Professional Documents
Culture Documents
EC 8004-WIRELESS
.c
ul
NETWORKS
pa
1)Jochen Schiller, ”Mobile Communications”, Second
jin
Edition, Pearson Education 2012.(Unit I,II,III)
.re
2)Vijay Garg , “Wireless Communications and networking”,
First Edition, Elsevier 2007.(Unit IV,V)
w
w
w
om
UNIT I - WIRELESS LAN
.c
ul
Introduction-WLAN technologies: - IEEE802.11: System
pa
architecture, protocol architecture, 802.11b, 802.11a – Hiper
LAN: WATM, BRAN, HiperLAN2 – Bluetooth: Architecture, WPAN
– IEEE 802.15.4, Wireless USB, Zigbee, 6LoWPAN,
WirelessHART jin
.re
w
w
w
Why Wireless?
om
• Benefits
.c
– Mobility Ability to communicate anywhere!!
– Easier configuration, set up and lower installation cost
ul
– Easier to maintain.
pa
– Solution in areas where cables are impossible to install (e.g.
hazardous areas, long distances etc.)
Difficulties
jin
– Communication medium: Free space
• Noisy and unpredictable channel
.re
• Broadcast channel, more user ->less BW per user
– Equipment cost is high
w
– limited BW
– Wireless comm. is influenced by physical obstructions, climatic
w
om
.c
ul
pa
jin
.re
w
w
w
The Electromagnetic Spectrum
om
Extremely Low Frequencies 30–300 Hz.
.c
(ELF) Power transmission
ul
Voice Frequencies (VF) 300Hz–3KHz.
Audio applications
pa
Very Low Frequencies (VLF) 3KHz-30KHz
Navy,Military applications
om
High Frequencies (HF) 3–30 MHz
.c
(short waves; BBC broadcasts;
government and military two-way
ul
communication; amateur radio,
CB.
pa
Very High Frequencies (VHF) 30–300 MHz
FM radio broadcasting (88–108
jin
MHz), television channels 2–13.
Ultra High Frequencies (UHF) 300–3GHz
.re
TV channels 14–67, cellular
phones, military communication.
w
w
w
The Electromagnetic Spectrum
om
.c
Microwaves and Super High 1–30 GHz
Frequencies (SHF)
ul
Satellite communication, radar,
wireless LANs, microwave ovens
pa
Extremely High Frequencies 30–300 GHz
(EHF)
jin
Satellite communication,
.re
computer data, radar
w
w
w
The Electromagnetic Spectrum
om
.c
Optical Spectrum
ul
– The optical spectrum exists directly above the millimeter
wave region.
pa
– Three types of light waves are:
• Infrared
jin
• Visible spectrum
.re
• Ultraviolet
w
w
w
WIRELESS TRANSMISSION-Introduction
om
• Provide excellent high speed and reliable data communications in building or
campus environment.
.c
• Wireless devices transmit using one of the following signals such as IR and
RF.
ul
1. INFRARED Txlight based Txn using 900nm wavelength.
It use LASER as a Txr and photodiode as a Rxr.
pa
Requires direct LOS for good Tx
cannot penetrate through walls
jin
No electrical interferences occurs
Requires low BW,no need for license
.re
2.UHF Narrowband TxIt support both unlicensed band(430-450MHz) and
licensed (450-470MHz)
power level is about 2W
w
w
w
Comparison: infrared vs. radio Tx
om
Infrared Radio
uses IR diodes, diffuse light, typically usingthe license free
multiple reflections (walls, ISM band at 2.4 GHz
.c
furniture etc.) Advantages
Advantages
ul
experience from wireless WAN
simple, cheap, available in and mobile phones can be used
many mobile devices coverage of larger areas
pa
no licensesneeded possible (radio can penetrate
simple shielding possible walls, furniture etc.)
Disadvantages Disadvantages
bands jin
interference by sunlight, heat
.c
specifically, a bandwidth that is much larger than the inverse of the data rate.
• Different users can be spread across the spectrum in different ways.
ul
• This allows multiple users to transmit in the same frequency band
simultaneously..
pa
• The receiver can determine which part of the total contribution comes from a
specific user by looking only at signals with a specific spreading pattern.
Types
jin
• FREQUENCY HOPPING SPREAD SPECTRUM(FHSS)
• DIRECT SEQUENCE-SPREAD SPECTRUM(DSSS)
.re
w
w
w
IEEE 802.11-WLAN
om
• Connect single MS to public landline system..
.c
• Connect fixed-location computers to internet.
• Very flexible within reception area
ul
• Ad-hoc networks do not need planning
• No wiring difficulties (e.g. historic buildings, firewalls)
pa
• More robust against disasters like, e.g., earthquakes, fire
• Coverage area upto 100m.
•
• jin
Data rate from 700kbps-55Mbps
Operating Frequency 2.4-2.5GHz
Classifications
.re
1. Infrastructure network
2. Ad-hoc network
w
w
w
Comparison: infrastructure vs. ad-hoc networks
om
infrastructure network
.c
AP: Access Point AP
ul
AP wired network AP
pa
ad-hoc network jin
.re
w
w
w
802.11 - Architecture of an infrastructure network
om
Station (STA)
802.11 LAN
802.x LAN terminal with access mechanisms
.c
to the wireless medium and radio
contact to the access point
ul
STA1 Basic Service Set (BSS)
BSS1
group of stations using the same
Portal
pa
Access radio frequency
Point Access Point
Distribution System
station integrated into the wireless
Access
ESS Point
bridge to other (wired) networks
jin
LAN and the distribution system
Portal
.re
BSS2 Distribution System
interconnection network to form
one logical network (ESS:
w
.c
executing the same MAC protocol and competing for access
ul
to the same shared wireless medium.
pa
• A BSS may be isolated or it may connect to a backbone
distribution system (DS) through an access point (AP)
jin
• The AP functions as a bridge and a relay point
.re
• In a BSS, client stations do not communicate directly with
one another.
w
w
w
om
• If one station in the BSS wants to communicate with another
.c
station in the same BSS, the MAC frame is first sent from
ul
originating station to the AP, and then from the AP to the
pa
destination station.
.c
service sets(BSS) interconnected by a distribution system.
ul
• Typically, the distribution system is a wired backbone LAN but
pa
can be any communications network
jin
.re
w
w
w
w
w
w
.re
jin
WLAN Services
pa
ul
.c
om
IEEE 802.11 –Protocol/Layered Architecture
om
.c
mobile terminal
ul
pa
jin
.re
w
w
w
IEEE 802.11LAYERS
om
1) PHY or Physical LayerEncoding –decoding , modulation-demodulation.
.c
MAC layer
ul
2) MAC Sub LayerFragmentation and reassembly of packets
pa
3) MAC Management Sub LayerRoaming,power management,Registration and
.c
1)PLCP Carrier sensing and
convert data-frame and carry mgt
ul
information.
pa
2) PMD define modulation and
coding techniques for signaling.
jin
.re
w
w
w
om
Physical media for WLANs
.c
1.1) FHSS PHY (Frequency-hopping spread spectrum)
ul
1.2) DSSS PHY (Direct sequence spread spectrum)
pa
1.3) Diffused infrared (baseband)
jin
.re
w
w
w
om
1.1) Frequency Hopping Spread Spectrum
• Two data rates for transmission at 1 and 2Mbps.
.c
• Available channel 78 with a BW of 1GHz.
• Modulation technique is GFSK.
ul
• Each BSS select one of the three patterns of 26 hops with the 3 groups..
pa
• Group1(0,3,6,….75),Group2(1,4,…76) and Group3(2,5,…77)
jin
.re
w
w
w
00111001
w
w
w
.re
jin
pa
ul
.c
om
FHSS PHY
om
• In FHSS PHY, data transmission over media is controlled by the
.c
FHSS PMD sublayer as directed by the FHSS PLCP sublayer.
ul
• Binary information bits converts them into RF signals by
pa
using carrier modulation and FHSS techniques.
om
.c
ul
pa
jin
.re
• The sync field contains a string of alternating 0s and 1s pattern
and is used by the receiver to synchronize the receiver’s
w
om
frame.
.c
• The PLCP length word (PLW) field specifies the length of the
ul
PSDU in octets and is used by the MAC layer to detect the end
pa
of a PPDU frame.
jin
• The PLCP signaling field (PSF) identifies the data rate of the
whitened PSDU ranging from 1 to 4.5 Mbps in increments of
.re
0.5 Mbps
w
w
w
• The header error check field contains the results of a
om
calculated frame check sequence from the sending station.
.c
• The FHSS PMD uses two-level Gaussian frequency shift key
ul
(GMSK) modulation to transmit the PSDU at the basic rate of
1Mbps.
pa
• Four-level GFSK is an optimal modulation scheme enables the
jin
whitened PSDU to be transmitted at a higher rate
.re
w
w
w
1.2)DSSS PHY
om
•The encoding scheme that is used is DBPSK (differential binary
phase shift keying) send 1 or 2 bits per symbol.
.c
•Total BW 2.4GHz is divided in to 11 channels with spaced by 5MHz.
ul
•DSSS communicates non overlapping pulses at the chip rate of
pa
11Mcps,which occupy 26 MHz.
jin
.re
w
w
w
DSSS Transmitter & Receiver
om
.c
ul
pa
jin
.re
w
w
w
• An 11-bit Barker code (1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) is used for
om
spreading
• In the transmitter, the 11-bit Barker code is applied to a modulo-2
.c
adder together with each of the information bits in the PPDU.
ul
• The output of the modulo-2 adder results in a signal with a data
pa
rate that is 10 times higher than the information rate. The result
in
the frequency domain is a signal that is spread over a wide
bandwidth at a reducedjin power level.
.re
• At the receiver, the DSSS signal is convolved with the same 11-bit
Barker code and correlated
w
w
w
w
w
w
.re
jin
pa
Frame Format
ul
.c
om
om
• The SYNC field is 128 bits (symbols) in length and contains a
.c
string of 1s .The receiver uses this field to acquire the
ul
incoming signal and to synchronize the receiver’s carrier
pa
tracking and timing prior to receiving the SFD
jin
• The SFD field contains information to mark the start of the
.re
PPDU frame.
w
w
w
om
• Signal Field - Specifies the data rate at which the MPDU
.c
portion of the frame is transmitted.
ul
• Length: Indicates the length of the MPDU field by specifying
pa
the number of microseconds necessary to transmit theMPDU
jin
• CRC fields are used for error checking and correction.
om
• The PMD of DFIR operates based on transmission of 250ns pulses.
• These pulses are generated by switching the transmitter LEDs on and off duration
.c
of pulse.
• Peak power of pulse is 2W and wavelength is 850nm to 950nm.
ul
• 16-PPM and 4-PPM modulation techniques at the data rate of 1and 2Mbps.
• 16-PPMblocks of 4-bits of information are coded occupy by the 16 slots of
pa
length of 16 bit sequence..
• In this 16x250ns=4000ns carries 4 bit of information that supports 1Mbps.
jin
• 4-PPM 4x250ns=1000ns carries 2 bit of information that supports 2Mbps.
.re
w
w
w
PLCP frame format for DFIR
om
.c
ul
pa
jin
.re
w
w
w
om
1.5) IEEE 802.3 Carrier Sensing
• The receiver reads the peak voltage of wire of cable and compares it
.c
against a threshold.
ul
• The PHY sensing is through the CCA signal produced by PLCP..
• The real sensing mechanism done by two methods.(detects bits in air ,
pa
checking RSS)
• Detection method is reliable than RSS because of interference..
jin
• Virtual carrier sensing based on Network Allocation Vector (NAV)
supported by the RTS/CTS and PCF mechanisms.
.re
• A length field in the MAC layer is used to specify the amount of time that
must elapse before the medium can be freed..
w
w
w
om
.c
ul
2) IEEE 802.11 MAC LAYER
pa
jin
.re
w
w
w
w
w
w
.re
jin
pa
802.11Layers
ul
.c
om
Layer 2 Functions
om
• Medium Access Control (MAC)
.c
– On transmission, assemble data into a frame with address and error
ul
detection fields.
pa
– On reception, disassemble frame, and perform address recognition and
error detection.
jin
– Govern access to the LAN transmission medium.
.re
• Logical Link Control (LLC)
– Provide an interface to higher layers and perform flow and
w
error control
w
w
om
• The lower sublayer of the MAC layer is the distributed
.c
coordination function (DCF). DCF uses a contention algorithm
ul
to provide access to all traffic.
pa
• The point coordination function (PCF) is a centralized MAC
jin
algorithm used to provide contention-free service. PCF is built
.re
on top of DCF.
w
w
w
Distributed Coordination Function (DCF)
om
• DCF uses interframe space (IFS) & CSMA
.c
• Steps
ul
1. A station with a frame to transmit senses the medium. If the medium
pa
is idle, it waits to see if the medium remains idle for a time equal to
IFS. If so, the station may transmit immediately.
2.
jin
If the medium is busy, the station defers transmission and continues
.re
to monitor the medium until the current transmission is over.
w
w
w
om
3. Once the current transmission is over, the station delays another IFS. If
.c
the medium remains idle for this period, then the station backs off a
random amount of time and again senses the medium. If the medium is
ul
still idle, the station may transmit. During the backoff time, if the medium
pa
becomes busy, the backoff timer is halted and resumes when the medium
becomes idle
4.
jin
If the transmission is unsuccessful, which is determined by the absence of
.re
an acknowledgement, then it is assumed that a collision has occurred
w
w
w
Point Coordination Function (PCF)
om
• PCF is an alternative access method implemented on top of the DCF. The
.c
operation consists of polling by the centralized polling master (point
coordinator).
ul
• The point coordinator makes use of PIFS when issuing polls.
pa
• During the first part of this interval, the point coordinator issues polls in a
jin
round-robin fashion to all stations configured for polling.
• When a poll is issued, the polled station may respond using SIFS. If the
.re
point coordinator receives a response, it issues another poll using PIFS
w
• The point coordinator then idles for the remainder of the superframe,
allowing a contention period for asynchronous access
w
w
om
MAC LAYER
.c
2.1)MAC SUB LAYER define the access mechanism and
ul
packet formats
2.2)MAC MANAGEMENT SUBLAYER Roaming support, power
pa
management, security
jin
.re
w
w
w
om
2.1) MAC Sub Layer-Accessing Mechanism
.c
• Contention methods CSMA/CA
ul
• Contention-free Access
1)RTS/CTS(avoid hidden terminal-Exposed terminal problems)
pa
2)PCF(assign a priority for packet transmission,based on polling)Time bounded
applications
jin
.re
w
w
w
2.1.1)CSMA/CA Operation-DCF
om
.c
ul
pa
• Case1Station transmit a packet immediately, by sensing the channel is free.
jin
• Case2if the channel is busy,then NAV is turned ON,By setting backoff time and
wait the DIFS period..
