cs8601 Mobile Computing Notes
cs8601 Mobile Computing Notes
www.studymaterial
Unit 1- INTRODUCTION
UNIT I – INTRODUCTION
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of Mobile
Communication Technologies-- Multiplexing – Spread spectrum -MAC Protocols – SDMA-
TDMA- FDMA- CDMA
User mobility refers to a user who has access to the same or similar telecommunication
services at different places, i.e., users communicate (wireless) <anytime, anywhere, with
anyone=
With device portability,1 the communication device moves (with or without a user).
Many mechanisms in the network and inside the device have to make sure that
communication is still possible while the device is moving. devices can be connected
anytime, anywhere to the network
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
laptop from one hotel to the next, reconnecting to the company9s network via the
telephone network and a modem.
Fixed and wireless: This mode is used for installing networks, e.g., in historical
buildings to avoid damage by installing wires, or at trade shows to ensure fast
network setup.
Mobile and wireless: This is the most interesting case. No cable restricts the user,
who can roam between different wireless networks. Most technologies discussed
in this book deal with this type of device and the networks supporting them.
Today9s most successful example for this category is GSM with more than 800
million users.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
accident.
• All the necessary steps for this particular type of accident can be prepared and
specialists can be consulted for an early diagnosis.
• Wireless networks are the only means of communication in the case of natural
disasters such as hurricanes or earthquakes. In the worst cases, only
decentralized, wireless ad-hoc networks survive.
c. Business:
Managers can use mobile computers say, critical presentations to major
customers. They can access the latest market share information. At a small
recess, they can revise the presentation to take advantage of this information.
They can communicate with the office about possible new offers and call
meetings for discussing responds to the new proposals. Therefore, mobile
computers can leverage competitive advantages.
A travelling salesman today needs instant access to the company9s database:
to ensure that files on his or her laptop reflect the current situation, to enable the
company to keep track of all activities of their travelling employees, to keep
databases consistent etc.
With wireless access, the laptop can be turned into a true mobile office, but
efficient and powerful synchronization mechanisms are needed to ensure data
consistency.
d. Credit Card Verification:
At Point of Sale (POS) terminals in shops and supermarkets, when customers
use credit cards for transactions, the intercommunication required between the
bank central computer and the POS terminal, in order to effect verification of the
card usage, can take place quickly and securely over cellular channels using a
mobile computer unit.
This can speed up the transaction process and relieve congestion at the POS
terminals.
e. Replacement of Wired Networks:
wireless networks can also be used to replace wired networks, e.g., remote
sensors, for tradeshows, or in historic buildings.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Physical layer: This is the lowest layer in a communication system and is responsible for
the conversion of a stream of bits into signals that can be transmitted on the sender
side. The physical layer of the receiver then transforms the signals back into a bit stream.
For wireless communication, the physical layer is responsible for frequency
selection, generation of the carrier frequency, signal detection (although heavy
interference may disturb the signal), modulation of data onto a carrier frequency and
(depending on the transmission scheme) encryption.
Data link layer: The main tasks of this layer include accessing the medium,
multiplexing of different data streams, correction of transmission errors, and
synchronization (i.e., detection of a data frame).
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Altogether, the data link layer is responsible for a reliable point-to-point connection
between two devices or a point-to-multipoint connection between one sender and
several receivers.
Network layer: This third layer is responsible for routing packets through a network
or establishing a connection between two entities over many other intermediate systems.
Important functions are addressing, routing, device location, and handover between
different networks.
Transport layer: This layer is used in the reference model to establish an end-to-end
connection
Application layer: Finally, the applications (complemented by additional layers that can
support applications) are situated on top of all transmission oriented layers. Functions
are service location, support for multimedia applications, adaptive applications
that can handle the large variations in transmission characteristics, and wireless access
to the world-wide web using a portable device.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
The GSM technology was continuously improved to provide better services which
led to development of advanced Technology between 2g and 3g
Provides phone calls
Send/receive e-mail messages
Web browsing
Speed : 64-144 kbps
Camera phones
Take a time of 6-9 mins. to download a 3 mins. MP3 song.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
WCDMA Network
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
1.6 Multiplexing
• Multiplexing describes how several users can share a medium with minimum
or no interference
• It is concerned with sharing the frequency range amongst the users
• Bands are split into channels
• Four main ways of assigning channels
• Space Division Multiplexing (SDM) : allocate according to location
• Time Division Multiplexing (TDM): allocate according to units of time
• Frequency Division Multiplexing (FDM): allocate according to the
frequencies
• Code Division Multiplexing (CDM) : allocate according to access codes
• Guard Space: gaps between allocations
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
For the remaining channels (k4 to k6) three additional spaces would be needed. In our
highway example this would imply that each driver had his or her own lane.
