Mobile Communication Networks Question and Answer Bank
Mobile Communication Networks Question and Answer Bank
Mobile Communication Networks Question and Answer Bank
bank
1
UNIT I
Two marks questions
1. Mention the different types of random access protocols.
3. Define a cell.
Spatially reusing the available spectrum so that the same spectrum can
support multiple users separated by a distance is called frequency reuse.
2
Femto cells, pico cells, micro cells, macro cells and mega cells.
Small cells inside a building that support local indoor networks such as
wireless LANs. Size of these cells are in the range of few tens of meters.
12. What are the various channel allocation techniques used in cellular
communication?
Mobility management refers to the operations required for tracking the mobile
and restructuring existing connections as it moves. Mobility management
consists of Location management and Handoff management
14.What is a cluster?
The N cells which collectively use the complete set of available frequencies is
called a cluster.
Major requirement driving Predominantly voice driven, Converge data and voice
architecture data was always add on over IP
3
Switching design basis Circuit and packet All digital with packetized
voice
Radio resource management refers to the control signalling and associated protocols
employed to keep track of relationships between signal strength, available radio
channels in a system so as to enable a mobile station or the network to optionally
select the best radio resources for communication.
l. Analysis of the relationship between the capacity, cell size and the
cost of infrastructure
Handoff management handles the messages required to make the changes in the
fixed network to handle the change in location during a ongoing communication.
This is the process of subdividing a congested cell into smaller cells, each with it’s
own base station and a corresponding reduction in antenna height and transmitter
power. Cell splitting increases the capacity of a cellular system since it increases the
number of times that channels are reused.
4
The co channel interference in a cellular system may be decreased by replacing a
single omni directional antenna at the base station by several directional antennas,
each radiating within a specified sector. By using directional antennas, a given cell
will receive interference and transmit with only a fraction of the available co channel
cells. This technique for reducing co channel interference and thus increasing
system performance by using directional antennas is called sectoring.
It is a measure of the number of users which can be offered a particular GOS with
a particular configuration of fixed channels.
• Weather forecasting.
• Radio and TV broadcast satellites.
• Military services.
• Navigation.
5
26. What is a page?
It is a brief message which is broadcast over the entire service area, usually in
a simulcast fashion by many base stations at the same time.
• Mobile stations
• Base stations
• Mobile Switching Center (MSC) or Mobile Telephone Switching Office
(MTSO).
31. What are the disadvantages of cellular systems with small cells?
Frequency bands between 30 MHz to 400 MHz is crowded with large number
of services and above 10 GHz is not used due to propagation path loss,
multipath fading and improper medium due to rain activity. So 800 MHz is
chosen for mobile communication.
It refers to the variation in the received signal which is due to the waves
reflected from surrounding buildings and other structures.
40. What are the different digital cellular systems available in 2G.
The base station serves as a bridge between all mobile users in the cell and
connects the simultaneous mobile calls via telephone lines or microwave links to the
mobile switching center(MSC)
The MSC coordinates the activities of all the base stations and connects the entire
cellular system to the PSTN.
The actual radio coverage of a cell is known as the foot print. It is determined
from field measurements or propagation prediction models.
The time over which a call may be maintained within a cell without handoff, is
called the dwell time.
This model is used to predict the received signal strength, when there is
unobstructed line-of-sight between the transmitter and receiver. The free
space power received by the receiving antenna which is separated from a
radiating transmitter antenna by a distance d is given by
8
Pt Gt Gr λ2
Pr (d ) =
(4π )2 d 2 L
where Pr(d) is the received power, Pt is the transmitted power, Gt is the
transmitter antenna gain, Gr is the receiver antenna gain, L is the loss factor
and λ is wavelength in meters.
The bistatic radar equation may be used to compute the received power due
to scattering in the far field in the urban mobile radio systems.
Longely-Rico model
Durkin,s model
Okumura model
a. Rapid changes in signal strength over a small travel distance or time interval
b. Random frequency modulation due to varying Doppler shifts on different
multipath signals
c. Time dispersion(echoes) caused by multipath propagation delays
9
55. Mention the basic propagation mechanisms, which impact propagation in
mobile communication.
The basic propagation mechanisms are,
Reflection
Diffraction
Scattering
Diffraction occurs when the radio path between the transmitter and receiver is
obstructed by a surface that has sharp irregularities.
Scattering occurs when the medium through which the wave travels consists
of objects with dimensions that are small compared to the wavelength and
where the number of obstacles per unit volume is large.
The Brewster angle is the angle at which no reflection occurs in the medium
of origin. It occurs when the incident angle is such that the reflection
coefficient Is equal to zero.
The decision feedback equalizer is particularly used for channels with severe
amplitude distortions and has been widely used in wireless communications.
10
63. Write the basic algorithms used in adaptive equalization.
PHP means Personal Handy Phone System. It is otherwise called PHS. PHP
is a wireless communication TDD System which supports personal
communication services (PCS). It uses small, low-complexity light weight
terminals called Personal Stations (PSS).
68. What are the logical channels that the control channel consists?
11
Broadcast control channel is a one way down link channel for broadcasting
control information from CS to PS.
CCCH is Common Control Channel Which sends out the control information
for call connection.
SIM, which is memory device that store information such as the subscriber
identity number, the network and countries where the subscriber is entitled to
service, private key, and other user specified information.
73. What are frequencies used in forward and reverse link frequency in GSM?
75. What are frequencies used in forward and reverse link frequency in IS-95?
12
76. If a cellular operator is allocated 12.5 MHz for each simple’s band and if
bandwidth is 12.5MHz guardband is 10 KHz & Bc=10khz find the number of
channel available in an FDMA system.
Soft handoff, hard handoff, forced handoff, delayed handoff and mobile
associated handoff.
80. State the expression that relates co channel reuse ratio (Q) to radius (R) of
a cell
Q = D/R
D – Distance between center of co channel cells
N = i2 + ij + j2
The time over which a call may be maintained within a cell without handoff.
It provides large area coverage to high speed users while providing small area
coverage to users traveling at low speeds.
The cells that operate with the same set of frequencies are referred as co
channel cells.
13
One Erlong represents the amount of traffic intensity carried by a channel that
is completely occupied.
86. State the relation between traffic intensity (Au) and holding time (H).
Au = lH.
l = request rate
88.How many co channel interferes are present in the first tier for a cluster size
of 7?
Six
89.What is CDPD?