.re
• SIFSShort Interframe Spacinghighest priority packet such as ACK,CTS.
• PIFSPCF-IFS2nd priority,duration between SIFS-DIFS..
• DIFSDCF-IFSLowest priority and longest duration.
w
• After completion of transmission each station has to wait based on its priority..
w
om
• When AP receive a packet of data, it
.c
waits for SIFS and send ACK..
• Because SIFS<DIFS.
ul
• All other terminals must wait until
the tx of ACK to MS is completed.
pa
jin
.re
w
w
w
2.1.2)Implementation of RTS/CTS Mechanism
om
• If a channel freesend
RTS(20bytes),which carry
source,destination address and data.
.c
• Destination station reply CTS(16
ul
byte),after SIFS period.
• The source terminal send data after SIFS
pa
period.
• Finally destination reply ACK after
receiving data.
• STATION3 It hear RTS/CTS jin
communication for the entire period,by
.re
setting their NAV signal ON.
• After completion of transmission,NAV is
terminated,opening the contention for
w
other users.
w
STATION 3
w
2.1.3) PCF Operation
om
.c
ul
pa
jin
• AP organizes periodical contention free period for the time bounded information.
• Data to be transmitted at the beginning of each CFP, during that period it arrange
NAV for other terminals.
.re
• Length of the PCF is occupied by CFP + DCF packets.
• If DCF packet occupies the channel,and doesnot complete before the start of the
w
next CFP.
w
w
w
w
w
.re
jin
pa
ul
MAC frame Format
.c
om
• Frame Control: Indicates the type of frame and provides control
om
information
• Duration/Connection ID: indicates the time (in microseconds) the
.c
channel will be allocated for successful transmission of a MAC
frame. In some control frames, this field contains an association,
ul
or connection identifier.
pa
• Sequence Control: Contains a 4-bit fragment number subfield
jin
usedfor fragmentation and reassembly, and a 12-bit sequence-No
.re
used to number frames sent between a given transmitter and
receiver.
w
.c
ul
pa
jin
.re
Sleep mode
w
Encryption
Power-save mode
w
w
om
• Protocol version00 ,reserved for fututre.
.c
• Type: Identifies the frame as control, management, or data.
ul
• Subtype: Further identifies the function of frame.
pa
• To DS: The MAC coordination sets this bit to 1 in a frame destined to the
distribution system.
jin
• From DS: The MAC coordination sets this bit to 1 in a frame leaving the
distribution system.
.re
• More Fragments: Set to 1 if more fragments follow this one.
w
om
• Establish a connection between stations and AP.
• It provide a accessing mechanism for mobile station
.c
ul
Functions
1. Registration
pa
2. Handoff
3. Power management
4. Security
jin
.re
w
w
w
1)Registration
om
• AP periodically send Beacon frame to MS for
timing synchronization.
.c
• It contains BSS-ID, RSS, Roaming, time
stamp.
ul
• Beacon used to identify the AP and N/W.
pa
• Association REQMS send this request to
AP.
• Association RESAP grant permission MS.
jin
.re
w
w
w
2)Handoff
om
Mobility Environment
• No Transition MS is static or moving but inside BSA.
.c
• BSS Transition MS moves from one BSS to another BSS but in same ESS.
• ESS Transition MS moves from one BSS to another BSS but in new ESS.
ul
Connection Registration
pa
• Re-Association service MS moves from one BSS to another BSS but in same
ESS.Hence MS send request to distributed system via AP.
• Diassociation service used to terminate the association, for MS when it leave
from BSS.
jin
.re
w
w
w
Handoff Procedure
om
.c
ul
pa
jin
.re
w
w
w
MS moves from AccessPoint1 to AccessPoint1
om
• Step1)Send Becon signal from APMS
.c
• Step2)MS lock AP1 who has strong RSS.
ul
• STEP 3)MS lies in border between two AP, hence it send probe signal to all
AP’s
pa
• Step4) All AP reply Probe via RSS to MS.
• Step5)MS select AP by a strongest signal
jin
• Step6)MS send reassociation req to AP3
• Step7)AP reply reassociation response to MS
.re
• Step8) Handoff message infromed to old AP1,AP2 via Inter Access Point
Protocol
w
w
w
Role of IAPP in Handoff
om
.c
ul
pa
jin
.re
w
w
w
om
3)Power Management
• When a station is idledominates
.c
LAN adaptor power consumption.
• It is important to put MS in
ul
sleeping mode , buffer the data in
AP,send to MS is awakened.
pa
• MS uses the power management
bit in the frame control field to
jin
announce its active/sleep mode.
• With every beacon TIM sent list of
.re
stations has buffered data.
• MS check the TIM and change its
mode to active.
w
.c
send ID to open system, then the response station send the result of request.
ul
2) Shared key authentication
pa
• Request Station send authentication ID using 40-bit secret code that is shared
between itself-AP.
• The second station sends a challenge text 128bytes.
jin
• The first station sends the encrypted challenged text as a response.
• The second station send the authentication results.
.re
w
w
w
om
IEEE 802.11a
• The PHY layer of IEEE 802.11a is based on OFDM transmission
.c
which operates 5GHz.
• MAC layer same as like as IEEE 802.11.
ul
• Supporting data rate Min 6Mbps -Max 54Mbps.
pa
• Use 52 sub carriers for BPSK,QPSK,16QAM modulation methods.
• Use convolution encoder (1/2,2/3,3/4) for error correction.
jin
• OFDM used to reduce the symbol rate by distributing bits over
numerous subcarriers.
.re
w
w
w
IEEE 802.11a – PHY Layer frame format
om
.c
4 1 12 1 6 16 variable 6 variable bits
ul
pa
PLCP header
om
frequency acquisition, channel estimation, and synchronization.
The duration of the preamble is 16 μs.
• signal contains the following fields and is BPSK-modulated.
.c
rate determines the data rate
ul
length indicates the number of bytes in the payload field.
tail bits are set to zero, also used to reset the encoder
pa
• data field is sent with the rate determined in the rate field .
• service field which is used to synchronize the descrambler of the
receiver jin
• payload contains the MAC PDU (1-4095 byte).
.re
• pad ensures that the number of bits in the PDU maps to an
integer number of OFDM symbols.
w
w
w
IEEE 802.11b
om
• Data ratemin 1Mbps- max 6 Mbps
.c
• Transmission range300m outdoor, 30m indoor
ul
• Frequency 2.4 GHz ISM-band
• SecurityLimited, WEP insecure, SSID
pa
• At 2.4 GHzIEEE 802.11b specify a new PHY layer called Clear
Channel Assignment (CCK) to support data rate of max 11Mbps.
jin
• It uses Walsh code with the complementary codes for M-ary
orthogonal data tx.
.re
w
w
w
om
Implementation of CCA Transmitter
.c
ul
pa
jin
•Serial data is multiplied by into 8-bit address.
•6 of 8 bits are used to select one of 64 orthogonal codes.
.re
•2-bits are directly modulated and txed.
w
w
w
om
Implementation of CCK Receiver
.c
ul
pa
jin
•The receiver comprised two parts Barker and correlator code
•By checking the PLCP data rate,the receiver knows which decoder
.re
employed for the rx packets.
w
w
w
IEEE 802.11b – PHY frame formats
om
Long PLCP PPDU format
128 16 8 8 16 16 variable bits
.c
synchronization SFD signal service length HEC payload
ul
PLCP preamble PLCP header
pa
192 µs at 1 Mbit/s DBPSK 1, 2, 5.5 or 11 Mbit/s
96 µs 2, 5.5 or 11 Mbit/s
w
w
w
w
w
.re
jin
pa
ul
.c
om
w
w
w
.re
jin
pa
ul
HIPERLAN
.c
om
om
• HIPERLAN -High Performance Radio Local Area Network
.c
• It is a European alternative for the IEEE 802.11 standards.
ul
• It is defined by the European Telecommunications Standards
pa
Institute (ETSI)
• The goal of the HiperLAN was to have data rate higher than
802.11
jin
.re
• HiperLAN/1 was planned in 1991 and implemented in
1997
w
w
w
HIPERLAN Family
om
1. HiperLAN/123Mbps
.c
2. HiperLAN/254Mbps
ul
pa
3. HiperLAN/3-
HIPERACCESS
jin
– provides up to 100 Mbps in the 40.5–43.5 GHz band
.re
4. HiperLAN/4- HIPERMAN
– designed for a WMAN in 2 GHz and 11 GHz bands (155
w
Mbps)
w
w
Hiperlan/1 features
om
.c
• Data rate 23.529Mbps.
ul
• Coverage 100m,frequency 5.2GHZ.
pa
• Supports asynchronous and synchronoustraffic
•Support power saving
jin
.re
w
w
w
HIPERLAN-1 Architecture Ad-hoc model
om
.c
ul
pa
jin
.re
w
w
w
om
• Each HIPERLAN node is either forwarder (F) or non-forwarder.
• Forwarder Node receive packet and retransmit it to the other node.
Non-forwarder Node Simply it accept a packet intended for it.
.c
•
• Each non forwarder node select at least one forwarder node as a neighbor.
ul
• Both nodes periodically update the routing database.
From Architecture
pa
• Node 1,4,6 are forwarder node, having peer-peer connections
jin
• Node 4 act as a bridge between HIPERLAN A-HIPERLAN B
.re
w
w
w
om
PHY-MAC Layer
1)PHY Layer
.c
• Bandwidth 5.15-5.35GHZ.Total channel is 5 with 40MHZ spacing
Transmission power 1W
ul
•
• GMSK modulation methods, support data rate 23Mbps.
pa
• CSMA/CA used for channel access.
2) MAC Layer
jin
• Handles encryption and power conservation.
.re
• MAC address size is 48 bits.(source, destination and neighbor hop)
w
w
w
om
Channel Access Methods
.c
ul
pa
jin
.re
w
w
w
om
• If a terminal senses the medium to be free at least 1700bit durations, it
immediately transmit.
• If the channel is busy the terminal access has three phases .
.c
• Prioritization phaseit has the highest priority. If a MS has a highest priority
survive for the next phase and others are eliminated from the contention.
ul
• Contention phaseit consists of elimination period and yield period.
pa
• elimination period Each terminal run a random number generator to select one
of the available 12 slots in which it sends continuous burst of 256bits.
• After sending burst MS listen the channel, if it doesn’t hear any other burst, then
jin
send another burst after 12 slots for survival..
• If a node hear any burst during this period,then eliminate itself.
• yield periodIf an MS senses the medium free for the entire yield period,then
.re
start the tx immediately..
w
w
w
HiperLAN--2
om
• HiperLAN/2 functional specification was accomplished Feb
.c
2000.
ul
• HiperLAN/2 uses the 5.15–5.25 GHz band and up to 54 Mbps
pa
data rate.
om
Connection between the MS
and AP is similar to WLAN.
.c
But communication between
APs are different.
ul
Access point controller
It allows handover in a subnet
pa
and IP based handover for
non homogeneous network.
It support seamless
interoperation Ethernet and
point-point connection. jin
.re
Access point
w
w
w
Protocol stack of HIPERLAN/2
om
.c
ul
pa
jin
.re
w
w
w
1) Physical layerOFDM ,52 Sub carriers(48 for data+4 sync)
om
– to provide several modulation and coding schemes
.c
according to current radio link quality and meet the
ul
requirements for different physical layer modes as defined
pa
by transport channels within DLC.
2)DLC layer
jin
– The DLC layer constitutes the logical link between an
.re
access point (AP) and mobile terminals (MTs)
w
w
w
om
The DLC layer consists of
.c
• Medium Access Control (MAC),
ul
• Error control (EC),
pa
• Radio link control (RLC),
jin
• DLC connection control (DCC),
.re
• Radio resource control (RRC) and
om
• Medium access in HIPERLAN/2 is based on the TDD/TDMA
.c
• It uses a MAC frame of 2 ms duration.
ul
• An AP provides centralized control and informs the mobile
pa
terminals at which point in time in the MAC frame they are
jin
allowed to transmit their data.
om
• Down Link Data,
.c
ul
pa
jin • Uplink Data, and
.re
• Broadcast control (BCH),
• Frame Control (FCH), • Random Access (RCH)
w
.c
network and AP identifiers, transmission power levels,
ul
and FCH and RCH length and wake-up indicator.
pa
• The FCH contains details of distribution of resources
jin
among the fields of each packet.
.re
• The ACH conveys information on previous access
attempts made in the RCH
w
w
w
om
.c
• The RCH is commonly shared among all MTs
ul
for random access and contention. If collisions
pa
occur the results from RCH access are re-
jin
ported back to the MTs in ACH
.re
w
w
w
3)Convergence layer
om
– it maps the service requirements of the higher layer to the
.c
service offered by the data link control layer
ul
– converts packets to frame and frame to packets
pa
jin
.re
w
w
w
Relation between logic-transport channels
om
.c
ul
pa
jin
.re
w
w
w
om
SBCHIt carry the information about handover,security,association and
.c
radio link control functions.
ul
DCCHConveys RLC sublayer signals between MS-AP.
pa
UDCHCarry DLC PDU for convergence layer data
om
• Comprehensive security mechanisms are seen in the
.c
HIPERLAN- 2 system compared with other wireless
ul
standards.
pa
• When contacted by an MT, the AP will respond initiating a
selected authentication and encryption procedure.
jin
• As always, there is an option not to use any authentication
.re
or encryption.
w
authentication
w
w
w
w
.re
jin
pa
ul
.c
om
w
w
w
.re
jin
ATM
pa
WIRELESS
ul
.c
om
ATM Forum Wireless ATM Working Group
compatibility to existing ATM Forum standards important and easily
om
upgrade existing ATM networks with mobility functions.
characteristics
.c
• Location management able to locate a wireless terminal or a
mobile user.
ul
• Mobile routingto route the traffic through the network to the
pa
access point currently responsible for the wireless terminal. Each
time a user moves to a new access point, the system must reroute
traffic.
jin
• Handover signalingThe network must provide mechanisms to set
up new connections between intermediate systems.
