Mobile Tutorial Answers

Embed Size (px)

Citation preview

  • 7/31/2019 Mobile Tutorial Answers

    1/38

    SECTION 4

    Answers for the Mobile Communications

    Tutorial Questions

  • 7/31/2019 Mobile Tutorial Answers

    2/38

    MOBILE COMMUNICATIONS NETWORKS

    Explain the difference between the terms fixed, portable, mobile, and wireless in

    the context of telecommunications. Use some examples to illustrate your answer.

    Fixed, portable and wireless are terms used in telecommunications to describe

    devices. They mean the following:

    Fixed: Used to describe something which is stationary in one position and does not

    move. For example, a desktop computer is fixed.

    Portable: Means you could use the device with you in different locations such as a

    laptop.

    Mobile: Used to describe users. Users could move to different places and use the same

    as well as different devices.

    Wireless: Anything without wires or cables.

    How is user mobility achieved when using email?

    Email, short for electronic mail is the most common form of asynchronous

    communication where you do not need a common clock between the communicating

    devices. For example, I can send a mail to my friend and its not necessary for him to

    check it when Im sending it. He can check it whenever he wants to.

    The process involved in sending and receiving email is the same all over the world, so

    it makes it easy to access your account (or inbox) from any part of the world.

    Different types of softwares are available to provide the interface with the user. For

    example, we can use a web based program such as hotmail. We can log into our

    account from any computer and from any part of the world.

    Describe briefly how one could use mobile communication in the emergency

    services.

    Mobile communication has its special use in emergency services. For example:

    Police: The police department is being allotted with a frequency which only they canuse to communicate with each other. No one else is allowed to use that frequency. So

    1

  • 7/31/2019 Mobile Tutorial Answers

    3/38

    it helps the police to communicate with each other with the help of wireless phone in

    cases of emergency such as a theft.

    Hospitals: In cases of accidents or emergencies, the injured persons information can

    be sent to the hospital immediately by a wireless device.

    Taxis: The taxi service has been allocated a frequency for its own use. They use that

    frequency to communicate with all the cars running for that particular service. For

    example, the person in charge at the main office can use his talking device to

    communicate with all the taxis running on that service and ask for any who is free.

    Each and every taxi on that service can hear that message. Any available taxi responds

    by his own device to the main office. The person in charge their can then direct him to

    the required area of emergency. Everyone on that frequency can hear all the messagesas the main office cannot send messages to each and every taxi and ask whether its

    available or not.

    What is the difference between location aware services and follow-on services?

    Location aware services are the services you could use in the different location. These

    services usually use different devices. Follow-on services are the services follow you

    all the time. These services usually use a same device.

    Draw the basic reference model used to describe a simple network, and briefly

    explain the function of its components.

    2

  • 7/31/2019 Mobile Tutorial Answers

    4/38

    [1]

    Application: Provides different services to the applications

    Presentation: Converts the information

    Session: Handles problems which are not communication issues

    Transport: Provides end to end communication control.

    Network: Routes the information in the network.

    Data Link: Provides error control between adjacent nodes.

    Physical: Connects the entity to the transmission media.

    Which frequency bands are normally used for wireless communication? List the

    band names, and their usage. Why is there a need for a regulator on thefrequency spectrum?

    850-900 MHz

    Infrared transmission is used for directed links. For example, connect laptops, PAD

    (Personal digital assistant).

    The need for a regulator on a frequency spectrum is required as it is easy to find

    common, worldwide regulations and for worldwide coordination of

    telecommunication.

    3

  • 7/31/2019 Mobile Tutorial Answers

    5/38

    What is an isotropic antenna? Draw the radiation pattern of a simple dipole

    antenna? What is wavelength?

    The purpose of a transmitting antenna is to radiate electromagnetic waves into air. An

    isotropic antenna has no preferred direction of radiation. It radiates uniformly in alldirections.

    The radiation pattern of a simple dipole antenna is as follows:

    [2]

    Wavelength is the distance between two successive crusts or troughs of a wave.

    Describe clearly all the factors that affect wireless signal propagation. Use

    diagrams to illustrate your answers. Why does long term fading occur?

    Factors which affect signal propagation are:

    Shadowing:

    Signals are sometimes unable to pass through large obstacles. The higher the

    frequency of the radio signal, the more it behaves like light and small objects such asa simple wall, a truck or even trees may block the signals.

    Reflection:

    If an object is large compared to the wavelength of the signal, reflection occurs. This

    happens, for example, where there are huge buildings or mountains. The signals are

    then reflected back. This reflected signal is not as strong as the original signal as some

    of the signal power might have been absorbed by the obstacle itself.

    Scattering:

    4

  • 7/31/2019 Mobile Tutorial Answers

    6/38

    If the size of the signal is approximately the same as the wavelength, the radio signal

    maybe scattered. This basically means that the incoming signal is scattered into many

    smaller signals.

    Diffraction:

    Diffraction is very much similar to scattering. Signals are deflected at an edge and

    propagated into different directions. The resulting signal has varying strength and this

    depends on the location of the receiver.

    [2]

    Varying distance to the sender or more remote obstacles cause long-term fading, it

    makes slow changes in the average power received. Long-term fading is basically

    distance related attenuation.

    What is meant by the term intersymbol interference?

    Interference with neighbor symbols, Inter Symbol Interference (ISI). The signal

    reaches a receiver directly and phase shifted.

    In two or three sentences, explain what multiplexing is.

    Multiplexing is a way which describes how several users can share a medium at the

    same time with minimal interference. The task of multiplexing is to assign ways to

    each communication channel with a minimum of interference and a maximum

    possible channel utilization.

    Describe clearly the four types of multiplexing.

    5

  • 7/31/2019 Mobile Tutorial Answers

    7/38

    Space division multiplexing: A separate sender for each communication channel with

    a wide enough distance between senders so as to avoid interference. The channels are

    mapped onto different spaces which separate the channels and prevent the interference

    ranges from overlapping. The space between the interference ranges is called as a

    guard space.

    Frequency division multiplexing: Separation of the whole spectrum into smaller

    frequency bands. A channel gets a certain band of the spectrum for the whole time.

    Users can transmit using their allocated frequency continuously as every user is

    assigned his own frequency so there is a very little chance of interference. Guard

    spaces are needed to avoid frequency bands overlapping.