CDPD is a Cellular packet digital Data System that uses packet switched data
The bit rate in the RF channel for CDPD is !9.2kbps
*In TDMA , no. of time slots depends upon modulation technique ,available
bandwidth
*Data transmission occurs in bursts
*It uses different time slots for transmission and reception, then duplexers are
not required
*Adaptive equalization is necessary
* Guard time should be minimized
*In CDMA system, many users share the same frequency either TDD or FDD
may be used
*Channel data rate is high
*Multipath fading may be substantially reduced
*CDMA uses co –channel cells, it can use macroscopic spatial diversity to
provide soft hand off
96.What is Bluetooth?
16
2.Give the comparison between fixed channel allocation and dynamic channel
allocation.
17
Dynamic Channel Allocation
Dynamic Channel Allocation (DCA) attempts to alleviate the problem mentioned for
FCA systems when offered traffic is non-uniform. In DCA systems, no set
relationship exists between channels and cells. Instead, channels are part of a pool
of resources. Whenever a channel is needed by a cell, the channel is allocated
under the constraint that frequency reuse requirements can not be violated. There
are two problems that typically occur with DCA based systems.
D-AMPS uses existing AMPS channels and allows for smooth transition
between digital and analog systems in the same area. Capacity was
increased over the preceding analog design by dividing each 30 kHz channel
pair into three time slots (hence time division) and digitally compressing the
18
voice data, yielding three times the call capacity in a single cell. A digital
system also made calls more secure because analog scanners could not
access digital signals. IS-136 added a number of features to the original IS-54
specification, including text messaging, circuit switched data (CSD), and an
improved compression protocol. SMS and CSD were both available as part of
19
magnitude change of the channel to become uncorrelated from its previous
value.
• Slow fading
arises when the coherence time of the channel is large relative to the
delay constraint of the channel. In this regime, the amplitude and phase
change imposed by the channel can be considered roughly constant over
the period of use. Slow fading can be caused by events such as
shadowing, where a large obstruction such as a hill or large building
obscures the main signal path between the transmitter and the receiver.
The amplitude change caused by shadowing is often modeled using a log-
normal distribution with a standard deviation according to the log-distance
path loss model.
• Fast fading
occurs when the coherence time of the channel is small relative to the
delay constraint of the channel. In this regime, the amplitude and phase
change imposed by the channel varies considerably over the period of
use.
A proper power control on both the uplink and downlink has several
advantages: System capacity is improved or optimized. Mobile battery life is
extended. Radio path impairments are properly compensated for. Quality of
service (QoS) at various bit rates can be maintained. The reverse link (uplink)
uses a combination of open loop and closed loop power control to command
the mobile station to make power adjustments The mobile station and the
base station receiver measure the received power and use the measurements
to maintain a power level for adequate performance. The mobile unit
measurement is part of the open loop power control while the base station
measurement is part of the closed loop power control. In the closed loop
mode, the mobile station transmitter power is controlled by a signal from the
base station site. Each base station demodulator measures the received SNR
for that mobile station and sends a power command either to increase or
decrease mobile station power. The measure-command-react cycle is
performed at a rate of800 times per second for each mobile station in IS-95.
The power adjustment command is combined with the mobile’s open loop
estimate and the result is used to adjust the transmitter gain. This solves the
near far interference problem, reduces interference to other mobiles using the
same. CDMA radio channel, helps to overcome fading, and conserves battery
power in portable and mobile units. On the uplink, the objective of the mobile
station is to produce a nominal received power signal at the base station
receiver. Regardless of the mobile’s position or propagation loss, each mobile
21
should be received at the base station with almost the same power level. If
the mobile’s signal arrives at the base station with a lower power level than
the required power level, its error rate performance will be high. On the other
hand, if the mobile’s signal is too high, it will interfere with other users with the
same CDMA radio channel causing performance degradation unless the
traffic load is decreased. Similarly, a combination of open loop and closed
loop power control is used on the forward link (downlink) to keep SNR at the
mobile almost constant. Forward link power control mitigates the corner
problem. Mobiles at the edges of cells normally require more power than
those close to the center of the base station for two reasons: more
transmission loss and more interference from adjacent base stations. This is
known as the corner problem. Forward link power control minimizes
interference to mobiles in the same base station (in multipath environments)
as well as mobiles in other base stations. Using the downlink power control,
the base station transmits the minimum required power, hence, minimizes the
interference to mobiles in the surrounding base stations. The outer loop power
control is the finer power control over the closed loop power control. It adjusts
the target signal-to-interference ratio (SIR) in the base station according to the
needs of the individual radio links and aims at a constant quality, which is
usually defined as a certain target bit error rate (BER) or frame error ratio
22
(FER). The required SIR depends on the mobile speed and multipath profile.
The outer loop power control is typically implemented by having the base
station to each uplink user data frame with frame quality indicator, such as a
cyclic redundancy check (CRC) result, obtained during decoding of the
particular user data frame.
GSM uses a variety of channels in which the data is carried. In GSM, these
channels are separated into physical channels and logical channels. The
Physical channels are determined by the timeslot, whereas the logical
channels are determined by the information carried within the physical
channel. It can be further summarised by saying that several recurring
timeslots on a carrier constitute a physical channel. These are then used by
different logical channels to transfer information. These channels may either
be used for user data (payload) or signalling to enable the system to operate
correctly.The channels may also be divided into common and dedicated
channels. The forward common channels are used for paging to inform a
mobile of an incoming call, responding to channel requests, and broadcasting
bulletin board information. The return common channel is a random access
channel used by the mobile to request channel resources before timing
information is conveyed by the BSS.The dedicated channels are of two main
types: those used for signalling, and those used for traffic. The signalling
channels are used for maintenance of the call and for enabling call set up,
providing facilities such as handover when the call is in progress, and finally
terminating the call. The traffic channels handle the actual payload.
23
BCCH - Broadcast Network information, e.g. for describing the current
control channel structure. The BCCH is a point-to-multipoint channel
(BSS-to-MS).
FACCHt - For time critical signalling over the TCH (e.g. for handover
signalling). Traffic burst is stolen for a full signalling burst.
FACCHs - FACCH for the SDCCH. The SDCCH burst is stolen for a
full signalling burst. Function not clear in the present version of GSM
(could be used for e.g. handover of an eight-rate channel, i.e. using a
"SDCCH-like" channel for other purposes than signalling).
The choice of frequencies allocated to HIPERLAN was part of the 5-5.30 GHz
band being allocated globally to aviation purposes. The Aviation industry only
used the 5-5.15GHz frequency, thus making the 5.15-5.30 frequency band
accessible to HIPERLAN standards. HIPERLAN is designed to work without
any infrastructure. Two stations may exchange data directly, without any
interaction from a wired (or radio-based) infrastructure. The simplest
25
HIPERLAN thus consists of two stations. Further, if two HIPERLAN stations
are not in radio contact with each other, they may use a third station (i.e. the
third station must relay messages between the two communicating stations).
