Professional Documents
Culture Documents
Answer Key
Introduction
Question & Answers
1/31/2012
Questions
3
Define Mobile Computing, its applications and limitations Define - Mobile Computing, Mobile Communications, Passive Computing, Ubiquitous networks, Mobile applications Define Spread Spectrum. Differentiate FHSS and DSSS Write short notes on DSSS and FHSS What is spread spectrum. Explain FHSS with a neat diagram. What is spread spectrum. Explain Direct Sequence Spread Spectrum with a neat diagram. Define multiplexing. Explain in detail the various methods of multiplexing available with neat diagram What is modulation? Explain the various methods available for digital modulation with neat diagrams. Explain the use of all the layers using the Simplified Reference Model of Communication Systems with a neat diagram.
1/31/2012
Definitions 1/1
4
Mobile Computing is an umbrella term used to describe technologies that enable people to access network services at any place, anytime, and anywhere. Mobile Communication Pervasive Computing - Pervasive means existing in all parts of a place or thing. The next generation of computing which takes into account the environment in which information and communication technology is used everywhere by everyone and at all times. Ubiquitous networks - A term that describes integration of computers into practically all objects in our everyday environment, endowing them with computing abilities Mobile applications 1/31/2012
Emergency services
Flood Earthquake
For Estate Agents In courts In companies Stock Information Collection/Control Credit Card Verification Taxi/Truck Dispatch Electronic Mail/Paging
1/31/2012
Interference: Radio transmission cannot be protected against interference using shielding as this is done in coaxial cable or shielded twisted pair. Regulations and spectrum: Frequencies have to be coordinated, and unfortunately, only a very limited amount of frequencies are available Low bandwidth: Although they are continuously increasing, transmission rates are still very low for wireless devices compared to desktop systems. Local wireless systems reach some Mbit/s while wide area systems only offer some 10 kbit/s.
1/31/2012
High delays, large delay variation: A serious problem for communication protocols used in todays Internet (TCP/IP) is the big variation in link characteristics. In wireless systems, delays of several seconds can occur, and links can be very asymmetrical (i.e., the links offer different service quality depending on the direction to and from the wireless device). Applications must be tolerant and use robust protocols. Lower security, simpler to attack: Not only can portable devices be stolen more easily, but the radio interface is also prone to the dangers of eavesdropping. Wireless access must always include encryption, authentication, and other security mechanisms that must be efficient and simple to use.
1/31/2012
Shared medium: Radio access is always realized via a shared medium. Ad-hoc networking: Wireless and mobile computing allows for spontaneous networking with prior set-up of an infrastructure. However, this raises many new questions for research: routing on the networking and application layer, service discovery, network scalability, reliability, and stability etc.
Device
Fit more functionality into single, smaller device. Need power and energy efficient
1/31/2012
Spread Spectrum is a means of transmission in which the data sequence occupies a bandwidth in excess of the minimum bandwidth necessary to send it.
Effectively the signal is mapped to a higher dimension signal space The signal component in each direction is sqrt(E/N)
Signal spreading is done before transmission by using a spreading sequence. The same sequence is used at the receiver to retrieve the signal Spread Spectrum is most effective against interference (intentional or non-intentional) with fixed energy. Main commercial applications in wireless and GPS.
1/31/2012
Pros
Including jamming Only receiver who knows spreading code can retrieve signal
Can hide/encrypt signals Several users can share same higher bandwidth with little interference
Cellular telephones Code division multiplexing (CDM) Code division multiple access (CDMA)
Cons
1/31/2012
FHSS spreads the signal by hopping from one frequency to another across a bandwidth of 83 Mhz. DSSS spreads the signal by adding redundant bits to the signal prior to transmission which spreads the signal across 22 Mhz. The process of adding redundant information to the signal is called Processing Gain . The redundant information bits are called Pseudorandom Numbers (PN).
1/31/2012
DSSS 2/2
14
The PN is also called a Chipping Code (eg., the Barker chipping code) chipping code are called chips - the result- which is then transmitted.
The bits resulting from combining the information bits with the
The higher processing gain (more chips) increases the signal's resistance to interference by spreading it across a greater number of frequencies. IEEE has set their minimum processing gain to 11. The number of chips in the chipping code equates to the signal spreading ratio. Doubling the chipping speed doubles the signal spread and the required bandwidth.
