[HN]K,,IGKN,K[OYPK,NO.D./NN
,H,9PEEDB-985PU-Cz--zDU9D798AY89CA--PqA-93R98D9W[:9kKP5Pk8A5-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-5 GSM
,H,93-A-93U3-A49kPRPkz829zU98KA9-zqUPEzUq9kKPUUAE-9zU-8AP49D79-8PU4P5494P8P9kKPUUAE-x9
/89z-9RD--zNEA98D9-AU49D595AkAz6A9,H,9435zUq96DzkA9D594P8P985PU-Cz--zDUx9
,H,9kPU9NA93-A497D594z-REP2zUq95DP49kDU4z8zDU-”9AjCPzE9KAP4A5-9D59-8Dkµ9W3D8A-9A8kx9
,H,9P5A9PE-D93-A497D593R4P8zUq9CDNzEA9RKDUA9-D78BP5A9D597D59zCREACAU8P8zDU9D79R3-K9-A56zkA-x9
OYYY/N TTAITPKjNDK,,IGKN.K[OYPKNOTD./N
VUKPUkA49 CA--PqA9 -A56zkA9 FVH,O9 PEEDB-9 85PU-Cz--zDU9 D79 EP5qA59 CA--PqA-”9 7D5CP88A49 8AY8”9 PUzCP8A49 Rzk835A-”9 -CPEE9
zCPqA-”9PU495zUq8DUA-9zU9P9-8PU4P54z–A49BP2x99
OYO/N DCFHY]KjYINDK,,IGKN,K[OYPKNODD./NN
HH,9PEEDB-985PU-Cz--zDU9D79EP5qA59Rzk835A-9-3kK9P-9`“VT”9T/S”9\XH“97zEA-9PU49PE-D9-KD5896z4AD9kEzR-x9
OO/N B[ECyNvNKIUNN
/U98Kz-9-A56zkA”97PY94P8P9z-985PU-Cz88A49P-94zqz8PE94P8P9D6A598KA9PUPEDq98AEARKDUA9UA8BD5µ93-zUq9CD4AC-x9
e
/893-A-9/JRjJ9-8PU4P54-9JxV9PU49JxQ:97D5985PU-Cz--zDUx9
g
SPY94P8P9PU497PY9-zqUPEzUq9z-985PU-Cz88A496zP985PU-RP5AU89NAP5A59-A56zkAx9
io led
4. Supplementary services
,3RREACAU8P529-A56zkA-9D77A596P5zD3-9AUKPUkACAU8-9D798KA9-8PU4P5498AEARKDU29-A56zkA-9PU49CP296P52975DC9R5D6z4A598D9
ic ow
R5D6z4A5x9
,3RREACAU8P529-A56zkA-9P5A9P44z8zDUPE9-A56zkA-98KP89P5A9R5D6z4A49N298KA9T,H9-2-8AC9D8KA598KPU98AEA-A56zkA-9D59NAP5A59
n
-A56zkA-x9
bl kn
JKA-A9 -A56zkA-9 zUkE34A9 7PkzEz8zA-9 -3kK9 P-9 kPEE9 7D5BP54zUq”9 kPEEA59 z4AU8z7zkP8zDU”9 kPEE9 BPz8zUq”9 C3E8zjRP5829 kDU6A5-P8zDU-”9
PU49NP55zUq9D79D38qDzUq9FzU8A5UP8zDUPEO9kPEE-”9PCDUq9D8KA5-x9,DCA9-3RREACAU8P529-A56zkA-9P5A9]9
at
Pu ch
o H3E8zRP5829,A56zkA9D59kDU7A5AUkzUq99
o ;PEE9\Pz8zUq9
Te
o ;PEE9=DE49
o ;PEE9SD5BP54zUq9
o ;PEE9XP55zUq9
o X3CNA59/4AU8z7zkP8zDU9
o _46zkA9D79;KP5qA9F_D;O9
o ;ED-A49R-A59T5D3R-9F;RT-O9
o RU-853k835A49-3RREACAU8P529-A56zkA-94P8P9FR,,'O9]9JKz-9PEEDB-9DRA5P8D5j4A7zUA49zU4z6z43PE9-A56zkA-x9
Table 2.1.3 : GSM services
.K[OYPKNIIHKGE[JN .K[OYPKN
JAEA9-A56zkA-9 JAEARKDU29
VCA5qAUk29kPEE9
,KD589CA--PqA9-A56zkA-9
az4AD8AY89PkkA--9
JAEA8AY”9SPY9
=PE795P8A9-RAAkK9kD4A59
VUKPUkA4973EE95P8A99
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-6 GSM
.K[OYPKNIIHKGE[JN .K[OYPKN
XAP5A59-A56zkA-9 ,2UkK5DUD3-94P8P9
_-2UkK5DUD3-94P8P9
,2UkK5DUD3-9RPkµA894P8P9
,3RREACAU8P529-A56zkA-9 ;PEE97D5BP54zUq99
;PEE9NP55zUq9
;PEEzUq9EzUA9z4AU8z7zkP8zDU9
;DUUAk8A49EzUA9z4AU8z7zkP8zDU9
;PEE9BPz8zUq99
;PEE9KDE49
H3E8zRP5829kDCC3UzkP8zDU9
e
;ED-A493-A59q5D3R9
_46zkA9D79kKP5qA9
g
TRA5P8D594A8A5CzUA49kPEE9NP55zUq9
io led
2.1.3 GSM System Architecture
(MU - Dec. 12, May 13)
ic ow
Q. Draw a neat diagram of GSM system architecture and explain with different types of interfaces. (Dec. 12, 10 Marks)
n
Q. What is the use of HLR and VLR registers in Mobile computing? (May 13, 5 Marks)
bl kn
Szqx9+xWx+9-KDB-98KA9-zCREz7zA496zAB9D798KA9T,H9-2-8AC9P5kKz8Ak835Ax99
at
Pu ch
JKA9T,H9UA8BD5µ9P5kKz8Ak835A9kPU9NA9q5D3RA49zU8D98K5AA9CPzU9-3N9-2-8AC-9]9
Wx9 ^P4zD9-3N-2-8AC9F^,,O9
Te
+x9 XA8BD5µ9PU49-Bz8kKzUq9-3N-2-8AC9FX,,O9
Qx9 TRA5P8zDU9-3N-2-8AC9FT,,O9
1. Radio subsystem
^P4zD9-3N-2-8AC9kDCR5z-A-9PEE95P4zD9AU8z8zA-x9VU8z8zA-9D79^,,9P5A9AYREPzUA49NAEDBx9
(i) Base station subsystem (BSS)
_9T,H9UA8BD5µ9kDCR5z-A-9CPU29X,,-x9
X,,9kDU8PzU-9DUA9D59CD5A95P4zD9kAEE-”9APkK9DUA9z-9kDU85DEEA49N29P9NP-A985PU-kAz6A59-8P8zDU9FXJ,Ox9
TUA9D59CD5A9XJ,-9zU9835U9P5A9kDU85DEEA49N29PU9AEACAU89kPEEA49XP-A9-8P8zDU9kDU85DEEA59FX,;Ox9JK3-98KA5A9P5A98BD9CPzU9
P5kKz8Ak835PE9AEACAU8-9zU9APkK9X,,9VM.9PU49V.IWN9
V..NqCTPHYET,9P5A98D9]9
o HPzU8PzU95P4zD9kDUUAk8zDU98D9H,9
o ;D4zUqZ4AkD4zUq9D796DzkA9
o ^P8A9P4PR8P8zDU98DZ75DC98KA9Bz5AEA--9UA8BD5µ9RP589
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-7 GSM
g e
io led
ic ow
n
bl kn
at
Pu ch
o _--zqU-9PU495AEAP-A-975AW3AUkzA-9PU498zCA9-ED8-97D598KA9H,x9
o =PU4EA-9zU8A59kAEE9KPU4D6A5x9
o ;DU85DE-98KA9RDBA5985PU-Cz--zDU9D798KA9X,,9PU49H,9zU9z8-9P5APx9
YjjYHYETIFNqCTPHYET,9zUkE34A9]9
o “A57D5CzUq985P77zk9kDUkAU85P8zDU98D95A43kA98KA9U3CNA59D79EzUA-975DC98KA9H,;9
o ^APEEDkP8zDU9D7975AW3AUkzA-9PCDUq9XJ,-9
o JzCA9PU4975AW3AUk29-2UkK5DUz–P8zDU9
o “DBA59CPUPqACAU89
o JzCAj4AEP29CAP-35ACAU8-9D795AkAz6A49-zqUPE-975DC98KA9H,9
(iv) Mobile station (MS)
JKA9H,9kDCR5z-A-9PEE93-A59KP54BP5A9PU49-D78BP5A9UAA4A497D59kDCC3UzkP8zDU9Bz8K9P9T,H9UA8BD5µx9
e
/U8A5UP8zDUPE9 CDNzEA9 AW3zRCAU89 z4AU8z829 F/HV/O9 z-9 3-A49 8D9 z4AU8z729 PU9 H,x9 'A6zkA9 -RAkz7zk9 CAkKPUz-C9 EzµA9 8KA789
g
R5D8Ak8zDU93-A-98KA9/HV/9U3CNA5x9
io led
H,9kDU-z-8-9D798BD9AEACAU8-9CDNzEA9AW3zRCAU89FHVO9PU49,/Hx9
HDNzEA9AW3zRCAU89FHVO9z-98KA9KP54BP5A98KP89z-98KA9CDNzEA9KPU4-A8x99
ic ow
JKA9-AkDU49kDCRDUAU89D79H,9z-9,CN,P[YNK[NYjKTHYHJN]EjCFKNO.ZD/x99
,/H9-8D5A-9PEE93-A59-RAkz7zk94P8P95AEA6PU898D9T,Hx9
n
_EE98KA9kPEE-9zU9T,H9P5A9,/H9NP-A49PU498KA29P5A94z5Ak8A498D98KA9,/H95P8KA598KPU98A5CzUPEx9
bl kn
_EE98KA94P8P9EzµA9,H,”9kDU8Pk89U3CNA5-9P5A9PE-D9-8D5A49zU9,/H9kP54x9
at
R-A59-RAkz7zk973Uk8zDU-9EzµA9kKP5qzUq”9P38KAU8zkP8zDU9P5A9PE-D9NP-A49DU98KA9,/Hx9
Pu ch
\z8KD389,/H9DUE29ACA5qAUk29kPEE-9P5A9RD--zNEAx9
Te
JKA9,/H9kP549kDU8PzU-9CPU29z4AU8z7zA5-”9PU498PNEA-9-3kK9P-9kP54982RA”9-A5zPE9U3CNA5”9P9Ez-89D79-3N-k5zNA49-A56zkA-”99
YNUK[,ETIFNZjKTHYqYPIHYETNQC]NK[NOUZQ/[NUZQNXTNFEPbYTGN\KJYTGNOUX\/[9PU9ICHAKTHYPIHYETNbKJN\#9PU498KA9ZTHK[TIHYETIFN
DENYFKN.CN,P[YNK[NZjKTHYHJNOZD.Z/x99999
JKA9CDNzEA9-8P8zDU9PE-D9-8D5A-98KA942UPCzk9zU7D5CP8zDU9BKzEA9EDqqA49DU8D98KA9T,H9-2-8AC9-3kK9P-9PYyAK[NbKJN\%#PU49P9
MK]yE[I[JNDENYFKN.CN,P[YNK[NZjKTHYHJNOMD.Z/”9PU498KA9REPIHYETNY[KINZjKTHYqYPIHYETNORYZ/x!
2. Network and Switching Subsystem (NSS)
JKA9X,,9kDUUAk8-98KA95P4zD9UA8BD5µ9Bz8K98KA9-8PU4P549R3NEzk9CDNzEA9UA8BD5µ-x9
JKA9X,,9zUkE34A-98KA9CPzU9-Bz8kKzUq973Uk8zDU-9D79T,H”9zCRD58PU894P8PNP-A-9F-3kK9P-9=_^”9a_^O95AW3z5A498D9CPUPqA9
3-A59R5D7zEA9PU493-A59CDNzEz82x9
JKA9X,,9kDU8PzU-98KA97DEEDBzUq973Uk8zDUPE9AEACAU8-x9
(i) Mobile service switching center (MSC)
H,;9z-98KA9KAP589D798KA9T,H9P5kKz8Ak835Ax99
JKA29P5A9KzqKjRA57D5CPUkA94zqz8PE9/,'X9-Bz8kKA-x9
VPkK9H,;9kDU85DE-9DUA9D59CD5A9X,,-x9
H,;9-A8-93R98KA9kDUUAk8zDU-98D9D8KA59H,;-9PU498D98KA9X,;-96zP98KA9YNYTHK[qIPKx99
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-9 GSM
e
BIHKxIJND.I9z-95A-RDU-zNEA97D59kDCC3UzkP8zDU9Bz8K98KA9AY8A5UPE97zYA49UA8BD5µ-9-3kK9P-9“,JX9PU49/,'Xx9
g
H,;9kPU9PE-D9kDUUAk898D9R3NEzk94P8P9UA8BD5µ-9F“'XO9-3kK9P-9Yx+Q9N293-zUq9P44z8zDUPE9zU8A5BD5µzUq973Uk8zDU-9F/\SOx!
io led
(ii) Home Location Register (HLR)
JKA9=_^95Aqz-8A59z-98KA9kAU85PE94P8PNP-A98KP89-8D5A-9PU49CPUPqA-98KA9RA5CPUAU89zU7D5CP8zDU9D798KA9-3N-k5zNA5x9
ic ow
\KAU9PU9zU4z6z43PE9N32-9P9-3N-k5zR8zDU9zU98KA97D5C9D79,/H”9PEE98KA9zU7D5CP8zDU9PND3898Kz-9-3N-k5zR8zDU9z-95Aqz-8A5A49zU9
8KA9=_^9D798KP89DRA5P8D5x9
n
=_^9kDU8PzU-98KA97DEEDBzUq9-8P8zk9PU4942UPCzk9zU7D5CP8zDUx9
bl kn
OI/N .HIHYPNYTqE[]IHYETN
o
at
HDNzEA9-3N-k5zNA59/,'X9U3CNA59FH,/,'XO99
Pu ch
o /U8A5UP8zDUPE9CDNzEA9-3N-k5zNA59z4AU8z829F/H,/O9
o
Te
_z-89D79-A56zkA-98D9BKzkK93-A59KP-9-3N-k5zNA49-3kK9P-9kPEE97D5BP54zUq”95DPCzUq95A-85zk8zDU”9T“^,9A8kx9
_EE98KA-A93-A5j-RAkz7zk9zU7D5CP8zDU9z-9AU8A5A49DUkA97D59APkK93-A59zU9P9-zUqEA9=_^9P898KA98zCA9D79-3N-k5zR8zDUx9
=_^9PE-D9CPzU8PzU-9-DCA942UPCzk9zU7D5CP8zDU98KP89z-93-A497D59EDkP8zUq98KA93-A5x9
ON/N FJTI]YPNYTqE[]IHYETN
o JKA9k355AU89EDkP8zDU9P5AP9F__O9D79H,9
o JKA9CDNzEA9-3N-k5zNA595DPCzUq9U3CNA59FH,^XO9
o ;355AU89a_^9PU49H,;9
_-9 -DDU9 P-9 H,9 EAP6A-9 z8-9 k355AU89 __”9 8KA9 a_^9 8KP89 z-9 k355AU8E29 5A-RDU-zNEA9 7D59 8KA9 H,9 zU7D5C-9 =_^9 PND389 z8-9 UAB9
EDkP8zDUx9
(iii) Visitor Location Register (VLR)
JKA9a_^9z-9P--DkzP8A498D9APkK9H,;x9
/89z-9P94P8PNP-A9kDU8PzUzUq95AkD54-9D79PEE9CDNzEA9-8P8zDU-9k355AU8E295Aqz-8A5A49Bz8K98KA9P88PkKA49H,;x9
\KAU9P9CDNzEA9-8P8zDU95DPC-9zU8D9P9UAB9H,;9P5AP”98KA9a_^9kDUUAk8A498D98KP89H,;9BzEE95AW3A-894P8P9PND3898KA9CDNzEA9
-8P8zDU975DC98KA9=_^x99
_P8A59z798KA9CDNzEA9-8P8zDU9CPµA-9P9kPEE”98KA9a_^9UAA49UD89kDU8Pk89=_^9APkK98zCA9-zUkA98KA9a_^9KP-9PEE98KA9zU7D5CP8zDU9
UAA4A498D9-A893R98KA9kPEEx99
JKA9a_^9P6Dz4-98KA975AW3AU89=_^9PkkA--Z3R4P8A-”9P-9PEE98KA93-A59zU7D5CP8zDU95AW3z5A49z-9P6PzEPNEA9zU9a_^x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-10 GSM
e
o HPzU8AUPUkA9JP-µ-x9
g
o J5P77zk9CDUz8D5zUq9 io led
o ,8P83-95ARD58-9D79UA8BD5µ9AU8z8zA-99
(ii) Authentication Center (AUC)
ic ow
JKA9_38KAU8zkP8zDU9;AU8A59z-9P9R5D8Ak8A494P8PNP-A98KP89-8D5A-9P9kDR29D798KA9-Ak5A89µA29-8D5A49zU9APkK9-3N-k5zNA5b-9,/H9
kP54”9BKzkK9z-93-A497D59P38KAU8zkP8zDU9PU49kzRKA5zUq9D798KA95P4zD9kKPUUAEx9
n
JKA9_R;9R5D8Ak8-9UA8BD5µ9DRA5P8D5-975DC94z77A5AU8982RA-9D7975P34x9
bl kn
_R;9kDU8PzU-98KA9PEqD5z8KC-97D59P38KAU8zkP8zDU9P-9BAEE9P-98KA9µA2-97D59AUk52R8zDU9PU49qAUA5P8A-98KA96PE3A-9UAA4A497D59
3-A59P38KAU8zkP8zDU9zU98KA9=_^x99
at
Pu ch
/89-8D5A-9/U8A5UP8zDUPE9HDNzEA9VW3zRCAU89/4AU8z829F/HV/O9U3CNA597D59APkK96PEz49CDNzEA9AW3zRCAU8x99
JKA9V/^9KP-9P9NEPkµ9Ez-89D79-8DEAU9CDNzEA94A6zkA-x9
/79P9RP58zk3EP59CDNzEA9z-9-8DEAU9D59z-9UD8982RA9PRR5D6A498KAU9kD55A-RDU4zUq9/HV/9z-9CP5µA49P-9zU6PEz49zU98KA9V/^x9
'z77A5AU89AEACAU8-9D79T,H9UA8BD5µ9kDCC3UzkP8A98D9APkK9D8KA593-zUq9BAEE94A7zUA49zU8A57PkA9NA8BAAU98KACx9
X]NZTHK[qIPKNRN
JKA!X!NYTHK[qIPK!z-98KA!IY[NYTHK[qIPK!7D598KA!B.D!CDNzEA98AEARKDUA9-8PU4P54xN
/89z-98KA!YTHK[qIPK!NA8BAAU98KA9CDNzEA9-8P8zDU9FH,O9PU498KA9XP-A985PU-kAz6A59-8P8zDU9FXJ,Ox9N
/89z-9kPEEA4!X]!NAkP3-A9z89z-98KA9CDNzEA9PUPEDq98D98KA9R!YTHK[qIPK!D79/,'Xx!!
X]Nz-!jKqYTKj!zU98KA!B.D!:VxYY9PU49:QxYY9-A5zA-9D79-RAkz7zkP8zDU-xN
JKA9T,H9Pz59zU8A57PkA9z-9NP-A49DU9JzCA9'z6z-zDU9H3E8zREA9_kkA--9FJ'H_O9Bz8K9S5AW3AUk29'z6z-zDU9'3REAY9FS''Ox9N
J'H_9 PEEDB-9 C3E8zREA9 3-A5-9 8D9 -KP5A9 P9 kDCCDU9 ^S9 kKPUUAE9 DU9 P9 8zCAj-KP5zUq9 NP-z-”9 BKzEA9 S''9 AUPNEA-9 4z77A5AU89
75AW3AUkzA-98D9NA93-A49zU93REzUµ9FH,98D9XJ,O9PU494DBUEzUµ9FXJ,98D9H,O94z5Ak8zDU-x9N
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-11 GSM
HD-89D798KA9zCREACAU8P8zDU-93-A9P975AW3AUk29NPU49D79L::9H=–x9JKA9D8KA594A5z6P8z6A9D79T,H9z-9kPEEA49'zqz8PE9kAEE3EP59
-2-8AC93-A-9W’::9H=–9F';HW’::OxN
JKA93-A4975AW3AUk29NPU49z-94z6z4A49zU8D9+::U=–9kP55zA5-9D59^S9kKPUUAE-9zU9ND8K98KA93REzUµ9PU494DBUEzUµ94z5Ak8zDUx99
VPkK9^S9kKPUUAE9z-98KAU97358KA59-3N4z6z4A49zU8D9AzqK894z77A5AU898zCA-ED8-”9zxAx”9:98D9"”9N29J'H_98AkKUzW3A-x99
_9-A89D798KA-A9AzqK898zCA-ED8-9z-95A7A55A498D9P-9P9J'H_975PCAx99
VPkK975PCA9EP-8-9Vx[WQ9C-Akx99
JKA9 RK2-zkPE9 kKPUUAE-9 P5A9 7358KA59 CPRRA49 8D9 6P5zD3-9 EDqzkPE9 kKPUUAE-9 kP552zUq9 3-A59 85P77zk9 PU49 kDU85DE9 zU7D5CP8zDU9
NA8BAAU98KA9H,9PU498KA9XJ,x99
JKA97DEEDBzUq9-Ak8zDU94A-k5zNA-98KA9RC9zU8A57PkA9R5D8DkDE-93-A49P898KA9H,9PU498KA9XJ,9-z4Ax9
g e
io led
ic ow
n
bl kn
Physical layer
_P2A59W”9BKzkK9z-9P95P4zD9zU8A57PkA”9R5D6z4A-98KA973Uk8zDUPEz8295AW3z5A498D985PU-7A598KA9Nz89-85APC-9D6A598KA9RK2-zkPE9
Te
kKPUUAE-9DU98KA95P4zD9CA4z3Cx9JKA9-A56zkA-9R5D6z4A49N298Kz-9EP2A598D98KA9PND6A9EP2A5-9zUkE34A9]9
;KPUUAE9CPRRzUq9FEDqzkPE98D9RK2-zkPEO9
;KPUUAE9kD4zUq9PU49kzRKA5zUq9
'zqz8PE9CD43EP8zDU9
S5AW3AUk29KDRRzUq9
JzCzUq9P46PUkA9PU49RDBA59kDU85DE9
Data link layer
,zqUPEzUq9_P2A59+9z-9NP-A49DU98KA9__“'C9R5D8DkDE”9BKzkK9z-9P96P5zP8zDU9D798KA9/,'X9__“j'9R5D8DkDEx99
JKA9CPzU98P-µ9D79__“'C9z-98D9R5D6z4A9P95AEzPNEA9-zqUPEzUq9EzUµ9NA8BAAU98KA9UA8BD5µ9PU498KA9CDNzEA9-8P8zDUx99
JKA9__“j'9R5D8DkDE9KP-9NAAU9CD4z7zA498D9P4PR89zU98KA9CDNzEA9AU6z5DUCAU8x99
Network layer
,zqUPEzUq9_P2A59Q98PµA-9kP5A9D79-zqUPEzUq9R5DkA435A-9NA8BAAU9PU9H,99PU498KA9UA8BD5µx9/89kDU-z-8-9D798K5AA9-3NEP2A5-9
Bz8K94z-8zUk89-zqUPEzUq9R5DkA435A-x9
o ^P4zD95A-D35kA9CPUPqACAU89F^^O9
o HDNzEz829CPUPqACAU89FHHO9
o ;DUUAk8zDU9CPUPqACAU89F;HO9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-12 GSM
^P4zD9 5A-D35kA9 CPUPqACAU89 F^^O9 kDCR5z-A-9 R5DkA435A-9 5AW3z5A49 8D9 A-8PNEz-K”9 CPzU8PzU”9 PU49 5AEAP-A9 8KA9 4A4zkP8A49
5P4zD9kDUUAk8zDU-x9JKA9^^9-3N9EP2A5973Uk8zDU-9zUkE34A9]9
o ;KPUUAE9P--zqUCAU89PU495AEAP-A9
o ;zRKA5zUq9
o HD4z7zkP8zDU9D79kKPUUAE9CD4A-”9Axqx”96DzkA9PU494P8P9
o =PU4D6A59NA8BAAU9kAEE-9
o S5AW3AUk295A4A7zUz8zDU98D9AUPNEA975AW3AUk29KDRRzUq9
o H,9CAP-35ACAU895ARD58-9
o “DBA59kDU85DE9PU498zCzUq9P46PUkA9
o “PqzUq9
o ^P4zD9kKPUUAE9PkkA--9
e
JKA9 CDNzEz829 CPUPqACAU89 FHHO9 -3NEP2A59 KPU4EA-9 73Uk8zDU-9 PU49 R5DkA435A-9 5AEP8A49 8D9 CDNzEz829 D79 8KA9 CDNzEA9 3-A5x9
JKz-9zUkE34A-9R5DkA435A-97D59_38KAU8zkP8zDU9PU49_DkP8zDU95Aqz-85P8zDU9PU49RA5zD4zk93R4P8zUqx9
g
JKA9 kDUUAk8zDU9 CPUPqACAU89 F;HO9 -3NEP2A59 kDU8PzU-9 8KA9 73Uk8zDU-9 PU49 R5DkA435A-9 7D59 kPEE9 kDU85DEx9 JKz-9 zUkE34A-9
io led
R5DkA435A-98D9A-8PNEz-K”95AEAP-A”9PU49PkkA--9-A56zkA-9PU497PkzEz8zA-x9
OY/N Y"#$NZTHK[qIPKNR9X,;9PU49XJ,9kDCC3UzkP8A96zP9_$%&9zU8A57PkAx9JKA9_$%&9zU8A57PkA9z-9P--DkzP8A49Bz8K98KA9zU7D5CP8zDU9
AYkKPUqA9 5AEP8A49 8D9 8KA9 5P4zD9 85PU-Cz--zDU9 -3kK9 P-9 4z-85zN38zDU9 D79 5P4zD9 kKPUUAE-”9 kDUUAk8zDU9 -3RA56z-zUq”9 8KA9
ic ow
W3A3zUq9D79CA--PqA-9NA7D5A985PU-Cz--zDU”975AW3AUk29KDRRzUq9kDU85DE”9kKPUUAE9kD4zUq”94AkD4zUq9A8kx9
n
OYY/N YN YTHK[qIPKN R9 9 JKA9 _9 zU8A57PkA9 z-9 3-A49 8D9 R5D6z4A9 kDCC3UzkP8zDU9 NA8BAAU9 8KA9 X,,9 PU49 8KA9 H,;x9 /89 z-9 NP-A49 DU9
bl kn
PY[PCYHN,xYHPAKjNUIDfv29-2-8AC-x9/89kP55zA-93R98D9Q:[V9µNz8-Z-9kDUUAk8zDU-x9JKA9zU8A57PkA9kP55zA-9zU7D5CP8zDU98D9
AUPNEA9 8KA9 kKPUUAE-9 PU49 8zCA-ED8-9 PEEDkP8A49 8D9 8KA9 CDNzEA9 AW3zRCAU8-x9 JKA9 CA--PqzUq9 5AW3z5A49 Bz8KzU9 8KA9
at
UA8BD5µ98D9AUPNEA9KPU4D6A59z-9PE-D9kP55zA49D6A598Kz-9zU8A57PkAx9
Pu ch
OYYY/N ]NYTHK[qIPKNRNJKA9^,,9z-9kDUUAk8A49Bz8K9T,,9N29]NYTHK[qIPKx9T9zU8A57PkA93-A-98KA9.YGTIFYTGN,J,HK]NQEWN^NO..^/N
NP-A49DU9cx+Q9PU49kP55zA-9CPUPqACAU894P8P98DZ75DC98KA9^,,x9
Te
]HAK[NYTHK[qIPK,NHAIHNI[KNC,KjNYTNB.DNI[KNRN
OY/N VNYTHK[qIPKNR9X9zU8A57PkA9AYz-89NA8BAAU98KA9H,;9PU498KA9a_^x9/893-A-9P9R5D8DkDE9µUDBU9P-98KA9 DYU_VNy[EHEPEFx9\A9
µUDB9 8KP89 CD-89 a_^-9 P5A9 kDEEDkP8A49 Bz8K9 PU9 H,;x9 JKz-9 CPµA-9 8KA9 zU8A57PkA9 R35AE29 PU9 dzU8A5UPEe9 zU8A57PkAx9 JKA9
zU8A57PkA9 z-9 3-A49 BKAUA6A59 8KA9 H,;9 UAA4-9 8D9 kDCC3UzkP8A9 Bz8K9 8KA9 a_^9 zU9 D54A59 8D9 PkkA--9 4P8P9 5AqP54zUq9 PU9 H,9
EDkP8A49zU9z8-9P5APx99
OYY/N IN YTHK[qIPKN R9 JKA9 ;9 zU8A57PkA9 z-9 3-A49 8D9 R5D6z4A9 kDCC3UzkP8zDU9 NA8BAAU9 8KA9 =_^9 PU49 P9 TH,;x9 JKA9 kPEE9 8KP89 z-9
D5zqzUP8zUq9 75DC9 D38-z4A9 8KA9 UA8BD5µ9 KP-9 8D9 RP--9 8K5D3qK9 8KA9 qP8ABP29 -D9 8KP89 5D38zUq9 zU7D5CP8zDU9 5AW3z5A49 8D9
kDCREA8A98KA9kPEE9CP29NA9qPzUA4x9JKz-9zU8A57PkA93-A-9DYU_INy[EHEPEFWN
OYYY/N FNYTHK[qIPKNR9JKA9a_^9PU498KA9=_^9kDCC3UzkP8A-96zP9'9zU8A57PkAx9/893-A-98KA9DYU_F9R5D8DkDEx9JKA9zU7D5CP8zDU95AEP8A49
9 8D98KA9EDkP8zDU9D79H,9z-9AYkKPUqA49NA8BAAU98KA9a_^9PU49=_^9D6A598Kz-9zU8A57PkAx99
OYO/N TNYTHK[qIPKNR9JKA9V9zU8A57PkA9R5D6z4A-9kDCC3UzkP8zDU9NA8BAAU98BD9H,;-x9/893-A-9DYU_T9R5D8DkDE98D9AYkKPUqA94P8P9
5AEP8A498D9KPU4D6A59NA8BAAU98KA9PUkKD59PU495AEP29H,;x9
999Szqx9+xWxV9R5A-AU8-98KA9R5D8DkDE9P5kKz8Ak835A9D79T,H9Bz8K9-zqUPEzUq9R5D8DkDE-9PU49zU8A57PkA-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-13 GSM
XP-A49DU98KA9zU8A57PkA”98KA9T,H9-zqUPEzUq9R5D8DkDE9z-9P--ACNEA49zU8D98K5AA9qAUA5PE9EP2A5-9]9
g e
Fig. 2.1.4 : GSM protocol stack for signaling
io led
RIJK[NrNRNMAKNyAJ,YPIFNFIJK[[NBKzkK93-A-98KA9kKPUUAE9-853k835A-9D6A598KA9Pz59zU8A57PkAx9
JKA9CPzU973Uk8zDU-9D79RK2-zkPE9EP2A59P5A9]99
ic ow
o =PU4EA-9PEE95P4zDj-RAkz7zk973Uk8zDU-9
o ;5AP8zDU9D79N35-8-9
n
o H3E8zREAYzUq9D79N35-8-9zU8D9J'H_975PCA-9
bl kn
o ,2UkK5DUz–P8zDU9Bz8K98KA9XJ,9
o
at
'A8Ak8zDU9D79z4EA9kKPUUAE-9
Pu ch
o HAP-35ACAU89D798KA9kKPUUAE9W3PEz829DU94DBUEzUµx9
JKA9RK2-zkPE9EP2A59P89R'9zU8A57PkA93-A-9TH,U97D594zqz8PE9CD43EP8zDU9PU49RA57D5C-9AUk52R8zDUZ4Ak52R8zDU9D794P8Px9
Te
RIJK[NVNRNMAKNjIHIfFYTbNFIJK[NN
JKA94P8PjEzUµ9EP2A593-A-9__“'C9F_zUµ9PkkA--9R5D8DkDE9DU98KA9''9kKPUUAEO9R5D8DkDENPk5D--98KA9RC9zU8A57PkA”9
__“'9F_zUµ9PkkA--9R5D8DkDE97D598KA9'9kKPUUAEO9z-98KA9/,'X9R5D8DkDE97D59'9kKPUUAEx999
__“''9z-9P9CD4z7zA496A5-zDU9D79__“'97D59CDNzEA9-8P8zDU-x9/894DA-9UD89UAA49-2UkK5DUz–P8zDU97EPq-9D59kKAkµ9-3C97D59A55D59
4A8Ak8zDUx99
__“''9D77A5-97DEEDBzUq973Uk8zDUPEz829]9
o ^AEzPNEA94P8P985PU-7A59D6A59kDUUAk8zDU-9
o ^Aj-AW3AUkzUq9D794P8P975PCA-9
o SEDB9kDU85DE9
o ,AqCAU8P8zDU9PU495AP--ACNE29D794P8P9
o _kµUDBEA4qA4Z3UPkµUDBEA4qA494P8P985PU-7A5x9
RIJK[NvNR9JKA98Kz549EP2A59D798KA9T,H9-zqUPEzUq9R5D8DkDE9z-94z6z4A49zU8D98K5AA9-3N9EP2A5-]9
^P4zD9^A-D35kA9CPUPqACAU89F^^O9
HDNzEz829HPUPqACAU89FHHO9PU49
;DUUAk8zDU9HPUPqACAU89F;HOx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-14 GSM
e
,8P8zDU9HPUPqACAU89FXJ,HOx99
g
JKA9XJ,9CPUPqACAU89EP2A59z-9P95AEP2973Uk8zDU9P898KA9XJ,98D98KA9X,;x9
io led
JKA9``Ny[EHEPEF,9R5D6z4A98KA9R5DkA435A-97D598KA93-A”9PEEDkP8zDU”95APEEDkP8zDU”9PU495AEAP-A9D798KA9T,H9kKPUUAE-x99
JKA9X,;9-8zEE9KP-9-DCA95P4zD95A-D35kA9CPUPqACAU89zU9REPkA97D598KA975AW3AUk29kDD54zUP8zDU”975AW3AUk29PEEDkP8zDU”9PU49
ic ow
8KA9CPUPqACAU89D798KA9D6A5PEE9UA8BD5µ9EP2A597D598KA9_P2A59+9zU8A57PkA-x9
S5DC9 8KA9 X,;9 8D9 H,;”9 8KA9 5AEP29 z-9 3-zUq9 ,,"9 R5D8DkDE-9 PU49 8KA9 X,,9 CDNzEA9 PRREzkP8zDU9 RP589 FX,,_“O9 z-9 3-A49 8D9
n
kDCC3UzkP8A975DC98KA9X,;98D9H,;x9
bl kn
MSC Protocols
at
_898KA9H,;”98KA9zU7D5CP8zDU9z-9CPRRA49Pk5D--98KA9_9zU8A57PkAx99
Pu ch
=A5A98KA9AW3z6PEAU89-A89D795P4zD95A-D35kA-9z-9UDB9kPEEA498KA9X,,9_RREzkP8zDU9“P589FX,,_“Ox9
JKz-9kDCREA8A-98KA95AEP29R5DkA--x9JK5D3qK98KA9kDU85DEj-zqUPEzUq9UA8BD5µ”9PEE98KA9H,;-9zU8A5Pk898D9EDkP8A9PU49kDUUAk89
Te
8D93-A5-98K5D3qKD3898KA9UA8BD5µx99
_DkP8zDU95Aqz-8A5-9P5A9zUkE34A49zU98KA9H,;94P8PNP-A-98D9P--z-89zU98KA95DEA9D794A8A5CzUzUq9KDB9PU49BKA8KA59kDUUAk8zDU-9
P5A98D9NA9CP4A98D95DPCzUq93-A5-x9
Signaling system No. 7 (SS7)
,,"9 z-9 3-A49 7D59 -zqUPEzUq9 NA8BAAU9 H,;9 PU49 P9 X,;x9 JKz-9 R5D8DkDE9 z-9 3-A49 8D9 85PU-7A59 PEE9 CPUPqACAU89 zU7D5CP8zDU9
NA8BAAU9H,;-”9=_^”a_^-”9_3;”9V/^”9PU49TH;x9
VWN ZTHK[TIHYETIFNDENYFKN.CN,P[YNK[NZjKTHYHJNOZD.Z/N
T,H93-A-9/H,/97D59zU8A5UPE93UzW3A9z4AU8z7zkP8zDU9D79P9-3N-k5zNA5x99
/H,/9kDU-z-8-9D79P9CDNzEA9kD3U8529kD4A9FH;;O”98KA9CDNzEA9UA8BD5µ9kD4A9FHX;O9F8KA9kD4A9D79-A56zkA9R5D6z4A5O”9PU49
8KA9CDNzEA9-3N-k5zNA59z4AU8z829U3CNA59FH,/XOx99
vWN MK]yE[I[JNDENYFKN.CN,P[YNK[NZjKTHYHJNOMD.Z/N
JD9Kz4A98KA9/H,/9D6A595P4zD9zU8A57PkA”9T,H93-A-9V9N28A9JH,/97D59EDkPE9-3N-k5zNA59z4AU8z7zkP8zDUx9
JH,/9z-9-AEAk8A49N298KA9k355AU89a_^9PU49z-96PEz497D598ACRD5P5zE29PU49Bz8KzU98KA9EDkP8zDU9P5AP9D798KA9a_^x9
a_^9CP29kKPUqA9JH,/9RA5zD4zkPEE2xN
7WN DENYFKN.HIHYETN`EI]YTGNQC]NK[NOD.`Q/N
H,^X9z-9P98ACRD5P529P445A--9qAUA5P8A49N29a_^98KP89z-93-A498D9Kz4A98KA9z4AU8z829PU49EDkP8zDU9D79P9-3N-k5zNA5x99
JKA9a_^9qAUA5P8A-98Kz-9P445A--9DU95AW3A-8975DC98KA9H,;x9
JKz-9H,^X9P445A--9z-9PE-D9-8D5A49zU98KA9=_^x9
e
H,^X9kDU8PzU-98KA9k355AU89aY,YHE[NIECTH[JNIEjKNOaII/”98KA9z4AU8z7zkP8zDU9D798KA9PC[[KTHND.INPU498KA9,CN,P[YNK[N
g
TC]NK[x9
io led
_EE98KA-A9PND6A9CAU8zDUA49U3CNA5-9P5A9UAA4A498D9EDkP8A9P9CDNzEA9-8P8zDU9PU49CPzU8PzU9kDUUAk8zDU9Bz8K9z8x99
2.1.6(a) Initialization
ic ow
\KAUA6A59P9CDNzEA9-8P8zDU9FH,O9z-9RDBA5A49DU”9-AW3AUkA9D79DRA5P8zDU-9KP6A98D9NA9RA57D5CA49zU9D54A598D9Pk8z6P8A98KA9
CDNzEA9zU98KA9qz6AU9UA8BD5µx9
n
Sz5-8”9H,9EDDµ-97D598KA9kP55zA59DU9BKzkK98KA9N5DP4kP-89kKPUUAE9z-985PU-Cz88A4x9
bl kn
/U9 D54A59 8D9 4D9 8Kz-”9 H,9 -kPU-9 PEE9 W+V9 kKPUUAE-9 PU49 CAP-35A-9 8KAz59 5AkAz6A49 RDBA59 EA6AEx9 JKA9 kP55zA59 kDU8PzUzUq9 8KA9
N5DP4kP-89kKPUUAE9z-9ACz88A49P89P9C3kK9KzqKA59RDBA598KPU9D8KA59kP55zA5-9zU98KA9-PCA9kAEEx9
at
Pu ch
JKA9H,9Ez-8-98KA9CAP-35A49kP55zA5-9PkkD54zUq98D98KAz594Ak5AP-zUq9RDBA5x9
/U9 8KA9 UAY89 -8AR”9 8KA9 H,9 Ez-8AU-9 8D9 8KA9 -3N-AW3AU89 kP55zA5-9 75DC9 8KA9 Ez-89 PU49 -AP5kKA-9 7D59 8KA9 75AW3AUk29 kD55Ak8zDU9
()
Te
kKPUUAE9FS;;=Ox9JKz-9z-94DUA9N29-kPUUzUq9: 9-ED89D798KA9N5DP4kP-89kP55zA5x9
JKA9H,9kP55zA5975AW3AUk29z-98KAU9P4g3-8A498D98KP8975AW3AUk2x9
H,98KAU97zU4-9D8KA59zCRD58PU89kDU85DE9zU7D5CP8zDU9N29-kPUUzUq9:()#-ED89D79-3N-AW3AU8975PCA-x9
_898Kz-9CDCAU898KA9RP--z6A9RP589D798KA9H,9Pk8z6P8zDU9zU98KA9UA8BD5µ9z-9kDCREA8A4x9
g e
io led
ic ow
n
bl kn
at
Pu ch
_898Kz-9RDzU8”9BA9P5A95AP4298D9zU7D5C98KA9=_^98KP898KA9H,9z-93U4A59kDU85DE9D79P9UAB9a_^9PU498KP898KA9H,9kPU9NA94Aj
Te
5Aqz-8A5A4975DC98KA9DE49a_^x9JKA9EDkP8zDU9D798KA93-A59z-93R4P8A49zU98KA9=_^xN
JKA9UAB9__/9PU49JH,/9z-9-AU898D98KA9H,x9H,9kDU7z5C-98KA9UAB9__/9PU49JH,/x9=A5A98KA9EDkP8zDU93R4P8A9R5DkA435A9z-9
kDCREA8Ax9JKA9,';;=9kKPUUAE9z-95AEAP-A4xN
JKA9-8AR9N29-8AR9R5DkA435A9z-9zEE3-85P8A49zU9Szqx9+xWxQx9
JKA97z5-898P-µ9PU9H,9KP-98D94D9z-98D9PkW3z5A9P9kKPUUAE97D595Aqz-85P8zDUx9JKA9H,94DA-98Kz-9N2985PU-Cz88zUq98KA9^_;=9zU9
BKzkK98KA9H,95AW3A-8-98KA9XJ,97D59P9kKPUUAE98D9NA93-A497D595Aqz-85P8zDUx9
JKA9XJ,985PU-7A5-98Kz-95AW3A-898D98KA9X,;x9
/U9835U98KA9X,;9zU7D5C-98KA9XJ,98D9P--zqU9P975AA9,8PU4PEDUA9'A4zkP8A49;DU85DE9;KPUUAE9F,';;=O98D98KA9H,x9
JKA9XJ,9-AU4-98KA9kDU7z5CP8zDU98D9H,9DU9_kkA--9q5PU89kKPUUAE9F_T;=O9PU49PEEDkP8A-9,';;=98D9H,x9
/U9835U98KA9H,9-AU4-98KA9EDkP8zDU93R4P8A95AW3A-89DU9UABE29P--zqUA49,';;=x9JKA95AW3A-89kDU8PzU-9JH,/9PU49DE49__/x9
JKz-95AW3A-89z-97D5BP54A498D98KA9UAB9H,;9PU49kD55A-RDU4zUq9a_^98K5D3qK98KA9XJ,9PU49X,;x9
/798KA9a_^9PE5AP429kDU8PzU-98KA93-A5h-9JH,/”9z893R4P8A-9z8-94P8Px9
/79 UD9 JH,/9 AYz-89 7D59 8KP89 3-A59 8KAU9 8KA9 __/9 -AU89 N29 8KA9 3-A59 z-9 4AkD4A4x9 JKA9 __/9 zU4z5Ak8E29 4A-k5zNA-9 8KA9 a_^9 8KP89
R5A6zD3-E29-A56A498KA9H,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-17 GSM
JKA9k355AU89a_^98PµA-9PEE98KA93-A5h-9RP5PCA8A5-9-3kK9P-9/H,/9U3CNA5”9P38KAU8zkP8zDU9PU49AUk52R8zDU9RP5PCA8A5-975DC9
8KA9R5A6zD3-9a_^x9
/798KA9R5A6zD3-9a_^94DA-9UD89kDU8PzU98Kz-9zU7D5CP8zDU98KAU98KA9H,9UAA4-98D985PU-Cz89z8-9/H,/9DU9,';;=x9
JKA9H,9-AU4-9z8-9/H,/98K5D3qK9Pz59DUE29DUkAx9JKz-9KPRRAU-9P898KA97z5-89AU85298D98KA9UA8BD5µx9
JKA9/H,/9U3CNA594A8A5CzUA-98KA9),,'&--".("%/&"0-&'",)%)"#$"%/&"123x9JKz-9zU7D5CP8zDU975DC98KA9=_^9z-9EDP4A49zU98KA9
k355AU89a_^x9JKA9zU7D5CP8zDU9kDU8PzU-9P38KAU8zkP8zDU9RP5PCA8A5-97D598KA93-A5x9
_78A598KP898KA9UAB9a_^9zUz8zP8A-98KA93-A59P38KAU8zkP8zDU9R5DkA--9PU498KA93-A595AREzA-9P5A96A5z7zA4x9
JKA9UAB9H,;Za_^95AW3A-8-98KA9X,,98D9kzRKA598KA95P4zD9kKPUUAEx9JKA9X,,93RDU9kzRKA5zUq98KA94DBUEzUµ9kKPUUAE9-AU4-9P9
kzRKA59kDCREA8A9CA--PqA98D98KA9H,;xN
e
(MU - May 14, Dec. 15)
g
Q. Describe the call initiation and call termination procedure in GSM systems.
io led (May 14, 10 Marks)
Q. Explain Mobile Call termination in GSM, detailing the need and the use of MSRN, IMSI, TMSI nos.
(Dec. 15, 10 Marks)
ic ow
JKz-9z-98KA9-z83P8zDU9BKA5A9P98A5CzUPE975DC9P97zYA49UA8BD5µ9kPEE-9P9CDNzEA9-8P8zDUx9JKz-9zU6DE6A-98KA97DEEDBzUq9-8AR-9
FSzqx9+xWx[Ox9
n
.HKyNrNN RNN _9 “,JX9 3-A59 4zPE-9 8KA9 RKDUA9 U3CNA59 D79 P9 T,H9 -3N-k5zNA5x9 JKA9 7zYA49 UA8BD5µ9 F“,JXO9 UD8zkA-9 8KP89 8KA9
bl kn
U3CNA59z-9D798KA9T,H9UA8BD5µ9PU497D5BP54-9kPEE9-A83R98D98KA9TP8ABP29H,;9FTH,;Ox9
at
.HKyNVNN R9 TH,;9 z4AU8z7zA-9 8KA9 =_^9 F75DC9 8KA9 /H,/9 U3CNA59 D79 8KA9 kPEEA49 H,O9 7D59 8KA9 -3N-k5zNA59 PU49 -zqUPE-9 8KA9 kPEE9
Pu ch
-A83R98D98KA9=_^x9
Te
.HKyNvNN R99 JKA9 =_^9 UDB9 kKAkµ-9 BKA8KA59 8KA9 U3CNA59 AYz-8-9 PU49 BKA8KA59 8KA9 3-A59 KP-9 -3N-k5zNA49 8D9 8KA9 5AW3A-8A49
-A56zkAx99
.HKyN7NN NNN R99=_^95AW3A-8-9P9HDNzEA9-3N-k5zNA595DPCzUq9U3CNA59FH,^XO975DC98KA9k355AU89a_^x9
.HKyNmNN NNN R99=_^95AkAz6A-9H,^Xx9_U498KA9=_^9kPU94A8A5CzUA95A-RDU-zNEA9H,;97D598KA9H,x9
.HKyNcNN NNN R99JKA9=_^97D5BP54-98Kz-9zU7D5CP8zDU98D9TH,;x9
.HKyN^NN NNN R99JKA9TH,;97D5BP54-9kPEE9-A83R95AW3A-898D98KA9H,;x9
.HKyN)[N:NN NNN RN JKA9H,;97z5-895AW3A-8-98KA9k355AU89-8P83-9D798KA9H,975DC98KA9a_^x99
.HKyNr2NN NNN R99/798KA9H,9z-9P6PzEPNEA”98KA9H,;9zUz8zP8A-9RPqzUq9zU9PEE9kAEE-x9
.HKyNrrNN NNN R99JKA9XJ,-9D79PEE9X,,-985PU-Cz898Kz-9RPqzUq9-zqUPE98D98KA9H,x9
.HKyNrV[NrvNR9JKA9H,9PU-BA5-x9
.HKyNr7[NrmNR9JKA9a_^94DA-9-Ak35z829kKAkµ-x9
.HKyNrc[Nr^NR99JKA9;DUUAk8zDU9z-9-A83Rx9
Szqx9+xWx"9zEE3-85P8A-98KA9CA--PqA-9AYkKPUqA9NA8BAAU98KA9H,9PU498KA9XJ,98PµAU9REPkA9435zUq98KA9kDUUAk8zDU9-A83Rx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-18 GSM
g e
io led Fig. 2.1.6 : Mobile terminated call
9
ic ow
n
bl kn
at
Pu ch
Te
XD8A98KP898KA9EDkP8zDU9P5AP9z-9-A56A49N29CPU29NP-A9-8P8zDU-x9,D9P78A594A8A5CzUzUq98Kz-9P5AP”98KA9H,;9-AU4-9P9RPqzUq9
5AW3A-898D9PEE9X,;-9DRA5P8zUq9zU98KA94A8A5CzUA49EDkP8zDU9P5APx99
/798KA9CDNzEA9-8P8zDU94A8Ak8-98KA9RPqzUq94z5Ak8A498D9z8”9z895AW3A-8-98KA9XJ,97D598KA9kKPUUAE9DU9^_;=x9
JKA9X,;98KAU9P--zqU-98KA9,';;=9kKPUUAE98D98KA9H,9PU49zU7D5C-9H,;9PND3898KA9P--zqUCAU8x9
H,9-AU4-98KA9RPqzUq95A-RDU-A9DU98Kz-9P--zqUA49,';;=x99
XDB9a_^9zUz8zP8A-98KA9H,9ICHAKTHYPIHYET9R5DkA--98KP89zU6DE6A-98KA9H,;”9X,;9PU9H,x9
_78A598KA9H,9KP-9NAAU9P38KAU8zkP8A4”98KA9a_^9z--3A-9P9kDCCPU498D9H,;98D9-8P589jIHINKTP[JyHYETx9JKA9H,;9zU9835U9
85PU-7A5-98Kz-9kDCCPU498D98KA9H,98K5D3qK9X,;9PU49XJ,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-19 GSM
_78A598KA9zUz8zP8zDU9D798KA9AUk52R8zDU9zU98KA9H,”9P9UAB9JH,/9U3CNA59z-9P--zqUA498D98KA9H,97D598KA98zCA9D79kDUUAk8zDUx9
JKA9H,9PkµUDBEA4qA-95AkAR8zDU9D798Kz-9U3CNA5x99
_89 8Kz-9 CDCAU89 8KA9 H,;9 zUz8zP8A-9 8KA9 PETTKPHYETN ,KHCy9 Bz8K9 8KA9 H,9 N29 -AU4zUq9 P9 -A89 3R9 CA--PqA9 8D9 z8x9 JKA9 H,9
PkµUDBEA4qA-98KA95AkAzR89D798Kz-9CA--PqAx99
H,;98KAU9zU7D5C-9X,;98D9P--zqU9P985P77zk9kKPUUAE98D98KA9H,x9H,95AkAz6A-98KA9kP55zA59U3CNA5”9P98zCA9-ED89PU49P985PzUzUq9
-AW3AUkA97D598KA9kDUUAk8zDUx9H,9PkµUDBEA4qA-98KA-A9RP5PCA8A5-x9
JKA9H,98KAU9-8P58-95zUqzUq9PU498KA9H,;9z-9zU7D5CA49PND389z8x9
JKA9H,;98KAU9-AU4-98KA95zUqzUq9-zqUPE98D98KA9kPEEzUq93-A5x99
_78A598KA9H,9PkkAR8-98KA9kPEE”9Pk83PE94P8P985PU-7A59-8P58-x9
2.1.6(d) Mobile Originated Call (MOC) (MU - May 16, Dec. 16)
Q. Explain how Mobile Originated Call (MOC) work. (May 16, Dec. 16, 10 Marks)
e
/89 z-9 C3kK9 -zCREA59 8D9 RA57D5C9 P9 CDNzEA9 D5zqzUP8A49 kPEE9 FHT;O9 kDCRP5A49 8D9 HJ;x9 JKz-9 7DEEDB-9 8KA9 7DEEDBzUq9 -8AR-99
g
F^A7A59Szqx9+xWx’Ox9 io led
.HKyNrN RN N N JKA9 H,9 85PU-Cz8-9 8KA9 5AW3A-89 7D59 P9 UAB9 kDUUAk8zDUx9 JKz-9 z-9 5APEz–A49 N29 8KA9 H,9 -AU4zUq9 P9 5PU4DC9 PkkA--9
N35-89DU9^_;=9EDqzkPE9kKPUUAEx9
.HKyNVNN RNN JKA9X,,97D5BP54-98Kz-95AW3A-898D98KA9H,;x9
ic ow
.HKyNmf)NN NRNN9JKA9H,;9kKAkµ-98KA9P6PzEPNzEz829D795A-D35kA-98K5D3qK9T,H9UA8BD5µ9PU49zU8D98KA9“,JXxNN
.HKyN:[Nr2N NRNN /79PEE95A-D35kA-9P5A9P6PzEPNEA”98KA9H,;9-A8-93R9P9kDUUAk8zDU9NA8BAAU9H,9PU498KA97zYA49UA8BD5µx9
/U9 P44z8zDU9 8D9 8KA9 PND6A9 -8AR-”9 D8KA59 CA--PqA-9 P5A9 AYkKPUqA49 NA8BAAU9 PU9 H,9 PU49 XJ,9 435zUq9 kDUUAk8zDU9 -A83Rx99
Szqx9+xWxL9-KDB-98KA9CA--PqA-97D59HT;x9
H,9KP-98D95AkAz6A9PU9PkkA--9q5PU89DU9_T;=9zU95A-RDU-A98D98KA9kKPUUAE95AW3A-89-AU89DU9^_;=x9JKz-9_T;=9kDU8PzU-98KA9
U3CNA59D798KA9,';;=9P--zqUA498D98KA9H,98D9NA93-A497D59kDUUAk8zDU9-A893Rx99
_EE9-3N-AW3AU89kDCC3UzkP8zDU9NA8BAAU98KA9H,9PU498KA9XJ,9BzEE9KPRRAU9DU98Kz-9P--zqUA49,';;=x9
JKA9H,9-AU4-9kPEE9-A893R95AW3A-898D98KA9X,;96zP9XJ,x9
JKA9X,;985PU-7A5-98Kz-9CA--PqA98D98KA9H,;x9
H,;9zU9835U9zU7D5C-98KA9a_^9P--DkzP8A49Bz8K9z89PND3898KA9kPEE9-A893R95AW3A-89z--3A49N298KA9H,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-20 GSM
g e
io led
Fig. 2.1.9 : Message flow for MOC
ic ow
/U9835U9a_^9zUz8zP8A-9P38KAU8zkP8zDU9R5DkA--x9
_78A598KA9H,9KP-9NAAU9P38KAU8zkP8A4”98KA9AUk52R8zDU9R5DkA435A9z-9-8P58A49N298KA9a_^x9
n
bl kn
_9UAB9JH,/9U3CNA59z-9P--zqUA498D98KA9H,x9JKA9H,9PkµUDBEA4qA-98KA95AkAR8zDU9D79JH,/x9JKA9H,;98KAU9P--zqU-9P97zYA49
EzUµ98D98KA9kPEE9PU49P985P77zk9kKPUUAE98D98KA9H,x9
at
Pu ch
H,9PkµUDBEA4qA-98KA9kKPUUAE9P--zqUCAU8x9JKz-9zU7D5CP8zDU95APkKA-98KA9H,;x9
H,;9-AU4-98KA9PEA589CA--PqA98D98KA9H,98K5D3qK9X,;9PU49XJ,9BKAU98KA9kPEEA49CDNzEA9-8P8zDU9-8P58-95zUqzUqx9
Te
\KAU98KA9kPEEA49CDNzEA9-8P8zDU9PkkAR8-98KA9kPEE”98KA9H,9z-9zU7D5CA49PND389z89N29-AU4zUq9kDUUAk89CA--PqAx9
SzUPEE29H,9PkµUDBEA4qA-98Kz-9kDUUAk89CA--PqA9PU494P8P985PU-7A59-8P58-x9
\KAU9P9CDNzEA93-A59z-9AUqPqA49zU9kDU6A5-P8zDU”98KA9H,9z-9kDUUAk8A498D98KA9XJ,96zP95P4zD9EzUµx9/798KA9CDNzEA93-A59CD6A-9
8D98KA9kD6A5PqA9P5AP9D79PUD8KA59XJ,”98KA95P4zD9EzUµ98D98KA9DE49XJ,9z-9A6AU83PEE294z-kDUUAk8A4”9PU49P95P4zD9EzUµ98D98KA9
UAB9XJ,9z-9A-8PNEz-KA498D9kDU8zU3A98KA9kDU6A5-P8zDUx9JKz-9R5DkA--9z-9kPEEA49KPU4D6A59D59KPU4D77x9999
=PU4D6A59z-95AW3z5A49zU9kAEE3EP59UA8BD5µ-”9P-9P9-zUqEA9NP-A9-8P8zDU94D9UD89kD6A598KA9BKDEA9-A56zkA9P5APx9
JKA9U3CNA59D79KPU4D6A5-98D9NA9RA57D5CA4994ARAU4-9DU98BD97Pk8D5-9]9
o IKFFN,YLKNR9JKA9-CPEEA59z-98KA9-z–A9D79kAEE9CD5A98KA9KPU4D6A5-95AW3z5A4x9
o .yKKjNEqND.NR9=zqKA598KA9-RAA49D79H,9CD5A9KPU4D6A5-9P5A95AW3z5A4x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-21 GSM
JKA5A9P5A98BD9NP-zk95AP-DU-97D59KPU4D6A59]9
rWN D.N]EOK,NECHNEqNHAKN[ITGKNEqNVM.N
_-9 P9 CDNzEA9 -8P8zDU9 z-9 CD6A49 D389 D79 8KA9 5PUqA9 D79 XJ,”9 8KA9 5AkAz6A49 -zqUPE9 EA6AE9 7PEE-9 NAEDB9 8KA9 CzUzCPE9
5AW3z5ACAU89D79kDCC3UzkP8zDUx9
JKA9A55D595P8A9q5DB-943A98D9zU8A57A5AUkA9PU49EDB9-zqUPE9-85AUq8Kx9
_EE98KA-A9A77Ak8-9CP294zCzUz-K98KA9W3PEz829D795P4zD9EzUµ9PU49CPµA9kDCC3UzkP8zDU9zCRD--zNEAx9
VWN REIjNNIFITPYTGNN
/798KA985P77zk9zU9DUA9kAEE9z-98DD9KzqK98KAU98KA9H,;9D59X,;9-Kz78-9-DCA9H,98D9D8KA59kAEE-x9
Szqx9+xWxW:9-KDB-98KA97D359RD--zNEA9KPU4D6A59-kAUP5zD-9zU9T,Hx9
g e
io led
ic ow
n
bl kn
OY/N ZTH[IfPKFFNAITjEOK[NRNJKz-9KPU4D6A598PµA-9REPkA9Bz8KzU9P9kAEEx9JKz-9KPU4D6A59z-9RA57D5CA49zU9D54A598D9DR8zCz–A98KA9
at
Pu ch
85P77zk9EDP49zU98KA9kAEE9D598D9zCR5D6A98KA9W3PEz829D798KA9kDUUAk8zDU9N29kKPUqzUq98KA9kP55zA5975AW3AUk29F-kAUP5zD9WOx9
OYY/N ZTHK[fPKFF[NYTH[IfV.INAITjEOK[NR9JKz-9KPU4D6A59Dkk35-9BKAU9P9CDNzEA9-8P8zDU9CD6A-975DC9DUA9kAEE98D9PUD8KA59kAEE”9
Te
N389-8P2-9Bz8KzU98KA9kDU85DE9D79-PCA9X,;x9JKA9X,;98KAU9RA57D5C-98KA9KPU4D6A5”9z89P--zqU-9P9UAB95P4zD9kKPUUAE9zU9
8KA9UAB9kAEE9PU495AEAP-A-9DE49DUA9F-kAUP5zD9+Ox9
OYYY/N ZTHK[fV.I[NYTH[IfD.INAITjEOK[NRNJKz-9KPU4D6A598PµA-9REPkA9NA8BAAU98BD9kAEE-9CPUPqA49N294z77A5AU89X,;-x9JKz-9
KPU4D6A59z-9kDU85DEEA49N29H,;9F-kAUP5zD9QOx9
OYO/N ZTHK[ND.INAITjEOK[NR9/U8A59H,;9KPU4D6A598PµA-9REPkA9NA8BAAU98BD9kAEE-9NAEDUqzUq98D94z77A5AU89H,;-x9XD8K9H,;-9
RA57D5C98KA9KPU4D6A598DqA8KA59F-kAUP5zD9VOx9
Inter-BSC, Intra-MSC handover
Szqx9+xWxWW9-KDB-98KA982RzkPE9-zqUPE97EDB9435zUq9PU9zU8A5jX,;”9zU85PjH,;9KPU4D6A5x9
JKA9H,9-AU4-9z8-9RA5zD4zk9CAP-35ACAU895ARD58-98D98KA9XJ,*+,x9
JKA9XJ,*+,97D5BP54-98KA-A95ARD58-98D98KA9X,;*+,98DqA8KA59Bz8K9z8-9DBU9CAP-35ACAU8-x9
XP-A49DU98KA-A96PE3A-98KA9X,;*+,94Akz4A-98D9RA57D5C9P9KPU4D6A59PU49-AU4-98KA9CA--PqA9=Ti5AW3z5A498D98KA9H,;x9
JKA9H,;98KAU95AW3A-8-98KA95A-D35kA-9UAA4A497D598KA9KPU4D6A5975DC98KA9UAB9X,;x9
JKz-9X,;-./9kKAkµ-”9z79AUD3qK95A-D35kA-9P5A9P6PzEPNEAx9/798KA95A-D35kA-9P5A9P6PzEPNEA98KAU9z89Pk8z6P8A-9P9RK2-zkPE9kKPUUAE9
P898KA9XJ,-./97D598KA9H,x9
XJ,-./9 -AU4-9 PkµUDBEA4qACAU89 D79 -3kkA--73E9 kKPUUAE9 Pk8z6P8zDU9 8D9 X,;-./x9 PU49 X,;-./9 PkµUDBEA4qA-9 8KA9 KPU4D6A59
5AW3A-8x9
JKA9H,;98KAU9z--3A-9P9KPU4D6A59kDCCPU498KP89z-97D5BP54A498D98KA9H,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-22 GSM
g e
io led
Fig. 2.1.11 : Intra MSC, inter BSC Handover process
JKA9H,9UDB9N5APµ-98KA9DE49kDUUAk8zDU9PU49PkkA--A-98KA9UAB9XJ,x9XDB9P9UAB95P4zD9EzUµ9z-9A-8PNEz-KA49NA8BAAU98KA9
H,9PU49XJ,-./x9
ic ow
_EE98KA95A-A56A495A-D35kA-9P898KA9DE49X,;9PU49XJ,9P5A95AEAP-A4x999
n
XD8A98KP89zU98KA9T,H9-2-8AC-98KA9CAP-35ACAU8-9P5A9RA57D5CA49N29ND8K9H,9PU498KA9XJ,x9
bl kn
JKA9W3PEz829PU498KA9RDBA59EA6AE9D798KA95AkAz6A49-zqUPE9P5A9CAP-35A49zU9ND8K98KA94z5Ak8zDU-x9JKA9H,9RA57D5C-95Aq3EP59
CAP-35ACAU8-9D798KA9W[9-85DUqA-89kP55zA5-985PU-Cz88zUq98KA9X;;=x9
at
Pu ch
JKA9CAP-35ACAU8-9D798KA9-zY9NA-89kP55zA5-9P5A985PU-Cz88A498D98KA9XJ,9A6A529:xV’9-Akx9
2.1.8 GSM Security (MU - May 12, Dec. 14, May 15, Dec. 16)
Te
Q. What are the functions of Authentication and Encryption in GSM ? (May 12, 10 Marks)
Q. Describe how data encryption is done is GSM system, with diagram explaining the role of SIM, A3, A5 and A8
algorithm. (Dec. 14, 10 Marks)
Q. Write a short note on Privacy and authentication in GSM. (May 15, 10 Marks)
Q. Explain in detail how Subscriber Authentication is done GSM. (Dec. 16, 10 Marks)
T,H9D77A5-9-A6A5PE9-Ak35z829-A56zkA-93-zUq9kDU7z4AU8zPE9zU7D5CP8zDU9-8D5A49zU98KA9YCINPU498KA9.ZDx9JKA-A9-Ak35z829
-A56zkA-9D77A5A49N29T,H9P5A9AYREPzUA49P-97DEEDB-x9
1. Access control and authentication
JKz-9zUkE34A-98KA9P38KAU8zkP8zDU9D79P96PEz493-A597D598KA9,/Hx9JKA93-A59UAA4-98D9AU8A59P9-Ak5A89“/X98D9PkkA--9P9,/Hx9
JKA9 T,H9 UA8BD5µ9 PE-D9 P38KAU8zkP8A-9 8KA9 -3N-k5zNA5x9 JKz-9 z-9 4DUA9 8K5D3qK9 8KA9 3-A9 D79 P9 kKPEEAUqAj5A-RDU-A9
CAkKPUz-Cx9
2. Confidentiality
/U9T,H”9kDU7z4AU8zPEz829D793-A594P8P9z-9PkKzA6A49N29AUk52R8zUq98KA94P8P9D6A59Pz59zU8A57PkAx9
_78A59P38KAU8zkP8zDU9H,9PU49XJ,9PRRE29AUk52R8zDU98D96DzkA”94P8P”9PU49-zqUPEzUq9zU7D5CP8zDUx9
JKA9kDU7z4AU8zPEz829AYz-8-9NA8BAAU9H,9PU49XJ,9DUE2x9/894DA-9UD89AYz-89AU4j8DjAU4x999999
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-23 GSM
3. Anonymity
JD9 R5D6z4A9 PUDU2Cz829 8KA9 z4AU8z829 D79 P9 -3N-k5zNA59 z-9 PEBP2-9 Kz44AU9 D6A59 8KA9 Pz59 zU8A57PkAx9 _EE9 4P8P9 z-9 AUk52R8A49
NA7D5A985PU-Cz--zDU9PU493-A59z4AU8z7zA5-9P5A9UD893-A49D6A598KA9Pz5x9
JD9AU-35A9-3N-k5zNA59z4AU8z829kDU7z4AU8zPEz82”98KA9JACRD5P529HDNzEA9,3N-k5zNA59/4AU8z829FJH,/O9z-93-A4x9a_^9CP29
kKPUqA98Kz-9JH,/9P89PU298zCAx99
JK5AA9PEqD5z8KC-9P5A93-A498D9R5D6z4A9-Ak35z829-A56zkA-9zU9T,Hx9
o YFGE[YHA]NYv9z-93-A497D59P38KAU8zkP8zDUx9
o YFGE[YHA]NYm9z-93-A497D59AUk52R8zDUx9
o YFGE[YHA]NY)9z-93-A497D59qAUA5P8zDU9D79kzRKA59µA2x9
VP5EzA59DUE29PEqD5z8KC9_Q9BP-9R3NEzkPEE29P6PzEPNEA”9BKA5A9P-9_Q9PU49_’9BA5A9-Ak5A8x9=DBA6A59_Q9PU49_’9P5A9UD9
EDUqA59-Ak5A898KA29BA5A9R3NEz-KA49DU98KA9/U8A5UA89zU9WLL’x9
JKA-A9PEqD5z8KC-9P5A9UD896A529-85DUq9KDBA6A59UA8BD5µ9R5D6z4A5-9kPU93-A9-85DUqA59PEqD5z8KC-x9
e
_EqD5z8KC9_Q9PU49_’9P5A9EDkP8A49DU98KA9,/H9PU49zU98KA9_3;x999
g
_EqD5z8KC9_Q9z-9zCREACAU8A49zU98KA94A6zkAx99
io led
=AUkA9PEqD5z8KC9_Q9PU49_’9kPU94z77A59N389PEqD5z8KC9_Q9z-9kDCCDU97D59PEE9-A56zkA9R5D6z4A5-x9
Authentication
ic ow
XA7D5A9PkkA--zUq9PU29T,H9-A56zkA98KA93-A59C3-89NA9P38KAU8zkP8A4x9
_38KAU8zkP8zDU9z-9NP-A49DU9,/H98KP89-8D5A-98KA9zU4z6z43PE9ICHAKTHYPIHYETNbKJN\Y[NHAKNC,K[NYjKTHYqYPIHYETNZD.ZNPU498KA9
n
IFGE[YHA]NYvx9
bl kn
_38KAU8zkP8zDU9R5DkA--93-A-9kKPEEAUqAj5A-RDU-A9CA8KD4x99
at
Pu ch
Te
,8AR-9zU6DE6A49zU9P38KAU8zkP8zDU9R5DkA--9P5A9zEE3-85P8A49zU9Szqx9+xWxW+x9
Wx9 JKA9PkkA--9kDU85DE9F_;O9qAUA5P8A-9P9W+’9Nz895PU4DC9U3CNA59^_X'9P-9kKPEEAUqAx9
+x9 a_^9-AU4-98Kz-9W+’jNz895PU4DC9U3CNA59F^_X'O98D98KA9H,x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-24 GSM
3. The MS computes the 32-bit signed response (SRES) based on the random number (RAND) with the
authentication algorithm (A3) using the individual subscriber authentication key (Ki).