Products compliant to the HIPERLAN 5 GHz standard shall be possible to
implement on a PCMCIA Type III card. Thus the standard will enable users to
truly take computing power on the road.
The control and management of mobile ad-hoc network is distributed among the
participating nodes. Each node is responsible to forward packet to other nodes in the
networks. The nodes are also collaborate themselves to implement network routine
functions such as security. Nodes in mobile ad-hoc network are highly mobile which
causes network topology to change rapidly and unpredictably. Moreover the
connectivity among the hosts varies with time. In most cases, mobile ad-hoc
26
networks operate on low power devices. Normally these devices have low CPU
process capability and small memory sizes, thus affect the capability of the mobile
ad-hoc network to reach other devices. Routing in mobile ad-hoc network, meaning
transferring packets from source to destination, is different than traditional routing in
a fixed network. Routing in mobile ad-hoc networking depends on many factors
which includes topology, selection of routers, initiation of request and available
bandwidth.
• Max out the processor's usage, preventing any work from occurring.
• Trigger errors in the microcode of the machine.
• Trigger errors in the sequencing of instructions, so as to force the
computer into an unstable state or lock-up.
• Exploit errors in the operating system, causing resource starvation and/or
thrashing, i.e. to use up all available facilities so no real work can be
accomplished.
• Crash the operating system itself.
• A permanent denial-of-service (PDoS), also known loosely as phlashing is
an attack that damages a system so badly that it requires replacement or
reinstallation of hardware. Unlike the distributed denial-of-service attack, a
PDoS attack exploits security flaws which allow remote administration on
the management interfaces of the victim's hardware, such as routers,
printers, or other networking hardware. The attacker uses these
28
vulnerabilities to replace a device's firmware with a modified, corrupt, or
defective firmware image—a process which when done legitimately is
known as flashing. This therefore "bricks" the device, rendering it unusable
for its original purpose until it can be repaired or replaced.
• The PDoS is a pure hardware targeted attack which can be much faster
and requires fewer resources than using a botnet in a DDoS attack.
Because of these features, and the potential and high probability of
security exploits on Network Enabled Embedded Devices (NEEDs), this
technique has come to the attention of numerous hacker communities.
Signals in wireless networks are omni directional and spread beyond the
desired coverage area. Due to this weakness, many active and passive
methods are available for doing attacks in wireless network transmission.
Inserting the data into wireless networks or modifying any transmitted data is
called active method whereas passive methods include monitoring the traffic
in promiscuous mode to get information about wireless networks.Major
security threats which are possible in wireless networks are as follows:
· Spoofing Threat:
Another major threat in wireless networks is ‘MAC Address Spoofing’ which
alters the manufacture assigned MAC address to any other value. This is
29
conceptually different than traditional IP address spoofing where an attacker
sends data from any arbitrary source address and does not expect to see a
response to their actual source IP address. An attacker may choose ‘MAC
Address Altering’ for several reasons, e.g. to bypass access control list, to
impersonate an already authenticated user or disguising his/her presence on
the network.
· Jamming Threat:
30
One of the most famous security threats for wireless networks is jamming. In
this, the attacker operates on the same frequency and channel of the target
network. He/she operates at higher power, thus disabling the actual access
point. Sometimes, the network arrives at standstill position and user fears that
network is attacked.
31
one medium impinges upon another medium with different electromagnetic
properties. The amplitude and phase of the reflected wave are strongly
related to the medium’s instrinsic impedance, incident angle, and electric field
polarization. Part of the radio wave energy may be absorbed or propagated
through the reflecting medium, resulting in a reflected wave that is attenuated.
Diffraction is a phenomenon by which propagating radio waves bend or
deviate in the neighborhood of obstacles. Diffraction results from the
propagation of wavelets into a shadowy region caused by obstructions such
as walls, buildings, mountains, and so on. Scattering occurs when a radio
signal hits a rough surface or an object having a size much smaller than or on
the order of the signal wavelength. This causes the Signal energy to spread
out in all directions. Scattering can be viewed at the receiver as another radio
wave source. Typical scattering objects are furniture, lamp posts, street signs,
and foliage.
12. Write short note on frequency reuse and hexagonal cell pattern
Frequency reuse
As the traffic grows, new cells and channels are added to the system. If an
irregular cell pattern is selected, it would lead to an inefficient use of the
spectrum due to its inability to reuse frequencies because of cochannel
interference. In addition, it would also result in an uneconomical deployment
of equipment, requiring relocation from one cell site to another. Therefore, a
33
great deal of engineering effort would be required to readjust the
transmission, switching, and control resources every time the system goes
through its development phase. The use of a regular cell pattern in a cellular
system design eliminates all these difficulties. In reality, cell coverage is an
irregularly shaped circle. The exact coverage of the cell depends on the
terrain and many other factors. For design purposes and as a first-order
approximation, we assume that the coverage areas are regular polygons. For
example, for omnidirectional antennas with constant signal power, each cell
site coverage area would be circular. To achieve full coverage without dead
spots, a series of regular polygons are required for cell sites. Any regular
polygon such as an equilateral triangle, a square, or a hexagon can be used
for cell design.The hexagon is used for two reasons: a hexagonal layout
requires fewer cells and, therefore, fewer transmitter sites, and a hexagonal
cell layout is less expensive compared to square and triangular cells. In
practice, after the polygons are drawn on a map of the coverage area, radial
lines are drawn and the signal-to-noise ratio (SNR) calculated for various
directions using the propagation
34
MS 3
MS 2 MS 4
MS 1 MS n
Random access
i. ALOHA
ii. Slotted ALOHA
iii. Carrier Sense Multiple Access
iv. Carrier Sense Multiple Access with Collision Detection
Scheduling approaches to medium access control
35
i. Reservation systems
ii. Polling
In the mid-l980s, several researchers saw the potential for a technology primarily
used in military applications to also be used for cellular communications. This
technology, spread spectrum communications, which involve transforming
narrowband information to a wideband signal for transmission, was seen as a mean
of addressing potential capacity limitations of TDMA systems (which result from the
fact that the number of users on any single frequency is restricted by the number of
available time slots). A spread spectrum system operates by transforming the
narrowband information of an individual user into wideband information by using
high- frequency codes, each unique for that particular user. By assigning different
users unique codes, a multiple-access system is possible, i.e, code division multiple
access (CDMA). Moreover, in a CDMA system, frequency reuse limitations Seen in
FDMA and TDMA systems are not quite so critical, as multiple mobile stations and
base stations can occupy the same frequencies at once. Qualcomm Incorporated in
San Diego, California, developed the first CDMA cellular system for widespread
deployment in the early 1990s, culminating with the standardization of Qualcomm's
CDMA solution by the Telecommunications Industry Association (TIA) in 1992.
