UNIT 1-5-Merged
UNIT 1-5-Merged
2020-2021
EVEN SEMESTER
Why Wireless Communication
Stay connected – anywhere, anytime.
• Freedom From Wires
• No cost of installing wires or rewiring
• No bunches of wires running here and there
• “Auto magical” instantaneous communications without physical connection setup, e.g.,
Bluetooth, WiFi
• Global Coverage
• Communications can reach where wiring is infeasible or costly, e.g., rural areas, old
buildings, battlefield, vehicles, outer space (through Communication Satellites)
• Stay Connected
• Roaming allows flexibility to stay connected anywhere and any time
• Rapidly growing market attests to public need for mobility and uninterrupted access
• Flexibility
• Services reach you wherever you go (Mobility). E.g, you don’t have to go to your lab to
check your mail
• Connect to multiple devices simultaneously (no physical connection required)
Wireless Communication
• Any transfer of information between points that do not have a physical
connection, like wire or cable connection, would be WIRELESS
COMMUNICATION.
• Examples
• Short Distance - TV controlled by remote
• Long Distance - Space Radio Communication
• There are different types of wireless communication devices like mobiles. Cordless
telephones, Zigbee wireless technology, GPS, Wi-Fi, satellite television, and wireless
computer parts. Current wireless phones include 3 and 4G networks, Bluetooth, and
Wi-Fi technologies.
Wireless Communication
• Transmitting/ Receiving Voice and data using electromagnetic waves
in open space.
• The information from sender to receiver is carrier over a well
defined frequency band (Channel)
• Each channel has a fixed frequency bandwidth and capacity ( bit
rate)
• Different channels can be used to transmit information in parallel
and independently.
Example
• Assume a spectrum of 120KHz is allocated over a base frequency for
communication between two stations A and B.
• 120/3= 40KHz – Each channel occupies 40KHz
History of Wireless Communication
• The first telegraph was invented (1600 – 1833)
• The invention of the radio from the telegraph (1867-1896)
• The birth of radio (1897 – 898)
• Transoceanic Communication (1901 –1909)
• Voice over Radio and the First Television Transmissions (1914 – 1940)
• Commercial Television and the Birth of Mobile Telephony (1946 – 1976)
• Cellular Mobile Telephony and Steps toward Wireless Internet (1979 –
1994)
• The Wireless Data Era (1997 – 2009)
• Personal Communication Services (1995-2008)
Evolution of Communication System
Cellular Generations
Wireless Communication
• A wireless Communication system is classified into Simplex, Half Duplex & Full Duplex.
• The simple wireless communication system is one-way communication. In this type, the communication can
be done in one direction only. The best example is the radio broadcast system.
• The half Duplex communication system is two-way communication, however, it is not simultaneous. The
best example of this type of communication is walkie – talkie.
• The full Duplex communication system is also two-way communication & it is simultaneous. The best
example of this communication system is the mobile phone. In wireless communication, the devices which
are used for communication may change from one service to others because these are available in different
shape, size & data throughput. The region enclosed through this type of communication system is an essential
factor. Here, some of the most essential wireless communication systems are discussed like IR wireless
communication, satellite communication, broadcast radio, Microwave radio, Bluetooth, Zigbee, etc.
Typical Frequencies
Propagation Methods
• Ground Propagation - radio waves travel through the lowest portion of the
atmosphere following the curvature of the planet.
• Sky Propagation - high frequency radio waves radiate upward into the
ionosphere where they are reflected back to the earth.
• Line-of-sight Propagation - very high frequency signals are transmitted in
straight lines directly from antenna to antenna.
Wireless Systems : Range Comparison
Components of a Communication System
• The source is the originating point of the information that is to be conveyed. This
information could be voice, text, picture, packet data etc. Usually, this message is
encoded upon a carrier or a medium called the Baseband signal.
• The baseband signal carries no information on its own, but before reaching the
transmitter, the information to be sent is added to it.
• The transmitter then sends out the message into the communication channel.
• The channel is a medium through which the transmitter output is sent to the recipient.
This in the wired system could be a wire, a coaxial cable, or an optical fiber.
• In wireless systems these are generally waves like IR or radio.
• At the other end of the channel would be the receiver. It would extract the information
from the incoming signal received, by subtracting the baseband signal from it.
• The receiver output is the information that had come from the source, and this can be
directed to the recipient.
Basic Communication System
Wireless Communication System
Wireless - Advantages
•Cost effectiveness
• Wired communication entails the use of connection wires. In wireless networks,
communication does not require elaborate physical infrastructure or
maintenance practices. Hence the cost is reduced.
•Flexibility
• Wireless communication enables people to communicate regardless of their
location. It is not necessary to be in an office or some telephone booth in order
to pass and receive messages.
•Convenience
• Wireless communication devices like mobile phones are quite simple and
therefore allow anyone to use them, wherever they may be. There is no need
to physically connect anything in order to receive or pass messages.
Wireless - Advantages
•Speed
• Improvements can also be seen in speed. The network connectivity
or the accessibility were much improved in accuracy and speed.
•Accessibility
• The wireless technology helps easy accessibility as the remote areas
where ground lines can’t be properly laid, are being easily connected
to the network.
•Constant connectivity
• Constant connectivity also ensures that people can respond to
emergencies relatively quickly.
Types of Wireless Communication Systems
• Television and Radio Broadcasting
• Satellite Communication
• Radar
• Mobile Telephone System (Cellular Communication)
• Global Positioning System (GPS)
• Infrared Communication
• WLAN (Wi-Fi)
• Bluetooth
• Paging
• Cordless Phones
• Radio Frequency Identification (RFID)
Satellite Communication
• Satellite communication is one type of self-contained wireless
communication technology, it is widely spread all over the world to
allow users to stay connected almost anywhere on the earth.
• When the signal (a beam of modulated microwave) is sent near the
satellite then, the satellite amplifies the signal and sent it back to the
antenna receiver which is located on the surface of the earth.
• Satellite communication contains two main components like the space
segment and the ground segment.
• The ground segment consists of fixed or mobile transmission,
reception, and ancillary equipment and the space segment, which
mainly is the satellite itself.
Infrared Communication
• Infrared wireless communication communicates information in a
device or system through IR radiation.
• IR is electromagnetic energy at a wavelength that is longer than that of
red light.
• It is used for security control, TV remote control, and short-range
communications.
• In the electromagnetic spectrum, IR radiation lies between
microwaves and visible light. So, they can be used as a source of
communication.
Television and Radio Broadcasting
• Radio is considered to be the first wireless service to be broadcast.
• It is an example of a Simplex Communication System where the
information is transmitted only in one direction and all the users
receiving the same data.
Global Positioning System (GPS)
• GPS is solely a subcategory of satellite communication.
• GPS provides different wireless services like navigation, positioning,
location, speed etc. with the help of dedicated GPS receivers and
satellites.
Bluetooth
• Bluetooth is another important low range wireless communication
system.
• It provides data, voice and audio transmission with a transmission
range of 10 meters.
• Almost all mobile phones, tablets and laptops are equipped with
Bluetooth devices. They can be connected to wireless Bluetooth
receivers, audio equipment, cameras etc.
Wireless Local Area Network (WLAN)
• Wireless Local Area Network or WLAN (Wi-Fi) is an internet related
wireless service.
• Using WLAN, different devices like laptops and mobile phones can
connect to an access point and access internet.
Noise and Signals
Noise
• Noise can be defined as any unwanted signals, random or deterministic, which
interfere with the faithful reproduction of the desired signal in a system.