Drawback
Although this procedure clearly represents a waste of space, this is exactly the principle
used by the old analog telephone system: each subscriber is given a separate pair of
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
copper wires to the local exchange. In wireless transmission, SDM implies a separate
sender for each communication channel with a wide enough distance between
senders.
B. Frequency division multiplexing
Separation of the whole spectrum into smaller non overlapping
frequency bands (guard spaces are needed)
A channel gets a certain band of the spectrum for the whole time –
receiver has to tune to the sender frequency
Again, guard spaces are needed to avoid frequency band overlapping (also called
adjacent channel interference).
This scheme is used for radio stations within the same region, where each radio station
has its own frequency. This very simple multiplexing scheme does not need complex
coordination between sender and receiver: the receiver only has to tune in to the specific
sender.
• Advantages
No dynamic coordination necessary
Works also for analog signal
Disadvantages:
While radio stations broadcast 24 hours a day, mobile communication typically
takes place for only a few minutes at a time. Assigning a separate frequency for
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
The typical everyday example of CDM is a party with many participants from
different countries around the world who establish communication channels, i.e.,
they talk to each other, using the same frequency range (approx. 300–6000 Hz
depending on a person9s voice) at the same time. If everybody speaks the same
language, SDM is needed to be able to communicate (i.e., standing in groups,
talking with limited transmit power).
But as soon as another code, i.e., another language, is used, one can tune in to this
language and clearly separate communication in this language from all the other
languages. (The other languages appear as background noise.)
This explains why CDM has built-in security: if the language is unknown, the
signals can still be received, but they are useless. By using a secret code (or
language), a secure channel can be established in a 8hostile9 environment. (At
parties this may cause some confusion.). Guard spaces are also of importance in
this illustrative example. Using, e.g., Swedish and Norwegian does not really work;
the languages are too close. But Swedish and Finnish are 8orthogonal9 enough to
separate the communication channels.
Advantages
Bandwidth efficient
No coordination and synchronization necessary
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
step iii). During transmission, narrowband and broadband interference add to the signal
The sum of interference and user signal is received. The receiver now knows how to
despread the signal, converting the spread user signal into a narrowband signal again,
while spreading the narrowband interference and leaving the broadband interference.
In step v) the receiver applies a bandpass filter to cut off frequencies left and right of the
narrowband signal. Finally, the receiver can reconstruct the original data because the
power level of the user signal is high enough, i.e., the signal is much stronger than the
remaining interference.
Drawbacks:
(i) Increased complexity of receivers that have to despread a signal.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
(ii) Large frequency band that is needed due to the spreading of the signal.
Although spread signals appear more like noise, they still raise the background noise level
and may interfere with other transmissions if no special precautions are taken.
• Spreading the spectrum can be achieved in two different ways as shown in
the following two sections
1.7.1 Direct sequence spread spectrum
Direct sequence spread spectrum (DSSS) systems take a user bit stream and
perform an (XOR) with a so-called chipping sequence as shown in below figure.
The example shows that the result is either the sequence 0110101 (if the user bit
equals 0) or its complement 1001010 (if the user bit equals 1). While each user bit has a
duration tb, the chipping sequence consists of smaller pulses, called chips, with a duration
tc.
If the chipping sequence is generated properly it appears as random noise: this
sequence is also sometimes called pseudo-noise sequence.
The spreading factor s = tb/tc determines the bandwidth of the resulting signal.
If the original signal needs a bandwidth w, the resulting signal needs s·w after spreading.
DSSS need additional components as shown in the simplified block diagrams in below
figure
The first step in a DSSS transmitter, the spreading of the user data with the
chipping sequence (digital modulation).
Assuming for example a user signal with a bandwidth of 1 MHz. Spreading with the
above 11-chip Barker code would result in a signal with 11 MHz bandwidth. The
radio carrier then shifts this signal to the carrier frequency (e.g., 2.4 GHz in the ISM band).
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
The DSSS receiver is more complex than the transmitter. The receiver only
has to perform the inverse functions of the two transmitter modulation steps. However,
noise and multi-path propagation require additional mechanisms to reconstruct the
original data.
The first step in the receiver involves demodulating the received signal. This
is achieved using the same carrier as the transmitter reversing the modulation and
results in a signal with approximately the same bandwidth as the original spread
spectrum signal. Additional filtering can be applied to generate this signal.
If transmitter and receiver are perfectly synchronized and the signal is not too
distorted by noise or multi-path propagation, DSSS works perfectly well according to the
simple scheme shown. Sending the user data 01 and applying the 11-chip Barker code
10110111000 results in the spread 8signal9 1011011100001001000111. On the receiver
side, this 8signal9 is XORed bit-wise after demodulation with the same Barker code as
chipping sequence. This results in the sum of products equal to 0 for the first bit and to
11 for the second bit. The decision unit can now map the first sum (=0) to a binary 0, the
second sum (=11) to a binary 1 – this constitutes the original user data.
