Professional Documents
Culture Documents
Sridhar Iyer
K R School of Information Technology
IIT Bombay
sri@it.iitb.ac.in
http://www.it.iitb.ac.in/~sri
Outline
Introduction and Overview
Wireless LANs: IEEE 802.11
Mobile IP routing
TCP over wireless
GSM air interface
GPRS network architecture
Wireless application protocol
Mobile agents
Mobile ad hoc networks
Others websites:
www.palowireless.com
www.gsmworld.com; www.wapforum.org
www.etsi.org; www.3gtoday.com
Sridhar Iyer IIT Bombay 3
Wireless networks
Access computing/communication services, on the move
Cellular Networks
traditional base station infrastructure systems
Wireless LANs
infrastructure as well as ad-hoc networks possible
very flexible within the reception area
low bandwidth compared to wired networks (1-10 Mbit/s)
Ad hoc Networks
useful when infrastructure not available, impractical, or expensive
military applications, rescue, home networking
Sridhar Iyer IIT Bombay 4
Some mobile devices
Tablets
Palm-sized
Clamshell handhelds
MSC MSC
HLR HLR
To other
VLR MSCs VLR
Application
new applications and adaptations
Transport
congestion and flow control
Network
addressing and routing
Link
media access and handoff
Physical
transmission errors and interference
Vehicles
transmission of news, road condition etc
ad-hoc network with near vehicles to prevent
accidents
Emergencies
early transmission of patient data to the hospital
ad-hoc network in case of earthquakes, cyclones
military ...
Web access
outdoor Internet access
intelligent travel guide with up-to-date
location dependent information
Information services
push: e.g., stock quotes
pull: e.g., weather update
Disconnected operations
mobile agents, e.g., shopping
Entertainment
ad-hoc networks for multi user games
Messaging
Transaction Processing
Messaging/Text Apps
Voice/SMS
Location Services
Still Image Transfers
Internet/VPN Access
Database Access
Document Transfer
Low Quality Video
High Quality Video
2G 3G
IS-95B
cdma2000
CDMA
FDD
GSM W-CDMA
TDD
GPRS
EDGE & 136
HS outdoor
IS-136 136 HS
UWC-136
TDMA indoor
Sridhar Iyer IIT Bombay 23
Wireless Technology Landscape
72 Mbps
Turbo .11a
54 Mbps 802.11{a,b}
5-11 Mbps 802.11b .11 p-to-p link
1-2 Mbps
Bluetooth
802.11 wave p-to-p links
3G
384 Kbps WCDMA, CDMA2000
2G
56 Kbps IS-95, GSM, CDMA
Access (HLR)
IP Intranet
IP Point User Profiles &
Base Stations Authentication
802.11
802.11
3G Air Wired Access
Internet
Interface
Access
Point
Sridhar Iyer IIT Bombay 25
Wireless LANs
AP wired network
AP
ad-hoc network
A B C
A and C cannot hear each other.
A sends to B, C cannot receive A.
C wants to send to B, C senses a free medium
(CS fails)
Collision occurs at B.
A cannot receive the collision (CD fails).
A is hidden for C.
Market consolidation
Entry of Wireless Carriers
Entry of new players
Footprint growth
Virtual Carrier
Emergence of virtual
carriers
Roaming agreements
MN Router
S
3
Home
agent
Router Router
1 2
move
Router
S MN
3
Foreign agent
Home agent
mobile host
access point
(foreign agent) wired Internet
Design Issues
System transparent v/s System aware
Application transparent v/s Application aware
Models
conventional, unaware client/server model
client/proxy/server model
caching/pre-fetching model
mobile agent model
HTML WML
HTML
filter/ Binary WML
WAP
web HTML proxy
server
WAE comprises WML (Wireless Markup Language), WML Script, WTAI etc.