More recently, CDMA has formed the basis for enhancing cellular systems around
the world. CDMA spread spectrum systems come in two types: frequency hopped
and direct sequence. CDMA using frequency hopping involves a user transmitting
over multiple frequencies consecutively in time in a pseudorandom manner.
Pseudorandom in this case refers to the fact that the sequence of transmission
frequencies is known at the transmitter and receiver, but appears random to any
other receiver. An example of a frequency hopping sequence is given in Figure 1.
Slow-hopping systems involve a changing of frequencies at a slower rate than the
information bit rate, whereas fast-hopping requires a much faster change of the
transmission frequency than the information bit rate. Frequency hopped systems are
limited by the total number of hopping frequencies available. If two users hop to the
same frequency at once, they will interfere with one another.Direct-sequence
36
systems work by modulating the user's information signal with a sequence known to
the receiver and transmitter. This sequence is generated at a much higher rate than
the user signal, literally "spreading" the user's signal bandwidth. This process is
illustrated in Figure 2. All commercial cellular CDMA systems use direct-sequence
spreading as opposed to frequency hopping.
37
Ten Marks questions
1921 - Detroit Michigan Police Dept. made the earliest significant use of
Mobile radio in a vehicle in the United States. The system operated at a
frequency close to 2 MHz. The channels soon became overcrowded.
1945 - First public mobile telephone system in the U.S. was inaugurated in St.
Louis, Missouri with three channels at 150 MHz. Six channels spaced 60 kHz
apart were allocated for this service by the FCC, but the mobile equipment
was not sophisticated enough to prevent interference.
38
1955 - Number of wire line channels available at 150 MHz was expanded
from 5 to 11 by the creation of new channels between the old ones (channel
spacing of 30 kHz).
1956 - 12 wire line channels were added near 450 MHz. All systems operated
in a manual mode, with each call to or from a mobile unit being handled by a
special mobile telephone operator.
1964 - A new system (150 MHz) was developed providing automatic channel
selection for each call, eliminated the need to push-to-talk operation, and
allowed customers to do their own dialing.
1969 - Automatic capability was extended to the 450 MHz band and the so
called "Improved Mobile Telephone System" (IMTS) became the standard for
mobile telephone service in the U.S.
As early as 1947, it was realized that small cells with frequency reuse could
increase traffic capacity substantially and the basic cellular concept was
developed. However, the technology did not exist.
1974 - FCC makes a firm allocation of 40 MHz for mobile telephone service
and solicited applications for developmental Systems to prove the feasibility of
so-called "Cellular Systems" but because of the beginnings of Bell Systems
divestiture proceedings, ruled that Western Electric could not manufacture
cellular terminal equipment. This was because Western Electric makes the
39
network equipment and the restriction from selling both terminal and network
products were to prevent further monopolization.
1978 - Mid 1978 the Equipment Test phase commenced. The Service Test-
phase started in late 1978. Twenty-one hundred mobile sets were procured
from three suppliers for the test and the system served over 2000 trial
customers.
1981 - FCC issues standard rules and due to the direction already taken, In
the Bell System divestiture proceedings, now rules that Western Electric is
permitted to manufacture cellular terminals as well as the network equipment.
In the years between 1974 and 1981, AT&T Bell Labs worked with all other cellular
terminal vendors to develop their cellular phones so that consumers would have
quality products available to use on the cellular network.
40
during the CP, for positive acknowledgments during the CP, and to end the
CFP. Data frames are used for the transmission of data during the CP and
CFP, and can be combined with polling and acknowledgments during the
CFP. The standard IEEE 802.11 frame format is illustrated in Fig. 1 The IEEE
standard 48-bit MAC addressing is used to identify a station. The 2 duration
octets indicate the time (in microseconds) the channel will be allocated for
successful transmission of a MAC protocol data unit (MPDU). The type bits
identify the frame as either control, data or management. The subtype bits
further identify the type of frame (e.g., Clear to Send control frame). A 32-bit
cyclic redundancy check (CRC) is used for error detection.
42
transmits a positive acknowledgment frame (ACK) back to the source station,
indicating that the transmission was successful.
used to determine the frequency with which the PCF occurs. Within a
repetition interval, a portion of the time is allotted to contention-free traffic, and
the remainder is provided for contention-based traffic. The CFP repetition
interval is initiated by a beacon frame, where the beacon frame is transmitted
by the AP. One of its primary functions is synchronization and timing. The
duration of the CFP repetition interval is a manageable parameter that is
always an integral number of beacon frames. Once the CFP_Rate is
43
established, the duration of the CFP is determined. The maximum size of the
CFP is determined by the manageable parameter CFP_Max_Duration. The
minimum value of CFP_Max_Duration is the time required to transmit two
maximum-size MPDUs, including overhead, the initial beacon frame, and a
CF-End frame. The maximum value of CFP_Max_Duration is the CFP
repetition interval minus the time required to successfully transmit a
maximumsize MPDU during the CP (which includes the time for RTS/CTS
handshaking and the ACK). Therefore, time must be allotted for at least one
MPDU to be transmitted during the CP. It is up to the AP to determine how
long to operate the CFP during any given repetition interval. If traffic is very
light, the AP may shorten the CFP and provide the remainder of the repetition
interval for the DCF. The CFP may also be shortened if DCF traffic from the
previous repetition interval carries over into the current interval. The maximum
amount of delay that can be incurred is the time it takes to transmit an
RTS/CTS handshake, maximum MPDU, and ACK
The IEEE 802.11 draft specification calls for three different physical-layer
implementations: They are
frequency hopping spread spectrum (FHSS),
direct sequence spread spectrum (DSSS), and
Infra Red.
The FHSS utilizes the 2.4 GHz Industrial, Scientific, and Medical (ISM) band
(i.e., 2.4000–2.4835 GHz). In the United States, a maximum of 79 channels
are specified in the hopping set. The first channel has a center frequency of
2.402 GHz, and all subsequent channels are spaced 1 MHz apart. The 1 MHz
separation is mandated by the FCC for the 2.4 GHz ISM band. The channel
separation corresponds to 1 Mb/s of instantaneous bandwidth. Three different
hopping sequence sets are established with 26 hopping sequences per set.
