SYLLABUS ISM band, Spread Spectrum, physical layer accessing techniques – FHSS, DSSS, OFDM, (IEEE 802.11a) HR-DSSS, OFDM (IEEE 802.11g)Wireless Networking, Wireless LAN Overview : MAC issues, IEEE 802.11, BlueTooth , Wireless multiple access protocols, Wireless applications, data broadcasting, Mobile IP-entities and terminology, IP Packet delivery, Agent discovery, Registration, Tunneling and encapsulation, optimization and reverse tunneling WAP : Architecture, protocol stack, application environment, applications.
ISM band In mobile computing, the ISM (Industrial, Scientific, and Medical) bands are essential for enabling various wireless communication technologies. These bands are non-licensed spectrum bands available for use by any device or application that adheres to the regulations governing these frequencies. The ISM bands facilitate numerous applications in mobile computing, from basic device connectivity to advanced Internet of Things ( IoT ) applications.
Key ISM Bands The most commonly used ISM bands in mobile computing are: 2.4 GHz Band : Ranges from 2.4 GHz to 2.5 GHz. 5 GHz Band : Includes several sub-bands, ranging from 5.15 GHz to 5.85 GHz. 900 MHz Band : Ranges from 902 MHz to 928 MHz (primarily used in North America).
Spread Spectrum Spread spectrum is a method used in mobile computing and wireless communications to spread the signal across a wider frequency band than the minimum bandwidth required for transmitting the information. This technique enhances signal robustness, reduces interference, and improves security. It is widely used in mobile communication systems, Wi-Fi, and other wireless technologies.
Advantages of Spread Spectrum in Mobile Computing Interference Mitigation : Spreads the signal across a wide band, reducing the impact of narrowband interference. Security : Makes unauthorized interception and jamming more difficult. Robustness : Enhances resistance to multipath fading, which is common in mobile environments. Capacity : Allows multiple users to share the same frequency band with minimal interference.
Challenges in Mobile Computing Complexity : Implementation of spread spectrum techniques can be complex and require sophisticated hardware. Bandwidth Efficiency : Spread spectrum techniques can be less bandwidth-efficient compared to some other methods. Power Consumption : May increase power consumption, which is a critical factor for battery-operated mobile devices . In summary, spread spectrum techniques play a crucial role in enhancing the performance, reliability, and security of wireless communications in mobile computing. By spreading the signal across a wider frequency range, these techniques help mitigate interference, improve robustness, and enable efficient use of the spectrum in various applications, from Wi-Fi and Bluetooth to cellular networks and GPS.
Physical layer accessing techniques – FHSS, DSSS, OFDM Accessing techniques in the physical layer are methods used to manage how multiple users share the available spectrum. Here are the details of three key techniques: Frequency Hopping Spread Spectrum (FHSS) Principle: FHSS works by rapidly switching the carrier frequency among many frequency channels. This hopping sequence is known to both the transmitter and the receiver .
Frequency Hopping Spread Spectrum (FHSS) Advantages: Resistant to narrowband interference. Provides security through frequency hopping. Disadvantages: Complex synchronization between transmitter and receiver. Less bandwidth efficient compared to other methods.
Direct Sequence Spread Spectrum (DSSS) Principle : DSSS spreads the signal over a wider frequency band than the minimum required. The signal is multiplied by a pseudo-random noise code which has a higher bit rate than the data being transmitted. The receiver uses the same pseudo-random noise code to demodulate the signal. Advantages: Resistant to narrowband interference and multipath fading. Provides some level of security since the pseudo-random code is known only to the transmitter and receiver .
Disadvantages: Requires more bandwidth than non-spread-spectrum techniques. Complexity in generating and synchronizing the pseudo-random code.
Orthogonal Frequency Division Multiplexing (OFDM) Principle : OFDM divides the available spectrum into multiple orthogonal sub-carriers. Data is transmitted in parallel on these sub-carriers. Advantages: Highly efficient in terms of bandwidth. Robust against multipath fading and interference. Simplifies equalization since it transforms a frequency-selective channel into multiple flat-fading sub-channels.
Disadvantages: Sensitive to frequency offset and phase noise. Requires complex synchronization and channel estimation techniques. High Peak-to-Average Power Ratio (PAPR) can reduce power efficiency.
Comparison and Applications FHSS: Common in Bluetooth technology and some military communications due to its resilience against interference and eavesdropping .
DSSS Used in Wi-Fi (802.11b) and CDMA (Code Division Multiple Access) mobile communications due to its robustness against interference and ability to support multiple users.