.re
• QoS and traffic controlWATM should be able to offer many QoS
parameters.
w
om
EMAS-N
WMT
.c
RAS
ul
EMAS-E
pa
M-NNI
WMT jin
RAS
EMAS-N
.re
w
LS
w
AUS
w
Wireless ATM Protocol Architecture
om
.c
ul
pa
jin
.re
w
w
w
om
Radio Access LayerTo support wireless communication,new
wireless channel specific medium access.
.c
Medium Access Controlprovide point to point link for the
higher protocol.
ul
Data link controlprovide service to ATM layer.used to control
pa
reduce channel error detection/correction
jin
Radio resource controlneeded for support of control plane
functions related to the radio access layer
.re
w
w
w
WATM components
om
• T(Terminal)-A standard ATM terminal offering ATM services defined
for fixed ATM networks
.c
• MT(Mobile Terminal)-MT can be moved between different access
ul
points within a certain domain
pa
• WT(wireless Terminal)-This terminal is accessed through a wireless
link jin
• WMT (Wireless Mobile ATM Terminal)-Combination of a wireless
.re
and a mobile terminal results in the WMT
w
radio link
w
• EMAS-E (End-user Mobility-supporting ATM Switch - Edge)-
om
Switches with the support of end user mobility
• EMAS-N (End-user Mobility-supporting ATM Switch -
Network)-A whole network can be mobile not just terminals
.c
• MS(Mobile ATM Switch)-ATM switches can also be mobile and
ul
can use wireless access to another part of ATM network
• ACT(Adhoc controller terminal)-These terminal control wireless
pa
access without aan RAS
• M-NNI (Network-to-Network Interface with Mobility support)
jin
• LS (Location Server)
• AUS (Authentication Server)
.re
w
w
w
w
w
w
.re
jin
pa
BLUETOOTH
ul
.c
om
om
Bluetooth
• Basic idea
.c
– Universal radio interface for ad-hoc wireless connectivity
ul
– Interconnecting computer and peripherals, handheld devices, PDAs,
cell phones – replacement of IrDA
pa
– Embedded in other devices, goal: 5€/device (already < 1€)
– Short range (10 m), low power consumption, license-free 2.45 GHz ISM
jin
– Voice and data transmission, approx. 1 Mbit/s gross data rate
.re
w
w
.c
ul
pa
jin 1999:
Ericsson mobile
communications AB
.re
reste denna sten till
minne av Harald
Blåtand, som fick ge
sitt namn åt en ny
w
kommunikation.
w
…and the real rune stone
om
Located in Jelling, Denmark,
erected by King Harald “Blåtand”
in memory of his parents.
.c
The stone has three sides – one side
showing a picture of Christ.
ul
pa
Inscription:
jin
"Harald king executes these sepulchral
monuments after Gorm, his father and
.re
Thyra, his mother. The Harald who won
the whole of Denmark and Norway and This could be the “original”
turned the Danes to Christianity." colors of the stone.
w
Inscription:
Btw: Blåtand means “of dark complexion” “auk tani karthi kristna” (and
w
om
• Bluetooth is the most successful WPAN technology
.c
commercially available.
ul
• It was originally conceived as a wireless alternative to
pa
RS-232 data cables
jin
• Bluetooth uses frequency-hopping spread spectrum
.re
• Frequency range from 2402 to 2480 MHz(2.4GHz)
w
om
• Collection of devices connected in an ad hoc
fashion
P
.c
S
• One unit acts as master and the others as slaves for
the lifetime of the piconet S
ul
M P
• Master determines hopping pattern, slaves have to
pa
synchronize SB S
om
• Linking of multiple co-located piconets through the sharing of
common master or slave devices
.c
– Devices can be slave in one piconet and master of another
ul
• Communication between piconets
– Devices jumping back and forth between the piconets
pa
Piconets
P (each with a
S S capacity of
S jin P
P
720 kbit/s)
.re
M
M
SB S
w
M=Master P SB SB
S=Slave
w
P=Parked S
SB=Standby
w
Bluetooth protocol stack
om
audio apps. NW apps. vCal/vCard telephony apps. mgmnt. apps.
.c
TCP/UDP OBEX
AT modem
IP
ul
commands
TCS BIN SDP
BNEP PPP Control
pa
RFCOMM (serial line interface)
Radio
w
.c
● Baseband: Description of basic connection establishment, packet
formats,timing, and basic QoS parameters
ul
pa
Link manager protocol: Link set-up and management between devices
including security functions and parameter negotiation
jin
● Logical link control and adaptation protocol (L2CAP): Adaptation
of higher layers to the baseband (connectionless and connection-
oriented services
.re
● Service discovery protocol: Device discovery in close proximity plus
w
.c
and transmit power
ul
• The baseband and link control layer enables the physical RF link
pa
between Bluetooth units forming a piconet- addressing, packet
format, timing, and power control.
jin
• It provides two different kinds of physical links
.re
1. SCO – Synchronous Connection Oriented Link
w
om
• The SCO link is symmetric and typically supports time-bounded
.c
voice traffic.
ul
• The master maintains the SCO link by using reserved slots
pa
• Once the connection is established, both master and slave units
jin
may send SCO packet continuously.
.re
• A fixed bandwidth is allocated for a point-to-point connection.
w
om
.c
payload (30)
ul
HV1 audio (10) FEC (20)
pa
HV2 audio (20) FEC (10)
(bytes)
w
w
w
ACL link
om
• The ACL link is packet oriented and supports both symmetric
.c
and asymmetric traffic.
ul
• The master unit controls the link bandwidth and decides how
pa
much piconet bandwidth is given to each slave and the
jin
symmetry of the traffic.
.re
• Slaves must be polled before they can transmit data.
• The ACL link also supports broadcast messages from the master
w
om
payload (0-343)
.c
header (1/2) payload (0-339) CRC (2)
ul
DM1 header (1) payload (0-17) 2/3 FEC CRC (2)
pa
DH1 header (1) payload (0-27) CRC (2) (bytes)
payload (0-183)
2/3 FEC CRC (2)
CRC (2)
.re
DM5 header (2) payload (0-224) 2/3 FEC CRC (2)
w
om
standby unconnected
.c
ul
detach inquiry page connecting
pa
transmit connected active
AMA AMA
park
jin
hold sniff
.re
low power
PMA AMA AMA
w
Page: connect to a specific device Hold: stop ACL, SCO still possible, possibly
Connected: participate in a piconet participate in another piconet
w
om
L2CAP - Logical Link Control and
Adaptation Protocol
.c
• Simple data link protocol on top of baseband
ul
• Connection oriented, connectionless, and signaling channels
pa
• Protocol multiplexing
– RFCOMM, SDP, telephony control
• Group abstraction
– Create/close group, add/remove member
w
L2CAP logical channels
om
.c
ul
Slave Master Slave
pa
L2CAP L2CAP L2CAP
2 d 1 1 d d d d 1 1 d d 2
baseband baseband baseband
jin
.re
signalling ACL connectionless connection-oriented
w
w
w
L2CAP packet formats
om
Connectionless PDU
2 2 ≥2 0-65533 bytes
length CID=2 PSM payload
.c
ul
Connection-oriented PDU
2 2 0-65535 bytes
pa
length CID payload
1 1 2 ≥0
w
om
User input
PIN (1-16 byte) (initialization)
Pairing PIN (1-16 byte)
.c
Authentication key
E2 E2
generation
ul
(possibly permanent
link key (128 bit) storage)
Authentication link key (128 bit)
pa
Encryption key
E3 E3
generation
Cipher data
Data Data
w
om
SDP – Service Discovery Protocol
.c
• Inquiry/response protocol for discovering services
ul
– Searching for and browsing services in radio proximity
– Adapted to the highly dynamic environment
pa
– Can be complemented by others like SLP, Jini, Salutation, …
– Defines discovery only, not the usage of services
Caching of discovered services
–
– jin
Gradual discovery
.re
• Service record format
– Information about services provided by attributes
w
(UUID)
w
w
w
w
.re
jin
WiMAX
pa
ul
.c
om
WIMAX/IEEE802.16
om
Introduction
.c
• Worldwide Interoperability for Microwave Access (WiMAX) is a wireless
communications standard for Metropolitan Area Networks..
ul
• Networks covering whole cities or even whole countries.
pa
• It is a IEEE 802.16d.. originally intended for data communications.
• For voice communication( is enabled by Voice over Internet Protocol (VoIP)).
• The modulation format MIMO/OFDM/OFDMA…
jin
• This uses licensed worldwide spectrum 2.3 GHz, 2.5GHz, 3.3 GHz, and 3.5 GHz
frequency bands
.re
w
w
w
w
w
w
.re
jin
pa
ul
.c
om
om
1. Fixed WIMAX (IEEE 802.16d — 2004)
.c
2. Mobile WIMAX (IEEE 802.16e — 2005)
ul
pa
• Fixed WiMAX is a point-to- multipoint technology,
jin
where the base station is fixed.
• Mobile WiMAX is a multipoint-to-multipoint
.re
technology.
w
w
w
om
.c
ul
pa
jin
.re
• It supports communication between subscriber stations with
w
om
• The 802.16 PHY supports TDD and full and half duplex
.c
FDD operations.
ul
• PHY features include adaptive modulation and coding (AMC),
pa
hybrid automatic repeat request (HARQ) and fast channel
feedback to enhance coverage and capacity of WiMAX in
jin
mobile applications.
.re
• WiMAX provides signaling to allow fully asynchronous
operation.
w
system
w
MAC layer overview
om
• The MAC layer consists (i) the MAC Convergence Sublayer (CS), (ii) the MAC
Common Part Sublayer, and (iii) the MAC Security Sublayer.
.c
1) Convergence Sublayer receives data packets from higher layers and modify the
suitable format for sending via air medium by suppressing redundant information in
ul
their headers..
2) Common Part Sublayerprovides the essential support functions for the over the-
pa
air transmission of the information.
• It includes such functions as signaling,modulation/coding scheme, feedback and
bandwidth allocation.
jin
• It also provides fragmentation and packing…
3) Security Sublayer assign service flow identifier (ID), Connection Identifier (CID),
.re
provisioned QoS parameters and the authorization module.
w
w
w
om
• The station’s concurrent transmission and reception is
possible through time division duplex (TDD) and frequency
.c
division duplex (FDD).
ul
• In TDD, a station transmits then receives (or vice versa) but
pa
not at the same time.
jin
• In FDD, a station transmits and receives simultaneously on
different channels.
.re
w
w
w
om
• The 802.16 MAC protocol is connection-oriented and
performs link adaptation and ARQ functions to maintain
.c
target bit error rate while maximizing the data throughput
ul
• It supports different transport technologies such as IPv4, IPv6,
pa
Ethernet, and ATM.
jin
.re
w
w
w
om
Wi-MAX Network Structure
.c
ul
pa
jin
.re
w
w
w
om
• A main goal of this architecture is to separate the over-the-air access (the Access
Service Network (ASN) from the Internet access (Connectivity Service Network
(CSN).
• The ASN provides the over-the-air connectivity corresponding to the PHY and
.c
MAC layer as defined in the IEEE 802.16 (scheduling and resource management)
• It discovers which networks are available and connects the user to the preferred
ul
(permissible) CSN..
• Each BS is connected to an ASN Gateway,which has somewhat similar functionality
pa
as the BS controller in GSM..
• During network discovery, the Mobile Station (MS) discovers both the access
jin
service provider and the available Network Service Provider (NSP).
• The situation is similar to WiFi ,where an access point just provides a wireless link
that can be seen as a “cable replacement” for a wired Internet connection..
.re
• Getting access and making payments to the Internet service provider is
independent of this operation.
w
w
w
w
w
w
.re
jin
pa
ul
.c
om
om
.c
ul
pa
Introduction - Mobile IP: IP packet delivery, Agent
jin
discovery, tunneling and encapsulation, IPV6-Network layer
in the internet- Mobile IP session initiation protocol -
.re
mobile ad-hoc network: Routing: Destination Sequence
distance vector, IoT: CoAP
w
w
w
Motivation for Mobile IP
om
Mobile IPis a protocol used to allow internetwork mobility for wireless node
without changing their IP address.
.c
ul
Routing
based on IP destination address,
pa
network prefix (e.g. 129.13.42) determines physical subnet
change of physical subnet => change of IP address to have a topological
correct address (standard IP)
jin
Solution: Temporarily change routing table entries for mobile host
Problem: does not scale if many mobile hosts or frequent location changes
.re
Solution: Change mobile host IP-address
adjust the host IP address depending on the current location
DNS updates take to long time
w
om
Transparency
mobile end-systems keep IP address
.c
Continuous service after link interruption
ul
point of connection to the fixed network can be changed
Compatibility
pa
No changes to current hosts, OS, routers
mobile end-systems can communicate with fixed systems
Security
jin
authentication of all registration messages
Efficiency and scalability
.re
only few additional messages to mobile system (low bandwidth)
Global support for large number of mobile systems
w
w
w
Entities and Terminology
om
Mobile Node (MN)
Laptop, PDA, etc.. that may move about
.c
Home Agent (HA)
Router in home network of the MN, helps in forwarding
ul
registers current MN location, tunnels IP datagrams to COA
Foreign Agent (FA)
pa
Router in current foreign network of MN
forwards tunneled datagrams to the MN
om
HA
.c
MN
ul
router
pa
home network mobile end-system
Internet
(physical home network
FA
for the MN)
network
router
jin foreign
.re
(current physical network
for the MN)
CN
w
end-system router
w
w
Overview of Packet Delivery (Mobile Node)
om
COA
.c
FA
network HA
foreign
Internet
ul
network
pa
CN router
3.
home
network
foreign
HA
router2.
jin
Internet
FA
router
4.
MN
.re
network
1.
CN router
w
2
w
w
Packet Routing Procedure
om
1. Sender sends to the IP address of MN, HA intercepts packet
2. HA tunnels packet to COA by encapsulation
.c
3. FA forwards the packet to MN
4. Reverse: Sender sends to IP address of receiver, FA is default router
ul
pa
jin
.re
w
w
w
om
Packet Routing Process
1. Agent Discovery(agent advertisement, agent solicitation)
.c
2. Registration
ul
3. Tunneling and Encapsulation
pa
4. Routing Optimization
jin
.re
w
w
w
1.1)Agent Advertisement
om
• HA and FA advertise their presence periodically using AA
messages.
