Download as pdf or txt
Download as pdf or txt
You are on page 1of 49

Wireless Network

&
Mobile Computing

Collected & Prepared By:


Laxmi Bhattarai
UNIT I: WIRELESS NETWORKS: Wireless Network,
Wireless Network Architecture, Wireless Switching
Technology, Wireless Communication problem, Wireless
Network Reference Model, Wireless Networking Issues &
Standards.

Wireless Network

A wireless network is a computer network that uses radio waves instead of physical cables to
transmit data between devices. Here's a breakdown of the key points:

 No Cables: Unlike wired networks that connect devices with physical cables, wireless
networks use radio waves to send and receive information. This offers more flexibility in
device placement and movement.
 Convenience: Wireless networks provide a convenient way to connect devices like
laptops, smartphones, tablets, and printers to the internet or each other. You can access
the network from anywhere within the coverage area, without being restricted by cables.
 Applications: Wireless networks are widespread in homes, offices, public places (Wi-Fi
hotspots), and even cellular networks for mobile phones.

Here are some of the advantages of wireless networks:

 Mobility: Wireless networks allow devices to move around freely within the coverage
area while staying connected.
 Scalability: It's easier to add new devices to a wireless network compared to a wired
network where you might need to run additional cables.
 Cost-effective: In some cases, setting up a wireless network can be cheaper than
installing cables throughout a building.

However, there are also some limitations to consider:

 Security: Wireless networks can be more susceptible to security breaches compared to


wired networks if not properly secured.
 Signal Strength: The strength and range of the wireless signal can be affected by
interference from other devices or obstacles.
 Speed: Wireless network speeds can sometimes be slower than wired connections,
although speeds continue to improve with advancements in technology.

Wireless Network Architecture


Wireless network architecture refers to the way a wireless network is designed and structured to
facilitate communication between devices. Here's a breakdown with a diagram to illustrate the
two main types:

1. Cellular Network Architecture

Imagine a large web covering a vast area. This web is made up of hexagonal cells, each served
by a base station (cell tower). Mobile devices like phones and tablets connect to the nearest cell
tower for communication.

Diagram:

Cell A Cell B Cell C


+-------+ +-------+ +-------+
| Base | | Base | | Base |
| Station| | Station| | Station|
+-------+ +-------+ +-------+
| | |
| User Equipment (Phone) | |
| | |
--- Moves around the coverage area ---
| | |
| | |
Cell D Cell E Cell F
+-------+ +-------+ +-------+
| Base | | Base | | Base |
| Station| | Station| | Station|
+-------+ +-------+ +-------+

 Key Components:
o Mobile Devices (User Equipment): These are the devices that connect to the
network, like phones and tablets.
o Base Stations (Cell Towers): These are towers equipped with antennas that
transmit and receive signals to and from mobile devices within their range.
o Mobile Switching Center (MSC): (Not shown) This central component manages
calls, handoffs (when a device moves between cells), and connects the cellular
network to the public switched telephone network (PSTN) for voice calls.

2. Wireless Local Area Network (WLAN) Architecture

Imagine a smaller area like a home, office, or coffee shop. A central device called an access
point (AP) acts like a hub, and wireless devices connect to it for internet access or to
communicate with each other.

Diagram:

Wireless Devices (Laptops, Phones, Tablets)


| | |
| | |
+-----------+-----------+-----------+
| | | |
| Access | Access | Access |
| Point 1 | Point 2 | Point 3 |
| | | |
+-----------+-----------+-----------+
| | |
| | |
(wired connection to router/internet)

 Key Components:
o Wireless Devices: These are the devices that connect to the WLAN for internet
access or communication, like laptops, phones, and tablets.
o Access Point (AP): This is the central device that wireless devices connect to. It
acts as a bridge between the wireless network and the wired network (usually
connected to a router).
o Router: (Not shown) This device connects the WLAN to the wired network (like
cable or DSL) and provides internet access to devices on the network.

Additional Considerations:

 Network Topology: The physical layout of the network can be star (all devices connect
to a central AP), mesh (devices connect to each other and relay signals), or a hybrid of
both.
 Protocols: Standardized rules like Wi-Fi (IEEE 802.11 standards) govern how devices
communicate on the network.

Understanding the architecture helps you visualize how wireless networks function and choose
the right setup for your needs.

Wireless Switching Technology

Wireless switching technology refers to the methods used to manage and direct data traffic
within a wireless network. Unlike wired networks where data travels through physical cables,
wireless networks rely on radio waves which can be prone to interference and congestion.
Wireless switching helps optimize data flow and improve network performance.

Here's a breakdown of some key concepts:

 Traffic Management: Wireless switches manage the flow of data packets between
access points (APs), wireless devices (phones, laptops etc.), and the wired network
backbone (router, internet). They prioritize data based on factors like type of traffic
(voice calls vs video streaming) and user needs.
 Cell Handoff: In cellular networks, when a mobile device moves from the coverage area
of one cell tower (base station) to another, the wireless switch facilitates a smooth
handover of the connection. This ensures uninterrupted communication as the device
travels.
 Load Balancing: Wireless switches can distribute network traffic across multiple access
points to prevent overloading and ensure optimal performance for all connected devices.
 Security: Some wireless switches offer advanced security features like access control
lists (ACLs) to restrict unauthorized devices from accessing the network.

There are two main types of wireless switching technologies:

1. Centralized Switching: This approach uses a central controller that manages multiple
access points. The controller gathers information about network traffic, user activity, and
signal strength. Based on this data, the controller instructs the access points on how to
route data packets efficiently. This offers centralized control and better network visibility.
2. Distributed Switching: In this approach, intelligence is distributed among the access
points themselves. Each access point makes decisions about routing data packets based
on local conditions and communication with neighboring access points. This can be
simpler to set up but might not offer the same level of control as centralized switching.

The choice of wireless switching technology depends on factors like the size and complexity of
the network, the number of users, and the desired level of control.

Wireless communication Problems

Wireless communication, despite its convenience, faces several challenges that can hinder its
performance and reliability. Here are some of the common problems encountered in wireless
communication:

Signal Interference: Radio waves used for wireless communication can be easily interfered with
by other radio signals or physical obstacles. This interference can cause data corruption, signal
weakness, and even complete loss of connection. Sources of interference include:

o Other wireless devices operating on the same frequency band (e.g., multiple Wi-
Fi networks in close proximity)
o Electronic devices like cordless phones, microwave ovens, bluetooth speakers
o Physical barriers like walls, trees, and buildings that can weaken or block the
signal
 Limited Range: The range of a wireless signal is generally shorter compared to wired
connections. Factors like frequency, transmission power, and obstacles all affect the
range. The signal strength weakens as it travels, limiting the effective coverage area of a
wireless network.
 Security Vulnerabilities: Wireless networks are inherently more susceptible to security
threats compared to wired networks. Since data travels through the air, it can be
intercepted by unauthorized devices if proper security measures are not implemented.
Here are some potential security risks:
o Eavesdropping: Hackers can intercept data transmissions if the network is not
encrypted.
o Unauthorized Access: Unsecured networks allow unauthorized devices to
connect and potentially access sensitive information.
o War jamming: Deliberate interference with the signal to disrupt communication.
 Capacity Limitations: The bandwidth available in a wireless network is shared by all
connected devices. As the number of users or the amount of data traffic increases, the
network can become congested, leading to slower speeds and reduced performance.
 Multipath Fading: This phenomenon occurs when a radio signal reaches the receiver
through multiple paths due to reflections from obstacles. These paths can have different
lengths and cause the signal to arrive out of phase, leading to signal weakening or
distortion.

These are some of the main challenges faced in wireless communication. Fortunately,
advancements in technology are leading to solutions that mitigate these problems. For example,
improved antenna design, better signal processing techniques, and the use of higher frequencies
can help improve range and capacity. Additionally, stronger encryption methods and network
security protocols are constantly being developed to enhance wireless network security.

Wireless Communication Problems and Solutions


Problem Description Solution
* Frequency Hopping: Rapidly changes
Radio waves can be transmission frequency to avoid consistent
disrupted by other signals or interference. * Channel Selection: Choose less
Signal
obstacles, causing weak congested channels for Wi-Fi networks. *
Interference
signal, data corruption, or Shielding: Use shielded cables and enclosures for
disconnection. access points to reduce interference from nearby
devices.
* Range Extenders: Boost signal strength of
existing network to extend coverage. * Mesh
Wireless signal strength Networking: Distribute signal efficiently with
Limited Range weakens with distance, interconnected access points. * Higher
limiting coverage area. Transmission Power (with regulations): Increase
access point power for stronger signal (consider
mobile device battery life).
* Encryption: Use strong protocols
Wireless networks are (WPA2/WPA3) to scramble data transmissions. *
susceptible to Access Control: Restrict network access with
Security
eavesdropping, unauthorized Access Control Lists (ACLs). * Guest Network:
Vulnerabilities
access, and jamming if not Isolate visitor traffic with a separate guest network.
properly secured. * Regular Updates: Keep firmware and software
updated for latest security patches.
* Quality of Service (QoS): Prioritize critical
Bandwidth is shared by all
traffic (calls, video) for smooth performance. *
connected devices, leading
Network Expansion: Add more access points or
Capacity to slow speeds and
higher-capacity routers to increase bandwidth. *
Limitations congestion as the number of
Upgrade to Newer Standards: Utilize newer Wi-
users or data traffic
Fi standards (Wi-Fi 6+) for increased bandwidth
increases.
and efficiency.
* Error Correction Techniques: Detect and
Signal reaches receiver
correct errors caused by multipath fading. *
Multipath through multiple paths due
Diversity Antennas: Use multiple antennas to
Fading to reflections, causing
capture different signal versions and improve
weakening or distortion.
reception.

Wireless network reference model

A wireless network reference model is a conceptual framework that describes how different
components of a wireless network interact and communicate with each other. It acts like a
blueprint, outlining the functionalities at various levels to ensure seamless data transfer.

Similarities to OSI Model:

The wireless network reference model shares some similarities with the OSI model (Open
Systems Interconnection) used for wired networks. Both models break down network
communication into layers, each with specific responsibilities. However, the wireless model may
have additional layers or sub-layers to address the unique challenges of wireless communication.