4. MS sends this SRES to the MSC.
5. Similarly, access control also calculates the signed response called SRES.
6. Now MSC compares the values of signed response received by AC and MS. If the values are same then the
subscriber is accepted, otherwise subscriber is rejected.
Encryption
To ensure privacy, all messages containing user-related information are encrypted in GSM over the air interface.
Once authentication is done, MS and BSS can initiate encryption.
Steps involved in Encryption process are described in Fig. 2.1.13.
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
The SIM and access control (AC) generate the 64 bit cipher key Kc by using the authentication key Ki and 128 bit
random number RAND and applying algorithm A8.
The MS and BTS can now encrypt and decrypt data using algorithm A5 and the cipher key Kc.
The Kc which is 64 bit is not very strong but just enough to provide protection against simple eavesdropping.
In certain implementations it so happen that 10 out of 64 bits are always set to 0, so that the real length of the key
now is only 54. Hence the encryption is much weaker.
Q. How much of the original GSM network does GPRS need? Which elements of the network perform the data transfer?
Q. Which components are new in GPRS as compared to GSM ? What is their purpose? (Dec. 13, 10 Marks)
Q. What are the modifications require to an existing GSM network to be upgraded to GPRS ? Explain with the help of
diagram. (Dec. 14, 10 Marks)
TAUA5PE9 “PkµA89 ^P4zD9 ,2-8AC9 FT“^,O9 -8PU4P549 BP-9 4A7zUA49 N29 V35DRAPU9 JAEAkDCC3UzkP8zDU-9 -8PU4P54-9 /U-8z838A9
FVJ,/Ox9
/89z-9P9CPgD59zCR5D6ACAU89PU49AY8AU-zDU98D98KA9-8PU4P549T,H9-2-8ACx9
T,H9z-9P9kz5k3z8j-Bz8kKA49UA8BD5µ9BKzkK9z-9z4APE97D598KA94AEz6A529D796DzkA9N389UD89-3z8PNEA97D5985PU-Cz88zUq94P8P98KP89z-9
N35-829PU49P-2CCA85zk9zU9UP835Ax9
T“^,9 P44A49 RPkµA8j-Bz8kKA49 73Uk8zDUPEz829 8D9 AYz-8zUq9 UA8BD5µ-9 P-9 P9 5A-3E89 8KA9 3-A5-9 D79 8KA9 -2-8AC9 kPU9 NA9 DUEzUA”9
PEEDBzUq98D9CPµA96DzkA9kPEE-9PU49PkkA--9zU8A5UA89DUj8KAjqDx9
T“^,93-A-93U3-A498zCA9-ED8-9D79T,H9-2-8AC98D985PU-Cz89RPkµA894P8Px9
e
T“^,9kPU9PEEDkP8A9DUA98D9AzqK898zCA9-ED8-9Bz8KzU9P9J'H_975PCAx9
g
_EEDkP8zDU9D798zCA9-ED8-9z-9PU9DU94ACPU49NP-z-9zU-8AP49D797zYA49PU49R5A4A8A5CzUA4x9JKz-9PEEDkP8zDU94ARAU4-9DU9k355AU89
io led
UA8BD5µ9EDP49PU498KA9DRA5P8D59R5A7A5AUkAx9
'ARAU4zUq93RDU98KA9kD4zUq”98KA985PU-7A595P8A93R98D9r^rWVNbNYH,_,9z-9RD--zNEAx99
T“^,9DRA5P8D5-9D77A59P9CzUzC3C9D79DUA98zCA9-ED89RA59kAEE98D9AU-35A9P89EAP-89CzUzC3C94P8P95P8Ax9
ic ow
;KP5qzUq9zU9T“^,9z-9NP-A49DU98KA96DE3CA9D794P8P9AYkKPUqA49PU49UD89DU98KA9kDUUAk8zDU98zCAx9
T“^,9PE-D9zUkE34A-9-A6A5PE9-Ak35z829-A56zkA-9-3kK9P-9P38KAU8zkP8zDU”9PkkA--9kDU85DE”9kDU7z4AU8zPEz829D793-A59z4AU8z829PU49
n
3-A594P8Px9
bl kn
JKA9 P6PzEPNEA9 3-A59 4P8P9 5P8A9 4ARAU4-9 3RDU9 8KA9 kD4zUq9 -kKACA9 PU49 8KA9 U3CNA59 D79 J'H_9 8zCA9 -ED8-9 PEEDkP8A4x99
at
JPNEA9+xWxQ9Ez-8-98KA94P8P95P8A-9P6PzEPNEA9zU9T“^,9z79z893-A49Bz8K9T,Hx9
Pu ch
2.2.1 Architecture
(MU - May 12, May 13, Dec. 13, Dec. 14, May 15, May 16, Dec. 16)
Q. Draw and explain architecture of GPRS network. (May 12, 5 Marks)
Q. Draw a neat diagram of GPRS system architecture and explain with different types of interfaces. (May 13, 10 Marks)
Q. Which components are new in GPRS as compared to GSM ? What is their purpose ? (Dec. 13, 10 Marks)
Q. What are the modifications required by an existing GSM network to be upgraded to GPRS ? Explain with the help of
diagram. (Dec. 14, May 16, Dec. 16, 10 Marks)
Q. Explain GPRS architecture in detail. Compare it with GSM architecture. (May 15, 10 Marks)
Szqx9 +x+xW9 -KDB-9 -zCREz7zA49 T“^,9 UA8BD5µ9 P5kKz8Ak835Ax9 _-9 -8P8A49 AP5EzA5”9 T“^,9 z-9 PU9 AY8AU-zDU9 8D9 85P4z8zDUPE9 T,H9
-2-8ACx99
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
JKA97DEEDBzUq9UA8BD5µ9UD4A-9KP6A9NAAU9P44A498D98KA9AYz-8zUq9T,H9UA8BD5µ98D9-3RRD589RPkµA89-Bz8kKA49UA8BD5µx9
1. GPRS Support Nodes (GSNs)
JKA9CD-89zCRD58PU89UA8BD5µ9UD4A9P44A498D98KA9T,H9UA8BD5µ9z-9T,X9FT“^,9,3RRD589XD4AOx9
/89z-9P9UA8BD5µ9UD4A9BKzkK9-3RRD58-98KA93-A9D79T“^,9zU98KA9T,H9kD5A9UA8BD5µx9_EE9T,X-9-KD3E49KP6A9P9!"9zU8A57PkA9
PU49-3RRD5898KA9T“^,983UUAEzUq9R5D8DkDE9FTJ“Ox9JKA5A9P5A98BD9µA296P5zPU8-9D798KA9T,X”9UPCAE29-A56zUq9PU49qP8ABP29
T“^,9-3RRD589UD4Ax9
2. Serving GPRS Support Node (SGSN)
/89z-9-zCzEP598D9H,;9D79T,H9UA8BD5µx9,T,X973Uk8zDU-9P5A9Ez-8A49NAEDBx99
o “A57D5C-94P8P9kDCR5A--zDU9BKzkK9KAER-98D9CzUzCz–A98KA9-z–A9D7985PU-Cz88A494P8P93Uz8-x99
o “A57D5C-9P38KAU8zkP8zDU9D79T“^,9-3N-k5zNA5-9PU49PE-D9CPzU8PzU-9zU7D5CP8zDU9D79PEE98KA9T“^,9-3N-k5zNA5-x99
o ,3kK9zU7D5CP8zDU9kDU8PzU-98KA9k355AU89kAEE”98KA9k355AU89a_^9PU49P9-3N-k5zNA5h-9R5D7zEA9kDU-z-8zUq9/H,/9U3CNA59PU49
e
8KA9P445A--93-A49zU9RPkµA89UA8BD5µx9
o
g
'A8A5CzUA-98KA95D38A9D7985PU-Cz88A49RPkµA8-9PU4985PU-7A598KAC98D9PRR5DR5zP8A9UD4A-x9
o
io led
HPUPqA-9H,9CDNzEz829P-98KA9-3N-k5zNA59CD6A-975DC9DUA9“_HX9P5AP98D9PUD8KA59“_HX”9PU49RD--zNE29DUA9,T,X98D9
PUD8KA59,T,Xx99
o HPzU8PzU-98KA9-8P8z-8zk-9D7985P77zk9kDEEAk8zDU-x99
ic ow
T,H9UA8BD5µx99
/894DA-98BD9CPzU973Uk8zDU-x9
at
o
Pu ch
^D38A-9RPkµA89kDCzUq975DC9AY8A5UPE9/“9UA8BD5µ-98D98KA95AEA6PU89,T,X9Bz8KzU98KA9T“^,9UA8BD5µx99=A5A9z89kDU6A58-9
zUkDCzUq9RPkµA898D98KA9T,H97D5CP89PU49-AU4-98KA9R5DkA--A49RPkµA898D9,T,Xx9
o ^D38A-9 RPkµA8-9 D5zqzUP8A49 75DC9 P9 T“^,9 3-A59 8D9 8KA9 5A-RAk8z6A9 AY8A5UPE9 /“9 UA8BD5µx9 =A5A9 z89 RA57D5C-9 8KA9
Te
kDU6A5-zDU9D798KA9T“^,9RPkµA898D98KA9PRR5DR5zP8A97D5CP89D798KA9“PkµA894P8P9R5D8DkDE9F“'“O94ARAU4zUq93RDU98KA9
4A-8zUP8zDU9UA8BD5µx9
4. Packet Control Unit (PCU)
“;R9z-98KA9kD5A93Uz898D9-Aq5AqP8A9NA8BAAU9T,H9PU49T“^,985P77zkx99
/89 -ARP5P8A-9 8KA9 kz5k3z89 -Bz8kKA49 PU49 RPkµA89 -Bz8kKA49 85P77zk9 75DC9 8KA9 3-A59 PU49 -AU4-9 8KAC9 8D9 8KA9 T,H9 PU49 T“^,9
UA8BD5µ-95A-RAk8z6AE2x99
/U9T“^,”9“;R9KP-97DEEDBzUq98BD9RP8K-x99
FzO9 “;RjH,;jTH,;j“,JX99
FzzO9 “;Rj,T,XjTT,Xj/U8A5UA89FRPkµA894P8P9UA8BD5µO9N
5. Border Gateway (BG)
/89Pk8-9P-9PU9zU8A57PkA9NA8BAAU94z77A5AU89DRA5P8D5-9D79T“^,9UA8BD5µ-x99
JKA9kDUUAk8zDU9NA8BAAU98BD9ND54A59qP8ABP2-9z-9kPEEA49T“^,983UUAEx99
/89z-9CD5A9-Ak35A98D985PU-7A594P8P9NA8BAAU98BD9DRA5P8D5-93-zUq98KAz59DBU9“_HX9UA8BD5µ-98K5D3qK9P94z5Ak89kDUUAk8zDU9
5P8KA598KPU96zP98KA9R3NEzk9/U8A5UA89BKzkK9z-9EA--9-Ak35Ax9
SD598Kz-9ND8K9DRA5P8D5-9UAA498D9Pq5AA98D9R5D6z4A9-3kK9kDUUAk8z6z829PU498A5C-9PU49kDU4z8zDU-9zUkE34zUq9kKP5qzUq98A5C-x99
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-28 GSM
e
99_U9/“9NP-A49UA8BD5µ9zU8A5jkDUUAk8zUq9PEE98KA9PND6A9CAU8zDUA49T“^,9UA8BD5µ9AEACAU8-9zU9DUA9“_HX9P5APx99
g
N OYY/N ZTHK[NURDQN io led
9/U8A59“_HX9z-9P9kDUUAk8zDU9NA8BAAU98BD94z77A5AU89“_HX9P5AP-x9
9. HLR Register
=_^9 -8D5A-9 zU7D5CP8zDU9 PU49 8KA9 3-A59 R5D7zEA9 D79 PEE9 T“^,9 -3N-k5zNA5-x9 JKA9 4P8P9 zUkE34A-9 8KA9 k355AU89 ,T,X9 PU49 “'“9
ic ow
P445A--A-x9JKA-A94P8P9P5A93R4P8A49APkK98zCA9P93-A595Aqz-8A5-9Bz8K9P9UAB9,T,Xx9
10. SMS-GMSC and SMS-IWMSC
n
bl kn
JKA9T“^,9-2-8AC9PEEDB-9,H,9CA--PqA-98D9NA9-AU89P-9BAEEx9SD598KP894P8P9AYkKPUqA9NA8BAAU9,H,jTH,;9PU499
,H,j/\H,;9NEDkµ-9PU498KA9PRR5DR5zP8A9,T,X98PµA-9REPkAx9
at
'z77A5AU89zU8A57PkA-9KP6A9NAAU94A7zUA49NA8BAAU94z77A5AU89UA8BD5µ9kDCRDUAU8-9D798KA9T“^,x9,DCA9UAB9zU8A57PkA-98D9
Te
T,H9KP6A9NAAU9P44A49zU9T“^,98D9-3RRD589RPkµA89-Bz8kKA494P8P9CPzUE29NA8BAAU9TT,X-”9,T,X-9PU49D8KA59UA8BD5µ9
kDCRDUAU8-x9JKA97DEEDBzUq9zU8A57PkA-9KP6A9NAAU94A7zUA4x9
OY/N X]NYTHK[qIPKNRN9XA8BAAU9H,9PU49XJ,98KA5A9z-9PU9X]9zU8A57PkA9BKzkK9z-96A529-zCzEP598D9T,H9PU494A7zUA-98KA9CD43EP8zDU9
82RA”9A55D59kD55Ak8zDUZ4A8Ak8zDU98AkKUzW3A”9RDBA59kDU85DE9zU7D5CP8zDU9A8kx99
OYY/N YN YTHK[qIPKN R9 XJ,9 PU49 X,;9 kDCC3UzkP8A-9 6zP9 _9 zU8A57PkA9 PU49 4A7zUA-9 8KA9 kKPUUAE9 PEEDkP8zDU”9 RDBA59 CAP-35ACAU89
zU7D5CP8zDU9A8kx99
OYYY/N BNNYTHK[qIPKNR9/89kDUUAk8-9X,;-98D9,T,Xx99
OYO/N BTN YTHK[qIPKN RN TU9 zU8A57PkA9 AYz-8N NA8BAAU9 T,X-9 D79 -PCA9 “_HXx9 /89 z-9 3-A49 8D9 AYkKPUqA9 3-A59 R5D7zEA9 BKAU9 8KA9 3-A59
CD6A-975DC9DUA9,T,X98D9PUD8KA5x99
OO/N ByNYTHK[qIPKNRNJBD9T,X-9D794z77A5AU89“_HX9kDCC3UzkP8A96zP9TR9zU8A57PkAWN/8Nz-93-A497D59AYkKPUqzUq98KA93-A59R5D7zEA9
PU49D8KA59-zqUPEzUq9zU7D5CP8zDU9NA8BAAU9P9,T,X9PU49TT,X9D79PUD8KA59P5APx99
OOY/N BqNYTHK[qIPKNRN/89z-93-A49NA8BAAU9,T,X9PU49V/^x9/89z-93-A498D9W3A5298KA9/HV/9zU7D5CP8zDU9z79PU9H,985zA-98D95Aqz-8A59Bz8K9
8KA9UA8BD5µx99
OOYY/N B[NYTHK[qIPKNRN9,T,X9PU49=_^9kDCC3UzkP8A96zP9B[9zU8A57PkAx9/89z-93-A498D9qA898KA93-A59R5D7zEA”98KA9k355AU89,T,X9P445A--9
PU498KA9“'“9P445A--FA-O97D59APkK93-A59zU9“_HXx99
OOYYY/NBPNYTHK[qIPKNR9XA8BAAU9TT,X9PU49=_^98KA5A9z-9BP9zU8A57PkAx9/89z-93-A49N29TT,X98D9W3A5293-A5b-9EDkP8zDU9PU49R5D7zEA98D9
3R4P8A9z8-9EDkP8zDU95Aqz-8A5x99
OYU/N BYNYTHK[qIPK9R9;DUUAk8-9TT,X98D9AY8A5UPE9“'Xx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-29 GSM
(x) Gs interface : Between SGSN and MSC/VLR is used to perform paging request of circuit switched GSM call for
combined attachment procedure.
(xi) Gd interface : Between SMS-Gateway (SMS-GMSC) and SGSN is used to exchange short message service (SMS)
messages.
(xii) GPRS Tunneling protocol (GTP) : All GSNs forming a GPRS backbone network are connected over IP. Within this
backbone the GSNs encapsulate and transmit PDN packets by using GPRS Tunneling Protocol (GTP).
g e
io led
ic ow
n
bl kn
2. TCP/UDP
Depending on the requirement, GTP can use either TCP or UDP as the transport layer protocol.
UDP is used in case non-reliable data transfer is required (IP packet transfer).
TCP is used in case reliable data transfer is required (X.25 packet transfer).
3. Subnetwork dependent convergence protocol (SNDCP)
It is used between the SGSN and the MS to adapt to the characteristics of the underlying networks.
User data packet is tunneled between the MS and the GGSN on top of SNDCP and GTP.
4. Logical link control
It is used to provide reliable data transfer between the MS and the SGSN.
It comprises ARQ and FEC mechanism for PTP (Point-To-Point) services.
5. Base station subsystem GPRS protocol (BSSGP)
This protocol is used to convey routing and QoS-related information between the BSS and SGSN.
It works on the top of a frame relay (FR).
6. Radio link protocol (RLC)
It is responsible for providing a reliable link between the MS and the BSS.
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-30 GSM
e
The BSC of GSM is given new functionality for mobility management for handling GPRS paging. The new traffic and
g
signaling interface form the SGSN is now terminated in the BSC.
io led
GPRS uses the MSC/VLR interface provided by GSM, between the MSC and SGSN coordinated signaling for mobile
stations which have both circuit switched and packet switched capabilities.
ic ow
The HLR of GSM is modified to contain GPRS subscription data and routing information and is accessible from the
SGSN. It also maps each subscriber to one or more GGSNs. The HLR may be in a different PLMN than the current SGSN
n
for roaming terminals
bl kn
Advantages of GPRS
Very flexible.
at
Pu ch
^WN .D.NRN/89z-9PE-D9RD--zNEA98D9-AU49,H,9CA--PqA-9D6A59T“^,x99
)WN .CyyFK]KTHI[JN ,K[OYPK,N R9 T“^,9 PE-D9 D77A5-9 -3RREACAU8P529 -A56zkA-”9 -3kK9 P-9 kPEE9 7D5BP54zUq9 PU49 kED-A49 3-A59 q5D3R9
F;RTOx9
e
TUA9 zUz8zPE9 AUKPUkACAU89 D79 T,H9 8DBP54-9 RHJ,9 BP-9 VUKPUkA49 'P8P9 5P8A-9 7D59 TEDNPE9 V6DE38zDU9 FV'TVO9 BKzkK9 3-A-9
g
AUKPUkA49CD43EP8zDU98AkKUzW3A-x9
io led
UMTS services
RHJ,9-KD3E49R5D6z4A97DEEDBzUq9-A56zkA-9P-9P9QT9UA8BD5µ9]9
ic ow
Wx9 “5D6z4A96P5zD3-9NAP5A59-A56zkA-x9
+x9 ,3RRD5895APEj8zCA9PU49UDU95APEj8zCA9-A56zkA-x9
n
Qx9 ,3RRD589;z5k3z89-Bz8kKA49PU49RPkµA89-Bz8kKA4985PU-Cz--zDUx9
bl kn
Vx9 =PU4D6A59-KD3E49RD--zNEA9NA8BAAU9RHJ,9kAEE-”9N389PE-D9NA8BAAU9D8KA59UDUjRHJ,9-2-8AC-9-3kK9P-9T,H9D59-P8AEEz8A9
at
UA8BD5µ-x9
Pu ch
Qx9 JKA9-2-8AC9-KD3E49NA9kDCRP8zNEA9Bz8K9T,H”9_JH”9/“9PU49/,'XjNP-A49UA8BD5µ-x9
[x9 ,KD3E49R5D6z4A96P5zPNEA94P8P95P8A-97D593REzUµ9PU494DBU9EzUµx9
Te
Q. Write a short note on UMTS architecture and its domain. (May 12, 5 Marks)
Q. Explain UMTS architecture. (May 15, 5 Marks)
Szqx9+xQxW9-KDB-98KA9-zCREz7zA49RHJ,95A7A5AUkA9P5kKz8Ak835Ax9
JK5AA9CPzU9kDCRDUAU8-9D79RHJ,9P5A9]9
Wx9 JKA9RJ^_9UA8BD5µ9FRJ^_XO99
+x9 ;D5A9XA8BD5µ9F;XO9
Qx9 R-A59VW3zRCAU89FRVO9
9
1. UTRAN
JKA9 RHJ,9 JA55A-85zPE9 UA8BD5µ9 FRJ^_XO9 KPU4EA-9 8KA9 kAEE9 EA6AE9 CDNzEz829 PU49 kDCR5z-A-9 -A6A5PE9 5P4zD9 UA8BD5µ9
-3N-2-8AC-9F^X,Ox9
^X,9kDU-z-8-9D798BD9CPzU9kDCRDUAU8-]9^X;F^P4zD9XA8BD5µ9;DU85DEEA5O9PU49XD4A9Xx9
XD4A9X9z-9-zCzEP598D98KA9NP-A9-8P8zDU9zU9T,H9-2-8AC”9BKzkK9RA57D5C-9RK2-zkPE9EP2A59R5DkA--zUq9-3kK9P-9kKPUUAE9kD4zUq”9
CD43EP8zDU”94P8P9zU8A5EAP6zUq9A8kx9
e
^X;9 kDU85DE-9 DUA9 D59 CD5A9 XD4A9 X-x9 /89 CPUPqA-9 5P4zD9 5A-D35kA-9 P--zqUA49 8D9 8KACx9 JK3-9 z89 RA57D5C-9 4P8P9 EzUµ9 EP2A59
R5DkA--zUq9PU49PE-D9RP58zkzRP8A-9zU9KPU4D6A59R5DkA--x99
g
^X;9z-9kDUUAk8A498D9H,;9PU49,T,X98D95D38A9kz5k3z89-Bz8kKA49PU49RPkµA89-Bz8kKA494P8Px99
io led
/U9qAUA5PE98KA973Uk8zDU-9D79^X,9zUkE34A-9]9
o ^P4zD9kKPUUAE9kzRKA5zUq9PU494AkzRKA5zUq9
ic ow
o =PU4D6A59kDU85DE9
o ^P4zD95A-D35kA9CPUPqACAU89
n
o _4Cz--zDU9kDU85DE99
bl kn
o ;DUqA-8zDU9kDU85DE9
o
at
,2-8AC9zU7D5CP8zDU9N5DP4kP-8zUq9
Pu ch
o ^P4zD9UA8BD5µ9kDU7zq35P8zDU9A8kx9
Te
RJ^_X9 z-9 kDUUAk8A49 8D9 R-A5-9 VW3zRCAU89 6zP9 8KA9 5P4zD9 zU8A57PkA9 R3x9 R39 zU8A57PkA9 z-9 kDCRP5PNEA9 8D9 RC9 zU8A57PkA9 zU9
T,Hx9
RJ^_X9kDCC3UzkP8A-9Bz8K98KA9;D5A9XA8BD5µ9F;XO96zP9/39zU8A57PkA9BKzkK9z-9-zCzEP598D98KA9_9zU8A57PkA9zU9T,Hx9
(i) Core Network (CN)
;D5A9UA8BD5µ9z-9-KP5A49Bz8K9T,H9PU49T“^,x9
/89kDU8PzU-9kDCRDUAU8-9-3kK9P-9=_^”9a_^”9H,;9”9TH,;9”9,T,X9PU49TT,Xx9
;D5A9 UA8BD5µ9 kDU8PzU-9 73Uk8zDU-9 7D59 zU8A5j-2-8AC9 KPU4D6A5”9 qP8ABP2-9 8D9 D8KA59 UA8BD5µ-”9 PU49 RA57D5C-9 EDkP8zDU9
CPUPqACAU8x99
(ii) User Equipment (UE)
JKA9 3-A59 AW3zRCAU89 FRVO9 kDU8PzU-9 8BD9 kDCRDUAU8-]9 HDNzEA9 AW3zRCAU89 FHVO9 PU49 RHJ,9 -3N-k5zNA59 /4AU8z829 HD43EA9
FR,/HOx99
HV9z-98KA95P4zD98A5CzUPE9kDUUAk8zUq98D98KA95P4zD9zU8A57PkA93-zUq9R39zU8A57PkAx999
R,/H9z-9P9-CP589kP549-zCzEP598D9,/H9zU9T,H9-2-8AC98KP89kDU8PzU-98KA9-3N-k5zNA59z4AU8z82”9P38KAU8zkP8zDU9PEqD5z8KC-”9
AUk52R8zDU9µA2-9A8kx9
RHJ,97358KA59-3N4z6z4A-98KA9PND6A9P5kKz8Ak835A9zU8D98BD94DCPzU-9P-9-KDBU9zU9Szqx9+xQx+x!
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-33 GSM
e
JKA9AU494A6zkA9z8-AE79z-9zU9P9CDNzEA9AW3zRCAU894DCPzUx9_EE973Uk8zDU-97D595P4zD985PU-Cz--zDU9P-9BAEE9P-93-A59zU8A57PkA-9
g
P5A9EDkP8A49KA5Ax9
io led
JKz-94DCPzU9z-97358KA594z6z4A49zU8D98BD9-3N94DCPzU-]9JKA9X.ZDNjE]IYT9PU49]ENYFKNKbCYy]KTHNjE]IYTx9
JKA9R,/H94DCPzU9kDU8PzU-98KA9,/H97D59RHJ,9PU49-8D5A-9PEE98KA9UAkA--P5293-A595AEP8A494P8Px9/89PE-D9RA57D5C-973Uk8zDU-9
ic ow
7D59AUk52R8zDU9PU49P38KAU8zkP8zDU9D793-A5-x9
The infrastructure domain
n
JKA9zU75P-853k835A94DCPzU9z-9-KP5A49PCDUq9PEE98KA93-A5-x9
bl kn
/89D77A5-9RHJ,9-A56zkA-98D9PEE98KA9-3N-k5zNA493-A5-x9
at
/89z-97358KA594z6z4A49zU8D98BD9-3N94DCPzU-x9JKA9IPPK,,NTKHxE[b,NjE]IYTNPU498KA9PE[KNTKHxE[bNjE]IYTWN
Pu ch
_kkA--9UA8BD5µ94DCPzU9kDU8PzU-98KA95P4zD9PkkA--9UA8BD5µ-9F^_XO9PU49R5D6z4A-95P4zD9PkkA--98D98KA9RHJ,93-A5-x9
;D5A9UA8BD5µ94DCPzU9kDU8PzU-973Uk8zDU-98KP89P5A9zU4ARAU4AU89D79PkkA--9UA8BD5µx99
Te
JKA9kD5A9UA8BD5µ94DCPzU9kPU9NA9-ARP5P8A49zU8D98K5AA94DCPzU-9Bz8K9-RAkz7zk98P-µ-x9
o JKA9-A56zUq9UA8BD5µ94DCPzU9
o JKA9KDCA9UA8BD5µ94DCPzU9
o JKA985PU-z89UA8BD5µ94DCPzU9
JKA9,K[OYTGNTKHxE[b9jE]IYT9kDCR5z-A-9PEE973Uk8zDU-9k355AU8E293-A49N29P93-A597D59PkkA--zUq9RHJ,9-A56zkA-x9
JKA9gE]KNTKHxE[bNjE]IYT9kDU8PzU-9PEE973Uk8zDU-95AEP8A498D98KA9KDCA9UA8BD5µ9D79P93-A597D59AYPCREA”93-A594P8P9EDDµj
3R”93-A59R5D7zEAx9
/798KA9-A56zUq9UA8BD5µ9kPUUD894z5Ak8E29kDU8Pk898KA9KDCA9UA8BD5µ98KAU9H[IT,YHNTKHxE[bNjE]IYT9CP29NA93-A4x9
UMTS radio interface
JKA9RHJ,94A7zUA-9P9UAB95P4zD9zU8A57PkA9#$%NA8BAAU98KA93-A59AW3zRCAU89PU498KA9RJ^_9UA8BD5µx9
JKA9RHJ,93-A-94z5Ak89-AW3AUkA9F',O9;'H_98AkKUDEDq2x9
/U9',j;'H_9APkK93-A59z-9-ARP5P8A493-zUq9P9-RAkzPE9kD4A9kPEEA49kKzRRzUq9-AW3AUkAx999
/89C3E8zREzA-9P9-85APC9D79Nz8-9Bz8K9P9kKzRRzUq9-AW3AUkA98D9-R5AP4-98KA9-zqUPEx9
JD9-ARP5P8A94z77A5AU893-A5-98KA9kD4A-98KA9kD4A-98KP89P5A93-A497D59-R5AP4zUq9-KD3E49NA9D58KDqDUPEx9
_EE9-zqUPE-93-A98KA9-PCA975AW3AUk29NPU4x9RHJ,93-A-98KA9kDU-8PU89kKzRRzUq95P8A9D79Qx’V9HkKzR-Z-x99
'z77A5AU894P8P95P8A-9kPU9NA9PkKzA6A49N293-zUq94z77A5AU89-R5AP4zUq97Pk8D5-x9,R5AP4zUq97Pk8D59z-94A7zUA49P-98KA9U3CNA59D79
kKzR-9RA59Nz8x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-34 GSM
Szqx9+xQxQ9-KDB-9NP-zk9z4AP9D79-R5AP4zUq9PU49-ARP5P8zDU9D793-A594P8P93-zUq9D58KDqDUPE9-R5AP4zUq9kD4A-x9
JKA97z5-89-8AR9z-9-R5AP4zUq98KA93-A594P8P93-zUq9D58KDqDUPE9-R5AP4zUq9kD4A-x9
g e
Fig. 2.3.3 : Spreading and scrambling of user data
io led
RHJ,93-A-9D58KDqDUPE96P5zPNEA9-R5AP4zUq97Pk8D59FTa,SO9kD4A-x9
Working of OVSF
ic ow
T58KDqDUPE9kD4A-9P5A9qAUA5P8A49N294D3NEzUq9P9kKzRRzUq9-AW3AUkA9c9Bz8K9PU49Bz8KD3897EzRRzUq98KA9-zqU9D798KA9kKzRx99
n
SD59 AYPCREA9 z79 P9 kKzRRzUq9 -AW3AUkA9 z-9 c9 8KA9 UAY89 -A89 D79 D58KDqDUPE9 kD4A-9 BD3E49 NA9 Fc”cO9 PU49 Fc”jcO9 P-9 -KDBU9 zU99
bl kn
Szqx9+xQxV9FPOx9
at
Pu ch
Te
XDB9 kKzRRzUq9 -AW3AUkA9 cc9 z-9 4D3NEA49 Bz8KD389 7EzRRzUq9 8KA9 -zqU-9 PU49 Bz8K9 7EzRRzUq9 8KA9 -zqU-x9 \A9 qA89 8BD9 CD5A9 -A8-9
Fc”c”c”cO9PU49Fc”c”jc”jcO9FSzqx9+xQxV9FNOOx!
JKA9BKDEA9R5DkA--9D79qAUA5P8zUq9Ta,S9kD4A-9z-9-KDBU9zU9Szqx9+xQxQ9P--3CzUq98KA9-8P58zUq9kKzRRzUq9-AW3AUkA9P-9Wx9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-35 GSM
g e
Fig. 2.3.5 : OVSF code tree used for orthogonal spreading
io led
'D3NEzUq98KA9kKzRRzUq9-AW3AUkA9PE-D95A-3E8-9zU9-R5AP4zUq98KA9Nz898BzkA9P-9C3kK9P-9NA7D5Ax9JKA9-R5AP4zUq97Pk8D59,SmU9
NAkDCA-9,Sm+Ux9
JBD9kD4A-9P5A9D58KDqDUPE9P-9EDUq9P-9DUA9kD4A9z-9UD898KA9RP589D79PUD8KA59kD4Ax9JK3-9D58KDqDUPEz829kPU9NA9q3P5PU8AA49z79
ic ow
DUA9kD4A9z-9UD89qAUA5P8A4975DC98KA9D8KA59kD4Ax9
JK3-9z79P9-AU4A593-A-98KA9kD4A9FW”nWO9Bz8K9-R5AP4zUq97Pk8D59P-9+”9z89z-9UD89PEEDBA498D93-A9PU29D798KA9kD4A-9EDkP8A499zU98KA9
n
-3N985AA9qAUA5P8A49D389D79FW”nWOx9
bl kn
RHJ,93-A-9kDU-8PU89kKzRRzUq95P8A9D79Qx’VHkKzRZ-x9
Pu ch
'z77A5AU894P8P95P8A-9P5A9PkKzA6A49N296P52zUq9-R5AP4zUq97Pk8D5x99
/798KA9kKzRRzUq95P8A9z-9kDU-8PU89PU49z79BA94D3NEA98KA9-R5AP4zUq97Pk8D598Kz-9BzEE95A-3E89zU9-R5AP4zUq98KA9Nz898BzkA9P-9C3kK9
Te
P-9NA7D5Ax9JK3-”9z894z6z4A-98KA94P8P95P8A9N298BDx9!
JK3-”9N293-zUq94z77A5AU89-R5AP4zUq97Pk8D5-9BA9kPU9PkKzA6A94z77A5AU894P8P95P8A-x!
Spreading and scrambling of user data
_-9 -KDBU9 zU9 Szqx9 +xQxQ9 APkK9 3-A59 -R5AP4-9 z8-9 4P8P9 -85APC9 3-zUq9 Ta,S9 kD4Ax9 _78A59 -R5AP4zUq”9 PEE9 kKzR9 -85APC-9 P5A9
-3CCA493R9PU49-k5PCNEA4x9,k5PCNEzUq9z-9UD8KzUq9N389cT^zUq9kKzR-9NP-A49DU9P9kD4Ax9
/U98KA9S''9CD4A”98KA9-k5PCNEzUq9kD4A9z-93UzW3A97D59APkK9-AU4A5x9JK3-”9KA5A9-k5PCNEzUq9kD4A9z-93-A498D9-ARP5P8A-9PEE9
-AU4A5-9zU9P9kAEEx9
_78A59-k5PCNEzUq98KA9-zqUPE-9D794z77A5AU89-AU4A5-9P5A9W3P–zjD58KDqDUPE-x9
SD59J''98KA9-k5PCNEzUq9kD4A9z-9kAEE9-RAkz7zk9zxAx9PEE98KA9-8P8zDU-9zU9P9kAEE93-A98KA9-PCA9-k5PCNEzUq9kD4Ax9
JKA9-k5PCNEA49kKzR-9P5A98KAU9CD43EP8A493-zUq9l“,U9PU498KAU985PU-Cz88A4x!
JKA9S''9CD4A97D59RJ^_93-A-9Bz4ANPU49;'H_9F\j;'H_O9Bz8K94z5Ak89-AW3AUkA9-R5AP4zUqx9
/U9S''”93REzUµ9PU494DBUEzUµ93-A-94z77A5AU8975AW3AUkzA-x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-36 GSM
Features of W-CDMA
1920-1980 MHz uplink
2110-2170 MHz downlink
Uses constant chipping rate of 3.840 Mchip/s
Provides soft handover
Uses QPSK for modulation
Requires complex power control (1500 power control cycles/s)
Spreading : Up Link : 4-256;Down Link:4-512
UTRA-FDD Frame structure
Fig. 2.3.6 shows UTRA-FDD frame structure.
A radio frame contains 15 time slots. The duration of each frame is 10 msec.
e
A radio frame consists of 38,400 chips.
g
Each time slot is of 666.6 µs and consists of 2,560 chips.
io led
Each W-CDMA channel occupies 4.4 to 5 MHz bandwidth.
Time slots in W-CDMA are not used for user separation but to support periodic functions. In contrast to GSM where
time slots are used to separate users.
ic ow
n
bl kn
at
Pu ch
Te
Similar to GSM, UMTS also defines many logical and physical channels and their mapping.
Physical Channels in UMTS
UMTS supports three physical channels which are used for data transport.
o Dedicated Physical Data Channel (DPDCH)
o Dedicated Physical Control Channel (DPCCH)
o Dedicated Physical Channel (DPCH)
And additionally a Random Access Channel (RACH) to control the media access in uplink.
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-37 GSM
.y[KIjYTGNqIPHE[N FIHIN[IHKNObNYH,_,/N
V9 L[:9
’9 V’:9
W[9 +V:9
Q+9 W+:9
e
[V9 [:9
g
io led W+’9 Q:9
+Q[9 WQ9
JK3-”9CPYzC3C94P8P95P8A9-3RRD58A49z-9L[:9µNz8Z-9Bz8K9-R5AP4zUq97Pk8D59Vx9
ic ow
JKA9 R5DNEAC9 D79 3-zUq9 T,aS9 z-9 8KP89 DUE29 kA58PzU9 C3E8zREzA-9 D79 8KA9 NP-zk9 4P8P9 5P8A9 FzxAx9 WQ9 µNz8Z-O9 kPU9 NA9 3-A4x99
SD59 AYPCREA”9 +Q:9 µNz8Z-9 4P8P9 5P8A9 z-9 5AW3z5A49 8KAU9 8KA9 4A6zkA9 KP-9 8D9 kKDD-A9 V’:9 µNz8Z-”9 BKzkK9 BP-8A-9 8KA9
n
NPU4Bz48Kx9
bl kn
/U9 APkK9 kDUUAk8zDU9 zU9 EP2A5W”9 z89 kPU9 KP6A9 NA8BAAU9 –A5D9 PU49 -zY9 '“';=-x9 JKz-9 5A-3E8-9 zU9 P9 8KAD5A8zkPE9 CPYzC3C9
4P8P95P8A9D79Q”"V:9µNz8Z-9FL[:99[9m9Q”"V:Ox9
at
Pu ch
JPNEA9+xQx+9-KDB-982RzkPE93-A594P8P95P8A-98DqA8KA59Bz8K98KA95AW3z5A494P8P95P8A-9DU98KA9RK2-zkPE9kKPUUAEx9
Table 2.3.2 : UTRA-FDD uplink data rates
Te
e
RDBA595PCRzUqx99
g
JKA9U3CNA59D79P6PzEPNEA9-ED8-9kPU9NA94A7zUA49RA59kAEE9PU49z-985PU-Cz88A496zP9P9N5DP4kP-89kKPUUAE98D9PEE9R-A5-x9
Steps for searching a cell
io led
_9RV9KP-98D9RA57D5C97DEEDBzUq9-8AR-9435zUq98KA9-AP5kK97D59P9kAEE9P78A59P9RDBA59DUx9
rWN U[Y]I[JN,JTPA[ETYLIHYETN
ic ow
_9RV9KP-98D9-2UkK5DUz–A9Bz8K98KA9KAER9D79P9+Q[9kKzR9R5zCP529-2UkK5DUz–P8zDU9kD4Ax9JKz-9kD4A9z-9-PCA97D59PEE98KA9kAEE-9
n
PU49KAER-98D9-2UkK5DUz–A9Bz8K98KA98zCA9-ED89-853k835Ax9
bl kn
VWN .KPETjI[JN,JTPA[ETYLIHYETN
'35zUq9 8Kz-9 -AkDU49 RKP-A”9 8KA9 RV9 5AkAz6A-9 P9 -AkDU4P529 -2UkK5DUz–P8zDU9 kD4A9 BKzkK9 4A7zUA-9 P9 q5D3R9 D79 -k5PCNEzUq9
at
Pu ch
kD4A-93-A49zU98Kz-9kAEEx9JKA9RV9z-9UDB9-2UkK5DUz–A49Bz8K98KA975PCA9-853k835Ax9
vWN ZjKTHYqYPIHYETNEqNHAKN,P[I]NFYTGNPEjKN
Te
JKA9RV985zA-9PEE9-k5PCNEzUq9kD4A-9Bz8KzU98KA9q5D3R9D79kD4A-98D97zU498KA95zqK89kD4A9Bz8K98KA9KAER9D79P9kD55AEP8D5x9
Q. Explain UTRA TDD mode in detail. (May 13, May 15, 5 Marks)
Features of UTRA-TDD
RJ^_jJ''9-ARP5P8A-93R9EzUµ9PU494DBU9EzUµ9zU98zCA94DCPzUx9JKA9S5PCA9-853k835A9D79J''9z-9-zCzEP598D9S''x9
WQ9-ED8-9Bz8K9+”Q[:9kKzR-9RA59-ED897D5C9P95P4zD975PCA9Bz8K9435P8zDU9D79W:C-x9JKA9kKzRRzUq95P8A9z-9PE-D9Qx’V9HkKzRZ-x9
JKA9J''975PCA9-853k835A9kPU9NA9,J]]KH[YPIF9D59P,J]]KH[YPIFx9
/U9-2CCA85zkPE975PCA9-853k835A9U3CNA59D793REzUµ9PU494DBUEzUµ9-ED8-9z-9-PCAx9
/U9P-2CCA85zkPE975PCA9-853k835A9PU29P5Nz85P529kDCNzUP8zDU9z-93-A4x9
JKA9-2-8AC9kPU9kKPUqA9-R5AP4zUq97Pk8D59NA8BAAU9W98D9W[98D9PkKzA6A94A-z5A494P8P95P8Ax9
JK3-93-zUq98KA985P77zk9N35-89-KDBU9zU9Szqx99+xQx"94P8P95P8A-9D79[[+V”99QQW+”9W[Q[”99’+’9PU49VWV9µNz8Z-9kPU9NA9PkKzA6A497D59
-R5AP4zUq97Pk8D5-9W”+”V”[”’”9PU49W[95A-RAk8z6AE2x9
“DBA59kDU85DE9z-9AP-2943A98D98zqK89-2UkK5DUz–P8zDU9PU493-A9D79D58KDqDUPE9kD4A-x9_9-zCREA9RDBA59kDU85DE9-kKACA9Bz8K9
W::j’::9RDBA59kDU85DE9k2kEA-Z-9z-9-377zkzAU8x9
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-39 GSM
e
g
Szqx9+xQx"9-KDB-9P9N35-89D7982RA+9BKzkK9kDCR5z-A-98BD9jIHI97zAE4-9APkK9D79W”W:V9kKzR-x99
io led
,R5AP4zUq9z-9PRREzA498D98KA-A94P8P97zAE4-9DUE2x9
Midample
ic ow
Hz4PCREA9z-93-A497D5985PzUzUq9PU49kKPUUAE9A-8zCP8zDUx9
Guard period (GP)
n
_-9J''93-A-98KA9-PCA9-k5PCNEzUq9kD4A-97D59PEE9-8P8zDU-j98KA9-8P8zDU-9C3-89NA98zqK8E29-2UkK5DUz–A49PU498KA9-R5AP4zUq9
bl kn
kD4A-9P5A9P6PzEPNEA9DUE29DUkA9RA59-ED8x99
JD9EDD-AU98KA98zqK89-2UkK5DUz–P8zDU9Ez88EA9Nz8”9P9q3P549RA5zD49KP-9NAAU9zU85D43kA49P898KA9AU49D79APkK9-ED8x9
at
Pu ch
e
FzzzO9 PU49/“jNP-A49UA8BD5µ9
g
_EE98KA95P4zD9PkkA--9CD4A-9D79RJ^_X9-KD3E4973EE29-3RRD589_X,/9VW9PU49T,H9H_“x9
io led
_U9DRA5P8D59CP29-AEAk89DUA9D59CD5A95P4zD9CD43EA-98DqA8KA59Bz8K9DUA9D59CD5A9kD5A9UA8BD5µ9CD43EA-98D9zCREACAU89
QT9-2-8ACx9
ic ow
HD5AD6A5”9UA8BD5µ95AEP8A49R5DkA435A-9P5A9DR8zCz–A498D95A43kA9-zqUPEzUq985P77zk9zU9QTx9
_U9 P44z8zDUPE9 zCR5D6ACAU89 8D9 8KA9 ;D5A9 XA8BD5µ9 zU9 RJ^_X9 BP-9 P44z8zDU9 D79 P9 UAB9 AU8z829 T_^9 FTP8ABP29 _DkP8zDU9
n
^Aqz-8A5O9NA8BAAU9=_^9PU49a_^x9
bl kn
S5DC98KA96zAB9RDzU89D79a_^9EDkP8A49zU96z-z8A49UA8BD5µ”9T_^9z-985AP8A49P-95DPCzUq93-A5h-9=_^9zU9KDCA9UA8BD5µx9
at
S5DC98KA96zAB9RDzU89D79=_^9zU9KDCA9UA8BD5µ”98KA9T_^9Pk8-9P-98KA9a_^9P898KA96z-z8A49UA8BD5µx9
Pu ch
Review Questions
Te
Mobile Networking
3
A
A
A
A
Unit III
A
A
Syllabus
3.1 Mobile Networking : Medium Access Protocol, Internet Protocol and Transport layer
3.2 Medium Access Control : Motivation for specialized MAC, Introduction to multiple Access techniques (MACA)
3.3 Mobile IP: IP Packet Delivery, Agent Advertisement and Discovery, Registration, Tunneling and Encapsulation,
Reverse Tunneling, Routing (DSDV,DSR)
e
3.4 Mobile TCP : Traditional TCP, Classical TCP Improvements like Indirect TCP, Snooping TCP & Mobile TCP, Fast
Retransmit/ Fast Recovery, Transmission/Timeout Freezing, Selective Retransmission.
g
A
io led
Introduction
CIPNAPN(A)LOIHAS/LD(ABFAOB)PLR'(AH(3I’(/5A?BRI'IPjANL/AR(’B?(ALzAI?OB)PLzPAFL’PB)AIzAPN(A/S’’(//ABFA?BRI'(Az(P2B)1/“A
ic ow
”:I/PIzDAz(P2B)1AO)BPB’B'/APNLPAL)(AH(3('BO(HAFB)AFI:(HAz(P2B)1AHBAzBPA2B)1A2(''AIFAS/(HAHI)(’P'jAIzA2I)('(//Az(P2B)1/“AUNI/A
I/A R(’LS/(A PN(A 2I)('(//A z(P2B)1/A I?OB/(A 3L)IBS/A ’NL''(zD(/A 'I1(A HjzL?I’A PBOB'BDj5A L/j??(P)I’A 'Iz1/5A F)(‘S(zPA
n
HI/’Bzz(’PIBz/5A/(’S)IPj5ANIDNA())B)A)LP(A(P’“AUBA/SOOB)PA ?BRI'IPj5A(IPN()Az(2AO)BPB’B'/ANL3(APBAR(AH(3('BO(HAB)A(:I/PIzDA
bl kn
O)BPB’B'/A z((HA PBA R(A ?BHIFI(H“A UNI/A ’NLOP()A HI/’S//(/A O)BR'(?/A 2IPNA /B?(A BFA PN(A (:I/PIzDA 4675A -zP()z(PA LzHA U7–A 'Lj()A
O)BPB’B'ALzHA)(‘SI)(HA?BHIFI’LPIBz/APBA/SOOB)PA?BRI'IPj“A
at
Pu ch
9B2ALAHLj5AO(BO'(A2LzPAPBAL’’(//APN(A/()3I’(/AF)B?ALzj2N()(5ALzjPI?(AI))(/O(’PI3(ABFAPN(I)A'B’LPIBz“AUNI/AF(LPS)(ABFA
?B3IzDALzj2N()(ALzHA/PI''AR(ALR'(APBAL’’(//APN(A/()3I’(/AI/A’L''(HA?BRI'IPj“A
4L1IzDA/S’NA/()3I’(/A?BRI'(5A)(‘SI)(/A?BHIFI’LPIBzAPBA(:I/PIzDAO)BPB’B'/ALzHALPA/B?(A(:P(zPAPBA(:I/PIzDAL)’NIP(’PS)(“A
UN(AFB''B2IzDA/(’PIBzAHI/’S//(/APN(AI?O)B3(?(zP/AB)A?BHIFI’LPIBz/Az((HAPBAR(AHBz(AIzA4(HILA6’’(//A7BzP)B'5A-zP()z(PA
LzHAU)Lz/OB)PA'Lj()AO)BPB’B'/APBA?L1(ALAz(P2B)1AB)A/()3I’(/A?BRI'(“AA
3.1.1 Medium Access Protocols
4(HIS?AL’’(//AO)BPB’B'/ARL/I’L''jA’BzP)B'/AL’’(//APBAPN(A/NL)(HA?(HIS?“A
C(A1zB2A?LzjABFAPN(A467AO)BPB’B'/AFB)A2I)(HA0B)AFI:(H+Az(P2B)1A/S’NAL/A6*G=65A;'BPP(HA6*G=65A7;465A7;4687V5A
UB1(zA RS/5A PB1(zA )IzDA (P’“A ;Iz’(A 2I)('(//A ?(HIS?A I/A LA /NL)(HA ?(HIS?A 467A O)BPB’B'/A R(’B?(A LzA I?OB)PLzPA H(/IDzA
H(’I/IBzAFB)A2I)('(//Az(P2B)1“A
KSPA L''A PNI/A 467A O)BPB’B'/A F)B?A 2I)(HA z(P2B)1/A ’LzzBPA R(A HI)(’P'jA S/(HA FB)A 2I)('(//A z(P2B)1/“A =()(5A 2(A NL3(A
IzP)BHS’(HA/(3()L'ADvyUgEx2NNv33xp4fL54HxhD2p6xL'DB)IPN?/A2NI’NAL)(A/O(’IFI’L''jALHLOP(HAPBAPN(A2I)('(//AHB?LIz“AA
4(HIS?AL’’(//A’BzP)B'A’B?O)I/(/AL''A?(’NLzI/?/APNLPA)(DS'LP(AS/()AL’’(//APBALA?(HIS?AS/IzDA;V45AUV45AQV45AB)A
7V4“A467AI/APNS/A/I?I'L)APBAP)LFFI’A)(DS'LPIBz/AIzAPN(A?S'PIO'(:IzD“A
-zAPNI/A’NLOP()A2(A2I''AHI/’S//A3L)IBS/A467AO)BPB’B'/A/O(’IL''jAH(/IDz(HAFB)A2I)('(//Az(P2B)1/“A
UN(A-zP()z(PA)BSP()/A'BB1ALPAPN(A-–ALHH)(//AO)(FI:5A2NI’NAIH(zPIFI(/ALAH(3I’(Z/Az(P2B)1“Ax
6PAPN(Az(P2B)1A'(3('5A)BSP()/A'BB1ALPAPN(Az(:PAF(2ARIP/APBAIH(zPIFjAPN(ALOO)BO)ILP(A/SRz(P“AQIzL''j5ALPAPN(A/SRz(PA'(3('5A
)BSP()/A'BB1ALPAPN(ARIP/AIH(zPIFjIzDALAOL)PI’S'L)AH(3I’(“Ax
-zAPNI/A)BSPIzDA/’N(?(5AIFAjBSAHI/’Bzz(’PALA?BRI'(AH(3I’(AF)B?APN(A-zP()z(PALzHA2LzPAPBA)(’Bzz(’PAPN)BSDNALAHIFF()(zPA
/SRz(P5A jBSA NL3(A PBA’BzFIDS)(APN(A H(3I’(A 2IPNA LA z(2A -–A LHH)(//5A LzHA PN(A LOO)BO)ILP(Az(P?L/1ALzHA H(FLS'PA )BSP()“A
GPN()2I/(5A )BSPIzDA O)BPB’B'/A NL3(A zBA ?(Lz/A BFA H('I3()IzDAOL’1(P/“A UNI/A I/A R(’LS/(A PN(A H(3I’(Z/A -–A LHH)(//A HB(/zZPA
’BzPLIzAPN(Az(’(//L)jAIzFB)?LPIBzALRBSPAPN(A’S))(zPAOBIzPABFALPPL’N?(zPAPBAPN(A-zP()z(P“x
UN(Az(’(//IPjAFB)ASzIzP())SOP(HA’B??SzI’LPIBzA2N(zAPN(A?BRI'(AH(3I’(A?B3(/AF)B?ABz(A'B’LPIBzAPBALzBPN()A’L''/AFB)A
LAz(2AP(’NzB'BDj“x
UNI/A 1IzHA BFA ’B??SzI’LPIBzA ’LzA R(A (FFI’I(zP'jA I?O'(?(zP(HA S/IzDA 4BRI'(A -–“A D47UHvx kOA0B)A 4-–+A I/A LzA -”UQA /PLzHL)HA
’B??SzI’LPIBz/AO)BPB’B'APNLPAI/AH(/IDz(HAPBAL''B2AE47UHvxH(3I’(AS/()/APBA?B3(AF)B?ABz(Az(P2B)1APBALzBPN()A2NI'(A
?LIzPLIzIzDALAO()?Lz(zPAkOALHH)(//“Ax
;(’PIBzAY“YAHI/’S//(/AH(PLI'A4BRI'(A-–AO)BPB’B'/ALzHAIP>/AFSz’PIBzL'IPI(/“x
e
3.1.3 Transport Protocols
g
io led
U)Lz/?I//IBzA’BzP)B'A–)BPB’B'A0U7–+AI/APjOI’L''jAH(/IDz(HAFB)AFI:(HAz(P2B)1“A
-FA2(AS/(APN(A/L?(AU7–AB3()A?BRI'(Az(P2B)15APN(AO()FB)?Lz’(ABFAPN(AU7–AH(D)LH(/“A
”:I/PIzDAU7–A’LzAR(A?BHIFI(HAPBA/SOOB)PA?BRI'IPj“A
ic ow
;(’PIBzA Y“<A HI/’S//(/A 2B)1IzDA BFA (:I/PIzDA U7–5A O)BR'(?/A 2IPNA (:I/PIzDA U7–A IFA S/(HA IzA ?BRI'(A z(P2B)1A LzHA /B?(A
n
?BHIFI’LPIBz/APBAPN(A(:I/PIzDAU7–APNLPA’LzAR(AS/(HAFB)A?BRI'(Az(P2B)1/“AA
bl kn
MU – May 18
Te
Q. Explain the need of specialized MAC in wireless communication. (May 18, 10 Marks)
7;4687VA I/A PN(A ?B/PA ’B??Bz'jA S/(HA 467A O)BPB’B'A FB)A 2I)(HA z(P2B)1“A UN(A ‘S(/PIBzA I/5A ’LzA 2(A S/(A PN(A /L?(A
7;4687VAFB)A2I)('(//Az(P2B)1/APBA’BzP)B'APN(A?(HIS?AL’’(//A2IPNBSPALzjA?BHIFI’LPIBz/!A
*(PAS/A’Bz/IH()A’L))I()A/(z/(A?S'PIO'(AL’’(//A2IPNA’B''I/IBzAH(P(’PIBz5A07;4687V+A2NI’NA2B)1/AL/AFB''B2/“AA
6A/(zH()A/(z/(/APN(A?(HIS?A0LA2I)(+APBA/((AIFAIPAI/AF)((“A-FAPN(A?(HIS?AI/ARS/j5APN(A/(zH()A2LIP/ASzPI'AIPAI/AF)((“A-FAPN(A
?(HIS?AI/AF)((5APN(A/(zH()A/PL)P/AP)Lz/?IPPIzDAHLPLALzHA’BzPIzS(/APBA'I/P(zAIzPBAPN(A?(HIS?“A-FAPN(A/(zH()AH(P(’P/ALA
’B''I/IBzA2NI'(A/(zHIzD5AIPA/PBO/ALPABz’(ALzHA/(zH/ALAUL??IzDA/IDzL'“A
KSPAPNI/A/’N(?(AFLI'/AIzA2I)('(//Az(P2B)1/“AUNI/AI/AR(’LS/(5A7;4687VAI/AzBPA)(L''jAIzP()(/P(HAIzA’B''I/IBz/ALPAPN(A/(zH()5A
RSPA)LPN()AIzAPNB/(ALPAPN(A)(’(I3()“AUN(A/IDzL'A/NBS'HA)(L’NAPN(A)(’(I3()A2IPNBSPA’B''I/IBz/“AKSPAPN(A/(zH()AI/APN(ABz(A
2NBAH(P(’P/APN(A’B''I/IBz/“AA
UNI/AI/AzBPALAO)BR'(?AS/IzDALA2I)(5AL/APN(A/L?(A/IDzL'A/P)(zDPNA’LzAR(AL//S?(HAL''AB3()APN(A2I)(AIFAPN(A'(zDPNABFAPN(A
2I)(A/PLj/A2IPNIzA’()PLIzA/PLzHL)HIV(HA'I?IP/“A-FALA’B''I/IBzAB’’S)/A/B?(2N()(AIzAPN(A2I)(5A(3()jRBHjA2I''AzBPI’(AIP“AA
UN(A/IPSLPIBzAI/AHIFF()(zPAIzA2I)('(//Az(P2B)1/“AU2BAO)BR'(?/ANIHH(zAP()?IzL'ALzHA(:OB/(HAP()?IzL'AO)BR'(?AB’’S)AIzA
2I)('(//Az(P2B)1A2NI’NAL)(AHI/’S//(HABzAFB''B2IzDA/(’PIBz/“x
7B''I/IBzA H(P(’PIBzA I/A 3()jA HIFFI’S'PA IzA 2I)('(//A /’(zL)IB/A L/A PN(A P)Lz/?I//IBzA OB2()A IzA PN(A L)(LA BFA PN(A P)Lz/?IPPIzDA
LzP(zzLA I/A /(3()L'A ?LDzIPSH(/A NIDN()A PNLzA PN(A )(’(I3IzDA OB2()“A ;B5A PNI/A 3()jA ’B??BzA 467A /’N(?(A F)B?A 2I)(HA
