Advantages of TDMA
Advantages of TDMA
Advantages of TDMA
Disadvantages of TDMA
CDMA
Advantages of CDMA
One of the main advantages of CDMA is that dropouts occur only when the phone is
at least twice as far from the base station. Thus, it is used in the rural areas where
GSM cannot cover.
Another advantage is its capacity; it has a very high spectral capacity that it can
accommodate more users per MHz of bandwidth.
Disadvantages of CDMA
Channel pollution, where signals from too many cell sites are present in the
subscriber. s phone but none of them is dominant. When this situation arises, the
quality of the audio degrades.
When compared to GSM is the lack of international roaming capabilities.
The ability to upgrade or change to another handset is not easy with this technology
because the network service information for the phone is put in the actual phone
unlike GSM which uses SIM card for this.
Limited variety of the handset, because at present the major mobile companies use
GSM technology.
A. TCP/IP
B. ISD
C. WAP
D. HTTP
A . ½ second, 10 seconds
B. 1 second, 12 seconds
C. 1 minute, 5 minutes
D. 1 hour, 12 hours
A. XML
B. WML
C. DHTMLL
D. XHTML
6. In a distributed system, a client sends the request, and the server provides_____
A. Data
B. Service
C. Information
7. Which of the following can be considered as the primary function of snooping TCP?
A. To buffer data close to the mobile host to perform fast local retransmission in case of
packet loss.
B. Congestion control
C. Flow control
D. None of the above
B.Wired device
C. Wireless-enabled device
B. Microwaves
C. Both A and B
B. 100mbs
C. 200mbps
19. The multiple satellite access technique suitable only for digital transmission is the
A. CDMA
B. TDMA
C. FDMA
D. Both TDMA and FDMA
20. In which one of the following codes with specific characteristics can be applied to the
transmission?
A. CDMA
B. GPRS
C. GSM
D. All of the above
21. Which of the following uses wireless as the mode of communication for transferring or
exchanging data between various mobiles over a short-range?
A. Ad hoc computing
B. Mobile computing
C. Bluetooth technology
D. None of the above
22. Mobile Computing allows transmission of data from one wireless-enabled device to
another_
A. Any device
B. Wired device
C. Wireless-enabled device
D. one of the above
23. Which of the following can be considered as the drawbacks of the Mobile and Wireless
Devices?
A. Smaller keypads
B. Consumes power rapidly
C. Requires a big power source
D. All of the above
24. In general, a mobile computing environment can also be considered as the type of
__________ environment.
A. Grid computing
B. Mobile computing
C. Distributed computing
D. None of the above
A. Electromagnetic waves
B. Microwaves
C. Both A and B
D. None of the above
27. In which of the following, the single-channel has the ability to carry all transmissions
simultaneously?
28. In which one of the following times is specifically divided into several time slots that are
in the fixed patterns?
A. CDMA
B. TDMA
C. FDMA
D. All of the above
a. 5MHz
b. 2MHz
c. 500KHz
d. 100KHz
30.CDMA2000 1xEV provides high speed data access with channel allocation of
a. 5 MHz
b. 50 MHz
c. 1.25 MHz
d. 4 MHz
5 MARK
10 MARK
1. EXPLAIN BRIEFLY MOBILE COMPUTING.
UNIT 1 COMPLETED
UNIT II
Overview of Mobile IP
IP Addressing :
- Dotted Decimal Notation: 32 bits (4x8) used to represent IPv4
addresses - 192.19.241.18
- Network Prefix and Host Portions: p - prefix, h - host, p + h = 32.
If p = 24 then h = 32 - 24 = 8. Using above address the network prefix will be 192.19.241
and host will be 18.
For those of you familiar with subnet masks, “p” represents the number
of 1’s in the subnet mask. If p = 24, subnet mask is 255.255.255.0, if p = 26, subnet mask is
255.255.255.192. 5
IP Routing:
- Network prefix is used for routing. Routing tables are used to look
up next hop and the interface on the router that is to be used.
- In the routing tables we use the following notation: target/prefix
length, e.g., 192.19.241.0/24, or 192.19.241.192/26.
- If two subnet masks/prefixes fit the address, the one with the largest
prefix is chosen for routing. E.g., a router with the following 3 entries in its table:
7.7.7.99/32 (p=32 host specific) and 7.7.7.0/24 (0<pp<32 network prefix) and 0.0.0.0/0
(p=0 default) will use entry 2 for an IP packet with destination 7.7.7.1 and entry 3 for
destination 192.33.14.12
Domain Name System (DNS): used to translate a host name to an IP address.
A host sends a query to a server to obtain the IP address of a destination of which it only
has the host name.
Link Layer Addresses - Address Resolution Protocol (ARP):
- Once a host has the IP address of a destination it then needs to finds its
layer 2 address or the layer 2 address of the next hop on the path. A broadcast message is
sent and the targeted host responds with its layer 2 address.
- A proxy ARP is a response by a node for another node that cannot
respond at the time the request is made (e.g. the node is a mobiel node and not on its host
net at the time, its home agent will respond in its stead).
- A gratuitous ARP, is a reply to no ARP request, used by a node that just
joins the network and wants to make its address known. Can be used by a mobile node
upon its return to its home net.
Motivation for Mobile IP
IP Routing
- based on IP destination address, network prefix (e.g. 129.13.42)
determines physical subnet
- change of physical subnet implies change of IP address to have a
topologically correct address (standard IP) or needs special entries in the routing
tables
Specific routes to end-systems?
- requires changing all routing table entries to forward packets to the right
destination
- does not scale with the number of mobile hosts and frequent changes in
the location, security problems
Changing the IP-address?
- adjust the host IP address depending on the current location
- almost impossible to find a mobile system, DNS updates take long time
- TCP connections break, security problems
Requirements to Mobile IP
Transparency
- mobile end-systems keep their IP address
- continuation of communication after interruption of link possible
- point of connection to the fixed network can be changed
Compatibility
- support of the same layer 2 protocols as IP
- no changes to current end-systems and routers required
- mobile end-systems can communicate with fixed systems
Security
- authentication of all registration messages
Efficiency and scalability
- only little additional messages to the mobile system
required(connection typically via a low bandwidth radio link)
- world-wide support of a large number of mobile systems in the
whole Internet
Mobile IP Terminology
1. Mobile Node (MN)
- system (node) that can change the point of connection to the network
without changing its IP address
2. Home Agent (HA)
- system in the home network of the MN, typically a router
- registers the location of the MN, tunnels IP datagrams to the
COA
3. Foreign Agent (FA)
- system in the current foreign network of the MN, typically a
router
- forwards the tunneled datagrams to the MN, typically also the
default router for the MN
4. Care-of Address (COA)
- address of the current tunnel end-point for the MN (at FA or
MN)
- actual location of the MN from an IP point of view
- can be chosen, e.g., via DHCP
5. Correspondent Node (CN)
- communication partner
Mobile IP Features
Allows a host to be reachable at the same address, even as it changes
its location
makes it seem as one network extends over the entire Internet
continuous connectivity, seamless roaming even while network
applications are running
fully transparent to the user
Key Mechanism in Mobile IP
Home Agents and Foreign Agents advertise their presence on
any attached links by periodically multicasting or broadcasting special Mobile IP
messages called Agent Advertisements
Mobile Nodes listen to these Agent Advertisements and
examine their contents to determine whether they are connected to their home link
or a foreign link
A Mobile Node connected to a foreign link acquires a care-of
address. A foreign agent care-of address can be read from one of the fields within
the foreign agent’s Agent Advertisement.
A collocated care-of address must be acquired by some
assignment procedure, such as Dynamic Host Configuration Protocol (DHCP), the
Point-to-Point Protocol’s IP Control Protocol (IPCP), or manual configuration.
The mobile IP Registers the care-of address acquired previously with
its home agent, using a message-exchange defined by Mobile IP. It asks for service
from a Foreign Agent, if one is present on the link. In order to prevent Denial-of-
Service attacks, the registration messages are required to be authenticated
The Home Agent or some other router on the home link
advertises reachability to the network-prefix of the Mobile Node’s home address, thus
attracting packets that are destined to the Mobile Node’s home address. The Home
Agent intercepts these packets, and tunnels them to the care-of address that the mobile
node registered previously
At the care-of address – at either the Foreign Agent or one of
the interfaces of the mobile node itself – the original packet is extracted from the
tunnel and then delivered to the Mobile Node
In the reverse direction, packets sent by the Mobile Node are
routed directly to their destination, without any need for tunneling. The Foreign Agent
serves as a default router for all packets generated by visiting node.
Route Optimization
1. Triangle Routing: tunneling in its simplest form has all packets go to home
network (HA) and then sent to MN via a tunnel.
- This involves two IP routes that need to be set-up, one original and the
second the tunnel route.
- Causes unnecessary network overhead and adds to the latency.
2. Route optimization: allows the correspondent node to learn the current location
of the MN and tunnel its own packets directly. Problems arise with
mobility: correspondent node has to update/maintain its cache.
authentication: HA has to communicate with the correspondent node to
do authentication, i.e., security association is with HA not with MN.
