Download as pdf or txt
Download as pdf or txt
You are on page 1of 86

Module Code & Module Title

CS5001NA Network and Operating System

Assessment Weightage & Type

30% Individual Coursework

Year and Semester

2019-20 Autumn

Student Name: Saugat Adhikari

London Met ID: 18029221

College ID: NP01NT4A180178

Assignment Due Date: January 2, 2020

Assignment Submission Date: January 2, 2020

I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a mark of zero will be awarded.

1|Page
ACKNOWLEDGEMENT

It is always a pleasure to remind the fine people in the Islington College and
London Metropolitan University for their sincere guidance I received to uphold my
academic and practical skills in Networking and Operating Systems.

First of all, thanks to Mr. Dipeshor Silwal, module leader of Network and Operating
Systems for assigning us (the students) this coursework that broadens the horizon of a
networking student with theoretical, practical and report writing skills.

Second, I would like to thank Mr. Suryansh Mathema, lecturer of this module who
enlightened me with proper understanding of various Network topologies and
technologies. He provided proper guidance and format required to develop this report.
Finally, I would like to express my sincere gratitude to Mr. Umesh Nepal, tutor for
this particular module. His immense feedback and review helped me to transform my
report into professional standard.

2|Page
ABSTRACT

The technical reports developed in this coursework are divided into two tasks. The main
objective of Task A is to develop a network simulation model in COMNET III that depicts
the ATM transaction network setup of IBN Bank in Nepal. In this model, two ATM networks
are created in Lalitpur and Biratnagar that are connected to the WAN Cloud which is
further connected to the Edinburgh Network of IBN Bank. Similarly, Task B shows the
detailed report on the introduction, history, architecture, analysis and conclusion of GSM
and emerging mobile communication technologies. The Task A of the coursework was
required to be done in COMNET software; which is a performance analysis tool for
communication networks. The technical report on GSM and other mobile communication
technology depicts critical analysis of wireless and wired communication mediums along
with their working mechanism and architecture. Both the reports have extensive amount
of research paper, journals, articles, books and genuine websites as references and
bibliography.

3|Page
Table of Contents

1.1 INTRODUCTION ................................................................................................................................. 1


1.2. WAN MODEL .................................................................................................................................... 2
1.2.1. EDINBURG LAN .......................................................................................................................... 3
1.2.2. WAN CLOUD .............................................................................................................................. 4
1.2.2.1. ACCESS LINK ........................................................................................................................ 5
1.2.2.2. VIRTUAL CIRCUIT ................................................................................................................. 6
1.2.3. BIRATNAGAR AND LALITPUR LAN ........................................................................................... 7
1.2.3.1. NETWORK DEVICE: ROUTER ................................................................................................ 9
1.2.3.2. TOKEN PASSING LINK ........................................................................................................ 10
1.2.3.3. PROCESSING NODE............................................................................................................ 11
1.2.3.4. COMPUTER GROUP ........................................................................................................... 13
1.2.3.5. MESSAGE SOURCE ............................................................................................................. 14
1.2.3.6. RESPONSE SOURCE............................................................................................................ 19
1.3 DESCRIPTION OF REPORTS ............................................................................................................... 21
1.3.1 NODE REPORT: RECEIVED MESSAGE COUNT ............................................................................. 21
1.3.2. LINK REPORT: CHANNEL UTILIZATION ...................................................................................... 23
1.3.3. WAN CLOUD REPORT: FRAME DELAY, FRAME COUNT, ............................................................. 25
ACCESS LINK STATS ............................................................................................................................ 25
1.3.4. MESSAGE AND REPORT RESPONSE: MESSAGE DELAY FOR ........................................................ 31
ALL NODES ........................................................................................................................................ 31
1.4 CONCLUSION ................................................................................................................................... 33
2.1. INTRODUCTION .............................................................................................................................. 35
2.1 BACKGROUND ................................................................................................................................. 36
2.1.1 History of GSM .......................................................................................................................... 36
2.2.2 Architecture of GSM ................................................................................................................. 37
2.2.1. MOBILE COMMUNICATION ...................................................................................................... 41
2.2.1.1. HISTORY ............................................................................................................................ 43
2.2.1.2. CELLULAR RADIO ............................................................................................................... 47
2.2.1.3. ADVANTAGES AND DISADVANTAGES................................................................................. 48

4|Page
2.2.2. CELLULAR TECHNOLOGIES........................................................................................................ 52
2.2.2.1. 1G, 2G, 3G AND LTE ........................................................................................................... 52
2.2.2.2. WIRELESS COMMUNICATIONS .......................................................................................... 53
2.2.2.3.1. WAP ............................................................................................................................... 53
2.2.2.3.2. GPRS .............................................................................................................................. 53
2.2.2.3.3. EDGE .............................................................................................................................. 53
2.2.2.3.4. UMTS ............................................................................................................................. 54
2.3. CONCLUSION .................................................................................................................................. 55
References ............................................................................................................................................ 56
Bibliography .......................................................................................................................................... 58
Appendices............................................................................................................................................ 59
A. Introduction ............................................................................................................................... 59
B. Architecture of GSM .................................................................................................................. 59
B.1 Subscriber Identity Module ...................................................................................................... 59
B.2 Transcoding Rate and Adaption Unit ........................................................................................ 60
B.3 Mobile Services Switching Centre............................................................................................. 60
B.4 Home Location Register ........................................................................................................... 60
B.5 Visitor Location Register .......................................................................................................... 61
C. Mobile Communication.............................................................................................................. 61
D. Cellular Radio............................................................................................................................. 62
E. History of Communication ......................................................................................................... 62
F. Disadvantages of Mobile Communication/Technology ............................................................... 62
G. First Generation (1G) ................................................................................................................. 63
H. Second Generation (2G) ............................................................................................................. 64
I. Third Generation (3G) ................................................................................................................ 65
J. Fourth Generation (4G) .............................................................................................................. 66
K. Wireless Application Protocol (WAP).......................................................................................... 67
L. General Packet Radio System (GPRS) ......................................................................................... 68
M. Enhanced data rates for GSM evolution (EDGE) ...................................................................... 70
N. Universal Mobile Telecommunications Service (UMTS) .............................................................. 71

5|Page
Table of Figures

Figure 1: COMNET MODEL OVERVIEW ........................................................................ 1


Figure 2: WAN Model ...................................................................................................... 2
Figure 3: Edinburgh LAN ................................................................................................. 3
Figure 4: WAN Cloud ...................................................................................................... 4
Figure 5: Access Points................................................................................................... 5
Figure 6: Virtual Circuit .................................................................................................... 6
Figure 7: Lalitpur LAN ..................................................................................................... 7
Figure 8: Biratnagar LAN................................................................................................. 8
Figure 9: Network Device: Router ................................................................................... 9
Figure 10: Token Passing Link ...................................................................................... 10
Figure 11: Processing Node (Single Teller Machine) .................................................... 11
Figure 12: Processing Node (Edinburgh Server) ........................................................... 12
Figure 13: Computer Group (ATM Nodes) .................................................................... 13
Figure 14: Message Source (Computer Group) Scheduling .......................................... 14
Figure 15: Message Source (Computer Group) Messages ........................................... 15
Figure 16: Message Source (Computer Group) Destinations ........................................ 15
Figure 17: Message Source (Computer Group) Packets............................................... 16
Figure 18: Message Source (Single Teller) Scheduling ................................................ 17
Figure 19: Message Source (Single Teller) Messages .................................................. 18
Figure 20: Message Response (Scheduling) ................................................................ 19
Figure 21: Message Response (Messages) .................................................................. 20
Figure 22: Received Message Count ............................................................................ 21
Figure 23: Receiver (Message Name) vs Counts .......................................................... 22
Figure 24: Channel Utilization ....................................................................................... 23
Figure 25: Link vs Channel Utilization % ....................................................................... 23
Figure 26: Frame Delay by VC ...................................................................................... 25
Figure 27: VC vs Average Frame Delay(ms) ................................................................. 26
Figure 28: VC vs Average Burst Size(kb) ...................................................................... 27
Figure 29: Frame Counts by VC .................................................................................... 28
Figure 30: VC vs Frame Accepted vs Kilobit Accepted ................................................. 29
Figure 31: Access Link Stats ......................................................................................... 29
Figure 32: Access Link vs Frame Entry vs Frame Exit .................................................. 30
Figure 33: Message Delay for all nodes ........................................................................ 31
Figure 34:Origin/Msg Src Name/Destination vs Average Message Delay (ms) ............ 32
Figure 35: GSM Introduction ......................................................................................... 35
Figure 36: GSM Architecture ......................................................................................... 37
Figure 37: Components of GSM .................................................................................... 38
Figure 38: Smartphone.................................................................................................. 41