1.7.2 Frequency hopping spread spectrum
For frequency hopping spread spectrum (FHSS) systems, the total available
bandwidth is split into many channels of smaller bandwidth plus guard spaces
between the channels.
Transmitter and receiver stay on one of these channels for a certain time and then
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
In slow hopping, the transmitter uses one frequency for several bit periods.
Above figure shows five user bits with a bit period tb. Performing slow hopping, the
transmitter uses the frequency f2 for transmitting the first three bits during the dwell
time td. Then, the transmitter hops to the next frequency f3. Slow hopping systems are
typically cheaper and have relaxed tolerances, but they are not as immune to narrowband
interference as fast hopping systems.
For fast hopping systems, the transmitter changes the frequency several times
during the transmission of a single bit. In the above figure, the transmitter hops three
times during a bit period. Fast hopping systems are more complex to implement because
the transmitter and receiver have to stay synchronized within smaller tolerances to
perform hopping at more or less the same points in time. However, these systems are
much better at overcoming the effects of narrowband interference and frequency
selective fading as they only stick to one frequency for a very short time.
The below Figures show simplified block diagrams of FHSS transmitters and
receivers respectively.
The first step in an FHSS transmitter is the modulation of user data according
to one of the digital-to analog modulation schemes, e.g., FSK or BPSK. This results in
a narrowband signal, if FSK is used with a frequency f0 for a binary 0 and f1 for a binary
1. In the next step, frequency hopping is performed, based on a hopping sequence.
The hopping sequence is fed into a frequency synthesizer generating the
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Compared to DSSS, spreading is simpler using FHSS systems. FHSS systems only use a
portion of the total band at any time, while DSSS systems always use the total bandwidth
available. DSSS systems on the other hand are more resistant to fading and multi-path
effects. DSSS signals are much harder to detect – without knowing the spreading code,
detection is virtually impossible. If each sender has its own pseudo-random number
sequence for spreading the signal (DSSS or FHSS), the system implements CDM.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
The two frequencies are also known as uplink, i.e., from mobile station to base station or
from ground control to satellite, and as downlink, i.e., from base station to mobile station
or from satellite to ground control.
The basic frequency allocation scheme for GSM is fixed and regulated by national
authorities.
All uplinks use the band between 890.2 and 915 MHz,
All downlinks use 935.2 to 960 MHz.
According to FDMA, the base station, shown on the right side, allocates a certain
frequency for up- and downlink to establish a duplex channel with a mobile phone.
Up- and downlink have a fixed relation. If the uplink frequency is fu = 890 MHz +
n·0.2 MHz, the downlink frequency is fd = fu + 45 MHz,
i.e., fd = 935 MHz + n·0.2 MHz for a certain channel n.
The base station selects the channel. Each channel (uplink and downlink) has a
bandwidth of 200 kHz.
This scheme also has disadvantages. While radio stations broadcast 24 hours
a day, mobile communication typically takes place for only a few minutes at a time.
Assigning a separate frequency for each possible communication scenario would
be a tremendous waste of (scarce) frequency resources.
Additionally, the fixed assignment of a frequency to a sender makes the scheme
very inflexible and limits the number of senders.
3.TDMA
A more flexible multiplexing scheme for typical mobile communications is time division
multiplexing (TDM). Compared to FDMA, time division multiple access (TDMA) offers
a much more flexible scheme, which comprises all technologies that allocate certain
time slots for communication.
Now synchronization between sender and receiver has to be achieved in the time
domain. Again this can be done by using a fixed pattern similar to FDMA techniques, i.e.,
allocating a certain time slot for a channel, or by using a dynamic allocation scheme.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Listening to different frequencies at the same time is quite difficult, but listening to
many channels separated in time at the same frequency is simple. Fixed schemes do not
need identification, but are not as flexible considering varying bandwidth requirements.
3.1 Fixed TDM
The simplest algorithm for using TDM is allocating time slots for channels in a
fixed pattern. This results in a fixed bandwidth and is the typical solution for
wireless phone systems.
MAC is quite simple, as the only crucial factor is accessing the reserved time slot
at the right moment.
If this synchronization is assured, each mobile station knows its turn and no
interference will happen.
The fixed pattern can be assigned by the base station, where competition
between different mobile stations that want to access the medium is solved.
The above figure shows how these fixed TDM patterns are used to implement
multiple access and a duplex channel between a base station and mobile station.
Assigning different slots for uplink and downlink using the same frequency
is called time division duplex (TDD).
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
As shown in the figure, the base station uses one out of 12 slots for the downlink,
whereas the mobile station uses one out of 12 different slots for the uplink. Uplink
and downlink are separated in time. Up to 12 different mobile stations can use the
same frequency without interference using this scheme. Each connection is
allotted its own up- and downlink pair.