• Stated another way, any interfering signal, which is usually noticed as random
fluctuations in voltage or current tending to obscure and mask the desired signals is
known as noise.
• These unwanted signals arise from a variety of sources and can be classified as
man-made or naturally occurring.
• Man-made types of interference (noise) can practically arise from any piece of
electrical or electronic equipment and include such things as electromagnetic
pick-up of other radiating signals, inadequate power supply filtering or alias terms.
Man-made sources of noise all have the common property that their effect can be
eliminated or at least minimised by careful engineering design and practice.
• Interference caused by naturally occurring noise are not controllable in such a
direct way and their characteristics can best be described statistically. Natural noise
comes from random thermal motion of electrons, atmospheric absorption and
cosmic sources.
Signals & Noise
• In every case we have a signal, which is used to carry useful
information; and in every case there is noise, which enters the system
from a variety of sources and degrades the signal, reducing the quality
of the communication.
• Keeping the ratio between signal and noise sufficiently high is the
basis for a great deal of the work that goes into the design of a
communication system.
• This signal-to-noise ratio, abbreviated S/N and almost always
expressed in decibels, is an important specification of virtually all
communication systems.
Modulated Signals
• Given the necessity for modulating a higher-frequency signal with a
lower-frequency baseband signal, it is useful to look at the equation for a
sine-wave carrier and consider what aspects of the signal can be varied. A
general equation for a sine wave is:
Modulated Signals
• It is common to use radians and radians per second, rather than degrees and hertz,
in the equations dealing with modulation, because it makes the mathematics
simpler.
• Of course, practical equipment uses hertz for frequency indications. The
conversion is easy. Just remember from basic ac theory that
Noise
• It is not sufficient to transmit a signal from transmitter to receiver if
the noise that accompanies it is strong enough to prevent it from being
understood.
• All electronic systems are affected by noise, which has many sources.
• The most important noise component is thermal noise, which is
created by the random motion of molecules that occurs in all materials
at any temperature above absolute zero (0 K or −273° C).
• The thermal noise power is proportional to the bandwidth over which
a system operates. The equation is very simple:
Here the bandwidth refers to the range of frequencies over which the noise is observed.
• kelvins are equal to degrees Celsius in size; only the zero point on the scale
is different.
• Therefore, converting between degrees Celsius and kelvins is easy:
Example Problem 1
Signal to Noise Ratio (SNR)
SNR or signal-to-noise ratio is the ratio between the desired information or the power of a
signal and the undesired signal or the power of the background noise.
• Maintaining an adequate ratio of signal power to noise power is essential for any
communication system, though the exact definition of “adequate” varies greatly.
• Obviously there are two basic ways to improve S/N: increase the signal power or
reduce the noise power.
• Increasing signal power beyond a certain point can cause problems, particularly
where portable, battery powered devices are concerned.
• Reducing noise power requires limiting bandwidth and, if possible, reducing the
noise temperature of a system. The system bandwidth must be large enough to
accommodate the signal bandwidth, but should be no larger than that.
• Some modulation schemes are more efficient than others at transmitting information
with a given power and bandwidth.
Signal to Noise Ratio (SNR)
Noise Figure and Noise Temperature
• All of the above are expressed as power ratios, not in decibels. When a device has multiple stages, each stage contributes
noise, but the first stage is the most important because noise inserted there is amplified by all other stages.
For radio waves in free space the velocity is the same as that of light: 300 × 106 m/s.
c = ƒλ
Example 3
Practice Question
❑For instance, in the case of a heavy load in one cell and a light
load in a neighboring cell, it could make sense to ‘borrow’
frequencies.
❑Cells with more traffic are dynamically allotted more
frequencies.
cells.
Fig:2 Cellular system with three cell clusters and three sectors per cell
❑Cellular systems using CDM instead of FDM do not need
such elaborate channel allocation schemes and complex
frequency planning.
❑Here, users are separated through the code they use, not
through the frequency.
❑ The simple Aloha works fine for a light load and does not
require any complicated access mechanisms. On the classical
assumption1 that data packet arrival follows a Poisson
distribution, maximum throughput is achieved for an 18 per
cent load (Abramson, 1977), (Halsall, 1996).
Fig:5 Classical Aloha multiple access
Slotted Aloha
Slotted Aloha
❑ The first refinement of the classical Aloha scheme is provided
by the introduction of time slots (slotted Aloha).
❑ In this case, all senders have to be synchronized, transmission
can only start at the beginning of a time slot as shown in
Figure 3.6. Still, access is not coordinated.
❑ Under the assumption stated above, the introduction of slots
raises the throughput from 18 per cent to 36 per cent, i.e.,
slotting doubles the throughput.
1
Mobile phone subscribers worldwide
1600
1400
1200
Subscribers [million]
GSM total
1000 TDMA
total
CDMA
total
PDC total
800
Analogue total
W-CDMA
600
Total
wireless
Prediction (1998)
400
200
0
1996 1997 1998 1999 2000 2001 2002 2003 2004 year
2
Development of mobile telecommunication
systems
FDMA
CT0/1
AMPS
NMT CT2
IMT-FT LTE
LTE
IS-136 DECT advanced
TDMA
TDMA
EDGE IMT-SC
D-AMPS
IS-136HS
GSM GPRS
UWC-136
PDC
IMT-DS
UTRA FDD / W-CDMA
IMT-TC HSPA
UTRA TDD / TD-CDMA
CDMA
IMT-TC
TD-SCDMA
IS-95 IMT-MC
cdma2000 1X
cdmaOne cdma2000 1X EV-DO
1X EV-DV
1G 2G 2.5G 3G (3X) 3.9G 4G
GSM: Overview
• GSM
• formerly: Groupe Spéciale Mobile (founded 1982)
• now: Global System for Mobile Communication
• Pan-European standard (ETSI, European Telecommunications Standardization Institute)
• simultaneous introduction of essential services in three phases (1991, 1994, 1996) by the European
telecommunication administrations (Germany: D1 and D2)
seamless roaming within Europe possible
• Today many providers all over the world use GSM
(>220 countries in Asia, Africa, Europe, Australia, America)
• more than 4,2 billion subscribers in more than 700 networks
• more than 75% of all digital mobile phones use GSM
• over 29 billion SMS in Germany in 2008, (> 10% of the revenues for many operators) [be aware: these
are only rough numbers…]
4
Performance characteristics of GSM (wrt.
analog sys.)
• Communication
• mobile, wireless communication; support for voice and data services
• Total mobility
• international access, chip-card enables use of access points of different providers
• Worldwide connectivity
• one number, the network handles localization
• High capacity
• better frequency efficiency, smaller cells, more customers per cell
• High transmission quality
• high audio quality and reliability for wireless, uninterrupted phone calls at higher speeds
(e.g., from cars, trains)
• Security functions
• access control, authentication via chip-card and PIN
5
Disadvantages of GSM
• There is no perfect system!!
• no end-to-end encryption of user data
• no full ISDN bandwidth of 64 kbit/s to the user, no transparent B-channel
• reduced concentration while driving
• electromagnetic radiation
• abuse of private data possible
• roaming profiles accessible
• high complexity of the system
• several incompatibilities within the GSM standards
6
GSM: Mobile Services
• GSM offers
• several types of connections
• voice connections, data connections, short message service
• multi-service options (combination of basic services)
• Three service domains
• Bearer Services
• Telematic Services
• Supplementary Services
bearer services
MS
transit
source/
network
TE MT GSM-PLMN destination TE
(PSTN,
R, S Um network (U, S, R)
ISDN)
tele services
7
Bearer Services
• Telecommunication services to transfer data between
access points
• Specification of services up to the terminal interface (OSI
layers 1-3)
• Different data rates for voice and data (original standard)
• Transparent bearer service (use only physical layer to transmit data
– Forward error correction (FEC) only
circuit switched – constant delay and throughput
• Non transparent bearer service (use protocols of layer 2 and 3 to
implement error correction and flow control)
data service (packet switched)
• Today: data rates of approx. 50 kbit/s possible – (even more
with new modulation)
8
Tele Services I
• Telecommunication services that enable voice communication via mobile
phones
• All these basic services have to obey cellular functions, security
measurements etc.