    Time division multiplexing: All sender use the same frequency but at different points

    in time. A channel is given the whole bandwidth for a certain period of time. Again,

    guard spaces which now represent time gaps, have to be used to separate the periodswhen the users are transmitting.

    Code division multiplexing: All channels use the same frequency for transmission at

    the same time but these are separated using different codes. Every channel has its own

    unique code which is used to distinguish it from others.

    Basically to summarize:

    S.D.M division of physical space of a medium.

    T.D.M allocation of time slot

    F.D.M. Assigning different frequencies

    C.D.M assigning code to each channel

    What types of multiplexing are used by radio stations in transmitting channels?

    Radio stations use SDM and FDM in transmitting channels.

    Why does one need to convert digital signals to analogue signals when

    transmitting data?

    Digital modulation is required if digital data needs to be transmitted over a medium

    that only allows for analog transmission. If we take the example of our voice, it

    cannot be transmitted in the way we speak. It has to be converted to some form of

    transmittable data. For that purpose we require digital modulation which is used to

    convert digital data to an analogue one for transmission.

    6

  • 7/31/2019 Mobile Tutorial Answers

    8/38

    What is a baseband signal?

    A baseband signal can be gained when digital data is modulated by digital

    modulation.

    List and explain the three basic analogue modulation schemes.

    Amplitude Modulation (AM):

    It is a type of modulation in which the amplitude of the carrier wave is varied

    according to some characteristic of the modulating signal. In case of an analog signal

    to be sent, the amplitude of the radio wave is modulated to be directly proportional to

    the value of the analog signal at that time. Amplitude modulation typically produces a

    modulated output signal that has twice thebandwidth of the modulating signal, with a

    significant power component at the original carrier frequency.

    Frequency Modulation (FM):

    Frequency Modulation (FM) is the encoding ofinformation in either analogue or

    digital form into a carrier wave by variation of its instantaneous frequency in

    accordance with an input signal. Frequency modulation requires a widerbandwidth

    than amplitude modulation by an equivalent modulating signal, but this also makes

    the signal more robust against interference. Frequency modulation is also more robust

    against simple signal amplitude fading phenomena

    Phase Modulation (PM):

    Phase Modulation (PM) is a form of modulation in which the carrier waves phase is

    caused to vary in accordance with the modulating signal. Phase modulation is a form

    of angle modulation (because the angle of the sine wave carrier is changed by the

    modulating wave). PM and FM are very similar in the sense that any attempt to shift

    the frequency or phase is accomplished by a change in the other.

    Describe briefly amplitude, frequency and phase shift keying.There are three ways in which the bandwidth of the channel carrier may be changed.

    They are altering the amplitude, frequency and phase of the carrier sine wave. They

    are amplitude-shift-keying (ASK), frequency-shift-keying (FSK) and phase-shift-

    keying (PSK), respectively.

    Amplitude Shift Keying (ASK): very simple and low bandwidth requirements, very

    susceptible to interference. The bandwidth of the signal remains unchanged.

    Frequency Shift Keying (FSK): It usually makes the use of two bits (1 or 0) using a

    different frequency for them. The resulting can be regarded as the sum of two

    7

    http://en.wikipedia.org/wiki/Bandwidthhttp://en.wikipedia.org/wiki/Encodinghttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Carrier_wavehttp://en.wikipedia.org/wiki/Frequencyhttp://en.wikipedia.org/wiki/Signalhttp://en.wikipedia.org/wiki/Modulationhttp://en.wikipedia.org/wiki/Bandwidthhttp://en.wikipedia.org/wiki/Amplitude_modulationhttp://en.wikipedia.org/wiki/Interferencehttp://en.wikipedia.org/wiki/Interferencehttp://en.wikipedia.org/wiki/Amplitude_modulationhttp://en.wikipedia.org/wiki/Bandwidthhttp://en.wikipedia.org/wiki/Modulationhttp://en.wikipedia.org/wiki/Signalhttp://en.wikipedia.org/wiki/Frequencyhttp://en.wikipedia.org/wiki/Carrier_wavehttp://en.wikipedia.org/wiki/Informationhttp://en.wikipedia.org/wiki/Encodinghttp://en.wikipedia.org/wiki/Bandwidth
  • 7/31/2019 Mobile Tutorial Answers

    9/38

    amplitude modulated signals of different carrier frequency. It also needs larger

    bandwidth.

    Phase Shift Keying (PSK): This modulation scheme uses shifts in phase of a signal to

    represent data, for example, a phase shift of can change the logic 0 to a 1 andvice versa. This scheme is more complex and robust against interference.

    180

    Explain what QAM is?

    Quadrature Amplitude Modulation (QAM) is a combination of amplitude modulation

    and phase shift keying. Its a method for encoding digital data in an analog signal in

    which each combination of phase and amplitude represents one of sixteen four bit

    patterns.

    Why are spread spectrum techniques important in signal transmission? Give an

    example of one technique that implements spread spectrum?

    [3]

    The problem of signal transmission is that frequency dependent fading can wipe out

    narrow band signals for duration of the interference. Spread spectrum techniques can

    solve this problem. In other words they can resist narrowband interference. In Code

    Division Multiple Access systems all users transmit in the same bandwidth

    simultaneously. Systems following this idea are spread spectrum systems. In thistransmission technique, the frequency spectrum of a data-signal is spread using a code

    8

  • 7/31/2019 Mobile Tutorial Answers

    10/38

    (key) with that signal. As a result the bandwidth occupancy is much higher then

    required.

    The codes used for spreading are unique to every user. This is the reason that a

    receiver which has knowledge about the code of the intended transmitter is capable of

    selecting the desired signal. As the bandwidth requirements are high, less power

    spectral density is required and in the channel the signal appears to be noise.

    Use a block diagram to explain how a chipping sequence can be used to spread

    the signal.

    [2]

    Direct sequence spread spectrum systems take a user bit stream and perform an XOR

    with chipping sequence (a randomly generated data sequence) to spread the signal as

    the figure shown above.

    Briefly explain Frequency hopping spread spectrum technique with the help of a

    simple diagram.

    [4]

    Frequency hopping spread spectrum technique splits the allocated bandwidth into

    many channels of smaller bandwidth in the spectrum which divides into many

    possible frequencies to which the data will be sent over. There exists a code which

    determines at any particular moment in time what frequency it will transmit at,

    hopping from frequency to frequency.

    The time spent on any one channel with a certain frequency is known as dwell time.

