Other Wireless Networks: - Wimax - Cellular Telephony - Satellite Networks
Other Wireless Networks: - Wimax - Cellular Telephony - Satellite Networks
• WiMAX
• Cellular Telephony
• Satellite networks
WiMAX
• First, people want to have access to the Internet from home or office
(fixed) where the wired access to the Internet is either not available or is
expensive.
• Second, people need to access the Internet when they are using their
cellular phones (mobiles).
Services
1. Fixed
2. Mobile
Fixed WiMAX
• A base station can use different types of antenna (omnidirectional, sector,
or panel) to optimize the performance.
• WiMAX uses a beamsteering adaptive antenna system (AAS).
• While transmitting, it can focus its energy in the direction of the
subscriber; while receiving, it can focus in the direction of the subscriber
station to receive maximum energy sent by the subscriber.
Mobile WiMAX
• It is the same as fixed service except the subscribers are mobile stations
that move from one place to another.
• The same issues involved in the cellular telephone system, such as
roaming, are present here.
IEEE Project 802.16
• WiMAX is the result of the IEEE 802.16 project, which was an effort to
standardize the proprietary broadband wireless system in 2002.
• The standard is sometimes referred to as wireless local loop
Service Specific Convergence Sublayer
• This is actually the DLC sublayer revised for broadband wireless
communication.
• It has been devised for a connection-oriented service in which each
connection may benefit from a specific quality of service (QoS).
MAC Sublayer
• The MAC sublayer defines the access method and the format of the frame.
• It is a sublayer designed for connection-oriented service.
• The packets are routed from the base station to the subscriber station
using a connection identifier which is the same during the duration of the
communication.
Access Method
• WiMAX uses the reservation (scheduling) access method.
• The base station needs to make a slot reservation before sending a slotsize
of data to a subscriber station; each subscriber station needs to make a
reservation before sending a slot-size of data to the base station
Frame Format
Two types of frames:
1. Generic: Used to send and receive payload
2. Control: Used only during the connection establishment.
The first bit in a frame is the frame identifier. If it is 0, the frame is a generic frame; if it
is 1, it is a control frame.
EC: The encryption control field uses one bit to define whether the frame should be
encrypted for security purpose. If the bit is 0, it means no encryption; if it is 1, it means
the frame needs to be encrypted at the security sublayer.
Type: The type field uses six bits to define the type of the frame.
CI: The checksum ID field uses one bit to define whether the frame checksum field
should be present or not. If the payload is multimedia, forward error correction
EK: The encryption key field uses two bits to define one of the four keys for encryption.
Length: The length field uses eleven bits to define the total length of the frame.
Bytes Needed: The bytes needed field uses sixteen bits to define the number of bytes
needed for allocated slots in the physical layer.
Connection ID: The connection ID field uses sixteen bits to define the connection
identifier for the current connection.
Header CRC: Both types of frames need to have an 8-bit header CRC field. The header
CRC is used to check whether the header itself is corrupted. It uses the polynomial (x8 +
x2 + x + 1) as the divisor.
Payload: This variable-length field defines the payload, the data that is encapsulated in
the frame from the service specific convergence sublayer. The field is not needed in the
control frame.
CRC: The last field, if present, is used for error detection over the whole frame.
Addressing
• Each subscriber and base station typically has a 48-bit MAC address
because each station is a node in the global Internet.
• The reason is that the combination of source and destination addresses
are mapped to a connection identifier during the connection-establishing
phase.
Security Sublayer
• The last sublayer in the data-link layer provides security for
communication using WiMAX.
• The nature of broadband wireless communication requires security to
provide encryption for the information exchanged between a subscriber
station and the base station.
Transmission Convergence Sublayer
• The transmission convergence sublayer uses TDD (time-division duplex), a
variation of time-division multiplexing designed for duplex (bidirectional)
communication.
Cellular Telephony
• Provide communications between two moving units, called
mobile stations (MSs) or between one mobile unit and one
stationary unit, often called a land unit.
• Each cellular service area is divided into small regions called
cells.
• Each cell contains an antenna and is controlled by a solar- or
Ac powered network station, called the base station (BS).
• Each base station, in turn, is controlled by a switching office,
called a mobile switching center (MSC).
• The MSC coordinates communication between all the base
stations and the telephone central office(connecting calls,
recording call information, and billing).
• Cell size is not fixed and can be increased(low density) or
decreased(high density) depending on the population of the
area.
• The typical radius of a cell is 1 to 12 mi.
Operation
Frequency-Reuse Principle
• In general, neighboring cells cannot use the same set of frequencies for
communication because doing so may create interference.
• A frequency reuse pattern is a configuration of N cells, N being the reuse factor, in
which each cell uses a unique set of frequencies.
• The cells with the same number in a pattern can use the same set of frequencies -
reusing cells.
• In a pattern with reuse factor 4, only one cell separates the cells using the same
set of frequencies. In a pattern with reuse factor 7, two cells separate the reusing
cells.
Transmitting
• To place a call from a mobile station, the caller enters a code of 7 or 10
digits (a phone number) and presses the send button.
• The mobile station then scans the band, seeking a setup channel with a
strong signal, and sends the data (phone number) to the closest base
station using that channel.
• The base station relays the data to the MSC.
• The MSC sends the data on to the telephone central office.
• If the called party is available, a connection is made and the result is
relayed back to the MSC.
• At this point, the MSC assigns an unused voice channel to the call, and a
connection is established.
• The mobile station automatically adjusts its tuning to the new channel,
and communication can begin.
