Wireless Lab Manual

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

University Institute of Technology

Rajiv Gandhi Proudyogiki Vishwavidyalaya

Department of Information Technology

Lab Manual
IT-702 Wireless and Mobile communication
7th Semester
Index
Exp. no Experiment title Page no.

1. Study of Network simulation Tools. 3


2. Study and Analysis of wired network. 5
3. Study and Analysis of wireless network. 8
4. Study and Analysis of Multiple Access 11
Techniques.
5. Study and Analysis of Bluetooth. 14
6. Study of Mobile IP. 16
7. Viva Questions 20
Experiment 1
Aim:
To study of different Network Simulation Tools for constructing and performance testing in
different network.

Requirements:
Network components and understanding of mathematical formulas.

Theory:
Type of network simulators:
1. OPNET (Optimized Network Evaluation Tool):
2. OPNET 's software environment is called Modeler, which is specialized for network
research and development. It can be flexibly used to study communication networks,
devices, protocols, and applications. Because of the fact of being a commercial
software provider, OPNET offers relatively much powerful visual or graphical
support for the users.
3. Network Simulator 2 (NS2):
4. NS2 is one of the most popular open-source network simulators. The original NS is a
discrete event simulator targeted at networking research. NS2 is the second version of
NS (Network Simulator). NS is originally based on REAL network simulator.
5. Network Simulator 3:
6. (NS3) Similar to NS2, NS3 is also an open sourced discrete-event network simulator
which targets primarily for research and educational use. NS3 is licensed under the
GNU GPLv2 license, and is available for research and development. NS3 is designed
to replace the current popular NS2. However, NS3 is not an updated version of NS2
since that NS3 is a new simulator and it is not backward-compatible with NS2.
7. OMNeT++:
8. OMNeT++ has generic and flexible architecture which makes it successful also in
other areas like the IT systems, queuing networks, hardware architectures, or even
business processes as well. It is similar with NS2 and NS3, OMNeT++ is also a
public-source, component-based network simulator with GUI support. Its primary
application area is communication networks.
Procedure:

Expected outcome:
We observed different Network Simulation Tools for constructing and performance testing in
different network.

Conclusion
Various Network Simulators has been successfully studied.
Experiment 2
Aim:
Study and Analysis of wired network.

Requirements:
Basic understanding of wired networks.

Theory:
The word wired refers to any kind of physical medium which is consisting of the cable. The
cables made up of the copper, fiber optics, and twisted pair. Wired network is mostly used to
carry different types of signals in the form of electricity from one medium to another. In a
wired network, only one internet connection is used in the cable. Only one device is attached
to one internet cable and data is shared among the different devices by using this same
concept of wire network.

Procedure:
Protocols of Wired Network
Wired network has the following protocols and let's discuss these protocols one by one:
• Ethernet
It is one of the protocols of a wired network and it is mostly used in the world.
Ethernet uses the access method which is called CSMA/CD (carrier sense multiple
access/collision detection).
This is basically a system in which each computer before sending some
information/data through the network must listen to the cable. In this only one by one
link is made. If there are multiple networks in a single line then computer have to wait
until the line is clear after that it sends the data to the receiver.

• Fast Ethernet
It is another type of protocol which is used to increase the speed of transmission and it
develops the new standards that have the speed of 100Mbps. this is called fast
Ethernet. Fast Ethernet requires the hub, networks interface cards and category
5(CAT5), fibre optics and twisted pair cable is required. This Ethernet is commonly
used in school nowadays.

• Local talk
Local talk is a wired network protocol which was developing by the Apple computer
for Macintosh computer. The data is transfer by using the special twisted pair cable. It
allows the linear bus, star or tree topologies using twisted pair cable. Disadvantages of
the local talk are the low speed of transmission which is 230Kbps.

• Token ring
The token ring protocol was developing by IBM in 1980 mid. The information is
carried out in the form of token and move round in the circle/ring. Two computers
cannot connect to each other until the will finish the task. After that, it connects with
the other system and its application on 2,23 computers system and rarely used because
its performance is very low and lots of time is consumed and lots of trouble is there.
its speed is 4Mbps 0r 16Mbps.