Here's a breakdown of what a wireless network reference model might typically include (specific
layers and names may vary):

Layers (Bottom to Top):

 Physical Layer: Deals with the physical transmission of radio waves, including signal
modulation, transmission power, and antenna characteristics.
 Data Link Layer: Handles frame packaging, addressing, error detection, and medium
access control (sharing the wireless medium efficiently).
 Medium Access Control (MAC) Sub-layer: This sub-layer specifically manages how
devices share access to the wireless channel to avoid collisions.
 Network Layer: Responsible for routing data packets between different networks,
including addressing and forwarding mechanisms.
 Transport Layer: Provides reliable data transfer between applications on different
devices, ensuring data arrives in the correct order and without errors.
 Session Layer: Establishes, manages, and terminates sessions between communicating
applications.
 Presentation Layer: Deals with data format conversion (e.g., encryption/decryption) to
ensure compatibility between different systems.
 Application Layer: Provides network services to user applications, like web browsing,
email, or file transfer.

Benefits of a Reference Model:

 Standardization: The model promotes a common understanding of how wireless


networks function, facilitating communication between different devices and vendors.
 Interoperability: By following the reference model, different network components from
various manufacturers can potentially work together seamlessly.
 Problem Solving: The layered approach helps isolate issues by identifying which layer a
problem might originate from, making troubleshooting more efficient.

Understanding the reference model is not essential for everyday use of wireless networks,
but it provides valuable insight into the underlying mechanisms that enable wireless
communication.

Wireless networking offers flexibility and convenience, but it also comes with its own set of
challenges. Here's a breakdown of common issues encountered in wireless networks and the role
of standards in addressing them:

Wireless Networking Issues:

 Signal Interference: Radio waves used for wireless communication can be easily
disrupted by other signals or obstacles, causing weak signal, data corruption, or
disconnection. Sources of interference include:
o Other wireless devices operating on the same frequency band (e.g., multiple Wi-
Fi networks)
o Electronic devices like cordless phones, microwave ovens, bluetooth speakers
o Physical barriers like walls, trees, and buildings that can weaken or block the
signal
 Limited Range: The range of a wireless signal is generally shorter compared to wired
connections. Factors like frequency, transmission power, and obstacles all affect the
range. The signal strength weakens as it travels, limiting the effective coverage area of a
network.
 Security Vulnerabilities: Wireless networks are inherently more susceptible to security
threats compared to wired networks. Since data travels through the air, it can be
intercepted by unauthorized devices if proper security measures are not implemented.
Here are some potential security risks:
o Eavesdropping: Hackers can intercept data transmissions if the network is not
encrypted.
o Unauthorized Access: Unsecured networks allow unauthorized devices to
connect and potentially access sensitive information.
o War jamming: Deliberate interference with the signal to disrupt communication.
 Capacity Limitations: The bandwidth available in a wireless network is shared by all
connected devices. As the number of users or the amount of data traffic increases, the
network can become congested, leading to slower speeds and reduced performance.
 Multipath Fading: This phenomenon occurs when a radio signal reaches the receiver
through multiple paths due to reflections from obstacles. These paths can have different
lengths and cause the signal to arrive out of phase, leading to signal weakening or
distortion.

Wireless Networking Standards:


Wireless networking standards play a crucial role in mitigating these issues and ensuring smooth
communication. Here's how:

 Standardization of Frequencies: Standards like IEEE 802.11 define specific frequency


bands for Wi-Fi operation. This helps prevent overlapping channels and reduces
interference between different networks.
 Security Protocols: Standards like WPA2 and WPA3 provide robust encryption methods
to scramble data transmissions, making them unreadable by unauthorized devices.
 Data Transmission Rates: Standards like 802.11ac and Wi-Fi 6 offer higher data
transmission rates, improving network capacity and supporting more users and data
traffic.
 Interoperability: Standards ensure that devices from different manufacturers can
communicate seamlessly on a wireless network.
 Power Management: Standards like 802.11ax (Wi-Fi 6) introduce features for improved
power management, extending battery life for mobile devices.

By following these established standards, wireless network equipment manufacturers can create
devices that work together effectively, addressing security concerns and offering improved
performance and capacity. This contributes to a more reliable and user-friendly wireless
networking experience

MOBILE COMPUTING: Mobile communication, Mobile


computing, Mobile Computing Architecture, Mobile Devices,
Mobile System Networks, Mobility Management

1. Mobile Communication:

Imagine the foundation. Mobile communication is the infrastructure that enables wireless devices
to talk to each other. It provides the framework for data transmission, including voice calls, texts,
and internet access for your phone or tablet. Think cell towers, protocols, and bandwidth - all
working together to ensure smooth and reliable communication.

2. Mobile Computing:

Now, picture yourself using your phone on the go. Mobile computing refers to the entire
experience of using a portable computer for interaction and data processing. It encompasses:

 Mobile communication: As mentioned above, this is the backbone for transmitting and
receiving information.
 Mobile hardware: This includes your phone, tablet, or any other portable device itself.
 Mobile software: These are the apps you use, designed specifically for the limitations
and strengths of mobile devices.
So, mobile computing is the bigger picture, where you use your mobile device (powered by
mobile communication) for various tasks.

3. Mobile Computing Architecture:

This dives deeper into the organizational structure of mobile computing systems. It defines how
different components work together. Imagine an architect's blueprint for a mobile app. There can
be different architectures, but a common one is a three-tier model:

 Presentation Tier (User Interface): This is what you see and interact with on your
phone, like the app interface.
 Business Logic Tier: This is the behind-the-scenes engine that processes data and
performs actions based on your input.
 Data Tier (Database Management): This layer stores and manages all the data used by
the application.

Understanding these different parts helps developers build efficient and user-friendly mobile
apps.

4 Mobile Devices:

These are the handy companions you carry around - smartphones, tablets, laptops, even
smartwatches. They're designed to be portable and allow you to access information,
communicate, and complete tasks anytime, anywhere. Mobile devices typically come equipped
with:

 Operating System (OS): This software acts as the brain of the device, managing
resources and applications. Examples include Android, iOS for iPhones, and Windows.
 Processor: This chip handles all the calculations and processing power needed for your
apps and tasks to run smoothly.
 Memory (RAM): This temporary storage holds data currently in use for quick access.
 Storage (ROM): This is where apps, photos, music, and other files are permanently
stored.
 Connectivity Features: These allow your device to connect to mobile networks (WiFi,
cellular data), Bluetooth, GPS, etc.

5. Mobile System Networks:

Imagine a complex web of roads and bridges. Mobile system networks are the infrastructure that
enables your mobile device to communicate with others. These networks consist of:

 Cell Towers: These are strategically placed towers that transmit and receive signals from
mobile devices.
 Base Stations: These are the equipment housed within cell towers that connect to the
core network and handle communication between devices and the network.
 Switches and Routers: These act as traffic directors, guiding data packets across the
network to the right destination.
 Network Protocols: These are the defined rules that govern how devices communicate
on the network. Examples include protocols for cellular data (like 4G LTE, 5G) and WiFi.

6 Mobility Management:

This is the invisible magic behind seamless communication while you're on the move. Mobility
management ensures that your device stays connected even as you switch between cell towers. It
handles functions like:

 Location Tracking: The network keeps track of your approximate location by


identifying the cell tower you're connected to. This allows calls and messages to be
routed to you.
 Handoff: When you move from one cell tower's coverage area to another, mobility
management seamlessly transfers the connection to the new tower without interrupting
your call or data session.
 Security: Mobility management also plays a role in ensuring secure communication by
authenticating devices and encrypting data transmission.

In simpler terms:

 Mobile Devices: These are the tools you use.


 Mobile System Networks: This is the highway that carries your information.
 Mobility Management: This is the traffic control system that keeps everything running
smoothly.

WIRELESS LAN
A Wireless Local Area Network (WLAN), also sometimes called a Local Area Wireless
Network (LAWN), is a network that connects devices using radio waves instead of cables. This
allows for mobility within a limited area, like a home, office, school, or even a coffee shop,
while still being connected to the network. Here are some key points about WLANs:

 Technology: WLANs rely on IEEE 802.11 standards, which are more commonly known
as Wi-Fi. Wi-Fi is a trademark, but it's the most widely used technology for WLANs.
 Components:
o Access Point (AP): This is a base station that acts as a central hub for the WLAN.
It connects to the wired network (like the internet) and allows wireless devices to
connect to it. Think of it as a central translator between wired and wireless
communication.
o Wireless Devices: These are laptops, smartphones, tablets, printers, or any other
device with a Wi-Fi adapter that can connect to the WLAN.
 Benefits:
o Mobility: Users can move around within the coverage area and stay connected to
the network.
o Scalability: It's easier to add or remove devices from a WLAN compared to a
wired network.
o Cost-effective: Setting up a WLAN can be cheaper than installing cables
throughout a building.
o Feasibility: In some cases, using cables may not be possible (think historical
buildings), WLANs offer a good alternative.
 Limitations:
o Security: WLANs can be vulnerable to security breaches if not properly secured.
It's important to use strong passwords and encryption methods.
o Range: The signal strength of a WLAN can be limited by distance and obstacles.
o Speed: While WLAN speeds have improved significantly, they may not always
match the speeds of wired connections.

Overall, WLANs are a convenient and popular way to connect devices in a local area without the
hassle of cables. They offer mobility, ease of use, and are a good solution for many situations.

UNIT II: WIRELESS LAN: Infra-redVs. radio transmission,


Infrastructure and Ad-hoc Network, IEEE 802.11: System
Architecture, Protocol Architecture, 802.11b, 802.11a,
Newer Developments, HIPERLAN 1,HIPERLAN 2,
Bluetooth: User Scenarios, Architecture.
Compare Infra-red Vs. radio transmission in table
Feature Infra-Red (IR) Radio Transmission
Technology Invisible light waves Radio waves
Frequency Below red visible light Kilohertz (kHz) to Gigahertz (GHz)
Line-of-sight (LOS)
Transmission Can penetrate walls, longer distances
required
Range Limited (few meters) Wider range (meters to kilometers)
More secure (limited
Security Less secure (signals can be intercepted)
range, LOS)
Short-range (remote Long-range, multi-directional (cellular networks, Wi-
Applications
controls, night vision) Fi, Bluetooth, radio broadcasting)

Aspect Infrared Transmission Radio Transmission


Aspect Infrared Transmission Radio Transmission
Operates in the infrared portion of the Operates in the radio frequency
Electromagnetic
spectrum, approximately 700 nm to 1 portion, ranging from 1 mm to 100
Spectrum
mm. km.
Can travel longer distances and
Limited to short-range communication,
Propagation and penetrate obstacles, suitable for both
typically within a room or between
Range short-range and long-range
nearby devices, line-of-sight required.
communication.
Typically offers lower data rates due to Supports higher data rates, suitable
Data Rate narrower bandwidth and susceptibility for applications requiring faster
to interference. communication speeds.
Commonly used for remote controls, Ubiquitous in modern
proximity sensors, short-range data communication systems: Wi-Fi,
Applications
transfer between devices (e.g., Bluetooth, NFC, cellular networks,
smartphones, laptops). AM/FM radio, GPS, etc.
Can face interference from other
Susceptible to disruption by ambient
Interference wireless devices operating on the
light sources.
same frequency band.

