Professional Documents
Culture Documents
HANDOUT
UNIT I – WIRELESS LAN
Wimax features
Wimax-Worldwide Inter-operability for Microwave access.
Features:
• Service area range 50km
• Very high spectrum utilization;3.8 bit/Hz
• Upto 280 Mbps per BS.
HIPERLAN-2 protocols
• Radio Link Control(RLC) Protocol
• DLC connection Protocol
• Radio Resource Protocol (RRP)
• Association Control Function (ACF)
Page | 1
Spread spectrum technique
• Spread spectrum techniques spread information over a very large bandwidth specifically, a
bandwidth that is much larger than the inverse of the data rate.
IR transmission Vs UHF
Requires low BW,no need for license It support both unlicensed band(430-
450MHz) and licensed (450-470MHz)
Characteristics of MANET
• Infrastructure-less dynamic multihop network. It does not have a definite Topology.No central
router required. Data takes multiple hops before reaching destination
WiMAX architecture
Page | 2
• During network discovery, the Mobile Station (MS) discovers both the access service provider
and the available Network Service Provider (NSP).
• The MAC layer consists→ (i) the MAC Convergence Sublayer (CS), (ii) the MAC Common Part
Sublayer, and (iii) the MAC Security Sublayer.
1) Convergence Sublayer→ receives data packets from higher layers and modify the suitable
format for sending via air medium by suppressing redundant information in their headers..
2) Common Part Sublayer→provides the essential support functions for the over the-air
transmission of the information.
• It includes such functions as signaling,modulation/coding scheme, feedback and bandwidth
allocation.
• It also provides fragmentation and packing…
3) Security Sublayer→ assign service flow identifier (ID), Connection Identifier (CID), provisioned
QoS parameters and the authorization module.
HIPERLAN standards
Data rate 23.529Mbps.
Coverage 100m,frequency 5.2GHZ.
Supports asynchronous and synchronous
Support power saving
Each HIPERLAN node is either forwarder (F) or non-forwarder.
Forwarder Node →receive packet and retransmit it to the other node.
Non-forwarder Node →Simply it accept a packet intended for it.
Each non forwarder node select at least one forwarder node as a neighbor.
Page | 3
Both nodes periodically update the routing database.
Connection between the MS and AP is similar to WLAN.
But communication between APs are different.
It allows handover in a subnet and IP based handover for non homogeneous network.
It support seamless interoperation Ethernet and point-point connection.
• DSSS communicates non overlapping pulses at the chip rate of 11Mcps,which occupy 26 MHz.
WLAN
PHY
layer
Functions
1)FHSS PHY (Frequency-hopping spread spectrum)
Two data rates for transmission at 1 and 2Mbps.
Available channel 78 with a BW of 1GHz.
Modulation technique is GFSK.
Each BSS select one of the three patterns of 26 hops with the 3 groups..
Group1→(0,3,6,….75),Group2→(1,4,…76) and Group3→(2,5,…77)
In FHSS PHY, data transmission over media is controlled by the
FHSS PMD sublayer as directed by the
FHSS PLCP sublayer.
Binary information bits converts them
into RF signals by using carrier modulation
and FHSS techniques.
Data whitening is used for the PSDU before
transmission to
minimize DC bias on the data if long strings
of 1s or 0s are contained in the PSDU. The
PHY stuffs a special symbol every 4 octets
of the PSDU in a PPDU frame
Page | 4
DSSS PHY (Direct sequence spread spectrum)
The encoding scheme that is used is DBPSK (differential binary
phase shift keying) send 1 or 2 bits per symbol.
Total BW 2.4GHz is divided in to 11 channels with spaced by 5MHz.
DSSS communicates non overlapping pulses at the chip rate of 11Mcps,which occupy 26 MHz.
Bluetooth Architecture
Universal radio interface for ad-hoc wireless connectivity
Interconnecting computer and peripherals, handheld devices, PDAs, cell phones – replacement of
IrDA
Embedded in other devices, goal: 5€/device (already < 1€)
Short range (10 m), low power consumption, license-free 2.45 GHz ISM
Voice and data transmission, approx. 1 Mbit/s gross data rate
Bluetooth PAN is also called a piconet and is composed of to 8 active devices in a master-slave
relationship
Page | 5
The first Bluetooth device in the piconet is the master, and other devices are slaves that
communicate with the master.