Different hopping sequences enable multiple BSSs to coexist in the same
geographical area, which may become important to alleviate congestion and
maximize the total throughput in a single BSS. The reason for having three
44
different sets is to avoid prolonged collision periods between different hopping
sequences in a set. The minimum hop rate permitted is 2.5 hops/s. The basic
access rate of 1 Mb/s uses two-level Gaussian frequency shift keying (GFSK),
where a logical 1 is encoded using frequency Fc + f and a logical 0 using
frequency Fc – f. The enhanced access rate of 2 Mb/s uses four-level GFSK,
where 2 bits are encoded at a time using four frequencies.
The DSSS also uses the 2.4 GHz ISM frequency band, where the 1 Mb/s
basic rate is encoded using differential binary phase shift keying (DBPSK),
and a 2 Mb/s enhanced rate uses differential quadrature phase shift keying
(DQPSK). The spreading is done by dividing the available bandwidth into 11
subchannels, each 11 MHz wide, and using an 11-chip Barker sequence to
spread each data symbol. The maximum channel capacity is therefore (11
chips/ symbol)/(11 MHz) = 1 Mb/s if DBPSK is used. Overlapping and
adjacent BSSs can be accommodated by ensuring that the center frequencies
of each BSS are separated by at least 30 MHz [3]. This rigid requirement will
enable only two overlapping or adjacent BSSs to operate without interference.
45
Fig IEEE 802.11 physical layer activities
The IR specification identifies a wavelength range from 850 to 950 nm. The IR
band is designed for indoor use only and operates with nondirected
transmissions. The IR specification was designed to enable stations to receive
line-of-site and reflected transmissions. Encoding of the basic access rate of 1
Mb/s is performed using 16-pulse position modulation (PPM), where 4 data
bits are mapped to 16 coded bits for transmission. The enhanced access rate
(2 Mb/s) is performed using 4-PPM modulation, where 2 data bits are mapped
to 4 coded bits for transmission.
IEEE 802.11a makes use of 5-GHz band and Provides rates of 6, 9 ,
12, 18, 24, 36, 48, 54 Mbps. It uses orthogonal frequency division multiplexing
(OFDM) as the physical layer. It is basically a multicarrier system in which the
46
subcarriers used are orthogonal to each other. The subcarriers are modulated
using BPSK, QPSK, 16-QAM or 64-QAM.
IEEE 802.11b standard provides data rates of 5.5 and 11 Mbps. In this
case the barker code used for spreading is replaced by complementary code
keying (CCK) modulation scheme shown below.
4. Explain in detail about the Mobile radio standards around the world.
The world’s first cellular system was implemented by the Nippon Telephone
and Telegraph Company (NTT) in Japan. The system deployed in 1979, uses
6—FM Duplex channels (25 KHz for each one way link) in the 800 MHz band.
47
MHz
824-894
NAMPS cellular 1992 FDMA FM 10 KHz
MHz
824-894 π/4-
USDC cellular 1991 TDMA 30KHz
MHz DQPSK
FH/ 824-894
CDPD cellular 1993 GMSK 30 KHz
packet MHz
824-894
Cellular/ QPSK/
IS-95 1993 CDMA MHz/ 1.25 MHz
PCS BPSK
1.8-2.0 GHz
DCS-900 1.85-1.99
PCS 1994 TDMA GMSK 200 KHz
(GSM) GHz
SMR/PC
MIRS 1994 TDMA several 16-QAM 25 KHz
S
SMR/PC
iDen 1995 TDMA several 16-QAM 25 KHz
S
48
Introduction Access band Bandwidth
450-470
NMT-450 Cellular 1981 FDMA FM 25 KHz
MHz
890-960
NMT-900 Cellular 1986 FDMA FM 12.5 KHz
MHz
Cellular/ 890-960
GSM 1990 TDMA GMSK 200 KHz
PCS MHz
450-465 20 KHz/
C-450 Cellular 1985 FDMA FM
MHz 10 KHz
864-868
CT2 Cordless 1989 FDMA GFSK 100 KHz
MHz
1880-1900
DECT Cordless 1993 TDMA GFSK 1.728 MHz
MHz
The first generation European cellular systems are generally incompatible with one
another because of the different frequencies and communication protocols used.
49
π/4-
PDC Cellular 1993 TDMA 810-1501 MHz 25 KHz
DQPSK
π/4-
PHS Cordless 1993 TDMA 1895-1907 MHZ 300 KHz
DQPSK
Two security services are specified in IEEE 802.11, the authentication service and
the privacy service. The privacy service is provided by Wired Equivalent Privacy
(WEP) algorithm. The authentication service provides two basic levels of security.
The first, Open System Authentication (OSA) is mandatory, but provides essentially
no security.The second is shared-key authentication that provides the highest level
of security available and uses the WEP algorithm.
50
stage which causes the keystream to vary as a function of IV and the key. That is:
Given:
The plaintext pj and RC4(IV, Key)
Form: cj = pj Å RC4(IV, Key)
Encryption is shown on the left and decryption on the right side of Figure 1.
Since IV must be known to the transmitter and receiver, it is sent to the receiver as
an unencrypted part of the ciphertext stream. The logic function to insert IV into the
ciphertext stream and recover it from the stream for input to the I function at the
receiving end are not shown, but are straightforward functions. IV does not have to
be secret since RC4’s strength is derived from the algorithm and key, not IV.
However, the integrity of IV needs to be assured or decryption will not function
properly. The RC4 algorithm supports variable length keys. The two lengths most
commonly used for wireless applications are 40 bits for export controlled systems
and 128 bits for domestic application. Although most vendors advertise 128 bit
encryption, the effective key length is 104 bits . One of the primary requirements of
stream ciphers in general and RC4 as well is that the implementation must ensure
that the keystream is never used twice to encrypt a data stream.
51
Authentication
Prior to sending data, a station (i.e., a wireless device) and an access point must
authenticate and establish an association. An association is a binding between the
station and the access point. Once successfully authenticated and associated
stations can exchange data with the access point (i.e., enter the network). The two
authentication methods supported are
Open System authentication and
Shared key Authentication.
