Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Ch1: Wireless -The means to communicate.

Challenges- higher interference, higher data loss rate, lower transmission rate, limited bandwidth, strict regulations of radio freq, lower security, higher delay and jitter. Mobile- nature of the applications. User Mobility(webmail), Device Portability(mobile phone). Challenges of portable devices- Power consumption, limited capability (limited room for components and performance), limited interface, easy loss of data(Loss of device, sol-sync with other devices, better data security). 5 layers network model- application, transport, network, link, physical. Signal drops with distance. How it can reach other side? Limit propagation length, use directed antenna, use protocol with noise tolerance. How to locate mobile device if moved? HLR/VLR in GSM/UMTS architecture. How to handle when mobile device moves? hand-over procedures between base stations. Network config. may change over time- mobile IP hides it by using the same IP even if device moves. How ensure reliable transmission of data over unreliable links? Change TCP to adapt to wireless link characteristics. Can we have unified programming interfaces for different mobile devices? Use common platform and a robust way to represent devices. Ch2: Signal- quantity varying over time. Periodic vs. aperiodic whether signal repeats itself. Continuous vs. discrete value/time value defined in every time, not just in some time instants. Analog signalcontinuous digital signal discrete. Fourier series every periodic signal can be represented by a sum of sine waves, first few terms can reconstruct the original wave. Fading occur when sender or receiver move. Signal Propagation- Ground wave(< 2 MHz) Sky wave(2 30 MHz) Line-of-sight(> 30 MHz) Multipath Propagation- Signals may reach receiver through multiple paths and in different time. Inter symbol interference(ISI)- interference with neighboring symbols, limits max bandwidth of a channel. What signal/wave should be sent from sender to receiver? Modulation and spread spectrum. Sending stages: encoding>digital modulation> analog modulation>transmission. Why analog needed: different signals may be in the same range and interfere. We use only low frequencies cos they re more prone to noises. Higher freq carrier used to modulate signal before sending. Analog modulation by using different carriers we can have different communication channels. We can use higher freq ranges to fully utilize the available medium and use its transmission properties. Digital modulation- ASK,PSK,FSK, different in: Implementation complexity(ASK easy to implement), Spectral efficiency(FSK&PSK require more spectrum than ASK), Robustness(ASK very susceptible to noise) Digital vs. analog digital determine if the original signal is 1/0, in analog every detail of the signal reconstructed. Adv of FSK less susceptible to noise than ASK Dissudden change of phase is possible, high bandwidth requirements. Adv of PSK- robust against interference Dis complex implementation. FSK,PSK may have sharp changes, with high freq components and high bandwidth. MSK(min shift keying)- FSK without abrupt signal change. QPSK- More valid phases available. Differential QPSK- The phase shift in BPSK&QPSK encodes the data in the absolute phase difference between modulated signal&carrier. Hierarchical Modulation- Finest details sent by sender. Receivers can fall-back to lower resolution if error is high. Multi-FSK- can use more frequencies. Spread spectrum problems: Fading, noise, may occur in specific frequencies only. In narrowband channels channel may be lost, in spread spectrum channels data may be recovered. DSSS adv- reduces the effect of freq selective fading, better security, can use the same freq range without interfering(better use of available freq, soft handover) Dis- precise power control necessary, complex signal regeneration process. FHSS- Fast hopping: multiple jumps in carriers happen during the sending of a single bit. Slow hopping: multiple bits are sent before the sender jumps to another carrier. Adv: Freq selective fading and interference limited to a short period, Simple implementation, Uses a small portion of the spectrum at any time. Dis: Not as robust as DSSS, Simpler to detect Ch3: MAC was developed to determine who can use the medium. CSMA/CD Sender: sends as long as it senses a free medium (CS); and then detects if collision occurs afterwards (CD), Receiver- just receives the info. SDM divide the space e.g radio. FDM- separate the freq spectrum into smaller freq bands with guard space (adv: no need of coordination, works for analog signals. Dis: waste of bandwidth if uneven traffic and unflexible). TDM a channel gets the whole spectrum for certain amount of time (adv: one carrier in a medium at any time, high throughput, flexible. Dis: sync needed) FTDM FDM+TDM e.g GSM (adv: protection against tapping and interference. Dis: coordination and lots of guard space required). CDM- all channels use the same spectrum, each channel has different code.