• Offered services
• mobile telephony
primary goal of GSM was to enable mobile telephony offering the traditional
bandwidth of 3.1 kHz
• Emergency number
common number throughout Europe (112); mandatory for all service providers;
free of charge; connection with the highest priority (preemption of other
connections possible)
• Multinumbering
several ISDN phone numbers per user possible
9
Tele Services II
• Additional services
• Non-Voice-Teleservices
• group 3 fax
• voice mailbox (implemented in the fixed network supporting the mobile terminals)
• electronic mail (MHS, Message Handling System, implemented in the fixed network)
• ...
10
Supplementary services
• Services in addition to the basic services, cannot be offered
stand-alone
• Similar to ISDN services besides lower bandwidth due to the radio link
• May differ between different service providers, countries and
protocol versions
• Important services
• identification: forwarding of caller number
• suppression of number forwarding
• automatic call-back
• conferencing with up to 7 participants
• locking of the mobile terminal (incoming or outgoing calls)
11
Architecture of the GSM system
• GSM is a PLMN (Public Land Mobile Network)
• several providers setup mobile networks following the GSM standard within
each country
• components
• MS (mobile station)
• BS (base station)
• MSC (mobile switching center)
• LR (location register)
• subsystems
• RSS (radio subsystem): covers all radio aspects
• NSS (network and switching subsystem): call forwarding, handover, switching
• OSS (operation subsystem): management of the network
12
GSM System Architecture
• Radio Subsystem (RSS)
• Mobile Station (MS)
• Mobile Equipment (ME)
• Subscriber Identity Module (SIM)
• Base Station Subsystem (BSS)
• Base Transceiver Station (BTS)
• Base Station Controller (BSC)
• Network Switching Subsystem(NSS)
• Mobile Switching Center (MSC)
• Home Location Register (HLR)
• Visitor Location Register (VLR)
• Operation Subsystem (OSS)
• Operation and Maintenance Center (OMC)
• Authentication Center (AUC)
• Equipment Identity Register (EIR)
13
Ingredients 1: Mobile Phones, PDAs & Co.
14
Ingredients 2: Antennas
Cabling
Microwave links
Ingredients 3: Infrastructure 2
Not „visible“, but
comprise the major part
of the network (also
from an investment
point of view…)
Management
Data bases
Switching units
Monitoring
17
GSM Architecture
MS: Mobile Station
BSS: Base Station Subsystem
BSC: Base Station Controller
BTS: Base Transceiver Station
TRX: Transceiver
MSC: Mobile Switching Centre
• Three Subsystems:
– The Radio Subsystem
– The Network and Switching Sub-system (NSS) – comprising an MSC and associated registers
– The Operation Subsystem
18
GSM: elements and interfaces
radio cell
M M BSS
S S
Um radio cell
BT M
RSS S
S
BT
S
Abis
BS BS
C C
A
MS MS
C C
NSS VL VL signaling
R R
HL GM ISDN, PSTN
R SC
IW PDN
F
O
OSS AU OM
EIR
C C
19
GSM: system architecture
radio network and fixed
subsystem switching subsystem partner networks
MS MS
ISDN
PSTN
MS
Um C
BT Abis
S BS
BT C EIR
S
SS7
HL
R
BT VL
S R
BS
BT C MS ISDN
S A C IW PSTN
BSS F
PSPDN
CSPDN
20
System Architecture: Radio Subsystem
radio network and
subsystem switching
subsystem
• Components
MS MS
• MS (Mobile Station)
• BSS (Base Station Subsystem):
consisting of
Um • BTS (Base Transceiver Station):
sender and receiver
BT Abis
S BS • BSC (Base Station Controller):
BT C
MSC controlling several transceivers
S
• Interfaces
• Um : radio interface
• Abis : standardized, open interface with
BT A 16 kbit/s user channels
S BS MSC • A: standardized, open interface with
BT C 64 kbit/s user channels
S
BSS
21
Radio Subsystem
• The Radio Subsystem (RSS) comprises the cellular
mobile network up to the switching centers
• Components
• Mobile Stations (MS)
22
RSS: The Mobile Station (MS)
• The mobile station consists of:
• Mobile Equipment (ME)
• Subscriber Identity Module (SIM)
• The SIM stores all specific data that is relevant to GSM - permanent and
temporary data about the mobile, the subscriber and the network,
including:
• The International Mobile Subscriber Identity (IMSI)
• MS ISDN number of subscriber (phone number)
• Authentication key and algorithms for authentication check
• Charging information, list of subscribed services
• Personal identity number (PIN), and PIN unblocking key (PUK)
• Temporary location information while logged onto GSM system
• Temporary mobile subscriber identity (TMSI)
• Location area identification (LAI)
23
RSS: The Mobile Station (MS)
• The mobile equipment has a unique International Mobile Equipment
Identity (IMEI), which is used for theft protection
• Without the SIM, only emergency calls are possible
• For GSM 900, MS transmits power of up to 2W, for GSM 1800 1W
due to smaller cell-size
• MS can also have other components and services for the user
(display, loudspeaker, Bluetooth interface, IrDA,...etc). These are non
GSM features.
24
RSS: The Base Station Sub-System (BSS)
• A GSM network comprises many BSSs.
• The BSS performs all the functions necessary to
maintain radio connection to an MS
(coding/decoding of voice, rate adaptation,…)
• Base Station Subsystem is composed of two parts
that communicate across the standardized Abis
interface allowing operation between components
made by different suppliers:
• Base Station Controller (BSC)
• One or more Base Transceiver Stations (BTSs)
• BTS contains:
• Radio Transmitter/Receiver (TRX)
• Signal processing and control equipment
• Antennas and feeder cables 25
RSS: The Base Station
• The purpose of the BTS is to:
Sub-System (BSS)
• Provide radio access to the mobile stations
• Manage the radio access aspects of the system
• Encode, encrypt, multiplex, modulate and feed the RF signals to the
antenna.
• Frequency hopping
• Communicates with Mobile station and BSC
• The BSC:
• Allocates a channel for the duration of a call
• Maintains the call:
• Monitoring quality
• Controlling the power transmitted by the BTS or MS
• Generating a handover to another cell when required
• BTSs can be linked to parent BSC by microwave, optical fiber or cable
26
Network and switching subsystem (NSS)
• NSS is the main component and the heart of the GSM
system
• Connects the wireless network with standard public networks
(manages communication between GSM and other networks)
• Performs handover between different BSSs
• Supports roaming of users between different providers in
different countries
• Performs functions for worldwide localization of users
• Charging and billing information, accounting information
HLR fixed
GMSC
NSS network
BSC
BSC 28
NSS - Mobile Services Switching Center
• MSCs are high-performance digital ISDN switches
• They set-up and control connections to other
MSCs and to BSCs via the A-interface
• They form the backbone network of a GSM
system
• Typically, an MSC manages several BSCs in a
geographical region
• Controls all connections via a separated network
to/from a mobile terminal within the domain of
the MSC
29
NSS - Mobile Switching Centre (MSC)
• Functions of the MSC:
• Switching calls, controlling calls and logging calls
• specific functions for paging and call forwarding
• mobility specific signaling
• Mobility management over the radio network and other networks.