This general scheme still wastes a lot of bandwidth.
It is too static, too inflexible for data communication. In this case,
connectionless, demand-oriented TDMA schemes can be used
This is a random access scheme, without a central arbiter controlling access and
without coordination among the stations.
If two or more stations access the medium at the same time, a collision occurs and
the transmitted data is destroyed.
Resolving this problem is left to higher layers (e.g., retransmission of data). The
simple Aloha works fine for a light load and does not require any complicated
access mechanisms.
3.3Slotted Aloha
The first refinement of the classical Aloha scheme is provided by the introduction
of time slots (slotted Aloha).
In this case, all senders have to be synchronized, transmission can only start at
the beginning of a time slot as shown below.
If a station misses the time-slot, the station must wait until the beginning of the
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
next time-slot
The introduction of slots raises the throughput from 18 per cent to 36 per cent, i.e.,
slotting doubles the throughput. Both basic Aloha principles occur in many systems that
implement distributed access to a medium. Aloha systems work perfectly well under a
light load, but they cannot give any hard transmission guarantees, such as maximum
delay before accessing the medium or minimum throughput.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
1) 1-Persistent
• Before sending a frame, a station senses the line (Figure 12.10a).
i) If the line is idle, the station sends immediately (with probability = 1).
ii) If the line is busy, the station continues sensing the line.
• This method has the highest chance of collision because 2 or more stations:
→ may find the line idle and
→ send the frames immediately.
2) Non-persistent
• Before sending a frame, a station senses the line (Figure 12.10b).
i) If the line is idle, the station sends immediately.
ii) If the line is busy, the station waits a random amount of time and then
senses the line again.
• This method reduces the chance of collision because 2 or more stations:
→ will not wait for the same amount of time and
→ will not retry to send simultaneously.
3) P-Persistent
• This method is used if the channel has time-slots with a slot-duration equal to or
greater than the maximum propagation time (Figure 12.10c).
• Advantages:
i)It combines the advantages of the other 2 methods.
ii) It reduces the chance of collision and improves efficiency.
• After the station finds the line idle, it follows these steps:
1) With probability p, the station sends the frame.
2) With probability q=1-p, the station waits for the beginning of the next
time-slot and checks the line again.
i) If line is idle, it goes to step 1.
ii) If line is busy, it assumes that collision has occurred and uses the
back off procedure.
3.5 Reservation algorithms
1. DAMA - Demand Assigned Multiple Access
• Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming
Poisson distribution for packet arrival and packet length)
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
In a fixed TDM scheme N mini-slots followed by N·k data-slots form a frame that
is repeated.
Each station is allotted its own mini-slot and can use it to reserve up to k data-
slots. This guarantees each station a certain bandwidth and a fixed delay. Other
stations can now send data in unused data-slots as shown.
Using these free slots can be based on a simple round-robin scheme or can be
uncoordinated using an Aloha scheme.
This scheme allows for the combination of, e.g., isochronous traffic with fixed
bitrates and best-effort traffic without any guarantees.
3.5 MACA - collision avoidance
• MACA (Multiple Access with Collision Avoidance) uses short signaling
packets for collision avoidance
• RTS (request to send): a sender request the right to send from a
receiver with a short RTS packet before it sends a data packet
• CTS (clear to send): the receiver grants the right to send as soon as it
is ready to receive
• Signaling packets contain
• sender address
• receiver address
• packet size
• MACA avoids the problem of hidden terminals
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
4.CDMA
Code division multiple access systems apply codes with certain characteristics
to the transmission to separate different users in code space and to enable access
to a shared medium without interference.
All terminals send on the same frequency probably at the same time and can
use the whole bandwidth of the transmission channel.
Each sender has a unique random number, the sender XORs the signal with
this random number.
The receiver can <tune= into this signal if it knows the pseudo random
number, tuning is done via a correlation function
Disadvantages:
higher complexity of a receiver (receiver cannot just listen into the medium and
start receiving if there is a signal)
all signals should have the same strength at a receiver
Advantages:
all terminals can use the same frequency, no planning needed
huge code space (e.g. 232) compared to frequency space
interferences (e.g. white noise) is not coded
forward error correction and encryption can be easily integrated
Example:
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
The following figure shows a sender A that wants to transmit the bits 101. The key of A is
shown as signal and binary sequence Ak. The binary <0= is assigned a positive signal value,
the binary <1= a negative signal value. After spreading, i.e., XORing Ad and Ak, the
resulting signal is As.
