MCC Notes by YK
MCC Notes by YK
MCC Notes by YK
Yazdan khan
ECC 454 A - Mobile Communication and computing
(ECC) 3L, 1T 3 Hours, 100 Marks
Electronics and computer engineering
MBM UNIVERSITY, JODHPUR.
Chapter 1
Concept of mobile telecommunications. Mobile radio network issues, cell size coding,
modulation and diversity Base station subsystems. Access methods. Location strategies for
personal communications services. Cell design principles.
Chapter 2
Elements of Radio Paging and microcellular radio communication: Fixed and dynamic
channel assignment, Allocation of spectrum and channels, Concepts of hexagon cells, mobile
identification system and registration of mobile, call procedure.
Chapter 3
Concepts of GSM and CDMA radio system architecture, roaming, digital speech and channel
coding. Mobility computing: Issues, challenges, and benefits; Network Programming:
Process communication techniques, remote login, ftp, socket programming, RPC, RMI,
Client – server programming.
Chapter 4
Process Migration : Steps, advantages, application taxonomy, alternatives, case study of
DEMOS/MP. Mobile Computing : Physical mobility, challenges, limits and connectivity,
mobile IP and cellular IP in mobile computing, case study of CODA.
Chapter 5
Wireless LANs : Introduction to IEEE 802.11, Bluetooth and IrDA technologies and
standards.
Introduction to Mobile Adhoc Networks: Hidden and exposed terminal problems; Routing
protocols: DSDV, DSR, AODV. Elements of Wireless Sensor Networks - Motes, smart dust,
TinyOS, routing protocols.
Chapter 6
Handheld Devices and OS : Palm, HP; PalmOS, Window CE, Windows Mobile. Conceptual
study Mobile Internet and WAP, gateways, Mobile agents: Aglets, Tcl, PMADE.
Index
S.No. Details of topics Page no.
1 1.1 a Introduction of cellular concept 1-3
2 Chapter 1 1.1 b Multipath propagation and diversity reception 3 - 15
3 1.2 Multiplexing (SDM,FDM,TDM,CDM) 16 - 19
4 1.3 Modulation Techniques(ASK,FSK.PSK, MSK ) 20 - 25
5 1.4 Access methods 26 - 28
6 1.5 Location strategies for PCS 29 - 30
7 2.1 Fundamental of Cellular Design 30 - 30
Chapter 2
Mobile networks use radio communication which requires the signals from the network and cell
phones to be in the form of radio waves. Radio waves are electromagnetic waves transmitted and
received at radio frequencies. The radio frequencies can range from 800 Megahertz to tens of
Gigahertz .Mobile phones communicate with mobile networks through a range of cellular
technologies. Many technologies have become part of the cellular industry since the first generation
of mobile networks in the early 1980s. Following the first generation, 1G, we have seen a new
generation of mobile networks nearly every ten years. Each generation is more advanced than its
predecessor and uses a more sophisticated set of technologies to maximise the achievable
bandwidth so that customers can do a lot more from their connection. To give you an example, back
in the 1990s, when GSM was the main technology for 2G in most parts of the world, a channel
bandwidth of 200KHz could enable phone calls and text messages. Nowadays, when we expect our
phones to be connected to high-speed internet all the time, current technologies like 4G and 5G can
enable bandwidths of 100 MHz and more through technologies like carrier aggregation.
The mobile phone and the mobile network are both able to transmit and receive using cellular
technologies that we generally refer to as 2G, 3G, 4G and 5G. All cellular technologies are based on
a network of cells. In mobile communications, a cell is the network coverage area created by the
transmission and reception of radio signals from a mobile base station.
The place where a mobile base station is installed is called a cell site. Mobile operators use a large
number of cell sites to enable nationwide coverage so that their customers stay connected no matter
where they are. The emission of signals from the antennas of the radio units at the cell site creates
cellular coverage. The radio units require electrical power to be able to generate electromagnetic
Higher frequencies have higher losses and do not travel as far as the lower frequencies can. The
transmission power also determines how far a signal can travel. The radio signals are sent at
specific frequencies so that they don‘t interfere with the signals coming from other base stations.
Only the intended mobile phone can decode the signal sent by the radio units at the cell site. The
type of radio signal depends on which technology the mobile network is using for communication.
Examples of the technology we refer to here are GSM, CDMA2000, LTE, etc.
●Transmission range: Within a certain radius of the sender transmission is possible, i.e., a receiver
receives the signals with an error rate low enough to be able to communicate and can also act as
sender.
● Detection range: Within a second radius, detection of the transmission is possible, i.e., the
transmitted power is large enough to differ from background noise. However, the error rate is too
high to establish communication.
● Interference range: Within a third even larger radius, the sender may interfere with other
transmission by adding to the background noise. A receiver will not be able to detect the signals,
but the signals may disturb other signals.
Radio waves can exhibit three fundamental propagation behaviours depending on their frequency:
● Ground wave (<2 MHz): Waves with low frequencies follow the earth‘s surface and can
propagate long distances. These waves are used for, e.g., submarine communication or AM radio.
● Sky wave (2–30 MHz): Many international broadcasts and amateur radio use these short waves
that are reflected2 at the ionosphere. This way the waves can bounce back and forth between the
ionosphere and the earth‘s surface, travelling around the world.
● Line-of-sight (>30 MHz): Mobile phone systems, satellite systems, cordless telephones etc. use
even higher frequencies. The emitted waves follow a (more or less) straight line of sight. This
Almost all communication systems presented in this book work with frequencies above 100 MHz
so, we are almost exclusively concerned with LOS communication. But mobile phones can work
even without an LOS.Mobile phones are typically used in big cities with skyscrapers, on mountains,
inside buildings, while driving through an alley etc. Hare several effects occur in addition to the
attenuation caused by the distance between sender and receiver, which are again very much
frequency dependent. Signals transmitted from a sender may bounce off the walls of buildings
several times before they reach the receiver.
1.1.1 Refraction: Refraction effect occurs because the velocity of the electromagnetic waves
depends on the density of the medium through which it travels. Only in vacuum does it equal c. As
the figure shows, waves that travel into a denser medium are bent towards the medium. This is the
reason for LOS radio waves being bent towards the earth: the density of the atmosphere is higher
closer to the ground.
Radio wave refraction follows exactly the same effects as it does for light. The basic law for radio
wave refraction and light wave refraction is known as Snell‘s Law which states:
1.1.2 Reflection: it is caused by objects much larger than the wavelength of the signals (and
demonstrate the typical ‗particle‘ behaviour of radio signals), the following two effects exhibit the
‗wave‘ character of radio signals.
In EM wave propagation Huygens‘ principle says that at each point, the wave field is effectively re-
radiating in all directions. In free space, these secondary reradiators sum and ―produce‖ the effect of
a wave front advancing in the direction away from the source. When objects exist in free space that
block or attenuate some of the wave field, the reradiation enable EM waves to ―bend‖ around
objects. In order to calculate the field at a point in (or near) the ―shadow‖ of an object, we can use
Huygens‘ principle to find accurate numerical results. This is a short version of some advanced
electromagnetics. The Fresnel-Kirchoff parameter v is given by,
1.1.4 Scattering If the size of an obstacle is in the order of the wavelength or less, then waves can
be scattered (see Figure 1.4.3 An incoming signal is scattered into several weaker outgoing signals.
The typical wavelength of radio transmission for, e.g., GSM or AMPS is in the order of some 10
cm. Thus, many objects in the environment can cause these scattering effects. When we discussed
reflection, we said a wave was impinging on a flat surface. But most surfaces (e.g., walls, ground)
are rough, not flat. When is a surface considered rough? When the maximum height ―protuberance‖
The first effect is that a short impulse will be smeared out into a broader impulse, or rather into
several weaker impulses. In Figure only three possible paths are shown and, thus, the impulse at the
sender will result in three smaller impulses at the receiver. For a real situation with hundreds of
different paths, this implies that a single impulse will result in many weaker impulses at the
The second impulse shown in Figure On the sender side, both impulses are separated. At the
receiver, both impulses interfere, i.e., they overlap in time. Now consider that each impulse should
represent a symbol, and that one or several symbols could represent a bit. The energy intended for
one symbol now spills over to the adjacent symbol, an effect which is called intersymbol
interference (ISI). The higher the symbol rate to be transmitted, the worse the effects of ISI will
be, as the original symbols are moved closer and closer to each other. ISI limits the bandwidth of a
radio channel with multi-path propagation (which is the standard case). Due to this interference, the
signals of different symbols can cancel each other out leading to misinterpretations at the receiver
and causing transmission errors.
The power of the received signal changes considerably over time. These quick changes in the
received power are also called short-term fading or small scale fading. Depending on the mobile
movement the signals take different paths which causes these signals may have a different phase
and cancel each other as shown in Figure1.1.7 The receiver now has to try to constantly adapt to the
varying channel characteristics,e.g., by changing the parameters of the equalizer. However, if these
changes are too fast, such as driving on a highway through a city, the receiver cannot adapt fast
enough and the error rate of transmission increases dramatically.
An additional effect shown in Figure 1.1.7 is the long-term fading or Large scale fading of the
received signal. This long-term fading, shown here as the average power over time, is caused by,
varying distance to the sender or more remote obstacles. The large-scale fading is generated by
shadowing effects which is due to changes in both the nature of surroundings and the terrain profile
involved. The large scale fading is log-normally spreaded with particular standard deviation value
of approximately 10 decibels in the urban area.
Typically, senders can compensate for long-term fading by increasing/decreasing sending power so
that the received signal always stays within certain limits. multi-path propagation limits the
maximum bandwidth due to ISI and that moving transceivers cause additional problems due to
varying channel characteristics or channel impairments. To resolve this, there are three popular
techniques –
Equalization
Diversity
Channel coding (See section)
2.Tracking Mode
When the training sequence is finished the filter coefficients are near optimal. Immediately
following the training sequence, user data is sent. When the data of the users are received, the
adaptive algorithms of the equalizer tracks the changing channel. As a result, the adaptive equalizer
continuously changes the filter characteristics over time.
1.1.c.2 Diversity
Diversity is a good technique applied in mobile communication receiver circuits where there are
multipath environments exists. The diversity techniques use the nature of the propagation path
characteristics for improving the sensitivity of receivers. It will improve the wireless links, at less
cost. It does not require prior training because a training sequence is not needed by a transmitter like
an equalizer. The diversity technique finds a way of analyzing signal paths for the multipath cellular
environment. The diversity decisions made at the receiver end and they are not known to the
transmitter.
1) Microscopic diversity
2) Macroscopic diversity
To counteract small-signal fading that is to avoid deep fading in the signal received under small
distances, fading can be minimized by this technique. It can prevent small signal fades in case of
less antenna separations, if two antennas are used.
By choosing the signal of higher strength most of the time, the receiver can reduce the fading
effects in the graph shown in the figure 1.1.9 below. The small-signal fades rapidly whereas the
large-signal fades gradually with respect to an indoor environment.
In large signal fading, the signal strength reduces that is because of shadowing problems. By
choosing a base station that is not shadowed when compared to other base stations, the mobile unit
can acquire a better signal-to-noise ratio (SNR) in its forward path. Such a type of counteracting to
large-scale fading effects or the method of diversity used to reduce large-scale signal fades is
termed as macroscopic diversity technique. This is highly useful at the base station receiver end.
Each diversity technique is unique in its functionality but aims towards a common goal of reducing
the fading effects in multipath receiver circuit.
The space diversity scheme is also called as ‘antenna diversity scheme‗. In conventional methods
of wireless communication, the availability of direct path between transmitter and receiver is not
assured. Therefore, the occurrence of Rayleigh fading will be present. But, the antenna space
diversity can achieve independent fading changes by applying spatially separated antennas.
In the space diversity scheme, the receiver configuration is quite simple. Several number of
diversity branches are selectable. For producing diversity reception at each and every cell site,
multiple base station receiving antennas are used effectively. It is important to note that main
scattering takes place in ground which is in the vicinity of the mobile unit, and hence to attain decor
relation, the antennas at base station have to be placed with necessary separation distances. This
separation distance can be in order or tens of wavelength (λ) value with respect to base station.
Generally, the space diversity technique can be used at base station or mobile or at both ends.
Also, in case, the antenna spacing is greater than λ/2, then it is sufficient to obtain low fading
correlation between the diversity branches, and antenna spacing of 50λ to 100λ is a must at the base
station end.
1. b).Feedback Diversity
The feedback diversity technique is also known as scanning diversity. In this method, the ‗n‘ signals
are scanned in a proper sequence and monitored to pick a signal in the sequence which is above the
preset threshold value say ‗α‘. Then, a scanning process will be initiated for the received signals.
But, the demerit of this method is that the fading level reduction is less than the other diversity
techniques. In this method, for the received signals (m), the best signal of better strength is
measured by comparing every signal with a preset threshold value ‗α‘ as shown in the figure below.
One of the merit of feedback diversity is its easier implementation than other methods.
1. c). Maximal Ratio Combining Technique
The concept of this method is that all the branch signals [N] are combined coherently with
necessary weighting coefficients for every diversity branch signal so that the reduction of fading
will be better leading to overall improvement of system performance. A block diagram for this method
is shown in the figure below. Unlike selection diversity, the signals are co-phased before the addition process
and for this, individual receiver and phasing circuits are a must for all the antenna elements. In the output,
signal of maximal ratio combiner will be such that the sum of individual signal to noise ratio (SNR) values
will be equal to the SNR of output signal measured.
4. Frequency Diversity
In this method of frequency diversity, the information is transmitted on many carrier frequencies.
The idea behind this is that if the frequencies are separated by more than that of the coherence
bandwidth of the mobile channel, these would be uncorrelated with each other and hence these
would not experience same fading status. Also under channels, uncorrelated situations, the
occupancy of fading will be multiple of the individual fading probability (occurrence).
The frequency diversity scheme is applied in microwave fields whenever line of sight (LOS) links
is used. That is in LOS links, they may carry many channels in the frequency division multiplex
mode (FDM). There are chances of deep fades in frequency diversity due to tropospheric
propagation and the resulting refractions of the signal. The fading variation independence factor
between the separated frequency components is a main effect with respect to land mobile
communication and it is known as frequency diversity effect. Thus, the frequency diversity is a
popular diversity reception technique.
5. Directional Diversity
The received signals would arrive from different incident angles due to any one of the propagation
mechanisms namely reflection, diffraction or scattered signals around the mobile terminal. By using
6. Path Diversity
In path diversity method, the signals are coherently combined. That is both the direct and delayed signal
components are combined together. Thus, the diversity branches are generated only after signal reception,
and this method is also called as Implicit diversity. As an example, an adaptive equalizer and RAKE
diversity are also categorized as path diversity schemes.
Advantages of Path Diversity schemes are as under:
In this scheme, no extra power is required.
No extra antennas are required
No extra frequency spectrum is required.
Disadvantages of path diversity schemes
This diversity method is very sensitive to Rayleigh fading conditions, and hence, the propagation
path conditions have to be given more attention.
Multiplexing is not only a fundamental mechanism in communication systems but also in everyday
life. Multiplexing describes how several users can share a medium with minimum or no
interference. One example, is highways with several lanes. Many users (car drivers) use the same
medium (the highways) with hopefully no interference (i.e., accidents). This is possible due to the
provision of several lanes (space division multiplexing) separating the traffic. In addition, different
cars use the same medium (i.e., the same lane) at different points in time (time division
multiplexing). While this simple example illustrates our everyday use of multiplexing, the following
examples will deal with the use of multiplexing in wireless communications. Mechanisms
controlling the use of multiplexing and the assignment of a medium to users (the traffic
regulations), are discussed in chapter 3 under the aspect of medium access control.
Frequency division multiplexing (FDM) describes schemes to subdivide the frequency dimension
into several non-overlapping frequency bands as shown in Figure 1.2.2. Each channel ki is now
allotted its own frequency band as indicated. Senders using a certain frequency band can use this
band continuously. Again, guard spaces are needed to avoid frequency band overlapping (also
called adjacent channel interference). This scheme is used for radio stations within the same
region, where each radio station has its own frequency. This very simple multiplexing scheme does
not need complex coordination between sender and receiver: the receiver only has to tune in to the
specific sender. However, this scheme also has disadvantages. While radio stations broadcast
24 hours a day, mobile communication typically takes place for only a few minutes at a time.
Assigning a separate frequency for each possible communication scenario would be a tremendous
waste of (scarce) frequency resources. Additionally, the fixed assignment of a frequency to a sender
makes the scheme very inflexible and limits the number of senders.
A disadvantage of this scheme is again the necessary coordination between different senders. One
has to control the sequence of frequencies and the time of changing to another frequency. Two
senders will interfere as soon as they select the same frequency at the same time. However, if the
frequency change (also called frequency hopping) is fast enough, the periods of interference may
be so small that, depending on the coding of data into signals, a receiver can still recover the
original data.
Signal parameters are the amplitude A, the frequency f, and the phase shift φ.The amplitude as a
factor of the function g may also change over time, thus At. The frequency f expresses the
periodicity of the signal with the period T = 1/f. (In equations, ω is frequently used instead of 2πf.)
The frequency f may also change over time and given as ft . Finally, the phase shift determines the
shift of the signal relative to the same signal without a shift. This shows a sine function without a
phase shift and the same function, i.e., same amplitude and frequency, with a phase shift φ. shows
how shifting the phase can be used to represent data. Sine waves are of special interest, as it is
possible to construct every periodic signal g by using only sine and cosine functions according to a
fundamental equation of Fourier:
In wireless networks, however, digital transmission cannot be used. Here, the binary bit-stream has
to be translated into an analog signal first. The three basic methods for this translation are
amplitude shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK).
Apart from the translation of digital data into analog signals, wireless transmission requires an
additional modulation, an analog modulation that shifts the center frequency of the baseband
signal generated by the digital modulation up to the radio carrier. For example, digital modulation
translates a 1 Mbit/s bit-stream into a baseband signal with a bandwidth of 1 MHz There are several
reasons why this baseband signal cannot be directly transmitted in a wireless system:
The receiver (see Figure1.3.2) receives the analog radio signal via its antenna and demodulates the
signal into the analog baseband signal with the help of the known carrier. This would be all that is
needed for an analog radio tuned in to a radio station. (The analog baseband signal would constitute
the music.) For digital data, another step is needed. Bits or frames have to be detected, i.e., the
receiver must synchronize with the sender. How synchronization is achieved, depends on the digital
modulation scheme. After synchronization, the receiver has to decide if the signal represents a
digital 1 or a 0, reconstructing the original data.
A famous FSK scheme used in many wireless systems is minimum shift keying (MSK). MSK is
basically BFSK without abrupt phase changes, i.e., it belongs to CPM schemes. Figure 1.3.7 shows
an example for the implementation of MSK. In a first step, data bits are separated into even and odd
bits, the duration of each bit being doubled. The scheme also uses two frequencies: f1, the lower
frequency, and f2, the higher frequency, with f2 = 2f1. According to the following scheme, the lower
or higher frequency is chosen (either inverted or non-inverted) to generate the MSK signal:
The above examples show in the figure 1.3.4A & 1.3.4 B use of Amplitude and Frequency and
Modulation to carry an analog signal. Analog signals consist of the raw information and do not
relate to digital 1s and zeros. One way to avoid this problem is to use differential QPSK
(DQPSK). Here the phase shift is not relative to a reference signal but to the phase of the previous
two bits. A constellation diagram is used to relate discrete digital values to different changes in the
analog carrier. The constellation diagram 1.3.8 below is for an 8PSK modulation scheme. The
distance from the origin of the graph describes the amplitude of the signal. All of the signals on the
below constellation diagram are the same distance from the origin, meaning that the modulation
scheme doesn't use any amplitude modulation. The angle from the "I" axis to where the point is on
the diagram shows the phase offset that the signal would have to represent that particular value. The
carrier would be only phase modulated which is called Phase Shift Keying (PSK). A digital
modulation scheme that incorporates both Phase and amplitude modulation is referred to
quadrature Amplitude Modulation (QAM).
To demonstrate the modulation an 8PSK modulator is used in the above block diagram. The
example bit stream on the left hand side enters the modulator and has a bit slot of 10. Being a
sample of 60 seconds and a bit slot of 10 seconds, the sample bit stream is carrying 6 bits (1 1 1 0 1
0). The 8PSK modulator clocks in 3 bits at a time to generate the modulated PSK signal. The PSK
modulator relates the 3 clocked bits to its constellation diagram and generates a PSK waveform
Because it clocks in 3 bits to ever state change, the RF signal is 1/3 the rate of the bit stream. The
entire process is depicted below and can be applied to any modulation scheme and bitrates. The
example above is using full rate modulation. In many cases, a half code rate scheme will be used in
conjunction with the modulation scheme such that only half of the bits would change every bit-slot.
Using a half code rate or even a 3/4 code rate helps ensure that the probability of an error in
transmission or detection is low.
A more advanced scheme is a hierarchical modulation as used in the digital TV standard DVB-T.
