You are on page 1of 14

CONTENTS

Preface page no

1. Types of Wireless networks for Internet 4

1.1 3G wireless networks 4


1.2 Universal mobile telephony system (UMTS) 5
1.3 Code Division Multiple Access (CDMA) 7
1.4 WLANS IEEE 802.11 7

2. Integration methods for 3G and 802.11 services 7


2.1 Open coupling 8
2.2 Tightly-coupled Integration 9
2.3 Loosely-coupled integration 10

3. Multiple Access Methods in wireless networks 10


3.1 TDMA 10
3.2 FDMA 10
3.3 GSM 10

4. Methods for improving Quality of service (QoS) in wireless and


Fixed networks . 11

4.1 The Reservation Protocol method 12


4.2 Class Based Queuing method 12

5. Security protocols in wireless networks 12

Conclusions: 13

References: 13

1
GATLA BHARAT KUMAR
Bharat_gatla@yahoo.co.in

Analysis of wireless networks and methods to improve quality of


service (QOS)

ABSTRACT:

This paper presents some views on third generation wide area networks and IEE
802.11 local area wireless networks. Comparing and contrasting technologies used in
wireless network design. it will present the problems related to 3G and IEE 802.11.
Advantages of 3G technology and IEE 802.11 and what are the major problems in
designing wireless networks. Different methods and functions related to integration of
3G and WLAN . it will also discus various methods developed for improving Quality
of service (QOS) in wireless networks and implementation of protocols in WLAN
802.11 for security. Critical analysis of wireless networks and there architecture
different ways to improve quality in data transfer in wireless network by integrating.
Implementation of cellular systems and understanding merits and demerits of
different Generation of mobile technology. Evaluating multiple access methods
(FDMA, TDMA and CDM). Discussing methods to improve QOS and reduce
congestion in wireless networks different protocols used for securing data in
wireless networks analyzing future wireless networks with good quality and
services for mobile computing .

INTRODUCTION

As the use of Internet application has been growing enormously in the recent years
and services like web surfing are becoming progressively popular. In order to provide
uninterrupted access to the Internet for corporate companies and users. Wireless unit
producers and service providers are evolving 3G wireless systems that expeditiously
help present and upcoming Internet services. This paper, appraises the operation and
capacity of a 3G wireless network systems. Wireless local-area networks (WLANs)
are progressively used , basically for educational institution and corporal fields. A
clear inferring of use in real WLANs is critical entropy for the developers, who
deploy, and manage WLAN technology. The Internet is provides a wide range of
services starting from synergistic web surfing to flowing audio and video diligences.
Basically, access to these services is incurred through wire-line dialup or LAN
connections. Lately, mobile and wireless access systems are being developed to
provide continuous access to the Internet. This paper caters a comprehensive study of
the cumulative effect of protocols and the lower layers, in the comportment of
multiple users. It also renders a brief description of the 3G system architecture and

2
explains on the key features that bear on the performance. The third-generation (3G)
wide area wireless networks and 802.11 local area wireless networks possess inverse
features. 3G networks anticipate omnipresent connectivity with comparatively low
data rates. where as 802.11 provides better higher data rates, corresponding to
connected networks, merely covering small geographic , suitable for commercial
applications in edifices and airports. The functioning and tractability of wireless data
services would be dramatically improved if users could access both networks. this
paper describe two possible integration methods namely tightly coupled integration
and loosely coupled integration . This paper presents the disputes posed by the need
for security during system architecture design for wireless systems. A huge drop in
service quality when a call handoff is made as the mobile moves from one region to
another may not be acceptable for these applications. It is therefore required to assert
the QoS of these services, in comportment of user quality QoS support in wireless
systems has been tried at different levels in the protocol stages. Several MAC level
protocols were suggested for achieving QoS in Wireless networks. This paper
presents two methods i.e. RSVP and CBQ mechanism in wireless networks.

1. Types of Wireless networks for Internet

Mobile networks - undergone several changes (1G, 2G and 3G) Wireless Local Area
Networks (WLANs) – upgraded from IEEE 802.11

3G mobiles and 802.11 have inverse characteristics .it is anticipated that both will
help end-users for unlimited broadband services with secured and congestion free data
transfer.