Transmission Control Protocol/Internet Protocol (TCP/IP)
Resulted from a coordinated effort by the U.S. Department of
Defense (DOD)
Advanced Research Projects Agency (ARPA)
- Charged with creating a wide area network (WAN)
- Results were TCP/IP and ARPANET
DOD funded two projects
- The adaptation of TCP/IP to work with UNIX
- The inclusion of the TCP/IP protocol with Berkeley UNIX (BSD
UNIX)
Reliable, full-duplex, connection oriented, stream delivery
Interface presented to the application doesn’t require data in
individual packets
Data is guaranteed to arrive, and in the correct order without
duplications
Or the connection will be dropped
Imposes significant overheads
The TCP/IP model explains how the protocol suite works to
provide communications
Four layers: Application, Transport, Internetwork, and
Network Interface
Requests for Comments (RFCs)
- Define, describe, and standardize the implementation and
configuration of the TCP/IP protocol suite.
Application Layer
- Protocols at the TCP/IP Application layer include:
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP)
Network File System (NFS)
Simple Mail Transfer Protocol (SMTP)
Terminal emulation protocol (telnet)
Remote login application (rlogin)
Simple Network Management Protocol (SNMP)
Domain Name System (DNS)
Hypertext Transfer Protocol (HTTP)
Transport Layer
- Performs end-to-end packet delivery, reliability, and flow control
- Protocols:
TCP provides reliable, connection-oriented communications between two
hosts
Requires more network overhead
UDP provides connectionless datagram services between two hosts
Faster but less reliable
Reliability is left to the Application layer
Ports
TCP and UDP use port numbers for communications between host.
Port numbers are divided into three ranges:
Well Known Ports are those from 1 through 1,023
Registered Ports are those from 1,024 through 49,151
Dynamic/Private Ports are those from 49,152 through 65,535
Adaption of TCP Window
TCP sliding windows
Control the flow and efficiency of communication
Also known as windowing
- A method of controlling packet flow between hosts.
- Allows multiple packets to be sent and affirmed with a single
acknowledgment packet.
The size of the TCP window determines the number of
acknowledgments sent for a given data transfer
Networks that perform large data transfers should use large window
sizes
Other flow control methods include
Buffering
Congestion avoidance
Internetwork Layer
- Four main protocols function at this layer
Internet Protocol (IP)
Internet Control Message Protocol (ICMP)
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol (RARP)
-ARP
A routed protocol
Maps IP addresses to MAC addresses
ARP tables contain the MAC and IP addresses of other devices on
the network
Network Interface Layer
-Plays the same role as the Data Link and Physical layers of the OSI model
-The MAC address, network card drivers, and specific interfaces for the
network card function at this level
-No specific IP functions exist at this layer
-Because the layer’s focus is on communication with the network card and
other networking hardware.
Snoop-TCP
-A (snoop) layer is added to the routing code at BS which keep track of
packets in both directions
-Packets meant to MH are cached at BS, and if needed, retransmitted in the
wireless link
-BS suppress DUPACKs sent from MH to FH
-BS use shorter local timer for local timeout
-Changes are restricted to BS and optionally to MH as well
-E2E TCP semantics is preserved
Disadvantages
-End-to-end semantics is not followed
-MSR sends an ack to the correspondent but loses the packet to the
mobile host
-Copying overhead at MSR
Conclusion
I-TCP particularly suited for applications which are throughput intensive.
UNIT II
1. 1. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
a) Application
b) Host to host
c) Internet
d) Network Access
3. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD
model is equivalent to the Network layer of the OSI model?
a) Application
b) Host to Host
c) Internet
d) Network Access
12. TCP supports many of the Internet’s most popular application protocols and resulting
applications, including the –
13. In the Internet protocol suite, TCP is the intermediate layer between the —–
a. Internet layer and application layer
b. Mobile laver and application layer
c. Transport layer and application layer
d. Session layer and application layer
14. The major responsibilities of TCP in an active session are to:
a. Provide reliable in-order transport of data
b. Control congestions in the networks
c. Control a packet flow between the transmitter and the receiver
d. All of the above
15. In TCP protocol to mitigate congestion, TCP —————–the transmission rate
dramatically.
a. Stop the transmission
b. Wait to resolve the congestion
c. Slows down
d. None of the above
16. The behavior of TCP shows after the detection of congestion is called
a. Slow start
b. Slows down
c. Wait to restart
d. None of the above
17. In TCP during the slow start doubling the congestion window, every time
acknowledgments come back until reaching the congestion threshold is called
a. The exponential growth of the congestion window
b Doubling the growth of the congestion window
c. Linear growth of the congestion window
d. None
18. As soon as the congestion window reaches the congestion threshold, further increase of
the transmission rate is only linear by adding ……… to the congestion window each time the
acknowledgments come back.
a. 1
b. 2
c. 3
d. None of the above
19. In TCP/IP, ———————— is a congestion control algorithm that makes it possible to
quickly recover lost data packets.
a. fast retransmit and fast recovery
b. Fast retransmit
c. Fast recovery
d. None of the above
20. Due to packet loss due to transmission error the sender can now retransmit the missing
packet(s) before the timer expires. This behavior is called
a. Fast retransmit
b. Fast recovery
c. Congestion control
d. None
21. Problems with Traditional TCP in wireless environments is/are
a. Slow Start mechanism in fixed networks decreases the efficiency of TCP if used with
mobile receivers or senders.
b. Error rates on wireless links are orders of magnitude higher compared to fixed fiber or
copper links. This makes compensation for packet loss by TCP quite difficult.
c. Mobility itself can cause packet loss. There are many situations where a soft handover
from one access point to another is not possible for a mobile end-system.
d. All of the above
22. Indirect TCP segments a TCP connection into a fixed part and a ——-
a. wireless part
b. wired part
c. either wireless part or wired part
d. None of the above
23. In I-TCP a suitable place for segmenting the connection is at the …………………… as it
not only controls the mobility of the mobile host anyway and can also hand over the
connection to the next foreign agent when the mobile host moves on.
a. Router
b. Home agent
c. Foreign agent
d. Access point
24. Disadvantages of I-TCP includes –
a. Loss of end-to-end semantics
b. Higher latency possible
c. Security issues
d. All of the above
25. In the I TCP the Foreign Agent (FA) becomes or acts as a —— and relays data in both
directions
a. Proxy
b. Router
c. Node
d. Access point
26. Which of the following buffers data close to the mobile host to perform fast local
retransmission in case of packet loss.
a. Indirect TCP
b. Snooping TCP
c. Foreign agent
d. None of the following
27. A new enhancement, which leaves the TCP connection intact and is completely
transparent, is ———–
a. Mobile TCP
b. Snooping TCP
c. I TCP
d. None
28. M-TCP is specially adapted to the problems arising from lengthy or frequent ————–
a. Delay packet
b. Packet loss
c. disconnections
d. None
29. In which of the following the sender can now determine precisely which packet is needed
and retransmit it?
a. I TCP
b. M TCP
c. Selective transmission
d. None of the above
30. An endpoint of an inter-process communication flow across a computer network is called
__________
a) socket
b) pipe
c) port
d) machine
5 MARK
1. Explain about Features Of Mobile IP.
2. Describe Route Optimization.
3. What is Key Mechanism In Mobile IP?
10 MARK
1. Define Architecture Of TCP / IP.
2. Explain Adaptation Of TCP Window?
3. Describe about Overview Of IP
4. Define Improvement In TCP performance?
UNIT II COMPLETED
UNIT III
GSM
GSM stands for Global System for Mobile Communication. GSM is an open and digital
cellular technology used for mobile communication. It uses 4 different frequency bands of
850 MHz, 900 MHz, 1800 MHz and 1900 MHz . It uses the combination of FDMA and
TDMA. This article includes all the concepts of GSM architecture and how it works.
GSM is nothing but a larger system which is divided into further 3 subsystems.
1. BSS : BSS stands for Base Station Subsystem. BSS handles traffic and signaling between a
mobile phone and the network switching subsystem. BSS having two
components BTS and BSC.
2. NSS : NSS stands for Network and Switching Subsystem. NSS is the core network of
GSM. That carried out call and mobility management functions for mobile phone present in
network. NSS have different components like VLR, HLR and EIR.
3. OSS : OSS stands for Operating Subsystem. OSS is a functional entity which the network
operator monitor and control the system. OMC is the part of OSS. Purpose of OSS is to
offer the customer cost-effective support for all GSM related maintenance services.
Suppose there are 3 Mobile stations which are connected with the tower and that tower is
connected to BTS through TRX, then further connected to BSC and MSC. Let’s understand
the functionality of different components.
1. MS : MS stands for Mobile System. MS comprises user equipment and software needed
for communication with a mobile network. Mobile Station (MS) = Mobile Equipment(ME)
+ Subscriber Identity Module (SIM). Now, these mobile stations are connected to tower and
that tower connected with BTS through TRX. TRX is a transceiver which comprises
transmitter and receiver. Transceiver has two performance of sending and receiving.