z(P2B)1AFLI'/AIzALA2I)('(//A/’(zL)IB“Ax
UN(AFB''B2IzDA/(’PIBz/A/NB2A/’(zL)IB/A2N()(A7;4687VA/’N(?(AFB)?AFI:(HAz(P2B)1/AFLI'AIzA’L/(ABFA2I)('(//Az(P2B)1“x
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-3 Mobile Networking
Q. What is Hidden and Exposed terminal problem? Discuss solutions to these problems. (May 12, Dec. 13, 10 Marks)
Q. What do you mean by Exposed terminal problem ? (Dec. 12, 5 Marks)
Q. What do you mean by Hidden terminal problem? (Dec. 12, May 16, 5 Marks)
Q. Explain hidden station and exposed station problems in WLAN. (May 15, May 16, 5 Marks)
Q. What is hidden and exposed terminal problems? Discuss solution to these problems. (May 17, 5 Marks)
Q. Why do hidden terminal and exposed terminal problems arise? How would you propose to solve it?
(Dec. 17, 10 Marks)
CI)('(//A ?(HIS?A I/A LzA BO(z5A /NL)(H5A LzHA R)BLH’L/PA ?(HIS?“A 4S'PIO'(A zBH(/A ?LjA L’’(//A PN(A ?(HIS?A LPA PN(A /L?(A
PI?(“AA
e
U)LHIPIBzL'A*69/AS/(/A7;4687VA?(’NLzI/?APBA’BzP)B'A?(HILAL’’(//“AUNI/A/’N(?(A2B)1/AFB)A2I)(HAz(P2B)1ARSPAzBPAFB)A
g
2I)('(//“AA io led
7;4687VAFLI'/AIzA’L/(ABFA2I)('(//Az(P2B)1/AHS(APBAPN(AFB''B2IzDA)(L/Bz“A
-zAPN(A2I)(HAz(P2B)1APN(A/IDzL'A/P)(zDPNA’LzAR(AL//S?(HAPBAR(A/L?(AL''AB3()APN(A2I)(AIFAPN(A'(zDPNABFAPN(A2I)(A/PLj/A
2IPNIzA ’()PLIzA /PLzHL)HIV(HA 'I?IP/“A -FA LA ’B''I/IBzA B’’S)/A /B?(2N()(A IzA PN(A 2I)(5A (L’NA /PLPIBzA 2I''A zBPI’(A IP“A KSPA PN(A
ic ow
/IPSLPIBzA I/A HIFF()(zPA IzA LA 2I)('(//A *69“A =()(5A PN(A /P)(zDPNA BFA LA /IDzL'A H(’)(L/(/A O)BOB)PIBzL''jA PBA PN(A /‘SL)(A BFA PN(A
HI/PLz’(APBAPN(A/(zH()“AA
n
bl kn
VS(APBAPNI/A)(L/Bz5A467A/’N(?(/AFB)A2I)(HAz(P2B)1/A?LjAFLI'A2N(zAS/(HAFB)A2I)('(//Az(P2B)1/“AA
QB''B2IzDAP2BA/’(zL)IB/A/NB2A2N()(A’Bz3(zPIBzL'A7;4687VAFLI'/A2N(zAS/(HAIzA2I)('(//Az(P2B)1/“A
at
7Bz/IH()APN(A/’(zL)IBA2IPNAPN)((A?BRI'(AONBz(/A65AKALzHA7AL/A/NB2zAIzAQID“AY“W“XA
Te
UN(AP)Lz/?I//IBzA)LzD(ABFA6A)(L’N(/AK5ARSPAzBPA7“AA
UN(AP)Lz/?I//IBzA)LzD(ABFA7A)(L’N(/AK5ARSPAzBPA6“AA
QIzL''j5APN(AP)Lz/?I//IBzA)LzD(ABFA6A)(L’N(/ARBPNA6ALzHA7“AUNLPAI/5A6A’LzzBPAH(P(’PA7ALzHA3I’(A3()/L“A
0I+AA -zIPIL''j5A6A/(z/(/APN(A’NLzz('ALzHA/Iz’(AIPAFIzH/APN(A’NLzz('AF)((5A6AP)Lz/?IP/APBAK“A
0II+AA CNI'(A6AI/AP)Lz/?IPPIzD5A7AL'/BA2LzP/APBAP)Lz/?IPAPBAKALzHAN(z’(A/(z/(/APN(A’NLzz('“A
0III+AA 7AHB(/AzBPAN(L)A6>/AP)Lz/?I//IBzA0R(’LS/(A6AI/ABSPABFA)LzD(ABFA7+“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-4 Mobile Networking
0I3+AA 7A’Bz’'SH(/APNLPAPN(A’NLzz('AI/AF)((ALzHA/PL)P/AP)Lz/?IPPIzDAPBAK“A
03+AA ;IDzL'/AF)B?A6ALzHA7ARBPNA’B''IH(ALPAK“A
03I+AA Y6ZAI/ANIHH(zAFB)AY7Z“A
2. Exposed Station Problem
A 7Bz/IH()APN(A/IPSLPIBzA/NB2zAIzAQID“AY“W“W“A6'BzDA2IPNAPN(AO)(3IBS/A/IPSLPIBzAzB2AzBH(AVAI/ALHH(HA2NI’NAI/AIzAPN(A)LzD(A
BFA7“A
g e
io led
ic ow
0II+A 9B2A7AL'/BA2LzP/APBAPL'1APBAV“A
0III+A 7A/(z/(/APN(A’NLzz('ALzHAFIzH/AIPAPBAR(ARS/jA07A’LzAN(L)AK>/AP)Lz/?I//IBzA/Iz’(AKAI/AIzA7>/A)LzD(+“A
at
0I3+A 7A’Bz’'SH(/APNLPAPN(A’NLzz('AI/ARS/jALzHAHB(/AzBPAP)Lz/?IPA02N(zAIPA’BS'HANL3(AIH(L''jAP)Lz/?IPP(HAPBAVAR(’LS/(A6AI/A
Pu ch
BSP/IH(APN(A)LHIBA)LzD(ABFA7+“A
03+A Y7ZAI/A(:OB/(HAPBAYKZ“A
Te
UN(A=IHH(zAU()?IzL'AO)BR'(?A'(LH/APBA[A
0I+A 4B)(A’B''I/IBz/A
0II+A CL/PLD(ABFA)(/BS)’(/A
GzAPN(ABPN()ANLzH5A”:OB/(HAU()?IzL'AO)BR'(?A'(LH/APBA[A
0I+A \zH()SPI'IVLPIBzABFA’NLzz('A
0II+A *B2()A(FF(’PI3(APN)BSDNOSPA
Q. Explain in short how Hidden station problem is avoided in WLAN. (May 16, 5 Marks)
Q. What is hidden and exposed terminal problems? Discuss solution to these problems. (May 17, 5 Marks)
Q. Why do hidden terminal and exposed terminal problems arise? How would you propose to solve it?
(Dec. 17, 10 Marks)
=IHH(zA LzHA (:OB/(HA P()?IzL'A O)BR'(?/A ’LzA R(A /B'3(HA RjA S/IzDA ?S'PIO'(A L’’(//A 2IPNA ’B''I/IBzA L3BIHLz’(A 04676+A
O)BPB’B'“AA
C(A1zB2APNLP5AY6R/(z’(ABFA’L))I()AHB(/AzBPAL'2Lj/A?(LzALzAIH'(A?(HIS?ZAIzAPN(A’BzP(:PABFANIHH(zAP()?IzL'AO)BR'(?A
LzHAY–)(/(z’(ABFA’L))I()AHB(/AzBPAL'2Lj/A?(LzALARS/jA?(HIS?ZAIzAPN(A’BzP(:PABFA(:OB/(HAP()?IzL'AO)BR'(?5A4676A
/B'3(/ARBPNAPN(AO)BR'(?/“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-5 Mobile Networking
4676AS/(/AP2BA/NB)PA/IDzL'IzDAOL’1(P/A’L''(HAXU;ALzHA7U;AFB)A’B''I/IBzAL3BIHLz’(“A
hU6x -#Bxh5vGgv3LxL4x3vfy6xVA6A/(zH()A)(‘S(/P/APN(A])IDNPAPBA/(zH>AF)B?ALA)(’(I3()ARjAP)Lz/?IPPIzDAXU;AOL’1(PAR(FB)(A
HLPLAP)Lz/?I//IBz“A
hUU6x p#BxhNHvK5xL4x3vfy6xVAUN(A)(’(I3()AD)LzP/APN(A])IDNPAPBA/(zH>AL/A/BBzAL/AIPAI/A)(LHjAPBA)(’(I3(ARjA/(zHIzDARL’1ALA7U;A
OL’1(P“A
UN(/(AOL’1(P/A’BzPLIzA/(zH()ALHH)(//5A)(’(I3()ALHH)(//ALzHA'(zDPNABFAFSPS)(AP)Lz/?I//IBz“A
4676A/B'3(/A=IHH(zA;PLPIBzA–)BR'(?“A
e
Fig. 3.2.3 : MACA solves Hidden station problem
g
io led
4676AL3BIH/APN(AO)BR'(?ABFANIHH(zA/PLPIBz/“A7Bz/IH()APN(A/’(zL)IBA/NB2zAIzAQID“AY“W“Y“A
X“A 6ALzHA7A2LzPAPBA’B??SzI’LP(APBAK“A
W“A 6A/(zH/AXU;AFI)/P“A
ic ow
Y“A KA)(’(I3(/AXU;APNLPA’BzPLIz/AzL?(ABFAPN(A/(zH()A06+5A)(’(I3()A0K+ALzHAPN(A'(zDPNABFAFSPS)(AP)Lz/?I//IBz“AUNI/AXU;AI/A
n
zBPAN(L)HARjA7A09BPAIzA7>/A)LzD(+“A
bl kn
^“A KA )(/OBzH/A PBA XU;A RjA /(zHIzDA 7U;“A 7U;A OL’1(PA ’BzPLIz/A PN(A /(zH()A 06+5A PN(A )(’(I3()A 0K+A LzHA PN(A '(zDPNA BFA PN(A
FSPS)(AP)Lz/?I//IBz“AUNI/A7U;AI/A)(’(I3(HARjARBPNA6ALzHA7A0KAI/AIzA)LzD(ABFARBPNA6ALzHA7+“A
at
Pu ch
<“A 7A2LIP/ALFP()A)(’(I3IzDA7U;AF)B?AKALzHAI/AzBPAL''B2(HAPBAP)Lz/?IPALzjPNIzDAFB)APN(AHS)LPIBzAIzHI’LP(HAIzA)(’(I3(HA
7U;“A
Te
;PI''APN()(AL)(A’NLz’(/ABFA’B''I/IBzAHS)IzDAPN(A/(zHIzDABFALzAXU;“AKBPNA6ALzHA7A’BS'HA/(zHALzAXU;ALPAPN(A/L?(API?(APNLPA
’B''IH(/ALPAK“A6zAXU;AOL’1(PAI/A3()jA/?L''AL/A’B?OL)(HAPBAHLPLAOL’1(P5A/BAPN(AO)BRLRI'IPjABFALA’B''I/IBzAI/A?S’NA'B2()“AA
-zA/S’NA’L/(/5AKA)(/B'3(/APNI/A’BzP(zPIBzALzHA/(zH/A7U;APBABz'jABz(A/PLPIBz“A
4676A;B'3(/A”:OB/(HAU()?IzL'A–)BR'(?AA!
4676AL'/BAL3BIH/APN(AO)BR'(?ABFA(:OB/(HAP()?IzL'/“A
7Bz/IH()APN(A/’(zL)IBA/NB2zAIzAQID“AY“W“^“A
X“A KA2LzP/APBA/(zHAHLPLAPBA6“A
W“A 7AL'/BA2LzP/APBA/(zHAHLPLAPBA/B?(Bz(A('/(A09BPAPBA6ALzHAK+A
Y“A KA/(zH/AXU;A2IPNA/(zH()AL/AK5AX(’(I3()AL/A6ALzHA'(zDPNABFAPN(AHLPLAOL’1(P“AUNI/AXU;AI/A)(’(I3(HARjARBPNA6ALzHA7“A
^“A 7AHB(/AzBPA)(L’PAPBAPNI/AXU;AL/AIPAI/AzBPAPN(A)(’(I3()“A
<“A 6A)(/OBzH/APBAXU;ARjA/(zHIzDA7U;“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-6 Mobile Networking
_“A UNI/A7U;AI/AzBPA)(’(I3(HARjA7A06AI/AzBPAIzA7>/A)LzD(+ALzHA7A’Bz’'SH(/APNLPA6AI/ABSP/IH(APN(AH(P(’PIBzA)LzD(“A
`“A 7A’LzAzB2A/PL)PAIP/AP)Lz/?I//IBzAL//S?IzDAIPA2I''AzBPA’LS/(ALA’B''I/IBzALPA6“A
Drawbacks of MACA
X“A Gz(AO)BR'(?A2IPNA4676AI/APN(AB3()N(LH/AL//B’ILP(HA2IPNAXU;ALzHA7U;AP)Lz/?I//IBzAFB)A/NB)PALzHAPI?(A’)IPI’L'AHLPLA
OL’1(P/“AA
W“A 4676A L'/BA L//S?(/A PNLPA PN(A P)Lz/?I//IBzA 'Iz1/A L)(A /j??(P)I’L'A IzA RBPNA PN(A SO'Iz1A LzHA PN(A HB2z'Iz1A HI)(’PIBz/“A
GPN()2I/(ALA/P)BzDA/(zH()5AHI)(’P(HALzP(zzLA(P’“A’BS'HA’BzP)L’PA2IPNAPN(ALRB3(A/’N(?(“A
3.3 Mobile IP
3.3.1 Mobile IP : Basic Concept
4BRI'(A-–A0B)A-–A?BRI'IPj+AI/ALA’B??SzI’LPIBzAO)BPB’B'AH(3('BO(HARjA-zP()z(PA”zDIz(()IzDAUL/1AQB)’(A0-”UQ+A/PLzHL)H“AA
e
-zA ?BRI'(A -–5A zBH(/A ’BzPIzS(A PBA )(’(I3(A OL’1(P/A IzH(O(zH(zPA BFA PN(I)A 'B’LPIBzA 2NI’NA I/A L’NI(3(HA RjA ?BHIFjIzDA PN(A
/PLzHL)HA -–A IzA LA ’()PLIzA 2Lj“A -PA I/A H(/IDz(HA /S’NA PNLPA ?BRI'(A S/()/A ’LzA ?B3(A F)B?A Bz(A z(P2B)1A PBA LzBPN()A 2NI'(A
g
?LIzPLIzIzDALAO()?Lz(zPA-–ALHH)(//“A
io led
3.3.1(a) Need for Mobile IP
UBASzH()/PLzHAPN(Az((HAFB)A4BRI'(A-–5A'(PAS/AFI)/PASzH()/PLzHAPN(AO)BR'(?A2IPNAPN(AIzP()z(PAO)BPB’B'A0-–+“A
ic ow
-zAPN(A/PLzHL)HA-–5ALANB/P>/A-–ALHH)(//AI/A?LH(ASOABFALAz(P2B)1AIH(zPIFI()ALzHALANB/PAIH(zPIFI()“AUNI/Az(P2B)1AIH(zPIFI()A
n
/O(’IFI(/APN(Az(P2B)1APN(ANB/PAI/ALPPL’N(HAPB“A
bl kn
6A NB/PA /(zH/A LzA -–A –L’1(PA 2IPNA PN(A N(LH()A ’BzPLIzIzDA LA H(/PIzLPIBzA LHH)(//5A ?LH(A SOA BFA IP/A z(P2B)1A IH(zPIFI()A LzHA
H(/PIzLPIBzAIH(zPIFI()“AA
at
Pu ch
6/A'BzDAL/APN(A)(’(I3()A)(?LIz/A’Bzz(’P(HAPBAIP/AB)IDIzL'Az(P2B)15AIPA’LzA)(’(I3(AOL’1(P/“AA
9B2A/SOOB/(APN(A)(’(I3()AHI/’Bzz(’P/AIP/('FAF)B?AIP/AB)IDIzL'Az(P2B)1ALzHAUBIz/ALzBPN()Az(P2B)15APN(A)(’(I3()A2BS'HA
Te
z(3()A )(’(I3(A LzjA OL’1(P/“A UNI/A I/A R(’LS/(5A PN(A -–A LHH)(//A BFA PN(A NB/PA I/A zB2A PBOB'BDI’L''jA zBPA ’B))(’PA IzA PN(A z(2A
z(P2B)1“A
=(z’(5ALANB/PAz((H/ALA/Ba’L''(HAPBOB'BDI’L''jA’B))(’PALHH)(//ALzHA4BRI'(A-–A/PLzHL)HA2L/AH(3('BO(H“A
89x 0HK,Hv33xWv/UNvxD47UHULzxC3UfDxEFU3LUfDxWv/UNvx2yy5v33x
A 4BRI'(AH(3I’(/A’LzA’BzPIzS(APBAS/(APN(I)A(:I/PIzDA-–ALHH)(//A(3(zA2NI'(A’NLzDIzDAPN(I)AL’PSL'A'B’LPIBzAB)APN(I)AB)IDIzL'A
z(P2B)1“AA
G9x H4xKyyULU4fKHx2yy5v33UfDx45x-4gLUfDx-vGgU5vEvfL3x
o UN(A /L?(A B3()L''A /’N(?(A FB)A LHH)(//IzDA LzHA )BSPIzDA ?S/PA R(A ?LIzPLIz(HA L/A IzA )(DS'L)A -–“A UN(A B2z()A BFA (L’NA
H(3I’(A?S/PAL//IDzA-–ALHH)(//(/AIzAPN(AS/SL'A2Lj“A
o 9(2A)BSPIzDA)(‘SI)(?(zP/A?S/PAzBPAR(AO'L’(HABzAPN(AIzP()z(P2B)15A'I1(ANB/Pa/O(’IFI’A)BSP(/“AA
I9x kfLv54Jv5K7UHULzx
A 4BRI'(A-–AH(3I’(/A’LzA’BzPIzS(APBA’B??SzI’LP(A2IPNABPN()A-–AH(3I’(/APNLPANL3(AzBAIH(LALRBSPANB2A4BRI'(A-–A2B)1/5A
LzHA3I’(a3()/L“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-7 Mobile Networking
K9x #5Kf3JK5vfNzx4LxMKzv53x
o 6''A’NLzD(/A?LH(ARjA4BRI'(A-–A?S/PA)(?LIzA’BzFIz(HAPBAPN(Az(P2B)1A'Lj()“AA
o GPN()A'Lj()/A'I1(APN(AP)Lz/OB)PA'Lj()ALzHALOO'I’LPIBz/A?S/PAR(ALR'(APBAFSz’PIBzAIzAPN(A/L?(A2LjAL/A)(DS'L)A-–3^“A
N9x -v3L5KUfUfDxOK5y,K5vxpPKfDv3x
o 6AF(2A’NLzD(/AL)(A)(‘SI)(HAPBAPN(A)BSP()/APNLPAL)(AS/(H5ARjAPN(A?BRI'(AH(3I’(ALzHAPN(A?BRI'(AH(3I’(A/BFP2L)(AFB)A
4BRI'(A-–“AA
o UN(/(A’NLzD(/A?S/PAR(A1(OPAPBALA?IzI?S?“AGPN()AH(3I’(/5ANB2(3()5A'I1(A)BSP()/AR(P2((zAPN(ABz(/ABzAPN(ANB?(A
LzHA3I/IP(HAz(P2B)1/5AHBAzBPAz((HA’NLzD(/“A
Q9x BNKHK7UHULzx
o 4BRI'(A-–A?S/PAL''B2ALzjAH(3I’(APBA’NLzD(AF)B?ABz(Az(P2B)1APBALzBPN()Az(P2B)15ALzHAPNI/A?S/PAR(A/SOOB)P(HAFB)A
LzAL)RIP)L)jAzS?R()ABFAH(3I’(/“AA
e
o UN(A /’BO(A BFA PN(A ’Bzz(’PIBzA ’NLzD(A ?S/PA R(A D'BRL'“A QB)A (:L?O'(5A jBSA ’LzA S/(A jBS)A 'LOPBOA F)B?A LzA BFFI’(A IzA
g
*BzHBzALzHAL'/BAS/(AIPAIFAjBSA?B3(APBA4S?RLI“A
io led
R9x BvNg5ULzx
A 4BRI'(A -–A ?S/PA Iz’'SH(A LSPN(zPI’LPIBzA O)B’(HS)(/A PBA O)(3(zPA SzLSPNB)IV(HA H(3I’(/A F)B?A ’LS/IzDA L’’(//IzDA PN(A
ic ow
z(P2B)1ALzHAPN()(RjA’LS/IzDAO)BR'(?/“A
Q. List the entities of mobile IP and describe data transfer from a mobile node to a fixed node and vice versa.
at
Pu ch
89x D47UHvxH4yvxhDH6x
A 6zA (zHa/j/P(?A B)A LA )BSP()A 0zBH(+A PNLPA ’LzA ’NLzD(A IP/A OBIzPA BFA ’Bzz(’PIBzA PBA PN(A z(P2B)1A 2IPNBSPA ’NLzDIzDA IP/A -–A
LHH)(//“x
G9xx p455v3J4fyvfLxH4yvxhpH6x
A -PAI/APN(A’B??SzI’LPIBzAOL)Pz()AFB)APN(A?BRI'(AzBH(“AUN(A79A’LzAR(AFI:(HAB)A?BRI'(“x
I9x O4EvxHvL,45SxhOH6x
A UN(ANB?(Az(P2B)1AI/APN(A/SRz(PAPBA2NI’NAPN(A49AR('BzD/APBA2IPNA)(/O(’PAPBAIP/A-–ALHH)(//“x
K9xx 045vUDfxHvL,45Sxh0H6x
A UN(AFB)(IDzAz(P2B)1AI/APN(A’S))(zPA/SRz(PAPN(A49A3I/IP/ALzHA2NI’NAI/AzBPAPN(ANB?(Az(P2B)1“x
N9xx 045vUDfx2DvfLxh026x
o UN(AQ6AI/APjOI’L''jALA)BSP()AIzAPN(AFB)(IDzAz(P2B)1APBA2NI’NAPN(A?BRI'(AzBH(AI/A’S))(zP'jALPPL’N(H“AA
o UN(AQ6AS/SL''jAI?O'(?(zP/A4BRI'(A-–AFSz’PIBz/A'I1(AO)B3IHIzDA/(’S)IPjA/()3I’(/APBAPN(A49AHS)IzDAIP/A3I/IPAPBAPN(AQ9A
LzHAFB)2L)HIzDAPN(AHLPLD)L?/A)(’(I3(HAF)B?APN(ANB?(ALD(zPAPBAPN(A49“AA
o -PAL'/BA/SOOB)P/APN(A/NL)IzDABFA?BRI'IPjAIzFB)?LPIBzA/BAPNLPA4BRI'(A-–ABO()LP(/A/?BBPN'j“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-8 Mobile Networking
Q9x O4Evx2DvfLxhO26x
o =6AI/ALA/j/P(?AIzAPN(ANB?(Az(P2B)1ABFAPN(A49“A
o =6A ’LzA R(A I?O'(?(zP(HA BzA )BSP()A PNLPA I/A )(/OBz/IR'(A FB)A PN(A NB?(A z(P2B)15A B)A L'P()zLPI3('j5A IPA ’LzA R(A
I?O'(?(zP(HABzALAzBH(AIzALANB?(A/SRz(P“A
o =6A?LIzPLIz/ALA'B’LPIBzA)(DI/P)jAI“(“AIPAI/AIzFB)?(HABFAPN(A49>/A'B’LPIBz“A
o UN(APSzz('AFB)AOL’1(P/APB2L)H/APN(A49A/PL)P/ALPAPN(A=6“AA
R9x pK5vx4Lx2yy5v33xhpT26x
o UN(A7G6AH(FIz(/APN(A’S))(zPA'B’LPIBzABFAPN(A49“A
o –L’1(PAH('I3()jAPB2L)H/APN(A49AI/AHBz(AS/IzDALAPSzz('“A
o 6''A-–A–L’1(P/A/(zPAPBAPN(A49AL)(AH('I3()(HAPBAPN(A7G6“A
UN()(AL)(AWAHIFF()(zPAOB//IRI'IPI(/AFB)APN(A'B’LPIBzABFAPN(A7G6“A
e
hU6x 045vUDfx2DvfLxpT2x
g
A UN(A7G6A’BS'HAR(APN(A-–ALHH)(//ABFAPN(AQ6“A-zAPNI/A’L/(5APN(APSzz('A(zHOBIzPAI/APN(AQ6“AUN(AQ6AFB)2L)H/AOL’1(P/APBA
io led
PN(A49“A
hUU6x p4UxH4NKLvyxpT2x
ic ow
A -FAPN(A49AL’‘SI)(/ALAP(?OB)L)jA-–ALHH)(//APBAL’PAL/APN(A7G65APN(A7G6AI/A/LIHAPBAR(A’BAbA'B’LP(H“AUNI/ALHH)(//AI/ALA
PBOB'BDI’L''jA’B))(’PALHH)(//ALzHAPN(A49>/APBOB'BDI’L''jA’B))(’PA-–ALHH)(//AI/AzB2APN(APSzz('A(zHOBIzP“A
n
-zAQID“AY“Y“X5ALzA(:L?O'(Az(P2B)1AI/A/NB2z“AA
bl kn
6A79A’Bzz(’P/APBAPN(AIzP()z(PA3ILALA)BSP()“A6zBPN()A)BSP()AI?O'(?(zP/APN(A=65APNS/A’Bzz(’PIzDAPN(ANB?(Az(P2B)1ALzHA
PN(AIzP()z(P“AA
at
Pu ch
UN(AFB)(IDzAz(P2B)1>/A)BSP()AL’P/AL/APN(AQ6“A7S))(zP'j5APN(A49AI/AIzAPN(AFB)(IDzAz(P2B)1“AUN(APSzz('>/A/PL)PAOBIzPAI/ALPA
=6ALzHA(zHAOBIzPAI/ALPAQ65AFB)APN(AOL’1(P/AHI)(’P(HAPB2L)H/APN(A49“A
Te
Note : Tunnel for a packet sent to the MN always starts at HA and ends at either FA or MN depending upon the mode
of COA. If the COA is foreign agent COA, then the tunnel ends at FA. If the COA is co-located, then the tunnel
ends at MN.
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-9 Mobile Networking
Q. List the entities of mobile IP and describe data transfer from a mobile node to a fixed node and vice versa.
(May 12, Dec. 16, 10 Marks)
Q. Explain the IP Packet Delivery with respect to mobile IP. (Dec. 13, 5 Marks)
Q. How is packet delivery achieved to and from mobile node? (Dec. 18, 5 Marks)
7Bz/IH()AHLPLAP)Lz/?I//IBzAR(P2((zA79ALzHA49“AUN()(AL)(AFBS)A/’(zL)IB/“A
X“A 79AI/ALAFI:(HAzBH(ALzHAHLPLAI/APBAR(AP)Lz/F())(HAF)B?A79APBA49“A
W“A 79AI/ALAFI:(HAzBH(ALzHAHLPLAI/APBAR(AP)Lz/F())(HAF)B?A49APBA79“A
Y“A 79AI/ALA?BRI'(AzBH(ALzHAHLPLAI/APBAR(AP)Lz/F())(HAF)B?A79APBA49“A
^“A 79AI/ALA?BRI'(AzBH(ALzHAHLPLAI/APBAR(AP)Lz/F())(HAF)B?A49APBA79“A
e
A QID“AY“Y“WA/NB2/APN(AOL’1(PAH('I3()jAPBALzHAF)B?A49“A
g
io led
ic ow
n
Fig. 3.3.2 : Packet delivery to and from the mobile node
bl kn
hK6x WKLKxL5Kf3Lv5xL54Ex0UFvyxpHxL4xDHx
at
BLvJx8xVA CN(zAPN(A79A2LzP/APBA/(zHALzA-–AOL’1(PAPBAPN(A495APN(A79AHB(/z>PA1zB2ALRBSPAPN(A49>/A’S))(zPA'B’LPIBzA
Pu ch
LzHA/(zH/APN(AOL’1(PAPBAPN(A-–ALHH)(//ABFA49“A=()(5APN(A/BS)’(ALHH)(//ABFAPN(AOL’1(PAI/A79>/A-–ALHH)(//ALzHA
PN(AH(/PIzLPIBzALHH)(//AI/A49>/AB)IDIzL'A-–ALHH)(//“A
Te
BLvJxGxVA UN(AOL’1(PAI/A)BSP(HA3ILAPN(A/PLzHL)HA)BSPIzDA?(’NLzI/?ABFAPN(A-zP()z(PAPBAPN(A)BSP()A)(/OBz/IR'(AFB)A49>/A
NB?(Az(P2B)1“AUN(ANB?(Az(P2B)1>/A)BSP()AI?O'(?(zP/APN(A=6“AA
BLvJxIxVA UN(A=6AzB2AH(P(’P/APNLPAPN(A49AI/A’S))(zP'jAzBPAIzAIP/ANB?(Az(P2B)1“A-z/P(LHABFAFB)2L)HIzDAPN(AOL’1(PAIzPBA
PN(A/SRz(PAL/AS/SL'5APN(AOL’1(PAI/A(z’LO/S'LP(HALzHAI/APSzz('(HAPBAPN(A7G6ABFAPN(A49“A6Az(2AN(LH()AI/ALHH(HA
IzA F)BzPA BFA PN(A B'HA -–A N(LH()A IzHI’LPIzDA 49>/A 7G6A L/A PN(A z(2A H(/PIzLPIBzA LzHA =6A L/A PN(A /BS)’(A BFA PN(A
(z’LO/S'LP(HAOL’1(P“A
BLvJxKxVA Q6AzB2AH(’LO/S'LP(/APN(AOL’1(PALzHAFB)2L)H/APN(AB)IDIzL'AOL’1(PA2IPNA79AL/A/BS)’(ALzHA49AL/AH(/PIzLPIBz“AAA
h76x WKLKxL5Kf3Lv5xL54ExDHxL4xLUFvyxpHx
BLvJx8xVx UN(A OL’1(PA I/A /(zPA RjA PN(A 49A 2IPNA IP/A B)IDIzL'A -–A LHH)(//A L/A PN(A /(zH()A LzHA PN(A 79>/A -–A LHH)(//A L/A PN(A
)(’(I3()“A
BLvJxGxVx UN(A Q6A )(/OBz/IR'(A FB)A PN(A FB)(IDzA z(P2B)1A L’P/A L/A LA H(FLS'PA )BSP()A LzHA FB)2L)H/A PN(A OL’1(PA PBA PN(A )BSP()A
)(/OBz/IR'(AFB)APN(A79A0UN(A)BSP()AI/A'B’LP(HAIzA79>/ANB?(Az(P2B)1+“A
BLvJxIxVx UN(A)BSP()A)(/OBz/IR'(AFB)A79APN(zAFB)2L)H/APN(AOL’1(PAPBA79“A
hN6x WKLKxL5Kf3Lv5xL54ExD47UHvxpHxL4xLPvxDHx
BLvJx8xVx UN(A79A/(zH/APN(AOL’1(PA2IPNAIP/AB)IDIzL'A-–ALHH)(//AL/APN(A/BS)’(ALHH)(//ALzHA49>/AB)IDIzL'A-–ALHH)(//AL/APN(A
H(/PIzLPIBzALHH)(//“A
BLvJxGxVx ;Iz’(A PN(A 79A I/A L'/BA IzA PN(A 3I/IPIzDA z(P2B)15A PN(A Q6A )(/OBz/IR'(A FB)A PN(A 79A /(zH/A PN(A OL’1(PA PBA PN(A )BSP()A
)(/OBz/IR'(AFB)APN(ANB?(Az(P2B)1ABFA49“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-10 Mobile Networking
BLvJxIxVx UN(A=6ABFA49A)(L'IV(/APNLPAPN(A49AI/AzBPAIzAPN(ANB?(Az(P2B)1“A-PAPN(zA(z’LO/S'LP(APN(A)(’(I3(HAOL’1(PALzHA
FB)2L)H/AIPAPBAPN(A7G6A2IPNA/BS)’(ALHH)(//AL/A=6>/A-–ALHH)(//ALzHAPN(AH(/PIzLPIBzALHH)(//AL/A7G6“A
BLvJxKxVx UN(AFB)(IDzALD(zPA0Q6+ABFAPN(A49A)(’(I3(/APNI/AOL’1(P5AH(’LO/S'LP(/AIPALzHAFB)2L)H/AIPAPBAPN(A49“A
hy6x WKLKxL5Kf3Lv5xL54ExDHxL4xKxE47UHvxpHxx
BLvJx8xVx UN(A 49A /(zH/A PN(A OL’1(PA L/A S/SL'A 2IPNA IP/A B2zA FI:(HA -–A LHH)(//A L/A LA /BS)’(A LHH)(//A LzHA 79>/A LHH)(//A L/A
H(/PIzLPIBz“A
BLvJxGxVx UN(AFB)(IDzALD(zPA0Q6+A)BSP()A)(/OBz/IR'(AFB)A49A/(zH/APNI/AOL’1(PAPBAPN(ANB?(Az(P2B)1ABFAPN(A79“A
BLvJxIxVx UN(A=6A)(/OBz/IR'(AFB)A79A)(’(I3(/APN(AOL’1(PALzHA)(L'IV(/APNLPAPN(A79AI/AzBPAIzAPN(ANB?(Az(P2B)1ALzHAN(z’(A
PSzz('APN(AOL’1(PAPB2L)H/A7G6ABFAPN(A79“A
BLvJxKxVx UN(AQ6A)(/OBz/IR'(AFB)A79A)(’(I3(/APN(AOL’1(P5AH(’LO/S'LP(/AIPALzHAFB)2L)H/AIPAPBAPN(A79“A
A ;B?(A LHHIPIBzL'A ?(’NLzI/?/A L)(A z((H(HA FB)A ?BRI'(A -–A PBA 2B)1“A UN(A FB''B2IzDA /(’PIBzA HI/’S//(/A LRBSPA PN(/(A
(zNLz’(?(zP/“A
e
3.3.3 Agent Advertisement and Discovery
g
io led .MU - May 18.
Q. Explain agent advertisement and discovery registration in mobile networks. (May 18, 5 Marks)
CN(zALA?BRI'(AzBH(AI/AFI)/PAPS)z(HABz5AIPA’LzA(IPN()AR(AIzAIP/ANB?(Az(P2B)1AB)ALAFB)(IDzAz(P2B)1“A
ic ow
=(z’(5APN(AFI)/PAPNIzDAPNLPAIPA?S/PAHBAI/APBAH(P()?Iz(A2N()(AIPAI/5ALzHAIFAIPAI/AzBPALPANB?(5A?S/PAR(DIzAPN(AO)B’(//ABFA
/(PPIzDASOAHLPLD)L?AFB)2L)HIzDAF)B?AIP/ANB?(Az(P2B)1APBAPN(A’S))(zPA'B’LPIBz“AA
n
UNI/AO)B’(//AI/AL’’B?O'I/N(HARjA’B??SzI’LPIzDA2IPNALA'B’L'A)BSP()A/()3IzDAL/ALzALD(zPA0Q6+5APN)BSDNAPN(AO)B’(//A’L''(HA
bl kn
"#$%&!'()*+,$-.“AA
6D(zPAHI/’B3()jAO)B’(//A?L1(/AIPAOB//IR'(AFB)ALzA49APBAH(P()?Iz(A[A
at
Pu ch
o CN(PN()AIPAI/A’Bzz(’P(HAPBAIP/ANB?(Az(P2B)1AB)APBALAFB)(IDzAz(P2B)1“A
o CN(PN()AIPANL/A’NLzD(HAIP/AOB/IPIBz“A
Te
o UBABRPLIzALA7G6A2N(zAIPA’NLzD(/APBALAHIFF()(zPAFB)(IDzAz(P2B)1“A
6FP()A ?B3IzDA PBA LzBPN()A z(P2B)1A Bz(A IzIPIL'A O)BR'(?A I/A NB2A PBA FIzHA LA FB)(IDzA LD(zP“A QB)A PNI/A OS)OB/(5A ?BRI'(A -–A
H(/’)IR(/AP2BA?(//LD(/[A!"#$%&!'(#)%*+#,#$%ALzHA!"#$%&-./*0*%1%*.$“A
=B2AHB(/ALA?BRI'(AzBH(A?L1(ABSPAPNLPAIPANL/A’NLzD(HAz(P2B)1A)(’(zP'j!AUNI/AI/AL’NI(3(HARjA?(//LD(/AF)B?ANB?(A
LD(zP/ALzHAFB)(IDzALD(zP/“A
=B?(ALD(zP/ALzHAFB)(IDzALD(zP/ALH3()PI/(APN(I)AO)(/(z’(ALzHA/()3I’(/AS/IzDA?(//LD(/A’L''(HA1"#$%&1'(#)%*+#,#$%“AA
6D(zPALH3()PI/(?(zPA?(//LD(/AL)(AO()IBHI’L''jAR)BLH’L/PALzHA’BzPLIzAPN(AFB''B2IzDAH(PLI'/A
o *I/PABFA7G6/AL3LI'LR'(AFB)APN(A49“A
o ;O(’IL'A F(LPS)(/A LzHA /()3I’(/A O)B3IH(HA RjA Q6A /S’NA L/A HIFF()(zPA PjO(/A BFA (z’LO/S'LPIBzA L3LI'LR'(“A QB)A (:L?O'(5A
?IzI?L'A(z’LO/S'LPIBzAB)AD(z()I’A(z’LO/S'LPIBz“A
o 6''B2/A49APBAH(P(’PAPN(Az(P2B)1AzS?R()ALzHA’BzD(/PIBzAH(PLI'/ABFALA'Iz1APBAPN(A-zP()z(P“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-11 Mobile Networking
QB)ALD(zPALH3()PI/(?(zPA-74–A?(//LD(/A2IPNA/B?(A?BRI'IPjA(:P(z/IBzAL)(AS/(H“AUN(ALD(zPALH3()PI/(?(zPAOL’1(PAI/A
/NB2zAIzAQID“AY“Y“Y“AA
g e
Fig. 3.3.3 : Agent advertisement message
io led
UN(A3L)IBS/AFI('H/ABFA-74–AOL)PABFAPN(AOL’1(PAL)(A[A
o #zJvxVA-PAI/A/(PAPBAcAFB)A-74–“A
ic ow
o p4yvx VA ;(PA PBA d5A IFA PN(A LD(zPA L'/BA )BSP(/A P)LFFI’A F)B?A zBza?BRI'(A zBH(“A 6zHA /(PA PBA X_A IFA PN(A LD(zPA Bz'jA )BSP(/A
?BRI'(AP)LFFI’“A
n
o VKyy5v33v3x VA -zHI’LP(/A PN(A zS?R()A BFA LHH)(//(/A LH3()PI/(HA 2IPNA PNI/A OL’1(P“A UN(A L’PSL'A LHH)(//(/A FB''B2A L/A
bl kn
/NB2zAIzAQID“AY“Y“Y“AA
o MULvLUEvxVAV(zBP(/APN(A'(zDPNABFAPI?(AFB)A2NI’NAPN(ALH3()PI/(?(zPAI/A3L'IHA
at
Pu ch
o O5vLv5vfNvx Hv/vHx VA –)(F()(z’(A FB)A (L’NA )BSP()A LHH)(//A I/A /O(’IFI(H“A -PA N('O/A LA zBH(A PBA ’NBB/(A PN(A )BSP()“A UN(A
’NB/(zA)BSP()A2I''AL’PAL/ALzAQ6AFB)APN(A49“A
Te
UN(A3L)IBS/AFI('H/ABFA?BRI'IPjA(:P(z/IBzAOL)PAL)(A[A
o #zJvxVx-PAI/A/(PAPBAX_AFB)A)BSPIzDABz'jA?BRI'(AOL’1(P/“x
o MvfDLPxVx*(zDPNAH(O(zH/ABzAPN(AzS?R()ABFA7G6/AO)B3IH(HA2IPNAPN(A?(//LD(ALzHAIPAI/A(‘SL'APBA_AeA^AfA0zS?R()ABFA
LHH)(//(/+“x
o BvGgvfNvxfgE7v5xVx-PAIzHI’LP(/APN(APBPL'AzS?R()ABFALH3()PI/(?(zP/A/(PA/Iz’(AIzIPIL'IVLPIBz“x
o -vDU3L5KLU4fxHULvLUEvxVxA;O(’IFI(/APN(A?L:I?S?A'IF(PI?(AIzA/(’BzH/ALAzBH(A’LzA)(‘S(/PAHS)IzDA)(DI/P)LPIBz“x
UN(AFB''B2IzDARIP/A/O(’IFjAPN(A’NL)L’P()I/PI’/ABFALzALD(zPA[A
o -x7ULxVx-PAI/APN(A)(DI/P)LPIBzARIPALzHAIzHI’LP(/AIFALA)(DI/P)LPIBzA2IPNAPNI/ALD(zPAI/A)(‘SI)(HA(3(zA2N(zAS/IzDAA
’Ba'B’LP(HA7G6ALPAPN(A49“A
o Wx7ULxVAUNI/ARIPAI/A/(PAIFAPN(ALD(zPAI/A’S))(zP'jAPBBARS/jAPBAL’’(OPAz(2A)(DI/P)LPIBz“A
o Ox7ULxVAUNI/ARIPAI/A/(PAIFAPN(ALD(zPABFF()/A/()3I’(/AL/ALANB?(ALD(zP“A
o 0x7ULxVAUNI/ARIPAI/A/(PAIFAPN(ALD(zPABFF()/A/()3I’(/AL/AFB)(IDzALD(zPABzAPN(A'Iz1A2N()(APN(ALH3()PI/(?(zPANL/AR((zA
/(zP“A
o DxKfyxXx7ULxVx4ALzHAgARIP/A/O(’IFjAPN(A?(PNBHABFA(z’LO/S'LPIBzAS/(HAFB)APN(APSzz('“A4AFB)A?IzI?L'A(z’LO/S'LPIBzA
LzHAgAFB)AD(z()I’A)BSPIzDA(z’LO/S'LPIBz“A
o 5x7ULxVAUNI/AI/A)(/()3(HALzHA/(PAPBAV()B“AA
o #x7ULxVA-PAIzHI’LP(/APNLPA)(3()/(APSzz(''IzDAI/A/SOOB)P(HARjAPN(AQ6“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-12 Mobile Networking
6D(zPA/B'I’IPLPIBzA?(//LD(/AL)(A/(zPARjA49AIP/('FAPBA/(L)’NALzAQ6AIzABz(ABFAPN(AFB''B2IzDA’BzHIPIBz/“A
o CN(zAzBALD(zPALH3()PI/(?(zP/AL)(AO)(/(zPAB)A
o UN(AIzP()aL))I3L'API?(ABFALH3()PI/(?(zPA?(//LD(AI/APBBANIDNAB)5A
o 6zA49ANL/AzBPA)(’(I3(HALA7G6ARjABPN()A?(Lz/“AA
UBA)(HS’(APN(A’BzD(/PIBzABzAPN(A'Iz1APN(A49A’LzA/(zHABSPAPN)((A/B'I’IPLPIBz/5AO()A/(’BzH5AL/A/BBzAL/AIPA(zP()/ALAz(2A
z(P2B)1“A
e
6zjALD(zPAPNLPA)(’(I3(/APN(A/B'I’IPLPIBzA?(//LD(5AP)Lz/?IP/ALA/IzD'(ALD(zPALH3()PI/(?(zPAIzA)(/OBz/(“A-FALAzBH(AHB(/A
zBPA)(’(I3(ALzALz/2()APBAIP/A/B'I’IPLPIBz/5AIPA?S/PAH(’)(L/(APN(A)LP(ABFA/B'I’IPLPIBz/A(:OBz(zPIL''jAPBAL3BIHAF'BBHIzDAPN(A
g
z(P2B)1“A io led
6FP()APN(/(A/P(O/ABFALH3()PI/(?(zP/ALzHA/B'I’IPLPIBz/5APN(A49A’LzAzB2A)(’(I3(A7G65A(IPN()ABz(AFB)ALzAQ6AB)ALAA
’Ba'B’LP(HA7G6“AA
9B2APN(Az(:PA/P(OAI/5APN(A49ANL/APBA)(DI/P()A2IPNAPN(A=6AIFAPN(A49AI/AIzALAFB)(IDzAz(P2B)1“A
ic ow
3.3.4 Registration
(MU – Dec. 13)
n
bl kn
6FP()ALD(zPAHI/’B3()jAI/AHBz(ARjALA?BRI'(AzBH(5AIPA1zB2/A2N(PN()AIPAI/AIzAIP/ANB?(Az(P2B)1AB)AIzALAFB)(IDzAz(P2B)1“A-FAIPA
at
Pu ch
I/A IzA IP/A NB?(A z(P2B)15A IPA ’B??SzI’LP(/A 'I1(A LA )(DS'L)A -–A H(3I’(5A RSPA IFA IPA NL/A ?B3(HA PBA LA FB)(IDzA z(P2B)15A IPA ?S/PA
L’PI3LP(A4BRI'(A-–“A
Te
QB)AL’PI3LPIzDA4BRI'(A-–5ALAO)B’(//A’L''(HANB?(ALD(zPA)(DI/P)LPIBz5AB)A/I?O'jA)(DI/P)LPIBzAI/AS/(H“AQB)A)(DI/P)LPIBz5APN(A
49A (:’NLzD(/A IzFB)?LPIBzA LzHA Iz/P)S’PIBz/A 2IPNA PN(A NB?(A LD(zP“A UN(A ?LIzA OS)OB/(A BFA )(DI/P)LPIBzA I/A PBA D(PA PN(A
4BRI'(A-–A2B)1IzD“AAUN(A?BRI'(AzBH(A?S/PAIzFB)?APN(ANB?(APNLPAIPAI/ABzALAFB)(IDzAz(P2B)1A/BAPNLPAL''AHLPLD)L?/A?S/PA
R(AFB)2L)H(HAPBAIP/AFB)(IDzAz(P2B)1“AA
-PA L'/BA ?S/PA IzFB)?A PN(A NB?(A LD(zPA LRBSPA IP/A ’L)(A BFA LHH)(//A 07G6+A /BA PN(A NB?(A LD(zPA ’LzA /(zHA PN(A FB)2L)H(HA
HLPLD)L?/ALOO)BO)ILP('j“A
CN(zA)(DI/P)LPIBzAI/AO()FB)?(H5APN(ANB?(ALD(zP5AIzAPS)z5Az((H/APBA’B??SzI’LP(A3L)IBS/APjO(/ABFAIzFB)?LPIBzARL’1APBA
PN(A?BRI'(AzBH(“AA
X(DI/P)LPIBzA’LzAR(AHBz(AIzAP2BAHIFF()(zPA2Lj/AH(O(zHIzDABzAPN(A'B’LPIBzABFAPN(A7G6“A
x 89x pT2xKLxLPvx02xVx-zAPNI/A’L/(5A)(DI/P)LPIBzAI/AHBz(AL/A/NB2zAIzAQID“AY“Y“^“AA
UN(A49A/(zH/AIP/A)(DI/P)LPIBzA)(‘S(/PAPBAPN(AQ6A0’BzPLIzIzDA7G6+“AA
UN(AQ6AFB)2L)H/APN(A)(‘S(/PAPBAPN(A=6“A
UN(A=6AzB2A/(PSOALA?BRI'IPjARIzHIzDA’BzPLIzIzDAPN(A?BRI'(AzBH(>/ANB?(A-–ALHH)(//5AAPN(A’S))(zPA7G6ALzHAPN(A
'IF(PI?(ABFAPN(A)(DI/P)LPIBz“AA
UN(A )(DI/P)LPIBzA (:OI)(/A LSPB?LPI’L''jA LFP()A PN(A 'IF(PI?(A LzHA I/A H('(P(H“A ;BA PN(A 49A /NBS'HA )()(DI/P()A R(FB)(A
(:OI)LPIBz“A
6FP()A?BRI'IPjARIzHIzD5APN(A=6A/(zH/A)(O'jA?(//LD(ARL’1APBAPN(AQ6A2NI’NAFB)2L)H/AIPAPBA49“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-13 Mobile Networking
g e
io led
ic ow
x G9x pT2xU3xN4UH4NKLvyxVA-zAPNI/A’L/(5APN(A)(DI/P)LPIBzAI/A3()jA/I?O'(ALzHA/NB2zAIzAQID“AY“Y“<A
UN(A49A?LjA/(zHA)(DI/P)LPIBzA)(‘S(/PAHI)(’P'jAPBAPN(A=6ALzHA3I’(A3()/L“A
at
Pu ch
-FA PN(A 49A )(’(I3(HA LzA LD(zPA LH3()PI/(?(zPA F)B?A PN(A Q65A IPA /NBS'HA )(DI/P()A 3ILA PNI/A Q6A IFA PN(A XA RIPA I/A /(PA IzA PN(A
LH3()PI/(?(zP“A
Te
Fig. 3.3.5 : Registration procedure of mobile node via HA (Co- located COA)
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-14 Mobile Networking
A UN(A)(DI/P)LPIBzA)(‘S(/PA?(//LD(AI/A/NB2zAIzAQID“AY“Y“_ALzHA3L)IBS/AFI('H/AL)(AH(/’)IR(HAL/AFB''B2/A[A
o #zJvxVx-PAI/A/(PAPBAXAFB)A)(DI/P)LPIBzA)(‘S(/P“x
o
e
Bx7ULxVx-FA/(P5AIzHI’LP(/APNLPAPN(A49AL'/BA2LzP/APN(AQ6APBA)(PLIzAO)IB)IPjARIzHIzD“x
o
g
Wx7ULxVx-FA/(P5AIzHI’LP(/APNLPALzA49AL'/BA2LzP/APBA)(’(I3(APN(AR)BLH’L/PAOL’1(P/A2NI’NANL3(AR((zA)(’(I3(HARjAPN(A
=6AIzANB?(Az(P2B)1“x
io led
o Wx7ULxVx-FA/(P5AIPAIzHI’LP(/APNLPAPN(AH(a’LO/S'LPIBzABFAOL’1(P/AI/AO()FB)?(HARjAPN(A49“x
o MULvLUEvxVxV(zBP(/APN(A3L'IHIPjABFAPN(A)(DI/P)LPIBzAIzA/(’BzH/“x
o
ic ow
O4EvxKyy5v33xVxUN(ANB?(ALHH)(//AI/APN(AFI:(HA-–ALHH)(//ABFAPN(A49“x
o O4EvxKDvfLxVA-PAI/APN(A-–ALHH)(//ABFAPN(ANB?(ALD(zP“x
n
o kyvfLULUNKLU4f3x VA _^A RIPA IH(zPIFI’LPIBzA I/A D(z()LP(HA RjA 49A PBA IH(zPIFjA LA )(‘S(/PA LzHA ?LP’NA IPA 2IPNA )(DI/P)LPIBzA
bl kn
)(O'I(/“x
2. Registration reply message
at
Pu ch
Te
A UN(A)(DI/P)LPIBzA)(O'jA?(//LD(AI/A/NB2zAIzAQID“AY“Y“`ALzHA3L)IBS/AFI('H/AL)(AH(/’)IR(HAL/AFB''B2/A[x
#zJvxVx-PAI/A/(PAPBAY“x
p4yvx Vx 7BH(A IzHI’LP(/A PN(A )(/S'PA BFA PN(A )(DI/P)LPIBzA )(‘S(/P“A -PA /O(’IFI(/A 2N(PN()A PN(A )(DI/P)LPIBzA )(‘S(/PA 2L/A
/S’’(//FS'AB)AH(zI(HARjAPN(A=65AB)AH(zI(HARjAPN(AQ6“A
”:L?O'(A’BH(/AL)(A[A
X(DI/P)LPIBzA/S’’(//FS'A
o 7BH(AhAdiAA )(DI/P)LPIBzAI/AL’’(OP(HA
o 7BH(AhXiA )(DI/P)LPIBzAI/AL’’(OP(H5ARSPA/I?S'PLz(BS/A?BRI'IPjAAARIzHIzD/ASz/SOOB)P(HA
X(DI/P)LPIBzAH(zI(HARjAQ6A
o 7BH(AhA_<iA LH?IzI/P)LPI3('jAO)BNIRIP(HA
o 7BH(AhA__iA Iz/SFFI’I(zPA)(/BS)’(/A
o 7BH(AhA_`iA ?BRI'(AzBH(AFLI'(HALSPN(zPI’LPIBzA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-15 Mobile Networking
o 7BH(AhA_jiA NB?(ALD(zPAFLI'(HALSPN(zPI’LPIBzA
o 7BH(AhA_ciAA )(‘S(/P(HA'IF(PI?(APBBA'BzDA
X(DI/P)LPIBzAH(zI(HARjA=6x
o 7BH(AhAXWciA LH?IzI/P)LPI3('jAO)BNIRIP(HA
o 7BH(AhAXYXiA ?BRI'(AzBH(AFLI'(HALSPN(zPI’LPIBzA
o 7BH(AhAXYYiA )(DI/P)LPIBzAIH(zPIFI’LPIBzA?I/?LP’NA
o 7BH(AhAXY<iA PBBA?LzjA/I?S'PLz(BS/A?BRI'IPjARIzHIzD/A
Extensions
A -PA’BzPLIz/APN(AOL)L?(P()/AFB)ALSPN(zPI’LPIBzALzHA?LjAL'/BA’BzPLIzABPN()AIzFB)?LPIBzAL/A)(‘SI)(H“AA
e
Q. Explain how tunnelling works for mobile IP using IP-in-IP, minimal and generic routing encapsulation respectively.
g
Discuss the advantages and disadvantages of these three methods. (May 12, 10 Marks)
Q. Explain encapsulation with respect to mobile IP. (Dec. 13, 5 Marks)
io led
Q. Describe tunnelling and encapsulation in Mobile IP. (May 14, 5 Marks)
Q. Why is Mobile IP packet required to be forwarded through a tunnel ? (May 15, 5 Marks)
ic ow
Q. Why is mobile IP packet required to be forwarded through tunnel? Explain minimal and generic technique of
encapsulation of mobile IP. (May 15, Dec. 15, May 16, May 17, 10 Marks)
n
Q. Discuss how tunnelling work for mobile IP using IP-In-IP encapsulation. (Dec. 17, 5 Marks)
bl kn
What is tunneling ?
at
Pu ch
CN(zALA?BRI'(AzBH(A?B3(/ABSPAF)B?ANB?(Az(P2B)15APN(A=6A/(zH/AOL’1(PAPBA7G6ABFAPN(A49A3ILALAPSzz('“AA
6APSzz('A(/PLR'I/N(/ALA3I)PSL'AOIO(AFB)AHLPLAOL’1(P“A
Te
-zA4BRI'(A-–5APN(A/PL)PABFAPN(APSzz('AI/APN(ANB?(ALD(zP5A2NI’NAHB(/APN(A(z’LO/S'LPIBz“AUN(A(zHABFAPN(APSzz('AH(O(zH/A
BzA2NLPA/B)PABFA’L)(ABFALHH)(//AI/AR(IzDAS/(HA2NI’NAH(’LO/S'LP(/AHLPLAOL’1(P“AA
-FAFB)(IDzALD(zPA7G6AI/AS/(HAPN(zAQ6AL’P/AL/APN(APSzz('A(zHAOBIzPALzHAIFA’Ba'B’LP(HA7G6AI/AS/(HAPN(zA49AL’P/AL/APN(A
PSzz('A(zHAOBIzP“A
-FALA79A2LzP/APBA/(zHAHLPLAOL’1(PAPBA49A0’S))(zP'jAzBPAIzANB?(Az(P2B)1+APN(AHLPLAOL’1(PAI/AFI)/PA(z’LO/S'LP(HALPA=6A
LzHA/(zPA3ILALAPSzz('ALzHAPN(zAH(’LO/S'LP(HALPAQ6ALzHAFIzL''jAFB)2L)H(HAPBAPN(A49“A
UN(A(z’LO/S'LPIBzAO)B’(//AI/A/NB2zAIzAPN(AQID“AY“Y“j“A
o EfNKJ3gHKLU4fA?(Lz/AOSPPIzDALAOL’1(PA?LH(ASOABFALAOL’1(PAN(LH()ALzHAHLPLAIzPBAPN(AHLPLAFI('HABFALAz(2AOL’1(P“A
o WvNKJ3gHKLU4fxI/APN(A)(3()/(AO)B’(//ABFA(z’LO/S'LPIBz5APNLPAI/A)(?B3IzDAPN(AOL’1(PAF)B?APN(AHLPLAOL)PABFALzBPN()A
OL’1(P“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-16 Mobile Networking
UN(AHI/LH3LzPLD(/ABFA(z’LO/S'LPIBzAL)(A[A
o –L’1(PA/IV(AI/A'L)D()APNLzAPN(AB)IDIzL'AOL’1(P“A
o ”z’LO/S'LPIBzA’LzAR(AHBz(ABz'jA2N(zAPN()(AI/ALzA(zPIPjALPAPN(APSzz('A(zHAPNLPAH(’LO/S'LP(/APN(A-–AHLPLD)L?“A
o 6FP()ALA79>/A-–AHLPLD)L?/AL)(A’LOPS)(H5AHLPLD)L?/APSzz('(HAPBAPN(AQ6AFB)AH('I3()jAPBAPN(A49“AUN(APSzz('IzDA’LzA
R(AHBz(ARjABz(ABFAPN)((A(z’LO/S'LPIBzAP(’NzI‘S(/“AUN(/(AL)(AHI/’S//(HAR('B2“A
Why Tunneling is required?
