Assignment I
Assignment I
dary. We see how under such a situation the pulse or the wave gets reflected.
When a wave is an incident on any surface, a part of the incident wave is reflected and a part is
transmitted into the second medium. If the wave is incident obliquely on the boundary, the
transmitted wave can also be termed as a reflected wave.
Here, the incident and the refracted waves obey Snell’s of refraction, and the incident and the
reflected waves obey the laws of reflection. The reflection of a wave or a pulse can happen from
two types of surfaces, it can either be a fixed wall or a ring, as shown in the image below.
When the right end of the string is tied to a ring, which slides up and down without any friction
on a rod, we term it as a free end. In this case, when the pulse arrives at the right end, the ring
moves up the rod and as it moves, it pulls on the string, stretching the string and producing a
reflected pulse with the same sign and amplitude as the incident pulse. Thus, in such a reflection,
the incident and reflected pulses reinforce each other, creating the maximum displacement at the
end of the string: the maximum displacement of the ring is twice the amplitude of either of the
pulses. Thus, the reflection occurs without any additional phase shift. In the case of a travelling
wave the reflection at an open boundary the reflection takes place without any phase change.
1.2.3 Diffraction of radio signals: Occurs when the path is blocked by an object with large
dimensions relative to one and sharp irregularities (edges). Secondary “wavelets” propagate into
the shadowed region. Diffraction gives rise to bending of waves around the obstacle. Diffraction
is caused by one wave of light being shifted by a diffracting object. This shift will cause the
wave to have interference with itself. Interference can be either constructive or destructive.
When interference is constructive, the intensity of the wave will increase. Diffraction occurs with
all waves, including sound waves, water waves, and electromagnetic waves such as visible light,
X-rays, and radio waves in wireless communication.
1.2.4 Scattering of radio signals: Occurs when a wave impinges upon an object with
dimensions on the order of I or less, causing the reflected energy to spread out or “scatter” in
many directions. Small objects such as street lights, signs, & leaves cause scattering Multipath in
wireless communication.
1.2.6 Multipath propagation
In wireless telecommunications, multipath is the propagation phenomenon that results
in radio signals reaching the receiving antenna by two or more paths. Causes of multipath
include atmospheric ducting, ionospheric reflection and refraction, and reflection from water
bodies and terrestrial objects such as mountains and buildings. The effects of multipath
include constructive and destructive interference, and phase shifting of the signal.
Destructive interference causes fading. Where the magnitudes of the signals arriving by
the various paths have a distribution known as the Rayleigh distribution, this is known as
Rayleigh fading. Where one component dominates, a Rician distribution provides a more
accurate model, and this is known as Rician fading. In facsimile and television transmission,
multipath causes jitter and ghosting, seen as a faded duplicate image to the right of the main
image. Ghosts occur when transmissions bounce off a mountain or other large object, while
also arriving at the antenna by a shorter, direct route, with the receiver picking up two signals
separated by a delay. In radar processing, multipath causes ghost targets to appear, deceiving
the radar receiver. These ghosts are particularly bothersome since they move and behave like
the normal targets, and so the receiver has difficulty in isolating the correct target echo.
These problems can be overcome by incorporating a ground map of the radar's surroundings
and eliminating all echoes which appear to originate below ground or above a certain height.
All communication systems that transmit signals are capable of generating interference.
Transmitters may produce ‘harmonics’ that may show up on undesired frequencies. Design
flaws such as insufficient filtering and inadequate shielding or frayed or corroded wires, dry
solder etc. may make equipment susceptible to cause and/or suffer interference
1.2.8 Handoff
The final obstacle in the development of cellular network involved the problem created when
a mobile subscriber traveled from one cell to another during a call. As adjacent areas do not
use the same radio channels, a call must either be dropped or transferred from one radio
channel to another when a user crosses the line between adjacent cells. Because dropping the
call is unacceptable, the process of handoff was created. Handoff occurs when the mobile
telephone network automatically transfers a call from radio channel to radio channel as a
mobile crosses adjacent cells (see Figure 1.4)
with only ten base stations, each with antenna tower height between 150 ft. and 550 ft. Most of
the early systems were designed for a carrier-to-interference ratio (CIR) of 18dB for satisfactory
voice quality, and were deployed in a 7-cell frequency reuse pattern with 3 sectors per cell.
