it6601 - mc - qb

Upload: kalpanasripathi

Post on 07-Jul-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/18/2019 IT6601 - MC - QB

    1/12

    VELAMMAL INSTITUTE OF TECHNOLOGY

    DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

    IT6601 – MOBILE COMPUTING

    UNIT III

    TELECOMMUNICATION SYSTEMS

    1. Define GSM. MAY!"UN #00$%

    GSM (Global System for Mobile communication) is a digital mobile telephony system that is

    widely used in Europe and other parts of the world. GSM uses a variation of time division

    multiple access (TDM) and is the most widely used of the three digital wireless telephony

    technologies (TDM! GSM! and "DM).

    GSM digiti#es and compresses data! then sends it down a channel with two other streams of user data! each in its own time slot. $t operates at either the %&& M'# or && M'# fre*uency

     band.

    #. Li' '(e '()ee *iffe)en' +,'e-)ie f e)/i+e f GSM. NOV!DEC #00$%

    )

    2(,' ,)e '(e '34e f e)/i+e in GSM5 MAY!"UN #01%

    +earer services

    Tele services

    Supplementary services

    7. 2(,' ,)e '(e '8 9,i+ +:,e f (,n*/e)5 APR!MAY #011%

    There are two basic classes in handover,

    H,)* (,n*/e); Switching between different antennas or different system is performed at a

    certain point in time.Sf' (,n*/e); This is a new real mechanism in -MTS compare to GSM and this only available

    in DD mode.

    . Di'in-

  • 8/18/2019 IT6601 - MC - QB

    2/12

    hard handover   is one in which the channel in the source cell is released and only then the

    channel in the target cell is engaged. Thus the connection to the source is bro/en before or 0as0 the

    connection to the target is made1for this reason such handovers are also /nown as break-before-

    make.

     soft handover  is one in which the channel in the source cell is retained and used for a while in

     parallel with the channel in the target cell. $n this case the connection to the target is established

     before the connection to the source is bro/en! hence this handover is called make-before-break .

    H,)* H,n* = Off

    2ccurs in GSM

    vailable in DD 3 TDD modes

    $nter fre*uency handover! $nter system handover 

    Sf' H,n* = Off 

    2ccurs in -MTS

    vailable only in DD mode

    Macro diversity

    >. 2(,' ,)e '(e *iffe)en' +n'): +(,nne:

  • 8/18/2019 IT6601 - MC - QB

    3/12

    needed. This hides the identity of a user. The TMS$ is not forwarded to the '78. +ut instead

    another temporary number reflects the location and any roaming re*uired is the MS89 is used

    internally by the system.

    @. 2(,' ,)e '(e e+

  • 8/18/2019 IT6601 - MC - QB

    4/12

    Di,*/,n',-e

     9o end:to:end encryption of user data

    8educed concentration while moving

    Electromagnetic radiation

    'igh comple?ity of system

    Several incompatibilities within the GSM standards

    11. 2(,' ,)e '(e e)/i+e 4)/i*e* 93

  • 8/18/2019 IT6601 - MC - QB

    5/12

    1>. 2(,' ,)e '(e ne8 +?4nen' ,**e* ' GPRS ne'8)5 MAY!"UN #01#%

    Two new components! called Gateway GB8S Support 9odes (GS9s) and! Serving GB8S Support

     9ode (SGS9) are added.

    16. S4e+if3 '(e f

  • 8/18/2019 IT6601 - MC - QB

    6/12

      lways online devices F

  • 8/18/2019 IT6601 - MC - QB

    7/12

    '34i+,: i-n,: ,n* , ?e,-e e

  • 8/18/2019 IT6601 - MC - QB

    8/12

    guarantees. There is not even a IoS guarantee for a voice call F if the ne?t cell is already completely

     boo/ed the connection will brea/ upon entering this cell. (; mar/s)