A piconet typically has a range of 10 metres (33 ft)
A single channel is shared among all devices in the piconet
Each of the active slaves has an assigned 3-bit active member address
Linking of multiple co-located piconets through the sharing of common master or slave devices
Devices can be slave in one piconet and master of another
Communication between piconets
Devices jumping back and forth between the piconets
Collection of devices connected in an ad hoc fashion
One unit acts as master and the others as slaves for the lifetime of the piconet
Master determines hopping pattern, slaves have to synchronize
Each piconet has a unique hopping pattern
Participation in a piconet = synchronization to hopping sequence
Each piconet has one master and up to 7 simultaneous slaves (> 200 could be parked)
Mobile IP Messages
Message Types:
Binding Request (BR)
Binding Acknowledgement (BA)
Binding Update (BU)
Binding Warning(BW)
Page | 6
Requirements for mobile IP.
Compatibility
Transparency
Scalability
Efficiency
Security
Triangular routing.
In the mobile IP, packets that are sent to a mobile host by thecorrespondent host are first routed to
the mobile host's home agent and thenforwarded to the mobile host at its current location by its
home agent.
Care of address
Care of address is a address of Foreign agent (router)
• Tunneling → establishes a virtual pipe for data packets between a tunnel entry and a tunnel
endpoint.
• Reverse tunneling→MN can directly send its packets to the CN.
• It provides local handovers without renewed registration by installing a single cellular IP gateway
(CIPGW) for each domain.
• In cellular IP domain, all nodes collect routing information from CIPGW.
• Soft handovers are achieved by allowing simultaneous forwarding of packets destined for a mobile
node along multiple paths.
• A mobile node moving between adjacent cells→ temporarily be able to receive packets via both old
and new base stations (BS)
• Cellular IP requires changes to the basic mobile IP protocol and is not transparent to existing
systems.
• The foreign network‘s routing tables are changed based on messages sent by mobile nodes.
• These should not be trusted blindly even if they have been authenticated. This could be exploited
by systems in the foreign network
Page | 8
• step 4 →New BS intercepts the registration request.
• Also it sends out a handoff message, and routers paths from the old and new BS.
Registration process
Page | 9
• extensions→ contain parameters for authentication.
• The protocol consists of two major phases: Route Discovery, Route Maintenance.
• When a mobile node has a packet to send to some destination, it first consults its route cache to
check whether it has a route to that destination.
• If it is an un-expired route, it will use this route.
• If the node does not have a route, it initiates route discovery by broadcasting a Route Request
packet.
• This Route Request contains the address of the destination, along with the source address.
• Each node receiving the packet checks to see whether it has a route to the destination. If it does not,
it adds its own address to the route record of the packet and forwards it.
• A route reply is generated when the request reaches either the destination itself or an intermediate
node that contains in its route cache an un-expired route to that destination.
• If the node generating the route reply is the destination, it places the route record contained in the
route request into the route reply.
• 2 phases, operating both on demand:
– Route discovery
Page | 10
– Route maintenance
• makes S able to detect, while using a source route to D, if it can no longer use its
route (because a link along that route no longer works)
• Route reply by reversing the route (as illustrated) works only if all the links along
the route are bidirectional
• If unidirectional links are allowed, then RREP may need a route discovery from D to
S
If multiple routes are available for the same destination the route with the smaller hops is used.
Any updates in the routing tables are periodically broadcast in the network to maintain table
consistency
The amount of traffic generated by these updates can be huge To alleviate this problem, the updates
are made through two types of packets (a) Full Dump (b) Incremental dump
Page | 11
The incremental packets fit into a standard NPDU and hence decrease the amount of traffic
generated.
Advantages T- TCP.
• RFC1644, T-TCP, describes a TCP version to avoid this overhead.
• Connection setup, data transfer and connection release can be combined.
• Thus, only 2 or 3 packets are needed.
• It is highly efficient.
Selective retransmission
• Selective retransmission allows for acknowledgements of single packets, not only
acknowledgements of in-sequence packet streams without gaps. Sender can now retransmit
only the missing packets
I –TCP isolate problems
• I-TCP splits the connection into two parts – a wired/fixed and a wireless/mobile part. This
isolates problems on the wireless link from the fixed network. However, this also requires
that intermediate systems are able to look into IP packets to split the TCP enhancements
for wireless.
Features of TCP/IP.
• Guarantees or Reliable message delivery.
• It support connection oriented data/voice services
• It provide end to end flow control mechanism.