    9

  • 7/31/2019 Mobile Tutorial Answers

    11/38

    FHSS has two types; slow hopping and fast hopping. In slow hopping, the transmitter

    uses one frequency for several bits of data. For fast hopping systems, the transmitter

    changes frequency several times during the transmission of a single bit. A simple

    example of FHSS is the Blue tooth technology. Blue tooth performs about 1600 hops

    per second and uses 79 hop carriers equally spaced.

    Explain how one can use just three frequencies to cover an entire area when

    using cells in mobile communication? Why is it better to use small cells instead of

    large cells in a cellular system? What are the negative aspects of this?

    [2]

    The cells are combined in clusters. No two adjoining cells can have the same

    frequency, as shown in the figure above. So that is why one can use just three

    frequencies to cover an entire area (implementing SDM).

    It is better to use small cells instead of larger ones as we get more space. It has several

    other advantages such as it has higher capacity, uses less transmission power, has

    local interference only, and robustness. Additional traffic appears as noise to other

    users and if the noise level is too high, users drop out of cells.

    What is medium access control?

    Medium access control comprises all mechanisms that regulate user access to a

    medium using SDM, TDM, FDM, or CDM. MAC is similar to the traffic regulation inthe highway. For example, several vehicles using the same street crossing in TDM,

    requires rules to avoid collision, MAC is the rule which allows this to be done.

    What is meant by hidden and exposed terminals?

    10

  • 7/31/2019 Mobile Tutorial Answers

    12/38

    A B

    C

    [2]

    Hidden terminals:

    If A wants to send a packet of data to B, it does so. C cannot receive A as it cannot

    sense it. To C, A is a hidden terminal. It is outside its radio range. At the same time, C

    wants to send a message to B. It does not know that A is already transmitting to B as it

    cannot sense the medium. As a result, there is a collision at B as both A and C wants

    to transmit. But as A is not in the range of C, it cannot detect the collision, therefore

    collision detection does not work either. Thus, A is hidden for C.

    Exposed terminals:

    If B sends something to A and C wants to transmit a data packet as well, the carrier

    sensing signal makes C wait as B is already transmitting to A. But as C is out of range

    for A, therefore it doesnt have to wait for B to get free. Thus, C is exposed to B.

    Describe what the problem is with near and far terminals.

    A B C

    [2]

    11

  • 7/31/2019 Mobile Tutorial Answers

    13/38

    [5]

    In mobile signal propagation, the strength of the signal decreases proportionally to the

    square of the distance. This is because every transmitter antenna or a base station has

    a certain range as shown in the above figure. The signal of terminal B therefore

    drowns out As signal and C cannot receive A as it is a far terminal for it.If C (for example) was an arbiter for sending rights, terminal B would drown out

    terminal A already on the physical layer. Therefore, we do have problems with near

    and far terminals concerning data transmission.

    What is frequency division multiple access? Give an example of such a scheme?

    The transmission of multiple separate signals through a shared medium by modulating

    the separate signals into different frequency bands is known as frequency division

    multiple accesses. In FDMA, each transmitter is assigned a distinct frequency channel

    so that receivers can differentiate among them by tuning to the desired channel. A

    very simple example is radio broadcast. Every radio station has its own frequency,

    assigned distinctly to that station. It will send the signal in this transmission channel.

    If we want to receive this signal, we should tune into this frequency and thus, we will

    be able to hear all that is happening on that radio channel.

    What is TDMA?

    Time division multiple access is a method for sharing a medium by allowing severalusers to share the same frequency by dividing it into different time slots. The users

    can transmit and use that channel in the time slot allotted to them. This allows

    multiple users to share the same transmission medium whilst using only a part of the

    bandwidth they require.

    Describe fixed TDMA?

    Fixed TDMA (Time Division Multiple Access) is the allocation of time slots for a

    channel in a fixed pattern. This results in fixed delays but at the same reduces the

    possibility of interference. Each channel knows exactly which time slot is reserved for

    12

    http://en.wikipedia.org/wiki/Frequency_channelhttp://en.wikipedia.org/wiki/Frequency_channel
  • 7/31/2019 Mobile Tutorial Answers

    14/38

    it and can access it at that very moment. This is the crucial factor for fixed TDMA.

    There is a fixed pattern for transmission, for example, the interval between any

    transmissions is 15 milliseconds and the length of the time slot is 500 microseconds.

    Therefore, each sender will transmit at an interval of 15 milliseconds for a period of

    500 microseconds. This fixed pattern is repeated every 15 milliseconds and itguarantees access to the channel every 15 milliseconds, independent of any other

    connections.

    What is classical Aloha? Describe how it can be improved?

    The classical Aloha scheme was invented by the University of Hawaii and was used

    for wireless connection of several stations. This method does not co-ordinate with

    different users when transmitting data; instead each station can access the medium

    anytime they want. There is no central station to co-coordinating between the users

    for transmission. In this system, if two or more users transmit at the same time, acollision occurs and the data is destroyed. It needs to be transmitted again.

    The classical Aloha method has its problems. It can be improved by the introduction

    of time slots, known as Slotted Aloha. All the stations are synchronized and

    transmission of data can only begin at the start of a time slot as shown in the above

    figure. This introduction of time slots for data transmission improves the throughput

    of the aloha system by 50 percent.

    Explain the principle of reservation in TDMA. Use simple diagrams to illustrate.

    13

  • 7/31/2019 Mobile Tutorial Answers

    15/38

    [5]

    [2]

    Every frame consists of N mini-slots and x data-slots

    Every station has its own mini-slot and can reserve up to k data-slots using this mini-slot (i.e. ).kNx =

    Other stations can send data in unused data-slots according to a round-robin sending

    scheme (best-effort traffic).

    Describe CDMA?

    CDMA stands for Code Division Multiple Access; it uses codes to separate different

    users enable access to a shared medium without interference. All users can send on the

    same frequency, at the same time and can use the whole bandwidth of the channel.

    14

  • 7/31/2019 Mobile Tutorial Answers

    16/38

    Each user who wishes to gain access to the transmission medium is allocated with a

    unique random number. Users who have knowledge about the coded signal, or in

    other words, know what the code of the transmitting signal is, can gain access only.

    The receiver can tune into the signal if and translate it if it knows the random number.

    Why are protocols important in mobile communications?