54
The backbone network consists of several entities between the PSTN and the base
station. The base station usually interfaces with a base station controller (BSC),
which networks a cluster of base stations to ensure that call admission and handover
can function in a coordinated manner among base stations within a geographical
region. A cluster is a group of cells that use the complete set of available telephony
channels in a cellular network. One or more BSCs are usually connected to a mobile
switching center (MSC), which interfaces directly with the PSTN. The MSC
contains information about the cellular subscriber that can be used to route other
information to that user during the call. Moreover, a home location register (HLR)
may be co-located with the MSC; this entity contains user-specific information used
primarily for authentication of the subscriber during call initialization. The
intercommunication between the mobile station, base station, BSC and MSC is
shown in Figure 1-2. A cellular telephone system has two basic functions; it must
locate and track both active and inactive mobile stations (MSs), and it must always
attempt to connect the active MSs to the best available base station(s) (BS(s)). The
former task is the subject of user location updating and paging. The latter task
requires the continuous evaluation of the radio link quality with the serving BS(s),
and the radio link quality with alternate BSs. This monitoring is performed by a
computer system that uses knowledge of the link quality evaluations, in addition to
55
the system topology and traffic flow, to decide upon the best BS(s) to serve a
particular MS.
RC4 is a stream cipher designed in 1987 by Ron Rivest for RSA Security. It is a
variable keysize stream cipher with byte-oriented operations. The algorithm is based
on the use of a random permutation. Eight to sixteen machine operations are
required per output byte, and the cipher can be expected to run very quickly in
software. RC4 was kept as a trade secret by RSA Security. A variable-length key of
from 1 to 256 bytes (8 to 2048 bits) is used to initialize a 256-byte state vector S,
with elements S[0], S[1], …, S[255]. At all times, S contains a permutation of all 8-bit
numbers from 0 through 255. For encryption and decryption, a byte k is generated
from S by selecting one of the 255 entries in a systematic fashion. As each value of k
is generated, the entries in S are once again permuted.
Initialization of S
To begin, the entries of S are set equal to the values from 0 through 255 in
ascending order; that is;
S[0] = 0, S[1] = 1, …, S[255] = 255.
56
A temporary vector, T, is also created. If the length of the key K is 256 bytes, then K
is transferred to T. Otherwise, for a key of length keylen bytes, the first keylen
elements of T are copied from K and then K is repeated as many times as necessary
to fill out T. These preliminary operations can be summarized as follows:
/* Initialization */
for i = 0 to 255 do
S[i] = i;
T[i] = K[i mod keylen];
Next we use T to produce the initial permutation of S. This involves starting with S[0]
and going through to S[255], and, for each S[i], swapping S[i] with another byte in S
according to a scheme dictated by T[i]:
/* Initial Permutation of S */
j = 0;
for i = 0 to 255 do
j = (j + S[i] + T[i]) mod 256;
Swap (S[i], S[j]);
Because the only operation on S is a swap, the only effect is a permutation. S still
contains all the numbers from 0 through 255.
Stream Generation
Once the S vector is initialized, the input key is no longer used. Stream generation
involves starting with S[0] and going through to S[255], and, for each S[i], swapping
S[i] with another byte in S according to a scheme dictated by the current
configuration of S. After S[255] is reached, the process continues, starting over again
at S[0]:
/* Stream Generation */
i, j = 0;
while (true)
i = (i + 1) mod 256;
j = (j + S[i]) mod 256;
Swap (S[i], S[j]);
t = (S[i] + S[j]) mod 256;
57
k = S[t];
To encrypt, XOR the value k with the next byte of plaintext. To decrypt, XOR the
value k with the next byte of ciphertext.
58
Fig 2 RC4
59
GPRS is different from the older Circuit Switched Data (or CSD) connection included
in GSM standards. In CSD, a data connection establishes a circuit, and reserves the
full bandwidth of that circuit during the lifetime of the connection. GPRS is packet-
switched which means that multiple users share the same transmission channel,
only transmitting when they have data to send. This means that the total available
bandwidth can be immediately dedicated to those users who are actually sending at
any given moment, providing higher utilisation where users only send or receive data
intermittently. Web browsing, receiving e-mails as they arrive and instant messaging
are examples of uses that require intermittent data transfers, which benefit from
sharing the available bandwidth.The multiple access methods used in GSM with
GPRS is based on frequency division duplex (FDD) and FDMA. During a session, a
user is assigned to one pair of uplink and downlink frequency channels. This is
combined with time domain statistical multiplexing, i.e. packet mode communication,
which makes it possible for several users to share the same frequency channel. The
packets have constant length, corresponding to a GSM time slot. In the downlink,
first-come first-served packet scheduling is used. In the uplink, a scheme that is very
similar to reservation ALOHA is used. This means that slotted Aloha (S-ALOHA) is
used for reservation inquiries during a contention phase, and then the actual data is
transferred using first-come first-served scheduling.
Transfer speed depends also on the channel encoding used. The least robust (but
fastest) coding scheme (CS-4) is available near the Base Transceiver Station (BTS)
while the most robust coding scheme (CS-1) is used when the Mobile Station (MS) is
further away from the BTS.Using the CS-4 it is possible to achieve a user speed of
20.0 kbit/s per time slot. However, using this scheme the cell coverage is 25% of
normal. CS-1 can achieve a user speed of only 8.0 kbit/s per time slot, but has 98%
of normal coverage. Newer network equipment can adapt the transfer speed
automatically depending on the mobile location.
GPRS upgrades GSM data services providing:
61
grouped into what is called a TDMA frame. Half rate channels use alternate frames
in the same timeslot. The channel data rate is 270.833 kbit/s, and the frame duration
is 4.615 ms.The transmission power in the handset is limited to a maximum of 2
watts in GSM850/900 and 1 watt in GSM1800/1900.
GSM has used a variety of voice codecs to squeeze 3.1kHz audio into between 6
and 13kbps. Originally, two codecs, named after the types of data channel they were
allocated, were used, called "Full Rate" (13kbps) and "Half Rate" (6kbps). These
used a system based upon linear predictive coding (LPC). In addition to being
efficient with bitrates, these codecs also made it easier to identify more important
parts of the audio, allowing the air interface layer to prioritize and better protect these
parts of the signal.GSM was further enhanced in the mid-nineties with the GSM-EFR
codec, a 12.2kbps codec that uses a full rate channel. Finally, with the development
of UMTS, EFR was refactored into a variable-rate codec called AMR-Narrowband,
which is high quality and robust against interference when used on full rate channels,
and less robust but still relatively high quality when used in good radio conditions on
62
half-rate channels.There are four different cell sizes in a GSM network - macro,
micro, pico and umbrella cells. The coverage area of each cell varies according to
the implementation environment. Macro cells can be regarded as cells where the
base station antenna is installed on a mast or a building above average roof top
level. Micro cells are cells whose antenna height is under average roof top level; they
are typically used in urban areas. Picocells are small cells whose diameter is a few
dozen meters; they are mainly used indoors. On the other hand, umbrella cells are
used to cover shadowed regions of smaller cells and fill in gaps in coverage between
those cells.
