Mobile Computing and Wireless Communication
Mobile Computing and Wireless Communication
Mobile Computing and Wireless Communication
- 1
Wireless Medium
Attribute of Mobility
• User Mobility
o User should be able to move from one physical location to another location and use the
same service.
o Example: User moves from London to New York and uses the Internet in either place to
access the corporate application.
• Network Mobility
o User should be able to move from one network to another network and use the same
service.
o Example: User moves from Hong Kong to Singapore and uses the same GSM phone to
access the corporate application.
• Bearer Mobility
o User should be able to move from one bearer to another while using the same service.
o Example: User is unable to access the WAP bearer due to some problem in the GSM
network then he should be able to use voice or SMS bearer to access that same
corporate application.
o Like Hike Messenger
• Device Mobility
o User should be able to move from one device to another and use the same service.
o Example: User is using a PC to do his work. During the day, while he is on the street he
would like to use his mobile to access the corporate application.
• Session Mobility
o A user session should be able to move from one user - agent environment to another.
o Example: An unfinished session moving from a mobile device to a desktop computer is a
good example.
• Service Mobility
o User should be able to move from one service to another.
o Example: User is writing a mail. Suddenly, he needs to refer to something else. In a PC,
user simply opens another service and moves between them. User should be able to do
the same in small wireless devices.
• Host Mobility
o User should be able to move while the device is a host computer.
o Example: The laptop computer of a user is a host for grid computing network. It is
connected to a LAN port. Suddenly, the user realizes that he needs to leave for an offsite
meeting. He disconnects from the LAN and should get connected to wireless LAN while
his laptop being the host for grid computing network.
• The transmitted distance can be anywhere between a few meters (for example: a television's
remote control) and thousands of kilometers (for example: radio communication).
• Wireless communication can be used for cellular telephony, wireless access to the internet,
wireless home networking, and so on.
3. Headsets
4. Radio Receivers
5. Satellite Television
6. Broadcast Television
7. Cordless Telephones etc…
Signals - Basics
• A signal is an electrical or electromagnetic current that is used for carrying data from one device
or network to another.
• It is the key component behind virtually all:
o Communication
o Computing
o Networking
o Electronic devices
• A signal can be either analog or digital.
• Here, we are concerned with electromagnetic signals used as a means to transmit information.
• An electromagnetic signal is a function of time, but it can also be expressed as a function of
frequency; that is, the signal consists of components of different frequencies.
o Time Domain
o Frequency Domain
• The frequency domain view of a signal is far more important to an understanding of data
transmission than a time domain view.
• As a function of time, an electromagnetic signal can be either analog or digital.
• An analog signal is one in which the signal intensity varies in a smooth fashion over time.
• In other words, there are no breaks or discontinuities in the signal.
• A digital signal is one in which the signal intensity maintains a constant level for some period of
time and then changes to another constant level.
• Figure shows examples of both kinds of signals. The analog signal might represent speech, and
the digital signal might represent binary 1s and 0s.
• Periodic signal: An analog or digital signal pattern that repeats over time.
• Aperiodic signal: An analog or digital signal pattern that doesn't repeat over time.
• Peak amplitude (A): Maximum value or strength of the signal over time. Typically measured in
volts.
• Frequency (f): Rate, in cycles per second, or Hertz (Hz), at which the signal repeats.
• Phase (f): A measurement of the relative position in time within a single period of a signal.
• Wavelength (l ): A distance occupied by a single cycle of the signal.
o Example: Speed of light is v = 3x108 m/s. Wavelength is lf = v (or l = vT)
o Signals
o Transmission
• We define data as entities that convey meaning, or information.
• Signals are electric or electromagnetic representations of data.
• Transmission is the communication of data by the propagation and processing of signals.
• Analog data take on continuous values in some interval.
o For example, voice and video are continuously varying patterns of intensity.
o Most data collected by sensors, such as temperature and pressure, are continuous
valued.
• Digital data take on discrete values.
o Examples are text and integers.
• An analog signal is a continuously varying electromagnetic wave that may be propagated over a
variety of media, depending on frequency.
o Examples are copper wire media, such as twisted pair and coaxial cable; fiber optic
cable; and atmosphere or space propagation (wireless).
• A digital signal is a sequence of voltage pulses that may be transmitted over a copper wire
medium.
• Example, a constant positive voltage level may represent binary 0 and a constant negative
voltage level may represent binary 1.
• The principal advantages of digital signaling are that it is generally cheaper than analog signaling
and is less susceptible to noise interference.
• The principal disadvantage is that digital signals suffer more from attenuation than do analog
signals.
• In frequency domain view, A signals lie in the frequency range, theoretically signals are
composed of many sinusoidal signals with different frequencies (like Fourier Series).
• It is actually composed of infinite sinusoidal signal at different amplitudes, frequencies, and
phases. An electromagnetic signal can be made up of many frequencies.
*+,(-(.#)
0
& ) *+,(-((1.)#)
1
' 0
!(#) = & ) (*+,(-(.#) + & ) *+,(-((1.)#))
( 1
Channel Capacity
• The maximum rate at which data can be transmitted over a given communication path, or
channel, under given conditions is referred to as the channel capacity.
• There are four concepts here that we are trying to relate to one another:
• Data rate: This is the rate, in bits per second (bps), at which data can be communicated.
• Data rate depends upon 3 factors:
1. The bandwidth available
2. Number of levels in digital signal
3. The quality of the channel – level of noise
• Bandwidth: This is the bandwidth of the transmitted signal as constrained by the transmitter
and the nature of the transmission medium, expressed in cycles per second, or Hertz.
• Noise: We are concerned with the average level of noise over the communications path.
• Error rate: This is the rate at which errors occur, where an error is the reception of a 1 when a 0
was transmitted or the reception of a 0 when a 1 was transmitted.
• log2(L) = 4.17
• L = 2^4.17 = 18 levels
Transmission Media
A transmission medium can be defined as anything that can carry information from a source to a
destination.
Transmission
Media
Guided Unguided
Media Media
•Guided media, which are those that provide a channel from one device to another, include
twisted-pair cable, coaxial cable, and fiber-optic cable.
• A signal travelling along any of these media is directed and contained by the physical limit of
the medium.
A. Magnetic Media
• One of the most common ways to transport data from one computer to another is to write
them onto magnetic tape or removable media (e.g., recordable DVDs), physically transport
the tape or disks to the destination machine, and read them back in again.
• Although this method is not as sophisticated as using a geosynchronous communication
satellite, it is often more cost effective, especially for applications in which high bandwidth
or cost per bit transported is the key factor.
B. Twisted Pair
• A twisted pair consists of two insulated copper wires, typically about 1 mm thick.
• The wires are twisted together in a helical form, just like a DNA molecule.
• Twisting is done because two parallel wires constitute a fine antenna.
• When the wires are twisted, the waves from different twists cancel out, so the wire radiates
less effectively.
• Latest categories are 6 and 7, which are capable of handling signals with bandwidths of 250
MHz and 600 MHz, respectively (versus a mere 16 MHz and 100 MHz for categories 3 and 5,
respectively).
C. Coaxial Cable
• It has better shielding than twisted pairs, so it can span longer distances at higher speeds.
• Two kinds of coaxial cable are widely used. One kind, 50-ohm cable, is commonly used when
it is intended for digital transmission from the start.
• The other kind, 75-ohm cable, is commonly used for analog transmission and cable
television but is becoming more important with the advent of Internet over cable.
• A coaxial cable consists of a stiff copper wire as the core, surrounded by an insulating
material.
• The insulator is encased by a cylindrical conductor, often as a closely-woven braided mesh.
• The outer conductor is covered in a protective plastic sheath.
• The construction and shielding of the coaxial cable give it a good combination of high
bandwidth and excellent noise immunity.
• The bandwidth possible depends on the cable quality, length, and signal-to-noise ratio of
the data signal. Modern cables have a bandwidth of close to 1 GHz.
• Coaxial cables used to be widely used within the telephone system for long-distance lines
but have now largely been replaced by fiber optics on long-haul routes.
D. Fiber Optics
• A fiber-optic cable is made of glass or plastic and transmits signals in the form of light.
• Optical fibers use reflection to guide light through a channel.
• A glass or plastic core is surrounded by a cladding of less dense glass or plastic.
• The difference in density of the two materials must be such that a beam of light moving
through a core is reflected off the cladding instead of being refracted into it.
• Fiber optic cables are similar to coax, except without the braid.
• Figure shows a single fiber viewed from the side. At the center is the glass core through
which the light propagates.
• The core is surrounded by a glass cladding with a lower index of refraction than the core, to
keep all the light in the core.
• Next comes a thin plastic jacket to protect the cladding. Fibers are typically grouped in
bundles, protected by an outer sheath. Figure shows a sheath with three fibers.
Unguided (Wireless) transmission media
•Unguided media transport electromagnetic waves without using a physical conductor. This
type of communication is often referred to as wireless communication.
A. Radio Transmission
• Radio waves are easy to generate, can travel long distances, and can penetrate buildings
easily, so they are widely used for communication, both indoors and outdoors.
• Radio waves also are omnidirectional, meaning that they travel in all directions from the
source, so the transmitter and receiver do not have to be carefully aligned physically.
• The properties of radio waves are frequency dependent.
• At low frequencies, radio waves pass through obstacles well, but the power falls off sharply
with distance from the source, roughly as 1/r2 in air.
• At high frequencies, radio waves tend to travel in straight lines and bounce off obstacles.
They are also absorbed by rain.
• At all frequencies, radio waves are subject to interference from motors and other electrical
equipment.
• In the VLF, LF, and MF bands, radio waves follow the curvature of the earth.
• In the HF they bounce off the ionosphere
B. Microwave Transmission
• Since the microwaves travel in a straight line, if the towers are too far apart, the earth will
get in the way .Consequently, repeaters are needed periodically.
• Unlike radio waves at lower frequencies, microwaves do not pass through buildings well. In
addition, even though the beam may be well focused at the transmitter, there is still some
divergence in space.
• Above 100 MHz, the waves travel in straight lines and can therefore be narrowly focused.
Concentrating all the energy into a small beam using a parabolic antenna gives a much
higher signal to noise ratio.
• Advantages:
o No right way is needed (compared to wired media).
o Relatively inexpensive.
o Simple to install.
• Disadvantages:
o Do not pass through buildings well.
o Multipath fading problem (the delayed waves cancel the signal).
o Absorption by rain above 8 GHz.
o Severe shortage of spectrum.
C. Infrared
• Unguided infrared and millimeter waves are widely used for short-range communication.
• The remote controls used on televisions, VCRs, and stereos all use infrared communication.
• They are relatively directional, cheap, and easy to build but have a major drawback: they do
not pass through solid objects (try standing between your remote control and your
television and see if it still works).
• In general, as we go from long-wave radio toward visible light, the waves behave more and
more like light and less and less like radio.
• On the other hand, the fact that infrared waves do not pass through solid walls well is also a
plus.
• It means that an infrared system in one room of a building will not interfere with a similar
system in adjacent rooms or buildings.
• Furthermore, security of infrared systems against eavesdropping is better than that of radio
systems precisely for this reason.
• Therefore, no government license is needed to operate an infrared system, in contrast to
radio systems, which must be licensed outside the ISM bands.
Communication Network
• Communication networks can be categories by their size as well as their purpose.
• The size of a network can be expressed by the geographic area.
• Some of the different networks based on size are:
o LAN – Local Area Network
o MAN – Metropolitan Area Network
o WAN – Wide Area Network
• The hosts are connected by a communication subnet, or just subnet for short.
• In most wide area networks, the subnet consists of two distinct components: transmission
lines and switching elements. Transmission lines move bits between machines.
• The communication between different users of WAN is established using leased telephone
lines or satellite links and similar channels.
Switching Techniques
• For transmission of data beyond a local area, communication is typically achieved by
transmitting data from source to destination through a network of intermediate switching
nodes; this switched network design is sometimes used to implement LANs and MANs as well.
• Switching Techniques - In large networks there might be multiple paths linking sender and
receiver. Information may be switched as it travels through various communication channels.
Circuit Switching
• Circuit switching is used in public telephone networks and is the basis for private networks
built on leased-lines.
• Circuit switching was developed to handle voice traffic but also digital data (although
inefficient)
• With circuit switching a dedicated path is established between two stations for
communication.