6|Page
Figure 39: Mobile and Internet users ............................................................................. 42
Figure 40: Early history of mobile communication ......................................................... 43
Figure 41: Evolution of Mobile Industry ......................................................................... 44
Figure 42: Global mobile traffic per month. Source: Cisco Systems (2014) Cisco Visual
Networking .................................................................................................................... 45
Figure 43: History of 1G to 3G ...................................................................................... 46
Figure 44: Low and High Frequency Sine wave ............................................................ 47
Figure 45: Advantages of Smartphones (Chanana, 2013) ............................................ 48
Figure 46: Disadvantages of Mobile Phones (Chanana, 2013) ..................................... 50
Figure 47: Specifications for GSM and CDMA .............................................................. 51
Figure 48: Architecture of AMTS ................................................................................... 63
Figure 49: UMTS Network Architecture ......................................................................... 65
Figure 50: WCDMA Network Architecture ..................................................................... 66
Figure 51: LTE Network Architecture ............................................................................ 67
Figure 52: WAP Architecture ......................................................................................... 68
Figure 53: Functional View of GPRS Network ............................................................... 69
Figure 54: GSM EDGE Network Architecture ................................................................ 70
Figure 55: High Level UMTS Architecture ..................................................................... 71
Figure 56: Overview of Network Model ......................................................................... 72
Figure 57: Edinburgh LAN of the Network Model .......................................................... 72
Figure 58: Biratnagar LAN of the Network Model .......................................................... 73
Figure 59: Lalitpur LAN of the Network Model ............................................................... 73
Figure 60: WAN Cloud of the Network Model ................................................................ 74
Figure 61: Simulation Parameters ................................................................................. 74
Figure 62: Access Link Stats inside WAN Cloud ........................................................... 75
Figure 63: Channel Utilization of all the links................................................................. 75
Figure 64: Frame Counts by Virtual Circuit inside WAN Cloud ..................................... 76
Figure 65: Frame Delay by Virtual Circuit inside WAN Cloud ........................................ 76
Figure 66: Message Delay for all the message sources and responses ....................... 77
Figure 67: Message Delivered for all the message sources and responses ................. 77
Figure 68: Counts for all the message received through each node ............................. 78

Table of Tables

Table 1: History of GSM (Eberspacher et al., 2009) ...................................................... 36

7|Page
Task A

8|Page
1.1 INTRODUCTION

The connection between workstations is usually a physical connection with wires or


cables, while wireless connections for networks are also possible. Local area networks
(LANs) and wide area networks (WANs) can be specifically categorized as networks.
Traditionally, the scale or radius of the network was the distinction between these network
classifications. LANs are the responsibility of the organization that uses the network.
WANs typically use equipment owned and operated by a network provider, while their
own WANs are owned and operated by public agencies. (Bidgoli, 2008) COMNET III is
used to design networks, their algorithms of command and their workload and also to
simulate LANs, WANs, and various Internet interconnections. (Ahuja, 1998) Based on
the report generated from the software the graphs are created with the use of Microsoft
Excel. All the appropriate objects are used in the model; such as, subnets, token ring,
router, access points; etc. The transaction request from Nepal’s Networks and response
from the Edinburgh server is the priority of this model and defines its completion.

Figure 1: COMNET MODEL OVERVIEW

1|Page
As seen in Figure 1, there are three subnets that comprise of Edinburgh LAN, Lalitpur
LAN, and Biratnagar LAN. All these subnets are connected with a central WAN Cloud
that optimizes the WAN connection between Nepal and Edinburgh.

1.2. WAN MODEL

Figure 2: WAN Model

A wide area network covers a large geographical area, often a country or a continent. Al
l hosts of this connection are connected to the subnet of communication. Any WAN mod
el consists of transmission lines (Ethernet, Token Passing Ring) and switching elements
(Router). (Tanenbaum, 2003 ) The WAN model for IBN bank’s network includes three
subnets and a WAN cloud. Lalitpur LAN and Biratnagar LAN consist of all the ATM
transactions nodes and Cisco Router that is connected with frame relay cloud with a

2|Page
transmission rate of 56kps. The Lalitpur LAN and Biratnagar LAN both have 50 ATM
nodes as computer group and a single teller machine that is connected via Token Passing
Ring. All the subnets/LANs have an access link point each for connecting into the WAN
cloud. Similarly, the WAN cloud has access links and virtual links inside the model. The
success of WAN connection is defined by the process of ATM transaction requests
reaching Edinburgh Server and its effective response to those requests

1.2.1. EDINBURG LAN

Figure 3: Edinburgh LAN

3|Page
As seen in Figure 3, Edinburgh LAN has three major components; an Edinburgh Server,
Token Passing Ring and Edinburgh Router. This subnet is connected to WAN cloud via
access point that is connected with Edinburgh Router (Cisco Router 710sp). Then, the
router is connected to a Token-Passing Link (IEEE 802.5 16Mpbs) that is ultimately
connected to Edinburgh Processing Server. The main functionality of Edinburgh Server
is that it provides a response to the Lalitpur and Biratnagar ATM transaction requests.

1.2.2. WAN CLOUD

Figure 4: WAN Cloud

Cloud WAN virtualizes and delivers all network functions as a service, including core
network functions such as packet steering and path selection. Using cloud in any network
provides stability in WAN connection over any physical infrastructure. (velocloud, 2019)
Similarly, in our network model, Edinburgh LAN, Lalitpur LAN, and Biratnagar LAN are
connected into the frame relay cloud via Cisco Router 7010sp, V10.0. This cloud makes
it possible for the ATM transaction request from Nepal to reach the Edinburgh Server.

4|Page
The WAN cloud has three access points connecting to their respective access links and
furthermore, has four virtual links that are shown in Figure 3.

1.2.2.1. ACCESS LINK

Figure 5: Access Points

Three point-to-point links/ Access Links are used in the model; namely, Edinburgh
Access, Lalitpur Access, and Biratnagar Access. As seen in Figure 3, all the access links
have a transmission rate of 56kbps for both packets coming from and to the WAN cloud.
All these access links are connected with their respective virtual link/ frame relay.