• FDDI
Fiber distributed data interface (FDDI) is another protocol of a wired network that is
used to connect two or more LAN. This is far away over a long distance. It is used as
the token ring method. But it uses the two rings for the transfer of the data. If one
system is busy then the other systems are automatically activated and transmit the
data. Its advantages are high speed and it works on the fiber optic cable at 100Mbps.

1. Advantages of the wired network:


o Power is not consumed so much.
o Wired network is easy to use, plug in the wire and ready to use the internet.
o There are varieties of cables available in the market nowadays. The user can
choose
o according to its need and budget.
o It provides the constant, stable and faster speed because it provides one to one
o connection.
o Security is very strong in a wired network.
o It is beneficial for small area network like at home or at the office.
o It is most reliable than a wireless network.
o It is good for business, home, office, school etc.
o Bandwidth is higher.
o It can extend to the longer distance by using the optical fiber.

2. Disadvantages of the wired network:


o It is not useful for the mobile or Smartphone. Because it requires some
physical sort of
o connection to use the internet.
o One wired network cable is attached to only one computer so it does not
facilitate
o another computer by single wire.
o Cable can be easily damaged after some time, so the user has to be very
careful while
o arranging and connect the cable with PC and protect the cable from any cuts
and water.
o It messes the room where you are gathering the wire
o If you want to connect more devices with each other you need an Ethernet
connection.
o But it also requires more wires to connect and if you are doing this then it is
difficult for
o you to find out that which wire is connected to which PC and it takes your lots
of time.
o If you want to expand your network then you need more cables and it becomes
more
o costly and takes lots of time to establish the network. If you want to expand
your
o network widely then you have to rewire all the devices and then again
establish the
o wider network.
o There is no freedom of movement for users.
o Wired network is not suitable for openly public usage.
o Lots of cables need to connect to the certain port.
o Set up is difficult sometimes but it’s expensive.

Expected outcome:
To study and analyse all types of wired network.
Conclusion:
We now have studied and analysed all types of wired network.
Experiment 3
Aim:
Study and Analysis of wireless network.

Requirements:
Basic understanding of wireless networks.

Theory:
The wireless network was also established by IEEE in 1947 with a standard 802.it first
connection was of 2Mb and that time it was not so much advance and familiar to anyone but
later with the passage of time and generating the new version of wireless, it becomes famous
over the world. Wireless word is used to refer to medium which is made up of
electromagnetic waves or infrared waves. All the devices, which are wireless that has sensor
or antennas embedded in them. It includes mobile, wireless sensor, TV remote, laptop etc. It
does not use the wire for the connection between two devices or to transfer the data. It uses
the radio frequency waves. Fiber optic and broadband ADSL are also used.

Procedure:
Types of wireless protocols:
There are three protocols of wireless network:
• Long range (measured in miles)

Long range protocols are used for speed to transfer the data over the longer distance.
It may be used as back-haul between two sites such as Smartphone etc. GSM (Global
System for Mobile Communication) is the most important protocol of wireless
network which is using in all world and its connections are between the cellular
phones and mobiles.
o LTE:
Before newer Smartphone, older generation used GPRS, EV-DO for the
communication. Because of those companies and industry have to spend lots of
money to upgrade it and made it supportive for 4G.LTE (long-term evaluation) is
used to improve the low data rates and other issues that occur in older phone. the
protocol can carry the 100Mbps of data which is divided into the users to use and
each user gave the 10Mbps.
o 60 GHz protocol:
Most of the video which is running on the computer needs 60GHz and they are
using it as well. It requires a lot of bandwidth. There are two different standard
called wirelesses HD and WiGig. It gives the best high-quality definition for the
video streaming.

• Medium range (measured in tens or hundreds of feet)

WLAN is usually used for the medium range protocol which is used for the
communication between the computers to enhance wired LAN or replace it. These all
protocols are the parts of IEEE (Institute of electrical and electronics engineers)
802.11 standards.
o Wi-Fi:
Wi-Fi is mostly used nowadays because of its range and access to another device.
It provides the facility of a hotspot as well. It becomes popular in 1990 for the
hardware usages. Wi-Fi can be controlled in the environment according to the
range. Its speed is lower as compared to the other wireless network protocols
speed but mobile device easily supports the Wi-Fi and LTE and give the
flexibility to the user.

o WAP:
The wireless application protocol is standardizing a protocol for communication.
It is used to provide the security and privacy to the network. There are other types
of protocols .one is WEP and the other is WPA. Both used for security.