RTS RTS
D A B C
CTS CTS
DATA
Sridhar Iyer IIT Bombay 56
IEEE 802.11
Wireless LAN standard defined in the unlicensed
spectrum (2.4 GHz and 5 GHz U-NII bands)
server
infrastructure network
access point
application application
TCP TCP
IP IP
LLC LLC LLC
802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY
Station Management
channel selection, MIB
LLC Station Management
DLC
PHY Management
PMD
Traffic services
Asynchronous Data Service (mandatory) DCF
Time-Bounded Service (optional) - PCF
Access methods
DCF CSMA/CA (mandatory)
collision avoidance via randomized back-off mechanism
ACK packet for acknowledgements (not for broadcasts)
DCF w/ RTS/CTS (optional)
avoids hidden terminal problem
PCF (optional)
access point polls terminals according to a list
RTS RTS
D A B C
CTS CTS
DATA
ACK
direct access if t
medium is free DIFS slot time
boe busy
station2
busy
station3
busy medium not idle (frame, ack etc.) boe elapsed backoff time
B1 = 25 B1 = 5
wait data
data wait
B2 = 20 B2 = 15 B2 = 10
DIFS
data
sender
SIFS
ACK
receiver
DIFS
other data
stations t
waiting time contention
DIFS
RTS data
sender
SIFS SIFS
CTS SIFS ACK
receiver
DIFS
RTS frag1 frag2
sender
SIFS SIFS SIFS
CTS SIFS ACK1 SIFS ACK2
receiver
NAV (RTS)
NAV (CTS)
NAV (frag1) DIFS
other NAV (ACK1) data
stations t
contention
t0 t1
SuperFrame
t2 t3 t4
PIFS SIFS
D3 D4 CFend
point
coordinator SIFS
U4
wireless
stations
stations NAV
NAV contention free period contention t
period
Control Frames
RTS/CTS/ACK
CF-Poll/CF-End
Management Frames
Beacons
Probe Request/Response
Association Request/Response
Dissociation/Reassociation
Authentication/Deauthentication
ATIM
Data Frames
beacon interval
B B B B
access
point
busy busy busy busy
medium
t
value of the timestamp B beacon frame
beacon interval
B1 B1
station1
B2 B2
station2
D B T T d D B
access
point
busy busy busy busy
medium
p d
station
t
T TIM D DTIM awake
B1 A D B1
station1
B2 B2 a d
station2
t
B beacon frame random delay A transmit ATIM D transmit data
802.11i LLC
security
WEP MAC
802.11f MAC Mgmt
Inter Access Point Protocol
802.11e MIB
QoS enhancements
PHY
DSSS FH IR
OFDM
802.11b
5,11 Mbps
802.11a
6,9,12,18,24
802.11g 36,48,54 Mbps
20+ Mbps
MN Router
S
3
Home
agent
Router Router
1 2
move
Router
S MN
3
Foreign agent
Home agent
FA foreign
network
FA foreign
network
extensions . . .
Optimizations
Triangular Routing
HA informs sender the current location of MN
Change of FA
new FA informs old FA to avoid packet loss, old FA now
forwards remaining packets to new FA
Reverse tunneling
Optimizations for triangular routing
Sridhar Iyer IIT Bombay 118
Outline
Introduction and Overview
Wireless LANs: IEEE 802.11
Mobile IP routing
TCP over wireless
GSM air interface
GPRS network architecture
Wireless application protocol
Mobile agents
Mobile ad hoc networks
Senders window
1 2 3 4 5 6 7 8 9 10 11 12 13
12 avoidance
10
(segments)
8 Slow start
6Slow start threshold
4
2
0
0 1 2 3 4 5 6 7 8
Time (round trips)
Retransmission timeout
Initiate Slow Start
Duplicate acknowledgements
Initiate Fast Retransmit
25
cwnd = 20
20
15
10
ssthresh = 8 ssthresh = 10
5
0
12
15
20
22
25
0
10
Window size (segments)
FH BS MH
FH BS MH
TCP connection
FH BS MH
wireless
Sridhar Iyer IIT Bombay 130
Impact of Handoffs
FH BS MH
FH BS MH
Types of bursts
Normal
Synchronization
Frequency Correction
Dummy
Access
Normal Burst
2*(3 head bit + 57 data bits + 1 signaling bit) + 26
training sequence bit + 8.25 guard bit
Signaling Channel
Broadcast Channel (BCH)
Common Control Channel (CCH)
Dedicated/Associated Control Channel
(DCCH/ACCH)
260 260
Interleaving
1 2 3 4 5 6 7 8
NORMAL BURST
3 57 1 26 1 57 3 8.25
OutSridhar
of firstIyer
20 ms IIT Bombay 150
Out of second 20ms
Traffic Channel Structure for Full Rate Coding
Slots 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2
T = Traffic
S = Signal( contains information about the signal strength in
neighboring cells)
T
Traffic Channel Structure for Half Rate Coding
Sridhar Iyer IIT Bombay 152
BCCH
Synchronization Channel
Repeated broadcast of SB
Message format of SCH
PLMN color BS color T1 Superframe T2 multiframe T3 block frame
3 bits 3 bits index 11 bits index 11 bits index 3bits
BSIC 6 bits"
FN 19bits
NO
Is
SCH detected?