.c
• These advertisement messages(ICMP) is a beacon broadcast into
the subnet.
ul
Characteristics of agent
pa
1. Bit H and F denotes whether agent offers services on the link
2. Bit Mand G specify the method of encapsulation
3. Mmin;GGeneric jin
4. Brepresents agent busy
.re
5. Treverse tunneling
w
w
w
Agent Advertisement-message
om
.c
ul
pa
jin
.re
w
w
w
om
1.2)Agent Solicitation(AS)
• If no agent advertisements are present then the MN send AS.
.c
• MN can send out a max of 3 solicitations,1per second.
ul
• Move detection using life time when MN fails to an
advertisement from FN with the specified lifetime.Hence HA
pa
wait for AA or send AS
jin
.re
w
w
w
om
2)Registration
• To inform the current location of MN to HA.
.c
Registration process
ul
• Get a COA from FA
pa
• Inform its HA of its current COA
• Renew registration with FA.
jin
• De-register when it back to Home
.re
w
w
w
Registration Request Registration Reply
om
MN FA HA MN HA
.c
ul
pa
t
jin
.re
t
w
w
w
Registration Request message
om
.c
ul
pa
jin
Registration Reply message
.re
w
w
w
• Type set to 1 for a registration request
om
• Lifetime denotes the validity of the registration in seconds.
• B bitindicates broadcast packets which have been received by
.c
the HA in the home network.
• D bit indicates this behavior of MN
ul
• M and G denote the use of minimal encapsulation or generic
pa
routing encapsulation
• Tindicates reverse tunneling, r and x are set to zero.
jin
• home address is the fixed IP address of the MN
• home agent is the IP address of the HA
.re
• COA represents the tunnel endpoint. The 64 bit identification is
generated by the MN to identify a request and match it with
registration replies.
w
om
• Tunneling establishes a virtual pipe for data packets between a tunnel entry
and a tunnel endpoint.
.c
• Encapsulationis the mechanism of taking a packet consisting of packet
header and data and putting it into the data part of a new packet.
ul
• Decapsulation The reverse operation, taking a packet out of the data part of
another packet.
pa
Encapsulation methods
1. IP-in-IP encapsulation
2. Minimal encapsulation
jin
.re
3. Generic routing encapsulation
w
w
w
3.1) IP-in-IP encapsulation
om
•Tunnel between HA and COA
• HA takes the original packet with the MN as destination, puts it into the
.c
data part of a new packet and sets the new IP header.
•Then the packet is routed to the COA. The new header is also called the
ul
outer header.
•Inner header which can be identical to the original header
pa
jin
.re
w
w
w
om
Outer Header
.c
ul
Inner Header
pa
Ver is 4 for IP version
jin
.re
•
• Internet header length (IHL)denotes the length of the outer header (32 bit)
• TTL must be high(the packet can reach the tunnel endpoint)
w
om
• It avoids duplication of identical fields and is an optional encapsulation
method for mobile IP.
• The inner header is different.
.c
• The tunnel entry point and endpoint are specified.
• The type of the following protocol and the address of the MN are needed.
ul
• If the S bit is 1, the original sender address of the CN is included
pa
jin
.re
Inner Header
w
w
w
3.3) Generic Routing Encapsulation(GRE)
om
• IP-in-IP encapsulation and minimal encapsulation work only for IP.
• GRE supports other network layer protocols in addition to IP.
• It allows the encapsulation of packets of one protocol suite into the payload
.c
portion of a packet of another protocol suite.
ul
• The packet of one protocol suite with the original packet header and data is
taken and a new GRE header is prepended.
pa
• Together this forms the new data part of the new packet.
• Finally, the header of the second protocol suite is put in front.
jin
.re
w
w
w
w
w
w
.re
jin
pa
ul
.c
om
• GRE header uses only 4 bytes.
om
• C bit indicates if the checksum field is present and contains
valid information.
• R bit indicates if the offset and routing fields are present and
.c
contain valid information.
• Checksum field is valid only if C is set
ul
• Offset field is valid only if R is set
pa
• Key field which may be used for authentication. If this field is
present, the K bit is set.
jin
• Sequence number bit S indicates if the sequence number field is
present, if the s bit is set
.re
• Recursion control field (rec.) is an important field that
additionally distinguishes GRE from IP-in-IP and minimal
encapsulation
w
om
• Triangular Routing
sender sends all packets via HA to MN
.c
Triangular routes longer, higher latency and network load
• “Route optimization”
ul
CN learn the current location of MN via HA
forward its pkts directly without HA.
pa
• CN create routing table which has info about MN.(location)
Mobile IP protocol needs 4 messages
jin
• Binding RequestCN send binding request about the Current location of
MN to HA.
.re
• Binding updateIt contains MN-IP address + COA
• Binding AckCN reply to HA
• Binding warningafter decapsulating pkt,if MN is not current location of
w
3
w
w
w
.re
jin
pa
ul
.c
om
• Case(1)Routing (Directly)
om
• CN send request to HA about the current location of MN
• HAsend update msg about MN to CN
• CNsend ACK to HA
.c
• CNSend data directly to FA old,forward data to MN.
ul
• Case(2)Routing (Handover)
• MN changes its location and register under new FA.
pa
• FA(new)informs FA old about the new registration of MN by sending
update.
jin
• FA(old)reply ACK to FA new
• CNDoesn’t know about the new location,still it send data to FA(old).
• FA(old)forward the data to FA (new) and send warning msg to CN.
.re
• Case(3)Routing
CN send request to HA about the New location of MN
w
•
• HAsend update msg about MN to CN
w
• CNsend ACK to HA
• CNSend data directly to FA new,forward data to MN.
w
Reverse Tunneling
om
• MN can directly send its packets to the CN.
• MN can request a reverse tunnel between its FA and its HA.
.c
ul
pa
jin
.re
w
w
w
w
w
w
.re
jinIPv6
pa
ul
.c
om
Problems with mobile IP
om
Security
FA typically belongs to another organization
.c
authentication with FA problematic
patent and export restrictions
ul
Firewalls
pa
Firewalls filter based on IP addresses
FA encapsulates packets from MN
Home firewalls rejects packet from MN (unless reverse tunneling)
jin
MN can no longer send packets back to home network QoS, etc..
.re
w
w
w
IPV6 Introduction
om
• IPv6 is the next generation network protocol to restore the
current IP and simplifies the protocol.
.c
• COA can be assigned via auto-configuration (DHCPv6 is one
candidate) by every node
ul
• MN can signal a sender directly the COA, without HA
• MN sends the new COA to its old router
pa
• old router encapsulates all packets for MN, forwards them to
new COA
jin
• authentication is always granted
• IP address size is 128bits
.re
• IPSEC provide solid security for communication
• Checksum field is not available
w
w
w
IPv6 Header format
om
.c
ul
pa
jin
Traffic class Assign priority for packets by associating different delivery
.re
Flow Label source node assign label to set of pkts belonging same flow.
Next Header identifies the type of header immediately after IPv6 pkt
header.
w
om
• Mobile IP exhibits several problems regarding the duration of
handover and the scalability of the registration procedure. ( large
.c
number of mobile devices changing)
IP Micro-mobility support:
ul
• Efficient local handover inside foreign domain without involving a
HA.
pa
• Reduces control traffic on backbone
• Especially needed for route optimization
Example approaches:
jin
.re
1. Cellular IP
2. HAWAII
w
om
• It provides local handovers without renewed registration by installing a single
cellular IP gateway (CIPGW) for each domain.
.c
• In cellular IP domain, all nodes collect routing information from CIPGW.
• Soft handovers are achieved by allowing simultaneous forwarding of packets
ul
destined for a mobile node along multiple paths.
• A mobile node moving between adjacent cells temporarily be able to receive
pa
packets via both old and new base stations (BS)
• Cellular IP requires changes to the basic mobile IP protocol and is not
transparent to existing systems.
jin
• The foreign network’s routing tables are changed based on messages sent by
mobile nodes.
.re
• These should not be trusted blindly even if they have been authenticated. This
could be exploited by systems in the foreign network
w
w
w
1)Cellular IP
om
Operation:
.c
„CIP Nodes“ maintain routing Internet
entries (soft state) for MNs
ul
Multiple entries possible Mobile IP
Routing entries updated based
CIP Gateway
pa
on update packets sent by MN data/control
CIP Gateway: packets
Mobile IP tunnel endpoint from MN 1
jin
Initial registration processing
.re
BS BS BS
packets from
MN2 to MN 1
w
w
w
Advantages
om
• Manageability: Cellular IP is mostly self-configuring.
• Integration with firewalls.
• All control messages by MN are authenticated
.c
Disadvantages
ul
• MN can directly influence routing entries.
pa
• Multipath forwardingmay cause BW
• Efficiency: Additional network load is induced by forwarding
packets on multiple paths.
jin
• Transparency: Changes to MNs are required.
.re
w
w
w
2)HAWAII(Handoff-Aware Wireless Access
om
Internet Infrastructure)
• Keep micro-mobility support as transparent as possible for both
.c
HA and MN.
• It doesn’t replace IP but works better than IP.
ul
• Each station maintains routing cache to deal with mobility and
pa
hop-hop tx of pkts.
• It support 2types of Handover.
jin
• Page request reach all stations (multicast group)
.re
w
w
w
• step 1MN obtains a COA
om
• step 2 MN registers with the HA
MN moving to foreign domain
• step 3MN sends a registration request
to the new base station as to a FA
.c
• step 4 New BS intercepts the registration
request.
ul
• Also it sends out a handoff message, and
routers paths from the old and new BS.
pa
jin
.re
w
w
w
Advantages
om
•Security: In contrast to Cellular IP, routing changes are always
initiated by the foreign domain’s infrastructure.
•Transparency: mostly transparent to mobile nodes.
.c
ul
Disadvantages
pa
•Security: There are no provisions regarding the setup of IPSec
tunnels.
• Implementation: No private address support is possible
jin
because of co-located COAs.
.re
w
w
w
3)Hierarchical Mobile IP (HMIP)
om
• provides micro-mobility support by installing a mobility
anchor point (MAP).
.c
• MAPresponsible for a certain domain and acts as a local
ul
HA within this domain for visiting MNs.
• The MAP receives all packets on behalf of the MN, encapsulates
pa
and forwards them directly to the MN’s current address.
jin
.re
w
w
w
om
•MAP domain’s boundaries are defined by the access
routers (AR) advertising the MAP information to the
attached MNs
.c
•MNs register their RCOA with the HA using a
ul
binding update.
pa
new LCOA with its MAP.
om
• Security: MNs can have (limited) location privacy because
LCOAs can be hidden.
• Efficiency: Direct routing between CNs sharing the same link is
.c
possible
ul
Disadvantages
• Transparency: Additional infrastructure component (MAP).
pa
• Security: Routing tables are changed based on messages sent by
mobile nodes. This requires strong authentication and
jin
protection against denial of service attacks. Additional security
functions might be necessary in MAPs
.re
w
w
w
om
.c
Dynamic Host Configuration
ul
Protocol(DHCP)
pa
jin
.re
w
w
w
Dynamic Host Configuration Protocol(DHCP)
om
• used to simplify the installation and maintenance of networked computers.
• Capability to automatically allocate reusable network address
.c
• supplies systems with all necessary information, such as IP address, DNS
server address, domain name, subnet mask, default router etc
ul
• enables automatic integration of systems into an Intranet or the Internet, can
be used to acquire a COA for Mobile IP
pa
Basic configuration in DHCP
jin
.re
w
om
1 2
i
.c
ul
pa
ii
iii
jin
.re
iv
w
v
w
w
• Step(i) DHCP Discover client broadcasts a DHCPDISCOVER into the
subnet.(asking IP address)
om
• Step(ii) DHCP Offer Two servers receive the broadcast and checking of
available IP addresses and choosing one for the client.
.c
Servers reply to the client’s request with DHCPOFFER by a list of
configuration parameters.
ul
• Step(iii) DHCP Request client choose one of the configurations offered by
pa
servers.
• client reply( accepting one server/rejecting the others)
jin
• Step(iv) DHCP Ack server-2 with the configuration accepted by the client
confirms the configuration with DHCPACK.
.re
• This completes the initialization phase.
w
pa
jin
.re
w
w
w
Mobile IP Session Initiation Protocol(SIP)
om
• It is an application layer protocol for creating, modifying and
terminating sessions with one or more participants.
.c
• Sessions may be text,voice,video,internet telephony and
multimedia
ul
• Communication may be unicast or multicast.
pa
• It provides a mechanism for call management
• It is a very simple protocol has limited set of commands can read.
jin
.re
w
w
w
w
w
w
.re
jin
pa
SIP Entities
ul
.c
om
SIP Entities
om
• User AgentIt is an applicants contains both user agent
client(UAC) and user agent server(UAS)
.c
• User Agent ServerIt will response(accept,reject,reidrect) to UA
ul
after receiving SIP request.
• Proxy Serverit act as both client and server.It accept request
pa
from other clients either responding or forward them to server.
• Redirect serverIt accept request from clients and returns 0. It
jin
doesn’t initiate any request or call.
• Registration serveraccept reg request from UA.
.re
w
w
w
SIP Request-Response
om
.c
ul
pa
jin
.re
w
w
w
SIP Request-Response
om
• INVITEInitiate session between 2 participants
.c
• BYETerminate the connection
ul
• CANCELcancel the pending actions
pa
• OPTIONSqueries the server
• 4xxclient error
w
• 5xxserver error
w
om
Mobile Ad-hoc Networks(MANET)
.c
ul
pa
jin
.re
w
w
w
MANET-Introduction
om
.c
• Infrastructure-less dynamic multihop network
ul
• It does not have a definite Topology.
pa
• No central router required. Each node will act as a router
itself.
jin
• Data takes multiple hops before reaching destination.
.re
• each node communicates with other nodes directly or
w
ul
.c
om
om
• MANETs are basically peer-to-peer wireless networks in
which information packets are transmitted in a store-and-
.c
forward manner from a source to an arbitrary destination, via
ul
intermediate nodes
pa
• The network topology keeps changing when devices join or
jin
leave the network.
.re
w
w
w
Characteristics of MANETs
om
• Dynamic topologies: Network topology may
change dynamically as the nodes are free to
.c
move.