(adv: no sync and coord needed, protection against interference and tapping. Dis: lower user data rate, complex signal regeneration). Cell structure- close base stations can t use the same resources, buffers are required for reuse of resources. adv: higher capacity, higher num of users, lower transmission power required, more robust. Dis: fixed network needed between base stations, handover required (changing between base stations), interference between cells. FDD/FDMA in GSM assign different frequencies to different users. TDD/TDMA in DECT each timeslot has a fixed user. Aloha/Slotted Aloha adv: easy, no coord required. Dis: low channel efficiency. Reservation-Based TDMA- sender reserves a future timeslot and sends without collisions. Adv: Reservation schemes may increase the efficiency to 80%. Dis: higher delays. Reservation TDMA- Every frame consists of N mini-slots and x data-slots. Every station has its own mini-slot and can reserve up to k data slots using this mini-slot (i.e., x = kN). Other stations can send data in unused data slots according to a round-robin sending scheme. MACA- sender has to make sure that the channel is ready before sending the data. applies to both sender and receiver. RTS-request to send (sent by sender), CTS- clear to send (receiver grants to sender) CDMA- All terminals send in the same freq band at the same time, Each channel has unique chipping sequence, Senders use the channel by XORing the data with chipping sequence before sending, Receivers tune to the channel by a correlation function using the same chipping sequence. Adv: All terminals use the same freq; no planning required. Can be shared by a huge amount of users. Decoding is much more noise tolerant. Dis: higher complexity of a receiver (cannot just listen to the medium and start receiving whenever there is a signal), Complex measure must be employed to coordinate the signal strength at receiver side. Ch4.2: GSM Provides: Communication: mobile, wireless communication; voice and data services. Worldwide connectivity: can use phone anywhere in the world. Total mobility: user may move or use different device or network (through SIM) High transmission quality: high audio quality and reliability- uninterrupted phone calls even at higher speeds. Security functions: access control, authentication via chip-card and PIN. GSM services: Telecommunication services: voice(normal &emergency calls), sms(uses signaling channels instead of data channels), Bearer services: network data(provides access points (U, S, R) as stated in ISDN devices, uses OSI layers 1-3), Supplementary services: call forwarding, lock stolen phones, conferencing. GSM components phone, antenna, base station, monitoring center, switching center. BTS: Base Transceiver Station (antenna). BSC: Base Station Controller. MSC: Mobile Services Switching Center. GMSC: Gateway MSC. GSM architecture Radio subsystem: manages the communication between mobile stations and base stations. Network and switching subsystem: core of GSM, handle a lot of different tasks. Operation subsystem enables centralized operations, management and maintenance of all GSM subsystems. Radio Interface- How is the medium shared? FDM: 200kHz per channel, separate uplinks and downlinks(FDD), 124 duplex channels in classic GSM900. TDM: each freq channel is further subdivided into 8 TDMA channels. Logical channels in GSM TCH(traffic channels) and CCH(control channels). TCH used to send data or voice, use different encoding to ensure different data rate and error protection. CCH carry control signals (paging, registration,..), sms, uses dedicated physical channel or frames of physical channel used by TCH. For every 26 frames in a channel, 24 are used to send user data (as for TCH), 1 to send controls, 1 not used. NSS responsible for: switching, mobility management, system control, connection to other networks. In NSS: Mobile Services Switching Center(MSC), DBs that are scalable, high capacity and low delay Home location register (HLR stores permanent info like phone num, profile, current location) and visitor location register (VLR- stores temp info of all users in the current location). Operation subsystem (OSS) enables management and maintenance of GSM subsystems. Contains: authentication center (auth In call setup, registration), Equipment identity register (reg. user rights), operation and maintenance center (billing). It s connected to NSS through SS7. mobility problems: 1. system must locate and alert a subscriber even if he is in another network(Tackled by Registration + Paging), 2. user may move between cells in a network during an ongoing call(Tackled by Hand-over mechanism) Reg&Paging- MS registers itself to the current network (visitor network),Upon registration, visitor network updates the current location of MS in home network, All calls to MS will first reach