2. BTS : BTS stands for Base Transceiver Station which facilitates wireless communication
between user equipment and a network. Every tower has BTS.
3. BSC : BSC stands for Base Station Controller. BSC has multiple BTS. You can consider
the BSC as a local exchange of your area which has multiple towers and multiple towers have
BTS.
4. MSC : MSC stands for Mobile Switching Center. MSC is associated with communication
switching functions such as call setup, call release and routing. Call tracing, call forwarding
all functions are performed at the MSC level. MSC is having further components like VLR,
HLR, AUC, EIR and PSTN.
VLR : VLR stands for Visitor Location Register. VLR is a database which contains the
exact location of all mobile subscribers currently present in the service area of MSC.
If you are going from one state to another state then your entry is marked into the
database of VLR.
HLR : HLR stands for Home Location Register. HLR is a database containing
pertinent data regarding subscribers authorized to use a GSM network.. If you
purchase SIM card from in the HLR. HLR is like a home which contains all data like
your ID proof, which plan you are taking, which caller tune you are using etc.
AUC : AUC stands for Authentication Center. AUC authenticates the mobile
subscriber that wants to connect in the network.
EIR : EIR stands for Equipment Identity Register. EIR is a database that keeps the
record of all allowed or banned in the network. If you are banned in the network then
you can’t enter the network, and you can’t make the calls.
PSTN : PSTN stands for Public Switched Telephone Network. PSTN connects with
MSC. PSTN originally a network of fixed line analog telephone systems. Now almost
entirely digital in its core network and includes mobile and other networks as well as
fixed telephones. The earlier landline phones which places at our home is nothing but
PSTN.
5.OMC : OMC stands for Operation Maintenance Center. OMC monitor and maintain the
performance of each MS, BSC and MSC within a GSM system.
Three subsystem BSS, NSS and OSS are connected with each other via some interfaces.
Total three interfaces are there:
GSM specifies different mechanism for data transmission, The original GSM
allowing for data rates of up to 9600 bits/s.
Transparent bearer services only use the physical layer to transmit data. Data
transmission has a constant delay at throughput if no transmission error occurs.
Non-transparent bearer services use protocols of layer two and three two three to
implement error correction and flow control.(data link layer and network layer).
2.Tele services:
Video calls.
Video text and face emoji.
short text message(SMS).
3.Supplementary services:
Conference calls.
Call waiting.
Call forwarding.
GSM security:
GSM offers several security using confidential information stored in the AUC and in the
individual SIM.
The SIM stores personal secret data and is protected with a pin against unauthorized use.
Advantages:
1. Compatibility: GSM is widely used around the world, so it is compatible with many
different networks and devices.
2. Security: GSM offers enhanced security features such as authentication, encryption and
confidentiality, which helps to protect the user’s privacy and data.
3. Efficient use of bandwidth: GSM uses a time-division multiplexing (TDM) technique
which enables many users to share the same frequency channel at different times, making it
an efficient use of the available bandwidth.
4. Roaming: GSM allows users to roam internationally and use their mobile phones in other
countries that use the same GSM standard.
5. Wide range of features: GSM supports a wide range of features, including call
forwarding, call waiting, voicemail, conference calling, and more.
Disadvantages:
1. Limited coverage: GSM networks may have limited coverage in some remote areas, which
can make it difficult for users to make calls or access the internet.
2. Network congestion: GSM networks may become congested during peak hours, which
can lead to dropped calls or poor call quality.
4. Data transfer speed: GSM networks offer relatively slow data transfer speeds compared
to newer technologies such as 3G and 4G.
5. Limited capacity: GSM networks have a limited capacity for handling large volumes of
data, which can be a disadvantage for users who require high-speed internet access or other
data-intensive applications.
What Is GPRS?
General packet radio service (GPRS) is defined as a mobile communications standard that
operates on 2G and 3G cellular networks to enable moderately high-speed data transfers
using packet-based technologies.
How GPRS Establishes a Connected Mobile Environment for IoT Applications
Before the transmission, the information is split into individual packets and routed
through the core network and radio. At the receiver’s end, the data is reattached.
The global system for mobile communications (GSM) is the primary standard for
the second generation (2G) cellular network, while GPRS is an improved version. GPRS is
not like GSM’s short messaging service (GSM-SMS), which has a message length limit of
160 bytes.
GPRS has a theoretical maximum speed of 115 kbps, although most networks
operate at roughly 35 kbps. GPRS is sometimes known as 2.5G unofficially. It’s a third-
generation route to gain availability on the internet.
One of the most basic is service class 1, which allows a one-time slot for each path.
Service class 12 is by far the most proficient, with four-time slots in every direction.
This method enables packet radio access to even time division multiple access
(TDMA) customers. GPRS also allows network operators to deploy an IP-based core
architecture for integrated audio and data applications, which can be used and improved for
3G networks.
When a GPRS network is available, most smartphones might use it, albeit those
used to better connections will notice the considerably slower bandwidth and long waits.
GPRS adds several new essential features to aid the end-to-end transmission of IP-
based data packets. The GSM standards created GPRS, which resulted in a structure with
specified attributes, interfaces, and inter-network operations for roaming assistance.
As a result of the GPRS standard, users could be paid based on the volume
exchanged instead of the connection length, allowing them to remain connected without
incurring further charges.
GPRS enables network operators to have a more effective method to distribute data
to their customers by removing the requirement to use speech channels for data transmission.
Customers get four times the rate for the most typical dial-up connections when using a
GPRS connection.
The overall average speed of dial-up data services is 9.6 kbps, whereas GPRS
speeds range from 40 to 172.2 kbps. Users can also access rich media applications and
information using GPRS connectivity. It is not necessary to download any data to view or use
it. As a result, GPRS technology is suitable for cellphone internet use. Because of the GPRS
network, one can access rich media apps via mobile networks.
GPRS networks can also allow for internet access. It suggests that online services
such as web surfing, email, chat, and file transfer protocol (FTP) could be accessible via cell
phones. The GPRS connection could be seen as a sub-network of the Internet because it uses
similar protocols, and GPRS phones could be regarded as mobile hosts since they are using
the same methods.
GPRS operates on cell phones, laptops, and other portable devices with a GPRS
modem or a GPRS Subscriber Identity Module (SIM) card. A GPRS modem is ideal for
sending and receiving messages from a computer.
This packet-based platform was one of the first to offer multimedia messaging and
push-to-talk features, similar to a walkie-talkie. However, GPRS devices are rarely capable of
transmitting longer voice recordings.
GPRS technology, for instance, couldn’t allow individuals to send a given text to a
transcription system since the audio files became too huge to be transferred at acceptable
rates.
The idea of Quality of Service (QoS) is incorporated into GPRS. It refers to the
capacity to adapt a service to the requirements of an app. The following QoS conditions apply
– priority, reliability, delay, and throughput. The inclusion of new network nodes called GSN
(GPRS support nodes) situated on a backbone network is required to integrate GPRS into a
GSM architecture:
The SGSN (Serving GPRS Support Node) is a router that controls the locations of
nearby stations and offers a packet transit interface to the GGSN portal. It is in charge of
GPRS mobile device authentication, network registration, mobility management, and data
collection on pricing for using the air interface.
A gateway that connects to other data networks is the GGSN (Gateway GPRS
Support Node). The GGSN is responsible for delivering an IP address to the mobile terminals
throughout the connection. It connects to external networks as both a router and an interface.
It comprises GPRS cellular routing information, which is used to route packets
through the IP-based internal backbone to the appropriate Serving GPRS Support Node. The
GGSN could also operate as a packet filter for incoming traffic and record pricing data
related to external internet services.
An always-online function that eliminates the need for dial-up, enabling programs
accessible with just one click.
The upgraded usual systems mean that carriers do not have to update their equipment;
instead, GPRS is put on top of the current equipment.
An essential part of future 3G networks, meaning the packet data core network for 3G
systems EDGE and WCDMA, GPRS is a necessary foundation for the future.
Compared to the original GSM system, GPRS technology provides various perks
and advantages to users and network providers. Companies commonly used this to create
precise data capabilities using mobile communications technology. Let’s take a look at some
of the benefits of GPRS.
Benefits of GPRS
When compared to circuit-switched services, GPRS packet transfer offers better consumer
billing. When it comes to circuit-switched services, the cost is determined by the length of the
connection. One of the significant disadvantages of circuit switching for IoT is cost-
efficiency. The connection length determines the subscriber’s operating costs in the circuit
switch.
Now suppose you’re using an asset tracking system or a remote sensor. One should
preferably keep these gadgets in ‘always-on’ mode. On the other hand, these products are
only designed to transmit or receive information somewhat irregularly. Each subscriber is
responsible for the entire cost of airtime, including during times when no packets have been
sent.
2. Increased speed
A significant advantage of the GPRS system is that it provides a higher data rate than GSM.
GSM was designed to transmit data at approximately 14.4 kbit/s at first. Over the 2G
network, GPRS, on the other hand, provided data speeds up to 86kbit/s. It made matters like
streaming and gaming possible for customers. It allowed for monitoring in enterprises.