1.1 3G wireless networks

Wireless mobile network started with 0G which was great antecedent in the mobile
service those were useable after 1980s. During those days, we had a mobile
manipulator to fix up the calls. The craze in mobile service started with analog
cellular application called AMPS (Analog Mobile Phone Service). This generation
was called 1G, it was technology used by cell for users placing their own calls and
continues their interactions simultaneously as they actuated from cell to cell. AMPS
were built on FDM. First generation technology was based on analog voice only

The second generation, came into existence after the first, was based on digital
cellular called D-AMPS applying TDMA (Time division Multiple Access).2G is
mostly used in many devices and services it provides digital clarity in voice and
reduced access to internet with short massage services (SMS). 2G mobile admit
CDMA, TDMA, and GSM The 2G networks allows narrow band (up to 144kbps)
voice and data services using circuit switching proficiencies. development from the
2G to 3G wireless networks, some changing technologies, namely GPRS for GSM,
136 high-speed for TDMA or IS-95B for CDMA, are specified, which may be called
2.5G wireless technologies.

Third generation technology (3G): considered as next generation of wireless mobile


technologies will admit for much higher contagion rates to wireless devices extending
to useful services and experience. Few of those at present use EDGE technology -
usable on select phones, admits for the highest speed of data transfer mobile.

3
3G systems patronise both real-time and non-real-time multimedia services with
Data rate speed ranging from 144kb/s to 2Mb/s and they cover wide area with
Wide geographic coverage and most world-wide roaming. but it Costs high – radio
spectrum, upgrading network devices. 3G Base Stations together with Radio Network
Controllers span the wireless and wired network.

The Two main 3G platforms:

UMTS (Universal Mobile Telecommunications System)


CDMA2000 (Code Division Multiplexing)

Fig1:Third generation wireless networks architecture

3G wireless network system posses digital clarity with voice ,packet switch and
data as application operating at the speeds of 384kbps for mobile & 2Mbps for
stationary posses properties such as Multimedia data, positioning capability,
connection to Internet, always connected. Unlike with WLANS, 3G standards
cover layers above the media access there fore 3G have standardized protocols
for: authentication routines, QoS warranties and mobility management. UMTS
and cdma2000 were developed separately Both were ITU approved 3G standards -
International Telecommunications Union.

1.2 Universal mobile telephony system (UMTS)

Universal Mobile Telecommunications System (UMTS), is a 3rd Generation (3G)


type of mobile networks. UMTS in packet switching mode permits mobile users to
have unlimited access to the web. UMTS mobile network is grounded on IP which
helps additions and alterations to the network. Consequently UMTS is development

4
step, which attains potential effective end-to-end packet-based data transfer .The
projected simulation environs admits end-to-end performance evaluation, integrating
the desired Quality of Service (QoS) .

Fig2:UMTS Architecture for Packet Switched Operations

The system is stationed on UMTS for packet-switched operations, illustrated in. The
transport technology in UMTS packet switched domain is IP-based. UEs transmit
with Node-Bs utilising the radio interface. Node-B supervises the network's air
interface for the UEs in its cell. The RNC contends the resources of the air port of all
the UEs connected to Node-Bs serviced by the RNC. This is conjointly cited to as
Radio Resource Management (RRM). The RNC also conveys with the SGSN
allowing it to send and receive data to and from the UEs.

Fig3:Basic construction of UMTS

The Access network is the portion of the UMTS which allows the mobile phone to the
UMTS Core network. The Core network caters the key switching and control
functions of UMTS. The Access network comprises of base stations and extra rases
of controllers and multiplexers distinctive for any cellular phones. Fig. 3 shows the
basic design of UMTS system. The UMTS Access network is like a rooted tree
topology. The node connects the Access network to the UMTS Core starting from
tree. In UMTS network systems, the root node is the starting switch. Which controls
dissimilar UMTS usage platforms and their changing techno-economic requirements.