OFDM Widely used in modern wireless communication systems, such as Wi-Fi (802.11a/g/n/ac), LTE (Long-Term Evolution), and digital television broadcasting (DVB-T) due to its spectral efficiency and robustness against multipath effects . These techniques play crucial roles in enhancing the performance, reliability, and security of communication systems at the physical layer.
(IEEE 802.11a) HR-DSSS, OFDM (IEEE 802.11g)Wireless Networking, Wireless LAN IEEE 802.11 standards specify the set of protocols for implementing wireless local area network (WLAN) communications. Here's a detailed look at the relevant standards and technologies: IEEE 802.11a Frequency Band : Operates in the 5 GHz band. Modulation : Uses Orthogonal Frequency Division Multiplexing (OFDM). Data Rates : Supports data rates up to 54 Mbps. Channels : More non-overlapping channels compared to 2.4 GHz band, reducing interference. Range : Generally has a shorter range compared to 2.4 GHz standards due to higher frequency.
IEEE 802.11b Frequency Band : Operates in the 2.4 GHz band. Modulation : Uses High Rate Direct Sequence Spread Spectrum (HR-DSSS). Data Rates : Supports data rates up to 11 Mbps. Channels : Limited number of non-overlapping channels, leading to potential interference in crowded environments. Range : Typically better range compared to 5 GHz band due to lower frequency.
IEEE 802.11g Frequency Band : Operates in the 2.4 GHz band. Modulation : Supports both HR-DSSS (for backward compatibility with 802.11b) and OFDM (like 802.11a). Data Rates : Supports data rates up to 54 Mbps. Channels : Same limitations as 802.11b regarding the number of non-overlapping channels. Range : Similar range to 802.11b but with higher data rates due to OFDM.
Wireless Networking Wireless networking allows devices to communicate and share data without physical connections, using radio waves to transmit and receive data over the air. Key components of wireless networking include: Access Points (APs) : Devices that allow wireless devices to connect to a wired network. Wireless Clients : Devices like laptops, smartphones, and tablets that connect to the network via Wi-Fi. Security Protocols : Measures to secure the wireless network, including WEP, WPA, and WPA2. Roaming : The ability for a wireless client to move between APs without losing connection.
Wireless LAN (WLAN) Wireless LANs are networks that connect devices over short distances using wireless communication. Key features and benefits include: Mobility : Allows users to move around within the network area while maintaining a network connection. Ease of Installation : No need for physical cables, making installation and reconfiguration easier. Scalability : Easy to expand the network by adding more APs and clients. Flexibility : Supports a variety of devices and can be set up in different environments (e.g., offices, homes, public spaces).
Overview: MAC issues The Medium Access Control (MAC) layer is a crucial component of the Data Link Layer in the OSI model, responsible for controlling how devices in a network gain access to the medium and permission to transmit data . There are several key issues and considerations related to the MAC layer in wireless networking : 1. Collision Avoidance and Detection Issue: In wireless networks, multiple devices may attempt to transmit data simultaneously, leading to collisions .
Techniques: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): Used in IEEE 802.11 (Wi-Fi) networks, this technique requires devices to sense the medium before transmitting and to back off for a random period if the medium is busy. Request to Send / Clear to Send (RTS/CTS): A handshake protocol to further reduce collisions, especially in environments with hidden nodes.
2. Hidden Node Problem Issue : Occurs when two devices cannot sense each other’s transmission because they are out of range, leading to potential collisions at the receiver. Solution: RTS/CTS: Helps mitigate this by reserving the medium before the actual data transmission.
3. Exposed Node Problem Issue : Happens when a device refrains from transmitting to avoid a collision with another device that is transmitting to a different receiver, even though it could have transmitted successfully. Solution: Adjusting transmission power and using directional antennas can help, but it remains a challenging problem without a perfect solution.
4. Throughput Efficiency Issue : Efficiency is affected by overhead from control frames, acknowledgments, and collision management mechanisms. Optimization: Frame Aggregation: Combining multiple frames into one transmission to reduce overhead. Block Acknowledgment: Acknowledging multiple frames with a single acknowledgment frame to improve efficiency.
5. Quality of Service ( QoS ) Issue : Ensuring timely delivery of data, especially for applications requiring low latency and high reliability (e.g., VoIP, video streaming). Mechanisms: Traffic Prioritization: Differentiating between types of traffic and giving higher priority to time-sensitive data. Enhanced Distributed Channel Access (EDCA): A QoS mechanism in IEEE 802.11e that provides differentiated access to the medium based on traffic categories.