    A protocol is a set of rules that governs how information is delivered and

    communicated between multiple users. IP provides a connectionless, reliable,best-

    effort packet delivery service. IP is anetwork layer protocol. IP is the standard that

    defines the manner in which the network layers of two hosts interact. These hosts may

    be on the same network or reside on physically distinct heterogeneous networks. IP

    requires the location of any host connected to the Internet to be uniquely identified by

    an assigned IP address.

    Name the main elements of the GSM system architecture and describe their

    functions.

    The main elements of the GSM system architecture are as follows:

    RSS (Radio Subsystem):

    It covers all radio aspects of the GSM network such as mobile stations and base

    stations subsystems.

    NSS (Network and Switching Subsystem):

    This is perhaps the most important element of the GSM network as it is responsible

    for connecting the wireless network to the standard public networks. It performs

    handovers between different base stations, and provides global functions such as

    roaming and charging. It consists of mobile switching centers, home location registers

    and visitor location registers.

    OSS (Operation Subsystem):

    This layer of the GSM is mainly responsible for the operation and management of the

    network. This subsystem has some of its own entities and can access others as well

    such as Operation and maintenance center (OMC), Authentication center (AuC) and

    equipment identity register (EIR).

    What multiplexing schemes are used in GSM?

    A GSM network makes use of Frequency and Time division multiplexing.

    15

  • 7/31/2019 Mobile Tutorial Answers

    17/38

    What are the main functions of the Base station controller?

    A Base station controller is usually responsible for the control of many Base

    Transceiver station (BTS). A BSS has many BTS under its control. It basically

    handles allocation of channels, receives measurements from cell phones and manageshandovers from BTS to BTS. One main function of the BSC is to act as a functional

    unit to permit a common data path to handle more data sources than there are channels

    on that path. Therefore, a GSM network is often designed to have many BSCs

    distributed into separate regions near the BTS.

    What are the components of the radio subsystem of GSM?

    The components of the radio subsystem of GSM are as follows:

    Base Station Subsystem (BSS)Base Transceiver Station (BTS)

    Base Station Controller (BSC)

    Mobile Stations (MS)

    Describe the key elements of the Network and Switching Subsystem of GSM.

    The key elements of the Network and Switching Subsystem (NSS) of GSM are:

    Mobile Services Switching Center (MSC):

    Controls all connections via a separated network to and from a mobile terminal within

    the domain of the MSC. Several BSC can belong to a MSC

    Home Location Register:

    Central master database containing user data, permanent and semi-permanent data of

    all subscribers assigned to the HLR.

    Visitor Location Register:

    Local database for a subset of user data, including data about all users currently in the

    domain of the VLR

    What is purpose of the Home Location Register? Where does it reside?

    A Home Location Register (HLR) is a database that contains semi-permanent mobile

    subscriber information for a wireless carriers' entire subscriber base. HLR subscriber

    information includes the International Mobile Subscriber Identity (The IMSI is a

    16

  • 7/31/2019 Mobile Tutorial Answers

    18/38

    unique non-dial able number allocated to each mobile subscriber in the GSM system

    that identifies the user and his or her subscription within the GSM network), service

    subscription information, location information (the identity of the currently serving

    Visitor Location Register (VLR) to enable the routing of mobile-terminated calls),

    service restrictions and supplementary services information. It resides in the networkand switching subsystem of the GSM network.

    Why a Visitor Location is Register useful?

    The Visitor Location Register (VLR) contains all user data required for call handling

    and mobility management for mobile users currently located in the area controlled by

    the VLR. The VLR is a database that contains temporary information about

    subscribers which is needed by the MSC in order to service visiting users to that

    particular area. When a mobile station roams into a new MSC area, the visitor

    location register connected to that mobile switching center will request data about the

    mobile station from the home location register, reducing the need for interrogation of

    the home location register. When a mobile user roams away from his home location

    and into a remote location, messages are used to obtain information about the

    subscriber from the HLR, and to create a temporary record for the subscriber in the

    VLR. There is usually one VLR per MSC.

    List and describe the main components of the Operation Subsystem of GSM?

    The main components of the Operation Subsystem (OSS) of GSM are:

    Authentication Center (AuC):

    The GSM network as a whole is very vulnerable to the outside world; therefore an

    Authentication Centre (AuC) is needed for the protection of user identity and data

    transmission. The AuC contains the algorithms as well as codes for encrypting data.

    Equipment Identity Register (EIR):

    The Equipment Identity Registers (EIR) is a storage place where all the registration

    takes place such as registration of users, mobile stations and so on. It has all the userdata stored. The EIR can also block all stolen devices, thus the SIM becomes useless.

    Operation and Maintenance Center (OMC):

    The Operation and Management Center (OMC) controls and monitors all network

    entities. Some typical management functions of an OMC are traffic monitoring, or

    accounting and billing.

    17

  • 7/31/2019 Mobile Tutorial Answers

    19/38

    Describe clearly with the help of a diagram, the steps taken to make a mobile

    terminated call.

    1: calling a GSM subscriber 3: Signal call setup to HLR2: Forwarding call to the GMSC 4,5: request MSRN from VLR

    6: Forward responsible MSC to GMSC 8, 9: get current status of MS

    10, 11: paging of MS 12, 13: MS answers

    14, 15: security checks 16, 17: connection setup.

    7: forward call to current MSC

    [2]

    Describe clearly with the help of a diagram, the steps taken to make a mobile

    originated call.

    18

  • 7/31/2019 Mobile Tutorial Answers

    20/38

    1, 2: connection request

    3, 4: security check

    5-8: check resources (free circuit)

    9-10: set up call

    [2]

    Describe the different types of handover that occur in GSM. Use a diagram to

    help.

    [2]

    When a mobile station moves, it may move out of the range of the base station to

    which it is joined or connected. When this occurs, a change of connection known as

    handover may occur. If the mobile has a currently active connection, the network

    provides a transparent transition to the new base station, and maintains theconnection. This is only possible if capacity is available on the new base station.

    There are four different types of handover in the GSM system, which involve

    transferring a call between

    channels (time slots) in the same cell,

    cells (Base Transceiver Stations) under the control of the same Base Station

    Controller (BSC),

    cells under the control of different BSCs, but belonging to the same Mobile

    services Switching Centre (MSC), and

    19

  • 7/31/2019 Mobile Tutorial Answers

    21/38

    Cells under the control of different MSCs.