1/31/2012
1/31/2012
The FCC regulated that DSSS use a maximum of 1 watt of transmitter power in Pt-to-Multipoint system.
DSSS costs less then FHSS FHSS can have more systems co-located than DSSS.
DSSS systems have the advantage in throughput
DSSS generally has a throughput of 5-6 Mbps while FHSS is generally between 1-2 Mbps. Both FHSS and DHSS are equally insecure. DSSS has gained much wider acceptance due to its low cost, high speed and interoperability. This market acceptance is expected to accelerate.
FHSS advancement includes HomeRF and 802.15 (WPAN) (Bluetooth), however, it is expected to not advance into the enterprise.
1/31/2012
Multiplexing
18
Multiplexing describes how several users can share a medium with minimum or no interference. For wireless communication, multiplexing can be carried out in four dimensions: space, time, frequency, and code. In this field, the task of multiplexing is to assign space, time, frequency, and code to each communication channel with a minimum of interference and a maximum of medium utilization.
1/31/2012
(FDM) describes schemes to subdivide the frequency dimension into several non-overlapping frequency bands
Separation
of the whole spectrum into smaller frequency bands A channel gets a certain band of the spectrum for the whole time
1/31/2012
A more flexible multiplexing scheme for typical mobile communications is time division multiplexing (TDM). Here a channel is given the whole bandwidth for a certain amount of time, i.e., all senders use the same frequency but at different points in time. Again, guard spaces, which now represent time gaps, have to separate the different periods when the senders use the medium.
1/31/2012
All channels use the same frequency at the same time for transmission. Separation is now achieved by assigning each channel its own code, guard spaces are realized by using codes with the necessary distance in code space, e.g., orthogonal codes. Implemented using spread spectrum technology Advantages:
The main advantage of CDM for wireless transmission is that it gives good protection against interference and tapping. Different codes have to be assigned, but code space is huge compared to the frequency space. Assigning individual codes to each sender does not usually cause problems. Bandwidth efficient No coordination and synchronization necessary Good protection against interference and tapping The main disadvantage of this scheme is the relatively high complexity of the receiver. A receiver has to know the code and must separate the channel with user data from the background noise composed of other signals and environmental noise. Additionally, a receiver must be precisely synchronized with the transmitter to apply the decoding correctly. To apply CDM, precise power control is required Lower user data rates
Disadvantage
1/31/2012
Modulation
22
digital modulation, - digital data (0 and 1) is translated into an analog signal (baseband signal). Digital modulation is required if digital data has to be transmitted over a medium that only allows for analog transmission.
amplitude
shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK
1/31/2012
Amplitude shift keying (ASK), is the most simple digital modulation scheme. The two binary values, 1 and 0, are represented by two different amplitudes. In the example, one of the amplitudes is 0 (representing the binary 0). This simple scheme only requires low bandwidth, but is very susceptible to interference. Effects like multi-path propagation, noise, or path loss heavily influence the amplitude. In a wireless environment, constant amplitude cannot be guaranteed, so ASK is typically not used for wireless radio transmission. The wired transmission scheme with the highest performance, namely optical transmission, uses ASK. Here, a light pulse may represent a 1, while the absence of light represents a 0.
1/31/2012
A modulation scheme often used for wireless transmission is frequency shift keying (FSK) (see Figure 2.24). The simplest form of FSK, also called binary FSK (BFSK), assigns one frequency f1 to the binary 1 and another frequency f2 to the binary 0.
1/31/2012
Finally, phase shift keying (PSK) uses shifts in the phase of a signal to represent data. Figure 2.25 shows a phase shift of 180 or as the 0 follows the 1 (the same happens as the 1 follows the 0). This simple scheme, shifting the phase by 180 each time the value of data changes, is also called binary PSK (BPSK).