6. Power Management Issue : Devices, especially battery-powered ones, need to manage their power consumption to extend battery life. Techniques: Power Save Mode: Devices can enter low power states when not actively transmitting or receiving. Adaptive Power Control: Dynamically adjusting transmission power based on the distance to the receiver and current network conditions.
7. Security Issue : Protecting data from unauthorized access and ensuring integrity and confidentiality in wireless transmissions. Solutions: Encryption: Using protocols like WPA2/WPA3 to encrypt data. Authentication: Ensuring only authorized devices can join the network.
8. Mobility Management Issue : Managing device movement within the network, maintaining connections as devices move between different APs. Techniques: Handoff/ Roaming: Seamlessly transferring a connection from one AP to another. Fast Transition (FT): An IEEE 802.11r feature that reduces handoff times for mobile clients.
9. Scalability Issue : Ensuring the network can handle a large number of devices and high traffic volumes without performance degradation. Approaches: Load Balancing: Distributing the load evenly across multiple APs. Channel Management: Dynamically adjusting channel assignments to minimize interference and optimize performance.
IEEE 802.11 IEEE 802.11 refers to a set of standards developed by the Institute of Electrical and Electronics Engineers (IEEE) for wireless local area networks (WLANs). These standards define the protocols for implementing wireless networking communication in various frequencies, including 2.4 GHz, 5 GHz, and 6 GHz bands. The most well-known of these standards is Wi-Fi, which allows devices to connect to the internet wirelessly .
Here are some key points about IEEE 802.11: IEEE 802.11b : Released in 1999, it operates in the 2.4 GHz band and provides a maximum data rate of 11 Mbps. IEEE 802.11a : Also released in 1999, it operates in the 5 GHz band and provides a maximum data rate of 54 Mbps. IEEE 802.11g : Released in 2003, it operates in the 2.4 GHz band and provides a maximum data rate of 54 Mbps .
BlueTooth , Wireless multiple access protocols, Wireless applications Bluetooth is a wireless technology standard used for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs). It was designed as a low-power, low-cost, and short-range wireless communication method.
Key Points: Range : Typically up to 100 meters, but most commonly used within 10 meters. Frequency : Operates in the 2.4 GHz ISM band. Data Rate : Standard Bluetooth supports data rates up to 3 Mbps; newer versions (Bluetooth 5 and beyond) offer higher speeds and longer range. Applications : Used for connecting peripherals like headphones, keyboards, mice, smartphones, and wearable devices.
Wireless multiple access protocols Wireless Multiple Access Protocols Wireless multiple access protocols are methods that allow multiple users or devices to share the same communication medium without interference. Some common protocols include: Frequency Division Multiple Access (FDMA) : Allocates individual frequency bands to each user. Each user has exclusive access to their assigned frequency. Time Division Multiple Access (TDMA) : Divides time into slots and allocates each slot to a different user. Users transmit in rapid succession, one after the other.
Cont ….. Code Division Multiple Access (CDMA): Uses unique codes to distinguish between different users.All users share the same frequency and time but are separated by unique spreading codes . Orthogonal Frequency Division Multiple Access (OFDMA): An extension of FDMA.Divides the frequency band into multiple subcarriers and allocates subsets of these subcarriers to different users.Used in LTE and Wi-Fi 6 . Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) : Used in Wi-Fi networks (IEEE 802.11). Devices sense the medium before transmitting and use collision avoidance techniques to minimize data collisions.
Wireless Applications Wireless technology has numerous applications across various fields, including: Personal and Home Use : Wi-Fi : Wireless internet connectivity for devices such as laptops, smartphones, and smart home devices. Bluetooth : Connecting personal devices like headphones, fitness trackers, and smartwatches. Industrial and Commercial Use : Wireless Sensor Networks (WSNs) : Monitoring and controlling industrial processes, environmental conditions, and security systems. RFID (Radio Frequency Identification) : Inventory management, asset tracking, and access control.