• Short range (less than 10 feet)

Wireless Personal Area network or WPAN is also called short wireless protocols.
Which work on the lower frequencies between the devices which are just a few feet
away from each other? Bluetooth is an example of a short-range protocol. Its common
usage is that it allows the wireless headset to communicate with a portable phone.
Infrared data association or IRDA is older and used for every short-range protocol.

o Bluetooth:
It is the oldest wireless network protocol which is commonly used now a day. It
transfers the data from one device to another device. It needs a lower amount of
power to work then Wi-Fi and from most other wireless protocols. It is a short
distance wireless network protocol. Wi-Fi has been replaced with the Bluetooth
but some Smartphone still has the features of Bluetooth in their system.

o Ultrawideband:
It is UWB and also called digital pulse wireless. It used for short distance and
have a wide frequency band with lower power. And take that kind of data which
was bend due to some obstacle or due to some higher power.

Factor affecting the performance of the wireless network:


• Physical obstruction
• The range of the network and distance between the devices
• Sharing of signal
• Usage of network and load on the network
• Poor antennas
• Reflection back of the signal
• Spectrum channel limitation
• Restriction of the wireless signal
• The polarization of the signal
• Speed loss due to wireless overhead
• Lower performance
Expected outcome:
To study and analyse all types of wireless network.

Conclusion:
We now have studied and analysed all types of wireless networks.
Experiment 4
Aim:
Study and Analysis of Multiple Access Techniques.

Requirements:
Basic understanding of Access techniques.

Theory:
Sometimes a satellite’s service is present at a particular location on the earth station and
sometimes it is not present. That means, a satellite may have different service stations of its
own located at different places on the earth. They send carrier signal for the satellite.

In this situation, we do multiple access to enable satellite to take or give signals from
different stations at time without any interference between them. Following are the three
types of multiple access techniques.

• FDMA (Frequency Division Multiple Access)


• TDMA (Time Division Multiple Access)
• CDMA (Code Division Multiple Access)

Procedure:
• FDMA

In this type of multiple access, we assign each signal a different type of frequency band
(range). So, any two signals should not have same type of frequency range. Hence, there
won’t be any interference between them, even if we send those signals in one channel.

One perfect example of this type of access is our radio channels. We can see that each
station has been given a different frequency band in order to operate.
Let’s take three stations A, B and C. We want to access them through FDMA
technique. So, we assigned them different frequency bands.

As shown in the figure, satellite station A has been kept under the frequency range of
0 to 20 HZ. Similarly, stations B and C have been assigned the frequency range of 30-
60 Hz and 70-90 Hz respectively. There is no interference between them.

The main disadvantage of this type of system is that it is very burst. This type of
multiple access is not recommended for the channels, which are of dynamic and
uneven. Because, it will make their data as inflexible and inefficient.

• TDMA

As the name suggests, TDMA is a time-based access. Here, we give certain time
frame to each channel. Within that time frame, the channel can access the entire
spectrum bandwidth

Each station got a fixed length or slot. The slots, which are unused will remain in idle
stage.

In above figure, packets 1, 3 and 4 are active, which transmits data. Whereas, packets
2 and 5 are idle because of their non-participation. This format gets repeated every
time we assign bandwidth to that particular channel.

If a channel is transmitting heavier loads, then it can be assigned a bigger time slot
than the channel which is transmitting lighter loads. This is the biggest advantage of
TDMA over FDMA. Another advantage of TDMA is that the power consumption will
be very low.

• CDMA

In CDMA technique, a unique code has been assigned to each channel to distinguish
from each other. A perfect example of this type of multiple access is our cellular
system. We can see that no two persons’ mobile number match with each other
although they are same X or Y mobile service providing company’s customers using
the same bandwidth.

In CDMA process, we do the decoding of inner product of the encoded signal and
chipping sequence. Therefore, mathematically it can be written as

Encoded signal = Original data × chipping sequence

The basic advantage of this type of multiple access is that it allows all users to coexist
and use the entire bandwidth at the same time. Since each user has different code,
there won’t be any interference.

In this technique, a number of stations can have number of channels unlike FDMA
and TDMA. The best part of this technique is that each station can use the entire
spectrum at all time.

Expected outcome:
To study and analyse multiple access techniques.

Conclusion:
We now have understanding of multiple access techniques.
Experiment 5
Aim:
Study and Analysis of Bluetooth.