5|Page
1.2.2.2. VIRTUAL CIRCUIT

Figure 6: Virtual Circuit

Frame Relay is a high-performance network protocol that operates on the physical and
data link layer of the OSI reference model. The essence of frame relay is that it is a
connection-oriented network with no error control and no flow control; where packets are
delivered in order. (Tanenbaum, 2003 ) On the other hand, Frame Relay Virtual Circuit
that is used in Figure 5 is only a logical connection that doesn’t use physical addresses
to define the Data Terminal Equipment. Here, four virtual circuits are used namely;
Lalitpur-Edinburgh, Edinburgh-Lalitpur, Biratnagar-Edinburgh and Edinburgh-Biratnagar.
Edinburgh access link serves as a focal point for the virtual circuits created for Biratnagar
and Lalitpur Access links. Similarly, the Frame relay VC’s used in the WAN cloud has a
transmission rate of 64kpbs using a sliding window burst type. Furthermore, in sliding
window protocols all the senders maintain a set of sequence numbers corresponding to
the frames it is permitted to send. (Tanenbaum, 2003 )

6|Page
1.2.3. BIRATNAGAR AND LALITPUR LAN

Figure 7: Lalitpur LAN

Figure 7 shows the architecture of Lalitpur that comprises a Cisco router, Token Passing
Ring, a computer group and a processing node. A message source is connected to both
computer groups and single processing nodes. The computer group in this LAN consists
of 50 ATM machines that request a transaction message each minute to the Edinburgh
Server. Similarly, a single teller machine also has the same criteria. Both these ATM
nodes are connected via a Token Passing Ring of IEEE 802.5 16Mbps standard.
Furthermore, a Cisco Router is connected between the token-passing ring and the access
point to the WAN cloud.

Figure 8 that is inserted below depicts the model of Biratnagar LAN that is identical to the
Lalitpur LAN previously discussed. Both these LANs are in different cities with different
ATM nodes, router, and token passing ring.

7|Page
Figure 8: Biratnagar LAN

8|Page
1.2.3.1. NETWORK DEVICE: ROUTER

Figure 9: Network Device: Router

All the network devices used throughout the network model are Cisco Routers 7000/7010
sp. The use of this router is all the three LANs is similar as it provides a gateway
connection between the local Token Passing ring and access link of the WAN Cloud.
Network devices are a prerequisite in any WAN model; as they are the medium that
actually allows the packets to pass through the internet and reach its desired destination.

9|Page
1.2.3.2. TOKEN PASSING LINK

Figure 10: Token Passing Link

The Token Ring Network was announced in October 1985 as a 4Mbps local area network
providing computers and workstations with high bandwidth peer-to-peer connectivity
between computers and workstations. (Blair, 1989) This connection is identified by IEEE
as 802.5 standards. We use an 802.5 16Mpbs token ring in all the LANs of our network
model; which provides fast transmission speed and reduces the chances of data collision
as each node/computer group only transmits a packet when it acquires the token.

10 | P a g e
1.2.3.3. PROCESSING NODE

Figure 11: Processing Node (Single Teller Machine)

The processing node is a single computer/workstation that is connected to LAN which


has a Data Link Control (DLC) or Media Access Control (MAC) address. As seen in figure
11, both the Lalitpur and Biratnagar LAN have a processing node each named Single
Teller machine. This node is connected to the Token Passing Ring of 16Mpbs
transmission rate and sends a message/transaction request to Edinburgh Server each
minute.

11 | P a g e
Figure 12: Processing Node (Edinburgh Server)

Figure 12 shows the processing node that is used in Edinburgh LAN which is acting as
an Edinburgh Server placed at headquarter of IBN Bank. This node is connected to a
Token-Passing Ring of 16Mpbs and has a message response to all the ATM requests
from Biratnagar and Lalitpur LAN.

12 | P a g e
1.2.3.4. COMPUTER GROUP

Figure 13: Computer Group (ATM Nodes)

The computer group used in the Biratnagar and Lalitpur LAN comprises of 50 different
ATM transaction nodes each. The computer group node is very helpful for designing
network architectures in this simulation environment; as a single computer group holds
the properties of all required number of workstations. The ATM computer group is
connected to a Token-Passing Ring of 16Mbps and has a message/transaction request
each minute that is destined to reach Edinburgh Server.

13 | P a g e
1.2.3.5. MESSAGE SOURCE

Figure 14: Message Source (Computer Group) Scheduling

The computer group of 50 ATM transaction nodes in each of Lalitpur and Biratnagar LAN
has a message source that sends a transaction request to Edinburgh server each minute.
As seen in Figure 14, this message source has an interarrival time with exponential
distribution of 0.5 with a stream value of 2.

Similarly, Figure 15 shows the size of the message produced by each ATM transaction
node in Lalitpur and Biratnagar. This size of this ATM authorization message can be
described by a uniform distribution where the size is evenly dispersed over the range of
50 to 100 bytes with a stream value of 2.

14 | P a g e
Figure 15: Message Source (Computer Group) Messages

Figure 16: Message Source (Computer Group) Destinations

15 | P a g e
The ATM authorization message requests that are sent by the computer group of ATM
nodes has a destination type of random list with the list consisting of only Edinburgh
Server of Edinburgh LAN. It is essential to determine the server as the sole destination;
as ATM transaction request must be only authorized by Edinburgh Server at headquarter
of IBN Bank.

Figure 17: Message Source (Computer Group) Packets

All the message source (ATM group and single teller machine) and message response
(ATM authorization) use the same parameters for packet size, protocols and routing
class. As seen in Figure 17, all the messages use TCP/IP – Windows V1.0 as the packet
transferring protocol. Similarly, the standard packet size for all message source and
response is 10.0ms and most importantly they use IGRP metric as the routing class.
Inside the IGRP metric class, the hop limit is set to 65,535 with weigh(k1) =1.

16 | P a g e
Figure 18: Message Source (Single Teller) Scheduling

17 | P a g e
Figure 19: Message Source (Single Teller) Messages

Biratnagar LAN and Lalitpur LAN both have a single teller machine each that generates
a message source each minute. Unlike the message source for computer group (ATM
nodes), the message authorization request from the single teller machine is generated an
interarrival time that can be defined with an exponential distribution with mean 30.
Likewise, the size of the message is defined by uniform distribution where the size is
evenly dispersed over the range of 50 to 120 bytes. This message source has similar
destination at Edinburgh Server of Edinburgh LAN as the message source from 50 ATM
Nodes.

18 | P a g e
1.2.3.6. RESPONSE SOURCE

Figure 20: Message Response (Scheduling)

Only the Edinburgh Server of Edinburgh LAN generates a message response or ATM
authorization response for messages from Lalitpur and Biratnagar LANs. Figure 20
depicts the scheduling parameters of this response message which has four different list
of received message namely; Biratnagar ATM Req, Biratnagar Single Teller Req, Lalitpur
ATM Req and Lalitpur Single Teller Req.

19 | P a g e
Figure 21: Message Response (Messages)

The ATM requests from Lalitpur and Biratnagar LANs are processed at the Edinburgh
server of IBN Bank. The message response from Edinburgh server can be described by
a uniform distribution where the size is evenly dispersed over the range of 50 to 100 bytes
with a stream value of 2.

20 | P a g e
1.3 DESCRIPTION OF REPORTS

The major advantage of using COMNET III for designing and simulating network models
is the automatic generation of reports. The report parameters cover a wide aspect of
options from Node Report, Channel Utilization and Message Delay. Hence, the received
message counts of all nodes, channel utilization, Frame Delay by VC, Frame Count by
VC, Access Link Stats, Message Delay for all nodes and Message Delivered for all nodes
is explained below.

1.3.1 NODE REPORT: RECEIVED MESSAGE COUNT

Figure 22: Received Message Count

Figure 22 demonstrates the count of all the message received by their respective receiver
along with its message name. As seen on the 1st row, the message named Biratnagar
ATM Req has reached Edinburgh Server of Edinburgh LAN for a total of 711 times.
Similarly, the ATM Request from Lalitpur has also reached Edinburgh Server 696 times.
Since the single teller machine in Biratnagar LAN is a single processing node; the
message generated from that machine has only reached the Edinburgh Server once. This
report is very useful in analyzing the number of times the message source reaches its
destinations and helps to determine the success of any LAN and WAN model.