home network and it forwards the calls to the correct visitor network according to the HLR entry. Upon receiving the calls, visitor network pages all MSes in the area to find the MS. Registration- Implement: set of cells in a network grouped into different location areas(LA).Every BTS broadcasts ID of LA to which it belongs. When MS learns that it moved from one LA to another(by the BTS s LA id), it performs new registration so new LA knows the existence of MS. Home network informed by new LA of visitor network for updating HLR entry. As long as MS stays in the same LA, it needs to renew its registration very infrequently. system only knows MS s location down to LA level if MS is not in a call. Paging message must be broadcast in the whole LA to locate the MS. Hand-over- If MS moves to another cell during a call hand-over routes the data through another base station without interrupting the call. (Another reasons: signal strength, load balancing) Security- Access Control/ Authentication: user>SIM: secret PIN used to identify user. SIM>network: Challenge-Response method used to identify SIM. Confidentiality: Voice&signaling encrypted on the wireless link, Key generated upon successful authentication. Anonymity: User identifier not sent during transmission, TMSI won t be used long term (in new registration, new TMSI assigned to user), Encrypted Transmission Ch4.3: Normal GSM- every user has individual channel HSCSD- Reserve more than 1 channel to send data. Adv: improved data rate. Dis: waste of resources(Channels may not be active all the time (but reserved), Uplinks&downlinks are very biased in general). GPRS- Use packet switches approach to increase channel utilization. System assigns channels according to users requirements. Many users may use same frame. Only max num of slots that can be used by the users is declared, every user may use free slots to send and receive. limits: user already used all possible slots in frame (eg. all bandwidth of a carrier), No speed upgrade possible unless the radio interface changed. EDGE- Use better modulation techniques to increase bitrate under good reception. 8PSK is used instead of Gaussian MSK triple data rate. Ch4.4: 3G- Target for voice and multimedia data services. UMTS- Three main parts: UE- User Equipment, UTRANUTRA Network(radio access, Cell level mobility, Encapsulation of all radio specific tasks), CN- Core Network(network backbone, Inter system handover, Location management if there is no dedicated connection between UE and UTRAN) Domains and Interfaces- Universal Subscriber Identity Module- USIM(Functions for encryption and authentication of users, Located on a SIM inserted into a mobile device), Mobile Equipment Domain(Functions for radio transmission, User interface for establishing/maintaining end-to-end connections), Access Network Domain(Access network dependent functions, Core Network Domain(Access network independent functions, Serving Network Domain(Network currently responsible for communication), Home Network Domain(Location and access network independent functions)) Access Network- GERAN(GSM / EDGE radio access network, Base Station Subsystem), UTRAN (UTRA Network, Radio Network Subsystem) UTRAN Radio Interface- CDMA is used, TDD or FDD versions are available. WCDMA- CDMA+FDD(freq band used is wider than its main competitor, cdmaOne), 5MHz channel, carrier at around 2GHz, Two levels of CDMA are used: scrambling codes(3.84 Mchip/s, high correlation if synchronized; almost zero correlation for different codes even if not synchronized)& channelization codes(up to 256 chips, generated by an OVSF code tree, orthogonal only if synchronized) UTRA-FDD- Soft/Softer handover are available, QPSK, Complex power control (1500 power control cycles per second) UTRAN Functions- Admission control, Radio channel encryption, Handover, Macro diversity, etc. Macro DiversityMulticasting of data via several physical channels: MD enables soft handover, available in FDD mode only. in Uplink: simultaneous reception of UE data at several Node Bs, Reconstruction of data at Node B, SRNC or DRNC. in Downlink: Simultaneous transmission of data via different cells, Different spreading codes in different cells. Soft Handover- Handover within the same RNC is soft and uses macro diversity. Handover within the same Node B is called softer handover which also uses macro diversity. It is still possible to have soft handover across RNC If the RNC s are connected through Iur interface so we ll have Serving RNC and Drifting RNC . Hard Handover- Across different RNC or even different systems(From and to other systems- e.g UMTS to GSM, UMTS<>GSM handover is a must as UMTS coverage will be poor in the beginning), The connection switched from the old base station to the new one. The old connection breaks before the new one is in use, The connection may be disrupted for a few milliseconds. Core Network in 3GPPCore 3GPP- CSD(circuit switched services including