Requirements:
Basic understanding of Wireless Networks.

Theory:
Bluetooth is an industry standard, later adopted by the IEEE 802.15 work group as
the Wireless Personal Area Network Standard (WPAN). To clearly understand this, I
need to understand what a PAN is. A Personal Area Network can be defined as a
network of devices in close range to a person, which can communicate with each
other.

Procedure:
Like most wireless technologies, Bluetooth is fairly sophisticated and hence the complete
technical specification is very vast. I identify some key technical features of this technology
which actually makes it so interesting. Most of the actual technical details presented in this
section as borrowed from. The table 1 provides a summary of some key features of
Bluetooth.

• Interference from other devices


Because BLUETOOTH devices and Wi-Fi (IEEE802.11b/g) use the same frequency,
microwave interference may occur and resulting in communication speed deterioration,
noise, or invalid connection if this unit is used near a Wi-Fi device. In such a case,
perform the following.
o Use this unit at least 10 m (30 feet) away from the Wi-Fi device.
o If this unit is used within 10 m (30 feet) of a Wi-Fi device, turn off the Wi-Fi
device.
• Interference to other devices
Microwaves emitting from a BLUETOOTH device may affect the operation of electronic
medical devices. Turn off this unit and other BLUETOOTH devices in the following
locations, as it may cause an accident.
o where inflammable gas is present, in a hospital, train, airplane, or a gas station
o near automatic doors or a fire alarm

Other Properties of Bluetooth network:

• To be able to use the BLUETOOTH function, the BLUETOOTH device to be


connected requires the same profile as this unit. Note also that even if the same profile
exists, devices may vary in function depending on their specifications.
• Due to the characteristic of BLUETOOTH wireless technology, the sound played on
this unit is slightly delayed from the sound played on the BLUETOOTH device
during talking on the telephone or listening to the music.
• This unit supports security capabilities that comply with the BLUETOOTH standard
to provide a secure connection when the BLUETOOTH wireless technology is used,
but security may not be enough depending on the setting. Be careful when
communicating using BLUETOOTH wireless technology.
• We do not take any responsibility for the leakage of information during
BLUETOOTH communication.
• A device featuring the BLUETOOTH function is required to conform to the
BLUETOOTH standard specified by Bluetooth SIG, Inc. and be authenticated. Even
if the connected device conforms to the above-mentioned BLUETOOTH standard,
some devices may not be connected or work correctly, depending on the features or
specifications of the device.
• Noise or sound skips may occur depending on the BLUETOOTH device connected
with this unit, the communication environment or the usage environment.

Expected outcome:
To Study and analyse of Bluetooth technology.

Conclusion:
We now have understanding of Bluetooth network.
Experiment 6
Aim:
Study of Mobile IP.

Requirements:
Basic understanding of IP Address.

Theory:
Mobile IP is an IETF (Internet Engineering Task Force) standard communications
protocol designed to allow mobile devices' (such as laptop, PDA, mobile phone, etc.) users to
move from one network to another while maintaining their permanent IP (Internet Protocol)
address.

Defined in RFC (Request for Comments) 2002, mobile IP is an enhancement of the internet
protocol (IP) that adds mechanisms for forwarding internet traffic to mobile devices (known
as mobile nodes) when they are connecting through other than their home network.

Components of Mobile IP

The mobile IP has following three components as follows:

• Mobile Node (MN)

The mobile node is an end system or device such as a cell phone, PDA (Personal Digital
assistant), or laptop whose software enables network roaming capabilities.

• Home Agent (HA)

The home agent provides several services for the mobile node and is located in the home
network. The tunnel for packets towards the mobile node starts at home agent. The home
agent maintains a location registry, i.e., it is informed of the mobile node's location by the
current COA (care of address). Following alternatives for the implementation of an HA
exist.

• Foreign Agent (FA)

The foreign agent can provide several services to the mobile node during its visit to the
foreign network. The FA can have the COA (care or address) acting as a tunnel endpoint
and forwarding packets to the MN. The foreign agent can be the default router for the
MN.

Foreign agent can also provide security services because they belong to the foreign
network as opposed to the MN which is only visiting.
In short, FA is a router that may function as the point of attachment for the mobile node
when it roams to a foreign network delivers packets from the home agent to the mobile
node.