21 | P a g e
Receiver(Message Name) vs Counts

800
700
600
500
COUNTS

400
300
200
100
0
Edinburgh Server Edinburgh Server Edinburgh Server
(Biratnagar ATM Req) (Lalitpur ATM Req) (Biratnagar Single
Teller Req)
Counts 711 696 1

Figure 23: Receiver (Message Name) vs Counts

22 | P a g e
1.3.2. LINK REPORT: CHANNEL UTILIZATION

Figure 24: Channel Utilization

Link vs Channel Utilization %

0.76
0.755
0.75
UTILIZATION %

0.745
0.74
0.735
0.73
0.725
0.72
Edinburgh LAN. Biratnagar LAN. Lalitpur LAN. Token-
Token-Passing Ring Token-Passing Ring Passing Ring
Utilization % 0.7338 0.7556 0.758

Figure 25: Link vs Channel Utilization %

23 | P a g e
All three LAN environment in this network model uses a Token-Passing Ring of 16Mbps
as channel requirement. So, Figure 24 illustrates the channel utilization of those token
rings used in LANs. This report has four major points namely, Link, Frames, Transmission
Delay (MS) and utilization percentage. Each row shows the name of the link, the number
of frames delivered, its error rate, average transmission delay and utilization percentage
of that particular link. 1st row demonstrates that the Token-Passing LAN in Edinburgh LAN
has delivered a total of 12119 frames with 0 error. Similarly, it has a pretty good average
of 0.036ms transmission delay and hence, has 0.7338% of channel utilization. This
means that the link is highly efficient in transmitting frames and has been utilized to its
optimum potential. Likewise, Token-Passing Ring in Biratnagar LAN has 11738 frames
delivered with an average transmission delay of 0.039 and setting the utilization
percentage to 0.7556. Finally, the Token-Passing LAN of Lalitpur LAN has 11761 frames
delivered with an average transmission delay of 0.039 and setting the utilization
percentage to 0.7580. As all the LANs use the identical Token-Passing Ring of 16Mpbs,
the utilization percentage seems to be almost parallel for all those links.

24 | P a g e
1.3.3. WAN CLOUD REPORT: FRAME DELAY, FRAME COUNT,
ACCESS LINK STATS

Figure 26: Frame Delay by VC

Figure 26 illustrates the frame delay in millisecond and burst size in kilobytes of all the
Virtual Circuits used in the model. The WAN cloud of the model contains four different
virtual circuits; namely, Lalitpur-Edinburgh, Edinburgh-Lalitpur, Edinburgh-Biratnagar and
Biratnagar-Edinburgh. Frame delay is a key service performance indicator in any
LAN/WAN environment. The report depicts that the Lalitpur-Edinburgh has an average
frame delay of 74915ms and average burst size of 56kb. Similarly, both the Edinburgh-
Lalitpur and Edinburgh-Biratnagar Virtual Circuits have identical value of 25ms for
average frame delay and 21kb for average burst size. Finally, Biratnagar-Edinburgh VC
has an average frame delay of 75057ms and average burst size of 56kb. As seen in the
report, the reason behind Lalitpur-Edinburgh and Biratnagar-Edinburgh having higher
value of both frame relay and burst size is due to the large number of frames generated
from the group of 50 ATMs and nodes of Biratnagar and Lalitpur LANs.

25 | P a g e
VC vs Average Frame Delay(ms)

80000

70000

60000
AVERAGE FRMAE DELAY

50000

40000

30000

20000

10000

0
Lalitpur- Edinburgh- Edinburgh- Biratnagar-
Edinburgh Lalitpur Biratnagar Edinburgh
Average Frame Delay(ms) 74915 25 25 75057

Figure 27: VC vs Average Frame Delay(ms)

26 | P a g e
VC vs Average Burst Size(kb)

60

50

40
AVERAGE BURST SIZE

30

20

10

0
Lalitpur- Edinburgh- Edinburgh- Biratnagar-
Edinburgh Lalitpur Biratnagar Edinburgh
Average Burst Size(kb) 56 21 21 56

Figure 28: VC vs Average Burst Size(kb)

27 | P a g e
Figure 29: Frame Counts by VC

The total kilobits transmitted throughout all the four Virtual Circuits in WAN Cloud is 4717.
Figure 29 demonstrates the accuracy and reliability of Virtual Circuits of the WAN Cloud
as there is not a single frame dropped. Lalitpur-Edinburgh had 3039 frames accepted of
size 1388 kilobits. Likewise, Edinburgh-Lalitpur had 3037 frames of size 972 kilobits
accepted. Similarly, Edinburgh-Biratnagar had 3021 frames of size 967 kilobits accepted.
Finally, Biratnagar-Edinburgh VC has 3020 frames of size 1390 kilobits accepted.

28 | P a g e
VC vs Frame Accepted vs Kilobit Accepted

4500
4000
3500
FRAME/KILOBIT

3000
2500
2000
1500
1000
500
0
Lalitpur- Edinburgh- Edinburgh- Biratnagar-
Edinburgh Lalitpur Biratnagar Edinburgh
Kilobits Accepted 1388 972 967 1390
Frames Accepted 3039 3037 3021 3020

Figure 30: VC vs Frame Accepted vs Kilobit Accepted

Figure 31: Access Link Stats

29 | P a g e
Three access links have been used in WAN cloud of our network model for transmission
of frames. As evident from Figure 31 all the access links had zero number of frames
dropped. Lalitpur Access Link had 6025 frames entered and 3037 frames exited with a
channel utilization of 37.60%. Similarly, Biratnagar Access Link had 6060 frames entered
and 3021 frames exited with channel utilization of 37.40%. Finally, Edinburgh Access Link
had 6059 frames entered and 12083 frames exited with channel utilization at its optimum
level of 100%. This further shows that the Edinburgh Access Link was most efficient
medium and had maximum channel utilization compared to Lalitpur Access and
Biratnagar Access.

Access Link vs Frame Accepted Entry vs


Frame Accepted Exit

20000
18000
16000
FRAME ENTRY/FRAME EXIT

14000
12000
10000
8000
6000
4000
2000
0
Lalitpur Access Biratnagar Access Edinburgh Access
Frame Accepted Exit 3037 3021 12083
Frame Accepted Entry 6025 6060 6059

Figure 32: Access Link vs Frame Entry vs Frame Exit

30 | P a g e
1.3.4. MESSAGE AND REPORT RESPONSE: MESSAGE DELAY FOR
ALL NODES

Figure 33: Message Delay for all nodes

Biratnagar ATM Req generated from ATM nodes at Biratnagar LAN has average
message delay of 143.63175 seconds when reaching the Edinburgh Server at Edinburgh
LAN. Similarly, Lalitpur ATM Req generated from ATM nodes at Lalitpur LAN has average
message delay of 143.27061 seconds while reaching the Edinburgh Server at Edinburgh
LAN. All the remaining message source and responses has a average message delay of
zero.

31 | P a g e
Origin/Msg Src Name/Destination vs
Average Message Delay (ms)
AVERAGE MESSAGE DELAY (MS)

160000
140000
120000
100000
80000
60000
40000
20000
0
Edinburg Biratnaga Biratnaga Lalitpur Lalitpur
h r r LAN.ATM LAN.Singl
LAN.Edin LAN.ATM LAN.Singl nodes / e Telller
burgh nodes / e Teller src Machine
Server / src Machine Lalitpur / src
src ATM Biratnaga / src ATM Req Lalitpur
response r ATM Biratnaga / Single
/ ECHO Req /… r Single… Ediburg… Teller…
Average Message Delay (ms) 0 143631.75 0 143270.61 0

Figure 34:Origin/Msg Src Name/Destination vs Average Message Delay (ms)

32 | P a g e
1.4 CONCLUSION

The simulation, report analysis of the network model and comparison of the graphs
determines the reliability, effectiveness and efficiency of the created LAN and WAN model
for IBN Bank. The choice of Token-Passing Ring over Ethernet and usage of WAN Cloud
for setting up a new network is justified by the technical report. The network architecture
created in this coursework is not just done for simulation and report generation purposes
but also to illustrate the usefulness and reliability of such network model in any real time
scenario. Further analysis of the reports demonstrates that all the message sources/ATM
authorization requests from Lalitpur and Biratnagar ATMs have successfully reached and
responded by the Edinburgh Server of IBN Bank. All the properties and nature of devices,
nodes and links used in this network model has been thoroughly researched for better
understanding of the network.