1/31/2012
26
1/31/2012
What is hidden terminal and exposed terminal problems? How are they handled in wireless networks? Why MAC protocol does not implement CSMA/CD? How the hidden terminal and fading problems are taken care? Explain the characteristics of Medium Access Control protocols. Explain ALOHA, PRMA, MACA, CSMA / CA, Polling Explain the following CSMA, MACA, DAMA, PRMA Define Pure ALOHA, Slotted ALOHA, CSMA/CD, CSMA/CA and MACA What is MACA? Explain in detail with a neat diagram. Explain in detail Multiple Access with Collision Avoidance with a neat diagram. What is Channel Allocation? Explain with suitable diagram Fixed Channel Allocation. What is multiple accesses? Define the group access, random access, controlled access and channelization Define Channelization, TDMA, FDMA and CDMA
1/31/2012
A and C cant see each other, both send to B RTS/CTS can help
Both
A and C would send RTS that B would see first B only responds with one CTS (say, echoing As RTS) C detects that CTS doesnt match and wont send
1/31/2012
B sending to A, C wants to send to D As C receives Bs packets, carrier sense would prevent it from sending to D, even though wouldnt interfere RTS/CTS can help
C
hears RTS from B, but not CTS from A C knows its transmission will not interfere with A 1/31/2012 C is safe to transmit to D
30
GSM
Questions & Answers
1/31/2012
GSM
31
Draw the GSM architecture and explain each block in detail. / In detail explain the functional architecture of a GSM system with a neat diagram./Explain functional architecture of a GSM system with a neat diagram. With a suitable diagram explain the role of GSM components BSC, MSC for mobile communications. Explain the cellular system and write about one cellular standard. Explain the concept of handover mechanisms in GSM in detail. / Handovers in GSM Systems Discuss the various types available with neat diagram./What is handover? Explain the various types of handover available with neat diagram. Explain the basic security services available in GSM systems using A3, A5, A8 algorithms with neat diagrams. Explain security of GSM in detail.
1/31/2012
Handover
32
If the mobile moves, the radio connection may be reestablished with a different base station without any interruption to user communication this is called handover There are two basic reasons for a handover
The
mobile station moves out of the range of a BTS load balancing by BSC or MSC
1/31/2012
4 types of handover
33
1 MS
2 MS
3 MS
4 MS
BTS
BTS BSC
1/31/2012
Intra-cell handover:
Within a cell, narrow-band interference could make transmission at a certain frequency impossible. The BSC could then decide to change the carrier frequency (scenario 1). This is a typical handover scenario. The mobile station moves from one cell to another, but stays within the control of the same BSC. The BSC then performs a handover, assigns a new radio channel in the new cell and releases the old one (scenario 2). As a BSC only controls a limited number of cells; GSM also has to perform handovers between cells controlled by different BSCs. This handover then has to be controlled by the MSC (scenario 3). A handover could be required between two cells belonging to different MSCs. Now both MSCs perform the handover together (scenario 4).
1/31/2012
MSC
BSCnew
BTSnew
HO command
HO command
HO command
HO request ack
HO access
Link establishment clear command clear complete clear command clear complete 1/31/2012 HO complete HO complete
access control/authentication
user SIM (Subscriber Identity Module): secret PIN (personal identification number) SIM network: challenge response method voice and signaling encrypted on the wireless link (after successful authentication) temporary identity TMSI (Temporary Mobile Subscriber Identity) newly assigned at each new location update (LUP) encrypted transmission
confidentiality
anonymity
A3 for authentication (secret, open A5 for encryption (standardized) A8 for key generation (secret, open interface)
secret: A3 and A8 available via the Internet interface) network providers can use stronger mechanisms 1/31/2012
GSM - authentication
37
mobile network Ki AC 128 bit A3 SRES* 32 bit SRES 32 bit SRES RAND 128 bit RAND
MSC
SRES* =? SRES
SRES
mobile network (BTS) Ki AC 128 bit A8 cipher key BTS Kc 64 bit data A5 encrypted data RAND 128 bit RAND
1/31/2012
39
Wireless LAN
Questions & Answers
1/31/2012
Questions
40
What are the advantages and disadvantages of WLAN / Discuss at least two WLAN vulnerabilities Explain Bluetooth protocol in detail. \Write short note on Bluetooth protocol Write short note on security in Bluetooth. Compare and Contrast wired LANs with Wireless LANs Explain the location management requirements transparency of mobility, Security, Efficiency and Scalability and Identification. What is handoff? Explain with a suitable diagram HIPERLAN-2 reference model Explain with proper diagram Intra-EMAS-E/Intra-AP forward handover.