Cell radius varies depending on antenna height, antenna gain and propagation
conditions from a couple of hundred meters to several tens of kilometers. The
longest distance the GSM specification supports in practical use is 35 km or 22
miles. There are also several implementations of the concept of an extended cell,
where the cell radius could be double or even more, depending on the antenna
system, the type of terrain and the timing advance.Indoor coverage is also supported
by GSM and may be achieved by using an indoor picocell base station, or an indoor
repeater with distributed indoor antennas fed through power splitters, to deliver the
radio signals from an antenna outdoors to the separate indoor distributed antenna
system. These are typically deployed when a lot of call capacity is needed indoors,
for example in shopping centers or airports. However, this is not a prerequisite, since
indoor coverage is also provided by in-building penetration of the radio signals from
nearby cells.
The modulation used in GSM is Gaussian minimum shift keying (GMSK), a kind of
continuous-phase frequency shift keying. In GMSK, the signal to be modulated onto
the carrier is first smoothed with a Gaussian low-pass filter prior to being fed to a
frequency modulator, which greatly reduces the interference to neighboring channels
(adjacent channel interference).
Network structure
The network behind the GSM system seen by the customer is large and
complicated in order to provide all of the services which are required. It is divided into a
number of sections and these are each covered in separate articles.
63
• the Base Station Subsystem (the base stations and their controllers).
• the Network and Switching Subsystem (the part of the network most similar to
a fixed network). This is sometimes also just called the core network.
• the GPRS Core Network (the optional part which allows packet based Internet
connections).
• all of the elements in the system combine to produce many GSM services
such as voice calls and SMS.
One of the key features of GSM is the Subscriber Identity Module (SIM), commonly
known as a SIM card. The SIM is a detachable smart card containing the user's
subscription information and phonebook. This allows the user to retain his or her
information after switching handsets.
GSM security
GSM was designed with a moderate level of security. The system was designed to
authenticate the subscriber using shared-secret cryptography. Communications
between the subscriber and the base station can be encrypted. GSM uses several
cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for
ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger
algorithm used within Europe and the United States; A5/2 is weaker and used in
other countries. A large security advantage of GSM over earlier systems is that the
Ki, the crypto variable stored on the SIM card that is the key to any GSM ciphering
algorithm, is never sent over the air interface. Serious weaknesses have been found
in both algorithms, and it is possible to break A5/2 in real-time in a ciphertext-only
attack. The system supports multiple algorithms so operators may replace that
cipher with a stronger one.
When the two antennas (transmitting and receiving) are on the earth, then there are
multiple paths from the transmitter to the receiver. The effect of the multiple paths is
the change in the path loss between two points. The simplest case is when the
64
antenna heights, hb and hm, are small compared with their separation, d, and the refl
ecting earth surface is assumed to be flat. The received signal is then represented
by a scattered fi eld, Es, that is approximated by a combination of a direct wave and
reflected wave
(1)
(2)
where:
∆d _ difference between direct path and refl ected path
In the mobile radio environment, c r = -1, and ∆θ is much less than one
65
radian. Thus Equation 2 can be written as
(3)
Since the received power Pr is proportional to the square of the field strength,
the power level at the antenna output located at the distance, d, from the transmitter,
including the path loss, will be:
(4)
From fig.1
(5)
(6)
66
(7)
(8)
67
and monitors what each station is transmitting. Thus the hub station is involved in
managing user access to the network. All standardized cellular mobile telephone and
wireless data systems use an infrastructure network topology to serve mobile
terminals operating within the coverage area of any BS. The IEEE 802.11 standard
and most of the wireless LAN products support infrastructure operation
This type of network topology applies to reconfigurable networks that can operate
without the need for a fixed infrastructure. These networks are primarily used by
the military and also in a few commercial applications for voice and data
transmission. Such a topology is suitable for rapid deployment of a wireless network
in a mobile or fixed environment. Fig 2 shows two variations of the ad hoc network
topology. Fig 2.a is a single hop ad hoc network where, as the name implies every
user terminal has the functional capability of communicating directly with any of the
other user terminals. The IEEE 802.11 WLAN standard supports single hop as hoc
topology.
68
Fig 2.Ad hoc networking (a) single hop peer to peer topology (b) multi hop ad hoc
network topology
In some as hoc networking applications, where users may be distributed over a wide
area, a given user terminal may be able to reach only a portion of the other users in
the network due to transmitter signal power limitations. In this situation, user
terminals will have to co-operate in carrying messages across the network between
widely separated stations. Networks designed to function this way are called
multihop ad hoc networks and is illustrated in fig2.b. In this type of network each
terminal should be aware of the neighboring terminals in its coverage range. This
type of network configuration is used in military applications.
12. Explain in detail the ALOHA and slotted ALOHA random access protocols
used in wireless systems
ALOHA
This is a single hop system with infinite users. Each user generates packets of
data according to a Poisson process with arrival rate λ (packets/sec) and all
packets have the same fixed length T. In this scheme, when the MS has a packet
to transmit, it transmits the packet right away. The sender side also waits to see
whether transmission is acknowledged by the receiver; no response within a
specified period of time indicates a collision with another transmission. If the
69
presence of a collision is determined by the sender, it retransmits after some
random wait time, as shown in fig.1 where the arrows indicate the arrival times.
It is assumed that this scheduling process is a Poisson process with arrival time
g. Consider a new or retransmitted packet scheduled for transmission at some
instant t. This packet can be successfully transmitted if there are no other
packets scheduled for transmission between the instants t-T and t+ T , where
the period 2T is called the vulnerable period. Therefore, the probability, Ps of
successful transmission is the probability that no packet is scheduled in an
interval of length 2T. Since the distribution of the scheduling time is assumed to
be Poisson process,
Since packets are scheduled at a rate of g packets per second with only a
fraction of Ps successful, the rate of successful transmission is g Ps . Defining
70
throughput as the fraction of time during which the useful information is carried on
the channel, it can be written as
Where G=gT is the normalized offered load to the channel. The maximum
throughput Sth max can be obtained by differentiating eq.(2) w.r.t G. It is found that
the maximum throughput occurs when G=1/2. Substituting in eq(2),
Slotted ALOHA
This is a modification of the ALOHA and in this scheme, the slot size is taken
as equal to the duration of the packet transmission T. Thus the vulnerable period
for packet collision is reduced to a slot. It means that a transmission is successful
if and only if one packet is scheduled for transmission for the current slot. Fig.2
shows the collision mechanism in slotted ALOHA where a collision is observed
to be a full collision; thus, no partial collision occurs.