33 | P a g e
TASK B

34 | P a g e
2.1. INTRODUCTION

The dream and goal of researchers, engineers and users, of being able to communicate
with anyone at any time was sparked since the advent of the first wireless communication
systems. GSM technology revolutionized the method of communication among people
since its introduction in 1990. Among the current wireless communication systems, GSM
is the most popular and widely implemented system that provided freedom to not only
roam within a network, but also between different networks. (Eberspacher et al., 2009)
GSM refers to Global System for mobile communication. It is the globally used mobile
communication system by all manufacturers and Internet Service Providers (ISP). GSM
is a framework that was developed as an advanced outline/application that uses Time
Division Multiple Access (TDMA) approach for purposes of correspondence. (Ali et al.,
2017) Moreover, GSM is a second-generation telecommunications system architecture
designed to address the first cellular network fragmentation issues. GSM is the first
telecommunications system in the world to define and facilitate digital modulation and
network layer services. For more information, click here.

Figure 35: GSM Introduction

35 | P a g e
2.1 BACKGROUND

2.1.1 History of GSM

Table 1: History of GSM (Eberspacher et al., 2009)

Year Event
1982 Groupe Special Mobile established by the CEPT.

1986 Reservation of 900 MHz spectrum band for GSM agreed.

1989 ETSI technical committee defines the GSM as internationally accepted


cellular telephony standard.

1990 GSM adaptation work started for the DCS1800 band.

1991 First GSM call made by Radiolinja in Finland.

1994 GSM MoU membership surpasses 100 operators.


GSM subscribers hit one million.

2000 First commercial GPRS services launched.


First GPRS handset enters the market.
Five billion SMS sent in one month.

2003 Membership of GSM Association breaks through 200-country barrier.

2008 GSM surpasses three billion customer thresholds.

36 | P a g e
2.2.2 Architecture of GSM

Figure 36: GSM Architecture

A GSM network comprises of distinctive components and routes that communicate with
each other in order to empower the general framework operation. Despite advances in
the more up-to-date frameworks, the basic GSM framework design has been maintained
and the system components has remained same since the first GSM framework was
propelled in the mid-1990s. (Ali et al., 2017) Like any modern mobile networks, GSM
utilizes a cellular structure/network which basic functioning is to partition the available
frequency range and assign only required segments of that frequency spectrum to any
base receiver station. (Gunnar, 1999) A GSM network comprises of various elements: the
mobile station (MS), the base transceiver (BTS), the subscriber identity module (SIM), the

37 | P a g e
base station controller (BSC), the mobile services switching centre (MSC), etc. Figure 2
depicts an overview of the GSM subsystems.

Figure 37: Components of GSM

Figure 2 shows the components required in order to form a public land mobile network
(PLMN). The GSM architecture can be assembled into four principal territories:

1. Mobile Station (MS): Portable devices (commonly referred as cell phones) or


versatile stations are integral part of GSM as it helps clients to interact
and actually utilize the GSM technology. Cell phones have fallen
significantly in size but has increased drastically in the usefulness and
features. The mobile station also consists of International Mobile
Equipment Identity (IMEI) and Subscriber Identity Module (SIM) is installed within
the cell phone.

38 | P a g e
2. Base Station Subsystem (BSS): GSM’s Base Station (BSS) section organizes
engineering that is related to talking to the mobile phones on the system at a very
basic level. Furthermore, BSS has two components:

• Base Transceiver Station (BTS): The BTS organizes the users of the radio
transmitter and their corresponding receiving devices that
transmit and communicate directly with the mobile devices. (Ali
et al., 2017) It provides the connectivity between the network and
the mobile station via the Air Interface. (Gunnar, 1999)

• Base Station Controller (BSC): The BTSs of an area are connected to the
BSC via an interface called the Abis-interface. The BSC takes
control of Base Station Subsystem and deals with radio
properties and monitors such as; handover within the range of
BTSs, channel classification and so on. (Ali et al., 2017)

3. Network Switching Subsystem (NSS): NSS provides principal control and


interfacing for the whole versatile system. Moreover, the major components within
this central system are: Mobile Switching Administrations Centre (MSC), Home
Location Register (HLR), Visitor Location Register (VLR), Equipment Identity
Register (EIR), Authentication Centre, Gateway Mobile Switching Centre (GMSC)
and SMS Gateway (SMS-G).

4. Operation and Support Subsystem (OSS): The OSS bolster subsystem is a


portion that is associated within NSS and BSC segments within the general GSM

39 | P a g e
organize engineering. It is also used for monitoring and tracking the general GSM
system and additionally monitors the BSS movement heap. (Ali et al., 2017)

The detailed description of each components included with a GSM architecture can be
found here.

40 | P a g e
2.2.1. MOBILE COMMUNICATION

Figure 38: Smartphone

The digitalisation of communication systems, tremendous progress in microelectronics,


computers and software technology, the invention of efficient algorithms and
compression, encryption and processing of all kinds of signals, as well as the
development of versatile communication protocols were all significant prerequisites for
this growth. (Eberspacher et al., 2009) Over the past decade, the shocking increase in
mobile phone use has had a number of significant consequences and implications for
both economic and social life. (Katz, 2008) In modern world, mobile communication has
aided the fields of navigation, transportation, machine-to-machine communications,
robots, emergency and law enforcement services, space exploration, military and so on.
(Kukushkin, 2018) The Internet’s growth slowed at the turn of the century, while the
smartphone usage continued to rise. As seen on Figure 36, between 2000 and 2003,
around twice as many new mobile cellular subscribers as new Internet users has been
added worldwide. (Katz, 2008) For more information, click here.

41 | P a g e
Figure 39: Mobile and Internet users

42 | P a g e
2.2.1.1. HISTORY

The cell phone has become standard sometime over the last decade. We now take it for
granted that we can communicate or call with anyone at anytime from anywhere and
inquire if such a call would be safe while driving. In addition, the technology arena has
moved from voice to wireless information. (Frenkiel, n.d.) For the early history of
communication, click here.

Figure 40: Early history of mobile communication

Since demand for mobile services has evolved from the beginning of the commercially
available GSM in the early 1990s to the introduction of a packet-based infrastructure in
GPRS, to a more reliable technology in UMTS, and to more advanced architectures in
LTE and beyond, the supporting core architecture has also shifted. (Liyanage et al., 2015)
Figure 39 shows how the mobile industry has evolved in every aspects of voice
transmission, SMS/Email transmission and how the user experiences these

43 | P a g e
advancements in mobile communication. Similarly, Figure 40 depicts the global mobile
traffic per month has shifted from 1.5 exabytes per month in 2013 to 15.9 exabytes per
month in 2018. These data are evident to the fact that we, users have been completely
immersed and dependent on the mobile communication and its features throughout the
last decade. Furthermore, Figure 41 demonstrates the development of 1G in 1995 to 2G
in 2002 and how this development has increased the data transmission and bandwidth of
mobile communication and its coverage.