signaling, resource reservation at connection setup, GSM components (MSC, GMSC, VLR)), PSD(GPRS components (SGSN, GGSN)), Release 99 uses GSM/GPRS network as the core network&adds a new radio access. Adv: save money, faster deployment-earn money. Dis: not as flexible as newer releases. Security in UMTS- longer keys,mutual authentication of both sides (network & user), mutual check for the freshness of the keys; replay attack avoidance by sequence number, encryption up to RNC level (to take care of possible microwave link between Node B and RNC), mandatory integrity check for signaling messages. HSDPA- Improves individual data rate&channel utilizations(High speed shared channels+short transmission time, Fast scheduling and user diversity, Fast link adaptation, Higher order modulation (16 QAM vs. QPSK), Fast HARQ) 4G- IMT Advanced- Now inviting submissions, Some key requirements- all IP packet switched network, 100Mbit/s during mobile access, 1Gbit/s during low mobility. not using CDMA; using OFDM based technologies: OFDMA, SC-FDMA (single carrier) Ch5: Telecommunication Satellites: global telephone&mobile connections, backbone for global networks, connections for communication in remote/ underdeveloped places. Satellites- LOS (Line of Sight) to the satellite necessary for connection- high elevation needed, less absorption due to e.g. buildings. Uplink: connection between base station&satellite. Downlink: connection between satellite&base station. separated frequencies for uplink and downlink, transponder used for sending/receiving and shifting of frequencies, transparent transponder: only shift of frequencies, regenerative transponder: additionally signal regeneration. *smaller orbit radius>higher rotational freq. Types of Orbits- GEO: geostationary orbit, around 36000 km above earth surface, LEO (Low Earth Orbit): around 500 - 1500 km. adv: much more acceptable latency (~ 5 10 ms), can cover also polar areas, smaller foot-print, better freq reuse. Dis: high cost; needs more satellites for complete coverage, hand-over required, complex system: satellite location changing, complex infrastructure + complex receiver. MEO (Medium Earth Orbit- balance between benefit&cost of LEO: slower moving satellites, less needed, simpler system design, for many connections no hand-over needed, higher latency ~70-80ms, higher sending power needed, special antennas for small footprints needed) or ICO (Intermediate Circular Orbit): around 6000 - 20000 km, HEO (Highly Elliptical Orbit) elliptical orbits. Geostationary Satellites- Orbit: must be on equatorial plane, synchronous with Earth rotation. Adv: requires fixed antenna only, receivers always see the same satellite, no hand-over required, large foot-print; fewer satellites are needed. Dis: Needs high power transmission, Large foot-print(can't reuse frequencies over different satellites), Must be on equatorial plane; poor coverage in polar areas, Key: high latency (~ 275ms). Not suitable for telecommunication. apps: video, radio. Routing- 1. Inter-Satellite Links(ISL) between satellites(faster, more expensive, uses fewer channels (one up & one down), more complex system (moving routers), shorter lifetime (fuel)) 2. Sends the signal back to Earth (Gateways), route the signal near destination and sends it back to the satellite(slower, use existing network to route between gateways, uses more channels, simpler) Handover- Intra-satellite handover(cells in foot-print of the same satellite), Inter-satellite handover(moving user: from one satellite to another), Gateway handover(moving satellite: from one gateway to another), Inter-system handover. Ch7.1: Wireless network- adv: very flexible within the reception area, Ad-hoc networks without previous planning are possible, almost no wiring difficulties, more robust against disasters. Dis: lower bandwidth than wired networks due to shared medium (IEEE 802.11g vs. Gigabit Ethernet), many proprietary solutions especially for older systems with higher bit-rates, products have to follow many national restrictions; takes a long time to establish global solutions like IMT-2000. Ch7.2: IEEE 802.11- LAN architecture+protocols MAC + PHY. Architecture: Station(STA)- terminal with access mechanisms to the wireless medium and radio contact to the access point, Access Pointstation integrated into the wireless LAN and the distribution system, Basic Service Set(BSS)- group of stations using the same radio freq(channel), Portal- bridge to other wired networks, Extended Service Set (ESS)a logical network of connected BSS, Distribution System- interconnection network for ESS. Ad-Hoc Network- Direct communication within a limited range. STA: terminal with access mechanisms to the wireless medium, IBSS: group of stations using the same radio freq(channel). Sync: work like AP at the scheduled beacon time, send a beacon after waiting for random backoff time if no other station was sending it. Layers&Functions- MAC(access