YES
Timing Advance
Advance in Tx time corresponding to
propagation delay
Mapping in frequency
124 channels, 200KHz spacing
Mapping in time
TDMA Frame, Multi Frame, Super Frame, Channel
Two kinds of multiframe:
26-frame multiframe; usage -Speech and Data
51-frame multiframe; usage -Signalling
0 12 3 50
1 S u p e r f r a m e = 1 3 2 6 T D M A f r a m e s ( 6 .1 2 s )
= 2 6 (5 1 fra m e s ) M u lti fra m e
0 1 2 3 23 24 25
1(26 frames) Multi frame = 26 TDMA frames (120 ms) 1 (5 1 fra m e s ) M u lti
fra m e = 5 1 T D M A f
ra m e s (3 0 6 0 /1 3 m s )
T12 T23 0 1 49 50
T0 T1 T2 I 2 3
(SACCH)
fra m e 6 1 5 m s )
1 T D Mt s A ( 1 2 0 / 2 6 o r 4 .
s l o
= 8 tim e
0 1 2 3 4 5 6 7
s l o t = 1 5 6 . 2 5 b i t d u r a t i o n ( 1 5 /2 6 o r 0 .5 7 7 m s )
1 tim e
( 1 b i t d u r a t i o n =IIT 4 8 / 1 3 o r 3 . 6 9 s )
Sridhar Iyer Bombay 163
Outline
Introduction and Overview
Wireless LANs: IEEE 802.11
Mobile IP routing
TCP over wireless
GSM air interface
GPRS network architecture
Wireless application protocol
Mobile agents
Mobile ad hoc networks
LA2 ISDN
4. MSRN
BSC
MS
GMSC/I
WF
BTS
2. MSISDN
MSC
3. MSRN
7. TMSI
7. TMSI
EIR
BSC
AUC
HLR
VLR
BTS
LA1 7. TMSI 5. MSRN
BTS
6. TMSI
MS
8. TMSI
Mobility
stationary
nomadic (pedestrian speed)
mobile (vehicular speed)
roaming (mobile across networks)
Connectivity
connected
Mobile Device Capability semi-connected
form factor (asymmetric)
GUI disconnected
multimedia
real-time multimedia
HTML
HTTP
TLS/SSL
TCP/IP
with WML-Script
WML Encoder CGI
WML Decks
WML- Scripts
WSP/WTP WMLScript
HTTP etc.
Script
Compiler
WTAI
Protocol Adapters Content
Etc.
with WML-Script
WML WML Encoder
WML Decks
Application
WML- WSP/WTP WMLScript Logic
Script Compiler
WTAI Protocol Adapters Content
Etc.
T-SAP T-SAP
T-DUnitdata.req
(DA, DP, SA, SP, UD) T-DUnitdata.ind
(SA, SP, UD)
T-DUnitdata.req
(DA, DP, SA, SP, UD)
T-DError.ind
SAP: Service Access Point
(EC)
DA: Destination Address
DP: Destination Port
SA: Source Address
SP: Source Port
UD: User Data
EC: Error Code
PPP PPP
WDP WDP
initiator responder
TR-SAP TR-SAP
TR-Invoke.req
(SA, SP, DA, DP, A, UD, C=0, H) TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=0, H)
A: Acknowledgement Type
(WTP/User)
C: Class (0,1,2)
H: Handle (socket alias)
initiator responder
TR-SAP TR-SAP
TR-Invoke.req
(SA, SP, DA, DP, A, UD, C=1, H) TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=1, H)
TR-Invoke.res
(H)
TR-Invoke.cnf
(H)
WSP Services
provides shared state between client and server, optimizes
content transfer
session management (establish, release, suspend, resume)
efficient capability negotiation
content encoding
Push
S-Suspend.req S-Suspend.ind
S-Suspend.ind (R)
(R) WTP Class 0
transaction
R: Reason for disconnection
S-Resume.req
(SA, CA)
~ ~
S-Resume.ind
(SA, CA)
S-Resume.res
S-Resume.cnf
WTP Class 2
transaction
client server
S-SAP S-SAP
S-Disconnect.req
(R) S-Disconnect.ind
S-Disconnect.ind (R)
(R) WTP Class 0
transaction
Goals
device and network independent application
environment
for low-bandwidth, wireless devices
considerations of slow links, limited memory, low
computing power, small display, simple user interface
(compared to desktops)
integrated Internet/WWW programming model
high interoperability
Tag-based browsing
language:
Content (XML)
Screen management (text,
images)
Data input (text, selection
lists, etc.) XSL Processor
Hyperlinks & navigation WML Stylesheet HTML StyleSheet
support
WML Browsers HTTP Browser
Takes into account
limited display,
navigation capabilities of
devices
<WML>
...