CNjAHB(/APN(A4BRI'(A-–AOL’1(PA)(‘SI)(HAPBAR(AFB)2L)H(HAPN)BSDNALAPSzz('A!A
g e
io led
ic ow
7Bz/IH()ALA/IPSLPIBzA2N(zALA7B))(/OBzH(zPA9BH(A079+A2LzP/APBA/(zHALzA-–AOL’1(PAPBALA4BRI'(A9BH(A049+“A6''APN(A79A
1zB2/ALRBSPAPNI/A49AI/5AIP/A-–ALHH)(//“A
at
Pu ch
UN(A79AI/APBPL''jASzL2L)(ABFAPN(A49>/A'B’LPIBzALzHA/BA/(zH/AIPAL/AS/SL'APBA49>/A-–ALHH)(//“A
UN(AIzP()z(P5A)BSP(/APNI/AOL’1(PAPBAPN(A=B?(A)BSP()ABFAPN(A49AL'/BA’L''(HAL/A=B?(A6D(zPA0=6+“A
Te
UN(A=6AzB2A1zB2IzDAPNLPAPN(A49AI/AzBPAIzAIP/ANB?(Az(P2B)1A(z’LO/S'LP(/ALzHAPSzz('/APN(AOL’1(PAPBAPN(A7G6“A
UN(A7L)(aBFaLHH)(//A07G6+AH(FIz(/APN(A’S))(zPA'B’LPIBzABFAPN(A49AF)B?ALzA-–AOBIzPABFA3I(2“A
;Iz’(AIzP()z(PA)BSP(/AL)(A’)(LP(HARL/(HABzAPN(AN(LH()A’BzP(zP/ABFALzA-–AOL’1(P5APBA)BSP(AIPAF)B?A=6APBA7G65A2(Az((HALA
z(2AN(LH()AFB)APN(AOL’1(PAPBAR(AP)Lz/?IPP(H“A
UN(Az(2AN(LH()ABzAPBOABFAPN(AB)IDIzL'AN(LH()AI/A?LH(A0QID“AY“Y“Xd+“A9B2APNI/A2I''A(zLR'(AS/APBA/(PALAz(2AHI)(’PA)BSP(A
A0LAPSzz('+APBAPN(A49AF)B?APN(A=6AL/AIPAI/A)BL?IzD“A
UNS/APSzz(''IzDAI/APN(AO)B’(//ABFA’)(LPIzDALAPSzz('ARjAPN(A=6APBAPN(A7G6APBA)BSP(AOL’1(P/APBAPN(A4BRI'(A9BH(AL/AIPA
)BL?/“A-PA(/PLR'I/N(/ALAOIO(A0LAHLPLA/P)(L?AR(P2((zAP2BA’Bzz(’P(HA(zH/+A2N()(IzAPN(AHLPLAI/AIz/()P(HALzHA?B3(/AIzAQ-QGA
B)H()“
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-17 Mobile Networking
-–aIza-–A(z’LO/S'LPIBzAI/AH(FIz(HAIzAXQ7AWddY“A-PAI/APN(A/I?O'(/PALOO)BL’NALzHA?S/PAL'2Lj/AR(A/SOOB)P(H“AA
-zAPNI/APjO(ABFA(z’LO/S'LPIBz5APN(A(zPI)(A-–AHLPLD)L?A/(zPARjAPN(AIzP()z(PANB/PAI/AIz/()P(HAIzALAz(2A-–AHLPLD)L?AL/APN(A
OLj'BLH“AA
6/A/NB2zAIzAPN(AQID“AY“Y“XXAAPN(A=6A(z’LO/S'LP(/APN(A)(’(I3(HA-–AHLPLD)L?A2IPNIzALzBPN()A-–AHLPLD)L?“A
g e
io led
ic ow
n
Fig. 3.3.11 : IP-in-IP encapsulation
bl kn
A UN(A3L)IBS/AFI('H/AIzAPN(ABSP()AN(LH()AL)(A[A
at
Pu ch
89x /v59xhYv53U4f6xVAk()/IBzAFI('HAH(zBP(/APN(A3()/IBzAzS?R()ALzHA/(PAPBA^AFB)A-–3^“A
G9x kOMxhkfLv5fvLxPvKyv5xHvfDLP6xVx-=*AIzHI’LP(/APN(A'(zDPNABFAPN(ABSP()AN(LH()“A
Te
I9x WBxh#TB6xVA-PAI/AUS/PA’BOI(HAF)B?APN(AIzz()AN(LH()“A
K9x MvfDLPxVA-PAH(zBP(/APN(A’B?O'(P(A'(zDPNABFAPN(A(z’LO/S'LP(HAOL’1(P“A
N9x ##MxhLUEvxL4xHU/v6xVA-PAIzHI’LP(/APN(AO()IBHABFA3L'IHIPjABFAPN(AOL’1(P“AUU*A/NBS'HAR(ANIDNA(zBSDNA/BAPN(AOL’1(PA’LzA)(L’NA
PN(APSzz('A(zHOBIzP“A
Q9x kOUUfUkOxVxUNI/AH(zBP(/APN(APjO(ABFAO)BPB’B'AS/(HAIzAPN(A-–AOLj'BLH“A
R9x kOxNPvNS3gExVAUNI/AI/AS/(HAFB)A())B)AH(P(’PIBzA?(’NLzI/?“AA
A UN(AFI('H/ABFAIzz()AN(LH()AL)(AL'?B/PA/L?(AL/APN(ABSP()AN(LH()APN(ABz'jAHIFF()(z’(/AL)(A[A
UN(ALHH)(//AFI('H/A’Bz/I/PABFAPN(ALHH)(//ABFAPN(AB)IDIzL'A/(zH()ALzHA)(’(I3()“A
UN(A UU*A 3L'S(A BFA PN(A Izz()A N(LH()A I/A H(’)(?(zP(HA RjA X“A UNI/A ?(Lz/A PNLPA PN(A 2NB'(A PSzz('A ’Bz/IH()(HA LA /IzD'(A NBOA
F)B?APN(AB)IDIzL'AOL’1(P>/AOBIzPABFA3I(2“A
A UN(AU7–8\V–AOLj'BLHA’BzPLIz/APN(AL’PSL'AS/()AHLPLAPBAR(AP)Lz/?IPP(H“A
2y/KfLKDvx
A -PAI/A/I?O'(APBAI?O'(?(zPALzHAIPAI/ALAH(FLS'PA(z’LO/S'LPIBzA?(’NLzI/?“A
WU3Ky/KfLKDvx
A 4B/PABFAPN(ABSP()AN(LH()AFI('H/AL)(A/L?(AL/AIzz()AN(LH()A/BAPNI/A?(PNBHAIz’)(L/(/A)(HSzHLz’j“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-18 Mobile Networking
Q. Explain minimal encapsulation. Also discuss merits and demerits. (May 12, 5 Marks)
Q. Explain minimal techniques of encapsulation of Mobile IP packet. (May 15, May 17, 5 Marks)
g e
io led
ic ow
n
bl kn
L''ALD)((APBAS/(“AQID“AY“Y“XWA/NB2/APN(A?IzI?L'A(z’LO/S'LPIBz“AA
UN(ABSP()AN(LH()AFI('H/AL)(AL'?B/PA/L?(AL/AFB)A-–A(z’LO/S'LPIBziAPN(ABz'jAHIFF()(z’(AI/AIzAPN(A#zJvAFI('H“A-PAI/A/(PAPBA<<“A
Te
UN(AIzz()AN(LH()AI/A?S’NA/?L''()APNLzA-–A(z’LO/S'LPIBzAOL’1(P“AA
UN(ABx7ULAIzHI’LP(/A2N(PN()APN(AB)IDIzL'A/(zH()>/A-–ALHH)(//AI/AIz’'SH(HAIzAPN(AN(LH()AB)AzBP“AkL'S(AdAIzHI’LP(/A/(zH()>/A
-–ALHH)(//A’LzAR(AB?IPP(H“A
2y/KfLKDvxVx*B2()AB3()N(LHAL/A’B?OL)(HAPBA-–aIza-–A(z’LO/S'LPIBzAL/AIPAL3BIH/A)(HSzHLz’j“x
WU3Ky/KfLKDvxVx-PAHB(/AzBPA/SOOB)PAF)LD?(zPLPIBzAPBAH(L'A2IPNAPSzz('A2IPNA/?L''()AOLPNA?L:I?S?AP)Lz/?I//IBzASzIP/A
04U\+“x
gX”AI/AH(FIz(HAIzAXQ7AX`dX“A
-PAI/ALAD(z()I’A(z’LO/S'LPIBzA?(’NLzI/?AH(3('BO(HAR(FB)(APN(AH(3('BO?(zPABFA?BRI'(A-–“A
gX”AL''B2/APN(A(z’LO/S'LPIBzABFAOL’1(P/ABFABz(AO)BPB’B'A/SIP(AIzPBAPN(AOLj'BLHAOB)PIBzABFALAOL’1(PABFALzBPN()AO)BPB’B'A
/SIP(“AA
QID“AY“Y“XYA/NB2/APN(AD(z()I’A)BSPIzDA(z’LO/S'LPIBz“AUN(AgX”AN(LH()AI/AO)(O(zH(HAPBAPN(AOL’1(PABFABz(AO)BPB’B'A/SIP(A
2IPNAPN(AB)IDIzL'AN(LH()ALzHAHLPL“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-19 Mobile Networking
e
K9x Zx7ULxVx-FAIPAI/A/(P5AIzHI’LP(/APN(A1(jAFI('HAI/AO)(/(zPALzHA?LjAR(AS/(HAFB)ALSPN(zPI’LPIBz“x
g
N9x Bx7ULxVx-FA/(P5AIzHI’LP(/APNLPAPN(A/(‘S(z’(AzS?R()AFI('HAI/AO)(/(zP“x
Q9x 3x7ULxVx-FA/(P5AIzHI’LP(/APNLPAPN(A/P)I’PA/BS)’(A)BSPIzDAI/AS/(H“Ax
io led
R9x 5vN9xh5vNg53U4fxN4fL54H6xVx-PA)(O)(/(zP/ALA’BSzP()APNLPA/NB2/APN(AzS?R()ABFAL''B2(HA)(’S)/I3(A(z’LO/S'LPIBz/“AA
ic ow
n
bl kn
at
Pu ch
Te
[9x 5v/9xh5v3v5/vy6xVxUNI/AFI('HAI/A)(/()3(HAFB)AFSPS)(AS/(HALzHA?S/PAR(A/(PAPBAd“x
\9x /v59xh/v53U4f6xVx-PAI/A/(PAPBA]xFB)APN(AgX”A3()/IBz“x
8]9x O54L4N4HxVx-zHI’LP(/APN(AO)BPB’B'AS/(HARjAPN(AOL’1(PAFB''B2IzDAPN(AgX”AN(LH()“x
889x pPvNS3gExVx7BzPLIz/ALA3L'IHA-–A’N(’1/S?ABFAPN(AgX”AN(LH()ALzHAPN(AOLj'BLHA0O)(/(zPABz'jA2N(zA7ARIPAI/A/(P+“x
8G9x TLL3vLxVx-PA)(O)(/(zP/APN(ABFF/(PAIzARjP(/AFB)APN(AFI)/PA/BS)’(A)BSPIzDA(zP)jA0O)(/(zPABz'jA2N(zAXARIPAI/A/(P+“x
8I9x ZvzxVx7BzPLIz/ALA1(jAPNLPA’LzAR(AS/(HAFB)ALSPN(zPI’LPIBzA0O)(/(zPABz'jA2N(zAlARIPAI/A/(P+“x
8K9x -4gLUfDxVx-PAI/ALA3L)ILR'(A'(zDPNAFI('HALzHA’BzPLIz/APN(AFI('H/AFB)A/BS)’(A)BSPIzD“Ax
Advantage
gX”A/SOOB)P/ABPN()Az(P2B)1A'Lj()AO)BPB’B'/AIzALHHIPIBzAPBA-–“A
-PAL''B2/A?B)(APNLzABz(A'(3('ABFA(z’LO/S'LPIBz“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-20 Mobile Networking
3.3.5(d) Optimization
.MU – May 18.
Q. What is triangular routing problem? How do you optimize mobile IP for avoiding triangular routing ?
Q. Why and how can optimization in Mobile IP be achieved. (May 18, 5 Marks)
Triangular routing
6/AHI/’S//(HAIzA/(’PIBzAY“Y“W5APN(A-–AOL’1(PAF)B?ALA79AH(/PIz(HAPBALzA49Az((H/APBAR(A)BSP(HAPBAIP/A=6AFI)/PALzHAPN(zA
PSzz('(HAPBAPN(AFB)(IDzALD(zPABFAPN(A49ALzHA-–AOL’1(PAF)B?APN(A49A’LzAR(AHI)(’P'jA)BSP(HAPBAPN(A79“AA
-FA PN(A 79A LzHA 49A L)(A 3()jA z(L)5A PN(zA L'/BA PN(A -–A OL’1(PA NL/A PBA P)L3('A LA 'BzDA 2LjA PBA )(L’NA PN(A 49“A UNI/A Iz(FFI’I(zPA
R(NL3IB)ABFALAzBzABOPI?IV(HA?BRI'(A-–AI/A’L''(HA2)*1$"3/1)&4.3%*$"“AA
UN(AP)ILzD'(AI/A?LH(ABFAPN(APN)((A/(D?(zP/5A79APBA=65A=6APBA7G68495ALzHA49ARL’1APBA79“A0X(F()AQID“AY“Y“X<+A
g e
io led
ic ow
n
bl kn
at
Pu ch
UN(AQID“AY“Y“X_A(:O'LIz/APN(AFBS)A?(//LD(/APBD(PN()A2IPNAPN(A’L/(ABFALzA49A’NLzDIzDAIP/AQ6ALzHA/NB2/APN(A(:’NLzD(ABFA
?(//LD(/AIzABOPI?IVLPIBzAO)BPB’B'“A
g e
io led
Fig. 3.3.16 : Optimized mobile IP working
UN(A79A)(‘S(/P/APN(A’S))(zPA'B’LPIBzABFA49AF)B?APN(A=6“A
ic ow
=6A)(PS)z/APN(A7G6ABFAPN(A49A3ILASOHLP(A?(//LD(“A
n
79AL’1zB2'(HD(APNI/ASOHLP(HA?(//LD(ALzHA/PB)(/A?BRI'IPjARIzHIzD“A
bl kn
9B2A79A’LzA/(zHAHLPLAHI)(’P'jAPBAPN(A’S))(zPAFB)(IDzALD(zPAQ6!"#“AQ6!"#AzB2AFB)2L)H/APN(/(AHLPLAPBA49“A
UN(A49A?IDNPAzB2A’NLzD(AIP/A'B’LPIBzALzHA)(DI/P()A2IPNALAz(2AFB)(IDzALD(zPAQ6$%&“A
at
Pu ch
Q6$%&AIzFB)?/AQ6!"#ALRBSPAz(2A)(DI/P)LPIBzABFA49A3ILALzASOHLP(A?(//LD(ALzHAQ6!"#'L’1zB2'(HD(HAPNI/ASOHLP(A?(//LD(“AA
79AHB(/z>PA1zB2ALRBSPAPN(A’S))(zPA'B’LPIBzABFA495AIPA/PI''APSzz('/AIP/AOL’1(P/AFB)A49APBAPN(AB'HAFB)(IDzALD(zPAQ6!"#“A
Te
UN(AQ6!"#AzBPI’(/AOL’1(P/AH(/PIz(HAPBA49ARSPAL'/BA1zB2/A49A’S))(zP'jAzBPAIzA’S))(zPAQ6“A
Q6!"#A?IDNPAzB2AFB)2L)HAPN(/(AOL’1(P/APBAPN(Az(2A7G6ABFA49A2NI’NAI/Az(2AFB)(IDzALD(zP“A
UNS/APN(AOL’1(P/APNLPAL)(AIzAP)Lz/IPAL)(AzBPA'B/P“AUNI/AR(NL3IB)AI/ALzBPN()ABOPI?IVLPIBzAPBARL/I’A?BRI'(A-–ALzHAO)B3IH(/A
/?BBPNANLzHB3()“A
Q6!"#A/(zH/ARIzHIzDA2L)zIzDA?(//LD(APBA79“A79APN(zA)(‘S(/P/ALARIzHIzDASOHLP(“A
UN(A=6A/(zH/ALzASOHLP(APBAIzFB)?APN(A79ALRBSPAPN(Az(2A'B’LPIBz5A2NI’NAI/AL’1zB2'(HD(H“A9B25A79A’LzA/(zHAHLPLA
HI)(’P'jAPBAQ6$%&5ALzHAL3BIHAP)ILzDS'L)ARIzHIzD“A
=B2(3()5APN(ABOPI?IVLPIBzA2I''AzBPA2B)1AIFAPN(A49AHB(/AzBPA2LzPAPBA)(3(L'AIP/A’S))(zPA'B’LPIBzAPBAPN(A79AR(’LS/(ABFA
/(’S)IPj“A
g e
Fig. 3.3.17 : Reverse tunneling
io led
A X(3()/(APSzz('IzDAI/AS/(HAIzAFB''B2IzDA/’(zL)IB“A
1. Ingress Filtering/Firewalls
ic ow
-FA PN(A z(P2B)1A 2N()(A ?BRI'(A zBH(A 'B’LP(HA NL/A I?O'(?(zP(HA ’()PLIzA /(’S)IPjA ?(L/S)(/A PNLPA O)BNIRIP/A PN(A zBH(A
F)B?A/(zHIzDAOL’1(P/AS/IzDAIP/AzB)?L'A-–ALHH)(//“A
n
CIPNALA)(3()/(APSzz('APN(AOL’1(PAI/AFI)/PA(z’LO/S'LP(HARjAQ6ALzHA/(zPAPBAPN(A=6“A
bl kn
2. Multi-cast
at
Pu ch
A X(3()/(APSzz('IzDAI/A)(‘SI)(HAFB)A?S'PI’L/PIzDA2N()(APN(AzBH(/AIzA?S'PI’L/PAD)BSOAL)(AIzAPN(ANB?(Az(P2B)15AL/ALzA49A
IzALAFB)(IDzAz(P2B)1A’LzzBPAP)Lz/?IPA?S'PI’L/PAOL’1(P/AHI)(’P'jAIzAPNI/A’L/(5AL/APN(AFB)(IDzAz(P2B)1A?IDNPAzBPAO)B3IH(A
PN(AP(’NzI’L'AIzF)L/P)S’PS)(AFB)A?S'PI’L/PA’B??SzI’LPIBz“A
Te
1. Frequent Mobility
A 4BRI'(A-–A2L/AH(/IDz(HAPBANLzH'(A?BRI'IPjABFAH(3I’(/5ARSPABz'jA)('LPI3('jAIzF)(‘S(zPA?BRI'IPj“AUNI/AI/AHS(APBAPN(A2B)1A
Iz3B'3(HA2IPNA(L’NA’NLzD(“AUNI/AB3()N(LHAI/zZPALARIDAH(L'A2N(zAjBSA?B3(ALA’B?OSP()ABz’(ALA2((15ALAHLjAB)A(3(zALzA
NBS)“A -PA ’LzA R(A LzA I//S(A FB)A Y)(L'aPI?(ZA ?BRI'IPjA /S’NA L/A )BL?IzDA IzA LA 2I)('(//A z(P2B)15A 2N()(A NLzHaBFFA FSz’PIBz/A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-23 Mobile Networking
BO()LPIzDALPAPN(AHLPLA'Iz1A'Lj()A?LjAR(A?B)(A/SIPLR'(“A4BRI'(A-–A2L/AH(/IDz(HASzH()APN(A/O(’IFI’AL//S?OPIBzAPNLPAPN(A
LPPL’N?(zPAOBIzPA2BS'HAzBPA’NLzD(A?B)(APNLzABz’(AO()A/(’BzH“A
2. Issue with DHCP
A 4BRI'(A-–AI/AIzP(zH(HAPBAR(AS/(HA2IPNAH(3I’(/APNLPA?LIzPLIzALA/PLPI’A-–A’BzFIDS)LPIBz“A;Iz’(APN(AH(3I’(Az((H/APBAR(ALR'(A
PBAL'2Lj/A1zB2APN(AIH(zPIPjABFAIP/ANB?(Az(P2B)1ALzHAzB)?L'A-–ALHH)(//5AIPAI/A?S’NA?B)(AHIFFI’S'PAPBAS/(AIPA2IPNALAH(3I’(A
PNLPABRPLIz/ALzA-–ALHH)(//AHjzL?I’L''j5AS/IzDA/B?(PNIzDA'I1(AV=7–“A
3. Security Issue
A QI)(2L''/5A’LS/(/AHIFFI’S'PjAFB)A?BRI'(A-–AR(’LS/(APN(jAR'B’1AL''A’'L//(/ABFAIz’B?IzDAOL’1(P/APNLPAHBAzBPA?((PA/O(’IFI(HA
’)IP()IL“A ”zP()O)I/(A FI)(2L''/A L)(A PjOI’L''jA ’BzFIDS)(HA PBA R'B’1A OL’1(P/A F)B?A (zP()IzDA 3ILA PN(A IzP()z(P“A -zA ?LzjA ’L/(/A
LSPN(zPI’LPIBzA2IPNAQ6AI/AO)BR'(?LPI’AL/APN(AQ6APjOI’L''jAR('BzD/APBALzBPN()AB)DLzIVLPIBzAB)Az(P2B)1“A
4. QoS Issue
e
UN(A mB;A /B'SPIBzA FB)A ?BRI'(A -–A /NBS'HA /LPI/FjA )(‘SI)(?(zP/A /S’NA L/A /’L'LRI'IPj5A ’Bz/()3LPIBzA BFA 2I)('(//A
g
RLzH2IHPN5A'B2AO)B’(//IzDAB3()N(LH5ALSPNB)IVLPIBzALzHAL’’BSzPIzDA(P’“AA
io led
CN(zANLzHB3()AB’’S)/AIzA?BRI'(A-–A(z3I)Bz?(zP5A/B?(ALOO'I’LPIBz/A/S’NAL/A2(RAR)B2/()ALzHAFI'(AP)Lz/F()AS/IzDA
U7–A’Bzz(’PIBzA2I''AFL’(AHI/’Bzz(’PIBzAB)ALAH(D)LHLPIBzABFAPN(AO()FB)?Lz’(“AAA
6zBPN()AO)BR'(?AI/A2IPNAPN(APSzz('ARL/(HA’B??SzI’LPIBz“A-zAPSzz('ARL/(HA’B??SzI’LPIBz/AHIFF()(zPAHLPLAF'B2/A
ic ow
LHH)(//(HAPBAPN(A/L?(A-–ALHH)(//AL)(AP)(LP(HAIzAPN(A/L?(A?Lzz()“AUNS/APSzz('IzDA?L1(/AIPANL)HAPBADI3(ALAF'B2ABFA
OL’1(P/ALA/O(’IL'AP)(LP?(zPAz((H(HAFB)AmB;“A
n
bl kn
Pu ch
kJ/Kx VA UN(A z(P2B)1A 'Lj()A O)BPB’B'A IzA PN(A U7–8-–A O)BPB’B'A /SIP(A I/A ’S))(zP'jA -–3^“A -–3^A O)B3IH(/A PN(A NB/PaPBaNB/PA
’B??SzI’LPIBzA R(P2((zA /j/P(?/A IzA PN(A -zP()z(P“A -–3^A NL/A /B?(A H(FI’I(z’I(/A PNLPA ?L1(A IPA Sz/SIPLR'(A FB)A PN(A FL/PA
Te
D)B2IzDA-zP()z(P5AIz’'SHIzDAPN(AFB''B2IzD[A
o V(/OIP(AL''A/NB)PAP()?A/B'SPIBz/5A/S’NAL/A/SRz(PPIzD5A’'L//'(//ALHH)(//IzD5ALzHA96U5ALHH)(//AH(O'(PIBzAI/A/PI''ALA'BzDA
P()?AO)BR'(?AIzA-zP()z(P“A
o UN(A -zP()z(PA ?S/PA L’’B??BHLP(A )(L'A PI?(A LSHIBA LzHA 3IH(BA P)Lz/?I//IBz“A UNI/A PjO(A BFA P)Lz/?I//IBzA )(‘SI)(/A
?IzI?S?AH('LjA/P)LP(DI(/ALzHA)(/()3LPIBzABFA)(/BS)’(/AzBPAO)B3IH(HARjA-–3^AH(/IDz“A
o UN(A-zP()z(PA?S/PAL’’B??BHLP(A(z’)jOPIBzALzHALSPN(zPI’LPIBzABFAHLPLAFB)A/B?(ALOO'I’LPIBz/“A9BA(z’)jOPIBzAB)A
LSPN(zPI’LPIBzAI/AO)B3IH(HARjA-–3^“A
kJ/Qx Vx UBA B3()’B?(A PN(/(A O)BR'(?/5A -–3_A L'/BA 1zB2zA L/A -–zDA 0-zP()z(PA –)BPB’B'A z(:PA D(z()LPIBz+A 2L/A O)BOB/(H“A -zA
-–3_5APN(A-zP()z(PAO)BPB’B'A2L/A(:P(z/I3('jA?BHIFI(HAPBAL’’B??BHLP(APN(AD)B2PNALzHAz(2AH(?LzH/ABFAPN(A-zP()z(P“AA
o UN(AFB)?LPALzHAPN(A'(zDPNABFAPN(A-–ALHH)(//(/A2()(A’NLzD(HAL'BzDA2IPNAPN(AOL’1(PAFB)?LPA
o X('LP(HAO)BPB’B'/A/S’NAL/A-74–A2()(AL'/BA?BHIFI(H“AA
o GPN()A O)BPB’B'/A IzA PN(A z(P2B)1A 'Lj()5A /S’NA L/A 6X–5A X6X–5A -g4–A 2()(A (IPN()A H('(P(HA B)A Iz’'SH(HA IzA -74–3_A
O)BPB’B'“AXBSPIzDAO)BPB’B'/A/S’NAL/AX-–ALzHAG;–QA2()(A/'IDNP'jA?BHIFI(HAPBAL’’B??BHLP(APN(/(A’NLzD(/“A
UN(AFL/PA/O)(LHIzDAS/(ABFA-zP()z(PALzHAz(2A/()3I’(/A/S’NAL/A?BRI'(A-–5A-–AP('(ONBzj5ALzHA-–a’LOLR'(A?BRI'(AP('(ONBzj5A
?LjA)(‘SI)(APN(APBPL'A)(O'L’(?(zPABFA-–3^ARjA-–3_“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-24 Mobile Networking
Advantages of IPv6
*L)D()ALHH)(//A/OL’(a6zA-–3_ALHH)(//AI/AXWjARIPA'BzD“A7B?OL)(HA2IPNAPN(AYWARIPA'BzDA-–3^ALHH)(//5APNI/AI/ANSD(AIz’)(L/(A
IzALHH)(//A/OL’(“A
K(PP()A =(LH()A FB)?LPa-–3_A S/(/A LA z(2A N(LH()A FB)?LPA IzA 2NI’NA BOPIBz/A L)(A /(OL)LP(HA F)B?A PN(A RL/(A N(LH()A LzHA
Iz/()P(HA2N(zAz((H(H5AR(P2((zAPN(ARL/(AN(LH()ALzHAPN(ASOO()A'Lj()AHLPL“AUNI/A/I?O'IFI(/ALzHA/O((H/ASOAPN(A)BSPIzDA
O)B’(//AR(’LS/(A?B/PABFAPN(ABOPIBz/AHBAzBPAz((HAPBAR(A’N(’1(HARjA)BSP()/“A
9(2AGOPIBz/a-–3_ANL/Az(2ABOPIBz/APBAL''B2AFB)ALHHIPIBzL'AFSz’PIBzL'IPI(/“A
6''B2Lz’(A FB)A (:P(z/IBza-–3_A I/A H(/IDz(HA PBA L''B2A PN(A (:P(z/IBzA BFA O)BPB’B'A IFA )(‘SI)(HA RjA z(2A P(’NzB'BDI(/A B)A
LOO'I’LPIBz/“A
;SOOB)PAFB)A)(/BS)’(AL''B’LPIBza-zA-–3_5APN(A%56#7.87+#)(*0#AFI('HANL/AR((zA)(?B3(H5ARSPA?(’NLzI/?A’L''(HA9/.:&/1;#/&
NL/AR((zALHH(HAPBA(zLR'(APN(A/BS)’(APBA)(‘S(/PA/O(’IL'ANLzH'IzDABFAOL’1(P“AUNI/A?(’NLzI/?A’LzAR(AS/(HAPBA/SOOB)PA
P)LFFI’A/S’NAL/A)(L'aPI?(ALSHIBALzHA3IH(B“A
e
;SOOB)PAFB)A?B)(A/(’S)IPjaUN(A(z’)jOPIBzALzHALSPN(zPI’LPIBzABOPIBz/AIzA-–3_AO)B3IH(A’BzFIH(zPIL'IPjALzHAIzP(D)IPjABFA
g
PN(AOL’1(P“A
Features of Ipv6 to support mobility
io led
9BA/O(’IL'A?(’NLzI/?/AL)(Az((H(HAFB)A/(’S)IzDA?BRI'(A-–A)(DI/P)LPIBz“A-zA(3()jA-O3_AzBH(AKyy5v33xKgL4xN4fLUDg5KLU4fA
I“(“APN(A?(’NLzI/?AFB)AL’‘SI)IzDALA7G6AI/AIzRSI'P“A
ic ow
HvUDP745xyU3N4/v5zA?(’NLzI/?AI/AL'/BA?LzHLPB)jAFB)A(3()jA-O3_AzBH(“A;BA/O(’IL'AFB)(IDzALD(zP/AL)(AzBA'BzD()Az((H(HA
PBALH3()PI/(A/()3I’(/“A
n
bl kn
7B?RIzIzDA PN(A F(LPS)(/A BFA LHH)(//A LSPBA ’BzFIDS)LPIBzA LzHA z(IDNRB)A HI/’B3()jA (zLR'(/A (3()jA -O3_A ?BRI'(A zBH(A PBA
’)(LP(ALzHABRPLIzALAPBOB'BDI’L''jA’B))(’PALHH)(//AB)APN(A’S))(zPAOBIzPABFALPPL’N?(zP“A
at
”3()jA-O3_AzBH(A’LzA/(zHARIzHIzDASOHLP(/APBALzBPN()AzBH(5A/BAPN(A49A’LzA/(zHAIP/A7G6AHI)(’P'jAPBAPN(A79ALzHA=6“AUN(A
Pu ch
Q6AI/AzBA'BzD()Az((H(H“AUN(A79AAAO)B’(//(/APN(ARIzHIzDASOHLP(/ALzHA?L1(/A’B))(/OBzHIzDA(zP)I(/AIzAIP/A)BSPIzDA’L’N(“A
UN(A49AI/AzB2ALR'(APBA[A
Te
o V(’LO/S'LP(/APN(AOL’1(P/A
o UBAH(P(’PA2N(zAIPAz((H/ALAz(2A7G6ALzHA
o UBAH(P()?Iz(A2N(zAPBA/(zHARIzHIzDASOHLP(/APBAPN(A=6ALzHA79A
6A34LLxPKfy4/v5xI/AOB//IR'(A2IPNA-O3_“AUN(A49A/(zH/AIP/Az(2A7G6APBAPN(AB'HA)BSP()A/()3IzDAPN(A49ALPAPN(AB'HA7G65ALzHA
PN(AB'HA)BSP()A’LzA(z’LO/S'LP(AL''AIz’B?IzDAOL’1(P/AFB)APN(A49ALzHAFB)2L)H/APN(?APBAz(2A7G6“A
3.4 Routing
XBSPIzDA IzA 2I)('(//A LHaNB’A z(P2B)1/A I/A HIFF()(zPA LzHA ’B?O'I’LP(HA PNLzA 2I)(HA z(P2B)1/A B)A 2I)('(//A z(P2B)1/A 2IPNA
IzF)L/P)S’PS)(“AUNI/AHIFF()(z’(A’LzAR(A(:O'LIz(HARjA(:L?O'(A/NB2zAIzAQID“AY“^“X“A
QID“AY“^“XA/NB2/APN(Az(P2B)1APBOB'BDjALPAP2BAHIFF()(zPAPI?(AP(ALzHAP)*AA
;(3(zAzBH(/AL)(A’Bzz(’P(HAH(O(zHIzDASOBzAPN(A’S))(zPAP)Lz/?I//IBzA’NL)L’P()I/PI’/AR(P2((zAPN(?“AA
6PAPI?(AP!AzBH(A9^A’LzA)(’(I3(A9XAB3()ALADBBHA'Iz15ARSPA9XA)(’(I3(/A9^A3ILALA2(L1A'Iz1“A*Iz1/A?LjAzBPANL3(APN(A/L?(A
’NL)L’P()I/PI’/AIzARBPNAHI)(’PIBz/“AA
UN(A /IPSLPIBzA ?LjA ’NLzD(A LPA PI?(A P)A 9XA ’LzzBPA )(’(I3(A 9^A LzjA 'BzD()5A 9^A ’LzA )(’(I3(A 9XA 3ILA LA 2(L1A 'Iz1“A 9(P2B)1A
PBOB'BDjAI/AF)(‘S(zP'jA’NLzD(HAIzALHaNB’Az(P2B)1/“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-25 Mobile Networking
e
A UN(A?LIzAHIFF()(z’(AR(P2((zALHaNB’ALzHA2I)(HAz(P2B)1/AHS(APBAPNI/A)BSPIzDAIzALHaNB’Az(P2B)1/AL)(AHIFF()(zPAL)(AL/A
FB''B2/A[A
g
1. Asymmetric links
io led
*Iz1/AL)(AzBPA/j??(P)I’AIzARBPNAHI)(’PIBz/AL/A2(ANL3(A/((z“A9BH(A9WA’LzA)(’(I3(A9XARSPA9XA’LzzBPA)(’(I3(A/IDzL'/A
F)B?A9W“AA
ic ow
UNS/A)BSPIzDAIzFB)?LPIBzA’B''(’P(HAFB)ABz(AHI)(’PIBzAI/AzBPAS/(FS'AFB)ABPN()AHI)(’PIBz“A
=B2(3()A?LzjA)BSPIzDAL'DB)IPN?/AFB)A2I)(HAz(P2B)1/A)('jABzALA/j??(P)I’A/’(zL)IB“A
n
2. Redundant links
bl kn
CI)(HAz(P2B)1ANL3(A)(HSzHLzPA'Iz1APBA/S)3I3(A'Iz1AFLI'S)(5ARSPAPNI/A)(HSzHLz’jAI/A'I?IP(H“A
at
Pu ch
-zALHaNB’Az(P2B)1/APN()(A?IDNPAR(A?LzjA)(HSzHLzPA'Iz1/ASOAPBANIDNA’B?O'(:IPj“A
XBSPIzDA L'DB)IPN?/A IzA 2I)(HA z(P2B)1A ’LzA NLzH'(A SOA PBA /B?(A )(HSzHLz’j5A RSPA LA 'L)D(A )(HSzHLz’jA ’LzA ’LS/(A LA
Te
'L)D(A’B?OSPLPIBzL'AB3()N(LHAFB)A)BSPIzDAPLR'(ASOHLP(/“A
3. Interference
-zA LHaNB’A z(P2B)1/A 'Iz1/A ’B?(/A LzHA DBA H(O(zHIzDA BzA PN(A P)Lz/?I//IBzA ’NL)L’P()I/PI’/5A Bz(A P)Lz/?I//IBzA ?LjA
IzP()F()(A2IPNABPN()5ALzHAzBH(/A?IDNPAB3()N(L)APN(AP)Lz/?I//IBz/ABFABPN()AzBH(/“AA
-zP()F()(z’(A’NLz’(/AIzA2I)('(//ALHaNB’Az(P2B)1/AL)(A3()jANIDN“A
4. Dynamic topology
UNI/AI/APN(AD)(LP(/PAO)BR'(?AIzA)BSPIzDAFB)ALHaNB’Az(P2B)1/“A
4BRI'(A zBH(/A ?B3(/A B)A ?(HIS?A ’NL)L’P()I/PI’/A ?IDNPA ’NLzD(A F)(‘S(zP'j“A UNI/A )(/S'P/A F)(‘S(zPA ’NLzD(/A IzA
PBOB'BDjA L/A /NB2zA IzA QID“A Y“^“XA 0LPA PI?(hP)+“A VS(A PBA ’NLzD(A IzA PBOB'BDj5A IzA LHaNB’A z(P2B)1/A PN(A )BSPIzDA PLR'(/A
NL3(APBAR(ASOHLP(HAF)(‘S(zP'j“A
#Pv5vxK5vx7K3UNKHHzxL,4xNHK33v3x4LxLHKLx54gLUfDxKHD45ULPE3xVx
1. Table-Driven routing protocols (Proactive)
UN(/(AO)BPB’B'/AL)(AL'/BA’L''(HAL/AO)BL’PI3(AO)BPB’B'/A/Iz’(APN(jA?LIzPLIzAPN(A)BSPIzDAIzFB)?LPIBzA(3(zAR(FB)(AIPA
I/Az((H(H“AA
”L’NALzHA(3()jAzBH(AIzAPN(Az(P2B)1A?LIzPLIz/A)BSPIzDAIzFB)?LPIBzAPBA(3()jABPN()AzBH(AIzAPN(Az(P2B)1“AXBSP(/A
IzFB)?LPIBzAI/AD(z()L''jA1(OPAIzAPN(A)BSPIzDAPLR'(/ALzHAI/AO()IBHI’L''jASOHLP(HAL/APN(Az(P2B)1APBOB'BDjA’NLzD(/“AA
4LzjABFAPN(/(A)BSPIzDAO)BPB’B'/A’B?(AF)B?APN(A'Iz1a/PLP(A)BSPIzD“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-26 Mobile Networking
e
more bandwidth.
g
Possibly inefficient (due to unnecessary signaling message overhead)
io led
Redundant routes may exist
Some computed routes may not be needed
2. On Demand routing protocols (Reactive)
ic ow
These protocols are also called reactive protocols since they don’t maintain routing information or routing activity at
n
the network nodes if there is no communication.
bl kn
If a node wants to send a packet to another node then this protocol searches for the route in an on-demand manner
and establishes the connection in order to transmit and receive the packets.
at
Pu ch
The route discovery usually occurs by flooding the route request packets throughout the network.
Examples of Reactive routing protocols
Te
=B2(3()5APN(A'B’L'AIzFB)?LPIBzA?LjAR(AB'HALzHAIz3L'IH“AUNI/AI/AR(’LS/(A’NLzD(/ALPABz(AzBH(AIzAPN(Az(P2B)1AO)BOLDLP(A
/'B2'jA PN)BSDNA PN(A z(P2B)1A 0/P(OaRja/P(OA 2IPNA (3()jA (:’NLzD(+“A UNS/A PN(A 'B’L'A IzFB)?LPIBzA ?LjA zBPA R(A SOHLP(HA
O)B?OP'j“A
UNI/ADI3(/A)I/(APBA'BBO/“A6A?(//LD(A?LjA'BBOAL)BSzHALA’j’'(AFB)ALA'BzDAPI?(A0’BSzPaPBaIzFIzIPjAO)BR'(?+“AA
;B'SPIBz/AS/(HAFB)APNI/AO)BR'(?AIzA2I)(HAz(P2B)1/A/S’NAL/AOBI/Bz(HA)(3()/(ALzHA/O'IPANB)IVBzAHBAzBPA2B)1AIzA’L/(ABFA
LHaNB’Az(P2B)1/AHS(APBAPN(A)LOIH'jA’NLzDIzDAPBOB'BDj“A
DSDV now adds two things to the distance vector algorithm.
1. Sequence numbers
”L’NAzBH(ALH3()PI/(A)BSPIzDAPLR'(A2IPNALA/(‘S(z’(AzS?R()“A
UNI/A /(‘S(z’(A zS?R()A S/(HA PBA HI/PIzDSI/NA /PL'(A )BSP(A 2IPNA PN(A F)(/NA )BSP(A LzHA N('OA PN(A zBH(/A PBA O)B’(//A
LH3()PI/(?(zP/AIzA’B))(’PAB)H()APNS/AL3BIH/A'BBO/APNLPAL)(A'I1('jAIzAHI/PLz’(A3(’PB)“A
2. Damping
e
-PAO)(3(zP/AP(?OB)L)jA’NLzD(AIzAPN(Az(P2B)1APBOB'BDjAF)B?AH(/PLRI'IV(APN(A)BSPIzD“AUN(/(A’NLzD(/AL)(ABFA/NB)PA
g
HS)LPIBzABz'j“A
io led
CN(zA LA zBH(A )(’(I3(/A LzA LH3()PI/(?(zPA ’BzPLIzIzDA LA ’NLzD(A IzA PN(A ’S))(zPA z(P2B)1A PBOB'BDj5A IPA 2LIP/A FB)A LA
’()PLIzAPI?(AR(FB)(AFB)2L)HIzDAPN(ASOHLP(/AIzA)BSPIzDAPLR'(APBABPN()AzBH(/“A
ic ow
CLIPIzDAPI?(AH(O(zH/ABzAPN(API?(AIzP()3L'AR(P2((zAPN(AFI)/PALzHAPN(AR(/PALzzBSz’(?(zPABFALAOLPNAPBALA’()PLIzA
H(/PIzLPIBz“A
n
DSDV algorithm
bl kn
”L’NAzBH(A?LIzPLIz/ALA)BSPIzDAPLR'(A2NI’NA/PB)(/A
o
at
9(:PANBOALzHA’B/PA?(P)I’APB2L)H/A(L’NAH(/PIzLPIBz“A
Pu ch
o 6'/BALA/(‘S(z’(AzS?R()APNLPAI/A’)(LP(HARjAPN(AH(/PIzLPIBzAIP/('F“A
-zA V;VkA (L’NA zBH(A O()IBHI’L''jA FB)2L)H/A IP/A B2zA )BSPIzDA PLR'(A PBA IP/A z(IDNRB)/“A 6zHA (L’NA zBH(A Iz’)(?(zP/A LzHA
Te
LOO(zH/AIP/A/(‘S(z’(AzS?R()A2N(zA/(zHIzDAIP/A'B’L'A)BSPIzDAPLR'(“A
”L’NA)BSP(AI/APLDD(HA2IPNALA/(‘S(z’(AzS?R()5APN(A)BSP(/A2IPNAD)(LP()A/(‘S(z’(AzS?R()/AL)(AO)(F())(H“A
”L’NAzBH(ALH3()PI/(/ALA?BzBPBzI’L''jAIz’)(L/IzDA(3(zA/(‘S(z’(AzS?R()AFB)AIP/('F“A
CN(zA LA zBH(A FIzH/A PNLPA LA )BSP(A I/A R)B1(z5A IPA Iz’)(?(zP/A PN(A /(‘S(z’(A zS?R()A BFA PN(A )BSP(A LzHA LH3()PI/(/A IPA 2IPNA
IzFIzIP(A?(P)I’“AUNS/AIzFIzIP(A?(P)I’AIzHI’LP(/APN(A)BSP(AI/AR)B1(z“A
V(/PIzLPIBzALH3()PI/(/Az(2A/(‘S(z’(AzS?R()“A
EFKEJHvxx
*(PA;0n+AR(APN(AH(/PIzLPIBzA/(‘S(z’(AzS?R()AFB)AoAL')(LHjAO)(/(zPAIzAn>/A)BSPIzDAPLR'(“A
9B2A/LjAnA)(’(I3(/AIzFB)?LPIBzALRBSPA)BSP(APBAoA2IPNAPN(AH(/PIzLPIBzA/(‘S(z’(AzS?R()A;0p+AFB)?AzBH(Ap“AUNS/A;0p+AI/A
PN(AH(/PIzLPIBzA/(‘S(z’(AzS?R()A/(zPAF)B?Ap“A
nAzB2A’B?OL)(/A;0n+ALzHA;0p+“A
o -FAA;0n+AqA;0p+5APN(zAnAIDzB)(/APN(A)BSPIzDAIzFB)?LPIBzA)(’(I3(HAF)B?Ap“A
o -FA;0n+AhA;0p+5ALzHA’B/PABFADBIzDAPN)BSDNApAI/A/?L''()APNLzAPN(A)BSP(A1zB2zAPBAn5APN(zAnA/(P/ApAL/APN(Az(:PANBOAPBAo“A
o -FA;0n+ArA;0p+5APN(zAnA/(P/ApAL/APN(Az(:PANBOAPBAo5ALzHA;0n+AI/ASOHLP(HAPBA(‘SL'A;0p+“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-28 Mobile Networking
Advantages of DSDV
V;VkAI/ALzA(FFI’I(zPAO)BPB’B'AFB)A)BSP(AHI/’B3()j“ACN(z(3()ALA)BSP(APBALAz(2AH(/PIzLPIBzAI/A)(‘SI)(H5AIPAL')(LHjA(:I/P/A
LPAPN(A/BS)’(“AA
=(z’(5A'LP(z’jAFB)A)BSP(AHI/’B3()jAI/A3()jA'B2“AA
V;VkAL'/BADSL)LzP((/A'BBOaF)((AOLPN/“A
Disadvantages of DSDV
=B2(3()5AV;VkAz((H/APBA/(zHALA'BPABFA’BzP)B'A?(//LD(/“AUN(/(A?(//LD(/AL)(AI?OB)PLzPAFB)A?LIzPLIzIzDAPN(Az(P2B)1A
PBOB'BDjALPA(L’NAzBH(“AA
UNI/A?LjAD(z()LP(ANIDNA3B'S?(ABFAP)LFFI’AFB)ANIDNaH(z/IPjALzHANIDN'jA?BRI'(Az(P2B)1/“AA
;O(’IL'A’L)(A/NBS'HAR(APL1(zAPBA)(HS’(APN(AzS?R()ABFA’BzP)B'A?(//LD(/“A
e
V;XAI/ALA5vKNLU/vx54gLUfDAO)BPB’B'A2NI’NAI/ALR'(APBA?LzLD(ALA469”U“AA
g
V;XA2L/A/O(’IFI’L''jAH(/IDz(HAFB)AS/(AIzAEgHLUUP4Jx,U5vHv33xKyxP4NxfvL,45S3ABFA?BRI'(AzBH(/“AA
io led
-PAS/(/ALzA4fUyvEKfyxLOO)BL’NAFB)AFIzHIzDA)BSP(/5APNLPAI/5ALA)BSP(AI/A(/PLR'I/N(HABz'jA2N(zAIPAI/A)(‘SI)(HARjALA/BS)’(A
zBH(AFB)AP)Lz/?IPPIzDAHLPLAOL’1(P/“AUNI/ALOO)BL’NA/L3(/APN(ARLzH2IHPNA
ic ow
-PAS/(/AB4g5Nvx54gLUfDAFB)A)BSP(AHI/’B3()jAPNLPAI/APN(A/BS)’(AzBH(AH(P()?Iz(/APN(A2NB'(AOLPNAF)B?APN(A/BS)’(APBAPN(A
H(/PIzLPIBzAzBH(ALzHAH(OB/IP/APN(ALHH)(//(/ABFAPN(AIzP()?(HILP(AzBH(/ABFAPN(A)BSP(AIzAPN(AOL’1(P/“A
n
DSR contains 2 phases
bl kn
X“A XBSP(AVI/’B3()jA0FIzHALAOLPN+A
at
W“A XBSP(A4LIzP(zLz’(A0?LIzPLIzALAOLPN+A
Pu ch
1. Route Discovery
Te
6AzBH(ABz'jAP)I(/APBAHI/’B3()ALA)BSP(APBALAH(/PIzLPIBzAIFAIPANL/APBA/(zHA/B?(PNIzDAPBAPNI/AH(/PIzLPIBzALzHAPN()(AI/AzBA
1zB2zA)BSP(“A
-FAzBH(A6ANL/AIzANI/AXBSP(A7L’N(ALA)BSP(APBAPN(AH(/PIzLPIBzA”5APNI/A)BSP(AI/AI??(HILP('jAS/(H“A-FAzBP5APN(AXBSP(A
VI/’B3()jAO)BPB’B'AI/A/PL)P(HA[A
X“A 9BH(A6A0IzIPILPB)+A/(zH/ALAXBSP(AX(‘S(/PAOL’1(PARjAF'BBHIzDAPN(Az(P2B)1A
W“A -FA zBH(A KA NL/A )(’(zP'jA /((zA LzBPN()A XBSP(A X(‘S(/PA F)B?A PN(A /L?(A PL)D(PA B)A IFA PN(A LHH)(//A BFA zBH(A KA I/A
L')(LHjA'I/P(HAIzAPN(AXBSP(AX(’B)H5AUN(zAzBH(AKAHI/’L)H/APN(A)(‘S(/PsA
Y“A -FA zBH(A KA I/A PN(A PL)D(PA BFA PN(A XBSP(A VI/’B3()j5A IPA )(PS)z/A LA XBSP(A X(O'jA PBA PN(A IzIPILPB)“A UN(A XBSP(A X(O'jA
’BzPLIz/A LA 'I/PA BFA PN(A YR(/PZA OLPNA F)B?A PN(A IzIPILPB)A PBA PN(A PL)D(P“A CN(zA PN(A IzIPILPB)A )(’(I3(/A PNI/A XBSP(A
X(O'j5AIPA’L’N(/APNI/A)BSP(AIzAIP/AXBSP(A7L’N(AFB)AS/(AIzA/(zHIzDA/SR/(‘S(zPAOL’1(P/APBAPNI/AH(/PIzLPIBz“A
^“A GPN()2I/(AzBH(AKAI/z>PAPN(APL)D(PALzHAIPAFB)2L)H/APN(AXBSP(AX(‘S(/PAPBANI/Az(IDNRB)/A0(:’(OPAPBAPN(AIzIPILPB)+“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-29 Mobile Networking
2. Route Maintenance
-zAV;XA(3()jAzBH(AI/A)(/OBz/IR'(AFB)A’BzFI)?IzDAPNLPAPN(Az(:PANBOAIzAPN(A;BS)’(AXBSP(A)(’(I3(/APN(AOL’1(P“A6'/BA(L’NA
OL’1(PAI/ABz'jAFB)2L)H(HABz’(ARjALAzBH(A0NBOaRjaNBOA)BSPIzD+“AA
-FALAOL’1(PA’Lz>PAR(A)(’(I3(HARjALAzBH(5AIPAI/A)(P)Lz/?IPP(HASOAPBA/B?(A?L:I?S?AzS?R()ABFAPI?(/ASzPI'ALA’BzFI)?LPIBzA
I/A )(’(I3(HA F)B?A PN(A z(:PA NBO“A Gz'jA IFA )(P)Lz/?I//IBzA )(/S'P/A PN(zA IzA LA FLI'S)(5A LA XBSP(A ”))B)A ?(//LD(A I/A /(zPA PBA PN(A
IzIPILPB)A PNLPA ’LzA )(?B3(A PNLPA ;BS)’(A XBSP(A F)B?A IP/A XBSP(A 7L’N(“A ;BA PN(A IzIPILPB)A ’LzA ’N(’1A NI/A XBSP(A 7L’N(A FB)A
LzBPN()A)BSP(APBAPN(APL)D(P“AA
-FAPN()(AI/AzBA)BSP(AIzAPN(A’L’N(5ALAXBSP(AX(‘S(/PAOL’1(PAI/AR)BLH’L/P(H“A
e
EFKEJHvxVx
g
X“A -FAzBH(A7AHB(/AzBPA)(’(I3(ALzAL’1zB2'(HD(?(zPAF)B?AzBH(AVALFP()A/B?(AzS?R()ABFA)(‘S(/P/5AIPA)(PS)z/ALAXBSP(A”))B)A
io led
PBAPN(AIzIPILPB)A6“A
W“A 6/A/BBzAL/AzBH(A)(’(I3(/APN(AXBSP(A”))B)A?(//LD(5AIPAH('(P(/APN(AR)B1(za'Iz1a)BSP(AF)B?AIP/A’L’N(“A-FA6ANL/ALzBPN()A
ic ow
)BSP(APBA”5AIPA/(zH/APN(AOL’1(PAI??(HILP('jAS/IzDAPNI/Az(2A)BSP(“A
Y“A GPN()2I/(APN(AIzIPILPB)A6AI/A/PL)PIzDAPN(AXBSP(AVI/’B3()jAO)B’(//ALDLIz“A
n
Optimization to route discovery
bl kn
UBAL3BIHAPBBA?LzjAR)BLH’L/P/5APNLPA’LS/(/AF'BBHIzDABFAPN(Az(P2B)1iA(3()jAzBH(ANL/ALzA’BSzP()ALzHAIPAI/AH(’)(?(zP(HA
at
(L’NAPI?(APN(AOL’1(PAI/AR)BLH’L/P(H“A9BH(/A’LzAH)BOALA)(‘S(/PAIFAPN(A’BSzP()A)(L’N(/AV()B“A
Pu ch
DSR Advantages
Te
XBSP(/A?LIzPLIz(HABz'jAR(P2((zAzBH(/A2NBAz((HAPBA’B??SzI’LP(A
X(HS’(/AB3()N(LHABFA)BSP(A?LIzP(zLz’(A
XBSP(A’L’NIzDA’LzAFS)PN()A)(HS’(A)BSP(AHI/’B3()jAB3()N(LH“A
6A /IzD'(A )BSP(A HI/’B3()jA ?LjA jI('HA ?LzjA )BSP(/A PBA PN(A H(/PIzLPIBz5A HS(A PBA IzP()?(HILP(A zBH(/A )(O'jIzDA F)B?A 'B’L'A
’L’N(/“A
DSR Disadvantages
–L’1(PAN(LH()A/IV(AD)B2/A2IPNA)BSP(A'(zDPNAHS(APBA/BS)’(A)BSPIzDA
Q'BBHABFA)BSP(A)(‘S(/P/A?LjAOBP(zPIL''jA)(L’NAL''AzBH(/AIzAPN(Az(P2B)1“A
–BP(zPIL'A’B''I/IBz/AR(P2((zA)BSP(A)(‘S(/P/AO)BOLDLP(HARjAz(IDNRB)IzDAzBH(/A
o -z/()PIBzABFA)LzHB?AH('Lj/AR(FB)(AFB)2L)HIzDAXX”mA
o -z’)(L/(HA’BzP(zPIBzAIFAPBBA?LzjA)BSP(A)(O'I(/A’B?(ARL’1AHS(APBAzBH(/A)(O'jIzDAS/IzDAPN(I)A'B’L'A’L’N(A
o XBSP(AX(O'jA/&+-0AO)BR'(?A
;PL'(A’L’N(/A2I''A'(LHAPBAIz’)(L/(HAB3()N(LHA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-30 Mobile Networking
EFKEJHvx4LxWB-x
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-31 Mobile Networking
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
Q. Explain snooping TCP and mobile TCP with their merits and demerits. (May 12, Dec. 13, 10 Marks)
Q. Discuss Mobile Transport Layer. (Dec. 12, 5 Marks)
Q. Explain merits and demerits of snooping TCP and indirect TCP? (May 14, 5 Marks)
Q. Explain the functioning of I-TCP and SNOOP -TCP, giving advantages and disadvantages of both.(May 15, 10 Marks)
UN(A FB''B2IzDA /(’PIBzA H(/’)IR(/A PN(A P)LHIPIBzL'A U7–A H(/IDz(HA FB)A LA 2I)(HA z(P2B)1A LzHA L'/BA HI/’S//(/A PN(A z((HA FB)A
?BHIFI’LPIBzAPBAPN(AP)LHIPIBzL'AU7–AIzAB)H()APBAS/(AIPA(FFI’I(zP'jAIzA2I)('(//Az(P2B)1/“A
1. Congestion Control
U7–A2L/AB)IDIzL''jAH(/IDz(HAFB)AFI:(HAz(P2B)1/A2IPNAFI:(HA(zHA/j/P(?/“A
XBSP()/AL)(A)(/OBz/IR'(APBAP)Lz/F()AOL’1(P/AF)B?A/BS)’(APBAH(/PIzLPIBz“A
-FA LA OL’1(PA I/A 'B/PA IzA PN(A 2I)(HA z(P2B)15A PN(A O)BRLR'(A )(L/BzA BFA PNLPA I/A ’BzD(/PIBz“A 7BzD(/PIBzA I/A zBPNIzDA RSPA LA
P(?OB)L)jAB3()'BLHALPA/B?(AOBIzPAIzAPN(AP)Lz/?I//IBzAOLPN5AI“(“ALA/PLP(ABFA’BzD(/PIBzALPALAzBH(“A
”L’NA )BSP()A ?LIzPLIz/A RSFF()/A FB)A OL’1(P/“A -FA PN(A /S?A BFA PN(A OL’1(P/>A IzOSPA )LP(A H(/PIz(HA FB)A Bz(A BSPOSPA 'Iz1A
(:’((H/A PN(A ’LOL’IPjA BFA PN(A BSPOSPA 'Iz15A PN(zA PN(A RSFF()A R(’B?(/A FS''A LzHA IPA ’LzzBPA FB)2L)HA PN(A OL’1(P/A FL/PA
(zBSDN5A/BAPN(AOL’1(P/AL)(AH)BOO(HARjAPN(A)BSP()“A
6AH)BOO(HAOL’1(PAI/A'B/PALzHALADLOAI/AzBPI’(HARjAPN(A)(’(I3()AIzAPN(AOL’1(PA/P)(L?“A
UN(A)(’(I3()A’BzPIzS(/APBAL’1zB2'(HD(AL''AIza/(‘S(z’(AOL’1(P/ASOAPBAPN(A?I//IzDABz(“AAAA
e
UN(A )(’(I3()A zBPI’(/A PN(A ?I//IzDA L’1zB2'(HD(?(zPA BFA PN(A 'B/PA OL’1(PA LzHA L//S?(/A LA OL’1(PA I/A 'B/PA HS(A PBA
g
’BzD(/PIBz“A
io led
X(P)Lz/?IPPIzDAPN(A'B/PAOL’1(PALzHA’BzPIzSIzDAPBA/(zHAOL’1(P/ALPAFS''A/(zHIzDA)LP(A2BS'HABz'jAIz’)(L/(A’BzD(/PIBz“A
UBA)(HS’(A’BzD(/PIBz5APN(AP)Lz/?I//IBzA)LP(AI/A/'B2(HAHB2zA’Bz/IH()LR'jARjAU7–“A
6''A BPN()A U7–A ’Bzz(’PIBz/A 2IPNA PN(A /L?(A O)BR'(?A FB''B2A PN(A /L?(A O)B’(//“A KjA HBIzDA PNI/5A PN(A ’BzD(/PIBzA I/A
ic ow
)(/B'3(HA/BBz“A
UNI/AR(NL3IB)ABFAU7–AHS)IzDA’BzD(/PIBzAI/A’L''(HA3H4,U3LK5L“AA
n
bl kn
U7–A(z/S)(/APNLPA(3(zASzH()AN(L3jA'BLHAPN(AL3LI'LR'(ARLzH2IHPNA2I''AR(A/NL)(HA(‘SL''j“AA
2. Slow start
at
Pu ch
UN(AR(NL3IB)ABFAU7–ALFP()AH(P(’PIBzABFA’BzD(/PIBzAI/A’L''(HA/'B2A/PL)P“AA
-PAI/AS/(HAPBA)(/B'3(A’BzD(/PIBzA‘SI’1'j“A
Te
Slow-start working
;(zH()A’L'’S'LP(/ALA’BzD(/PIBzA2IzHB2AFB)APN(A)(’(I3()“AUN(A/PL)PA/IV(ABFA2IzHB2AI/ABz(A/(D?(zPA0U7–AOL’1(P+“A
UN(A /(zH()A /(zH/A Bz(A OL’1(PA LzHA 2LIP/A FB)A LzA L’1zB2'(HD(?(zP“A -FA PNI/A L’1zB2'(HD(?(zPA L))I3(/5A PN(A /(zH()A
Iz’)(L/(/APN(A’BzD(/PIBzA2IzHB2ARjABz(“A6zHAzB2A/(zH/AP2BAOL’1(P/A0’BzD(/PIBzA2IzHB2AhAW+“AA
6FP()A L))I3L'A BFA P2BA ’B))(/OBzHIzDA L’1zB2'(HD(?(zP/5A PN(A /(zH()A LHH/A WA IzA PN(A ’BzD(/PIBzA 2IzHB25A Bz(A FB)A (L’NA
L’1zB2'(HD(?(zP“A
UNI/A/’N(?(AHBSR'(/APN(A’BzD(/PIBzA2IzHB2A(3()jAPI?(APN(AL’1zB2'(HD(?(zPAL))I3(/“AUNI/AI/A’L''(HAL/ALzAvFJ4fvfLUKHx
UfN5vK3v^xLzHAIPA’BzPIzS(/API''ALA’()PLIzA3L'S(A’L''(HAL/AN4fDv3LU4fxLP5v3P4Hy“A
Gz’(A ’BzD(/PIBzA 2IzHB2A ’)B//(/A PN(A ’BzD(/PIBzA PN)(/NB'H5A FS)PN()A Iz’)(L/(A IzA P)Lz/?I//IBzA )LP(A I/A 'Iz(L)A I“(“A
’BzD(/PIBzA2IzHB2AI/AIz’)(L/(HARjABz(A(L’NAPI?(APN(AL’1zB2'(HD(?(zPAI/A)(’(I3(H“A
UNI/A'Iz(L)AIz’)(L/(A’BzPIzS(/API''APN(A/(zH()AH(P(’P/APN(AOL’1(PA'B//“A
Gz’(APN(AOL’1(PA'B//AI/AH(P(’P(HiAPN(A/(zH()A/(P/APN(A’BzD(/PIBzAPN)(/NB'HAPBANL'FABFAIP/A’S))(zPA’BzD(/PIBzA2IzHB2A
LzHA’BzD(/PIBzA2IzHB2AI/A/(PAPBABz(“AUN(ALRB3(A/P(O/AL)(A)(O(LP(HALDLIz“A
3. Fast retransmit/fast recovery
UN(A/(zH()AH(P(’P/APN(A'B//ABFAOL’1(P/AIzAP2BA2Lj/“A
A 0I+A -FALAPI?(aBSPAB’’S)/ALPAPN(A)(’(I3()5AIzAPNLPA’L/(APN(A/(zH()AL’PI3LP(/AzB)?L'A/'B2A/PL)P“A
A 0II+A -FAPN(A/(zH()A)(’(I3(/A’BzPIzSBS/AL’1zB2'(HD(?(zP/AFB)APN(A/L?(AOL’1(PA0VSO'I’LP(AL’1zB2'(HD(?(zP/+“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-33 Mobile Networking
-FA PNI/A I/A PN(A ’L/(5A PN(zA PN(A /(zH()A ’LzA H(HS’(A P2BA PNIzD/A aA Bz(A I/A PNLPA PN(A )(’(I3()A DBPA L''A OL’1(P/A SOA PBA PN(A
L’1zB2'(HD(?(zPA IzA /(‘S(z’(A LzHA /(’BzHA I/A PNLPA PN(A )(’(I3()A I/A ’BzPIzSBS/'jA )(’(I3IzDA /B?(PNIzDA F)B?A PN(A
/(zH()“AAUN()(FB)(5APN(AOL’1(P/A?S/PANL3(AR((zA'B/PAHS(APBA/I?O'(AP)Lz/?I//IBzA())B)ALzHAzBPAHS(APBAz(P2B)1A
’BzD(/PIBz“A
UN(A/(zH()A’LzAzB2A)(P)Lz/?IPAPN(A?I//IzDAOL’1(P0/+AR(FB)(APN(API?()A(:OI)(/“AUNI/AR(NL3IB)AI/A’L''(HAL/ALALK3Lx
5vL5Kf3EUL“AA
UN(A )(’(IOPA BFA LzA L’1zB2'(HD(?(zP/A /NB2A PNLPA PN()(A I/A zBA ’BzD(/PIBzA PBA US/PIFjA LA /'B2A /PL)P“A UN(A /(zH()A ’LzA
’BzPIzS(A2IPNAPN(A’S))(zPA’BzD(/PIBzA2IzHB2“AUN(A/(zH()AO()FB)?/ALAFL/PA)(’B3()jAF)B?APN(AOL’1(PA'B//“A
UNI/A?(’NLzI/?AI?O)B3(/APN(A(FFI’I(z’jABFAU7–AH)L?LPI’L''j“A
4. Implication on mobility
UN()(AL)(A?LzjAO)BR'(?/APNLPAH(D)LH(APN(AO()FB)?Lz’(ABFAU7–“A
Transmission errors
e
A U7–AL//S?(/A’BzD(/PIBzAIFAOL’1(P/AL)(AH)BOO(H“AUNI/AI/AzBPAL'2Lj/AP)S(AFB)A2I)('(//Az(P2B)1/5A2N()(ABFP(z5AOL’1(PA'B//A
g
I/AHS(APBAP)Lz/?I//IBzA())B)/“AA
io led
Mobility (i.e. handoff)
A 4BRI'IPjA 0I“(“A NLzHBFF+A IP/('FA ’LzA ’LS/(A OL’1(PA 'B//5A IFA (“D“A LA ?BRI'(A zBH(A )BL?/A F)B?A Bz(A L’’(//A OBIzPA 0(“D“A FB)(IDzA
ic ow
LD(zPAIzA4BRI'(A-–+APBALzBPN()A2NI'(APN()(AL)(A/PI''AOL’1(P/AIzAP)Lz/IPAPBAPN(A2)BzDAL’’(//AOBIzPALzHAFB)2L)HIzDAI/AzBPA
OB//IR'(“A
n
High delay
bl kn
A CI)('(//Az(P2B)1/ANL3(ALA’Bz/IH()LR'jA'BzD()A'LP(z’jA0H('Lj+APNLzA2I)(HAz(P2B)1“A
Battery powered devices
at
Pu ch
4BRI'(A H(3I’(/A L)(A RLPP()jA OB2()(HA LzHA N(z’(A OB2()A I/A LA /’L)’(A /BS)’(“A –)BPB’B'A H(/IDz(HA FB)A ?BRI'(A B)A 2I)('(//A
z(P2B)1/A/NBS'HAR(AOB2()A(FFI’I(zP“AAA
Te
Limited Bandwidth
63LI'LR'(ARLzH2IHPNA2IPNIzALA’(''A?LjA’NLzD(AH)L?LPI’L''j“AUNI/A'(LH/APBAHIFFI’S'PI(/AIzADSL)LzP((IzDAmB;AOL)L?(P()/A
/S’NAL/AH('LjARBSzH/ALzHARLzH2IHPNADSL)LzP((/“A
BH4,x 3LK5LA I/A PN(A ?(’NLzI/?A BFA P)LHIPIBzL'A U7–A FB)A 2I)(HA z(P2B)1A PBA H(L'A ’BzD(/PIBz“A -zA PNLP5A U7–A L//S?(/A OL’1(PA
'B//(/AHS(APBA’BzD(/PIBz“A=B2(3()5AIzA2I)('(//Az(P2B)1APN()(A’BS'HAR(A/B?(ABPN()A)(L/Bz/APNLPA’LS/(AOL’1(PA'B//A/S’NA
L/AK”X5ALzHAF)(‘S(zPAHI/’Bzz(’PIBz/ARjANLzHBFF“AAAA
-FA2(AS/(AP)LHIPIBzL'AU7–AIzA2I)('(//A(z3I)Bz?(zP5AIPAH)L/PI’L''jA)(HS’(/APN(A’BzD(/PIBzA2IzHB2A/IV(ALzHAHBSR'(/APN(A
P)Lz/?I//IBzA PI?(BSPA 3L'S(“A UNI/A Szz(’(//L)jA ’BzD(/PIBzA ’BzP)B'A )(HS’(/A PN(A SPI'IVLPIBzA )LP(A BFA PN(A RLzH2IHPN5A
)(HS’(/APN(Az(P2B)1AO()FB)?Lz’(A/(3()('j“A
;()IL'A PI?(aBSPA LPA U7–A /(zH()A H(D)LH(/A B3()L''A PN)BSDNOSPA ?B)(A PNLzA 'B//(/A HS(A PBA RIPA ())B)/A B)A /?L''A ’BzD(/PIBzA
2IzHB2AHB“A
=(z’(A2(A)(‘SI)(HAPBA’NLzD(AU7–AFB)A?BRI'(A(z3I)Bz?(zP“AUN()(AL)(A'L)D(AzS?R()ABFAH(3I’(/ALzHALOO'I’LPIBz/APNLPA
L)(AS/IzDA’S))(zPAU7–iAIPAI/AzBPAOB//IR'(APBA’NLzD(AU7–A’B?O'(P('jAUS/PAPBA/SOOB)PA?BRI'(AS/()/AB)A2I)('(//A'Iz1/“A
UN()(FB)(ALzjA(zNLz’(?(zPAPBAU7–ANL/APBAR(A’B?OLPIR'(A2IPNAPN(A/PLzHL)HAU7–“AA
W“A 4LIzP(zLz’(ABFA(zHaPBa(zHAU7–A/(?LzPI’/“A
Y“A 4IzI?IV(APN(AO)BR'(?A’LS/(HARjA'(zDPNjAHI/’Bzz(’PIBz/AB)ARjAF)(‘S(zPAHI/’Bzz(’PIBz/“A
^“A 6HUS/PA2IPNAHjzL?I’L''jA’NLzDIzDARLzH2IHPNAB3()APN(AL')(LHjA/PL)3(HA2I)('(//A'Iz1“A
<“A 4L1(A/S)(APNLPAPN(ANLzHBFFA?LzLD(?(zPAI/A(FFI’I(zP“A
UN(A FB''B2IzDA /(’PIBz/A O)(/(zPA /B?(A ’'L//I’L'A /B'SPIBz/A PNLPA ’LzA R(A S/(HA PBA ?BHIFjA /PLzHL)HA U7–A PBA I?O)B3(A PN(A
O()FB)?Lz’(ABFA2I)('(//A(z3I)Bz?(zP“A
e
Q. Explain the functioning of Mobile TCP. (Dec. 15, 5 Marks)
g
Q. Explain any two TCP for Mobile communication. (May 18, 5 Marks)
io led
UN()(AL)(AP2BAFL’P/[ABz(AI/APNLPAU7–AO()FB)?/AOBB)'jAPBD(PN()A2IPNA2I)('(//A'Iz1/ALzHA/(’BzHAI/APNLPAU7–A2IPNIzAPN(A
FI:(HAz(P2B)1A’LzzBPAR(A’NLzD(H“A
ic ow
QID“AY“<“XA/NB2/ALzA(:L?O'(A2IPNALA?BRI'(ANB/PA’Bzz(’P(HA3ILALA2I)('(//A'Iz1ALzHALzAL’’(//AOBIzPAPBAPN(A2I)(HAIzP()z(PA
2N()(APN(A’B))(/OBzH(zPAzBH(A)(/IH(/“AUN(A’B))(/OBzH(zPAzBH(A’BS'HAL'/BAS/(A2I)('(//AL’’(//“A
n
-aU7–A/(OL)LP(/ALAU7–A’Bzz(’PIBzAIzPBAP2BAOL)P/A[ALAFI:(HALzHALA2I)('(//AOL)P“A
bl kn
o 0UFvyxJK5LxU3AR(P2((zAPN(A?BRI'(A/SOOB)PA)BSP()A0L’’(//AOBIzP+ALzHAPN(AFI:(HANB/PAB3()APN(AFI:(HAz(P2B)1“A
o
at
_U5vHv33xJK5LAI/AR(P2((zAPN(A4=A04BRI'(ANB/P+ALzHAIP/AL’’(//AOBIzPAB3()APN(A2I)('(//A?(HIS?“A
Pu ch
;PLzHL)HAU7–AI/AS/(HAR(P2((zAPN(AFI:(HA’B?OSP()ALzHAPN(AL’’(//AOBIzP“AA
6ADBBHAOBIzPAFB)A/(D?(zPIzDAPN(A’Bzz(’PIBzAR(P2((zA?BRI'(ANB/PALzHA’B))(/OBzH(zPANB/PAI/ALPAPN(AFB)(IDzALD(zPABFA
Te
?BRI'(A-–“A
UN(A FB)(IDzA LD(zPA I/A )(/OBz/IR'(A FB)A ’BzP)B''IzDA PN(A S/()A ?BRI'IPj“A 6zHA HS)IzDA NLzHB3()5A FB)(IDzA LD(zPA P)Lz/F()/A PN(A
’Bzz(’PIBzAPBAPN(Az(2AFB)(IDzALD(zP“A
UN(AFB)(IDzALD(zPAL’P/AL/ALAO)B:jALzHA)('Lj/AL''AHLPLAIzARBPNAHI)(’PIBz/“AA
UN()(A?LjAR(AFB''B2IzDA/’(zL)IB/“A
1. Correspondent host sends a packet to mobile host
;Iz’(APN(A’B))(/OBzH(zPAzBH(AI/ALAFI:(HAzBH(5AIPA/(zH/ALAU7–AOL’1(PA3ILALA/PLzHL)HAU7–“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-35 Mobile Networking
6zAL’’(//AOBIzPA)(’(I3(/APNLPAOL’1(PALzHA/(zH/ALzAL’1zB2'(HD(?(zPAPBALAFI:(HANB/PAFB)APN(A)(’(I3(HAOL’1(P“A
UN(AL’’(//AOBIzPARSFF()/APN(AOL’1(PALzHAFB)2L)H/APNI/AOL’1(PAPBALA?BRI'(ANB/PAS/IzDA2I)('(//AU7–“A
-FAPN()(AI/ALzjAP)Lz/?I//IBzA())B)ABzA2I)('(//A'Iz1APN(zAL’’(//AOBIzPA)(P)Lz/?IP/APNLPAOL’1(PAIz/P(LHABFAFI:(HANB/PA
)(P)Lz/?IPPIzDAIP“A0UNI/AI/AL'/BA’L''(HA'B’L'A)(P)Lz/?I//IBz+“AA
Gz’(APN(AL’1zB2'(HD(?(zPAI/A)(’(I3(HAFB)APN(AOL’1(PAFB)?APN(A?BRI'(ANB/PiAPN(AL’’(//AOBIzPAPN(zA)(?B3(/APNLPA
OL’1(PAF)B?AIP/ARSFF()“A
UNS/APN(AL’’(//AOBIzPAL’P/AL/ALAO)B:j“A
2. Mobile host transmits a packet to a fixed host
4BRI'(ANB/PA/(zH/ALAU7–AOL’1(PALzHAL’’(//AOBIzPA)(’(I3(/APNLPAOL’1(PALzHA/(zH/ALzAL’1zB2'(HD(?(zPAPBA?BRI'(A
NB/P“A
-FALAOL’1(PAI/A'B/PALPA2I)('(//A'Iz1APN(zAPN(A?BRI'(ANB/PAzBPI’(/APNI/A(3(zPA?S’NAFL/P()ALzHA)(P)Lz/?IP/APN(AOL’1(P“A
UN(AL’’(//AOBIzPAPN(zAP)Lz/?IP/APNLPAOL’1(PAPBAPN(AFI:(HANB/PA3ILA/PLzHL)HAU7–A’Bzz(’PIBz“A
e
-FALAOL’1(PAI/A'B/PAIzA2I)(HAz(P2B)1APN(zAQ6ANLzH'(/APN(A)(P)Lz/?I//IBz/“A
g
6FP()A)(’(I3IzDAPN(AL’1zB2'(HD(?(zPAPN(AOL’1(PAI/A)(?B3(HAF)B?APN(ARSFF()“A
io led
3. The mobile host moves to a new location and handover takes place
CN(zA?BRI'(ANB/PA?B3(/APBALAz(2A'B’LPIBz5AIPA)(DI/P()/A2IPNAz(2AFB)(IDzALD(zP“A6FP()A)(DI/P)LPIBzAPN(Az(2AFB)(IDzA
ic ow
LD(zPAIzFB)?/APN(AB'HAFB)(IDzALD(zPALRBSPAIP/A’S))(zPA'B’LPIBz“A
UN(A B'HA FB)(IDzA LD(zPA FB)2L)H/A L''A PN(A RSFF()(HA OL’1(P/A PBA z(2A FB)(IDzA LD(zPA L/A PN(A OL’1(PA IzA PN(A RSFF()A NL3(A
n
L')(LHjAR((zAL’1zB2'(HD(H“A
bl kn
CIPNAPN(ARSFF()(HAHLPLAPN(A/B’1(P/ABFAPN(AL’’(//AOBIzPA?S/PAL'/BA?ID)LP(APBAPN(Az(2AFB)(IDzALD(zP“AUNI/AI/A/NB2zA
IzAQID“AY“<“W“A
at
Pu ch
Te
UN(A/B’1(PA)(F'(’P/APN(A’S))(zPA/PLP(ABFAPN(AU7–A’Bzz(’PIBzAI“(“A/(‘S(z’(AzS?R()5ALHH)(//(/5AOB)PAzS?R()/A(P’“A
UN(ANLzHB3()AI/AP)Lz/OL)(zPAPBAPN(A’B))(/OBzH(zPANB/PALzHAzBAz(2A’Bzz(’PIBzAI/A(/PLR'I/N(HAFB)APN(A?BRI'(ANB/P“A
Advantages of I-TCP
-aU7–AHB(/AzBPA)(‘SI)(ALzjA’NLzD(/AIzAPN(A/PLzHL)HAU7–AS/(HAFB)A2I)(HAz(P2B)1/“A
VS(APBAPN(AOL)PIPIBzIzDAP)Lz/?I//IBzA())B)/ABzAPN(A2I)('(//A'Iz1A’LzzBPAO)BOLDLP(AIzPBAPN(AFI:(HAz(P2B)1“A
-PAI/A/I?O'(APBA’BzP)B'5A?BRI'(AU7–AI/AS/(HABz'jAFB)ABz(ANBOAR(P2((z5A(“D“5ALAFB)(IDzALD(zPALzHA?BRI'(ANB/P“A
6A3()jAFL/PA)(P)Lz/?I//IBzABFAOL’1(P/AI/AOB//IR'(5APN(A/NB)PAH('LjABzAPN(A?BRI'(ANBOAI/A1zB2z“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-36 Mobile Networking
VS(APBAPN(A/(D?(zPLPIBzABFAPN(AU7–A’Bzz(’PIBz5APN(A?BRI'(ANB/PALzHA’B))(/OBzH(zPANB/PA’LzAS/(AHIFF()(zPAP)Lz/OB)PA
'Lj()AO)BPB’B'/“A
VIFF()(zPA/B'SPIBz/APBABOPI?IV(APN(AP)Lz/F()AB3()APN(A2I)('(//A'Iz1A’LzAR(AP(/P(HAB)A’L))I(HABSPA2IPNBSPAOSPPIzDABFAPN(A
-zP()z(PALPA)I/1“A
Disadvantages of I-TCP
-PA'B//(/A(zHaPBa(zHA/(?LzPI’/iALzAL’1zB2'(HD(?(zPA/(zPARjAL’’(//AOBIzPAPBALA/(zH()AHB(/AzB2AzBA'BzD()A?(LzAPNLPALA
)(’(I3()A )(L''jA DBPA LA OL’1(P“A -FA LA FB)(IDzA LD(zPA ’)L/N(/A R(FB)(A /(zHIzDA L’1zB2'(HD(HA OL’1(PA PBA LA ?BRI'(A NB/PiA PN(A
/(zH()ANL/AzBA2LjAPBAFIzHABSPA2N(PN()AOL’1(P/ANL3(AR((zA)(’(I3(HAB)AzBP“A
=IDN()A NLzHB3()A 'LP(z’jA I/A ?B)(A O)BR'(?LPI’“A 6''A OL’1(P/A /(zPA RjA ’B))(/OBzH(zPA NB/PA L)(A RSFF()(HA RjA PN(A FB)(IDzA
LD(zP“A-FALA?BRI'(ANB/PA’NLzD(/AIP/A'B’LPIBz5AB'HAFB)(IDzALD(zPANL/APBAFB)2L)HAPN(ARSFF()(HAOL’1(P/APBAPN(Az(2AFB)(IDzA
LD(zPAL/APN(jANL3(AL')(LHjAR((zAL’1zB2'(HD(HARjAPN(AB'HAL’’(//AOBIzP“A
UN(AFB)(IDzALD(zPA?S/PAR(ALAP)S/P(HA(zPIPjAR(’LS/(AU7–A’Bzz(’PIBzA(zH/ALPAPNI/AOBIzP“A
e
3.5.2(b) Snooping TCP (S-TCP)
g
io led (MU – May 12, Dec. 13, May 14, May 15, May 17, May 18)