mechanisms, fragmentation, encryption), MAC Management(synchronization- sync timer (using Beacons), roaming- no connection: Scanning the environment- station listens the medium for beacon signals or sends probes into medium and waits for answer, Association/ Reassociation Request- station sends request to one/several Aps, Association/ Reassociation Response- success: AP answers, station can participate, failure: station continues scanning. If AP accepts Request: signals the joining of new station to distribution system& it updates its db so that new packets can go to the correct location), MIB- accessing current state of network/wireless stations, power management- station should sleep/wake up. Uses TSF to wake up together), PLCP(hiding physical link properties, clear channel assessment signal(carrier sense)), PMD (modulation, coding), PHY Management(channel selection, MIB), Station Management(coord of all management functions) Physical Layer- FHSS-min 2.5 freq hops/s, twolevel GFSK, DSSS- DBPSK for 1Mbps, DQPSK for 2Mbps, chipping sequence: Barker code, Infrared- no practical implementations available. MAC Layer- Traffic Services: Asynchronous Data Service(mandatory)exchange of data packets based on best-effort , support of broadcast and multicast. Time-Bounded Service(optional)- implemented using PCF. Access methods: DFWMAC-DCF CSMA/CA (mandatory)- collision

avoidance via randomized back-off mechanism, ACK packet for acknowledgements(no ACK for broadcasts). DFWMAC-DCF with RTS/CTS(optional)- uses RTS/CTS before data transmission, avoids hidden terminal problem. DFWMAC- PCF(optional)- access point polls terminals according to list, for time-bound services through polling. Priorities: implemented by IFS, Higher priority frames wait less. SIFS- highest priority, for ACK, CTS, polling response(reply steps). PIFS- medium priority, for time-bound service using PCF (for polling), DIFS- lowest priority, for asynchronous data service. CSMA/CA Broadcast Msges- Direct access if medium is free for IFS, If busy wait til medium is free, then wait for DIFS+ random backoff time, backoff timer won t reset if someone else sent during its backoff time duration. CSMA/CA Unicast- station wait for DIFS before sending data, receiver acknowledges at once if the packet was received correctly(CRC), automatic retransmission of data packets in case of transmission errors. RTS-CTS- Sender wait for DIFS to send RTS, After successful RTS subsequent steps are of high priority (SIFS), Other stations mark the channel as busy when they get RTS/CTS for the duration as shown in the messages. MAC Frame Format- Types: control, management and data frames. Sequence numbers: important against duplicated frames due to lost ACKs. Addresses: receiver, transmitter (physical), BSS identifier, sender (logical). Miscellaneous: sending time, checksum, frame control, data. Ch7.3: Bluetooth- Universal radio interface for ad-hoc wireless connectivity, FHSS and TDD. Piconet- Collection of devices connected in an ad-hoc fashion. One unit is master and others slaves for the lifetime of the piconet. Master- determines hopping pattern, governs traffic. Slaves- joins piconet by synchronizing with the master&reserving an ACL link. Parked devices- synchronized with master, but no active connections. Scatternet- Linking of multiple co-located piconets through sharing of common master/slave devices. device can be a slave in one piconet and master of another- cannot be the master of 2. Communication:device jumps between piconets. SDP- protocol for discovering services: Searching for and browsing services in radio proximity, Adapted to highly dynamic environment, Can be complemented by others like SLP, Defines discovery only- not usage of services, Caching of discovered services, Gradual discovery. Service record format: Info about services provided by attributes, Attributes composed of 16bit ID&value, values may be derived from 128bit Universally Unique Identifiers (UUID). IEEE 802.15- PAN, operated in a very short range, low powered. 802.15.1- adv: integrated into several products, available worldwide, free ISM-band, several vendors, simple system, simple ad-hoc networking, peer to peer, scatternets. Dis: interference on ISM-band, limited range, max 8 devices/ network&master, high set-up latency.