Ps = e-gT (4)
The maximum throughput Sth max can be obtained by differentiating eq.(5) w.r.t G.
It is found that the maximum throughput occurs when G=1. Substituting in eq(5),
71
Fig.2 Collision mechanism in slotted ALOHA
13. Explain in detail the CSMA and CSMA/CD random access protocols used in
wireless systems
72
Fig 1. Collision mechanism in CSMA
In this protocol, the MS senses the medium first whenever the MS has a packet to
send. If the medium is busy, the MS waits for a random amount of time and senses
the medium again. If the medium is idle, the MS transmits the packet immediately. If
a collision occurs, the MS waits for a random amount of time and starts all over
again. The packets can be sent during a slotted period or can be transmitted at any
arbitrary time. This leads to two different subcategories.
Ge −αG
S th = (1)
G (1 + 2α ) + e −αG
αGe −αG
S th = (2)
(1 − e −αG ) + α
73
where α = τ , and τ is the propagation delay through the air.
T
Persistent CSMA
a. 1 persistent CSMA
b. p persistent CSMA
In 1 persistent CSMA protocol, the MS senses the medium when the MS has a
packet ready to send. If the medium is busy, the MS keeps listening to the medium
and transmits the packet immediately after the medium becomes idle. This protocol
is called 1 persistent because the MS transmits with a probability of 1 whenever it
finds the medium to be idle. However, in this protocol, there will always be a collision
if two or more MSs have ready packets, are waiting for the medium to become free,
and start transmitting at the same time. The two variants of this protocol are
unslotted 1 persistent CSMA and slotted 1 persistent CSMA. Given the system
parameters G and α, the throughput for unslotted 1 persistent CSMA is given by
αG
G1+ G +αG(1+ G + )e−G(1+2α)
Sth =
2
(3)
G(1+ 2α) − (1− e ) + (1+αG)e−G(1+α)
−αG
G (1 + α − e −αG )e −G (1+α )
S th = (4)
(1 + α )(1 − e −αG ) + αe −G (1+α )
In p persistent CSMA protocol, the time is slotted. In this protocol, the MS senses
the medium when it has a packet to send. If the medium is busy, the MS waits until
the next slot and checks the medium again. If the medium id idle, the MS transmits
74
with probability p or deters transmission with probability (1-p) until the next slot. If a
collision occurs, the MS waits for a random amount of time and starts all over again.
Intuitively, this protocol is considered as an optimal access strategy. If N terminals
have a packet to send, Np, the expected number of terminals will attempt to transmit
once the medium becomes idle. If Np>1, then a collision is expected. Therefore, the
network should make sure that Np≤1.
In a typical CSMA protocol, if two terminals begin transmitting at the same time, each
will transmit its complete packet even though they collide. This wastes the medium
for an entire packet time and can be addressed by a new protocol called CSMA
with collision detection. The main idea is to terminate transmission immediately after
detection of a collision.
In this protocol, the terminal senses the medium when the terminal has a
packet to transmit. If the medium is not busy, the terminal will transmit the packet
immediately. If the medium is busy, the terminal will wait until it becomes free. If a
collision is detected during the transmission, the terminal aborts its transmission
immediately and it attempts to transmit later after waiting for a random amount of
time. Fig 2 shows the collision mechanism in this protocol. Here two terminals A and
B are considered. The propagation delay between them is τ. Suppose A starts
transmission at time To, then its transmission reaches B at time To+τ. Suppose B
initiates a transmission at To+τ-ε (where ε is a small period such that 0<ε≤τ). It takes
τcd for a terminal to detect collision, so at time To+τ+ τcd B detects collision. Then a
short jamming signal is transmitted to ensure that other stations know that collision
has occurred before aborting the transmission, and a backoff algorithm is used to
schedule for future resensing time.
75
Fig 2. Collision mechanism in CSMA/CD
Fig 1 shows the basic reservation system. The station takes turns transmitting
a single frame at the full rate R bps, and the transmissions from stations are
organized into cycles that can be variable in length. Each cycle begins with a
reservation interval. In the simplest case, the reservation interval consists of M
76
minislots, one time slot per station. Stations use their corresponding minislot to
indicate that they have a frame to transmit in a corresponding cycle. The stations
announce their intention to transmit a frame by broadcasting their reservation bit
during the appropriate minislot. By listening to the reservation interval, the stations
can determine the order of frame transmissions in the corresponding cycle. The
length of the cycle will the correspond to the number of stations that have a frame to
transmit.
To find the maximum attainable throughput for this system, assume propagation
delay is negligible, the frame transmission times are X=1 time unit, the reservation
minislot requires v time units, where v<1 and that one minislot is required per frame
reservation. Each frame transmission then requires 1+v time units. The maximum
throughput occurs when all the stations are busy and is given by,
for one frame reservation/minislot. Very high throughputs can be achieved if v is very
small compared to 1.
77
Suppose the propagation delay is not negligible as shown in fig 2.b. The
stations transmit their reservations in the same way as before, but the reservations
do not take effect until some fixed number of cycles later. If the cycle length is
constrained to have some minimum duration that is greater than the round trip
propagation delay, then the reservations would take effect in the second following
cycle.
Polling
In this type of system, the stations take turns accessing the medium. At any given
time, only one of the stations has the right to transmit into the medium. When a
station is done transmitting, some mechanism is used to pass the right to transmit to
another station.
The different ways for passing the right to transmit from station to station is shown
in fig 3. Fig 3.a shows the situation in which M stations communicate with the host
computer. The host computer will act as the central controller that issues control
messages to co-ordinate the transmissions from the stations.
The central controller sends a polling message to the particular station. When
polled, the station sends its inbound frames and indicates the completion of its
78
transmission through a go-ahead message. The central controller might poll the
stations in round-robin fashion, or according to some other pre-determined order.
Fig 3.b shows another situation where polling can be used. Here the central
controller may use radio transmissions in a certain frequency band to transmit
outbound frames and stations may share a different frequency band to transmit
inbound frames. This technique is called frequency division duplex (FDD) approach.
Again the centra l controllers can co-ordinate transmissions on the inbound channel
by issuing polling messages. Another variation of fig 9.b involves having inbound and
outbound transmissions share one frequency band. This is the time division duplex
(TDD) approach. In this case, there will be alternation between transmissions from
the central controller and transmissions from polled stations. Fig3c shows a
situation where polling is used without a central controller. In such a case, the
stations will have a polling order developed using some protocol and all stations will
be able to receive the signals from all other stations. After a station is done
transmitting, it is responsible for sending a polling message to the next station in the
polling list.
79