Difficulties in UMTS Protocols:

 more convergence time likened to frequency of topology varies because of


roaming mobiles
 more marching necessities because of protocol
 huge bulk of routing control contents

5
 Danger of message loss due misrouting.

1.3 Code Division Multiple Access (CDMA)

CDMA (Code Division Multiple Access) is a type of Spread Spectrum enables


communication techniques . it is a peculiar class of communication systems that
utilises bandwidth greater than the minimal bandwidth required for the information
signal to be carried. The signal bandwidth spreading is incurred by marching the
information signal with Pseudo Noise sequences (PN-sequences) enables them
effective autocorrelation and cross correlation attributes. cdma2000 uses 1xRTT
(Radio Transmission Technology) with 1xEV-DO (Evolution, Data Only) and future
cdma2000 3x. All developed to be backward compatible with cdma (2Gversion)
Both 1x types have the same bandwidth and chip rate.Cdma can be used in any
cdmaOne frequency band and network. cdma2000 system provides voice or data on a
standard 1.25 MHz IS-95 CDMA radio channel .Cdma2000 channels are multiples of
the 1.25 MHz CDMA radio channel bandwidth which may are about 3, 6, 9 or 12
times (up to 15MHz wide).

Fig4: Basic CDMA

1.4 WLANS IEEE 802.11

IEEE 802.11 standards can be specified by two modes of operation:


1) Infrastructure mode 2) Ad hoc mode
Infrastructure mode network consists of an access point (AP) in which terminals
can communicate with an AP at all the time where as in Ad hoc mode network
AP is not specified and terminals can communicate with each other until there is a
radio link that helps for transmission. Basically, infrastructure mode networks are
used for integration of 3G and WLAN. 802.11e MAC (Media Access Control)
employs a channel access function namely Hybrid Coordination Function (HCF)
HCF lets in a contention channel based and free access centrally controlled
mechanism. Contention based channel access mechanism specifies when two or
more nodes try to transfer between a network continuously. IEEE 802.11 is the
fledged wireless protocol developed for wireless LAN transfers, it is tested and

6
distributed for years in corporate, educational and populace environments
areas. it is the preferred technologies for home networking.

The IEEE 802.11 standard patronizes many wireless LAN technologies in


unaccredited bands of 2.4 and 5 GHz, and share the same MAC above two PHY
layer stipulations called direct-sequence spread spectrum (DSSS) and frequency-
hopping spread spectrum (FHSS).

Fig5: IEE 802.11 MAC Structure

The most important is the IEEE 802.11b PHY layer specification, which reaches
data rates of 5.5 and 11 Mbps by utilizing complementary code keying ( CCK)
modulation. Lately IEEE 802.11g task group has developed a draft standard that
enables data rates above 22 Mb/s, acquiring single-carrier trellis-coded 8- phase
shift keying (PSK) modulation. In parallel, other 802.11 task groups aim to
develop specific areas of the protocol. 802.11d task group works with in 802.11b
variations at other frequencies, for many countries in which 2.4GHz band is not
available. 802.11e task group works with the stipulation of a improved 802.11
MAC protocol to accommodate better QoS and security requirements above
legacy 802.11 PHY layers. 802.11 MAC replaced the Ethernet-like MAC layer
with matching Time Division Multiple Access (TDMA), and imparts additional
error-correction to traffic. 802.11i intents to develop 802.11 security rather than
Wired Equivalent Privacy (WEP). In order to assure interoperability and
compactable with many market segments. IEEE 802.11 product manufactures
have tallied on a compliance routine called Wi-Fi(Wireless Fidelity standard).

2. Integration methods for 3G and 802.11 services

The third-generation (3G) wide area wireless networks and 802.11 local area wireless
networks have inverse features. 3G networks assure to provide on, omnipresent
connectivity with comparatively low data rates. The contrive of a network architecture
that expeditiously integrates3G and 802.11 is a ambitious job, especially with the
objective of making the interoperation among the two technologies as unlined and as
effective as imaginable. while these features are acquaint by design in 3G networks,
their execution depends on specific wireless access architectures namely CDMA2000
or UMTS and their extension to other wireless technologies such as 802.11 presents
several compatibility issues. Integration can be achieved at dissimilar “coupling”
points in the network depending upon specific technical prerequisites like.
 Secured network for communication
 Maintaining QoS between transmitter and receiver.

7
 Continues session

Integration can be attained in three general methods namely open coupled, loose
coupled and tightly coupled.