• Switching and transmission resources within the network are reserved for the exclusive use
of the circuit for the duration of the connection.
Packet Switching
• Packet switching was designed to provide a more efficient facility than circuit-switching for
bursty data traffic.
• With packet switching, a station transmits data in small blocks, called packets.
• At each node packets are received, stored briefly (buffered) and passed on to the next node.
• Station breaks long message into packets. Packets sent one at a time to the network.
• Packets handled in two ways:
1. Datagram
§ Each packet treated independently
§ Packets can take any practical route
§ Packets may arrive out of order
§ Packets may go missing
§ Up to receiver to re-order packets and recover from missing packets
2. Virtual Circuit
§ Preplanned route established before any packets sent.
§ Once route is established, all the packets between the two communicating
parties follow the same route through the network
§ Call request and call accept packets establish connection (handshake)
§ Each packet contains a Virtual Circuit Identifier (VCI) instead of destination
address
§ No routing decisions required for each packet
§ Clear request to drop circuit
§ Not a dedicated path
What is Protocol?
• A protocol defines rules and conventions for communication between network devices.
• A protocol defines the format and the order of messages exchanged between two or more
communicating entities, as well as the actions taken on the transmission and/or receipt of a
message or other event.
• The key features of protocol are as follows:
• Syntax: Concerns the format of the data blocks
• Semantics: Includes control information for coordination and error handling
• Timing: Includes speed matching and sequencing
• Example: HTTP, IP, FTP etc…
• It defines those computers of the network used at the edge of the network. These
computers are known as hosts or end system.
• Host can be classified into the following two types:
o Clients: Refer to the computer systems that request servers for the completion of a
task. The clients are generally called desktop PCs or workstations.
o Servers: Refer to the computer systems that receive requests from the clients and
process them. After the processing is complete, the servers send a reply to the
clients who sent the request.
• The concept of clients and servers is essential in the network design. The various networks
design models are as follows:
• Disadvantage:
o The speed of the network decreases due to heavy usage.
o It is not easy to keep track of information on each computer.
o There is on central backup of files and folders.
o Network and data security are weak.
Client/Server network
• A client/server network is a system where one or more computers called clients connect to
a central computer named a server to share or use resources.
• The client requests a service from server, which may include running an application,
querying database, printing a document, or performing a backup or recovery procedure. The
request made by the client is held by server.
• A client/server network is that the files and resources are centralized. This means that a
computer, the server, can hold them and other computers can access them.
• Advantage:
o The server system holds the shared files.
o The server system can be scheduled to take the file backups automatically.
o Network access is provided only to authorize users through user security at the
server.
o The server system is a kind of central repository for sharing printer with clients.
o Internet access, e-mail routing, and such other networking tasks are quite easily
managed by the server.
o The software applications shared by the server are accessible to the clients.
• Disadvantage:
o The implementation of the network is quite expensive.
o A network operating system is essential.
o If server fails, the entire network crashes.
Transport Layer
• The transport layer is responsible for process-to-process delivery of the entire message.
• A process is an application program running on a host.
• The transport layer ensures that the whole message arrives intact and in order, overseeing
both error control and flow control at the source-to-destination level.
• The transport layer is concerned with the following:
o Service-point addressing
o Segmentation and reassembly
o Connection control
o Flow control
o Error control
Session Layer
• The session layer is the network dialog controller.
• It establishes, maintains, and synchronizes the interaction among communicating systems.
• The session layer is concerned with the following:
o Dialog control
o Synchronization
Presentation Layer
• The presentation layer is concerned with the syntax (language rule) and semantics (meaning
of each rule) of the information exchanged between two systems.
• The presentation layer is concerned with the following:
o Translation
o Encryption
o Compression
Application Layer
• The application layer enables the user, whether human or software, to access the network.
• It provides user interfaces and support for services such as electronic mail, remote file
access and transfer, shared database management, and other types of distributed
information services.
• The application layer is concerned with the following:
• Network virtual terminal
o File transfer, access, and management
o Mail services
o Directory services
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Data Link Layer
5. Physical Network
Application Layer
• The application layer is provided by the program that uses TCP/IP for communication.
• An application is a user process cooperating with another process usually on a different host
(there is also a benefit to application communication within a single host).
• Examples: Telnet and the File Transfer Protocol (FTP) etc…
Transport Layer
• The transport layer provides the end-to-end data transfer by delivering data from an
application to its remote peer.
• Multiple applications can be supported simultaneously.
• The most-used transport layer protocol is the Transmission Control Protocol (TCP), which
provides:
o Connection-oriented reliable data delivery
o Duplicate data suppression
o Congestion control
o Flow control.
• Another transport layer protocol is the User Datagram Protocol (UDP), which provides:
o Connectionless
o Unreliable
o Best-effort service.
• UDP is used by applications that need a fast transport mechanism and can tolerate the loss
of some data.
Internetwork Layer
• The internetwork layer also called the internet layer or the network layer.
• It is provides the “virtual network” image of an internet this layer shields the higher levels
from the physical network architecture below it.
• Internet Protocol (IP) is the most important protocol in this layer.
• It is a connectionless protocol that does not assume reliability from lower layers. IP does not
provide reliability, flow control, or error recovery.
• IP provides a routing function that attempts to deliver transmitted messages to their
destination.
• These message units in an IP network are called an IP datagram.
• Example: IP, ICMP, IGMP, ARP, and RARP.
Internetworking
• An interconnected set of networks may appear simply as a larger network. This entire
configuration is often referred to as an internet.
Internetworking Terms
• Communication Network:
o A facility that provides a data transfer service among devices attached to the network.
• Internet:
Voice
Communication
• Here, communication takes place through sound waves. However, if two people want to
communicate who is at longer distances, then we have to convert these sound waves into
electromagnetic waves.
• The device, which converts the required information signal into electromagnetic waves, is known
as an Antenna.
• An Antenna is a transducer, which converts electrical power into electromagnetic waves and vice
versa.
• An Antenna can be used either as a transmitting antenna or a receiving antenna.
• A transmitting an antenna is one, which converts electrical signals into electromagnetic waves
and radiates them.
• A receiving an antenna is one, which converts electromagnetic waves from the received beam
into electrical signals.
• In two-way communication, the same antenna can be used for both transmission and reception.
Radiation Patterns
• An antenna will radiate power in all directions but, does not perform equally well in all directions.
• A common way to characterize the performance of an antenna is the radiation pattern, which is
a graphical representation of the radiation properties of an antenna as a function of space
coordinates.
• The simplest pattern is produced by an idealized antenna known as the isotropic antenna.
• An isotropic antenna is a point in space that radiates power in all directions equally.
• The actual radiation pattern for the isotropic antenna is a sphere with the antenna at the center.
• However, radiation patterns are almost always depicted as a two-dimensional cross section of
the three-dimensional pattern.
A
B
A
Antenna Location
a. Omnidirectional b. Directional
• The isotropic antenna produces an omnidirectional radiation pattern of equal strength in all
directions, so the A and B vectors are of equal length.
• For the antenna pattern of Figure 1b, the B vector is longer than the A vector, indicating that
more power is radiated in the B direction than in the A direction, and the relative lengths of the
two vectors are proportional to the amount of power radiated in the two directions.
Types of Antennas
1. Dipoles
• Two of the simplest and most basic antennas are the half-wave dipole antenna (Figure 3) and the
quarter-wave vertical, or Marconi, antenna (Figure 3).
• The half-wave dipole consists of two straight collinear conductors of equal length, separated by
a small gap.
• The length of the antenna is one-half the wavelength of the signal that can be transmitted most
efficiently.
• A vertical quarter wave antenna is the type commonly used for automobile radios and portable
radios.
• A half-wave dipole has a uniform or omnidirectional radiation pattern in one dimension and a
figure eight pattern in the other two dimensions (Figure 2).
• If a parabola is revolved about its axis, the surface generated is called a paraboloid.
• A cross section through the paraboloid parallel to its axis forms a parabola and a cross section
perpendicular to the axis forms a circle.
• Such surfaces are used in automobile headlights, optical and radio telescopes, and microwave
antennas. Figure 4b shows this effect in cross section.
Antenna Gain
• Antenna gain is a measure of the directionality of an antenna.
• Antenna gain is defined as the power output, in a particular direction, compared to that produced
in any direction by a perfect omnidirectional antenna (isotropic antenna).
• A concept related to that of antenna gain is the effective area of an antenna.
• The effective area of an antenna is related to the physical size of the antenna and to its shape.
• The relationship between antenna gain and effective area is:
$%& $)(%&
!=# '(
=# *(
Where:
G = antenna gain
Ae = effective area
f = carrier frequency
c = speed of light (3*108 m/s)
l = carrier wavelength
1. Ground Wave
• Radio waves in the VLF band propagate in a ground, or surface wave. The wave is connected at
one end to the surface of the earth and to the ionosphere at the other.
• The ionosphere is the region above the troposphere (where the air is), from about 50 to 250 miles
above the earth.
• It is a collection of ions, which are atoms that have some of their electrons stripped off leaving
two or more electrically charged objects. The sun's rays cause the ions to form which slowly
modified.
• The propagation of radio waves in the presence of ions is drastically different than in air, which is
why the ionosphere plays an important role in most modes of propagation.
• Ground waves travel between two limits, the earth and the ionosphere, which acts like a channel.
Since the channel curves with the earth, the ground wave will follow. Therefore very long range
propagation is possible using ground waves.
• Example of ground wave communication is AM radio.
2. Sky Waves
• Radio waves in the LF and MF ranges may also propagate as ground waves, but suffer significant
losses, or are attenuated, particularly at higher frequencies. But as the ground wave mode fades
out, a new mode develops: the sky wave.
• Sky waves are reflections from the ionosphere. While the wave is in the ionosphere, it is strongly
bent, or refracted, ultimately back to the ground.
• From a long distance away this appears as a reflection. Long ranges are possible in this mode also,
up to hundreds of miles.
• Sky waves in this frequency band are usually only possible at night, when the concentration of
ions is not too great since the ionosphere also tends to attenuate the signal.
• However, at night, there are just enough ions to reflect the wave but not reduce its power too
much.
• Example: Used in amateur radio, CB radio, international broadcast such as BBC.
3. Line-of-sight propagation
Line-Of-Sight Transmission
• Line of sight (LoS) is a type of propagation that can transmit and receive data only where transmit
and receive stations are in view of each other without any sort of an obstacle between them.
• FM radio, microwave and satellite transmission are examples of line-of-sight communication.
• We have examined various impairments on the information-carrying capacity of a
communications link.
• The most significant impairments are:
9: (#$+)( (#$)+)(
= =
9; '( *(
Where:
Pt = signal power at transmitting antenna
Pr = signal power at receiving antenna
l = carrier wavelength
d = propagation distance between antennas
c = speed of light (3 * 108 m/s)
Where
Gt = gain of transmitting antenna
Gr = gain of receiving antenna
At = effective area of transmitting antenna
Ar = effective area of receiving antenna
• Free space loss accounting for gain of other antennas can be recast as:
<+= = (> ?@A(') + (> ?@A(+) − 5> ?@A(%: %; )
= −(> ?@A()) + (> ?@A(+) − 5> ?@A(%: %; ) + 5JF. .#+=
3. Noise
A. Thermal Noise:
• Thermal noise due to agitation of electrons.
• It is present in all electronic devices and transmission media and is a function of temperature.
• Thermal noise is uniformly distributed across the frequency spectrum and hence is often
referred to as white noise.
• It cannot be eliminated and therefore places an upper bound on communications system
performance.
• It is particularly significant for satellite communication.
• Amount of thermal noise to be found in a bandwidth of 1Hz in any device or conductor is:
N
K> = LM( )
OP
Where:
N0 = noise power density in watts per 1 Hz of bandwidth
k = Boltzmann's constant = 1.38 x 10-23 J/K
T = temperature, in kelvins (absolute temperature)
• Noise is assumed to be independent of frequency.
• Thermal noise present in a bandwidth of B Hertz (in watts):
K = LM=
Or, in decibel-watts
K = 5> ?@A L + 5> ?@A M + 5> ?@A =
= −((G. J+=N + 5> ?@A M + 5> ?@A =
B. Intermodulation noise
• It occurs if signals with different frequencies share the same medium.
• Interference caused by a signal produced at a frequency that is the sum or difference of
original frequencies.