Rates of up to 172 kbps are feasible. However, top data speeds of 15 to 40 kbps are
achievable in most scenarios. 2G or 3G with GPRS is typically a theoretically acceptable fit if
all you need is slow, occasional data transfers.
3. “Always-on” connectivity
Another benefit of GPRS is that it is always available. A GPRS connection can provide
constant Internet connectivity, quick messaging, and improved SMS transfers. It was also the
fastest network ever seen when it was first launched. For example, with a standard Global
System for Mobile Communications technology, somebody could transmit only 10 SMSs per
minute.
On the other hand, somebody could transmit three times as many messages a minute while
using SMS-boosted GPRS transfer. Costs depend on how often a circuit has been used over
time and whenever circuit-switched procedures have been used. The expenses of packet-
switched technology are computed above any volumes of information transmitted, which
would be consumed by the provider’s bandwidth. Always-on connectivity is enabled
simultaneously.
Despite the benefits of GPRS technology, several drawbacks may deter some clients. GPRS
retains a stronghold on the people despite its flaws. The following are the disadvantages of
GPRS:
Disadvantages of GPRS
1. Sunsetting of 2G and 3G
Because of the GPRS protocol, both 2G and 3G networks have proven to be quite successful
in supporting IoT projects over a previous couple of decades. On the other hand, new
networks are putting more strain on the limited radio frequency (RF) bandwidth.
Carriers have already begun to turn off existing 2G and 3G networks to make place for the
new networks, with the pace set to pick up in the coming years. Users will have to change
technology at a certain point. Now would be the time to evaluate and plan for changes to the
current 2G and 3G IoT networks to prevent a last-minute scramble.
2. Limited cell capacity
GPRS is technically adequate for most IoT use cases, but not all. 2G or 3G with GPRS is
typically a theoretically acceptable fit if all you need is slow, occasional data transfers.
However, for data-intensive applications, the existing cell capacity of a system is impacted by
GPRS.
There are only a few radio resources that one can use for various purposes. Voice and GPRS
calls, for example, share similar network services. The magnitude of the impact is determined
by the number of timeslots set for GPRS use only.
To achieve the maximum possible GPRS data transmission speed of 172.2 kbps, all eight
timeslots should be taken over by an individual user with no error safety. The supported data
rates (171.2/384 Kbps) are slower than the current wireless protocols such as HSPA, LTE,
LTE-advanced, and so on.
A network operator is unlikely to enable one GPRS customer to occupy all time slots.
Furthermore, the first GPRS terminals are projected to be highly constrained, with only one,
two, or three time slots being supported.
GPRS provides various unique services to wireless mobile subscribers and business users,
and some of them supply users with higher-value services. Non-voice mobile services like
GPRS enable a wide range of business and consumer applications, and we’ll show you which
ones are best for you. Some of these aspects are listed below:
Mobility: GPRS allows for continuous voice and data connectivity while moving.
Immediacy: GPRS allows subscribers to connect whenever they want. Users don’t need to be
concerned about their location or where they are signed in.
Localization: GPRS provides data about the available facility based on their current position.
Various potential applications are now being developed for users by leveraging the
aforementioned three features. These GPRS applications include the following:
1. Communication
2. Value-added services
Apps that give information services and other games, for example, are considered value-
added services. It only refers to the content offered by telecom companies to boost the quality
of their services to customers. Push and pull are two concepts widely used in GPRS-based
information delivery, as explained below.
Pull refers to the customer’s demand for information in real-time. This content must have
specific properties to be valuable to subscribers: This content must have particular properties
to be helpful to subscribers. With relevant information, personalized information is tailored to
user-specific needs.
Two examples of tailored information sent through GPRS are a market ticker that focuses on
crucial quotes and news and an e-commerce application that knows a user’s profile.
3. E-commerce
E-commerce can be described as business conducted over the Internet or through a data
system. It would only involve applications in which an agreement is formed over the network
connection, including when buying goods and services and online banking applications, due
to the common criteria of the consumer-authentication process and secure transmission of
personal information.
It includes retail apps like ticket purchases, banking apps, and financial trading, among other
things. Applications include navigation, traffic updates, airline/rail schedules, and location
finders, among other services.
4. Vertical applications
Vertical applications in the mobile context refer to platforms that use mobile frameworks to
aid the achievement of the desired tasks in a company’s value chain, compared to
applications that are then sold to a customer. Vertical applications that run using GPRS
include:
Sales support-providing stock and product data to sales representatives and integrating any
use of appointment details and distant order placement
Dispatching which entails communication of scope of work such as location and work
schedules; allowing data interrogation to assist the work
Fleet management, including fleet tracking or service personnel and location tracking, and
work schedule
Parcel delivery involves tracking package locations for user feedback and performance
evaluation
5. Advertising
Thanks to GPRS, companies can provide advertising services in the form of a push-type
information service. They could provide consumers advertising to help offset the costs of
voice or other data services. Lastly, advertising could be location sensitive, such as when a
customer enters a shopping center and receives advertising uniquely tailored to the shops
within specific malls.
Location-based services enable consumers to link push or pull information services to their
current location. Telematics technology is built on GPRS frameworks, and hotel and
restaurant locators, roadside assistance, and city-specific news and information are some
examples. One can also find vertical applications in this technology, including workforce
management and vehicle tracking.
Weather, traffic, entertainment, the stock market, travel schedules, and other consumer
applications that use data on demand all rely on GPRS. This also includes money transfers,
which require immediate contact with the network provider for administrative data like
statements, bill reminders, or new services. The rise of mobile application security is also due
to the proliferation of GPRS.
8. Remote operations
By pressing a button on a terminal, a truck driver can transmit a consumer invoice back to the
corporation. Without a phone call, a fashion designer traveling in another nation turns on her
digital assistant and gets a couple of megabytes of fresh designs with a “beep.” These
qualities assist individuals in performing their occupations more effectively. And GPRS, with
its expanded data transfer abilities, will be the medium for doing so.
What Is UMTS?
UMTS Applications
Features of UMTS
Advantages of UMTS
UMTS could be a successor to 2G based GSM advances counting GPRS and EDGE .
Gaining a 3rd title 3GSM since it could be a 3G relocation for GSM
Gives administrators the adaptability to present unused mixed media administrations to trade
clients and buyers
This not as it were gives client a valuable phone but moreover deciphers higher incomes for
the administrator.
Disadvantages of UMTS
UMTS
UMTS is popularly known as a third-generation (3G) cellular network. It was seen as a better
cellular technology for data transfer than its predecessor, the GSM technology, which used
GPRS and EDGE data services, primarily due to its speed of transfer and operation.
Today, UMTS is used interchangeably with 3G. Unlike global system for mobile
communications (GSM) – which was widely used before the deployment of UMTS – UMTS
offers faster data transfer, improved cellular capabilities, greater range/bandwidth, and better
radio spectrum efficiency.
This ensures a better method of transferring data and a better customer experience.
Although UMTS uses code division multiple access (CDMA) technology, it has a broader
bandwidth than other CDMA systems, e.g., CDMA2000. So, it is sometimes referred to as
wideband CDMA or WCDMA.
The frequency spectrum is broken down into smaller channels in GSM communication
and then distributed based on time slots. This was not convenient for simultaneously
transferring large amounts of information. Hence, big corporations sought a better
technology, so UMTS was born.
Despite Its increased functionality, UMTS was not created to serve as a replacement
for the GSM system but to act as a complementary technology. This ensures that one can use
both network technologies in the same devices if they were made to access either network.
Due to the need for better wireless connectivity of the Internet of Things (IoT) devices,
UMTS has been widely applied due to its lesser cost, better customer experience, wide
bandwidth, reliability, speed, and ease of application. UMTS also introduced more cellular
capabilities like video streaming and mobile television, but significantly, a higher data
transfer rate.
A mobile network of the UMTS can be divided into three major parts – user equipment, the
access network, and the core network. These parts are linked and work together to transfer
data through the UMTS mobile network.
The user equipment is divided into the mobile station, which is the device itself and the SIM
card, which describes the U-SIM or universal subscriber identity module. The mobile station
cannot transmit signals without the U-SIM. The U-SIM performs three main functions, which
include:
Another essential component of the access network is the radio network controller (RNC).
This is where the intelligence of the access network lies. It processes the data gotten from
Node B connected to it. The Node B and RNC composite structure is known as UMTS
terrestrial radio access network (UTRAN).
The interface between the mobile station and the Node B is based on the air Wideband
CDMA technology (WCDMA). When Node B receives information from the Radio Network
Controller, it spreads it by multiplying it with the CDMA code, modulates it, and then sends
the information to the mobile station. If the data comes from the mobile station, it must
undergo despreading and demodulation at Node B before it gets to the RNC.
Node B also handles error correction between the station and RNC. The RNC also acts as an
admission controller. For instance, if a mobile station (e.g., a phone) wants to transmit
through a voice call, and a particular Node B is congested with other connected devices, the
RNC gives it a new CDMA code to connect it to an available Node B.
