0% found this document useful (0 votes)
1K views19 pages

Lab Manual: IT-602 Wireless & Mobile Computing

The document is a lab manual for a course on wireless and mobile computing. It provides details on experiments related to studying different aspects of wireless networks, technologies, and standards. The first experiment involves analyzing wireless networks and their key characteristics like transmission distance, applications, and cellular network features such as frequency reuse. The second experiment focuses on studying Code Division Multiple Access (CDMA) technology, how it allows multiple signals to occupy the same channel using orthogonal codes, and its use in cellular systems.

Uploaded by

Sanjay kurmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views19 pages

Lab Manual: IT-602 Wireless & Mobile Computing

The document is a lab manual for a course on wireless and mobile computing. It provides details on experiments related to studying different aspects of wireless networks, technologies, and standards. The first experiment involves analyzing wireless networks and their key characteristics like transmission distance, applications, and cellular network features such as frequency reuse. The second experiment focuses on studying Code Division Multiple Access (CDMA) technology, how it allows multiple signals to occupy the same channel using orthogonal codes, and its use in cellular systems.

Uploaded by

Sanjay kurmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

BANSAL INSTITUTE OF SCIENCE AND TECHNOLOGY

BHOPAL

DEPARTMENT OF INFORMATION TECHNOLOGY

LAB MANUAL
IT-602
WIRELESS & MOBILE COMPUTING

Prepared By: Submitted to:


Sanjay Kurmi Prof Shailendra Thakur
Er.No -0112IT191046

Semester -6th

0112IT191046
INDEX

SR. NO.
LIST OF EXPERIMENTS
1 Study and Analysis of wireless network.
2 Study and Analysis Code Division Multiple Access (CDMA).

3 Study and Analysis of wired network.

4 Study and Analysis of Bluetooth.

5 Study of Mobile IP.

6 Study of OPNET tool for modeling and simulation of different cellular


standards.

7 To write a program to implement concept of frequency reuse when


given size of geographical area and the set of available frequencies.

0112IT191046
1. Study and Analysis of wireless network.

Wireless communication involves the transmission of information over a distance without the
help of wires, cables or any other forms of electrical conductors.

Wireless communication is a broad term that incorporates all procedures and forms of
connecting and communicating between two or more devices using a wireless signal through
wireless communication technologies and devices.

Features of Wireless Communication

 The evolution of wireless technology has brought much advancement with its
effective features.

 The transmitted distance can be anywhere between a few meters (for example, a
television's remote control) and thousands of kilometers (for example, radio
communication).

 Wireless communication can be used for cellular telephony, wireless access to the
internet, wireless home networking, and so on.

 Other examples of applications of radio wireless technology include GPS units,


garage door openers, wireless computer mice, keyboards and headsets, headphones,
radio receivers, satellite television, broadcast television and cordless telephones.

Cellular network is an underlying technology for mobile phones, personal communication


systems, wireless networking etc. The technology is developed for mobile radio telephone to
replace high power transmitter/receiver systems. Cellular networks use lower power, shorter
range and more transmitters for data transmission.

Features of Cellular Systems


Wireless Cellular Systems solves the problem of spectral congestion and increases user
capacity. The features of cellular systems are as follows −
 Offer very high capacity in a limited spectrum.
 Reuse of radio channel in different cells.
 Enable a fixed number of channels to serve an arbitrarily large number of users by
reusing the channel throughout the coverage region.
 Communication is always between mobile and base station (not directly between
mobiles).
 Each cellular base station is allocated a group of radio channels within a small
geographic area called a cell.
 Neighboring cells are assigned different channel groups.
 By limiting the coverage area to within the boundary of the cell, the channel groups
may be reused to cover different cells.

0112IT191046
 Keep interference levels within tolerable limits.
 Frequency reuse or frequency planning.
 Organization of Wireless Cellular Network.
Cellular network is organized into multiple low power transmitters each 100w or less.