• Intermodulation noise is produced when there is some nonlinearity in the transmitter
receiver, or intervening transmission system.
• Normally, these components behave as linear systems; that is, the output is equal to the input
times a constant.
C. Crosstalk
• Crosstalk has been experienced by anyone who, while using the telephone, has been able to
hear another conversation; it is an unwanted coupling between signal paths.
• It can occur by electrical coupling between nearby twisted pairs or, rarely, coax cable lines
carrying multiple signals.
• Crosstalk can also occur when unwanted signals are picked up by microwave antennas;
although highly directional antennas are used, microwave energy does spread during
propagation.
• Typically, crosstalk is of the same order of magnitude as, or less than, thermal noise. However,
in the unlicensed ISM bands, crosstalk often dominates.
• Impulse noise
• It is non-continuous, consisting of irregular pulses or noise spikes of short duration and of
relatively high amplitude.
• It is generated from a variety of causes, including external electromagnetic disturbances, such
as lightning, and faults and flaws in the communications system.
• Impulse noise is generally only a minor annoyance for analog data.
• For example, voice transmission may be corrupted by short clicks and crackles with no loss of
intelligibility.
• However, impulse noise is the primary source of error in digital data transmission.
• For example, a sharp spike of energy of 0.01 s duration would not destroy any voice data but
would wash out about 560 bits of data being transmitted at 56 kbps.
• Reflection - occurs when signal encounters a surface that is large relative to the wavelength of
the signal.
• Diffraction - occurs at the edge of an impenetrable body that is large compared to wavelength of
radio wave.
• Scattering – occurs when incoming signal hits an object whose size in the order of the wavelength
of the signal or less.
Fading
• The term fading, or, small-scale fading, means rapid fluctuations of the amplitudes, phases, or
multipath delays of a radio signal over a short period or short travel distance.
• This might be so severe that large scale radio propagation loss effects might be ignored.
A. Multipath Propagation:
• Multipath is the propagation phenomenon that results in radio signals reaching the receiving
antenna by two or more paths. The effects of multipath include constructive and destructive
interference, and phase shifting of the signal.
B. Speed of the mobile:
• The relative motion between the base station and the mobile results in random frequency
modulation due to different Doppler shifts on each of the multipath components.
C. Speed of surrounding objects:
• If objects in the radio channel are in motion, they induce a time varying Doppler shift on multipath
components. If the surrounding objects move at a greater rate than the mobile, then this effect
dominates fading.
D. Transmission Bandwidth of the signal
• If the transmitted radio signal bandwidth is greater than the “bandwidth" of the multipath
channel (quantified by coherence bandwidth), the received signal will be distorted.
• According to the input source signal m(t) (either analog or digital), which is called baseband signal
(or modulating signal) , the carrier signal fc(t) will be modulated into modulated signal s(t).
• Modulation techniques involve operation on one or more of the three parameters:
A. Amplitude
B. Frequency
C. Phase
• Total four different mappings or encodings techniques available:
1. digital-to-digital
2. digital-to-analog
3. analog-to-analog
4. analog-to-digital
Digital-to-analog
• Digital data and digital signals must be converted to analog signals for wireless transmission.
• Optical system and unguided media (wireless system) only propagate analog signals.
Analog-to-analog
• A baseband analog signal, such as voice or video, must be modulated onto a higher-frequency
carrier for transmission.
• Baseband: easy and cheap, e.g., in voice telephone lines, voice signals are transmitted over
telephone lines at their original spectrum.
Analog-to-digital
• Conversion of analog data (e.g., voice, video) to digital form permits the use of modern digital
transmission & switching.
• It’s a common to digitize voice signals prior to transmission over either guided or unguided media
to improve quality and to take advantage of TDM scheme.
• Both frequency & phase remain constant while amplitude changes and one of the amplitudes is
zero.
• Inefficient because Up to 1200bps on voice grade lines.
• Application: ASK is used to transmit digital data over optical fiber.
• The ASK modulator block diagram comprises of the carrier signal generator, the binary sequence
from the message signal and the band-limited filter. Above is the diagram of the ASK Modulator.
• Peak amplitude & phase remain constant during each bit interval.
• BFSK is less susceptible to error than ASK.
• Application: it is used over voice lines, high frequency (3 to 30MHz) radio transmission.
• The diagram of Binary Phase Shift Keying consists of the balance modulator which has the carrier
sine wave as one input and the binary sequence as the other input.
2. Angle Modulation
A. Frequency modulation - FM
B. Phase modulation - PM
1. Amplitude Modulation – AM
• A continuous-wave goes on continuously without any intervals and it is the baseband message
signal, which contains the information. This wave has to be modulated.
• According to the standard definition, “The amplitude of the carrier signal varies in accordance
with the instantaneous amplitude of the modulating signal.”
• Means that the amplitude of the carrier signal containing no information varies as per the
amplitude of the signal containing information, at each instant.
• This can be well explained by the following figure.
• The figure shows the modulating wave, which is the message signal.
• The next one is the carrier wave, which is a high frequency signal and contains no information.
While, the last one is the resultant modulated wave.
2. Angle Modulation
• Angle modulation is further divided into frequency modulation and phase modulation.
A. Frequency Modulation(FM)
• In amplitude modulation, the amplitude of the carrier signal varies. Whereas,
in Frequency Modulation (FM), the frequency of the carrier signal varies in accordance
with the instantaneous amplitude of the modulating signal.
• Hence, in frequency modulation, the amplitude and the phase of the carrier signal
remains constant. This can be better understood by observing the following figure.
• The frequency of the modulated wave increases, when the amplitude of the
modulating or message signal increases.
• Similarly, the frequency of the modulated wave decreases, when the amplitude of the
modulating signal decreases.
• Note that, the frequency of the modulated wave remains constant and it is equal to
the frequency of the carrier signal, when the amplitude of the modulating signal is
zero.
B. Phase Modulation(PM)
• In frequency modulation, the frequency of the carrier varies. Whereas, in Phase
Modulation (PM), the phase of the carrier signal varies in accordance with the
instantaneous amplitude of the modulating signal.
• So, in phase modulation, the amplitude and the frequency of the carrier signal remains
constant.
• This can be better understood by observing the following figure.
• The phase of the modulated wave has got infinite points, where the phase shift in a
wave can take place.
• The instantaneous amplitude of the modulating signal changes the phase of the carrier
signal.
• When the amplitude is positive, the phase changes in one direction and if the
amplitude is negative, the phase changes in the opposite direction.
• Instead of a pulse train, PCM produces a series of numbers or digits, and hence this process is
called as digital.
• Each one of these digits, though in binary code, represent the approximate amplitude of the
signal sample at that instant.
• In Pulse Code Modulation, the message signal is represented by a sequence of coded pulses.
• This message signal is achieved by representing the signal in discrete form in both time and
amplitude.
• In spread-spectrum we spread the transmission power over the complete band as shown in
figure.
• In spread-spectrum the transmission signal bandwidth is much higher than the information
bandwidth.
• There are numerous ways to cause a carrier to spread; however, all spread-spectrum systems can
be viewed as two steps modulation processes.
• First, the data to be transmitted is modulated.
• Second, the carrier is modulated by the spreading code, causing it to spread out over a large
bandwidth.
• Hybrid System: A hybrid system combines the best points of two or more spread-spectrum
systems. The performance of a hybrid system is usually better than can be obtained with a single
spread-spectrum technique for the same cost.
• The most common hybrids combine both frequency-hopping and direct-sequence techniques.
• Amateurs and business community are currently authorized to use only two spreading
techniques. These are frequency hopping and direct sequence techniques.
• Rest of the Spread-Spectrum technologies are classified and used by military and space sciences.
Types of Errors
• There may be three types of errors:
1. Single bit:
o In a frame, there is only one bit, anywhere though, which is corrupt.
2. Multiple bit:
o Frame is received with more than one bits in corrupted state.
3. Burst:
o Frame contains more than 1 consecutive bits corrupted.
Detection Methods
1. Parity Check
2. Cyclic Redundancy check
3. Checksum
Detection
Methods
Cyclic
Parity Check Redundancy Checksum
Check
Figure 19: Detection Methods
Parity checks
• In this technique, a redundant bit called parity bit, is appended to every data unit so that the
number of 1s in the unit including the parity becomes even.
• Blocks of data from the source are subjected to a check bit or Parity bit generator form, where a
parity of 1 is added to the block if it contains an odd number of 1’s and 0 is added if it contains an
even number of 1’s.
• At the receiving end the parity bit is computed from the received data bits and compared with
the received parity bit.
• This scheme makes the total number of 1’s even, that is why it is called even parity checking.
Performance
• A receiver can detect all single bit errors in each code word.
• Errors in more than one bit cannot be detected.
10110011 | 1
10101011 | 1
Row parities
01011010 | 0
11010101 | 1
Column 10010111 | 1
parities
Performance
• Two- Dimension Parity Checking increases the likelihood of detecting burst errors.
• 2-D Parity check of n bits can detect a burst error of n bits.
• A burst error of more than n bits is also detected by 2-D Parity check with a high-probability.
• If two bits in one data unit are damaged and two bits in exactly same position in another data
unit are also damaged, the 2-D Parity check checker will not detect an error.
Checksum
• Here, the data is divided into k segments each of m bits.
• In the sender’s end the segments are added using 1’s complement arithmetic to get the sum.
• The sum is complemented to get the checksum.
• The checksum segment is sent along with the data segments.
• At the receiver’s end, all received segments are added using 1’s complement arithmetic to get
the sum. The sum is complemented.
• If the result is zero, the received data is accepted; otherwise discarded.
Performance
• The checksum detects all errors involving an odd number of bits.
• It also detects most errors involving even number of bits.
Performance
• CRC is a very effective error detection technique.
• If the divisor is chosen according to the previously mentioned rules, its performance can be
summarized as follows
• CRC can detect all single-bit errors
• CRC can detect all double-bit errors (three 1’s)
Sender Receiver
m n bits Data CR
Data 00… C
0
n+1
n+1 bits
bits Divisor
Divisor
n bits Remainder
CRC
Y N
11 10 9 8 7 6 5 4 3 2 1
d d d r d d d r d r r
Redundancy bits
• Step-2
11 10 7 6 3 2 1
d d d r8 d d d r4 d r2 r1
• Step:3
Example
Data: 1 0 0 1 1 0 1
Data 1 0 0 1 1 0 1
Adding r1 1 0 0 1 1 0 1 1
Adding r2 1 0 0 1 1 0 1 0 1
Adding r4 1 0 0 1 1 0 0 1 0 1
Adding r8 1 0 0 1 1 1 0 0 1 0 1
Data: 1 0 0 1 1 1 0 0 1 0 1
• Error in transmission
Sent Received
1 0 0 1 1 1 0 0 1 0 1 1 0 0 1 0 1 0 0 1 0 1
Error
• Error bit detection
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 0 1 0 0 1 0 1
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 0 1 0 0 1 0 1
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 0 1 0 0 1 0 1
11 10 9 8 7 6 5 4 3 2 1
1 0 0 1 0 1 0 0 1 0 1
Applications on 3G
• In 3G, there will be different types of client applications: Local, Occasionally connected, Online
and Real-time.
• Games, cartoons and similar applications are examples of local applications. These applications
can be downloaded over the air and used offline.
• In an occasionally connected computing (OCC) environment, the user will connect to the network
occasionally. Downloading and uploading of emails are the best examples of OCC.
• Online applications will be the corporate applications. Examples of such applications will be
online order booking or updating of inventory status.
• Real-time applications could be real-time stock updates or applications for law-enforcement
agents for real-time tracking or navigational systems.
• Few 3G specific applications are:
o Virtual Home Environment (VHE) – Virtual Home Environment can be defined as a
concept where an environment is created in a foreign network (or home network outside
the home environment).
o So, that the mobile users can experience the same computing experience as they have in
their home or corporate computing environment while they are mobile and roaming.
o Personal Communication Networks (PCN) – These are digital telephone networking
infrastructures, which supports personal numbering, individual service selection, and
moves towards unified billing and call anytime, anywhere through wireless digital
telephony.
o Universal Subscriber Identity Module (USIM) – This is the smart card for third generation
mobile phones. A SIM card in the mobile phone offers portability, security and
individuality.
o Audio/Video – Third generation applications will be used to download music, multimedia,
news, etc.
o VoIP
o Electronic Agents – Electronic agents are defined as “mobile programs that go places in
the network to carry out their owners’ instructions. They can be thought of as extensions
of the people who dispatch them.”
o Downloading of Software and Content
o ENUM – ENUM is a protocol that is emerging from work of Internet Engineering Task
Force’s (IETF’s) Telephone Number Mapping working group.