The same happens with data from sender B with bits 100. The result is Bs. As and Bs now
superimpose during transmission. The resulting signal is simply the sum As + Bs as
shown above. A now tries to reconstruct the original data from Ad. The receiver applies
A9s key, Ak, to the received signal and feeds the result into an integrator. The integrator
adds the products, a comparator then has to decide if the result is a 0 or a 1 as shown
below. As clearly seen, although the original signal form is distorted by B9s signal, the
result is quite clear. The same happens if a receiver wants to receive B9s data.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Soft handover or soft handoff refers to a feature used by the CDMA and WCDMA
standards, where a cell phone is simultaneously connected to two or more cells (or cell
sectors) during a call. If the sectors are from the same physical cell site (a sectorised site),
it is referred to as softer handoff. This technique is a form of mobile-assisted handover,
for IS-95/CDMA2000 CDMA cell phones continuously make power measurements of a
list of neighboring cell sites, and determine whether or not to request or end soft
handover with the cell sectors on the list.
Soft handoff is different from the traditional hard-handoff process.
With hard handoff, a definite decision is made on whether to hand off or not. The
handoff is initiated and executed without the user attempting to have simultaneous
traffic channel communications with the two base stations. With soft handoff, a
conditional decision is made on whether to hand off. Depending on the changes in pilot
signal strength from the two or more base stations involved, a hard decision will
eventually be made to communicate with only one. This normally happens after it is
evident that the signal from one base station is considerably stronger than those from the
others. In the interim period, the user has simultaneous traffic channel communication
with all candidate base stations. It is desirable to implement soft handoff in power-
controlled CDMA systems because implementing hard handoff is potentially difficult in
such systems.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Unit 1- INTRODUCTION
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
UNIT III
3.1 MOBILE IP
Mobile IP is an Internet Engineering Task Force (IETF)
standard communications protocol that enhances the existing
IP to accommodate mobility.
Mobile IP allows mobile computers to stay connected to the
internet regardless of their location & without having to
continually change their IP address.
Every mobile user needs continuous network connectivity
irrespective of his physical location. The traditional IP does not
support user mobility.
Mobile IP was created by extending IP to enable users to keep
the same IP address while travelling to different networks.
Advantages of using Mobile IP :
It allows fast, continuous low‐cost access to corporate
networks in remote areas where there is no public telephone
system or cellular coverage.
It supports a wide range of applications from Internet access
and e‐mail to e‐commerce.
Users can be permanently connected to their Internet
provider and charged only for the data packets that are sent
and received
It can move from one type of medium to another without losing
connectivity
Disadvantage of Mobile IP:
Routing inefficiency problem caused by the <triangle routing=
formed by the home agent, correspondent host, and the
foreign agent.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
b) Agent solicitation:
Rather than waiting for agent advertisements a MN can sen out
an agent solicitation.
This solicitation forces any agents on the link to immediately
send an agent advertisement.
If MN determines that it is connected to a foreign network, then
it obtains a COA.
Types of COA:
(i) Foreign Agent COA - The static IP address of a foreign agent
(FA) on a visited network
(ii) Co-located COA - Temporary IP address assigned to the
MN.
Represents the current position of the MN on the Foreign
network & can be used by only one MN at a time.
A co-located care-of address can be obtained by Dynamic
Host Configuration Protocol (DHCP).
Steps:
1. MA (HA, FA) broadcast agent advertisement message at regular
intervals.
2. The MN receiving the agent advertisement message observes
whether the message is from its own HA & determine whether
it is on the home network or on the foreign network.
3. If the MN does not wish to wait for the periodic advertisement,
it can send out agent solicitation message that will be
responded to by a MA.
After these steps of advertisements or solicitations the MN can
now receive a COA, either one for an FA or a co-located COA. The
MN knows its location (home network or foreign network) and
the capabilities of the agent.
The next step for the MN is the registration with the HA if the
MN is in a foreign network
3.1.4.2 REGISTRATION
If the MN discovers that it is on the home network, then it
operates normally without Mobile IP
7
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
If the MN has moved to a new network & obtain the COA from
a FA, then this address should be registered with the HA.
Registration – A MN uses an authenticated registration
procedure to inform the HA of its COA.
Registration messages uses UDP Protocol.
Registration can be done in two different ways:
(i) Registration of the MN through FA
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
10
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Visitor List:
Maintained on FA.
Maps MN9s home address with its MAC address (address of
NIC) & HA9s address.
11
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Fig. IP encapsulation
Steps in Encapsulation:
1. When a HA receives a packet addressed to a MN, it forwards
the packet to the COA using IP -within -IP encapsulation
2. Using IP -within -IP , the HA inserts a new IP header in front
of the IP header of any datagram.
3. Destination address is set to the COA.
4. Source address is set to the HA9s address.
5. After stripping out the 1st header, IP processes the packet
again.
There are different ways of performing the encapsulation. They
are:
1. IP-in-IP Encapsulation
2. Minimal Encapsulation
3. Generic Routing Encapsulation
(1) IP-in-IP Encapsulation:
This is the mandatory method for Mobile IP.