Shape of Cells
The coverage areas of cellular networks are divided into cells, each cell having its own
antenna for transmitting the signals. Each cell has its own frequencies. Data communication
in cellular networks is served by its base station transmitter, receiver and its control unit.
The shape of cells can be either square or hexagon −

Hexagon
A hexagon cell shape is highly recommended for its easy coverage and calculations. It offers
the following advantages −

 Provides equidistant antennas


 Distance from center to vertex equals length of side

Frequency Reuse
Frequency reusing is the concept of using the same radio frequencies within a given area,
that are separated by considerable distance, with minimal interference, to establish
communication.
Frequency reuse offers the following benefits −

 Allows communications within cell on a given frequency


 Limits escaping power to adjacent cells
 Allows re-use of frequencies in nearby cells
 Uses same frequency for multiple conversations
 10 to 50 frequencies per cell

0112IT191046
 Mobile Equipment (ME) – This refers to the physical phone itself. The phone must be able to
operate on a cellular network. Older phones operated on a single band only. Newer phones
are dual-band, triple-band, and even quad-band capable. A quad-band phone has the technical
capability to operate on any network worldwide.
Each phone is uniquely identified by the International Mobile Equipment Identity (IMEI)
number. This number is burned into the phone by the manufacturer. The IMEI can usually be
found by removing the battery of the phone and reading the panel in the battery well.

 Base Transceiver Station (BTS) – It is actually the antenna that you see installed on top of the
tower. The BTS is the Mobile Phone’s access point to the network. It is responsible for
carrying out radio communications between the network and the Mobile Phone. It handles
speech encoding, encryption, multiplexing (TDMA), and modulation/demodulation of the
radio signals. One BTS usually covers a single 120 degree sector of an area. Usually a tower
with 3 BTSs will accommodate all 360 degrees around the tower. However, depending on
geography and user demand of an area, a cell may be divided up into one or two sectors, or a
cell may be serviced by several BTSs with redundant sector coverage. A BTS is assigned a
Cell Identity. The cell identity denotes a particular Location Area, which provides details of
the cell which the BTS is covering.

 What is a Cell – A base station (transmitter) having a number of RF channels is called a cell.
Each cell covers a limited number of mobile subscribers within the cell boundaries (Coverage
area). Approximately a Cell Radius is 30 Km , (Start up), 1 KM (Mature) .

 Cell Size and Capacity – Cell size determines number of cells available to cover geographic
area and (with frequency reuse) the total capacity available to all users. Capacity within cell
limited by available bandwidth and operational requirements. Each network operator has to
size cells to handle expected traffic demand

 Base Station Controller (BSC) – The BSC controls multiple BTSs. It handles allocation of
radio channels, frequency administration, power and signal measurements from the MS, and
handovers from one BTS to another (if both BTSs are controlled by the same BSC). A BSC

0112IT191046
also functions as a "funneler". It reduces the number of connections to the Mobile Switching
Center (MSC) and allows for higher capacity connections to the MSC. A BSC may be
collocated with a BTS or it may be geographically separate. It may even be collocated with
the Mobile Switching Center (MSC)

 Mobile Switching Center (MSC) – The MSC is the heart of the GSM network. It handles call
routing, call setup, and basic switching functions. An MSC handles multiple BSCs and also
interfaces with other MSC's and registers. It also handles inter-BSC handoffs as well as
coordinates with other MSC's for inter-MSC handoffs.

0112IT191046
2. Study and Analysis Code Division Multiple Access (CDMA).
Code Division Multiple Access (CDMA) is a sort of multiplexing that facilitates various
signals to occupy a single transmission channel. It optimizes the use of available bandwidth.
The technology is commonly used in ultra-high-frequency (UHF) cellular telephone
systems, bands ranging between the 800-MHz and 1.9-GHz.
CDMA Overview
Code Division Multiple Access system is very different from time and frequency
multiplexing. In this system, a user has access to the whole bandwidth for the entire
duration. The basic principle is that different CDMA codes are used to distinguish among
the different users.
Techniques generally used are direct sequence spread spectrum modulation (DS-CDMA),
frequency hopping or mixed CDMA detection (JDCDMA). Here, a signal is generated
which extends over a wide bandwidth. A code called spreading code is used to perform this
action. Using a group of codes, which are orthogonal to each other, it is possible to select a
signal with a given code in the presence of many other signals with different orthogonal
codes.
How Does CDMA Work?
CDMA allows up to 61 concurrent users in a 1.2288 MHz channel by processing each voice
packet with two PN codes. There are 64 Walsh codes available to differentiate between calls
and theoretical limits. Operational limits and quality issues will reduce the maximum
number of calls somewhat lower than this value.
In fact, many different "signals" baseband with different spreading codes can be modulated
on the same carrier to allow many different users to be supported. Using different orthogonal
codes, interference between the signals is minimal. Conversely, when signals are received
from several mobile stations, the base station is capable of isolating each as they have
different orthogonal spreading codes.
The following figure shows the technicality of the CDMA system. During the propagation,
we mixed the signals of all users, but by that you use the same code as the code that was
used at the time of sending the receiving side. You can take out only the signal of each user.