• SDMA serves different users by using spot beam antenna. These areas may be served by the
same frequency or different frequencies.
• However for limited co-channel interference it is required that the cells are sufficiently
separated. This limits the number of cells a region can be divided into and hence limits the
frequency re-use factor. A more advanced approach can further increase the capacity of the
network. This technique would enable frequency re-use within the cell. In a practical cellular
environment it is improbable to have just one transmitter fall within the receiver beam width.
Therefore it becomes imperative to use other multiple access techniques in conjunction with
SDMA.
• When different areas are covered by the antenna beam, frequency can be re-used, in which
case TDMA or CDMA is employed, for different frequencies FDMA can be used.
Fixed TDMA
• In this, connections between time slots in each frame and data streams assigned to a user
remain static and switched only when large variations in traffic are required.
• In this variant, the slot sizes are fixed at T/N (T is time in seconds and N is the number of users).
Figure 3: Time Division Multiple Access
Dynamic TDMA
• In this, a scheduling algorithm is used to dynamically reserve a variable number of time slots in
each frame to variable bit-rate data streams.
• This reservation algorithm is based on the traffic demand of each data stream.
• Unlike competing systems, such as GSM, that use TDMA, CDMA does not assign a specific
frequency to each user.
• Instead, every channel uses the full available spectrum. Individual conversations are encoded
with a pseudo-random digital sequence.
• CDMA consistently provides better capacity for voice and data communications than other
commercial mobile technologies, allowing more subscribers to connect at any given time, and it
is the common platform on which 3G technologies are built.
• For example, CDMA is a military technology first used during World War II by English allies to
foil German attempts at jamming transmissions.
• Unlike the FDMA or TDMA where a frequency or time slot is assigned exclusively to a
subscriber, in CDMA all subscribers in a cell use the same frequency band simultaneously.
• To separate the signals, each subscriber is assigned an orthogonal code called “chip”.
Cell
Base Station
(Network Tower)
Cell Structure
• The coverage area of cellular networks divided into cells, each cell having its own antenna for
transmitting the signals.
• Each cell has its own frequencies.
• Though in reality, these cells could be of any shape, for proper modeling purposes these are
modeled as hexagons.
• A hexagon cell shape is highly recommended for its easy coverage and calculations. It offers the
following advantages −
o Provides equidistant antennas.
o Distance from center to vertex equals length of side.
Frequency Reuse
• To serve hundreds of thousands of users, the frequency must be reused and this is done
through cells.
• The area to be covered and subdivided into radio zones or cells.
• Base station positioned at the center of the cell.
• Data communication in cellular networks served by its base station transmitter, receiver, and its
control unit.
• When moving from one cell to another during an ongoing conversation, an automatic channel
change occurs.
• This phenomenon is called handover. Handover maintains an active speech and data connection
over cell boundaries.
• The regular repetition of frequencies in cells results in a clustering of cells.
• The clusters generated in this way can consume the whole frequency band.
Cell Cluster
• Each cell ! receives a subset of frequencies "#! from the entire set assigned to the respective
mobile network.
• To avoid any co-channel interference two neighboring cells never uses the same frequencies.
• Only at a distance of $ (known as frequency reuse distance), the same frequency from the set
"#! can be reused.
• Cells with distance $ from cell !, can be assigned one or all the frequencies from the set "#!
belonging to cell !.
• The size of a cluster defined by %, the number of cells in the cluster.
• It also defines the frequency reuse distance $. The figure shows an example of cluster size of 4.
GSM Specification
• Uses a combination of FDMA (Frequency Division Multiple Access) and TDMA (Time Division
Multiple Access).
• Allocation of 50 MHz (890–915 MHz and 935–960 MHz) bandwidth in the 900 MHz frequency
band and using FDMA further divided into 124 (125 channels, 1 not used) channels each with a
carrier bandwidth of 200 KHz.
• Using TDMA, each of the above mentioned channels is then further divided into 8 time slots
• So, with the combination of FDMA and TDMA, a maximum of992 channels for transmit and
receive can be realized.
• It consists of the minimum one administrative region assigned to one Mobile Switching Centre
(MSC).
• An administrative region is commonly known as Public Land Mobile Network (PLMN).
• Each administrative region subdivided into one or many Location Area (LA).
• One LA consists of many cell groups and each cell group assigned to one Base Station Controller
(BSC).
• For each LA, there will be at least one BSC while cells in one BSC can belong to different LA.
GSM Architecture
• In System, It consists at the minimum one administrative region assigned to one MSC (Mobile
Switching Centre).
• Administrative region is commonly known as PLMN (Public Land Mobile Network).
• Each administrative region is subdivided into one or many Location Area (LA).
• One LA consists of many cell groups and each cell group is assigned to one BSC (Base Station
Controller).
• For each LA, there will be at least one BSC while cells in one BSC can belong to different LAs.
• Cells are formed by the radio areas covered by a BTS (Base Transceiver Station). Several BTSs
are controlled by one BSC.
• Traffic from the MS (Mobile Station) is routed through MSC. Calls originating from or
terminating in a fixed network or other mobile networks is handled by the GMSC (Gateway
MSC)
• For all subscribers registered with a cellular network operator, permanent data such as the
service profile is stored in the Home Location Register (HLR). The data relate to the following
information:-
o Authentication information like IMSI.
o Identification information like name, address, etc., of the subscriber.
o Identification information like MSISDN, etc.
o Billing information like prepaid or postpaid customer.
o Operator select denial of service to a subscriber.
o Handling of supplementary services like for CFU (Call Forwarding Unconditional), CFB
(Call Forwarding Busy), CFNR (Call Forwarding Not Reachable) or CFNA (Call Forwarding
Not Answered)
o Storage of SMS Service Center (SC) number in case the mobile is not connectable so that
whenever the mobile is connectable, a paging signal is sent to the SC
o Provisioning information like whether long distance and international calls allowed or
not.
o Provisioning information like whether roaming is enabled or not
o Information related to auxiliary services like Voice mail, data, fax services, etc.
o Information related to auxiliary services like CLI (Caller Line Identification), etc.
o Information related to supplementary services for call routing. In GSM network, one can
customize the personal profile to the extent that while the subscriber is roaming in a
foreign PLMN, incoming calls can be barred. Also, outgoing international calls can be
barred, etc.
o Some variable information like pointer to the VLR, location area of the subscriber, Power
OFF status of the handset, etc.
• The GSM technical specifications define different entities that form the GSM network by
defining their functions and interface requirements. The GSM network can be divided into 5
main groups:-
• The Mobile Station (MS): This includes the Mobile Equipment (ME) and the Subscriber Identity
Module (SIM).
• The Base Station Subsystem (BSS): This includes the Base Transceiver Station (BTS) and the
Base Station Controller (BSC).
• The Network and Switching Subsystem (NSS): This includes Mobile Switching Center (MSC),
Home Location Register (HLR), Visitor Location Register (VLR), Equipment Identity Register (EIR),
and the Authentication Center (AUC).
• The Operation and Support Subsystem (OSS): This includes the Operation and Maintenance
Center (OMC).
• The data infrastructure that includes Public Switched Telephone Network (PSTN), Integrated
System Digital Network (ISDN), and the Public Data Network (PDN).
Entities in GSM
1. Mobile Equipment (ME)
Mobile Station (MS) 2. Subscriber Identity Module (SIM)
Mobile Station(MS)
• Mobile Station (MS) consists of two main elements:
o Mobile equipment or mobile device (that is the phone without the SIM card)
o Subscriber Identity Module (SIM)
• Terminals distinguished principally by their power and application.
• SIM is installed in every GSM phone and identifies the terminal.
• SIM cards used in GSM phones are smart processor cards possess a processor and a small
memory.
• SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the
subscriber to the system, a secret key for authentication, and other security information.
• BTS holds the radio transmitter and the receivers that define a cell and handles the radio-link
protocols with the Mobile Station.
• Each BTS has between 1 and 16 transceivers depending on the density of users in the cell.
• Base Station Controller is the connection between the BTS and the Mobile service Switching
Center (MSC) and manages the radio resources for one or more BTSs.
• BSC handles:
o Handovers process.
o Radio-channel setup.
o Control of radio frequency power levels of the BTSs.
o Exchange function, and frequency hopping.
• There is a component called Gateway MSC (GMSC) that associated with the MSC.
• GMSC is the interface between the mobile cellular network and the PSTN and also is in charge
of routing calls from the fixed network towards a GSM user and vice versa.
• GMSC often implemented in the same node as the MSC.
• GIWU (GSM Inter Working Unit) corresponds to an interface to various networks for data
communications.
BSC
BTS
PSTN
GMSC ISDN
PDN
MSC
VLR
BSC
BTS
HLR
AUC
BTS
NSS
EIR
Figure 12: System Architecture of GSM
• In addition to this, when the mobile communicates with a particular BTS, one of the responses it
makes is to send out a list of the radio channels of the beacon frequencies of neighboring BTSs
via the Broadcast Channel (BCCH).
• The mobile scans these and reports back the quality of the link to the BTS. In this way the
mobile assists in the handover decision and as a result this form of GSM handover is known as
Mobile Assisted Hand over (MAHO).
• The network knows the quality of the link between the mobile and the BTS as well as the
strength of local BTSs as reported back by the mobile.
• It also knows the availability of channels in the nearby cells. As a result it has all the information
it needs to be able to make a decision about whether it needs to hand the mobile over from one
BTS to another.
• If the network decides that it is necessary for the mobile to hand over, it assigns a new channel
and time slot to the mobile. It informs the BTS and the mobile of the change.
• The mobile then retunes during the period it is not transmitting or receiving, i.e. in an idle
period.
• A key element of the GSM handover is timing and synchronization. There are a number of
possible scenarios that may occur dependent upon the level of synchronization.
Roaming
• In wireless telecommunications, roaming is a general term that refers to the extending of
connectivity service in a location that is different from the home location where the service was
registered. Roaming ensures that the wireless device keeps connected to the network, without
losing the connection. The term "roaming" originates from the GSM (Global System for Mobile
Communications) sphere; the term "roaming" can also be applied to the CDMA technology.
Handoff
• In cellular telecommunications, the term handover or handoff refers to the process of
transferring an ongoing call or data session from one channel connected to the core network to
another.
• International Mobile Subscriber Identity (IMSI): Each registered user is uniquely identified by
its international mobile subscriber identity (IMSI).
• It is stored in the subscriber identity module (SIM). A mobile station can only be operated if a
SIM with valid IMSI is inserted into equipment with a valid IMEI.
Maximum 15 digit
3 digits 2-3 digits Where:
• Mobile Network Code -MNC
• Mobile Country Code - MCC
MCC MNC MSIN
• Mobile Subscriber Identification
National MSI Number - MSIN
IMSI
• Location Area Identity: Each LA in a PLMN has own identifier called Location Area Identifier
(LAI) which is structured hierarchically and unique. Example: 502-20-60001
• Mobile Station Roaming Number (MSRN): When a subscriber is roaming in another network, a
temporary ISDN number assigned to the subscriber called MSRN.
o MSRN assigned by the local VLR in charge of the mobile station and follows the structure
of MSISDN.
• Temporary Mobile Subscriber Identity (TMSI): TMSI is a temporary identifier assigned by the
serving VLR used in place of the IMSI for identification and addressing of the mobile station.
o Together with the current location area, a TMSI allows a subscriber to identified
uniquely.
• Local Mobile Subscriber Identity (LMSI): LMSI assigned by the VLR and stored in the HLR and
used as a searching key for faster database access within the VLR.
• Cell Identifier: Within an LA, every cell has a unique Cell Identifier (CI) together with an LAI, a
cell can be identified uniquely through Global Cell Identity (LAI & CI).
• Ciphering: This encrypts blocks of user data using a symmetric key shared by the mobile station
and the BTS.
• Burst formatting: It adds some binary information to the ciphered block for use in
synchronization and equalization of the received data.