• Radio Resource management – handovers between BSCs
• Billing Information
• location registration and forwarding of location information
• provision of new services (fax, data calls)
• support of short message service (SMS)
• generation and forwarding of accounting and billing information
• Interface with PSTN, ISDN, PSPDN - interworking functions via Gateway
MSC (GMSC)
30
NSS - MSC- Gateway Mobile Switching Centre
(GMSC)
• The GMSC accesses the network’s HLR to find the location of the
required mobile subscriber
33
NSS- Visitor Location Register (VLR)
• Each MSC has a VLR
• VLR is a dynamic local database which stores all important information
needed for MS users currently in the LA (location area) associated to the
MSC (the domain of the VLR)
• If a new MS comes into the LA of the VLR, it copies all relevant
information for this user from the HLR, and stores this data temporarily.
• Information stored includes:
– International Mobile Subscriber Identity (IMSI)
– Mobile Station ISDN Number (MSISDN)
– Mobile Station Roaming Number (MSRN)
– Temporary Mobile Station Identity (TMSI)
• Local Mobile Station Identity
– The location area where the mobile station has been registered
– Supplementary service parameters
Operation Subsystem (OSS)
• The OSS (Operation Subsystem) enables centralized
operation, management, and maintenance of all GSM
subsystems. It accesses other components via SS7
signaling. It consists of the following three components:
• Operation and Maintenance Center (OMC)
• Authentication Center (AuC)
• Equipment Identity Register (EIR)
35
OSS – Authentication Center (AuC)
• Authentication Center (AuC)
• A separate AuC is defined to protect user
identity and data transmission (wireless
part)
• authentication parameters used for
authentication of mobile terminals and
encryption of user data on the air
interface within the GSM system
• generates user specific authentication
parameters on request of a VLR
• Situated in a special protected part of the
HLR
36
OSS – Equipment Identity Register (EIR)
• EIR is a database for all IMEI (International Mobile
Equipment Identity). It stores all device
identifications registered for this network
• The EIR controls access to the network by returning the status of a mobile
in response to an IMEI query
37
The Radio Interface
• The most interesting interface in GSM is Um the radio interface.
• GSM implements SDMA using cells with BTS and assigns an MS to a BTS
• FDD is used to separate uplink and downlink
• TDM is also used and media access combines TDMA & FDMA
• In GSM 900, 124 channels uplink + 124 channels downlink, each 200KHz wide, are
used for FDMA
• Each of the 248 channels is further divided into frames that are repeated
continuously. The duration of the frame is 4.615 ms
• Each frame is subdivided into 8 GSM timeslots, where each slot represents a
physical channel and lasts for 577 µsec. Each TDM channel occupies the 200 KHz
carrier for 577 µsec every 4.615 ms
• Data is transmitted in small portions called bursts, the burst is only 546.5 µsec long
and contains 148 bits. The remaining 30.5 µsec are used as guard space to avoid
overlapping with other bursts.
38
GSM - TDMA/FDMA
935-960 MHz
124 channels (200 kHz)
downlink
y
nc
ue
890-915 MHz
eq
124 channels (200 kHz)
fr uplink
higher GSM frame structures
time
1 2 3 4 5 6 7 8
4.615 ms
39
Cellular Networks Terminology
• Operation
• Initialisation: when handset is turned on it selects a
channel and connects to the switch
• Paging: switch must locate a mobile by broadcasting
requests from base stations
• Handoff: switches must be able to move calls between
cells when mobile moves
• Blocking/Dropping: calls may be blocked or dropped if
conditions in a cell change
• Interworking: calls may be placed to other networks or
may allow users to roam into other networks
40
GSM- Logical channels
• GSM specifies two basic groups of logical channels:
• Traffic channels (TCH): to transmit user data (e.g., voice, fax,
SMS,..)
• Control Channel (CCH): many different CCHs are used in GSM
system to control medium access, allocation of traffic channels,
or mobility management. The following three groups of CCH
have been defined:
• Broadcast control channel (BCCH) : A BTS used this channel to signal
information to all MSs within a cell (e.g. Cell identifier)
• Common control channel (CCCH): All information regarding connection
setup between MS and BS is exchanged via the CCCH (e.g. paging
request) – random access scheme (ALOHA)
• Dedicated control channel (DCCH): Before establishing a TCH, an MS and
BTS uses this bidirectional channel for signalling (e.g. authentication)
41
GSM Operation: Localization & Calling
• One fundamental feature of GSM is the automatic worldwide
localization of users
• The system always know where a user currently is, and the same
phone number is valid worldwide.
• To provide this service, GSM performs periodic location updates even
if a user doesn’t use the MS (still logged in GSM and not switched
off).
• The HLR always contain information about the current location (the
LA, not the precise geographical location)
• The VLR responsible for the MS informs the HLR about location
changes.
• As soon as an MS moves into the range of a new VLR, the HLR sends
all user data needed to the new VLR
• Changing VLRs with uninterrupted availability of all services is called
handover - roaming
Localization & Calling (cont)
• Internal:
• Channels (time slots) in the same cell
• Cells within the same BSS (same BSC)
• External:
• Cells in different BSSs (different BSCs) but
under the control of the same MSC
• Cells under the control of different MSCs
4 types of handover
1
2 3 4
M M M M
S S S S
MSC MSC
1. Intra-cell handover (channels, time-slots within the same cell – e.g. because of
narrow band interference with some frequencies)
2. Inter-cell, intra-BSC handover (cells within the same BSS, BSC)
3. Inter-BSC, intra-MSC handover (cells in different BSS but under control of same
MSC)
4. Inter MSC handover (cells under control of different MSCs)
Handover Decision
• Handover decision is based on the following
parameters (in priority order):
• Received signal quality (signal level + bit-error rate)
• Received signal strength
• Distance of MS from BTS
• Drops below power budget margin
• Each operator has a operator-defined threshold and
handover decisions can be based on one or a
combination of the parameters
• Handover metrics:
• Call blocking/dropping/completion probability
• Probability of successful handoff
• Handoff rate/delay
• Interruption duration
Handover decision
receive level receive level
BTSold BTSnew
HO_MARGIN
M M
S S
BTSold BTSnew
HO decision
HO required HO request
resource
allocation
ch. activation
HO complete HO complete
clear command clear command
clear complete clear complete
Hard handover
Roaming
• Allows subscriber to travel to different network areas, different operator’s networks, different
countries – keeping the services and features they use at home
• Billing is done through home network operator, who pays any other serving operator involved
• Clearing house companies carry out data validation on roamer data records, billing of home
network operations and allocation of payments
Roaming process
• Each mobile network has its own HLR and VLRs. When an MSC detects a
mobile user’s presence in the area covered by its network, it first checks
the HLR database to determine if the user is in his/her home area or is
roaming, i.e., the user is a visitor.
• User in Home Area: HLR has the necessary information for initiating,
terminating, or receiving a call.
• User is Roaming: VLR contacts the user’s HLR to get the necessary
information to set up a temporary user profile.
• When a user receives a call while roaming within another network MSC
• Home GMSC contacts the HLR to determine the appropriate switch in the
roaming area to handle the arriving call and then transfers the call to the
roaming area MSC.
