Lab Manual: IT-602 Wireless & Mobile Computing
Lab Manual: IT-602 Wireless & Mobile Computing
BHOPAL
LAB MANUAL
IT-602
WIRELESS & MOBILE COMPUTING
Semester -6th
0112IT191046
INDEX
SR. NO.
LIST OF EXPERIMENTS
1 Study and Analysis of wireless network.
2 Study and Analysis Code Division Multiple Access (CDMA).
0112IT191046
1. Study and Analysis of wireless network.
Wireless communication involves the transmission of information over a distance without the
help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of
connecting and communicating between two or more devices using a wireless signal through
wireless communication technologies and devices.
The evolution of wireless technology has brought much advancement with its
effective features.
The transmitted distance can be anywhere between a few meters (for example, a
television's remote control) and thousands of kilometers (for example, radio
communication).
Wireless communication can be used for cellular telephony, wireless access to the
internet, wireless home networking, and so on.
0112IT191046
Keep interference levels within tolerable limits.
Frequency reuse or frequency planning.
Organization of Wireless Cellular Network.
Cellular network is organized into multiple low power transmitters each 100w or less.
Shape of Cells
The coverage areas of cellular networks are divided into cells, each cell having its own
antenna for transmitting the signals. Each cell has its own frequencies. Data communication
in cellular networks is served by its base station transmitter, receiver and its control unit.
The shape of cells can be either square or hexagon −
Hexagon
A hexagon cell shape is highly recommended for its easy coverage and calculations. It offers
the following advantages −
Frequency Reuse
Frequency reusing is the concept of using the same radio frequencies within a given area,
that are separated by considerable distance, with minimal interference, to establish
communication.
Frequency reuse offers the following benefits −
0112IT191046
Mobile Equipment (ME) – This refers to the physical phone itself. The phone must be able to
operate on a cellular network. Older phones operated on a single band only. Newer phones
are dual-band, triple-band, and even quad-band capable. A quad-band phone has the technical
capability to operate on any network worldwide.
Each phone is uniquely identified by the International Mobile Equipment Identity (IMEI)
number. This number is burned into the phone by the manufacturer. The IMEI can usually be
found by removing the battery of the phone and reading the panel in the battery well.
Base Transceiver Station (BTS) – It is actually the antenna that you see installed on top of the
tower. The BTS is the Mobile Phone’s access point to the network. It is responsible for
carrying out radio communications between the network and the Mobile Phone. It handles
speech encoding, encryption, multiplexing (TDMA), and modulation/demodulation of the
radio signals. One BTS usually covers a single 120 degree sector of an area. Usually a tower
with 3 BTSs will accommodate all 360 degrees around the tower. However, depending on
geography and user demand of an area, a cell may be divided up into one or two sectors, or a
cell may be serviced by several BTSs with redundant sector coverage. A BTS is assigned a
Cell Identity. The cell identity denotes a particular Location Area, which provides details of
the cell which the BTS is covering.
What is a Cell – A base station (transmitter) having a number of RF channels is called a cell.
Each cell covers a limited number of mobile subscribers within the cell boundaries (Coverage
area). Approximately a Cell Radius is 30 Km , (Start up), 1 KM (Mature) .
Cell Size and Capacity – Cell size determines number of cells available to cover geographic
area and (with frequency reuse) the total capacity available to all users. Capacity within cell
limited by available bandwidth and operational requirements. Each network operator has to
size cells to handle expected traffic demand
Base Station Controller (BSC) – The BSC controls multiple BTSs. It handles allocation of
radio channels, frequency administration, power and signal measurements from the MS, and
handovers from one BTS to another (if both BTSs are controlled by the same BSC). A BSC
0112IT191046
also functions as a "funneler". It reduces the number of connections to the Mobile Switching
Center (MSC) and allows for higher capacity connections to the MSC. A BSC may be
collocated with a BTS or it may be geographically separate. It may even be collocated with
the Mobile Switching Center (MSC)
Mobile Switching Center (MSC) – The MSC is the heart of the GSM network. It handles call
routing, call setup, and basic switching functions. An MSC handles multiple BSCs and also
interfaces with other MSC's and registers. It also handles inter-BSC handoffs as well as
coordinates with other MSC's for inter-MSC handoffs.
0112IT191046
2. Study and Analysis Code Division Multiple Access (CDMA).
Code Division Multiple Access (CDMA) is a sort of multiplexing that facilitates various
signals to occupy a single transmission channel. It optimizes the use of available bandwidth.
The technology is commonly used in ultra-high-frequency (UHF) cellular telephone
systems, bands ranging between the 800-MHz and 1.9-GHz.
CDMA Overview
Code Division Multiple Access system is very different from time and frequency
multiplexing. In this system, a user has access to the whole bandwidth for the entire
duration. The basic principle is that different CDMA codes are used to distinguish among
the different users.