Besides the United States, AMPS was deployed in several countries in South America,
Asia, and North America. In the United States, the FCC assigned spectrum to two operators per
market—one an incumbent telecommunications carrier and the other a new non-incumbent
operator. Each operator was assigned 20MHz of spectrum, supporting a total of 416 AMPS
channels in each market. Of the 416 channels, 21 channels were designated for control
information and the remaining 395 channels carried voice traffic. AMPS systems used
Frequency Modulation (FM) for the transmission of analog voice and Frequency Shift Keying
(FSK) for the control channel. Even after the deployment of second generation (2G) systems,
AMPS continued to be used by operators in North America as a common fallback service
available throughout the geography, as well as in the context of providing roaming between
different operator networks that had deployed incompatible 2G systems.
2.1.1.3 2G Digital Cellular Systems
Improvements in processing abilities of hardware platforms over time enabled the development
of 2G wireless systems. 2G systems were also aimed primarily toward the voice market but,
unlike the first generation systems, used digital modulation. Shifting from analog to digital
enabled several improvements in systems performance. System capacity was improved through
(1) the use of spectrally efficient digital speech codecs, (2) multiplexing several users on the
same frequency channel via time division or code division multiplexing techniques, and (3)
tighter frequency re-use enabled by better error performance of digital modulation, coding, and
equalization techniques, which reduced the required carrier-to-interference ratio from 18dB to
just a few dB. Voice quality was also improved through the use of good speech codecs and
robust link level signal processing. 2G systems also used simple encryption to provide a measure
of security against eaves dropping and fraud, which were a source of major concern with first
generation analog systems.
Examples of 2G digital cellular systems include the Global System for Mobile Communications
(GSM), IS-95 CDMA, and IS-136 TDMA systems. GSM is by far the most widely deployed of
these systems; IS-95 is deployed in North America and parts of Asia; IS-54 (later enhanced to
IS-136) was initially deployed in North America but was later discontinued and replaced mostly
by GSM. IS-136 was a TDMA-based system that was designed as a digital evolution of AMPS
using 30kHz channels. The Personal Handy phone System (PHS) deployed in China, Japan,
Taiwan, and some other Asian countries is also often considered a 2G system. PHS is a cordless
telephone system like the Digital Enhanced Cordless Telephone (DECT) system but with
capability to handover from one cell to another, and operated in the 1880–1930MHz frequency
band. Table 1.3 provides a summary comparison of the various 2G digital cellular systems.
Besides providing improved voice quality, capacity, and security, 2G systems also enabled new
applications. Prime among these was the Short Messaging Service (SMS). SMS was first
deployed in Europe in 1991, and quickly became a popular conversational tool
Table 2.2 Major Second Generation Cellular Systems
among younger mobile subscribers. Today, over 2.5 billion SMS messages are sent each day in
the United States alone, and the service has been used for delivering news updates, business
process alerts, mobile payments, voting, and micro-blogging, among other things.
In addition to SMS, 2G systems also supported low data rate wireless data applications.
Original 2G systems supported circuit switched data services (similar in concept to dial-up
modems), and later evolved to support packet data services as well. Early wireless data services
included information services such as the delivery of news, stock quotes, weather, and directions,
etc. Limitations in data rate and available space for display in handheld devices meant that
specialized technologies, such as the Wireless Access Protocol (WAP), had to be developed to
tailor and deliver Internet content to handheld devices.
GSM and Its Evolution
In 1982, many European countries came together under the auspices of the Conference of
European Posts and Telegraphs (CEPT) to develop and standardize a Pan-European system for
mobile services. The group was called the Groupe Special Mobile (GSM) and their main charter
was to develop a system that could deliver inexpensive wireless voice services, and work
seamlessly across all of Europe. Prior to GSM, the European cellular market was fragmented
with a variety of mutually incompatible systems deployed in different countries: Scandinavian
countries had NMT-400 and NMT-900, Germany had C-450, the United Kingdom had TACS,
and France had Radiocom.
By 1989, the European Telecommunications Standards Institute (ETSI) took over the
development of the GSM standard and the first version, called GSM Phase I, was released in
1990. Shortly thereafter, several operators in Europe deployed GSM. GSM quickly gained
acceptance beyond Europe and the standard was appropriately renamed as the Global System for
Mobile Communications. According to the Informa Telecoms and Media, an industry analyst,
GSM and its successor technologies today boast over 4.2 billion subscribers spread across 220
countries, a 90% global market share. The broad worldwide adoption of GSM has made
international roaming a seamless reality.
The GSM air-interface is based on a TDMA scheme where eight users are multiplexed on a
single 200kHz wide frequency channel by assigning different time slots to each user. GSM
employed a variant of FSK called Gaussian Minimum Shift Keying (GMSK) as its modulation
technique. GMSK was chosen due to its constant envelope property providing good power and
spectral efficiency characteristics.