    >. H8 i 3n+()ni,'in ,+(ie/e* in GSM ,n* 8(3 i' i i?4)',n'5 H8 3'e? e+ithin each time:slot during transmission

    a mid ample further improves synchronisation. The terminal itself is responsible for precise

    synchronisation within the cell. This is very important in TDM systems as otherwise neighbouring

    data may be destroyed.( < mar/s)

    rame structure ( mar/)

    Security mechanisms ( mar/)

    ccess control and authentication. "onfidentiality

    nonymity

    Description of each mechanism ( < < 5 % mar/s)

    Diagram ( mar/ 6 mar/)

    UNIT IV

    PART A

    1. 2(,' ,)e '(e *iffe)en+e 9e'8een AODV ,n* '(e ',n*,)* *i',n+e /e+') ,:-)i'(?5 2(3 ,)e

    e'enin nee*e*5 APR!MAY #00@%

    2DA is capable of both unicast and multicast routing. $t is a reactive routing protocol! meaning that

    it establishes a route to a destination only on demand 8outers use distance vector based routing

     protocols to periodically advertise the routes in their routing tables. 8outing information e?changed

     between typical distance vector based routers is unsynchroni#ed and unac/nowledged.

    2DA is a reactive protocol. 8oute calculation is only performed if necessary. This improves

    scalability under light load! but causes a higher initial latency.

    #. 2(,' ,)e '(e *),89,+ f 8i)e* ne'8)5 APR!MAY #010% 8unning the wires from each room within the home can be a difficult tas/.

     9etwor/ cables can loo/ disorgani#ed.

     9etwor/ cables can disconnect or become faulty conse*uently causing the connection to fail.

    dding more computers to a wired networ/ may result in une?pected e?pense if you run out of 

    connections on your networ/ and could slow down the networ/.

  • 8/18/2019 IT6601 - MC - QB

    9/12

    ll wired networ/s differ from each other. The most familiar type of wired networ/ is an Ethernet

    networ/.

    7. Di'in-

  • 8/18/2019 IT6601 - MC - QB

    10/12

    S.

    N

    F,+') 2i)e* Ne'8) 2i)e:e Ne'8)  

    A3??e')i+

    :in

    8outing algorithm asymmetric 8outing algorithm symmetric

    ;

    Re*

  • 8/18/2019 IT6601 - MC - QB

    11/12

    infrastructure). Multi:hop ad:hoc networ/s additionally do not re*uire that all nodes can receive each

    other. 9odes may forward transmissions for other nodes. dvantages are the lower re*uired

    transmission power (itKs Lust li/e whispering into the neighbourKs ear instead of shouting out loud)

    and the increased robustness (failure of single nodes can be tolerated).

    The topology of ad:hoc networ/s is dynamic in nature and changes in their topology are possible.

    +ut to attain a reliable outptut *uality fre*uent changes can be avoided.

    Due to wireless transmission their physical security is limited.

    The capacity of these networ/s is lower when compared with wired networ/s.

    They e?perience higher loss rates! higher delays and also the Litter than the fi?ed type of 

    networ/s.

    They use either e?haustible power supplies or batteries for getting energy. $n networ/ design it is

    very important to consider power saving.

    $n a perfect ad:hoc networ/K it has all the seven layers from physical layer to application layer.

    $n designing an ad:hoc networ/ their e?ists high comple?ity with physical layer setups but in case

    of mobile networ/s it will be ta/en care by their base stations.

    The information related to networ/ density! lin/ failures! node distribution has to be clearly

    defined for adhoc networ/s.

    To obtain a better networ/ structure it is important that the M" layer and networ/ layer should

    collaborate with each other.

    The ad:hoc networ/ is independent of any central control or infrastructure.

    7. Given the networ/ topology below! use the dynamic source routing algorithm to compute the shortest

     path from to all other nodes. Ma/e sure to show the results of the computation at each step.

    () APR!MAY #00@%

  • 8/18/2019 IT6601 - MC - QB

    12/12

    . >ith a suitable e?ample compare the behaviour of DSDA and DS8 algorithms with their routing

    table or cache contentsJ(). NOV!DEC #00@%