0112IT191046
CDMA Capacity
The factors deciding the CDMA capacity are −

 Processing Gain
 Signal to Noise Ratio
 Voice Activity Factor
 Frequency Reuse Efficiency
Capacity in CDMA is soft, CDMA has all users on each frequency and users are separated
by code. This means, CDMA operates in the presence of noise and interference.
In addition, neighboring cells use the same frequencies, which means no re-use. So, CDMA
capacity calculations should be very simple. No code channel in a cell, multiplied by no cell.
But it is not that simple. Although not available code channels are 64, it may not be possible
to use a single time, since the CDMA frequency is the same.
Advantages of CDMA
CDMA has a soft capacity. The greater the number of codes, the more the number of users.
It has the following advantages −
 CDMA requires a tight power control, as it suffers from near-far effect. In other
words, a user near the base station transmitting with the same power will drown the
signal latter. All signals must have more or less equal power at the receiver
 Rake receivers can be used to improve signal reception. Delayed versions of time (a
chip or later) of the signal (multipath signals) can be collected and used to make
decisions at the bit level.
 Flexible transfer may be used. Mobile base stations can switch without changing
operator. Two base stations receive mobile signal and the mobile receives signals
from the two base stations.

0112IT191046
 Transmission Burst − reduces interference.
Disadvantages of CDMA
The disadvantages of using CDMA are as follows −
 The code length must be carefully selected. A large code length can induce delay or
may cause interference.
 Time synchronization is required.
 Gradual transfer increases the use of radio resources and may reduce capacity.
 As the sum of the power received and transmitted from a base station needs constant
tight power control. This can result in several handovers.

0112IT191046
3. Study and Analysis of wired network.

In computing terminology, the term "wired" is used to differentiate between wireless


connections and those that involve cables. While wireless devices communicate over the air,
a wired setup uses physical cables to transfer data between different devices and computer
systems.

A wired network is a common type of wired configuration. Most wired networks use Ethernet
cables to transfer data between connected PCs. In a small wired network, a single router may
be used to connect all the computers. Larger networks often involve multiple routers or
switches that connect to each other. One of these devices typically connects to a cable
modem, T1 line, or other type of Internet connection that provides Internet access to all
devices connected to the network.

Wired may refer to peripheral devices as well. Since many keyboards and mice are now
wireless, "wired" is often used to describe input devices that connect to a USB port.
Peripherals such as monitors and external hard drives also use cables, but they are rarely
called wired devices since wireless options are generally not available.

While many peripherals are now wireless, some users still prefer wired devices, since they
have a few benefits over their wireless counterparts. For example, an Ethernet connection is
not prone to signal interference that can slow down Wi-Fi connections. Additionally, wired
network connections are often faster than wireless ones, which allows for faster data transfer
rates. Some users also prefer wired peripherals since their is no need to replace batteries on a
regular basis. Gamers especially prefer wired keyboards and mice since they have lower
latency and can be backlit, thanks to the power provided by the USB connection.

There are three basic systems people use to set up wired networks. An Ethernet system uses either a twisted copper-
pair or coaxial-based transport system. The most commonly used cable for Ethernet is a category 5 unshielded
twisted pair (UTP) cable -- it's useful for businesses who want to connect several devices together, such as
computers and printers, but it's bulky and expensive, making it less practical for home use. A phone line, on the other
hand, simply uses existing phone wiring found in most homes, and can provide fast services such as DSL. Finally,
broadband systems provide cable Internet and use the same type of coaxial cable that gives us cable television.

0112IT191046
4. Study and Analysis of Bluetooth.
It is a Wireless Personal Area Network (WPAN) technology and is used for exchanging data
over smaller distances. This technology was invented by Ericson in 1994. It operates in the
unlicensed, industrial, scientific and medical (ISM) band at 2.4 GHz to 2.485 GHz.
Maximum devices that can be connected at the same time are 7. Bluetooth ranges upto 10
meters. It provides data rates upto 1 Mbps or 3 Mbps depending upon the version. The
spreading technique which it uses is FHSS (Frequency hopping spread spectrum). A
bluetooth network is called piconet and a collection of interconnected piconets is call
scatternet.