    The first two types of handover involve only one Base Station Controller (BSC). To

    save bandwidth, they are managed by the BSC without involving the Mobile service

    Switching Center (MSC), though it informs the MSC when the handover is done. The

    last two types of handovers are handled by the MSCs involved.

    What are the reasons for implementing handover in GSM?

    Handover is an important process in GSM transmission. As single cells do not cover a

    whole service area as it is very difficult to do so, thus handover becomes necessary.

    Sometimes in the case of intra-cell handover, the frequency needs to be changed in

    order to make the transmission possible.

    Explain clearly how authentication is achieved in mobile phones.

    [2]

    A radio medium can be accessed by anyone, authentication of users to prove that they

    are who they claim to be, is a very important element of a mobile network.

    Authentication involves two functional entities, the SIM card in the mobile, and theAuthentication Centre (AuC). Each subscriber is given a secret key, one copy of

    which is stored in the SIM card and the other in the Authentication Centre. During

    authentication, the AuC generates a random number that it sends to the mobile. Both

    the mobile and the AuC then use the random number, in conjunction with the

    subscriber's secret key and a ciphering algorithm, to generate a number that is sent

    back to the AuC. If the number sent by the mobile is the same as the one calculated

    by the AuC, the subscriber is authenticated.

    Explain how encryption is achieved in mobile phones.

    20

  • 7/31/2019 Mobile Tutorial Answers

    22/38

    Encryption is a method of encoding data so that it cannot be read by a third party.

    There are several levels of encryption, and mobile phones can support different levels,

    to match what the network is using. After authentication has been done as described

    above, using the same random number combined with the SIM cards private key,

    both the mobile and the AUC generate a cipher key using algorithm. This key is notpassed over the air, but is used by both network and mobile to encrypt each packet of

    data. Combining the cipher key and the frame number they produce a 114 bit

    sequence which is XOR'd with the first two 57 bit data blocks when they are

    transmitted

    What is GPRS?

    GPRS, standing for General Packet Radio Service, is a way of passing data over a

    mobile phone network. Until GPRS, the standard method of surfing the net, getting

    emails or, most commonly, using WAP on a mobile phone was done using the circuit-switched method - dialing up, staying online, then logging off.

    GPRS allows us to be always logged on for data connection for GSM mobile phones,

    allowing for faster browsing, web surfing and email.

    As well as being faster than the older dialup method, the main advantage is that you

    no longer pay for your online time per-minute, you pay for the amount of data you

    transfer. As an example, the O2 online Leisure tariff charges 3 per megabyte used,

    which is enough to send or receive up to 400 emails of 100 words, or download up to

    1000 Mobile Internet (WAP) pages. Another bonus of GPRS is that sessions can be

    suspended when an incoming voice call is detected, so you don't lose calls .

    What is TETRA?

    TETRA stands for terrestrial trunked radio systems. These systems use many different

    radio carriers but only assign a specific carrier to a certain user for a short period of

    time according to demand. It is currently being used by the emergency services such

    as the police force, taxi services, hospitals, fleet managements, and rescue teams and

    so on.

    What is the use of TETRA?

    It offers interfaces to public networks, i.e., voice and data services. It is another

    system for private use like GSM.

    Distinguish between packet switched and circuit switched transmission?

    21

    http://frame/http://www.filesaveas.com/wap.htmlhttp://www.qksrv.net/click-1117749-5062567?SID=FSAgprshttp://www.qksrv.net/click-1117749-5062567?SID=FSAgprshttp://www.filesaveas.com/wap.htmlhttp://frame/
  • 7/31/2019 Mobile Tutorial Answers

    23/38

    Packet Switching:

    Data packets are broken down into smaller packets before they are actually sent. Each

    data packet is transmitted individually across the following channel and can followany route to the destination. Thus, each packet has header information about the

    source, destination and packet numbering etc. At the receiver end, the packets are re-

    assembled into the original message.

    Circuit Switching:

    Data packets are transmitted quickly, in a sequence at a constant rate. It is a point-to-

    point transmission technique in which a dedicated connection should be established

    before any data transmission can take place, for example, a telephone call. Once the

    transmission is over, the circuit is free for other uses.

    Difference between Packet Switching and Circuit Switching:

    The difference between the two is that in packet switching techniques, the

    communication channels are not dedicated to passing messages from the source to the

    destination. In packet switching, different messages and even different packets can

    pass through different routes. There is a dead time between the source and destination

    at some point in time, and that is when the channel can be used by other users.

    Circuit Switching is ideal when data has to be transmitted quickly in order. Therefore,

    when transmitting real time data, such as audio and video, circuit switching will be

    used. Packet Switching is more efficient and robust for data that can withstand delays

    in transmission, such as e-mail messages, and Web pages.

    Explain what is meant by the term Mobile IP?

    A protocol is set of standard rules used to communicate between several users.

    Internet Protocol (IP) is a network layer protocol and is the standard that defines the

    way in which the network of two hosts interacts. These hosts maybe on the same

    network or physically different ones. IP provides a connectionless packet delivery

    service. Mobile IP is a type of protocol designed to enable mobile computers to stay

    connected to the internet regardless of their location and without changing their IP

    address. Mobile IP is a standard protocol that makes mobility transparent to

    applications and higher level protocols like the Transmission Control Protocol (TCP).

    It solves the problem by allowing each mobile node to have two IP addresses and

    maintaining the binding between the two addresses. One of the IP addresses is the

    permanent home address that is assigned at the home network and is used for

    identification purposes. The other is a temporary care-of address that represents the

    current location of the host provided by the foreign network. It has no geographical

    limitations and no physical connection is required. There are no changes required tothe present IP address and it supports security as well.

    22

  • 7/31/2019 Mobile Tutorial Answers

    24/38

    What is meant by the terms foreign network and home network in the context of

    mobile IP?

    The home network is the subnet the Mobile Node (MN) belongs to with respect to itsIP address. No mobile IP support is needed within the home network. It is the network

    or virtual network which matches the subnet address of the mobile node.

    The foreign network is the current subnet the MN visits. It is a router on a mobile

    node's visited network which provides routing services to the mobile node while

    registered.

    Describe how an IP packet is delivered from a correspondent node to a mobile

    node, which is not in its home network.