Security in GSM
• Security services
• access control/authentication
• user SIM (Subscriber Identity Module): secret PIN (personal identification number)
• SIM network: challenge response method
• confidentiality
• voice and signaling encrypted on the wireless link (after successful authentication)
• anonymity
• temporary identity TMSI (Temporary Mobile Subscriber Identity)
• newly assigned at each new location update
• encrypted transmission
“secret”:
• 3 algorithms specified in GSM • A3 and A8
available via the
• A3 for authentication (“secret”, open interface) Internet
• A5 for encryption (standardized) • network
providers can use
• A8 for cipher key generation used in A5(“secret”, stronger
open interface) mechanisms
• Algorithms A3, A8 are located on the SIM and the AuC and can be proprietary.
A5 is implemented in device and should be identical for all providers.
GSM - authentication
mobile network SIM
RAND
Ki RAND RAND Ki
A3 A3
SIM
SRES* 32 bit SRES 32 bit
SRES* =? SRES
MSC SRES
SRES 32 bit
RAND
Ki RAND RAND Ki
AC 128 bit 128 bit 128 bit 128 bit SIM
A8 A8
cipher Kc
key 64 bit Kc
64 bit
data encrypted SRES
data
BSS
data MS
A5 A5
Authentication & Encryption
3
7
5 4
6
Evolution Of GSM
• 2nd Generation
• GSM -9.6 Kbps (data rate)
• 2.5 Generation
• HSCSD (High Speed Circuit Switched Data)
• Data rate : 76.8 Kbps (9.6 x 8 kbps)
• GPRS (General Packet Radio Service)
• Data rate: 14.4 - 115.2 Kbps
• EDGE (Enhanced Data rate for GSM Evolution)
• Data rate: 547.2 Kbps (max)
• 3rd Generation
• UMTS - WCDMA(Wide band CDMA)
• Data rate : 0.348 – 2.0 Mbps
Data services in GSM
• Data transmission standardized with only 9.6 kbit/s.
Advanced coding allows 14.4 kbit/s
• not enough for Internet and multimedia applications
• GSM is circuit switching connected-oriented mechanism.
This is not suitable for data transmission which is bursty
in nature and requires higher bandwidth
• Web-browsing leaves the channel idle most of the time, so
allocation of channel permanently waste too much resources
• Billing is based upon time allocation of channels which is not
suitable for data services
• Two basic approaches have been proposed:
• HSCSD (High-Speed Circuit Switched Data)
• GPRS (General Packet Radio Service)
HSCSD (High-Speed Circuit Switched
Data) – 2.5 Generation
• Higher data are achieved by bundling several TCHs
• An MS requests one or more TCHs from the GSM
network, i.e., it allocates several TDMA slots within a
TDMA frame– the allocation could be asymmetrical
(more slots on downlink than in uplink)
• Mainly software update in MS and MSC
• An MS can use up to 8 slots within the frame to
achieve up to115.2 Kbit/s
• advantage: ready to use, constant quality, simple
• disadvantage: Still circuit switching same problems,
high price and wasting of resources- channels blocked
for voice transmission – handover for all channels
General Packet Radio Service- GPRS (2.5
G)
• General Packet Radio Service (GPRS) is a new
bearer service for GSM that greatly improves and
simplifies wireless access to packet data networks,
• It uses the existing GSM network to transmit and
receive TCP/IP based data to and from GPRS
mobile devices.
• GPRS is a non-voice service added to existing
TDMA time division multiple
• access networks, one of the 2.5G technology
upgrades. TDMA is the underlying transport
mechanism used by GSM networks.
General Packet Radio Service- GPRS (2.5
G)
• Fully packet-oriented switching
• Standardization 1998, introduction 2001
• Using free slots only if data packets ready to send
(e.g., 50 kbit/s using 4 slots temporarily)
• Users are always ON – Charging on volume not on connection
time
• Advantage: one step towards UMTS, more flexible
• Disadvantage: more investment needed (new hardware)
• GPRS network elements
• GSN (GPRS Support Nodes): GGSN and SGSN (routers)
• GGSN (Gateway GSN)
• interworking unit between GPRS and PDN (Packet Data Network)
• SGSN (Serving GSN)
• supports the MS (location, billing, security)
• GR (GPRS Register)
• user addresses
General Packet Radio Service- GPRS (2.5
G)
• High Speed (Data Rate 14.4 – 115 kbps)
• Efficient use of radio bandwidth (Statistical Multiplexing)
• Circuit switching & Packet Switching can be used in
parallel
• Constant connectivity
GPRS Architecture and Interfaces SGS
N
Gn
Um Gb Gn Gi
HLR
MSC /
GR
VLR EIR
Towards 3G: EDGE Technology
• EDGE improves the GPRS architecture by employing a new
modulation method and link quality control. 8-PSK is a high-level
linear modulation method that carries three times more information
through an extended signal constellation.
• The link quality control dynamically selects the modulation and
coding scheme for transmission of data over the air interface. Thus
the EDGE user bit-rates increase with better quality.
Towards 3G: CDMA
• Capacity is CDMA's biggest asset. It can accommodate more users per MHz of
bandwidth than any other technology ( 3 to 5 times more than GSM)
• CDMA has no built-in limit to the number of concurrent users.
• CDMA do not limit the distance a tower can cover.
• CDMA consumes less power and covers large areas so cell size in CDMA is larger.
• CDMA is able to produce a reasonable call with lower signal (cell phone reception)
levels.
• CDMA uses Soft Handoff, reducing the likelihood of dropped calls.
• CDMA's variable rate voice coders reduce the rate being transmitted when
speaker is not talking, which allows the channel to be packed more efficiently.
• Has a well-defined path to higher data rates.
ITU’s View of Third-Generation Capabilities
• Voice quality comparable to the public switched
telephone network
• 144 kbps data rate available to users in high-speed
motor vehicles over large areas
• 384 kbps available to pedestrians standing or moving
slowly over small areas
• Support for 2.048 Mbps for office use
• Symmetrical / asymmetrical data transmission rates
• Support for both packet switched and circuit switched
data services
ITU’s View of Third-Generation Capabilities
• An adaptive interface to the Internet to reflect efficiently the common
asymmetry between inbound and outbound traffic
• More efficient use of the available spectrum in general
• Support for a wide variety of mobile equipment
• Flexibility to allow the introduction of new services and technologies
UMTS
• UMTS – Universal Mobile Telephone System
• Most popular 3G wireless standard.
• Combines the infrastructure of the GSM network with superior
technology of the CDMA air interface.
• UMTS was originally a European standard.
• Not just an improvement of 2G networks.
• Requires new equipment and new frequency bandwidths
UMTS Aims
• Broadband access around 2Mbit/s
• Mobile or fixed access
• Service transparency
• Mass market provision at low (?) cost
• Variety of tariffs in 2011
© www.ericsson.com
UNIT 4
MOBILE IP-Part-I
Motivation for Mobile IP
Routing
• based on IP destination address, network prefix (e.g. 129.13.42) determines
physical subnet
• change of physical subnet implies change of IP address to have a topological
correct address (standard IP) or needs special entries in the routing tables
Specific routes to end-systems?
• change of all routing table entries to forward packets to the right destination
• does not scale with the number of mobile hosts and frequent changes in the
location, security problems
Changing the IP-address?