• Bandwidth-constrained, variable capacity links:
ul
Realized throughput of wireless communication
pa
is less than the radio’s maximum transmission
rate. Collision occurs frequently.
jin
• Energy-constrained operation: Some nodes in
the ad hoc network may rely on batteries or
.re
other exhaustible means for their energy.
• Limited physical security: More prone to
w
networks.
w
Applications
om
1. Defense applications:
.c
– MANETs can be formed among soldiers on the ground or fighter
ul
planes in the air, while sensors can be deployed to monitor
pa
activities in the area of interest
2. Crisis-management applications:
jin
–These arise as a result of natural disasters in which the entire
communication infrastructure is in disarray.
.re
– Restoring communications quickly is essential
w
w
w
om
3)Tele-medicine: Conference assistance from a surgeon for an
emergency intervention.
.c
4)Tele-Geo processing: Queries regarding location
ul
information of the users.
pa
jin
.re
w
w
w
5. Vehicular area network:
om
– This is a growing and very useful application of ad hoc
network in providing emergency services and other
.c
information
ul
6. Virtual navigation:
pa
– A remote database contains the graphical
representation of streets, buildings, etc of places.
jin
– Blocks of this database are transmitted in rapid
.re
sequence to a vehicle, where a rendering program
permits the occupants to visualize the needed
environment ahead of time
w
w
w
Routing
om
.c
• Routing in a MANET depends on many factors, including
ul
modeling of the topology, selection of routers, initiation of a
pa
route request, and specific underlying characteristics that
could serve as heuristics in finding the path efficiently.
jin
• Routing is facilitated by routing tables, which has the list of
.re
most appropriate neighbor for any given packet destination
w
w
w
Example Ad-hoc network
om
.c
ul
pa
Time t1
•
•
jin
Five nodes, N1 to N5, are connected
In this N4 can receive N1 over a good link, but N1 receives N4 only via a weak link.
.re
• N1 cannot receive N2 at all, N2 receives a signal from N1.
• This situation can change quite fast at t2.
Time t2
w
• N4 receives N1 only via a weak link. But now N1 has an asymmetric but bi-directional
link to N2 that did not exist before.
w
Requirement of routing protocol
om
1. Provide the maximum possible reliability by selecting
.c
alternative routes if a node connectivity fails.
ul
2. Route network traffic through the path with least cost by
pa
minimizing the actual length between the source and
destination through use of the lowest number of
jin
intermediate nodes.
.re
3. Give the nodes the best possible response time and
w
om
The existing routing protocols can be classified as,
.c
– Proactive: when a packet needs to be forwarded,
ul
the route is already known.
pa
– Reactive: Determine a route only when there is data
to send.
jin
.re
w
w
w
Routing Classification
om
1. Proactive or table-driven routing protocols
.c
1.1 Destination-Sequenced Distance-Vector Routing-DSDV
ul
1.2 Cluster Head Gateway Switch Routing-CGSR
pa
2. Reactive or on-demand routing protocols.
jin
2.1 Ad Hoc On-Demand Distance Vector Routing-AODV
.re
2.2 Dynamic Source Routing-DSR
2.3 Temporarily Ordered Routing Algorithm-TORA
w
om
• Table-driven routing protocols maintain up-to-date routing
.c
information from each node to every other node in the
ul
network.
pa
• The routing information is kept in different routing tables.
jin
• These tables were updated regularly with respect to the
.re
changes in network topology
immediately used.
1.1)Destination-Sequenced Distance Vector
om
Routing-DSDV
.c
• Each mobile node maintains a routing table with a route to
ul
every possible destination in the network and the number of
pa
hops to the destination
• Each such entry in the table is marked with a sequence
jin
number assigned by the destination node.
.re
• The sequence numbers allow the mobile node to distinguish
stale routes from new ones, and help avoid formation of
w
routing loops
w
w
w
w
w
.re
jin
pa
ul
.c
om
om
• A new route broadcast contains:
.c
– The destination address.
ul
– The number of hops required to reach the destination
pa
– The sequence number of the information received about
jin
the destination and a new sequence number unique to
the broadcast
.re
w
w
w
om
• If multiple routes are available for the same destination the
route with the smaller hops is used.
.c
• Any updates in the routing tables are periodically broadcast
in the network to maintain table consistency
ul
The amount of traffic generated by these updates can be
pa
•
huge
•
jin
To alleviate this problem, the updates are made through two
types of packets (a) Full Dump (b) Incremental dump
.re
• A full dump packet carries all the available routing
information and can require multiple network protocol data
w
units (NPDUs).
w
w
om
• When there is only occasional movement, smaller
incremental packets are used to relay only the change in
.c
information since the last full dump.
ul
• The incremental packets fit into a standard NPDU and
pa
hence decrease the amount of traffic generated.
jin
• The nodes maintain a separate table in which they
.re
maintain all the information sent in the incremental
routing information packets
w
w
w
2)On-demand routing protocols.
om
.c
• This maintains information only for active routes
ul
• Only when a node requires a route to a destination, a route
pa
discovery process is initiated
om
The protocol consists of two major phases: Route Discovery,
.c
Route Maintenance.
ul
When a mobile node has a packet to send to some
destination, it first consults its route cache to check whether
pa
it has a route to that destination.
If it is an un-expired route, it will use this route.
jin
If the node does not have a route, it initiates route
discovery by broadcasting a Route Request packet.
.re
This Route Request contains the address of the destination,
along with the source address.
w
w
w
Dynamic Source Request (Cont’d)
om
Each node receiving the packet checks to see whether it has
.c
a route to the destination. If it does not, it adds its own
ul
address to the route record of the packet and forwards it.
A route reply is generated when the request reaches either
pa
the destination itself or an intermediate node that contains
in its route cache an un-expired route to that destination.
jin
If the node generating the route reply is the destination, it
places the route record contained in the route request into
.re
the route reply.
w
w
w
om
Dynamic source routing (DSR)
.c
• Reactive routing protocol
ul
• 2 phases, operating both on demand:
pa
– Route discovery
• Used only when source S attempts to to send a packet to destination D
jin
• Based on flooding of Route Requests (RREQ)
– Route maintenance
.re
• makes S able to detect, while using a source route to D, if it can no longer
use its route (because a link along that route no longer works)
w
w
w
DSR: Route discovery (1)
om
.c
K
ul
F H
Q A
pa
S E G D P
jin J
.re
B M
R
I
L
w
C
N
w
w
DSR: Route discovery (2)
om
.c
K
ul
F H
Q A
pa
S E G D P
(S)
jin J
.re
B M
R
I
L
w
C
N
w
w
DSR: Route discovery (3)
om
.c
(S,A) K
ul
F H
Q A
pa
(S,E)
S E G D P
jin J
.re
B M
R
I
L
w
C
N
w
w
DSR: Route discovery (4)
om
.c
K
ul
F H
Q A
pa
E (S,E,G) P
S G D
jin J
.re
B M
R
I
L
w
C
(S,B,C) N
w
w
DSR: Route discovery (5)
om
.c
(S,A,F,H)
K
ul
F H
Q A
pa
E (S,E,G,J) P
S G D
jin J
.re
B M
R
I
L
w
C
N
w
w
DSR: Route discovery (6)
om
.c
K
ul
F H (S,A,F,H,K)
Q A
pa
S E G D P
jin J
.re
B M
R
I
L
w
C
N
w
w
DSR: Route discovery (7)
om
.c
K
ul
F H
Q A
pa
S E G D P
jin J (S,A,F,H,K,P)
.re
B M
R
I
L
w
C
N
w
w
DSR: Route discovery (8)
om
.c
K
ul
F H
Q A
pa
S E G D P
jin J RREP(S,E,G,J,D)
.re
B M
R
I
L
w
C
N
w
w
om
DSR: Route Discovery (9)
.c
• Route reply by reversing the route (as illustrated)
ul
works only if all the links along the route are
pa
bidirectional
• If unidirectional links are allowed, then RREP may
jin
need a route discovery from D to S
.re
• Note: IEEE 802.11 assumes that links are
bidirectional
w
w
w
DSR: Data delivery
om
.c
K
ul
F H
Q A
pa
DATA(S,E,G,J,D)
S E G D P
jin J
.re
B M
R
I
L
w
C
N
w
w
DSR: Route maintenance (1)
om
.c
K
ul
F H
Q A
pa
DATA(S,E,G,J,D)
E P
X
S G D
jin J
.re
B M
R
I
L
w
C
N
w
w
DSR: Route maintenance (2)
om
.c
K
ul
F H
Q A
pa
RERR(G-J)
E P
X
S G D
jin J
.re
B M
R
I
L
w
C
N
w
pa
PROTOCOL(TCP)
jin
.re
w
w
w
Traditional TCP
om
• Guarantees or Reliable message delivery
.c
• It support connection oriented data/voice services
• Delivers messages in the same order they were sent
ul
• Delivers at most one copy of each message
• Supports arbitrarily large messages
pa
• Supports synchronization between the sender and the receiver
• It provide end to end flow control mechanism.
•
• jin
It incorporates congestion control mechanism
It uses sliding window mechanism for data transmission
.re
w
w
w
Flow control VS Congestion control
om
• Flow control involves preventing senders from
.c
overrunning the capacity of the receivers
ul
• Congestion control involves preventing too much
data from being injected into the network, thereby
pa
causing switches or links to become overloaded
jin
.re
w
w
w
w
w
w
.re
jin
pa
TCP Header
ul
.c
om
TCP Header
om
• The SrcPort and DstPort fields identify the source and destination ports,
respectively.
• SequenceNum field contains the sequence number for the first byte of data
.c
carried in that segment.
ul
• The 6-bit Flags field is used to relay control information between TCP peers.
• The possible flags include SYN, FIN, RESET, PUSH, URG, and ACK.
pa
• The SYN and FIN flags are used when establishing and terminating a TCP
connection, respectively.
• The ACK flag is set any time the Acknowledgment field is valid, implying that
jin
the receiver should pay attention to it.
• The URG flag signifies that this segment contains urgent data.
.re
• The PUSH flag signifies that the sender invoked the push operation, which
indicates to the receiving side of TCP that it should notify the receiving
process of this fact.
w
• Finally, the RESET flag signifies that the receiver has become confused
w
w
Connection Establishment/Termination in TCP
om
.c
ul
pa
jin
.re
w
.c
Controlling mechanism
ul
• Additive Increase Multiplicative Decrease
pa
• Slow start or exponential start
• Fast Retransmit/Recovery
jin
.re
w
w
w
1) Additive Increase Multiplicative Decrease
om
.c
CWND=1
ACK
ul
segment
CWND=1+1
pa
CWND=1+1+1
CWND=1+1+1+1
jin
.re
w
w
At start CWND=1
New Congestion Window(CWND) = CWND+1
w
om
Additive Increase Multiplicative Decrease
– TCP does not wait for an entire window’s worth of ACKs to add 1
packet’s worth to the congestion window, but instead increments
.c
Congestion Window by a little for each ACK that arrives.
– Specifically, the congestion window is incremented as follows each
ul
time an ACK arrives:
pa
• Increment = MSS × (MSS/Congestion Window)
• Congestion Window+= Increment
• That is, rather than incrementing Congestion Window by an entire MSS
jin
bytes each RTT, we increment it by a fraction of MSS every time an ACK is
received.
.re
• Assuming that each ACK acknowledges the receipt of MSS bytes, then that
fraction is MSS/Congestion Window.
w
w
w
om
2)Slow start or exponential start
• Slow start effectively increases the congestion window
.c
exponentially, rather than linearly.
ul
• source starts out by setting Congestion Window to one packet.
• When the ACK for this packet arrives, TCP adds 1 to Congestion
pa
Window and then sends two packets.
• Upon receiving the corresponding two ACKs, TCP increments
jin
Congestion Window by 2—one for each ACK—and next sends
four packets.
.re
• The end result is that TCP effectively doubles the number of
packets it has in transit every RTT.
w
w
w
om
TCP Congestion Control-Mechanism
.c
20 ACK
• Slow Start
ul
segment
21
pa
22
jin
.re
23
w
w
At start CWND=1
Congestion Window(CWND) = 2n
w
om
• Slow Start
– There are actually two different situations in which
slow start runs.
.c
• The first is at the very beginning of a connection, at which time
ul
the source has no idea how many packets it is going to be able to
have in transit at a given time.
pa
• In this situation, slow start continues to double Congestion
Window each RTT until there is a loss, at which time a
timeout causes multiplicative decrease to divide Congestion
jin
Window by 2.
• The second situation in which slow start is used is a bit more
.re
subtle; it occurs when the connection goes dead while
waiting for a timeout to occur.
w
w
w
om
2)Fast Retransmit and Fast Recovery
.c
– Every time a data packet arrives at the receiving side, the receiver responds
ul
with an acknowledgment.
– when a packet arrives out of order TCP resends the same acknowledgment
pa
it sent the last time.
– This second transmission of the same acknowledgment is called a
duplicate ACK.
jin
– When the sender sees a duplicate ACK, it knows that the other side must
have received a packet out of order, which suggests the earlier packet
might have been lost or delayed
.re
– TCP waits until it has seen three duplicate ACKs before retransmitting the
missing packet
w
w
w
om
Fast Recovery
.c
– When the fast retransmit mechanism signals congestion,
rather than drop the congestion window all the way back to
ul
one packet and run slow start, it is possible to use the ACKs
that are still in the pipe to clock the sending of packets.
pa
– This mechanism, which is called fast recovery, effectively
removes the slow start phase that happens between when fast
jin
retransmit detects a lost packet and additive increase begins.
.re
w
w
w
om
TCP Congestion control
.c
Multiplicative decrease
Additive Increase
ul
pa
jin
.re
Slow start
w
w
w
om
.c
ul
Classical TCP Solutions
pa
jin
.re
w
w
w
Methods
om
1. Indirect TCP
.c
2. Snooping TCP
3. Mobile TCP
ul
4. Fast Retransmit/fast recovery
pa
5. Transmission/time out freezing
6. Selective retransmission
7.
jin
Transaction –oriented TCP
.re
w
w
w
1)Indirect TCP (I-TCP)
om
•TCP performs poorly together with wireless links
.c
•TCP within the fixed network cannot be changed.
ul
•mobile host connected via a wireless link and an access point to the ‘wired’ internet where the
correspondent host resides
pa
CN
mobile host
jin access point
(foreign agent) „wired“ Internet
.re
w
om
• Instead of the mobile host, the access point now terminates the standard TCP
connection, acting as a proxy.