12
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
13
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
14
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
15
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
16
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
17
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
18
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
19
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
– Pair of nodes can either communicate directly when they are in within the
range or can communicate via multi-hop communication.
2. Dynamic topologies :
– n/w topology can change unpredictably because of the mobility of devices
in MANET
– Rate of topology change depends on the speed of mobile movement
3. Bandwidth constrained, variable capacity link:
– Wireless link have lower capacity compare to wired link
– Factors affecting Bandwidth: Noise, Interference…….
4. Energy constrained operation:
– Nodes depends on battery power
– Small battery – limited amount of energy
– Need more energy during Routing
– <Energy Conservation= – important objective of MANET routing protocol
5. Increased vulnerability:
– New type of security threats
– Increased the possibility of eavesdropping, spoofing, DOS attacks.
– Difficult to identify the attacker because:
• Devices keeps on moving
• Do not have global Identifier
1) Limited bandwidth:
Limited bandwidth because of the effect of multiple access, fading, noise,
and interference conditions, etc.,
2) Dynamic topology:
20
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
7) Battery constraints:
Devices used in these networks have restrictions on the power source in
order to maintain portability, size and weight of the device.
8) Security threats:
Brings new security challenges to the network design. As the wireless
medium is vulnerable to eavesdropping.
21
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
22
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Procedure:
23
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Flooding LSP – for example Router E sends its LSP on all its links and
routers D, B and C insert the LSP in their LSDB and forward it over their
other links.
24
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Each router computes the spanning tree by using Dijkstra9s shortest path
algorithm
25
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
26
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Maintain the global topology information in the form of tables at every node.
Sequence Number:
Each routing advertisement comes with a sequence number.
Within ad-hoc networks, advertisements may propagate along many
paths.
Sequence numbers help to apply the advertisements in correct order.
This avoid the loops in the network.
Damping:
Transient changes in topology that are of short duration should not
weaken the routing mechanisms.
Unstable changes in the topology are not forwarded
27
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
28
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
2 step process
Route Discovery
Route Maintenance
29
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
30
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
31
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
32
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
33
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Combines the best features of both proactive & reactive routing protocols.
It is Hybrid Protocol
Based on the concept of zones.
The routing zone has a radius expressed in hops. i.e., Zone radius: Number
of hops
o Intrazone routing: 1st the packet is sent within the routing zone of
the source node to reach the peripheral nodes
In the diagram the routing zone of S includes the nodes A-I, but not K.
The nodes are divided into peripheral nodes and interior nodes.
Peripheral nodes: Nodes whose minimum distance is less than the radius.
34
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
35
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
o Drawback of this scheme is that multiple copies of the same packet are
forwarded through the mesh.
36
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
3. A multicast receiver getting the JOIN REQUEST creates or updates the source
entry in its member table.
4. As long as valid entries in receiver's member table, JOIN TABLE are
broadcasted periodically.
5. An intermediate node, receiving the JOINT TABLE, compares it's Node ID with
the entries of that table.
37
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
38
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
The term VANET became mostly synonymous with the more generic
term inter-vehicle communication (IVC).
WORKING OF VANET
VANET turns every participating car into a wireless router or node, allowing
cars approximately 100 to 300 meters of each other to connect and, in turn,
create a network with a wide range.
As cars fall out of the signal range and drop out of the network, other cars can
join in, connecting vehicles to one another so that a mobile Internet is created.
It is estimated that the first systems that will integrate this technology are police
and fire vehicles to communicate with each other for safety purposes.
COMMUNICATION IN VANET
39
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
ARCHITECTURE OF VANET
Each node in VANET is equipped with two types of unit i.e. On Board
Unit(OBU) and Application Unit (AU). OBU has the communicational
capability whereas AU executes the program making OBU8s communicational
capabilities. An RSU can be attached to the infrastructure network which is
connected to the Internet.
CHARACTERISTICS OF VANET
High Mobility: The nodes in VANETs usually are moving at high speed.
This makes harder to predict a node9s position and making protection of
node privacy
40
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
APPLICATIONS OF VANET
These applications are used to increase the safety on the roads. These
applications can be further categorised in following way.
Cooperative Driving: Drivers can get traffic related warning signals & these
signals can co-operate the driver for an uninterrupted and safe driving.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Internet Connectivity: People always want to connect with the Internet all
the time. Hence VANET provides the constant connectivity of the Internet
to the users.
Other services: VANET can be utilised in other user based application such
as payment service to collect the tall taxes, to locate the fuel station,
restaurant etc.
Security: As VANET provides the road safety applications which are life
critical therefore security of these messages must be satisfied
42
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Real time Constraint: VANET is time critical where safety related message
should be delivered with 100ms transmission delay. So to achieve real time
constraint, fast cryptographic algorithm should be used. Message and entity
authentication must be done in time.