1/31/2012
Advantages
very flexible within the reception area Ad-hoc networks without previous planning possible (almost) no wiring difficulties (e.g. historic buildings, firewalls) more robust against disasters like, e.g., earthquakes, fire - or users pulling a plug... typically very low bandwidth compared to wired networks (1-10 Mbit/s) many proprietary solutions, especially for higher bit-rates, standards take their time (e.g. IEEE 802.11) products have to follow many national restrictions if working wireless, it takes a vary long time to establish global solutions like, e.g., IMT-2000
Disadvantages
1/31/2012
7.1.1
Short Range RF at 2.45 GHZ called ISM Uses Quick Frequency Hoping Packet Switched Protocol Transceiver has a unique 48 Bit Address Using IEEE 802 Standard Piconet Network Structure Ad-Hoc networking of up to 8 devices form a piconet. Each piconets master sets the FH behaviour. Up to 10 piconets can form a scatternet
1/31/2012
1/31/2012
More than one Piconet is a Scatternet Up to Eight Devices Allowed in a Piconet Each Piconet is Identified by a Different Frequency Hopping Sequence Connections can be made up to 10 meters or extended up to 100 meters Power Consumption is .3mA Supports Half-Duplex or Full-Duplex Time Division Duplex Scheme is used fo Full-Duplex
1/31/2012
1/31/2012
45
L2CAP The Logical Link Control and Adaptation Protocol layer allows multiple channels to share a single Bluetooth link. It also handles segmentation and assembly of long messages, group management and quality of service functionalities.
1/31/2012
46
1/31/2012
47
Bluetooth audio Bluetooth printing Data access profiles (incl. TCP/IP over Bluetooth) Information transfer profiles (calendar, contacts sync.) Human Interface device profiles (mouse, keyboard,)
Overall, this is a lot of code! But many Bluetooth stack implementations exist, including open source stacks. E.g. BlueZ for Linux and Smart-Its for Atmel AVR chips.
1/31/2012
48
Bluetooth Security
49
Every bluetooth device has 4 entities for maintaining Security Bluetooth device address
48-bit address that is unique for each Bluetooth device and defined by IEEE 128-bit random number used for authentication purposes 8-128 bits in length that is used for encryption frequently changing 128-bit random or pseudo-random number that is made by the Bluetooth device itself
1/31/2012
Random number
1/31/2012
51
Advantages of Wireless
Advantages of Wired
Easier to make changes to the network. Dont have to lay cables. Wireless LAN allows users to move around the covered area. A Wireless LAN can be relocated.
A wired LAN is more secure Wires can cover longer distances than wireless transmissions.
1/31/2012
Contrast
802.3 (Ethernet) uses CSMA/CD, Carrier Sense Multiple Access with 100% Collision Detect for reliable data transfer 802.11 has CSMA/CA (Collision Avoidance)
Contrast They use specialized physical and data link protocols They integrate into existing networks through access points which provide a bridging function They let you stay connected as you roam from one coverage area to another They have unique security considerations They have specific interoperability requirements They require different hardware They offer performance that differs from wired LANs.
1/31/2012
Transmitters fail to get a response Receivers see corrupted data through a CRC error
53
Best-effort service model remains unchanged TCP and UDP can (and do) run over wireless, mobile
TCP treats packet loss as a sign of congestion TCP tries to estimate the RTT to drive retransmissions TCP does not perform well under out-of-order packets
1/31/2012
Wireless ATM
54
Mobility extensions are added in the fixed ATM network. To support user mobility for a wireless network new mechanisms are needed and are fundamental, such as handover, routing, and location management. An important key feature is mobile QoS offered by the WATM as opposed with that of other technologies.
1/31/2012
New developments of wireless networks are needed to enable wireless technologies to interwork with existing wired networks.
In
order for ATM to be successful, it must offer a wireless extension, otherwise it cannot participate in the rapidly growing field of mobile communications.
802.11 only covers local area access methods. Bluetooth only builds up piconets. Mobile IP only works on the network layer.