.c
• This means that the access point is now seen as the mobile host for the fixed host and
as the fixed host for the mobile host.
ul
• If the correspondent host sends a packet,the foreign agent acknowledges this packet
pa
and tries to forward the packet to the mobile host.
• If a packet is lost on the wireless link due to a transmission error, the correspondent
jin
host would not notice this. In this case, the foreign agent tries to retransmit this packet
locally to maintain reliable data transport
.re
• If the packet is lost on the wired link, the mobile hosts notice this much faster due to
the lower round trip time and can directly retransmit the packet
w
• Packet loss in the wired network is now handled by the foreign agent.
w
w
I-TCP socket and state migration after handover
om
.c
CN
ul
new
access point1
pa
socket migration
and state transfer Internet
jin
.re
old access point2
mobile host
w
w
w
• Access point acts as a proxy buffering packets for retransmission.
om
• After the handover, the old proxy must forward buffered data to
the new proxy because it has already acknowledged the data.
• After registration with the new foreign agent, this new foreign
.c
agent can inform the old one about its location to enable packet
forwarding.
ul
• The sockets of the proxy, must migrate to the new foreign agent
located in the access point.
pa
• The socket reflects the current state of the TCP connection, i.e.,
sequence number, addresses, ports etc.
jin
• No new connection may be established for the mobile host, and
the correspondent host must not see any changes in connection
.re
state.
w
w
w
om
Advantages
No changes in the fixed network necessary, no changes for the hosts
(TCP protocol) necessary, all current optimizations to TCP still work
.c
Wireless link transmission errors isolated from those in fixed network
simple to control, mobile TCP is used only for one hop between, e.g.,
ul
a foreign agent and mobile host
therefore, a very fast retransmission of packets is possible, the short
pa
delay on the mobile hop is known
Disadvantages
jin
loss of end-to-end semantics, an acknowledgement to a sender does
now not any longer mean that a receiver really got a packet, foreign
agents might crash
.re
higher latency possible due to buffering of data within the foreign
agent and forwarding to a new foreign agent
w
w
w
2)Snooping TCP I
om
„Transparent“ extension of TCP within the foreign agent
buffering of packets sent to the mobile host
.c
lost packets on the wireless link (both directions!) will be
retransmitted immediately by the mobile host or foreign agent,
ul
respectively (so called “local” retransmission)
the foreign agent therefore “snoops” the packet flow and recognizes
pa
acknowledgements in both directions, it also filters ACKs
changes of TCP only within the foreign agent
jin
local retransmission
foreign
agent
correspondent
host
.re
„wired“ Internet
mobile
host
end-to-end TCP connection
w
w
Snooping TCP II
om
Data transfer to the mobile host
FA buffers data until it receives ACK of the MH, FA detects packet
.c
loss via duplicated ACKs or time-out
fast retransmission possible, transparent for the fixed network
ul
Data transfer from the mobile host
pa
FA detects packet loss on the wireless link via sequence numbers,
FA answers directly with a NACK to the MH
MH can now retransmit data with only a very short delay
snooping TCP does not isolate the wireless link as good as I-TCP
snooping might be tough if packets are encrypted
w
w
3) Mobile TCP
om
Special handling of lengthy and/or frequent disconnections
M-TCP splits as I-TCP does
.c
unmodified TCP fixed network to supervisory host (SH)
optimized TCP SH to MH
ul
Supervisory host
no caching, no retransmission
pa
monitors all packets, if disconnection detected
set sender window size to 0
om
TCP reacts with slow-start although there is no congestion
Forced fast retransmit
.c
as soon as the mobile host has registered with a new foreign agent,
the MH sends duplicated acknowledgements on purpose
ul
this forces the fast retransmit mode at the communication partners
additionally, the TCP on the MH is forced to continue sending with
pa
the actual window size and not to go into slow -start after
registration
Advantage
jin
simple changes result in significant higher performance
Disadvantage
.re
Cooperation required between IP and TCP, no transparent
approach
w
w
w
5)Transmission/time-out freezing
om
Mobile hosts can be disconnected for a longer time
no packet exchange possible, e.g., in a tunnel, disconnection due
.c
to overloaded cells or mux. with higher priority traffic
TCP disconnects after time-out completely
ul
TCP freezing
pa
MAC layer is often able to detect interruption in advance
MAC can inform TCP layer of upcoming loss of connection
TCP stops sending, but does now not assume a congested link
jin
MAC layer signals again if reconnected
Advantage
.re
scheme is independent of data
Disadvantage
TCP on mobile host has to be changed, mechanism depends on
w
MAC layer
w
w
6)Selective retransmission
om
TCP acknowledgements are often cumulative
ACK n acknowledges correct and in-sequence receipt of packets
.c
up to n
if single packets are missing quite often a whole packet sequence
ul
beginning at the gap has to be retransmitted (go-back-n), thus
wasting bandwidth
pa
Selective retransmission as one solution
RFC2018 allows for acknowledgements of single packets, not only
acknowledgements of in-sequence packet streams without gaps
jin
sender can now retransmit only the missing packets
Advantage
.re
much higher efficiency
Disadvantage
more complex software in a receiver, more buffer needed at the
w
receiver
w
w
7)Transaction oriented TCP
om
TCP phases
connection setup, data transmission, connection release
.c
using 3-way-handshake needs 3 packets for setup and release,
respectively
ul
thus, even short messages need a minimum of 7 packets!
pa
RFC1644, T-TCP, describes a TCP version to avoid this overhead
connection setup, data transfer and connection release can be
combined
jin
thus, only 2 or 3 packets are needed
Advantage
.re
efficiency
Disadvantage
w
om
setup overhead
.c
ul
pa
jin
.re
w
w
w
om
Comparison of different approaches for a
Approach Mechanism
“mobile”Advantages
TCP loss of TCP semantics,
Disadvantages
.c
Indirect TCP splits TCP connection isolation of wireless
into two connections link, simple higher latency at
handover
ul
Snooping TCP “snoops” data and transparent for end-to- problematic with
acknowledgements, local end connection, MAC encryption, bad isolation
retransmission integration possible of wireless link
pa
M-TCP splits TCP connection, Maintains end-to-end Bad isolation of wireless
chokes sender via semantics, handles link, processing
window size long term and frequent overhead due to
fast recovery
Transmission/
roaming
jin
Fast retransmit/ avoids slow-start after
om
.c
• The following characteristics have to be considered
ul
when deploying applications over 2.5G/3G wireless
links:
pa
Data rates:
While typical data rates of today’s 2.5G systems are 10–
jin
20 kbit/s uplink and 20–50 kbit/s downlink, 3G and
future 2.5G systems will initially offer data rates
.re
around 64 kbit/s uplink and 115–384 kbit/s downlink.
Typically, data rates are asymmetric as it is expected that
users will download more data compared to
w
power
w
om
.c
Latency:
ul
• All wireless systems comprise elaborated algorithms
for error correction and protection, such as forward
pa
error correction (FEC), check summing, and
interleaving.
jin
• FEC and interleaving let the round trip time (RTT)
grow to several hundred milliseconds up to some
.re
seconds.
• The current GPRS standard specifies an average delay
w
ul
Wireless systems suffer from large delay variations or
pa
‘delay spikes’. Reasons for sudden increase in the
latency are:
jin
link outages due to temporal loss of radio coverage,
.re
blocking due to high-priority traffic, or handovers
w
w
w
om
.c
Packet loss:
ul
• Packets might be lost during handovers or due to
pa
corruption.
• Recovery at the link layer appears as jitter to the
higher layers jin
.re
w
w
w
om
The following configuration parameters to adapt TCP to
Large windows: wireless environments:
• TCP should support large enough window sizes based on the
.c
bandwidth delay product experienced in wireless systems.
• With the help of the windows scale option (RFC 1323) and
ul
larger buffer sizes this can be accomplished (typical buffer
pa
size settings of 16 Kbyte are not enough).
Limited transmit:
jin
• It is particularly useful when small amounts of data are to be
transmitted (standard for, e.g., web service requests).
.re
Large MTU:
• The larger the MTU (Maximum Transfer Unit) the faster TCP
increases the congestion window.
w
default MTU.
w
om
.c
Selective Acknowledgement (SACK):
ul
SACK (RFC 2018) allows the selective retransmission of
packets and is almost always beneficial compared to the
pa
standard cumulative scheme.
Explicit Congestion Notification (ECN):
jin
• ECN allows a receiver to inform a sender of congestion in
the network by setting the ECN-Echo flag on receiving an
.re
IP packet that has experienced congestion.
• This mechanism makes it easier to distinguish packet
w
om
• TCP connections with large windows may benefit from
more frequent RTT samples provided with timestamps
.c
by adapting quicker to changing network conditions.
ul
• With the help of timestamps higher delay spikes can be
tolerated by TCP without experiencing a spurious
pa
timeout.
• The effect of bandwidth oscillation is also reduced.
jin
No header compression:
.re
• As the TCP header compression mechanism according to RFC
1144 does not perform well in the presence of packet losses
this mechanism should not be used.
w
w
w
om
TCP over 2.5/3G wireless networks
Fine tuning today’s TCP
Learn to live with
.c
Data rates: 64 kbit/s up, 115-384 kbit/s down; asymmetry: 3-6, but also
up to 1000 (broadcast systems), periodic allocation/release of channels
ul
High latency, high jitter, packet loss
Suggestions
pa
Large (initial) sending windows, large maximum transfer unit, selective
acknowledgement, explicit congestion notification, time stamp, no
header compression
Already in use
i-mode running over FOMA
jin
.re
WAP 2.0 (“TCP with wireless profile”)
w
w
w
TCP Improvements II
om
Performance enhancing proxies (PEP, RFC 3135) Mobile system
Transport layer
.c
wireless
Local retransmissions and acknowledgements
Additionally on the application layer
ul
Content filtering, compression, picture downscaling PEP
E.g., Internet/WAP gateways
pa
Web service gateways?
.c
• The aim of IMT-2000 is to provide universal coverage enabling terminals to
ul
have seamless roaming across multiple networks.
• IMT-2000 to define radio interfaces that are applicable in different radio
pa
environments including indoor, outdoor, terrestrial, and satellite.
jin
.re
w
w
w
w
w
w
.re
jin
pa
IMT Family
ul
.c
om
Evolution to UMTS/IMT-2000 in a
GSM environment
om
.c
• Core network supports both GSM and
UMTS/IMT-2000 services, including
ul
handoff and roaming b/w the two.
The transport protocol within the new
pa
•
radio network and the core network
will be IP.
• All radio network functions are
jin
handled within the radio access
.re
w
w
w
General GSM-UMTS network architecture
om
.c
ul
pa
jin
.re
w
w
w
om
• GSM-UMTS core network (UCN)a circuit-switched MSC and a
packet-switched GRPS support node (GSN).
• UMTS terrestrial radio access network (UTRAN)
.c
• GSM base station subsystem (BSS)
ul
• The GSM-UMTS core network implements supplementary
services according to GSM principles (HLR-MSC/VLR).
pa
jin
.re
w
w
w
om
Services
• Bearers defined by QoS
.c
• Mobile station execution environment (MExE)
Telephony value-added services (TeleVAS)
ul
•
• Subscriber identity module (SIM) toolkit
pa
• Location services
• Open interfaces to mobile network functions
jin
.re
w
w
w
UMTS Network Reference Architecture
om
.c
ul
pa
jin
.re
w
w
w
UMTS — 3G reference architecture.
om
.c
ul
pa
jin
.re
w
w
w
UMTS Terrestrial Radio Access Network (UTRAN)
Architecture (1/3)
om
Uu interface
Iub interface
New Radio Access network
.c
•
needed mainly due to new radio
RNC
access technology
ul
• Core Network (CN) is based on
GSM/GPRS
pa
UE NodeB CN
• Radio Network Controller (RNC)
corresponds roughly to the Base
Station Controller (BSC) in GSM
•
the Base Station in GSM
jin
Node B corresponds roughly to
UE
NodeB
.re
Iur interface RNC
NodeB
w
UTRAN
w
w
om
UMTS Terrestrial Radio Access Network (UTRAN)
Architecture (2/3)
.c
• RNC
ul
– Owns and controls the radio resources in its domain
– Radio resource management (RRM) tasks include e.g. the following
pa
• Mapping of QoS Parameters into the air interface
• Air interface scheduling
• jin
Handover control
Outer loop power control
.re
•
• Admission Control
• Initial power and SIR setting
w
• Code allocation
Load Control
w
•
om
UMTS Terrestrial Radio Access Network (UTRAN)
Architecture (3/3)
.c
• Node B
ul
– Main function to convert the data flow between Uu and Iub interfaces
– Some RRM tasks:
pa
• Measurements
• Innerloop power control
jin
.re
w
w
w
om
• The Iu is split functionally into two logical interfaces.
• Iups connecting the packet switched domain to the access network .
.c
• Iucs connecting the circuit switched domain to the access network.
• The Iur logically connects radio network controllers (RNCs) but could be
ul
physically realized by a direct connection between RNCs or via the core
network.
pa
jin
.re
w
w
w
w
w
w
.re
jin
pa
ul
.c
om
w
w
w
.re
jin
pa
ul
.c
om
NSS Operations
om
• Two types of services are providedby GPRS:
.c
• Point-to-point (PTP)MS-MS
ul
• Point-to-multipoint (PTM)BS-MS
pa
• The GPRS standard introduces twonew nodes,
jin
• Serving GPRS Support Node (SGSN)
.re
• Gateway GPRS Support Node (GGSN)
om
• The SGSN serves the mobile and performs security
.c
and access control functions.
ul
• The SGSN is connected to the BSS via frame-
pa
relay
• The SGSN provides packet routing, mobility
jin
management, authentication, and ciphering to and
.re
from all GPRS subscribers located in the SGSN service
w
area.
w
w
Functions of GGSN
om
• Transfer within the Public Land Mobile Network (PLMN) is
supported by the GPRS support node (GGSN).
.c
ul
• The GGSN acts as a logical interface to external packet data
networks.
pa
• Within the GPRS networks, protocol data units (PDUs) are
encapsulated at the originating GSN and decapsulated at the
destination GSN.
jin
.re
w
w
w
• All GPRS user related data required by the SGSN to perform the
om
routing and data transfer functionality is stored within the
HLR.