Techniques generally used are direct sequence spread spectrum modulation (DS-CDMA),
frequency hopping or mixed CDMA detection (JDCDMA). Here, a signal is generated
which extends over a wide bandwidth. A code called spreading code is used to perform this
action. Using a group of codes, which are orthogonal to each other, it is possible to select a
signal with a given code in the presence of many other signals with different orthogonal
codes.
How Does CDMA Work?
CDMA allows up to 61 concurrent users in a 1.2288 MHz channel by processing each voice
packet with two PN codes. There are 64 Walsh codes available to differentiate between calls
and theoretical limits. Operational limits and quality issues will reduce the maximum
number of calls somewhat lower than this value.
In fact, many different "signals" baseband with different spreading codes can be modulated
on the same carrier to allow many different users to be supported. Using different orthogonal
codes, interference between the signals is minimal. Conversely, when signals are received
from several mobile stations, the base station is capable of isolating each as they have
different orthogonal spreading codes.
The following figure shows the technicality of the CDMA system. During the propagation,
we mixed the signals of all users, but by that you use the same code as the code that was
used at the time of sending the receiving side. You can take out only the signal of each user.
0112IT191046
CDMA Capacity
The factors deciding the CDMA capacity are −
Processing Gain
Signal to Noise Ratio
Voice Activity Factor
Frequency Reuse Efficiency
Capacity in CDMA is soft, CDMA has all users on each frequency and users are separated
by code. This means, CDMA operates in the presence of noise and interference.
In addition, neighboring cells use the same frequencies, which means no re-use. So, CDMA
capacity calculations should be very simple. No code channel in a cell, multiplied by no cell.
But it is not that simple. Although not available code channels are 64, it may not be possible
to use a single time, since the CDMA frequency is the same.
Advantages of CDMA
CDMA has a soft capacity. The greater the number of codes, the more the number of users.
It has the following advantages −
CDMA requires a tight power control, as it suffers from near-far effect. In other
words, a user near the base station transmitting with the same power will drown the
signal latter. All signals must have more or less equal power at the receiver
Rake receivers can be used to improve signal reception. Delayed versions of time (a
chip or later) of the signal (multipath signals) can be collected and used to make
decisions at the bit level.
Flexible transfer may be used. Mobile base stations can switch without changing
operator. Two base stations receive mobile signal and the mobile receives signals
from the two base stations.
0112IT191046
Transmission Burst − reduces interference.
Disadvantages of CDMA
The disadvantages of using CDMA are as follows −
The code length must be carefully selected. A large code length can induce delay or
may cause interference.
Time synchronization is required.
Gradual transfer increases the use of radio resources and may reduce capacity.
As the sum of the power received and transmitted from a base station needs constant
tight power control. This can result in several handovers.
0112IT191046
3. Study and Analysis of wired network.
A wired network is a common type of wired configuration. Most wired networks use Ethernet
cables to transfer data between connected PCs. In a small wired network, a single router may
be used to connect all the computers. Larger networks often involve multiple routers or
switches that connect to each other. One of these devices typically connects to a cable
modem, T1 line, or other type of Internet connection that provides Internet access to all
devices connected to the network.
Wired may refer to peripheral devices as well. Since many keyboards and mice are now
wireless, "wired" is often used to describe input devices that connect to a USB port.
Peripherals such as monitors and external hard drives also use cables, but they are rarely
called wired devices since wireless options are generally not available.
While many peripherals are now wireless, some users still prefer wired devices, since they
have a few benefits over their wireless counterparts. For example, an Ethernet connection is
not prone to signal interference that can slow down Wi-Fi connections. Additionally, wired
network connections are often faster than wireless ones, which allows for faster data transfer
rates. Some users also prefer wired peripherals since their is no need to replace batteries on a
regular basis. Gamers especially prefer wired keyboards and mice since they have lower
latency and can be backlit, thanks to the power provided by the USB connection.
There are three basic systems people use to set up wired networks. An Ethernet system uses either a twisted copper-
pair or coaxial-based transport system. The most commonly used cable for Ethernet is a category 5 unshielded
twisted pair (UTP) cable -- it's useful for businesses who want to connect several devices together, such as
computers and printers, but it's bulky and expensive, making it less practical for home use. A phone line, on the other
hand, simply uses existing phone wiring found in most homes, and can provide fast services such as DSL. Finally,
broadband systems provide cable Internet and use the same type of coaxial cable that gives us cable television.
0112IT191046
4. Study and Analysis of Bluetooth.
It is a Wireless Personal Area Network (WPAN) technology and is used for exchanging data
over smaller distances. This technology was invented by Ericson in 1994. It operates in the
unlicensed, industrial, scientific and medical (ISM) band at 2.4 GHz to 2.485 GHz.
Maximum devices that can be connected at the same time are 7. Bluetooth ranges upto 10
meters. It provides data rates upto 1 Mbps or 3 Mbps depending upon the version. The
spreading technique which it uses is FHSS (Frequency hopping spread spectrum). A
bluetooth network is called piconet and a collection of interconnected piconets is call
scatternet.