Figure 41: Evolution of Mobile Industry

44 | P a g e
Figure 42: Global mobile traffic per month. Source: Cisco Systems (2014) Cisco Visual Networking

45 | P a g e
Figure 43: History of 1G to 3G

46 | P a g e
2.2.1.2. CELLULAR RADIO

The use of the term “cellular” in describing mobile radio systems is well known to
everyone. We know that it is called cellular because a number of cells make up the
network. Mobile radio systems work for two reasons on the basis of cells. The first reason
is that the radio signals only transmit short distance without the usage of transmitters. The
second reason is due to the radio spectrum, which is what radio signals use to travel
through space. (Web, 1998) The one basic requirement for cellular and wireless
communication is the radio spectrum. By producing an electrical “radio” signal and
passing it via antenna, the signal is radiated in the form of electric waves that can be
received by another antenna at some distance away. And when the radio signal is
constantly changing, the electrical signal is finally transmitted. (Web, 1998) Figure 43
show the sine wave which is also the simplest form of changing signal. For more
information, click here.

Figure 44: Low and High Frequency Sine wave

47 | P a g e
2.2.1.3. ADVANTAGES AND DISADVANTAGES

Mobile communication technology includes devices such as mobile phones, portable Wi-
Fi-enabled devices and wireless laptops that can be linked via Wi-Fi or cellular
connectivity. But before you are dependent on these gadgets, it is important to understand
the advantages and disadvantages of mobile communication.

• Advantages:

Figure 45: Advantages of Smartphones (Chanana, 2013)

48 | P a g e
The rapid advancement in the development of mobile communication technology has
led to the whole word being regarded as a global village. People can communicate
with each other at any time and from anywhere. Similarly, GSM has many advantages
from easier availability and cost effectiveness. GSM phones come with a range of
plans with cheaper rates of call, free messaging services, limited free calls, etc. The
GSM-based networks (i.e. base stations) are distributed globally and therefore the
same mobile phone operates worldwide. As well as providing seamless wireless
connectivity, this leverages cost benefits. The power consumption of GSM based
phones is lower than CDMA. The SIM card or subscriber recognizes a device card
that transmits customer information and shares information, offers purchaser
information. SIM cards also enable customers to provide one user with their
subscription information and telephone book info to be added at any time. (Dixit &
Garg, 2014)

49 | P a g e
• Disadvantages:

Figure 46: Disadvantages of Mobile Phones (Chanana, 2013)

Security is a legitimate concern of wireless equipment users, especially with


respect to potential hazards caused by fields of electromagnetic (EM). For medical
impacts of mobile phones, click here. The power level for mobile technologies
using GSM and CDMA can be seen in Figure 44 with their mode of transmission.
The radiations form these radiations interferes with the electric impulses that two
neurons connect with each other

50 | P a g e
Figure 47: Specifications for GSM and CDMA

Furthermore, GSM uses a system for FTDMA connectivity. Multiple users use the
same bandwidth here and will also conflict if more users use the GSM service. As
seen of Figure 44, GSM uses pulse based burst transmission technology that
interferes with other electronics using radio waves. Due to this reason, petrol
stations, hospital and airplanes avoid the use of GSM based electronic equipment.
Today’s digital world demands security and confidentiality in digital transmission
that cannot be guaranteed by GSM, as it has no means for end-to-end encryption
of user data that can lead to tampering in calls made form GSM devices.

51 | P a g e
2.2.2. CELLULAR TECHNOLOGIES

2.2.2.1. 1G, 2G, 3G AND LTE

• First Generation (1G): 1G was effectively a circuit-switched analogue cellular


network introduced in 1981.The data traffic was mainly verbal. It used FDMA as a
technique of multiplexing with peak velocity of 1.9kbps. Total Access
Communications System (TACS), Advance Mobile Phone Service (AMPS) and
Nordic Mobile Telephone (NMT) were the most effective standards. (Kanani et al.,
2014)For more information on 1G, click here.

• Second Generation (2G): Analog / digital split is the main difference between 1
G and 2G. 2 G was now able to handle roaming with the Short Message Service
(SMS) facility with the introduction of GSM architecture in 1991. Voice and data
with FDMA and TDMA as their multiplexing techniques were the main traffic in this
circuit switched architecture. (Kanani et al., 2014) For more information, click here.

• Third Generation (3G): 3 G is GSM-based and introduced in 2000. This


technology was aimed at providing high-speed data. Using packet switching, the
original technology has been upgraded to enable data up to 14 Mbps and more.
This uses Broad Band Wireless Network to improve visibility. (Vora, 2015) For
more information, click here.

• Fourth Generation (4G) / LTE: The LTE (Long Term Evolution) system is known
to be 4G. 4 G is being developed to meet the QoS and rate requirements of future
applications such as wireless broadband connectivity, Multimedia Messaging
Service (MMS), video messaging, mobile Television, HDTV content, Digital Video
Broadcasting (DVB), limited voice and data services and other bandwidth-based
services. (Vora, 2015) For more information, click here.

52 | P a g e
2.2.2.2. WIRELESS COMMUNICATIONS

2.2.2.3.1. WAP

WAP stands for Wireless Application Protocol. WAP is used to build bridges between cell
phones and the Internet as well as Intranet and provides mobile users with the experience
of accessing a better form of Internet on their mobile phones. With implementation of
WAP, subscribers can access as much information as they can from the desktops from a
pocket-sized computer. (K et al., 2015) For more information, click here.

2.2.2.3.2. GPRS

General Packet Radio System (GPRS) system brings to the existing GSM system the
packet-switched bearer services. Depending on the MS capabilities, the GPRS MS can
use between one and eight channels over the air network, and these channels are
dynamically allocated to an MS when packets need to be sent or received. The GPRS
device has a theoretical maximum throughput of 160 kbps per MS using all eight channels
without correction of errors. (Halonen et al., 2003) For more information, click here.

2.2.2.3.3. EDGE

Enhanced data rates for GSM evolution (EDGE) is a significant improvement in data rates
for GSM. For some time now, GSM networks have been providing advanced data
services, such as circuit-switched 9.6-kbpsdata and SMS. EGPRS is based on GPRS,
which is GSM's packet-switched data service. It typically provides high-bit rate packet
services include fast file transfer, Internet access, web browsing, and remote email.
(Halonen et al., 2003) For more information, click here

53 | P a g e
2.2.2.3.4. UMTS

UMTS (Universal Mobile Telecommunications System) is the W-CDMA-based European


3 G Standard. In 2001, Japan's NTT DoCoMo launched the first commercial UMTS
network. The major changes introduced by the different releases of UMTS specifications
take place within the network and in transport technologies, as well as the new flexibilities
and efficiencies in network operation. For further information, click here.

54 | P a g e
2.3. CONCLUSION

Human beings have come a long way from the days of audible transmission and analogue
communication to modern mobile communication means. The area of wireless and mobile
communication has a fascinating history spanning more than a century of technological
innovations from the first transatlantic transmission by Marconi in 1899 to the widespread
acceptance of mobile cellular networks by more than four billion people today. Wireless
has become one of the core technology enablers for a wide range of networking and
communications applications ranging from 3G/4 G cellular devices, internet connectivity
to large WIFI networks. It is also of central importance to the future of mobile pervasive
audio-visual and multimedia applications. This has led to an accelerating pace of research
and development in the wireless area with the promise of significant new breakthroughs
over the next decade and beyond. (Raychaudhuri & Mandayam, 2011) Finally, GSM has
revolutionized the field of mobile communication since its development in 1990s.