Cont …. Healthcare : Wearable Devices : Monitoring patient vitals, fitness tracking, and remote health monitoring. Telemedicine : Remote consultations and diagnostics using wireless communication. Public Services : Smart Cities : Integrating wireless technology for smart lighting, waste management, and traffic control. Emergency Services : Wireless communication for first responders and disaster management.
data broadcasting, Mobile IP-entities and terminology Data broadcasting refers to the transmission of data to multiple recipients simultaneously. It is a method used to distribute data widely and efficiently to a large audience. Common uses of data broadcasting include television and radio broadcasting, as well as digital data dissemination over networks. Key Concepts: Broadcast Medium : Data can be broadcast over various mediums such as satellite, cable, terrestrial radio waves, and the internet. One-to-Many Communication : Unlike unicast (one-to-one) or multicast (one-to-many but with a specific group), broadcasting sends data to all possible receivers in the network or area. Applications : Digital TV, radio, software updates, news, weather alerts, financial data, and emergency notifications.
Mobile IP Mobile IP is a protocol that allows mobile devices to move across different networks while maintaining a permanent IP address. This enables continuous internet connectivity without changing the IP address as the device moves. Entities and Terminology in Mobile IP Mobile Node (MN) : A device that can change its point of attachment to the internet while maintaining constant IP connectivity (e.g., smartphones, tablets, laptops). Home Agent (HA) : A router on the home network of the mobile node. Maintains the current location information (care-of address) of the mobile node. Forwards packets to the mobile node when it is away from home.
Cont ….. Foreign Agent (FA) : A router on the visited network that provides routing services to the mobile node when it is away from its home network. Assigns a care-of address to the mobile node. Care-of Address (CoA) : A temporary IP address assigned to the mobile node by the foreign agent when it is visiting a foreign network. Used by the home agent to forward packets to the mobile node . Correspondent Node (CN ): Any device that communicates with the mobile node , typically without knowing the mobile node's current location.
Terminology: Tunneling : The process by which packets are encapsulated and forwarded from the home agent to the mobile node's care-of address. Ensures that the mobile node can receive data while away from its home network. Binding : The association of the mobile node's home address with its care-of address. Maintained by the home agent to forward data correctly.
Cont ….. Agent Advertisement : Messages broadcast by home and foreign agents to advertise their presence and services. Mobile nodes use these advertisements to determine their location and to register with foreign agents. Registration : The process by which a mobile node informs its home agent of its care-of address. Ensures that the home agent can forward packets to the mobile node's current location.
IP Packet delivery, Agent discovery, Registration IP Packet Delivery IP packet delivery in a Mobile IP environment involves ensuring that packets reach a mobile node regardless of its current location. This process includes several key steps: Packet Forwarding : When a correspondent node (CN) sends an IP packet to the mobile node (MN), it uses the MN's home address as the destination. The packet is routed to the home network, where the home agent (HA) resides.
Cont …. Tunneling : The home agent intercepts the packet intended for the mobile node. The home agent encapsulates the original packet within a new IP packet, using the mobile node's care-of address (CoA) as the new destination. This process is known as tunneling .
Cont …. Decapsulation and Delivery :The encapsulated packet is routed to the foreign agent (FA) on the foreign network where the mobile node currently resides.The foreign agent decapsulates the packet, extracting the original IP packet.The foreign agent then delivers the original packet to the mobile node . Reverse Path : When the mobile node sends a packet to the correspondent node, it typically sends it directly to the CN without involving the home agent. This is often referred to as triangular routing.
Agent Discovery Agent discovery is the process by which a mobile node determines whether it is on its home network or a foreign network and discovers the presence of home or foreign agents. This involves two main methods: Agent Advertisement : Home and foreign agents periodically broadcast agent advertisement messages. These messages are typically ICMP Router Advertisement messages with additional Mobile IP extensions. The advertisement includes information about the agent, such as the type (home or foreign), care-of address, and supported services.
Cont …. Agent Solicitation : If a mobile node does not receive an agent advertisement within a certain period, it can send an agent solicitation message. This is an ICMP Router Solicitation message with a Mobile IP extension. Agents that receive this solicitation respond with an agent advertisement, allowing the mobile node to discover available agents.
Registration Registration is the process by which a mobile node informs its home agent of its current care-of address. This ensures that the home agent can correctly forward packets to the mobile node. The registration process involves the following steps: Registration Request : The mobile node sends a registration request to the foreign agent if it is on a foreign network. The foreign agent forwards this request to the home agent. The registration request includes the mobile node's home address, care-of address, requested lifetime, and identification information for authentication.
Cont …. Processing the Request : The home agent verifies the registration request, checking the authenticity and validity of the information. If the request is valid, the home agent updates its binding table with the mobile node's new care-of address and the registration lifetime.
Cont …. Registration Reply : The home agent sends a registration reply back to the foreign agent. The foreign agent forwards the reply to the mobile node. The registration reply indicates whether the registration was successful or if there were errors.