Infrastructure and Ad-hoc networks:


1. Infrastructure Network:
o Definition: An infrastructure network is a type of network where devices
communicate with each other through a central infrastructure, typically a wireless
access point (AP) or a router.
o Components:
 Wireless Access Point (AP): This central device connects wireless
devices to a wired network (such as the internet) and facilitates
communication among them.
 Wired Backbone: The AP is connected to a wired network backbone,
which serves as the primary communication channel for data transfer.
 Client Devices: Devices like smartphones, laptops, tablets, or other
wireless-enabled devices connect to the AP to access the network and
communicate with each other.
o Functionality:
 The AP manages network traffic, assigns IP addresses to client devices,
and regulates communication within the network.
 Devices within an infrastructure network communicate through the AP.
The AP acts as a bridge between wireless and wired networks.
o Examples:
 Wi-Fi networks in homes, offices, cafes, airports, etc., where multiple
devices connect to a central Wi-Fi router or access point.
Cellular networks, where mobile devices communicate through cellular

towers connected to the wired network infrastructure.
2. Ad-hoc Network:
o Definition: An ad-hoc network, also known as a peer-to-peer network or a
decentralized network, is a type of network where devices communicate directly
with each other without the need for a central infrastructure.
o Characteristics:
 Decentralized: Ad-hoc networks don't rely on a central infrastructure like
access points or routers. Instead, each device in the network acts as a node,
relaying data to other devices.
 Dynamic: Devices in an ad-hoc network can join or leave the network
dynamically, and the network topology can change frequently.
 Self-Organizing: Ad-hoc networks self-organize to establish
communication paths between devices, adapting to changes in the network
environment.
o Functionality:
 Devices in an ad-hoc network communicate directly with each other,
forming a temporary network as needed.
 Ad-hoc networks are useful in situations where establishing a centralized
infrastructure is impractical or impossible, such as in emergency situations,
military operations, or peer-to-peer file sharing.
o Examples:
 Wireless mesh networks, where nodes communicate with each other to
relay data and extend network coverage without the need for a central
access point.
 Mobile ad-hoc networks (MANETs), where mobile devices form
temporary networks to share resources or communicate in environments
without established infrastructure, like disaster areas or remote locations.

In summary, infrastructure networks rely on a central access point or router for communication,
while ad-hoc networks allow devices to communicate directly with each other without the need
for a central infrastructure. Each type has its advantages and is suitable for different use cases
and environments.

Differences between Infrastructure and Ad-hoc networks:

Aspect Infrastructure Network Ad-hoc Network


Central Relies on a central access point (AP) No central infrastructure required;
Infrastructure or router. devices communicate directly.
Star topology, with devices connecting Can have various topologies, such as
Topology
to the central AP/router. mesh or peer-to-peer.
Generally more scalable, as additional Scalability depends on the ability of
Scalability devices can connect through the devices to form direct connections
central infrastructure. with each other.
Dependency Dependent on the availability and Less dependent on external
Aspect Infrastructure Network Ad-hoc Network
functionality of the central infrastructure, suitable for dynamic
infrastructure. environments.
Typically requires configuration andDevices can join or leave the network
Network Setup
setup of the central AP/router. dynamically without centralized setup.
Provides more flexibility as devices
Offers less flexibility in terms of
Flexibility can communicate directly with each
network setup and configuration.
other.
Generally more resilient to failures as
Vulnerable to single points of failure
Fault Tolerance communication routes can adapt
at the central infrastructure.
dynamically.
Distributed control, with each device
Centralized control over network
Control responsible for its communication and
access, security, and management.
security.
Suitable for providing broad network More suitable for smaller, localized
Coverage
coverage in large areas. networks or dynamic environments.
Commonly used in homes, offices, Used in scenarios like emergency
Use Cases public Wi-Fi hotspots, and corporate response, military operations, and
networks. peer-to-peer file sharing.

These differences highlight the contrasting characteristics and applications of Infrastructure and
Ad-hoc networks.

IEEE 802.11: System and Protocol Architecture


The IEEE 802.11 standard, more commonly known as Wi-Fi, defines the architecture for
Wireless Local Area Networks (WLANs). It outlines how devices connect and communicate
wirelessly. Here's a breakdown of the system and protocol architecture of IEEE 802.11:

System Architecture:

This describes the physical components and their roles in a WLAN. Imagine the blueprint of a
house:

 Stations (STA): These are all the devices that can connect to the network, including
laptops, smartphones, tablets, and printers. Each station has a wireless network interface
controller (WNIC) that allows it to communicate wirelessly. Think of these as the rooms
and appliances in the house.
 Basic Service Set (BSS): This is the fundamental building block of a WLAN. It consists
of a group of stations communicating at the physical layer. There are two types of BSS:
o Independent BSS (IBSS): An ad-hoc network where stations connect directly
with each other, like a group of friends having a picnic and sharing resources
directly (no central point).
o Infrastructure BSS (IBSS): A network with a central coordinator called an
Access Point (AP). Stations connect to the AP to access the network and the
internet (if available). Think of this as a house with a central router that all
devices connect to for internet access.
 Extended Service Set (ESS): This is a larger network formed by connecting multiple
BSS together, often through a wired backbone (like a cable or fiber optic connection).
Imagine a neighborhood with multiple houses (BSS) connected by a central street (wired
network).
 Distribution System (DS): This is the wired network that connects multiple access
points in an ESS. It's like the hidden network of pipes and cables that provide utilities to
all the houses in a neighborhood.

Protocol Architecture:

This defines the communication protocols used between devices in a WLAN. Imagine the set of
rules and languages everyone in a house uses to communicate.

 Physical Layer (PHY): This layer handles the actual transmission and reception of radio
signals over the air. It defines things like frequency bands, modulation techniques, and
signal strength. Think of this as the language used for basic communication (turning
lights on/off, opening doors).
 Medium Access Control (MAC) Layer: This layer manages how devices share the
wireless medium and avoid collisions when transmitting data. It uses protocols like
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) to ensure orderly
communication. Think of this as the set of rules everyone follows to avoid talking over
each other (taking turns to speak, raising hands).
 Logical Link Control (LLC) Layer (Optional): This layer provides a service interface
between the MAC layer and higher network layers. It's not always implemented in all
WLAN devices. Imagine this as an optional translator that helps devices from different
"speaking styles" understand each other.
 Higher Network Layers: These layers (like Network Layer, Transport Layer,
Application Layer) are responsible for routing data packets, establishing connections, and
providing specific network services. They operate the same way in WLANs as they do in
wired networks. Imagine these as the specific conversations people have in the house
(ordering food, watching TV, playing games).

Understanding the system and protocol architecture of IEEE 802.11 helps you appreciate the
complex behind-the-scenes work that enables seamless wireless connectivity. It's like
understanding the hidden systems that keep a house functioning smoothly, allowing everyone to
enjoy the benefits of a comfortable and connected environment.

comparison chart between IEEE 802.11b and 802.11a:

Aspect IEEE 802.11b IEEE 802.11a


Frequency
Operates in the 2.4 GHz band. Operates in the 5 GHz band.
Band
Aspect IEEE 802.11b IEEE 802.11a
Maximum Data
Maximum data rate of up to 11 Mbps. Maximum data rate of up to 54 Mbps.
Rate
Uses Complementary Code Keying
Modulation Uses Orthogonal Frequency Division
(CCK) and Direct Sequence Spread
Technique Multiplexing (OFDM).
Spectrum (DSSS).
More susceptible to interference from
Less susceptible to interference due to
other devices operating in the 2.4 GHz
Interference less crowded spectrum in the 5 GHz
band, such as Bluetooth devices and
band.
microwave ovens.
Offers longer range compared to Provides shorter range compared to
Range 802.11a due to lower frequency, making 802.11b but offers better performance
it better suited for indoor deployments. in terms of throughput and reliability.
Compatible with older devices and
Not backward compatible with
Compatibility infrastructure that support the 802.11b
802.11b devices.
standard.
Channel Utilizes wider channel bandwidth,
Utilizes 22 MHz channel bandwidth.
Bandwidth typically 20 MHz or 40 MHz.
Suitable for enterprise environments,
Commonly used in home and small
Suitable streaming multimedia, and
business environments for basic internet
Applications applications requiring higher
access and file sharing.
throughput.
Well-suited for deployments where cost Ideal for high-density environments
Usage Scenario and compatibility with existing and applications demanding higher
infrastructure are priorities. performance and reliability.
Initially faced slower adoption due to
Widely adopted due to its early
higher cost and limited availability of
Availability introduction and compatibility with
devices, but gained popularity as
legacy systems.
technology matured.
Considered obsolete in favor of newer
Considered obsolete due to its slower
standards like 802.11ac and 802.11ax,
Obsolete Status data rate and susceptibility to
but still in use in legacy systems and
interference.
devices.

These points highlight the key differences between IEEE 802.11b and 802.11a in terms of
frequency band, data rate, modulation technique, interference, range, compatibility, channel
bandwidth, suitable applications, usage scenarios, availability, and current status.

HIPERLAN 1 vs. HIPERLAN 2:


Aspect HIPERLAN1 HIPERLAN2
Developed in the late 1990s as part of Introduced as an evolution of
Introduction
the European Telecommunications HIPERLAN1, with improvements
Aspect HIPERLAN1 HIPERLAN2
Standards Institute (ETSI) in performance, QoS, and support
standardization efforts. for multimedia applications.
Operates in the 5 GHz band, similar
Frequency Band Operates in the 5 GHz band.
to HIPERLAN1.
Provides higher data rates, up to 54
Data Rate Offers data rates up to 23.5 Mbps.
Mbps.
Uses Orthogonal Frequency
Modulation Utilizes Frequency Hopping Spread Division Multiplexing (OFDM),
Technique Spectrum (FHSS). providing higher spectral
efficiency.
Adopts a Carrier Sense Multiple
Employs a Time Division Multiple
MAC Protocol Access with Collision Avoidance
Access (TDMA) protocol.
(CSMA/CA) protocol.
Enhances QoS support with
Quality of Provides basic QoS features for voice mechanisms for prioritization and
Service and data traffic. traffic scheduling, suitable for
multimedia applications.
Provides extended coverage range
Offers moderate coverage range suitable
compared to HIPERLAN1, suitable
Coverage for indoor and short-range outdoor
for both indoor and outdoor
deployments.
deployments.
Achieves better interoperability
Lacked interoperability with Wi-Fi and
with Wi-Fi standards through
Interoperability other WLAN standards due to different
compatibility with 802.11a/g
modulation and MAC protocols.
networks.
Enhances security mechanisms with
Supports basic security features like
Security improved encryption algorithms
encryption and authentication.
and authentication protocols.
Improves mobility support with
Limited support for mobility, primarily
seamless handover between access
Mobility Support designed for fixed and nomadic
points (APs), suitable for mobile
deployments.
and vehicular applications.
Enhances voice support with better
Supports basic voice services with QoS mechanisms, enabling reliable
Voice Support
limited QoS capabilities. voice communication over the
network.
Enhances multimedia support with
Multimedia Provides limited support for multimedia higher data rates and improved
Support applications with lower data rates. QoS, suitable for streaming video
and audio.
Considered an early WLAN standard but Gained popularity as a successor to
Standards Status
faced slower adoption due to limited HIPERLAN1, particularly in
Aspect HIPERLAN1 HIPERLAN2
interoperability and availability of Europe, but faced competition from
compatible devices. Wi-Fi standards globally.
Experienced broader commercial
Limited commercial availability,
Commercial deployment, particularly in Europe,
primarily deployed in niche markets and
Availability but still remained overshadowed by
specific applications.
Wi-Fi in global markets.
Considered a legacy standard due to Regarded as a legacy standard
Legacy Status limited deployment and advancements in despite broader deployment in
Wi-Fi technology. specific regions and applications.
Paved the way for future
Served as the foundation for subsequent
advancements in WLAN
Evolution WLAN standards and technologies,
technology, influencing standards
including Wi-Fi.
like IEEE 802.11n/ac/ax.