</WML>
Example
calling a number (WML)
wtai://wp/mc;07216086415
calling a number (WMLScript)
WTAPublic.makeCall("07216086415");
Implementation
Extension of basic WAE application model
Extensions added to standard WML/WMLScript browser
Exposes additional API (WTAI)
<WML>
<CARD>
<DO TYPE=ACCEPT>
WTAI Call <GO URL=wtai:cc/mc;$(N)/>
</DO>
Enter phone number:
Input Element
<INPUT TYPE=TEXT KEY=N/>
</CARD>
</WML>
third party
firewall
origin servers
Event occurrence
WTA user agent could be executing and expecting
the event
WTA user agent could be executing and a different
event occurs
No service is executing
Event handling
channel for each event defines the content to be
processed upon reception of that event
Client Server
Procedure
Remote Evaluation
Procedure
+
State
Procedure
+ Server Data
State
Procedure
+
State
Procedure
+
State Server Data
Server Data
Mobile Agents
Sridhar Iyer IIT Bombay 253
Interaction Model
Request
Client Server
Response
Client/server communication
Mobile agent
Request
Client Server
Response
Event Manager
Execution User identification
environment
Mobile Agent
Protection
Communication (agent, server)
(agent dispatching)
Authentication
Agent life cycle
(creation, destruction)
3
Paper Assembler 1
2 Cloning
Partial Question
Paper
Sridhar Iyer
To Distribution Center IIT Bombay 256
Dynamic Upgrade
Distributor
Distribution Server
Examiner A Examiner C
Examiner D
Results
Sridhar Iyer IIT Bombay 259
Agents collaborate to produce the final result
Mobile Agents Summary
Appears to be a useful mechanism for
applications on mobile and wireless devices
Reduce the network load
Help in overcoming latency
Execute asynchronously and autonomously
B
A A
B
A B
D
C
A starts sending to B.
C senses carrier, finds medium in use and has to
wait for A->B to end.
D is outside the range of A, therefore waiting is not
necessary.
A and C are exposed terminals
Sridhar Iyer IIT Bombay 266
Routing Protocols
Proactive protocols
Traditional distributed shortest-path protocols
Maintain routes between every host pair at all times
Based on periodic updates; High routing overhead
Example: DSDV (destination sequenced distance vector)
Reactive protocols
Determine route if and when needed
Source initiates route discovery
Example: DSR (dynamic source routing)
Hybrid protocols
Adaptive; Combination of proactive and reactive
Example : ZRP (zone routing protocol)
Sridhar Iyer IIT Bombay 267
Dynamic Source Routing (DSR)
Route Discovery Phase:
Initiated by source node S that wants to send packet to
destination node D
Route Request (RREQ) floods through the network
Each node appends own identifier when forwarding RREQ
Route Reply Phase:
D on receiving the first RREQ, sends a Route Reply (RREP)
RREP is sent on a route obtained by reversing the route
appended to received RREQ
RREP includes the route from S to D on which RREQ was
received by node D
Data Forwarding Phase:
S sends data to D by source routing through intermediate nodes
Z
S E
F
B
C M L
J
A G
H D
K
I N
[S] Z
S E
F
B
C M L
J
A G
H D
K
I N
[X,Y]
Sridhar Iyer Represents list ofIIT
identifiers
Bombay appended to RREQ 270
Route Discovery in DSR
Y
Z
S [S,E]
E
F
B
C M L
J
A [S,C] G
H D
K
I N
Z
S E
F [S,E,F]
B
C M L
J
A G
H D
[S,C,G] K
I N
Z
S E
F [S,E,F,J]
B
C M L
J
A G
H D
K
I [S,C,G,K] N
Z
S E
[S,E,F,J,M]
F
B
C M L
J
A G
H D
K
I N
Z
S RREP [S,E,F,J,D]
E
F
B
C M L
J
A G
H D
K
I N
DATA [S,E,F,J,D] Z
S E
F
B
C M L
J
A G
H D
K
I N
Others websites:
www.palowireless.com
www.gsmworld.com; www.wapforum.org
www.etsi.org; www.3gtoday.com
Sridhar Iyer IIT Bombay 279
Thank You
Contact Details:
Sridhar Iyer
School of Information Technology
IIT Bombay, Powai, Mumbai 400 076
Phone: +91-22-2576-7901
Email: sri@it.iitb.ac.in
Sridhar Iyer IIT Bombay 280