• Modulation: The modulation technique chosen for the GSM system is the Gaussian Minimum
Shift Keying (GMSK) where binary data is converted back into analog signal to fit the frequency
and time requirements for the multiple access rules.
• This signal is then radiated as radio wave over the air.
• Multipath and equalization: An equalizer is in charge of extracting the ‘right’ signal from the
received signal while estimating the channel impulse response of the GSM system and then it
constructs an inverse filter.
• The received signal is then passed through the inverse filter.
• Synchronization: For successful operation of a mobile radio system, time and frequency
synchronization are needed.
• Frequency synchronization is necessary so that the transmitter and receiver frequency match
(in FDMA) while Time synchronization is necessary to identify the frame boundary and the bits
within the frame (in TDMA).
• To avoid collisions of burst transmitted by MS with the adjacent timeslot such collisions, the
Timing Advance technique is used where frame is advanced in time so that this offsets the delay
due to greater distance.
• Using this technique and the triangulation of the intersection cell sites, the location of a mobile
station can be determined from within the network.
Example
• The MSISDN number of a subscriber in Bangalore associated with Airtel network is
+919845XYYYYY which is a unique number and understood from anywhere in the world.
• Here, + means prefix for international dialing, 91 is the country code for India and 45 is the
network operator’s code (Airtel in this case).
• X is the level number managed by the network operator ranging from 0 to 9 while YYYYY is the
subscriber code which, too, is managed by the operator.
• The call first goes to the local PSTN exchange where PSTN exchange looks at the routing table
and determines that it is a call to a mobile network.
• PSTN forwards the call to the Gateway MSC (GMSC) of the mobile network.
• MSC enquires the HLR to determine the status of the subscriber. It will decide whether the call
is to be routed or not. If MSC finds that the call can be processed, it will find out the address of
the VLR where the mobile is expected to be present.
• If VLR is that of a different PLMN, it will forward the call to the foreign PLMN through the
Gateway MSC. If the VLR is in the home network, it will determine the Location Area (LA).
MSISDN
MSISDN
Indicates a MSISDN IMSI
switching MSRN
node MSRN
MSRN
MSRN
TMSI
• Within the LA, it will page and locate the phone and connect the call.
Um A
CM CM
GSM MM MM
Abis
Layer 3
RR BSSMAP
RR BSSMAP
• Across the A interface, the Message Transfer Part layer 2 of Signaling System Number 7 is used.
• Layer 3 of the GSM signaling protocol is itself divided into three sub-layers:
o Radio Resources Management: It controls the set-up, maintenance and termination of
radio and fixed channels, including handovers.
o Mobility Management: It manages the location updating and registration procedures as
well as security and authentication.
o Connection Management: It handles general call control and manages Supplementary
Services and the Short Message Service.
Supplementary Services
• Supplementary services are provided on top of teleservices or bearer services, and include
features such as caller identification, call forwarding, call waiting, multi-party conversation. A
brief description of supplementary services is given here:
o Multiparty Service or conferencing: The multiparty service allows a mobile subscriber to
establish multiparty conservations. That is, conservation between three or more
subscribers to setup a conference calls. This service is only applicable to normal
telephony.
o Call Waiting: This service allows a mobile subscriber to be notified of an incoming call
during a conversation. The subscriber can answer, reject or ignore the incoming call. Call
waiting is applicable to all GSM telecommunications services using circuit switched
connection.
o Call Hold: This service allows a mobile subscriber to put an incoming call on hold and
then resume this call. The call hold service is only applicable to normal telephony.
o Call Forwarding: The call forwarding supplementary service is used to divert calls from
the original recipient to another number, and is normally set up by the subscriber
himself.
o It can be used by the subscriber to divert calls from the Mobile Station when the
subscriber is not available, and so to ensure that calls are not lost.
o A typical scenario would be a salesperson turns off his mobile phone during a meeting
with customer, but does not wish to lose potential sales leads while he is unavailable.
o Call Barring: The concept of barring certain type of calls might seem to be a
supplementary disservice rather than service.
o However, there are times when the subscriber is not the actual user of the Mobile
Station, and as a consequence may wish to limit its functionality, so as to limit charges
incurred.
o If the subscriber and users and one and same, the call barring may be useful to stop calls
being routed to international destinations when they are route.
o The reasons for this are because it is expected that are roaming subscriber will pay the
charges incurred for international re-routing of calls.
o So, GSM devised some flexible services that enable the subscriber to conditionally bar
calls.
Introduction of GPRS
• GPRS is an abbreviation for General Packet Radio Service.
• GPRA is a means of providing packet switched data service with full mobility and wide area
coverage on GSM networks.
• The GPRS service is designed to ultimately provide data transfer up to 14.4 kBps to 171.2 KBps.
• Deployment of GPRS networks allows a variety of new applications ranging from mobile e-
commerce to mobile corporate VPN access.
• No dial-up modem connection is necessary.
• Offers fast connection set-up mechanism to offer a perception of being ‘always on’ or ‘always
connected’.
• Immediacy is one of the prime advantages of GPRS.
• SGSN sends queries to HLR to obtain profile data of GPRS subscribers. The SGSN is connected to
the base station system with Frame Relay.
SMS-GMSC
SMS-IWMSC Other GPRS
PLMN
GGSN
BSC
BTS
Internet/
GGSN ISDN/PDN
SGSN
VLR
BSC
BTS
HLR
AUC
BTS
EIR
Abbreviation:
AUC Authentication Center MS Mobile Station
BSC Base Station Controller MSC Mobile Switching Center
BTS Base Transceiver Station PDN Packet Data Network
EIR Equipment Identity Register PLMN Public Land Mobile Network
GGSN Gateway GPRS Support Node SMSC Short Message Service Center
SMS Nodes
• SMS-GMSCs and SMS-IWMSCs are upgraded to support SMS transmission via the SGSN.0
• Optionally, the MSC/VLR can be enhanced for more efficient coordination of GPRS and non-
GPRS services and functionality.
• GPRS uses two frequency bands at 45 MHz apart; viz., 890-915 MHz for uplink (MS to BTS), and
935-960 MHz for downlink (BTS to MS).
Applications of GPRS
• Communications: E-mail, fax, unified messaging and intranet/internet access, etc.
• Value-added services: Information services and games, etc.
• E-commerce: Retail, ticket purchasing, banking and financial trading, etc.
• Location-based applications: Navigation, traffic conditions, airline/rail schedules and location
finder, etc.
• Vertical applications: Freight delivery, fleet management and sales-force automation.
• Advertising: It may be location sensitive. For example, a user entering a mall can receive
advertisements specific to the stores in that mall.
• Figure shows the layered protocol structure between the MS and the GGSN.
Air Interface
• The air interface is located between the MS and the BSS. The protocols used on the air interface
are as follows:
o Radio link control/medium access control (RLC/MAC): RLC provides a reliable radio link
between the mobile and the BSS.
o MAC controls the access signaling procedures to the GPRS radio channel, and the
multiplexing of signaling and RLC blocks from different users onto the GSM physical
channel.
o GSM-RF layer: It is the radio subsystem that supports a certain number of logical
channels.
o This layer is split into two sub layers: the radio frequency layer (RFL), which handles the
radio and baseband part (physical channel management, modulation, demodulation,
and transmission and reception of radio blocks), and the physical link layer (PLL), which
manages control of the RFL (power control, synchronization, measurements, and
channel coding/decoding).
• A relay function is implemented in the BSS to relay the LLC PDUs between the air interface and
the Gb interface.
Gb Interface
• The Gb interface is located between the SGSN and the BSS. It supports data transfer in the
transmission plane. The Gb interface supports the following protocols:
o BSS GPRS protocol (BSSGP): This layer conveys routing and QoS-related information
between the BSS and SGSN.
o Network service (NS): It transports BSSGP PDUs and is based on a frame relay
connection between the BSS and SGSN.
• A relay function is implemented in the SGSN to relay the packet data protocol (PDP) PDUs
between the Gb and Gn interfaces.
Gn/Gp Interface
• The Gn interface is located between two GSNs (SGSN or GGSN) within the same PLMN, while
the Gp interface is between two GSNs in different PLMNs.
• The Gn/Gp interface is used for the transfer of packets between the SGSN and the GGSN in the
transmission plane. The Gn/Gp interface supports the following protocols:
o GPRS tunneling protocol (GTP): This protocol tunnels user data between the SGSN and
GGSN in the GPRS backbone network. GTP operates on top of UDP over IP. The layers L1
and L2 of the Gn interfaces are not specified in the GSM/GPRS standard.
o User datagram protocol (UDP): It carries GTP packet data units (PDUs) in the GPRS Core
Network for protocols that do not need a reliable data link (e.g., IP).
o Internet protocol (IP): This is the protocol used for routing user data and control
signaling within the GPRS backbone network.
• In case of static address, the network operator permanently assigns a PDP address to the user
while in other case, a PDP address is assigned to the user upon the activation of a PDP context.
• Using the message “activate PDP context request”, MS informs the SGSN about the requested
PDP context and if request is for dynamic PDP address assignment, the parameter PDP address
will be left empty.
• After necessary security steps, if authentication is successful, SGSN will send a ‘create PDP
context request’ message to the GGSN, the result of which is a confirmation message ‘create
PDP context response’ from the GGSN to the SGSN, which contains the PDP address.
• SGSN updates its PDP context table and confirms the activation of the new PDP context to the
MS.
• Disconnection from the GPRS network is called GPRS detach in which all the resources are
released.
How the packets are routed in GPRS. Explain GPRS packet routing
for Inter & Intra PLMN.
• Routing is the process of how packets are routed in GPRS.
• Here, the example assumes two intra-PLMN backbone networks of different PLMNs. Intra-
PLMN backbone networks connect GSNs of the same PLMN or the same network operator.
• These intra-PLMN networks are connected with an inter-PLMN backbone while an inter-PLMN
backbone network connects GSNs of different PLMNs and operators. However, a roaming
agreement is necessary between two GPRS network providers.
• Gateways between PLMNs and external inter-PLMN backbone are called border gateways
which perform security functions to protect the private intra-PLMN backbones against malicious
attacks.
• Let’s say that GPRS MS located in PLMN1 sends IP packets to a host connected to the IP
network (e.g. to a Web server connected to the Internet).
PLMN-1 PLMN-2
BSC BSC
BTS BTS
Inter-PLMN
SGSN GPRS backbone SGSN
• SGSN that the MS is registered with encapsulates the IP packets coming from the mobile
station, examines the PDP context and routes them through the intra-PLMN GPRS backbone to
the appropriate GGSN.
• GGSN de-encapsulates the packets and sends them out on the IP network, where IP routing
mechanisms are used to transfer the packets to the access router of the destination network
and finally, delivers the IP packets to the host.
• Let us also say that home-PLMN of the mobile station is PLMN2.
• An IP address has been assigned to MS by the GGSN of PLMN2 and so, MS’s IP address has the
same network prefix as the IP address of the GGSN in PLMN2.
• Correspondent host is now sending IP packets to the MS onto the IP network and are routed to
the GGSN of PLMN2 (the home-GGSN of the MS). The latter queries the HLR and obtains the
information that the MS is currently located in PLMN1.
• It encapsulates the incoming IP packets and tunnels them through the inter-PLMN GPRS
backbone to the appropriate SGSN in PLMN1 while the SGSN de-encapsulates the packets and
delivers them to the MS.
• HLR stores the user profile, the current SGSN address and the PDP addresses for every GPRS
user in the PLMN.
• When the MS registers with a new SGSN, HLR will send the user profile to the new SGSN.
• Signaling path between GGSN and HLR may be used by the GGSN to query a user’s location and
profile in order to update its location register.
Limitations of GPRS
• A GPRS is a new enabling mobile data service which offers a major improvement in spectrum
efficiency, capability and functionality compared with today's non-voice mobile services.
• However, it is important to note that there are some limitations with GPRS, which can be
summarized as:
Transit Delays
• GPRS packets are sent in all different directions to reach the same destination.
• This opens up the potential for one or some of those packets to be lost or corrupted during the
data transmission over the radio link.
• The GPRS standards recognize this inherent feature of wireless packet technologies and
incorporate data integrity and retransmission strategies.
• However, the result is that potential transit delays can occur.