Besides voice and SMS, the original GSM standard also supported circuit-switched data at
9.6kbps. By the mid-1990s, ETSI introduced the GSM Packet Radio Systems (GPRS) as an
evolutionary step for GSM systems toward higher data rates. GPRS and GSM systems share the
same frequency bands, time slots, and signaling links. GPRS defined four different channel
coding schemes supporting 8kbps to 20kbps per slot. Under favorable channel conditions, the
higher 20kbps rate can be used, and if all eight slots in the GSM TDM frame were used for data
transmission, in theory, GPRS could provide a maximum data rate of 160kbps. Typical
implementations of GPRS provided a user data rate of 20–40kbps.
Figure 1.2 provides a high-level architecture of a GSM/GPRS network. It is instructive to
review this architecture as it formed the basis from which later 3G systems and LTE evolved.
The original GSM architecture had two sub-components:
Base Station Subsystem: This is comprised of the base-station transceiver (BTS) units that the
mobile stations (MS) connect with over the air-interface and the base station controller (BSC),
which manages and aggregates traffic from several BTSs for transport to the switching core, and
manages mobility across BTSs connected
that it uses the same bandwidth (1.25MHz) as IS-95. The data capabilities were enhanced by
adding separate logical channels termed supplemental channels. Each link can support a single
fundamental channel (at 9.6kbps) and multiple supplemental channels (up to 307kbps). Strictly
speaking, this is less than the 3G requirements, and for this reason, one may refer to
CDMA2000-1X as a 2.5G system. The data rate can be increased up to 2Mbps through the use of
multiple carriers as in CDMA2000-3X. CDMA2000-1X theoretically doubles the capacity of IS-
95 by adding 64 more traffic channels to the forward link, orthogonal to the original set of 64.
The uplink was improved through the use of coherent modulation; and the downlink through the
addition of fast (800Hz) power control to match the uplink. Advanced antenna capabilities were
also integrated into the new standard through options for transmit diversity as well as
supplemental pilot options for beam-steering. A key to these upgrades is that they are backward
compatible. CDMA2000 and IS-95A/B could be deployed on the same carrier, which allowed
for a smooth migration.
In order to achieve higher data rates (up to 2Mbps) as well as improve overall system
throughput for packet data scenarios, the CDMA2000-1X standard was also evolved to
CDMA2000-1X-EVDO (Evolution, Data Only). As the name implies, the standard is applicable
to data traffic only and there is no support for voice or other real time services.
Though it uses a 1.25MHz channel bandwidth and shares radio characteristics with IS-95, it
cannot be deployed on the same carrier as CDMA2000-1X RTT or IS-95. This required service
providers to dedicate a single carrier to data services in order to deploy data.
EV-DO originally was developed as a High-Data Rate (HDR) solution by Qualcomm for use
in fixed and nomadic applications meeting the 2Mbps low mobility requirements of IMT-2000. It
was, however, later upgraded to meet the full mobility requirements and was indeed the first
system to provide real broadband-like speeds to mobile users. In fact, the first deployment of
EV-DO occurred in 2002, a full three years ahead of a similar system—HSDPA—being
deployed by GSM operators. According to the CDMA Development Group, as of July 2009, EV-
DO had over 120 million subscribers.
EV-DO is designed to be an asymmetric system providing downlink rates up to 2.4Mbps and
uplink rates up to 153kbps. The downlink is actually a TDMA link where multiple users are time
multiplexed. The system supports QPSK and 16QAM modulation and coding rates from 1/5 to
1/3. Depending on the modulation and coding scheme chosen, user rates can vary from 38.4kbps
to 2457.6kbps. EV-DO has the capability to adaptively change the modulation and coding based
on link conditions.
Enhancements to EV-DO were made in EV-DO Rev. A, which improved the peak user data
rates to 3.07Mbps and 1.8Mbps in the downlink and uplink, respectively, while providing a more
symmetric link. In commercial deployments, Rev A achieves average throughput of 450–
800kbps in the forward link and 300–400kbps in the reverse link.
2.1.1.2.4 UMTS WCDMA
Universal Mobile Telephone Service (UMTS) was originally developed by ETSI as the 3G
system for IMT-2000 based on the evolution of GSM. As GSM went global, in 1998, the 3GPP
was formed as a collaboration of six regional telecommunications standards bodies from around
the world to continue the development of UMTS and other standards of GSM heritage. 3GPP
completed and published the first 3G UMTS standard in 1999, and that standard is often called
UMTS Release 99. UMTS Release 99 is widely deployed around the world and enjoys broad
success. According to the trade groups 3G Americas and the UMTS Forum, as of May 2010,
UMTS networks have been deployed by 346 operators in over 148 countries [2] and has over
450 million users [3].