Receiving
• When a mobile phone is called, the telephone central office sends the
number to the MSC.
• The MSC searches for the location of the mobile station by sending query
signals to each cell in a process called paging.
• Once the mobile station is found, the MSC transmits a ringing signal and,
when the mobile station answers, assigns a voice channel to the call,
allowing voice communication to begin.
Handoff
• During a conversation, the mobile station moves from one cell to another.
• The signal becomes weak, the MSC seeks a new cell that can better
accommodate the communication.
1. Hard Handoff: When the MS moves from one cell to another,
communication must first be broken with the previous base station
before communication can be established with the new one.
2. Soft Handoff: In this case, a mobile station can communicate with two
base stations at the same time.
Roaming
• A service provider usually has limited coverage.
• Neighboring service providers can provide extended coverage through a
roaming contract.
First Generation (1G)
• The first generation was designed for voice communication using analog
signals.
AMPS
• Advanced Mobile Phone System (AMPS) is one of the leading analog
cellular systems in North America.
• It uses FDMA.
Bands
• AMPS operates in the ISM 800-MHz band. The system uses two separate
analog channels, one for forward (base station to mobile station - 869 and
894 MHz) communication and one for reverse (mobile station to base
station - 824 and 849 MHz) communication.
• Each band is divided into 832 channels.
• Two providers can share an area, which means 416 channels in each cell
for each provider.
• Out of these 416, 21 channels are used for control, which leaves 395
channels.
• AMPS has a frequency reuse factor of 7; this means only one-seventh of
these 395 traffic channels are actually available in a cell.
Transmission
• AMPS uses FM and FSK for modulation.
• Voice channels are modulated using FM, and control channels use FSK to
create 30-kHz analog signals.
• AMPS uses FDMA to divide each 25-MHz band into 30-kHz channels.
Second Generation (2G)
• The second generation was mainly designed for digitized voice, higher-
quality (less noise-prone) mobile voice communications.
D-AMPS
• The product of the evolution of the analog AMPS into a digital system is
digital AMPS (D-AMPS).
Band
• D-AMPS uses the same bands and channels as AMPS.
Transmission
• Each voice channel is digitized using a very complex PCM and compression
technique.
• A voice channel is digitized to 7.95 kbps.
• Three 7.95-kbps digital voice channels are combined using TDMA.
• The result is 48.6 kbps of digital data; much of this is overhead.
• The system sends 25 frames per second, with 1944 bits per frame.
• Each frame lasts 40 ms (1/25) and is divided into six slots shared by three
digital channels.
• Each slot holds 324 bits. However, only 159 bits come from the digitized
voice; 64 bits are for control and 101 bits are for error correction.
• The resulting 48.6 kbps of digital data modulates a carrier using QPSK; the
result is a 30-kHz analog signal.
• Finally, the 30-kHz analog signals share a 25-MHz band (FDMA).
• D-AMPS has a frequency reuse factor of 7.
GSM
• The Global System for Mobile Communication (GSM) is a European
standard that was developed to provide a common second-generation
technology for all Europe.
Bands
• GSM uses two bands for duplex communication. Each band is 25 MHz in
width, shifted toward 900 MHz.
• Each band is divided into 124 channels of 200 kHz separated by guard
bands.
Transmission
• Each voice channel is digitized and compressed to a 13-kbps digital signal.
• Each slot carries 156.25 bits.
• Eight slots share a frame (TDMA)
• 26 frames also share a multiframe (TDMA).
• Each 270.8-kbps digital channel modulates a carrier using GMSK (a form of
FSK); the result is a 200-kHz analog signal.
• 124 analog channels of 200 kHz are combined using FDMA. The result is a
25-MHz band.
Reuse Factor
• Because of the complex error correction mechanism, GSM allows a reuse
factor as low as 3.
IS-95
• One of the dominant second-generation standards in North America is
Interim Standard 95 (IS-95).
• It is based on CDMA and DSSS.
Bands and Channels
• IS-95 uses two bands for duplex communication.
• The bands can be the traditional ISM 800-MHz band or the ISM 1900-MHz
band.
• Each band is divided into 20 channels of 1.228 MHz separated by guard
bands.
• Each service provider is allotted 10 channels.
Synchronization
• All base channels need to be synchronized to use CDMA.
• To provide synchronization, bases use the services of GPS (Global
Positioning System).
Forward Transmission
• IS-95 has two different transmission techniques: one for use in the
forward (base to mobile) direction and another for use in the reverse
(mobile to base) direction.
• In the forward direction, communications between the base and all
mobiles are synchronized; the base sends synchronized data to all mobiles.
• These three circles meet at one single point, this is our position.
• In three-dimensional space, the situation is different.
• Three spheres meet in two points.
• With additional info one of the two points, where the spheres meet, is so
improbable that the other can be selected without a doubt.
Measuring the distance
• Measuring the distance is done using a principle called one-way ranging.
• Let us assume that all GPS satellites and the receiver on the Earth are
synchronized.
• Each of 24 satellites synchronously transmits a complex signal, each
satellite’s signal having a unique pattern.
• The computer on the receiver measures the delay between the signals
from the satellites and its copy of the signals to determine the distances to
the satellites.
Synchronization
• Satellites use atomic clocks, which are precise
• The receiver’s clock, however, is a normal quartz clock (no way of
synchronizing it).
• There is an unknown offset between the satellite clocks and the receiver
clock, the measured distance is called a pseudorange.
• The calculation of position becomes finding four unknowns: the xr, yr, zr
coordinates of the receiver, and common clock offset dt.
• For finding these four unknown values, we need at least four equations.