Mobile IP
• The term “Mobile” in Mobile IP signifies that, while a user is connected to applications across
the Internet and the user’s point of attachment changes dynamically, all connections are
maintained despite the change in underlying network properties.
• Similar to the handoff/roaming situation in a cellular network.
• Mobile IP allows the mobile node to use two IP addresses called home address and care of
address.
• The home address is static and known to everybody as the identity of the host.
• The care of address changes at each new point of attachment and can be thought of as the
mobile node’s location specific address.
Home
Network
for A Mobile Foreign 4
Node A Network
3
Home
2 Foreign
Agent
1 Internet or other Agent
topology or routers
and links 5
Server X
• Let’s take the case of mobile node (A) and another host (server X). The following steps take
place:
• Server X wants to transmit an IP datagram to node A.
• The home address of A is advertised and known to X.
• X does not know whether A is in the home network or somewhere else.
• Therefore, X sends the packet to A with A’s home address as the destination IP address in the IP
header.
• The IP datagram is routed to A’s home network.
• At the A’s home network, the incoming IP datagram is intercepted by the home agent.
• The home agent discovers that A is in a foreign network.
• A care of address has been allocated to A by this foreign network and available with the home
agent.
• The home agent encapsulates the entire datagram inside a new IP datagram, with A’s care of
address in the IP header.
• This new datagram with the care of address as the destination address is retransmitted by the
home agent.
• At the foreign network, the incoming IP datagram is intercepted by the foreign agent. The
foreign agent is the counterpart of the home agent in the foreign network. The foreign agent
strips off the outer IP header, and delivers the original datagram to A.
• A intends to respond to this message and sends traffic to X. In this example, X is not mobile;
therefore X has a fixed IP address.
• For routing A’s IP datagram to X, each datagram is sent to some router in the foreign network.
Typically, this router is the foreign agent.
Bearers:
GSM IS-136 CDMA PHS CDPD PDC-P IDEN FLEX etc…
Cordless System
• Cordless system is a general term of cordless telephones and cordless telecommunication
systems.
• Cord means a wire, so, a cordless system means wireless system.
• A cordless telephone is known as a portable telephone and it acts as a standard phone.
• A base station communicates with the cordless handset through radio waves, and this usually
only works within a limited range like residence or office.
Base station
antenna
Residence
Wireless links
Wireless link
Office
Building
Switching
Center
Govt.
Agency
Wireless Broadband
• It is known as Wireless Metropolitan Area Network (Wireless MAN) / Wireless Interoperability
Microwave Access (WiMAX).
IEEE 802.16 standards define how wireless traffic will move between subscribers and core networks.
Residential
subscriber Base Station ISP
• Long-term cost-benefits are greater in dynamic environment requiring frequent moves and
changes.
• Scalability: Wireless LAN can be configured in a variety of topologies to meet the users need
and can be easily scaled to cover a large area with thousands of users roaming within it.
• In infrastructure mode, the mobile station-MS are connected to a abase station or access point.
• This is similar to a star network where all the mobile stations are attached to the base station.
• Through a protocol the base station manages the dialogue between the AP and MS.
• Most companies, public hotspots, and homeowners implement infrastructure WLANs. In this
configuration, one or more access points interface wireless mobile devices to the distribution
system.
• Each access point forms a radio cell, also called a basic service set (BSS), which enables wireless
users located within the cell to connect to the access point.
• This allows users to communicate with other wireless users, as well as with servers and network
applications connecting to the distribution system.
• A company, for example, can use this configuration to enable employees to access corporate
applications and the Internet from anywhere within the facility.
• Physical layer convergence procedure (PLCP): Defines a method of mapping 802.11 MAC layer
protocol data units (MPDUs) into a framing format suitable for sending and receiving user data
and management information between two or more stations using the associated PMD sub
layer.
• Physical medium dependent sub layer (PMD): Defines the characteristics of, and method of
transmitting and receiving, user data through a wireless medium between two or more stations
• Above the physical layer are the functions associated with providing service to LAN users. These
include
o On transmission, assemble data into a frame with address and error detection fields.
o On reception, disassemble frame, and perform address recognition and error detection.
o Govern access to the LAN transmission medium.
o Provide an interface to higher layers and perform flow and error control.
• These are functions typically associated with OSI layer 2. The set of functions the last bullet item
is grouped into a logical link control (LLC) layer. The functions in the first three bullet items are
treated as a separate layer, called medium access control (MAC).
• The separation is done for the following reasons:
o The logic required to manage access to a shared-access medium is not found in
traditional layer 2 data link control.
o For the same LLC, several MAC options may be provided.
• The smallest building block of a wireless LAN is a basic service set (BSS), which consists of some
number of stations executing the same MAC protocol and competing for access to the same
shared wireless medium.
• A BSS may be isolated or it may connect to a backbone distribution system (DS) through an
access point (AP).
• The AP functions as a bridge and a relay point. In a BSS, client stations do not communicate
directly with one another.
• Rather, if one station in the BSS wants to communicate with another station in the same BSS,
the MAC frame is first sent from the originating station to the AP, and then from the AP to the
destination station.
• Similarly, a MAC frame from a station in the BSS to a remote station is sent from the local
station to the AP and then relayed by the AP over the DS on its way to the destination station.
• The BSS generally corresponds to what is referred to as a cell in the literature. The DS can be a
switch, a wired network, or a wireless network.
• When all the stations in the BSS are mobile stations, with no connection to other BSSs, the BSS
is called an independent BSS (IBSS).
• An IBSS is typically an ad hoc network. In an IBSS, the stations all communicate directly, and no
AP is involved.
• A simple configuration is shown in Figure, in which each station belongs to a single BSS; that is,
each station is within wireless range only of other stations within the same BSS.
• It is also possible for two BSSs to overlap geographically, so that a single station could
participate in more than one BSS.
• Further, the association between a station and a BSS is dynamic. Stations may turn off, come
within range, and go out of range.
• An extended service set (ESS) consists of two or more basic service sets interconnected by a
distribution system.
• Typically, the distribution system is a wired backbone LAN but can be any communications
network.
• The extended service set appears as a single logical LAN to the logical link control (LLC) level.
• Figure indicates that an access point (AP) is implemented as part of a station; the AP is the logic
within a station that provides access to the DS by providing DS services in addition to acting as a
station.
• To integrate the IEEE 802.11 architecture with a traditional wired LAN, a portal is used. The
portal logic is implemented in a device, such as a bridge or router, that is part of the wired LAN
and that is attached to the DS.
o Station services are implemented in every 802.11 station, including access point (AP)
stations.
o Distribution services are provided between basic services sets (BSSs); these services may
be implemented in an AP or in another special purpose device attached to the
distribution system.
2. Three of the services are used to control IEEE 802.11 LAN access and confidentiality.
o Six of the services are used to support delivery of MAC service data units (MSDUs)
between stations.
o The MSDU is the block of data passed down from the MAC user to the MAC layer;
typically this is a LLC PDU If the MSDU is too large to be transmitted in a single MAC
frame, it may be fragmented and transmitted in a series of MAC frames.
• Distribution of Messages within a DS: The two services involved with the distribution of
messages within a DS are distribution and integration.
• Distribution is the primary service used by stations to exchange MAC frames when the frame
must traverse the DS to get from a station in one BSS to a station in another BSS.
• For example, suppose a frame is to be sent from station 2 (STA 2) to STA 7 in Figure.
• The frame is sent from STA 2 to STA 1, which is the AP for this BSS. The AP gives the frame to
the DS, which has the job of directing the frame to the AP associated with STA 5 in the target
BSS.
• STA 5 receives the frame and forwards it to STA 7. How the message is transported through the
DS is beyond the scope of the IEEE 802.11 standard.
• If the two stations that are communicating are within the same BSS, then the distribution
service logically goes through the single AP of that BSS.
• The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a
station on an integrated IEEE 802.x LAN.
• The term integrated refers to a wired LAN that is physically connected to the DS and whose
stations may be logically connected to an IEEE 802.11 LAN via the integration service.
• The integration service takes care of any address translation and media conversion logic
required for the exchange of data.
• To meet this requirement, a station must maintain an association with the AP within its current
BSS. Three services relate to this requirement:
o Association: Establishes an initial association between a station and an AP Before a
station can transmit or receive frames on a wireless LAN, its identity and address must
be known.
o For this purpose, a station must establish an association with an AP within a particular
BSS. The AP can then communicate this information to other APs within the ESS to
facilitate routing and delivery of addressed frames.
o Reassociation: Enables an established association to be transferred from one AP to
another, allowing a mobile station to move from one BSS to another.
o Disassociation: A notification from either a station or an AP that an existing association
is terminated.
o A station should give this notification before leaving an ESS or shutting down. However,
the MAC management facility protects itself against stations that disappear without
notification.
• There are two characteristics of a wired LAN that are not inherent in a wireless LAN.
1. In order to transmit over a wired LAN, a station must be physically connected to the LAN. On
the other hand, with a wireless LAN, any station within radio range of the other devices on
the LAN can transmit. In a sense, there is a form of authentication with a wired LAN, in that
it requires some positive and presumably observable action to connect a station to a wired
LAN.
2. Similarly, in order to receive a· transmission from a station that is part of a wired LAN, the
receiving station must also be attached to the wired LAN. On the other hand, with a wireless
LAN, any station within radio range can receive. Thus, a wired LAN provides a degree of
privacy, limiting reception of data to stations connected to the LAN.
• IEEE 802.11 defines three services that provide a wireless LAN with these two features:
Authentication:
• Used to establish the identity of stations to each other. In a wired LAN, it is generally assumed
that access to a physical connection conveys authority to connect to the LAN.
• This is not a valid assumption for a wireless LAN, in which connectivity is achieved simply by
having an attached antenna that is properly tuned.
• The authentication service is used by stations to establish their identity with stations they wish
to communicate with IEEE 802.11 supports several authentication schemes and allows for
expansion of the functionality of these schemes.
• The standard does not mandate any particular authentication scheme, which could range from
relatively unsecure handshaking to public key encryption schemes.
• However, IEEE 802.11 requires mutually acceptable, successful authentication before a station
can establish an association with an AP.
De-authentication:
• This service is invoked whenever an existing authentication is to be terminated.
Privacy:
• Used to prevent the contents of messages from being read by other than the intended
recipient. The standard provides for the optional use of encryption to assure privacy.
• Similarly, the CTS alert all stations that are within reception range of the destination that an
exchange is under way.
• The RTS/CTS portion of the exchange is a required function of the MAC but may be disabled.
• The number of channels available depends on the bandwidth allocated by the various national
regulatory agencies.
• This ranges from 13 in most European countries to just one available channel in Japan.
• Frequency-hopping spread spectrum (FHSS) operating in the 2.4-GHz ISM band, at data rates of
1 Mbps and 2 Mbps.
• The number of channels available ranges from 23 in Japan to 70 in the United States.
• Infrared at 1 Mbps and 2 Mbps operating at a wavelength between 850 and 950nm.
• Even the 104-bit key proved to be vulnerable, due to a variety of weaknesses both internal and
external to the protocol supporting WEP.
• These vulnerabilities include the heavy reuse of keys, the ease of data access in a wireless
network, and the lack of any key management within the protocol.
• The 802.11i task group has developed a set of capabilities to address the WLAN security issues.
• In order to accelerate the introduction of strong security into WLANs, the Wi-Fi Alliance
promulgated Wi-Fi Protected Access (WPA) as a Wi-Fi standard.
• WPA is a set of security mechanisms that eliminates mos1 802.11 security issues and was based
on the current state of the 802.11i standard.
• As 802.11i evolves, WPA will evolve to maintain compatibility. IEEE 802.11i addresses three
main security areas: authentication, key management, and data transfer privacy. To improve
authentication, 802.11i requires the use of an authentication server (AS) and defines a more
robust authentication protocol.
• The AS also plays a role in key distribution. For privacy, 802.1li provides three different
encryption schemes.
• The scheme that provides a long-term solution makes use of the Advanced Encryption Standard
(AES) with 128-bit keys.
• However, because the use of AES would require expensive upgrades to existing equipment,
alternative schemes based on 104-bit RC4 are also defined.
• Figure gives a general overview of 802.11i operation. First, an exchange between a station and
an AP enables the two to agree on a set of security capabilities to be used. Then an exchange
involving the AS and the station pro vides for secure authentication. The AS is responsible for
key distribution to the A P, which in turn manages and distributes keys to stations. Finally,
strong encryption is used to protect data transfer between the station and the AP.