UMTS includes (1) a core network (CN) that provides switching, routing, and subscriber
management; (2) the UMTS Terrestrial Radio Access Network (UTRAN); and (3) the User
Equipment (UE). The basic architecture is based on and backward compatible with the
GSM/GPRS architecture described in Figure 2.2, with each element enhanced for 3G
capabilities. The BTS becomes Node-B, BSC becomes the Radio Network Controller (RNC), the
NSS becomes CN, and the MS is called the UE.
While UMTS retains the basic architecture of GSM/GPRS networks, the 3G air interface called
Wide-band CDMA (W-CDMA) is a radical departure from the 2G air interface. The W-CDMA
design was inspired by the success of IS-95 and builds on its basic features. It is a Direct
Sequence Spread Spectrum CDMA system where user data is multiplied with pseudo-random
codes that provide channelization, synchronization, and scrambling. W-CDMA is specified for
both FDD and TDD operations, although FDD is by far the most widely deployed. The system
operates on a larger 5MHz bandwidth, capable of supporting over 100 simultaneous voice calls,
and providing peak data rates from 384 to 2048kbps. Besides the channel bandwidth, other
notable distinguishing features of W-CDMA when compared to CDMA2000 include: (1) support
for multi-code use by a single user to increase data rate, (2) wider choice of spreading factors and
data rates, and (3) use of Alamouti space-time coding for transmit diversity.
2.1.1.5 HSPA
High-Speed Packet Access, or HSPA, is the term used to refer to the combination of two key
enhancements by 3GPP to UMTS-WCDMA: (1) High-Speed Downlink Packet Access (HSDPA)
introduced in Release 5 in 2002 and (2) High-Speed Uplink Packet Access (HSUPA) introduced
in Release 6 in 2004. HSDPA was first deployed by AT&T in late 2005 and quickly became
widely deployed around the world. As of February 2010, HSPA has been deployed by 303
operators in 130 countries, with many more being planned [2]. For the most part, HSPA was
deployed as a software upgrade to existing UMTS systems.
Since Internet usage patterns in the late 1990s showed that most of the applications demanded
higher throughput on the download, 3GPP UMTS evolution focused initially on improving the
downlink. HSDPA defined a new downlink transport channel capable of providing up to
14.4Mbps peak theoretical throughput. This downlink transport channel called the High-Speed
Downlink Shared Channel (HS-DSCH), unlike previous W-CDMA channels, uses time division
multiplexing as the primary multi-access technique with limited code division multiplexing.
HSDPA has 16 Walsh codes, 15 of which are used for user traffic. A single user could use 5, 10,
or 15 codes to get higher throughputs, though this is often limited to 5 or 10 by UE
implementations. To achieve higher speed, this channel uses a 2ms frame length, compared to
frame lengths of 10, 20, 40, or 80ms used by W-CDMA channels. Practical deployments of
HSDPA provided typical user throughputs in the 500kbps to 2Mbps range.
CONCLUSION
Wireless Networks having few common limitations and challenges. Quality of Service, energy
limitations, power limitation, security and multitasking are various challenges in Wireless
Networks. The security of any wireless network should be checked frequently to detect attacks if
any by the adversaries nodes and should be defensive to deploy new security mechanism. There
are several security standards should be used as per the confidentiality concerns. Security
methods provided by EAP to support a variety of upper layer authentication methods each with
different benefits and drawbacks. Any one of these authentication methods can be the ideal
choice for a specific networking environment and security requirements.
REFERENCES
[1] John A. Stankovic, “Wireless Sensor Networks”, www.wsntech.net (2006). [2] SANS
Institute InfoSec Reading Room, “Wireless LAN: Security Issues and Solutions”(2003). [3] G.
Padmavathi and D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges
in Wireless Sensor Networks”, International Journal of Computer Science and Information
Security,(2009). [4] H. Modares, R, Salleh, A. Moravejosharieh, “Overview of Security Issues in
Wireless Sensor Networks”, Third International Conference on Computational Intelligence,
(2011). [5] Tahir Naeem, Kok-Keong Loo, “Common Security Issues and Challenges in
Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks”, International Journal of
Digital Content Technology and its Applications,(2009). [6] Khidir M. Ali, Ali Al-Khalifah, “A
Comparative Study of Authentication Methods for Wi-Fi Networks”, A Comparative Study of
Authentication Methods for Wi-Fi Networks,(2011). [7] N. CHENDEB, B. E. HASSAN, and H.
AFIFI, “Performance evaluation of the security in wireless local area networks (WiFi)”,
International Conference on Information and Communication Technologies,(2004). [8] I. P.
Mavridis, A. B. Ηalkias, “Real-life paradigms of wireless network security attacks”, Panhellenic
Conference on Informatics,(2011).