2.1 Open coupling

In open coupling integration 3G and WLAN networks have entirely disjoint operation
in data and control paths.The Open coupling technique tries to elevate a simplified
architecture for providing wireless Internet services with continuous mobility across
any where access to networks. This method has three component types:
1) Routers – used for the global Internet and local administrative domain (AD)
networks.
2) Mobile Network Access Servers (MNASs) comprise radio or fixed network
mobility knowledge.
3) Mobile Network Access Clients (MNACs) are the mobile clients.

2.2 Tightly-coupled Integration

The precept at the rear end of tightly-coupled approach is to make the 802.11 network
appear to the 3G network as another 3G access network. The 802.11 network uses the
methods which are readily present in 3G radio networks. In tightly coupled
approach WLAN is integrated into the 3G core network or 3G radio access networks.
This method is used by WISP in “802.11 gateway” network element seems to the
upriver 3G core as PCF, in the case of a CDMA2000 core network, or as an SGSN,
in the case of UMTS. The 802.11 gateway obscures the contingents of the 802.11
to the 3G core, and enforces all the 3G protocols (mobility management,
authentication, etc.) required in a 3G. Mobile network Nodes in this overture are
involved for implement the representing 3G protocol stack on top of their standard
802.11 network cards, and switch to one physical layer to the next when needed.

Fig 6: 3G and 802.11 Integration: tightly-coupled vs. loosely-couple

8
2.3 Loosely-coupled integration

The loosely-coupled method calls for the unveiling of a new element in the 802.11
network, the 802.11 gateway. However, in this design (WISP No.2 in Figure 6), the
gateway associates to the Internet and does not have any direct link to 3G network
elements such as PDSNs, GGSNs or 3G core network switches. In loosely coupled
integration 3G and WLAN networks have totally dissociate operation in data paths.
control protocols that cover authentication, billing and mobility management in the
networks need to be interoperable with other. It is called loosely-coupled integration
because it completely assorts the data routes in 802.11 and 3G networks. The eminent
speed 802.11 data traffic is never injected into the 3G core network but the end user
can have continuous data transfer.

3. Multiple Access Methods in wireless networks

Multiple access methods can be classified as follows:


 Time Division Multiple Access (TDMA)
 Frequency Division Multiple Access (FDMA)
 Code Division Multiple Access (CDMA)

3.1 TDMA
In Tdma method users are multiplexed with the time domain On a single
carrier frequency applying a frame format that depends on the wireless standard
being used each user has a unique time slot in which to access network.Merits of
Tdma it is conceivable to apportion several number of time slots per frame to
different users. Therefore this can cater bandwidth as when required.
For an instances: GSM and United States Digital Cellular (USDC)

3.2 FDMA
In frequency division method channels are apportioned on demand. any users can
broadcast with in the network. it is not required to share the same frequency for
data transfer but network bandwidth is shared on a frequency basis. FDMA
channel is permitted to have only one user at time but when channel is assigned
MS and BTS can transmit at the same time without stoppage. MS applies
duplexers as the transmitter and receiver operate at the same time .
For example : Advanced Mobile Phone Service (AMPS) and (ETACS)

3.3 GSM

GSM network may be divided into three broad regions


1) Mobile stations which are done subscribers
2) Base station which are used to control radio link with mobile station

9
3) Network substation it is the main body immobile switching centre

Mobile Station consists of mobile kits and SIM Card which allows mobility so user
can access GSM services independently of terminal they are using mobile kit itself is
distinctly identified – International Mobile Equipment Identify (IMEI) which can be
used to check rectifier to system called authentication purposes. this Network only
requires a valid account when compared to traditional technology such as AMPS.
Base station consists of two parts: BTS and BSC these are used to transfer over Abis
interface which enables to communicate between distinct vendors it controls voice
data traffic transport synchronization.
Network Subsystem GSM systems use a Transcoding Rate and Adaptation Unit
(TRAU) is compressor circuit used to control traffic from mobile to BSC where voice
and data are zipped by handset after that TRAU places data in form that the Mobile
TRAU can manage many GSM formats such as: Full Rate transmission, Enhanced
Full Rate transmission, Half Rate transmission.