These points highlight the key differences between HIPERLAN1 and HIPERLAN2 in terms of
their development, technical specifications, capabilities, interoperability, security, mobility
support, multimedia support, standards status, commercial availability, and legacy status.

Additional Notes:

 HIPERLAN 2 offered multiple flavors with varying data rates and power levels for
different needs.
 While offering potential advantages, HIPERLAN 2 ultimately lost the market battle to
Wi-Fi due to factors like timing and industry support.

In essence, HIPERLAN 2 aimed to improve upon HIPERLAN 1 by offering:

 Faster data rates


 More efficient use of the radio spectrum
 Improved signal robustness
 Potentially wider coverage area
 Lower power consumption
 Enhanced security

However, despite these advancements, HIPERLAN 2 never achieved widespread adoption,


leaving its mark primarily as a stepping stone in wireless technology development.

BLUETOOTH USER SCENERIOS

Bluetooth technology facilitates various user scenarios across different domains:

1. Wireless Personal Area Network (WPAN):


o Bluetooth enables the creation of WPANs, allowing devices in close proximity to
communicate wirelessly.
o Common scenarios include connecting smartphones to hands-free headsets,
linking a laptop to a wireless mouse or keyboard, or syncing a smartwatch with a
smartphone.
2. Audio Streaming:
o Bluetooth is widely used for wireless audio streaming between devices.
o Users can stream music from smartphones, tablets, or computers to Bluetooth-
enabled speakers, headphones, or car audio systems.
3. Peripheral Connectivity:
o Bluetooth facilitates the connection of peripheral devices to host devices without
the need for cables.
o This includes pairing wireless printers, scanners, and game controllers with
computers or gaming consoles.
4. Automotive Applications:
o In-car Bluetooth connectivity enables hands-free calling, audio streaming, and
integration with infotainment systems.
o Users can make phone calls, access contacts, and stream music from their
smartphones while driving.
5. Internet of Things (IoT):
o Bluetooth is increasingly used in IoT applications, allowing smart devices to
communicate and interact with each other.
o Examples include smart home devices like thermostats, light bulbs, and door
locks that can be controlled via a smartphone.

Components of Bluetooth Architecture:

1. Bluetooth Radio (RF):


o The Bluetooth Radio layer comprises the hardware components responsible for
transmitting and receiving Bluetooth signals.
o It includes the radio transceiver, which modulates digital data into radio waves for
transmission and demodulates received radio waves back into digital data.
2. Baseband Layer:
o The Baseband layer handles the physical and data link layers of the Bluetooth
protocol.
o It defines the packet format, modulation techniques, error correction, and
frequency hopping for wireless communication.
o The Baseband layer also manages link establishment, connection maintenance,
and data transmission between Bluetooth devices.
3. Host Controller Interface (HCI):
o HCI provides a standardized interface between the Bluetooth hardware (radio)
and the higher layers of the protocol stack.
o It defines commands and events for controlling the Bluetooth radio and
exchanging data between the host (software) and the Bluetooth controller.
o HCI enables communication between the Bluetooth stack running on the host
device's operating system and the Bluetooth hardware.
4. Link Manager Protocol (LMP):
o LMP is responsible for managing the link between Bluetooth devices.
oIt handles tasks such as device discovery, connection establishment,
authentication, encryption, and power control.
o LMP communicates with HCI to exchange control messages and manage the
Bluetooth link.
5. Logical Link Control and Adaptation Protocol (L2CAP):
o L2CAP provides multiplexing and segmentation services for data packets
transmitted over Bluetooth links.
o It adapts higher-layer protocols and application data for transmission over
Bluetooth connections.
o L2CAP supports both connection-oriented and connectionless data transmission
modes.
6. Bluetooth Profiles:
o Bluetooth profiles define the capabilities and functionalities of Bluetooth devices
for specific applications or use cases.
o Each profile specifies the protocol stack, data formats, and procedures required to
support a particular Bluetooth service.
o Examples of Bluetooth profiles include Hands-Free Profile (HFP), Advanced
Audio Distribution Profile (A2DP), and Human Interface Device Profile (HID).

The block diagram illustrates the layered architecture of Bluetooth, with each layer responsible
for specific functions and interactions between Bluetooth devices. The Bluetooth stack
implements these layers, facilitating wireless communication and enabling a wide range of
applications and services.

What is Bluetooth?
Bluetooth is used for short-range wireless voice and data communication. It
is a Wireless Personal Area Network (WPAN) technology and is used for
data communications over smaller distances. This generation changed into
being invented via Ericson in 1994. It operates within the unlicensed,
business, scientific, and clinical (ISM) bands from 2.4 GHz to 2.485 GHz.
Bluetooth stages up to 10 meters. Depending upon the version, it presents
information up to at least 1 Mbps or 3 Mbps. The spreading method that it
uses is FHSS (Frequency-hopping unfold spectrum). A Bluetooth network is
called a piconet and a group of interconnected piconets is called a scatternet.
What is Bluetooth?
Bluetooth simply follows the principle of transmitting and receiving data
using radio waves. It can be paired with the other device which has also
Bluetooth but it should be within the estimated communication range to
connect. When two devices start to share data, they form a network called
piconet which can further accommodate more than five devices.
Key Features of Bluetooth
 The transmission capacity of Bluetooth is 720 kbps.
 Bluetooth is a wireless device.
 Bluetooth is a Low-cost and short-distance radio communications
standard.
 Bluetooth is robust and flexible.
 The basic architecture unit of Bluetooth is a piconet.
Architecture of Bluetooth
The architecture of Bluetooth defines two types of networks:
Piconet: Piconet is a type of Bluetooth network that contains one primary
node called the master node and seven active secondary nodes called slave
nodes. Thus, we can say that there is a total of 8 active nodes which are
present at a distance of 10 meters. The communication between the primary
and secondary nodes can be one-to-one or one-to-many. Possible
communication is only between the master and slave; Slave-slave
communication is not possible. It also has 255 parked nodes, these are
secondary nodes and cannot take participation in communication unless it
gets converted to the active state.

Bluetooth Architecture

Scatternet: It is formed by using various piconets. A slave that is present in


one piconet can act as master or we can say primary in another piconet. This
kind of node can receive a message from a master in one piconet and deliver
the message to its slave in the other piconet where it is acting as a master.
This type of node is referred to as a bridge node. A station cannot be
mastered in two piconets.
Bluetooth Protocol Stack
1. Radio (RF) layer:
 It specifies the details of the air interface, including frequency, the use
of frequency hopping and transmit power.
 It performs modulation/demodulation of the data into RF signals.
 It defines the physical characteristics of Bluetooth transceivers.
 It defines two types of physical links: connection-less and connection-
oriented.
2. Baseband Link layer:
 The baseband is the digital engine of a Bluetooth system and is
equivalent to the MAC sublayer in LANs.
 It performs the connection establishment within a piconet,
addressing, packet format, timing and power control.
3. Link Manager protocol layer:
 It performs the management of the already established links which
includes authentication and encryption processes.
 It is responsible for creating the links, monitoring their health, and
terminating them gracefully upon command or failure.
4. Logical Link Control and Adaption (L2CAP) Protocol layer:
 It is also known as the heart of the Bluetooth protocol stack.
 It allows the communication between upper and lower layers of the
Bluetooth protocol stack.
 It packages the data packets received from upper layers into the
form expected by lower layers.
 It also performs segmentation and multiplexing.
5. Service Discovery Protocol (SDP) layer:
 It is short for Service Discovery Protocol.
 It allows discovering the services available on another Bluetooth-
enabled device.
6. RF comm layer:
 It is a cabal replacement protocol.
 It is short for Radio Frontend Component.
 It provides a serial interface with WAP and OBEX.
 It also provides emulation of serial ports over the logical link
control and adaption protocol(L2CAP).
 The protocol is based on the ETSI standard TS 07.10.
7. OBEX:
 It is short for Object Exchange.
 It is a communication protocol to exchange objects between 2
devices.
8. WAP:
 It is short for Wireless Access Protocol.
 It is used for internet access.
9. TCS: It is short for Telephony Control Protocol. It provides telephony
service. The basic function of this layer is call control (setup & release)
and group management for the gateway serving multiple devices.
10. Application layer:
It enables the user to interact with the application.

Bluetooth Protocol Stack

Types of Bluetooth
Various types of Bluetooth are available in the market nowadays. Let us look
at them.
 In-Car Headset: One can make calls from the car speaker system without
the use of mobile phones.
 Stereo Headset: To listen to music in car or in music players at home.
 Webcam: One can link the camera with the help of Bluetooth with their
laptop or phone.
 Bluetooth-equipped Printer: The printer can be used when connected
via Bluetooth with mobile phone or laptop.
 Bluetooth Global Positioning System (GPS): To use Global Positioning
System (GPS) in cars, one can connect their phone with car system via
Bluetooth to fetch the directions of the address.
Advantages of Bluetooth
 It is a low-cost and easy-to-use device.
 It can also penetrate through walls.
 It creates an Ad-hoc connection immediately without any wires.
 It is used for voice and data transfer.
Disadvantages of Bluetooth
 It can be hacked and hence, less secure.
 It has a slow data transfer rate of 3 Mbps.
 Bluetooth communication does not support routing.
Applications of Bluetooth
 It can be used in wireless headsets, wireless PANs, and LANs.
 It can connect a digital camera wireless to a mobile phone.
 It can transfer data in terms of videos, songs, photographs, or files from
one cell phone to another cell phone or computer.
 It is used in the sectors of Medical healthcare, sports and fitness, Military.

UNIT III: GLOBAL SYSTEM FOR MOBILE


COMMUNICATIONS (GSM): Mobile Services, System
Architecture, Protocols, Localization & Calling, Handover,
Security.GPRS: GPRS System Architecture, UMTS: UMTS
System Architecture. LTE: Long Term Evolution, 4G, 5G.
GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS (GSM)

GSM (Global System for Mobile Communications) is a widely used standard for digital cellular
communication. It was developed to replace the analog cellular networks that were prevalent
before its introduction. GSM has become the de facto standard for mobile telecommunications
worldwide, with over 90% of the global market share.

GSM Mobile Services:

1. Voice Calls:
o GSM provides the fundamental service of voice calls. Users can make and receive
calls using GSM-compatible mobile phones.
o Voice calls are digitally encoded and transmitted over the GSM network, offering
improved voice quality compared to analog systems.
2. Short Message Service (SMS):
o SMS allows users to send short text messages (up to 160 characters) between
GSM-compatible mobile phones.
o SMS messages are transmitted over the signaling channels of the GSM network
and are typically delivered in near real-time.
3. Data Services:
o GSM supports data services, enabling users to access the internet, send emails,
and use other data applications.
o Data transmission rates in GSM are relatively slow compared to modern standards,
typically ranging from 9.6 kbps to 14.4 kbps.
4. Multimedia Messaging Service (MMS):
o MMS enables users to send multimedia content such as images, videos, and audio
clips between GSM-compatible mobile phones.
o MMS messages can contain a combination of text, images, audio, and video,
providing a richer communication experience compared to SMS.
5. Fax Services:
o GSM networks support fax services, allowing users to send and receive fax
documents using GSM-compatible mobile phones or fax machines connected to
the network.
6. Roaming:
o GSM enables users to roam between different GSM networks seamlessly.
o Roaming agreements between network operators allow subscribers to use their
mobile phones while traveling outside their home network coverage area,
ensuring continuous connectivity.
7. Security Features:
o GSM incorporates various security features to protect user communications and
data.
o Authentication, encryption, and mutual authentication between the mobile device
and the network help prevent unauthorized access and eavesdropping.
8. Supplementary Services:
o GSM provides a range of supplementary services to enhance the user experience.
o These services include call forwarding, call waiting, conference calling, caller ID,
and voicemail.

Overall, GSM mobile services offer a comprehensive suite of communication capabilities,


enabling users to stay connected, exchange information, and access a wide range of services
using GSM-compatible mobile devices.

GSM System Architecture: A Block Diagram Breakdown


The Global System for Mobile Communications (GSM) utilizes a structured architecture to
facilitate communication between mobile devices and the network. Here's a breakdown with a
block diagram:

Explanation of Components:

 Mobile Station (MS): Represents the mobile device used by a subscriber (e.g., phone,
tablet). It consists of:
o Mobile Equipment (ME): The physical device the user interacts with.
o Subscriber Identity Module (SIM): Stores subscriber information and enables
network access.
 Base Station Subsystem (BSS): Manages radio communication with mobile stations. It
includes:
o Base Transceiver Station (BTS): Handles radio signal transmission and
reception within a cell.
o Base Station Controller (BSC): Controls multiple BTSs, manages handovers,
and performs call routing functions.
 Network Switching Subsystem (NSS): The core network for call routing, mobility
management, and authentication. It includes:
o Mobile Switching Center (MSC): Performs call switching, routing, and manages
handovers between BSCs.
o Visitor Location Register (VLR): Stores temporary location information for
roaming mobile stations.
o Home Location Register (HLR): Stores permanent subscriber information.
o Equipment Identity Register (EIR): Contains information about mobile
equipment validity for security.
 Operation Support Subsystem (OSS): Provides network management functionalities,
including:
o Fault Management: Detecting and resolving network issues.
o Performance Management: Monitoring network performance metrics.
o Security Management: Implementing security measures.
o Billing Management: Generating and managing subscriber bills.

Communication Flow:

1. The mobile station communicates with the nearest BTS using radio signals.
2. The BTS transmits signals to the BSC, which manages communication for multiple BTSs.
3. The BSC connects to the MSC, the central switching element in the NSS.
4. The MSC performs call routing, interacts with the VLR and HLR for subscriber
information, and utilizes the EIR for security checks.
5. The OSS monitors the entire network operation and takes corrective actions if needed.

This block diagram provides a simplified overview of the GSM system architecture. Each
component plays a vital role in establishing, maintaining, and managing communication between
mobile devices and the network.

GSM Protocols
GSM, or Global System for Mobile Communication, relies on a complex set of protocols to
function. These protocols are layered, meaning each layer performs specific tasks and interacts
with the layers above and below it. Here's a breakdown of the key GSM protocols:

Protocol Stack:

Imagine a stack of boxes, with each box representing a layer. The bottom layer deals with the
most basic aspects of communication, while the higher layers handle more complex functions.
GSM uses a similar structure with four layers:

1. Physical Layer: This layer handles the radio aspects of communication, including signal
transmission, frequency allocation (FDMA/TDMA), and error correction.
2. Data Link Layer: This layer ensures data transmission reliability. It breaks data into
packets, adds error detection codes, and manages data flow. Protocols like LAPDm
(modified Link Access Protocol D-channel) operate here.
3. Network Layer: This layer is responsible for setting up and maintaining connections. It
handles tasks like call routing, location management (tracking phone location), and
handover (switching between cell towers).
4. Communication Layer: This top layer deals with user-related services like call control,
short message service (SMS) management, and supplementary services (call waiting,
voicemail).

Additional Protocols:

 Signaling System No. 7 (SS7): This protocol enables communication between different
network elements, like the Mobile Switching Center (MSC) that routes calls.
 Base Station Subsystem (BSS) protocols: These protocols manage communication
between the phone and the Base Transceiver Station (BTS). Examples include BSSAP
(BSS-Application Part).

Understanding GSM protocols can get technical, but hopefully, this explanation provides a basic
overview of how these protocols work together to enable mobile communication on the GSM
network.

Security Mechanisms:

GSM implements several security features to protect user privacy and communication integrity:

 Subscriber Identity Module (SIM): The SIM card securely stores a unique identifier
(IMSI) and a secret key for authentication.
 Authentication: When you turn on your phone, the network initiates an authentication
challenge. The SIM uses a cryptographic algorithm (A3) and the secret key to generate a
response (SRES) that proves your identity to the network.
 Encryption: GSM supports encryption for specific data services like GPRS (General
Packet Radio Service) using a temporary encryption key (Kc) generated by a ciphering
key generation algorithm (A8) stored on the SIM. This protects the confidentiality of the
data being transmitted.
 Temporary Mobile Subscriber Identity (TMSI): To prevent eavesdropping and protect
user identity, the network assigns a temporary identifier (TMSI) to your phone when it
connects to the network. TMSI is used instead of IMSI for most communication within
the network.

Additional Security Considerations:

 While GSM offers a basic level of security, it's not foolproof. More advanced encryption
techniques are used in later generations of cellular networks (3G, 4G, 5G) to address
evolving security threats.
 It's crucial to protect your PIN and PUK codes associated with your SIM card to prevent
unauthorized access.

GPRS: GPRS System Architecture

GPRS (General Packet Radio Service) builds upon the existing GSM network infrastructure to
provide packet-based data transmission. Here's a breakdown of the key elements in a GPRS
system architecture:

Core Network Elements:

 Mobile Switching Center (MSC): This network element, also present in GSM, is
responsible for call routing and handover management. In GPRS, it also routes data
packets.
 Serving GPRS Support Node (SGSN): This new element in GPRS acts like a mobile
data router. It keeps track of active GPRS users within its coverage area, routes data
packets to and from the mobile station (MS), and performs functions like mobility
management (handover for GPRS data sessions).
 Gateway GPRS Support Node (GGSN): Another new element, the GGSN acts as the
interface between the GPRS network and external networks like the internet. It routes
data packets to their final destination (another device on the internet) and performs tasks
like security (authentication) and billing.

Radio Access Network Elements:

 Base Transceiver Station (BTS): These remain the same as in GSM, handling radio
signal transmission and reception. However, they are enhanced to handle GPRS data
traffic in addition to voice calls.
 Base Station Controller (BSC): Similar to the BTS, the BSC also sees an upgrade to
handle GPRS data channels alongside voice channels.

Mobile Station (MS):

 Your mobile phone with a GPRS enabled SIM card acts as the MS. It communicates with
the BTS using packet data protocols on designated GPRS time slots within the GSM
radio channels.

Interfaces:

 Several interfaces connect these elements, enabling data flow and control signaling:
o Gb interface: Connects the BTS to the BSC.
o Gs interface: Connects the BSC to the SGSN.
o Gi interface: Connects the SGSN to the GGSN.
o Gn interface: Connects the SGSN to the MS.

Benefits of GPRS Architecture:

 Efficient Radio Usage: GPRS utilizes unused time slots within the GSM channels for
data transmission, making efficient use of existing radio resources.
 Packet-Based Transmission: GPRS uses a packet-based approach, allowing for better
resource allocation and bursty data transfer compared to dedicated circuits for data.
 Scalability: The architecture can be expanded to accommodate more users as needed.

Overall, the GPRS system architecture leverages the existing GSM infrastructure with the
addition of new elements like SGSN and GGSN to provide a packet-based data service over the
mobile network. This paved the way for early mobile internet access and data applications.

UMTS
The Universal Mobile Telecommunications System (UMTS) is a third-generation (3G) mobile
communications technology that succeeded GSM (2G). Its architecture is quite intricate but can
be simplified into several key components:

1. User Equipment (UE): UE refers to the mobile device used by subscribers, such as
smartphones, tablets, or data cards.
2. Radio Network Subsystem (RNS):
oNode B (base station): Responsible for transmitting and receiving radio signals
to and from the UE.
o Radio Network Controller (RNC): Controls one or more Node Bs, manages
radio resources, and handles mobility and handover between cells.
3. Core Network (CN):
o Serving GPRS Support Node (SGSN): Handles packet-switched data
connections for UMTS devices, responsible for mobility management and session
management.
o Gateway GPRS Support Node (GGSN): Acts as a gateway between the UMTS
network and external packet-switched networks (like the internet).
o Mobile Switching Center (MSC): Manages circuit-switched connections,
including voice calls.
o Home Location Register (HLR): Stores subscriber information, including user
profiles and location information.
o Visitor Location Register (VLR): Temporarily stores information about
subscribers currently located in the area served by the MSC.
o Authentication Center (AuC): Responsible for authentication and encryption
key generation.
o Equipment Identity Register (EIR): Stores information related to the identity of
mobile equipment, helping to prevent theft and fraud.
4. Multimedia Messaging Service (MMS) Architecture:
o MMSC (Multimedia Messaging Service Center): Handles the storage,
transcoding, and forwarding of multimedia messages (e.g., pictures, videos).
5. IP Multimedia Subsystem (IMS):
o Call Session Control Function (CSCF): Provides session control for voice and
multimedia sessions.
o Home Subscriber Server (HSS): Stores subscriber profiles and authentication
information.
o Proxy Call Session Control Function (P-CSCF): Serves as the entry point for
SIP signaling messages.
o Media Gateway Control Function (MGCF): Interfaces between the IMS
network and the PSTN (Public Switched Telephone Network) for voice call setup.