.c
• Subscriber and equipment information is shared between GPRS
ul
and the switched functions of GSM by the use of a common
pa
HLR and coordination of data between the visitor location
register (VLR) and the GPRS support nodes of the GBS.
jin
.re
w
w
w
UMTS Terrestrial Radio Access
om
Network(UTRAN) Overview
• RNC is responsible for the use and allocation of all the radio
.c
resources of the RNS to which it belongs.
Responsibilities of RNC
ul
• Intra UTRAN soft handover
pa
• Macro diversity combining/splitting of data streams
• Frame synchronization
jin
• Radio resource allocation & management
• Outer loop power control
.re
w
w
w
UTRAN Logical Architecture
om
.c
ul
pa
jin
.re
w
Uu
w
Uu
MOBILE TERMINAL MOBILE TERMINAL
w
Node B is responsible for radio transmission and reception in one or more cells to/from the
om
•
user equipment (UE).
• Responsibilities of the Node B:
• Termination of Iub interface from RNC
.c
• Termination of MAC protocol for transport channels RACH, FACH
• Termination of MAC, RLC, and RRC protocols for transport channels BCH, PCH
ul
• Radio environment survey (BER estimate, receiving signal strength, etc.)
• power control
pa
• Radio channel coding/decoding
• Macro diversity combining/splitting of data streams from its cells (sectors)
• Termination of Uu interface from UE
•
•
jin
Error detection and correction(FEC),Mux and Demux
Modulation and spreading/demodulation and despreading of physical channels
.re
• Frequency and time (chip, bit, slot, frame) synchronization
w
w
w
om
UTRAN Logical Interfaces
.c
ul
pa
jin
.re
w
w
w
• The protocol structure contains two main layers, the radio network layer
om
(RNL) and the transport network layer (TNL).
• RNLall UTRAN-related functions are visible.
• The transport network control plane carries all control signaling within the
.c
transport layer.
• User information is carried by the user plane
ul
• It contains access link control application part (ALCAP) required to set up the
transport bearers (data bearers) for the user plane
pa
jin
.re
w
w
w
om
Interfacing types
1. lu Interface interconnects one UTRAN to the
.c
UMTS core network
ul
2. Iur Interface connection between two RNCs
pa
3. lub Interface connection between the RNC
and Node B
jin
4. Uu Interface Radio interface between a Node
.re
B and one of its UE.
w
w
w
w
w
w
.re
jin
pa
1) Iu Interface
ul
.c
om
om
• SIGNALING CONNECTION CONTROL PART (SCCP)
• MESSAGE TRANSFER PART (MTP3-B)
• SIGNALING ASYNCHRONOUS TRANSFER MODE (ATM)
.c
• SERVICE-SPECIFIC COORDINATION FUNCTION (SSCF) SERVICE-SPECIFI
C CONNECTION-ORIENTED PROTOCOL (SSCOP)
ul
pa
jin
.re
w
w
w
om
• Iu interface has three protocol planes Radio network control plane (RNCP),
Transport network control plane (TNCP), and the user plane (UP).
RNCP functions
.c
• It carries information for the general control of UTRAN radio network operations.
• It carries information for control of UTRAN in the context of each specific call.
ul
• It carries user call control (CC) and mobility management (MM) signaling
messages.
pa
TNCP functions
• carries information for the control of transport network used within UCN.
UP functions
jin
carries user voice and packet data information.(up to 64 kbps)
.re
• SSCF and SSCOP layers are specifically designed for signaling transport in ATM
networks.
• Also it will take care of signaling connection management functions.
w
ul
.c
om
Functions of Iur
om
1. Basic inter-RNC mobility support
• Support of Serving RNC relocation
• Support of inter-RNC cell and UTRAN registration area update
.c
• Support of inter-RNC packet paging
• Reporting of protocol errors
ul
2. Dedicated channel traffic support
• Establishment, modification, and release of a dedicated channel during
pa
handoff.
• Transfer of DCH transport blocks between Serving RNC and Drift RNC
jin
• Perform Power Management
3. Common channel traffic support
.re
• Setup and release of the transport connection
• Splitting of the MAC layer between the SRNC (MAC-d) and DRNC
• Flow control between the MAC-d and MAC-c/MAC-sh
w
ul
.c
om
• Iub interface provides communications between Node B and the RNC of the
same RNS.
om
Iub interface is used to carry:
• Information for the general control of Node B for radio network operation on
RNCP
.c
• Information for the control of a transport network used within UTRAN on TCNP
ul
• User CC and MM signaling message on RNCP
• User voice and packet data information on UP
pa
jin
.re
w
w
w
UMTS Core Network Architecture(UCN)
om
UMTS core network (UCN) in relation to all other entities within the UMTS network
.c
and all of the interfaces to the associated networks.
ul
pa
jin
.re
w
w
w
• UCN consists of a CS entity for providing voice and CS data services and a PS
om
entity for providing packet-based services.
• Network management systems (billing and provisioning, service
management, element management.
.c
CN has different functional areas:
• Functional entities needed to support PS services (e.g. 3G-SGSN, 3G-GGSN)
ul
• Functional entities needed to support CS services (e.g. 3G-MSC/VLR)
• Functional entities common to both types of services (e.g. 3G-HLR)
pa
jin
.re
w
w
w
Logical architecture of the UMTS core
om
network.
.c
ul
pa
jin
.re
w
w
w
3G-MSC
om
• provides the necessary control and corresponding signaling interfaces
including SS7, MAP, ISUP (ISDN user part).
• provides the interconnection to external networks like PSTN and ISDN
.c
3G-MSC Services
ul
• Mobility management Handles attach, authentication, updates to the HLR,
SRNS relocation, and intersystem's handover.
pa
• Call management Handles call set-up messages from/to the UE.
• Supplementary services Handles call-related services.(call waiting, etc.)
jin
• CS data services The IWF provides rate adaptation and message translation
for circuit mode data services, such as fax.
• Short message services (SMS) allows the user to send and receive SMS data
.re
to and from the SMS-GMSC/SMS-IWMSC.
• VLR functionality database is located within the 3G-MSC and can serve as
intermediate storage for visitor subscriber data.
w
om
• Provides the necessary control function both UE and the 3G-GGSN.
• It also provides the appropriate signaling and data interfaces including
connection to an IP-based network.
.c
3G-SGSN Services
• Session management Handles session set-up messages from/to the UE
ul
• SMS allows the user to send and receive SMS data to and from the SMS-
GMSC /SMS-IWMSC.
pa
• Mobility management Handles attach, authentication, updates to the HLR
and SRNS relocation, and intersystem handover.
jin
• Subscriber database functionality:similar to the VLR.located within the 3G-
SGSN and serves as intermediate storage for subscriber data to support
subscriber mobility.
.re
• Charging The SGSN collects charging information related to radio network
usage by the user.
w
w
w
3G-GGSN
om
• GGSN provides interworking with the external PS network.
• GGSN may optionally support an SS7 interface with the HLR to handle mobile
terminated packet sessions.
.c
3G-GGSN Services
• Maintain information locations at SGSN level (macro-mobility)
ul
• Gateway between UMTS packet network and external data networks (e.g. IP,
X.25)
pa
• Gateway-specific access methods to intranet
• User level address allocation GGSN may have to allocate (depending
jin
on subscription) a dynamic address to the UE.(With the help of DHCP)
• Charging:collects charging information related to external data
.re
network usage by the user.
w
w
w
om
SMS-GMSC/SMS-IWMSC
SMS-GMSC provides the following functions
.c
• Reception of short message packet data unit (PDU)
• Interrogation of HLR for routing information
ul
• Forwarding of the short message PDU to the MSC or SGSN using the
• routing information.
pa
SMS-IWMSC provides the following functions
• Reception of the short message PDU from either the 3G-SGSN or3G-MSC
jin
• Establishing a link with the addressed service center
• Transferring the short message PDU to the service center
.re
w
w
w
om
Firewall
• used to protect the service providers’ backbone data networks
.c
from attack from external packet data networks.
• The security of the backbone data network can be ensured by
ul
applying packet filtering mechanisms.
pa
• It is based on access control lists or any other methods deemed
suitable.
jin
.re
w
w
w
DNS/DHCP
om
• DNS server is used, as in any IP network, to translate host names into IP
addresses
.c
• used to translate the access point name (APN) into the GGSN IP address
ul
• DHCP protocol server is used to manage the allocation of IP addresses to
systems
pa
jin
.re
w
w
w
om
.c
ul
pa
High-Speed Downlink Packet Access
jin(HSDPA)
.re
w
w
w
Introduction
om
• It is a 3GPP(Generation Partnership Project)
.c
• Objective of HSDPA is to provide a cost-effective, high BW, low-delay,
packet-oriented service within UMTS.
ul
• provide data rates up to approximately 8–10 Mbps
• support packet-based multimedia services.
pa
jin
.re
w
w
w
All-IP based UMTS Architecture
om
.c
ul
pa
jin
.re
w
w
w
Performance Improvements of HSDPA
om
• scheduling of data packet transmission and processing of retransmissions (in
case of transmission errors)
.c
• Using a short frame length to further accelerate packet scheduling for
transmission.
ul
• Employing incremental redundancy for minimizing the air-interface load
pa
caused by retransmissions.
• Adopting a new high-speed downlink shared channel (HS-DSCH) to
facilitate air interface channel sharing between several users.
jin
• Adapting the modulation and coding scheme according to the quality of the
radio link
.re
w
w
w
om
.c
ul
LONG TERM EVOLUTION (LTE)
pa
jin
.re
w
w
w
Introduction
om
• Designed to support only packet-switched services
• provide seamless Internet connectivity between user equipment (UE) and the
.c
packet data network (PDN).
• Provide seamless connection without any disruption to the end users’
ul
applications during mobility.
• It encompasses the evolution of the Universal Mobile Telecommunications
pa
System (UMTS) radio access through the Evolved UTRAN (E-UTRAN).
• It is accompanied by an evolution of the non-radio aspects under the term
“System Architecture Evolution” (SAE), which includes the Evolved Packet
jin
Core (EPC) network. Together LTE and SAE comprise the Evolved Packet
System (EPS).
.re
w
w
w
Evolution Packet System(EPS)-
om
Architectural overview
.c
• EPS provides IP and Voice over IP (VoIP).
• Multiple bearers can be established for a user in order to provide different
ul
QoS streams or connectivity to different PDNs.
pa
• Ex user might be engaged in a voice (VoIP) call while at the same time
performing web browsing or FTP download.
• Provide sufficient security and privacy for user.
jin
.re
w
w
w
om
EPS-Core Network Elements(CN)
• The core network is responsible for the overall control of the UE and
.c
establishment of the bearers.
• Each of these network elements is interconnected by means of interfaces that
ul
are standardized in order to allow multi-vendor interoperability.
• This gives network operators may choose in their physical implementations to
pa
split or merge these logical network elements depending on commercial
considerations.
CN consists of following logical nodes
• PDN Gateway (P-GW)
• Serving Gateway (S-GW)
jin
.re
• Mobility Management Entity (MME)
w
w
w
w
w
w
.re
jin
pa
ul
.c
om
w
w
w
.re
jin
pa
ul
.c
om
1)PCRF –( Policy Control and Charging Rules )Function is responsible for
om
policy control decision-making and controlling the flow-based charging .
2)HSS – (Home Subscriber Server) contains users’ SAE subscription data such
.c
as the EPS-subscribed QoS profile and any access restrictions for roaming.
• It also holds information about the PDNs to which the user can connect.
ul
• In addition the HSS holds dynamic information such as the identity of the
MME to which the user is currently attached or registered.
pa
3) P-GW – (PDN Gateway) responsible for IP address allocation for the UE and
flow-based charging.
• jin
It is responsible for the filtering of downlink user IP packets into the
different QoS-based bearers.
.re
• It also serves as the mobility anchor for interworking with non-3GPP
technologies such as CDMA2000 and WiMAX networks.
w
w
w
4)S-GW ( Serving Gateway) serves as the local mobility UE moves between
eNodeBs.
om
• It also retainsthe information about the bearers when the UE is in the idle
state “IDLE” [ECM-IDLE])
• performs some administrative functions in the visited network such as
.c
collecting information for charging packet radio service (GPRS) and UMTS.
5)MME –( Mobility Management Entity)is the control node processes the
ul
signaling between the UE and the CN.
• Functions related to bearer management – This includes the establishment,
pa
maintenance and release of the bearers
• Functions related to connection management – This includes the
establishment of the connection and security between the network and UE
jin
.re
w
w
w
om
Protocol architecture-user plane
.c
ul
pa
jin
.re
w
w
w
• Consisting of the Packet Data Convergence Protocol (PDCP), Radio Link
om
Control (RLC) and Medium Access Control (MAC) sublayers.
• The above layers are terminated in the eNodeB on the network side.
• In the absence of any centralized controller node, data buffering during
.c
handover due to user mobility in the E-UTRAN must be performed in the
eNodeB itself.
ul
• Data protection during handover is a responsibility of the PDCP layer.
• The RLC and MAC layers both start afresh in a new cell after handover.
pa
jin
.re
w
w
w
om
Protocol architecture-control plane
.c
ul
pa
jin
.re
w
w
w
om
• The blue region of the stack indicates the AS protocols.
• The lower layers perform the same functions as for the user plane with the
exception that there is no header compression function for the control plane.
• The Radio Resource Control (RRC) protocol is known as “layer 3” in the AS
.c
protocol stack.
• AS responsible for establishing the radio bearers and configuring all the
ul
lower layers using RRC signaling between the eNodeB and the UE.
pa
jin
.re
w
w
w
om
.c
ul
pa
Introduction – 4G vision – 4G features and challenges -
Applications of 4G – 4G Technologies: Multicarrier
Modulation, Smart antenna techniques, IMS Architecture,
jin
LTE, Advanced Broadband Wireless Access and Services,
.re
MVNO.
w
w
w
w
w
w
.re
jin
pa
Introduction-4G
ul
.c
om
w
w
w
.re
jin
1G
pa
ul
.c
320
om
Features
om
• Circuit-switched technology.
• FDMA (Frequency Division Multiple Access).
.c
• Analog system.
ul
• Basic mobility.
pa
• Poor voice quality.
• Poor security.jin
• Poor spectrum allocation
.re
w
w
w
321
w
w
w
.re
jin
2G
pa
ul
.c
322
om
2G
om
• Digital data can be compressed and multiplexed much
more effectively than analog voice encodings.