    Figure 1 Mobile IP Components and Relationships

    [6]

    Computer Node (CN) sends an IP packet and the Internet routes the packet to the

    router responsible for the home network of Mobile Node (MN). Then the Home

    Agent (HA) knowing that the MN is currently not in its home network intercepts the

    packet. The packet is encapsulated and tunneled to the Care Of Address (COA). A

    new header is put in front of the old IP header showing the COA as new destinationand HA as source of the encapsulated packet. Then the Foreign Agent (FA)

    decapsulates the packet, i.e., removes the additional header, and forwards the original

    packet with CN as source and MN as destination to the MN.

    What is encapsulation and tunneling?

    Generally encapsulation means to include one thing into another so that the included

    thing is not apparent. Encapsulation is the inclusion of one data structure within

    another structure so that the first data structure is hidden for the time being.

    23

  • 7/31/2019 Mobile Tutorial Answers

    25/38

    Tunneling is the transmission of data intended for use only within a private network

    through a public network in such a way that the routingnodes in the public network is

    unaware that the transmission is part of a private network. Tunneling is generally

    done by encapsulating the private network data and protocol information within the

    public network transmission units so that the private network protocol informationappears to the public network as data.

    How does a mobile node know that is has moved into a foreign network?

    Home Agents (HA) and Foreign Agents (FA) sends advertisement messages into their

    physical subnets. A Mobile Node (MN) listens to these messages and detects, if it is in

    the home or a foreign network. Foreign agents have a security association with the

    home agent.

    Having received a care-of-address from a foreign agent, how does a mobile noderegister with the home agent?

    Once a mobile node has been given a care of address, it needs to register itself with

    the home agent. The purpose of registration is that the home agent should be aware of

    the current location of the mobile node for the correct transfer of information. A

    mobile node sends a registration request containing the care of address to the foreign

    agent. The foreign agent will check for the validity of the registration request and if it

    is valid will forward it to the home agent. The Home Agent checks the validity of the

    registration request, which includes authentication of the Mobile Node. If the

    registration request is valid, the Home Agent creates a mobility binding (an

    association of the Mobile Node with its care-of address), a tunnel to the care-of

    address, and a routing entry for forwarding packets to the home address through the

    tunnel.

    The Home Agent then sends a registration reply to the Mobile Node through the

    Foreign Agent (if the registration request was received via the Foreign Agent). The

    home agent can send the request back directly to the mobile node as well. The reply

    basically depends on how the registration request was sent to the home agent.

    Why are firewalls a problem for mobile IP?

    The firewall imposes restrictions on packets entering of leaving the private network.

    Packets are not allowed through unless they confirm to a filtering specification, or

    unless there is a negotiation involving some sort of authentication. Because of this,

    the firewall must be explicitly targeted as the destination node by outside packets

    seeking to enter the private network.

    What are ad-hoc networks?

    24

    http://searchsmallbizit.techtarget.com/sDefinition/0,,sid44_gci212924,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212665,00.htmlhttp://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212665,00.htmlhttp://searchsmallbizit.techtarget.com/sDefinition/0,,sid44_gci212924,00.html
  • 7/31/2019 Mobile Tutorial Answers

    26/38

    Ad-hoc networks are a collection of mobile nodes which can communicate over radio

    and do not need any pre-installed communication infrastructure. Communication can

    be performed if two nodes are close enough to exchange data. Any mobile host can

    become a router and pass information to the destination. Therefore, there is not need

    for routers in ad-hoc networks.This type of network must be able to start by itself as its need can arise anywhere any

    time. The network topology will also change dynamically as the mobile hosts move

    around within the network and so the routing protocol must be flexible enough to

    ensure that data gets routed correctly and efficiently.

    Give some examples in which ad-hoc networks would be beneficial.

    Ad-hoc networks can be of significance in:

    1) In a conference room during meetings where the participants can shareinformation.

    2) In a lecture, where students can share information with the professor.

    3) In an airport maybe, where the staff wants to share pieces of information with

    them.

    4) In an emergency rescue mission among the rescue workers to coordinate the

    effort. For example, after an earthquake or flood knocks the entire

    infrastructure down.

    5) In battle among soldiers to coordinate defense or offense.

    How does mobile IP differ from Internet IP?

    Mobile IP enables mobility in the Internet without changing existing wired systems.

    Internet IP is fixed.

    Explain why TCP used in fixed networks is not suitable for the mobile transport

    layer.

    The mechanisms within TCP have been designed for situations that are completely

    different from those in mobile networks.

    In traditional TCP, why does the sender reduce the data rate by half when it

    notices a missing acknowledgement?

    In traditional Transmission Control Protocol (TCP), data information is sent from the

    sender to the receiver using packet switching. Each time a packet of data is sent, the

    receiver sends an acknowledgement to the sender that it has got hold of the data.

    25

  • 7/31/2019 Mobile Tutorial Answers

    27/38

    The sender tends to increase the data rate each time after getting an acknowledgment.

    This increase is usually an exponential increase. In real time systems, many users are

    transmitting data on the same channel, so an increase in data rate can exceed the

    capacity of the channel. This gives rise to congestion problems. As soon as a sender

    receives a missing acknowledgement, it reduces its transmission rate to half because itrecognizes the fact that congestion might have occurred.

    Explain briefly with the help of a diagram, how indirect TCP works?

    [2]

    Indirect TCP as it is called, does not make any changes to the host connected to the

    fixed network (millions of users use this system). It splits up the connection at, for

    example, the foreign agent into two TCP connections, so we do not need the long end-

    to-end connection anymore. Indirect TCP hosts in the fixed part of the network and

    therefore, does not notice the characteristics of the wireless part

    Briefly outline the key advantages and disadvantages of indirect TCP?

    Advantages:

    Indirect Transmission Control Protocol (Indirect TCP) is very simple to control asthere are no changes required to make in the fixed networks to the basic TCP model.

    All the optimizations made for the basic model can be used in I-TCP. The failures

    which come up in the wireless link do not propagate into the fixed network. A mobile

    hop is used only between the foreign agent and the mobile host, therefore a very fast

    transmission rate is possible

    Disadvantages:

    As there is no direct connection between the senders and the receivers, they are

    connected via the foreign agents; an acknowledgment sent to the sender for

    26

  • 7/31/2019 Mobile Tutorial Answers

    28/38

    transmission of data does not necessarily mean that the receiver has actually got hold

    of the data packet. There might be some hidden delays possible within the foreign

    agents when they are transacting with the data to a new foreign agent.