• adjust the host IP address depending on the current location
• almost impossible to find a mobile system, DNS updates take to long time
• TCP connections break, security problems
Requirements to Mobile IP (RFC 3344, was: 3220, was: 2002)
Transparency
• mobile end-systems keep their IP address
• continuation of communication after interruption of link possible
• point of connection to the fixed network can be changed
Compatibility
• support of the same layer 2 protocols as IP
• no changes to current end-systems and routers required
• mobile end-systems can communicate with fixed systems
Security
• authentication of all registration messages
Efficiency and scalability
• only little additional messages to the mobile system required (connection
typically via a low bandwidth radio link)
• world-wide support of a large number of mobile systems in the whole
Internet
Terminology
Mobile Node (MN)
• system (node) that can change the point of connection
to the network without changing its IP address
Home Agent (HA)
• system in the home network of the MN, typically a router
• registers the location of the MN, tunnels IP datagrams to the COA
Foreign Agent (FA)
• system in the current foreign network of the MN, typically a router
• forwards the tunneled datagrams to the MN, typically also the default router
for the MN
Care-of Address (COA)
• address of the current tunnel end-point for the MN (at FA or MN)
• actual location of the MN from an IP point of view
• can be chosen, e.g., via DHCP
Correspondent Node (CN)
• communication partner
Example network
HA
MN
router
end-system router
Data transfer to the mobile system
HA
2
MN
FA foreign
network
FA foreign
network
receiver
Overview COA
foreign
Internet network
C
router
N
3.
home router router M
2. FA N
network HA 4.
foreign
Internet network
1.
C
router
N
Network integration
Agent Advertisement
• HA and FA periodically send advertisement messages into their physical
subnets
• MN listens to these messages and detects, if it is in the home or a foreign
network (standard case for home network)
• MN reads a COA from the FA advertisement messages
Registration (always limited lifetime!)
• MN signals COA to the HA via the FA, HA acknowledges via FA to MN
• these actions have to be secured by authentication
Advertisement
• HA advertises the IP address of the MN (as for fixed systems), i.e. standard
routing information
• routers adjust their entries, these are stable for a longer time (HA responsible
for a MN over a longer period of time)
• packets to the MN are sent to the HA,
• independent of changes in COA/FA
Agent advertisement
0 7 8 15 16 23 24 31
type code checksum
#addresse
addr. size lifetime
s
router address 1
preference level 1
router address 2
preference level 2
...
type = 16
length = 6 + 4 * #COAs type = 16 length sequence number
R: registration required registration lifetime R B H F MG r T
reserved
B: busy, no more registrations COA 1
H: home agent COA 2
F: foreign agent ...
M: minimal encapsulation
G: GRE encapsulation
r: =0, ignored (former Van Jacobson compression)
T: FA supports reverse tunneling
reserved: =0, ignored
Registration
MN r FA HA MN r HA
egis egis
requ tration requ tration
e st es t
regi
s
requ tration
est
on
g i s trati
re
y
n repl
i s tratio
reg
repl
y t
tion
stra
regi
y
repl
t
Mobile IP registration request
0 7 8 15 16 23 24 31
T
type = 1 S B D MGr lifetime
x
home address
home agent
COA
identification
extensions . . .
S: simultaneous bindings
B: broadcast datagrams
D: decapsulation by MN
M mininal encapsulation
G: GRE encapsulation
r: =0, ignored
T: reverse tunneling requested
x: =0, ignored
Mobile IP registration reply
0 7 8 15 16 31
type = 3 code lifetime
home address
home agent
identification
Example codes: extensions . . .
registration successful
0 registration accepted
1 registration accepted, but simultaneous mobility bindings unsupported
registration denied by FA
65 administratively prohibited
66 insufficient resources
67 mobile node failed authentication
68 home agent failed authentication
69 requested Lifetime too long
registration denied by HA
129 administratively prohibited
131 mobile node failed authentication
133 registration Identification mismatch
135 too many simultaneous mobility bindings
Encapsulation
original IP
original data
header
GRE original
outer header original data
header header
Triangular Routing
• sender sends all packets via HA to MN
• higher latency and network load
“Solutions”
• sender learns the current location of MN
• direct tunneling to this location
• HA informs a sender about the location of MN
• big security problems!
Change of FA
• packets on-the-fly during the change can be lost
• new FA informs old FA to avoid packet loss, old FA now forwards remaining
packets to new FA
• this information also enables the old FA to release resources for the MN
Change of foreign agent
CN HA FAold FAnew MN
Data Data
MN changes
location
Update Registration
ACK
Data
Data Data
Warning
Request
Update
ACK
Data
Data
t
Reverse tunneling (RFC 3024, was: 2344)
HA
2
MN
FA foreign
network
1. MN sends to FA
3 2. FA tunnels packets to HA
CN by encapsulation
3. HA forwards the packet to the
receiver (standard case)
receiver
Mobile IP with reverse tunneling
Mobile IP was developed for IPv4, but IPv6 simplifies the protocols
• security is integrated and not an add-on, authentication of registration is
included
• COA can be assigned via auto-configuration (DHCPv6 is one candidate), every
node has address autoconfiguration
• no need for a separate FA, all routers perform router advertisement which
can be used instead of the special agent advertisement; addresses are always
co-located
• MN can signal a sender directly the COA, sending via HA not needed in this
case (automatic path optimization)
• „soft“ hand-over, i.e. without packet loss, between two subnets is supported
• MN sends the new COA to its old router
• the old router encapsulates all incoming packets for the MN and forwards them to the
new COA
• authentication is always granted
Problems with mobile IP
Security
• authentication with FA problematic, for the FA typically belongs to another
organization
• no protocol for key management and key distribution has been standardized
in the Internet
• patent and export restrictions
Firewalls
• typically mobile IP cannot be used together with firewalls, special set-ups are
needed (such as reverse tunneling)
QoS
• many new reservations in case of RSVP
• tunneling makes it hard to give a flow of packets a special treatment needed
for the QoS
Security, firewalls, QoS etc. are topics of current research and
discussions!
Security in Mobile IP
FA MH
response:
EHA-FA {session key}
EHA-MH {session key}
HA
Application
• simplification of installation and maintenance of networked computers
• supplies systems with all necessary information, such as IP address, DNS
server address, domain name, subnet mask, default router etc.
• enables automatic integration of systems into an Intranet or the Internet,
can be used to acquire a COA for Mobile IP
Client/Server-Model
• the client sends via a MAC broadcast a request to the DHCP server (might be
via a DHCP relay) DHCPDISCOVER
DHCPDISCOVER
server client
client relay
DHCP - protocol mechanisms
server client server
(not selected) initialization (selected)
DHCPDISCOVER DHCPDISCOVER
determine the determine the
configuration configuration
DHCPOFFER DHCPOFFER
collection of replies
time
selection of configuration
DHCPREQUEST DHCPREQUEST
(reject) (options) confirmation of
configuration
DHCPACK
initialization completed
release
DHCPRELEASE delete context
DHCP characteristics
Server
• several servers can be configured for DHCP, coordination not yet
standardized (i.e., manual configuration)
Renewal of configurations
• IP addresses have to be requested periodically, simplified protocol
Options
• available for routers, subnet mask, NTP (network time protocol) timeserver,
SLP (service location protocol) directory,
DNS (domain name system)
•IEEE 802.11
•802.11 a and 802.11b
•HIPERLAN
•Bluetooth Architecture
•802.15
Introduction
• IEEE 802.11 is part of the IEEE 802 set of local area
network (LAN) technical standards, and specifies the set of medium
access control (MAC) and physical layer (PHY) protocols for
implementing wireless local area network (WLAN) computer
communication.
• IEEE 802.11 is used in most home and office networks to
allow laptops, printers, smartphones, and other devices to
communicate with each other and access the Internet without
connecting wires.