Also, since UMTS also sends information in the form of packets of data, like voice calls over
Skype, the RNC regulates the bit rate and speed of transmission to ensure hitch-free
transmission as this is a real-time activity. If the application is not a real-time activity – such
as downloading a file – if a particular Node B is congested, the RNC reduces the bit rate of
other devices that do not require real-time feedback.
This is the backbone network. It consists of a circuit-switched (CS) domain and packet-
switched (PS) domain. The circuit-switched domain is the part of the network responsible for
voice calls, while the packet-switched domain is responsible for carrying the packet data. The
packet-switched domain takes care of the internet services. The CS and PS domains consist
of various databases that hold information necessary for running the system
UNIT III
5 MARK
1. EXPLIAN THE MOBILE COMMUNICATION SYSTEM.
2. BRIEFLY EXPLAIN THE GSM?
10 MARK
1. WRITE ABOUT THE GPRS.
2. WHAT IS UMTS AND BRIEFLY?
MANET stands for Mobile Adhoc Network also called a wireless Adhoc
network or Adhoc wireless network that usually has a routable networking environment on
top of a Link Layer ad hoc network.. They consist of a set of mobile nodes connected
wirelessly in a self-configured, self-healing network without having a fixed infrastructure.
MANET nodes are free to move randomly as the network topology changes frequently. Each
node behaves as a router as they forward traffic to other specified nodes in the network.
MANET may operate a standalone fashion or they can be part of larger internet.
They form a highly dynamic autonomous topology with the presence of one or multiple
different transceivers between nodes.
The main challenge for the MANET is to equip each device to continuously
maintain the information required to properly route traffic. MANETs consist of a peer-to-
peer, self-forming, self-healing network MANET’s circa 2000-2015 typically communicate
at radio frequencies (30MHz-5GHz).
This can be used in road safety, ranging from sensors for the environment,
home, health, disaster rescue operations, air/land/navy defense, weapons, robots, etc.
Characteristics of MANET –
Dynamic Topologies:
Network topology which is typically multihop may change randomly and rapidly with
time, it can form unidirectional or bi-directional links.
Bandwidth constrained, variable capacity links:
Wireless links usually have lower reliability, efficiency, stability, and capacity as
compared to a wired network
Autonomous Behavior:
Each node can act as a host and router, which shows its autonomous behavior.
Energy Constrained Operation:
As some or all the nodes rely on batteries or other exhaustible means for their energy.
Mobile nodes are characterized by less memory, power, and lightweight features.
Limited Security:
Wireless networks are more prone to security threats. A centralized firewall is absent due
to the distributed nature of the operation for security, routing, and host configuration.
Less Human Intervention:
They require minimum human intervention to configure the network, therefore they are
dynamically autonomous in nature.
Advantages:
Flexibility: MANETs are highly flexible, as they can be easily deployed in various
environments and can be adapted to different applications and scenarios. This makes them
ideal for use in emergency situations or military operations, where there may not be a pre-
existing network infrastructure.
Scalability: MANETs can easily scale to accommodate a large number of nodes, making
them suitable for large-scale deployments. They can also handle dynamic changes in network
topology, such as the addition or removal of nodes.
Cost-effective: Since MANETs do not require any centralized infrastructure, they are often
more cost-effective than traditional wired or wireless networks. They can also be used to
extend the range of existing networks without the need for additional infrastructure.
Rapid Deployment: MANETs can be rapidly deployed in areas where infrastructure is not
available, such as disaster zones or rural areas.
Disadvantages:
Security: MANETs are vulnerable to security threats, such as attacks by malicious nodes,
eavesdropping, and data interception. Since the network is decentralized, there is no central
authority to ensure the security of the network.
Reliability: MANETs are less reliable than traditional networks, as they are subject to
interference, signal attenuation, and other environmental factors that can affect the quality of
the connection.
Bandwidth: Since MANETs rely on wireless communication, bandwidth can be limited.
This can lead to congestion and delays, particularly when multiple nodes are competing for
the same channel.
Routing: Routing in MANETs can be complex, particularly when dealing with dynamic
network topologies. This can result in inefficient routing and longer delays in data
transmission.
Power Consumption: Since MANETs rely on battery-powered devices, power consumption
can be a significant issue. Nodes may need to conserve power to extend the life of the battery,
which can limit the amount of data that can be transmitted.
Applications of MANET
Some specific applications of ad hoc networks include industrial and commercial applications
involving cooperative mobile data exchange. There are many existing and future military
networking requirements for robust, IP-compliant data services within mobile wireless
communication networks, with many of these networks consist of highly dynamic
autonomous topology segments. Advanced features of Mobile ad hoc networks, including
data rates compatible with multimedia applications global roaming capability, and
coordination with other network structures are enabling new applications.
Routing
Routing is the process of finding the best path for traffic in a network, or across multiple
networks. The role of routing is similar to the road map for a hotel. In both cases, we need to
deliver messages at proper location and in an appropriate way.
In a MANET, each node or device is expected to serve as a router, and each router is
indistinguishable from another in the sense that all routers execute the same routing algorithm
to compute paths through the entire network.
o Since centralized routing in a dynamic and even for small networks is impossible
therefore routing computation must be distributed.
o Route computation should not add many more nodes.
o If any host demands for the route, they must have quick access.
o Maintenance of a global state should not involve in the route computation.
o Each node should care about their destination node to its route and should not be
involved in frequent topology updates for those portions of the network that have no
traffic.
o Since broadcast can be time consuming for MANETs, it must be avoided as much as
possible.
o In routing there must have a backup route when the primary route has become stale.
Routing Classification
1. Proactive Protocol
2. Reactive Protocol
3. Hybrid Protocol
1. Proactive Protocol
Proactive protocols attempt to evaluate continuously the routes within the network. It means
proactive protocol continuously maintain the routing information, so that when a packet
needs to be forwarded, the path is known already and can be immediately used. The family of
distance vector protocols is an example of proactive scheme.
The advantage of the proactive schemes is that whenever a route is needed, there is negligible
delay in determining the route.
2. Reactive Protocols
Reactive protocols do not maintain routes but invoke a route determination procedure only on
demand or we can say reactive protocols build the routes only on demand. Thus, when a route
is required, some sort of global search procedure is initiated. The family of classical flooding
algorithms belongs to the reactive protocol group. Examples of reactive ad-hoc network
routing protocols include ad hoc on demand distance vector (AODV) and temporally ordered
routing algorithm (TORA).
Hybrid protocols attempt to take advantage of best of reactive and proactive schemes. The
basic idea behind such protocols is to initiate route discovery on demand but at a limited
search cost. One of the popular hybrid protocols is zone routing protocol (ZRP).
1. Table-driven protocols
2. Source initiated on -demand protocols
o These protocols are called table-driven because each node is required to maintain one
or more tables containing routing information on every other node in the network.
o They are proactive in nature so that the routing information is always consistent and
up to date.
o The protocols respond to changes in network topology by propagating the updates
throughput the network so that every node has a consistent view of the network.
For example the routing table of Node A from the above network is:
A A 0 A46 001000
B B 1 B36 001200
C B 2 C28 001500
Basically the table stores description of all possible paths reachable by node A, along with the
hop, number of hops, sequence number and install time.
Advantages
o Destination sequenced distance vector routing was one of the early algorithms
available. It is suitable for creating ad-hoc networks with small no. of nodes.
Disadvantage
o Destination sequenced distance vector routing requires a regular update of its routing
tables, which uses more battery power and a small amount of bandwidth even when
the network is idle.
o This algorithm is not suitable for highly dynamic networks.
o The cluster head (CH) gateway switch routing (CGSR) protocol is different from the
destination sequenced distance vector routing in the type of addressing and the
network organization scheme employed.
o Instead of a flat network, CGSR uses cluster heads, which control a group of ad hoc
nodes and hence achieve a hierarchical framework for code separation among
clusters, routing, channel access, and bandwidth allocation.
o Identification of appropriate clusters and selection of cluster heads is quite complex.
Once clusters have been defined, it is desirable to use a distributed algorithm within
the cluster to elect a node as the cluster head.
o The disadvantage of using a cluster head scheme is that frequent changes adversely
affect performance as nodes spend more time selecting a cluster head rather than
relaying packets. Hence, the least cluster change (LCC) clustering algorithm is used
rather than CH selection every time the cluster membership changes. Using LCC,
CHs change only when two CHs come into contact, or when a node moves out of
contact with all other CHs.
o In this scheme, each node must maintain a cluster member table (CMT), which stores
the destination CH for each node in the network. The cluster member tables are
broadcast periodically by the nodes using the DSDV algorithm.
o When a node receives such a table from a neighbor, it can update its own information.
As expected, each node also maintains a routing table to determine the next hop
required to reach any destination.
The wireless routing protocol is a proactive unicast routing protocol for MANETs. It uses an
enhanced version of the distance vector routing protocol, which uses the Bellman - Ford
algorithm to calculate paths.