The right side Figure 1.3.10 shows a 64 QAM that contains a QPSK modulation. A 64 QAM can
code 6 bit per symbol. Here the two most significant bits are used for the QPSK signal embedded in
the QAM signal. If the reception of the signal is good the entire QAM constellation can be resolved.
Under poor reception conditions, e.g., with moving receivers, only the QPSK portion can be
resolved. A high priority data stream in DVB-T is coded with QPSK using the two most significant
bits. The remaining 4 bits represent low priority data. For TV this could mean that the standard
resolution data stream is coded with high priority, the high resolution information with low priority.
If the signal is distorted, at least the standard TV resolution can be received.
In wireless communication systems, it is often desirable to allow the subscriber to send information
simultaneously from the mobile station to the base station while receiving information from the
base station to the mobile station.
A cellular system divides any given area into cells where a mobile unit in each cell communicates
with a base station. The main aim in the cellular system design is to be able to increase the
capacity of the channel, i.e., to handle as many calls as possible in a given bandwidth with a
sufficient level of quality of service.
There are several different ways to allow access to the channel. These includes mainly the following
1.4.2 Frequency division multiple access (FDMA) comprises all algorithms allocating frequencies
to transmission channels according to the frequency division multiplexing (FDM) . Allocation can
either be fixed (as for radio stations or the general planning and regulation of frequencies) or
dynamic (i.e., demand driven). Channels can be assigned to the same frequency at all times, i.e.,
pure FDMA, or change frequencies according to a certain pattern, i.e., FDMA combined with
TDMA. The latter example is the common practice for many wireless systems to circumvent
narrowband interference at certain frequencies, known as frequency hopping. Sender and receiver
have to agree on a hopping pattern, otherwise the receiver could not tune to the right frequency.
Hopping patterns are typically fixed, at least for a longer period. The fact that it is not possible to
arbitrarily jump in the frequency space (i.e., the receiver must be able to tune to the right frequency)
is one of the main differences between FDM schemes and TDM schemes. Furthermore, FDM is
often used for simultaneous access to the medium by base station and mobile station in cellular
networks. Here the two partners typically establish a duplex channel, i.e., a channel that allows for
simultaneous transmission in both directions. The two directions, mobile station to base station and
vice versa are now separated using different frequencies. This scheme is then called frequency
division duplex (FDD). Again, both partners have to know the frequencies in advance; they cannot
1.4.3 TDMA
Compared to FDMA, time division multiple access (TDMA) offers a much more flexible scheme,
which comprises all technologies that allocate certain time slots for communication, i.e., controlling
TDM. Now tuning in to a certain frequency is not necessary, i.e., the receiver can stay at the same
frequency the whole time. Using only one frequency, and thus very simple receivers and
transmitters, many different algorithms exist to control medium access. As already mentioned,
listening to different frequencies at the same time is quite difficult, but listening to many channels
separated in time at the same frequency is simple. Now synchronization between sender and
receiver has to be achieved in the time domain. Again this can be done by using a fixed pattern
similar to FDMA techniques, i.e., allocating a certain time slot for a channel, or by using a dynamic
allocation scheme. Dynamic allocation schemes require an identification for each transmission as
this is the case for typical wired MAC schemes (e.g., sender address) or the transmission has to be
announced beforehand. MAC addresses are quite often used as identification. This enables a
receiver in a broadcast medium to recognize if it really is the intended receiver of a message. Fixed
schemes do not need an identification, but are not as flexible considering varying bandwidth
requirements. The following sections present several examples for fixed and dynamic schemes as
used for wireless transmission. Typically, those schemes can be combined with FDMA to achieve
even greater flexibility and transmission capacity.
Figure 21 shows how these fixed TDM patterns are used to implement multiple access and a duplex
channel between a base station and mobile station. Assigning different slots for uplink and
downlink using the same frequency is called time division duplex (TDD). As shown in the figure,
the base station uses one out of 12 slots for the downlink, whereas the mobile station uses one
out of 12 different slots for the uplink. Uplink and downlink are separated in time. Up to 12
different mobile stations can use the same frequency without interference using this scheme. Each
1.4.4 CDMA
Finally, codes with certain characteristics can be applied to the transmission to enable the use of
code division multiplexing (CDM). Code division multiple access (CDMA) systems use exactly
these codes to separate different users in code space and to enable access to a shared medium
without interference. The main problem is how to find ―good‖ codes and how to separate the signal
from noise generated by other signals and the environment. The code directly controls the chipping
sequence. But what is a good code for CDMA? A code for a certain user should have a good
autocorrelation and should be orthogonal to other codes. Orthogonal in code space has the same
meaning as in standard space (i.e., the three dimensional space).
Spectrum Allocations
Frequency management is done in several steps
Frequency allocation:
A band of radio frequencies identified by an upper and lower frequency limit earmarked for
use by one or more of the 38 terrestrial and space radio communication services defined by
the International Telecommunication Union under specified conditions.
Frequency allotment:
Frequency assignment:
The term frequency assignment is also used for the action of an operator assigning a channel
to a particular user. For instance in dynamic frequency assignment (DCA) the cellular
operator optimizes the resources available in all cells to optimally adapt to the changing
needs from its subscribers. Confusingly, DCA is often called dynamic frequency allocation.
The shape of a mobile network cell, in real life, is irregular and changes considerably depending on
the terrain structure and obstructions like buildings, trees and mountains etc. However, for technical
documentation purposes, a cell is represented by a large group of interconnected hexagons.
We have a simplified diagram 2.2 below where the green, yellow and magenta icons represent
cellular towers (base stations), and the hexagons represent cells created by the base stations. Each
base station has several radio units that operate at specific frequencies to create radiations. These
radiations create cellular coverage. Usually, each base station has multiple cells known as sectors of
a base station, as you can see in the diagram below. Cells do have a certain level of overlap with
each other to allow some time for the handover to take place when someone is moving from one
cell to another. A regular cell is known as a macro cell, and its range can be in tens of kilometres.
There are different kinds of cells though, including microcells and other smaller cells.
Another feature of newer cellular systems is the ability to make handoff decisions based on a wide
range of metrics other than signal strength. The co-channel and adjacent channel interference levels
may be measured at the base station or the mobile, and this information may be used with
conventional signal strength data to provide a multi-dimensional algorithm for determining when a
handoff is needed. The IS-95 code division multiple access (CDMA) spread spectrum cellular
system provides a unique handoff capability that cannot be provided with other wireless systems.
Unlike channelized wireless systems that assign different radio channels during a handoff (called a
hard handoff), spread spectrum mobiles share the same channel in every cell. Thus, the term
handoff does not mean a physical change in the assigned channel, but rather that a different base
station handles the radio communication task. By simultaneously evaluating the received signals
from a single subscriber at several neighbouring base stations, the MSC may actually decide which
version of the user‘s signal is best at any moment in time. This technique exploits macroscopic
space diversity provided by the different physical locations of the base stations and allows the MSC
to make a ―soft‖ decision as to which version of the user‘s signal to pass along to the PSTN at any
instance . The ability to select between the instantaneous received signals from a variety of base
stations is called soft handoff.
the services are reused in a regular pattern of cells, each covered by one base station. The repeating
regular pattern of cells is called cluster. Since each cell is designed to use radio frequencies only
within its boundaries, the same frequencies can be reused in other cells not far away without
interference, in another cluster. Such cells are called `co-channel' cells. The reuse of frequencies
enables a cellular system to handle a huge number of calls with a limited number of channels.
Figure shows a frequency planning with cluster size of 7, showing the co-channels cells in different
clusters by the same letter. The closest distance between the co-channel cells (in different clusters)
is determined by the choice of the cluster size and the layout of the cell cluster. Consider a cellular
system with S duplex channels available for use and let N be the number of cells in a cluster. If each
cell is allotted K duplex channels with all being allotted unique and disjoint channel groups then
Clearly, if K and N remain constant, then and, if T and K remain constant, then Hence the capacity
gain achieved is directly proportional to the number of times a cluster is repeated, as shown, as well
as, for a fixed cell size, small N =25 decreases the size of the cluster with in turn results in the
increase of the number of clusters and hence the capacity. However for small N, co-channel cells
are located much closer and hence more interference. The value of N is determined by calculating
the amount of interference that can be tolerated for a sufficient quality communication. Hence the
smallest N having interference below the tolerated limit is used. However, the cluster size N cannot
take on any value and is given only by the following equation Where i and j are integer numbers.
Hence the smallest N having interference below the tolerated limit is used. However, the cluster
size N cannot take on any value and is given only by the following equation
For the efficient use of available spectrum, it is necessary to reuse frequency bandwidth over
relatively small geographical areas. However, increasing frequency reuse also increases
interference, which decreases system capacity and service quality. The cells where the same set of
frequencies is used are call co-channel cells. Co-channel interference is the cross talk between two
different radio transmitters using the same radio frequency as is the case with the co-channel cells.
The reasons of CCI can be because of either adverse weather conditions or poor frequency planning
or overly crowded radio spectrum. If the cell size and the power transmitted at the base stations are
same then CCI will become independent of the transmitted power and will depend on radius of the
cell (R) and the distance between the interfering co-channel cells (D). If D/R ratio is increased, then
From the above equation, small of `Q' means small value of cluster size `N' and increase in cellular
capacity. But large `Q' leads to decrease in system capacity but increase in transmission quality.
Choosing the options is very careful for the selection of `N', the proof of which is given in the first
section.
The Signal to Interference Ratio (SIR) for a mobile receiver which monitors the forward channel
can be calculated as :-
where S is the desired signal power from the desired base station and Ii is the interference power
caused by the ith interfering co-channel cell base station. If the signal levels of co-channel cells are
known, i0 be the number of co-channel interfering cells. then the S/I ratio for the forward link can be
found using Equation (2.4.4).
Propagation measurements in a mobile radio channel show that the average received signal strength
at any point decays as a power law of the distance of separation between a transmitter and receiver.
The average received power Pr at a distance d from the transmitting antenna is approximated by:-
where P0 is the power received at a close-in reference point in the far field region of the antenna at a
small distance d0 from the transmitting antenna and n is the path loss exponent. Now consider the
forward link where the desired signal is the serving base station and where the interference is due to
co-channel base stations. If Di is the distance of the ith interferer from the mobile, the received
power at a given mobile due to the ith interfering cell will be proportional to (Di)–n. The path loss
exponent typically ranges between two and four in urban cellular systems.
Considering only the first layer of interfering cells, if all the interfering base stations are equidistant
from the desired base station and if this distance is equal to the distance D between cell centers,
then Equation (2.4.7) simplifies to (2.4.8)
Equation (2.4.8) relates S/I to the cluster size N, which in turn determines the overall capacity of the
system from Equation (2.4.3). It should be noted that Equation (2.4.8) is based on the hexagonal
cell geometry where all the interfering cells are equidistant from the base station receiver, and hence
provides an optimistic result in many cases.
Using an exact cell geometry layout, it can be shown for a seven-cell cluster, with the mobile unit at
the cell boundary, the mobile is a distance D – R from the two nearest co-channel interfering cells
and is exactly D + R/2, D, D – R/2, and D + R from the other interfering cells in the first tier, as
shown rigorously in. Using the approximate geometry shown in Figure 2.7, Equation (2.4.7), and
assuming n = 4, the signal-to-interference ratio for the worst case can be closely approximated as:
Numerical Example 1
If a total of 33 MHz of bandwidth is allocated to a particular FDD cellular telephone system which
uses two 25 kHz simplex channels to provide full duplex voice and control channels, compute the
number of channels available per cell if a system uses (a) four-cell reuse, (b) seven-cell reuse,
and(c) 12-cell reuse. If 1 MHz of the allocated spectrum is dedicated to control channels, determine
an equitable distribution of control channels and voice channels in each cell for each of the three
systems.
Solution
Given:
Total bandwidth = 33 MHz
Channel bandwidth = 25 kHz × 2
simplex channels = 50 kHz/duplex channel
Total available channels = 33,000/50 = 660 channels
(a) For N = 4,
total number of channels available per cell = 660/4 ≈ 165 channels.
(b) For N = 7,
total number of channels available per cell = 660/7 ≈ 95 channels.
(c) For N = 12,
total number of channels available per cell = 660/12 ≈ 55 channels.
A 1 MHz spectrum for control channels implies that there are 1000/50 = 20 control channels out of
the 660 channels available. To evenly distribute the control and voice channels, simply allocate the
same number of voice channels in each cell wherever possible. Here, the 660 channels must be
evenly distributed to each cell within the cluster. In practice, only the 640 voice channels would be
allocated, since the control channels are allocated separately as 1 per cell.
(a) For N = 4, we can have five control channels and 160 voice channels per cell. In practice,
however, each cell only needs a single control channel (the control channels have a greater reuse
distance than the voice channels). Thus, one control channel and 160 voice channels would be
assigned to each cell.
(b) For N = 7, four cells with three control channels and 92 voice channels, two cells with three
control channels and 90 voice channels, and one cell with two control channels and 92 voice
channels could be allocated. In practice, however, each cell would have one control channel, four
cells would have 91 voice channels, and three cells would have 92 voice channels.
Numerical Example 2
If a signal-to-interference ratio of 15 dB is required for satisfactory forward channel performance of
a cellular system, what is the frequency reuse factor and cluster size that should be used for
maximum capacity if the path loss exponent is (a) n = 4, (b) n = 3? Assume that there are six
cochannel cells in the first tier, and all of them are at the same distance from the mobile. Use
suitable approximations.
Solution
(a) n = 4
First, let us consider a seven-cell reuse pattern.
Using Equation (3.4), the co-channel reuse ratio D/R = 4.583.
Using Equation (3.9), the signal-to-noise interference ratio is given by
S/I = (1/6) × (4.583)4 = 75.3 = 18.66 dB
Since this is greater than the minimum required S/I, N = 7 can be used.
(b) n = 3
First, let us consider a seven-cell reuse pattern. Using Equation (2.4.8), the signal-to-interference
ratio is given by
S/I = (1/6) × (4.583)3 = 16.04 = 12.05 dB
Since this is less than the minimum required S/I, we need to use a larger N. Using Equation (2.4.2),
the next possible value of N is 12, (i = j = 2). The corresponding co-channel ratio is given by
Equation (2.4.2) as
D/R = 6.0
Using Equation (2.4.3), the signal-to-interference ratio is given by
S/I = (1/6) × (6)3 = 36 = 15.56 dB
Since this is greater than the minimum required S/I, N = 12 is used.
Adjacent channel interference can be minimized through careful filtering and channel assignments.
Since each cell is given only a fraction of the available channels, a cell need not be assigned
channels which are all adjacent in frequency. By keeping the frequency separation between each
channel in a given cell as large as possible, the adjacent channel interference may be reduced
considerably.
If the frequency reuse factor is large (e.g., small N), the separation between adjacent channels at the
base station may not be sufficient to keep the adjacent channel interference level within tolerable
For a path loss exponent n = 4, this is equal to –52 dB. If the intermediate frequency (IF) filter of
the base station receiver has a slope of 20 dB/octave, then an adjacent channel interferer must be
displaced by at least six times the passband bandwidth from the center of the receiver frequency
passband to achieve 52 dB attenuation. Here, a separation of approximately six channel bandwidths
is required for typical filters in order to provide 0 dB SIR from a close-in adjacent channel user.
This implies more than six channel separations are needed to bring the adjacent channel interference
to an acceptable level. Tight base station filters are needed when close-in and distant users share the
same cell. In practice, base station receivers are preceded by a high Q cavity filter in order to reject
adjacent channel interference.
As the demand for wireless service increases, the number of channels assigned to a cell eventually
becomes insufficient to support the required number of users. At this point, cellular design
techniques are needed to provide more channels per unit coverage area. Techniques such as cell
splitting, sectoring, and coverage zone approaches are used in practice to expand the capacity of
cellular systems. Cell splitting allows an orderly growth of the cellular system. Sectoring uses
directional antennas to further control the interference and frequency reuse of channels. The zone
microcell concept distributes the coverage of a cell and extends the cell boundary to hard to-reach
places.
Cell splitting is the process of subdividing a congested cell into smaller cells, each with its own base
station and a corresponding reduction in antenna height and transmitter power. Cell splitting
increases the capacity of a cellular system since it increases the number of times that channels are
reused. By defining new cells which have a smaller radius R/2 than the original cells radius R and
by installing these smaller cells (called microcells) between the existing cells, capacity increases
due to the additional number of channels per unit area.
The increased number of cells would increase the number of clusters over the coverage region,
which in turn would increase the number of channels, and thus capacity, in the coverage area. Cell
splitting allows a system to grow by replacing large cells with smaller cells without upsetting the
channel allocation scheme required to maintain the minimum co-channel reuse ratio Q (see
Equation (2.4.3)) between co-channel cells. An example of cell splitting is shown in Figure 2.8. In
Figure 2.8, the base stations are placed at corners of the cells, and the area served by base station A
is assumed to be saturated with traffic (i.e., the blocking of base station A exceeds acceptable rates).
New base stations are therefore needed in the region to increase the number of channels in the area
and to reduce the area served by the single base station. Note in the figure that the original base
station A has been surrounded by six new microcells. In the example shown in Figure 2.8, the
smaller cells were added in such a way as to preserve the frequency reuse plan of the system. For
example, the microcell base station labelled G was placed half way between two larger stations
utilizing the same channel set G. This is also the case for the other microcells in the figure. As can
2.5.2 Sectoring
As shown in figure 2.8, cell splitting achieves capacity improvement by essentially rescaling the
system. By decreasing the cell radius R and keeping the co-channel reuse ratio D/R unchanged, cell
splitting increases the number of channels per unit area. However, another way to increase capacity
is to keep the cell radius unchanged and seek methods to decrease the D/R ratio. As we now show,
sectoring increases SIR so that the cluster size may be reduced. In this approach, first the SIR is
improved using directional antennas, then capacity improvement is achieved by reducing the
number of cells in a cluster, thus increasing the frequency reuse. However, in order to do this
successfully, it is necessary to reduce the relative interference without decreasing the transmit
power.
When sectoring is employed, the channels used in a particular cell are broken down into sectored
groups and are used only within a particular sector, as illustrated in Figure 2.9 (a) and (b).
Assuming seven-cell reuse, for the case of 120° sectors, the number of interferers in the first tier is
Referring to Figure 2.10, consider the interference experienced by a mobile located in the right-
most sector in the center cell labeled ―5‖. There are three cochannel cell sectors labelled ―5‖ to the
right of the center cell, and three to the left of the center cell. Out of these six co-channel cells, only
two cells have sectors with antenna patterns which radiate into the center cell, and hence a mobile
in the center cell will experience interference on the forward link from only these two sectors. The
resulting S/I for this case can be found using Equation (2.4.7) to be 24.2 dB, which is a significant
improvement over the omnidirectional case where the worst case S/I was shown to be 17 dB. This
S/I improvement allows the wireless engineer to then decrease the cluster size N in order to improve
the frequency reuse, and thus the system capacity. In practical systems, further improvement in S/I
is achieved by downtilting the sector antennas such that the radiation pattern in the vertical
(elevation) plane has a notch at the nearest co-channel cell distance.
The improvement in S/I implies that with 120° sectoring, the minimum required S/I of 18 dB can be
easily achieved with seven-cell reuse, as compared to 12-cell reuse for the worst possible situation
in the unsectored case (see Section 2.5.1). Thus, sectoring reduces interference, which amounts to
an increase in capacity by a factor of 12/7, or 1.714. The penalty for improved S/I and the resulting
capacity improvement from the shrinking cluster size is an increased number of antennas at each
base station, and a decrease in trunking efficiency due to channel sectoring at the base station. Since
sectoring reduces the coverage area of a particular group of channels, the number of handoffs
increases, as well.
Microcellular stations are transceiving units covering a relatively small geographic area and adapted
to establish bidirectional links between mobile telephone subscriber stations and a main base
station. Each such microcellular station includes a transmitter for generating outgoing signals
directed to the main base station over an optical fiber link. Radio signals received from a mobile
Represented as Tx/Rx in Figure 2.11 are connected to a single base station and share the same radio
equipment. The zones are connected by coaxial cable, fiberoptic cable, or microwave link to the
base station. Multiple zones and a single base station make up a cell. As a mobile travels within the
cell, it is served by the zone with the strongest signal. This approach is superior to sectoring since
antennas are placed at the outer edges of the cell, and any base station channel may be assigned to
any zone by the base station.