• Care of Address (COA)

The Care- of- address defines the current location of the mobile node from an IP point of
view. All IP packets sent to the MN are delivered to the COA, not directly to the IP
address of the MN. Packet delivery toward the mobile node is done using a tunnel. To be
more precise, the COA marks the endpoint of the tunnel, i.e. the address where packets
exit the tunnel.

• Correspondent Node (CN)

At least one partner is needed for communication. The correspondent node represents this
partner for the MN. The correspondent node can be a fixed or mobile node.

• Home Network

The home network is the subset the MN belongs to with respect to its IP address. No
mobile IP support is needed within this network.

• Foreign network

The foreign network is the current subset the MN visits and which is not the home
network.

Procedure:
The following case shows how a datagram moves from one point to another within the
Mobile IP framework.

• First of all, the internet host sends a datagram to the mobile node using the mobile
node's home address (normal IP routing process).
• If the mobile node (MN) is on its home network, the datagram is delivered through
the normal IP (Internet Protocol) process to the mobile node. Otherwise the home
agent picks up the datagram.
• If the mobile node (MN) is on foreign network, the home agent (HA) forwards the
datagram to the foreign agent.
• The foreign agent (FA) delivers the datagram to the mobile node.
• Datagrams from the MN to the Internet host are sent using normal IP routing
procedures. If the mobile node is on a foreign network, the packets are delivered to
the foreign agent. The FA forwards the datagram to the Internet host.

Process of Mobile IP

The mobile IP process has following three main phases, which are:

• Agent Discovery

During the agent discovery phase the HA and FA advertise their services on the
network by using the ICMP router discovery protocol (IROP).

Mobile IP defines two methods: agent advertisement and agent solicitation which are
in fact router discovery methods plus extensions.

o Agent advertisement: For the first method, FA and HA advertise their


presence periodically using special agent advertisement messages. These
messages advertisement can be seen as a beacon broadcast into the subnet. For
this advertisement internet control message protocol (ICMP) messages
according to RFC 1256, are used with some mobility extensions.
o Agent solicitation: If no agent advertisements are present or the inter arrival
time is too high, and an MN has not received a COA, the mobile node must
send agent solicitations. These solicitations are again bases on RFC 1256 for
router solicitations.

• Registration

The main purpose of the registration is to inform the home agent of the current
location for correct forwarding of packets.
Registration can be done in two ways depending on the location of the COA.

If the COA is at the FA, the MN sends its registration request containing the COA to the
FA which is forwarding the request to the HA. The HA now set up a mobility binding
containing the mobile node's home IP address and the current COA.

• Tunnelling

A tunnel is used to establish a virtual pipe for data packets between a tunnel entry and a
tunnel endpoint. Packets which are entering in a tunnel are forwarded inside the tunnel
and leave the tunnel unchanged. Tunnelling, i.e., sending a packet through a tunnel is
achieved with the help of encapsulation.

Tunnelling is also known as "port forwarding" is the transmission and data intended for
use only within a private, usually corporate network through a public network.

Expected outcome:
To study and analyse Mobile IP

Conclusion:
We now have basic understanding of Mobile IP.
Viva Questions
1) What is the wireless communication concept?
2) What do you mean by frequency reuse?
3) What do you mean by Handoff?
4) What do you mean by Mobile Station Subsystem?
5) What do you mean by Base Station Subsystem?
6) What do you mean by Network and Switching Subsystem?
7) What do you mean by Ad-hoc networks?
8) What are the different types of transmission impairment?
9) What is the difference between 3G and 4G?
10) Which multiple access technique is used by second-generation cellular systems?
11) The CDMA standard of the second-generation network is?
12) Popular 2G CDMA standard IS-95 is also known as
13) How many users or voice channels are supported for each 200 KHz channel in GSM?
14) How many voice channels are supported for each 30 kHz radio channel in IS-136?
15) How many users are supported in IS-95 for each 1.25 MHz?
16) Which modulation technique is used by GSM?
17) IS-95 uses which modulation technique?
18) IS-136 uses which modulation technique?
19) The disadvantages of 2G standards?
20) GSM (Global System for Mobile) was earlier also known as
21) 2G CDMA standard, IS-95, was proposed by which company?
22) Which 2G standard is used in Japan?
23) The 2G GSM technologies use a carrier separation of

You might also like