4. Methods for improving Quality of service (QoS) in wireless and


fixed networks

Integrating wireless LAN (WLAN) methods with 3G cellular networks has helped to
improve the operation of wireless systems. WLANs play an vital part in such mixed
systems, which enables the execution of WLANs turns important to the complete
system. It is understood that WLANs allow a physical layer multi-rate potentiality,
where MAC layer techniques are used to tap this capability. this paper, presents a
MAC layer relay-enabled point coordination function (PCF) protocol, called PCF.

Fig7: Typical polling procedure in PCF

The IEEE 802.11 standard defined two media access control (MAC) mechanisms:
1) Distributed Coordination Function (DCF) it is based on carrier-sense multiple
access with collision avoidance (CSMA/CA).DCF is the basic MAC mechanism

1
2) Point Coordination Function (PCF) it is stationed on polling. where PCF is built on
top of DCF and provides congestion data access. PCF renders congestion less data
transmission where the AP does the job of point coordinator, and holds the medium
access in a poll-and-response mode. The state at which PCF engages is known as
contention-free period (CFP). as CFP starts, the AP runs under DCF, but it uses the
priority inter-frame space (PIFS) to capture the medium, and then transmits out a
packet that contains the time of CFP. Many Efforts were undergone to provide the
Internet with Quality of Service (QoS). The emergence of wireless networks and
mobile sets is able to help services that compel QoS is very important task.

4.1 The Reservation Protocol method (RSVP) : that allows a signalling technique
for point-to-point QoS handshake. RSVP was developed for wired networks. To
make RSVP compatible for wireless networks by changing the way control
messages are aired and inclosing wireless/mobile specific QoS parameters are
considered namely high losses, low bandwidth, power constraints and mobility. The
RSVP control messages can be classified as(i) trigger messages which are sent to set
connections
and (ii) refreshing messages that are used to assert the stage with the path.

4.2 Class Based Queuing method (CBQ) which is used as the underlying bandwidth
enforcing mechanism is also modified to fit our approach. CBQ does the work of
assigning packets depending on the bandwidth prerequisites of a specific class of
service. The bandwidth that was held and not used for a given class must be utilized.
It is essential to have methods that make the resources be used by other till it wants.
The CBQ method permits a class of service to borrow bandwidth from other class if
the class is above its assigned bandwidth. Presently, when receiving packets is more
than capacity of the network then CBQ applies the tail dropping technique to shed off
the packets. CBQ must be altered to lodge the loss profiles attributes. CBQ thus cliffs
the packets in bursts .

5 SECURITY PROTOCOLS IN WIRELESS NETWORKS

It is necessary to know that wireless security is an point-to-point essential that can be


sub-divided into many security domains. design of security protocols is key issue

Fig 8: Security protocols in wire less network


To understand how different security protocols can be used for wireless kits, we need
to take a wireless network that has the Wireless Application Protocol (WAP) in Fig8:

1
displays a network architecture that enables wireless client transfer with a web server
with in the web, base station and a wireless gateway. The WAP specifies protocols
for wireless link, that can be covered above existing wireless methods, like wise
GSM, CDPD, CDMA. The WAP gateway interprets congestion from transmitter and
receiver in wireless network, to formal internet protocols (HTTP/TCP/IP), “thereby
helping integration with existing Internet servers. Appliance domain security tries to
ensure only specified appliance to access the data stored and Network access domain
security checks only empowered devices that can connect to a wireless network to
maintain data integrity. Network domain security covers security of the substructure
both voice and data in networks that helps a wireless network. Application domain
security assures for a safe and relied service that can execute on the service.

Conclusions:

At the end of this I conclude that though 3G and Wlans have technologies that are
complement to each other, integrating them would yield better performance in
network over large geographic area that can reduce low data rates and controlling
traffic. For designing any network QoS and security must be achieved which may not
be possible by integrating. Because there no proper methods available so there is a
concern in developing integrating methods and design different protocols for a
secured wireless network. Methods must be developed to improve quality of data
transfer and reduce jamming in the network.

References:

1) M.Buddhikot, G.Chandranmenon, S.Han, Y.W.Lee, S.Miller, L.Salgarelli,


Integration of 802.11 and third generation wireless data networks, 2003, IEEE.

2) Local and metropolitan area networks: standard for port based network access
control. Technical report,IEEE P802.1x,2001.

3) J.Ala-laurila,J.mikkonen and J.Renemaa.Wireless lan access network architecture


for mobile operators.IEEE communication magazine,pages 82-89November 2001.