*Bluetooth covers many layers, from applications to physical, 802.15.1 only data link and physical layers. IEEE workgroup worked together with Bluetooth consortium on the specifications. V2EDR use DQPSK and 8-DPSK instead of GFSK in payloads to increase data rate to 2Mbit/s and 3Mbit/s respectively. V3- High Speed Up to 24 Mbps, Use Bluetooth for negotiation; other technologies (802.11) for transmission (AMP Alternate MAC/PHY). V4- Low Energy, Still provide 1 Mbps data rate, consumes -1/100 power of classic Bluetooth, saves energy with shorter packets&longer sleeps. Ch7.4: WiMAX- delivery of last mile wireless broadband access, May use licensed/unlicensed bands, Cell range: several km, Originally using 10-66GHz carriers, LOS transmission required, Max raw data rate 120Mb/s, extended to 210GHz, Non-LOS transmission available. OFDM- Observation: signal contains number of freq components, Changing the amplitude of one component won t affect the others. Sender: User data separated into streams, each stream is encoded within one sub-carrier . user s data are used as the coefficient of the freq components. Baseband signal generated according to the series (using IFFT). Receiver: After getting the signal, FFT is performed to extract the coefficient of each component, original data bits can then be recovered. OFDMA- Each user can get a set of sub-carriers and timeslots. TDD mostly used/ FDD. allocated by scheduling algorithm according to specified QoS requirements. allocated resource may change with different network load. Ch8: Normal IP routing: Based on destination IP address, network prefix determines the subnet. IP packets routed to the subnet. if computer moves? changes to another subnet. Requirements- Transparency: each mobile end-system keeps its IP, continuation of communication after interruption of link possible, point of connection to fixed network can be changed, higher level protocols are not aware of this. Compatibility: uses same layer 2 protocols as IP, no changes to current end-systems and routers required, mobile end-systems can communicate with fixed systems. Security: authentication of all registration messages. Efficiency&Scalability- only little additional messages to the mobile system required, worldwide support of large num of mobile systems in the whole Internet. MN- system that can change point of connection to the network without changing its IP. HA- system in the home network of the MN, typically router, registers the location of MN, tunnels IP datagrams to COA. FA- system in the current foreign network of the MN, forwards the tunneled datagrams to the MN, typically the default router for MN. COAaddress of the current tunnel end-point for the MN (at FA/MN), actual location of the MN from IP point of view. two-possibilities: FA COA (IP of FA), or co-located COA (a new IP). CN- communication partner. Data Transfer to Mobile Node- 1. Sender sends to the IP address of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to COA, here FA, by encapsulation 3. FA forwards the packet to the MN. from Mobile Node- Sender sends to the IP of the receiver as usual, FA works as default router. Agent Advertisement- Let MN know where it is now so it can let HA know: HA&FA periodically broadcast advertisement msges into their physical subnets. MN listens to these msges and detects if it is in home/foreign network. MN reads COA from the FA advertisement msges. Registration- Let HA&FA know where MN is currently. HA can then forward packets to the MN using the COA. FA knows that it needs to broadcast the packet when it received the tunneled packet from HA. *MN gets COA from agent advertisement. MN signals COA to the HA via FA, HA acknowledges to MN via FA. These actions have to be secured by authentication, All registrations always limited lifetime. Change of FA- on-the-fly packets may be lost during the change. To avoid, new FA can inform old FA-old FA should forward remaining packets to new FA. also enables old FA to release resources for MN. Reverse Tunneling- Packets directly from MN may not reach CN. Router on CN side accepts often only topologically correct addresses (firewall), packet from MN encapsulated by FA is topologically correct after reverse tunneling. 1. MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver. Don t solve: optimization of data paths, backwards-compatible standard: extensions can be implemented easily and cooperate with current implementations without these extensions, Agent Advertisements may tell MNs whether reverse tunneling is supported or not, MN may choose the right FA for reverse tunneling. Security- authentication with FA problematic because FA typically belongs to another organization, no protocol for key management and key distribution has been standardized in the Internet. Firewalls- mobile IP can t be used with firewalls, special set-ups needed (reverse tunneling) QoS- many new reservations in case of RSVP, tunneling makes it hard to give a flow of packets a special treatment needed for the QoS. OpenQueAnswers: What are the advantages of using analog modulation? a.the analog modulation method is simple: switch the carrier on and off. b.one can achieve close to the theoretical limit of information transfer within a given band. Briefly explain what hidden terminals are? A sends data to B,but C cannot detect A.C wants to send data to B,C senses a free medium.Collision occurs at B,but A cannot detect collision.A is hidden for C and vice versa. Extensions like HSCSD, GPRS and EDGE provide a higher data rate than a standard GSM channel. Describe three main approaches used in those extensions for increasing the data