Bluetooth Architecture:
0112IT191046
Bluetooth protocols stack:
0112IT191046
7. OBEX:
It is short for Object Exchange. It is a communication protocol to exchange objects
between 2 devices.
8. WAP:
It is short for Wireless Access Protocol. It is used for internet access.
9. TCS:
It is short for Telephony Control Protocol. It provides telephony service.
10. Application layer:
It enables the user to interact with the application.
Advantages:
Low cost.
Easy to use.
It can also penetrate through walls.
It creates an adhoc connection immediately without any wires.
It is used for voice and data transfer.
Disadvantages:
It can be hacked and hence, less secure.
It has slow data transfer rate: 3 Mbps.
It has small range: 10 meters.
0112IT191046
5. Study of Mobile IP.
Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications
protocol that is designed to allow mobile device users to move from one network to another
while maintaining a permanent IPaddress.
It enables the transfer of information to and from mobile computers, such as laptops and
wireless communications. The mobile computer can change its location to a foreign network
and still access and communicate with and through the mobile computer’s home network.
0112IT191046
The care-of addresses acquired from a Foreign Agent: An IP address of a Foreign Agent
that has an interface on the foreign network being visited by a Mobile node.
The collocated care-of address: This represents the current position of the Mobile Node on
the foreign network and can be used by only one Mobile Node at a time.
Phase II: Registration
This the phase, where a mobile node registers its current location with the foreign agent and
the home agent. If the connected location is identified as foreign location, then the mobile
node looks for a foreign agent and registers itself with the foreign location and the
foreign agent, in turn, notifies the home agent and creates a tunnel between itself and the
home agent. During this phase, the Mobile node sends a registration request message to the
foreign agent which forwards the message to the home agent. The home agent sends back a
reply after updating its registration table with the home address and “care-of” address
mapping. The flow of these messages is described in the figure below.
Thus, a successful Mobile IP registration sets up the routing mechanism for transporting
packets to and from the mobile node as it roams.
After the registration phase, the home agent now encapsulates all the packets intended for
the mobile node and forwards those packets through the tunnel to the foreign agent. The
0112IT191046
foreign agent de-encapsulates the packet and forwards them to the mobile node. The return
path from the mobile node is as per the standard IP routing principle where the foreign agent
acts as a gateway for the mobile node.
0112IT191046
6. Study of OPNET tool for modeling and simulation of different cellular
standards.
Optimized Network Performance ensures a comprehensive development environment to
model various communication networks and distributed systems. We offer Opnet simulator
projects to enhance the behavior and performance of various systems by using discrete event
simulations. We incorporate all phases such as model design, data collection, simulation, and
data analysis. We deploy various communication and information processing to attain
leverage model networks and distributed system which supports ACM reference paper. It
ensures a specification of model through graphical editors.
Node Editor.
Network Editor.
Parameter Editor.
Process Editor.
Modeling Wireless Network: We support various modeling network in final year project for
students are
Radio Receiver Object: Radio Receiver object act as entry point in node for receiving
packets on radio communication links.
Radio Transceiver Pipeline To Model Radio Link:This pipeline composed of fourteen
stages and executed on per receiver basis whenever transmission occurs.
Antenna Object: It mainly used in radio transmission and affect simulation by association of
Radio transmitters and receivers.
0112IT191046
Performance of Complex Software Systems.
Other simulation tool supported by our team:
NS.
NetSim++.
SMURPH
Omnet++
OPNET
COMNET.
Voice Communication over Hybrid MANET using Opnet Modeler:
We deploy various processes of MANET services such as voice and video conference with
QoS support.
To ensure multimedia service and voice over Internet protocol support session
initiation protocol.
Different routing protocol for voice transmission are developed using OPNET
simulator.
0112IT191046
8.To write a programme to implement concept of frequency reuse when
given size of geographical area and the set of available frequencies.
In the cellular concept, frequencies allocated to the service are re-used in a regular pattern of areas, called 'cells', each
covered by one base station. In mobile-telephone nets these cells are usually hexagonal. In radio broadcasting, a
similar concept has been developed based on rhombic cells.
To ensure that the mutual interference between users remains below a harmful level, adjacent cells use different
frequencies. In fact, a set of C different frequencies {f1, ..., fC} are used for each cluster of C adjacent cells. Cluster
patterns and the corresponding frequencies are re-used in a regular pattern over the entire service area.
Frequency reuse plan for C = 3, with hexagonal cells. (i=1, j =1)Frequency reuse plan for C = 7 (i=2, j =1).
Reuse Distance
The closest distance between the centres of two cells using the
same frequency (in different clusters) is determined by the
choice of the cluster size C and the lay-out of the cell cluster.
This distance is called the frequency 're-use' distance. It can be
shown that the reuse distance ru, normalised to the size of each
hexagon, isru = SQRT{3 C}
0112IT191046