As a mobile travels from one zone to another within the cell, it retains the same channel. Thus,
unlike in sectoring, a handoff is not required at the MSC when the mobile travels between zones
within the cell. The base station simply switches the channel to a different zone site. In this way, a
given channel is active only in the particular zone in which the mobile is traveling, and hence the
base station radiation is localized and interference is reduced. The channels are distributed in time
and space by all three zones and are also reused in co-channel cells in the normal fashion. This
technique is particularly useful along highways or along urban traffic corridors. The advantage of
the zone cell technique is that while the cell maintains a particular coverage radius, the co-channel
interference in the cellular system is reduced since a large central base station is replaced by several
lower powered transmitters (zone transmitters) on the edges of the cell. Decreased co-channel
interference improves the signal quality and also leads to an increase in capacity without the
degradation in trunking efficiency caused by sectoring. As mentioned earlier, an S/I of 18 dB is
In Figure 2.12 B, let each individual hexagon represents a zone, while each group of three hexagons
represents a cell. The zone radius Rz is approximately equal to one hexagon radius. Now, the
capacity of the zone microcell system is directly related to the distance between co-channel cells,
and not zones. This distance is represented as D in Figure 2.12 B For a Dz /Rz value of 4.6, it can be
seen from the geometry of Figure 2.12B that the value of co-channel reuse ratio, D/R, is equal to
three, where R is the radius of the cell and is equal to twice the length of the hexagon radius. Using
Equation , D/R = 3 corresponds to a cluster size of N = 3. This reduction in the cluster size from N
= 7 to N = 3 amounts to a 2.33 times increase in capacity for a system completely based on the zone
microcell concept. Hence for the same S/I requirement of 18 dB, this system provides a significant
increase in capacity over conventional cellular planning.
Paging systems are one way communication systems that send brief messages to a subscriber.
Depending on the type of service, the message may be either a numeric message, an alphanumeric
message, or a voice message. Paging systems are typically used to notify a subscriber of the need to
call a particular telephone number or travel to a known location to receive further instructions. In
modern paging systems, news headlines, stock quotations, and faxes may be sent. A message is sent
to a paging subscriber via the paging system access number (usually a toll-free telephone number)
with a telephone keypad or modem. The issued message is called a page. The paging system then
transmits the page throughout the service area using base stations which broadcast the page on a
radio carrier.
Paging systems vary widely in their complexity and coverage area. While simple paging systems
may cover a limited range of 2 to 5 km, or may even be confined to within individual buildings,
wide area paging systems can provide worldwide coverage. Though paging receivers are simple and
inexpensive, the transmission system required is quite sophisticated. Wide area paging systems
consist of a network of telephone lines, many base station transmitters, and large radio towers that
simultaneously broadcast a page from each base station (this is called simulcasting). Simulcast
transmitters may be located within the same service area or in different cities or countries. Paging
systems are designed to provide reliable communication to subscribers wherever they are; whether
inside a building, driving on a highway, or flying in an airplane. This necessitates large transmitter
powers (on the order of kilowatts) and low data rates (a couple of thousand bits per second) for
maximum coverage from each base station. Figure shows a diagram of a wide area paging
system. The paging control center dispatches pages received from the PSTN throughout several
cities at the same time in Fig 2.13 A
A paging system is composed of the following 6 basic elements (see Figure 2.13 B above).
1) Paging Terminal
2) Controller
3) Outbound control and paging information channel
4) Transmitter network
5) Communications link from transmitter network to controller
6) End user pagers
3D views of Figure 2.14 a pocket pager patented in 1960 by Donald R. Jones of Motorola. In this
system, pages were delivered in two parts. First, you received a short alert tone from a loudspeaker (19,
green). That signalled you to flick a receiver switch (24, purple), and hook a headphone up to a receiver
socket (21, brown), whereupon you could listen to a short voice message from your caller relayed via an
operator. The other components I've highlighted are a radio antenna (37, light blue), selective frequency
switch (red 40), and battery (35, yellow).
SECTOR PAGING
A paging system, either simulcast or non-simulcast, can be operated in either an, all
transmitters key or a subset of all transmitters key, depending on the pager being paged.
When all transmitters do not key for paging in the system this is referred to as sector paging.
Sector paging allows the system operator to partition his system and charge various monthly
service fees depending on the users desired area of coverage. The paging terminal database
must now segregate and group page requests for various service areas. Sector paging
provides no increase in system paging throughput, but in fact can even reduce throughput
slightly since the base stations must be selectively keyed and de-keyed depending on the
page requests. Efficient page request batching may not be possible if the page requests are
not all associated with the same sector. Through the years sector paging has fallen off in
popularity with the increase in users on a system.
MULTIPLE FREQUENCY PAGING
When the multiple frequency transmitter is keyed on a channel the other channel is forced to
be idle by definition. The objective of a paging system operator is to build a single
frequency channel and load the channel to capacity such the system users receive acceptable
paging throughput at a reasonable cost. If the system loading is excessive then throughput
during peak paging hours may become unacceptable by users and service may be sought by
the user from the competition. Typically multiple frequency paging is used when the user
desires to hold a paging frequency they have been granted however they do not have the
capitol to build a complete second system.
3.1.1 Teleservices
GSM mainly focuses on voice-oriented tele services. These comprise encrypted voice transmission,
message services, and basic data communication with terminals as known from the PSTN or ISDN
(e.g., fax). However, as the main service is telephony, the primary goal of GSM was the provision
of high-quality digital voice transmission, offering at least the typical bandwidth of 3.1 kHz of
analog phone systems. Special codecs (coder/decoder) are used for voice transmission, while other
codecs are used for the transmission of analog data for communication with traditional computer
modems used in, e.g., fax machines. Another service offered by GSM is the emergency number.
The same number can be used throughout Europe. This service is mandatory for all providers and
free of charge. This connection also has the highest priority, possibly pre-empting other
connections, and will automatically be set up with the closest emergency center. A useful service
for very simple message transfer is the short message service (SMS), which offers transmission of
messages of up to 160 characters. SMS messages do not use the standard data channels of GSM but
exploit unused capacity in the signalling channels. Sending and receiving of SMS is possible during
GSM specifies different mechanisms for data transmission, the original GSM allowing for data rates
of up to 9600 bit/s for non-voice services. Bearer services permit transparent and non-transparent,
synchronous or asynchronous data transmission. Transparent bearer services only use the
functions of the physical layer (layer 1) to transmit data. Data transmission has a constant delay and
throughput if no transmission errors occur. The only mechanism to increase transmission quality is
the use of forward error correction (FEC), which codes redundancy into the data stream and
helps to reconstruct the original data in case of transmission errors. Depending on the FEC, data
rates of 2.4, 4.8, or 9.6 kbit/s are possible. Transparent bearer services do not try to recover lost data
in case of, for example, shadowing or interruptions due to handover. Non-transparent bearer
services use protocols of layers two and three to implement error correction and flow control. These
services use the transparent bearer services, adding a radio link protocol (RLP). This protocol
comprises mechanisms of high-level data link control (HDLC) and special selective-reject
mechanisms to trigger retransmission of erroneous data. The achieved bit error rate is less than 10–
7, but now throughput and delay may vary depending on transmission quality. Using transparent
and non-transparent services, GSM specifies several bearer services for interworking with PSTN,
ISDN, and packet switched public data networks (PSPDN) like X.25, which is available worldwide.
Data transmission can be full-duplex, synchronous with data rates of 1.2, 2.4, 4.8, and 9.6 kbit/s or
full-duplex, asynchronous from 300 to 9,600 bit/s.
In addition to tele and bearer services, GSM providers can offer supplementary services. Similar
to ISDN networks, these services offer various enhancements for the standard telephony service,
and may vary from provider to provider. Typical services are user identification, call redirection,
or forwarding of ongoing calls. Standard ISDN features such as closed user groups and multi-
party communication may be available. Closed user groups are of special interest to companies
because they allow, for example, a company-specific GSM sub-network, to which only members of
the group have access.
As with all systems in the telecommunication area, GSM comes with a hierarchical, complex
system architecture comprising many entities, interfaces, and acronyms. Figure 3.2 gives a
simplified overview of the GSM system as specified in ETSI (1991b). A GSM system consists of
three subsystems, the radio sub system (RSS), the network and switching subsystem (NSS), and
the operation subsystem (OSS). Each subsystem will be discussed in more detail in the following
As the name implies, the radio subsystem (RSS) comprises all radio specific entities, i.e., the
mobile stations (MS) and the base station subsystem (BSS). Figure 3.2 shows the connection
between the RSS and the NSS via the A inter-face (solid lines) and the connection to the OSS via
the O interface (dashed lines). The A interface is typically based on circuit-switched PCM-30
systems (2.048 Mbit/s), carrying up to 30 64 kbit/s connections, whereas the O interface uses the
Signalling System No. 7 (SS7) based on X.25 carrying management data to/from the RSS .
Base station subsystem (BSS): A GSM network comprises many BSSs, each controlled by
a base station controller (BSC). The BSS performs all functions necessary to maintain radio
connections to an MS, coding/decoding of voice, and rate adaptation to/from the wireless
network part. Besides a BSC, the BSS contains several BTSs.
Base transceiver station (BTS): A BTS comprises all radio equipment, i.e., antennas,
signal processing, amplifiers necessary for radio transmission. A BTS can form a radio cell
or, using sectorized antennas, several cells, and is connected to MS via the Um interface
(ISDN U interface for mobile use), and to the BSC via the Abis interface. The Um interface
contains all the mechanisms necessary for wireless transmission (TDMA, FDMA etc.) and
will be discussed in more detail below. The Abis interface consists of 16 or 64 kbit/s
The ―heart‖ of the GSM system is formed by the network and switching sub-system (NSS). The
NSS connects the wireless network with standard public networks, performs handovers between
different BSSs, comprises functions for worldwide localization of users and supports charging,
accounting, and roaming of users between different providers in different countries. The NSS
consists of the following switches and databases:
Mobile services switching center (MSC): MSCs are high-performance digital ISDN
switches. They set up connections to other MSCs and to the BSCs via the A interface, and
form the fixed backbone network of a GSM system. Typically, an MSC manages several
BSCs in a geographical region. A gateway MSC (GMSC) has additional connections to
other fixed networks, such as PSTN and ISDN. Using additional interworking functions
(IWF), an MSC can also connect to public data networks (PDN) such as X.25. An MSC
handles all signaling needed for connection setup, connection release and handover of
connections to other MSCs. The standard signaling system No. 7 (SS7) is used for this
purpose. SS7 covers all aspects of control signaling for digital networks (reliable routing and
delivery of control messages, establishing and monitoring of calls). Features of SS7 are
number portability, free phone/toll/collect/credit calls, call forwarding, three-way calling
etc. An MSC also performs all functions needed for supplementary services such as call
forwarding, multi-party calls, reverse charging etc.
Home location register (HLR): The HLR is the most important database in a GSM system
as it stores all user-relevant information. This comprises static information, such as the
The third part of a GSM system, the operation subsystem (OSS), contains the necessary functions
for network operation and maintenance. The OSS possesses network entities of its own and
accesses other entities via SS7 signaling (see Figure 3.2). The following entities have been defined:
Operation and maintenance center (OMC): The OMC monitors and controls all other
network entities via the O interface (SS7 with X.25). Typical OMC management functions
are traffic monitoring, status reports of net-work entities, subscriber and security
management, or accounting and billing. OMCs use the concept of telecommunication
management net-work (TMN) as standardized by the ITU-T.
Authentication centre (AuC): As the radio interface and mobile stations are particularly
vulnerable, a separate AuC has been defined to protect user identity and data transmission.
The AuC contains the algorithms for authentication as well as the keys for encryption and
generates the values needed for user authentication in the HLR. The AuC may, in fact, be
situ- ated in a special protected part of the HLR.
Equipment identity register (EIR): The EIR is a database for all IMEIs, i.e., it stores all
device identifications registered for this network. As MSs are mobile, they can be easily
stolen. With a valid SIM, anyone could use the stolen MS. The EIR has a blacklist of stolen
(or locked) devices. In theory an MS is useless as soon as the owner has reported a theft.
Unfortunately, the blacklists of different providers are not usually synchronized and the
illegal use of a device in another operator‘s network is possible (the reader may speculate as
to why this is the case). The EIR also contains a list of valid IMEIs (white list), and a list of
malfunctioning devices (gray list).
combines TDMA and FDMA. In GSM 900, 124 channels, each 200 kHz wide, are used for FDMA,
whereas GSM 1800 uses, 374 channels. Due to technical reasons, channels 1 and 124 are not used
for transmission in GSM 900. Typically, 32 channels are reserved for organiza tional data; the
remaining 90 are used for customers. Each BTS then manages a single channel for organizational
data and, e.g., up to 10 channels for user data. The following example is based on the GSM 900
system, but GSM works in a similar way at 1800 and 1900 MHz. While Figure 3.3 in chapter 3 has
already shown the FDM in GSM, Figure 3.4 also shows the TDM used. Each of the 248 channels is
additionally separated in time via a GSM TDMA frame, i.e., each 200 kHz carrier is subdivided
into frames that are repeated continuously. The duration of a frame is 4.615 ms. A frame is again
subdivided into 8 GSM time slots, where each slot represents a physical TDM channel and lasts for
577 μs. Each TDM channel occupies the 200 kHz carrier for 577 μs every 4.615 ms.
Data is transmitted in small portions, called bursts. Figure 3.4 shows a so-called normal burst as
used for data transmission inside a time slot (user and signaling data). In the diagram, the burst is
only 546.5 μs long and contains 148 bits. The remaining 30.5 μs are used as guard space to avoid
overlapping with other bursts due to different path delays and to give the transmitter time to turn on
and off. Filling the whole slot with data allows for the transmission of156.25 bit within 577 μs.
Each physical TDM channel has a raw data rate of about 33.8 kbit/s, each radio carrier transmits
approximately 270 kbit/s over the Um interface.
The first and last three bits of a normal burst (tail) are all set to 0 and can be used to enhance the
receiver performance. The training sequence in the middle of a slot is used to adapt the parameters
of the receiver to the current path propagation characteristics and to select the strongest signal in
case of multi-path propagation. A flag S indicates whether the data field contains user or network
control data. Apart from the normal burst, ETSI (1993a) defines four more bursts for data
transmission: a frequency correction burst allows the MS to correct the local oscillator to avoid
interference with neighbouring channels, a synchronization burst with an extended training
sequence synchronizes the MS with the BTS in time, an access burst is used for the initial
connection setup between MS and BTS, and finally a dummy burst is used if no data is available
Frames based on the combination of these physical channels. A physical channel consists of a slot,
repeated every 4.615 ms. GSM specifies two basic groups of logical channels, i.e., traffic channels
and control channels:
3.3.2.a : Traffic channels (TCH): GSM uses a TCH to transmit user data (e.g., voice, fax). Two
basic categories of TCHs have been defined, i.e., full-rate TCH (TCH/F) and half-rate TCH
(TCH/H). A TCH/F has a data rate of 22.8 kbit/s, whereas TCH/H only has 11.4 kbit/s. With the
voice codecs available at the beginning of the GSM standardization, 13 kbit/s were required,
whereas the remaining capacity of the TCH/F (22.8 kbit/s) was used for error correction (TCH/FS).
The standard codecs for voice are called full rate (FR, 13 kbit/s) and half rate (HR, 5.6 kbit/s). A
newer codec, enhanced full rate (EFR), provides better voice quality than FR as long as the
transmission error rate is low. An additional increase in voice quality is provided by the so-called
tandem free operation (TFO). This mode can be used if two MSs exchange voice data. In this
case, coding to and from PCM encoded voice (standard in ISDN) can be skipped and the GSM
encoded voice data is directly exchanged. Data transmission in GSM is possible at many different
data rates, e.g., TCH/F4.8 for 4.8 kbit/s, TCH/F9.6 for 9.6 kbit/s, and, as a newer specification,
3.3.2.b.Control channels (CCH): Many different CCHs are used in a GSM system to control
medium access, allocation of traffic channels or mobility management. Three groups of control
channels have been defined, each again with sub channels):
Broadcast control channel (BCCH): A BTS uses this channel to signal information to all
MSs within a cell. Information transmitted in this channel is, e.g., the cell identifier, options
available within this cell (frequency hopping), and frequencies available inside the cell and
in neighbouring cells. The BTS sends information for frequency correction via the
frequency correction channel (FCCH) and information about time synchronization via the
synchronization channel (SCH), where both channels are sub channels of the BCCH.
Common control channel (CCCH): All information regarding connection setup between
MS and BS is exchanged via the CCCH. For calls toward an MS, the BTS uses the paging
channel (PCH) for paging the appropriate MS. If an MS wants to set up a call, it uses the
random access channel (RACH) to send data to the BTS. The RACH implements multiple
access (all MSs within a cell may access this channel) using slotted Aloha. This is where a
collision may occur with other MSs in a GSM system. The BTS uses the access grant
channel (AGCH) to signal an MS that it can use a TCH or SDCCH for further connection
setup.
Dedicated control channel (DCCH): While the previous channels have all been
unidirectional, the following channels are bidirectional. As long as an MS has not
established a TCH with the BTS, it uses the stand-alone dedicated control channel
(SDCCH) with a low data rate (782 bit/s) for signaling. Finally, if more signaling
information needs to be transmitted and a TCH already exists, GSM uses a fast associated
dedicated control channel (FACCH). The FACCH uses the timeslots which are otherwise
used by the TCH. This is necessary in the case of handovers where BTS and MS have to
exchange larger amounts of data in less time.
This periodic pattern of 26 slots occurs in all TDMA frames with a TCH. The combination of these
frames is called traffic multiframe. Figure 3.4.1 shows the logical combination of 26 frames
(TDMA frames with a duration of 4.615 ms) to a multiframe with a duration of 120 ms. This type
of multiframe is used for TCHs, SACCHs for TCHs, and FACCHs. As these logical channels are all
associated with user traffic, the multiframe is called traffic multiframe. TDMA frames containing
(signaling) data for the other logical channels are combined to a control multiframe. Control
multiframes consist of 51 TDMA frames and have a duration of 235.4 ms.
Figure 3.4.2 shows the protocol architecture of GSM with signaling protocols, interfaces, as well as
the entities already shown in Figure 3.2. The main interest lies in the Um interface, as the other
interfaces occur between entities in a fixed network. Layer 1, the physical layer, handles all
radio-specific functions. This includes the creation of bursts according to the five different
formats, multiplexing of bursts into a TDMA frame, synchronization with the BTS, detection of
idle channels, and measurement of the channel quality on the downlink. The physical layer at Um
uses GMSK for digital modulation and performs encryption/decryption of data, i.e., encryption is
not performed end-to-end, but only between MS and BSS over the air interface. Synchronization
also includes the correction of the individual path delay between an MS and the BTS. All MSs
within a cell use the same BTS and thus must be synchronized to this BTS. The BTS generates the
time-structure of frames, slots etc. As the variable timing advance cannot be extended a burst
cannot be shifted earlier than 63 bit times. This results in the 35 km maximum distance between an
MS and a BTS. It might be possible to receive the signals over longer distances; to avoid collisions
at the BTS, access cannot be allowed.
The main tasks of the physical layer comprise channel coding and error detection/correction,
which is directly combined with the coding mechanisms. Channel coding makes extensive use of
different forward error correction (FEC) schemes. FEC adds redundancy to user data, allowing
for the detection and correction of selected errors. Different logical channels of GSM use different
coding schemes with different correction capabilities. Speech channels need additional coding of
voice data after analog to digital conversion, to achieve a data rate of 22.8 kbit/s (using the 13 kbit/s
from the voice codec plus redundancy, CRC bits, and interleaving As voice was assumed to be the
main service in GSM, the physical layer also contains special functions, such as voice activity
detection (VAD), which transmits voice data only when there is a voice signal.
Signaling between entities in a GSM network requires higher layers (see Figure 3.4.2). For this
purpose, the LAPDm protocol has been defined at the Um interface for layer two. LAPDm, as the
name already implies, has been derived from link access procedure for the D-channel (LAPD) in
ISDN systems, which is a version of HDLC. LAPDm is a lightweight LAPD because it does not
need synchronization flags or check summing for error detection. (The GSM physical layer already
performs these tasks.) LAPDm offers reliable data transfer over connections, re-sequencing of data
frames, and flow control. As there is no buffering between layer one and two, LAPDm has to obey
the frame structures, recurrence patterns etc. defined for the Um interface. Further services provided
by LAPDm include segmentation and reassembly of data and acknowledged/unacknowledged data
transfer.
The network layer in GSM, layer three, comprises several sublayers as Figure 3.4.2 shows. The
lowest sublayer is the radio resource management (RR).The functions of RR‘ are supported by
the BSC via the BTS management (BTSM). The main tasks of RR are setup, maintenance, and
release of radio channels. RR also directly accesses the physical layer for radio information and
offers a reliable connection to the next higher layer.
Finally, the call management (CM) layer contains three entities: call control (CC), short message
service (SMS), supplementary service (SS). SMS allows for message transfer using the control
channels SDCCH and SACCH(if no signaling data is sent), CC provides a point-to-point connection
between two terminals and is used by higher layers for call establishment, call clearing and change
of call parameters. This layer also provides functions to send in-band tones, called dual tone
multiple frequency (DTMF), over the GSM network. These tones are used, e.g., for the remote
control of answering machines or the entry of PINs in electronic banking and are, also used for
Mobile station international ISDN number (MSISDN): The only important number for a
user of GSM is the phone number. Remember that the phone number is not associated with
a certain device but with the SIM, which is personalized for a user. The MSISDN follows
the ITU-T standard E.164 for addresses as it is also used in fixed ISDN networks. This
number consists of the country code (CC) (e.g., +91 79 12345678 with 91 for India), the
national destination code (NDC) (i.e., the address of the network provider, e.g., 791), and
the subscriber number (SN)
International mobile subscriber identity (IMSI): GSM uses the IMSI for internal unique
identification of a subscriber. IMSI consists of a mobile country code (MCC) (e.g., 240 for
Sweden, 208 for France), the mobile network code (MNC) (i.e., the code of the network
provider), and finally the mobile subscriber identification number (MSIN).