Low tolerance for error: Some protocols are designed on the basis of
probability. VANET uses life critical information on which action is
performed in very short time. A small error in probabilistic algorithm may
cause harm.
MANET Vs VANET
43
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
MANET VANET
Collection of mobile nodes that Nodes(vehicles) can communicate
communicate with each other over with certain roadside infrastructures
bandwidth constrained wireless links or base stations.
without any infrastructure support.
The node movement is more random The node mobility is constrained to
in nature the road topologies.
Power is a major constrained The battery power available in a
vehicle is quite adequate.
Cost of production is cheap Expensive
Change in network topology is slow Frequent & very fast
Node lifetime depends on power depends on lifetime of vehicles
resource
Multi-hop routing is available. Weakly available.
Attribute based addressing scheme Location-based
44
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
UNIT IV
Mobile TCP - WAP – Architecture – WDP – WTLS – WTP – WSP – WAE - WTA -
Architecture - WML
The behaviour TCP shows after the detection of congestion is called slow
start
Instead of starting transmission at a fixed transmission window size, the
transmission is started at the lowest window size and then doubled after
each successful transmission.
If congestion is detected, the transmission window size is reduced to half of
its current size.
The sender always calculates a congestion window for a receiver.
1. The start size of the congestion window is one segment.
2. The sender sends one packet and waits for acknowledgement.
3. If this acknowledgement arrives, the sender increases the congestion
window by one, now sending two packets.
4. After arrival of the two corresponding acknowledgements, the sender again
adds 2 to the congestion window, one for each of the acknowledgements.
5. Now the congestion window equals 4.
6. This scheme doubles the congestion window every time the
acknowledgements come back, which takes one round trip time (RTT). This
is called the exponential growth of the congestion window in the slow start
mechanism.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
The sender can retransmit the missing packet(s) before the timer expires.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
It does not wait until the timer expires it retransmit a packet whenever
sender is getting 3 duplicate acknowledgements.
After retransmitting a packet it sets the window size is reduced to its half
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Standard TCP is used between the fixed computer and the access point.
The foreign agent (access point) acts as a proxy and relays all data in both
directions.
Packet delivery:
If CN sends packet, FA acknowledges packet and forwards packet to MN
If MN receives packet, it acknowledges
This acknowledgement only used by CN
Similarly if MN sends packet, FA acknowledges packet and forwards it to CN
Packet Loss:
Case1 : If a packet is lost on the wireless link due to a transmission error:
Then the CN would not notice this.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Advantages:
1. The approach automatically falls back to standard TCP if the
enhancements stop working.
2. The CN does not need to be changed since most of the enhancements are
in the FA.
3. It does not need a handover of state as soon as the MH moves to another
FA.
4. It does not matter if the next FA uses the enhancement or not. If not, the
approach automatically falls back to the standard solution.
Disadvantages:
1. Snooping TCP does not isolate the behaviour of the wireless link as good
as I-TCP.
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
The SH is responsible for exchanging data to both the Standard host and
the Mobile host.
In this approach, we assume that the error bit rate is less as compared to
other wireless links.
So if any packet is lost, the retransmission has to occur from the original
sender and not by the SH.
1. The SH monitors the ACKs being sent by the MH.
2. If for a long period ACKs have not been received, then the SH assumes that
the MH has been disconnected.
3. If so the SH blocks the sender by setting its window size to 0.
4. Then the sender goes into persistent mode i.e. the sender will not try to
retransmit the data.
5. Now when the SH detects a connectivity established again with the MH,
the window of the sender is restored to original value.
Advantages of Mobile TCP:
1. M-TCP maintains the TCP end-to-end semantics.
2. If the MH is disconnected, it avoids useless retransmissions, slow starts or
breaking connections by simply shrinking the sender9s window to 0.
3. M-TCP does not buffer data so, no forwarding.
Disadvantages of Mobile TCP:
7
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Advantages:
1. It is simple.
2. Only minor changes in the MN software results in performance increase.
3. No FA or CN host has to be changed.
Disadvantages: Increased time delay in the retransmitted packets to move
from CN to MH.
4.3.5 Transmission/time-out freezing
In normal TCP, a disconnection takes place when the connection is lost for
a longer time.
Example: When a MN moving through a tunnel or passing black out areas,
the connection is lost and it needs to make connection once again, when it
comes back.
TCP freezing:
MAC layer is often able to detect interruption in advance
MAC can inform TCP layer of upcoming loss of connection
TCP stops sending, but does not assume a congested link.
MAC layer signals again if reconnected.
Advantages:
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Disadvantages:
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Fast Avoids slow start ate Simple and efficient Mixed layers, not
Retransmission roaming transparent.
/Fast Recovery
10
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Features:
Interoperable: Allowing terminals and software from different vendors to
communicate with networks from different providers
Scalable: Protocols and services should scale with customer needs and
number of customers
Efficient: Provision of QoS suited to the characteristics of the wireless
and mobile networks
Reliable: Provision of a consistent and predictable platform for deploying
services
Secure: Preservation of the integrity of user data, protection of devices
and services from security problems.