For the wireless routing protocol (WRP) each node maintains 4 tables:
o Distance table
o Routing table
o Link cost table
o Message retransmission list (MRL) table
Each entry in the message retransmission list has a sequence number of the update message, a
retransmission counter, an acknowledgment required flag vector with one entry per neighbor,
and a list of updates sent in the update message. When any node receives a hello message
from a new node, it adds the new node to its routing table and sends the new node a copy of
its routing table. A node must send a message to its neighbors within a certain time to ensure
connectivity.
Advantages
o The advantage of WRP is similar to DSDV. In addition, it has faster convergence and
adds fewer table updates.
Disadvantage
o Source - initiated on demand routing is reactive in nature, unlike table driven routing.
This type of protocols generates routes only when a source demands it.
o In other words, when a source node requires a route to a destination, the source
initiates a route discovery process in the network. This process finishes when a route
to the destination has been discovered or all possible routes have been examined
without any success.
o The discovered route is maintained by a route maintenance procedure, until it is no
longer desired or the destination becomes inaccessible.
o AODV is a routing protocol for MANETs (mobile ad hoc networks) and other
wireless ad hoc networks.
o It is a reactive routing protocol; it means it establishes a route to a destination only on
demand.
o AODV routing is built over the DSDV algorithm. It is a significant improvement over
DSDV.
o The devices that are not on a particular path do not maintain routing information, nor
do they participate in the routing table exchanges.
o When a source requires sending a message to a destination and does not have a valid
route to the latter, the source initiates a route discovery process.
o Source sends a route request (RREQ) packet to all its neighbors, the latter forward the
request to all their neighbors, and so on, until either the destination or an intermediate
mobile (node) with a "fresh enough" route to the destination is reached.
The above figure illustrates the propagation of the broadcast request (RREQs) across the
network. Since in DSDV, destination sequence numbers are used to ensure that all routes are
loop free and contain the most recent route information. Each node has a unique sequence
number and a broadcast ID, which is incremented each time the node, initiates RREQ.
The broadcast ID, together with the IP address of node, uniquely identifies every RREQ.
Intermediate mobile reply only if they have a route to the destination with a sequence number
greater than or at least equal to that contained in the RREQ. To optimize the route
performance, intermediate nodes record the address.
From the above figure, since RREP (route reply packet) travels back on the reverse path, the
nodes on this path set up their forward route entries to point to the node from which RREP
had just been received. These forward route records indicate the active forward route. The
RREP continues traveling back along the reverse path till it reaches the initiator of the route
discovery. Thus, AODV can support only the use of symmetric links.
In DSDV, each node in a MANET maintains a routing table in which all of the
possible destinations and the number of hops to each destination are recorded.
Each node maintains information regarding routes to all the known destinations.
The routing information is updated periodically.
DSDV uses two types of route update packets. The first is known as full dump.
This type of packet carries all the available routing information and can require
multiple network protocol data units (NPDUs) to be transmitted.
The mobile nodes maintain an additional table where they store the data received
through the incremental routing information packets from various nodes.
1. Each router (node) in the network collects route information from all its
neighbours.
2. After gathering information, the node determines the shortest path to the destination
based on the gathered information.
4. The router broadcasts this table to its neighbours. On receipt by neighbours, the
neighbor nodes recompute their respective routing tables.
Table 7.1 is the routing table of the node N4 at the moment before the movement of
nodes. The metric field in the routing table helps to determine the number of hops
required for a packet to traverse to its destination.
The route discovery and route maintenance activities in AODV are very similar to
those for the
DSR protocol.
AODV does make use of hop-by-hop routing, sequence numbers and beacons.
The node that needs a route to a specific destination generates a route request.
The route request is forwarded by intermediate nodes which also learn a reverse
route from the
source to themselves.
When the request reaches a node with route to destination, it generates a route reply
containing
All nodes that participate in forwarding this reply to the source node create a
forward route to
destination.
This route created from each node from source to destination is a hop-by-hop route.
Recollect that DSR includes the complete route in packet headers.
The large headers can substantially degrade the performance, especially when the
data content of packets is small.
AODV attempts to improve upon DSR by maintaining routing tables at the nodes,
so that the data packets do not have to contain the routes.
AODV retains a positive feature of DSR, in that the routes are maintained only
between those nodes that need to communicate.
If a link break occurs while a route is being used to transmit a message, a route
error message is
sent to the source node by the node that observes that the next link in the route has
failed.
The Zone Routing Protocol (ZRP) is a hybrid protocol. It incorporates the merits of
both ondemand and proactive routing protocols.
A routing zone comprises a few MANET nodes within a few hops from the central
zone. Within a zone, a table-driven routing protocol is used.
The source node sends a route request to the border nodes of its zone, containing its
own address, the destination address and a unique sequence number.
Border nodes are those nodes which are some predefined number of hops away
from the source.
Each border node checks its local zone for the destination.
DSR is a source initiated on-demand (or reactive) routing protocol for ad hoc
networks.
It uses source routing, a technique in which the sender of a packet determines the
complete sequence of nodes through which a packet has to travel.
The sender of the packet then explicitly records this list of all nodes in the packet’s
header. This makes it easy for each node in the path to identify the next node to which
it should transmit the packet for routing the packet to its destination.
In this protocol, the nodes do not need to exchange the routing table information
periodically, which helps to reduce the bandwidth overhead associated with the
protocol.
Each mobile node participating in the protocol maintains a routing cache which
contains the list of all routes that the node has learnt.
Whenever a node finds a new route, it adds the new route to its routing cache. Each
mobile node also maintains a sequence counter called request id to uniquely identify
the last request it had generated.
The pair < source address, request id > uniquely identifies any request in the ad hoc
network.
Route discovery
Route discovery allows any host to dynamically discover the route to any
destination in the ad
hoc network.
When a node has a data packet to send, it first checks its own routing cache.
If it finds a valid route in its own routing cache, it sends out the packet using this
route.
The route request packet contains the source address, the request id and a route
record in which the sequence of hops traversed by the request packet, before reaching
the destination is recorded.
Suppose a node N1 wishes to send a message to the destination node N8. The
intermediate nodes are N2, N3, N4, N5, N6, N7.
The node N1 initiates the route discovery process by broadcasting a route request
packet to its neighbours N2 and N3.
Note that each node can have multiple copies of the route request packet arriving at
it.
The propagation of route reply is shown in Figure 7.5, and the acknowledgement
messages from destination to source are indicated by thick arrows.
Route maintenance
When a host (source) while using a route, finds that it is inoperative, it carries out
route maintenance.
Whenever a node wanting to send a message finds that the route is broken, it would
help if it already knows of some alternative routes.
If it has another route to the destination, it starts to retransmit the packet using the
alternative route. Otherwise, it initiates the route discovery process again.
Uses of VANETs :
Intelligent Transportation Systems (ITS): VANETs can be used to enhance traffic flow,
reduce congestion, and improve road safety by enabling communication between vehicles
and with road-side infrastructure.
Navigation and Location-Based Services: VANETs can provide real-time traffic and
navigation information to drivers, allowing them to make informed decisions and avoid
congestion.
Emergency Services: VANETs can be used to quickly and efficiently relay emergency
messages, such as accidents and road closures, to other vehicles and to emergency
services.
Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) Communication: VANETs
can facilitate communication between vehicles and with road-side infrastructure, allowing
for a wide range of applications, such as cooperative driving and platooning.
Entertainment and Infotainment Services: VANETs can provide entertainment and
information services, such as streaming music and video, to passengers in vehicles.
Overall, VANETs can enhance the driving experience, improve road safety, and support a
wide range of intelligent transportation applications.
Difference between MANET and VANET :
S.No. MANET VANET
MANET features
The features are as follows −
It supports Dynamic topologies
It supports Energy constraint operation
It has Variable capacity links.
Here is an example picture of MANET −
VANET features
The features are as follows −
Cellular and WLAN network
Hybrid
Pure Ad hoc
Here is the example picture of VANET −
Differences
The differences between the MANETs with VANETs are as follows −
Energy constraints It has a medium energy constraint. It has low energy constraint.
Network and It does not have fixed infrastructure. It has security issues which are
information It is prone to attacks eg DoS, illegal tracking, brute force attacks,
security eavesdropping etc. eavesdropping etc.
MANETS are fundamentally different from both wired networks and infrastructure-based
wireless networks.
The nature of MANETs not only introduces new security concerns but also exacerbates the
In a MANET, on the other hand, an intruder is part of the network, and therefore much
more difficult to detect and isolate.
At the physical layer, an intruder can easily cause jamming or overload the available
network resources beyond their capacities, thereby effectively paralysing it.
Wireless links can get jammed and the batteries at the nodes can get depleted by such
Attackers can also disturb the normal operation of routing protocols by modifying the
headers of packets.
The intruder may insert spurious information while routing packets, causing erroneous
routing table updates and thereby leading to frequent misroutings.
UNIT IV
Answer: A
2. The network in which all the nodes are symmetric and there is no central control or
hierarchy is .................
Answer: C
3. What is the type of network in which the topology change from time to time?
(A) Wi-Fi (B) Cell Network
Answer: D
4. The processes that keep track of all mobile hosts visiting the area is .................
Answer: C
5. The hosts which are basically stationary hosts who move from one fixed site to another
from time to time but use the network only when they are physically connected to it are
called ................