These components work together to enable various services such as voice calls, SMS, MMS,
mobile internet access, and video calling within the UMTS network. Additionally, UMTS also
supports data speeds higher than those of its predecessor GSM, facilitating services like mobile
broadband.

LTE
LTE stands for Long Term Evolution, and it's a standard for wireless broadband communication.
It's commonly known as 4G LTE, succeeding older 3G technologies. LTE offers higher data
speeds, lower latency, and improved capacity compared to its predecessors. Here's a breakdown
of some key aspects:
1. Speed: LTE provides significantly faster data speeds compared to 3G networks.
Depending on network conditions, it can offer download speeds ranging from tens to
hundreds of megabits per second (Mbps) and upload speeds in the tens of Mbps.
2. Latency: LTE networks have lower latency compared to 3G, which means data packets
travel more quickly between devices and network servers. This lower latency is essential
for real-time applications like online gaming, video calls, and voice over IP (VoIP).
3. Efficiency: LTE networks are more efficient in their use of spectrum, allowing for more
data to be transmitted over the same bandwidth. This efficiency results in better overall
network performance and a smoother user experience, especially in densely populated
areas.
4. Capacity: LTE networks can handle more simultaneous connections and data traffic
compared to 3G networks, making them better suited to support the growing number of
devices and applications requiring high-speed internet access.
5. Coverage: LTE networks typically offer broader coverage compared to older
technologies, with support for both urban and rural areas. However, coverage can vary
depending on factors such as terrain, infrastructure, and network deployment.
6. Backward compatibility: LTE is designed to be backward compatible with existing 2G
and 3G networks, ensuring that older devices can still connect to the network even as
LTE becomes more widespread.

Overall, LTE represents a significant advancement in wireless communication technology,


providing faster speeds, lower latency, and improved performance compared to previous
generations. It serves as the foundation for many modern mobile broadband services and enables
a wide range of applications and services on smartphones, tablets, and other connected devices.

comparison between LTE, 4G, and 5G in a table format:

Aspect LTE 4G 5G
Generation 3.9G (pre-4G) 4G 5G
Up to hundreds of Up to hundreds of
Data Speed Up to multiple Gbps
Mbps Mbps
Significantly lower latency, near
Latency Lower than 3G Lower than 3G
real-time communication
Higher capacity, more
Capacity Improved over 3G Improved over 3G simultaneous connections and
data traffic support
Efficiency More efficient than 3G More efficient than 3G More efficient spectrum usage
Broad coverage, with potential
Coverage Broad coverage Broad coverage for better coverage in high-
frequency bands
Compatible with previous
Backward Compatible with 2G Compatible with 2G
generations, support for legacy
Compatibility and 3G networks and 3G networks
devices
Aspect LTE 4G 5G
Supports high-speed Supports high-speed Enables new applications like
Applications internet, multimedia internet, multimedia IoT, critical communications,
streaming, and more streaming, and more and immersive experiences

This table highlights some of the key differences and improvements between LTE (often
considered 4G), 4G, and 5G technologies.

4g and 5g
1. Speed: 4G offers up to 1 Gbps, while 5G boasts theoretical speeds of up to 20 Gbps,
making it significantly faster.
2. Latency: 4G has moderate latency, whereas 5G offers much lower latency for near-
instantaneous responses.
3. Applications: 4G supports common tasks like streaming and gaming, while 5G paves the
way for demanding applications like VR and autonomous vehicles.
4. Technology: 4G relies on LTE (Long-Term Evolution), while 5G utilizes new radio
technology.
5. Development: 4G is a mature technology, while 5G is under development with
expanding coverage.
6. Device Compatibility: Most devices work with 4G, but only 5G-enabled devices can
access 5G networks.
7. Cost: 4G plans are generally less expensive, while 5G plans might have higher costs
initially.
8. Availability: 4G has widespread coverage, whereas 5G availability is still limited in
some areas.
9. Spectrum: 4G uses lower frequency bands, while 5G utilizes both lower and higher
frequency bands.
10. Overall: 4G is sufficient for current needs, while 5G is a future-proof technology for
demanding applications.

IP Packet Delivery
IP packet delivery is the process of sending data packets from a source device (sender) to a
destination device (receiver) across an internet protocol (IP) network. Here's a breakdown of the
key steps involved:

1. Encapsulation:

 The data (email, webpage, etc.) is broken down into smaller units called packets.
 Each packet gets a header attached. This header includes crucial information like:
o Source IP address: Address of the sending device.
o Destination IP address: Address of the receiving device.
o Other control information: This helps routers route the packet efficiently.

2. Addressing and Routing:

 Routers are network devices responsible for directing packets towards their final
destination.
 They use the destination IP address in the packet header to determine the most efficient
route.
 Routers maintain routing tables that map IP addresses to outgoing network interfaces.
 Based on the routing table, the router forwards the packet to the next hop on the path
towards the destination.

3. Sending the Packet:

 The router sends the packet out the appropriate network interface based on the routing
table.
 This process repeats at each router along the path until the packet reaches the final
destination network.

4. Decapsulation:

 Once the packet arrives at the destination network, it reaches the destination device.
 The destination device removes the header (decapsulation) to access the actual data.
 The data is then delivered to the appropriate application on the device (web browser,
email client, etc.).

Additional Points:

 Packets can travel through multiple networks with different routers making the decisions.
 The path a packet takes can be dynamic and may change depending on network traffic
congestion or router failures.
 Error checking mechanisms are in place to ensure data integrity during transmission. Lost
or corrupted packets can be retransmitted.

Types of IP Delivery:

 Direct Delivery: This occurs when the source and destination devices are on the same
network segment. The router on the same segment delivers the packet directly.
 Indirect Delivery: When devices are on different network segments, routers across the
internet work together to route the packet to the destination.

Agent Discovery
In Mobile IP, Agent Discovery is a crucial process that allows a mobile node (your phone or
laptop) to determine its network status and locate the necessary agents for communication.
Here's a breakdown of what happens during Agent Discovery:

Purpose:

 Identify the type of network the mobile node is currently connected to (home network or
foreign network).
 Locate a Foreign Agent (FA) on the foreign network if needed.
 Learn the care-of address (temporary IP address) assigned to the mobile node on the
foreign network.
 Discover the mobility services offered by the available agents.

How it Works:

1. Agent Advertisement:
o Foreign Agents periodically broadcast advertisement messages on the network.
o These messages use a modified version of the ICMP Router Advertisement
protocol.
o The advertisements contain information about the FA's capabilities and the care-
of address prefix it can offer visiting mobile nodes.
2. Agent Solicitation:
o The mobile node, upon entering a new network, actively searches for agents by
sending Agent Solicitation messages.
o These messages are also based on ICMP.
3. Response and Registration:
o When a Foreign Agent receives a Solicitation message, it responds with an
Advertisement containing its details.
o The mobile node can then register with the FA, informing it of its presence and
obtaining a care-of address.

Benefits:

 Enables seamless handover for the mobile node as it moves between networks.
 Allows the mobile node to maintain its home address for continued reachability.
 Optimizes communication by directing packets to the mobile node's current location
through the care-of address.

Additional Points:

 Home Agents can also advertise their presence, but this is less common.
 Mobile IP defines two methods for agent discovery: agent advertisement and agent
solicitation. They are essentially variations of existing router discovery protocols with
Mobile IP extensions.
 The mobile node can choose the most suitable Foreign Agent based on factors like load
or offered services.
Registration
In the context of mobile networks, registration is the initial process where your mobile device
(phone or tablet) connects to a cellular network and identifies itself with the service provider. It's
essentially a handshake between your device and the network, allowing you to use their services.
Here's a breakdown of what happens during registration:

Steps Involved:

1. Network Attachment: When you turn on your phone or enter a new coverage area, it
automatically searches for a cellular network signal. Once a signal is detected, your
device attempts to connect to a nearby cell tower.
2. Authentication: The phone transmits a registration request to the cell tower, which
includes:
o International Mobile Equipment Identity (IMEI): A unique identifier for your
phone's hardware.
o Temporary Mobile Subscriber Identity (TMSI): A temporary identifier
assigned by the network.
o Electronic Serial Number (ESN) (older CDMA networks): Another unique
identifier for your device (used in some older networks).
3. Verification: The network receives the request and checks the information against a
central database. This verification process ensures:
o Your phone is authorized to use the network (not blacklisted or stolen).
o Your SIM card is valid and has an active service plan.
4. Acceptance and Service Access: If the verification is successful, the network accepts the
registration and assigns a temporary identifier specific to that network (like a Mobile
Station Identifier (MSI) in GSM networks). This allows the network to track your
device's location and connect you to calls, texts, and data services.

Benefits of Registration:

 Security: Registration helps prevent unauthorized devices from accessing the network,
improving overall network security.
 Billing and Service Management: It allows the network operator to identify your
specific device and subscription plan, enabling accurate billing and service management.
 Network Optimization: Registration helps the network manage resources efficiently by
allocating resources (like radio channels) based on the number and location of registered
devices.

Additional Points:

 Registration typically happens automatically in the background when you turn on your
phone or move between coverage areas.
 You don't usually need to initiate the registration process manually.
 If registration fails due to issues with your SIM card, service plan, or phone, you might
experience limitations like being unable to make calls or connect to data.

Tunneling and Encapsulation


Tunneling and encapsulation are two important concepts that work together to enable data
transmission across networks. Here's a breakdown of each:

Encapsulation:

 Imagine a child's toy capsule with two parts: a top and a bottom. Encapsulation is like
putting a message (data) inside a capsule.
o The message is the actual information you want to send, like an email or a video.
o A new header is created and wrapped around the message. This header contains
information for routing the data, like the source and destination addresses.
 Encapsulation happens at each layer of the OSI (Open Systems Interconnection) model, a
layered networking framework. Each layer adds its own header specific to its function.
 By adding headers, encapsulation allows different network layers to understand and
process the data efficiently.