1/31/2012
Handover
56
Procedure to hand over connection(s) from a mobile ATM terminal from one access point to another access point Support of an handover domain
several access points cover a certain area common handover protocol and strategy all access points and switches belong to one administrative domain multiple connection handover point-to-point and point-to-multipoint QoS support
Requirements
data integrity and security signaling and routing support high performance and low complexity
1/31/2012 8.27.1
Handover classes
57
Handover Classes
Hard handover: A wireless mobile terminal has a radio connection with only one AP at any time. Soft handover: Supports simultaneous communication of a wireless mobile terminal with more than one AP during the handover. Backward handover: The wireless mobile terminal notices, for example, a fading signal and initialises the handover to a new AP. The terminal continues to maintain the radio link while the handover is in process and switches over to a new AP after radio resources have been reserved and all entities involved are prepared for the handover. Hence the handover execution can be initiated via the old AP. Forward handover: Characterized by a wireless mobile terminal arriving at a new AP suddenly.
The handover can only be initiated after the terminal has associated itself with the new AP. In this case, the new AP has to initiate and control the handover from there after. This happens when the terminal suddenly loses its connection to the old AP (due to interference or a fast-moving terminal), so there is no time to perform a backward 1/31/2012 handover.
Handover scenarios
58
EMAS-N COS
RT5
RT6
AP3
1/31/2012
FW handover - Intra-EMAS-E/Intra-AP
59
WMT
AP
EMAS-E
1/31/2012
8.35.1
HyperLAN 2 Introduction
60
HiperLAN Family
Description Freq. Range PHY Bit Rate Hiperlan 1 Wireless Ethernet 5GHz 23.5Mbps Hiperlan2 HiperAccess HiperLink Wireless ATM Wireless Local Wireless PointLoop to-Point 5GHz 5GHz 17GHz 6~54Mbps ~25Mbps ~155Mbps
Features
5 GHz technology, up to 54 Mbit/s Generic architecture supporting: Ethernet, IEEE 1394, ATM, 3G etc Connection-oriented with QoS per conn. Security - authentication & encryption Plug-and-play radio network using DFS Optimal throughput scheme
1/31/2012
User Plane
EC
RLC MAC
PHY
The lowest layer, the physical layer, handles as usual all functions related to modulation, forward error correction, signal detection, synchronization etc. The data link control (DLC) layer contains the MAC functions, the RLC sublayer and error control functions Above the MAC DLC is divided into a control and a user part. This separation is common in classical connection-oriented systems such as cellular phones or PSTN. The user part contains error control mechanisms. The radio link control (RLC) sublayer comprises most control functions in the DLC layer
The association control function (ACF) controls association and authentication of new MTs as well as synchronization of the radio cell via beacons
The DLC user connection control (DCC or DUCC) service controls connection setup, modification, and release. Finally, the radio resource control (RRC) handles handover between APs and within an AP On top of the DLC layer there is the convergence layer. This highest layer of HiperLAN2 standardization may comprise segmentation and reassembly functions and adaptations to fixed LANs, 3G networks etc
1/31/2012
Requirement
Transparency Security Efficiency
and Mobility
65
1/31/2012
Questions
66
Mobile IP.
Explain the functions of agents in mobile IP in OSI network layer. Explain tunneling and reverse tunneling concept of Mobile IP. Explain how agent discovery and registration is done during IP packet delivery in mobile IPs with neat diagrams / Explain the following basic functions in Mobile IP Agent Discovery and Registration
What are mobile agents and their applications and uses in mobile computing. / Briefly explain how mobile agents can be used for mobile clients (What support can a mobile agent give for mobile clients.) Explain with suitable diagram how the IP packet delivery is done in a wireless network. What is dynamic host configuration protocol? Explain its functions.
1/31/2012
Mobile IP
67
The goal of a mobile IP can be summarized as: supporting end-system mobility while maintaining scalability, efficiency, and compatibility in all respects with existing applications and Internet protocols.
1/31/2012
that moves across networks without changing its IP address with which MN is corresponding (TCP)
in the home network of the MN, typically a router registers the location of the MN, tunnels IP packets to the COA
1/31/2012
Terminology (contd.)