    How does snooping TCP work?

    wired Internet

    buffering of

    local retransmissionst

    ent

    st

    correspondent

    hoforeign

    ag

    mobile

    ho

    snooping of

    [2]

    The basic idea behind a snooping TCP is the same as that of a TCP, the only

    difference being that an addition of a foreign agent. When a sender transmits data to

    the receiver, it receives an acknowledgment for a successful transmission. Not always

    will the transmission be successful. There is always data lost on the communication

    link from both sides. Here the foreign agent comes into affect. It immediately re-

    transmits data from itself to the mobile host or to the correspondent host, i.e. in either

    way. The foreign agent actually keeps the data which the sender wants to transmit to

    the receiver, so that whenever there is a transmission failure, it can send the data on

    behalf of the sender. The foreign agent therefore snoops the packet flow and

    recognizes acknowledgements in both directions.

    What are the advantages and disadvantages of snooping TCP?

    Advantages:

    As the data sent by the sender to the receiver is held by the foreign agent (as it goesthrough it), if there are any transmission failures, the sender does not need to send that

    particular data again as this can be done by the foreign agent. Therefore, this helps in

    saving time and the sender can send some more fresh pieces of data in the mean time.

    This is because for the sender to spend time on transmitting the same data again

    which wasnt received by the receiver, the foreign agent does this on behalf of the

    sender.

    Disadvantages:

    Snooping TCP does not actually isolate the wireless link and it might sometimes

    27

  • 7/31/2019 Mobile Tutorial Answers

    29/38

    become useless depending on the encryption schemes. As data is transferred via a

    foreign agent, it might actually take longer to send it to the receiver by this method

    rather than directly.

    What functions does the transport layer represent?

    This layer is used in the reference model to establish an end-to-end connection. It has

    the following functions:

    Flow and congestion control, quality of service

    Local retransmissions and acknowledgements

    Content filtering, compression, picture downscaling

    What is the difference between the transport layer and the network layer?

    The transport layer is used in the reference model to establish an end-to-end

    connection. Network layer is responsible for routing packets through a network of

    establishing a connection between two entities over many other intermediate systems.

    Explain why TCP is needed?

    Transmission Control Protocol (TCP) is responsible for verifying the correct delivery

    of data from client to server. Data can be lost in the intermediate network as there are

    many users wanting access to the network. The capacity of the network may exceed

    during these data transmissions by multiple users. Congestion occurs as a result. TCP

    controls the data transmission flow and rate. As soon as it detects congestion, it

    immediately reduces the data transmission rate of the users to half in order to

    overcome the problem of congestion. It has made the use of networks fair and equally

    distributed as every user has the chance to transmit. TCP further adds support to

    detect errors or lost data and to trigger retransmission until the data is correctly and

    completely received.

    28

  • 7/31/2019 Mobile Tutorial Answers

    30/38

    SECTION 5

    Answers for the OPNET EXPERIMENT

    Questions

    29

  • 7/31/2019 Mobile Tutorial Answers

    31/38

    If you will install a LAN on the first floor of the office building and you will be

    asked to evaluate whether you can support the addition of few intelligence

    workstations on the second floor by extending the LAN service to the second

    floor. What are your main recommendations to establish this process? What is

    the current demand on the server from the first floor LAN and will it be able to

    handle the load of the second network on the second floor? What is the current

    total delay across the first floor LAN and what will happen once the second

    network is placed on the second floor?

    If an extension has to be made to an existing Local Area Network (LAN), a new

    topology similar to the one on the first floor has to be modeled. It is critical that we

    make sure that the extension to the present network will not cause the network as a

    whole to fail. This verification can be achieved by testing and simulating the new

    network separately before actual implementation. Through simulating the extension in

    OPNET, the actual results can be seen before it is implemented. From those results

    and data collected, it can be seen how the network on the second floor will behave

    before it can actually be put into implementation.

    The current demand on the server for the first floor is about 5602 bits per second and

    the current total delay is about 0.41 milliseconds. When the network was expanded to

    the second floor, the load changed to 10678 bits per second. It was observed that the

    delay of the network after extension did not change significantly and was 0.40

    milliseconds.

    What are the first three requirements to start building the small internetworks?

    The first three requirements to start building a small internetwork are as follows:

    a) A server

    b) Router

    c) Switch.

    30

  • 7/31/2019 Mobile Tutorial Answers

    32/38

    Draw a diagram of a small LAN networks for a two floor office and state the

    function of each element in the diagram.

    Node:

    A network object that can send and receive data

    Link:

    A communication medium that connects nodes to one another. Links can represent

    electrical or fibre optical cables.

    3Com switch:

    Used to connect both the networks together.

    Number of workstations connected to the server: 30

    31

  • 7/31/2019 Mobile Tutorial Answers

    33/38

    Sm_Int_server:

    The main server for this network to which all workstations are connected.

    Sm_Application_Config:

    Configurations for the applications

    Sm_Profile_Config:

    Profile configurations.

    What are your conclusions if the Ethernet delay of a network is approximatelysame with the network expansion by one or two nodes?

    If the Ethernet delay of a network is approximately the same with the expansion by

    one or two nodes, this suggests that the network is stable and consistent. It does not

    overload because it is able to adjust more nodes within itself.

    Why the average queuing delay in M/M/1 queue does appear to have a large

    change early? Does this stabilize after a long period of time?

    The performance of an M/M/1 queuing system depends on the following parameters:

    Packet arrival rate

    Packet size

    Service capacity

    If the total effect of the average packet arrival rate and the average packet size

    exceeds the service capacity, the queue size will grow indefinitely as it cannot hold

    data which is beyond its capacity.

    When performing this experiment and simulating the results, we basically have to

    make sure the queue reaches steady state for a specific arrival rate, packet size, and

    service capability.

    When the simulations are performed, the average queuing delay appears to have a

    large change early. This is because at the start of the simulation, the numbers of

    packets collected are small. So there arent many samples to take the average of. The

    system is sensitive to small number of data samples. As more time passes, the queue

    system stabilizes as more and more samples processed by the server and collected at

    the destination.

    32

  • 7/31/2019 Mobile Tutorial Answers

    34/38

    If the mean queuing delay is around 15 seconds, what is the mean service rate if

    the mean interarrival time is 1.0 second, mean service requirement 9000b/p and

    service capacity is 9600b/s?

    mean service requirement; =/1 9000 b/p

    mean service capacity ; C = 9600 b/s

    mean interarrival time = 1.0 seconds

    mean queuing delay = 15.0 seconds

    mean service rate ; =C [((1/9000)*9600)] = 1.067 packets/second

    What is the time-average queue size if the mean arrival rate, mean service rate

    requirement and service capacity are 1p/s, 9000b/s and 9600b/s respectively?

