Vous êtes sur la page 1sur 13

ASSIGNMENT#1

OF
Mobile and ADHOC Networks

SUBMITTED TO-
Miss. GURLINE KAUR

SUBMITTED BY-
RAJESH RANA
REG.NO. 7010070005
BCA (Hons.)-MCA
Sec. D37D2
PART – A

QUES1. EXPLAIN DIFFERENT TYPES OF


MULTIPLEXING? IN WHICH GENERATIONS THESE ARE
USED?

ANS. In telecommunications and computer networks, multiplexing is a


process where multiple analog message signals or digital data streams are
combined into one signal over a shared medium. The aim is to share an
expensive resource. For example, in telecommunications, several phone
calls may be transferred using one wire. It originated in telegraphy, and is
now widely applied in communications.

There are two basic forms of multiplexing used:

 Time division multiplexing (TDM)- 2G


 Frequency division multiplexing (FDM)-1G

TIME DIVISION MULTIPLEXING

Time division multiplexing works by the multiplexor collecting and


storing the incoming transmissions from all of the slow lines connected to
it and allocating a time slice on the fast link to each in turn. The messages
are sent down the high speed link one after the other. Each transmission
when received can be separated according to the time slice allocated.

Theoretically, the available speed of the fast link should at least be equal
to the total of all of the slow speeds coming into the multiplexor so that
its maximum capacity is not exceeded.

Two ways of implementing TDM are:

 Synchronous TDM
 Asynchronous TDM

SYNCHRONOUS TDM

 Synchronous TDM works by the muliplexor giving exactly the


same amount of time to each device connected to it. This time slice
is allocated even if a device has nothing to transmit. This is
wasteful in that there will be many times when allocated time slots
are not being used. Therefore, the use of Synchronous TDM does
not guarantee maximum line usage and efficiency.
 Synchronous TDM is used in T1 and E1 connections.
ASYNCHRONOUS TDM

Asynchronous TDM is a more flexible method of TDM. With


Asynchronous TDM the length of time allocated is not fixed for each
device but time is given to devices that have data to transmit.

This version of TDM works by tagging each frame with an identification


number to note which device it belongs to. This may require more
processing by the multiplexor and take longer, however, the time saved
by efficient and effective bandwidth utilization makes it worthwhile.

Asynchronous TDM allows more devices than there is physical


bandwidth for.

This type of TDM is used in Asynchronous Transfer Mode


(ATM) networks.

FREQUENCY DIVISION MULTIPLEXING

Frequency Division Multiplexing (FDM) works by transmitting all of the


signals along the same high speed link simultaneously with each signal
set at a different frequency. For FDM to work properly frequency overlap
must be avoided. Therefore, the link must have sufficient bandwidth to be
able to carry the wide range of frequencies required. The demultiplexor at
the receiving end works by dividing the signals by tuning into the
appropriate frequency.
FDM operates in a similar way to radio broadcasting where a number of
different stations will broadcast simultaneously but on different
frequencies. Listeners can then "tune" their radio so that it captures the
frequency or station they want.

FDM gives a total bandwidth greater than the combined bandwidth of the
signals to be transmitted. In order to prevent signal overlap there are
strips of frequency that separate the signals. These are called guard bands.

QUES2.WHAT IS SPREAD SPECTRUM AND CODE


DIVISION?

ANS.

SPREAD-SPECTRUM

Spread-spectrum techniques are methods by which a signal (e.g. an


electrical, electromagnetic, or acoustic signal) generated in a
particular bandwidth is deliberately spread in the frequency domain,
resulting in a signal with a wider bandwidth. These techniques are
used for a variety of reasons, including the establishment of secure
communications, increasing resistance
tonatural interference and jamming, to prevent detection
Code Division Multiplexing
• Spread-spectrum communication technique
• Common communication link shared through a combination of
frequency and time multiplexing - Frequency Hopping application
(multiplication) of a pseudo-random sequence (code) to distinguish users
- Direct-Sequence
• Transmitted signal has much wider bandwidth than information signal
• Applications in mobile radio systems, wireless LANs, and high-speed
optical fibre communication systems

In general, signal transmission is enabled through some means of


modulation. In the past, systems have relied primarily on narrow-band
modulation schemes. In these systems, all of the power in a transmitted
signal is confined to a very narrow portion of the frequency bandwidth.
As a result of these narrow frequencies, an interfering frequency at or
near the transmitting frequency can cause interference, which render the
signal unrecoverable. Amplitude Modulation (AM) is one example of a
narrow-band modulation scheme in which the amplitude of the carrier
signal is made stronger or weaker based on the information in the signal
to be transmitted. The large amounts of power that are associated with
Amplitude Modulation allow the signal to travel large distances before it
attenuates to an undetectable level. A second popular form of modulation
is Frequency Modulation (FM), in which the phase of the carrier
frequency is adjusted in accordance with the signal being transmitted.
Narrow-band modulation schemes are not the only implementations
available to broadcasters. Broadcasting entities may take advantage of the
fact that a defined spectral power density may be achieved not only
through high power over a very narrow frequency range, but also through
lower powers spread over much larger frequency ranges.