• It incorporates congestion control mechanism
Page | 12
Timeout freezing
• Mobile hosts can be disconnected for a longer time - no packet exchange is possible, e.g., in a
tunnel, disconnection due to overloaded cells or mux.With higher priority traffic TCP
disconnects after time-out completely TCP freezing MAC layer is often able to detect
interruption in advance. MAC can inform TCP layer of upcoming loss of connection. TCP
stops sending, but does now not assume a congested link. MAC layer signals again if
reconnected.
Page | 13
connection setup, data transmission, connection release
RFC1644, T-TCP, describes a TCP version to avoid this overhead connection setup, data transfer
and connection release can be combined thus, only 2 or 3 packets are needed
Advantage
Efficiency
Disadvantage
Congestion in TCP
Page | 14
worth of ACKs to add 1 packet‘s worth to the congestion window, but instead increments
Congestion Window by a little for each ACK that arrives. Specifically, the congestion
window is incremented as follows each time an ACK arrives
Fast Retransmit/Recovery
• Every time a data packet arrives at the receiving side, the receiver responds with an
acknowledgment.
• when a packet arrives out of order TCP resends the same acknowledgment it sent the last time.
• This second transmission of the same acknowledgment is called a duplicate ACK.
Page | 15
• Standard TCP is used between the fixed computer and the access point.
• Instead of the mobile host, the access point now terminates the standard TCP connection,
acting as a proxy.
• This means that the access point is now seen as the mobile host for the fixed host and as the
fixed host for the mobile host.
• If the correspondent host sends a packet,the foreign agent acknowledges this packet and tries
to forward the packet to the mobile host.
• If a packet is lost on the wireless link due to a transmission error, the correspondent host
would not notice this. In this case, the foreign agent tries to retransmit this packet locally to
maintain reliable data transport
• If the packet is lost on the wired link, the mobile hosts notice this much faster due to the lower
round trip time and can directly retransmit the packet
• Packet loss in the wired network is now handled by the foreign agent.
• Access point acts as a proxy buffering packets for retransmission.
• After the handover, the old proxy must forward buffered data to the new proxy because it has
already acknowledged the data.
• After registration with the new foreign agent, this new foreign agent can inform the old one
about its location to enable packet forwarding.
• The sockets of the proxy, must migrate to the new foreign agent located in the access point.
• The socket reflects the current state of the TCP connection, i.e., sequence number, addresses,
ports etc.
• No new connection may be established for the mobile host, and the correspondent host must
not see any changes in connection state.
Page | 16
ii) Snooping TCP
• buffering of packets sent to the mobile host
• lost packets on the wireless link (both directions!) will be retransmitted immediately by the
mobile host or foreign agent, respectively (so called ―local‖ retransmission)
• foreign agent therefore ―snoops‖ the packet flow and recognizes acknowledgements in both
directions, it also filters ACKs changes of TCP only within the foreign agent
Selective Retransmission
• TCP acknowledgements are often cumulative
• ACK n acknowledges correct and in-sequence receipt of packets up to n
• if single packets are missing quite often a whole packet sequence beginning at the gap has to
be retransmitted (go-back-n), thus wasting bandwidth
• Selective retransmission as one solution
• RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-
sequence packet streams without gaps
Page | 17
• sender can now retransmit only the missing packets
Advantage
• much higher efficiency
Disadvantage
• more complex software in a receiver, more buffer needed at the receiver
ii)Transmission/time-out freezing
• Mobile hosts can be disconnected for a longer time no packet exchange possible, e.g., in a
tunnel, disconnection due to overloaded cells or mux. with higher priority traffic TCP
disconnects after time-out completely
TCP freezing
• MAC layer is often able to detect interruption in advance
• MAC can inform TCP layer of upcoming loss of connection
• TCP stops sending, but does now not assume a congested link
• MAC layer signals again if reconnected
Advantage
• scheme is independent of data
Disadvantage
• TCP on mobile host has to be changed, mechanism depends on MAC layer
Page | 18
RNC responsibilities
ALCAP
• The transport network control plane contains access link control application part(ALCAP)
required to set up the transport bearers (data bearers) for the user plane.
RNC functions
• It supports the adv the UMTS supports the advanceddata and information services and can be
called a true multimedia network.
• Higher data rate - The UMTS supports 2 Mbps data rate, which is much higher than that
supported by the 2G mobile systems.
• Iu interface
• Iur interface
• Iub interface
• Uu interface
Page | 19
3G-MSC functions
• 3G-MSC→ provides the necessary control and corresponding signaling interfaces including
SS7, MAP, ISUP (ISDN user part).