2
Two different basic transmission
technologies can be used to set up WLANs
• Infra red - at 900 nm wavelength
• radio transmission - in the GHz range
Types of WLAN
• Infrastructure Networks
• Ad-hoc Networks
3
Infrastructure networks
4
Ad-hoc networks
5
IEEE 802.11 Features
• Need ways to share spectrum among multiple users and multiple LANs -
Spread Spectrum (CDMA)
• Supports Three different Physical layers:
• Direct Sequence (DS) spread spectrum using ISM band
• Frequency Hopping (FH) spread spectrum using ISM band
• Diffused Infrared (850-900 nm) bands
• Support multiple priorities
• Support time-critical and data traffic
• Power management allows a node to doze off
6
Architecture
• The architecture of the IEEE 802.11 WLAN is designed to support a
network where most decision making is distributed to mobile stations.
• Advantages. It is tolerant of faults in all of the WLAN equipment and
eliminates possible bottlenecks a centralized architecture would introduce.
• The architecture is flexible and can easily support both small, transient
networks and large, semipermanent or permanent networks.
• In addition, the architecture and protocols offer significant power saving
and prolong the battery life of mobile equipment without losing network
connectivity
7
Architecture(Contd..)
• Two network architectures are defined in the IEEE 802.11 standard:
• Infrastructure network: An infrastructure network is the network
architecture for providing communication between wireless clients and
wired network resources. The transition of data from the wireless to wired
medium occurs via an AP.
• Point-to-point (ad-hoc) network: An ad-hoc network is the architecture that
is used to support mutual communication between wireless clients.
Typically, an ad-hoc network is created spontaneously and does not
support access to wired networks. An ad-hoc network does not require an
AP.
8
Architecture(Contd..)
9
Architecture(Contd..)
• IEEE 802.11 supports three basic topologies for WLANs, the independent
basic service set (IBSS), the basic service set, and the extended service set
(ESS).
• The MAC layer supports implementations of IBSS, basic service set, and
ESS configuration.
• Independent basic service set: The IBSS configuration is referred to as an
independent configuration or an ad-hoc network. An IBSS configuration is
analogous to a peer-to-peer office network in which no single node is
required to act as a server.
10
Architecture(Contd..)
• Basic service set: The basic service set configuration relies on an AP that
acts as the logical server for a single WLAN cell or channel.
• Extended service set: The ESS configuration consists of multiple basic
service set cells that can be linked by either wired or wireless backbones
called a distributed system.
11
Medium Access Control
The basic services provided by the MAC layer are the mandatory
asynchronous data service and an optional time-bounded service.
Functionality;
• Reliable data delivery
• Fairly control access
• Protection of data
Deals;
• Noisy and unreliable medium
• Frame exchange protocol - ACK
• Overhead to IEEE 802.3 -
• Hidden Node Problem – RTS/CTS
• Participation of all stations
• Reaction to every frame
MAC access mechanisms for IEEE 802.11
1. The mandatory basic method based on a version of CSMA/CA,
2. an optional method avoiding the hidden terminal problem, and
3. finally a contention-free polling method for time-bounded service.
1& 2 are summarized as distributed coordination function (DCF), DCF only
offers asynchronous service
3rd method is called point coordination function (PCF)., PCF offers both
asynchronous and time-bounded service but needs an access point to
control medium access and to avoid contention.
The MAC mechanisms are also called distributed foundation wireless
medium access control (DFWMAC).
13
MAC
• Retry Counters
• Short retry counter
• Long retry counter
• Lifetime timer
• Basic Access Mechanism
• CSMA/CA
• Binary exponential back-off
• NAV – Network Allocation Vector
• Timing Intervals: SIFS, Slot Time, PIFS, DIFS, EIFS
• DCF Operation
• PCF Operation
Short inter-frame spacing (SIFS):
PCF inter-frame spacing (PIFS):
15
DFWMAC-DCF using CSMA/CA
16
DFWMAC–DCF with several competing
senders
17
DCF Operation
PCF Operation
• Poll – eliminates contention
• PC – Point Coordinator
• Polling List
• Over DCF
• PIFS
• CFP – Contention Free Period
• Alternate with DCF
• Periodic Beacon – contains length of CFP
• CF-Poll – Contention Free Poll
• NAV prevents during CFP
• CF-End – resets NAV
Frame Types
● NAV information
Or
● Short Id for Upper layer data
PS-Poll ● 2048 byte max
● 256 upper layer
header
Sequenc
Duration Address Address Address Address
FC e DATA FCS
/ID 1 2 3 4
Control
2 2 6 6 6 2 6 0-2312 4 bytes
• Pre authentication
• Scans and initiate an authentication
• Reduces the time
802.11a and 802.11b
• 802.11a − This is an extension to 802.11 that pertains to wireless
LANs and goes as fast as 54 Mbps in the 5-GHz band.
• 802.11a employs the orthogonal frequency division multiplexing
(OFDM) encoding scheme as opposed to either FHSS or DSSS.
• 802.11b − The 802.11 high rate WiFi is an extension to 802.11 that
pertains to wireless LANs and yields a connection as fast as 11 Mbps
transmission in the 2.4-GHz band.
• The 802.11b specification uses only DSSS.
32
33
HIPERLAN:
HIgh PErformance Radio
Local Area Networks
▪ Two main standards families for Wireless Lan:
▪ IEEE 802.11 (802.11b, 802.11a, 802.11g...)
▪ ETSI Hiperlan (Hiperlan Type 1, Type 2, HiperAccess, HiperLink...)
▪ HiperLAN Family
34
Hiperlan2 System Overview
▪ Features
▪ 5 GHz technology, up to 54 Mbit/s
▪ Generic architecture supporting:
Ethernet, IEEE 1394, ATM, 3G etc
▪ Connection-oriented with QoS per conn.
▪ Security - authentication & encryption
▪ Plug-and-play radio network using DFS
▪ Optimal throughput scheme
Architecture
CL
PHY MAC
DLC
HiperLAN Type 1 Reference Model
PHY
47
Bluetooth Architecture
The architecture of bluetooth defines two types of networks:
1. Piconet
2. Scatternet
48
Piconet
• Piconet is a type of bluetooth network that contains one primary
node called master node and seven active secondary nodes called
slave nodes.
• There are total of 8 active nodes which are present at a distance of 10
metres.
• The communication between the primary and secondary node can be
one-to-one or one-to-many.
• Possible communication is only between the master and slave;
Slave-slave communication is not possible. It also have 255 parked
nodes, these are secondary nodes and cannot take participation in
communication unless it get converted to the active state.
49
Scatternet
• It is formed by using various piconets. A slave that is present in one
piconet can be act as master.
• This kind of node can receive message from master in one piconet and
deliver the message to its slave into the other piconet where it is acting
as a slave. This type of node is refer as bridge node. A station cannot
be master in two piconets.
50
802.15
51
Thank you
UNIT 5
2
MANET
3
Characteristics of MANET
• Dynamic Topologies:
Network topology which is typically multi hop, may change randomly and rapidly with time, it can form
unidirectional or bi-directional links.
• Limited Security:
Wireless networks are more prone to security threats. A centralized firewall is absent due to its distributed nature of
the operation for security, routing, and host configuration.
4
MANET Routing Protocols
5
Pro-active routing protocols
• Each mobile node maintains a separate routing table which contains the
information of the routes to all the possible destination mobile nodes.
• Since the topology in the mobile ad-hoc network is dynamic, these routing tables
are updated periodically as and when the network topology changes.
• Destination Sequenced Distance Vector Routing Protocol (DSDV):
It is a pro-active/table driven routing protocol.