Q. Explain snooping TCP with its merits and demerits. (May 12, Dec. 13, May 14, 5 Marks)
Q. Explain the functioning of SNOOP -TCP, give advantages and disadvantages. (May 15, 10 Marks)
Q. Explain functioning of I-TCP and Snooping TCP. Giving advantages and disadvantages of both.
ic ow
;zBBOIzDAU7–A2B)1/A’B?O'(P('jAP)Lz/OL)(zP'jALzHA'(L3(/APN(AU7–A(zHaPBa(zHA’Bzz(’PIBzAIzPL’P“AA
at
-PAB3()’B?(/APN(A/B?(AH)L2RL’1/ABFAPN(A-aU7–“A
Pu ch
Te
A ;zBBOIzDAU7–A2B)1/AL/AFB''B2/A[A
1. Correspondent host sends a packet to mobile host
7B))(/OBzH(zPANB/PA/(zH/ALAOL’1(PAPBA?BRI'(ANB/PA3ILA2I)(HAU7–A’Bzz(’PIBz“AUN(AL’’(//AOBIzPARSFF()/APN(AOL’1(PA
/(zPARjA’B))(/OBzH(zPANB/P“A
o 6’’(//AOBIzPAL'/BA/zBBO/ABzAPN(AOL’1(PAIzARBPNAHI)(’PIBz/APBA)(B)DLzIV(AL’1zB2'(HD(?(zP/“AA
o Gz’(A PN(A ?BRI'(A NB/PA )(’(I3(/A PN(A OL’1(P5A IPA /(zH/A LzA L’1zB2'(HD(?(zPA LzHA PNI/A L’1zB2'(HD(?(zPA L'/BA
OL//(/APN)BSDNAPN(AL’’(//AOBIzP“A
o -FAPN(AL’’(//AOBIzPAHB(/z>PA)(’(I3(ALzjAL’1zB2'(HD(?(zPAF)B?ALA?BRI'(ANB/PA2IPNIzA’()PLIzAL?BSzPABFAPI?(5A
PN(zA IPA )(P)Lz/?IP/A PN(A OL’1(PA F)B?A IP/A RSFF()5A O()FB)?IzDA LA ?S’NA FL/P()A )(P)Lz/?I//IBzA ’B?OL)(HA PBA PN(A
FI:(HANB/P“A
o UN(API?(aBSPAFB)AL’1zB2'(HD(?(zP/A’LzAR(A?S’NA/NB)P()5AR(’LS/(AIPA)(F'(’P/ABz'jAPN(AH('LjABFABz(ANBOAO'S/A
O)B’(//IzDAPI?(“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-37 Mobile Networking
o -PA I/A L'/BA OB//IR'(A PNLPA ?BRI'(A NB/PA /(zH/A HSO'I’LP(A L’1zB2'(HD(?(zP/A FB)A PN(A /L?(A OL’1(PA PBA IzHI’LP(A LA
OL’1(PA 'B//iA PN(A FB)(IDzA LD(zPA ’LzA FI'P()A PN(/(A HSO'I’LP(A L’1zB2'(HD(?(zP/A /B5A PNLPA Szz(’(//L)jA
)(P)Lz/?I//IBz/AF)B?APN(A’B))(/OBzH(zPANB/PA’LzAR(AL3BIH(H“A
2. Mobile host transmits a packet to a correspondent host
CN(zA LA ?BRI'(A NB/PA /(zH/A LA OL’1(PA PBA ’B))(/OBzH(zPA NB/P5A PN(A FB)(IDzA LD(zPA 1((O/A A P)L’1A BFA PN(A /(‘S(z’(A
zS?R()/ABFAPN(/(AOL’1(P/“AA
CN(zA LA FB)(IDzA LD(zPA H(P(’P/A LA DLOA IzA PN(A /(‘S(z’(A zS?R()/5A I“(“A OL’1(PA 'B//5A IPA /(zH/A LA z(DLPI3(A
L’1zB2'(HD(?(zPA0967l+APBAPN(A?BRI'(ANB/P“A
Gz’(APN(A?BRI'(ANB/PA)(’(I3(/APN(A967l5AIPA’LzA)(P)Lz/?IPAPN(A?I//IzDAOL’1(PAI??(HILP('j“A
X(B)H()IzDABFAPN(AOL’1(P/AI/AHBz(ALSPB?LPI’L''jALPAPN(A’B))(/OBzH(zPAzBH(ARjAU7–“A
A 9BP(A PNLPA PBA ?LIzPLIzA (zHaPBa(zHA /(?LzPI’/A BFA U7–5A FB)(IDzA LD(zPA ?S/PA zBPA L’1zB2'(HD(A HLPLA IP/('FA PBA PN(A
’B))(/OBzH(zPANB/PA0Iz/P(LHAQ6AFB)2L)H/APN(A67lA)(’(I3(HAF)B?APN(A4=+“AUNI/A(z/S)(/APN(A’B))(/OBzH(zPANB/PAPNLPA
e
PN(A ?BRI'(A NB/PA NL/A L’PSL''jA )(’(I3(HA PN(A HLPL“A 9B2A IFA FB)(IDzA LD(zPA ’)L/N(/5A PN(A PI?(aBSPA ?(’NLzI/?A BFA
g
’B))(/OBzH(zPANB/PA/PI''A2B)1/ALzHAP)IDD()/ALA)(P)Lz/?I//IBzABFALA'B/PAOL’1(P“A
Advantages of Snooping-TCP
io led
UN(A(zHaPBa(zHA/(?LzPI’/AL)(AO)(/()3(H“A
7B))(/OBzH(zPANB/PAz((HAzBPAPBAR(A’NLzD(HiA?B/PABFAPN(A(zNLz’(?(zP/AL)(AHBz(AIzAPN(AFB)(IDzALD(zP“A
ic ow
-PAHB(/z>PAz((HANLzHB3()ABFAPN(A/PLP(AL/A/BBzAL/APN(A?BRI'(ANB/PA?B3(/APBALzBPN()AFB)(IDzALD(zP“A6//S?(APN()(A?IDNPA
n
/PI''AR(AHLPLAIzAPN(ARSFF()AzBPAP)Lz/F())(HAPBAPN(Az(2AFB)(IDzALD(zP“A6''APNLPANLOO(z/AI/ALAPI?(aBSPALPAPN(A’B))(/OBzH(zPA
bl kn
NB/PALzHAPN(A)(P)Lz/?I//IBzABFAPN(AOL’1(P/APBAPN(Az(2AFB)(IDzALD(zP“A
-PAHB(/z>PA?LPP()AIFAPN(Az(2AFB)(IDzALD(zPAS/(/APN(A(zNLz’(?(zPAB)AzBP“A-FAzBP5A/zBBOIzDAU7–ALSPB?LPI’L''jAFL''/ARL’1A
at
PBAPN(A/PLzHL)HA/B'SPIBz“A
Pu ch
\/IzDA 967lA R(P2((zA FB)(IDzA LD(zPA LzHA PN(A ?BRI'(A NB/PA L//S?(/A LHHIPIBzL'A ?(’NLzI/?/A BzA ?BRI'(A NB/P“A UNI/A
LOO)BL’NAI/AzBA'BzD()AP)Lz/OL)(zPAFB)AL)RIP)L)jA?BRI'(ANB/P/“A
;zBBOIzDA U7–A HB(/A zBPA I/B'LP(A PN(A R(NL3IB)A BFA PN(A 2I)('(//A 'Iz1A F)B?A 2I)(HA 'Iz1A L/A IzA ’L/(A BFA -aU7–“A -FA PN(A H('LjA IzA
2I)('(//A'Iz1AI/A3()jANIDNAL/A’B?OL)(HAPBA2I)(HA'Iz15APN(API?()/ABFAPN(AL’’(//AOBIzPALzHAPN(A’B))(/OBzH(zPANB/PA2BS'HA
L'?B/PA R(A /L?(“A UNS/5A PN(A H('LjA BzA 2I)('(//A 'Iz1A LSPB?LPI’L''jA P)IDD()/A PI?(aBSPA IzA ’B))(/OBzH(zPA NB/PA LzHA ’LS/(/A
)(P)Lz/?I//IBz/“AUNS/APN(A(FF(’PI3(z(//ABFA;aU7–A’B?O'(P('jAH(O(zH/ABzAPN(A‘SL'IPjABFA2I)('(//A'Iz1“A
-FAS/()ALOO'I(/A(zHaPBa(zHA(z’)jOPIBz5A;aU7–AFLI'/“AK(’LS/(AU7–AN(LH()A2BS'HAR(A(z’)jOP(HALzHAN(z’(A/zBBOIzDABzAPN(A
/(‘S(z’(AzS?R()/AI/A?(LzIzD'(//“AA
UN(AB’’S))(z’(ABFA'(zDPNjALzH8B)AF)(‘S(zPAHI/’Bzz(’PIBzAI/APN(A?LUB)AO)BR'(?AIzA2I)('(//Az(P2B)1/“A4a-7–AH(L'/A2IPNA
PN(A'(zDPNjALzH8B)AF)(‘S(zPAHI/’Bzz(’PIBz/“AA
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-38 Mobile Networking
4aU7–ALI?/A[A
o UBAI?O)B3(AB3()L''APN)BSDNOSPA
o UBA'B2()APN(AH('LjA
o UBA?LIzPLIzA(zHaPBa(zHA/(?LzPI’/ABFAU7–AA
o UBAO)B3IH(ALA?B)(A(FFI’I(zPANLzHB3()A
UN(A’Bzz(’PIBzAI/A/O'IPASOAIzPBAWAOL)P/ARjA4aU7–A/I?I'L)APBA-aU7–“A
UN(A’B))(/OBzH(zPANB/PALzHA/SO()3I/B)jANB/PA’B??SzI’LP(A3ILAPN(ASz?BHIFI(HA/PLzHL)HAU7–“A
UN(A’B??SzI’LPIBzAR(P2((zA/SO()3I/B)jANB/PA0;=+ALzHA?BRI'(ANB/PA04=+AI/AHBz(ARjAPN(A?BHIFI(HA/O(’IL'AU7–“A
QB)AP)Lz/F())IzDAHLPLAR(P2((zARBPNAOL)P/5APN(A/SO()3I/B)jANB/PAI/AS/(H“A
;=AHB(/AzBPAO()FB)?A’L’NIzDAB)A)(P)Lz/?I//IBzABFAAHLPLAL/ALA)('LPI3('jA'B2ARIPA())B)A)LP(AI/AL//S?(HARjA4aU7–ABzAPN(A
2I)('(//A'Iz1“ACN(z(3()ALAOL’1(PAI/A'B/PABzAPN(A2I)('(//A'Iz15APN(AB)IDIzL'A/(zH()A?S/PA)(P)Lz/?IPAIP“AU7–A(zHaPBa(zHA
/(?LzPI’/AL)(APNS/A?LIzPLIz(H“AQB)AFLI)A/NL)IzDAB3()APN(A2I)('(//A'Iz15A4aU7–Az((H/ALARLzH2IHPNA?LzLD()“A
e
Working of M-TCP
g
–L’1(P/AL)(A/(zPAPBAPN(A?BRI'(ANB/PARjALA’B))(/OBzH(zPANB/P“A
io led
-FALzjAOL’1(PAI/A'B/PABzAPN(A2I)('(//A'Iz15APN(zAPN(AB)IDIzL'A/(zH()A)(P)Lz/?IP/APN(AOL’1(P“AUNS/5A(zHaPBa(zHA/(?LzPI’/A
L)(A?LIzPLIz(H“A
ic ow
6''APN(AOL’1(P/A/(zPAPBA4=AL)(A?BzIPB)(HARjAPN(A;=ALzHAL)(AL’1zB2'(HD(HARjAPN(A4=A3ILA67lAOL’1(P/“A
6FP()ALA/(PAL?BSzPABFAPI?(5AIFAPN(A;=A/PI''AHB(/AzBPA)(’(I3(ALzjA67l5AIPAL//S?(/APNLPAPN(A4=AI/AHI/’Bzz(’P(H“A
n
;=A/(P/A/(zH()>/A2IzHB2A/IV(APBAV()BALzHAPNS/A’NB1(/APN(A/(zH()“AGz’(APN(A2IzHB2A/IV(AI/A/(PAPBAV()B5APN(A/(zH()AI/A
bl kn
FB)’(HA PBA DBA IzPBA LA O()/I/P(zPA ?BH(“A -zA PN(A O()/I/P(zPA ?BH(5A IzH(O(zH(zPA BFA PN(A )(’(I3()>/A O()IBHA BFA HI/’Bzz(’P(HA
/PLP(5APN(A/PLP(ABFAPN(A/(zH()A2I''AzBPA’NLzD(“A
at
Pu ch
Gz’(APN(A;=AH(P(’P/APN(A’Bzz(’PI3IPjALDLIz5APN(A/(zH()>/A2IzHB2A/IV(AI/ALDLIzA/(PAPBAPN(AB'HA3L'S(5A(zLR'IzDAPN(A/(zH()A
PBA/(zHALPAFS''A/O((H“A
Te
Advantages of M-TCP
”zHaPBa(zHA/(?LzPI’/AL)(A?LIzPLIz(H“A;=AIP/('FAHB(/z>PA/(zHALzjA67l5AIPABz'jAFB)2L)H/A67l/APNLPA2()(A)(’(I3(HAF)B?A
PN(A4=“A
-PAL3BIH/ASzz(’(//L)jA)(P)Lz/?I//IBz/5AIFAPN(A4=AI/AHI/’Bzz(’P(H“AA
-PAI/AzBPAz(’(//L)jAPBAFB)2L)HAL''AHLPLAPBALAz(2A;=AR(’LS/(A;=AHB(/AzBPARSFF()ALzjAHLPL“A
Disadvantages of M-TCP
*B//(/ABzA2I)('(//A'Iz1AL)(AO)BOLDLP(HAPBAPN(A2I)(HA'Iz1“AUNI/AI/AR(’LS/(A;=AHB(/AzBPAL’PAL/ALAO)B:jALzHAHB(/AzBPARSFF()A
PN(AOL’1(P/ALzHAI/AzBPA)(/OBz/IR'(AFB)A'B’L'A)(P)Lz/?I//IBz“A
-PA)(‘SI)(/Az(2Az(P2B)1A('(?(zP/A'I1(ARLzH2IHPNA?LzLD()“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-39 Mobile Networking
e
UNS/APN(A’B))(/OBzH(zPANB/PADB(/AIzPBAFL/PAP)Lz/?IPA?BH(ALzHAzBPAPBAPN(A/'B2A/PL)P“A
g
Mobile host enters in fast retransmit mode
io led
4BRI'(ANB/PA?LjAL'/BA(zP()AIzA/'B2A/PL)PALFP()A?B3IzDAPBALAz(2AFB)(IDzALD(zP“AA
UBAL3BIHAPNI/5ALFP()ANLzHB3()ALA?BRI'(ANB/PALSPB?LPI’L''jAL’PI3LP(/AFL/PA)(P)Lz/?IPA?BH(“A
ic ow
UN(A?BRI'(ANB/PA)(P)Lz/?IP/AL''ASzL’1zB2'(HD(HAOL’1(PAS/IzDAPN(A’S))(zPA’BzD(/PIBzA2IzHB2A/IV(A2IPNBSPADBIzDAIzPBA
/'B2A/PL)P“A
n
Advantages of fast retransmit/fast recovery
bl kn
QB)(IDzALD(zPAB)A’B))(/OBzH(zPANB/PAz((HAzBPAPBAR(A’NLzD(H“A
at
Pu ch
4IzB)A’NLzD(/AL)(A)(‘SI)(HAIzA?BRI'(ANB/P>/A/BFP2L)(“A
k()jA;I?O'(“A
Te
6/A/BBzAL/APN(A467A'Lj()AH(P(’P/A’Bzz(’PI3IPjALDLIz5AIPAIzFB)?/APN(AU7–APBA)(/S?(ABO()LPIBzA2IPNAPN(A/L?(A’BzD(/PIBzA
2IzHB2ALzHAPN(API?()/“A
Advantages of transmission/time-out freezing
-PABFF()/ALA2LjAPBA)(/S?(AU7–A’Bzz(’PIBzA(3(zALFP()ALA'BzD()AIzP())SOPIBzABFAPN(A’Bzz(’PIBz“A
UNI/A/’N(?(AI/AIzH(O(zH(zPABFALzjABPN()AU7–A?(’NLzI/?/A/S’NAL/AL’1zB2'(HD(?(zP/AB)A/(‘S(z’(AzS?R()/“A;BAIPA’LzA
R(AS/(HAPBD(PN()A2IPNA(z’)jOP(HAHLPL“A
Disadvantages of transmission/time-out freezing
4BRI'(ANB/PAL/A2(''AL/A’B))(/OBzH(zPANB/PAz((H/APBAR(A’NLzD(H“A
6''A?(’NLzI/?/AL)(ARL/(HABzAPN(A’LOLRI'IPjABFA467A'Lj()APBAH(P(’PAFSPS)(AIzP())SOPIBz“A
-FA PN(A (z’)jOPIBzA I/A S/(HA PNLPA H(O(zH/A BzA PI?(aH(O(zH(zPA )LzHB?A zS?R()/5A PN(zA PNI/A /’N(?(A )(‘SI)(HA
)(/jz’N)BzIVLPIBzALFP()AIzP())SOPIBz“A
e
3.5.5 Selective Retransmission
g
-zAPN(A/PLzHL)HAU7–AL’1zB2'(HD?(zP/AL)(AIzA/(‘S(z’(“A
io led
-FA LA OL’1(PA I/A 'B/P5A PN(A /(zH()A NL/A PBA )(P)Lz/?IPA L''A PN(A OL’1(P/A /PL)PIzDA F)B?A PN(A 'B/PA OL’1(P“A 0gGaK67lA 9A
)(P)Lz/?I//IBz+“AUNI/A2L/P(/APN(ARLzH2IHPN“A
ic ow
UN(A/('(’PI3(A)(P)Lz/?I//IBzALOO)BL’NAL''B2/ALA)(P)Lz/?I//IBzABFALA/('(’PI3(AOL’1(PAI“(“APN(A/(zH()A’LzAzB2AH(P()?Iz(A
2NI’NAOL’1(PAI/APBAR(A)(P)Lz/?IPP(H“A
n
Advantages of Selective retransmission
bl kn
;(zH()A z((HA PBA )(P)Lz/?IPA 'B/PA OL’1(PA Bz'j“A UNS/5A RLzH2IHPNA )(‘SI)(?(zPA I/A ?S’NA 'B2()A LzHA IPA I/A LH3LzPLD(BS/A IzA
at
Pu ch
/'B2A2I)('(//A'Iz1/“A
-?O)B3(/APN(AO()FB)?Lz’(ABFAU7–AIzA2I)('(//AL/A2(''AL/AIzA2I)(Az(P2B)1/“A
Te
g e
Fig. 3.5.5 : Example of TCP connection setup and release
io led
Advantage of transaction-oriented TCP
A X(HS’(AB3()N(LH“A
ic ow
UN(A?BRI'IPjAI/AzBA'BzD()AP)Lz/OL)(zP“A
-PAOB/(/A?LzjA/(’S)IPjA)I/1/“A
at
Pu ch
Q. What advantages does the use of IPV6 offer for mobility? (May 12, 5 Marks)
e
Ipv4
g
UN(A z(P2B)1A 'Lj()A O)BPB’B'A IzA PN(A U7–8-–A O)BPB’B'A /SIP(A I/A ’S))(zP'jA -–3^“A -–3^A O)B3IH(/A PN(A NB/PaPBaNB/PA
io led
’B??SzI’LPIBzAR(P2((zA/j/P(?/AIzAPN(A-zP()z(P“A-–3^ANL/A/B?(AH(FI’I(z’I(/APNLPA?L1(AIPASz/SIPLR'(AFB)APN(AFL/PAD)B2IzDA
-zP()z(P5AIz’'SHIzDAPN(AFB''B2IzD[A
V(/OIP(A L''A /NB)PA P()?A /B'SPIBz/5A /S’NA L/A /SRz(PPIzD5A ’'L//'(//A LHH)(//IzD5A LzHA 96U5A LHH)(//A H(O'(PIBzA I/A /PI''A LA 'BzDA
ic ow
P()?AO)BR'(?AIzAPN(A-zP()z(P“A
n
UN(A-zP()z(PA?S/PAL’’B??BHLP(A)(L'API?(ALSHIBALzHA3IH(BAP)Lz/?I//IBz“AUNI/APjO(ABFAP)Lz/?I//IBzA)(‘SI)(/A?IzI?S?A
bl kn
H('LjA/P)LP(DI(/ALzHA)(/()3LPIBzABFA)(/BS)’(/AzBPAO)B3IH(HARjA-–3^AH(/IDz“A
UN(A -zP()z(PA ?S/PA L’’B??BHLP(A (z’)jOPIBzA LzHA LSPN(zPI’LPIBzA BFA HLPLA FB)A /B?(A LOO'I’LPIBz/“A 9BA (z’)jOPIBzA B)A
at
Pu ch
LSPN(zPI’LPIBzAI/AO)B3IH(HARjA-–3^“A
Ipv6
Te
UBAB3()’B?(APN(/(AO)BR'(?/5A-–3_AL'/BA1zB2zAL/A-–zDA0-zP()z(PA–)BPB’B'Az(:PAD(z()LPIBz+A2L/AO)BOB/(H“AA
-zA-–3_5APN(A-zP()z(PAO)BPB’B'A2L/A(:P(z/I3('jA?BHIFI(HAPBAL’’B??BHLP(APN(AD)B2PNALzHAz(2AH(?LzH/ABFAPN(A-zP()z(P“AA
UN(AFB)?LPALzHAPN(A'(zDPNABFAPN(A-–ALHH)(//(/A2()(A’NLzD(HAL'BzDA2IPNAPN(AOL’1(PAFB)?LP“A
X('LP(HAO)BPB’B'/A/S’NAL/A-74–A2()(AL'/BA?BHIFI(H“AA
GPN()A O)BPB’B'/A IzA PN(A z(P2B)1A 'Lj()5A /S’NA L/A 6X–5A X6X–5A LzHA -g4–A 2()(A (IPN()A H('(P(HA B)A Iz’'SH(HA IzA -74–3_A
O)BPB’B'“AXBSPIzDAO)BPB’B'/A/S’NAL/AX-–ALzHAG;–QA2()(A/'IDNP'jA?BHIFI(HAPBAL’’B??BHLP(APN(/(A’NLzD(/“A
UN(AFL/PA/O)(LHIzDAS/(ABFA-zP()z(PALzHAz(2A/()3I’(/A/S’NAL/A?BRI'(A-–5A-–AP('(ONBzj5ALzHA-–a’LOLR'(A?BRI'(AP('(ONBzj5A
?LjA)(‘SI)(APN(APBPL'A)(O'L’(?(zPABFA-–3^ARjA-–3_“A
Advantages of IPv6
hU6x MK5Dv5x Kyy5v33x 3JKNvx VA 6zA -–3_A LHH)(//A I/A XWjA RIPA 'BzD“A 7B?OL)(HA 2IPNA PN(A YWA RIPA 'BzDA -–3^A LHH)(//iA PNI/A I/A NSD(A
Iz’)(L/(AIzALHH)(//A/OL’(“A
hUU6x WvLLv5x OvKyv5x L45EKLx VA -–3_A S/(/A LA z(2A N(LH()A FB)?LPA IzA 2NI’NA BOPIBz/A L)(A /(OL)LP(HA F)B?A PN(A RL/(A N(LH()A LzHA
Iz/()P(HA2N(zAz((H(H5AR(P2((zAPN(ARL/(AN(LH()ALzHAPN(ASOO()A'Lj()AHLPL“AUNI/A/I?O'IFI(/ALzHA/O((H/ASOAPN(A)BSPIzDA
O)B’(//AR(’LS/(A?B/PABFAPN(ABOPIBz/AHBAzBPAz((HAPBAR(A’N(’1(HARjA)BSP()/“A
hUUU6x Hv,xTJLU4f3xVA-–3_ANL/Az(2ABOPIBz/APBAL''B2AFB)ALHHIPIBzL'AFSz’PIBzL'IPI(/“A
hU/6x 2HH4,KfNvx L45x vFLvf3U4fx VA -–3_A I/A H(/IDz(HA PBA L''B2A PN(A (:P(z/IBzA BFA O)BPB’B'A IFA )(‘SI)(HA RjA z(2A P(’NzB'BDI(/A B)A
LOO'I’LPIBz/“A
Mobile Communication & Computing (MU-Sem. 7-Comp) 3-43 Mobile Networking
(v) Support for resource allocation : In IPv6, the type-of-service field has been removed, but mechanism called Flow
label has been added to enable the source to request special handling of packet. This mechanism can be used to
support traffic such as real-time audio and video.
(vi) Support for more security : The encryption and authentication options in IPv6 provide confidentiality and integrity of
the packet.
Features of Ipv6 to support mobility
No special mechanisms are needed for securing mobile IP registration. In every Ipv6 node address auto-configuration
i.e. the mechanism for acquiring a COA is inbuilt.
Neighbor discovery mechanism is also mandatory for every Ipv6 node. So special foreign agents are no longer needed
to advertise services.
Combining the features of address auto-configuration and neighbor discovery enable every Ipv6 mobile node to create
and obtain a topologically correct address or the current point of attachment.
e
Every Ipv6 node can send binding updates to another node, so the MN can send its COA directly to the CN and HA. The
FA is no longer needed. The CN processes the binding updates and makes corresponding entries in its routing cache.
The MN is now able to :
g
io led
o Decapsulate the packets
o Detect when it needs a new COA and
ic ow
Ipv6 Header
at
Pu ch
h/6x HvFLxOvKyv5xVAjARIP/“A;O(’IFI(/APN(Az(:PA(z’LO/S'LP(HAO)BPB’B'“AUN(A3L'S(/AL)(A’B?OLPIR'(A2IPNAPNB/(A/O(’IFI(HAFB)APN(A
-–3^AO)BPB’B'AFI('H“A
h/U6x O4JxMUEULxVAjARIP/ASz/IDz(H“AQB)A(L’NA)BSP()APNLPAFB)2L)H/APN(AOL’1(P5APN(ANBOA'I?IPAI/AH(’)(?(zP(HARjAX“ACN(zAPN(A
NBOA'I?IPAFI('HA)(L’N(/AV()B5APN(AOL’1(PAI/AHI/’L)H(H“AUNI/A)(O'L’(/APN(AUU*AFI('HAIzAPN(A-–3^AN(LH()APNLPA2L/AB)IDIzL''jA
IzP(zH(HAPBAR(AS/(HAL/ALAPI?(ARL/(HANBOA'I?IP“A
h/UU6x B4g5NvxKyy5v33xVAX_ARjP(/“AUN(A-–3_ALHH)(//ABFAPN(A/(zHIzDAzBH(“A
h/UUU6xxWv3LUfKLU4fxKyy5v33xVAX_ARjP(/“AUN(A-–3_ALHH)(//ABFAPN(AH(/PIzLPIBzAzBH(“A
Review Questions
e
Q. 3 Compare M-TCP and Snooping TCP.
g
Q. 4 Write a short note on DSR.
io led
Q. 5 Explain any two routing algorithms used for MANET.
Q. 6 Explain the errors in wireless networks that degrade the performance of TCP.
ic ow
Q. 8 Explain the errors in wireless networks that degrade the performance of TCP and how TCP snooping can improve the
performance.
at
Pu ch
Q. 9 Discuss the problems of using traditional TCP in wireless networks? Explain I-TCP.
Q. 10 What are the problems with IPv4 protocol? What advantages does IPv6 provide over IPv4?
Te
!!!
!
!
A
SS
S
S 4 Wireless Local Area Networks
S
Unit IV
S
S
Syllabus
4.1 Wireless Local Area Networks : Introduction, Infrastructure and ad-hoc network
4.2 IEEE 802.11:System architecture, Protocol architecture, Physical layer, Medium access control layer, MAC
management, 802.11a, 802.11b
4.3 Wi-Fi security : WEP, WPA, Wireless LAN Threats, Securing Wireless Networks
e
4.4 HIPERLAN 1 and HIPERLAN 2
g
4.5 Bluetooth : Introduction, User Scenario, Architecture, protocol stack
io led
S
Introduction
ic ow
M,PRSU,ymE80SP2E01H/U8RSy21E,80SUFyRRS1CSBP08F8RRS28EB10xSE8U,21F1qP8RSUyFF8HS-P08F8RRSO1UyFSz08ySD8EB10xRS4-OzDR’jS
32S U12E0yRES E1S E,8S E8U,21F1qP8RS H8RU0P58HS P2S E,8S m086P1/RS U,ymE80RS R/U,S yRS 7:Y–S 7+K:–S QYM:S 8EUjS -OzDRS y08S EJmPUyFFJS
n
08RE0PUE8HSP2SE,8P0SHPy98E80SE1S5/PFHP2qR–SySUy9m/RS10SySRP2qF8S0119Sy2HSy08S1m80yE8HS5JSP2HP6PH/yFRSy2HS21ES5JSFy0q8SRUyF8S
bl kn
28EB10xSm016PH80RjSM,8S9yP2Sq1yFS1CS-OzDSPRSE1S08mFyU8S1CCPU8SUy5FP2q–SE1S82y5F8SE8E,80F8RRSyUU8RRSE1SE,8S32E8028ESy2HSE1S
yFF1BS yHS ,1US U199/2PUyEP12jS M,8S U,ymE80S HPRU/RR8RS 6y0P1/RS -OzDS E8U,21F1qP8RS R/U,S yRS 3………S V;"j‘‘–S X3+…KOzD“‘S y2HS
at
X3+…KOzD“"jS”10S8yU,S-OzDSRJRE89–SE,8SH8EyPFRS1CSy0U,PE8UE/08–SE,8Sm,JRPUyFSFyJ80Sy2HSYz'SFyJ80S,y68S5882SHPRU/RR8HjS
Pu ch
K89yP2H80S 1CS E,8S U,ymE80S C1U/R8RS 12S —F/8E11E,S E8U,21F1qJS y2HS U19my0PR12S 1CS yFFS 1CS E,8S y5168S 982EP128HS -OzDS
E8U,21F1qP8RjS
Te
4R5 CvLhqQqvqMN5I5-PE,P2S0yHP1SU1680yq8–SyS/R80SUy2S8yRPFJSU199/2PUyE8SBPE,1/ESy2JS08RE0PUEP12jS5
kR5 -qE8vq0qLP58vHYYqYD5I5-P08F8RRSyHZ,1US28EB10xRSH1S21ES08µ/P08Sy2JSmFy22P2qSC10SU12CPq/0P2qSyS28EB10xj5
GR5 zWvEjTM/5Yj56q7qYD5Pq00q9OvMqLT5I5—8Uy/R8S21SBP0P2qSPRS08µ/P08H–SPESUy2S58S8yRPFJSP2REyFF8HSB,808SBP0P2qSPRSHPCCPU/FESS
5 48jqjS,PRE10PUS5/PFHP2qR–SCP08ByFFR’j5
,R5 VjQOTM5I5-P08F8RRSOzDSPRS9108S015/RESyqyP2RESHPRyRE80RSFPx8–S8jqj–S8y0E,µ/yx8R–SCP08–S10S/R80RSm/FFP2qSySmF/qjSS
UR5 XjTM5L00L9MqKL5I5<2U8SySBP08F8RRS28EB10xSPRSP2REyFF8H–SyHHP2qS28BSyHHPEP12yFS/R80SBPFFS21ESP2U08yR8SC/0E,80SU1REjSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-2 Wireless Local Area Networks
4R5 Bj6L75 QHYP6qPMF5 HYP5 M7HYTEqTTqjY5 GOHvqMN5 IS -P08F8RRS OzDS 1CC80RS KL7N5 vj65 QHYP6qPMFS 4‘Z‘;S Y5PE“R’S U19my08HS E1S
BP08HS28EB10xRSH/8SE1SR,y08HS98HP/9jSzFR1SPES,yRS,Pq,S80010S0yE8RSH/8SE1SP2E80C8082U8jSX82U8SPES1CC80RSvj65Hj-SyRS
U19my08HSE1SBP08HS28EB10xjS
kR5 IHYN587j87qLMH7N5TjvOMqjYT58=PRE–SH/8SE1SRF1BSREy2Hy0HPVyEP12Sm01U8H/08j5
GR5 Bj9Hv5 7LDOvHMj7N5 7LTM7q9MqjYT5 I5 :8680yFS U1/2E0P8RS P9m1R8S HPCC8082ES Rm8UE0yFS 08RE0PUEP12RjS W/8S E1S E,PRS PES PRS HPCCPU/FES E1S
8REy5FPR,SqF15yFS-OzDSR1F/EP12RjS
,R5 Bj6L75 TH0LMN5 HYP5 TL9O7qMN5 IS S :8U/0PEJS U12U802RS y08S ,Pq,S P2S BP08F8RRS 28EB10xRjS M,8S 1m82S 0yHP1S P2E80CyU8S 9yx8RS
8y68RH01mmP2qS9/U,S8yRP80SP2S-OzDRSE,y2SBP08HS28EB10xjSS
e
—yR8HS12SE,8S28EB10xSU12CPq/0yEP12–SBP08F8RRSOzDRSUy2S58SUFyRRPCP8HSP2E1SEB1SUyE8q10P8RjS
g
‘jS 32C0yRE0/UE/08S5yR8HSBP08F8RRS28EB10xRS
io led
S "jS zHS,1USBP08F8RRS28EB10xRS
!
z2SP9m10Ey2ES8F8982ES1CSE,PRSEJm8S1CS28EB10xSPRSzUU8RRSm1P2ES4z+’jS
n
z+Sm016PH8RSy2SP2E80CyU8S58EB882SE,8SBP08F8RRSE809P2yFRSy2HSBP08HS28EB10xSP2C0yRE0/UE/08jS
bl kn
X808SBP08F8RRS21H8RSU199/2PUyE8SBPE,S8yU,S1E,80S6PySy2SyUU8RRSm1P2EjSS
zFFS E,8S 28EB10xS U12E01FS m01U8H/08RS FPx8S 98HP/9S yUU8RRS U12E01F–S RJ2U,012PVyEP12–S m1B80S 9y2yq8982ES ,yRS 5882S
at
Pu ch
H128S5JSE,8Sz+jSS
”PqjSXj‘j‘SR,1BRSE,088SyUU8RRSm1P2ERSBPE,SE,088SBP08F8RRS28EB10xRSy2HSySBP08HS28EB10xjS
Te
M,8S H8RPq2S 1CS P2C0yRE0/UE/08S 5yR8HS BP08F8RRS 28EB10xS PRS 680JS RP9mF80S E,y2S yHZ,1US 28EB10xRjS :P2U8S z+S m80C109RS
91RES1CSE,8SE0y2R9PRRP12SU12E01FSm01U8H/08R–SE,8SU19mF8=PEJS1CSP2HP6PH/yFS21H8SPRSF8RRjS
32C0yRE0/UE/08S 5yR8HS BP08F8RRS 28EB10xS PRS F8RRS CF8=P5F8jS ”10S 8=y9mF8–S P2S E,8S UyR8S 1CS HPRyRE80S E,8JS Uy221ES 58S /R8HS
B,82S21SP2C0yRE0/UE/08SPRSF8CEjSS
”10S…=y9mF8–5'8FF/Fy0Sm,128S28EB10xjS
g e
io led
Fig. 4.1.2 : Ad-hoc wireless networks
32SyHS,1US28EB10xR–S21H8RSUy2S12FJSU199/2PUyE8SB,82SE,8JSy08SBPE,P2S8yU,S1E,80YRS0yHP1S0y2q8S10SPCS1E,80S21H8RS
ic ow
Uy2SC10By0HSE,8S98RRyq8jS
3ES1CC80RS,Pq,80SCF8=P5PFPEJSyRSE,8R8S28EB10xRSUy2S58SP2REyFF8HSP2REy2EFJSBPE,1/ES288HS1CSy2JSP2C0yRE0/UE/08jSS
n
bl kn
4.1.3 Difference between Ad-hoc Network and Infrastructure based Wireless Networks
at
MU – Dec. 15
Pu ch
Q. Explain Difference between Ad-hoc Network and Infrastructure based Wireless Networks. (Dec. 15, 5 Marks)
Te
‘jS W86PU8RS 12S E,PRS EJm8S 1CS 28EB10xS yFFS U199/2PUyE8S zHZ,1US 28EB10xRS H12YES 08µ/P08S yS U82E0yFPV8HS yUU8RRS
E,01/q,SySRP2qF8SyUU8RRSm1P2E–SB,PU,SPRSq8280yFFJSE,8S m1P2EjS32RE8yH–SH86PU8RS12SE,8SBP08F8RRS28EB10xSU1228UES
BP08F8RRS01/E80jS HP08UEFJSE1S8yU,S1E,80jS
"jS 32C0yRE0/UE/08S 91H8S PRS PH8yFS PCS R8EEP2qS /mS yS 9108S zHZ,1US91H8SUy2S58S8yRP80SE1SR8ES/mSPCSJ1/SZ/RESBy2ESE1S
m809y282ES28EB10xjSS U1228UESC8BSH86PU8RSE1S8yU,S1E,80SBPE,1/ES08µ/P0P2qSyS
U82E0yFPV8HSyUU8RRSm1P2EjS
\jS M,8S H8RPq2S 1CS P2C0yRE0/UE/08S 5yR8HS 28EB10xS PRS '19mF8=PEJS 1CS P2HP6PH/yFS 21H8S P2S yHS ,1US 28EB10xRS PRS
RP9mF80SE,y2SyHS,1US28EB10xR–SRP2U8Sy2SyUU8RRSm1P2ES ,Pq,80S 58Uy/R8S yFFS 28EB10xS C/2UEP12yFPEJS R/U,S yRS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-4 Wireless Local Area Networks
]jS 32C0yRE0/UE/08S 5yR8HS BP08F8RRS 28EB10xS PRS F8RRS 3ES 1CC80RS ,Pq,80S CF8=P5PFPEJS yRS E,8R8S 28EB10xRS Uy2S 58S
CF8=P5F8jS ”10S 8=y9mF8–S P2S UyR8S 1CS HPRyRE80–S E,8JS P2REyFF8HSP2REy2EFJSBPE,1/ES288HS1CSy2JSP2C0yRE0/UE/08jS
Uy221ES58S/R8HSB,82S21SP2C0yRE0/UE/08SPRSF8CEjS
e
g
KNNN5OPkR44SPRSySR8ES1CSREy2Hy0HRSC10SP9mF8982EP2qSBP08F8RRSF1UyFSy08yS28EB10xS4-OzD’SP2S"jX–S[j]Sy2HS\S7XVSC08µ/82UJS
5y2HRjSS
io led
M,8JSy08SU08yE8HSy2HS9yP2EyP28HS5JSE,8S3………SOzD“YzDS:Ey2Hy0HRS'199PEE88S43………SV;"’jS
3………SV;"j‘‘SP2E01H/U8HS6y0P1/RS680RP12RS1CSV;"j‘‘SZSV;"j‘‘y–SV;"j‘‘5–SV;"j‘‘q–S8EUjSSS
ic ow
M1S 9yP2EyP2S P2E801m80y5PFPEJ–S E,PRS REy2Hy0HS /R8RS E,8S Ry98S P2E80CyU8S yRS E,8S 1E,80RS E1S ,Pq,80S FyJ80R–S 5/ES Rm8UPCP8RS E,8S
8FNTq9Hv5vHNL7Sy2HSELPqOE5H99LTT5vHNL7SyHymE8HSE1SE,8SRm8UPyFS08µ/P08982ES1CSBP08F8RRSOzDRjS
n
4.2.1 IEEE 802.11 System Architecture
bl kn
at
3………SV;"j‘‘SOzDRSUy2S58SU12CPq/08HSyRSP2C0yRE0/UE/08S5yR8HS28EB10xS10SyRSyHS,1US28EB10xRjS
Pu ch
”Pqj5Xj"j‘SR,1BRSE,8Sy0U,PE8UE/08S1CS3………SV;"j‘‘SP2C0yRE0/UE/08S5yR8HS28EB10xjS
M,8S5yRPUS5/PFHP2qS5F1UxS1CS3………SV;"j‘‘Sy0U,PE8UE/08SPRSE,8S—yRPUS:806PU8S:8ES4—::’jS
M,8SREyEP12RSy2HSyUU8RRSm1P2ESB,PU,Sy08SBPE,P2SE,8SRy98S0yHP1SU1680yq8SC109SyS—yRPUS:806PU8S:8ES4—::’jS
zFFSREyEP12RSBPE,P2SyS—::SU199/2PUyE8SBPE,SE,8SRy98SyUU8RRSm1P2ESy2HSU19m8E8SC10SR,y08HS98HP/9jS
zUU8RRSm1P2ESUy2S58SU1228UE8HSE1S1E,80SyUU8RRSm1P2ERS6PySHPRE0P5/EP12SRJRE89jS
Station (STA)
M,8SREyEP12SPRSySBP08F8RRS21H8Sy2HSPESPRSU1228UE8HSE1Sy2SyUU8RRSm1P2EjS5
zFFSREyEP12RSy08S8µ/Pmm8HSBPE,SBP08F8RRS28EB10xSP2E80CyU8SUy0HRS4-D3'R’Sy2HSU12EyP2SE,8SC/2UEP12yFPEP8RS1CSE,8SV;"j‘‘S
m01E1U1FjS
-P08F8RRSREyEP12SUy2S58S915PF8SH86PU8RSR/U,SyRSFymE1mR–Sm80R12yFSHPqPEyFSyRRPREy2ER–S3+Sm,128RSy2HS1E,80SR9y0ESm,128R–S
e
10SCP=8HSH86PU8RSR/U,SyRSH8RxE1mRSy2HSB10xREyEP12RSE,yESy08S8µ/Pmm8HSBPE,SySBP08F8RRS28EB10xSP2E80CyU8jS
g
Access Point (AP)
io led
zUU8RRSm1P2ERS4z+R’Sy08S5yR8SREyEP12RSC10SE,8SBP08F8RRS28EB10xjSS
MB1SE809P2yFRSP2SE,8SRy98S—::SU199/2PUyE8S6PySz+jSS
ic ow
z+YRSC/2UEP12RSy08S_S
n
‘jS :/mm10ERS01y9P2qS4Pj8jSU,y2qP2qSyUU8RRSm1P2ER’S
bl kn
"jS +016PH8RSRJ2U,012PVyEP12SBPE,P2SyS—::S
[jS :/mm10ERSm1B80S9y2yq8982ESS
at
Pu ch
XjS 'y2SU12E01FS98HP/9SyUU8RRSE1SR/mm10ESEP98S51/2H8HSR806PU8RS
zSR8ES1CSU1228UE8HS—::RSE1q8E,80SC109S…::S4z2S…=E82H8HS:806PU8S:8ES4…::’’S
zUU8RRSm1P2ERSP2Sy2S…::Sy08SU1228UE8HS5JSySHPRE0P5/EP12SRJRE89jSS
…yU,S…::S,yRSy2S3WSUyFF8HSE,8S…::3WSB,PU,SPRSyS["Z5JE8S49y=P9/9’SU,y0yUE80SRE0P2qjS
Portal
3ESyUERSyRSy2SP2E8028ESB10xP2qS/2PESE1SU1228UES1E,80SOzDRjS
Distribution System (DS)
zS HPRE0P5/EP12S RJRE89S B10xRS yRS yS 5yUx5128S 28EB10xS y2HS ,y2HF8RS HyEyS E0y2RC80S 58EB882S HPCC8082ES z+YRjS 3ES U1228UERS
R8680yFS—::YRS6PySz+YRSE1Sm10EyFSE,/RSC109P2qSySRP2qF8S28EB10xjS
M,8SW:SPRS21ES08yFFJSE,8Smy0ES1CS3………V;"j‘‘SREy2Hy0HjS
M,8SW:SU1/FHSU12RPRES1CS50PHq8HS3………SOzDSBP08F8RRSFP2xRS10Sy2JS1E,80S28EB10xjS
32SyHZ,1USBP08F8RRS28EB10xR–SE,808Sy08S128S10S9108SP2H8m82H82ES—::RS43—::’SyRSR,1B2SP2S”PqjSXj"j"jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-6 Wireless Local Area Networks
e
Fig. 4.2.2 : Architecture of IEEE 802.11 ad-hoc wireless LAN
g
3—::SU19m0PR8RSySq01/mS1CSREyEP12RS/RP2qSE,8SRy98S0yHP1SC08µ/82UJjS”10S8=y9mF8–SyRSR,1B2SP2S”PqjSXj"j"S:Mz!–S:Mz"–Sy2HS
io led
:Mz#Sy08SP2S3—::!–SB,808SyRS:Mz$Sy2HS:Mz%&P2S3—::"jSM,PRS98y2–S:Mz"SUy2SU199/2PUyE8SHP08UEFJSBPE,S:Mz#S5/ES21ESBPE,S:Mz$jSS
4.2.2 IEEE 802.11 Protocol Architecture
(MU – May 13)
ic ow
zRSR,1B2SP2S”PqjSXj"j[Sy2SV;"j‘‘SBP08F8RRSOzDSU1228UE8HSE1SySRBPEU,8HS3………SV;"j[S…E,8028ES6PySyS50PHq8S4zUU8RRSm1P2E’jS
M,8S,Pq,80SFyJ80RS4zmmFPUyEP12–SM'+–S3+’S1CSBP08F8RRS21H8SB10xRSRy98SyRSBP08HS21H8jSS
at
M,8S /mm80S my0ES 1CS HyEyS FP2xS U12E01FS FyJ80S Pj8jS F1qPUyFS FP2xS U12E01FS 4OO'’S U1680RS E,8S HPCC8082U8RS 1CS E,8S 98HP/9S yUU8RRS
Pu ch
U12E01FSFyJ80RS288H8HSC10SHPCC8082ES98HPyjSS
3………SV;"j‘‘SREy2Hy0HS12FJSU1680RSE,8SRm8UPCPUyEP12S1CS8FNTq9Hv5vHNL75HYP5IWX5vHNL7RS
Te
e
+01E1U1FSy0U,PE8UE/08SPRSR,1B2SP2S”PqjSXj"jXS_S
g
o M,8SQBXQSR/5SFyJ80Sm016PH8RSS
io led
S 4y’S zSUy00P80SR82R8SRPq2yF–SUyFF8HSUF8y0SU,y228FSyRR8RR982ES4''z’SSS
S 45’S zSU19912S+X`SR806PU8SyUU8RRSm1P2ES4:z+’S
o
ic ow
M,8SQITSR/5SFyJ80S,y2HF8RSS
S 4y’S Y1H/FyEP12SS
n
bl kn
S 45’S …2U1HP2q“H8U1HP2qS1CSRPq2yFRS
MAC layer
at
Pu ch
M,8S5yRPUSEyRxRS1C5IWX5FyJ80S_S
4y’S Y8HP/9SyUU8RRS
Te
45’S ”0yq982EyEP12S1CS/R80SHyEyS
4U’S …2U0JmEP12S1CS/R80SHyEyS
MAC management
MyRxRS1CSYz'SYy2yq8982ES_S
4y’S :/mm10ERSE,8SyRR1UPyEP12Sy2HS08ZyRR1UPyEP12S1CSySREyEP12SE1Sy2SyUU8RRSm1P2ES
45’S K1y9P2qS58EB882SHPCC8082ESyUU8RRSm1P2ERS
4U’S '12E01FRSy/E,82EPUyEP12S98U,y2PR9RS
4H’S …2U0JmEP12S
48’S :J2U,012PVyEP12S1CSySREyEP12SBPE,S08qy0HSE1Sy2SyUU8RRSm1P2ESSS
PHY management
MyRxRS1CS+X`S9y2yq8982ES_SS S
4y’S ',y228FSE/2P2qS
45’S +,JRPUyFSY3—S9yP2E82y2U8SS
4U’S :EyEP12S9y2yq8982ES
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-8 Wireless Local Area Networks