Tunneling:

 Tunneling is like putting the entire encapsulated message (capsule) inside another, bigger
capsule.
o The inner capsule represents the original data and its header.
o The outer capsule adds a new header with information specific to the tunnel itself.
This might include the addresses of the tunnel endpoints and a protocol identifier.
 Tunneling is used to transport data packets across a network that doesn't natively support
the original protocol.
o Imagine sending a box of toys (original data) through a pneumatic tube system
(different network). You might need a special container (tunnel) to ensure the box
arrives safely.
 Tunneling protocols like GRE (Generic Routing Encapsulation) or PPTP (Point-to-Point
Tunneling Protocol) create the outer capsule for specific purposes.

How they work together:

1. Data is encapsulated with headers at its originating network layer.


2. If tunneling is needed, the encapsulated data is further encapsulated within a tunnel
header.
3. The entire packet (inner capsule and outer capsule) is transmitted across the network.
4. At the receiving end, the outer tunnel header is removed (decapsulated).
5. The inner encapsulated data is then decapsulated layer by layer, allowing the receiving
network to understand and process the original message.
Benefits of using Tunneling and Encapsulation:

 Securing Data: Tunnels can be encrypted, adding an extra layer of security for sensitive
data traveling across untrusted networks.
 Virtual Private Networks (VPNs): Tunneling is a core technology used in VPNs to
create secure connections over public networks like the internet.
 Protocol Compatibility: Tunneling allows incompatible protocols to coexist and
communicate by encapsulating data within a supported protocol.
 Network Management: Tunnels can be used to isolate network traffic and manage
bandwidth allocation for specific purposes.

Dynamic Host Configuration Protocol (DHCP)

The Dynamic Host Configuration Protocol (DHCP) is a network protocol that automatically
assigns IP addresses and other configuration settings to devices on a network. It eliminates the
need for manual configuration, saving time and reducing errors. Here's a breakdown of DHCP:

How it Works:

1. Client Discovery: When a device (computer, phone, etc.) connects to a network, it


broadcasts a DHCP Discover message. This message announces the device's presence
and requests network configuration information.
2. Server Offer: A DHCP server on the network receives the Discover message and
responds with an Offer message. This Offer includes a proposed IP address, subnet mask,
default gateway, and other settings for the device.
3. Client Request and Server Acknowledgement: The client, if it accepts the offer, sends
a DHCP Request message back to the server, claiming the offered IP address. The server
acknowledges the request by sending a DHCP Acknowledgement message.
4. Lease: The IP address assignment is typically a lease, meaning it's valid for a specific
period. Before the lease expires, the client can renew the lease by sending a renewal
request to the server.

Benefits of DHCP:

 Automatic Configuration: DHCP eliminates the need to manually assign IP addresses


for every device, saving time and reducing the risk of errors.
 Scalability: DHCP easily accommodates new devices on the network without manual
intervention.
 Centralized Management: Network administrators can manage IP address allocation
from a central location through the DHCP server.
 Dynamic Addressing: Leases allow for efficient use of IP addresses, as devices that are
not actively using the network can release their addresses for others.

Components of DHCP:

 Client (DHCP Client): Any device on the network that requests and uses a DHCP-
assigned IP address.
 Server (DHCP Server): A network device running DHCP software that manages the
pool of available IP addresses and assigns them to clients.
 Scope: A defined range of IP addresses that the DHCP server can lease to clients.

Additional Points:

 DHCP operates on the UDP (User Datagram Protocol) port 67 for the server and port 68
for the client.
 DHCP is not mandatory for a network to function, but it's widely used for its convenience
and efficiency.
 In some cases, static IP addresses might be assigned manually for specific devices that
require a permanent configuration.

 UNIT V: MOBILE TRANSPORT LAYER: Traditional


TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast
retransmit/fast recovery, Transmission /time-out
freezing, Selective retransmission, Transaction oriented
TCP, TCP over 2.5G/3G Wireless Networks.

Traditional TCP
Traditional TCP, also sometimes referred to as wired TCP, is the original version of the
Transmission Control Protocol designed for reliable data transfer over fixed, wired networks.
Here's a breakdown of its key features and considerations:

Core functionalities:

 Reliable Data Delivery: TCP guarantees in-order delivery of data packets even if they
travel out of order or experience errors during transmission. It achieves this by:
o Sequence Numbers: Assigning a unique sequence number to each data packet
for proper reassembly at the receiver.
o Acknowledgments: The receiver sends acknowledgment (ACK) messages for
received packets, and the sender retransmits missing or corrupted packets.
o Error Checking: Using checksums to detect errors in received data.
 Connection-Oriented: TCP establishes a connection between sender and receiver before
data transfer begins. This allows for handshaking and controlled data exchange.
 Congestion Control: TCP includes mechanisms to avoid overwhelming the network
with data. It dynamically adjusts the sending rate based on network congestion signals.
This helps prevent data loss and network slowdowns.

Designed for Stability: Traditional TCP prioritizes reliable data delivery over speed. This
makes it well-suited for applications that require accurate data transfer, such as file transfers,
email, and web browsing.

Limitations in Wireless Networks:

Traditional TCP was not designed for the dynamic nature of wireless networks. When packets
are lost due to signal fluctuations or handoffs between cell towers, TCP's congestion control
mechanisms can misinterpret it as network congestion and throttle down the data transfer rate.
This can lead to slower performance compared to wired connections.

comparison chart between Traditional TCP (Transmission Control Protocol) and Indirect TCP

Aspect Traditional TCP Indirect TCP


Standard protocol for transmitting data A modification of TCP designed for
1. Definition
reliably. specific needs.
Detects errors through Uses proxies to handle errors and
2. Handling Errors
acknowledgment mechanism. congestion.
3. Congestion Uses congestion window and slow Utilizes proxy servers for
Control start algorithm. congestion management.
Relies on end-to-end connection for Adds a layer of reliability through
4. Reliability
reliability. proxies.
Does not involve proxy servers in data Involves proxy servers as
5. Proxy Usage
transmission. intermediaries.
6. Packet Data packets remain unaltered during Proxy servers may modify packets
Modification transmission. for optimization.
May introduce additional header
7. Header Overhead Typically has lower header overhead.
overhead.
8. Network Provides direct communication Introduces an additional layer of
Transparency between endpoints. abstraction.
Generally maintains end-to-end May introduce security risks
9. Security
encryption. through proxies.
Scales well for traditional client-server May face scalability challenges with
10. Scalability
setups. proxy load.
Performance is generally reliable and Performance can vary based on
11. Performance
predictable. proxy efficiency.
Offers flexibility in direct Introduces flexibility through proxy
12. Flexibility
communication setups. configurations.
Aspect Traditional TCP Indirect TCP
May consume fewer resources without Proxy servers may require
13. Resource Usage
proxy overhead. additional resources.
Widely compatible with existing May require specific proxy support
14. Compatibility
network setups. for compatibility.
Suitable for general data transmission Useful for scenarios requiring proxy
15. Use Cases
scenarios. intermediaries.

Snooping TCP
Snooping TCP, also known as Transparent TCP, is a technique used in mobile networks to
improve data transmission efficiency, particularly for wireless connections that are prone to
errors and packet loss. Here's a breakdown of its concept, advantages, and disadvantages:

Concept:

 Snooping TCP operates at an intermediate network device, like a router or base station,
between the mobile device and the internet.

 The network device monitors the TCP traffic flowing in both directions (mobile device to
internet and vice versa).

 When the network device detects a missing packet (based on sequence numbers in the
TCP header), it can take action without waiting for a timeout from the actual endpoints
(mobile device or internet server).

Advantages:

 Reduced Latency: By proactively retransmitting missing packets from its buffer,


snooping TCP can potentially reduce the time it takes to recover from packet loss,
leading to faster data transfer.

 Improved Performance: Faster recovery from packet loss can improve overall network
performance, especially for applications sensitive to delays like real-time video or audio
streaming.

 Reduced Load on Mobile Device: By handling retransmissions locally, snooping TCP


can alleviate the burden on the mobile device's battery and processing power.

Disadvantages:

 Loss of Isolation: Snooping TCP monitors the entire TCP data stream, which can raise
privacy concerns. It essentially breaks the end-to-end encryption principle of TCP.
 Limited Effectiveness with Encryption: If end-to-end encryption is used between the
mobile device and the server, snooping TCP cannot read the sequence numbers to detect
missing packets, rendering it ineffective.

 Overhead on Network Device: Monitoring and potentially retransmitting packets adds


processing overhead to the network device, which could impact overall network
performance if not managed efficiently.

 Compatibility Issues: Not all mobile devices or network devices may fully support
snooping TCP, potentially leading to compatibility issues.

In summary:

Snooping TCP offers potential benefits for mobile networks by reducing latency and improving
performance in scenarios with packet loss. However, it comes at the cost of reduced privacy,
limited effectiveness with encryption, and potential overhead on network devices. The decision
to implement snooping TCP should be weighed against the specific network requirements,
security considerations, and potential drawbacks.

Mobile TCP
Mobile TCP, or M-TCP, is a transport layer protocol designed specifically for mobile networks.
It addresses the challenges that standard TCP faces in these environments, such as:

 Frequent Disconnections: Mobile devices can frequently disconnect due to weak signal,
handover between cell towers, or entering areas with no coverage. Standard TCP
interprets these disconnections as congestion, leading to performance issues.
 High Bit Error Rates: Early mobile networks were prone to errors in data transmission.
Standard TCP relies on reliable data delivery, and these errors can cause unnecessary
retransmissions.

M-TCP tackles these issues by making some key modifications to the TCP protocol:

 Split TCP Connection: M-TCP splits the TCP connection into two segments. One
segment runs between the fixed network and a supervisory host (SH), while the other
runs between the SH and the mobile device.
 Disconnection Notification: The SH acts as an intermediary, monitoring the connection
and notifying the sender about disconnections. This prevents the sender from mistakenly
interpreting disconnection as congestion.
 Window Management: M-TCP dynamically adjusts the window size for data
transmission. When a disconnection is detected, the window shrinks to zero, pausing data
flow until reconnection.

Overall, M-TCP aims to improve performance and reliability for data transfer over mobile
networks by:
 Reducing unnecessary retransmissions due to misinterpreted disconnections.
 Providing faster recovery from actual disconnections.
 Maintaining efficient data flow during periods of stable connection.

However, M-TCP is not widely used today. Advancements in cellular network technology have
reduced disconnection rates and bit error rates. Additionally, other mobile-optimized protocols,
like TCP variants with Selective Acknowledgement (SACK), have been developed to address
these challenges.