.c
•Multiplexing -multiple analog message signals or digital
ul
data streams are combined into one signal.
pa
jin
.re
w
w
w
323
• CODEC introduction -program that encodes and
om
decodes digital data stream or signal.
•Translates data from digital to analog and vice .
.c
Eg(LPC,CELP)
ul
pa
Speaker
jin
.re
w
Voice CODEC
0101110
w
w
324
2G
om
•Advantages:
• The digital voice encoding allows digital error
.c
checking
ul
•increase sound quality
pa
•lowers the noise level
Going all-digital allowed for the introduction of
jin
digital data transfer.
•SMS –“short message service”
.re
•E-mail
w
w
w
325
2G
om
Disadvantages
.c
• Cell towers had a limited coverage area.
ul
pa
• Built mainly for voice services and slow data.
jin
.re
w
w
w
326
om
.c
2.5G
ul
pa
2G Enhanced
jin
.re
w
w
w
327
• Lies somewhere between 2G and 3G.
om
• The development of 2.5G has been viewed as a
.c
stepping-stone towards 3G.
ul
pa
• Was prompted by the demand for better data
services and access to the internet.
jin
.re
• Provides faster services than 2G, but not as faster as
advanced as the newer 3G systems.
w
w
w
328
om
• Extends the capabilities of 2G systems by providing
.c
additional features, such as a packet-switched
connection(GPRS) in the TDMA-based GSM system,
ul
and enhanced data rates (HSCSD and EDGE).
pa
jin
.re
GPRS: General Packet Radio Services.
EDGE: Enhanced Data for Global Evolution.
HSCSD: High Speed circuit-switched data.
w
w
w
329
w
w
w
.re
jin
3G
pa
ul
.c
330
om
3G
om
• Large capacity and broadband capabilities. •Allows the
transmission of 384kbps for mobile systems and up to
.c
2Mbps.
ul
pa
•Increased spectrum efficiency –5Mhz–
-A greater number of users that can be simultaneously
jin
supported by a radio frequency bandwidth.
.re
• High data rates at lower incremental cost than 2G.
w
• Global roaming
w
w
331
3G
om
• CDMA –Code Division Multiple Access.
• Does not divide up the channel by time or frequency.
.c
• Encodes data with a special code associated with each
ul
channel.
pa
jin
.re
w
w
w
332
Evolution to 4G
om
CDMA GSM/UMTS IEEE Cellular IEEE LAN
.c
2G CDMA IS-95A GSM TDMA IEEE 802.16 IEEE 802.11
ul
IS-136
pa
IEEE 802.11a
2.5G CDMA IS-95B GPRS
333
Technology moving towards 4G
om
Mobility
1995 2000 2005 2010+
4G
.c
High speed
ul
3G LTE
pa
3G
(IMT2000)
Mobile
Mediu
m speed
jin 2G
(Digital)
CDMA/GSM/TDMA WiMAX
(WiBRO)
.re
CDMA/GSM/TDMA
High Speed
1G WPAN
WLAN
(Analog)
5 GHz
w
WLAN
Bluetooth Data Rates
w
om
.c
High speed
ul
pa
Medium
speed
3thGeneration 4th Generation
2G (2001)jin
(IMT-2000)
(2007-2010)
2.5G
Walking/ 2G
.re
Local area
w
w
Standing/
Indoor Data Rates
w
0.1 1 10 335
100
w
w
w
.re
jin4G
pa
ul
.c
om
4G
om
Fourth generation Mobile Communications
.c
•A network that operates on Internet technology, combines it with
ul
other applications and technologies such as Wi-Fi.
• Fully IP-based wireless internet.
pa
100 Mbps (outdoor) and 1Gbps (indoor).
Any services, anytime, anywhere.
jin
Always Be Connected (ABC).
Seamless roaming
.re
Smoother handover
High bandwidth
w
High security.
w
Seamless Roaming
om
.c
• "Seamless" and "wireless," when put together,
ul
represent a technology of wireless Internet that hands
pa
you off to another network without interruption so you
may continue your activities online without even
jin
noticing that you connected into another network.
.re
Another name for it is "seamless roaming."
w
w
w
Seamless Connection of Networks in 4G
om
Cellular 2.5G
(GSM etc.
Cellular 3G
(UMTS
.c
etc.
ul
Digital
Audio/Video
pa
Broadcast Connection Layer
Core IP Network
jin
.re
Cellular 4G
w
Short Range
PAN/LAN/
w
MAN/WAN
WLAN/
w
HIPER-LAN
4G-Vision
om
•4G systems designed to provide a new services, from high-quality voice to
high-definition video to high-data-rate wireless channels.
• 4G is described as MAGIC —Mobile multimedia, Anytime anywhere,
.c
Global mobility support, Integrated wireless and Customized personal
service.
ul
•support the next generation mobile services, and also fixed wireless
networks.
pa
jin
.re
w
w
w
w
w
w
.re
jin
pa
ul
.c
om
om
4G Features and Challenges
• High usabilityanytime, anywhere, and with any technology
.c
• Support for multimedia services at low transmission cost
ul
Personalization
• Integrated services
pa
•Multi-standard wireless system.
–Bluetooth, Wired, Wireless (802.11x)
•Ad Hoc Networking.
•IPv6 Core.
jin
.re
•OFDM used instead of CDMA.
w
w
w
om
Applications of 4G
• Virtual presence provide user services at all times, even if the user
.c
is off-site.
• Virtual navigation provide users with virtual navigation through which a user
ul
can access a database of streets, buildings, etc., of a large city.
• Tele-medicine support the remote health monitoring of patients via video
pa
conference assistance for a doctor at anytime and anywhere.
• Tele-geo-processing applications combine geographical information
jin
systems (GIS) and global positioning systems (GPS) in which a user will
get location querying.
.re
• Education provide a good opportunity to people anywhere in the world to
continue their education on-line in a cost-effective manner.
w
w
w
vs.
om
Technology 3G 4G
.c
Frequency
ul
Band 1.8 - 2.5GHz 2 - 8GHz
pa
Bandwidth 5-20MHz 5-20MHz
Data Rates jin
Up to 2Mbps 100Mbps moving - 1Gbps
stationary
.re
Access W-CDMA VSF-OFCDM and VSF-CDMA
w
344
om
4G Technologies
.c
1. Multicarrier Modulation
2. Smart Antenna Techniques
ul
3. OFDM-MIMO Systems
pa
4. Adaptive Modulation and Coding with Time-
Slot Scheduler (AMCTSS)
jin
5. Cognitive Radio
.re
w
w
w
1)Multicarrier Modulation(MCM)
om
• It is a derivative of frequency-division multiplexing.
.c
• MCM systems are currently used in DSL modems and digital audio/video
broadcast (DAB/DVB).
ul
• MCM is a baseband process that uses parallel equal bandwidth sub-channels
to tx information ( implemented with fast Fourier transform (FFT))
pa
• To overcome ISI effect a cyclic extension or guard band must be added to
the data.(Peak to avg ratio high)
• The difference, D, of the peak-to-average ratio between MCM and a single
jin
carrier system is a function of the number of subcarriers, N,
.re
w
w
w
Lb original length of block.
om
•
• Lc channel’s response length.
• Lb+ Lc- 1 cyclically extended symbol new length
• At MCM receiver, only Lb samples are processed
.c
and Lc-1 samples are discarded
• SNR is given by
ul
pa
Modulation methods
• MC-CDMA each user can be allocated several
codes, where the data is spread in time or
frequency
jin
• MC-OFDM(TDMA)users are assigned time slots
to transmit and receive data.
.re
w
w
w
MC-OFDM(TDMA)
om
• OFDM divides a broadband channel into many parallel sub channels.
• The sub channel pulse shape is a square wave.
.c
• Pulse forming and modulation is performed by a simple IFFT.
• To decode the transmission, a receiver needs only to implement FFT.
ul
• OFDM receiver senses the channel and corrects distortion on each sub channel before
the transmitted data can be extracted.
pa
• In OFDM, each of the frequencies is an integer multiple of a fundamental frequency.
This ensures that even though sub channels overlap, they do not interfere with each
other
jin
.re
w
w
w
2) Smart Antenna Techniques
om
• Smart antenna techniques, such as multiple-input multiple-output (MIMO).
• MIMO systems use multiple antennas at both the transmitter and receiver to
increase the capacity of the wireless channel
.c
• MIMO systemsto provide 20 Mbps for 4G systems.
ul
• MIMO different signals are transmitted out of each antenna simultaneously
in the same bandwidth and then separated at the receiver.
pa
Methods
• Single-Input, Single-Output (SISO)
•
•
jin
Single-Input, Multiple-Output (SIMO)
Multiple-Input, Single-Output (MISO)
Multiple-Input, Multiple-Output (MIMO)
.re
•
w
w
w
MIMO System
om
• Four antennas at the transmitter and receiver to provide four times the data rate of a
single antenna system, without an increase in transmit power or bandwidth.
Support multiple independent channels in the same bandwidth, provided the
.c
•
multipath environment.
• Number of transmitting antennas is M, and the number of receiving antennas is N,
ul
where N≥M
pa
jin
.re
w
w
w
om
1) Single-Input,Single-Output (SISO)
.c
• The channel bandwidth is B, the transmitter power is Pt.
ul
• Average signal-to-noise ratio of SNR0,.
• Shannon limit on channel capacity C is
pa
jin
.re
w
w
w
2) Single-Input,Multiple-Output (SIMO)
om
• There are N antennas at the receiver.
• If the signals received on the antennas have on average the same amplitude,
.c
then they can be added coherently to produce an N2 increase in signal power.
• N sets of noise sources that are added coherently and result in an N-fold
ul
increase in noise power.
• Overall increase in SNR will be
pa
• channel capacity C is jin
.re
w
w
w
om
3) Multiple-Input,Single-Output (MISO)
• Consider M transmitting antennas
.c
• The total power is divided into M transmitter branches.
• If the signals add coherently at the receiving antenna, we get an M-fold
ul
increase in SNR as compared to SISO.
• Because there is only one receiving antenna, the noise level is same as SISO.
pa
• Overall SNR is given by
jin
.re
w
w
w
om
4) Multiple-Input,Multiple-Output (MIMO)
.c
• Combination of MISO and SIMO channels
ul
• it is possible to achieve approximately an MN-fold increase in the average
SNR0 giving a channel capacity equal to
pa
jin
• Assuume N≥ M, we can send different signals using the same BW and still be
able to decode correctly at the receiver.
.re
• Thus, we are creating a channel for each one of the transmitters.
• Channel capacity
w
w
w
om
MIMO-Block diagram
.c
ul
pa
jin
.re
w
w
w
om
3)OFDM-MIMO Systems
• OFDM and MIMO techniques can be combined to achieve high spectral
efficiency and increased throughput.
.c
• The OFDM-MIMO system transmits independent OFDM modulated data
from multiple antennas simultaneously.
ul
• At the receiver, after OFDM demodulation, MIMO decodes each sub channel
pa
to extract data from all transmit antennas on all the sub channels.
jin
.re
w
w
w
4) Adaptive Modulation and Coding
om
with Time Slot Scheduler(AMCTSS)
.c
• TCP/IP is designed for a highly reliable transmission medium in wired N/W
ul
• But wireless network uses a time varying channel where packet losses may be
common due to severe fading.
pa
• To overcome the above problem we need a system with efficient packet data
transmission using TCP in 4G.
• This can be achieved by using a suitable Automatic Repeat Request (ARQ) scheme
combined with AMCTSS. jin
• Lower layers are adapted to channel conditions while still providing some
.re
robustness through retransmission.
• If the channel quality for each radio link can be predicted about 10 ms into the
future ARQ along with an AMCTSS can be selected for each user to satisfy the
w
om
• Software-Defined Radio (SDR) system is a radio communication system
which uses software for the modulation and demodulation of radio signals.
.c
• An SDR performs significant amounts of signal processing in a general
purpose computer
ul
• The goal of this design is to produce a radio that can receive and transmit a
new form of radio protocol just by running new software.
pa
• It have significant utility for cell phone services, which must serve a wide
variety of changing radio protocols in real time.
jin
• The hardware of a SDR consists of a super heterodyne RF front end which
converts RF signals from and to analog RF signals, and analog to digital
converters and digital to analog converters which are used to convert digitized
.re
intermediate frequency (IF) signals from and to analog form, respectively.
• SDR can talk and listen to multiple channels at the same time.
w
w
w
w
w
w
.re
jin
pa
ul
.c
om
om
6)Cognitive Radio(CR)
• It is not only a radio technology, also includes how the spectrum can be
.c
efficiently shared by operators/users/systems.
ul
• The main functions of CRSensing,dynamic spectrum allocation and
adaptive communication
pa
• The CR focuses on applying software capabilities to determine when
frequencies are free to use and then use them in the most efficient manner
possible.
Uses
jin
• Determine which portion of the spectrum are available and detect.
.re
• Select the best available channel
• Sharing channel between users
• Vacate the channel when license user is detected
w
w
w
w
w
w
.re
jin
pa
ul
.c
om
w
w
w
.re
jin
pa
CR-Architecture
ul
.c
om
• There are two main subsystems in a cognitive radio.
om
1) Cognitive unit makes decision based on various inputs.
2) SDR unit operating software provides a range of possible
operating modes
.c
• Cognitive enginetries to find a solution based on received
ul
inputs.
• Policy engineverify and ensure that the solution provided by
pa
Cognitive engine with regulatory rules.
• The utilization of all elements use of available spectrum and
jin
access common set of radio hardware..
.re
w
w
w
Features
om
• Cognitive capabilitydetect the existence of the information from
.c
the surrounding environment of the radio.
• sense and ability to capture the different variations of environment
ul
• Re-configurability system has the ability to be programmed
pa
according to the radio environment ..
• sense a spectrum of wide range of frequencies and make some
communication links by using the information.
jin
.re
w
w
w
Benefit of CR
om
• Efficiency of spectrum
High BW services
.c
•
• Graceful degradation of services
ul
• Benefits to the service providers
pa
• Common hardware platform
• jin
Emergency communication services
.re
w
w
w
om
Applications of CR
• Future Internet services
.c
• Multimedia download in mobile
ul
• Communication during emergency services
pa
• Wireless Multimedia services
jin
.re
w
w
w