Temporary mobile subscriber identity (TMSI): To hide the IMSI, which would give
away the exact identity of the user signaling over the air interface, GSM uses the 4 byte
TMSI for local subscriber identification. TMSI is selected by the current VLR and is only
valid temporarily and within the location area of the VLR (for an ongoing communication
TMSI and LAI are sufficient to identify a user; the IMSI is not needed). Additionally, a
VLR may change the TMSI periodically.
Mobile station7 roaming number (MSRN): Another temporary address that hides the
identity and location of a subscriber is MSRN. The VLR generates this address on request
from the MSC, and the address is also stored in the HLR. MSRN contains the current visitor
country code (VCC), the visitor national destination code (VNDC), the identification of
the current MSC together with the subscriber number. The MSRN helps the HLR to find a
subscriber for an incoming call.
Figure 3.5.1 : Mobile call terminated operation Figure 3.5.2 :Mobile call originated operation
Figure 3.5.3 : Message Flow for MTC & MOC during connection set up between MS and BTS
Figure 3.5.1 shows the basic steps needed to connect the calling station with the mobile user.
Mobile originated call (MOC) is much simpler as compared to a MTC (see Figure 3.5.2).
(1).The MS transmits a request for a new connection .
(2).The BSS forwards this request to the MSC.
(3 and 4)The MSC then checks if this user is allowed to set up a call with the requested
service and checks the availability of resources through the GSM network and into the
PSTN. If all resources are available, the MSC sets up a connection between the MS and the
fixed network.
Coding is the information processing in GSM Signal processing that involves preparing the basic
data signals so that they are protected and put in a form that the radio link can handle. Generally the
coding process includes the Logical EXclusive OR (EXOR). Coding is included in −
Speech Properties
Human speech can be distinguished in elementary sounds (Phonemes). Depending on the language,
there are 30 to 50 different phonemes. The human voice is able to produce up to 10 phonemes per
second, so that about 60 bit/s are required to transfer the speech. However, all individual features
and intonations would disappear. To preserve the individual features, the real amount of
information to be sent is a number of times higher, but still a fraction of the 64 Kbit/s used for
PCM.
Based upon the phoneme production mechanism of the human organs of speech, a simple speech
production model can be made. It appears that during a short time interval of 10-30 ms, the model
parameters like pitch-period, voiced/unvoiced, amplification gain, and filter parameters remain
about stationary (quasi stationary). The advantage of such a model is the simple determination of
the parameters by means of linear prediction.
GSM speech coder is RELP (Residually Excited Predictive Coder), which is enhanced by
including a Long Term Predictor (LTP).
The coder provides 260 bits for 20ms blocks of speech, which yields a bit rate of 13kbps.
3.6.2 Channel coding: Channel coding, also known as forward error control coding (FECC), is a
process of detecting and correcting bit errors in digital communication systems. Channel coding is
performed both at the transmitter and at the receiver. Figure 3.6.2 shows the conceptual block
diagram of a modern wireless communication system, where the channel coding block is shown in
the inset of the dotted block. At the transmit side, channel coding is referred to as encoder, where
redundant bits (parity bits) are added with the raw data before modulation. At the receive side,
channel coding is referred to as the decoder. This enables the receiver to detect and correct errors, if
they occur during transmission due to noise, interference and fading. Since error control coding
adds extra bits to detect and correct errors, transmission of coded information requires more
bandwidth.
In a system which utilizes FECC coding, the data are encoded with the redundant bits to allow the
receiver to not only detect errors, but to correct them as well. In this system, a sequence of data
signals is transformed into a longer sequence that contains enough redundancy to protect the data.
This type of error control is also classified as channel coding, because these methods are often used to
correct errors that are caused by channel noise. The goal of all FECC techniques is to detect and
• Block codes
• Convolutional codes
• Concatenated codes
• Orthogonal codes
Usually the convolutional coder and decoder used at the time if signal processing and especially in
channel coding process
C. Interleaving:
To minimize the effect of sudden fades on the received data, the total of 456 encoded bits
within each 20ms speech frame or control message frame are broken into eight 57 bits sub
blocks and they are numbered even odd according to block number. These eight consecutive
blocks are spread over eight consecutive TCH time slot.
If a burst is lost due to interference or fading, channel coding ensures that enough bits will
still be received correctly to allow the error correction to work.
Each TCH time slot carries two 57 bits blocks of data from two different 20ms speech
blocks. Time slot of first 4 frames contains even data blocks of present speech frame and
odd data block of previous speech frame. Time slot of next 4 frames contains odd blocks of
present speech frame and even data block of next speech frame.
D. Burst formatting:
Burst formatting adds binary data to the data block to help synchronization and equalization
of the received signal.
E. Ciphering:
Ciphering modifies the contents of the eight interleaved blocks by encryption techniques
known only to the particular mobile station and base transceiver station.
The A3 ciphering algorithm is used to authenticate each mobile by verifying the user
password within the SIM with the cryptographic key at the MSC.
The A5 ciphering algorithm is used for encryption. It provides scrambling for 114 coded bits
sent in each TS.
The A8 is used for ciphering key.
F. Modulation:
The modulation scheme used by GSM system is 0.3GMSK where 0.3 describes 3db
bandwidth of the Gaussian pulse shaping filter.
The channel data rate of GSM is 270.833 kbps which is four times the RF frequency shift.
This minimizes bandwidth of the modulation spectrum and hence improves channel
capacity.
MSK modulated signal is then passed through Gaussian filter to smooth the rapid frequency
transitions which would otherwise spread energy in adjacent channels.
G. Demodulation:
Three algorithms have been specified to provide security services in GSM. Algorithm A3 is used
for authentication, A5 for encryption, and A8 for the generation of a cipher key. In the GSM
standard only algorithm A5 was publicly available, whereas A3 and A8 were secret, but
standardized with open interfaces.
Authentication is based on the SIM, which stores the individual authentication key Ki, the user
identification IMSI, and the algorithm used for authentication A3. Authentication uses a challenge-
MS and BTS can now encrypt and decrypt data using the algorithm A5 and the cipher key Kc. As
Figure 3.7.2 shows, Kc should be a 64 bit key – which is not very strong, but is at least a good
protection against simple eavesdropping. However, the publication of A3 and A8 on the internet
showed that in certain implementations 10 of the 64 bits are always set to 0, so that the real length
of the key is thus only 54 consequently, the encryption is much weaker.
Code Division Multiple Access (CDMA) is a digital cellular technology used for mobile
communication. CDMA is the base on which access methods such as cdma One, CDMA2000, and
WCDMA are built. CDMA cellular systems are deemed superior to FDMA and TDMA, which is
why CDMA plays a critical role in building efficient, robust, and secure radio communication
systems.
Salient Features of CDMA
CDMA, which is based on the spread spectrum technique has following salient features −
In CDMA, every channel uses the full available spectrum.
Individual conversations are encoded with a pseudo-random digital sequence and then
transmitted using a wide frequency range.
CDMA consistently provides better capacity for voice and data communications, allowing
more subscribers to connect at any given time.
CDMA is the common platform on which 3G technologies are built. For 3G, CDMA uses 1x
EV-DO and EV-DV.
WCDMA is based on DS-CDMA (direct sequence code division multiple access) technology in
which user-information bits are spread over a wide bandwidth (much larger than the information
signal bandwidth) by multiplying the user data with the spreading code. The chip (symbol rate) rate
of the spreading sequence is 3.84 Mcps, which, in the WCDMA system deployment is used together
with the 5-MHz carrier spacing. The processing gain term refers to the relationship between the
signal bandwidth and the information bandwidth. Thus, the name wideband is derived to
differentiate it from the 2G CDMA (IS-95), which has a chip rate of 1.2288 Mcps. In a CDMA
system, all users are active at the same time on the same frequency and are separated from each
other with the use of user specific spreading codes. The wide carrier bandwidth of WCDMA allows
supporting high user-data rates and also has certain performance benefits, such as increased
multipath diversity. The actual carrier spacing to be used by the operator may vary on a 200-kHz
grid between approximately 4.4 and 5 MHz, depending on spectrum arrangement and the
interference situation.
The CDMA Development Group (CDG), founded in December 1993, is an international consortium
of companies. It works together to lead the growth and evolution of advanced wireless
telecommunication systems.
CDG is comprised of service providers, infrastructure manufacturers, device vendors, test
equipment vendors, application developers, and content providers. Its members jointly define the
technical requirements for the development of complementary systems CDMA2000 and 4G.
Further, the interoperability with other emerging wireless technologies are meant to increase the
availability of wireless products and services to consumers and businesses worldwide.
3G CDMA2000
Code division multiple access 2000 is the natural evolution of IS-95 (cdma One). It includes
additional functionality that increases its spectral efficiency and data rate capability.(code division
multiple access) is a mobile digital radio technology where channels are defined with codes (PN
sequences). CDMA permits many simultaneous transmitters on the same frequency channel. Since
more phones can be served by fewer cell sites, CDMA-based standards have a significant economic
advantage over TDMA- or FDMA-based standards. This standard is being developed by
telecommunications Industry Association (TIA) of US and is is standardized by 3GPP2 The main
CDMA2000 standards are: CDMA2000 1xRTT,CDMA 2000 1xEV and CDMA2000 EV-DV.
These are the approved radio interfaces for the ITU's IMT-2000 standard. In the following, a brief
discussion about all these standards is given.
CDMA2000 1xRTT: RTT stands for Radio Transmission Technology and the designation "1x",
meaning "1 times Radio Transmission Technology", indicates the same RF bandwidth as IS- 95.The
main features of CDMA2000 1X are as follows:
Provides CDMA carriers with the option of installing radio channels with data only
(CDMA2000 EV-DO) and with data and voice (CDMA2000 EV-DV .
The cdma2000 1xEV-DO supports greater than 2.4Mbps of instantaneous high-speed packet
throughput per user on a CDMA channel, although the user data rates are much lower and
highly dependent on other factors.
CDMA2000 EV-DV can offer data rates up to 144kbps with about twice as many voice
channels as IS-95B.
CDMA2000 3x is (also known as EV-DO Rev B) is a multi-carrier evolution. It has higher
rates per carrier (up to 4.9 Mbit /s on the downlink per carrier). Typical deployments are
expected to include 3 carriers for a peak rate of 14.7 Mbit /s. Higher rates are possible by
bundling multiple channels together. It enhances the user experience and enables new
services such as high definition Video streaming
Uses statistical multiplexing across channels to further reduce latency, enhancing the
experience for latency-sensitive services such as gaming, video telephony, remote console
sessions and web browsing.
It provides increased talk-time and standby time. The interference from the adjacent sectors
is reduced by hybrid frequency re-use and improves the rates that can be offered, especially
to users at the edge of the cell. It has efficient support for services that have asymmetric
download and upload requirements (i.e. different data rates required in each direction) such
as le transfers, web browsing, and broadband multimedia content delivery.
3G TD-SCDMA
Time Division-Synchronous Code Division Multiple Access, or TD-SCDMA, is a 3G mobile
telecommunications standard, being pursued in the People's Republic of China by the Chinese
Academy of Telecommunications Technology (CATT). This proposal was adopted by ITU as one
of the 3G options in late 1999. TD-SCDMA is based on spread spectrum technology.
TD-SCDMA uses TDD, in contrast to the FDD scheme used by W-CDMA. By dynamically Adjust-
ting the number of timeslots used for downlink and uplink, the system can more easily accommodate
asymmetric traffic with different data rate requirements on downlink and uplink than FDD schemes.
Since it does not require paired spectrum for downlink and uplink, spectrum allocation flexibility is
also increased. Also, using the same carrier frequency for uplink and downlink means that the
channel condition is the same on both directions, and the base station can deduce the downlink
channel information from uplink channel estimates, which is helpful to the application of beam
forming techniques.
TD-SCDMA also uses TDMA in addition to the CDMA used in WCDMA. This reduces the
number of users in each timeslot, which reduces the implementation complexity of multiuser
detection and beam forming schemes, but the non-continuous transmission also reduces coverage
(because of the higher peak power needed), mobility (because of lower power control frequency)
and complicates radio resource management algorithms. The "S" in TD-SCDMA stands for
"synchronous", which means that uplink signals are synchronized at the base station receiver,
achieved by continuous timing adjustments. This reduces the interference between users of the same
Beyond 3G networks, or 4G (Fourth Generation), represent the next complete evolution in wireless
communications. A 4G system will be able to provide a comprehensive IP solution where voice,
data and streamed multimedia can be given to users at higher data rates than previous generations.
There is no formal definition for 4G ; however, there are certain objectives that are projected for
4G. It will be capable of providing between 100 Mbit/s and 1 Gbit/s speeds both indoors and
outdoors, with premium quality and high security. It would also support systems like multicarrier
communication, MIMO and UWB.
CDMA channels can be broadly categorized as Forward channel and Reverse channel. This chapter
explains the functionalities of these channels.
3.2.1Forward Channel
The Forward channel is the direction of the communication or mobile-to-cell downlink path. It
includes the following channels −
Pilot Channel − Pilot channel is a reference channel. It uses the mobile station to acquire the
time and as a phase reference for coherent demodulation. It is continuously transmitted by
each base station on each active CDMA frequency. And, each mobile station tracks this
signal continuously.
Sync Channel − Synchronization channel carries a single, repeating message, which gives
the information about the time and system configuration to the mobile station. Likewise, the
mobile station can have the exact system time by the means of synchronizing to the short
code.
Reverse Channel
The Reverse channel is the mobile-to-cell direction of communication or the uplink path. It consists
of the following channels −
Access Channel − Access channel is used by mobile stations to establish a communication
with the base station or to answer Paging Channel messages. The access channel is used for
short signaling message exchanges such as call-ups, responses to pages and registrations.
Reverse Traffic Channel − Reverse traffic channel is used by the individual users in their
actual calls to transmit traffic from a single mobile station to one or more base stations.
Time division duplex is a technique by which the Uplink and the Downlink transmissions are
carried over the same frequency by using synchronized time intervals. The carrier uses a 5 MHz
band, although there is a low chip rate solution under study by the 3GPP (1.28 Mcps). The available
frequency bands for TDD will be 1900–1920 MHz and 2010 – 2025 MHz.
Duplex Methods of Radio Links
In case of Time Division Duplex, the forward link frequency is same as the reverse link frequency.
In each link, signals are transmitted continuously in turns − just like a Ping-Pong game.
TDD uses a single frequency band for both to transmit and to receive. Further, it shares the band by
assigning alternate timeslots for transmitting and receiving operations. The information to be
transmitted can be voice, video, or computer data in bit-serial format. Each time interval can be 1
byte long or may be a part of several bytes.
TDD alternates the transmission and reception station data over time. Timeslots can be of variable
length. Due to the nature of high-speed data, the communicating parties cannot mean that the
transmissions are intermittent. Transmissions that appear as simultaneous are actually competing
each other. Digitally converted into analog voice, no one can say that it is not a full duplex.
In some TDD systems, alternative time intervals are of same duration or having both DL and UL;
however, the system does not need to be symmetric 50/50. The system may be asymmetrical as
required.
For example, while accessing the Internet, the download speed is usually higher than the upload
speed. Most of the equipment work on asynchronous mode where the download speed is higher
than the upload speed. When the download speed is higher than the upload speed, less timeslots are
needed for uploading. Some TDD formats offer dynamic bandwidth allocation when the number of
time intervals or durations is changed on the fly as needed.
The real advantage of TDD is that it is only a single channel of the frequency spectrum and it
doesn‘t require band guards or channel separations as the intervals take place using timeslots. The
disadvantage is that the successful implementation of TDD requires a timing system. The precise
timing to both the transmitter and the receiver is needed to ensure that the time intervals do not
overlap or interfere with another.
Timing is often synchronized to GPS atomic clock standards specific derivative. The guard time is
also needed between timeslots to avoid duplication. This time is generally equal to the transmission-
reception processing time (transmission-reception switching time) and the transmission delays
(latency) on the communications channel.
In Frequency Division Duplex (FDD), the forward link frequency is not the same as the reverse link
frequency. In each link, signals are continuously transmitted in parallel.
FDD requires two symmetrical segments of spectrum for the uplink and downlink channels.
In a cell phone with a transmitter and receiver, operating simultaneously in such close proximity,
the receiver has to filter as much of the signal from the transmitter as possible. More separation of
the spectrum, the most effective filters.
FDD uses a lot of frequency spectrum, generally twice of the required TDD spectrum. In addition,
there must be adequate spectrum separation between transmission and reception of the channels.
These bands keep saying − it cannot be used, they are unnecessary. Given the scarcity and cost of
the spectrum, they are real disadvantages.
Use of FDD
FDD is widely used in different cellular telephone systems. In some systems, the band 869-894
MHz is used as the downlink (DL) spectrum from the cell site tower to the device. And, the band
824-849 MHz is used as the uplink (UL) spectrum of the handset at the cell site.
FDD also works on a cable where transmit and receive channels are given different parts of the
cable spectrum, as in cable TV systems. And, filters are used to keep the channels separate.
A duplex method whereby the Uplink and the Downlink transmissions use two separate frequency
bands −
Disadvantage of FDD
The drawback of FDD is that it does not allow special techniques like multiple antennas, multiple
input-output (MIMO), and beam forming. These technologies are an essential element of the new
strategies Long Term Evolution (LTE) 4G cell phone to increase the data rate. It is difficult to make
broad enough bandwidth to cover both sets of antenna spectrum. Circuit complex dynamic
adjustment is required.
The radio channel is a communication medium shared by several users in a geographic area. Mobile
stations are in competition with one another for the frequency resource to transmit their information
flow. Without other measures to control concurrent access of several users, collisions can occur.
Since collisions are undesirable for connection oriented communication such as mobile phones,
personal/mobile subscriber stations need to be allocated the dedicated channels on request.
The mobile communication, sharing wireless resources on all users, must be communicated to
identify the user. While identifying the user, it is referred to as "multiple access" (Multiple Access)
Code Division Multiple Access system is very different from time and frequency multiplexing. In
this system, a user has access to the whole bandwidth for the entire duration. The basic principle is
that different CDMA codes are used to distinguish among the different users.
Techniques generally used are direct sequence spread spectrum modulation (DS-CDMA),
frequency hopping or mixed CDMA detection (JDCDMA). Here, a signal is generated which
extends over a wide bandwidth. A code called spreading code is used to perform this action. Using
a group of codes, which are orthogonal to each other, it is possible to select a signal with a given
code in the presence of many other signals with different orthogonal codes.
CDMA allows up to 61 concurrent users in a 1.2288 MHz channel by processing each voice packet
with two PN codes. There are 64 Walsh codes available to differentiate between calls and
theoretical limits. Operational limits and quality issues will reduce the maximum number of calls
somewhat lower than this value.
In fact, many different "signals" baseband with different spreading codes can be modulated on the
same carrier to allow many different users to be supported. Using different orthogonal codes,
interference between the signals is minimal. Conversely, when signals are received from several
mobile stations, the base station is capable of isolating each as they have different orthogonal
spreading codes.
The following figure shows the technicality of the CDMA system. During the propagation, we
mixed the signals of all users, but by that you use the same code as the code that was used at the
time of sending the receiving side. You can take out only the signal of each user.
Processing Gain
Signal to Noise Ratio
Voice Activity Factor
Frequency Reuse Efficiency
Capacity in CDMA is soft, CDMA has all users on each frequency and users are separated by code.
This means, CDMA operates in the presence of noise and interference.
In addition, neighbouring cells use the same frequencies, which means no re-use. So, CDMA
capacity calculations should be very simple. No code channel in a cell, multiplied by no cell. But it
is not that simple. Although not available code channels are 64, it may not be possible to use a
single time, since the CDMA frequency is the same.
Centralized Methods
The band used in CDMA is 824 MHz to 894 MHz (50 MHz + 20 MHz separation).
Frequency channel is divided into code channels.
1.25 MHz of FDMA channel is divided into 64 code channels.
CDMA is a spread spectrum technique. Each data bit is spread by a code sequence. This means,
energy per bit is also increased. This means that we get a gain of this.
P (gain) = 10log (W/R)
W is Spread Rate
R is Data Rate
For CDMA P (gain) = 10 log (1228800/9600) = 21dB
This is a gain factor and the actual data propagation rate. On an average, a typical transmission
condition requires a signal to the noise ratio of 7 dB for the adequate quality of voice.
Translated into a ratio, signal must be five times stronger than noise.
Actual processing gain = P (gain) - SNR
= 21 – 7 = 14dB
CDMA uses variable rate coder
The Voice Activity Factor of 0.4 is considered = -4dB.
Hence, CDMA has 100% frequency reuse. Use of same frequency in surrounding cells causes some
additional interference.