Q. Discuss the PHY frame format of an IEEE 802.11 using the spread spectrum technique, which separates by code.
(Dec. 14, 10 Marks)
e
M,PRSEJm8S1CSm,JRPUyFSFyJ80S/R8RS0yHP1SBy68SC10SE0y2R9PRRP12j5
g
zRSE,8S2y98SR/qq8RER–SPES/R8RSHP08UESR8µ/82U8SRm08yHSRm8UE0/9SE8U,2Pµ/8j5
io led
3………SV;"j‘‘SW:::SRm08yHRSE,8SRPq2yFS5JS/RP2qS‘‘S5PES5y0x80SU1H8SS4bS‘–SaS‘–SbS‘–SbS‘–SaS‘–SbS‘–SbS‘–SbS‘–SaS‘–SaS‘–SaS‘’jSS
3ESyFR1S/R8RSkR,5URVS3:YS5y2HS4Ry98SyRS”X::’Sy2HS1CC80RS51E,S‘SY5PE“RSy2HS"SY5PE“RSHyEyS0yE8jS
3ES/R8RSWPCC8082EPyFS—P2y0JS+,yR8S:,PCESc8JP2qS4W—+:c’SC10S‘SY5PE“RSE0y2R9PRRP12Sy2HSWPCC8082EPyFSd/yH0yE/08S+,yR8S:,PCES
ic ow
c8JP2qS4Wd+:c’SC10S"SY5PE“RjS
Yy=P9/9SE0y2R9PESm1B80SPRS‘-S4P2SE,8SQ:’–S‘;;9-S…3K+SP2SE,8S…/01m8Sy2HS‘;9-“YXVSP2Seymy2jSS
n
bl kn
M,8SRJ951FS0yE8SPRS‘SYXVSy2HSU,PmmP2qS0yE8SPRS‘‘SYXVjS
39mF8982EyEP12SPRSHPCCPU/FEjS
at
Pu ch
+016PH8RSyS58EE80SU1680yq8Sy2HSyS9108SREy5F8SRPq2yFS4F8RRSP2E80C8082U8Sy2HSF8RRS9/FEPmyE,Sm01myqyEP12’jS
Frame structure of DS-SS physical layer
Te
78280yFSmyUx8ESR82ES1680SE,8SU,y228FSU12RPRERS1CSE,088Smy0ERS_SM,8S+O'+Sm08y95F8–SM,8S+O'+S,8yH80Sy2HSE,8S+yJF1yHS
R,1B2SP2S”PqjSXj"j\jS
Fig. 4.2.5 : IEEE 802.11 DS-SS PLCP Physical layer packet format
M,8SW:Z::S+,JRPUyFSFyJ80S+O'+SmyUx8ESC109yES1CS3………SV;"j‘‘SPRSR,1B2SP2S”PqjSXj"j\jSS
M,8S+O'+Smy0ESPRSyFByJRSE0y2R9PEE8HSyESE,8S0yE8S1CS‘SY5PE“RjSS
+yJF1yHSUy2S58SE0y2R9PEE8HSyES8PE,80S‘S10S"SY5PE“RSH8m82HP2qS/m12SE,8S91H/FyEP12SE8U,2Pµ/8S/R8HjS
S M,8SCP8FHRS1CSySC0y98S,y68SE,8SC1FF1BP2qSC/2UEP12RjS
o -NY9F7jYqVHMqjY5I53ESPRSyS‘"VS5PESCP8FHS4yFE802yEP2qS;Sy2HS‘’S/R8HSC10SRJ2U,012PVyEP12–SqyP2SR8EEP2q–S8280qJSH8E8UEP12–S
y2HSC10SC08µ/82UJS1CCR8ESU19m82RyEP12jSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-9 Wireless Local Area Networks
o -MH7M5 07HEL5 PLvqEqML75 z-TC/5 I5 M,PRS CP8FHS P2HPUyE8RS E,8S REy0EP2qS 1CS yS C0y98S y2HS U12RPRES E,8S myEE802S
‘‘‘‘;;‘‘‘;‘;;;;;jS
o -qDYHv5I5M,PRSCP8FHSP2HPUyE8RSE,8SHyEyS0yE8S1CSE,8SmyJF1yHjSM,8S6yF/8S;=;zSPRSC10S‘SY5PE“RSy2HS;=‘XSPRSC10S"SY5PER“R–S
1E,80S6yF/8RSy08S08R8068HSC10SC/E/08S/R8jS
o -L7Kq9L5I5M,PRSCP8FHSPRS08R8068HSC10SC/E/08S/R8jSS
o BLYDMF5I5M,PRS‘]S5PESCP8FHSPRS/R8HSE1SP2HPUyE8SE,8SF82qE,S1CSySmyJF1yHSP2S9PU01R8U12HRjS
o RLHPL75N77j75XFL9L5zRNX/5I5X…'SPRS/R8HSE1Sm01E8UES+O'+S,8yH80jS
M,8S+O'+Smy0ES1CSE,8SmyUx8ESPRSC1FF1B8HS5JSE,8SmyJF1yHSUy00JP2qSYz'SmyUx8ESHyEyS/2PES4Y+WQ’S1CSE,8SF82qE,S58EB882S‘S
E1S";XVS1UE8ERjS
32RE8yHS1CS‘‘a5PES—y0x80SU1H8SymmFP8HSBPE,SW—+:cS10SWd+:cS91H/FyEP12–SE,8S'19mF8982Ey0JS'1H8Sc8JP2qS4''c’SUy2S
58S/R8HSE1SyU,P868S,Pq,80SHyEyS0yE8RS1CS\j\S10S‘‘SY5PE“RjS
M,8SW:Z::S680RP12S1CSE,8Sm,JRPUyFSFyJ80S82R/08RS,Pq,SHyEyS0yE8Sy2HS,Pq,S0y2q8–S5/ESPRSU1REFP80SE,y2S”XZ::SE8U,2Pµ/8SH/8S
e
E1SE,8S,Pq,SU1RES1CSW:ZK”SU19m1282ERjSY108S1680SW:ZK”SU19m1282ERSyFR1S/R8S9108Sm1B80jS
g
4.2.3(b) Frequency Hopping Spread Spectrum Physical Layer (FHSS – PHY)
io led
M,PRSEJm8S1CSm,JRPUyFSFyJ80S/R8RS0yHP1SBy68SC10SE0y2R9PRRP12j5
zRSE,8S2y98SR/qq8RER–SPES/R8RSC08µ/82UJS,1mmP2qSRm08yHSRm8UE0/9j5
ic ow
'19my08HSE1SW:Z::Sm,JRPUyFSFyJ80–S”XZ::Sm,JRPUyFSFyJ80Sm016PH8RS,Pq,SHPRE10EP12SP99/2PEJ–S,Pq,SRJRE89SUymyUPEJ–SF1BS
m1B80S/R8Sy2HS/R8RSF1BSU1RESK”SU19m1282ERj5
n
3ESyFR1S/R8RSE,8SkR,5URVS3:YS5y2HjS
bl kn
+016PH8RS5y2HBPHE,S1CS4IRVjS
at
3ES/R8RS7y/RRPy2S”08µ/82UJS:,PCESc8JP2qS47”:c’SC10S91H/FyEP12jS
Pu ch
"ZF868FS 7”:cS PRS /R8HS C10S ‘S Y5PE“RS 4‘S 5PES PRS 9ymm8HS 12S 128S C08µ/82UJ’jS XZF868FS 7”:cS PRS /R8HS C10S "S Y5PE“RS 4"S 5PERS y08S
9ymm8HS12S128SC08µ/82UJ’jS
Te
<m80yEP12SyES‘SY5PE“RSPRS9y2HyE10JSB,PF8SyES"SY5PE“RSPRS1mEP12yFjS
^fSX1mmP2qSU,y228FRSC10SD10E,Sz980PUySy2HS…/01m8Sy2HS"[S,1mmP2qSU,y228FRSC10Seymy2jS
Yy=P9/9SE0y2R9PESm1B80SPRS‘S-“YXVSP2SQ:–S‘;;S9-S…3K+SP2S…/01m8Sy2HS‘;9-“YXVSP2Seymy2jS
”X::SPRS8yRP80SE1SP9mF8982EjS
Frame structure of FH-SS Physical layer
”PqjSXj"j]SR,1BRSE,8SC0y98SRE0/UE/08S1CSE,8Sm,JRPUyFSFyJ80SBPE,S”XZ::S+X`jS
M,8SC0y98SU12RPRERS1CSE,088S5yRPUSmy0ERS_SE,8S+O'+Sm08y95F8–S+O'+S,8yH80Sy2HSE,8SmyJF1yHSmy0EjSS
Fig. 4.2.6 : IEEE 802.11 FH-SS PLCP Physical layer packet format
S
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-10 Wireless Local Area Networks
M,8SCP8FHRS1CSySC0y98Sy08SyRSC1FF1BRS_S
4R5 -NY9F7jYqVHMqjY5I5M,PRSmyEE802SPRS/R8HSC10SE,8SRJ2U,012PVyEP12S1CSE,8S08U8P680RSy2HSRPq2yFSH8E8UEP12S5JSE,8S''zS4'F8y0S
',y228FSyRR8RR982E’jS3ESPRSV;S5PESCP8FHSB,PU,SPRSyS;‘;‘;‘;‘;gjS—PESmyEE802jS
kR5 -MH7M507HEL5PLvqEqML75z-CT/5I5M,PRSPRSyS‘]S5PESCP8FHSP2HPUyE8RSE,8SREy0ES1CSC0y98Sy2HSm016PH8RSC0y98SRJ2U,012PVyEP12jSM,8S
myEE802S1CS:”WSPRS;;;;‘‘;;‘;‘‘‘;‘jS
GR5 QH9LLM5vLYDMF56j7P5zQBW/5I5M,8S‘"S5PESmyUx8ESF82qE,SBPHE,SR,1BRSE,8SF82qE,S1CSE,8SmyJF1yHjSM,8SF82qE,S1CSySmyUx8ES
U1/FHS58S/mSE1SXxS5JE8RjS
,R5 QBXQ5 TqDYHvqYD5 0qLvP5 zQ-C/5 I5XS 5PES +:”S CP8FHS Rm8UPCP8RS E,8S HyEyS 0yE8S 1CS E,8S myJF1yHS C1FF1BP2qjS 3CS yFFS 5PERS y08S R8ES E1S V801S
4;;;;’SPES98y2RSE,8SF1B8RESHyEyS0yE8S4‘SY5PE“R’jS"SY5PE“RSHyEyS0yE8SPRS08m08R82E8HS5JS;;‘;S5PESR8µ/82U8jSYy=P9/9S
HyEyS0yE8SVj\SY5PER“RSPRS08m08R82E8HS5JS‘‘‘‘jS
UR5 RLHPL75 L77j75 9FL9L5 zRNX/5 I5 ‘]S 5PES X”'S PRS yHH8HS E1S m01E8UES E,8S +O'+S ,8yH80jS 3ES Uy2S 08U1680S 80010RS 1CS /mS E1S "S 5PER–S
e
1E,80BPR8SPH82EPCJSB,8E,80S+O'+S5PERSy08SU100/mE8HjS
g
4.2.3(c) Infra Red Physical Layer
io led
M,8Sm,JRPUyFSFyJ80S/R8RS!"#$%&$'(SC10SE0y2R9PRRP12jS
WPqPEyFSRPq2yFRSy08SR82ES/RP2qSP2C0yS08HS0yJRS1CSE,8SBy68SF82qE,SV\;Zf\;29S0y2q8Sy2HS+/FR8S+1RPEP12SY1H/FyEP12S4++Y’jS
ic ow
MB1SHyEyS0yE8R–S‘Sy2HS"SY5PE“RS,y68S5882SREy2Hy0HPV8HjSS
o
n
”10S‘SY5PE“RSHyEyS0yE8–SE0y2R9PEE8HS5PERSy08Sq01/m8HSP2SXZ5PES5F1UxRSy2HS‘]Z++YSPRSymmFP8HjS
o
bl kn
”10S"SY5PE“R–SE,8SHyEySRE08y9SPRSHP6PH8HSP2E1S"Z5PES5F1UxRSy2HSXZ++YSPRSymmFP8HjS
Frame structure of Infra red physical layer
at
Pu ch
M,8S+O'+SmyUx8ESC109yES1CS32C0yS08HSm,JRPUyFSFyJ80S,yRS5882SR,1B2SP2S”PqjSXj"j^jS
Te
Fig. 4.2.7 : IEEE 802.11 Infrared PLCP Physical layer packet format
X808S E,8S CP8FHS TX5 vLKLv5 HPXOTMELYMS U12EyP2RS myEE802S B,PU,S 82y5F8RS E,8S 08U8P6P2qS REyEP12S E1S R8ES E,8S W'S F868FS 1CS E,8S
RPq2yFjS
M,8S3KSP2E80CyU8SPRSE,8SU,8ym8RES1CSyFFSV;"j‘‘Sm,JRPUyFSP2E80CyU8RjSS
3ESH18RS21ES288HSy2JSC08µ/82UJS08q/FyEP12RjS
3ESPRS08RPREy2ESE1S8y68RH01mmP2qjS—/ESPES,yRSF1B80SU1680yq8jS
zRS 32C0yS 08HS FPq,ES P2E80C808RS BPE,S 1E,80S 08R1/0U8RS FPx8S R/2FPq,ES 10S ,8yES R1/0U8RS 8EUjS R/U,S 28EB10xRS Uy2S 12FJS 58S /R8HS
BPE,P2S5/PFHP2qR–S8jqjSUFyRR0119R–S988EP2qS,yFF–SU12C8082U8S,yFFS8EUjS
”08µ/82UJS08/R8SPRS680JSRP9mF8jSM,8SRy98SC08µ/82UJSUy2S58S/R8HSP2SHPCC8082ESUFyRR0119RjS
S
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-11 Wireless Local Area Networks
M,8SYz'SFyJ80S08Rm12RP5PFPEP8RSy08SHP6PH8HS58EB882SYz'SR/5SFyJ80Sy2HSYz'SFyJ80S9y2yq8982ESR/5SFyJ80jSS
K8Rm12RP5PFPEP8RS1CSYz'SR/5SFyJ80S_S
o M1S,y2HF8SyUU8RRS98U,y2PR9S
o W8CP28SyHH08RRP2qSy2HSC0y98SC109yES
K8Rm12RP5PFPEP8RS1CSYz'SFyJ80S9y2yq8982ESR/5SFyJ80S_S
o K1y9P2qSP2SE,8SW::S
o +1B80S9y2yq8982ES
o z/E,82EPUyEP12S
o :8U/0PEJS
g e
io led
ic ow
Q. Explain IEEE 802.11 MAC frame format in detail. (May 14, 10 Marks)
”PqjSXj"jfSR,1BRSE,8Sq8280yFSYz'SC0y98SC109yES1CS3………SV;"j‘‘jS
Te
4R5 C7HEL59jYM7jv5I5M,PRSCP8FHSUy00P8RSE,8SP2RE0/UEP12RS12SE,8S2yE/08S1CSE,8SmyUx8EjS3ESHPREP2q/PR,8RSHyEySC019SU12E01FSy2HS
9y2yq8982ESC0y98RjS”0y98SU12E01FSU12EyP2RSR8680yFSR/5ZCP8FHRjS
kR5 Q7jMj9jv5KL7TqjY5IS:,1BRSE,8SU/0082ESm01E1U1FS680RP12Sy2HSPRSCP=8HS5JS;jS
GR5 YN8L5ISW8E809P28RSE,8SC/2UEP12RS1CSySC0y98_S9y2yq8982ES4;;’–SU12E01FS4;‘’Sy2HSHyEyS4‘;’jSM,8S6yF/8S‘‘SPRS08R8068HjS
,R5 -OQMN8L5IShyF/8RS;;;;SC10SyRR1UPyEP12S08µ/8RE–S‘;;;SC10S58yU12–S‘;‘‘SC10SKM:SU12E01FSC0y98–S‘‘;;SPRSC10S'M:SC0y98jS
QR80SHyEySE0y2R9PERSBPE,S;;;;SR/5EJm8jS
UR5 Yj5T-ZC7jE5T-5ISQR8HSE1SU12E01FS98y2P2qS1CSE,8SyHH08RRSCP8FHSP2SE,8SYz'SC0y98jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-12 Wireless Local Area Networks
[R5 Ij7L5 07HDELYMT5 IS hyF/8S ‘S 08m08R82ERS E,yES E,808S y08S 9108S HyEyS 10S 9y2yq8982ES C0yq982ERS 1CS E,8S U/0082ES Y:WQS E1S
C1FF1BjS
\R5 VLM7N5ISM,PRSCP8FHSPRSR8ESE1S‘SPCSE,8SC0y98SPRSE,8S08E0y2R9PRRP12S1CSm086P1/RSC0y98jSS
OR5 Qj6L75EHYHDLELYM5I5hyF/8S‘SP2HPUyE8RSE,8SREyEP12Sq18RSP2Sm1B80SRy68S91H8–S;S08m08R82ERSE,8SREyEP12S089yP2RSyUEP68jS
]R5 Ij7L5PHMH5ISM,PRSCP8FHSP2HPUyE8RSyS08U8P680SE,yESR82H80S,yRS9108SHyEySE1SR82HSE,y2SE,8SU/0082ESC0y98jS
4PR5 Wq7LP5NGOqKHvLYM5Q7qKH9N5zWNQ/5IS32HPUyE8RSE,yESE,8SREy2Hy0HSR8U/0PEJS98U,y2PR9S1CS3………SV;"j‘‘SPRS/R8HjS
44R5 ^7PL75IShyF/8S‘SP2HPUyE8RSE,8S08U8P68HSC0y98RS9/RES58Sm01U8RR8HSP2SRE0PUES10H80jSSS
4kR5 TO7HMqjYZKT5ISM,PRSCP8FHSPRS/R8HSE1SH8CP28SE,8Sm80P1HS1CSEP98SP2SB,PU,SE,8S98HP/9SPRS1UU/mP8HjSM,PRSCP8FHSPRS/R8HSE1SR8ES
DzhSP2SKM:“'M:S98U,y2PR9jS
4GR5 WPP7LTT545Mj5,5I55”1/0SyHH08RRSCP8FHRS4XVS5PERS8yU,’Sy08S/R8HSE1SPH82EPCJSE,8SR1/0U8–SH8REP2yEP12Sy2HSyUU8RRSm1P2ESE1S
B,PU,SE,8JSy08SU1228UE8HjS
4,R5 -LGOLY9L59jYM7jv5I5QR8HSC10SC0yq982EyEP12S2/9580P2qSE1SU12E01FSR8µ/82U8S2/9580P2qjS
e
4UR5 XFL9LTOE5I5QR8HSE1Sm01E8UESC0y98jSS
g
Yz'SC0y98RSUy2S58SE0y2R9PEE8HS_S
io led
o —8EB882S915PF8SREyEP12RS
o —8EB882S915PF8SREyEP12Sy2HSyUU8RRSm1P2ES
o —8EB882SyUU8RRSm1P2ERS/RP2qSW:SS
ic ow
M,8S EB1S 5PERS BPE,P2S ”0y98S '12E01FS CP8FHS Yj5 T-5 y2H5 C7jE5 T-5 HPCC8082EPyE8S E,8R8S UyR8RS y2HS H8CP28S E,8S C1/0S yHH08RRS
n
CP8FHRjS
bl kn
5 zq/5 WPP7LTT54SPH82EPCP8RSE,8Sm,JRPUyFS08U8P680jS…680JSREyEP12–SyUU8RRSm1P2ES10SBP08F8RRS21H8SCPFE80RS12SyHH08RRS‘jS
5 zqq/5 WPP7LTT5kS08m08R82ERSE,8SE0y2R9PEE80S1CSySC0y98jS
at
Pu ch
5 zqqq/5 WPP7LTT5GSy2HSWPP7LTT5,Sy08S9yP2FJS28U8RRy0JSC10SE,8SF1qPUyFSyRRPq2982ES1CSC0y98RjSS
Table 4.2.1: MAC addresses in IEEE 802.11
Te
IWX5XjYM7jv58H9LLMT55
”PqjSXj"j‘;SR,1BRSE,088SHPCC8082ESEJm8RS1CSU12E01FSmyUx8ERS_SzUx21BF8Hq8982ESmyUx8E–SKM:–Sy2HS'M:SmyUx8EjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-13 Wireless Local Area Networks
e
Fig. 4.2.10 : IEEE 802.11 special control packets ACK, RTS and CTS
g
KM:S myUx8ES U12EyP2RS E,8S 08U8P680S yHH08RRS 1CS E,8S P2E82H8HS 08UPmP82ES y2HS E,8S E0y2R9PEE80S yHH08RRS 1CS E,8S REyEP12S
io led
E0y2R9PEEP2qSE,8SKM:jSS
M,8SH/0yEP12SRm8UPCP8RSE,8SEP98S08µ/P08HSE1SR82HS'M:–SHyEySy2HSPERSz'cSmF/RSE,088S:3”:jS
ic ow
M,8SP998HPyE8FJSC1FF1BP2qS'M:SC0y98SU1mP8RSE,8SE0y2R9PEE80SyHH08RRSC019SE,8SKM:SmyUx8ESP2SE1SE,8S08U8P680SyHH08RRS
n
CP8FHjS
bl kn
S 3………SV;"j‘‘S1CC80RSEB1SEJm8RS1CSYz'SR806PU8R–S
4R5 TXC5 zTqTM7qQOMLP5 Xjj7PqYHMqjY5 COY9MqjY/5 IS W'”S 1CC80RS 12FJS yRJ2U,0121/RS HyEyS R806PU8S y2HS PES P2UF/H8RS EB1S
Te
98U,y2PR9RjS
XjYMLYMqjYS98U,y2PR9SR/mm10E8HS5JS':Yz“'zSm01E1U1FjS
XjYMLYMqjY507LLS98U,y2PR9S5JS/RP2qSKM:“'M:jS
S 3ESPRS9y2HyE10JSR806PU8jS
kR5 QXC5zQjqYM5Xjj7PqYHMqjY5COY9MqjY/5IS+'”S1CC80RSyRJ2U,0121/RSHyEySR806PU8SyRSB8FFSyRSEP98S51/2H8HSR806PU8jS3ESP2UF/H8RS_S
XjYMLYMqjY507LLSm1FFP2qS98E,1HjS3ESPRSy2S1mEP12yFSR806PU8jS
zHS,1US28EB10xRSUy2S1CC80S12FJSHTNY9F7jYjOT5PHMH5TL7Kq9LT54Uy2S12FJS/R8SW'”’jS
32C0yRE0/UE/08S5yR8HS28EB10xRSUy2S1CC80S51E,SHTNY9F7jYjOT5zTXC/5yRSB8FFSyRSMqEL5QjOYPLP5TL7Kq9LT5zQXC/jS
M,8S Yz'S 98U,y2PR9RS U1FF8UEP68FJS y08S yFR1S UyFF8HS WPRE0P5/E8HS ”1/2HyEP12S -P08F8RRS Y8HP/9S zUU8RRS '12E01FS
zTCWIWX/jSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-14 Wireless Local Area Networks
e
Inter-Frame Spacing
g
3………SV;"j‘‘S1CC80RSE,088SP2E80ZC0y98SRmyUP2qS43”:’S58EB882SE0y2R9PRRP12RS1CSC0y98jSS
io led
zCE80SU19mF8EP12S1CSE0y2R9PRRP12–S8yU,SREyEP12S,y6P2qSySmyUx8ESByPERSC10S128S1CSE,8SE,088S3”:Sm80P1HRSH8m82HP2qS12SE,8S
EJm8S1CSE,8SmyUx8EjS
ic ow
zq/5 -Fj7M5KYML7MC7HEL5-8H9qYD5z-KC-/5555
o M,PRSPRSE,8SR,10E8RESByPEP2qSEP98SC10S98HP/9SyUU8RRj5
n
o M,8S ,Pq,80S m0P10PEJS myUx8ERS R/U,S yRS R,10ES U12E01FS 98RRyq8R–S yUx21BF8Hq8982ES 1CS HyEyS myUx8ERS 10S m1FFP2qS
bl kn
08Rm12R8RS,y68SE1SByPESC10S:3”:S58C108S98HP/9SyUU8RRj5
at
zqq/5 TqTM7qQOMLP5Xjj7PqYHMqYD5COY9MqjY5KC-5zTKC-/555
Pu ch
o M,PRSH821E8RSE,8SF12q8RESByPEP2qSEP98Sy2HS,yRSE,8SF1B8RESm0P10PEJSC10S98HP/9SyUU8RRjSS
o O1B8RES m0P10PEJS myUx8ERS R/U,S yRS myJF1yHS myUx8ERS 4myUx8ERS U12EyP2P2qS HyEy’S ,y68S E1S ByPES C10S W3”:S 58C108S E,8S
Te
98HP/9SyUU8RRjS
o W3”:SPRSyS:3”:SmF/RSEB1SRF1ESEP98RjS
zqqq/5 QjqYM5Xjj7PqYHMqYD5COY9MqjY5KC-5zQKC-/5
o M,PRSPRSE,8SByPEP2qSEP98S58EB882SW3”:Sy2HS:3”:jS5
o 3ESPRS/R8HS5JSE,8SyUU8RRSm1P2EjS5
o —8C108Sm1FFP2qS1E,80S21H8R–SE,8SyUU8RRSm1P2ES,yRSE1SByPESC10S+3”:SEP98SC10S98HP/9SyUU8RRj5
e
FyJ80jS
g
3CSE,8S98HP/9SPRS5/RJ–SE,82SyFFSE,8S21H8RSBy2EP2qSE1SyUU8RRSE,8S98HP/9SByPES/2EPFSE,8S98HP/9S58U198RSC088jS
io led
<2U8SE,8S98HP/9SPRSC088–SyFFSE,8SU19m8EP2qS21H8RSByPESC10SW3”:SEP98Sm80P1HjSzCE80SByPEP2qSC10SySW3”:SEP98–SU19m8EP2qS
21H8RS82E80SP2S9jYMLYMqjY58FHTLjS
ic ow
D1BS8yU,S21H8SU,11R8RSyS0y2H19S5yUxZ1CCSEP98SBPE,P2SE,8SU12E82EP12SBP2H1BSy2HSH18RS21ESE0JSE1SyUU8RRSE,8S98HP/9S
C10SE,PRS0y2H19Sy91/2ES1CSEP98jSS
n
<2U8SE,8S0y2H19PV8HSByPEP2qSEP98SC10SyS21H8SPRS1680–SE,8S21H8SU12EP2/8RSE1SR82R8SE,8S98HP/9jSzRSR112SyRSE,8S21H8S
bl kn
R82R8RSE,8SU,y228FSPRS5/RJ–SPES,yRSF1RESE,PRSUJUF8Sy2HS,yRSE1SByPESC10SyS28=ESU,y2U8SPj8jS/2EPFSE,8S98HP/9S58U198RSPHF8S
C10SyESF8yRESW3”:SEP98jSS
at
Pu ch
—/ESPCSE,8S0y2H19PV8HSyHHPEP12yFSByPEP2qSEP98SC10SyS21H8SPRS1680Sy2HSE,8S98HP/9SPRSREPFFSPHF8–SE,8S21H8SUy2SyUU8RRSE,8S
98HP/9SP998HPyE8FJSy2HSUy2SREy0ESE0y2RC800P2qSHyEyjS
Te
M1Sm016PH8SCyP0SyUU8RRS98U,y2PR9–S3………SV;"j‘‘SyHHRSySQH9L5j005MqEL7RS
…yU,SREyEP12S21BSU,11R8RSyS5yUxZ1CCSEP980SP2SE,8S0y2q8S1CSU12E82EP12SBP2H1BjSS
3CSySREyEP12SH18RS21ESq8ESyUU8RRSE1SE,8S98HP/9SP2SE,8SCP0RESUJUF8–SE,8S5yUxZ1CCSEP980SqT5YjM59vLH7LP_5qYTMLHP5qM5qT5XOTM5
8HOTLPjS
32SE,8S28=ESU12E82EP12SUJUF8–SE,8S21H8SH18RS21ESU,11R8SyS28BS0y2H19S5yUxZ1CCSEP98–SE,8SEP980SU12EP2/8RSC019SB,808S
PESByRSmy/R8HjS
M,/RSE,8SREyEP12RSE,yES,y68SByPE8HSC10SySF12q80SEP98SyUU8RRSE,8S98HP/9SCP0REjSS
”PqjSXj"j‘XSR,1BRS/2PUyRESHyEySE0y2RC80S/RP2qSW”-Yz'ZW'”jS
zRSR,1B2SP2S”PqjSXj"j‘X–SE,8SR82H80SyUU8RR8RSE,8S98HP/9SyCE80SByPEP2qSC10SW3”:SEP98Sy2HSE0y2R9PERSHyEyjS
M,8S 1E,80S REyEP12RS 08yHS E,8S Yz'S C0y98S y2HS H8E8UES C019S E,8S ()$%*!+"& #!',(S ,1BS F12qS E,8S U,y228FS BPFFS 58S 5/RJjS
M,808C108SE,8JSUy2SR8ESE,8P0SDzhS4D8ESyFF1UyEP12S68UE10’SC10SE,8Symm01m0PyE8SEP98Sm80P1HjSS
zCE80SByPEP2qSC10S:3”:SE,8S08U8P680SyUx21BF8Hq8RSPCSE,8SmyUx8ESByRS08U8P68HSU1008UEFJjS
3CS21Sz'cSPRS08E/028HS5JSE,8SR82H80–SyCE80SE,8SEP980S8=mP08R–SE,8SR82H80S08E0y2R9PERSE,yESmyUx8EjS
M,8S U12E82EP12S BP2H1BS REy0ERS yCE80S DzhS bS W3”:S m80P1HjS zFFS 1E,80S REyEP12RS U19m8EP2qS C10S E,8S U,y228FS 21BS U,11R8S yS
0y2H19PV8HS5yUxS1CCSEP980SyCE80SB,PU,SE,8JSR82R8SySU,y228FjSS
M,8SREyEP12SBPE,SE,8SR,10E8RES5yUxS1CCSEP98SCP2HRSE,8SU,y228FSPHF8Sy2HSREy0ERSE1SE0y2R9PESHyEyjS
DFWMAC-DCF with RTS/CTS extension
M1Sy61PHS,PHH82SE809P2yFSm015F89–S3………SV;"j‘‘SH8CP28RSKM:“'M:Sm01E1U1FRjS3ESB10xRSyRSC1FF1BRjSS
M,8Sm01U8RRS1CS/2PUyRESHyEySE0y2RC80S/RP2qSKM:“'M:SPRSPFF/RE0yE8HSP2S”PqjSXj"j‘\jS
e
3CS yS E809P2yFS PRS BPFFP2qS E1S R82HS HyEy–S yCE80S ByPEP2qS C10S W3”:S 4mF/RS yS 0y2H19S 5yUx1CCS EP98S PCS E,8S 98HP/9S ByRS 5/RJ’–S PES
R82HRSySR,10ESKM:SU12E01FSmyUx8EjS
g
M,8S KM:S myUx8ES U12EyP2RS E,8S R1/0U8S yHH08RR–S H8REP2yEP12S yHH08RRS y2HS E,8S H/0yEP12S 1CS E,8S B,1F8S HyEyS E0y2R9PRRP12S
io led
P2UF/HP2qSE,8SyUx21BF8Hq8982EjS
zFFS1E,80S21H8RS08U8P6P2qSKM:SmyUx8ERSR8ESE,8P0S28ESyFF1UyEP12S68UE10S4Dzh’jSDzhSPRSR8ESP2SyUU10Hy2U8SBPE,SE,8SH/0yEP12S
CP8FHSRm8UPCP8HSP2SE,8SKM:SmyUx8EjSM,8R8SREyEP12RSBPFFS21ESE0JSE1SyUU8RRSE,8S98HP/9SC10SE,PRSH/0yEP12jS
ic ow
M,8SH8REP2yEP12SREyEP12S08Rm12HRSE1SE,PRSmyUx8ES5JSR82HP2qS'M:SU12E01FSmyUx8ESyCE80Sy2S:3”:Sm80P1HjS
n
M,PRS 'M:S myUx8ES U12EyP2RS E,8S H/0yEP12S CP8FHS yqyP2S y2HS yFFS REyEP12RS 08U8P6P2qS E,8S 'M:S C019S E,8S 08U8P680S 1CS E,8S HyEyS
bl kn
E0y2R9PRRP12SR8ESE,8P0SDzhSS
Note : This is needed because the set of stations receiving RTS can be different from the set of stations
at
Pu ch
receiving CTS, thus separate NAV has to be set by the receivers of RTS and the receivers of CTS).
Te
M,8SR1/0U8SE809P2yFS08U8P68RSE,8S'M:Sy2HSR82HRSHyEySyCE80SByPEP2qSC10S:3”:jS
M,8SH8REP2yEP12SE809P2yFSR82HRSz'cSyCE80Sy21E,80S:3”:jS
zCE80SU19mF8EP12S1CSE0y2R9PRRP12–SDzhS1CS8yU,SREyEP12SE809P2yE8HSy2HSU,y228FSPRSy6yPFy5F8SC10S1E,80S/R80RjSS
X808SE,8SHyEySC0y98SPRSC0yq982E8HSP2E1SR9yFF80SC0y98RjS
:82H80SR82HRSy2SKM:SyCE80SByPEP2qSW3”:SEP98jSM,PRSKM:SP2UF/H8RSE,8SH/0yEP12SC10SE,8SE0y2R9PRRP12S1CSE,8SCP0RESC0yq982ES
y2HSE,8SU1008Rm12HP2qSyUxjS
<E,80SREyEP12RS08U8P6P2qSE,PRSKM:SR8ERSE,8P0SDzhS4C10SKM:’SyUU10HP2qSE1SE,8SH/0yEP12SRm8UPCP8HSP2SKM:jS
g e
Fig. 4.2.16 : IEEE 802.11 fragmentations of data
io led
M,8S08U8P680S21BSy2RB80RSBPE,S'M:–SyqyP2SP2UF/HP2qSH/0yEP12SCP8FHjS
K8U8P680RS1CS'M:SR8ESE,8P0SDzhS4C10S'M:’SyUU10HP2qSE1SE,8SH/0yEP12SCP8FHjS
ic ow
M,8SR82H80SUy2S21BSR82HSE,8SCP0RESC0yq982ES4C0yq‘’SyCE80SByPEP2qSC10S:3”:SEP98jS
M,8SC0yq982ES‘SP2UF/H8RSH/0yEP12S6yF/8jSM,PRSH/0yEP12SCP8FHS08R8068RSE,8S98HP/9SC10SE,8SE0y2R9PRRP12S1CSE,8SC1FF1BP2qS
n
C0yq982ERS4E,yESPRSC10SR8U12HSC0yq982ESy2HSPERSyUx’jS
bl kn
zqyP2–SyFFS1E,80SREyEP12RS08U8P68SE,PRS08R806yEP12Sy2HSyHZ/RESE,8P0SDzhS4C10SC0yq‘’SyUU10HP2qFJjS
at
M,8S 08U8P680S 1CS C0yq‘S R82HRS yUxS C10S C0yq‘S yCE80S ByPEP2qS C10S :3”:S EP98jS M,PRS yUxS P2UF/H8RS 08R806yEP12S C10S E,8S 28=ES
Pu ch
C0yq982EjS
<E,80SREyEP12RS08U8P6P2qSE,PRSyUxSR8ESE,8P0SDzhSC10S4yUx‘’SyUU10HP2qFJjS
Te
3CSE,8SC0yq982ESPRSE,8SFyRESC0yq982ESE,82SPESH18RS21ES08R8068SE,8S98HP/9S4W/0yEP12SCP8FHSPRS89mEJ’Sy2HSE,8S98HP/9SPRS
21BSC088SC10S1E,80SREyEP12RjS
DFWMAC-PCF with polling
+1P2ESU110HP2yEP2qSC/2UEP12S4+'”’SPRS/R8HSE1Sm016PH8SEP98Z51/2H8HSR806PU8RjSS
+'”S08µ/P08RSy2SyUU8RRSm1P2ESE,yESU12E01FRSE,8S98HP/9SyUU8RRSy2HSm1FFRSySRP2qF8S21H8jS
+'”S1m80yEP12SPRSy6yPFy5F8S12FJSC10SP2C0yRE0/UE/08S28EB10xRjS
YFL5QXC58jvvqYD5ELMFjP56j7LT5HT50jvvj6T5
+1P2ESU110HP2yE10SP2SE,8SyUU8RRSm1P2ESRmFPERSE,8S82EP08SyUU8RRSEP98SP2E1SR/m80SC0y98Sm80P1HRjS
zSR/m80SC0y98SU12EyP2RSyS-+"*'"*!+"&#$''&.'$!+(Sy2HSyS-+"*'"*!+"&.'$!+(jSS
”PqjSXj"j‘^SR,1BRSR8680yFSBP08F8RRSREyEP12RSy2HSE,8P0SDzhjSS
zESEP98SE'SE,8SU12E82EP12ZC088Sm80P1HS1CSySR/m80C0y98SR,1/FHSE,8108EPUyFFJSREy0ES5/ES58Uy/R8SE,8S98HP/9SPRS5/RJSPESPRS
m1REm128HSEPFFSE!jS
zCE80SByPEP2qSC10SyS+3”:SEP98–SE,8Sm1P2ESU110HP2yE10S4z+’SR82HRSW!SHyEySE1Sm1FFSCP0RESREyEP12jSM,PRSREyEP12SUy2S08mFJS12U8S
yCE80S:3”:jS
zCE80S ByPEP2qS C10S :3”:S EP98–S E,8S m1P2ES U110HP2yE10S R82HRS W"S HyEyS E1S m1FFS R8U12HS REyEP12jS M,PRS REyEP12S 9yJS y2RB80S 5JS
R82HP2qSQ"SHyEySyCE80S:3”:jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-18 Wireless Local Area Networks
M,8S m1P2ES U110HP2yE10S 21BS R82HRS W#S E1S m1FFS E,P0HS REyEP12jS M,PRS EP98S E,P0HS REyEP12S ,yRS 21E,P2qS E1S R82HjS M,8S m1P2ES
U110HP2yE10SBPFFS21ES08U8P68Sy2JE,P2qSyCE80S:3”:SEP98jSS
D1B–SE,8Sm1P2ESU110HP2yE10SUy2Sm1FFS1E,80SREyEP12RSyCE80SByPEP2qS+3”:SEP98jS
M,8Sm1P2ESU110HP2yE10SUy2SR82HS82HS9y0x80S4'”()*’SE,yESP2HPUyE8RSE,8S82HS1CSU12E82EP12ZC088Sm80P1HSy2HSE,8SREy0ES1CS
U12E82EP12Sm80P1HjS
M,8SU12E82EP12Sm80P1HSUy2S58S/R8HSC10S—z:3'ZSW”-Yz'S10SW-”Yz'SBPE,SKM:“'M:jS
<2U8SE,8SU12E82EP12Sm80P1HSPRS1680S4yCE80SE#’SE,8S28=ESR/m80C0y98SREy0ERSy2HSE,8Sy5168Sm01U8RRSREy0ERSyqyP2jSSSSSS
g e
io led
ic ow
”1FF1BP2qSy08SE,8S08Rm12RP5PFPEP8RS1CSIWX5IHYHDLELYM5TOQ5vHNL75IS
at
Pu ch
4y’S :J2U,012PVyEP12SS
45’S +1B80SYy2yq8982ESS
Te
4U’S zRR1UPyEP12“K8yRR1UPyEP12S
4H’S Yz'SYy2yq8982ES32C109yEP12S—yR84Yz'SY3—’SS
Q. Explain synchronization in 802.11 MAC management layer for both infrastructure as well Ad-hoc WLANs.
(May 15, 10 Marks)
…yU,S21H8S1CSy2S3………SV;"j‘‘S28EB10xS9yP2EyP2RSy2SP2E802yFSUF1UxjS
M1SRJ2U,012PV8SE,8SUF1UxRS1CSyFFS21H8R–S3………SV;"j‘‘SRm8UPCP8RSySEP9P2qSRJ2U,012PVyEP12SC/2UEP12S4M:”’jSS
M,8R8SRJ2U,012PV8HSUF1UxRSy08S288H8HSC10S_S
o +1B80S9y2yq8982ES
o '110HP2yEP12S1CSE,8S+'”SS
o :J2U,012PVyEP12SP2S”X::S,1mmP2qSR8µ/82U8jS
32SP2C0yRE0/UE/08S5yR8HS28EB10xR–Sy2SyUU8RRSm1P2ESU110HP2yE8RSE,8SRJ2U,012PVyEP12Sm01U8RRjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-19 Wireless Local Area Networks
M,8Sz+SE0y2R9PERSySRm8UPyFSC0y98SUyFF8HSQLH9jYSm80P1HPUyFFJjS
zS 58yU12S C0y98S U12RPRERS 1CS yS EP98S REy9mS y2HS 1E,80S 9y2yq8982ES P2C109yEP12S /R8HS C10S m1B80S 9y2yq8982ES y2HS
01y9P2qjS
<E,80SBP08F8RRS21H8RSyHZ/RESE,8P0SF1UyFSUF1UxRSBPE,S58yU12SEP98SREy9mjS
M,8S21H8SPRS21ES08µ/P08HSE1S,8y0S8680JS58yU12SE1SREyJSRJ2U,012PV8H–S,1B8680SC019SEP98SE1SEP98SPERSUF1UxSR,1/FHS58S
yHZ/RE8HjS
M,8S E0y2R9PRRP12S 1CS E,8S 58yU12S PRS 21ES yFByJRS m80P1HPUjS 3CS E,8S 98HP/9S PRS 5/RJ–S E,8S yUU8RRS m1P2ES m1REm128HS E,8S
E0y2R9PRRP12S1CSE,8S58yU12SC0y98jS
g e
io led
Fig. 4.2.18 : Beacon transmission in 802.11 infrastructure network
ic ow
m01U8RRjS
zCE80S8yU,S58yU12SP2E806yF–SyFFSREyEP12RSU,11R8S0y2H19S5yUxZ1CCSEP98jS
at
Pu ch
<2FJS 128S REyEP12S B,1R8S 0y2H19S H8FyJS EP98S PRS F8RRS 58U198RS E,8S BP2280S y2HS Uy2S R82HS E,8S 58yU12S C0y98jS zFFS 1E,80S
REyEP12RSyHZ/RESE,8P0SF1UyFSUF1UxSyUU10HP2qFJjSS
Te
Q. Explain how the power management is done in IEEE 802.11 infrastructure based and ad-hoc networks.
(May 12, Dec. 13, Dec. 17, 10 Marks)
:P2U8SBP08F8RRSH86PU8RSy08Sm1B808HS5JS5yEE80JiSm1B80SRy6P2qSPRSyS5PqSU,yFF82q8SP2S3………SV;"j‘‘jS
M,8S5yRPUSPH8ySE1SRy68Sm1B80SP2S-OzDSPRSE1SRBPEU,S1CCSE,8SE0y2RU8P680SB,828680SPESPRS21ES288H8HjSS
…yU,SREyEP12SUy2S58SP2S128S1CSE,8SEB1SREyE8RSz4/5TvLL85zk/5H6HLLRS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-20 Wireless Local Area Networks
3CSySR82H80SPRSBPFFP2qSE1SU199/2PUyE8SBPE,SySm1B80SRy6P2qSREyEP12S4REyEP12SP2SRF88mS91H8’SE,82SE,8SR82H80S,yRSE1S5/CC80S
HyEyjS
M,8SRF88mP2qSREyEP12SyByx8RSm80P1HPUyFFJSy2HS089yP2RSyByx82SC10SySU80EyP2Sm80P1HS1CSEP98jS
W/0P2qSE,PRSEP98SyFFSREyEP12RSy221/2U8SH8REP2yEP12RS1CSE,8P0S5/CC808HSHyEyjS
3CSySREyEP12SR88RSE,yESPESPRSySH8REP2yEP12S1CSyS5/CC808HSHyEy–SE,82SPESREyJRSyByx8S/2EPFSE,8SE0y2R9PRRP12SEyx8RSmFyU8jS
zFFSREyEP12RSR,1/FHSByx8/mS10S58SyByx8SyESE,8SRy98SEP98jS”10SE,PR–SMP98S:J2U,012PVyEP12S”/2UEP12S4M:”’SPRS/R8HjS
Power management in infrastructure based networks
32SP2C0yRE0/UE/08S28EB10xR–Sy2SyUU8RRSm1P2ESPRS08Rm12RP5F8SC10SE,8Sm1B80S9y2yq8982ESC/2UEP12jS
zUU8RRSm1P2ES5/CC80RSHyEySmyUx8ERSC10SyFFSRF88mP2qSREyEP12RjS
M,8SyUU8RRSm1P2ESE0y2R9PERSySM0yCCPUS32HPUyEP12SYymS4M3Y’SBPE,SyS58yU12SC0y98jSM3YSU12RPRERS1CSySFPRES1CSH8REP2yEP12RS1CS
5/CC808HSHyEyjS
zHHPEP12yFFJ–S E,8S yUU8RRS m1P2ES yFR1S 9yP2EyP2RS yS W8FP680JS M0yCCPUS 32HPUyEP12S YymS 4WM3Y’S P2E806yFjS WM3YS PRS /R8HS C10S
e
R82HP2qS501yHUyRE“9/FEPUyRESC0y98RjS
M,8SWM3YSP2E806yFSPRSyFByJRSyS9/FEPmF8S1CSM3YSP2E806yFRjS
g
io led
ic ow
n
bl kn
at
Pu ch
zFFSREyEP12RSByx8S/mSm0P10SE1Sy2S8=m8UE8HSM3YSy2HSWM3YjSS
zRS R,1B2S P2S ”PqjS Xj"j";–S yES E,8S REy0ES 1CS E,8S WM3YS P2E806yF–S E,8S yUU8RRS m1P2ES ,yRS E1S E0y2R9PES yS 501yHUyRES C0y98jS
M,808C108–SE,8SREyEP12SREyJRSyByx8S/2EPFSPES08U8P68RSE,yESyS501yHUyRESC0y98jS
zCE80S08U8P6P2qSE,8S501yHUyRESC0y98–SySREyEP12Sq18RS5yUxSE1SE,8SRF88mS91H8jS
M,8SREyEP12SByx8RS/mSyqyP2S58C108SE,8S28=ESM3YSE0y2R9PRRP12jS—/ESE,8SyUU8RRSm1P2ESH8FyJRSE,8SE0y2R9PRRP12S1CSE,8S28=ES
M3YSH/8SE1SE,8S5/RJS98HP/9–SR1SE,8SREyEP12SREyJRSyByx8jS
M,PRSEP98–SE,8SyUU8RRSm1P2ES,yRS21E,P2qSE1SR82HjSX82U8SE,8SREyEP12Sq18RS5yUxSE1SRF88mSyCE80SR198SEP98jS
zESE,8S28=ESM3Y–SE,8SyUU8RRSm1P2ESP2HPUyE8RSE,yESE,8SREyEP12SPRSE,8SH8REP2yEP12S1CS5/CC808HSHyEyjSS
M,8SH8REP2yEP12SREyEP12S08mFP8RS5JSR82HP2qSQ-S4m1B80SRy6P2q’SQjvvRSz2HSE,8SREyEP12SREyJRSyByx8SE1S08U8P68SE,yESHyEyjS
zCE80S08U8P6P2qSHyEy–SE,8SREyEP12SR82HRSy2SyUx21BF8Hq8982ES10S9yJSR82HSR198SHyEySy2HSq18RS5yUxSE1SRF88mjS
32SE,8S28=ESWM3Y–SE,8SyUU8RRSm1P2ES,yRS9108S501yHUyRESHyEySE1SR82HSy2HSE,8SREyEP12S,yRSE1SyByx8SE1S08U8P68SE,yESHyEyjS
Power management in ad-hoc networks
32SyHZ,1US28EB10xR–Sm1B80S9y2yq8982ESPRS9108SHPCCPU/FESE,y2SP2SP2C0yRE0/UE/08S28EB10xRS58Uy/R8SE,808SPRS21SyUU8RRS
m1P2ESE1S5/CC80SHyEySC10Sm1B80SRy6P2qSREyEP12RjSS
X808–S8yU,SREyEP12S5/CC80RSHyEySE,yESPESBy2ERSE1SR82HSE1Sm1B80SRy6P2qSREyEP12RjS
32SyHZ,1US28EB10xR–SyFFSREyEP12RSy221/2U8SySFPRES1CS5/CC808HSC0y98SH/0P2qSySm80P1HSB,82SE,8JSy08SyFFSyByx8jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-21 Wireless Local Area Networks
zFFSREyEP12RSy221/2U8SH8REP2yEP12RSC10SB,PU,SmyUx8ERSy08S5/CC808HS/RP2qSzM3YS4zHZ,1USE0yCCPUSP2HPUyEP12S9ym’SH/0P2qS
E,8SzM3YSP2E806yFjS
zRSR,1B2SP2S”PqjSXj"j"‘SyFFSREyEP12RSyByx8SyESE,8SRy98SEP98Sy2HSREyJSyByx8SC10SzM3YSP2E806yFjSS
g e
io led
Fig. 4.2.21 : Power management in IEEE 802.11 ad-hoc networks
32SE,8SCP0RESEB1SzM3YSP2E806yFR–SREyEP12RS,y68S21E,P2qSE1SR82H–S,82U8–SREyEP12RSREyJSyByx8SC10SzM3YSP2E806yFSy2HSFyE80Sq1S
ic ow
5yUxSE1SRF88mjS
32S E,8S E,P0HS zM3YS P2E806yF–S REyEP12!S ,yRS 5/CC808HS HyEyS C10S REyEP12"S ,82U8S REyEP12!S R82HRS zM3YS 4:,1B2S yRS WS P2SS
n
”PqjSXj"j"‘’jS
bl kn
:EyEP12"SyUx21BF8Hq8RSE,PRSzM3YS4:,1B2SyRSPSP2S”PqjSXj"j"‘’Sy2HSREyJRSyByx8SC10SE0y2R9PRRP12jSzCE80SE,8SzM3YSBP2H1B–S
at
:EyEP12!SUy2SE0y2R9PES5/CC808HSHyEyS4:,1B2SyRSTSP2S”PqjSXj"j"‘’Sy2HSREyEP12"SR82HRSyUx21BF8Hq8982ES4R,1B2SyRSPSP2S
Pu ch
”PqjSXj"j"‘’S10SHyEyS4PCSPES,yR’SP2S08mFJjSSSS
1. Association
<2U8Sy/E,82EPUyEP12SPRSU19mF8E8H–SREyEP12RSUy2SyRR1UPyE8SBPE,Sy2SyUU8RRSm1P2ES410S08yRR1UPyE8SBPE,SyS28BSyUU8RRSm1P2E’SE1S
qyP2SC/FFSyUU8RRSE1SE,8S28EB10xjSS
zRR1UPyEP12SyFF1BRSE,8SHPRE0P5/EP12SRJRE89SE1SE0yUxSE,8SF1UyEP12S1CS8yU,S915PF8SREyEP12jS
M,8S5yRPUSm01U8H/08S1CSyRR1UPyEP12SPRSR,1B2SP2S”PqSXj"j""jS
WTTj9qHMqjY5Q7j9LPO7L5I5
4P’S <2U8SyS915PF8SREyEP12S,yRSy/E,82EPUyE8HSE1Sy2SyUU8RRSm1P2E–SPESUy2SPRR/8Sy2SzRR1UPyEP12SK8µ/8RESC0y98jSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-22 Wireless Local Area Networks
4PP’S M,8SyUU8RRSm1P2ESE,82Sm01U8RR8RSE,8SyRR1UPyEP12S08µ/8REjSS
4y’S -,82SE,8SyRR1UPyEP12S08µ/8RESPRSq0y2E8H–SE,8SyUU8RRSm1P2ES08Rm12HRSBPE,SySREyE/RSU1H8S1CS;S4R/UU8RRC/F’Sy2HS
E,8S zRR1UPyEP12S 3WS 4z3W’jS M,8S z3WS PRS yS 2/980PUyFS PH82EPCP80S /R8HS E1S F1qPUyFFJS PH82EPCJS E,8S 915PF8S REyEP12S E1S
B,PU,S5/CC808HSC0y98RS288HSE1S58SH8FP6808HjSS
45’S Q2R/UU8RRC/FSyRR1UPyEP12S08µ/8RERSP2UF/H8S12FJSySREyE/RSU1H8–Sy2HSE,8Sm01U8H/08S82HRjS
2. Reassociation
S K8yRR1UPyEP12SPRSE,8Sm01U8RRS1CS916P2qSy2SyRR1UPyEP12SC019Sy2S1FHSyUU8RRSm1P2ESE1SyS28BS128jSS
g e
io led
ic ow
n
bl kn
VLHTTj9qHMqjY5Q7j9LPO7L5I5
Pu ch
M,8SREyEP12S912PE10RSE,8Sµ/yFPEJS1CSE,8SRPq2yFSPES08U8P68RSC019SE,yESyUU8RRSm1P2E–SyRSB8FFSyRSE,8SRPq2yFSµ/yFPEJSC019S1E,80SyUU8RRS
m1P2ERSP2SE,8SRy98S…::jSS
Te
-,82S E,8S 915PF8S REyEP12S H8E8UERS E,yES PEYRS 08U8P6P2qS 58EE80S RPq2yFS C019S 1E,80S yUU8RRS m1P2E–S PES P2PEPyE8RS E,8S 08yRR1UPyEP12S
m01U8H/08jSS
”PqjSXj"j"[SH8mPUERSE,8SC1FF1BP2qSRE8mRS_S
‘jS M,8S915PF8SREyEP12SPRR/8RSySK8yRR1UPyEP12SK8µ/8RESE1SE,8S28BSyUU8RRSm1P2EjSS
"jS M,8S28BSyUU8RRSm1P2ES9/RESU199/2PUyE8SBPE,SE,8S1FHSyUU8RRSm1P2ESE1S680PCJSE,yESE,8S1FHSyUU8RRSm1P2ESy/E,82EPUyE8HS
E,8SREyEP12jS3CSE,8S680PCPUyEP12SCyPFRSE,82SE,8S28BSyUU8RRSm1P2ES08Rm12HRSBPE,SySW8y/E,82EPUyEP12SC0y98Sy2HS82HRSE,8S
m01U8H/08jS
[jS M,8S yUU8RRS m1P2ES m01U8RR8RS E,8S K8yRR1UPyEP12S K8µ/8REjS +01U8RRP2qS K8yRR1UPyEP12S K8µ/8RERS PRS RP9PFy0S E1S m01U8RRP2qS
zRR1UPyEP12SK8µ/8RERS_S
S 4y’S 3CSE,8SK8yRR1UPyEP12SK8µ/8RESPRSq0y2E8H–SE,8SyUU8RRSm1P2ES08Rm12HRSBPE,SyS:EyE/RS'1H8S1CS;S4R/UU8RRC/F’Sy2HS
E,8Sz3WjS
S 45’S Q2R/UU8RRC/FSK8yRR1UPyEP12SK8µ/8RERSP2UF/H8SZ/RESyS:EyE/RS'1H8–Sy2HSE,8Sm01U8H/08S82HRjS
XjS M,8S28BSyUU8RRSm1P2ESU12EyUERSE,8S1FHSyUU8RRSm1P2ESE1SCP2PR,SE,8S08yRR1UPyEP12Sm01U8H/08jSM,PRSU199/2PUyEP12SPRSmy0ES
1CSE,8S3z++jS
\jS M,8S1FHSyUU8RRSm1P2ESR82HRSy2JS5/CC808HSC0y98RSC10SE,8S915PF8SREyEP12SE1SE,8S28BSyUU8RRSm1P2EjSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-23 Wireless Local Area Networks
]jS M,8S1FHSyUU8RRSm1P2ESE809P2yE8RSPERSyRR1UPyEP12SBPE,SE,8S915PF8SREyEP12jSS
^jS M,8S 28BS yUU8RRS m1P2ES 58qP2RS m01U8RRP2qS C0y98RS C10SE,8S 915PF8S REyEP12jS -,82S PES 08U8P68RS yS C0y98S H8REP28HS C10S E,8S
915PF8SREyEP12jS
Roaming/ Scanning
-,82SyS915PF8SREyEP12S9168RSC019S128SyUU8RRSm1P2ESE1Sy21E,80SyUU8RRSm1P2ESE,82SPES,yRSSE1SyRR1UPyE8SBPE,S28BSyUU8RRS
m1P2ES C10S /2P2E800/mE8HS R806PU8–S E,PRS 916P2qS 58EB882S yUU8RRS m1P2ERS UyFF8HS 01y9P2qS 4Xy2H1CC’jS M,8S RE8mRS C10S 01y9P2qS
,y2H1CCS58EB882SyUU8RRSm1P2ERSy08SyRSC1FF1BRS4K8C80S”PqjSXj"j"X’S_S
g e
io led
ic ow
n
bl kn
at
Pu ch
-,82S REyEP12S 9168RS C019S 128S —::S E1S y21E,80S PERS FP2xS µ/yFPEJS C019S E,8S yUU8RRS m1P2ES z+!S 58U198RS m110jS M,8S REyEP12S
Te
E,82SREy0ERSRUy22P2qSC10Sy21E,80SyUU8RRSm1P2EjS
:Uy22P2qS P261F68RS R8y0U,S C10S y21E,80S —::S 10S R8EEP2qS /mS 28BS —::S P2S E,8S UyR8S 1CS yHZ,1US 28EB10xRjS :Uy22P2qS 9yJS 58S
yUEP68S 10S myRRP68jS 32S W9MqKL5 T9HYYqYD5 REyEP125 R82HRS yS 87jQL5 12S 8yU,S U,y228FS y2HS ByPES C10S yS 08Rm12R8jS 32S QHTTqKL5
T9HYYqYDSE,8SREyEP12SFPRE82SE1SE,8S98HP/9SPj8jSREyEP12S08U8P68RS58yU12SRPq2yFS1CSy21E,80S28EB10xjS+0158Sy2HS58yU12S
U12EyP2RSE,8S28U8RRy0JSP2C109yEP12SE1SZ1P2SE,8S28BSyUU8RRSm1P2EjS
M,8S REyEP12S E,82S R8F8UES E,8S 58RES yUU8RRS m1P2ES z+#S BPE,S E,8S RE012q8RES m0158“S 58yU12S RPq2yFS RE082qE,–S y2HS R82HS
7LHTTj9qHMqjY57LGOLTMSE1SE,8SR8F8UE8HSyUU8RRSm1P2EjS
M,8S28BSyUU8RRSm1P2ESy2RB80RSBPE,S7LHTTj9qHMqjY57LT8jYTLR53CSE,8S08Rm12R8SPRSR/UU8RRC/F–SE,8SREyEP12S,yRS01y98HSE1S
E,8S28BSyUU8RRSm1P2EjS
M,8S28BSyUU8RRSm1P2ES/R8HS3z++S432E80SzUU8RRS+1P2ES+01E1U1F’SE1SP2C109SE1SE,8S1FHSyUU8RRSm1P2ESz+!Sy51/ESE,8SU,y2q8S1CS
yUU8RRSm1P2EjS!
e
]–Sf–S‘"–S‘V–S"X–S[]–SXVSy2HS\XSY5PER“RjS
g
Usage of OFDM in IEEE802.11a io led
M,8S5yRPUSPH8yS1CS<”WYSPRSE,8S08H/UEP12S1CSE,8SRJ951FS0yE8S5JSHPRE0P5/EP2qS5PERS1680S2/9801/RSR/5Uy00P80RjS
3………SV;"j‘‘yS/R8RSCP=8HSRJ951FS0yE8S1CS"\;–;;;SRJ951FRSm80SR8U12HSP2H8m82H82ES1CSE,8SHyEyS0yE8jS
ic ow
n
bl kn
at
Pu ch
Te
”PqjS Xj"j"\S R,1BRS \"S R/5Uy00P80RS 8µ/yFFJS RmyU8HS y01/2HS yS U82E08S C08µ/82UJjS M,8S RmyUP2qS 58EB882S E,8S R/5Uy00P80RS PRS
[‘"j\ScXVjS
M,8SU82E80SC08µ/82UJSPER8FCSPRS21ES/R8HSyRSySR/5SUy00P80jS:/5Uy00P80RS2/95808HSZ"‘–Z^–S^–S"‘Sy08S/R8HSC10SmPF1ESRPq2yFRSE1S
9yx8SE,8SRPq2yFSR8F8UEP12S015/RESyqyP2RESC08µ/82UJS1CCR8EjS
'19my08HS E1S 3………S V;"j‘‘5S E,yES 1m80yE8RS P2S "jXS 7XVS E,8S 3………V;"j‘‘yS 1CC80RS ,Pq,80S HyEyS 0yE8S y2HS 9108S U1680yq8–S
,1B8680SR,yHP2qSyES\7XVSPRS9/U,S9108SR86808SU19my08HSE1S"jXS7XVjS
4.2.7 802.11b
Q2FPx8S3………SV;"j‘‘y–S3………SV;"j‘‘5S1m80yE8RSyES"jXS7XVj5
3ESm016PH8RS0yBSHyEyS0yE8RS/mSE1S‘‘SY5mRj5
3ESm016PH8RSySBP08F8RRS0y2q8S1CS01/q,FJS[\S98E80RSP2H110RSy2HS‘X;S98E80RS1/EH110Rj5
3ES/R8RSE,8S':Yz“'zSE8U,2Pµ/8j5
M,8SK”SRPq2yFSC109yES/R8HSC10SV;"j‘‘5SPRS''cS10SU19mF8982Ey0JS'1H8Sc8JP2qj5
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-25 Wireless Local Area Networks
IEEE 802.11b supports Adaptive Rate selection. The system monitors the signal quality. If the signal falls or
interference levels rise, then system adopt a slower data rate with more error correction. The system will first fall back
to a rate of 5.5 Mbps, then 2, and finally 1 Mbps. This scheme is known as Adaptive Rate Selection (ARS).