QUES3. WI-FI IS GAINING POPULARITY? HOW?

ANS.

 WiFi uses unlicensed radio


spectrum and does not require
regulatory approval for
individual deployers.

 Prices are considerably lower as competition amongst vendors'


increases.

 Allows LANs to be deployed without cabling, typically reducing


the costs of network deployment and expansion. Spaces where
cables cannot be run, such as outdoor areas and historical
buildings, can host wireless LANs.
 Wi-Fi silicon pricing continues to come down, making Wi-Fi a
very economical networking option and driving inclusion of Wi-Fi
in an ever-widening array of devices.

 Wi-Fi products are widely available in the market. Different brands


of access points and client network interfaces are interoperable at a
basic level of service. Products designated as Wi-Fi CERTIFIED
by the Wi-Fi Alliance are interoperable and include WPA2
security.

 Wi-Fi networks support roaming, in which a mobile client station


such as a laptop computer can move from one acces point to
another as the user moves around a building or area.

 Wi-Fi is a global set of standards. Unlike cellular carriers, the same


Wi-Fi client works in different countries around the world.

 Widely available in more than 250,000 public hot spots and


millions of homes and corporate and university campuses
worldwide.

 As of 2006, WPA and WPA2 encryption are not easily crackable if


strong passwords are used

 New protocols for Quality of Service (WMM) and power saving


mechanisms (WMM Power Save) make Wi-Fi even more suitable
for latency-sensitive applications (such as voice and video) and
small form-factor devices.
PART - B

QUES1. WHAT IS UMTS? HOW IS IT HELPFUL?

Ans.
UMTS (Universal Mobile Telecommunications Service) is a third-
generation (3G) broadband, packet-based transmission of text, digitized
voice, video, and multimedia at data rates up to 2 megabits per second
(Mbps). UMTS offers a consistent set of services to mobile computer and
phone users, no matter where they are located in the world. UMTS is
based on the Global System for Mobile (GSM) communication standard.
It is also endorsed by major standards bodies and manufacturers as the
planned standard for mobile users around the world. Once UMTS is fully
available, computer and phone users can be constantly attached to the
Internet wherever they travel and, as they roam, will have the same set of
capabilities. Users will have access through a combination of
terrestrial wireless and satellite transmissions. Until UMTS is fully
implemented, users can use multi-mode devices that switch to the
currently available technology (such as GSM 900 and 1800) where
UMTS is not yet available.
Previous cellular telephone systems were mainly circuit-switched,
meaning connections were always dependent on circuit availability.
A packet-switched connection uses the Internet Protocol (IP), meaning
that a virtual connection is always available to any other end point in the
network.

UMTS is helpful-
UMTS makes it possible to provide new services like
alternative billing methods or calling plans. For instance, users can
choose to pay-per-bit, pay-per-session, flat rate, or asymmetric bandwidth
options. The higher bandwidth of UMTS also enables other new services
like video conferencing or IPTV. UMTS may allow the Virtual Home
Environment (VHE) to fully develop, where a roaming user can have the
same services to either at home, in the office or in the field through a
combination of transparent terrestrial and satellite connections.

QUES2. STATE AND EXPLAIN LIMITATIONS OF CDMA?

Ans.

LIMITATIONS OF CDMA

1) With WCDMA based 3G, as the data speed increases the coverage
area of the cell become smaller and smaller. For data rates of 2 Mbps and
above, a WCDMA cell can cover only an area of 10 meter radius ie.
about 300 sq. meters.

Therefore, to provide 2Mbps data connectivity to an Air port terminal of


say, 600 meter square (360,000 Sq.Mtr.), there should be 1200 W-CDMA
cells.

There has been some improvement with HSPDA, but still it is impossible
to connect these by wireless links in cellular technology and therefore,
will have to use Optical Fiber cable connectivity / PON up to the Cell
terminal. In this situation the wireless portion of the network is only at
the end link of 10 meter that can be better managed with alternate
technology terminals and higher reach by WiMax / WiFi wireless system.

2) As far as mobility is concerned; using W-CDMA cells, with increase


in data rate the speed of movement of user terminal also become lesser
and lesser. For 2Mbps, the speed of movement will be limited to 10
meters /second, ie. a vehicle moving at 36 K.M per hour. Intricacy
of 'hand over' at every 20 to 25 meters is also innumerable.

3) The success of any business comes from the volume its products can
generate. Volume can be built only when the product is available,
accessible and affordable to community who are interested in such
products.

Delivery of 2Mbps and above products, anywhere, everywhere, any time


is only sales hype. This is not realizable except in isolated hot spots in
cities, and such data rates are not required by the users in their mobile
situation.