Bluetooth Architecture:

0112IT191046
Bluetooth protocols stack:

1. Radio (RF) layer:


It performs modulation/demodulation of the data into RF signals. It defines the physical
characteristics of bluetooth transceiver. It defines two types of physical link:
connection-less and connection-oriented.
2. Baseband Link layer:
It performs the connection establishment within a piconet.
3. Link Manager protocol layer:
It performs the management of the already established links. It also includes
authentication and encryption processes.
4. Logical Link Control and Adaption protocol layer:
It is also known as the heart of the bluetooth protocol stack. It allows the
communication between upper and lower layers of the bluetooth protocol stack. It
packages the data packets received from upper layers into the form expected by lower
layers. It also performs the segmentation and multiplexing.
5. SDP layer:
It is short for Service Discovery Protocol. It allows to discover the services available on
another bluetooth enabled device.
6. RF comm layer:
It is short for Radio Frontend Component. It provides serial interface with WAP and
OBEX.

0112IT191046
7. OBEX:
It is short for Object Exchange. It is a communication protocol to exchange objects
between 2 devices.
8. WAP:
It is short for Wireless Access Protocol. It is used for internet access.
9. TCS:
It is short for Telephony Control Protocol. It provides telephony service.
10. Application layer:
It enables the user to interact with the application.
Advantages:
 Low cost.
 Easy to use.
 It can also penetrate through walls.
 It creates an adhoc connection immediately without any wires.
 It is used for voice and data transfer.
Disadvantages:
 It can be hacked and hence, less secure.
 It has slow data transfer rate: 3 Mbps.
 It has small range: 10 meters.

0112IT191046
5. Study of Mobile IP.

Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications
protocol that is designed to allow mobile device users to move from one network to another
while maintaining a permanent IPaddress.
It enables the transfer of information to and from mobile computers, such as laptops and
wireless communications. The mobile computer can change its location to a foreign network
and still access and communicate with and through the mobile computer’s home network.

Mobile IP for better Mobility


Mobile IP – A technology which supports mobile data and applications that are dealing with
wireless connectivity. A user may now disconnect his computer in the office and reconnect
from another site within the same office or elsewhere.
Mobile IP or IP-Mobility Management (IP-MM) is an open standard communication
protocol defined by Internet Engineering Task Force (IETF) that allows mobile device users
to move from one network to another without changing their IP address as a change in the IP
address will interrupt ongoing TCP/IP communications. Mobile IP is an enhancement of the
Internet Protocol (IP) which allows a node to change its point of attachment to the Internet
without needing to change its IP address.
Mobile IP is independent of the physical layer technology as the mobility functions are
performed at the network layer – any media that can support IP can support Mobile IP.

Components of a Mobile IP Network


Mobile IP has three major components as mentioned below –
 Mobile Node: A device such as a cell phone, personal digital assistant, or laptop whose
software enables network roaming capabilities.
 The Home Agent: A router on the home network serving as the anchor point for
communication with the mobile node; its tunnel packets from a device on the Internet,
called a correspondent node, to the roaming mobile node.
 The Foreign Agent: A router that may function as the point of attachment for the mobile
node when it roams to a foreign network delivers packets from the home agent to the
mobile node.
The Mobile IP process has three main phases –

Phase I: Agent Discovery


This is the phase where mobile node discovers its foreign and home agents. A mobile node
first determines its connected location by using ICMP router discovery messages. If it’s
connected location is with the local network, then the normal IP routing is used for the
communication. When a mobile node determines that it has moved to a foreign network it
obtains a care-of address from the foreign agent reflecting its current location.
Two types of “care-of” addresses exist –

0112IT191046
 The care-of addresses acquired from a Foreign Agent: An IP address of a Foreign Agent
that has an interface on the foreign network being visited by a Mobile node.
 The collocated care-of address: This represents the current position of the Mobile Node on
the foreign network and can be used by only one Mobile Node at a time.
Phase II: Registration
This the phase, where a mobile node registers its current location with the foreign agent and
the home agent. If the connected location is identified as foreign location, then the mobile
node looks for a foreign agent and registers itself with the foreign location and the
foreign agent, in turn, notifies the home agent and creates a tunnel between itself and the
home agent. During this phase, the Mobile node sends a registration request message to the
foreign agent which forwards the message to the home agent. The home agent sends back a
reply after updating its registration table with the home address and “care-of” address
mapping. The flow of these messages is described in the figure below.

Thus, a successful Mobile IP registration sets up the routing mechanism for transporting
packets to and from the mobile node as it roams.