Answer: A
6. The hosts who compute on the run and want to maintain their connections as they
move around ...............
Answer: C
7. What is the type of network in which the routers themselves are mobile?
Answer: B
Answer: D
9. Why probe packets are transmitted in the network?
Answer: D
10. If the source deduces the existence of congestion by making local observations, such as
the time needed for acknowledgements to come back is called as .................
Answer: B
11. A _________ is a device that forwards data that is not explicitly destined to it.
A. hub
B. switch
C. router
D. All of the above
17. Which type of Ethernet framing is used for TCP/IP and DEC net?
A. Ethernet 802.3
B. Ethernet 802.2
C. Ethernet II
D. Ethernet SNAP
18. Which NetWare protocol works on layer 3–network layer—of the OSI model?
A. IPX
B. NCP
C. SPX
D. NetBIOS
A. Yes
B. No
C. Can be yes or no
D. Can not say
21. Which of the following correctly describes an advantage of a Mobile Ad-hoc Network?
UNIT V
Mobile O/S—A Few Basic Concepts
The operating system providing a set of services to the application programs. The operating
system is usually structured into a kernel layer and a shell layer.
The shell essentially provides facilities for user interaction with the kernel. The kernel
executes in the supervisor mode and can run privileged instructions that could not be run in
the user mode.
During booting, the kernel gets loaded first and continues to remain in the main memory of
the device.
This implies that in a virtual memory system, paging does not apply to the kernel code and
kernel data.
Therefore the kernel is called the memory resident part of an operating system.
The shell programs are usually not memory resident. The kernel of the operating system is
responsible for interrupt servicing and management of processes, memory, and files.
The traditional operating systems such as Unix and Windows are known to have a monolithic
kernel
design.
In a monolithic kernel OS design, the kernel essentially constitutes the entire operating
system code,
The principal motivation behind this monolithic design was the belief that in the supervisor
mode, the operating system services can run more securely and efficiently.
Monolithic design versus microkernel design of an operating system.
The main problem with the monolithic kernel design is that it makes the kernel massive, non-
modular, hard to tailor, maintain, extend, and configure.
The microkernel design approach tries to minimize the size of the kernel code. Only the basic
hardware dependent functionalities and a few critical functionalities are implemented in the
kernel mode and all other functionalities are implemented in the user mode.
Most of the operating system services run as user level processes. The main advantage of this
approach is that it becomes easier to port, extend, and maintain the operating system code.
The kernel code is very difficult to debug compared to application programs. The reason for
this is that a bug in a kernel code can crash the system, thus crashing the debugger too.
Further, even when some operating system service crashes while being used by a user, it does
not bring down the entire system. This is one reason as to why a microkernel operating
system could be expected to be more reliable than an equivalent monolithic kernel operating
system.
A few special features that are required to be supported by a mobile OS, but are not present in
traditional operating systems. A mobile device is powered by severely limited energy stored
in a tiny battery.
Limited memory
A mobile device usually has much less permanent and volatile storage compared to that of a
contemporary desktop or laptop. To cope with the limited memory of a mobile device, the OS
must be as small as possible and yet provide a rich set of functionalities to meet user
demands.
The size of a mobile handset needs to be small to make it portable. This limits the size of the
display
screen. Consequently, new innovative user interfaces need to be supported by the mobile OS
to overcome this constraint and minimize user inconveniences.
For example, many handsets provide easy configurability of the interface to suit individual
preferences, switching between menu and iconic interfaces, etc.
Miniature keyboard
Mobile handsets are either provided with a small keypad or the small-sized display screen is
designed to be used as a keyboard in a touch screen mode using a stylus. In both these
arrangements, typing in the documents and entering the string commands is difficult. This
mandates the provision of some facility for word completion prompts and availability of
capabilities for free form handwriting recognition.
The cope with the restricted processing power, storage, and battery power,
usually the operating system is made to provide only a limited number of functionalities that
are useful in the actual operation of the mobile.
Mobile devices need to be as lightweight as possible to increase their portability. Due to the
severe restrictions that are placed on their size and weight, a mobile device usually has a
small battery and often recharging cannot be done as and when required.
In spite of the small battery, a mobile phone is expected to support long talk time without the
need to recharge frequently.
Consequently, the operating system for a mobile device needs to be not only computationally
efficient, but also at the same time expected to minimize power consumption.
The techniques used by an OS to reduce power consumption include putting the processor
and display screen into sleep mode within a few seconds of inactivity, and varying the
intensity of transmitted antennae power as per requirement, etc.
The operating system of a mobile handset needs to run complex protocols due to the inherent
problems caused by mobility and the wireless medium.
Windows Mobile
Palm OS
Blackberry OS
Symbian OS
iPhone OS (iOS)
Android OS
1. Windows Mobile
manufacturers.
Microsoft defined a hardware specification for hand-held computers that can run its
Windows Mobile operating system in order to simplify the design of the operating
system and to reduce the number of versions of the operating system. It was also
intended to make the cell phones manufactured by different vendors appear uniform.
Microsoft later renamed its Pocket PC operating system to Windows Mobile Classic.
Windows mobile classic operating systems support touch screen-based user interface.
Windows Mobile Standard and Windows Mobile Professional are targeted for use in
smartphones, and Windows Mobile Classic is not targeted for cell phones, but for PDAs.
Many third-party software applications are available for Windows mobile. These
software applications can be purchased via the Windows Marketplace for mobiles.
Palm OS
Palm OS (also known as Garnet OS) is a proprietary operating system that was
developed by Palm Computing in 1998 for its highly successful PDA called Palm
Pilot. Palm OS was designed for ease of use with the provision of a touchscreen-based
graphical user interface.
Palm OS was upgraded to facilitate installation in several different mobile devices,
such as smartphones of different makes, wrist watches, hand-held gaming consoles,
bar code readers and GPS devices.
The key features of the current Palm OS (named Garnet) are the following:
time. For example, if you are on voice communication, you cannot use the calculator, or read
an SMS.
It has an elementary memory management system. To keep the operating system small and
fast, Palm
OS does not isolate the memory areas of applications from each other. Consequently, any
misbehaving
Palm supplies Palm emulator, which emulates the Palm hardware on a PC. This allows
Palm programs
It supports a facility called HotSync technology for data synchronization with desktop
computers.
It incorporates a very simple and rudimentary security model in which a device can be
locked by
password.
The different interfaces supported include Serial port/USB, infrared, Bluetooth and Wi-Fi
connections.
It uses a proprietary format to store calendar, address, task and note entries and yet are
accessible by
third-party applications.
Being a proprietary operating system, details of its architecture have not been
published. But, at the user level, the very good email system that it deploys is easily noticed.
Symbian OS
The Symbian source code was published under Eclipse Public License (EPL)
in February 2010. This event was reported to be the largest codebase transition from
proprietary to Open Source in the entire history.
(a) Series 60: It support large sized colour screen, easy-to-use interface and an extensive
suite of
(b) UIQ interface: UIQ (earlier known as User Interface Quartz) is a software package
developed by
UIQ Technology for Symbian OS. Essentially, this is a graphical user interface layer that
provides
A few other important features supported by the Symbian operating system are
given below:
iOS
Android OS:
Android is a Linux-based operating system for mobile devices such as smartphones
and tablet computers. There are more than 4,00,000 apps in Android Markets Android
specially developed for applications. Android has a better app market.
Android, Inc. found in Palo alto in California united states by Andy Rubin. - October 2003
In 2005, Google acquired a small startup company called Android, which was
developing an
The Open Handset Alliance, a group of serveral companies was formed – 5 Nov 2007.
To develop the
Android can run multiple apps at the Same Time.Also support optimized graphics
VGA, 2D graphics
and 3D graphics
Google could embed its search engine into Android, the way Internet Explorer is
embedded into
Windows.
Mobile users expect to browse real web pages, and not the simplified mobile versions
of those
pages.
Many mobile handsets support browsing alternative sites provided by many website
operators for mobile handsets with small screens and limited interfacing capabilities.
third-party applications.
Apple does not facilitate third party application development and is implicitly
promoting a closed
proprietary environment, where the internal working of the operating system is not exposed
to the
developers.
A prominent advantage that Android holds out is that Android SDK works in
Eclipse
environment. Since many developers are already exposed to these standard technologies,
there is a
large pool of developers available for working on projects on the Android platform.
It provides an RDBMS SQLite for data storage and data sharing across various
applications.
Application layer
The Android operating system comes with a set of basic applications such as
web browser, email client, SMS program, maps, calendar, and contacts repository
management programs. All these applications are written using the Java programming
language J2ME.
Application framework
The available libraries are written using multiple languages such as C and C++.
These are called through a Java interface. These include a Surface Manager, 2D and 3D
graphics, Media Codecs like MPEG-4 and MP3, an SQL database SQLite and the web
browser engine called WebKit.
The Android runtime consists of two components.
Dalvik translates a Java application program into machine code of the mobile
device and executes it by invoking the operating system.