Firewall protection
• Firewalls filter based on IP addresses. Home firewalls rejects packet from MN.
• SGSN→serves routing,mobility management and authentication to and from all GPRS users.
• GGSN→ provides gateway for external IP network and handling security functions.
HSDPA channels.
• UTRAN→ Radio channel coding/decoding.Macro diversity combining/splitting of data
streams from its cells (sectors).Termination of Uu interface from UE.Error detection and
correction.
Protocol model of UTRAN
• New Radio Access network needed mainly due
to new radio access technology
• Core Network (CN) is based on GSM/GPRS
• Radio Network Controller (RNC) corresponds
roughly to the Base Station Controller (BSC)
in GSM
• Node B corresponds roughly to the Base
Station in GSM
•
•
•
•
•
•
•
•
Page | 20
• Uu Interface→ Radio interface between a Node B and one of its UE.
• lu Interface→ interconnects one UTRAN to the UMTS core network
• Iur Interface→ connection between two RNCs
• lub Interface→ connection between the RNC and Node B
• Iu interface has three protocol planes→ Radio network control plane (RNCP), Transport
network control plane (TNCP), and the user plane (UP).
RNCP functions
• It carries information for the general control of UTRAN radio network operations.
• It carries information for control of UTRAN in the context of each specific call.
• It carries user call control (CC) and mobility management (MM) signaling messages.
TNCP functions
• carries information for the control of transport network used within UCN.
UP functions
• carries user voice and packet data information.(up to 64 kbps)
• SSCF and SSCOP layers are specifically designed for signaling transport in ATM networks.
• Also it will take care of signaling connection management functions.
• AAL5 is used for segmenting the data to ATM cells.
• SCTP layer is specifically designed for signaling transport on the Internet.
Page | 21
Functions of UMTS domains
• UCN consists of a CS entity for providing voice and CS data services and a PS entity for
providing packet-based services.
• Network management systems (billing and provisioning, service management, element
management.
• CN has different functional areas:
• Functional entities needed to support PS services (e.g. 3G-SGSN, 3G-GGSN)
• Functional entities needed to support CS services (e.g. 3G-MSC/VLR)
• Functional entities common to both types of services (e.g. 3G-HLR)
Page | 22
3G-MSC Services
• Mobility management→ Handles attach, authentication, updates to the HLR, RNS relocation, and
intersystem's handover.
• Call management→ Handles call set-up messages from/to the UE.
• Supplementary services→ Handles call-related services.(call waiting, etc.)
• CS data services→ The IWF provides rate adaptation and message translation for circuit mode data
services, such as fax.
• Short message services (SMS)→ allows the user to send and receive SMS data to and from the
SMS-GMSC/SMS-IWMSC.
• VLR functionality→ database is located within the 3G-MSC and can serve as intermediate storage
for visitor subscriber data.
• OAM (operation, administration, and maintenance) agent functionality
• RNC is responsible for the use and allocation of all the radio resources of the RNS to which it
belongs.
• Responsibilities of RNC
• Intra UTRAN soft handover
• Macro diversity combining/splitting of data streams
• Frame synchronization
• Radio resource allocation & management
• Outer loop power control
Page | 23
• Responsibilities of the Node B:
• Termination of Iub interface from RNC
• Termination of MAC protocol for transport channels RACH, FACH
• Termination of MAC, RLC, and RRC protocols for transport channels BCH, PCH
• Radio environment survey (BER estimate, receiving signal strength, etc.)
• power control and Radio channel coding/decoding
• Macro diversity combining/splitting of data streams from its cells (sectors)
• Termination of Uu interface from UE
• Error detection and correction(FEC),Mux and Demux
• Modulation and spreading/demodulation and despreading of physical channels
Frequency and time (chip, bit, slot, frame) synchronization
1) PCRF –( Policy Control and Charging Rules )→Function is responsible for policy control
decision-making and controlling the flow-based charging .
2) HSS – (Home Subscriber Server)→ contains users‘ SAE subscription data such as the EPS-
subscribed QoS profile and any access restrictions for roaming.
• It also holds information about the PDNs to which the user can connect.
• In addition the HSS holds dynamic information such as the identity of the MME to which the user
is currently attached or registered.
3) P-GW – (PDN Gateway)→ responsible for IP address allocation for the UE and flow-based
charging.