In CDMA frequency, reuse efficiency is 0.67 (70% eff.) = -1.73dB
Advantages of CDMA
CDMA has a soft capacity. The greater the number of codes, the more the number of users. It has
the following advantages −
CDMA requires a tight power control, as it suffers from near-far effect. In other words, a
user near the base station transmitting with the same power will drown the signal latter. All
signals must have more or less equal power at the receiver
Rake receivers can be used to improve signal reception. Delayed versions of time (a chip or
later) of the signal (multipath signals) can be collected and used to make decisions at the bit
level.
Flexible transfer may be used. Mobile base stations can switch without changing operator.
Two base stations receive mobile signal and the mobile receives signals from the two base
stations.
Transmission Burst − reduces interference.
Disadvantages of CDMA
A base station is an essential element of the CDMA network. A base station covers a small
geographical area called a cell. A cell may be omnidirectional or sectoral. Each base station has a
transmitting antenna and two receiving antennas for each cell. Two receiving antennas are used per
CDMA Identities
Network Identities −
A base station is a member of a cellular system and a network. A network is a subset of a system.
The systems are installed with an identification called Identification System (CIS). The networks
with a system receiving is Network identification (NID). It is a uniquely identified network pair of
(SID, NID). The mobile station has a list of one or more home (non-roaming) pairs (SID, NID).
SID
A system identification indicator 15 bits (SID) is stored in a mobile station. It is used to determine
the host system of the mobile stations. The bit allocation of the system identification indicator is
shown below.
The circuit that provides the ESN must be isolated so that no one can contact and tamper. Attempts
to change the ESN circuit should make the mobile station inoperative. At the time of the issuance of
the initial acceptance, the manufacturer must be assigned a code Manufacturers (MFR) in the eight
most significant bits (bits 31-24 bits) 32-bit serial number. Bits 23-18 are reserved (initially zero).
And, every manufacturer only allocates 17 bits to 0. When a manufacturer has used almost all
possible combinations of serial numbers in bits 17-0, the manufacturer may submit a notification to
the FCC. The FCC will assign the next sequential binary number in the reserve block (bits 23
through).
Permuted ESN
CDMA is a spread spectrum technique where multiple users to access the system at the same
example in a cell, and of course on the same frequency. Therefore, it discriminates the users on the
reverse link (i.e. information from MS to the base station). It spreads information using codes that
are unique to the mobile station in all the CDMA cellular systems. This code has an element that is
the ESN, but it doesn‘t use the ESN in the same format instead, it uses an ESN swapped.
NMSI
In wireless systems, fading can be either due to multipath, called as multipath fading or due
to shadowing from obstacles affecting the wave propagation, known as shadow fading. Here in
this chapter, we will discuss how multipath fading affects the reception of signals in CDMA.
CDMA systems use a signal fast chip rate for spreading the spectrum. It has a high time resolution,
due to which it receives a different signal from each path separately. The RAKE receiver prevents
signal degradation by summing all the signals.
Because CDMA has high time-resolution, different paths delay the CDMA signals, which can be
discriminated. Therefore, energy from all paths can be summed by adjusting their phases and path
delays. This is a principle of RAKE receiver. By using a RAKE receiver, it is possible to improve
the loss of the received signal due to fading. It can ensure a stable communication environment.in
CDMA systems, multi-path propagation improves the signal quality by using RAKE receiver.
Due to the reflection on the challenges of a broadband, radio channel can consists of many copies
(multipath), signals originally transmitted with different amplitude, phase, and delay. If the signal
components arrive over a chip period of each other, a rake receiver may be used to adjust and
combine. The Rake receiver uses a principle of diversity through multiple paths. The figure given
below shows the Rake receiver scheme.
The Rake receiver processes several multipath signals components. The correlator outputs are
combined to achieve better reliability and communication performance. Bit decision on the basis of
a single correlation can produce a large bit error rate as multipath component processed by the fact
that the correlator can be damaged by discoloration. If the output of a correlator is corrupted by
fading, the other cannot be, and the corrupt signal can be reduced by the weighting process.
The Rake receiver processes several multipath signals components. The correlator outputs are
combined to achieve better reliability and communication performance. Bit decision on the basis of
a single correlation can produce a large bit error rate as multipath component processed by the fact
that the correlator can be damaged by discoloration. If the output of a correlator is corrupted by
fading, the other cannot be, and the corrupt signal can be reduced by the weighting process.
1. The received signal from multiple paths arrives at the antenna with different delays and
phases.
1. The signal is first passed through a bank of matched filters, each of which corresponds to a
specific path.
2. The output of each matched filter is sampled at the symbol rate and the resulting samples are
combined.
3. The combining process is done using a technique called maximum ratio combining (MRC)
which gives more weight to the signals that have higher signal-to-noise ratio (SNR).
4. The combined signal is then demodulated to obtain the transmitted symbols.
5. The rake receiver also performs channel estimation by estimating the complex gains of each
path using a technique called pilot symbols.
6. The channel estimates are used to adjust the weights in the combining process to ensure
optimal performance.
7. The rake receiver also uses a technique called diversity combining to reduce the effect of
fading by combining the signals from multiple antennas.
8. The combined signal from each antenna is then passed through the matched filter and
combined using maximum ratio combining.
9. The rake receiver is able to recover the transmitted signal even in the presence of severe
multipath fading and interference.
Some key applications of Rake receiver are:
CDMA Systems: Rake receivers are extensively used in CDMA systems, where they are used
to combat the effects of multipath fading.
Wireless Networks: Rake receivers are also used in wireless networks to improve the
performance of the system, especially in environments where the signal is weak.
Satellite Communications: In satellite communication systems, Rake receivers are used to
detect and extract weak signals that have travelled long distances.
Mobile Communications: Rake receivers are used in mobile communication systems to
improve the quality of the received signal by minimizing the effects of multipath fading.
High-Speed Data Transmission: Rake receivers are used in high-speed data transmission
systems to reduce errors caused by the transmission of signals over long distances.
Each line of the 64 Walsh matrix 64 corresponds to a channel number. The channel number 0 is
mapped to the first row of the Walsh matrix, which is the code of all zeros. This channel is also
known as the pilot channel and is used to form and to estimate the impulse response of a mobile
radio channel. Take a look at the following Diagram 3 .6.2 It shows how multiplexing is carried out
using Walsh Code.
To calculate the cross-correlation between the sequences, we will need to convert the bits into the
matrix to form the antithesis of ± 1 values. However, all users on the same CDMA channel can be
synchronized with an accuracy of one chip interval using a common long PN sequence. It also
functions as a data scrambler.
Walsh Code is a group of spreading codes having good autocorrelation properties and poor
cross correlation properties. Walsh codes are the backbone of CDMA systems and are used
to develop the individual channels in CDMA.
For IS-95, there are 64 codes available.
o Code `0‘ is used as the pilot and code `32‘ is used for synchronization.
Orthogonal codes are assigned to the users, the output of the correlator in the receiver will be zero
except the desired sequence. In synchronous direct sequence, the receiver receives the same code
sequence which was transmitted so that there is no time shift between the users.
Demodulating DS Signals - 1
In order to demodulate DS signals, you need to know the code that was used at the time of
transmission. In this example, by multiplying the code used in the transmission to the reception
signal, we can get the transmitted signal.
In this example, multiple codes were used at the time of transmission (10,110,100) to the received
signal. Here, we have calculated by using the law of two additives (Modulo 2 Addition). It is further
demodulated by multiplying the code that was used at the time of this transmission, called
the reverse diffusion (de-spreading). In the diagram given below, it can be seen that during the
As shown in the following figure, the power density of Spread Spectrum signals could be lower
than the noise density. This is a wonderful feature that can keep the signals protected and maintain
privacy.
By spreading the spectrum of the transmitted signal, one can reduce its power density such that it
becomes less than the power density of the noise. In this way, it is possible to hide the signal in the
noise. It can be demodulated if you know the code that was used to send the signal. In case the code
is not known, then the received signal will remain hidden in the noise even after the demodulation.
Since the signal is spread over a wide frequency band, the power spectral density becomes very
low, so other communication systems do not suffer from this kind of communication. However, the
Gaussian noise increases. Given below is a list of a few major advantages of Spread Spectrum −
Multipath can be agreed with, as a large number of codes can be generated, allowing a large
number of users.
In spread spectrum, there is no limit of users whereas there is limitations of users in FDMA
technology.
Security − without knowing the spreading code, it is hardly possible to recover the
transmitted data.
Descending rejection − as large bandwidth is used the system; it is less susceptible to
deformation.
PN Sequence
The DS-CDMA system uses two types of spreading sequences, i.e., PN sequences and orthogonal
codes. As mentioned above, the PN sequence is generated by the pseudo-random noise generator. It
is simply a binary linear feedback shift register, consisting of XOR gates and a shift register. This
PN generator has the ability to create a sequence identical for both the transmitter and the
receiver, and retaining the desirable properties of the noise randomness bit sequence.
A PN sequence has many features such as having an almost equal number of zeros and ones, very
low correlation between shifted versions of the sequence, and very low cross-correlation with other
signals such as interference and noise. However, it is able to correlate well with itself and its
inverse. Another important aspect is the autocorrelation of the sequence as it determines the ability
to synchronize and lock the spreading code for the received signal. This fight effectively effects the
multiple interference and improves the SNR. M-sequences, Gold codes, and Kasami sequences are
the examples of this class of sequences.
A Pseudo-random Noise (PN) sequence is a sequence of binary numbers, e.g. ±1, which
appears to be random; but it is in fact, perfectly deterministic.
PN sequences are used for two types of PN spread spectrum techniques −
o Direct Signal Spread Spectrum (DS-SS) and
o Frequency Hop spread Spectrum (FH-SS).
If ‗u‘ uses PSK for modulating the PN sequence, it results in DS-SS.
If ‗u‘ uses FSK for modulating the PN sequence, it results in FH-SS.
As shown in the illustration, user A is far away from the receiver and user B is close to the receiver,
there will be big difference between desired signal power and interfered signal power. Desired
signal power will be much higher than the interfered signal power and hence SN ratio of user A will
be smaller and communication quality of user A will be severely degraded.
3.8 CDMA - Handoff
Whenever a cellular subscriber passes through one base station to another, the network
automatically switches to the other respective base station and maintains the coverage
responsibility. This behaviour called "hand-off" (Handoff) or "hand-over" (Handover).
Whereas in FDMA and TDMA systems, it uses a different frequency to communicate with the base
station of that area. It means, there will be a frequency switch from one frequency to another, and
during the switching, there will be slightly communication cut, which is called as "hard
handoff" (Hard Handoff) or "hard handover" (Hard Handover).
Cellular systems track mobile stations in order to maintain their communication links. When mobile
station goes to a neighbour cell, the communication link switches from the current cell to the
neighbour cell.
When a mobile enters in a new area (from the base station to another base station), the mobile is the
second pilot of sufficient power by sending the message to the strength of the driver to the first base
station. The base station notifies the MTSO and then the MTSO requests new Walsh code
assignment of the second base station.
The first base station controls with new progressive transfer Walsh assignment MTSO then
sends land link to the second base station. Mobile is powered by two base stations and
MTSO selects the best quality status for every 20 ms.
The power goes low at the mobile station by the first BS and mobile sends a pilot strength
message then the first BS transmission stops and releases the channel. And, traffic channel
continues on the second base station.
In CDMA cellular system, communication does not break even at the moment doing
handoff, because switching frequency or timeslot is not required.
Note − A Walsh sequence is a part of Orthogonal Codes, whereas other sequences such as PN,
Gold, and Kasami are shift register sequences. In case orthogonal codes are assigned to the users,
the output of the correlator in the receiver will be zero except the desired sequence, whereas
synchronous direct sequence receiver receives the same code sequence which was transmitted, so
there is no time shift between the users.
3.9 CDMA - Interferences
A CDMA signal experiences high interference signals other than the CDMA users. This takes two
forms of interference — interference from other users in the same minicell and interference from
the adjacent cells. The total interference also includes the background noise and other spurious
signals.
Noise Sources
In the spread spectrum technology, the radio signals are distributed on a single 1.23 MHz wide
frequency band. Each subscriber has assigned PN codes. Signals corresponding to the PN codes are
decoded and processed. Signals that do not contain the code matches are treated as noise and
ignored.
Signal Processing: Receive
CDMA starts with an encoded narrowband signal; this spreads with the use of the PN codes to a
bandwidth of 1.23 MHz.
When the signal is received, it is filtered and processed to recover the desired signal. A correlator
eliminates sources of interference because they are uncorrelated with the desired signal treatment.
Using this method, the number of CDMA calls can occupy the same frequency spectrum
simultaneously.
Frame Error Rate
The number of transmission errors, measured in terms of frame error rate (FER). It increases with
the number of calls. To overcome this problem, the minicell and mobile site can increase the power
until either the mobile or the minicell site can power up more further to reduce FER to an
acceptable amount. This event provides a soft limit calls from a particular minicell and depends on
Mobile computing provides a variety of wireless devices that has the mobility to allow people to
connect to the internet. It provides wireless transmission to access data and information from the
locations they are stored.
As we know that mobile computing is the communication between computing devices without any
physical connection between them, we use wireless networks to establish connections in mobile
computing. So there are always some chances of threats and security issues due to wireless
connections.
There are mainly five fundamental goals of security used in the information system to deal with
security issues. They are:
a) Confidentiality
This is used to prevent unauthorized users from gaining access to any particular user's critical
and confidential information.
b) Integrity
This is used to ensure that any type of unauthorized modification, destruction or creation of
information cannot be done.
c) Availability
The availability is used to ensure that authorized users get the required access whenever they
need it.
d) Legitimate
This is used to ensure that only authorized, and legitimate users have access to the services.
Accountability is used to ensure that the users will be responsible for their security-related
activities by arranging the users and their activities in a linked form.
We have to achieve these goals according to the security policy used by the service providers.
Mobile Computing faces many improper and unethical practices and problems such as hacking,
industrial espionage, pirating, online fraud and malicious destruction etc. The threats and security
issues of mobile computing can be divided into two categories:
Wireless security issues are considered as the primary security issues of mobile computing. These
are related to wireless networks. These issues occur when the hackers intercept the radio signals.
Most wireless networks are dependent on other private networks, which are managed by others, so
after these issues, the users have less control of security procedures. These security issues are:
The denial of services or DOS attacks is one of the most common attacks of all kinds of
networks and especially in a wireless network. It prevents users from using network services
because the attacker sends a large amount of unnecessary data or connection requests to the
communication server. It causes a slow network, and therefore the users cannot get benefitted
from using its service.
b) Traffic Analysis
Traffic analysis is used to identify and monitor communication between users. In this process,
the service provider listens the traffic flowing in the wireless channel to access the private
information of users affected by the attacker.
c) Eavesdropping
It specifies that the attacker can log on to the wireless network and access sensitive data if the
wireless network was not secure enough. This can also be done if the information is not
encrypted.
It specifies that the attacker can intercept the session and modify the transmitted data in this
session. This scenario is called "man in the middle." It inserts the attacker's host between the
sender and receiver host.
In this security issue, the attacker impersonates him as an authorized account of another user
and tries to access the sensitive data and unauthorized services.
In this security issue, the attacker can get some of the network services by getting unauthorized
access. After capturing the message, he/she can reply to it with some modifications to the same
destination or another.
Mobile devices are very prone to new types of security attacks and fraud issues. These issues
are not only because of the mobile devices' vulnerability but also because of the sensitive data
that the mobile devices have stored. These security issues and threats such as Virus, Spyware
and Trojan may damage or destroy the mobile devices and steal the information stored on them.
A virus is a part of malicious software or spyware that tends to gather information about the
user without his/her knowledge.
Following is a list of some General mobile computing security issues we face using mobile devices:
a) Push Attacks
In the push attack, the attacker creates a malicious code at the user's mobile device by hacking it
and then he/she may spread it to affect other elements of the network.
b) Pull Attacks
The pull attack is a type of attack where the attacker controls the device and handles it in his/her
way. He can decide which emails they want to receive. In this attack, the user can decide about
the obtained data by the device itself.
c) Forced De-authentication
In this security issue, the attackers convince the mobile end-point or the mobile user to drop its
connection and re-connection to get a new signal. Within this process, they insert their device
between the mobile device and the network and steal the information or do the fraud.
d) Multi-protocol Communication
The multi-protocol communication provides the ability of many mobile devices to operate using
multiple protocols. For example, A cellular provider's network protocol. Most of the protocols
have some security loopholes, which help the attacker to exploit this weakness and access to the
device.
e) Mobility
f) Disconnections
These types of security issues occur when mobile devices go to different places. It occurs in the
form of frequent disconnections caused by external parties resulting in the handoff.
These are the non-technical attacks. They are occurred due to the lack of awareness of security
policies. Due to this reason, many times, security breaches occur. Even though corporate has
standard policies for mobile device security, many employees don't understand its risks. It is
found in a study that most of the security risks and threats (almost 72%) occur because of
careless employees than hackers (28%). It shows the importance of implementing a strong
combination of technology and security awareness within an organization.
The biggest issue in mobile computing is the credential verification of users. Because the users
share the username and passwords, it may become a significant threat to security. Due to this
sensitive issue, most companies are very reluctant to implement mobile computing. Some
recommendations can be followed by companies or mobile users to keep their mobile devices and
the data stored in the devices secure.
Mobile Computing is defined as a computing environment which is mobile and moves along with
the user. There are various number of challenges that affected mobile computing and it has to
overcome them. Some of the major technical challenges faced by mobile computing are:
1. Mobility
2. Wireless Medium
3. Portability
2. Wireless Medium: The transmission medium in mobile computing is wireless, therefore the
following points are considered:
Various interferences occurs in the mobile computing by the different elements in the
environment.
Accuracy and quantity of bandwidth should be sufficient.
Network cost is feasible.
3. Portability: This means that the communication device moves, for eg. mobile phones. The
following mobile constraints are to be considered as the devices are also mobile:
Location Flexibility
This has enabled users to work from anywhere as long as there is a connection established. A
user can work without being in a fixed position. Their mobility ensures that they are able to
carry out numerous tasks at the same time and perform their stated jobs.
The time consumed or wasted while travelling from different locations or to the office and back,
has been slashed. One can now access all the important documents and files over a secure
channel or portal and work as if they were on their computer. It has enhanced telecommuting in
many companies. It has also reduced unnecessary incurred expenses.
Enhanced Productivity
Users can work efficiently and effectively from whichever location they find comfortable. This
in turn enhances their productivity level.
Ease of Research
Research has been made easier, since users earlier were required to go to the field and search for
facts and feed them back into the system. It has also made it easier for field officers and
researchers to collect and feed data from wherever they are without making unnecessary trips to
and from the office to the field.
Entertainment
Video and audio recordings can now be streamed on-the-go using mobile computing. It's easy to
access a wide variety of movies, educational and informative material. With the improvement
and availability of high speed data connections at considerable cost, one is able to get all the
entertainment they want as they browse the internet for streamed data. One is able to watch
news, movies, and documentaries among other entertainment offers over the internet. This was
not possible before mobile computing dawned on the computing world.
Business processes are now easily available through secured connections. Looking into security
issues, adequate measures have been put in place to ensure authentication and authorization of
the user accessing the services. all banking services are available with Mobile Banking the
online payment after corona pandemic has been desperately increased and all trade activities in
physical or from share markets are being done with the help of mobile computing.
Some business functions can be run over secure links and sharing of information between
business partners can also take place. Meetings, seminars and other informative services can
be conducted using video and voice conferencing. Travel time and expenditure is also
considerably reduced.
Online education & Social media
all these activities now became integral part of the mobile and its computing as far as education
and learning is concern these are available online instantly with ease of cost and streamed with
e learning contents and all bachelors and master‘s degree courses are available online .
Apart from Education millions of people are joined with social media platform to exchange the
ideas and thoughts and informations with the help of mobile computing.
IaC is a method to define and provision network infrastructure by using definition files that contain
code. It's necessary for automating networks and making them programmable. IaC is enabled
through application programming interfaces (APIs). It makes the tasks of unifying separate
processes and automating infrastructure provisioning simpler, faster, and more reliable.
Network programmability
Networking programmability generally refers to tools and best practices for deploying, managing,
and troubleshooting network devices. More precisely, network programmability is the process of
using code, concepts based on the software development lifecycle, and other tools to make networks
perform actions.
How is a network "programmable"? A modern network is more than just routers and switches. It's a
collection of interconnected systems that include applications and other software, virtual machines,
cloud instances, containers, and more. A programmable network has APIs in its infrastructure that
developers can use to program applications and other components to interact directly with the
network.
Some network programmability use cases
Network programmability, combined with task automation, helps businesses deploy new apps and
services faster, even at the network edge. Services also can be orchestrated centrally instead of
provisioned separately.Another use case for network programmability is mitigating security threats.
Using APIs, a network can be programmed to block malware or other malicious traffic without
disrupting users as network security engineers diagnose and remediate the issue.
programmable networks demand new skills or at least an expansion of core skill sets for network
programming. It's becoming increasingly important for network engineers to become familiar with
network programmability basics.