Fast retransmit/fast recovery in mobile transport layer


Mobile networks still experience some level of packet loss, even with advancements in
technology. While M-TCP addressed disconnection issues, standard TCP's congestion control
mechanisms like fast retransmit and fast recovery are still relevant for mobile transport layers.

Here's how these mechanisms work in the context of mobile TCP:

 Fast Retransmit: This works similarly to traditional TCP. When the sender receives
three duplicate acknowledgments (ACKs) for the same packet, it assumes the packet is
lost and retransmits it immediately without waiting for the retransmission timer (RTO) to
expire. This helps recover from packet loss faster, especially when dealing with bursty
errors common in mobile networks.
 Fast Recovery (Modified): While the core concept remains the same (sending new data
along with the retransmission), there might be some modifications for mobile
environments. Here's why:
o Congestion vs. Disconnection: Distinguishing between packet loss due to
congestion and disconnection is crucial. Traditional fast recovery assumes
congestion, which might not be the case in a mobile scenario.
o Limited Buffering: Mobile devices often have limited buffer space compared to
fixed network devices. Aggressive sending during fast recovery might overwhelm
the receiver's buffer on a reconnected device.

Therefore, some mobile-optimized TCP variants might adjust how much additional data is sent
during fast recovery to balance speed with potential buffer overflows.

Here are some additional points to consider:

 SACK (Selective Acknowledgement): This TCP extension can be beneficial for mobile
networks. It allows the receiver to acknowledge which packets were received correctly
within a sequence, even if some are missing. This helps the sender identify lost packets
more accurately and potentially trigger a fast retransmit without waiting for three
duplicate ACKs.
 Dynamic Tuning: Mobile TCP implementations might dynamically adjust the fast
retransmit/recovery parameters based on factors like network conditions and device
capabilities.
Overall, while M-TCP addressed specific mobile network challenges, fast retransmit/fast
recovery remain important techniques for mobile transport layers, potentially with some
adaptations to account for the unique characteristics of mobile networks.

Transmission /time-out freezing


Transmission/timeout freezing is a technique used in mobile TCP to improve performance when
dealing with frequent disconnections. Here's how it works:

The Idea:

Standard TCP relies on timers to detect packet loss and trigger retransmissions. However, in
mobile networks, disconnections can happen frequently due to handover between cell towers or
weak signal. These disconnections can lead to unnecessary timeouts and retransmissions.

Transmission/timeout freezing aims to avoid these issues by leveraging the capabilities of the
lower layers (like the Media Access Control or MAC layer) in mobile networks.

How it Works:

1. Early Disconnection Detection: The MAC layer can often detect an upcoming
disconnection before it actually happens. This could be due to signal strength changes or
handover notifications.
2. Notification to TCP: The MAC layer informs the TCP layer about the impending
disconnection.
3. Freezing the State: Upon receiving the notification, TCP freezes its current state. This
includes:
o Pausing transmission of any new data packets.
o Stopping the timers associated with retransmissions.
4. Resuming after Reconnection: Once the connection is re-established, the MAC layer
informs TCP again. TCP then resumes transmission from the point it left off:
o The frozen timers restart.
o Any unacknowledged data packets are still considered outstanding, and no
retransmissions are triggered.

Benefits:

 Prevents Unnecessary Retransmissions: By freezing the timers, TCP avoids triggering


timeouts and unnecessary retransmissions during a disconnection.
 Faster Recovery: When the connection resumes, TCP can continue sending data
immediately without the slow start phase typically used after a timeout. This leads to
faster recovery from disconnections.
 Maintains Congestion Window: The congestion window size, which determines how
much data can be sent without overwhelming the network, is maintained during the
freeze. This avoids starting from scratch after reconnection.
Limitations:

 Relies on MAC Layer: This technique depends on the MAC layer being able to
accurately predict disconnections, which might not always be the case.
 Limited Applicability: It's primarily beneficial for situations with short disconnections
and frequent handovers.

Overall, transmission/timeout freezing is a valuable technique for mobile TCP to improve


performance and efficiency in environments prone to frequent disconnections.

Selective retransmission
In the context of mobile TCP, selective retransmission is a crucial mechanism that improves data
transfer efficiency by focusing on retransmitting only the lost packets within a data stream.
Here's a breakdown of how it works and its advantages for mobile networks:

Standard TCP vs. Selective Retransmission:

 Standard TCP: Traditional TCP uses a technique called "go-back-n" for retransmission.
When a packet is lost (indicated by missing acknowledgements), the sender retransmits
not only the lost packet but also all subsequent packets in the sequence. This can be
wasteful, especially in mobile networks where packet loss can be bursty (occurring in
clusters).
 Selective Retransmission: With selective retransmission, the receiver acknowledges
each packet it receives correctly. This granular acknowledgement allows the sender to
pinpoint exactly which packets are missing. The sender then retransmits only those
specific lost packets, not the entire sequence.

Benefits of Selective Retransmission in Mobile Networks:

 Reduced Bandwidth Consumption: By focusing on retransmitting only the missing


packets, selective retransmission minimizes wasted bandwidth. This is particularly
important in mobile networks where bandwidth can be limited and expensive.
 Faster Recovery: Since only specific packets are retransmitted, overall data transfer
resumes quicker. This is crucial in mobile environments where delays can be more
significant due to factors like signal strength and network congestion.
 Improved Performance: Selective retransmission helps maintain a more efficient data
flow by minimizing unnecessary retransmissions. This translates to better overall
performance for applications using mobile data connections.

Implementation Details:

 Acknowledgement Mechanism: Selective retransmission relies on the receiver's ability


to acknowledge individual packets within a sequence. This is often achieved using TCP
extensions like Selective Acknowledgement (SACK) which allows the receiver to inform
the sender about the specific packets it has received successfully.
 Sender Buffering: The sender needs to buffer data segments to enable selective
retransmission. This allows the sender to hold onto packets until it receives
acknowledgements and can identify missing ones for retransmission.

Overall, selective retransmission is a core mechanism for mobile TCP, enabling efficient
data transfer and improved performance in environments prone to packet loss.

Transaction oriented TCP


Transaction-oriented TCP (T/TCP) was an attempt to address the limitations of standard TCP in scenarios involving
short data transfers, particularly relevant for early mobile networks. While not widely adopted today, it offers some
interesting concepts:

The Problem:

Standard TCP excels at reliable data transfer over long-lived connections. However, it has some overhead associated
with connection setup (three-way handshake) and teardown (four-way handshake). This overhead becomes
significant for short data transfers, common in mobile applications like sending a quick message or downloading a
small file.

T/TCP's Solution:

T/TCP aimed to optimize TCP for transaction-based communication by:

 Reduced Handshake: It proposed combining the connection setup and data transfer into a single message
segment. This could potentially reduce the number of packets required from 7 (standard TCP) to 3 (T/TCP) for a
simple data transfer.
 Faster Teardown: T/TCP also aimed to eliminate the separate teardown process. Instead, the data segment could
include a flag indicating the end of the transaction, streamlining the connection termination.

Benefits:

 Reduced Overhead: By minimizing handshake and teardown overhead, T/TCP could potentially offer faster and
more efficient data transfer for short transactions.
 Improved Performance: This approach could be particularly beneficial in mobile networks where bandwidth might
be limited and frequent short data transfers occur.

Challenges and Limitations:

 Complexity: Implementing T/TCP required changes to both sender and receiver software, making widespread
adoption less feasible.
 Limited Scope: T/TCP's focus on short transactions made it less suitable for applications requiring long-lived
connections and reliable data streams.
 Evolution of Mobile Networks: Advancements in mobile network technology have reduced disconnection rates
and bit error rates, making the original motivation for T/TCP less pressing.

Alternatives:

 Mobile-Optimized TCP Variants: Other TCP variants like TCP with Selective Acknowledgement (SACK) have
been developed to address challenges specific to mobile networks. These variants leverage the existing TCP
framework while incorporating features like SACK to improve efficiency.
 Application-Layer Protocols: Protocols designed specifically for short data transfers, like UDP, might be a better
choice for certain mobile applications where reliability is less crucial than speed.

Overall, T/TCP was an innovative proposal for optimizing data transfer in mobile environments. While not
mainstream today, it highlights the importance of considering network characteristics when choosing or
adapting transport protocols.

TCP over 2.5G/3G Wireless Networks


TCP, the Transmission Control Protocol, is the dominant transport layer protocol for internet
data transfer. However, it was designed for wired networks and doesn't perform optimally over
wireless networks like 2.5G and 3G. Here's a breakdown of the challenges and optimizations for
TCP over 2.5G/3G:

Challenges Faced by TCP in 2.5G/3G Networks:

 Frequent Disconnections: 2.5G and 3G networks are prone to disconnections due to factors like
handover between cell towers or weak signal. Standard TCP interprets these disconnections as
congestion, leading to unnecessary retransmissions and slowdowns.
 High Bit Error Rates: Compared to wired networks, 2.5G and 3G experience higher data
transmission errors. TCP relies on reliable data delivery, and these errors can trigger excessive
retransmissions further impacting performance.
 Limited Bandwidth: Bandwidth limitations are inherent to wireless networks. TCP's congestion
control mechanisms might not adapt efficiently to these limitations, potentially leading to
suboptimal data transfer rates.

Optimizations for Mobile TCP:

 TCP Variants with Selective Acknowledgement (SACK): SACK allows the receiver to inform
the sender about which packets within a sequence were received correctly. This enables the
sender to identify and retransmit only the missing packets, improving efficiency.
 Fast Retransmit/Recovery: These techniques aim to recover from packet loss faster. Fast
retransmit helps identify lost packets quicker, and fast recovery allows the sender to resume
sending new data along with the retransmission, minimizing delays. However, mobile-specific
variants might adjust these mechanisms to account for disconnections and avoid overwhelming
the receiver's buffer.
 Transmission Timeout Freezing: This technique leverages the capabilities of the lower layers
(like MAC) in mobile networks. When an impending disconnection is detected, the MAC layer
informs TCP, which freezes its timers and transmission. Upon reconnection, TCP resumes
without unnecessary timeouts or retransmissions.

Overall, while TCP isn't ideal for 2.5G/3G networks, these optimizations along with
advancements in cellular technology have improved its performance. It's important to note
that alternative protocols like M-TCP (Mobile TCP) were proposed specifically for mobile
networks, but haven't gained widespread adoption.
REFERENCES

These notes has been prepared taking the references from the electronic
Sources such as google , openai,Gemini ,techtarget.com,TutorialsPoint,
Javatpoint,Guru99,geeks for geeks . I would recommend to go through
book for more clarity & Correctness.

You might also like