1 / 63

Mobile Wireless Communication Fundamentals & Architecture

Explore the fundamentals and architecture of mobile and wireless communication, including wired vs. wireless networks, mobile computing, multiplexing, spread spectrum techniques, GSM architecture, handover, roaming, 2G vs. 3G services, GPRS, SMS, comparison of GSM vs. CDMA, and more.

warnick
Download Presentation

Mobile Wireless Communication Fundamentals & Architecture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MC7503-MOBILE COMPUTING REGULATION 2013 III MCA - V SEMESTER

  2. UNIT - IWIRELESS COMMUNICATION FUNDAMENTALS,ARCHITECTURE

  3. WIRELESS COMMUNICATION FUNDAMENTALS,ARCHITECTURE • Discussion on: Wired network vs Wireless network • What is mobile computing? • Categories of devices Fixed and Wired Fixed and Wireless Mobile and Wireless Mobile and Wired • Applications of mobile and wireless devices

  4. Multiplexing: What is multiplexing? Need of it. • Dimensions SDM FDM TDM CDM

  5. Spread spectrum : What is spread spectrum? • Spread spectrum techniques: DSSS FHSS • Advantages of spread spectrum

  6. GSM Architecture: Introduction Five main groups MS BSS NSS OSS SMS

  7. Handover What is handover? Types: Soft handover Hard handover Examples

  8. Roaming What is roaming? Types Horizontal Roaming Vertical Roaming Example

  9. 2G vs 3G services: Comparison of 2G , 3G in terms of -> Introduced Year -> Datarates offered -> Modulation Techniques used -> Bandwidth -> Technology -> Standards -> etc.,

  10. GPRS: Introduction Two new nodes for packet switching: * SGSN * GGSN Enhanced nodes in GSM

  11. SMS : * What is SMS ? * SMS Architecture * Characteristics of SMS * Two types SMMO SMMT

  12. Comparison of GSM vs CDMA : In terms of : Storage Type Data transfer Network International Roaming Frequency band Network service and technology

  13. GSM Addresses and Identifiers IMEI IMSI MS-ISDN LAI MSRN TMSI LMSI CI

  14. Authentication and Security A3 :Authentication Algorithm A8 :Key generation A5/1:Ciphering and deciphering Algorithms

  15. UNIT - IIMOBILE WIRELESS SHORT RANGE NETWORKS

  16. Introduction: -> Discussion of wireless short range networks -> Need for standards -> Example wireless networks.

  17. WLAN components : Client LAN adapter Access point LAN bridge

  18. WLAN Topologies : Peer to peer topology Access point based topology point to multipoint based topology

  19. WLAN technology : Infrared spread spectrum techniques DSSS FHSS UHF technology

  20. 802.11 Standard : Introduction to IEEE 802.11 reference Duties of physical layer Duties of MAC

  21. 802.11 Architecture model : BSS ESS • Type of transition on devices No transition BSS transition ESS transition

  22. Physical layer Infrared DSSS FHSS • DFWMAC DCF(CSMA/CA Algorithm) PCF

  23. WAP • Introduction • WAP layers WAE WSP WTP WDP

  24. Bluetooth • What is bluetooth ? • Bluetooth protocol stack • Bluetooth groups TPG MPG AG

  25. Transport PG : L2CAP LMP HCI Baseband and radio • MPG RFCOMM SDP OBEX IrDA TCS

  26. IrDA(Infra red data Association) • What is IrDA ? • IrDA specification IrPHY IrLMP IrLAP • Applications

  27. Zigbee • What is zigbee ? • Zigbee protocol Architecture IEEE 802.15.4 Zigbee layers Manufacturer Application

  28. UNIT – 3MOBILE NETWORK,TRANSPORT LAYER

  29. Mobile network layer : • Need of mobile IP Internet and DNS Design IP Address hierarchy Support mobility and wireless mode

  30. Entities and Terminologies : Mobile node Correspondent node Home Agent Foreign Agent COA Co-located -COA Foreign Agent- COA

  31. IP packet delivery : Packet delivery to and from MN to CN • Agent discovery Agent Advertisement Agent Discovery

  32. Registration • Registration request : Mobility binding ICMP packet • Registration reply ICMP packet and field description

  33. Tunneling and Encapsulation • What is tunnelling ? • What is encapsulation? • What is decapsulation? • Types IP-in-IP encapsulation Minimal encapsulation Generic routing encapsulation

  34. Optimization : To overcome Triangular Routing • Messages Binding request Binding reply Binding acknowledgement Binding warning • Discuss about smooth handover

  35. DHCP • DHCP provides • IP address • Subnet mask • Domain name • DNS server address • Default gateway

  36. TCP Improvement : • Address the issue of why fixed TCP is not applicable to wireless and mobile environment • Indirect TCP • Snooping TCP • Mobile TCP

  37. Indirect TCP(I-TCP) • Concept • Data transfer from CH to FA and FA to MN • Handover Process • Advantages and disadvantages

  38. Snooping TCP(S-TCP) • Concept • Data transfer from CH to FA and FA to MN • Handover Process • Advantages and disadvantages

  39. Mobile TCP(M-TCP) • Concept • Data transfer from CH to FA and FA to MN • Handover Process • Advantages and disadvantages

  40. UNIT – IVMOBILE AD-HOC,SENSOR NETWORKS

  41. Mobile Ad-hoc Networks : • Characteristics of ad-hoc network • Instant infra-structure • Disaster relief • Remote access • Effectiveness

  42. Routing algorithm • DSDV • Distance vector routing logic with introducing sequence no damping

  43. DSR Routing Algorithm • Route discovery • Route maintenance • Routing table construction

  44. Alternative metrics : • LIR –least Interference Routing • Calculation of interference • Route identification

  45. Overview of ad-hoc routing protocols • Flat ad-hoc routing • Hierarchical ad-hoc routing • Geographical position assisted ad-hoc routing

  46. Security • Network security requirements • Key management • Trusted key management in ad-hoc network

  47. Password based group system • Threshold cryptography • Self organized public key management for MANET

  48. Wireless sensor network • Characteristics of WSN • Architecture of WSN • Application of WSN

  49. Localization : • Types of nodes • Anchor node • Sensor node • Range based solution • Range free solution

  50. Routing in WSN • Routing challenges and design issues • Network dynamic in nature • Energy consumption

More Related