The programmable network is taking center stage in today's application-centric organizations,
which are embracing software-defined networking, 5G connectivity, Internet of Things (IoT)
applications, and more. IT professionals who want to advance their network programming skills and
programmability knowledge can earn certifications, attend education programs, or engage in other
learning opportunities.
This conceptual framework outlines the functions of a networking system. OSI includes seven
layers that show how data flows across and within networks. The layers are: physical, data link,
network, transport, session, presentation, and application.
1. Shared Memory
2. Message passing
Figure 3.2.2 below shows a basic structure of communication between processes via the shared
memory method and via the message passing method.
An operating system can implement both methods of communication. First, we will discuss the
shared memory methods of communication and then message passing. Communication between
processes using shared memory requires processes to share some variable, and it completely
depends on how the programmer will implement it. One way of communication using shared
memory can be imagined like this: Suppose process1 and process2 are executing simultaneously,
and they share some resources or use some information from another process. Process1 generates
information about certain computations or resources being used and keeps it as a record in shared
memory. When process2 needs to use the shared information, it will check in the record stored in
shared memory and take note of the information generated by process1 and act accordingly.
Processes can use shared memory for extracting information as a record from another process as
well as for delivering any specific information to other processes.
ii) Messaging Passing Method
In this method, processes communicate with each other without using any kind of shared
memory. If two processes p1 and p2 want to communicate with each other, they proceed as
follows:
Establish a communication link (if a link already exists, no need to establish it again.)
Start exchanging messages using basic primitives. We need at least two primitives:
– send(message, destination) or send(message)
– receive(message, host) or receive(message)
A link has some capacity that determines the number of messages that can reside in it temporarily
for which every link has a queue associated with it which can be of zero capacity, bounded
capacity, or unbounded capacity. In zero capacity, the sender waits until the receiver informs the
sender that it has received the message. In non-zero capacity cases, a process does not know
whether a message has been received or not after the send operation. For this, the sender must
communicate with the receiver explicitly. Implementation of the link depends on the situation, it
can be either a direct communication link or an in-directed communication link.
Direct Communication links are implemented when the processes use a specific process
identifier for the communication, but it is hard to identify the sender ahead of time.
A process that is blocked is one that is waiting for some event, such as a resource becoming
available or the completion of an I/O operation. IPC is possible between the processes on same
computer as well as on the processes running on different computer i.e. in networked/distributed
system. In both cases, the process may or may not be blocked while sending a message or
attempting to receive a message so message passing may be blocking or non-blocking. Blocking
is considered synchronous and blocking send means the sender will be blocked until the
message is received by receiver. Similarly, blocking receive has the receiver block until a
message is available. Non-blocking is considered asynchronous and Non-blocking send has the
sender sends the message and continue. Similarly, Non-blocking receive has the receiver receive a
valid message or null. After a careful analysis, we can come to a conclusion that for a sender it is
more natural to be non-blocking after message passing as there may be a need to send the
message to different processes. However, the sender expects acknowledgment from the receiver
in case the send fails. Similarly, it is more natural for a receiver to be blocking after issuing the
receive as the information from the received message may be used for further execution. At the
In Direct message passing, The process which wants to communicate must explicitly name the
recipient or sender of the communication. e.g. send(p1, message) means send the message to p1.
Similarly, receive(p2, message) means to receive the message from p2. In this method of
communication, the communication link gets established automatically, which can be either
unidirectional or bidirectional, but one link can be used between one pair of the sender and
receiver and one pair of sender and receiver should not possess more than one pair of links.
Symmetry and asymmetry between sending and receiving can also be implemented i.e. either both
processes will name each other for sending and receiving the messages or only the sender will
name the receiver for sending the message and there is no need for the receiver for naming the
sender for receiving the message. The problem with this method of communication is that if the
name of one process changes, this method will not work.
In Indirect message passing, processes use mailboxes (also referred to as ports) for sending and
receiving messages. Each mailbox has a unique id and processes can communicate only if they
share a mailbox. Link established only if processes share a common mailbox and a single link can
be associated with many processes. Each pair of processes can share several communication links
and these links may be unidirectional or bi-directional. Suppose two processes want to
communicate through Indirect message passing, the required operations are: create a mailbox, use
this mailbox for sending and receiving messages, then destroy the mailbox. The standard
primitives used are: send(A, message) which means send the message to mailbox A. The
primitive for the receiving the message also works in the same way e.g. received (A, message).
There is a problem with this mailbox implementation. Suppose there are more than two processes
sharing the same mailbox and suppose the process p1 sends a message to the mailbox, which
process will be the receiver? This can be solved by either enforcing that only two processes can
share a single mailbox or enforcing that only one process is allowed to execute the receive at a
given time or select any process randomly and notify the sender about the receiver. A mailbox can
be made private to a single sender/receiver pair and can also be shared between multiple
sender/receiver pairs. Port is an implementation of such mailbox that can have multiple senders
and a single receiver. It is used in client/server applications (in this case the server is the
receiver). The port is owned by the receiving process and created by OS on the request of the
receiver process and can be destroyed either on request of the same receiver processor when the
receiver terminates itself. Enforcing that only one process is allowed to execute the receive can be
done using the concept of mutual exclusion. Mutex mailbox is created which is shared by n
process. The sender is non-blocking and sends the message. The first process which executes the
receive will enter in the critical section and all other processes will be blocking and will wait.
Now, let‘s discuss the Producer-Consumer problem using the message passing concept. The
producer places items (inside messages) in the mailbox and the consumer can consume an item
when at least one message present in the mailbox.
Examples of IPC systems
Advantages of IPC:
1. Enables processes to communicate with each other and share resources, leading to increased
efficiency and flexibility.
2. Facilitates coordination between multiple processes, leading to better overall system
performance.
3. Allows for the creation of distributed systems that can span multiple computers or networks.
4. Can be used to implement various synchronization and communication protocols, such as
semaphores, pipes, and sockets.
Disadvantages of IPC:
3.4:Remote login`
Remote Login is a process in which user can login into remote site i.e. computer and use services
that are available on the remote computer. With the help of remote login a user is able to
understand result of transferring and result of processing from the remote computer to the local
computer. It is implemented using Telnet.
1. When the user types something on local computer, then local operating system accepts
character.
2. Local computer does not interpret the characters, it will send them to TELNET client.
3. TELNET client transforms these characters to a universal character set called Network
Virtual Terminal (NVT) characters and it will pass them to the local TCP/IP protocol
Stack.
4. Commands or text which is in the form of NVT, travel through Internet and it will arrive at
the TCP/IP stack at remote computer.
FTP is a standard communication protocol. There are various other protocols like HTTP which
are used to transfer files between computers, but they lack clarity and focus as compared to FTP.
Moreover, the systems involved in connection are heterogeneous systems, i.e. they differ in
operating systems, directory, structures, character sets, etc the FTP shields the user from these
differences and transfer data efficiently and reliably. FTP can transfer ASCII, EBCDIC, or image
files. The ASCII is the default file share format, in this, each character is encoded by NVT ASCII.
In ASCII or EBCDIC the destination must be ready to accept files in this mode. The image file
format is the default format for transforming binary files.
The goals of FTP are:
It encourages the direct use of remote computers.
It shields users from system variations (operating system, directory structures, file structures,
etc.)
It promotes sharing of files and other types of data.
FTP Clients
FTP works on a client-server model. The FTP client is a program that runs on the user‘s computer
to enable the user to talk to and get files from remote computers. It is a set of commands that
Anonymous FTP
Some sites can enable anonymous FTP whose files are available for public access. So, the user
can access those files without any username or password. Instead, the username is set to
anonymous and the password to the guest by default. Here, the access of the user is very limited.
For example, the user can copy the files but not allowed to navigate through directories.
FTP Working
The FTP connection is established between two systems and they communicate with each other
using a network. So, for the connection, the user can get permission by providing the credentials to
the FTP server or can use anonymous FTP.
When an FTP connection is established, there are two types of communication channels are also
established and they are known as command channel and data channel. The command channel is
used to transfer the commands and responses from client to server and server to client. FTP uses the
same approach as TELNET or SMTP to communicate across the control connection. It uses the
NVT ASCII character set for communication. It uses port number 21. Whereas the data channel is
used to actually transfer the data between client and server. It uses port number 20. The figure
below shows the working of FTP.
Applications of FTP
The following are the applications of FTP:
FTP connection is used by different big business organizations for transferring files in between
them, like sharing files to other employees working at different locations or different branches
of the organization.
FTP connection is used by IT companies to provide backup files at disaster recovery sites.
Financial services use FTP connections to securely transfer financial documents to the
respective company, organization, or government.
Employees use FTP connections to share any data with their co-workers.
Advantages
Multiple transfers: FTP helps to transfer multiple large files in between the systems.
Efficiency: FTP helps to organize files in an efficient manner and transfer them efficiently over
the network.
Security: FTP provides access to any user only through user ID and password. Moreover, the
server can create multiple levels of access.
Continuous transfer: If the transfer of the file is interrupted by any means, then the user can
resume the file transfer whenever the connection is established.
Simple: FTP is very simple to implement and use, thus it is a widely used connection.
Speed: It is the fastest way to transfer files from one computer to another.
Disadvantages
Less security: FTP does not provide an encryption facility when transferring files. Moreover,
the username and passwords are in plain text and not a combination of symbols, digits, and
alphabets, which makes it easier to be attacked by hackers.
Old technology: FTP is one of the oldest protocols and thus it uses multiple TCP/IP
connections to transfer files. These connections are hindered by firewalls.
Any computer system that is on a network needs a local port to transfer data over the internet.
This data is directed to the designated system with the use of it‘s IP Address. Each and every
system receives and sends this data over the network by the ports designated for the respective
process. For example, port 80 is the default port to receive information sent from the server. This
port needs not to be same always, it can be decided by the user as well.
Therefore, a socket is an IP address and a port together, which enables the network connection to
send/receive information to other networks or systems.
Socket Programming can be better understood by creating a Server and a client on two different
consoles by running Perl scripts and then transferring data between both via a secure connection.
Above image illustrates the calls that are must for running server side and client side scripts in
Socket programming.
-> Creating a socket using the socket() call function. Perl provides a predefined
module Socket.pm which needs to be included in the code using ‗use‗ pragma.
use Socket;
This module will help creation of a socket at the server end
-> bind() call is used to bind the socket with a port number. Without a port, the socket will be of
no use. The server uses this bind() function to assign a port to a socket.
bind(socket, port_address)
-> listen() call is to enable the port to wait for any incoming requests. This call is done by the
server to provide a limit of the connection requests allowed with the server.
listen(socket, size)
Here, size is used to pass request limit.
-> accept() call is used to issue a request to the access() function to accept the incoming
connections.
accept(new_socket, socket)
If the access() call is successful then a new socket is returned for future connections with the
respective client.
close($socket);
RPC service enumeration is not the same as finding out what your target‘s vulnerabilities are. It is
more about taking note of specific information about the network in general. This can involve
approaching an RPC server and learning more about it, but you cannot do so without having to first
check for vulnerabilities. Every other method for digging for information about something or
someone usually involves vulnerability analysis first.
3.8:RMI (Remote Method Invocation)
The RMI (Remote Method Invocation) is an API(Application Programming Interface) that provides
a mechanism to create distributed application in java. The RMI allows an object to invoke methods
on an object running in another JVM. The RMI provides remote communication between the
applications using two objects stub and skeleton.
In an RMI application, we write two programs, a server program (resides on the server) and
a client program (resides on the client).
Inside the server program, a remote object is created and reference of that object is made
available for the client (using the registry).
RMI Registry
The Client-server model is a distributed application structure that partitions task or workload
between the providers of a resource or service, called servers, and service requesters called
clients. In the client-server architecture, when the client computer sends a request for data to the
server through the internet, the server accepts the requested process and deliver the data packets
requested back to the client. Clients do not share any of their resources. Examples of Client-
Server Model are Email, World Wide Web, etc.
Client-Server Model operation
In this article we are going to take a dive into the Client-Server model and have a look at how
the Internet works via, web browsers. This article will help us in having a solid foundation of the
WEB and help in working with WEB technologies with ease.
Client: When we talk the word Client, it mean to talk of a person or an organization using a
particular service. Similarly in the digital world a Client is a computer (Host) i.e. capable of
receiving information or using a particular service from the service providers (Servers).
Servers: Similarly, when we talk the word Servers, It mean a person or medium that serves
something. Similarly in this digital world a Server is a remote computer which provides
information (data) or access to particular services.
Native App
Mobile operating systems, including Android and iOS, come with a Software Development Kit
(SDK) for developing apps specific to the OS. Such apps are referred to as native to the system for
which they have been developed. When discussing an app, the general assumption is that it is a
native app implemented in a standard programming language for the respective operating system -
Objective-C or Swift for iOS, and Java or Kotlin for Android.
The most obvious downside of native apps is that they target only one specific platform. To build
the same app for both Android and iOS, one needs to maintain two independent code bases, or
introduce often complex development tools to port a single code base to two platforms. The
following frameworks are an example of the latter and allow you to compile a single codebase for
both Android and iOS.
Xamarin
Google Flutter
React Native
Apps developed using these frameworks internally use the APIs native to the system and offer
performance equivalent to native apps. Also, these apps can make use of all device capabilities,
including the GPS, accelerometer, camera, the notification system, etc. Since the final output is very
similar to previously discussed native apps, apps developed using these frameworks can also be
considered as native apps.
Web App
Mobile web apps (or simply, web apps) are websites designed to look and feel like a native app.
These apps run on top of a device‘s browser and are usually developed in HTML5, much like a
modern web page. Launcher icons may be created to parallel the same feel of accessing a native
app; however, these icons are essentially the same as a browser bookmark, simply opening the
default web browser to load the referenced web page.
Hybrid App
Hybrid apps attempt to fill the gap between native and web apps. A hybrid app executes like a
native app, but a majority of the processes rely on web technologies, meaning a portion of the app
runs in an embedded web browser (commonly called "WebView"). As such, hybrid apps inherit
both pros and cons of native and web apps.
A web-to-native abstraction layer enables access to device capabilities for hybrid apps not
accessible to a pure web app. Depending on the framework used for development, one code base
can result in multiple apps that target different platforms, with a UI closely resembling that of the
original platform for which the app was developed.
Following is a non-exhaustive list of more popular frameworks for developing hybrid apps:
Apache Cordova
Framework 7
Ionic
jQuery Mobile
Native Script
Onsen UI
Sencha Touch
Progressive Web Apps (PWA) load like regular web pages, but differ from usual web apps in
several ways. For example it's possible to work offline and access to mobile device hardware is
possible, that traditionally is only available to native mobile apps.
PWAs combine different open standards of the web offered by modern browsers to provide benefits
of a rich mobile experience. A Web App Manifest, which is a simple JSON file, can be used to
configure the behaviour of the app after "installation"
DEMOS/MP provides a two level version of the flat name space provided by the original
DEMOS. In DEMOS, a single name server, the switchboard, aids in establishing connections
between processes in much the same way a telephone operator sets up a call between two
people. Any process with a link to the switchboard may announce itself by a process sends a
message to the switchboard containing a link to itself and a name to assign to the link. When
another process sends a request message to the switchboard containing that name, the
switchboard returns the link to the announced process. Since the switchboard is one of the first
processes started, it is simple to provide a link to the switchboard to each new process that needs
it.
There are two types of switchboard processes, global and local. There is only one global
switchboard. Its location is broadcast across the network as part of the network‘s routing
protocol. As new processors are added to the network, they are told of the switchboard‘s
location. Local switchboards may exist on each processor in the network. Their locations are not
broadcast. When a process sends a message using a switchboard link, the message kernel sends
that message to the local switchboard if one exists or to the global switchboard if there is no
local one. Switchboard requests from the local switchboards are sent to the global switchboard.
This effectively implements a two level naming hierarchy.
The hierarchical design solves two problems,
scaling the name space
locating the switchboard.
The scaling problem is caused by the potentially larger number of names and resources in a
multiple machine environment. The locating problem is caused by not having a switchboard
process on every machine.
All interactions between one process and another or between a process and the system are via
communication-oriented kernel calls. Most system services are provided by system processes that
are accessed by message communication. The kernel implements the message operations and a few
special services. Messages are sent to the kernel to access all services except message
communication itself. A copy of the kernel resides on each processor. Although each kernel
independently maintains its own resources (CPU, real memory, and I/O ports), all kernels cooperate
in providing a location-transparent, reliable, Interprocess message facility. In fact, different
modules of the kernel on the same processor, as well as kernels on different processors, use the
message mechanism to communicate with each other.
In DEMOS/MP, messages are sent using links to specify the receiver of the message. Links can be
thought of as buffered, one-way message channels, but are essentially protected global process
addresses accessed via a local name space. Links may be created, duplicated, passed to other
processes, or destroyed. Links are manipulated much like capabilities; that is, the kernel participates
in all link operations, but the conceptual control of a link is vested in the process that the link
addresses (which is always the process that created it). Addresses in links are context-independent;
if a link is passed to a different process, it will still point to the same destination process. A link
may also point to a kernel. Messages may be sent to or by a kernel in the same manner as a process.
The success of the DEMOS/MP implementation is due to the simplicity of the organization of the
system. DEMOS/MP uses message passing as the basic structuring tool for both the operating
system and the users. Message passing is implemented at the lowest level of the system and
therefore is available for use by both the system and users.
a) The first feature is the link data area. At first glance, these data areas appear to be an escape
mechanism to allow processes to share memory. These are better viewed as separating the
two common forms of communications: short control messages and bulk data transfers.
Messages are used for short, control functions, and link data areas are used for large data
transfers. The data areas contribute to the ease in implementing process migration and
remote paging.
b) The second feature is the use of DELIVERTOKERNEL links. These links provide control
of processes across machine boundaries, while requiring a minimum of additional
mechanism. In all cases, control messages for a process are directed to the correct machine
by using the standard message routing.
c) The third feature is the structure of the intermachine protocols. Through the use of type
abstractions in a strongly typed language, layers of protocol were constructed with small
performance penalty for interactions between the abstractions (layers) of the protocol.
It is not difficult to design an operating system that will run in a distributed environment. The main
point is to avoid uncontrolled sharing of data between components of the operating system. In
DEMOS/MP, each component (kernel, system processes) of the operating system only maintains
state that is local to that component and uses links as the only means to reference state that is
maintained by another component. For example, when a process opens a file, it receives a link that
represents the resource of the open file. All of the state regarding the state of the open file is
maintained in the file server process(es). If a user process moves, the only requirement is that the
link still be valid at the process‘s new location; no other changes are needed to local system state.
It is not difficult to distribute an operating system, but to make a reliable distributed system is
difficult. Even given a reliable network communication protocol, a system must still handle
machine crashes, network failures, and the resulting loss of system function. It is not difficult to
4.4 Mobile IP and cellular IP in mobile computing, 4.5 case study of CODA.
Both cellular IP and mobile IP are open standards published by the Internet Engineering Task Force
(IETF). The difference between the two is their zone of operation. Cellular IP is similar to a Local
Area Network (LAN) whereas Mobile IP is analogous to a Wide Area Network (WAN). Cellular IP
was first proposed in January 2000, but has never been accepted as a formal standard. Mobile IP
was defined in August 2002.
Mobile IP Working:
The correspondent node sends the data to the mobile node. Data packets contain the
correspondent node‘s address (Source) and home address (Destination). Packets reach the home
agent. But now mobile node is not in the home network, it has moved into the foreign network.
The foreign agent sends the care-of-address to the home agent to which all the packets should be
sent. Now, a tunnel will be established between the home agent and the foreign agent by the
process of tunneling.
Tunneling establishes a virtual pipe for the packets available between a tunnel entry and an
endpoint. It is the process of sending a packet via a tunnel and it is achieved by a mechanism
called encapsulation. Now, the home agent encapsulates the data packets into new packets in
which the source address is the home address and destination is the care-of-address and sends it
through the tunnel to the foreign agent. Foreign agent, on another side of the tunnel, receives the
data packets, decapsulates them, and sends them to the mobile node. The mobile node in response
to the data packets received sends a reply in response to the foreign agent. The foreign agent
directly sends the reply to the correspondent node.