e
Modulation DSSS, OFDM DSSS or DSSS or CCK or OFDM DSSS or CCK or OFDM
g
FHSS CCK
io led
Channel width 20 MHz 20 MHz 20 MHz 20 MHz 20 MHz or 40 MHz
Typical range 66 feet 75 feet 100 feet 150 feet 150 feet
ic ow
Antenna 1x1 SISO 1x1 SISO 1x1 SISO 1x1 SISO(Single Input- 4x4 MIMO (Multiple Input-
configuration Single Output) Multiple Output)
n
bl kn
IEEE 802.11 is mainly designed for enhanced security purposes. It addresses two main weaknesses of wireless security
networks which are encryption and authentication. Encryption is accomplished by replacing WEP’s original PRNG RC4
at
algorithm by stronger cipher that performs three steps on every block of data. The authentication and key management is
Pu ch
”P0RESyS08µ/8REP2qSREyEP12SR82HRSy2Sz/E,82EPUyEP12SK8µ/8RESE1SE,8SyUU8RRSm1P2ES4z+’jS
<2S08U8P6P2qSE,8S08µ/8RE–SE,8Sz+–S08mFP8RSBPE,SyS‘"VS5JE8S0y2H19SU,yFF82q8SE8=ESq8280yE8HS5JS-…+SyFq10PE,9jS
M,8S08µ/8REP2qS21H8SE,82SU1mP8RSE,8SE8=ESP2E1SE,8Sy/E,82EPUyEP12SC0y98Sy2HSS82U0JmERSPESBPE,SySR,y08HSx8JS–Sy2HSE,82S
R82HRSE,8SC0y98S5yUxSE1SE,8Sz+jS
e
M,8Sz+SE,82SBPFFSH8U0JmESE,8S6yF/8S1CSE,8SU,yFF82qP2qSE8=ES/RP2qSE,8SRy98SR,y08HSx8JSy2HSU19my08SPESE1SE,8SU,yFF82qP2qS
g
E8=ESR82ES8y0FP80jS
io led
3CS9yEU,S1UU/0R–SE,8Sz+SBPFFS08mFJSBPE,SySm1RPEP68Sy/E,82EPUyEP12SP2HPUyEP2qSySR/UU8RRC/FSy/E,82EPUyEP12jSS
3CSE,808SPRS21ESyS9yEU,–SE,8Sz+SBPFFSR82HS5yUxSyS28qyEP68Sy/E,82EPUyEP12jS
(ii) WEP Encryption
ic ow
NY97N8MqjY587j9LTT5
n
-…+S/R8RSK'XS82U0JmEP12SB,PU,SPRSySRJ998E0PUSRE08y9SUPm,80SE1Sm016PH8SU12CPH82EPyFPEJjS
bl kn
M,8SX;Z5PESR8U08ESx8JSPRSU1228UE8HSBPE,SyS"XZ5PES32PEPyFPVyEP12S68UE10S43h’S08R/FEP2qSP2SySE1EyFS]XSa5PESx8J4R,1B2SyRSySR88HS
at
P2S”PqjSXj[j"’jSS
Pu ch
M,8S08R/FEP2qSx8JS4R88H’SPRSE,8SP2m/ESC10SE,8S+R8/H1SKy2H19SD/9580S78280yE10S4+KD7’jSM,8S+KD7S4K'X’S1/Em/ERSyS
mR8/H1S0y2H19Sx8JSR8µ/82U8S5yR8HS12SE,8SP2m/ESx8JjS
Te
M,8S08R/FEP2qSR8µ/82U8SPRS/R8HSE1S82U0JmESE,8SHyEyS5JSH1P2qSyS5PEBPR8Sj<KjSS
M,8S08R/FESPRS82U0JmE8HS5JE8RS8µ/yFSP2SF82qE,SE1SE,8S2/9580S1CSHyEyS5JE8RSE,yESy08SE1S58SE0y2R9PEE8HSP2SE,8S8=my2H8HS
HyEySmF/RSC1/0S5JE8RjSM,PRSPRS58Uy/R8SE,8Sx8JSR8µ/82U8SPRS/R8HSE1Sm01E8UESE,8S["Z5PES32E8q0PEJS',8UxShyF/843'h’SSyRSB8FFS
yRSE,8SHyEyjS
”PqjSSXj[j"SR,1BRSE,8S82U0JmEP12SyFq10PE,9Sy2HS”PqjSXj[j[SR,1BRSE,8SH8U0JmEP12SyFq10PE,9jS
M1Sm08682ES/2y/E,10PV8HSHyEyS91HPCPUyEP12Sy2SP2E8q0PEJSyFq10PE,9–S'K'Z["S1m80yE8RS12SE,8SmFyP2SE8=ESE1Sm01H/U8S3'hjS
M,8S1/Em/ES1CSE,8SB,1F8Sm01U8RRSPRSyS98RRyq8SU12EyP2P2qSE,088Smy0ER_SE,8S08R/FEP2qSUPm,80E8=E–SE,8S3h–Sy2HSE,8S3'hjS5
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-27 Wireless Local Area Networks
Decryption process
e
M,8S H8U0JmEP12S PRS 680PCP8HS 5JS m80C109P2qS P2E8q0PEJS U,8UxS yFq10PE,9S 12S E,8S 08U16808HS mFyP2S E8=ES y2HS U19my0P2qS E,8S
g
1/Em/ES1CSE,8S3'hYS4'yFU/FyE8HS3'h’SE1SE,8S3'hSR/59PEE8HSBPE,SE,8S98RRyq8jS3CSUyFU/FyE8HS3'hS43'hY’SPRS21ESRy98SyRS3'hS–S
io led
E,8S08U8P68HS98RRyq8SPRSP2S80010jS5
WEP vulnerabilities
zFE,1/q,S-…+SyEE89mERSE1SyU,P868SBP08HS8µ/P6yF82ESR8U/0PEJ–SE,808Sy08SREPFFS9y2JSB8yx28RR8RSP2S-…+SB,PU,S9yJS58S
ic ow
/R8HS5JSE,8S9yFPUP1/RS/R80SE1SU19m019PR8SE,8SR8U/0PEJS1CS-OzDjS
n
zq/5 YFL5K`5qT5Mjj5TEHvv5HYP5qY59vLH75MLhMR5
bl kn
S 32PEPyFSh8UE10S/R8HSP2S-…+SPRS"XZ5PESCP8FHSR82ESP2SE,8SUF8y0SE8=ESm10EP12S1CSyS98RRyq8jSM,PRS"XZ5PESRE0P2q–S/R8HSE1SP2PEPyFPV8S
E,8Sx8JSRE08y9Sq8280yE8HS5JSE,8SK'XSyFq10PE,9–SPRSyS08FyEP68FJSR9yFFSCP8FHSB,82S/R8HSC10SU0JmE1q0ym,PUSm/0m1R8RjS
at
Pu ch
zqq/5 YFL5K`5qT5TMHMq9R55
S M,8SRy98S3hSPRS/R8HSE1Sm01H/U8SE,8Sx8JS8680JSEP98jSK8/R8S1CSE,8SRy98S3hS9yJSm01H/U8SPH82EPUyFSx8JSRE08y9RSy2HSRP2U8S
Te
3hSPRSR,10E–SPESq/y0y2E88RSE,yESE,1R8SRE08y9RSBPFFS08m8yESyCE80SyS08FyEP68FJSR,10ESEP98jS
zqqq/5 YFL5K`5EHLLT5MFL5LLN5TM7LHE5KOvYL7HQvLR5
S SM,8SV;"j‘‘SREy2Hy0HSH18RS21ESRm8UPCJS,1BSE,8S3hRSy08SR8ES10SU,y2q8H–Sy2HSP2HP6PH/yFSBP08F8RRSyHymE80RSC019SE,8SRy98S
682H10S9yJSyFFSq8280yE8SE,8SRy98S3hSR8µ/82U8R–S10SR198SBP08F8RRSyHymE80RS9yJSm1RRP5FJS/R8SySU12REy2ES3hjSzRSyS08R/FE–S
,yUx80RSUy2S08U10HS28EB10xSE0yCCPU–SH8E809P28SE,8Sx8JSRE08y9–Sy2HS/R8SPESE1SH8U0JmESE,8SUPm,80SE8=EjS
zqK/5 WNQ587jKqPLT5Yj597N8MjD7H8Fq95qYMLD7qMN587jML9MqjYR5
S M,8S U195P2yEP12S 1CS 212ZU0JmE1q0ym,PUS U,8UxR/9RS BPE,S RE08y9S UPm,80RS PRS Hy2q801/RS ZS y2HS 1CE82S P2E01H/U8RSS
6/F280y5PFPEP8RjSMS
zK/5 WNQ5aTLT5-M7LHE5Xq8FL7R5
S M,8S5yRPUSm015F89SBPE,S-…+SPRSE,yESPES/R8RSySRE08y9ZUPm,80Sx21B2SyRSK'XSP2SRJ2U,0121/RS91H8SC10S82U0JmEP2qSHyEyS
myUx8ERjS QRP2qS E,8S RJ2U,0121/RS RE08y9S UPm,80R–S E,8S F1RRS 1CS yS RP2qF8S 5PES 1CS yS HyEyS RE08y9S Uy/R8RS E,8S F1RRS 1CS yFFS HyEyS
C1FF1BP2qSE,8SF1RES5PEjSM,/RSE,8SRE08y9SUPm,80SPRS21ESR/PEy5F8SC10SBP08F8RRS98HP/9SB,808SmFyUx8ESF1RRSPRSBPH8Rm08yHj5
4.3.2 WPA
-+zSREy2HRSC10Sk-PZ”PS+01E8UE8HSzUU8RRljSS
-+zSByRSH868F1m8HS5JSE,8S-PZ”PSzFFPy2U8SE1Sm016PH8S58EE80S/R80Sy/E,82EPUyEP12SE,y2S-P08HS…µ/P6yF82ES+0P6yUJS4-…+’–SSS
<28S9yZ10SP9m0168982ESP2S-+zS1680S-…+SPRSE,8SM89m10yFSc8JS32E8q0PEJS+01E1U1FS4Mc3+’–SB,PU,SHJ2y9PUyFFJSU,y2q8RS
x8JRSyRSE,8SRJRE89SPRS/R8HjSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-28 Wireless Local Area Networks
3ES/R8RSK'XSRE08y9SUPm,80SBPE,SyS‘"VS5PESx8JSy2HSySXVS5PES3hjSM,8SF12q80Sx8JSy2HS3hSE1q8E,80SH8C8yESE,8Sx8JS08U1680JS
yEEyUxRS12S-…+jS
32SyHHPEP12SE1Sy/E,82EPUyEP12Sy2HS82U0JmEP12–S-+zSyFR1Sm016PH8RS6yREFJSP9m0168HSmyJF1yHSP2E8q0PEJjSS
M,8SUJUFPUS08H/2Hy2UJSU,8UxS4'K'’S/R8HSP2S-…+SPRSP2R8U/08iSPESPRSm1RRP5F8SE1SyFE80SE,8SmyJF1yHSy2HS/mHyE8SE,8S98RRyq8S
'K'SBPE,1/ESx21BP2qSE,8S-…+Sx8JjSS
-+zS/R8RSySR1F/EP12SUyFF8HSYPU,y8F–SB,PU,SPRSySY8RRyq8S32E8q0PEJS',8UxS4Y3'’–SE1SE,8SU,8UxR/9S58P2qSU100/mE8HSPRR/8jS
-+zS/R8RSyS["S5PES32E8q0PEJS',8UxShyF/8S43'h’jSM,PRSPRSP2R80E8HSyCE80SmyJF1yHSy2HS58C108S3hjSM,8SY3'SP2UF/H8RSySC0y98S
U1/2E80–SB,PU,S,8FmRSE1Sm08682ES08mFyJSyEEyUxRjS
WPA Modes
S-+zSR/mm10ERSEB1S91H8RS1CS1m80yEP12j
1. Pre-Shared Key Mode or Personal Mode
e
S M,PRS91H8SPRS/R8HSC10Sm80R12yFS/R8jSM,8Sm08R,y08HS91H8SH18RS21ES08µ/P08Sy/E,82EPUyEP12SR80680jS3ES/EPFPV8RSySR,y08HS
g
x8JSE,yESPRSU199/2PUyE8HSE1S51E,SRPH8RS4z+Sy2HSUFP82E’S58C108S8REy5FPR,P2qSySBP08F8RRSU1228UEP12iSE,PRSx8JSPRSE,82S/R8HS
E1SR8U/08SE,8SE0yCCPUjSS
io led
2. Enterprise Mode
S …2E80m0PR8SY1H8S08µ/P08RSy2Sy/E,82EPUyEP12SR80680jS3ES/R8RS9108SRE0P2q82ESV;"j‘=Sy/E,82EPUyEP12SBPE,SE,8S…=E82RP5F8S
ic ow
z/E,82EPUyEP12S +01E1U1FS 4…z+’j!!"! QR8RS KzW3Q:S m01E1U1FRS C10S y/E,82EPUyEP12S y2HS x8JS HPRE0P5/EP12jS 32S E,PRS 91H8–S E,8S
n
/R80SU08H82EPyFRSy08S9y2yq8HSU82E0yFFJjSS
bl kn
BP08HSU1228UEP12jSS
-…+S501yHUyRERS98RRyq8RS/RP2qS0yHP1SBy68RSy2HSPRS9/U,S8yRP80SE1SU0yUxjSM,PRSPRS58Uy/R8SPES/R8RSE,8SRy98S82U0JmEP12SS
C10S 8680JS HyEyS myUx8EjS 3CS 821/q,S HyEyS PRS y2yFJV8HS 5JS y2S 8y68RH01mm80–S E,8S x8JS Uy2S 58S 8yRPFJS C1/2HS BPE,S y/E19yE8HS
Te
R1CEBy08jS
-+zSP9m0168RS12S-…+S5JS/RP2qSE,8SMc3+S82U0JmEP12SRU,898SE1SRU0y95F8SE,8S82U0JmEP12Sx8JSy2HS680PCJSE,yESPES,yR2mES
5882SyFE808HSH/0P2qSE,8SHyEySE0y2RC80jSS
”/0E,80–S-+z"SP9m0168RSE,8SR8U/0PEJS1CSyS28EB10xS5JS/RP2qSRE012q80S82U0JmEP12S98E,1HSUyFF8HSz…:jS
e
m1P2ESU1/FHS58SR8E/mSP2SySU,y228FSE,yESPRS21ES/R8HS5JSE,8SF8qPEP9yE8SyUU8RRSm1P2EjSSM,82SE,8SH82PyFS1CSR806PU8SyEEyUxS
U1/FHS 58S Fy/2U,8HS yES E,8S U,y228FS U/0082EFJS 58P2qS /R8HS Uy/RP2qS 82Hm1P2ES H86PU8RS E1S E0JS E1S 08ZyRR1UPyE8S 12E1S yS
g
HPCC8082ESU,y228FSB,PU,SPRS/R8HS5JSE,8S01q/8SyUU8RRSm1P2EjS
io led
4. Configuration Problems
:P9mF8SU12CPq/0yEP12Sm015F89RSy08S1CE82SE,8SUy/R8S1CS9y2JS6/F280y5PFPEP8RjSSzS216PU8S/R80SUy2SR8ES/mS128S1CSE,8R8S
ic ow
H86PU8RS µ/PUxFJS y2HS qyP2S yUU8RRjS S X1B8680–S E,8JS yFR1S 1m82S /mS E,8P0S 28EB10xS E1S 8=E802yFS /R8S BPE,1/ES C/0E,80S
U12CPq/0yEP12jS
n
<E,80S PRR/8RS BPE,S U12CPq/0yEP12S P2UF/H8S B8yxS myRRm,0yR8R–S B8yxS R8U/0PEJS yFq10PE,9S H8mF1J982ERS 4Pj8jS -…+S 6RS
bl kn
-+zS6RS-+z"’–Sy2HSH8Cy/FES::3WS/Ryq8jS
5. Passive Capturing
at
Pu ch
+yRRP68SUymE/0P2qSPRSm80C1098HS5JSRP9mFJSq8EEP2qSBPE,P2SE,8S0y2q8S1CSySEy0q8ESBP08F8RRSOzDSy2HSE,82SFPRE82P2qSy2HS
UymE/0P2qSHyEyjSS
Te
M,PRSP2C109yEP12SUy2S58S/R8HSC10SyS2/9580S1CSE,P2qRSP2UF/HP2qSyEE89mEP2qSE1S508yxS8=PREP2qSR8U/0PEJSR8EEP2qRSy2HS
y2yFJVP2qS212ZR8U/08HSE0yCCPUjSS
3ESPRSyF91RESP9m1RRP5F8SE1S08yFFJSm08682ESE,PRSEJm8S1CSyEEyUxS58Uy/R8S1CSE,8S2yE/08S1CSySBP08F8RRS28EB10xiSB,yESUy2S
58SH128SPRSE1SP9mF8982ES,Pq,SR8U/0PEJSREy2Hy0HRS/RP2qSU19mF8=Smy0y98E80RjS
6. Misbehaving Clients
:198EP98RS UFP82ERS C109S /2y/E,10PV8HS -PZ”PS U1228UEP12RS yUUPH82EyFFJS 10S P2E82EP12yFFJjS —JS H1P2qS E,PR–S E,8JS m/ES
E,89R8F68RSy2HSU10m10yE8SHyEySyES0PRxjSS
:198S 82E80m0PR8RS /R8S 701/mS +1FPUJS <5Z8UERS E1S U12CPq/08S y/E,10PV8HS -PZ”PS U1228UEP12RS y2HS m08682ES 82HZ/R80S
U,y2q8RjS<E,80RS/R8S,1REZ08RPH82ESyq82ERSE1S912PE10S-PZ”PSUFP82ESyUEP6PEJSy2HSHPRU1228UES,Pq,Z0PRxSU1228UEP12RjSS
kR5 aTL5NYML787qTL5WQWk56qMF5OPkR4b5HOMFLYMq9HMqjY5
o QR8S82E80m0PR8S91H8S1CS-PZ”PSR8U/0PEJ–S58Uy/R8SPESy/E,82EPUyE8RS8680JS/R80SP2HP6PH/yFFJSZS…680J128SUy2S,y68SE,8P0S
1B2S-PZ”PS/R802y98Sy2HSmyRRB10HjS:1SPCSySFymE1mS10S915PF8SH86PU8SPRSF1RES10SRE1F82–S10Sy2S89mF1J88SF8y68RSE,8S
U19my2J–SyFFSJ1/S,y68SE1SH1SPRSU,y2q8S10S0861x8SE,yESmy0EPU/Fy0S/R80YRSF1qZP2RjS
o 32SU12E0yRE–SP2Sm80R12yFS91H8–SyFFS/R80RSR,y08SE,8SRy98S-PZ”3SmyRRB10H–SR1SB,82SH86PU8RSq1S9PRRP2qS10S89mF1J88RS
F8y68SJ1/S,y68SE1SU,y2q8SE,8SmyRRB10HS12S8680JSRP2qF8SH86PU8jS
o z21E,80SyH6y2Eyq8S1CS82E80m0PR8S91H8SPRSE,yES8680JS/R80SPRSyRRPq28HS,PRS10S,80S1B2S82U0JmEP12Sx8JjSM,yES98y2RS
/R80RSUy2S12FJSH8U0JmESHyEySE0yCCPUSC10SE,8P0S1B2SU1228UEP12SnS21SR211mP2qS12Sy2J128S8FR8YRSBP08F8RRSE0yCCPUjS
GR5 aTL50q7L6HvvT5Mj5TL9O7L5NjO75WqM0q5YLM6j7L5
o QR8SzS,y0HBy08SCP08ByFFjSzS,y0HBy08SCP08ByFFSH18RSE,8SRy98SE,P2qSyRSySR1CEBy08S128–S5/ESPESyHHRS128S8=E0ySFyJ80S1CS
R8U/0PEJjS
o
e
M,8S 58RES my0ES y51/ES ,y0HBy08S CP08ByFFRS PRS E,yES 91RES 1CS E,8S58RES BP08F8RRS 01/E80RS ,y68S yS 5/PFEZP2S CP08ByFFSE,yES
R,1/FHSm01E8UESJ1/0S28EB10xSC019Sm1E82EPyFSUJ580SyEEyUxRjS5
g
o
io led
3CS J1/0S 01/E80S H18R2YES ,y68S 128–S J1/S Uy2S P2REyFFS yS q11HS CP08ByFFS H86PU8S E1S J1/0S 01/E80S P2S 10H80S E1S m01E8UES J1/0S
RJRE89SC019S9yFPUP1/RS,yUxP2qSyEE89mERSyqyP2RESJ1/0S,198S28EB10xjS
,R5 VLTM7q9M5H99LTT5
ic ow
S <2FJS yFF1BS y/E,10PV8HS /R80RS E1S yUU8RRS J1/0S 28EB10xjS …yU,S mP8U8S 1CS ,y0HBy08S U1228UE8HS E1S yS 28EB10xS ,yRS yS 98HPyS
yUU8RRSU12E01FS4Yz'’SyHH08RRjS`1/SUy2S08RE0PUESyUU8RRSE1SJ1/0S28EB10xS5JSCPFE80P2qSE,8R8SYz'SyHH08RR8RjSS
n
bl kn
UR5 NY97N8M5MFL5PHMH5jY5NjO75YLM6j7L5
S QR8S RE012qS 82U0JmEP12S yFq10PE,9S E1S 82U0JmES HyEyjS M,808S y08S R8680yFS 82U0JmEP12S m01E1U1FRS y6yPFy5F8S E1S m016PH8S E,PRS
at
Pu ch
m01E8UEP12jS -P08HS …µ/P6yF82ES +0P6yUJS 4-…+’–S -PZ”PS +01E8UE8HS zUU8RRS 4-+z’–S y2HS -+z"S 82U0JmES P2C109yEP12S 58P2qS
E0y2R9PEE8HS58EB882SBP08F8RRS01/E80RSy2HSBP08F8RRSH86PU8RjS-+z"SPRSU/0082EFJSE,8SRE012q8RES82U0JmEP12jSS
Te
[R5 IHqYMHqY5HYMqKq7OT5Tj0M6H7L5
S 32REyFFS y2EP6P0/RS R1CEBy08S y2HS x88mS E,8S 6P0/RS H8CP2PEP12RS /mZE1ZHyE8jS Yy2JS y2EP6P0/RS m01q0y9RS yFR1S ,y68S yHHPEP12yFS
C8yE/08RSE,yESH8E8UES10Sm01E8UESyqyP2RESRmJBy08Sy2HSyHBy08jS
\R5 aTL50qvL5TFH7qYD56qMF59HOMqjY5
S ”PF8SR,y0P2qS58EB882SH86PU8RSR,1/FHS58SHPRy5F8HSB,82S21ES288H8HjSzFF1BSCPF8SR,y0P2qS1680S,198S10SB10xS28EB10xR–S
28680S 12S m/5FPUS 28EB10xRjS '08yE8S yS H8HPUyE8HS HP08UE10JS C10S CPF8S R,y0P2qS y2HS 08RE0PUES yUU8RRS E1S yFFS 1E,80S HP08UE10P8RjS
z2JE,P2qSE,yESPRS5882SR,y08HSR,1/FHS58SmyRRB10HSm01E8UE8HjSS
OR5 cLL85NjO75H99LTT58jqYM5Tj0M6H7L58HM9FLP5HYP5O8MMjMPHML5
5 M,8S9y2/CyUE/080S1CSJ1/0SBP08F8RRSyUU8RRSm1P2ESSm80P1HPUyFFJS08F8yR8S/mHyE8RjSQmHyE8SyUU8RRSm1P2ESR1CEBy08SB85RPE8S
08q/Fy0FJjS
]R5 XjYYL9M5OTqYD5H5Kq7MOHv587qKHML5YLM6j7L5
S Yy2JSU19my2P8RSy2HS10qy2PVyEP12RS,y68SyShP0E/yFS+0P6yE8SD8EB10xS4h+D’jSh+DRSyFF1BS89mF1J88RSE1SU1228UESR8U/08FJS
E1SE,8P0S28EB10xSB,82SyByJSC019SE,8S1CCPU8jSh+DRS82U0JmESU1228UEP12RSyESE,8SR82HP2qSy2HS08U8P6P2qS82HRSy2HSx88mS
1/ESE0yCCPUSE,yESPRS21ESm01m80FJS82U0JmE8HjS!
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-31 Wireless Local Area Networks
4P’S 3………SV;"j‘‘S4V;"j‘‘5–SV;"j‘‘y–SV;"j‘‘qjjj’SS
4PP’S …M:3SX3+…KOzDS4X3+…KOzDSMJm8S‘–SMJm8S"–SXPm80zUU8RR–SXPm80OP2x’S
X3+…KOzDSPRSyS…/01m8y2S4…M:3’SREy2Hy0HPVyEP12SP2PEPyEP68SC10SySXPq,S+80C109y2U8S-P08F8RRSO1UyFSz08ySD8EB10xjSS
…M:3SH8CP28HSC1/0SEJm8RS1CSX3+…KOzDR_SX3+…KOzD“‘–SX3+…KOzD“"–SX3+…Kz''…::Sy2HSX3+…KO3DcjSSS
e
g
X3+…KOzDZ‘S1m80yE8RSP2SE,8SH8HPUyE8HS5y2HBPHE,SUR4U5Mj5URG5URV5HP6PH8HSP2E1S\SCP=8HSU,y228FRjS
io led
3ESR/mm10ERSHyEyS0yE8S/mSE1SkGRU5IQ8TSBPE,SU1680yq8S1CS\;9jS
X3+…KOzDZ‘SE809P2yFRSUy2S9168SyESE,8S9y=P9/9SRm88HS1CS4R,EZTjS
3ESR/mm10ERS51E,SqY07HTM7O9MO7L5QHTLPSy2HSHPMFj95YLM6j7LTjS
ic ow
3ESR/mm10ERSmyUx8ES10P82E8HSRE0/UE/08Sy2HS/R8RSyS6y0Py2ES1CSX-IWZXW587jMj9jvjS
n
:/mm10ERSyRJ2U,0121/RSyRSB8FFSyRSPR1U,0121/RSE0yCCPUjS
bl kn
M,8Sm01E1U1FSP2UF/H8RS1mEP12yFSm08ZR8RRP12S82U0JmEP12Sy2HSm1B80SRy6P2qS98U,y2PR9jS
at
”PqjS XjXj‘S m08R82ERS E,8S X3+…KOzDZ‘S 08C8082U8S FyJ80S 91H8FS 4+01E1U1FS REyUx’jS ”PqjS XjXj"S R,1BRS E,8S X3+…KOzDS
Pu ch
U199/2PUyEP12S91H8FjS
Te
Y8HP/9SzUU8RRS'12E01FS
4Yz'’SR/5FyJ80S
',y228FSzUU8RRS'12E01FS4'z'’SR/5FyJ80S
+,JRPUyFS4+X`’SOyJ80S
M,8SYz'SFyJ80S08U8P68RSYz'SR806PU8SHyEyS/2PERS4Y:WQ’SC109SE,8S,Pq,80SFyJ80RSE,01/q,SYz'SR806PU8SyUU8RRSm1P2EjS
3ESm01U8RR8RSY:WQSy2HSq8280yE8RSXY+WQS4X3+…KOzDSYz'S+01E1U1FSWyEySQ2PE’S
M,PRSXY+WQSE,82S82E80RSX3+…KOzDS'z'SFyJ80SE,01/q,SySX3+…KOzDa'z'SR806PU8SyUU8RRSm1P2ES4X':z+’jS
M,8S',y228FSzUU8RRS'12E01FS4'z'’SR/5SFyJ80SH8E809P28RSB,PU,S21H8RSy08SyFF1B8HSE1SE0y2R9PESy2HSRm8UPCP8RSE,8SyUU8RRS
m0P10PEP8RjSS
M,PRSFyJ80S1CC80RSyS-+""'-*!+"&,'//&/'$0!-'SE1SE,8SYz'SR/5SFyJ80jS
'z'Sm01E1U1FSm01U8RR8RSE,8SXY+WQSy2HSm01H/U8SX'+WQS4X3+…KOzDZ'z'S+01E1U1FSWyEySQ2PE’SB,PU,SCP2yFFJSU12REPE/E8SyS
myJF1yHS1CSySm,JRPUyFSHyEyS5/0REjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-32 Wireless Local Area Networks
e
4.4.1(a) HIPERLAN-1 MAC Sublayer
Yz'SR/5FyJ80SC/2UEP12RSy08SFPRE8HS58F1BjS
1. MAC address mapping
n
bl kn
M,8SREy2Hy0HSH8CP28RSP2E802yFSyHH08RRSRE0/UE/08jSS
M,8SyHH08RRS1CSySX3+…KOzDSE809P2yFSU12EyP2RSEB1Smy0ERjSM,8SCP0RESmy0ESH8CP28RSE,8S28EB10xS2y98Sy2HSE,8SR8U12HSmy0ES
at
Pu ch
H8E809P28RSE,8SREyEP12jS
2. Security
Te
M1S82R/08SU199/2PUyEP12SR8U/0PEJ–SE,8S…2U0JmEP12“W8U0JmEP12SyFq10PE,9RSy08S/R8HjSS
M,8SyFq10PE,9S08µ/P08RSy2SPH82EPCPUyEP12Sx8JSy2HSySU19912SP2PEPyFPVyEP12S68UE10SC10SHyEyS82U0JmEP12Sy2HSH8U0JmEP12jS
M,8SmR8/H10y2H19Sq8280yE10SyUU8mERSE,8SPH82EPCPUyEP12Sx8JSy2HSE,8SP2PEPyFS68UE10Sy2HSq8280yE8RSySR8µ/82U8jSS
M,8S91H/F1Z"SyHHPEP12SPRSm80C1098HS12SE,8SR8µ/82U8S1CS/R80SHyEySy2HSE,8SR8µ/82U8Sq8280yE8HS5JSE,8SmR8/H10y2H19S
q8280yE10jS
32PEPyFPVyEP12S68UE10RSy2HSPH82EPCPUyEP12Sx8JRSUy2S58SC08µ/82EFJSU,y2q8HSP2S10H80SE1SyU,P868S,Pq,SR8U/0PEJjS
3. Addressing of MAC service access point (MSAP)
S Y:z+Sy08SyHH08RR8HS/RP2qSXVS5PESOzDZYz'SyHH08RRSB,PU,Sy08SU19myEP5F8SE1S3………SV;"j=SOzDRjS
4. Data forwarding
M,8S ymm8yFP2qS C8yE/08S 1CS X3+…KOzD“‘S PRS y5PFPEJS E1S C10By0HS HyEyS myUx8ERS /RP2qS R8680yFS 08FyJRjS K8FyJRS Uy2S 8=E82HS E,8S
U199/2PUyEP12S12SE,8SYz'SFyJ80S58J12HSE,8S0yHP1S0y2q8jSS
M,8SC10By0HP2qSUy2S58S1CSEB1SEJm8RZm1P2EZm1P2ES4/2PUyRE’S10Sm1P2EZ9/FEPm1P2ES49/FEPUyRE“501yHUyRE’jSS
…yU,S08FyJSREyEP12S9yP2EyP2RSyS01/EP2qSEy5F8Sy2HSySFPRES1CS9/FEPm1P2ES08FyJRjSS
5. Power saving
S :BPEU,S1CCSE809P2yFRSB,828680SE,8JSy08S21ESP2S/R8S10Sx88mSP2SRF88mS91H8SB,82SE,8JSH12YES,y68SHyEySE1SR82HjSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-33 Wireless Local Area Networks
EY-NPMA
e
M,8S 91RES P9m10Ey2ES my0ES 1CS 'z'S R/5S FyJ80S PRS E,8S …FP9P2yEP12S `P8FHS +0889mEP68S +0P10PEJS Y/FEPmF8S zUU8RRS 4…`ZS D+Yz’S
g
m01E1U1FjSS
io led
3ESPRSyS6y0Py2ES1CS':YzSm01E1U1FSBPE,Sm0P10PEPVyEP12jS
3ESHP6PH8RSE,8S98HP/9SyUU8RRS1CSHPCC8082ESU19m8EP2qS21H8RSP2E1SE,088Sm,yR8RjS
‘jS +0P10PEPVyEP12S "jS '12E82EP12S [jS M0y2R9PRRP12S
ic ow
S
n
bl kn
at
Pu ch
Te
1. Prioritization
MP98SPRSHP6PH8HSP2E1SU,y228FSyUU8RRSUJUF8RjS…yU,SUJUF8SREy0ERSBPE,SE,8SU,y228FSyUU8RRSRJ2U,012PVyEP12jS
M,8SRJ2U,012PVyEP12SPRSC1FF1B8HS5JSE,8Sm0P10PEPVyEP12Sm,yR8jSM,PRSm,yR8SU12EyP2RSCP68S‘]VZ5PESRF1ERSREy0EP2qSC019SE,8S
RF1ES1CS,Pq,8RESm0P10PEJS4mo‘’jS
3CSE,8SE809P2yFS,yRSE,8Sm0P10PEJ–S!SPESR82R8RSE,8SU,y228FSC10SE,8SCP0RES4!Z‘’SRF1ERjS
3CSE,8SU,y228FS089yP2RSPHF8–SE,8S21H8SR82HRSy2SyUU8RRSmyEE802jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-34 Wireless Local Area Networks
3CSE,8S21H8SCP2HRSE,yESE,8SU,y228FSPRS5/RJ–SPESByPERSC10SE,8S58qP22P2qS1CSE,8S28=ESyUU8RRSUJUF8jS
Y108SE,y2S128SREyEP12SUy2S,y68SE,8SRy98Sm0P10PEJjS
:1–S28=ESU12E82EP12Sm,yR8SPRSUy00P8HS1/ESE1S08R1F68SU12E82EP12Sm015F89jS
2. Contention
M,PRSm,yR8SPRSC/0E,80SHP6PH8HSP2E1SEB1Sm,yR8RS_S…FP9P2yEP12Sm,yR8Sy2HS`P8FHSm,yR8jS
M,8SLvqEqYHMqjY58FHTLSPRSHP6PH8HSP2E1S;Z‘"SRF1ERjS…yU,SE809P2yFSB,PU,S,yRS21ES5882S8FP9P2yE8HSP2SE,8Sm0P10PEPVyEP12S
m,yR8SR82HRSE,8S8FP9P2yEP12S5/0REjSM,8SF82qE,S1CSE,PRS5/0RESPRS0y2H19S58EB882S;SE1S‘"jS
zCE80S R82HP2qS y2S 8FP9P2yEP12S 5/0RE–S 8yU,S REyEP12S R82R8RS E,8S U,y228FS H/0P2qS 8FP9P2yEP12S R/06P6yFS 680PCPUyEP12S
P2E806yFjSSS
zSREyEP12SqP68RS/mSPCSE,8SU,y228FSPRS1UU/mP8HS5JSR198S1E,80SREyEP12SH/0P2qSE,PRSP2E806yFjS
M,85NqLvP58FHTLSU12EyP2RSE82S‘]VZ5PESRF1ERjS…yU,SREyEP12SR82R8RSU,y228FSH/0P2q"#SRF1ERS4;Zf’jSS
e
M,8Sm015y5PFPEJSE,yESE,8SqP682SREyEP12SR82R8RSE,8SU,y228FSC10S#SU12R8U/EP68SRF1ERSPRS‘“‘;jS
3. Transmission
g
io led
3CSE,8SREyEP12SH18RS21ESH8E8UESy2JSyUEP6PEJSP2SE,8SU,y228FSH/0P2qSFPRE82P2q–SPESP998HPyE8FJSREy0ERSE0y2R9PEEP2qSy2HS
82E80RSE0y2R9PRRP12Sm,yR8jS
3CSE,8SREyEP12S,yRSH8E8UE8HSE,yESE,8SU,y228FSPRS5/RJ–SPES,yRSF1RESPERSUJUF8Sy2HSByPERSEPFFSE,8S58qP22P2qS1CSE,8S28=ES
ic ow
yUU8RRSUJUF8jS
MU – May 16)
”/2UEP12RS1CSE,8Sm,JRPUyFSFyJ80S1CSX3+…KOzDSy08SFPRE8HS58F1BS_S
Te
Y1H/FyEP12–SH891H/FyEP12S4/R8RS”:c–7Y:c’S
—PESy2HSC0y98SRJ2U,012PVyEP12S
”10By0HS80010SU1008UEP12S98U,y2PR9RS4/R8RS—'XSU1H8R’S
Y8yR/08982ERS1CSRPq2yFSRE082qE,S
',y228FSR82RP2qS
X3+…KOzDZ‘Sm016PH8RS[S9y2HyE10JSy2HS"S1mEP12yFSU,y228FRSyUU10HP2qSE1SE,8P0SUy00P80SC08µ/82UP8RjS
zq/5 IHYPHMj7N59FHYYLvT5
o ',y228FS;_S\j‘^]X]V;S7XVS
o ',y228FS‘_S\j‘ffff^XS7XVS
o ',y228FS"_S\j""[\"]VS7XVS
zqq/5 ^8MqjYHv59FHYYLvT5
o ',y228FS[_S\j"X^;\]"S7XVS
o ',y228FSX_S\j"^;\V\]S7XVS
X3+…KOzDZ‘S/R8RS212SHPCC8082EPyFS7y/RRPy2S9P2P9/9S:,PCESc8JP2qS4212SHPCC8082EPyFS7Y:c’jS
3ES /R8RS yHymEP68S 8µ/yFPV80S UyFF8HS H8UPRP12S C88H5yUxS 8µ/yFPV80S 4W”…’S E1S 089168S P2E80S RJ951FS P2E80C8082U8S 43:3’S Uy/R8HS
H/8SE1S9/FEPmyE,Sm01myqyEP12jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-35 Wireless Local Area Networks
X3+…KOzDZ‘SyFR1S89mF1JRS—'XS80010SU1008UEP2qSU1H8RSE1S9P2P9PV8SE,8S80010RSyESm,JRPUyFSFyJ80jS
M,PRSU1H8SPRSy5F8SE1SU1008UESySRP2qF8S80010Sy2HSH8E8UESEB1S0y2H19S80010R–SyFFS80010RS5/0RERS21ESF12q80SE,y2S\SaS5PERjS
”PqjSXjXjXSm08R82ERSX3+…KOzDZ‘SHyEySmyUx8ESC109yES/R8HSyESm,JRPUyFSFyJ80jS
e
Fig. 4.4.4 : HIPERLAN-1 physical layer packet format for data and acknowledgement
g
4.4.2 HIPERLAN -2
io led
MU – Dec. 18)
X3+…KOzD"SyFF1BRSP2E80U1228UEP12SP2SyF91RESy2JSEJm8S1CSCP=8HS28EB10xjS
n
Features of HIPERLAN- 2
bl kn
<m80yE8RSyESU5URVSC08µ/82UJS5y2HS
at
+016PH8RS'1228UEP12Z10P82E8HSR806PU8S
Pu ch
XPq,SRm88HSE0y2R9PRRP12S/mSE1SU,5IQqMZTS4Ry98SyRS3………SV;"j‘‘y’S
Te
d/yFPEJZ1CZ:806PU8S4d1:’SR/mm10ES
z/E19yEPUSC08µ/82UJSyFF1UyEP12S
:8U/0PEJSR/mm10ES
Y15PFPEJSR/mm10ES
D8EB10xSy2HSymmFPUyEP12SP2H8m82H82ES
+1B80SRy6P2qS
Reference model and configuration of HIPERLAN-2
X3+…KOzDZ"SPRSH8RPq28HSE1SB10xSP2SEB1SU12CPq/0yEP12R_S5/RP28RRS826P012982ESy2HS,198S826P012982EjS
—/RP28RRS826P012982ESPRSy2SyUU8RRS28EB10xSB,PU,SU12RPRERS1CSR8680yFSz+RSU1228UE8HS5JSySU108S28EB10xjS…yU,Sz+SR8068RS
yS2/9580S1CS915PF8SE809P2yFRjSX3+…KOzDZ"SyFR1SyFF1BRS01y9P2qS58EB882SE,8Sz+RjSS
32S,198S826P012982E–Sy2SyHZ,1US28EB10xSPRSU08yE8HjS
”PqjSXjXj\Sm08R82ERSE,8SREy2Hy0HSy0U,PE8UE/08S1CSX3+…KOzDZ"S28EB10xjSSS
MB1SyUU8RRSm1P2ERSy08SU1228UE8HSE1SyS9j7L5YLM6j7LjSS
M,8S'108S28EB10xS9Pq,ES58Sy2SzMYS28EB10x–S…E,8028ESOzDR–SQYM:S[7SU8FF/Fy0S28EB10xS8EUjS
…yU,S yUU8RRS m1P2ES U12EyP2RS EB1S my0ER_S y2S W99LTT5 QjqYM5 XjYM7jvvL75 zWQX/S y2HS 128S 10S 9108S W99LTT5 QjqYM5 Y7HYT9LqKL75
zWQY/RS
”1/0SEjQqvL5ML7EqYHvT5zIY/Sy08SyFR1SR,1B2SP2S”PqjSXjXj\jSS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-36 Wireless Local Area Networks
M,8R8S YMRS Uy2S 9168S C019S 128S U8FFS y08yS E1S y21E,80jS M,8S yUU8RRS m1P2ES y/E19yEPUyFFJS R8F8UERS yS C08µ/82UJS 5JS /RP2qS
4HJ2y9PUSC08µ/82UJSR8F8UEP12’SW”:jS
e
M,808Sy08SE,088SEJm8RS1CS,y2H1680SB,PU,S9Pq,ES1UU/0S_S
g
1. Sector Handover (Inter sector)
io led
3CSE,8SR8UE10PV8HSy2E822yRSy08S/R8HSC10SyUU8RRSm1P2ESE,82Sz+SR/mm10ERSE,PRS,y2H1680jSYMS9168RSC019S128SR8UE10S
E1Sy21E,80SR8UE10SE,yESPRSU12E01FF8HS5JSE,8SRy98Sz+MjSS
ic ow
:8UE10S,y2H1680SPRS,y2HF8HSP2RPH8SE,8SWO'SFyJ80SE,808C108S21ES6PRP5F8S1/ERPH8SE,8Sz+jS5
2. Radio Handover (Inter-APT/Intra-AP)
n
bl kn
KyHP1S,y2H1680SPRSyFR1S,y2HF8HSBPE,P2SE,8Sz+jS
zRSR,1B2SP2S”PqjSXjXj\–SYM#&9168RSC019S128Sz+MSE1Sy21E,80Sz+MS1CSE,8SRy98Sz+jS
at
Pu ch
32SE,PRSUyR8–SE,8SU108S28EB10xSy2HS,Pq,80SFyJ80RSy08SyFR1SP261F68HjS
HIPERLAN-2 networks operate in two modes
‘jS '82E0yFPV8HSY1H8S4'Y’SS
"jS WP08UESY1H8S4WY’SS
EC – Error Control
CL – Convergence LayerS
e
Fig. 4.4.6 : HIPERLAN-2 reference Model
g
4.4.2(a) HIPERLAN-2 Physical Layer
io led
Yy2JSC/2UEP12RSy2HSC8yE/08RS1CS+X`SFyJ80S1CSX3+…KOzDZ"Sy08SPH82EPUyFSE1S3………SV;"j‘‘yjS3ES/R8RSE,8SRy98S91H/FyEP12S
RU,898Sy2HSm016PH8RSE,8SRy98SHyEyS0yE8SyRS3………SV;"j‘‘yjS
ic ow
+,JRPUyFSFyJ80S1CSX3+…KOzDZ"Sm80C109RSE,8SC1FF1BP2qSC/2UEP12RjS
n
o Y1H/FyEP124<”WY’S
bl kn
o ”10By0HS…0010S'1008UEP12S
at
o
Pu ch
:Pq2yFSW8E8UEP12S
o :J2U,012PVyEP12S8EUjS
Key features
Te
X3+…KOzDZ"S1m80yE8RSyESUURVSC08µ/82UJS
Yy=P9/9SHyEyS0yE8S1CS/mSE1SU,IQqMZTS
3ES/R8RSHPCC8082ES91H/FyEP12SRU,898RSR/U,SyRS—+:c–Sd+:c–S‘]ZdzY–S]XSadzYSE1SyU,P868SHPCC8082ESHyEyS0yE8RjS
3ES89mF1JRS^CTIjS
<”WYSRJ951FSH/0yEP12SZSXSpRS
D/9580S1CSR/5SUy00P80RSZS\"S
D/9580S1CSmPF1ESRJ951FRSZSSXS
:/5Uy00P80SRmyUP2qSZS[‘"j\cXVS
',y228FSRmyUP2qSZS";YXVS
Yy=P9/9SE0y2R9PESm1B80SPRS";;9-S…3K+SC10SE,8SF1B80SC08µ/82UJS5y2HjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-38 Wireless Local Area Networks
”PqjSXjXj^SPFF/RE0yE8RSE,8S08C8082U8SU12CPq/0yEP12S1CSE,8SE0y2R9PRRP12SU,yP2S1CSySX3+…KOzDZ"SH86PU8jSS
g e
M,8SX3+…KOzDZ"Sm,JRPUyFSFyJ80S08U8P68RSE,8S+:WQSC019SWO'SOyJ80jSS
io led
-ML8545I55 -97HEQvqYD5
S S M,8S CP0RES RE8mS E,82S PRS RU0y95FP2qS 1CS yFFS HyEyS 5PERS BPE,S E,8S q8280yE10S m1FJ219PyFS =+b=$b‘jS M,PRS PRS H128S C10S W'S
5F1UxP2qSy2HSB,PE82P2qS1CSE,8SRm8UE0/9jSM,8S1/EU198S1CSE,PRSRE8mSPRSE,8SRU0y95F8HS5PERjS
ic ow
-ML85k5I55 CNX5XjPqYD5
n
S S M,8S28=ESRE8mSPRSE1SymmFJS”…'SU1HP2qS12SE,8R8SRU0y95F8HS5PERjSM,PRSPRSH128SC10S80010SH8E8UEP12Sy2HSU1008UEP12jS
bl kn
M,8S08R/FES1CSE,PRSRE8mSPRS82U1H8HS5PERjS
-ML85G5I5 KYML7vLHKqYD5
at
Pu ch
S S D8=E–S82U1H8HS5PERSy08SP2E80F8y68HSE1S9PEPqyE8SE,8SC08µ/82UJSR8F8UEP68SCyHP2qjSM,8S08R/FESPRSP2E80F8y68HS5PERjS
-ML85,5I5 IH88qYD5
Te
S S M,8S9ymmP2qSm01U8RRSCP0RESHP6PH8RSE,8S5PESR8µ/82U8SP2Sq01/mS1CS‘–S"–SXS10S]S5PERSH8m82HP2qS12SE,8S91H/FyEP12S
RU,898RS /R8HS R/U,S yRS —+:c–S d+:c–S ‘]ZdzY–]XZdzYS 08Rm8UEP68FJjS M,8R8S q01/mRS y08S 9ymm8HS 12S E1S E,8S
ymm01m0PyE8S91H/FyEP12SRJ951FjSM,8S08R/FES1CSE,PRSRE8mSPRSR/5SUy00P80S91H/FyEP12SRJ951FRjS
-ML85U5I55 ^CTI5IjPOvHMqjY5 5
S S M,8S<”WYS91H/FyEP12SU12680ERSE,8R8SRJ951FRSP2E1SyS5yR85y2HSRPq2yFjSM,8SRJ951FSP2E806yFSPRSXpRjS
-ML85[5I55 QRS5QO7TM5
S S 32SE,PRSRE8mSE,8Sm,JRPUyFS5/0RESPRSU08yE8HjSM,PRS5/0RESU12EyP2RSm08y95F8Sy2HSmyJF1yHjS
-ML85\5I55 VHPqj5M7HYTEqTTqjY5
S S ”P2yFFJS0yHP1SE0y2R9PRRP12SR,PCERSE,8S5yR85y2HSRPq2yFSP2E1SySUy00P80SC08µ/82UJjS
WO'SFyJ80Sm016PH8RSC10SySF1qPUyFSFP2xS58EB882SYMSy2HSz+S1680SE,8S<”WYSm,JRPUyFSFyJ80jS
WyEySFP2xSU12E01FSPRSHP6PH8HSP2E1SE,088Smy0ER_SYz'–SE,8S'12E01FS+Fy28Sy2HSE,8SQR80SmFy28jS
M,8S/R80SmFy28SU12EyP2RS…0010S'12E01FS98U,y2PR9S4…'’jS
z2HSE,8SU12E01FSmFy28SU12EyP2RSKO'SR/5SFyJ80SE,yESm016PH8RS91RES1CSE,8SU12E01FSC/2UEP12RSqP682S58F1BjSS
4P’S z'”S 4zRR1UPyEP12S '12E01FS ”/2UEP12’S U12E01FRS yRR1UPyEP12S y2HS y/E,82EPUyEP12S 1CS 28BS YMRS yRS B8FFS yRS m80C109RS
RJ2U,012PVyEP12SEyRxjS
4PP’S W''S4WO'SQR80S'1228UEP12S'12E01F’SU12E01FRSU1228UEP12SR8E/m–S91HPCPUyEP12Sy2HS08F8yR8jS
4PPP’S KK'S4VHPqj57LTjO79L59jYM7jv/5C/2UEP12Sm80C109RSE,8SC1FF1BP2qSEyRxRS
o WJ2y9PUSC08µ/82UJSR8F8UEP12S
o Y8yR/08982ERSm80C1098HS5JSYMS
o K8m10EP2qS98yR/08982ERSE1SE,8Sz+S
o ”08µ/82UJSU,y2q8S5JSE,8Sz+Sy2HSPERSyRR1UPyE8HSYMRS
e
o +1B80SRy6P2qSm01U8H/08S
g
o M0y2R9PESm1B80SU12E01FS
io led
o Xy2H1680S58EB882Sz+RSy2HSBPE,P2Sz+S
”PqjSXjXjVSR,1BRSX3+…KOzDZ"SYz'S”0y98SC109yEjSS
ic ow
n
bl kn
at
Pu ch
Te
X3+…KOzDZ"S98HP/9SyUU8RRSU12E01FSPRS5yR8HS12SE,8SMWYz“MWWjS
…yU,SYz'SC0y98SPRS1CS"9RSH/0yEP12Sy2HSPESPRSC/0E,80SHP6PH8HSP2E1SC1/0Sm,yR8RjSS
o d7jHP9HTM5QFHTL5IS'y00P8RSE,8S—01yHUyRES'12E01FS',y228FS4—''X’Sy2HS”0y98S'12E01FS',y228FS4”''X’jSS
o Tj6YvqYL58FHTL5IS'y00P8RSP2C109yEP12SC019SyUU8RRSm1P2ES4z+’S10S'82E0yFS'12E01FF80S4''’SE1SE,8SRm8UPCP8HS915PF8S
E809P2yFjS
o a8vqYL58FHTL5IS'y00P8RSP2C109yEP12SC019S915PF8SE809P2yFSE1Sz+S10S''jS
o VHYPjE5H99LTT58FHTL5ISQR8HSE1SE0y2R9PES0y2H19SyUU8RRSU,y228FS4K'X’SjS
X3+…KOzDZ"SH8CP28RSRP=SHPCC8082ESE0y2Rm10ESU,y228FRS
o dXR5zd7jHP9HTM59FHYYLv/5ISM,PRSU,y228FSU1268JRS5yRPUSP2C109yEP12SC10SE,8S0yHP1SU8FFSE1SyFFSYMRjS
o CXR5 zC7HEL5 9FHYYLv/5 IS '12EyP2RS E,8S 8=yUES H8RU0PmEP12S 1CS E,8S yFF1UyEP12S 1CS 08R1/0U8RS BPE,P2S E,8S U/0082ES Yz'S
C0y98jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-40 Wireless Local Area Networks
o WXR5zW99LTT50LLPQH9L59FHYYLv/5IS7P68RSC88H5yUxSE1SYMRS08qy0HP2qS0y2H19SyUU8RRSH/0P2qSE,8SK'XS1CSE,8Sm086P1/RS
C0y98jS
o BXRSzBjYD5TO88j7M59FHYYLv/5ISM0y2Rm10ERS/R80Sy2HSU12E01FSHyEySC10SH1B2FP2xRSy2HS/mFP2xRjS
o :'XS4:,10ESE0y2Rm10ESU,y228F’S_SSM0y2Rm10ERSU12E01FSHyEySC10SH1B2FP2xRSy2HS/mFP2xRj5
o VXR5zVHYPjE59FHYYLv/5ISQRP2qSE,PRSU,y228F–SYMRSUy2SR82HSP2C109yEP12SE1Sz+“''S6PySRF1EE8HSzF1,yj5
X3+…KOzDZ"SyFR1SH8CP28RSR198SF1qPUyFSU,y228FRSC10SRPq2yFP2q–SU12E01FSy2HSP2C109yEP12SE0y2RC80jSM,8R8SF1qPUyFSU,y228FRS
y08S9ymm8HS12S:'X–SO'X–Sy2HSK'XSE0y2Rm10ESU,y228FRjSS
o -dXR5 I5 QR8HS 12FJS P2S H1B2FP2xS E1S 501yHUyRES U12E01FS P2C109yEP12S 08FyE8HS E1S E,8S U8FFjS 3ES ,8FmRS P2S ,y2H1680–S
yRR1UPyEP12–SR8U/0PEJSy2HS0yHP1SFP2xSU12E01FSC/2UEP12RjS
o TXXR5I5'1268JRSKO'SR/5SFyJ80SRPq2yFRS58EB882Sy2Sz+Sy2HSE,8SYMjS
e
o aTXR5I5'y00P8RSWO'S+WQSC10SU12680q82U8SFyJ80SHyEyjS
g
o BXXR5I53ESPRS/R8HSC10S80010SU12E01FSC/2UEP12RSC10SySRm8UPCPUSQW'XjS
io led
o W-XR5I53ESPRS/R8HSC10SyRR1UPyEP12Sy2HS08ZyRR1UPyEP12S08µ/8RE598RRyq8Rj555
4.5 Bluetooth
ic ow
4.5.1 Introduction
n
bl kn
—F/8E11E,SPRSySBP08F8RRSOzDSE8U,21F1qJSBPE,S680JSFP9PE8HSU1680yq8S4y51/ES‘;9’Sy2HSPESH18RS21ES288HSy2JSP2C0yRE0/UE/08S
4—F/8E11E,SPRSy2S8=y9mF8S1CSyHS,1US28EB10xR’jS
at
Pu ch
—F/8E11E,SE8U,21F1qJSByRSCP0RESH868F1m8HS5JS…0PURR12jSS3ESByRSE,82SC109yFPV8HS5JSySq01/mS1CS8F8UE012PURS9y2/CyUE/080RS
R/U,SyRS…0PURR12–S3—Y–S32E8F–SD1xPy–Sy2HSM1R,P5ySB,1SZ1P2EFJSC109SE,8S—F/8E11E,S:m8UPyFS32E808RES701/mS4:37’jS
Te
—F/8E11E,SE8U,21F1qJSByRSH8RPq28HSm0P9y0PFJSE1SR/mm10ESRP9mF8SBP08F8RRS28EB10xP2qS1CSm80R12yFSU12R/980SH86PU8RSy2HS
m80Pm,80yFR–SP2UF/HP2qSU8FFSm,128R–S+WzR–Sy2HSBP08F8RRS,8yHR8ERS4+80R12yFSz08ySD8EB10xSaS+zD’jS
'19my08HSE1S-PZ”P–S—F/8E11E,S28EB10xP2qSPRS9/U,SRF1B80–SyS5PES9108SFP9PE8HSP2S0y2q8–Sy2HSR/mm10ERSC8B80SH86PU8RjS
Features of Bluetooth
—F/8E11E,SH86PU8RSq8280yFFJSU199/2PUyE8SyESF8RRSE,y2S‘SY5mRjS
<m80yE8RSP2SE,8SkR,5URVS3:YS5y2HSBPE,S^fS10S"[SK”SU,y228FRjS
7”:cS 47y/RRPy2S ”08µ/82UJS :,PCES c8JP2q’S 91H/FyEP12S PRS /R8HS y2HS MWWS 4MP98S WP6PRP12S W/mF8=’S PRS /R8HS C10S /mFP2xS y2HS
H1B2FP2xSR8my0yEP12jS
3ESymmFP8RSCR--SBPE,SyS4[PPS,1mR“RS,1mmP2qS0yE8jS
3ES/R8RS:'<S4:J2U,0121/RS'1228UEP12S<0P82E8H’SFP2xRSC10S61PU8Sy2HSz'OS4zRJ2U,0121/RS'1228UEP12SF8RR’SFP2xRSC10SWyEyjS
QR8RS”…'S4C10By0HS80010SU1008UEP12’SBPE,S21S08E0y2R9PRRP12jS
QR8RS]XSx5PE“RSH/mF8=–Sm1P2EZE1Zm1P2E–SUP0U/PESRBPEU,8HSU,y228FRjS
M1m1F1qJS_S<680FymmP2qSmPU128ERS4REy0R’SC109P2qSySRUyEE8028EjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-41 Wireless Local Area Networks
kR5 -O88j7M5 0j75 HP5 Fj95 YLM6j7LqYD5 I5 zHZ,1US 28EB10xRS y08S /R8C/FS C10S E0yH8R,1BRS y2HS 8=,P5PEP12RS B,808S R8680yFS m81mF8S
U198SE1q8E,80Sy2HS8=U,y2q8SHyEyjS-P08F8RRS28EB10xRSUy2SR/mm10ESE,PRSEJm8S1CSP2E80yUEP12jS:9yFFSH86PU8RS9yJS21ES,y68S
-OzDSyHymE80RS1CS3………V;"j‘‘SREy2Hy0H–S5/ESU,8ym80S—F/8E11E,SU,PmRS5/PFESP2jS
GR5 d7qPDqYD5j05JLM6j7LT5I5QRP2qSBP08F8RRSmPU128ER–SyS915PF8Sm,128SUy2S58SU1228UE8HSE1SyS+WzS10SFymE1mSP2SySRP9mF8SByJjS
M,8S 915PF8S m,128S E,yES ,yRS 5F/8E11E,S U,PmS Uy2S 21BS yUES yRS yS 50PHq8S 58EB882S E,8S F1UyFS mPU128ES y2HS E,8S qF15yFS 7:YS
e
28EB10xjS
g
4.5.3 Architecture
io led
(MU – May 14)
Q. With respect to Bluetooth protocol explain piconet and scatternet. (May 14, 10 Marks)
ic ow
Qq9jYLMSPRSySU1FF8UEP12S1CS—F/8E11E,SH86PU8RSB,PU,Sy08SRJ2U,012PV8HSE1SE,8SRy98S,1mmP2qSR8µ/82U8jSS
at
Pu ch
…yU,SmPU128ES,yRS128SH86PU8SUyFF8HSYyRE80S4Y’jSzFFS1E,80SH86PU8RSUyFF8HSRFy68RS4:’Sy08SU1228UE8HSE1SE,8S9yRE80jS
M,8S9yRE80SH8E809P28RSE,8S,1mmP2qSR8µ/82U8SP2SE,8SmPU128ESy2HSyFFSRFy68RS,y68SE1SRJ2U,012PV8SE1SE,PRSmyEE802jS3CSyS
Te
H86PU8SBy2ERSE1Smy0EPUPmyE8SPES,yRSE1SRJ2U,012PV8SE1SE,PRjS
M,808Sy08SEB1S9108SEJm8RS1CSH86PU8R_S+y0x8HSH86PU8S4+’Sy2HS:Ey2HZ5JSH86PU8R4:—’jS
o +y0x8HS H86PU8RS Uy2S 21ES yUEP68FJS my0EPUPmyE8S P2S E,8S mPU128ES 5/ES y08S x21B2S y2HS Uy2S 58S 08yUEP6yE8HS BPE,P2S
R198S9PFFPR8U12HRjS
o :Ey2HZ5JS4:—’SH86PU8RSH1S21ESmy0EPUPmyE8SP2SE,8SmPU128EjSS
zSYyRE80S4Y’SUy2SU1228UESR8682SyUEP68SRFy68RSy2HS/mSE1S"\\Smy0x8HSRFy68RSm80SmPU128EjSS
zFFS yUEP68S H86PU8RS P2S yS mPU128ES y08S yRRPq28HS yS [Z5PES yUEP68S 989580S yHH08RRS 4zYz’jS z2HS yFFS my0x8HS H86PU8RS y08S
yRRPq28HSVZ5PESmy0x8HS989580SyHH08RRS4+Yz’jS
M,8S9yRE80S4Y’SqP68RSPERSUF1UxSy2HSXVZ5PESH86PU8S3WSE1SyFFSRFy68RSP2SySmPU128EjSX1mmP2qSR8µ/82U8SPRSH8E809P28HS5JS
H86PU8S3WSy2HS,1mmP2qSmyEE802SPRSH8E809P28HS5JS9yRE80YRSUF1UxjS
zFFSyUEP68SH86PU8RS/R8SE,8SRy98S,1mmP2qSR8µ/82U8Sy2HS,1mRSE1q8E,80jS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-42 Wireless Local Area Networks
(a)
g e
io led
ic ow
n
bl kn
M= Master device
at
S= Slave device
Pu ch
P = Parked device
SB = Standby device
Te
(b)
Fig. 4.5.1 : (a) Piconet (b) Scatternet
kR5 -9HMML7YLM5
-9HMML7YLMSPRSySq01/mS1CSmPU128ERjSY108SE,y2S128SmPU128ESUy2S58SU1228UE8HSE1SC109SySRUyEE8028ESE,01/q,SE,8SR,y0P2qS
1CSU19912S9yRE80S10SRFy68SH86PU8RjS
W86PU8RSUy2S58SRFy68SP2S128SmPU128ESy2HS9yRE80SP2Sy21E,80jSS
'199/2PUyEP12S58EB882SmPU128ERSUy2SEyx8SmFyU8S5JSZ/9mP2qSH86PU8RS5yUxSy2HSC10E,S58EB882SE,8SmPU128ERjSS
…yU,S mPU128ES P2S yS RUyEE8028ES /R8RS yS HPCC8082ES ,1mmP2qS R8µ/82U8S E,yES PRS yFByJRS H8E809P28HS 5JS E,8S 9yRE80S 1CS E,yES
mPU128EjS
Q. Draw and explain Bluetooth protocol stack in detail. (May 12, Dec. 12, Dec. 13, Dec. 18, 10 Marks)
Q. Explain in detail Bluetooth protocol architecture. (May 16, Dec. 16, May 17, May 18, 10 Marks)
Q. Describe Bluetooth architecture and protocol stack. Also discuss its limitations. (Dec. 17, 10 Marks)
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-43 Wireless Local Area Networks
e
o zMS_SzEE82EP12SR8µ/82U8S
g
o <—…jS_S<5Z8UES8=U,y2q8S
io led
o M':S—3DS_SM8F8m,12JSU12E01FSm01E1U1FSRm8UPCPUyEP12SaS5P2y0JS
o —D…+S_S—F/8E11E,S28EB10xS82UymR/FyEP12Sm01E1U1FS
o
ic ow
:W+S_S:806PU8SHPRU1680JSm01E1U1FS
o K”'<YYS_SKyHP1SC08µ/82UJSU199jS
n
Fig. 4.5.2 : Bluetooth protocol stack
bl kn
Radio Layer
at
Pu ch
KyHP1SFyJ80SH8CP28RSE,8SUy00P80SC08µ/82UP8RSy2HS1/Em/ESm1B80jS
—F/8E11E,S/R8RS"jXS7XqSFPU82R8SC088S5y2HjS
Te
”08µ/82UJS,1mmP2qSy2HSMWWS4EP98SHP6PRP12SH/mF8=’SPRS/R8HSC10SE0y2R9PRRP12SBPE,SCyRES,1mmP2qS0yE8S1CS‘];;S,1mR“RjS
3ES/R8RS^fS,1mSUy00P80RS8µ/yFFJSRmyU8HSBPE,S‘SYXVjS
7y/RRPy2S”:cS/R8HSC10S91H/FyEP12jS
Baseband Layer
—yR85y2HSFyJ80Sm80C109RSC08µ/82UJS,1mmP2qSE1Sy61PHSP2E80C8082U8Sy2HSE1SyUU8RRSE,8S98HP/9jS
W8CP28RSm,JRPUyFSFP2xRSy2HS9y2JSmyUx8ESC109yERjS
3ESU12E01FRS_S
o W86PU8SzHH08RRP2qS
o ',y228FSU12E01FS4,1BSH86PU8RSCP2HS8yU,S1E,80’SE,01/q,SmyqP2qSy2HSP2µ/P0JS98E,1HRS
o +1B80ZRy6P2qS1m80yEP12RS
o ”F1BSU12E01FSy2HSRJ2U,012PVyEP12Sy912qS—F/8E11E,SH86PU8RjS
Link Manager Protocol (LMP)
M,8SFP2xS9y2yq80Sm01E1U1FS4OY+’S9y2yq8RS6y0P1/RSyRm8UERS1CSE,8S0yHP1SFP2xS58EB882S9yRE80Sy2HSRFy68jS
M,8SC1FF1BP2qSC/2UEP12RSy08SU16808HS5JSOY+S_S
o z/E,82EPUyEP12–SmyP0P2q–Sy2HS82U0JmEP12S
o :J2U,012PVyEP12S
o 'ymy5PFPEJS28q1EPyEP12S
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-44 Wireless Local Area Networks
o d1:S28q1EPyEP12S
o +1B80SU12E01FS
o OP2xSR/m806PRP12S
o :EyE8Sy2HSE0y2R9PRRP12S91H8SU,y2q8S
Logical Link Control and Adaptation Layer Protocol (L2CAP)
O"'z+SPRSFyJ808HS1680SE,8S—yR85y2HS+01E1U1FSy2HS08RPH8RSP2SE,8SHyEySFP2xSFyJ80jSS
O"'z+Sm016PH8RS_S
o '1228UEP12Z10P82E8HS y2HS U1228UEP12F8RRS HyEyS R806PU8RS E1S /mm80S FyJ80S m01E1U1FRS BPE,S m01E1U1FS 9/FEPmF8=P2qS
Uymy5PFPEJjS
o :8q982EyEP12Sy2HS08yRR895FJS1m80yEP12jS
o 701/mSy5RE0yUEP12RjS
e
O"'z+Sm016PH8RSE,088SHPCC8082ESEJm8RS1CSF1qPUyFSU,y228FRSE,yESy08SE0y2Rm10E8HS6PySz'OSFP2xS58EB882S9yRE80Sy2HSRFy68–S
E,8R8Sy08S_S
g
o '1228UEP12F8RRS/R8HSC10S501yHUyREjS
io led
o '1228UEP12Z10P82E8HSC10SHyEySE0y2RC80SBPE,Sd1:SCF1BSRm8UPCPUyEP12jS
o :Pq2yFP2qS/R8HSE1S8=U,y2q8SRPq2yFP2qS98RRyq8RS58EB882SO"'z+S82EPEP8RjS
ic ow
3ESm016PH8RSyUU8RRSE1S,y0HBy08SREyE/RSy2HSU12E01FS08qPRE80RjS
…RR82EPyFFJSE,PRSP2E80CyU8Sm016PH8RSyS/2PC109S98E,1HS1CSyUU8RRP2qSE,8S—F/8E11E,S5yR85y2HSUymy5PFPEP8RjS
at
Pu ch
M,8SX'3S8=PRERSyU01RRS[SR8UEP12R–SYFL5RjTM–SY7HYT8j7M5BHNL7_5RjTM5XjYM7jvvL7jS…yU,S1CSE,8SR8UEP12RS,yRSySHPCC8082ES01F8S
E1SmFyJSP2SE,8SX'3SRJRE89jS
Te
X'3SH8CP28RSE,8SR8ES1CSC/2UEP12RS1CSyS—F/8E11E,S91H/F8SE,yESy08SyUU8RRP5F8SE1SE,8S,1RESy2HSPERSymmFPUyEP12jS
X'3SUy2S58SR882SyRSySR1CEBy08“,y0HBy08S51/2Hy0JjS
RFCOMM
M,8SK”'<YYSm01E1U1FSm016PH8RS89/FyEP12S1CSR80PyFSm10ERS1680SE,8SO"'z+Sm01E1U1FjS
3ESPRSySUy5F8S08mFyU8982ESm01E1U1FSE,yESm016PH8RSySR80PyFSFP28SP2E80CyU8SE1SyFFSE,8SymmFPUyEP12RjS
M,8Sm01E1U1FSPRS5yR8HS12SE,8S…M:3SREy2Hy0HSM:S;^j‘;jS
3ESR/mm10ERS9/FEPmF8SR80PyFSm10ERS1680SySRP2qF8Sm,JRPUyFSU,y228FjS
Profiles
+01CPF8RSy08SRm8UPCPUyEP12RSB,PU,SH8RU0P58S,1BS—F/8E11E,SR,1/FHS58S/R8HSP2SySRm8UPCPUSymmFPUyEP12Sy2HSyRSE,/RS82R/08RS
E,yESyFFSH86PU8RSC019SHPCC8082ES9y2/CyUE/080RSUy2SR8y9F8RRFJSB10xSBPE,S128Sy21E,80jSM,808Sy08Sy51/ESySH1V82Sm01CPF8R_S
78280PUSzUU8RR–S:80PyFS+10E–SWPyF/mSD8EB10xP2q–S”zj–SX8yHR8E–SOzDSzUU8RRS+1P2E–S78280PUS<5Z8UES…=U,y2q8S4<—…j’–S”PF8S
M0y2RC80–S<5Z8UES+/R,–S:J2U,012PVyEP12–S'10HF8RRSM8F8m,12J–Sy2HS32E80U19jSS
Y108Sm01CPF8RSy08S/2H80SHPRU/RRP12SBPE,P2S6y0P1/RS—F/8E11E,S:37Sq01/mRjS
M,8S m01CPF8S U12U8mES PRS /R8HS E1S H8U08yR8S E,8S 0PRxS 1CS P2E801m80y5PFPEJS m015F89RS 58EB882S HPCC8082ES 9y2/CyUE/080RmS
m01H/UERjS
Telephony Control Protocol Specification Binary (TCS-BIN)
M1S H8CP28S UyFFS U12E01FS RPq2yFP2qS C10S E,8S 8REy5FPR,982ES 1CS 61PU8S y2HS HyEyS UyFFRS 58EB882S —F/8E11E,S H86PU8RS M':Z—3DS
H8RU0P58RSyS5P2y0J–SmyUx8ES5yR8H–S5PEZ10P82E8HSm01E1U1FjS
e
MU – Dec. 15
g
Q. Explain how a Bluetooth network is established using baseband state transitions. (Dec. 15, 10 Marks)
io led
zSEJmPUyFS—F/8E11E,SH86PU8S,yRSySm1B80S1CS‘;;9-Sy2HSUy2S,y68SyS0y2q8S1CS/mE1S‘;;9jS
Xy6P2qSR/U,S,/q8Sm1B80Sy2HS08FJP2qS12S5yEE80JSyRSPERSR1/0U8SBPFFS08R/FESP2SyS,/q8SByREyq8SPCSE,8SH86PU8SFP8RSPHF8SC10SF12qS
ic ow
EP98jS
—F/8E11E,SH8CP28RSR8680yFSF1BZm1B80SREyE8RSC10SySH86PU8jSM,8S9yZ10SREyE8RSm08R82ESUy2S58SR882SP2SE,8S”PqjSXj\j[jS
n
bl kn
-MHYPQN5ISzSH86PU8SB,PU,SPRSU/0082EFJS<DSy2HS21ESmy0ES1CSy2JSmPU128ESPRSP2SREy2H5JS91H8jS32SE,PRSF1BZm1B80S91H8S12FJS
E,8S2yEP68ZUF1UxS0/2RjS
at
KYGOq7N5ISD1BSE,8S9168982ESE1SE,8S28=ES21H8SPj8jSP2µ/P0JSREyE8SPRS5yR8HS12S8PE,80S1CSEB1SByJRS_S
Pu ch
4R5 W5 PLKq9L5 6HYMT5 Mj5 LTMHQvqTF5 H5 8q9jYLM5 IS M,8S /R80S By2ERS E1S RUy2S yFFS E,8S H86PU8RS P2S PERS 0y2q8jS M,PRS P2µ/P0JS
m01U8H/08SPRSREy0E8HS5JSR82HP2qSy2S32µ/P0JSyUU8RRS'1H8S43z'’SE1SyFFSH86PU8RSP2S0y2q8jS
Te
kR5 TLKq9L5 qY5 -MHYPQN5 MFHM5 vqTMLYT5 8L7qjPq9HvvN5 IS zS H86PU8S B,PU,S PRS P2S :Ey2H5JS 9yJS 82E80S E,8S 32µ/P0JS REyE8S
m80P1HPUyFFJSE1SR8y0U,SC10S3z'S98RRyq8RjS3CSPESCP2HRS128SR/U,–SE,82SPESE0y2RC80RSE,8S28U8RRy0JSP2C109yEP12Sy51/ES
PER8FCSy2HS58U198RSySRFy68jS
QHDL5EjPL5IS<2SR/UU8RRC/FSP2µ/P0J–SE,8SH86PU8S82E80RSE,8Smyq8S91H8jS32SE,8Smyq8SREyE8SEB1SHPCC8082ES01F8RSy08SH8CP28HjS
‘jS zCE80SE,8S9yRE80SCP2HRSyFFSE,8SH86PU8RS08µ/P08HSC10SySU1228UEP12–SPESR8ERS/mSySmPU128EjS
"jS M,8S9yRE80SE,82SUyFU/FyE8RSRm8UPyFS,1mmP2qSR8µ/82U8RS5yR8HS12SE,8SH86PU8SyHH08RR8RS08U8P68HSE1SU12EyUES8yU,S
H86PU8SP2HP6PH/yFFJjS
[jS M,8SRFy68RSy2RB80SE1SUyFFRS5JSE,8S9yRE80Sy2HSRJ2U,012PV8SE,8P0SUF1UxRSyUU10HP2qFJjS
XjS 32SE,8S98y2EP98–SE,8S9yRE80S9yJSU12EP2/8SE1Smyq8S9108SH86PU8RSE1SE,8SmPU128EjS
\jS zRSR112SyRSE,8SH86PU8S4RFy68’SRJ2U,012PV8RSE1SE,8S,1mmP2qSmyEE802S1CSE,8SmPU128E–SPES82E80RSE,8SU1228UE8HSREyE8jS
XjYYL9MLP5ISM,8SU1228UE8HSREyE8SU12EyP2RSE,8SyUEP68SREyE8Sy2HSE,088SF1BSm1B80SREyE8RjS
W9MqKL5I55
o 32SyUEP68SREyE8SE,8SRFy68Smy0EPUPmyE8RSP2SE,8SmPU128ES5JSFPRE82P2q–SE0y2R9PEEP2qSy2HS08U8P6P2qjSzS9yRE80Sm80P1HPUyFFJS
RJ2U,012PV8RSBPE,SE,8R8SRFy68RjS
o M,8SU199/2PUyEP12SPRSH128S6PySz'OSy2HS:'<SFP2xRjS
o …680JSH86PU8SB,PU,SPRSyUEP68S288HRSE1S,y68SyS[Z5PESzUEP68SY89580SzHH08RRS4zYz’jSS
o 32SE,8SyUEP68SREyE8–SPCSE,8SH86PU8SPRS21ESE0y2R9PEEP2q–SPESUy2SHPRU1228UESPER8FCSy2HSq1SE1SREy2H5JS5JSPLMH9FS98E,1HjS
Mobile Communication & Computing (MU-Sem. 7-Comp) 4-46 Wireless Local Area Networks
zS—F/8E11E,SyFR1S,yRSE,8SU,1PU8SE1Sq1SP2E1S8PE,80S1CSE,8SE,088SF1BZm1B80SREyE8RSB,PU,Sy08S_S
4R5 -Yq00555
o </ES1CSyFFSE,8SE,088SF1BSm1B80SREyE8R–SE,PRS128S,yRS9y=jSm1B80SU12R/9mEP12jS
o Q2FPx8SP2SyUEP68SREyE8SB,808SE,8SRFy68SFPRE82RSE1SmPU128ESyES8680JSRF1E–S,808SPESFPRE82RSyESyS08H/U8HS0yE8SB,PU,SUy2S
58Sm01q0y998HSyRSm80SE,8S288HjS
o M,8S9yRE80SyFR1SyFF1UyE8RSyS08H/U8HS2/9580S1CSRF1ERSC10SE,8SRFy68SP2SR2PCCS91H8jS
kR5 RjvP55
o M,8SH86PU8S,808SRE1mRSyFFSz'OSFP2xSE0y2R9PRRP12RSy08SRE1mm8HjS
o 3CS21SyUEP6PEJSPRSE,808SP2SE,8SmPU128E–SE,8SRFy68S08H/U8SE,8Sm1B80SU12R/9mEP12S10Smy0EPUPmyE8RSP2Sy21E,80SmPU128EjS
GR5 QH7L55
o M,PRSREyE8S,yRSE,8SF1B80SH/EJSUJUF8Sy2HSF1B8RESm1B80SU12R/9mEP12S1CSE,8SE,088jS
e
o 3ESyFR1S08F8yR8SPES[Z5PESzYzSyHH08RRjS32RE8yHSPESq8ERSySVZ5PES+YzS4+y0x8HSY89580SzUU8RR’jS
g
o 3ES089yP2RSyS989580S1CSE,8SmPU128ES5/ESqP68RSySU,y2U8SC10Sy21E,80SH86PU8SE1S58U198SyUEP68jS
io led
ic ow
n
bl kn
at
Pu ch
Te
Q. Compare between IEEE 802.11 and HIPERLAN-2. (Dec. 12, Dec. 13, Dec. 17, 10 Marks)
Q. Compare HIPERLAN-1, HIPERLAN-2 and 802.11 W-LAN. (May 15, 10 Marks)
Q. Write a short note on HIPER LAN-1 VS HIPERLAN-2. (Dec. 15, 5 Marks)
Q. Compare HIPERLAN 2, BLUETOOTH, IEEE 802.11. (May 16, Dec. 16, 10 Marks)
e
m1B80S M+'S
g
…0010SU12E01FS zKdS zKd–”…'SyES+X`S ”…'SyES+,JRPUyFSFyJ80jS3ES zKd“”…'SyES+X`S zKd“”…'SyESYz'SFyJ80S
io led
FyJ80S /R8RS—'XSU1H8RjS FyJ80S
Review Questions
Q. 1 Discuss the advantages and disadvantages of WLAN over wired network. Explain two basic types of WLAN
architecture.