• Distance vector routing protocol was not suited for mobile ad-hoc networks due to
count-to-infinity problem. Hence, as a solution Destination Sequenced Distance
Vector Routing Protocol (DSDV) came into picture.
• Destination sequence number is added with every routing entry in the routing table
maintained by each node.
• A node will include the new update in the table only if the entry consists of the new
updated route to the destination with higher sequence number.
6
Global State Routing (GSR)
• Global State Routing (GSR):
It is a pro-active/table driven routing protocol.
• Link state routing protocol was not suited for mobile ad-hoc networks
because in it, each node floods the link state routing information directly into
the whole network i.e. Global flooding which may lead to the congestion of
control packets in the network.
• Hence, as a solution Global State Routing Routing Protocol (GSR) came into
the picture.
• Global state routing doesn’t flood the link state routing packets globally into
the network.
• In GSR, each of the mobile node maintains one list and three tables namely,
adjacency list, topology table, next hop table and distance table.
7
Reactive routing protocols
• The process of route discovery occurs by flooding the route request packets
throughout the mobile network. It consists of two major phases namely, route
discovery and route maintenance.
1. Dynamic Source Routing protocol (DSR):
It is a reactive/on-demand routing protocol. In this type of routing, the route is
discovered only when it is required/needed.
It consists of two phases:
1. Route Discovery:
This phase determines the most optimal path for the transmission of data
packets between the source and the destination mobile nodes.
2. Route Maintenance:
This phase performs the maintenance work of the route as the topology in the
mobile ad-hoc network is dynamic in nature and hence, there are many cases
of link breakage resulting in the network failure between the mobile nodes.
8
Ad-Hoc On Demand Vector Routing
protocol (AODV):
• Ad-Hoc On Demand Vector Routing protocol (AODV):
It is a reactive/on-demand routing protocol.
• It is an extension of dynamic source routing protocol (DSR) and it helps to remove
the disadvantage of dynamic source routing protocol.
• In DSR, after route discovery, when the source mobile node sends the data packet
to the destination mobile node, it also contains the complete path in its header.
• Hence, as the network size increases, the length of the complete path also increases
and the data packet’s header size also increases which makes the whole network
slow.
• Hence, Ad-Hoc On Demand Vector Routing protocol came as solution to it. The
main difference lies in the way of storing the path, AODV stores the path in the
routing table whereas DSR stores it in the data packet’s header itself.
• It also operates in two phases in the similar fashion: Route discovery and Route
maintenance.
9
Hybrid Routing protocol
10
AoDV Routing
• AODV enables “dynamic, self-starting, multi-hop routing between
mobile nodes wishing to establish and maintain an ad hoc network”.
• AODV allows for the construction of routes to specific destinations
and does not require that nodes keep these routes when they are not in
active communication.
• AODV avoids the “counting to infinity” problem by using destination
sequence numbers. This makes AODV loop free.
11
Routing Table
The routing table fields used by AODV are:
– Destination IP Address
– Destination Sequence Number
– Valid Destination Sequence number flag
– Other state and routing flags
– Network Interface
– Hop Count
– Next Hop
– List of Precursors
– Lifetime
12
VANET communication in VANET
• VANETs are a key part of the intelligent transportation systems (ITS) framework
Applications of VANETs
• Electronic brake lights, which allow a driver (or an autonomous car or truck) to react to vehicles
braking even though they might be obscured (e.g., by other vehicles).
• Platooning, which allows vehicles to closely (down to a few inches) follow a leading vehicle by
wirelessly receiving acceleration and steering information, thus forming electronically coupled
"road trains".
• Traffic information systems, which use VANET communication [8]
to provide up-to-the minute
obstacle reports to a vehicle's satellite navigation system
• Road Transportation Emergency Services– where VANET communications, VANET
networks, and road safety warning and status information dissemination are used to reduce delays
and speed up emergency rescue operations to save the lives of those injured.
• On-The-Road Services– it is also envisioned that the future transportation highway would be
"information-driven" or "wirelessly-enabled". VANETs can help advertise services (shops, gas
stations, restaurants, etc.) to the driver, and even send notifications of any sale going on at that
moment.
13
Wireless Sensor Network (WSN)
• Wireless Sensor Network (WSN) is an infrastructure-less wireless
network that is deployed in a large number of wireless sensors in an
ad-hoc manner that is used to monitor the system, physical or
environmental conditions.
• Sensor nodes are used in WSN with the onboard processor that
manages and monitors the environment in a particular area.
• They are connected to the Base Station which acts as a processing unit
in the WSN System.
• Base Station in a WSN System is connected through the Internet to
share data.
14
WSN can be used for processing, analysis, storage, and mining
of the data.
15
Components of WSN
1. Sensors:
Sensors in WSN are used to capture the environmental variables and which is used
for data acquisition. Sensor signals are converted into electrical signals.
2. Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the WLAN
access point. It consists of a microcontroller, transceiver, external memory, and
power source.
3. WLAN Access Point:
It receives the data which is sent by the Radio nodes wirelessly, generally through
the internet.
4. Evaluation Software:
The data received by the WLAN Access Point is processed by a software called as
Evaluation Software for presenting the report to the users for further processing of
the data which can be used for processing, analysis, storage, and mining of the
data.
16
Applications of WSN
1. Internet of Things (IOT)
2. Surveillance and Monitoring for security, threat detection
3. Environmental temperature, humidity, and air pressure
4. Noise Level of the surrounding
5. Medical applications like patient monitoring
6. Agriculture
7. Landslide Detection
17
RFID technology two tags of RFID
• RFID tags are a type of tracking system that uses smart barcodes in
order to identify items.
• RFID is short for “radio frequency identification,” and as such, RFID
tags utilize radio frequency technology.
• These radio waves transmit data from the tag to a reader,
• An RFID tag works by transmitting and receiving information via an
antenna and a microchip — also sometimes called an integrated circuit
or IC. which then transmits the information to an RFID computer
program.
18
Types
• There are two types of RFID tags:
• Passive tags are powered by energy from the RFID reader's
interrogating radio waves.
• Active tags are powered by a battery and thus can be read at a greater
range from the RFID reader, up to hundreds of meters.
19
Wi-Fi standards
20
WiMax standards
21
Femtocell network
• A Femtocell is the smallest type of small cell used to expand cellular
network connectivity within a targeted geographic area (typically a
small, single location).
• In addition to being the smallest in the family of small cell
technologies, Femtocells also use the lease amount of power.
• In fact, compared to other types of small cells, like picocells and
microcells, femtocells offer the least amount of additional bandwidth,
so they should only be deployed in specific situations.
22
Contd..
• Femtocell technology is integrated into cellular networks in nearly the
same way that all the other small cell systems are utilized, but its main
advantage is that it does not require a centralized hub.
• Typically, Femtocells are implemented in locations where there is
existing network backhaul, or within a location where backhaul can be
developed without too much difficulty or capital investment.
23
Push to talk technology for SMS
• Push to talk (PTT), is a means of instantaneous communication
commonly employed in wireless cellular phone services that uses a
button to switch a device from voice transmission mode to voice
reception mode.
• The operation of phones used in this way is similar to "walkie talkie"
use.
• PTT switches a phone from full duplex mode, where both parties can
hear each other simultaneously
24
Contd..
• These new versions of PTT, sometimes described as "Push To Talk
over Cellular" (PoC), are based on 2.5G or 3G packet-switched
networks using a form of VoIP based upon SIP and RTP protocols
instead of iDEN.
25
Thank you