Cellular IP is a "micro-mobility" proposed protocol. This routes IP traffic within a fixed range over
wireless devices. Cellular IP competes with other micro-mobility solutions. A parallel with fixed
wire routing is that the Border Gateway Protocol is mandatory for routing over the Internet, but a
variety of routing protocols are available for LANs. The primary design objective of Cellular IP is to
provide maximum scalability and robustness with minimal complexity. A Cellular IP network is
fully distributed where
Functions of Cellular IP
a) Mappings
For simplicity and scalability, in a Cellular IP network none of the nodes know the exact
location of a mobile host. Packets addressed to a mobile host are routed to its current base
station on a hop-by-hop basis where each node only needs to know on which of its outgoing
ports to forward packets. This limited routing information is local to the host and does not
assume that nodes have any knowledge of the wireless access network‘s topology. We refer to
these information elements as mappings because they map mobile host identifiers (IP addresses)
to node ports. Mappings are created by packets transmitted by mobile hosts. These packets
travel in the access network toward the gateway router, routed on a hop-by-hop basis. By
monitoring these packets and by mapping sender address to incoming port, nodes of the access
network create a hop by-hop reverse path for future packets addressed to the given host.
b) Paging
Idle mobile hosts periodically generate short control packets, called paging-update packets
sending them to the nearest available base station. The paging-update packets travel in the
access network toward the gateway router (GW), routed on a hop-by-hop basis. Nodes equipped
d) Handoff
Handoff in Cellular IP is always initiated by the mobile host. As the host approaches a new base
station, it redirects its data packets from the old to the new base station. The first of these
redirected packets will automatically configure a new path of RC mappings for the host, this
time to the new base station. For a time equal to the timeout of RC mappings, packets addressed
to the mobile host will be delivered at both the old and new base stations. This guarantees that if
the host‘s radio device is capable of listening to two logical channels, the handoff will be soft. If
the host can not listen to both base stations at the same time then the performance of hard
handoff will depend on the radio device. After a while, the path to the old base station will time
out and clear, while packets will continue to be delivered to the host at its current location via
the new base station.
The Cellular IP architecture relies on the separation of local mobility from wide area mobility. A set
of key requirements, namely easy global migration, cheap passive connectivity, flexible handoff
support, efficient location management and simple memory less mobile hosts as motivating factors
in design. Cellular IP is optimized for wireless access networks and has been designed to satisfy
these key requirements. Two further advantages of the protocol are its simplicity and robustness. A
Cellular IP network scales well, using the same simple low-cost nodes for small indoor systems to
metropolitan or large rural areas. The simplicity of a Cellular IP node and the capability of smooth
interworking with Mobile IP eases the introduction of Cellular IP making it backward compatible,
while the network can be easily extended in an incremental way.
Context delivery architecture(CODA) is a distributed file system with its origin in AFS2. It
has many features that are very desirable for network file systems. Currently, Coda has
several features not found elsewhere.
To provide all the necessary files for disconnected work, Coda offers extensive mechanisms for pre-
fetching of files while still connected, called hoarding . If the client is connected to the server with
a strong connection (see Figure 4.1.7), hoarding transparently pre-fetches files currently used. This
automatic data collection is necessary for it is impossible for a standard user to know all the files
currently used.
As soon as the client is disconnected, applications work on the replicates (see Figure 4.1.7,
emulating). Coda follows an optimistic approach and allows read and write access to all files. The
system keeps a record of changed files, but does not maintain a history of changes for each file.
The cache always has only one replicate (possibly changed). After reconnection, Coda compares the
replicates with the files on the server . If Coda notices that two different users have changed a file,
reintegration of this file fails and Coda saves the changed file as a copy on the server to allow for
manual reintegration
Another problem of Coda is the definition of a conflict. Coda detects only write conflicts, i.e., if two
or more users change a file. Now consider two files f1and f2. One client uses values from files f1
and f2 to calculate something and stores the result in file f1. The other client uses values from files
f1 and f2 to calculate something else and stores the result in file f2. Coda would not detect any
problem during reintegration of the files. However, the results may not reflect the correct values
based on the files. The order of execution plays an important role. To solve this problem, a simple
transaction mechanism was introduced into Coda as an option, the so-called isolation-only
transactions (IOT). IOT allows grouping certain operations and checks them for serial execution.
Coda models the patience of a user and weighs it against the cost of fetching the file required by the
user.
waves can penetrate walls, senders and receivers can be placed anywhere (also non-visible, e.g.,
within devices, in walls etc.). Sometimes wiring is difficult if firewalls separate buildings (real
firewalls made out of, e.g., bricks, not routers set up as a firewall). Penetration of a firewall is only
permitted at certain points to prevent fire from spreading too fast.
● Planning: Only wireless ad- hoc networks allow for communication without previous planning,
any wired network needs wiring plans. As long as devices follow the same standard, they can
communicate. For wired networks, additional cabling with the right plugs and probably
interworking units (such as switches) have to be provided.
● Design: Wireless networks allow for the design of small, independent devices which can for
example be put into a pocket. Cables not only restrict users but also designers of small PDAs,
notepads etc. Wireless senders and receivers can be hidden in historic buildings, i.e., current
networking technology can be introduced without being visible.
● Robustness: Wireless networks can survive disasters, e.g., earthquakes or users pulling a plug. If
the wireless devices survive, people can still communicate. Networks requiring a wired
infrastructure will usually break down completely.
● Cost: After providing wireless access to the infrastructure via an access point for the first user,
adding additional users to a wireless network will not increase the cost. This is, important for e.g.,
lecture halls, hotel lobbies or gate areas in airports where the numbers using the network may vary
significantly. Using a fixed network, each seat in a lecture hall should have a plug for the network
although many of them might not be used permanently. Constant plugging and unplugging will
sooner or later destroy the plugs. Wireless connections do not wear out.
WLANs disadvantages:
● Quality of service: WLANs typically offer lower quality than their wired counterparts. The main
reasons for this are the lower bandwidth due to limitations in radio transmission (e.g., only 1–10
Mbit/s user data rate instead of 100–1,000 Mbit/s), higher error rates due to interference (e.g., 10–4
instead of 10–12 for fiber optics), and higher delay/delay variation due to extensive error correction
and detection mechanisms.
● Proprietary solutions: Due to slow standardization procedures, many companies have come up
with proprietary solutions offering standardized functionality plus many enhanced features
(typically a higher bit rate using a patented coding technology or special inter-access point
protocols). However, these additional features only work in a homogeneous environment, i.e., when
adapters from the same vendors are used for all wireless nodes.
● Restrictions: All wireless products have to comply with national regulations. Several
government and non-government institutions worldwide regulate the operation and restrict
frequencies to minimize interference. Consequently, it takes a very long time to establish global
solutions like, e.g., IMT-2000, which comprises many individual standards. WLANs are limited to
low-power senders and certain license-free frequency bands, which are not the same worldwide.
In a Wi-Fi P2P group, the group owner operates as an access point and all other devices are clients.
There are two main methods to establish a group owner in the Wi-Fi Direct group. In one approach,
the user sets up a P2P group owner manually. This method is also known as autonomous group
Figure 5.1.4 : Devices A and C are both communicating with B, but are unaware of each other
Bridge
A bridge can be used to connect networks, typically of different types. A wireless Ethernet bridge
allows the connection of devices on a wired Ethernet network to a wireless network. The bridge acts
as the connection point to the wireless LAN
Piconet:
Piconet is a type of Bluetooth network that contains one primary node called the master node
and seven active secondary nodes called slave nodes. Thus, we can say that there is a total of 8
active nodes which are present at a distance of 10 meters. The communication between the
primary and secondary nodes can be one-to-one or one-to-many. Possible communication is only
between the master and slave; Slave-slave communication is not possible. It also has 255 parked
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act as master or
we can say primary in another piconet. This kind of node can receive a message from a master in
one piconet and deliver the message to its slave in the other piconet where it is acting as a master.
This type of node is referred to as a bridge node. A station cannot be mastered in two piconet.
1. Radio (RF) layer: It specifies the details of the air interface, including frequency, the use of
frequency hopping and transmit power. It performs modulation/demodulation of the data into
RF signals. It defines the physical characteristics of Bluetooth transceivers. It defines two
types of physical links: connection-less and connection-oriented.
2. Baseband Link layer: The baseband is the digital engine of a Bluetooth system and is
equivalent to the MAC sublayer in LANs. It performs the connection establishment within a
piconet, addressing, packet format, timing and power control.
3. Link Manager protocol layer: It performs the management of the already established links
which includes authentication and encryption processes. It is responsible for creating the
links, monitoring their health, and terminating them gracefully upon command or failure.
4. Logical Link Control and Adaption (L2CAP) Protocol layer: It is also known as the heart
of the Bluetooth protocol stack. It allows the communication between upper and lower layers
of the Bluetooth protocol stack. It packages the data packets received from upper layers into
the form expected by lower layers. It also performs segmentation and multiplexing.
5. Service Discovery Protocol (SDP) layer: It is short for Service Discovery Protocol. It allows
discovering the services available on another Bluetooth-enabled device.
10. Application layer: It enables the user to interact with the application.
Types of Bluetooth
Various types of Bluetooth are available in the market nowadays. Let us look at them.
In-Car Headset: One can make calls from the car speaker system without the use of mobile
phones.
Stereo Headset: To listen to music in car or in music players at home.
Webcam: One can link the camera with the help of Bluetooth with their laptop or phone.
Bluetooth-equipped Printer: The printer can be used when connected via Bluetooth with
mobile phone or laptop.
Bluetooth Global Positioning System (GPS): To use GPS in cars, one can connect their phone
with car system via Bluetooth to fetch the directions of the address.
Advantage:
It is a low-cost and easy-to-use device.
It can also penetrate through walls.
It creates an Ad-hoc connection immediately without any wires.
It is used for voice and data transfer.
Disadvantages:
It can be hacked and hence, less secure.
It has a slow data transfer rate: of 3 Mbps.
It has a small range: 10 meters.
Bluetooth communication does not support routing.
The issues of handoffs have not been addressed.
Applications:
It can be used in laptops, and in wireless PCs, printers.
It can be used in wireless headsets, wireless PANs, and LANs.
It can connect a digital camera wirelessly to a mobile phone.
It can transfer data in terms of videos, songs, photographs, or files from one cell phone to
another cell phone or computer.
It is used in the sectors of Medical health care, sports and fitness, Military.
Application Layer:
In this application layer protocol security plays a vital role.
Sync(PIM), Object Push(PIM) or Binary File Transfer are the functions provided by this layer.
Session Layer:
IrOBEX , IrLAN , IrBus , IrMC , TrTran , IrComm are present in this layer to perform different
tasks.
IrTinyTP:
Segmentation and reassembly takes place in this layer .
It provides connection to IrLMP.
IrLMP:
It multiplexes multiple applications data as well as exclusive link access.
It provides an Ad-hoc connection between peers.
Physical Layer:
This layer has an ability for accessing half duplex or alternating directions duplex access.
MANET may operate a standalone fashion or they can be part of larger internet. They form a
highly dynamic autonomous topology with the presence of one or multiple different transceivers
between nodes. The main challenge for the MANET is to equip each device to continuously
maintain the information required to properly route traffic. MANETs consist of a peer-to-peer,
self-forming, self-healing network MANET‘s circa 2000-2015 typically communicate at radio
frequencies (30MHz-5GHz). This can be used in road safety, ranging from sensors for the
environment, home, health, disaster rescue operations, air/land/navy defense, weapons, robots,
etc.
5.3.1 Characteristics of MANET –
Dynamic Topologies:
Network topology which is typically multihop may change randomly and rapidly with time, it
can form unidirectional or bi-directional links.
Bandwidth constrained, variable capacity links:
Wireless links usually have lower reliability, efficiency, stability, and capacity as compared to
a wired network
Improvement in MANET:
1. Quality of Service (QoS): Researchers are working to improve the quality of service of
MANET by developing efficient routing protocols that provide better bandwidth, throughput,
and latency.
2. Security: To ensure the security of the MANET, researchers are developing efficient security
mechanisms that provide encryption, authentication, and authorization facilities.
3. Power management: To enhance the lifetime of MANET nodes, researchers are working on
developing efficient power management techniques that reduce the energy consumption of
nodes.
4. Multimedia support: Researchers are working to provide multimedia support to MANET by
developing efficient routing protocols that can handle multimedia traffic efficiently.
5. Standardization: To ensure the interoperability of different MANET devices, researchers are
working on developing standard protocols and interfaces that can be used by different
MANET devices.
Mobile Adhoc Network (MANET) is a wireless network made up of a collection of mobile nodes
connected wirelessly and free of any fixed infrastructure. It is self-configuring and self-healing.
MANET provides a lot of benefits, but it also has several drawbacks that need to be fixed.
Researchers are always trying to make MANET‘s features better in order to get over these
constraints. Future advancements in new technology and methodologies might make MANET a
dependable and effective wireless network.
Advantages:
Flexibility: MANETs are highly flexible, as they can be easily deployed in various environments
and can be adapted to different applications and scenarios. This makes them ideal for use in
emergency situations or military operations, where there may not be a pre-existing network
infrastructure.
Scalability: MANETs can easily scale to accommodate a large number of nodes, making them
suitable for large-scale deployments. They can also handle dynamic changes in network topology,
such as the addition or removal of nodes.
Cost-effective: Since MANETs do not require any centralized infrastructure, they are often more
cost-effective than traditional wired or wireless networks. They can also be used to extend the
range of existing networks without the need for additional infrastructure.
Rapid Deployment: MANETs can be rapidly deployed in areas where infrastructure is not
available, such as disaster zones or rural areas.
Disadvantages:
Security: MANETs are vulnerable to security threats, such as attacks by malicious nodes,
eavesdropping, and data interception. Since the network is decentralized, there is no central
authority to ensure the security of the network.
Reliability: MANETs are less reliable than traditional networks, as they are subject to
interference, signal attenuation, and other environmental factors that can affect the quality of the
connection.
Bandwidth: Since MANETs rely on wireless communication, bandwidth can be limited. This can
lead to congestion and delays, particularly when multiple nodes are competing for the same
channel.
Routing: Routing in MANETs can be complex, particularly when dealing with dynamic network
topologies. This can result in inefficient routing and longer delays in data transmission.
Power Consumption: Since MANETs rely on battery-powered devices, power consumption can
be a significant issue. Nodes may need to conserve power to extend the life of the battery, which
can limit the amount of data that can be transmitted.
5.3.4 The Hidden Terminal Problem
In wireless LANs ( wireless local area networks), the hidden terminal problem is a transmission
problem that arises when two or more stations who are out of range of each other transmit
simultaneously to a common recipient. This is prevalent in decentralised systems where there
aren‘t any entity for controlling transmissions. This occurs when a station is visible from a wireless
access point (AP), but is hidden from other stations that communicate with the AP.
Problem Illustration
Suppose that there are three stations labelled STA, STB, and STC, where STA and STC are
transmitting while STB is receiving. The stations are in a configuration such that the two
transmitters STA and STC are not in the radio range of each other. This is shown in the following
figure −
Solution
The exposed terminal problem is solved by the MAC (medium access control) layer protocol IEEE
802.11 RTS/CTS, with the condition that the stations are synchronized and frame sizes and data
speed are the same. RTS stands for Request to Send and CTS stands for Clear to Send.
A transmitting station sends a RTS frame to the receiving station. The receiving station replies by
sending a CTS frame. On receipt of CTS frame, the transmitting station begins transmission.
Any station hearing the RTS is close to the transmitting station and remains silent long enough for
the CTS. Any station hearing the CTS is close to the receiving station and remains silent during the
data transmission.
In the above example, station STC hears does not hear RTS from station STA, but hears CTS frame
from station STB. So, it understands that STB is busy defers its transmission thus avoiding
collision.
Problem Illustration
Suppose that there are four stations labelled STA, STB, STC, and STD, where STB and STC are
transmitters while STA and STD are receivers at some slot of time. The stations are in a
configuration such that the two receivers STA and STD are out of radio range of each other, but the
The above diagram shows that a transmission is going on from STB to STA. STC falsely concludes
that the above transmission will cause interference and so stops its transmission attempts to STD.
However, the interference would not have occurred since the transmission from STC to STD is out
of range of STB. This prevention of transmission is called exposed terminal problem.
Solution
The exposed terminal problem is solved by the MAC (medium access control) layer protocol IEEE
802.11 RTS/CTS, with the condition that the stations are synchronized and frame sizes and data
speed are the same. RTS stands for Request to Send and CTS stands for Clear to Send.
A transmitting station sends a RTS frame to the receiving station. The receiving station replies by
sending a CTS frame. On receipt of CTS frame, the transmitting station begins transmission.
Any station hearing the RTS is close to the transmitting station and remains silent long enough for
the CTS. Any station hearing the CTS is close to the receiving station and remains silent during the
data transmission.
In the above example, station STC hears RTS from station STB, but does not hear CTS from
station STA. So, it is free to transmit to station STD.
5.4 Routing protocols: DSDV, DSR, AODV
MANET Routing Protocols
In Mobile Ad hoc Network (MANET), nodes do not know the topology of their network, instead
they have to discover it by their own as the topology in the ad-hoc network is dynamic topology.
The basic rules is that a new node whenever enters into an ad-hoc network, must announce its
arrival and presence and should also listen to similar announcement broadcasts made by other
mobile nodes.
WSN can be used for processing, analysis, storage, and mining of the data.
Applications of WSN:
Challenges of WSN:
Elements of WSN:
1. Sensors:
Sensors in WSN are used to capture the environmental variables and which is used for data
acquisition. Sensor signals are converted into electrical signals.
2. Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the WLAN access point.
It consists of a microcontroller, transceiver, external memory, and power source.
3. WLAN Access Point:
It receives the data which is sent by the Radio nodes wirelessly, generally through the internet.
4. Evaluation Software:
The data received by the WLAN Access Point is processed by a software called as Evaluation
Software for presenting the report to the users for further processing of the data which can be
used for processing, analysis, storage, and mining of the data.
Devices that incorporate communications, processing, sensors, and batteries into a small
package.
Atmel microcontroller with sensors and a communication unit.
RF transceiver, laser module, or a corner cube reflector.
Temperature, light, humidity, pressure, 3 axis magnetometers, 3 axis accelerometers.
The topological structure of wireless networks is shown in figure 5.1.15. Mesh topology and hub-
and-spoke topology is used in the development of this network. In the mesh topology, each mote
acts like an independent instrument, where as in hub-and-spoke one of the motes acts as cleaning
house for all data network, i.e. the stored old data has been deleted after sending to the nearest
subsystem. Each mote gathers nearest data and sends it to the adjacent motes
The mote is a small type of computer which works on tiny operating system(TinyOS) . One
computer examines one or more sensors. The sensing applications are common to the motes such as
to sense temperature, light, sound, position, acceleration, stress, vibration, humidity, etc. The
computer connects with radio link to monitor sensors. The radio link transmits the sensing power
from 10 feet to 200 feet distance . Because of small size, the motes having normal radios power.
The motes run on batteries and some works with power grid in some applications. If the motes are
very small to maintain batteries, in such cases it will work on solar power. the operational
specification of motes can be given as:
1) Hardware
UCB motes
2) Programming
TinyOS
3) Query processing
Tiny DB
Directed diffusion
Geographic hash tables
4) Power management
MAC protocols
Adaptive topologies
5.7 TinyOS
TinyOS is an embedded, component-based operating system and platform for low-power wireless
devices as shown in figure ( ), such as those used in wireless sensor networks (WSNs), smartdust,
ubiquitous computing, personal area networks, building automation, and smart meters. It is written
in the programming language nesC, as a set of cooperating tasks and processes. It began as a
collaboration between the University of California, Berkeley, Intel Research, and Crossbow
Technology, was released as free and open-source software under a BSD license, and has since
grown into an international consortium, the TinyOS Alliance.
TinyOS applications are written in the programming language nesC, a dialect of the C
language optimized for the memory limits of sensor networks. Its supplementary tools are mainly in
the form of Java and shell script front-ends. Associated libraries and tools, such as the nesC
compiler and Atmel AVR binutils toolchains, are mostly written in C.
TinyOS programs are built of software components, some of which present hardware abstractions.
Components are connected to each other using interfaces. TinyOS provides interfaces and
components for common abstractions such as packet communication, routing, sensing, actuation
and storage.
The data sensed by the sensor nodes in a wireless sensor network (WSN) is typically forwarded to
the base station that connects the sensor network with the other networks (may be internet) where
the data is collected, analyzed and some action is taken accordingly.
In very small sensor networks where the base station and motes (sensor nodes) so close that they
can communicate directly with each other than this is single-hop communication but in most WSN
application the coverage area is so large that requires thousands of nodes to be placed and this
scenario requires multi-hop communication because most of the sensor nodes are so far from the
sink node (gateway) so that they cannot communicate directly with the base station. The single-hop
communication is also called direct communication and multi-hop communication is called indirect
communication.
In multi-hop communication the sensor nodes not only produce and deliver their material but also
serve as a path for other sensor nodes towards the base station. The process of finding suitable path
from source node to destination node is called routing and this is the primary responsibility of the
network layer.
The routing protocols define how nodes will communicate with each other and how the information
will be disseminated through the network. There are many ways to classify the routing protocols of
WSN. The basic classification of routing protocols is illustrated in Figure 5.1.18.
LEACH protocol apply randomization and cluster head is selected from the group of nodes so this
selection of cluster head from several nodes on temporary basis make this protocol more long
lasting as battery of a single node is not burdened for long. Sensor nodes elect themselves as cluster
head with some probability criteria defined by the protocol and announce this to other nodes
5.8.2. Data-centric
In most of the wireless sensor networks, the sensed data or information is far more valuable than the
actual node itself. Therefore data centric routing techniques the prime focus is on the transmission
of information specified by certain attributes rather than collecting data from certain nodes.