WAP Architecture:
WAP is designed in a layered fashion, so that it can be extensible, flexible,
and scalable. The WAP protocol stack is divided into five layers −
Layers of WAP Protocol:
Application Layer (Wireless Application Environment (WAE))
Session Layer(Wireless Session Protocol (WSP))
Transaction Layer(Wireless Transaction Protocol (WTP))
Security Layer(Wireless Transport Layer Security (WTLS))
Transport Layer(Wireless Datagram Protocol (WDP))
a) Bearer services
The basis for transmission of data is formed by different bearer services.
WAP uses existing data services and will integrate further services.
Example:
Message services such as short message service (SMS) of GSM, Circuit-
switched data such as high-speed circuit switched data (HSCSD) in GSM
Packet switched data such as general packet radio service (GPRS) in
GSM.
Many other bearers are supported, such as CDPD, IS-136,PHS.
No special interface has been specified between the bearer service
b) Transport Layer (Wireless Datagram Protocol (WDP))
The transport layer with its wireless datagram protocol (WDP) and the
additional wireless control message protocol (WCMP) offers a bearer
independent, reliable datagram-oriented service to the higher layers of the
WAP architecture
11
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
12
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
On the left side, different fixed networks, such as the traditional internet
and the public switched telephone network (PSTN), are shown.
Several new elements will be implemented between these networks
WAP-enabled wireless, mobile devices in a wireless network on the right-
hand side.
To browse web pages with handheld devices, a wireless mark-up language
(WML) has been defined in WAP.
Special filters within the fixed network can translate HTML into WML, web
servers can already provide pages in WML, or the gateways between the fixed
13
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
and wireless network can translate HTML into WML. These gateways not
only filter pages but also act as proxies for web access.
WML is additionally converted into binary WML for more efficient
transmission.
Wireless telephony application (WTA) server translates all incoming signals
into WML events displayed at the handheld device
14
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
15
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
16
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
17
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
18
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
19
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
20
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
21
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
22
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Origin server: Standard web servers running HTTP and generating content
using scripts, providing pages using a database, or applying any other
technology. Origin servers will respond to the request.
Then the gateway encodes the response and its content & then transfers
the encoded response with the content to the client.
Push services: The WAE logical model also includes push services.
Then an origin server pushes content to the gateway.
The gateway encodes the pushed content and transmits the encoded push
content to the client.
User Agent: Several user agents can reside within a client.
User agents include such items as: browsers, phonebooks, message
editors etc.
WAE does not specify the number of user agents or their functionality.
User agent handles access to, and interaction with, mobile telephone
features.
23
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
a) Client
The client is connected via a mobile network with a WTA server, other
telephone networks and a WAP gateway.
A WML user agent running on the client.
24
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
The client may have voice and data connections over the network.
c) WTA server: One difference between WTA servers and other servers besides
security is the tighter control of QoS.
d) Other servers: Other origin servers can be connected via the WAP gateway.
Other servers located in the internet, may not be able to give as good QoS
guarantees as the network operator.
f) WTA user agent: The WTA user agent has a very rigid and real-time context
management for browsing the web compared to the standard WML user agent.
Interaction between a WTA client, a WTA gateway, a WTA server, the mobile
network and a voice box server:
25
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
26
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])
lOMoARcPSD|19779664
www.studymaterial
Either these decks can be static files on the server or they can be
dynamically generated.
WML describes the intent of interaction in an abstract manner. The user
agent on a handheld device has to decide how to best present all elements
of a card.
Features of WML:
Text and images: WML gives hints how text and images can be presented
to a user. However, the exact presentation of data to a user is up to the user
agent running on the handheld device.
User interaction: WML supports different elements for user input.
Examples: text entry controls for text or password entry, option selections
or controls for task invocation.
Navigation: WML offers a history mechanism with navigation through the
browsing history, hyperlinks and other inter card navigation elements.
Context management: WML allows for saving the state between different
decks without server interaction so state can be shared across different
decks.
WML HTML
Mark-up language for wireless Mark-up language for wired
communication communication
Makes use of variables Does not use of variables
WML script stored in a separate file
JavaScript is embedded in the same
HTML file
Images are stores as WBMP(Wireless Images are stores as GIF, JPEG or
Bitmap) PNG
WBMP is a 2 bit image Size of the images are much larger in
HTML
Case sensitive Not Case sensitive
WML has fewer tags than HTML HTML has more tags than WML
A set of 8WML cards9 make a 8DECK9 A set of 8HTML pages9 make a 8SITE9
WMLScript:
27
Download Useful
DownloadedMaterials @ www.rejinpaul.com
by J sham kevin ([email protected])