.69
in the current foreign network of the MN, typically a router forwards tunneled packets to the MN, typically the default router for MN
Mobility: Vocabulary
.70
home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote
Permanent address: address in home network, can always be used to reach mobile
e.g., 128.119.40.186
Correspondent node:
Foreign agent: entity in visited network that performs mobility functions on behalf of mobile.
Source: Jim Kuroses slides
1/31/2012 Network Layer 4-71
IP Packet Delivery
72
1/31/2012
visited network
home network
2 correspondent requests, receives foreign address of mobile 1
wide area network
overcome triangle routing problem non-transparent to correspondent: correspondent must get care-of-address from home agent
Mobile IP
.75
router address
type = 16
length
registration lifetime
0 or more care-ofaddresses
1/31/2012 Source: Jim Kuroses slides
Agent Advertisement
.77
HA/FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in home/foreign network MN reads a COA from the FA advertisement messages
1/31/2012
registration reply
HA: 128.119.40.7 MA: 128.119.40.186 Lifetime: 4999 Identification: 714 .
MN Registration
.79
MN signals COA to the HA via the FA HA acknowledges via FA to MN limited lifetime, need to be secured by authentication
1/31/2012
1/31/2012
Tunneling
Home agent tunnels (encapsulates) packets to care-of address Tunnel source is the home agents address Tunnel destination is the care-of address IP within IP (other ways exist):
1/31/2012
81
MN sends packet to FA
home network
wide area network
1 2
1/31/2012
Reverse tunneling
.84
with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) optimization of data paths, i.e. packets will be forwarded through the tunnel via the HA to a sender (double triangular routing)
1/31/2012
Evolution Of DHCPv6
To boot the machines in a LAN, needs lot of network parameters to be configured in each machine. In order to avoid this manual process, all the network parameters are put in a server and when a machine in LAN is booting, it will contact the server for the configuration parameters. This is called BOOTP server. Later it is extended to DHCP with additional features. Generally called DHCP
1/31/2012
85
Dhcpv6 Concepts
86
What is DHCPv6 ?
The Dynamic Host Configuration Protocol for IPv6 (DHCP) enables DHCP servers to pass configuration parameters such as IPv6 network addresses to IPv6 nodes. DHCPv6 protocol Released in RFC 3315 This protocol is a stateful counterpart to "IPv6 Stateless Address Autoconfiguration" (RFC 2462). Used separately or concurrently with the latter to obtain configuration parameters.
1/31/2012
DHCP Working
87
DHCP is based on a client/server model as shown in Figure 8.17. DHCP clients send a request to a server (DHCPDISCOVER in the example) to which the server responds. A client sends requests using MAC broadcasts to reach all devices in the LAN. A DHCP relay might be needed to forward requests across inter-working units to a DHCP server.
1/31/2012
1/31/2012
89
1/31/2012
Questions
90
Explain two features namely flow control and congestion control. Explain why traditional TCP features are failures in wireless network. Explain Indirect TCP with Mobile TCP How traditional TCP function with reference to sliding window concept. Describe snooping TCP. How it differs from indirect TCP? What are the advantages and disadvantages of each one? / Explain indirect TCP and Snooping TCP with neat diagrams.
1/31/2012
Traditional TCP
91
Congestion control
Slow
Sender calculates a congestion window for a receiver Exponential growth of the congestion window stops at congestion threshold Further increase is linear
Flow control
Sliding
window
1/31/2012
Standard TCP reacts with slow start if ACK are missing It is common for mobile network to miss the packets This results in degradation of performance.
1/31/2012
1/31/2012
94
Data Broadcasting
Questions & Answers
1/31/2012
Questions
95
What is communication asymmetry? Explain with suitable example. Discuss the different broadcast models. List its advantages and disadvantages. Discuss Dissemination based Data Delivery Using Broadcast Disks Explain unidirectional broadcast systems with reference to audio broadcast. Explain in detail Digital Video broadcasting with a neat diagram. Explain in detail the Digital Audio broadcasting with a neat diagram
1/31/2012
Point-to-point access: A logical channel is established between the client and the server. Broadcast: Data are sent simultaneously to all users in the broadcast area. It is up to the client to select the data it wants. Why broadcast?
Broadcast satisfies arbitrary number of users: A single broadcast of a data item can satisfy all the outstanding requests for that item at the same time. Broadcast satisfies the wireless environment: Mobile wireless environments are characterized by asymmetric communication. Data broadcast can take advantage of the large downlink capacity when delivering data to clients. Implemented without any additional cost: A wireless communication system essentially employs a broadcast component to deliver information. e.g. Server sends broadcast
information to find the cell-phone user.
1/31/2012
Broadcast system
97
news feeds and traffic information systems cable TV with set-top box
Communications Asymmetry
98
Network asymmetry
In many cases, downlink bandwidth far exceeds uplink bandwidth Large client population, few servers Small requests for info, large responses Again, downlink bandwidth more important Updates likely affect a number of clients
Client-to-server ratio
Data volume
Update-oriented communication
1/31/2012
Question 1: What are the three types of broadcast models? Answer: Push based broadcast; On-demand (or pull based) broadcast; Hybrid broadcast. Question 2: Scheduling and indexing techniques are very important in wireless broadcast system, why? Answer: In wireless data system, access efficiency and power conservation are two critical issues. Scheduling technique provides more access efficiency, which concerns how fast a request is satisfied. Indexing technique helps reduce a mobile clients power consumption when it is accessing the data it wants.
1/31/2012
Push-based broadcast:
The users cannot place requests directly to the server. The broadcast schedule should be determined based solely on the access probabilities.
The push-based model has already played an important role in our daily lives (e.g., the television programs) but, scheduling problem
Hybrid broadcast:
A combination of Push-based and Pull-based broadcast.
1/31/2012
Tune-in time: The time a mobile client stays active to receive the requested data
items.
1/31/2012
Data Scheduling
102
Key issue: how the server organize the data in the broadcast in
order that the clients can access the information efficiently in terms of the latency (access time) and the tune in time. Three categories:
Push-based scheduling (e.g. flat broadcast, probabilistic-based broadcast, broadcast disks, optimal scheduling, etc.) Pull-based scheduling (e.g. for equal-size items, for variable-size items, energy-efficient scheduling, etc.) Hybrid scheduling (adaptive scheduling)
1/31/2012
Data Scheduling
103
Key issue: how the server organize the data in the broadcast in
order that the clients can access the information efficiently in terms of the latency (access time) and the tune in time. Three categories:
Push-based scheduling (e.g. flat broadcast, probabilistic-based broadcast, broadcast disks, optimal scheduling, etc.) Pull-based scheduling (e.g. for equal-size items, for variable-size items, energy-efficient scheduling, etc.) Hybrid scheduling (adaptive scheduling)
1/31/2012
1/31/2012
104
Complementary approach:
to move some pages which are located near the end of a broadcast cycle to those empty slots which occur before those pages.
After complementary approach
1/31/2012
105
DVB-S Satellites Multipoint Distribution System DVB-C Cable Terrestrial Receiver DVB-T Integrated Receiver-Decoder
Multimedia PC
What is DVB ?
107
DVB (Digital Video Broadcasting) is a set of international open standards for digital television DVB standards are publicly available DVB standards are used in Europe;
1/31/2012
DVB generalities
108
DVB standards define the physical layer and data link layer of the distribution system DVB standards are based on MPEG-2 and MPEG-4 standards and all data is transmitted in MPEG Transport Streams most important DVB standards are:
for satellite TV: DVB-S, DVB-S2 for terrestrial (aerial) TV: DVB-T, DVB-T2 for cable TV: DVB-C, DVB-C2 for handheld devices TV: DVB-H, DVB-SH
DVB has a conditional access system (DVB-CA) through Common Scrambling Algorithm (DVB-CSA) and a physical Common Interface (DVBCI)
1/31/2012
Specifications:
Transmits 6-10 CD quality audio channels (data-rate: 2.304 Mbit/s) 1.5 MHz bandwidth 192 - 1536 carriers depending on frequency Transmit with OFDM signal
Specifications:
Transmits MPEG-2 compressed video (same format as used for DVD players) Data rates up to 31 Mbps will replace the current analog system by around 2008 sufficient to support High Definition Television. Transmit OFDM signal
1/31/2012
DAB Transmitter
111
FIC
Transmission Multiplexer Audio Audio Services Encoder Channel Coder MSC Multiplexer
OFDM
Transmitter
Radio Frequency
FIC: Fast Information Channel MSC: Main Service Channel OFDM: Orthogonal Frequency Division Multiplexing 1/31/2012
Data Services
Packet Mux
Channel Coder
DAB Receiver
112
(partial) MSC Tuner OFDM Demodulator FIC Independent Data Service Channel Decoder Audio Decoder Audio Service
User Interface
1/31/2012
113
1/31/2012
Questions
114
What is mobile adhoc networks? Explain at least two applications for which mobile adhoc networks are suitable. Explain the basic functioning of Adhoc networks with a neat diagram Define mobile adhoc network. Explain the properties and applications of MANET Write about adhoc networks and routing protocols used. Explain table driven routing algorithm of MANET Explain routing in adhoc networks using DSDV, DSR and alternative metrics with neat diagrams.