In data centric routing the sink node queries to specific regions to collect data of some specific
characteristics so naming scheme based on attributes is necessary to describe the characteristics of
data. Examples are as follows:
Three messages namely ADV, REQ and DATA are used in SPIN. The node broadcast an ADV
packet to all the other nodes that it has some data. This advertising node ADV message includes
attributes of the data it has. The nodes having interests in data, which the advertising node has
The main advantages of flooding are ease of implementation and simplicity. The drawbacks are
blindness of resources and overlapping and implosion. The gossiping protocol is somewhat
advanced version of flooding protocol. In gossiping protocol, the sensor node, which is getting a
data packet, transmits it to the arbitrarily selected neighbour. At the next turn, the sensing nodes
again randomly pick another nodes and sends data to it. This process is continued again and again.
The broadcasting is not used in gossiping protocol as it was used in flooding. In this way, implosion
issue can be avoided easily. But delay is enhanced in this way. The main categories of the routing
protocols are depicted in Figure 5.1.20
Table 2
How Handheld operating systems are different from Desktop operating systems?
Since the handheld operating systems are mainly designed to run on machines that have lower
speed resources as well as less memory, they were designed in a way that they use less memory
and require fewer resources.
They are also designed to work with different types of hardware as compared to standard
desktop operating systems.
6.1.1 Palm OS
Since the Palm Pilot was introduced in 1996 by Palm Incorporated, and alternatively known
as Garnet OS, Palm OS is the operating system used by the stylus-based Palm Pilot series of
handheld computers. The 6th and final update to the operating system, Palm OS Cobalt, was
released in 2004., the Palm OS platform has provided various mobile devices with essential
business tools, as well as the capability that they can access the internet via a wireless
connection.
These devices have mainly concentrated on providing basic personal-information-management
applications. The latest Palm products have progressed a lot, packing in more storage, wireless
internet, etc.
Development Cycle
For the development of the PALM OS, these are the phases it has to go through before it can be
used in the market:
Editing the code for the operating system that is checking for errors and correcting errors.
Compile and Debug the code to check for bugs and correct functioning of the code.
Run the program on a mobile device or related device.
If all the above phases are passed, we can finally have our finished product which is the
operating system for mobile devices named PALM OS.
Disadvantages
The user cannot download applications using the external memory in PALM OS. It will be a
disadvantage for users with limited internal memory.
Systems and extended connectivity are less compared to what is offered by other operating
systems.
Basic Features
Following are some of the important features of Linux Operating System.
Portable − Portability means software can works on different types of hardware in same
way. Linux kernel and application programs supports their installation on any kind of
hardware platform.
Open Source − Linux source code is freely available and it is community based
development project. Multiple teams work in collaboration to enhance the capability of
Linux operating system and it is continuously evolving.
Multi-User − Linux is a multiuser system means multiple users can access system resources
like memory/ ram/ application programs at same time.
Multiprogramming − Linux is a multiprogramming system means multiple applications can
run at same time.
Hierarchical File System − Linux provides a standard file structure in which system files/
user files are arranged.
Shell − Linux provides a special interpreter program which can be used to execute
commands of the operating system. It can be used to do various types of operations, call
application programs. etc.
Security − Linux provides user security using authentication features like password
protection/ controlled access to specific files/ encryption of data.
Architecture
Android was released under the Apache v2 open source license; this allows for many variations of
the OS to be developed for other devices, such as gaming consoles and digital cameras. Android is
based on open source software, but most Android devices come preinstalled with a suite of
proprietary software, such as Google Maps, YouTube, Google Chrome and Gmail.
Android OS features
1) The default UI of Android relies on direct manipulation inputs such as tapping, swiping and
pinching to initiate actions. The device provides haptic feedback to the user via alerts such
as vibrations to respond to actions. If a user presses a navigation button, for example, the
device vibrates.
2) When a user boots a device, Android OS displays the home screen, which is the primary
navigation hub for Android devices and is comprised of widgets and app icons.
3) Widgets are informational displays that automatically update content such as weather or
news.
4) The home screen display can differ based on the device manufacturer that is running the OS.
5) Users can also choose different themes for the home screen via third-party apps on Google
Play.
6) A status bar at the top of the home screen displays information about the device and its
connectivity, such as the Wi-Fi network that the device is connected to or signal strength.
7) Users can pull down the status bar with a swipe of a finger to view a notification screen.
8) Android OS also includes features to save battery usage. The OS suspends applications that
aren't in use to conserve battery power and CPU usage.
9) Android includes memory management features that automatically close inactive processes
stored in its memory.
10) Android runs on both of the most widely deployed cellular standards GSM/HSDPA
and CDMA/EV-DO. Android also supports:
Bluetooth
Edge
3G communication protocols, like EV-DO and HSDPA
Android OS versions
Google makes incremental changes to the OS with each release. This often includes security
patches and performance improvements.
I. Android 1.0. Released Sept. 23, 2008. Included a suite of Google apps, including Gmail,
Maps, Calendar and YouTube.
II. Android 1.5 (Cupcake). Released April 27, 2009. Introduced an onscreen virtual keyboard
and the framework for third-party app widgets.
III. Android 1.6 (Donut). Released Sept. 15, 2009. Introduced the ability for the OS to run on
different screen sizes and resolutions; added support for CDMA networks.
IV. Android 2.0 (Eclair). Released Oct. 26, 2009. Added turn-by-turn voice navigation, real-
time traffic information, pinch-to-zoom capability.
V. Android 2.2 (Froyo). Released May 20, 2010. Added dock at the bottom of the home
screen and voice actions, which allows users to tap an icon and speak a command. Also
introduced support for Flash to the web browser.
VI. Android 2.3 (Gingerbread). Released Dec. 6, 2010. Introduced black and green into the
UI.
VII. Android 3.0 to 3.2 (Honeycomb). Released Feb. 22, 2011. This release was exclusive to
tablets and introduced a blue, space-themed holographic design.
VIII. Android 4.0 (Ice Cream Sandwich). Released Oct. 18, 2011. Introduced a unified UI to
both tablets and smartphones; emphasized swiping as a navigational method.
IX. Android 4.1 to 4.3 (Jelly Bean). Released July 9, 2012, Nov. 13, 2012, and July 24, 2013,
respectively. Introduced Google Now, a day planner service. Added interactive notifications
and improved voice search system.
X. Android 4.4 (KitKat). Released Oct. 31, 2013. Introduced lighter colors into the UI, along
with a transparent status bar and white icons.
XI. Android 5.0 (Lollipop). Released Nov. 12, 2014. Incorporated a card-based appearance in
the design with elements such as notifications and Recent Apps list. Introduced hands-free
voice control with the spoken "OK, Google" command.
XII. Android 6.0 (Marshmallow). Released Oct. 5, 2015. This release marked Google's
adoption of an annual release schedule. Introduced more granular app permissions and
support for USB-C and fingerprint readers.
XIII. Android 7.0 and 7.1 (Nougat). Released Aug. 22, 2016 and Oct. 4, 2016, respectively.
Introduced a native split-screen mode and the ability to bundle notifications by app.
XIV. Android 8.0 and 8.1 (Oreo). Released Aug. 21, 2017 and Dec. 5, 2017, respectively. These
versions introduced a native picture-in-picture (PIP) mode and the ability to snooze
notifications. Oreo was the first version to incorporate Project Treble, an effort by OEMs to
provide more standardized software updates.
XV. Android 9.0 (Pie). Released Aug. 6, 2018. This version replaced Back, Home and
Overview buttons for a multifunctional Home button and a smaller Back button. Introduced
productivity features, including suggested replies for messages and brightness management
capabilities.
Android uses ARM for its hardware platform; later versions of Android OS support x86 and x86-64
architectures. Starting in 2012, device manufacturers released Android smartphones and tablets with
Intel processors. The minimum hardware requirements of Android depend on the device's screen size and
CPU type and density. Originally, Google required a 200 MHz processor, 32 MB of storage and 32 MB of
RAM. Google releases documentation with hardware requirements that original equipment manufacturers
(OEMs) must meet for a device to be "Google Approved," which means that it will ship with official Google
apps. The open source nature of Android, however, means that it can also run on lesser hardware, and vice
versa.
Programming Languages used in Developing Android Applications
1. Java
2. Kotlin
Developing the Android Application using Kotlin is preferred by Google, as Kotlin is made an
official language for Android Development, which is developed and maintained by JetBrains.
Previously before Java is considered the official language for Android Development. Kotlin is
made official for Android Development in Google I/O 2017
Android OS Advantages
It is a Google Linux-based operating system that is mainly designed for touchscreen devices
such as phones, tablets, etc.
There are three architectures which are ARM, Intel, and MIPS which are used by the
hardware for supporting Android. These lets users manipulate the devices intuitively, with
movements of our fingers that mirror some common motions such as swiping, tapping, etc.
Android operating system can be used by anyone because it is an open-source operating
system and it is also free.
It offers 2D and 3D graphics, GSM connectivity, etc.
Disadvantages of Android OS
Fragmentation provides a very intuitive approach to user experience but it has some drawbacks,
where the development team needs time to adjust to the various screen sizes of mobile
smartphones that are now available in the market and invoke the particular features in the
application.
The Android devices might vary broadly. So the testing of the application becomes more
difficult.
As the development and testing consume more time, the cost of the application may increase,
depending on the application‘s complexity and features.
WAP stands for Wireless Application Protocol. worldwide standard for providing Internet
communications and advanced telephony services on digital mobile phones, pagers, personal digital
assistants, and other wireless terminals
WAP is the set of rules governing the transmission and reception of data by computer applications
on or via wireless devices like mobile phones. WAP allows wireless devices to view specifically
designed pages from the Internet using only plain text and very simple black-and-white pictures.
WAP is a standardized technology for cross-platform, distributed computing very similar to the
Internet's combination of Hypertext Markup Language (HTML) and Hypertext Transfer Protocol
(HTTP), except that it is optimized for:
low-display capability
low-memory
low-bandwidth devices, such as personal digital assistants (PDAs), wireless phones, and
pagers.
WAP is designed to scale across a broad range of wireless networks like GSM, IS-95, IS-136, and
PDC.
The Wireless Application Protocol (WAP) is a result of joint efforts taken by companies teaming up
in an industry group called WAP Forum (www.wapforum.org).On June 26, 1997, Ericsson,
Motorola, Nokia, and Unwired Planet took the initiative to start a rapid creation of a standard for
making advanced services within the wireless domain a reality. In December 1997, WAP Forum
was formally created and after the release of the WAP 1.0 specifications in April 1998, WAP
Forum membership was opened to all.
The WAP Forum now has over 500 members and represents over 95 percent of the global handset
market. Companies such as Nokia, Motorola and Ericsson are all members of the forum. The
objective of the forum is to create a license-free standard that brings information and telephony
services to wireless devices.
Until the first WAP devices emerged, the Internet was a Internet and a mobile phone was a mobile
phone. You could surf the Net, do serious research, or be entertained on the Internet using your
computer, but this was limited to your computer.
To browse a standard internet site you need a web browser. Similar way to browse a WAP enables
website, you would need a micro browser. A Micro Browser is a small piece of software that makes
minimal demands on hardware, memory and CPU. It can display information written in a restricted
mark-up language called WML. Although, tiny in memory footprint it supports many features and
is even scriptable.
Today, all the WAP enabled mobile phones or PDAs are equipped with these micro browsers so
that you can take full advantage of WAP technology.
WAP - Key Features
1. A programming model similar to the Internet's
Though WAP is a new technology, but it reuse the concepts found on the Internet. This
reuse enables a quick introduction of WAP-based services, since both service developers
and manufacturers are familiar with these concepts today.
3. WMLScript
Once again, you must be using Java Script or VB script to enhance the functionality of your
web applications. Same way, WMLScript can be used to enhance the functionality of a
service, just as Java script can be utilized in HTML. It makes it possible to add procedural
logic and computational functions to WAPbased services.
The Internet model makes it possible for a client to reach services on a large number of origin
servers, each addressed by a unique Uniform Resource Locator (URL).
The content stored on the servers is of various formats, but HTML is the predominant. HTML
provides the content developer with a means to describe the appearance of a service in a flat
document structure. If more advanced features like procedural logic are needed, then scripting
languages such as JavaScript or VB Script may be utilised.
The figure below shows how a WWW client request a resource stored on a web server. On the
Internet standard communication protocols, like HTTP and Transmission Control Protocol/Internet
Protocol (TCP/IP) are used.
The content available at the web server may be static or dynamic. Static content is produced once
and not changed or updated very often; for example, a company presentation. Dynamic content is
needed when the information provided by the service changes more often; for example, timetables,
news, stock quotes, and account information. Technologies such as Active Server Pages (ASP),
Common Gateway Interface (CGI), and Servlets allow content to be generated dynamically.
Application Layer Wireless Application Environment (WAE). This layer is of most interest to
content developers because it contains among other things, device specifications, and the content
development programming languages, WML, and WMLScript.
Session Layer Wireless Session Protocol (WSP). Unlike HTTP, WSP has been designed by the
WAP Forum to provide fast connection suspension and reconnection.
Transaction Layer Wireless Transaction Protocol (WTP). The WTP runs on top of a datagram
service, such as User Datagram Protocol (UDP) and is part of the standard suite of TCP/IP
protocols used to provide a simplified protocol suitable for low bandwidth wireless stations.
Security Layer Wireless Transport Layer Security (WTLS). WTLS incorporates security features
that are based upon the established Transport Layer Security (TLS) protocol standard. It includes
data integrity checks, privacy, service denial, and authentication services.
Transport Layer Wireless Datagram Protocol (WDP). The WDP allows WAP to be bearer-
independent by adapting the transport layer of the underlying bearer. The WDP presents a
consistent data format to the higher layers of the WAP protocol stack, thereby offering the
advantage of bearer independence to application developers.
Each of these layers provides a well-defined interface to the layer above it. This means that the
internal workings of any layer are transparent or invisible to the layers above it. The layered
architecture allows other applications and services to utilise the features provided by the WAP-stack
as well. This makes it possible to use the WAP-stack for services and applications that currently are
not specified by WAP.
The WAP protocol architecture is shown below alongside a typical Internet Protocol stack.
Components of WAE
Addressing Model A syntax suitable for naming resources stored on servers. WAP use the same
addressing model as the one used on the Internet that is Uniform Resource Locators (URL).
Wireless Markup Language (WML) A lightweight markup language designed to meet the
constraints of a wireless environment with low bandwidth and small handheld devices. The
Wireless Markup Language is WAP's analogy to HTML used on the WWW. WML is based on the
Extensible Markup Language (XML).
Wireless Telephony Application (WTA, WTAI) A framework and programming interface for
telephony services. The Wireless Telephony Application (WTA) environment provides a means to
create telephony services using WAP.
In Mobile Computing, Mobile Agents are the composition of computer software and data that can
autonomously move from one computer to another computer and continue its execution on the
destination computer.
In other words, you can say that An Mobile Agent is an autonomous program that is capable of
moving from host to host in a network and interact with resources and other agents. In this process,
the chance of data loss is scarce because the state of the running program is saved and then
transported to the new host. It allows the program to continue execution from where it left off
before migration. The most significant advantage of mobile agents is the possibility of moving
complex processing functions to the location where you have enormous amounts of data and that
have to be processed. Mobile Agents are also called as transportable agents. They are classified into
two types:
Mobile Agents with pre-defined path: They have a static migration path.
Mobile Agents with undefined path i.e., Roamer: They have dynamic migration paths. The
mobile agents choose their path according to the present network condition.
Intelligence
Mobile Agents are capable of learning and searching for knowledge about their domain.
That's why they are called intelligent agents because they possess a degree of domain
knowledge. They can also transport their state from one environment to another without
disturbing the previous holding data and be capable of performing appropriately in the new
environment.
Autonomous
The Mobile Agents are Autonomous. It means the agents are not only motivated by the
outside actions initiated by the users or system but also they have internal events that
decided their performance and behaviour. The mobile agents can also take an autonomous
decision while selecting a node.
Mobility
Mobile Agents contain some degree of mobility. The agent is not limited to its home node
only. They can migrate from one node to another and can carry out tasks along with them.
This feature distributes the processing and balancing of the load. Another benefit of this
capability is that when the user goes offline, the agents will still keep functioning.
Communicative
Mobile Agents can communicate effectively with other agents, users and systems. The
mobile agents use a communication language for inter-agent communication.
6.3.2 Life Cycle of Mobile Agents The life cycle of mobile agents ensures the following
conditions:
They can adapt to the environment. For example, either home or foreign environment.
They are capable of switching among the positions of one node to another.
They are autonomous and focused on the final output.
Originally developed at the IBM Tokyo Research Laboratory, the Aglets technology is now hosted
at sourceforge.net as open source project, where it is distributed under the IBM Public License.
Aglets is completely made in Java, granting an high portability of both the agents and the platform.
Aglets includes both a complete Java mobile agent platform, with a stand-alone server called Tahiti,
and a library that allows developer to build mobile agents and to embed the Aglets technology in
their applications. Currently, stable release of Aglets are available in the 2.0 series, and 2.0.2 is the
latest one.
Features of Aglets
Provide an easy and comprehensive model for programming mobile agents without
requiring modifications to Java VM or native code.
Support dynamic and powerful communication that enables agents to communicate with
unknown agents as well as well-known agents.
Design a reusable and extensible architecture.
Design a harmonious architecture with existing Web/Java technology.
An aglet can dispatch itself to a remote host by calling the Aglet.dispatch(URL dest) primitive. To
be more precise, an aglet occupies the aglet context and can move from this context to others during
its execution. Because the runtime system may serve multiple contexts within one Java VM, these
contexts can be in the same VM. Dispatching causes an aglet to suspend its execution, serialize its
internal state and bytecode into the standard form and then to be transported to the destination. On
the receiver side, the Java object is reconstructed according to the data received from the origin, and
a new thread is assigned and executed.
System Architecture
The Aglets architecture consists of two APIs and two implementation layers.
Aglet API
Aglets Runtime Layer - The implementation of Aglet API
Agent Transport and Communication Interface
Transport Layer
The Aglets runtime layer is the implementation of Aglet API, which provides the fundamental
functionality such as creation, management or transfer of aglets. This layer defines the behaviour of
APIs such as Aglet and AgletContext, and can serve multiple AgletContext objects.
The transport layer is responsible for transporting an agent to the destination in the form of a byte
stream that contains class definitions as well as the serialized state of the agent. This layer is also
defined as an API, called Agent Transfer and Communication Interface (ATCI), which allows the
When an aglet issues a request to dispatch itself to a destination, the request travels down to the
Aglets runtime layer, which converts the aglet into the form of a byte array consisting of its state
data and its code. If the request is successful, the aglet is terminated, and the byte array is passed to
the ATP layer through the ATCI. The ATP, which is the implementation of ATCI, then constructs a
bit stream that contains general information such as the agent system name and agent identifier, as
well as the byte array from the Aglets runtime.
Mobile computers have become increasingly popular as users discover the benefits of having their
electronic work available at all times. Using Internet resources from a mobile platform, however, is
a major challenge. Mobile computers do not have a permanent network connection and are often
disconnected for long periods. When the computer is connected, the connection is often prone to
sudden failure, such as when a physical obstruction blocks the signal from a cellular modem. Agent
Tcl is a mobile agent system whose agents can be written in Tcl, Java, and Scheme. Agent Tcl has
extensive navigation and communication services, security mechanisms, and debugging and
tracking tools. When we focus on Agent Tcl's architecture and security mechanisms, its RPC
system, and its docking system, which lets an agent move transparently among mobile computers,
regardless of when they are connected to the network.
Tcl Architecture
Agent Tcl Architecture (adapted from [Gray 95]) With the increase in popularity of computer
networks, there has been a shift proposed in distributed system programming from the remote
procedure call (RPC) to the remote programming (RP) paradigm, to decrease network traffic and
improve performance.
In Agent Tcl, the agent‘s state is implicitly transferred with the agent when it jumps from one
machine to another. To make this transparent state transfer possible, Agent Tcl uses a modified
version of the Tcl interpreter. The modification consists of separating the Tcl (i. e., the program
being interpreted) stack from the regular C (i. e.,the interpreter) stack so that the Tcl script and state
can be saved and sent as a message to run on another machine. Unfortunately, the modified
interpreter runs Tcl programs approximately 20 percent slower than the standard Tcl core.
An agent can send a message to another in two ways; through an event or via an established
connection. An event provides asynchronous notification of an important occurrence while a
connection is a named stream linking two agents.
Events are not yet available. The non-volatile storage permits agents to save their state, check
pointing their progress in order to make failure recovery easier. Note, however, that the failure
recovery strategy is defined and implemented by the agents. The server only supplies the
save/restore state commands.
The third architectural level consists of one execution interpreter for each available agent language.
Each interpreter has four modules: the interpreter itself, a security supervisor that prevents an agent
from performing forbidden actions, a statecapture component that catches and reconstructs agents‘
internal states on the command of the server, and an API that interacts with the server to handle
migration, communication, and checkpointing.
The end.
Thank You