55 | P a g e
References

Ahuja, S.P. (1998) COMNET III: a network simulation laboratory environment for a course
in communications networks. In FIE '98. 28th Annual Frontiers in Education Conference.
USA, 1998. IEEE.
Ali, S., Haq, I.u. & Zia, R.U. (2017) GSM Technology: Architecture, Security and Fututre
Challenges. Internation Journal of Science Engineering and Advance Technology, 5(1).
Bidgoli, H., ed. (2008) HANDBOOK OF COMPUTER NETWORKS. New Jersey: John
Wiley & Sons, Inc.
Blair, J.D. (1989) A 16 MBPS adapter chip for the token-ring local area network. In
Internation Solid-State Circuits Confrence. New York, 1989. IEEE.
Calhoun, G. (1988) Digital Cellular Radio. Artech House, Inc.
Chanana, P. (2013) Interesting Mobile Phone Statistics and Pros & Cons Of Using Them
[Infographic] [Online]. Available from:
https://www.business2community.com/infographics/interesting-mobile-phone-statistics-
pros-cons-using-infographic-0729744 [Accessed 23 December 2019].
Dixit, A. & Garg, A. (2014) A Study on Cellular GSM & CDMA -Based for New Generation
Mobile Radio System. International Journal of Computing and Technology, 1(8).
Eberspacher, J., Vogel, H.-J., Bettstetter, C. & Hartman, C. (2009) GSM - Architecture,
Protocols and Services. 3rd ed. Germany: John Wiley and Sons Ltd.
Frenkiel, R. (n.d.) A Brief History of Mobile Communications. IEEE.
GSMA Intelligence. (2019) Definitive data and analysis for the mobile industry [Online].
Available from: https://www.gsmaintelligence.com/ [Accessed 22 December 2019].
Guifen, G. & Guili, P. (2010) The Survey of GSM Wireless Communication Sytem.
Internatioal Conference on Computer and Information Application (ICCIA), (1).
Gunnar, H. (1999) GSM Networks: Protocols, Terminology, and Implementation. London:
Artech House, INC.
Halonen, T., Romero, J. & Melero, J., eds. (2003) GSM, GPRS and EDGE Performance:
Evolution Towards 3G/UMTS. 2nd ed. Sussex: John Wiley and Sons, Ltd.
Kanani, P., Shah, K. & Kaul, V. (2014) A Survey on Evolution of Mobile Networks:1G to
4G. INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH.
Katz, J.E. (2008) Handbook of Mobile Communication Studies. London: The MIT Press.
56 | P a g e
K, A., M., & G, F.P. (2015) Wireless Application Protocol - A Survey. International Journal
of Trend in Research and Development, 2(6).
Kukushkin, A. (2018) Introduction to Mobile Network Engineering. Sussex: John Wiley
and Sons, Inc.
Liyanage, M., Gurtov, A. & Ylianttila, M., eds. (2015) Software Defined Mobile Networks
(SDMN). Sussex: John Wiley and Sons, Ltd.
Nath, D.A. & Mukherjee, S. (2015) Impact of Mobile Phone/Smartphones: A pilot study
on positive and negative effects. Research Article. Kolkata: International Journal of
Advance Research in Computer Science and Management Studies St. Xavier's College.
Rahnema, M. (2008) UMTS NETWORK PLANNING, OPTIMIZATION, AND INTER-
OPERATION WITH GSM. IEEE.
Raychaudhuri, D. & Mandayam, N. (2011) Frontiers of Wireless and Mobile
Communications. IEEE, 100(4).
Rouse, M. (2019) GSM (Global System for Mobile Communication) [Online]. Available
from: https://searchmobilecomputing.techtarget.com/definition/GSM [Accessed 23
December 2019].
Russell, S.J. & Norving, P. (2016) Artificial Intelligence: A Modern Approach. 3rd ed. India:
Pearson Education, Inc.
Smyth, P. (2000) A Brief History of Mobile Communications - 1995 to 2010. BT
Technology Journal, 18(1).
Tanenbaum, A.S. (2003 ) Computer Networks. 4th ed. New Delhi, India: Pearson
Education, Inc.
Tolstrup, M. (2015) Indoor Radio Planning: A Practical Guide for 2G,3G and 4G. 3rd ed.
Suusex: John Wiley and Sons, Ltd.
velocloud. (2019) cloud-wan [Online]. Available from: https://www.velocloud.com/sd-
wan/understanding-sd-wan/cloud-wan [Accessed 1 December 2019].
Vora, M.L.J. (2015) EVOLUTION OF MOBILE GENERATION TECHNOLOGY: 1G TO
5G. International Journal of Modern Trends in Engineering and Research, 2(10).
Web, W. (1998) Understanding Cellular Radio. Artech House, INC.

57 | P a g e
Bibliography

Calhoun, G. (1988) Digital Cellular Radio. Artech House, Inc.


Russell, S.J. & Norving, P. (2016) Artificial Intelligence: A Modern Approach. 3rd ed. India:
Pearson Education, Inc.

Web, W. (1998) Understanding Cellular Radio. Artech House, INC.

58 | P a g e
Appendices

A. Introduction

The Global System for Mobile Communications, GSM, is a pan-European Mobile


communication system in the 900 MHz band introduced in the early years of this decade.
Mobile Communication has become one of the fastest growing areas of
telecommunications due to the flexibility and convenience offered by modern mobile
communication systems. With the increase of the number and the requirement of GSM
subscriber, GSM wireless communication system has attracted more and more attention
in the field of telecommunication. (Guifen & Guili, 2010) According to GSMA Intelligence
2019, the total amount of unique mobile subscribers till Dec 2019 is a whopping
5,176,436,700, which has an 2.5% yearly growth rate. (GSMA Intelligence, 2019)

B. Architecture of GSM

B.1 Subscriber Identity Module: SIM is a smart card/chip that is used in GSM that
distinguishes the identity of the subscriber and mobile equipment. It has
integrated secure storage and cryptographic functions. It is inserted in any
mobile computers and mobile phones that is removable and portable. It serves
as a database on the user side as it governs the number and calls billed to the
subscriber. The SIM communicates directly with the VLR and indirectly with the HLR.
(Gunnar, 1999)

59 | P a g e
B.2 Transcoding Rate and Adaption Unit: The flexibility with which GSM uses the
available frequency resources is one of the most vital aspects of a mobile
network. Data compression is carried out in both the MS and TRAU in the GSM
network. TRAU is a black box within the Bases Station Subsystem. (Gunnar,
1999)

B.3 Mobile Services Switching Centre: The core component of the general GSM structure
engineering centre network area is the Mobile Services Centre (MSC). MSC
acts as a general exchange hub and provides additional usefulness to allow a
portable client’s needs to be upheld. (Ali et al., 2017) MSC is connected with
large numbers of BSCs via the A-interface. MSC routes the incoming and outgoing calls
and assigns user channels to the A-interface. (Gunnar, 1999)

B.4 Home Location Register: In addition to their last known area, this database contains
all the regulatory data about each supporter. The GSM system can make calls to
the relevant base station for the MS along these lines. It is a repository that stores
the data of large number of subscribers. When a customer turns on their mobile,
the telephone records with the network and it is therefore conceivable to decide
the BTS they are talking to in such a way that approaching calls can be handled
appropriately. (Ali et al., 2017)

60 | P a g e
B.5 Visitor Location Register: The VLR was devised so that the HLR would not be
overloaded with inquiries on data about its subscribers. (Gunnar, 1999) It
includes HLR selected data that empowers the chosen administrations to be
presented to the individual endorser. The VLR can be modified as a different
substance but is usually recognized as a vital port of the MSC rather than a separate
feature.