Rate? The three main approaches used in those extensions for increasing the data rate include: use multiple existing channels to form a channel for a user improve the modulation method to send more bits per symbol use different frame format so that less bits are spent in overheads. Describe how beacons work in an IEEE 802.11? beacon for synchronization.contain timestamp and other management info for power management&roaming.access point perform synchronization by transmitting (quasi)periodic beacon sig,whereas all other wireless nodes adjust local timer to time stamp.as normal data,use DIFS+random backoff time. Briefly discuss the advantages and disadvantages of using reservation-based TDMA schemes. TDMA-advantages: reserves time slots- high efficiency . might be increased by 80%. disadvantage: delays are relatively higher!. In a CDMA system, what are the two criteria for selecting codes for different users? Briefly explain why these two criteria are desirable. CDMA-Selecting codes defined by 1. orthogonal to other codes(simplicity a*b=0. 2. good auto correlation property. (getting inner high result-for signal strength). What is the main difference between hard handover and soft handover? Why can soft handover be implemented in UTRA-FDD but not in GSM? Hard Handover:- When mobile(in Call) switches to a new sector/Cell which is on different frequency , then it performs hard Handover. It is basically an inter-frequency handover. Soft Handover:- When mobile (in Call) switches to a new sector/cell which is on the same frequency then it is called a soft handover. If the "new" sector is also from the same BTS then it is called a softer handover. UTRA-FDD use cdma,it can use different code to send data in same frequency,but gsm cannot because it only send one kind of data in same frequency.Macro diversity enables soft handover.MD is not supported in gsm. What are home network and visitor network in a GSM cellular network? Briefly explain how home location register (HLR) can get the current location of the mobile station (MS). HLR(Home Location Register)-DB that stores permanent and semi-permanent info. Such as: profile,p.number,current location. VLR(Visitor Location Register)-the network u'r actually in, db storing temp data. *MS register itself in the VLR->updates the current location at HLR. Explain why the user throughput of an IEEE 802.11 b wireless LAN (around 6 Mbitls) cannot reach its theoretic maximum (II Mbitls). distance between access point and device;performance of router;in long PLCP PPDU format,size of PLCP preamble is big.What is care-of address of a foreign agent? How is this address used in mobile IP routing? Care-of address is the destination the IP packet to the MN should be tunneled to. It is the actual location of the MN in IP point of view. IP packets that are sent to MN should be first forwarded to HA using normal IP routing, and then HA will tunnel the IP packet (using IP encapsulation) to the MN directly (colocated COA) or to the FA where the MN resides in (FA COA) using the care of address.what are 4-dimensions of multiplexing what used in 802.11? 802.11 use Tdm.DFWMAC-DCF CSMA/CA,mandatory,collision avoidance via randomized "back-off" mechanism,Ack packet for acknowledgements,no Ack for broadcasts;DFWMAC-DCF with RTS/CTS,optional,uses RTS/CTS before data transmission,avoids hidden terminal problem;DFWMAC- PCF,optional,access point polls terminals according to a list for time-bound services through polling..what are hidden termainals?how does Bluetooth and 802.11 eliminate the problem? Hidden terminal problem occurs when a node is visible from a wireless access point (AP), but not from other nodes communicating with said AP. This leads to difficulties in media access control. IEEE 802.11 uses MACA mechanism sending PTS/CTS to solve the hidden terminal Problem. For HiperLAN2 this problem does not exist as the Access Point controls all medium Access. If a terminal is hidden it cannot communicate at all and thus, does not interfere.In Bluetooth, as well there are no hidden terminals as the master controls all visible slaves. If a Terminal does not see the master it cannot participate in communication. If this terminal sends Anyway it will not interfere as this terminal then acts as master with different hopping sequence..how scrambling and channelization used in UMTS? channel code 1 (data 1) combined with channel code 2 (data 2) being scrambled and sent for terminal 2 etc.how wifi and wimax determine which media has right to send? Wi-Fi-priorities-use CSMA When the sender (station) is ready to transmit data, it checks if the physical medium is busy. If so, it senses the medium continually until it becomes idle, and then it transmits a piece of data (a frame). In case of a collision, the sender waits for a random period of time and attempts to transmit again. Wi-Max-uses a scheduling algorithm for which the subscriber station needs to compete only once for initial entry