• It is responsible for the filtering of downlink user IP packets into the different QoS-based bearers.
• It also serves as the mobility anchor for interworking with non-3GPP technologies such as
CDMA2000 and WiMAX networks.
4) S-GW ( Serving Gateway)→ serves as the local mobility UE moves between eNodeBs.
Page | 24
• It also retainsthe information about the bearers when the UE is in the idle state IDLE.
• performs some administrative functions in the visited network such as collecting information for
charging packet radio service (GPRS) and UMTS.
5) MME –( Mobility Management Entity)→is the control node processes the signaling between the
UE and the CN.
• Functions related to bearer management – This includes the establishment, maintenance and release
of the bearers
• Functions related to connection management – This includes the establishment of the connection
and security between the network and UE
Key features of 4G
Applications of 4G
MIMO system
Page | 25
MAGIC
• MCM is a baseband process that uses parallel equal bandwidth sub-channels to tx information
( implemented with fast Fourier transform (FFT))
• Software-Defined Radio (SDR) system is a radio communication system which uses software
for the modulation and demodulation of radio signals
3G and 4G systems.
T e ch n o l o g y 3G 4G
Frequency
1.8 - 2.5GHz 2 - 8GHz
Band
Bandwidth 5-20MHz 5-20MHz
Data Rates Up to 2Mbps 100Mbps moving - 1Gbps
stationary
Access W-CDMA VSF-OFCDM and VSF-CDMA
Page | 26
• Support for multimedia services at low transmission cost Personalization
• Integrated services
• Multi-standard wireless system.
• –Bluetooth, Wired, Wireless (802.11x)
• Ad Hoc Networking.
• A network that operates on Internet technology, combines it with other applications and
technologies such as Wi-Fi.
• Fully IP-based wireless internet.
• 100 Mbps (outdoor) and 1Gbps (indoor).
• Any services, anytime, anywhere.
• Always Be Connected (ABC).
• Seamless roaming
• Smoother handover
• High bandwidth
• End-to-end QoS (Quality of service).
• High security.
APPLICATIONS
• Virtual presence → provide user services at all times, even if the user is off-site.
• Virtual navigation→ provide users with virtual navigation through which a user can access a
database of streets, buildings, etc., of a large city.
• Tele-medicine →support the remote health monitoring of patients via video conference
assistance for a doctor at anytime and anywhere.
Page | 27
Cognitive radio architecture
Page | 28
• Cognitive engine→tries to find a solution based on received inputs.
• Policy engine→verify and ensure that the solution provided by Cognitive engine with
regulatory rules.
• The utilization of all elements use of available spectrum and access common set of radio
hardware..
• Cognitive capability→detect the existence of the information from the surrounding
environment of the radio.
• sense and ability to capture the different variations of environment
• Re-configurability→ system has the ability to be programmed according to the radio
environment ..
• sense a spectrum of wide range of frequencies and make some communication links by using
the information
OFDM-MIMO systems
• OFDM divides a broadband channel into many parallel sub channels.
• The sub channel pulse shape is a square wave.
• Pulse forming and modulation is performed by a simple IFFT.
• To decode the transmission, a receiver needs only to implement FFT.
• OFDM receiver senses the channel and corrects distortion on each sub channel before the
transmitted data can be extracted.
• In OFDM, each of the frequencies is an integer multiple of a fundamental frequency.
• This ensures that even though sub channels overlap, they do not interfere with each other
• OFDM and MIMO techniques can be combined to achieve high spectral efficiency and
increased throughput.
• The OFDM-MIMO system transmits independent OFDM modulated data from multiple
antennas simultaneously.
• At the receiver, after OFDM demodulation, MIMO decodes each sub channel to extract data
from all transmit antennas on all the sub channels.
Page | 29
Software defined radio
• Software-Defined Radio (SDR) system is a radio communication system which uses software for
the modulation and demodulation of radio signals.
• An SDR performs significant amounts of signal processing in a general purpose computer
• The goal of this design is to produce a radio that can receive and transmit a new form of radio
protocol just by running new software.
• It have significant utility for cell phone services, which must serve a wide variety of changing radio
protocols in real time.
• The hardware of a SDR → consists of a super heterodyne RF front end which converts RF signals
from and to analog RF signals, and analog to digital converters and digital to analog converters
which are used to convert digitized intermediate frequency (IF) signals from and to analog form,
respectively.
• SDR can talk and listen to multiple channels at the same time.
Page | 30