C. Mobile Communication

Mobile Internet is the second wave of the digital revolution that started with the
unprecedented introduction of cell phones that reached four billion users worldwide in
2011. With the launch of so-called third-generation (3G) and fourth-generation (4G)
networks beginning around 2005, cellular technology started transitioning towards data
and Internet services, allowing a wide range of new computing and multimedia
technologies from navigation to mobile video streaming/sharing seamlessly.
(Raychaudhuri & Mandayam, 2011)

61 | P a g e
D. Cellular Radio

AT&T/Bell Laboratories initially developed the concept of cellular coverage. Before that,
manual systems used only for mobile voice telephony were the mobile telephony
systems. The first of these cellular systems was analogue voice transmission and some
data transmission was modulated in the speech channel to signal the occasional
transmission or power control order. AMPS, D-AMPS, TACS, PCS, CDMA, NMT, GSM
(2G), DCS(2G), UMTS(3G) AND LTE(4G) were some of the widely used protocols.
(Tolstrup, 2015)

E. History of Communication

Before delving into the modern inventions in the field of mobile communication, we must
understand the founding stones of today’s technology. Before the advancement in
technology, the primitive times had visual transmission medium of smoke/light to audible
transmission of drums and horns. After the invention of electricity, first telephone was
invented in 1876 AD by Alexander Graham Bell, that revolutionized the communication
medium for human beings for ages to come.

F. Disadvantages of Mobile Communication/Technology

The possible adverse health effects arising from exposure to radiofrequency radiation
(RFR) such as those from mobile communications devices have been increasingly
concerned. Mobile communication is where the signal is transmitted by radio frequency
and microwave signals through electromagnetic wave. This signal produces
electromagnetic radiation consisting of dangerous ionizing radiation and harmless non-
ionizing radiation in the form of thermal radiation. Electromagnetic wave is transmitted to

62 | P a g e
the body when using mobile phones, which causes health problems, especially in the
area near the ear skull where they are known to affect the neurons. (Nath & Mukherjee,
2015)

G. First Generation (1G)

The basic features of AMPS are:

• Speed-2.4 kbps
• Allows voice calls in 1 country
• Use analogue signal.
• Poor voice quality and large phone size
• Offered very low level of spectrum efficiency

It introduces mobile technologies such as Mobile Telephone System (MTS), Advanced


Mobile Telephone System (AMTS), Improved Mobile Telephone Service (IMTS), and
Push to Talk (PTT). (Vora, 2015)

Figure 48: Architecture of AMTS

63 | P a g e
H. Second Generation (2G)

It uses the 30 to 200 KHz bandwidth. For comparison to 2 G, the 2.5 G system uses the
modified packet and circuit domain which provides up to 144 kbps of data rate. For
example. GPRS, CDMA, EDGE, etc.

The main features of 2G are:

• Data speed was up to 64kbps


• Use digital signals
• Enables services such as text messages, picture messages and MMS (Multimedia
message)
• Provides better quality and capacity
• Unable to handle complex data such as videos.

The main features of 2.5G are:

• Provides phone calls


• Send/receive e-mail messages
• Web browsing
• Speed: 64-144 kbps
• Camera phones (Vora, 2015)

64 | P a g e
I. Third Generation (3G)

In the same year as GSM was launched commercially, the European


Telecommunications Standards Institute (ETSI) started the work for the next generation
mobile networks. Universal Mobile Telecommunication System (UMTS) was the name of
this new system. WCDMA was selected as their 3 G network system in 1997 by ETSI.
Third Generation Partnership Project (3GPP) organization has carried out development
work on 3G. (Kanani et al., 2014) The main features of 3G are:

• Speed 2 Mbps
• Typically called smart phones
• Increased bandwidth and data transfer rates to accommodate web-based
applications and audio and video files.
• Provides faster communication
• Send/receive large email messages
• High speed web/more security/video conferencing/3D gaming (Vora, 2015)

Figure 49: UMTS Network Architecture

65 | P a g e
Figure 50: WCDMA Network Architecture

J. Fourth Generation (4G)

LTE Network Architecture includes the Evolved Packet Core (EPC), which is a fully PS
backbone network and manages mobility and session. The traditional, fully CS voice
traffic is handled by the IP multimedia subsystem (IMS) network. (Kanani et al., 2014)
The main features of 4G are:

• Capable of provide 10Mbps-1Gbps speed


• High quality streaming video
• Combination of Wi-Fi and Wi-Max
• High security
• Provide any kind of service at any time as per user requirements anywhere
• Expanded multimedia services (Vora, 2015)

66 | P a g e
Figure 51: LTE Network Architecture

K. Wireless Application Protocol (WAP)

WAP is a free, global standard that allows mobile users to immediately access and
communicate with internet information and resources via wireless devices. Wireless
Application Protocol allows users to use their mobile phones to carry Internet content.
The production of WAP began in the mid-1990s. At the beginning, the two major
manufacturers –Nokia and Ericsson–demonstrated their interest in offering such
advanced technologies to a competitive advantage on the mobile communication market.
As-Protocol mismatch, System limitations, accessibility, WAP is used to address several
major problems. WAP describes a series of standardized protocols that can run across a
wide range of existing cellular networks to address these issues. In 2002, the WAP forum
was founded in the Open Mobile Alliance by Ericsson, Motorola, Nokia and Unwired
Planet.

67 | P a g e
Figure 52: WAP Architecture

L. General Packet Radio System (GPRS)

GPRS provides the GSM network with a few new network features. The main ones are
the GPRS support node serving (SGSN) and the GPRS support node gateway (GGSN).
The point-to-multipoint service center (PTM-SC), which is dedicated to the PTM services
in the GPRS network, is another important new feature. The main objective of the GPRS
is to offer an access to standard data networks such as transport control protocol
(TCP)/Internet protocol (IP) and X.25. (Halonen et al., 2003)

68 | P a g e
Figure 53: Functional View of GPRS Network

69 | P a g e
M. Enhanced data rates for GSM evolution (EDGE)

EGPRS has a major impact on the network interface RF and physical layer as well as on
the RLC / MAC protocol, but there are minor changes to other protocols and layers of
protocols. One significant conceptual change in EGPRS compared to GPRS is the quality
control component, which also supports incremental redundancy (type II hybrid ARQ) in
EGPRS, in addition to GPRS-type link adaptation (type I hybrid ARQ). (Halonen et al.,
2003)

Figure 54: GSM EDGE Network Architecture

70 | P a g e
N. Universal Mobile Telecommunications Service (UMTS)

In particular, the advantage of a higher spectrally effective and versatile air interface is
UMTS, which implemented the WCDMA for its air interface. The three main elements of
the high-level UMTS architecture are the user equipment (UE) that houses the UMTS
subscriber identity module (USIM), the UMTS Terrestrial Radio Access Network (UTRAN)
and the Core Network (CN). The Uu and Iu interface protocols are divided into two
categories: User plane and Control plane protocols. A bearer service is a type of
telecommunications service that provides transmitting capability between points of
access. A bearer service includes all the things required for delivering a certain QoS, such
as consumer plane data transportation and QoS management. The protocols of the
control plane are used to manage the radio access bearers and the communications
between the UE and the network. (Rahnema, 2008)

Figure 55: High Level UMTS Architecture

71 | P a g e
Figure 56: Overview of Network Model

Figure 57: Edinburgh LAN of the Network Model

72 | P a g e
Figure 58: Biratnagar LAN of the Network Model

Figure 59: Lalitpur LAN of the Network Model

73 | P a g e
Figure 60: WAN Cloud of the Network Model

Figure 61: Simulation Parameters

74 | P a g e
Figure 62: Access Link Stats inside WAN Cloud

Figure 63: Channel Utilization of all the links

75 | P a g e
Figure 64: Frame Counts by Virtual Circuit inside WAN Cloud

Figure 65: Frame Delay by Virtual Circuit inside WAN Cloud

76 | P a g e
Figure 66: Message Delay for all the message sources and responses

Figure 67: Message Delivered for all the message sources and responses

77 | P a g e
Figure 68: Counts for all the message received through each node

78 | P a g e

You might also like