Phase III: Tunneling


This is the phase where a reciprocal tunnel is set up by the home agent to the care-of address
to route packets to the mobile node as it roams. The method by which mobile IP receives
information from a network is called tunneling.
It has two primary functions:

1. Encapsulation of the data packet to reach the tunnel endpoint.


2. Decapsulation, when the packet is delivered at that endpoint.

After the registration phase, the home agent now encapsulates all the packets intended for
the mobile node and forwards those packets through the tunnel to the foreign agent. The

0112IT191046
foreign agent de-encapsulates the packet and forwards them to the mobile node. The return
path from the mobile node is as per the standard IP routing principle where the foreign agent
acts as a gateway for the mobile node.

0112IT191046
6. Study of OPNET tool for modeling and simulation of different cellular
standards.
Optimized Network Performance ensures a comprehensive development environment to
model various communication networks and distributed systems. We offer Opnet simulator
projects to enhance the behavior and performance of various systems by using discrete event
simulations. We incorporate all phases such as model design, data collection, simulation, and
data analysis. We deploy various communication and information processing to attain
leverage model networks and distributed system which supports ACM reference paper. It
ensures a specification of model through graphical editors.

Editor Tools in OPNET Modeler:


We ensure various tools for Opnet called editors to develop new simulation model for

 Node Editor.
 Network Editor.
 Parameter Editor.
 Process Editor.

Modeling Wireless Network: We support various modeling network in final year project for
students are
Radio Receiver Object: Radio Receiver object act as entry point in node for receiving
packets on radio communication links.
Radio Transceiver Pipeline To Model Radio Link:This pipeline composed of fourteen
stages and executed on per receiver basis whenever transmission occurs.
Antenna Object: It mainly used in radio transmission and affect simulation by association of
Radio transmitters and receivers.

Opnet Modeler Simulator:


We support opnet simulator to perform simulation and to monitor the performance of
network. It composed of low level design, MPSL Technology, Network implementation,
Prediction and validation of networks.

Uses of Opnet Modeler:


We provide uses of simulation are:
 Queuing Network Model.
 Hardware Architecture Validation.
 Traffic Modeling Of Telecommunication Network.
 Multiprocessor and Distributed System.

0112IT191046
 Performance of Complex Software Systems.
Other simulation tool supported by our team:
 NS.
 NetSim++.
 SMURPH
 Omnet++
 OPNET
 COMNET.
Voice Communication over Hybrid MANET using Opnet Modeler:
We deploy various processes of MANET services such as voice and video conference with
QoS support.
 To ensure multimedia service and voice over Internet protocol support session
initiation protocol.
 Different routing protocol for voice transmission are developed using OPNET
simulator.

Performance Analysis Carried in Opnet Modeler: During voice transmission, routing


protocol performance is measured using OPNET simulator. It se parameter fro protocols and
configure routing for protocol, SIP client, Voice encoding, table configuration on each node.

Performance Metrics of Opnet Modeler:


We measured the following metrics in more than 80 projects are:
 Jitter.
 Packet delay variation.
 Packet Delivery Ratio.
 Routing load.
 End to End delay.
 Throughput.

Advantages of using Opnet Modeler Simulator:


We offer advantages are:
 Cost.
 Mobility.
 Installation and Rewiring.

0112IT191046
8.To write a programme to implement concept of frequency reuse when
given size of geographical area and the set of available frequencies.
In the cellular concept, frequencies allocated to the service are re-used in a regular pattern of areas, called 'cells', each
covered by one base station. In mobile-telephone nets these cells are usually hexagonal. In radio broadcasting, a
similar concept has been developed based on rhombic cells.
To ensure that the mutual interference between users remains below a harmful level, adjacent cells use different
frequencies. In fact, a set of C different frequencies {f1, ..., fC} are used for each cluster of C adjacent cells. Cluster
patterns and the corresponding frequencies are re-used in a regular pattern over the entire service area.

Frequency reuse plan for C = 3, with hexagonal cells. (i=1, j =1)Frequency reuse plan for C = 7 (i=2, j =1).

Reuse Distance
The closest distance between the centres of two cells using the
same frequency (in different clusters) is determined by the
choice of the cluster size C and the lay-out of the cell cluster.
This distance is called the frequency 're-use' distance. It can be
shown that the reuse distance ru, normalised to the size of each
hexagon, isru = SQRT{3 C}

For hexagonal cells, i.e., with 'honeycomb' cell lay-outs


commonly used in mobile radio, possible cluster sizes are C = i2 + ij + j2, with
integer i and j (C = 1, 3, 4, 7, 9, ...). Integers i and j determine the relative location of co-
channel cells.

7-cell reuse with i = 2 and j =1.

0112IT191046

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy