MDU B.TECH May 2015

`SUBJECT: Mobile Communication                                      BRANCH:  ECE`
`SUBJECT CODE: EE-419-F                                            SEMESTER: VII`
`Max Marks: 100                                                     DURATION:3 Hours`

Before answering the question, candidate should ensure that they have been supplied the correct and complete question paper. No complaint in this regard, will be entertained after the examination.Note: Question no. 1 is compulsory. Attempt any five questions by selecting at least one question from each section.

`SOLUTION`

Q.1.(a) What is far-field region

(4)

Click to view the Solution

The region far from an antenna compared to the dimensions of the antenna and the wavelength of the radiation. Also known as far field;far region; far zone; radiation zone. In this region, the radiation pattern does not change shape with distance(although the field still die off as 1/R, the power density dies off as (1/R2). Also, this region is dominated by radiated fields, with the E- and H-fields orthogonal to each other and the direction of propagation as with plane waves.
If the maximum linear dimension of an antenna is D, then the following 3 conditions must all be satisfied to be in the far field region:
R > 2D2/ λ ------------------------------------------------------------------------ i.
R >> D -------------------------------------------------------------------------------------------ii
R >> λ---------------------------------------------------------------------------------------iii
The 1st and the 2nd eqn above ensure that the power radiated in a given direction from distinct parts of the antenna are approximately parallel as shown in figure below. This helps ensure the fields in the far-field region behave like plane waves. Note that R >> D, or R >> λ means “R is much more greater i.e. 10 times than the RHS”
Finally, where doesthe third far-field equation come from? Near a radiating antenna, there are reactive fields that typically have the E-fields and H-fiels die off with distance 1/R2 and 1/R3. The third equation above ensures that these near fields are gone,and we are left with the radiating fields, which fall off with distance as 1/R.
The far field region is sometimes referred to as Fraunhofer region, a carryover term from optics.

hide this content

1.(b) What are the security threats to wireless networks?

(4)

Click to view the Solution
Under Progress
Hide this content

1.(c ) What are the effects of fading?

(4)

Click to view the Solution

Under Progress

1.(d) What is mobility management?

(4)

Click to view the Solution

Mobility Management :
A MS is assigned a home network, commonly known as location area. When an MS migrates out of its current BS into the footprint of another, a procedure is performed to maintain service continuity, known as Handoff management. An agent in the home network, called home agent, keeps track of the current location of the MS. The procedure to keep track of the user’s current location is referred to as Location management. Handoff management and location management together are referred to as Mobility management.
a. Handoff: At any instant, each mobile station is logically in a cell and under the control of the cell’s base station. When a mobile station moves out of a cell, the base station notices the MS’s signal fading away and requests all the neighbouring BSs to report the strength they are receiving. The BS then transfers ownership to the cell getting the strongest signal and the MSC changes the channel carrying the call. The process is called handoff.
b. Location Management:
location update and paging. When a Mobile Station (MS) enters a new Location Area, it performs a location updating procedure by making an association between the foreign agent and the home agent. One of the BSs, in the newly visited Location Area is informed and the home directory of the MS is updated with its current location. When the home agent receives a message destined for the MS, it forwards the message to the MS via the foreign agent. An authentication process is performed before forwarding the message.

hide this content

1.(e) What advantages does the use of IPv6 offer for mobility?

(4)

Click to view the Solution

While mobile IP was originally designed for IP version 4, IP version makes life much easier. The advantages are:

1. Several mechanisms that had to be specified separately for mobility support come free in IPv6.
2. Security with regard to authentication, is now a required featurefor all IPv6 nodes. No special mechanisms as add-ons are needed for securing mobile IP registration.
3. Every IPv6 node masters address auto configuration – the mechanisms for acquiring a COA are already built in.
4. Neighbor discovery as a mechanism mandatory for every node is also included in the specification; special foreign agents are no longer needed to advertise services.
5. Combining the features of auto configuration and neighbor discovery means that every mobile node is able to create or obtain a topologically correct address for the current point of attachment.
6. Every IPv6 node can send binding updates to another node, so the MN can send its current COA directly to the CN and HA. These mechanisms are an integral part of IPv6.
7. A soft handover is possible with IPv6. The MN sends its new COA to the old router servicing the MN at the old COA, and the old router encapsulates all incoming packets for the MN and forwards them to the new COA.
8. Altogether, mobile IP in IPv6 networks requires very few additional mechanisms of a CN, MN, and HA.
9. The FA is not needed any more. A CN only has to be able to process binding updates, i.e., to create or to update an entry in the routing cache.
10. The MN itself has to be able to decapsulate packets, to detect when it needs a new COA, and to determine when to send binding updates to the HA and CN. A HA must be able to encapsulate packets.

hide this content

`SECTION- A`
Q.2. (a) What are the applications of cellular mobile communications?

(10)

Click to view the Solution

The application areas are discussed below:

1. Vehicle: many of the new vehicle that are appearing in the market are already fitted with such technology. It helps communication while on moving in a vehicle. In urban areas cellular systems help maintain te uninterrupted communication while in remote areas satellite communication can be used, while the current position of the car can be determined using the global positioning system. Other services as music, news, road condition, weather report and other broadcast services are received via digital audio broadcasting with 1.5 Mbps.
2. Emergencies: Ambulance may be fitted with high quality wireless connectivity with hospital for better medical help.
3. Business: Cellular communication has brought the concept of m-commerce and m-business, and this is a reality these days that many of the meetings, audio conferences help business activity while on move without actually meeting the other party.
4. Replacement of wired networks: This gives a better solution to get rid of all wires in home and offices, thus giving a neat and clean outlook, flexibility, mobility etc.
5. Infotainment : Internet everywhere, is not possible without wireless and cellular technology. It has given the freedom to do business with electronic cash. Today service like mpaisa is available that transfer money to another location. Cashless recharge of mobile. Airtel has offered a service to transfer balance to other mobile.
6. Location dependent services: Today we are able to move and get connected through another access point hiding the fact that you have changed your location. Mobile IP allows to transmit the packet through other access points keeping the same home IP.
7. Mobile and Wireless devices:
1. a. Sensor (Sensing the Door )
2. Embedded controllers (keyboard, washing machines)
3. Pager (Display short message)
4. Mobile Phones (Migrate, Color graphic display touch screen)
5. Personal Digital assistant (Accompany calendar, notepad)
6. Pocket computer Notebook / Laptop

hide this content

2.(b) Describe in brief the Antennas used in mobile communication.

(10)

Click to view the Solution

The antennas are used for Radiation and reception of electromagnetic waves, coupling of wires to space for radio transmission. The following types of antennas are used in mobile communication
• Isotropic radiator: equal radiation in all directions (three dimensional) - only a theoretical reference antenna
• Real antennas always have directive effects (vertically and/or horizontally)

Antennas: simple dipoles
• Real antennas are not isotropic radiators but, e.g., dipoles with lengths /4 on car roofs or /2 as Hertzian dipole
shape of antenna proportional to wavelength

Example: Radiation pattern of a simple Hertzian dipole

Gain: maximum power in the direction of the main lobe compared to the power of an isotropic radiator (with the same average power)
• Often used for microwave connections or base stations for mobile phones (e.g., radio coverage of a valley)

hide this content

3. (a) What do you mean by diversity? How many type of diversity are present?

(10)

Click to view the Solution

3.(b) Define the followings:

(10)

(a) Doppler Spread. Click to view the Solution

Doppler spread BD is a measure of the spectral broadening caused by the time rate of change of the mobile radio channel and is defined as the range of frequencies over which the received Doppler spectrum is essentially non-zero. When a pure sinusoidal tone of frequency fc is transmitted, the received signal spectrum, called the Doppler spectrum, will have components in the range fc – fd to fc + fd ,where fd is the Doppler shift. The amount of spectral broadening depends on fd which is a function of the relative velocity of the mobile, and the angle θ between the direction of motion of the mobile and direction of arrival of the scattered waves. If the baseband signal bandwidth is much greater than BD the effects of Doppler spread are negligible at the receiver.

hide this content

(b) Coherence Time Click to view the Solution

Coherence time Tc is the time domain dual of Doppler spread and is used to characterize the time varying nature of the frequency dispersiveness of the channel in the time domain. The Doppler spread and coherence time are inversely proportional to one another. That is, Tc = 1/fm

(a)

Coherence time is actually a statistical measure of the time duration over which the channel impulse response is essentially invariant, and quantifies the similarity of the channel response at different times. In other words, coherence time is the time duration over which two received signals have a strong potential for amplitude correlation. If the reciprocal bandwidth of the baseband signal is greater than the coherence time of the channel, then the channel will change during the transmission of the baseband message, thus causing distortion at the receiver. If the coherence time is defined as the time over which the time correlation function is above 0.5, then the coherence time is approximately:
Tc = 9/16πf2m

(b)

where fm is the maximum Doppler shift given by fm = v ⁄ λ . In practice, (a) suggests a time duration during which a Rayleigh fading signal may fluctuate wildly, and (5.40.b) is often too restrictive. A popular rule of thumb for modern digital communications is to define the coherence time as the geometric mean of Equations (a) and b). That is,
Tc = √(9/(16π(fm)2)
The definition of coherence time implies that two signals arriving with a time separation greater than TC are affected differently by the channel.

hide this content

(c) Coherence bandwidth Click to view the Solution

The coherence Bc is the bandwidth for which either amplitudes or phases of two receiver signals have a high degree of similarity. Bc is a statistical measure of range of frequencies over which the channel passes all spectral components with approximately equal gain and linear phase.
Bc = 1/τdmax
More useful measurement is often expressed in terms of “ rms” delay spread τdrms . Two fading signal with frequencies f1 and f2, where Δf= | f1-f2 |, if correlation function nbetween two faded signal R(Δf)=0.5, then Δf > Bc = 1/2πτdrms
More popular approximation is Δf > Bc = 1/5πτdrms
Bc<1/Ts=Bw corresponds to frequency-selective (all freq. components are not affected by channel a similar manner)channel Bc>1/Ts=Bw corresponds to flat fading (all freq. components are affected by channel a similar manner)channel channel

hide this content

(d) Doppler Shift Click to view the Solution

Doppler shift occurs when the transmitter of a signal is moving in relation to the receiver. The relative movement shifts the frequency of the signal, making it different at the receiver than at the transmitter. In other words, the frequency perceived by the receiver differs from the one that was originally emitted. It’s easy to understand and observe this phenomena with sound waves. A good example is the sound of a race car that passes by you. When the car is getting closer, the sound has a higher pitch. When the car passes you and starts going away, the pitch suddenly becomes lower. This occurs because the source emits sound waves at a constant frequency but as it moves toward the observer, the distance between the waves in the signal becomes shorter. The waves travel at a speed v and are emitted at a frequency ƒ(cycles/seconds). In our example, the emitter has moved a distance of d towards the receiver between the emission of two succeeding cycles. The cycles thus arrive at the observer at a frequency higher than the emission frequency. The opposite applies when the transmitter is moving away; the distance between each peak (or cycles) increases, and since the wave is moving at the same v speed, the perception of the observer is that the frequency has diminished.
For a vehicle moving in a straight line at constant velocity v , the Doppler frequency shift, fd is given by:

hide this content

SECTION - B
4. (a) Explain in detail the free space loss model.

(10)

Click to view the Solution

Ans:
The free space propagation model assumes a transmit antenna and a receive antenna to be located in an otherwise empty environment. Neither absorbing obstacles nor reflecting surfaces are considered. In particular, the influence of the earth surface is assumed to be entirely absent.
For propagation distances d much larger than the antenna size, the far field of the electromagnetic wave dominates all other components. That is, we are allowed to model the radiating antenna as a point source with negligible physical dimensions. In such case, the energy radiated by an omni-directional antenna is spread over the surface of a sphere. This allows us to analyse the effect of distance on the received signal power.
The surface area of a sphere of radius d is 4πd2. The power density w at distance d from a transmitter with power pT and antenna gain Gt is w = pT Gt / (4 π d2).
The available power pR at a receive antenna with gain GR is
PR = (PTGT/(4 πd2)).A
= (&lambda2/(4 πd2)).GTPTGR
where A is the effective area or `aperture' of the antenna, with GR = 4 π A / λ2. The wavelength λ is c / fc with c the velocity of light and fc the carrier frequency. The product Gt pT is called the effectively radiated power (ERP) of the transmitter.
20 log d Path Loss Law
As the propagation distance increases, the radiated energy is spread over the surface of a sphere of radius d, so the power received decreases proportional to d-2. Expressed in dB, the received power is
PdB = Pv - 20 log ( d/dv)

hide this content

4. (b) Explain Okumara propagation model.

(10)

Click to view the Solution

Ans: Okumura’s model is a graphical model and is one of the most frequently and easiest to use macroscopic propagation models. It was developed during the mid 1960's as the result of large-scale studies conducted in and around Tokyo. The model was designed for use in the frequency range 200 up to 1920 MHz and mostly in an urban propagation environment. Okumura’s model assumes that the path loss between the TX and RX in the terrestrial propagation environment can be expressed as:
L50 = LFS + Amu + Htu + Hru
where: L50 - Median path loss between the TX and RX expressed in dB
LFS - Path loss of the free space in dB
Amu - “Basic median attenuation” – additional losses due to propagation in urban environment in dB
Htu - TX height gain correction factor in dB
Hxu - RX height gain correction factor in dB
The free space loss term can be calculated analytically using:
LFS = 32.45 + 20 log (d/(1 km)) + 20 log (f/(1 MHz)) – 10log(Gt) - 10log(Gr)
where: d - Distance between the TX and RX in km
f - Operating frequency in MHz
Gt ,Gr - TX and RX antenna gains (linear)
The remaining terms on the right hand side of eqn for L50 above are provided in a graphical form as the family of curves such as Basic median attenuation as a function of frequency and path distance, Base station height correction gain and Mobile station height correction gain graphs.

hide this content

5. (a) Explain the basic propagation mechanisms in detail, which impact propagation in mobile communication.

(15)

Click to view the Solution

Ans:
Reflection, diffraction and scattering are the three fundamental phenomena that cause signal propagation in a mobile communication system, apart from LoS communication. The most important parameter, predicted by propagation models based on above three phenomena, is the received power. The physics of the above phenomena may also be used to describe small scale fading and multipath propagation. The following subsections give an outline of these phenomena
Reflection : Reflection occurs when an electromagnetic wave falls on an object, which has very large dimensions as compared to the wavelength of the propagating wave. For example, such objects can be the earth, buildings and walls. When a radio wave falls on another medium having different electrical properties, a part of it is transmitted into it, while some energy is reflected back. Let us see some special cases. If the medium on which the e.m. wave is incident is a dielectric, some energy is reflected back and some energy is transmitted. If the medium is a perfect conductor, all energy is reflected back to the first medium. The amount of energy that is reflected back depends on the polarization of the e.m. wave.

Diffraction: It is the phenomenon due to which an EM wave can propagate beyond the horizon, around the curved earth’s surface and obstructions like tall buildings. As the user moves deeper into the shadowed region, the received field strength decreases. But the diffraction field still exists an it has enough strength to yield a good signal

Scattering: The actual received power at the receiver is somewhat stronger than claimed by the models of reflection and diffraction. The cause is that the trees, buildings and lampposts scatter energy in all directions. This provides extra energy at the receiver. Roughness is tested by a Rayleigh criterion, which defines a critical height hc of surface protuberances for a given angle of incidence θi, given by, hc = λ / 8 sin(θi) .

hide this content

5.(b) Define Brewster angle

(5)

Click to view the Solution

Ans:
Brewster angle is the angle at which no reflection occurs in the medium of origin. It occurs when the incident angle ϴB is such that the reflection coefficient (Γ) is equal to zero. The Brewster angle is given by the value of ϴB which satisfies: Sin(ϴB) = √(ε1/(ε1 + ε2))
For the case when the first medium is free space and the second medium has a relative permittivity εr,then the above equation can be expressed as∶ Sin(θ,B) = √((εr-1)/((εr)2 - 1))
The Brewster angle occur only for vertical polarization i.e. the maximum polarization of the reflected ray occurs when the reflected ray is perpendicular to the refracted ray.
hide this content

SECTION - C
6.(a) Explain forward and reverse channel parameters of IS-95 CDMA.

(12)

Click to view the Solution

Ans:
IS-95 channels in the Forward link
The IS-95 forward link channels and their functions and make-up are summarized below:

1. Pilot channel (PC): The pilot channel is transmitted as a reference by the base station to provide timing and phase reference for the mobiles, and carries no real data. The "data" carried by the channel is a continuous stream of zeros which is spread by Walsh code zero, which itself a stream of zeros. This is further spread by a pair of quadrature PN sequences. This means that the pilot channel is effectively the PN sequence with its associated offset. A measurement of the signal-to-noise ratio of the pilot channel also gives the mobile an indication of which is the strongest serving sector.
2. Paging channels (PCH): This IS-95 channel is used to carry information to enable mobiles to be paged. Data carried by this IS-95 channel includes system parameters, voice pages, SMS and other broadcast messages. It occupies Walsh codes 1 - 7 dependent upon the system requirements. The PCH carries data at either 4.8 or 9.6 kbps - a field in the Sync Channel indicates the data rate being transmitted.

3. As with other channels there are a number of stages taken to produce the final channel. First the baseband information is error protected. After this the data is repeated if it is at a rate of 4.8 kbps, otherwise it is left as it is. Following this the data is interleaved and then scrambled by the decimated long PN sequence, and finally spread by the Walsh code for the particular channel assignment. In this process the long PN code is itself masked with a code which is specific to the channel being used. In this way the long PN code for Paging Channel 1 (using Walsh Code 1) is different to Paging Channel 4 (using Walsh Code 4).
4. Synchronisation channel (SC): This IS-95 channel is used to provide the timing reference to access the cell . This IS-95 channel always uses Walsh code 32. Each base station has a fixed timing offset to reduce the interference between adjacent base-stations. The Sync channel incorporates an 80 mS superframe structure. This is divided into three 26.667 mS frames which correspond to the same length as the short PN sequences. This means that they align with the timing on the Pilot channel.
This IS-95 channel is allocated the least power of the overhead channels in the overall CDMA transmission. The data that is transmitted on this channel includes the system time, pilot PN of the base station, long code state, system ID, and the network ID.
5. Forward Traffic Channel (FTC): As the name implies, the Forward Traffic Channel is used to carry voice, user data, and also signalling information.

IS-95 channels in the reverse link
The IS-95 channels for the reverse link are quite different to those in the forward link. There are only two basic channels:
1. Access channel
2. Reverse traffic channel
The way in which these IS-95 channels are structured and assembled is also different. This is because they are generated within the mobile rather than the base station. In terms of the modulation, OQPSK is used where a half chip delay is introduced onto the Q channel of the modulation.

The two IS-95 channels in the reverse link are summarized below:
1. Access channel (AC): This IS-95 channel is used by the mobile to communicate with the base station when no traffic channel has been set up. This IS-95 channel is therefore used for gaining acess toth e network, call origination requests and also for sending responses to paging commands that might be sent bythe network.
There can be up to 32 Access Channels on the IS-95 reverse link for each Paging Channel on forward link. Each AC uses the same PN but they are time shifted to enable the mobile to be uniquely identified. Data is sent at 4800 bps in a 20 mS time frame so that each frame contains 96 bits.
2. Reverse traffic channel (RTC): Like the Forward Traffic Channel, this reverse link IS-95 channel is used to carry variable rate voice data, user data and signaling.
hide this content

6.(b) What are the different GSM services and features?

(8)

Click to view the Solution

ANS:
The GSM service permits integration of different voice and data services and interworking with existing networks.
• Here bearer services comprise all services that enable transparent transmission of data between the interface to the network (S in case of Mobile station).These services are connection oriented and may be circuit or packet switched and need lower 3 layer of OSI,
• Tele services are application specific and may need all 7 layers of OSI

i. Bearer Services:
• Bearer service permit transparent, non- transparent, synchronous, asynchronous data transmission. Original GSM offered data rate of 9.6Kbps.
• Transparent bearer services use layer 1 of OSI
• Use forward Error correction(FEC), do not try to recover loss of data due to shadowing, intruptions etc.
ii. Tele Services:
GSM mainly focuses on voice-oriented services, which comprises encrypted voice transmission, message services, and basic data communication with terminals as known from the PSTN and ISDN,. However as the main service is telephony, primary goal of GSM was the provision of high quality digital voice transmission, offering at least typical bandwidth of 3.1KHz that of analog telephony.
Non-voice Services offered: These services are: Emergency call, Short message service upto 160 characters, Enhanced Message service (EMS) upt 760 characters, Multimedia message service(MMS)-offered GIF, JPG, WBMP, short video clip come with phone with camera, Group 3 fax: in this fax data is transmitted as digital data over analog telephone network
iii. Supplementary Services
Similar to ISDN these service offer various enhancements for std. telephony service such as :
• user identification, • Redirection, • Call Forwarding, • Closed user group, • Multi-party
hide this content

7.(a) How do IEEE 802.11, HyperLAN2 and Bluetooth, respectively, solve the hidden terminal problem?

(8)

Click to view the Solution

7.(b) What are the advantages and problems of forwarding mechanisms in Bluetooth networks regarding security, power saving, and network mobility?

(12)

Click to view the Solution

SECTION-D
8.(a) List the entities of mobile IP and describe data transfer from mobile node and vice versa. Why and where is encapsulation needed?

(10)

Click to view the Solution

ANS:

Various entities are:

1. Mobile node (MN): A mobile node is an end-system or router that can change its point of attachment to the internet using mobile IP
2. Correspondent node (CN): At least one partner is needed for communication. In the following the CN represents this partner for the MN. The CN can be a fixed or mobile node.
3. Home network: The home network is the subnet the MN belongs to with respect to its IP address. No mobile IP support is needed within the home network.
4. Foreign network: The foreign network is the current subnet the MN visits and which is not the home network
5. Foreign agent (FA): The FA can provide several services to the MN during its visit to the foreign network. The FA can have the COA acting as tunnel endpoint and forwarding packets to the MN. The FA can be the default router for the MN. FAs can also provide security services because they belong to the foreign network as opposed to the MN which is only visiting. For mobile IP functioning, FAs are not necessarily needed. Typically, an FA is implemented on a router for the subnet the MN attaches to.
6. Care-of address (COA): The COA defines the current location of the MN from an IP point of view. All IP packets sent to the MN are delivered to the COA, not directly to the IP address of the MN. Packet delivery toward the MN is done using a tunnel, as explained later. To be more precise, the COA marks the tunnel endpoint.
7. Foreign agent COA: The COA could be located at the FA, i.e., the COA is an IP address of the FA. The FA is the tunnel end-point and forwards packets to the MN. Many MN using the FA can share this COA as common COA.
8. Home agent (HA): The HA provides several services for the MN and is located in the home network. The tunnel for packets toward the MN starts at the HA. The HA maintains a location registry, i.e., it is informed of the MN’s location by the current COA.
IP packet delivery to and from the MN : A correspondent node CN wants to send an IP packet to the MN.
step 1 : One of the requirements of mobile IP was to support hiding the mobility of the MN. CN does not need to know anything about the MN’s current location and sends the packet as usual to the IP address of MN. This means that CN sends an IP packet with MN as a destination address and CN as a source address.
step 2: The internet, not having information on the current location of MN, routes the packet to the router responsible for the home network of MN. This is done using the standard routing mechanisms of the internet. The HA now intercepts the packet, knowing that MN is currently not in its home network. The packet is not forwarded into the subnet as usual, but encapsulated and tunnelled to the COA. A new header is put in front of the old IP header showing the COA as new destination and HA as source of the encapsulated packet.
step 3: The foreign agent now decapsulates the packet, i.e., removes the additional header, and forwards the original packet with CN as source and MN as destination to the MN. Again, for the MN mobility is not visible. It receives the packet with the same sender and receiver address as it would have done in the home network.
step 4: At first glance, sending packets from the MN to the CN is much simpler. The MN sends the packet as usual with its own fixed IP address as source and CN’s address as destination.
The router with the FA acts as default router and forwards the packet in the same way as it would do for any other node in the foreign network. As long as CN is a fixed node the remainder is in the fixed internet as usual. If CN were also a mobile node residing in a foreign network, the same mechanisms as described in steps 1 through 3 would apply now in the other direction. hide this content

8(b) Write short note on mobile adhoc networks. Distinguish some of the adhoc routing protocols.

(10)

Click to view the Solution

ANS:
A mobile ad-hoc network (MANET) is an infrastructure less network, i.e. this type of network does not require big infrastructure like BTS, BSC, MSC etc as in the case of cellular systems. The mobile nodes in an MANET depend on their own transmission/receiving power and are used in a short range. These types of networks are established in emergency and where there is no infrastructure existing. These networks should be mobile and use wireless communications. Examples for the use of such mobile, wireless, multi-hop ad-hoc networks, which are only called ad-hoc networks here for simplicity, are:
Instant infrastructure: Unplanned meetings, spontaneous interpersonal communications etc. cannot rely on any infrastructure. Infrastructures need planning and administration. It would take too long to set up this kind of infrastructure; therefore, ad-hoc connectivity has to be set up.
Disaster relief: Infrastructures typically break down in disaster areas. Hurricanes cut phone and power lines, floods destroy base stations, fires burn servers. Emergency teams can only rely on an infrastructure they can set up themselves. No forward planning can be done, and the set-up must be extremely fast and reliable. The same applies to many military activities, which is, to be honest, one of the major driving forces behind mobile ad-hoc networking research.
Remote areas: Even if infrastructures could be planned ahead, it is sometimes too expensive to set up an infrastructure in sparsely populated areas. Depending on the communication pattern, ad-hoc networks or satellite infrastructures can be a solution.
Routing protocols:
Routing is needed to find a path between source and destination and to forward the packets appropriately. In wireless networks using an infrastructure, cells have been defined. Within a cell, the base station can reach all mobile nodes without routing via a broadcast. In the case of ad-hoc networks, each node must be able to forward data for other nodes. This creates many additional problems that are discussed in the following paragraphs. Some of the routing protocols are described below:
Distance Vector Routing(DVR):
Every node keep a maintain a routing table containing the following information:

Every node share their routing table with every other node in its visibility area. Thus the nodes will update their routing table and will contain information of every other node. The problem with this routing protocol is that there is a great amount of overhead of routing information and lead to congestion and packet drops, count-to-infinity in case of broken link, battery usage is high which is not desirable feature in MANET.
Destination sequence distance vector(DSDV):Some of the above problems are solved in DSDV protocol. This protocol add two things to the distance vector algorithm:
Sequence numbers: Each routing advertisement comes with a sequence number. Within ad-hoc networks, advertisements may propagate along many paths. Sequence numbers help to apply the advertisements in correct order. This avoids the loops that are likely with the unchanged distance vector algorithm. ● Damping: Transient changes in topology that are of short duration should not destabilize the routing mechanisms. Advertisements containing changes in the topology currently stored are therefore not disseminated further. A node waits with dissemination if these changes are probably unstable. Waiting time depends on the time between the first and the best announcement of a path to a certain destination.
The routing table of DSDV protocol is shown below:
Dynamic Source Routing:
The DVR, DSDV algorithms maintain routes between all nodes, although there may currently be no data exchange at all. This causes unnecessary traffic and prevents nodes from saving battery power. Dynamic source routing (DSR), therefore, divides the task of routing into two separate problems:

1. Route discovery: A node only tries to discover a route to a destination if it has to send something to this destination and there is currently no known route.
2. Route maintenance: If a node is continuously sending packets via a route, it has to make sure that the route is held upright. As soon as a node detects problems with the current route, it has to find an alternative.

3. The basic principle of source routing is also used in fixed networks, e.g. token rings. Dynamic source routing eliminates all periodic routing updates and works as follows. If a node needs to discover a route, it broadcasts a route request with a unique identifier and the destination address as parameters. Any node that receives a route request does the following.
● If the node has already received the request (which is identified using the unique identifier), it drops the request packet.
● If the node recognizes its own address as the destination, the request has reached its target.
● Otherwise, the node appends its own address to a list of traversed hops in the packet and broadcasts this updated route request. Using this approach, the route request collects a list of addresses representing a possible path on its way towards the destination. As soon as the request reaches the destination, it can return the request packet containing the list to the receiver using this list in reverse order. One condition for this is that the links work bi-directionally. If this is not the case, and the destination node does not currently maintain a route back to the initiator of the request, it has to start a route discovery by itself. hide this content

9. (a) Explain characteristics of TCP over 2.5/3G wireless networks.

(10)

Click to view the Solution

ANS:
The focus on 2.5G/3G for transport of internet data is important as already more than 1 billion people use mobile phones and it is obvious that the mobile phone systems will also be used to transport arbitrary internet data. The following characteristics have to be considered when deploying applications over 2.5G/3G wireless links:

2. Latency: All wireless systems comprise elaborated algorithms for error correction and protection, such as forward error correction (FEC), check summing, and interleaving. FEC and interleaving let the round trip time (RTT) grow to several hundred milliseconds up to some seconds. The current GPRS standard specifies an average delay of less than two seconds for the transport class with the highest quality (see chapter 4).
3. Jitter: Wireless systems suffer from large delay variations or ‘delay spikes’. Reasons for sudden increase in the latency are: link outages due to temporal loss of radio coverage, blocking due to high-priority traffic, or handovers. Handovers are quite often only virtually seamless with outages reaching from some 10 ms (handover in GSM systems) to several seconds (intersystem handover, e.g., from a WLAN to a cellular system using Mobile IP without using additional mechanisms such as multicasting data to multiple access points).
4. Packet loss: Packets might be lost during hand overs or due to corruption. Thanks to link-level retransmissions the loss rates of 2.5G/3G systems due to corruption are relatively low (but still orders of magnitude higher than, e.g., fiber connections!). However, recovery at the link layer appears as jitter to the higher layers. Based on these characteristic
5. hide this content

9. (b) Explain some performance enhancing proxies beneficial for wireless and mobile internet access.

(10)

Click to view the Solution

Performance Enhancing Proxies are used to ‘Mitigate Link-Related Degradations’ and are also beneficial for wireless and mobile internet access.
Transport layer proxies : The transport layer proxies are ‘snooping TCP’ and ‘indirect TCP’. The transport layer proxies are typically used for local retransmissions, local acknowledgements, TCP acknowledgement filtering or acknowledgement handling in general.
Application level proxies: Application layer proxies can be used for content filtering, content-aware compression, picture downscaling etc. Prominent examples are internet/WAP gateways making at least some of the standard web content accessible from WAP devices.
In principle, proxies can be placed on any layer in a communication system but the one located in located in the transport and application layer are discussed here. One of the key features of a proxy is its transparency with respect to the end systems, the applications and the users.
Figure shows the general architecture of a wireless system connected via a proxy with the internet.
However, all proxies share a common problem as they break the end-to-end semantics of a connection. The most detrimental negative implication of breaking the end-to-end semantics is that it disables end-to-end use of IP security. Using IP security with ESP (encapsulation security payload) the major part of the IP packet including the TCP header and application data is encrypted so is not accessible for a proxy. hide this content