Cont ….. Re-Registration : The mobile node must periodically re-register with its home agent before the registration lifetime expires. This ensures the home agent maintains an up-to-date binding of the mobile node's location. By using these processes, Mobile IP allows a mobile node to maintain continuous internet connectivity and communication while moving across different networks.
Tunneling and encapsulation, optimization and reverse tunneling A technique of inter-networking called Tunneling is used when source and destination networks of the same type are to be connected through a network of different types. Tunneling uses a layered protocol model such as those of the OSI or TCP/IP protocol suite. So, in other words, when data moves from host A to B it covers all the different levels of the specified protocol (OSI, TCP/IP, etc.) while moving between different levels, data conversion (Encapsulation) to suit different interfaces of the particular layer is called tunneling .
Encapsulation Encapsulation in the context of tunneling refers to the process of enclosing one type of data packet inside another. This is typically done to facilitate data transfer over a network that might not support the original packet format or to enhance security. For example, in mobile computing, tunneling is used in Virtual Private Networks (VPNs) to encapsulate private data packets within a public network, providing secure communication over potentially insecure networks.
Optimization Optimization in mobile computing refers to techniques and strategies used to improve the efficiency and performance of data transmission and network usage. This can include: Data Compression : Reducing the size of data packets to minimize transmission time and bandwidth usage. Caching : Storing frequently accessed data locally to reduce the need for repeated data transmission. Load Balancing : Distributing network traffic evenly across multiple servers or connections to avoid congestion and ensure efficient resource use. Power Management : Implementing strategies to reduce battery consumption while maintaining optimal performance, which is crucial for mobile devices.
Reverse Tunneling Reverse Tunneling is a technique where data from a mobile node is tunneled back to a home agent before reaching its destination. This is often used to ensure that all data appears to come from a specific IP address, typically for security or management purposes. In traditional tunneling , data packets are sent directly from the mobile node to the destination. However , in reverse tunneling , the data packets first go through a home agent, which forwards them to the final destination. This can help maintain consistent IP address usage and comply with network security policies.
WAP: Architecture, protocol stack, application environment, applications. Wireless Application Protocol (WAP) is a suite of protocols designed to enable mobile devices to access information and services on the internet. Here's an overview of its architecture, protocol stack, application environment, and applications: Architecture The WAP architecture is designed to provide a scalable and flexible environment for delivering internet content and services to mobile devices. The key components include: Mobile Device : The client device, such as a mobile phone or PDA, which runs a WAP browser. WAP Gateway : A server that acts as an intermediary between the mobile device and the internet. It translates WAP requests into HTTP requests and vice versa. Web Server : Hosts the WAP content, typically written in WML (Wireless Markup Language), and responds to HTTP requests from the WAP gateway.
Protocol Stack The WAP protocol stack is analogous to the OSI model and consists of several layers: Application Layer : Includes WML, WMLScript , and WTAI (Wireless Telephony Application Interface). Session Layer : WSP (Wireless Session Protocol) provides session management for maintaining a connection between the client and server. Transaction Layer : WTP (Wireless Transaction Protocol) ensures reliable message delivery. Security Layer : WTLS (Wireless Transport Layer Security) provides security features like data integrity, privacy, and authentication. Transport Layer : WDP (Wireless Datagram Protocol) ensures data transport across different wireless networks. Bearer Layer : Uses existing wireless network protocols (e.g., GSM, CDMA) to transmit data.
Application Environment The WAP application environment is built on WAE (Wireless Application Environment), which provides a framework for developing applications and content. Key components include: WML (Wireless Markup Language) : A markup language similar to HTML but optimized for mobile devices. It is used to create pages that can be displayed in a WAP browser. WMLScript : A scripting language similar to JavaScript, used for client-side scripting in WAP applications. WTA (Wireless Telephony Application) : Provides APIs for telephony services, allowing WAP applications to interact with the mobile device's phone functionalities.
Applications WAP enables various applications and services for mobile users, including: Mobile Banking : Accessing banking services and performing transactions via mobile devices. Mobile Commerce (m-commerce) : Shopping and purchasing goods and services using a mobile device. Email and Messaging : Sending and receiving emails, SMS, and instant messages. News and Information Services : Accessing news, weather updates, stock quotes, and other information. Entertainment : Downloading ringtones, wallpapers, games, and streaming music or video. Location-Based Services : Accessing maps, navigation, and location-specific information. Corporate Applications : Accessing intranet services, corporate email, and other enterprise applications.