• And following security measures are a part of the 802.11 IEEE protocol:
o Authentication
o Association
o Encryption
• For communication purpose in wireless environment, the client should be authenticated
person, and then only he or she may be able to associate with other client and the data that is
to be transferred between two clients should be sent in encrypted form.
• In this problem, the transmission range of A reaches B but not C. Similarly, the range of C
reaches B but not A. Also the range of B reaches both A and C.
• Now, the node A starts to send something to B and C, but C doesn’t receive this transmission.
• Now C also wants to send data to B and senses the carrier. As it senses it to be free, it also starts
sending to B.
A B C
• A hidden terminal problem occurs when two nodes that are outside each other’s range
performs simultaneous transmission to a node that is within the range of each of them resulting
in a collision.
• That means the data from both parties A and C will be lose during the collision.
• Hidden nodes mean increased probability of collision at the receiver end.
• One solution to avoid this is to have the channel sensing range much greater than the receiving
range. Another solution is to use the Multiple Access with Collision Avoidance (MACA).
Unit-5: Bluetooth
Introduction of Bluetooth
• It was initiated in the year 1989 by Nils Rydbeck and "Bluetooth" name is taken from a 10th-
century Danish king Harald Blåtand named Harald Bluetooth, who was said to unite disparate,
warring regional factions. Like its namesake.
• Bluetooth technology brings together a broad range of devices across many different industries
through a unifying communication standard.
• Bluetooth is a short-range wireless communication technology that allows devices such as
mobile phones, computers, and peripherals to transmit data or voice wirelessly over a short
distance.
• The purpose of Bluetooth is to replace the cables that normally connect devices, while still
keeping the communications between them secure.
• For Example, mobile, headset, laptop, camera, etc.
• Bluetooth allows users to make ad hoc wireless connections between devices like mobile
phones, desktop or notebook computers wirelessly.
• Bluetooth operates in a globally available frequency bad ensuring interoperability. Bluetooth
uses the unlicensed 2.4GHz ISM (Industrial Scientific and Medical) frequency band.
• There are 79 available Bluetooth channels spaced 1MHz apart from 2.402 GHz to 2.480 GHz.
• The Bluetooth standard is managed and maintained by Bluetooth Special Interest Group.
• Data transfer at a speed of about 720 Kbps within 50 meters (150 feet) of range or beyond
through walls, clothing and even luggage bags.
• Several of these piconets can be linked together to form a larger network in an ad-hoc manner.
• The topology can be thought as a flexible, multiple piconet structure. This network of piconets is
called Scatternet.
• A Scatternet is formed when a device from one piconet also acts as a member of another
piconet. In this scheme, a device being a master in one piconet can simultaneously be a slave in
the other one.
• Baseband: It enables the physical RF link between Bluetooth units forming a piconet.
• This layer uses inquiry and paging procedures to synchronize the transmission with different
Bluetooth devices. Using SCO and ACL link different packets can be multiplexed over the
same.
• Link Manager Protocol: When two Bluetooth devices come within each other’s range, link
managers of either device discover each other.
• LMP then engages itself in peer-to-peer message exchange. These messages perform
various security functions starting from authentication to encryption.
• It also controls the power modes, connection state, and duty cycles of Bluetooth devices in a
piconet.
• Logical Link Control and Adaption Protocol (L2CAP): This layer is responsible for
segmentation of large packets and the reassembly of fragmented packets.
• L2CAP is also responsible for multiplexing of Bluetooth packets from different applications.
• Service Discovery Protocol (SDP): It enables a Bluetooth device to join a piconet. Using SDP
a device inquires what services are available in a piconet and how to access them.
• SDP uses a client-server model where the server has a list of services defined through
service records.
• In Bluetooth device there is only one SDP server. If a device provides multiple services, one
SDP server acts on behalf of all of them.
• The “cable replacement” protocol emulates RS-232 control and data signals over Bluetooth
Baseband Protocol.
4. Adopted Protocols:
• This has many protocols stacks like Point-to-Point Protocol (PPP), TCP/IP Protocol, OBEX
(Object Exchange Protocol), Wireless Application Protocol (WAP), vCard, vCalender, Infrared
Mobile Communication (IrMC), etc.
• PPP Bluetooth: This offers PPP over RFCOMM to accomplish point-to-point connections.
Point-to-Point Protocol is the means of taking IP packets to/from the PPP layer and placing
them onto the LAN.
• TCP/IP: This protocol is used for communication across the Internet. TCP/IP stacks are used
in numerous devices including printers, handheld computers, and mobile handsets.
• TCP/IP/PPP is used for the all Internet bridge usage scenarios.
• OBEX Protocol: OBEX is a session protocol developed by the Infrared Data Association (IrDA)
to exchange objects.
• OBEX provides the functionality of HTTP in a much lighter fashion. It defines a folder listing
object, which can be used to browse the contents of folders on remote devices.
• Content Formats: vCard and vCalender specifications define the format of an electronic
business card and personal calendar entries developed by the Versit consortium.
• These content formats are used to exchange messages and notes. They are defined in the
IrMC specification.
Bluetooth Security
• Bluetooth offers security infrastructure starting from authentication, key exchange to
encryption.
• At lower levels of the protocol stack, Bluetooth uses the publicly available cipher algorithm
known as SAFER+ to authenticate a device’s identity.
Application of Bluetooth
Model Description
File Transfer Refers to object transfer or transfer of files between devices.
Internet Bridge In this model, a cordless modem acts as a modem to a PC and provides dial-up
networking and faxing facilities.
LAN Access Multiple data terminals use a LAN access point (LAP) as a wireless connection to
an Ethernet LAN.
Synchronization The synchronization model enables a device-to-device synchronization of data.
Headset It is wirelessly connected and can act as an audio input-output interface of
remote devices.
Linux kernel
• This provides a level of abstraction between the device hardware and it contains all the
essential hardware drivers like camera, keypad, display etc.
• The kernel handles all the things that Linux is really good at such as networking and a vast array
of device drivers, which take the pain out of interfacing to peripheral hardware.
Libraries
• On top of Linux kernel there is a set of libraries including open-source Web browser engine
WebKit, well known library libc.
• SQLite database which is a useful repository for storage and sharing of application data, libraries
to play and record audio and video, SSL libraries responsible for Internet security etc.
Android Libraries
• This category encompasses those Java-based libraries that are specific to Android development.
Examples of libraries in this category include the application framework libraries in addition to
those that facilitate user interface building, graphics drawing and database access. A summary
of some key core Android libraries available to the Android developer is as follows.
• android.app − Provides access to the application model and is the cornerstone of all Android
applications.
• android.content − Facilitates content access, publishing and messaging between applications
and application components.
• android.database − Used to access data published by content providers and includes SQLite
database management classes.
• android.opengl − A Java interface to the OpenGL ES 3D graphics rendering API.
• android.os − Provides applications with access to standard operating system services including
messages, system services and inter-process communication.
• android.text − Used to render and manipulate text on a device display.
• android.view − The fundamental building blocks of application user interfaces.
• android.widget − A rich collection of pre-built user interface components such as buttons,
labels, list views, layout managers, radio buttons etc.
• android.webkit − A set of classes intended to allow web-browsing capabilities to be built into
applications.
Android Runtime
• This section provides a key component called Dalvik Virtual Machine which is a kind of Java
Virtual Machine specially designed and optimized for Android.
• The Dalvik VM makes use of Linux core features like memory management and multi-threading,
which is intrinsic in the Java language. The Dalvik VM enables every Android application to run
in its own process, with its own instance of the Dalvik virtual machine.
• The Android runtime also provides a set of core libraries which enable Android application
developers to write Android applications using standard Java programming language.
Application Framework
• The Application Framework layer provides many higher-level services to applications in the form
of Java classes. Application developers are allowed to make use of these services in their
applications.
• Activity Manager − Controls all aspects of the application lifecycle and activity stack.
• Content Providers − Allows applications to publish and share data with other applications.
• Resource Manager − Provides access to non-code embedded resources such as strings, color
settings and user interface layouts.
• Notifications Manager − Allows applications to display alerts and notifications to the user.
• View System − an extensible set of views used to create application user interfaces.
Applications
• You will find all the Android application at the top layer. You will write your application to be
installed on this layer only. Examples of such applications are Contacts Books, Browser, and
Games etc.
Application Components
• Application components are the essential building blocks of an Android application. These
components are loosely coupled by the application manifest file AndroidManifest.xml that
describes each component of the application and how they interact.
• There are following four main components that can be used within an Android application
Activities
• An activity represents a single screen with a user interface; in-short Activity performs actions on
the screen. For example, an email application might have one activity that shows a list of new
emails, another activity to compose an email, and another activity for reading emails. If an
application has more than one activity, then one of them should be marked as the activity that
is presented when the application is launched.
Services
• A service is a component that runs in the background to perform long-running operations. For
example, a service might play music in the background while the user is in a different
application, or it might fetch data over the network without blocking user interaction with an
activity.
Broadcast Receivers
• Broadcast Receivers simply respond to broadcast messages from other applications or from the
system. For example, applications can also initiate broadcasts to let other applications know
that some data has been downloaded to the device and is available for them to use, so this is
broadcast receiver who will intercept this communication and will initiate appropriate action.
• A broadcast receiver is implemented as a subclass of BroadcastReceiver class and each message
is broadcaster as an Intent object.
Content Providers
• A content provider component supplies data from one application to others on request. Such
requests are handled by the methods of the ContentResolver class. The data may be stored in
the file system, the database or somewhere else entirely.
• A content provider is implemented as a subclass of ContentProvider class and must implement
a standard set of APIs that enable other applications to perform transactions.
<manifest>
<uses-permission />
<permission />
<permission-tree />
<permission-group />
<uses-sdk />
<uses-configuration />
<uses-feature />
<supports-screens />
<compatible-screens />
<supports-gl-texture />
<application>
<activity>
<intent-filter>
<action />
<category />
<data />
</intent-filter>
<meta-data />
</activity>
<activity-alias>
<intent-filter> . . . </intent-filter>
<meta-data />
</activity-alias>
<service>
<intent-filter> . . . </intent-filter>
<meta-data/>
</service>
<receiver>
<intent-filter> . . . </intent-filter>
<meta-data />
</receiver>
<uses-library />
</application>
</manifest>
<manifest>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="string”
android:versionCode="integer"
android:versionName="string">
. . .
</manifest>
• The root element of the AndroidManifest.xml file. It must contain an <application> element and
specify xmlns:android and package attributes.
<application>
• The declaration of the application. This element contains sub elements that declare each of the
application's components and has attributes that can affect all the components.
<activity>
• Declares an activity that implements part of the application's visual user interface. All activities
must be represented by <activity> elements in the manifest file. Any that are not declared there
will not be seen by the system and will never be run.
<action>
<service>
3. Android Layouts
• The basic building block for user interface is a View object which is created from the View class
and occupies a rectangular area on the screen and is responsible for drawing and event
handling. View is the base class for widgets, which are used to create interactive UI components
like buttons, text fields, etc.
• The ViewGroup is a subclass of View and provides invisible container that hold other Views or
other ViewGroups and define their layout properties.
Linear Layout
android:id
• This is the ID which uniquely identifies the layout.
android:gravity
• This specifies how an object should position its content, on both the X and Y axes. Possible
values are top, bottom, left, right, center, center_vertical, center_horizontal etc.
android:orientation
• This specifies the direction of arrangement and you will use "horizontal" for a row, "vertical" for
a column. The default is horizontal.
<Button android:id="@+id/btnA"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:text="Button A"/>
<Button android:id="@+id/btnB"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:text="Button B"/>
</LinearLayout>
Relative Layout
• RelativeLayout is a view group that displays child views in relative positions. The position of
each view can be specified as relative to sibling elements (such as to the left-of or below
another view) or in positions relative to the parent RelativeLayout area (such as aligned to the
bottom, left or center).
• android:layout_alignParentTop
o If "true", makes the top edge of this view match the top edge of the parent.
• android:layout_centerVertical
o If "true", centers this child vertically within its parent.
• android:layout_below
o Positions the top edge of this view below the view specified with a resource ID.
• android:layout_toRightOf
o Positions the left edge of this view to the right of the view specified with a resource ID.