The cost of providing wide spread network availability, is going to be


enormous which will reflect in the cost of use and in turn in low volume
of users.
Business volume will be generated only if there is large user base using
high revenue earning products. Corperates and business community will
be interested in Stocks and shares, and short video chats while on the
move. Stocks & Shares trading do not require very high data rate. Other
products the corporate and business community are interested in their
mobile terminal would be comparatively low value products and
the customer volume also will be limited.
The bulk user who are from medium and low income group will look for
products needed for real time streaming of Video games, Movies
and Video conferencing and sending and receiving Videos + Audio etc.
The users interest can be converted to business volume only if the
products are given at affordable cost which is not going to be the case in
these current W-CDMA 3G products due to higher CAPEX and OPEX.
With the high investment in W-CDMA 3G systems and Networks, and
cost of 3G spectrum added to it, it would be difficult to make the 3G
business viable.
Most of these features and products could be made available at much
cheaper rates via the landline links using Optical Fiber /PON to Home
Networks and WiFi and Wimax for the end links for mobility in the
premises.
Another important aspect is that with as the rate increases, the
distinguishing factors beteen Fixed and Mobile data networks vanishes
limiting these to the type of end link and typer of end user device.

Is still limited compared to the GSM technology. Its support is currently


non-existent in Europe because the European Union mandates the sole
use of GSM. In North America however, CDMA generally offers a, speed
is important to those who use the phone for more than making calls.
CDMA has been traditionally faster than GSM, though both technologies
continue to rapidly leapfrog along this path.
QUES 3.HOW ENCRYPTION IS UTILIZED IN CDMA?

ANS.
Authentication and Encryption in CDMA system
The security protocols with CDMA-IS-41 networks are among the best in
the industry. By design, CDMA technology makes eavesdropping very
difficult, whether intentional or accidental. Unique to CDMA systems, is
the 42-bit PN (Pseudo-Random Noise) Sequence called “Long Code” to
scramble voice and data. On the forward link (network to mobile), data is
scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the
reverse link, data is scrambled at a rate of 1.2288 Mega chips per second
(Mcps). CDMA network security protocols rely on a 64-bit authentication
key (A-Key) and the Electronic Serial Number (ESN) of the mobile.
The cellular authentication and voice Encryption (CAVE)
The cellular authentication and voice encryption (CAVE) security system
used in ANSI-41 net words supporting analog, TDMA and CDMA
systems is much more compels. The wireless device's private key is
shared only by the wireless device and the home system, but the serving
system is sent SSD, a secondary key (i.e. one that is derived from the
primary key), rather than just a list of challenge response pairs. This
enables the serving system to securely authenticate the wireless device
any number of times without the overhead of further communication with
the home system. This flexibility and efficiency does, however, require
the same algorithm (CAVE) be used by all system. If a major loss of keys
occurred it would be possible to update the valid wireless devices with a
new SSD over the radio interface, but a serious breach of the CAVE
algorithm would not be easily rectified
CAVE id use
1. To generate A-Key Checksum.
2. To generate the SSD
3. To generate the CMEA Key an VPM
the authentication by CAVE

A random binary number called RANDSSD, which is generated in the


HLR/AC, also plays a role in the authentication procedures. The A-Key is
programmed into the mobile and is stored in the Authentication Center
(AC) of the network.
In addition to authentication, the A-Key is used to generate the sub-keys
for voice privacy and message encryption.
CDMA uses the standardized CAVE (Cellular Authentication and Voice
Encryption) algorithm to generate a 128-bit sub-key called the “Shared
Secret Data” (SSD). The A-Key, the ESN and the network-supplied
RANDSSD are the inputs to the CAVE that generates SSD. The SSD has
two parts: SSD_A (64 bit), for creating authentication signatures and
SSD_B (64 bit), for generating keys to encrypt voice and signaling
messages. The SSD can be shared with roaming
service providers to allow local authentication. A fresh SSD can be
generated when a mobile returns to the home network or roams to a
different system.

Basic of authentication
o key (authentication Key)
o ESN:
A- key (authentication Key):
the A-key or authentication key is a 64 bit permanent number stored in
the permanent memory of the mobile. Pre-programmed and stored
security on the mobile phone during factory settings. Known only to the
mobile and its associated HLR/AC. Is used to generate the SSD (share
secret data)- the intermediate keys.

ESN:
ESN (electronic serial number)
The ESN is the 32 bit electronic serial number of the mobile phone. The
ESN is pre-programmed by the phone manufacturer during factory
setting. The ESN is unique to each mobile on the network and is used in
conjunction with the mobile number to identity the mobile on the
network . MIN (mobile identification number)
The MIN is the 10 digit number which is assigned by the service
providers to a mobile phone in the network . the MIN is unique each
mobile on the network and is used in conjunction with the ESN to
identify the mobile on the network.
MDN (mobile directory number) The MDN is the 10 digit dilatable
number assigned by the service provider to a mobile phone on its network
. the MDN may be the same as the MIN (it depend on how the service
provider provisions this pair on its network)

Vous aimerez peut-être aussi