    Service arrival rate: 1 p/s

    Service capacity: 9600 b/s

    Mean service requirement: 9000 b/s

    =)(

    1 C

    =1067.1

    1

    = 14.9 seconds

    The queue model requires means of generating, queuing and serving packets,

    what is the module that all these functions can be done with?

    All these functions stated above in the question can be done with the node module.

    33

  • 7/31/2019 Mobile Tutorial Answers

    35/38

    Draw a diagram of the M/M/1 queue system and state briefly the operation of

    each module?

    The M/M/1 queue has a Poisson distribution of packets. Data packets are generated

    and sent to the infinite buffer. When a packet reaches the buffer, it is processed by a

    server and sent to its destination.

    The queuemodule is used to represent the infinite buffer and also the server.

    : mean packet arrival rate

    1/: mean packet size

    C: service capacity

    The M/M/1 queue model requires a way of generating, queuing, and serving packets,

    all of which can be done with existing node modules.

    If you have a finite buffer on the packets arrived on the process module of a

    node, what are your recommendations on the quality of services?

    If we have a finite buffer on the process module, the quality of service will drop

    drastically. This is due to the fact that the buffer will be able to handle a certain

    amount of data packets. When the data packets exceed the capacity of the finite

    buffer, the buffer will not be able to process them and send them to the server. This

    has a negative impact as the server sends the data packets to their destinations. If the

    buffer is not collecting the data packets as it cannot because of limited capacity, the

    34

  • 7/31/2019 Mobile Tutorial Answers

    36/38

    data packets wont reach their destination and get destroyed. This reduces the

    percentage of successful transmitted data.

    What are the three main nodes used in the Mobile Radio Network? Give a short

    list of the modules used in each node?

    The three main nodes used in the Mobile Radio Network are:

    a) Transmitter node: A transmitter node transmits data packets in all directions. It

    consists of a packet generator module, a radio transmitter module, and an

    antenna module.

    b) Receiver node: A receiver node measures the quality of signal emitted from

    the stationary nodes. It consists of an antenna module, a radio receiver module,

    a sink processor module, and an additional processor module that works with

    the directional antenna.c) Mobile jammer node: The jammer nodes create noise. The jammers trajectory

    takes it in and out of the radio range of the receiver node, increasing and

    decreasing interference at the receiver.

    The transmitter and the receiver nodes are also known as the stationary nodes.

    Distinguish the variations of throughput of the mobile network using isotropic

    antenna pattern and directional antenna?

    An antenna is a device that radiates radio signals. An isotropic antenna is one which

    radiates equally in all directions. The number of packets received initially using the

    isotropic antenna increases. As the radiations are equally spread in all directions, a

    large number of packets are received. But one thing which has to be kept in mind is

    that as this antenna radiates in all directions, it is more vulnerable to picking up

    interference. This is what happens and the throughput decreases with the passage of

    time as more and more interference is picked up.

    A directional antenna is used to transmit in one certain direction or angle. Initially the

    throughput is slow to start with. As it is a directional antenna, the number of datasamples transmitted are low. With the passage of time, the throughput increases as

    data is transmitted in a certain direction and less interference is picked up. The

    process is more effective as less unwanted signal is picked up.

    35

  • 7/31/2019 Mobile Tutorial Answers

    37/38

    Illustrate the main elements of a Generic transmitter and receiver node models

    for Aloha and CSMA?

    A simple Alohasystem can be designed using a simple source generator and a bus

    transmitter. But we design a more general model so that it can be used later for theCSMA model as well.

    The transmitter node consists of a generator, processor and a bus transmitter. The

    generic transmitter node must generate packets, process them, and send them on to the

    bus. This can be done by using a source processor to generate packets, another

    processor to perform any necessary operations, and a bus transmitter that transmits the

    packets on the bus link. Bus transmitters also have internal queuing capability they

    will issue all submitted packets onto the bus in a first come first serve order.

    The transmitter process only has to receive packets from the generator and send themon to the transmitter. The Aloha transmitter process has only one unforced

    state: waiting for the arrival of a packet from the generator. The transmitter cannot

    collect statistics.

    The generic receiver node basically consists of a processor and a bus receiver. The

    generic receiver node monitors the movement of packets across the bus. The receiver

    does not require a generator because it simply checks the packets moving across the

    bus.

    The receiver node is also responsible for handling received packets for collecting

    statistics.

    Comment on the variations of the throughput of both Aloha and CSMA against

    the channel traffic?

    The CSMA protocol achieves a maximum channel throughput of about 0.5 while the

    Aloha protocol achieves a maximum channel throughput of about 0.185. The

    throughput difference is 0.315. There are a few reasons for this. It transmits data

    packets randomly without any control. The Aloha system does not coordinate mediumaccess. It is a random scheme without a central station controlling the other

    workstations and coordinating between them. If any two stations transmit at the same

    time, which they usually do, a collision occurs which subsequently reduces the

    throughput as the data needs to be sent again.

    Theoretical analyses have shown that a pure Aloha system has a channel throughput S

    as a function of channel traffic G given by S = Ge-2G. This relationship gives a

    maximum channel throughput of Smax = 1/2e 0.18.

    36

  • 7/31/2019 Mobile Tutorial Answers

    38/38

    At low traffic levels, collisions hardly ever occur. At high traffic levels, the channel is

    overloaded and excessive collisions prevent packets from being successfully received.

    Thus, the maximum throughput is achieved near G = 0.5 and is close to the expected

    value of 0.18.

    The Carrier Sensing Multiple Access (CSMA) on the other hand, has a little bit of

    improvement to the Aloha system. It uses the sensing technique before accessing the

    medium. Sensing or listening is seeing whether the medium is free for transmission or

    not and then actually transmitting. Sensing the medium and accessing only when the

    carrier is idle decreases the probability of a collision. Therefore, the throughput of

    CSMA is slightly better.

    The CSMA protocol seems to be better than the Aloha protocol at all channel traffic

    loads. The theoretical channel throughput S as a function of channel traffic G in a

    CSMA channel (with negligible propagation delay) is given by S=G (1+G)e-G/(G+e-G).This formula predicts a maximum throughput of approximately 0.5 at channel traffic

    of approximately 1.0.