1/31/2012
115
1/31/2012
Questions
116
Explain WAP architecture with diagram. / Explain Wireless Application Protocol architecture. Give mobile computing architecture for a mobile device. Explain at least five services provided in wireless application protocol
1/31/2012
117
Miscellaneous
Questions & Answers
1/31/2012
Questions
118
What are six contributions for saving energy in mobile computing? Explain briefly at least four of them. How is energy conservation to be done in access protocol for mobile computing and communication (Transmission Scheduling Protocols & Reception Scheduling Protocols) What is disconnected operation and how it is managed in CODA FS? Explain the features and functions of Sync ML with suitable diagram.
1/31/2012
Coda: file system developed at CMU that supports disconnected operation Cache/hoard files and resolve needed updates upon reconnection Replicate servers to improve availability What data items (files) do we hoard?
User selects and prioritizes Hoard walking ensures that cache contains the most important stuff Often, when connected
1/31/2012
Coda (2)
120
If disconnected, cannot
How do we reconcile the cached version of the data item with the version at the server?
When connection is possible, can check before updating When disconnected, use local copies Upon reconnection, resolve updates If there are hard conflicts, user must intervene (e.g., its manualrequires a human brain)
Coda reduces the cost of checking items for consistency by grouping them into volumes If a file within one of these groups is modified, then the volume is marked modified and individual files within can be checked
1/31/2012
121
More Slides
1/31/2012
Home network
Interconnect
Visited network
1/31/2012
The DSSS encoder spreads the data across a broad range of frequencies using a mathematical key. The receiver uses the same key to decode the data.
Each bit represented by multiple bits using spreading code In proportion to number of bits used 10 bit spreading code spreads signal across 10 times bandwidth of 1 bit code Combine input with spreading code using XOR Input bit 1 inverts spreading code bit Input zero bit doesnt alter spreading code bit Data rate equal to original spreading code
One method:
For frequency hopping spread spectrum (FHSS) systems, the total available bandwidth is split into many channels of smaller bandwidth plus guard spaces between the channels. Transmitter and receiver stay on one of these channels for a certain time and then hop to another channel. This system implements FDM and TDM. The pattern of channel usage is called the hopping sequence, the time spend on a channel with a certain frequency is called the dwell time. FHSS comes in two variants, slow and fast hopping
1/31/2012
Station (STA): A computer or device with a wireless network interface. Access Point (AP): Device used to bridge the wireless-wired boundary, or to increase distance as a wireless packet repeater. Ad Hoc Network: A temporary one made up of stations in mutual range. Infrastructure Network: One with one or more Access Points. Channel: A radio frequency band, or Infrared, used for shared communication. Basic Service Set (BSS): A set of stations communicating wirelessly on the same channel in the same area, Ad Hoc or Infrastructure. Extended Service Set (ESS): A set BSSs and wired LANs with Access Points that appear as a single logical BSS.
1/31/2012
BSSID & ESSID: Data fields identifying a stations BSS & ESS. Clear Channel Assessment (CCA): A station function used to determine when it is OK to transmit. Association: A function that maps a station to an Access Point. MAC Service Data Unit (MSDU): Data Frame passed between user & MAC. MAC Protocol Data Unit (MPDU): Data Frame passed between MAC & PHY. PLCP Packet (PLCP_PDU): Data Packet passed from PHY to PHY over the Wireless Medium.
1/31/2012
AP BSS STA
1/31/2012