Q. 4 Discuss the PHY frame format of an IEEE 802.11 using FHSS technique.
Q. 6 Describe MAC mechanism schemes used in IEEE802.11. Explain in detail MAC scheme that uses DCF with
RTS/CTS extension.
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
Mobility Management
5
Unit V
Syllabus
e
5.3 Micro Mobility : CellularIP, HAWAII, HMIPv6,
g
Introduction
io led
IP Mobility is a mechanism that allows mobile device to move from one network to another network without
changing its permanent IP address. This chapter discusses various protocols to support IP Mobility. Mobile IP was the first
ic ow
communication protocol developed by IETF to support IP mobility with the current version of IPV4. Later Mobile IPV6
(MIPV6) was developed as an update to IPV6 protocols to supports IP mobility. IPV6 header has some new features and
n
options that supports IP mobility. The chapter also discusses various Micro mobility mechanisms to support fast and
bl kn
seamless handover while mobile device is changing its network or point of attachment.
at
IP mobility refers to the set of mechanisms that allow an IP mobile node to move freely between
Te
5.1.1 Mobile IP
Mobile IP (or MIP) is an IETF standard communications protocol that is designed to allow mobile device users to move
from one network to another while maintaining a permanent IP address.
Mobile IP is an enhancement of the internet protocol (IP) that adds mechanisms for forwarding internet traffic to
mobile devices when they are connecting through other than their home network. Fig. 5.1.1 shows generic Mobile IP
topology.
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-2 Mobility Management
Every host will have a "Home Address (Permanent IP)” within a "Home Network". A home network has a "Home
Agent" that provides several services for the mobile node
Traffic destined to the "Home Address" of mobile node (MN) will always be routed to the "Home Agent."
If the mobile node is in its "Home Network", traffic will be forwarded directly the mobile node.
If the mobile node has moved to some other network called "Foreign Network", traffic will be IP tunneled by the
"Home Agent" to a "Care-of- Address". The Care- of- address defines the current location of the mobile node.
Every Foreign network has ‘Foreign agent (FA) ’. The foreign agent can provide several services to the mobile node
during its visit to the foreign network. The FA can have the COA (care or address) acting as a tunnel endpoint when
forwarding packets to the MN.
g e
io led
ic ow
n
Fig. 5.1.1 : Mobile IP topology
bl kn
5.1.2 Optimization
at
Pu ch
Triangular routing
With Mobile IPv4 there is always a triangular traffic pattern. As shown in Fig. 5.1.2 the IP packet from a CN
Te
(Correspondent Node) destined to an MN needs to be routed to its HA first and then tunneled to the foreign agent of
the MN.
If the Corresponding Node (CN)and MN are very near, then also the IP packet has to travel a long way to reach the
MN. This in efficient behavior of a non optimized mobile IP is called Triangular Routing.
The triangle is made of the three segments : CN to HA, HA to COA/MN and MN back to CN.
e
4. Binding warnings
g
A binding warning message is sent by anode if it decapsulates a packet for an MN but it is not the FA for that MN
io led
currently.
If CN receives the binding warning, it requests the HA for a new binding update.
ic ow
If the HA receives the warning it directly sends a binding update to the CN.
Fig. 5.1.3 explains how these four messages are used together when an MN changes its FA and also shows the
n
exchange of messages in optimization protocol.
bl kn
at
Pu ch
Te
CN doesn’t know about the current location of MN, its till tunnels its packets for MN to the old foreign agent FAold.
The FAold notices packets destined to MN but also knows MN currently not in current FA.
FAold might now forward these se packets to the new COA of MN which is new foreign agent.
Thus the packets that are in transit are not lost. This behavior is another optimization to basic mobile IP and provides
smooth handover.
FAold sends binding warning message to CN. CN then requests a binding update.
The HA sends an update to inform the CN about the new location, which is acknowledged. Now CN cans end data
directly to FAnew, and avoid triangular binding.
However, the optimization will not work if the MN does not want to reveal its current location to the CN because of
security.
e
Internet protocol was extensively modified to accommodate the growth and new demands of the Internet. The format
g
and the length of the IP addreses were changed along with the packet format.
io led
Related protocols such as ICMP were also modified. Other protocols in the network layer, such as ARP, RARP, IGMP
were either deleted or included in ICMPv6 protocol. Routing protocols such as RIP and OSPF were slightly modified to
accommodate these changes. The fast spreading use of Internet and new services such as mobile IP, IP telephony, and
ic ow
IP-capable mobile telephony, may require the total replacement of IPv4 by IPv6.
Advantages of IPv6
n
bl kn
1. Larger address space : An IPv6 address is 128 bit long. Compared with the 32 bit long IPv4 address, this is huge
increase in address space.
at
Pu ch
2. Better Header format : IPv6 uses a new header format in which options are separated from the base header and
inserted when needed, between the base header and the upper layer data. This simplifies and speeds up the routing
process because most of the options do not need to be checked by routers.
Te
3. New Options : IPv6 has new options to allow for additional functionalities.
4. Allowance for extension : IPv6 is designed to allow the extension of protocol if required by new technologies or
applications.
5. Support for resource allocation : In IPv6, the type-of-service field has been removed, but mechanism called Flow label
has been added to enable the source to request special handling of packet. This mechanism can be used to support
traffic such as real-time audio and video.
6. Support for more security : The encryption and authentication options in IPv6 provide confidentiality and integrity of
the packet.
Features of Ipv6 to support mobility
No special mechanisms are needed for securing mobile IP registration. In every Ipv6 node address auto configuration
i.e. the mechanism for acquiring a COA is inbuilt.
Neighbor discovery mechanism is also mandatory for every Ipv6 node. So special foreign agents are no longer needed
to advertise services.
Combining the features of address auto configuration and neighbor discovery enables every Ipv6 mobile node to
create and obtain a topologically correct address or the current point of attachment.
Every Ipv6 node can send binding updates to another node, so the MN can send its COA directly to the CN and HA. The
FA is no longer needed. The CN processes the binding updates and makes corresponding entries in its routing cache.
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-5 Mobility Management
g e
io led
ic ow
n
bl kn
2. Traffic Class : 8 bits - Used to specify different classes or priorities of IPv6 packets.
3. Flow Label : 20 bits - Used for specifying special router handling from source to destination(s) for a sequence of
packets. It distinguish the different types of packets such as audio, video, txt etc. and accordingly provides quality of
services to them.
4. Payload Length : 16 bits unsigned - Specifies the length of the data in the packet.
5. Next Header : 8 bits - Specifies the next encapsulated protocol. The values are compatible with those specified for the
IPv4 protocol field.
6. Hop Limit : 8 bits unsigned - For each router that forwards the packet, the hop limit is decremented by 1. When the
hop limit field reaches zero, the packet is discarded. This replaces the TTL field in the IPv4 header that was originally
intended to be used as a time based hop limit.
7. Source address : 16 bytes - The IPv6 address of the sending node.
8. Destination address : 16 bytes - The IPv6 address of the destination node.
Mobile IP supports of both MIPv4 and MIPv6, but IPv4 has a couple of drawbacks. The main drawback of IPV4 is
address exhaustion, making MIPv6 the future option for mobility protocol in IP Networks.
Mobile IPv6 (MIPv6) is a protocol developed as a subset of IPv6 to support mobility.
MIPv6 is an update of the Mobile IP standard designed to authenticate mobile devices using IPv6 addresses.
In traditional IP routing, IP addresses represent a topology. Routing mechanisms rely on the assumption that each
network node will always have the same point of attachment to the Internet, and that each node's IP address
identifies the network link where it is connected.
In this routing scheme, if you disconnect a mobile device from the Internet and want to reconnect through a different
network, you have to configure the device with a new IP address, and the appropriate netmask and default router.
Otherwise, routing protocols have no means of delivering packets, because the device's network address doesn't
contain the necessary information about the node's network point of attachment to the Internet.
Mobile IPv6 allows a mobile node to transparently maintain connections while moving from one subnet to another.
e
Each device is identified by its home address although it may be connecting to through another network. When
connecting through a foreign network, a mobile device sends its location information to a home agent, which
g
intercepts packets intended for the device and tunnels them to the current location.
io led
5.3.2 FMIPv6 (Fast Hand Over for Mobile IPV6)
Mobile IPv6 (MIPv6) enables a Mobile Node (MN) to maintain its connectivity to the Internet when moving from one
ic ow
Hand over latency results from the standards handover procedure such as movement detection, new Care of address
configuration, binding updates etc.
at
Pu ch
This Hand over latency is often unacceptable to real-time traffic such as Voice over IP (VoIP).
The fast handover for mobile IPv6 (FMIPv6) aims at reducing the long handover latency in mobile IPv6 by fast
Te
5.4.1 Cellular IP
Why Cellular IP ?
Mobile IP exhibits several problems when there is a large number of mobile devices changing network frequently and
moving very fast. In such cases, a high load on home agents and on the network is generated by registration and
binding update messages.
Mobile IP is basically designed only for macro level mobility and relatively slow moving hosts.
Cellular IP (CIP) is a new robust, simple, and flexible protocol for highly mobile hosts.
CIP complements Mobile IP by supporting local mobility.
It can accommodate large number of users by separating idle hosts from active hosts.
CIP architecture
The architecture of Cellular IP is shown in Fig. 5.4.1. It consists of three major components.
e
o Cellular IP gateway (GW),
g
o Cellular IP node or the base station (BS)
io led
o Cellular IP mobile host (MH)
ic ow
n
bl kn
at
Pu ch
Te
An important component of a Cellular IP network is the base station (BS). A cellular IP network consists of several
interconnected BSs.
The BSs communicate with mobile hosts (MHs) via wireless interface and also route IP packets inside the cellular
network. The base stations are built on regular IP forwarding engines, but IP routing is now replaced by Cellular IP
routing and cellular location management.
CIP gateway router connects a cellular IP network and the regular Internet.
Mobility between gateways is managed by Mobile IP while mobility within access networks is handled by Cellular IP.
Now the IP address of gateway serves as the care-of-address for all mobile hosts that are currently attached to the
network.
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-8 Mobility Management
Routing in CIP
Uplink packets (packets originated from mobile host) are routed from mobile host to the gateway on a hop-by-hop
basis.
The path taken by these packets is cached in base stations. This cache is called routing cache.
To route downlink packets addressed to a mobile host the path used by recent packets transmitted by the host (that
are already stored in route cache) is reversed.
A mobile host may wants to maintain its routing cache mappings even though it is not regularly transmitting data
packets.
Such mobile hosts transmit route-update packets at regular interval to keep their routing cache mappings valid. These
packets are empty data packets addressed to the gateway.
Paging in CIP
In Cellular IP, an idle mobile host is one that has not received data packets for a system specific time.
e
For such idle hosts, their downlink soft state routes timeout and are removed from the routing cache.
g
These hosts transmit paging-update packets at regular intervals. The paging update packet is an empty IP packet
io led
addressed to the gateway. It is distinguished from route update packet by its IP type parameter.
Similar to data and route update packets, paging update packets are routed on a hop-by-hop basis to the gateway.
Base stations may optionally maintain paging cache.
ic ow
Thus all idle mobile hosts have mappings in paging caches but not in routing caches.
n
In addition, active mobile hosts will have mappings in both routing as well as paging cache.
bl kn
Packets addressed to a mobile host are normally routed by routing cache mappings. Paging occurs when a packet is
addressed to an idle mobile host and the gateway or base stations find no valid routing cache mapping for the
at
destination.
Pu ch
The paging cache is used to avoid broadcast search procedures found in cellular systems.
Te
If there is no entry in the paging cache, then the packet addressed to an idle mobile host is broadcast in the access
network. This may happen when transmitting first packet to the any host.
Idle mobile hosts that receive a packet, move from idle to active state and immediately transmit a route-update
packet.
Handover in CIP
CIP implements MCHO (Mobile controlled handover) thus, in CIP, handoff is initiated by Mobile Host (MH).
MH listens to the beacon transmitted by BSs and initiates handover based on signal strength measurements.
To perform a handoff, an MH tunes its radio to the new BS. It then sends a route update packet to this new BS.
This creates entry in a routing cache on route to the gateway, thus, configuring the downlink route to the new BS.
During the handoff process time, downlink packets may be lost. The mappings associated with the old base station are
not cleared at handover, rather, they timeout as the associated soft-state timers expire.
The mappings associated with the old BS are cleared after the expiry of a timer.
Before the timeout, both the old and new downlink routes remain valid and packets are delivered through both the
BSs. Thus, Cellular IP uses semisoft handover to improve handoff performance.
Advantages of CIP
1. Provides easy Global migration
2. Cheap Passive Connectivity
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-9 Mobility Management
5.4.2 HAWAII
HAWAII (Handoff-Aware Wireless Access Internet Infrastructure) tries to keep micro-mobility support as transparent
as possible for both home agent and MN.
Working
Step 1 : On entering an HAWAII domain, a mobile node obtains a co-located COA.
Step 2 : MN registers with the HA.
Step 3 : When MN moving another cell inside the foreign domain, the MN sends a registration request to the new base
station as to a foreign agent.
Step 4 : The base station interprets the registration request and sends out a handoff update message, which
e
reconfigures all routers on the paths from the old and new base station to the crossover router. When the
g
routing has been reconfigure successfully, the base station sends a registration reply to the MN, again as if it
were a foreign agent.
io led
ic ow
n
bl kn
at
Pu ch
Te
Advantages
1. Security : Challenge response extensions are mandatory. In contrast to cellular IP, routing changes are always initiated
by the foreign domain’s infrastructure.
2. Transparency : HAWAII is mostly transparent to mobile nodes.
Disadvantages
Co-located COA raises DHCP security issues(DHCP has no strong authentication).
Decentralized security-critical functionality(Mobile IP registration processing during handover)in base stations.
Authentication of HAWAII protocol messages unspecified (potential attackers: stationary nodes in foreign network).
Mobile Communication & Computing (MU-Sem. 7-Comp) 5-10 Mobility Management
g e
io led
ic ow
n
bl kn
1. Security : MNs can have (limited) location privacy because LCOAs can be hidden.
2. Efficiency : Direct routing between CNs sharing the same link is possible
Te
Disadvantages
1. Transparency : Additional infrastructure component (MAP).
2. Security : Routing tables are changed based on messages sent by mobile nodes. This requires strong authentication
and protection against denial of service attacks. Additional security functions might be necessary in MAPs
Review Questions
Q. 2 Draw a neat sketch of IPv6 header. Compare IPv4 and IPv6 with respect to IP mobility.
Q. 5 What is Cellular IP. Explain CIP architecture along with routing and paging procedure in CIP.
Q. 6 What are the problems with standard Mobile IP protocol? Explain how MIPv6 overcome these problems.
6 Long Term Evolution of 3GPP
Unit VI
Syllabus
6.1 Long-Term Evolution (LTE) of 3GPP : LTE System Overview, Evolution from UMTS to LTE
6.2 LTE/SAE Requirements, SAE Architecture
6.3 EPS: Evolved Packet System, E-UTRAN, Voice over LTE (VoLTE), Introduction to LTE-Advanced,
6.4 System Aspects, LTE Higher Protocol Layers, LTE MAC layer, LTE PHY Layer,
e
6.5 Self Organizing Network (SON-LTE),SON for Heterogeneous Networks (HetNet), Introduction to 5G
g
io led
Introduction
In chapter 2 we discussed about 2G (GSM , GPRS) and 3G (UMTS) networks. This chapter focuses on 4G network
ic ow
architecture LTE (Long Term Evolution). The chapter discusses detailed system architecture and other system aspects of
Long Term Evolution (LTE). With LTE providing much higher data rate and low latency, it is also important that it supports
n
voice transmission. VoLTE is a technology that transmits Voice over LTE network. Also Self Organizing Networks (SON)
bl kn
which supports dynamic configuration of LTE base stations (eNB) to automate the human efforts for setting up network has
been discussed.
at
Pu ch
WCDMA was upgraded to HSPA, and cdma 2000 was expanded with 1xRTT EV-DO releases A and B. Both are still
widely deployed.
The Third Generation Partnership Project (3GPP), developed the widely used UMTS WCDMA/HSPA 3G standards. As a
4G successor to WCDMA, 3GPP developed Long-Term Evolution (LTE). Thus, LTE was created as an upgrade to the 3G
standards.
Release 8 of LTE was completed in 2010, followed by release 9. Now, release 10 is also available which defines
LTE-Advanced (LTE-A) is also under development.
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
e
6.2.2 SAE Architecture
g
System Architecture Evolution (SAE) is a new network architecture designed to simplify LTE networks. It establish a flat
io led
architecture similar to other IP based communications networks.
SAE uses an eNB and Access Gateway (aGW) and removes the RNC and SGSN from the equivalent 3G network
ic ow
architecture. This allows the network to be built with an “All-IP” based network architecture.
SAE also includes entities to allow full inter-working with other related wireless technology (WCDMA, WiMAX, WLAN,
n
etc.). These entities can specifically manage and permit the non-3GPP technologies to interface directly with the
bl kn
network.
The high-level network architecture of LTE is comprised of following three main components :
at
Pu ch
The evolved packet core (EPC) provides the means to communicate with packet data networks in the outside world
such as the internet, private corporate networks or the IP multimedia subsystem.
Between EU and E-UTRAN there is Uu interface,
EPC is connected to E-UTRAN via S1 interface and to the outside world via SGi interface.
g e
io led
ic ow
n
bl kn
(EPC). It contains only one component, the evolved base stations, called eNodeB or eNB.
Each eNB is a base station that controls the mobiles in one or more cells.
Te
The base station that is currently communicating with a mobile is known as its serving eNB.
Each eBN connects with the EPC by means of the S1 interface.
Two nearby base stations can be connected via the X2 interface, which is mainly used for signaling and packet
forwarding during handover.
e
Policy enforcement
g
Packet filtering
io led
Charging support
Lawful interception
ic ow
Packet screening
3. HSS
n
The HSS (for Home Subscriber Server) is a database that contains user-related and subscriber-related information.
bl kn
It is similar to - Home Location Register (HLR) and Authentication Centre (AuC) used in 3G networks.
at
4. MME
Pu ch
The MME (for Mobility Management Entity) deals with the control plane.
Te
It handles the signaling related to mobility and security for E-UTRAN access. The MME is responsible for the tracking
and the paging of UE in idle-mode. It is the termination point of the Non-Access Stratum (NAS).
Fig. 6.2.4 shows the entire SAE architecture.
When 3GPP started designing the LTE system, prime focus was to create a system which can achieve high data
throughput with low latency.
LTE is an all IP network and the ability to carry voice was not given much importance. Therefore, for LTE networks to
carry traditional circuit switched voice calls, a different solution was required.
This solution to carry voice over IP in LTE networks is commonly known as “VoLTE”. Basically VoLTE systems covert
voice into data stream, which is then transmitted using the data connection.
VoLTE is based on the IMS(IP multimedia system).
IMS is an architectural framework for delivering multimedia communications services such as voice, video and text
messaging over IP networks.
Voice over LTE - VoLTE basics
VoLTE, Voice over LTE is an IMS (IP multimedia System) based technique.
VoLTE enables the system to be integrated with the suite of other applications for LTE.
e
To make implementation of VoLTE easy and cost effective to operators, cut down version of IMS network was defined.
g
This not only reduced the number of entities required in the IMS network, but it also simplified the interconnectivity.
io led
This considerably reduced the costs for network operators as this had been a major issue for acceptance of IMS. The
reduced IMS network for LTE has been shown in Fig. 6.3.1.
ic ow
n
bl kn
The entities within the reduced IMS network used for VoLTE are explained below :
(i) IP-CAN IP, Connectivity Access Network : This consists of the EUTRAN and the MME.
Te
(ii) P-CSCF, Proxy Call State Control Function : The P-CSCF is the user to network proxy. All SIP signaling to and from the
user runs via the P-CSCF whether in the home or a visited network.
(iii) I-CSCF, Interrogating Call State Control Function : The I-CSCF is used for forwarding an initial SIP request to the
S-CSCF. When the initiator does not know which S-CSCF should receive the request.
(iv) S-CSCF, Serving Call State Control Function : The S-CSCF performs a variety of actions within the overall system, and it
has a number of interfaces to enable it to communicate with other entities within the overall system.
(v) AS, Application Server : It is the application server that handles the voice as an application.
(vi) HSS, Home Subscriber Server : The IMS HSS or home subscriber server is the main subscriber database used within
IMS. The IMS HSS provides details of the subscribers to the other entities within the IMS network, enabling users to be
granted access or not dependent upon their status.
The IMS calls for VoLTE are processed by the subscriber's S-CSCF in the home network. The connection to the S-CSCF is
via the P-CSCF.
Benefits of VoLTE
The implementation of VoLTE offers many benefits, both in terms of cost and operation.
VoLTE provides following benefits :
Provides a more efficient use of spectrum than traditional voice;
Meets the rising demand for richer, more reliable services;
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-7 Long Term Evolution of 3GPP
Eliminates the need to have voice on one network and data on another;
Can be deployed in parallel with video calls over LTE and multimedia services, including video share, multimedia
messaging, chat and file transfer;
Ensures that video services are fully interoperable across the operator community, just as voice services are,
Increases handset battery life by 40 % (compared with VoIP);
Provides rapid call establishment time.
e
6.4.1 LTE Advanced Key Features
g
The main aims for LTE Advanced :
io led
Peak data rates : Downlink - 1 Gbps; uplink - 500 Mbps.
Spectrum efficiency : 3 times greater than LTE.
ic ow
Compatibility : LTE Advanced shall be capable of interworking with LTE and 3GPP legacy systems.
These are many of the development aims for LTE Advanced.
Each aggregated carrier is referred to as a ‘component carrier’. The component carrier can have a bandwidth of 1.4, 3,
5, 10, 15 or 20 MHz.
Maximum of five component carriers can be aggregated, hence the maximum bandwidth is 100 MHz.
The number of aggregated carriers can be different in DownLink and UpLink; however the number of UpLink
component carriers is never larger than the number of DownLink component carriers.
g e
io led
ic ow
n
bl kn
at
Pu ch
In continuous aggregation, contiguous component carriers within the same operating frequency band are aggregated
so called intra-band contiguous.
For non-contiguous allocation it could either be intra-band, (i.e. the component carriers belong to the same operating
frequency band, but are separated by a frequency gap) or it could be inter-band, in which case the component carriers
belong to different operating frequency bands (Refer Fig. 6.4.2)
The RRC connection is handled by one cell called the Primary serving cell, served by the Primary component carrier.
The other component carriers are all referred to as Secondary component carrier serving the Secondary serving cells.
e
6.4.2(c) Relay Nodes
g
In LTE-Advanced, the heterogeneous network planning i.e. a mix of large and small cells is possible through Relay
io led
Nodes (RNs).
The Relay Nodes are low power base stations that provides enhanced coverage and capacity at cell edges. It also
serves as hot-spot areas and it can also be used to connect to remote areas without fiber connection.
ic ow
The Relay Node is connected to the Donor eNB (DeNB) via a radio interface, Un.
n
Un is a modification of the E-UTRAN air interface Uu.
bl kn
In the Donor cell the radio resources are shared between UEs served directly by the DeNB and the Relay Nodes.
When the Uu and Un use different frequencies the Relay Node is referred to as a Type 1a RN
at
Pu ch
on Un at the same time (or vice versa). This can be avoided through time sharing between Uu and Un, or having
different locations of the transmitter and receiver.
Fig. 6.4.4 shows the Relay Node (RN) is connected to the DeNB via the radio interface Un. UEs at the edge of the donor
cell are connected to the RN via Uu, while UEs closer to the DeNB are directly connected to the DeNB via the Uu
interface. The frequencies used on Un and Un can be different, outband, or the same, inband.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-10 Long Term Evolution of 3GPP
One of the key issues with many cellular systems is that of poor performance at the cell edges. To improve the
performance at cell edges, LTE-Advanced introduces coordinated multipoint (CoMP) scheme.
In CoMP there are two important components :
1. TX (Transmit) points
2. RX (Receive) Points
A number of TX points provide coordinated transmission in the DL (DownLink).
Similarly a number of RX points provide coordinated reception in the UL (UpLink).
A TX/RX-point constitutes of a set of co-located TX/RX antennas providing coverage in the same sector.
The set of TX/RX-points used in CoMP can either be at different locations, or co-sited but providing coverage in
e
different sectors. They can also belong to the same or different eNBs.
g
In Fig. 6.4.5 two simplified examples for DL CoMP is shown.
io led
ic ow
n
bl kn
(a)
at
Pu ch
Te
(b)
Fig. 6.4.5 : Down Link CoMP (a) Joint Transmission (b) Dynamic point selection
In both these cases Down link (DL) data is available for transmission from two TX-points. When two, or more,
TX-points, transmit on the same frequency in the same subframe it is called Joint Transmission.
When data is available for transmission at two or more TX-points but only scheduled from one TX-point in each
subframe it is called Dynamic Point Selection.
In case of Uplink (UL) CoMP, there is a Joint Reception i.e. a number of RX-points receive the UL data from one UE, and
the received data is combined to improve the quality.
When CoMP is used additional radio resources for signaling is required e.g. to provide UE scheduling information for
the different DL/UL resources.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-11 Long Term Evolution of 3GPP
g e
io led
ic ow
n
bl kn
Pu ch
The Fig. 6.4.6 depicts LTE Advanced (LTE-A) Architecture for E-UTRAN.
It consists of P-GW, S-GW, MME, S1-MME, eNB, HeNB, HeNB-GW and Relay Node etc. Following are the functions of
these architecture entities.
Te
P-GW
It stands for PDN Gateway.
It interfaced with S-GW using S5 interface and with operator's IP services using SGi interface.
It has connectivity with PCRP using Gx interface.
It connects UE to packet data networks.
P-GW assigns IP address to the UE. One UE can have connectivity with more than one PGWs in order to have access to
multiple PDNs.
It takes care of packet filtering, policy enforcement and charging related services. Moreover it fulfils connectivity
between 3GPP (LTE, LTE-A) and non 3GPP (WiMAX, CDMA etc.) technologies.
S-GW
It stands for Serving Gateway.
It interfaces with MME using S11 interface and with SGSN using S4 interface.
It connects with PDN-GW using S5 interface as mentioned above.
EPC gets terminated at this node/entity. It is connected with E-UTRAN via S1-U interface.
Each UE in LTE-A is associated to unique S-GW which has several functions.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-12 Long Term Evolution of 3GPP
e
It provides interface with UEs or LTE-A phones.
g
It has similar functionality as base station used in GSM or other cellular systems.
io led
Each of the eNBs serve one or several E-UTRAN cells. Interface between two eNBs is known as X2 interface.
HeNB
ic ow
HeNB-GW
Pu ch
It aggregates all the traffic from number of Home eNBs to core network.
It uses S1 interface to connect with HeNBs.
Relay Node :
It is used for improving network performance.
e
Maximum No. of 2 in the downlink, 1 in the uplink 2 in the downlink, 2 in the uplink
g
codewords
io led
Spectral 16.3 for 4x4 MIMO in the downlink, 4.32 for 30 for 8x8 MIMO in the downlink, 15
Efficiency(peak,b/s/Hz) 64QAM SISO case in the Uplink for 4x4 MIMO in the Uplink
PUSCH and PUCCH Simultaneously not allowed Simultaneously allowed
ic ow
transmission
n
Modulation schemes QPSK, 16QAM, 64QAM QPSK, 16QAM, 64QAM
bl kn
supported
Access technique OFDMA (DL),DFTS-OFDM (UL) Hybrid OFDMA(DL), SC-FDMA(UL)
at
Pu ch
Fig. 6.4.7 depicts LTE protocol stack. It is divided into two main parts - NAS (Non-Access Stratum) and AS (Access
Stratum).
Further it is categorized into control plane and user plane.
User plane of eNB consists of PHY, MAC, RLC and PDCP layers.
Control plane of eNB consists of these 4 layers and in addition RRC layer also.
Following are functions of each layer.
PHY
This layer takes care of frame formation as per TDD or FDD topology and as per OFDMA structure.
Moreover, it takes care of modulation and coding of different control and traffic channels.
It covers scrambling and codeword to layer mapping functionalities.
It incorporates reference signals which are used for channel estimation and channel equalization.
MAC-Medium Access Control
e
It takes care of following functions :
g
Multiplexing/demultiplexing of RLC Packet Data Units (PDUs).
io led
Scheduling information reporting.
Error correction through Hybrid ARQ (HARQ).
Local Channel Prioritization.
ic ow
Padding.
n
RLC-Radio Link Control
bl kn
In-sequence delivery.
PDCP-Packet Data Convergence Protocol
Header compression.
In-sequence delivery and retransmission of PDCP Session Data Units (SDUs).
Duplicate detection.
Ciphering and integrity protection.
RRC-Radio Resource Control
Broadcast system information related to Non-Access Stratum (NAS) and Access Stratum (AS).
Establishment, maintenance, and release of RRC connection.
Security functions including key management.
Mobility functions.
QoS management functions.
UE measurement reporting and control of the reporting.
NAS direct message transfer between UE and NAS.
NAS-Non Access Stratum
Connection/session management between UE and the core network.
Authentication.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-15 Long Term Evolution of 3GPP
Registration.
Bearer context activation/deactivation.
Location registration management.
e
via lower layers.
g
If RLC entity configured at the eNB, there is a peer RLC entity configured at the UE and vice versa. (Fig 6.5.1 (b)) RLC
performs following major functions :
io led
o Error correction through Automatic Repeat reQuest (ARQ).
o Segmentation according to the size of the transport block and re-segmentation in case a retransmission is
ic ow
needed.
o Concatenation of SDUs for the same radio bearer.
n
o Protocol error detection and recovery.
bl kn
o In-sequence delivery.
RLC Modes :
at
Pu ch
An RLC entity can be configured to perform data transfer in one of the following three modes.
1. Transparent Mode (TM)
Te
As the name suggests the Transparent mode entity in RLC does not add any overhead to the upper layer SDUs.
The entity just transmits the SDUs coming from upper layer to MAC.
In this mode :
o Segmentation or reassembly of RLC SDUs is not allowed
o No RLC headers are added.
o Does not guarantees delivery
RLC TM is used for transmission of paging messages on PCCH, system information transmitted on BCCH and SRB0
messages transmitted on CCCH.
2. Unacknowledged Mode (UM)
RLC Unacknowledged Mode is used for transmission of delay sensitive packets, such as VoIP packets or audio/video
streams.
In this mode :
o Segmentation or reassembly of RLC SDUs is allowed
o RLC headers are added.
o Does not guarantees delivery
o This mode is suitable for carrying streaming traffic.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-16 Long Term Evolution of 3GPP
e
6.5.2 Packet Data Convergence Protocol (PDCP)
g
io led
The PDCP layer is located above the RLC layer and below the IP layer (in the user plane) or the RRC layer (in the
control plane).
PDCP is a kind of interface between inside world and outside world.
ic ow
In other words, the data coming into the eNB first go through PDCP and then gets into RLC (Downlink). Data waiting in
RLC trying to go out to the outside world has to go through PDCP to reach outside world(Uplink Path)
n
The major functions of PDCP layer
bl kn
o Header compression
Pu ch
Duplicate detection
o Ciphering and integrity protection
g e
io led
ic ow
n
bl kn
at
Pu ch
Te
g e
The Hybrid Automatic Repeat-reQuest (HARQ) process is done in combination between the MAC and the PHY layer.
io led
The PHY performs the retention and re-combination and the MAC performs the management and signaling.
The MAC indicates a NACK whenever there’s a transport block (TB) CRC failure; the PHY usually indicates that failure.
Retransmission is done by the eNodeB or the sender on the downlink using a different type of coding.
ic ow
The coding is sent and maintained in buffers in the eNodeB. Eventually, after one or two attempts, there will be
n
enough data to reconstruct the signal.
bl kn
In HARQ operation, the retransmission does not have to be fully correct. It has to be correct enough that it can be
combined mathematically with the previous transport block (TB) in order to produce a good transport block.
at
Pu ch
6. Multiple HARQ processes can run in parallel to retry several outstanding TBs.
g e
io led
Logical Channels Transport Channels
o PCCH : Paging Control Channel o PCH : Paging Channel
o BCCH : Broadcast Control Channel o BCH : Broadcast Channel
ic ow
Fig. 6.6.1 : Logical channels to Physical channel mapping for Down link
Fig. 6.6.1 shows the physical layer control channel at the bottom of the picture.
Te
(ii) Broadcast Control Channel (BCCH) : A downlink channel for broadcasting system control information.
(iii) Paging Control Channel (PCCH) : A downlink channel that transfers paging information. This channel is used
when the network does not know the location cell of the UE.
(iv) Common Control Channel (CCCH) : Uplink channel for transmitting control information between UEs and
network. This channel is used by the UEs having no RRC connection with the network.
(v) Dedicated Control Channel (DCCH) : A point-to-point bi-directional channel that transmits dedicated control
information between a UE and the network. Used by UEs that have an RRC connection.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-20 Long Term Evolution of 3GPP
6.6.4 Scheduling
Scheduling is a process through which eNodeB decides which UEs should be given resources (RBs), how much resource
(RBs) should be given to send or receive data.
In LTE, scheduling is done at per subframe basis i.e. every 1 mili second.
Resources are composed of Physical Resource Blocks (PRB) and Modulation Coding Scheme (MCS).
The MCS determines the bit rate, and thus the capacity, of PRBs.
e
An LTE scheduler performs following function for efficient scheduling :
g
(i) Link Adaptation : It selects the optimal combination of parameters such as modulation, channel Coding and
transmit schemes.
io led
(ii) Rate Control : It is in charge of resource allocation among radio bearers of the same UE which are available at the
eNB for DL and at the UE for UL.
ic ow
(iii) Packet Scheduler : It controls access to air interface resources amongst all active Users.
n
(iv) Resource Assignment : It allocates air interface resources to selected active users on per TTI basis.
bl kn
(v) Power Control : Provides the desired SINR level for achieving the desired data rate, but also controls the
interference to the neighbouring cells.
at
Pu ch
(vi) HARQ (ARQ + FEC) : It allows recovering from residual errors by link adaptation.
In OFDMA, users are allocated a specific number of subcarriers for a predetermined amount of time. These are
referred to as physical resource blocks (PRBs) in the LTE specifications.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-21 Long Term Evolution of 3GPP
e
Depending on the assigned task, physical channels and signals use different modulation and coding parameters.
g
6.7.2 Downlink Multiplexing
io led
OFDMA is the basic multiplexing scheme employed in the LTE downlink.
In OFDMA, groups of 12 adjacent subcarriers are grouped together on a slot-by-slot basis to form physical resource
ic ow
blocks (PRBs).
A PRB is the smallest unit of bandwidth assigned by the base station scheduler.
n
bl kn
Three different types of physical channels are defined for the LTE downlink.
at
Pu ch
e
Support for semi-static resource allocation
g
6.7.5 Mapping Downlink Physical Channels to Transport Channels
io led
Transport channels are mapped to physical channels as shown in Fig. 6.7.2 Supported transport channels are :
1. Broadcast channel (BCH)
ic ow
g e
io led
ic ow
SON Architectures
n
bl kn
The self-organization functionality can be located at one place even split in different nodes.
Self-Optimization algorithms can be located in OAM or eNB or both of them.
at
Pu ch
According to the location of optimization algorithms, SON can be divided into the three main architectures:
1. Centralized SON
Te
2. Distributed SON
3. Hybrid SON
The all three versions differ with respect to data acquisition, data processing and configuration management.
1. Centralized SON
In Centralized SON, optimization algorithms are stored and executed from the OAM System. Here, the SON
functionality resides in a small number of locations, at a high level in the architecture.
Fig. 6.8.2 shows an example of Centralized SON. Here, all SON functions are located in OAM systems, so it is easy to
deploy them but does not support those simple and quick optimization cases.
To implement Centralized SON, existing Northbound Interface (Itf-N), which is the interface between the Element
Manager and the Network Manager, needs to be extended.
Also, as the number of nodes in the network increases, computational requirements will also increase, which might
cause problems in scalability.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-24 Long Term Evolution of 3GPP
g e
Fig. 6.8.2 : Centralized SON
io led
2. Distributed SON
In Distributed SON, optimization algorithms are executed in eNBi. SON functionality resides in many locations at a
ic ow
has to be ensured that there is a coordination between them so that the network as a whole is optimised.
at
Pu ch
Te
3. Hybrid SON
In Hybrid SON, part of the optimization algorithms are executed in the OAM system, while others are executed in eNB.
Fig. 6.8.4 shows an example of Hybrid SON.
In Hybrid SON, simple and quick optimization schemes are implemented in eNB and complex optimization schemes
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-25 Long Term Evolution of 3GPP
are implemented in OAM so as to provide flexibility to support different kinds of optimization cases.
But on the other hand, it costs lots of deployment effort and interface extension work.
g e
io led
Fig. 6.8.4 : Hybrid SON
ic ow
It is assumed that there will be 50 billion connected devices by 2020. Demands for higher data rates continues to
increase.
at
Pu ch
High-quality video streaming, social networking and M2M communication over wireless networks are growing
exponentially.
Hence, a new paradigm called heterogeneous networks (HetNet) are being considered by network operators.
Te
HetNet stands for Heterogeneous Network, which involves a mix of radio technologies, different cell types, distributed
antenna systems, and WiFi working together seamlessly.
The HetNet involves several aspects :
o Use of multiple radio access technologies
o Operation of different cell sizes
o Backhaul
Multiple Size cells
HetNet introduces two main types of cells : Small cells and Macro cells.
1. Small cells :
Small cells have smaller coverage and capacity and are of three types. Micro , Pico and Femto cells. (Listed as in order
of decreasing base station power).
The idea of merging small cells with the macro cell network has the advantage of offloading traffic from the macro cell
sites to the smaller cells while the macro cell operates at its normal capacity.
Table 6.9.1 compared all the cells based on certain characteristics.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-26 Long Term Evolution of 3GPP
e
closer to the customer.
g
(i) Microcells
io led
Microcells, typically cover smaller areas maybe up to a kilometre.
They usually transmit within a range of milliwatts to a few watts.
Microcells are deployed for providing temporary cellular coverage and capacity to places like sports stadiums,
ic ow
This coverage area is around 200m. And us usually they served around 32 to 100 users.
(iii) Femto Cells
Femto cells are typically user-installed to improve coverage area within a small vicinity, such as home office or a
dead zone within a building.
Femto cells can be obtained through the service provider or purchased from a reseller.
Femto cells are open to specific UEs – called CSG (Closed Subscription group) .
A UE close to femto can’t connect to femto if it is not in CSG. In that case it connects to macro instead.
Femto cell usually serves to 4 to 16 users.
Its coverage area is 10 to 50 m.
2. Macro cells
Macro cells have large coverage and capacity and are controlled by High power base stations. These are the cells
which have been traditionally used in all cellular systems.
Base stations in HetNets
Heterogeneous networks consist of different types of base stations supporting different types of cells such as Macro,
Micro, Pico and Femto cells.
o Macro cells are controlled by High Power eNBs.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-27 Long Term Evolution of 3GPP
o Small Cells (Micro, Pico and Femto) are controlled by Low power eNBs. Low Power nodes include micro, pico,
Remote Radio Heads (RRH), relay nodes and femto nodes.
These can use the same or different technologies.
In LTE networks, the actual cell size depends not only on the eNodeB power but also on antenna position, as well as
the location environment; e.g. rural or city, indoor or outdoor etc.
Different nodes, for small cells, used in LTE/LTE-A HetNets are listed below :
1. Home eNodeB (HeNB)
These nodes are used to form Femto cells.
It is a low power eNodeB which is mainly used to provide indoor coverage, for Closed Subscriber Groups (CSG).
For example, in office premises.
HeNBs are privately owned and deployed without coordination with the macro-network.
2. Relay Node (RN)
e
Relay 4 interface Uu.
3. RRHs (Remote Radio Head)
g
io led
RRH is connected to an eNB via fibre can also be used to provide small cell coverage.
It is an alternative solution to a BTS housed in a shelter at the bottom of the tower.
ic ow
It is a distributed base station, in which the majority of the base station equipment is no longer located in the
shelter, but in an enclosure at the top of the tower near the antenna.
n
This separate but integrated radio frequency (RF) unit is called a remote radio unit or remote radio head.
bl kn
It is compact in size. RRH is generally used to extend the coverage of a base station sub-system in the remote
rural areas.
at
Pu ch
A key component of such heterogeneous networks, which helps in meeting the above requirements is network
intelligence via the SON (Self Organizing Network).
SON is automation technology that enables the network to set itself up and self-manage resources and
configuration to achieve optimal performance in an integrated network approach.
The self-organizing and self-optimizing capability of the small cell smoothen the path for implementation of such
heterogeneous networks.
A self-organizing micro base station can automatically detect the surrounding radio environment conditions and
automatically plan and configure radio parameters such as frequency, scrambling code, and transmission power.
A traditional base station cannot do this.
6.10 Introduction to 5G
e
6.10.1 Overview
g
5G is not just one technology, it is actually a combination of several technologies in one. The system, however, will be
io led
a smart and know when to make use of which technology for maximum efficiency.
5G will be much more faster than 4G. It will provide data rate up to 10Gbps.
ic ow
It will provide 100% coverage area. That is better coverage even at the cell boundaries.
5G will also provide low network latency (up to 1 msec) which will be helpful for the critical applications like industry,
n
healthcare and medical.
bl kn
5G technology aims to provide wide range of future industries from retail to education, transportation to
at
5G technology will provide ubiquitous connectivity means everything. from vehicles to mobile networks to industries
Te
5G technology standard are still under development. So, no firm standards is in place at this time; the market is still
figuring out the essential 5G features and functionalities.
The primary 5G standards bodies involved in these processes are the 3rd Generation Partnership Project (3GPP), the
Internet Engineering Task Force (IETF), and the International Telecommunication Union (ITU).
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-29 Long Term Evolution of 3GPP
e
with other vehicles (V2V), pedestrians (V2P), networks (V2N), and the surrounding infrastructure (V2I).
g
2. Making Vehicle Safer io led
Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicle-to-vehicle (V2V),
vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
C-V2X will improve safety on roads by tremendously facilitating the flow of information between vehicles,
ic ow
pedestrians and road infrastructure. This will enable connected vehicles to anticipate and avoid dangerous
situations, reducing collisions and potentially saving lives.
n
bl kn
Cellular-V2X (C-V2X) as initially defined as LTE V2X in 3GPP Release 14 is designed to operate in several modes.
It provides one solution for integrated V2V, V2I and V2P operation with V2N by using existing cellular network
infrastructure :
1. Device-to-Device Communication
Device-to-device communication is Vehicle-to-Vehicle (V2V), Vehicle-to-(Roadway) Infrastructure (V2I) and
Vehicle-to-Pedestrian (V2P) direct communication.
In the device-to-device mode (V2V, V2I, V2P) operation, C-V2X does not necessarily require any network
infrastructure. It can operate without a SIM, without network assistance and uses GNSS as its primary source of
time synchronization.
2. Device-to-Cell Tower Communication
Device-to-cell tower is another communication link which enables network resources and scheduling and utilizes
existing operator infrastructure.
3. Device-to-Network Communication
Device-to-network is the V2N solution using traditional cellular links to enable cloud services to be part and parcel
of the end-to-end solution.
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-30 Long Term Evolution of 3GPP
Collectively, the transmission modes of shorter-range direct communications (V2V, V2I, V2P) and longer-range
network-based communications (V2N) comprise what we call Cellular-V2X
5GAA focuses on more than simply providing faster data rate. 5G technology aims to provide wide range of future
industries from retail to education, transportation to entertainment and smart homes to healthcare.
1. High Speed Mobile Networks
5G will revolutionize the mobile experience with data rate up to 10 to 20 GBPS download speed. It is equivalent
to a fiber optic Internet connection accessed wirelessly.
Another important feature of 5G technology is Low latency which is significant for autonomous driving and
mission critical applications. 5G networks are capable of latency less than a millisecond.
2. Entertainment and Multimedia
e
Almost 50 percentage of mobile Internet traffic is used for video downloads globally. This trend will increase in
g
future and high definition video streaming will be common in future.
io led
5G will offer a high definition virtual world on your mobile phone. Live events can be streamed via wireless
network with high definition.
HD TV channels can be accessed on mobile devices without any interruptions. Entertainment industry will hugely
ic ow
benefit from 5G wireless networks. Augmented reality and virtual reality requires HD video with low latency. 5G
network is powerful enough to power AR and VR with amazing virtual experience.
n
3. Internet of Things - Connecting everything
bl kn
Internet of Things (IoT) is another broad area that will use 5G wireless network. Internet of Things will connect
at
IoT applications will collects huge amount of data from millions of devices and sensors. 5G is the most efficient
candidate for Internet of Things due to its flexibility, unused spectrum availability and low cost solutions for
Te
deployment.
IoT can benefit from 5G networks in many areas like: Smart Homes, Smart Cities, Industrial IoT, Fleet
Management etc.
4. Virtual reality and Augmented Reality
As Virtual reality (VR) and Augmented Reality (AR) needs faster data rate, low latency and reliability. 5G networks will
unlock the potentials of VR and AR.
Until now, only operators of satellites and radar systems used millimeter waves for real-world applications.
There is one major drawback to millimeter waves, though – they can’t easily travel through buildings or obstacles and
they can be absorbed by foliage and rain. That’s why 5G networks will likely augment traditional cellular towers with
another new technology, called small cells.
Review Questions
Q. 3 What additional features does LTE advanced contain compared to LTE? Explain LTE-A architecture in detail.
e
Q. 6 Explain the Generic frame structure of LTE.
g
Q. 7 Explain different transport and logical channels used by LTE.
io led
Q. 8 What do you mean by Self Organizing Networks? Explain SOIN architecture.
at
Pu ch
Te