4) S. Weinstein et al. Wireless LAN and Cellular Mobile – Competition and


Cooperation. Technical Talk, IEEE New Jersey Coast Section. Available
from
http://www.ewh.ieee.org/r1/njcoast/events/weinstein.ppt, May 2002.

5) J.H. Park. Wireless internet access for mobile subscribers based on the
grps/umts network. IEEE Communications Magazine, pages 38–49, April 2002.

6) Wireless IP Network Standard. P.S0001-A-1, Third Generation Partnership


Program 2 (3GPP2), 2000.

7) Wireless LAN Medium Access Control (MAC) and Physical Layer


(PHY) specifications. ANSI/IEEE Std 802.11: 1999 (E) Part 11,
ISO/IEC 8802-11, 1999.

1
8) H.L.Truong and G.Vannuccini, Performance evaluation of the QOS enhanced
IEEE 802.11e MAC layer,IEEE 2003.

9) A. Almquist A. Lindgren and 0. Schelen. “Evaluation of quality of


service schemes for IEEE 802.1 I Wireless LANs,” Pmc. 26th Annul
IEEE Conference on Lord Compurcr Nerwork (LCN ZWI), pp. 348-
351, 2001.

10) Draft Supplement to Standard for Telecommunications and Infomalion


Exchange Between System - LANIMAN Specific Requiemenfs
- Part 1 I: Wireless LAN Medium Access Gmml (MAC) and Physical
Layer (PHY) Specifi cations: Medium Access Conhol (MAC) Enhancements
for Quality of Service (QOS):’ IEEE Std 802.1 WD3.3, October 2002

11) Supplement to IEEE Slandard for Information Technology - Telecommunications


and Information Exchange Between System - Lacal
and Meuapolilan Area Networks - Specific Requiremenfs - Pan II:
Wireless LAN Medium Access Control (MAC) and Physical h y a
(PHY) Specifications: High-speed Physical Layer in Ule 5 GHz Band:’
IEEE Std 802.11a-1999.

12) 802.1 1:’Pm. of IEEE INFOCOM ZWI, pp. 209-218. ZWI.


181 P. May 0. Klein 0. Hienz L. Stibar S. Mangold. S. Choi, “WEE
802.11e Wireless LAN for Quality of Service:’ Pmccccdings of the
Eumpcon Wmlcs, MI. I, pp. 32-39, February 2002.

13) Timo HAmalainen,Eero Walleneus,Kari Luostarinen and Timo Nihtila,End to


End Qos Issues at the integrated WLAN and 3G environments.

14) S. Mangold, S. Choi. P.May, 0. Klein. G. Hie-, L. Stibor. “EEE


802.1 le Wireless Lan for Quality of Service”

15) EEE 802.11 WG. Draft Supplement.to STANDARD FOR Telecommunications


and Information Exchange Between Systems – LANl MAN Specific Requirements -
Pm 11: wireless Medium Access Control (MAC) and physical layer (PHY)
specifications: Medium Access Control (MAC) Enhancements for Quality of Service
(QoS), IEEE 802.11eJD2.0, Nov. 2001.

16) Eero Wallenius, Timo Hämäläinen, Timo Nihtilä, Jyrki Joutsensalo and c)Kari
Luostarinen, 3G Interworking with WLAN QoS 802.11e,IEEE 2003.

17) Kumar Balachandran,, “Convergence of 3G and WLANs”, IEEE ICC 2002.

1
18) Jamal N. Al-Karaki and J. Morris Chang, A Simple Distributed Access Control Scheme
for Supporting QoS in IEEE 802.11 Wireless LANs,IEEE 2004.

19) A. Veres, A.T. Campbell, M. Barry and Li-Hsiang Sun, ”Supporting service
differentiation in wireless packet networks using distributed control”, IEEE
Journal on Selected Areas in Communications, Volume: 19 Issue:10, Oct.
2001 Page(s): 2081-2093.

20) A. Lindgren, A. Almquist and O. Schelen, ”Quality of Service schemes for


IEEE 802.11-a simulation study”, Proceedings of the Ninth International
Workshop on Quality of Service (IWQoS’2001), June 2001

21)

You might also like