These can be compiled to ARM native code and installed using the Android native
development kit (SDK).
Every Android application runs its own process with its own instance of the Dalvik
virtual machine.
Kernel
Android kernel has been developed based on a version of Linux kernel. However, it has
excluded the Native X Window System and does not support the full set of standard GNU
libraries.
Based on the Linux kernel code, Android implements its own device drivers,
memory management, and process management and networking functionalities. Android is
multitasking and allows applications to run concurrently.
For example, it is possible to hear music and read or write an email at the same
time. Google initially maintained the kernel code they contributed to in the Linux public
distribution. Google maintains its own code tree. This has marked the branching of Android
from Linux code in the public distribution.
Cell phones are small in size and therefore can easily be carried everywhere like a
wallet.
Considering their portability and the powerful feature sets that they provide, they
have now come to play an important part in today’s society.
The mobile phones implement new and innovative functionalities. For example,
many handsets provide facilities for radio and television reception, timer and clock, Internet
access, camera, and calculator,etc.
Advantages:
Android SDK can be installed on almost all common operating systems such as
Windows, Mac OS, and Linux.
The SDK comes with an Integrated Development Environment (IDE) and other tools
which are required to develop applications. Android SDK converts Java byte code to
Android’s Dalvik VM byte code. The android based applications, the developer codes the
applications using Java.
The environment to develop applications for Android consists of the Android SDK, the
IDE Eclipse and the Java Development Kit (JDK). After installing the SDK, which is done
by simply extracting the downloaded ZIP file in a folder, the path to the SDK has to be set in
the path environment variable. Eclipse can be used as the IDE, which also automatically
installs the Android SDK as a plug-in.
Features of SDK
Using the SDK, one can either run the application on the actual Android device or a
software emulator on the host machine. This is achieved by using the Android Debug Bridge
(ADB) available with the SDK.
A client program which runs on the developer’s (called host) machine. One can
invoke aclient from a shell by issuing an adb command.
It is the part that actually manages the communication with the handset or the
emulator and helps in executing the application.
A server program which runs as a background process on the host machine. The
server manages communication between the client and an adb daemon that runs on the
emulator or the Android handset.
Content providers: Content providers are used for reading and writing data that are either
private to an application or shared across applications. By using the content provider, an
application can query or modify the stored data.
Service: A service denotes a background task and not for interacting through a user interface.
For example, a service might play music in the background while the user is interacting with
a different application.
Advantages of Android
The mobile platform Android is an open platform and can be ported on almost every
type of cell phone.
The emulator of the Android platform has a modern design and is easy to use.
Application installation on the emulator/device is possible via Android Debug Bridge (ADB)
or via Eclipse
Google offers a very good documentation as well as many examples which cover
the most basic and important techniques used to get in touch with Android and the
application development on it.
Android supports robust libraries for media access, communication and data
transfer Android offers a real database SQLite using which meaningful data manipulation
and data Sharing across applications is possible.
Android has an integrated web browser which gives an experience similar to web
browsing using a desktop PC.
Mobile commerce, involves carrying out any activity related to buying and selling
of commodities, services, or information using the mobile hand-held devices.
The popularity of m-commerce can be traced to the convenience it offers both to the
buyers and sellers.
The use of computers and networking in trade related transactions has been limited
to automatic teller machines (ATMs), banking networks, debit and credit card systems,
electronic money and electronic bill payment systems (E-payment).
Advantages
1. For the business organization, the benefits of using M-commerce include customer
convenience, cost savings, and new business opportunities.
Disadvantages
1. Mobile devices do not generally offer graphics or processing power of a PC. The users are
therefore constrained to use small screen and keyboard and low resolution pictures and
videos.
2. The small screens of mobile devices limit the complexity of applications. For example, the
menu choice, and text typing capability are severely constrained
3. The underlying network imposes several types of restrictions. For example, the available
bandwidth is severely restricted, and international reach is prohibitively expensive.
Mobile devices
Hand-held devices essentially present user interfaces to the mobile users. The users
specify their requests using the appropriate interface programs, which are then transmitted to
the mobile commerce application on the Internet. The results obtained from the mobile
commerce application are displayed in suitable formats.
Mobile middleware
Network
Mobile commerce has become possible mainly because of the availability of wireless
networks. User requests are delivered either to the closest wireless access point (in a wireless
local area network environment) or to a base station (in a cellular network environment).
Wired networks are optional for a mobile commerce system. However, host
computers (servers) are generally connected to wired networks such as the Internet. So user
requests are routed to these servers using transport and/or security mechanisms provided by
wired networks.
Host computers
Host computers are essentially servers that process and store all the information
needed for mobile commerce applications. Most application programs used in the mobile
commerce are hosted on these. These applications usually consist of three major
components: web servers, database servers, and application programs and support software.
The web servers help interact with the mobile client. The database servers store
data. The application program is the middleware that implements the business logic of the
mobile commerce application.
Mobile devices include mobile phones, PDAs, and any other device that connects
to a mobile network for making payments.
A mobile device can also be used for payment of bills (especially utilities and
insurance premiums) with access to account-based payment instruments such as electronic
funds transfer, Internet banking payments, direct debit and electronic bill presentment.
The simple message exchange via short messaging services (SMS) may prove
more successful. The important payment solutions will be SMS-based, which can easily be
charged to the mobile phone bill of customers.
The problems of M-payment schemes are those of security, privacy, and guarding
against frauds.
The challenges for providing secure transactions are many and range from physical
theft of a mobile device which can be subsequently used for fraudulent payments.
(c) Micropayment
The bank account of the customer is linked to his mobile phone number. When the
customer makes an Mpayment transaction with a vendor or in a shopping complex, based on
a Bluetooth or wireless LAN connectivity with the vendor, the bank account of the customer
is debited and the alue is credited to the vendor’s account.
In the credit card based M-payment, the credit card number is linked to the mobile
phone number of the customer. When the customer makes an M-payment transaction with a
merchant, the credit card is charged and the value is credited to the merchant’s account.
(C) Micropayment
Micropayment is intended for payment for small purchases such as from vending
machines. The mobile device can communicate with the vending machine directly using a
Bluetooth or wireless LAN connection to negotiate the payment and then the micropayment
is carried out.
A customer makes a call to the number of a service provider where the per call
charge is equal to the cost of the vending item. Thus, the micropayment scheme is
implemented through the cooperation of the mobile phone operator and a third party service
provider. This approach has been used for vending from Coca-Cola machines.
Security Issues
1. Trace: Users of mobile devices can be difficult to trace because of roaming of the users.
Also, the mobile
devices go on-line and off-line frequently. Thus, attacks would be very difficult to trace.
2. Loss or Theft: A mobile device that is stolen or has fallen into wrong hands can cause
frauds that are difficult to track and prevent. A major problem in this regard is the lack of any
satisfactory mechanism to authenticate a particular user.
UNIT V
A. Norway
B. Austria
C. United States
D. Japan
B. It is too expensive
B. Smart Phones
C. Blackberry
D. Motorola Droid
4. Global marketing and advertising revenue are expected to exceed one billion dollars in:
A. Europe
B. Asia
C. North America
D. Antarctica
A. Pepsi
B. Coca-Cola
C. Cadbury
D. Kraft
E. Apple
B. RedLaser
A. Slow Connectivity
B. Security
C. Reliability
D. Standardization
A. 1955
B. 1977
C. 1989
D. 1997
E. 2001
A. FCC
B. SimPay
C. Pay Pal
D. RCR
E. EU Communication Bureau
A. Kevin Duffey
B. Duffer brothers
C. Warren Buffet
D. Bill Gates
11. What is the name of first operating system for mobile?
A. webos
B. Tizen
C. Simon
D. LuneOS
A. IBM
B. Microsoft
C. Apple
D. Google
13. Mobile operating systems (OS) are specialized software that runs on?
A. smartphones
B. tablets
C. Both A and B
D. None of the above
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
A. iOS
B. KaiOS
C. LuneOS
D. Tizen
A. Android
B. ios
C. Blackberry OS
D. Both A and B
17. Which OS known for its user-friendly interface, strong security features, and a wide range
of built-in apps and features?
A. Android
B. IOS
C. Windows
D. Tizen
18. Which of the following are advantage of Android?
A. flexibility
B. customization options
C. a large app ecosystem
D. All of the above
19. Mobile operating systems are continuously updated with new features, security patches
and bug fixes, which keeps the device running smoothly and securely.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
A. Fragmentation
B. Battery Drain
C. Limited Hardware support
D. All of the above
21. What is the name of the mobile operating system developed by Google?
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
24. Which mobile operating system was developed by Microsoft?
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
25. Which mobile operating system is considered to be the most popular globally?
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
27. Which mobile operating system is known for its focus on privacy and security?
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
28. Which mobile operating system is considered to be the oldest and most established?
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
29. Which mobile operating system is known for its integration with other Microsoft
products and services?
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
30. Which mobile operating system is considered to be a niche player in the market?
A) iOS
B) Android
C) Windows Phone
D) BlackBerry OS
6. What is M-Commerce?