into the network. After network entry is allowed, the subscriber station is allocated an access slot by the base station. The time slot can enlarge and contract, but remains assigned to the subscriber station, which means that other subscribers cannot use it. In addition to being stable under overload and over-subscription, the scheduling algorithm can also be more bandwidth efficient.drawbacks of wireless? Link strength,security,cost,complicated setup.why there is separation between core network and access network for 3g systems? separation core&access network enable flexible assignment of core network to radio access system,diff radio access&core network,service provider flexibly pair combination for implement 3g,eg use gsm/gprs network as core,only adds a new radio access.advantage:smooth transition from gsm to umts,saving money by extending current system rather than introducing new.save money,faster deployment and earn money faster;disadvantage:not as flexible as newer releases.what dimension used in UMTS-FDD how used? umts-fdd:space,cdma+fdd;cdma levels:scrambling&channelization codes.scrambling code is unique for each sender and separates all senders(UE&BS)in a cell,diff cells may use same code.fdd:uplink&downlink use diff freq.for tdd,stations in cell use same scrambling and cells separated diff codes. 2007-ans: 2.short-term fading:sudden change of sig path,shadow by big building/light post.tackled by robust trans protocols.long:chg of distance with bs.more predictable,can be compensated.3.mobile:some parts of mobile app should be designed to move.wireless:its comm tech.w-app uses wireless means for comm between parties in app.wlan in historic building,w not m.notebook plugged into hotel fixed net,m not w.4.head preamble5.multiplex in btooth:tdm,sdm.Tdm:tdd,polling by master.Sdm:piconets use diff hopping pattern.6.mobile node mn:sys(node) that can chg point of conn to network without chg its ip addr.home agent ha:sys in home net of mn, typically router;registers loc of mn,tunnel ip datagrams to coa.foreign a fa:sys in current foreign net of mn,router;forwards tunneled datag to mn,also default router for mn.pack deliver mn:sender sendto ip add of mn,ha intercepts pack;ha tunnels pack to coa,here fa,by encap;fa forwards pack to mn.7.slow start use in tran tcp decrease efficiency of tcp if use in mobile.use of it under wrong assumptions.tcp concludes congestion for pack loss.not main reason.cant distinguish congestion&tans error.slow start no help in trans error over wireless links and during handover.result in severe performance degradation 2009May 2.digital modulation:digital mod creates base-band analog mod to represent original digital data.Amplitude frequency phase two different amplitude represent 2 value,0&1.low bandwidth,but susceptible to interference.Frequency SK assign frequency f1 to binary 1 and f2 to 0.needs larger bandwidth and sudden change of phase is possible but lower susceptible to errors.Phase SK shift phase to represent data like a phase shift of 180as0 follows 1.robust against interference but has complex implementation.3.Cdma power manage:power level from different side at receiver side is roughly same so that some kinds of signal which has lower power at receiver side would not be treated as noise.4.Roaming is that system must be able to locate and alert subscriber,even if he is in another network.every BTS broadcast its ID of LA to which it belongs.As soon as a MS learns that it has moved from one to another.It perform a new registration so that visitor network is known its existence in itself LA.visitor network informs home network to which MS belongs.home network updates HLR entry.5.two different tech in UMTS beyond GSM:WCDMA,soft handover.6.power manage in 802.11:in order to save power,switch transceiver off if it is not needed.states of a station:sleep&awake.Timing synchronization function TSF,ensures that every station wakes up at same time.in infrastructure networks:Traffic indication map TIM,list of unicast receivers transmitted by AP;Delivery traffic indication map DTIM,list of broadcast/multicast receivers transmitted by AP. how access control and authentication is done in GSM. user vs. mobile station:a secret PIN can be set on the SIM.user has to enter correct PIN in order to use mobile station.validity of SIM:each SIM has a unique private key.this key is also stored in authentication center AuC.When a mobile station tries to register to network,a random number is sent to SIM.SIM converts random number into a hash and sends this back to system.system also asks AuC to converts same number into a hash.SIM is validated if two hashes match. Is directional antenna useful within mobile phones?why? No.directional antenna can only receive signal from or send signal to certain direction.mobile phone must communicate with base station.if used,we must point antenna to direction of base station for connection.this is difficult for users.

You might also like