<Spinner
android:id="@id/SpA"
android:layout_width="96dp"
android:layout_height="wrap_content"
android:layout_alignParentRight="true" />
<Button
android:layout_width="96dp"
android:layout_height="wrap_content"
android:layout_below="@id/SpA"
android:layout_alignParentRight="true"/>
</RelativeLayout>
ScrollView
• ScrollView is a special kind of layout, designed to hold view larger than its actual size. When the
Views size goes beyond the ScrollView size, it automatically adds scroll bars and can be scrolled
vertically.
• ScrollView can hold only one direct child. This means that, if you have complex layout with more
view controls, you must enclose them inside another standard layout
like LinearLayout, TableLayout or RelativeLayout.
• You can specify layout_height and layout_width to adjust height and width of screen.
• Scrollview is ideal for screens where scrolling is required, but it is an overhead when scroll view
is used to render a larger list of data. Android provides specialized adapter views
like ListView, GridView are recommended for long lists.
• You should never use a ScrollView with a ListView or GridView, because they both takes care of
their own vertical scrolling.
• ScrollView only supports vertical scrolling. Use HorizontalScrollView for horizontal scrolling.
<ScrollView
xmlns:android="http://schemas.android.com/apk/res/android"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:orientation="vertical">
<LinearLayout
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:orientation="vertical">
<ImageView
android:id="@+id/imageView"
android:layout_width="wrap_content"
android:layout_height="200dp"
android:scaleType="centerCrop"
android:src="@drawable/image" />
<TextView
android:id="@+id/textView"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:text="@string/description"/>
</LinearLayout>
</ScrollView>
Table Layout
• Android TableLayout going to be arranged groups of views into rows and columns. You will use
the <TableRow> element to build a row in the table. Each row has zero or more cells; each cell
can hold one View object.
• android:collapseColumns
<TableLayout
xmlns:android="http://schemas.android.com/apk/res/android"
android:layout_width="match_parent"
android:layout_height="match_parent">
. . .
<TextView
android:id="@+id/TextView01"
android:text="Row 2 column 1"
android:layout_weight="1"/>
<TextView
android:id="@+id/TextView02"
android:text="Row 2 column 2"
android:layout_weight="1" />
<TextView
android:id="@+id/TextView03"
android:text="Row 2 column 3"
android:layout_weight="1" />
</TableRow>
</TableLayout>
FrameLayout
• Frame Layout is designed to block out an area on the screen to display a single item. Generally,
FrameLayout should be used to hold a single child view, because it can be difficult to organize
child views in a way that's scalable to different screen sizes without the children overlapping
each other.
• android:foreground
o This defines the drawable to draw over the content and possible values may be a color
value, in the form of "#rgb", "#argb", "#rrggbb", or "#aarrggbb".
• android:foregroundGravity
o Defines the gravity to apply to the foreground drawable. The gravity defaults to fill.
Possible values are top, bottom, left, right, center, center_vertical, center_horizontal
etc.
• android:measureAllChildren
o Determines whether to measure all children or just those in the VISIBLE or INVISIBLE
state when measuring. Defaults to false.
<FrameLayout
xmlns:android="http://schemas.android.com/apk/res/android"
android:layout_width="match_parent"
android:layout_height="match_parent">
<ImageView
android:src="@drawable/ic_launcher"
android:scaleType="fitCenter"
android:layout_height="250px"
android:layout_width="250px"/>
<TextView
android:text="Frame Demo"
android:layout_height="wrap_parent"
android:layout_width="wrap_parent"
android:gravity="center"/>
</FrameLayout>
Installation
• So let's launch Android Studio.exe, Make sure before launch Android Studio, Our Machine
should require installed Java JDK.
• Once you launched Android Studio, it’s time to mention JDK7 path or later version in android
studio installer.
• Need to specify the location of local machine path for Android studio and Android SDK.
• Need to specify the ram space for Android emulator by default it would take 512MB of local
machine RAM.
• At final stage, it would extract SDK packages into our local machine, it would take a while time
to finish the task.
• After done all above steps perfectly, you must get finish button and it going to be open android
studio project with Welcome to android studio message as shown below
• You can start your application development by calling start a new android studio project. in a
new installation frame should ask Application name, package information and location of the
project.
Textview
Definition
• A TextView displays text to the user and optionally allows them to edit it. A TextView is a
complete text editor; however the basic class is configured to not allow editing.
• android:id
o This is the ID which uniquely identifies the control.
• android:text
o Text to display.
• android:textColor
o Text color.May is a color value, in the form of "#rgb", "#argb", "#rrggbb", or "#aarrggbb".
• android:textSize
o Size of the text. Recommended dimension type for text is "sp" for scaled-pixels
(example: 15sp).
Example of TextView
<RelativeLayoutxmlns:android="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
tools:context=".MainActivity">
<TextView
android:id="@+id/text_id"
android:layout_width="300dp"
android:layout_height="200dp"
android:text="hello_world"
android:textColor="@android:color/holo_blue_dark"
android:textSize="50dp"/>
</RelativeLayout>
EditText
Definition
• An EditText is an overlay over TextView that configures itself to be editable. It is the predefined
subclass of TextView that includes rich editing capabilities.
• Edittext Attributes:-Following are the important attributes related to EditText control. You can
check Android official documentation for complete list of attributes and related methods which
you can use to change these attributes are run time.
• android:text
o If set, specifies that this TextView has a textual input method and automatically corrects
some common spelling errors.
• android:background
o This is a drawable to use as the background.
• android:id
o This supplies an identifier name for this view.
• android:visibility
o This controls the initial visibility of the view.
Example
<RelativeLayoutxmlns:android="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
tools:context=".MainActivity">
<EditText
android:id="@+id/edittext"
android:layout_width="fill_parent"
android:layout_height="wrap_content"
android:layout_alignLeft="@+id/button"
android:layout_below="@+id/textView1"
android:layout_marginTop="61dp"
android:ems="10"
android:text="@string/enter_text"android:inputType="text"/>
</RelativeLayout>
Button View
Definition
• A Button is a Push-button which can be pressed, or clicked, by the user to perform an action.
Button Attributes
• Following are the important attributes related to Button control. You can check Android official
documentation for complete list of attributes and related methods which you can use to change
these attributes are run time.
• android:drawableBottom
o This is the drawable to be drawn below the text.
• android:text
• This is the Text to display.
• android:background
• This is a drawable to use as the background.
• android:id
o This supplies an identifier name for this view.
• android:id
o This supplies an identifier name for this view.
Example
<?xml version="1.0" encoding="utf-8"?>
<RelativeLayout
xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
tools:context=".MainActivity">
<Button
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:text="Button"
android:id="@+id/button"
android:layout_alignTop="@+id/editText"
android:layout_alignLeft="@+id/textView1"
android:layout_alignStart="@+id/textView1"
android:layout_alignRight="@+id/editText"
android:layout_alignEnd="@+id/editText" />
</RelativeLayout>
Radio Buttton
<RadioButton
android:layout_width="wrap_content"
android:layout_height="55dp"
android:text="Male"
android:id="@+id/radioButton"
android:layout_gravity="center_horizontal"
android:checked="false"
android:textSize="25dp"/>
<RadioButton
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:text="Female"
android:id="@+id/radioButton2"
android:layout_gravity="center_horizontal"
android:checked="false"
android:textSize="25dp"
android:layout_weight="0.13"/>
</RadioGroup>
</RelativeLayout>
CheckBox
Definition
• A CheckBox is an on/off switch that can be toggled by the user. You should use check-boxes
when presenting users with a group of selectable options that are not mutually exclusive.
CheckBox Attributes
• Following are the important attributes related to CheckBox control. You can check Android
official documentation for complete list of attributes and related methods which you can use to
change these attributes are run time.Inherited from android.widget.TextView Class –
• android:autoText
o If set, specifies that this TextView has a textual input method and automatically corrects
some common spelling errors.
• android:drawableRight
<RelativeLayout
xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent”
tools:context=".MainActivity">
<CheckBox
android:id="@+id/checkBox1"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:text="Do you like Tutorials Point"
android:layout_above="@+id/button"
android:layout_centerHorizontal="true"/>
<CheckBox
android:id="@+id/checkBox2"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:text="Do you like android "
android:checked="false"
android:layout_above="@+id/checkBox1"
android:layout_alignLeft="@+id/checkBox1"
android:layout_alignStart="@+id/checkBox1"/>
</RelativeLayout>
Image View
Definition
• An ImageButton is an AbsoluteLayout which enables you to specify the exact location of its
children. This shows a button with an image (instead of text) that can be pressed or clicked by
the user.
ImageButton Attributes
• Following are the important attributes related to ImageButton control. You can check Android
official documentation for complete list of attributes and related methods which you can use to
change these attributes are run time.
• Inherited from android.widget.ImageView Class
• android:adjustViewBounds
o Set this to true if you want the ImageView to adjust its bounds to preserve the aspect
ratio of its drawable.
• android:baseline
o This is the offset of the baseline within this view.
• android:baselineAlignBottom
o If true, the image view will be baseline aligned with based on its bottom edge.
• android:cropToPadding
o If true, the image will be cropped to fit within its padding.
• android:src
o This sets a drawable as the content of this ImageView.
• android:id
o This supplies an identifier name for this vi
Example
<?xml version="1.0" encoding="utf-8"?>
<RelativeLayout
xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"android:layout_width="match_parent"
android:layout_height="match_parent"
tools:context=".MainActivity">
<ImageButton
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:id="@+id/imageButton"
android:layout_centerVertical="true"
android:layout_centerHorizontal="true"
android:src="@drawable/abc"/>
</RelativeLayout>
Rating Button
Definition
• Android RatingBar can be used to get the rating from the user. The Rating returns a floating-
point number. It may be 2.0, 3.5, 4.0 etc.
• Android RatingBar displays the rating in stars. Android RatingBar is the subclass of AbsSeekBar
class.
• The getRating() method of android RatingBar class returns the rating number.
Attributes:-
• android:id
• android:layout_alignParentTop
• android:layout_centerHorizontal
• android:layout_marginTop
Example
<RelativeLayout xmlns:androclass="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
tools:context=".MainActivity" >
<RatingBar
android:id="@+id/ratingBar1"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:layout_alignParentTop="true"
android:layout_centerHorizontal="true"
android:layout_marginTop="44dp" />
</RelativeLayout>
Option Menu
Definition
• Android Option Menus are the primary menus of android. They can be used for settings, search,
delete item etc.
• Here, we are going to see two examples of option menus. First, the simple option menus and
second, options menus with images.
• Here, we are inflating the menu by calling the inflate() method of MenuInflater class. To
perform event handling on menu items, you need to override onOptionsItemSelected() method
of Activity class.
Example
<RelativeLayout xmlns:androclass="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:paddingBottom="@dimen/activity_vertical_margin"
android:paddingLeft="@dimen/activity_horizontal_margin"
android:paddingRight="@dimen/activity_horizontal_margin"
android:paddingTop="@dimen/activity_vertical_margin"
tools:context=".MainActivity" >
</RelativeLayout>
<item android:id="@+id/item1"
android:title="Item 1"/>
<item android:id="@+id/item2"
android:title="Item 2"/>
<item android:id="@+id/item3"
android:title="Item 3"/>
</menu>
• registerForContextMenu(View v)
• First of all we need to register view for using Context menu. This method will set the
View.OnCreateContextMenuListener on the view to this activity,
so onCreateContextMenu(ContextMenu, View, ContextMenuInfo) will be called when it is time
to show the context menu.
activity_main.xml
<?xml version="1.0" encoding="utf-8"?>
<LinearLayout xmlns:android="http://schemas.android.com/apk/res/android"
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:gravity="center"
android:orientation="vertical" >
<Button
android:id="@+id/btn"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
</LinearLayout>
MainActivity.java
package com.example.contextmenu;
import android.app.Activity;
import android.os.Bundle;
import android.view.ContextMenu;
import android.view.MenuItem;
import android.view.View;
import android.view.ContextMenu.ContextMenuInfo;
import android.widget.Button;
import android.widget.Toast;
@Override
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_main);
registerForContextMenu(btn);
@Override
ContextMenuInfo menuInfo) {
super.onCreateContextMenu(menu, v, menuInfo);
menu.setHeaderTitle("Context Menu");
@Override
} else {
return false;
return true;