Professional Documents
Culture Documents
EC8004-Wireless Networks-Notes
EC8004-Wireless Networks-Notes
NETWORKS
1)Jochen Schiller, ”Mobile Communications”, Second
Edition, Pearson Education 2012.(Unit I,II,III)
Optical Spectrum
– The optical spectrum exists directly above the millimeter
wave region.
– Three types of light waves are:
• Infrared
• Visible spectrum
• Ultraviolet
WIRELESS TRANSMISSION-Introduction
• Provide excellent high speed and reliable data communications in building or
campus environment.
• Wireless devices transmit using one of the following signals such as IR and
RF.
1. INFRARED Txlight based Txn using 900nm wavelength.
It use LASER as a Txr and photodiode as a Rxr.
Requires direct LOS for good Tx
cannot penetrate through walls
No electrical interferences occurs
Requires low BW,no need for license
2.UHF Narrowband TxIt support both unlicensed band(430-450MHz) and
licensed (450-470MHz)
power level is about 2W
Comparison: infrared vs. radio Tx
Infrared Radio
uses IR diodes, diffuse light, typically usingthe license free
multiple reflections (walls, ISM band at 2.4 GHz
furniture etc.) Advantages
Advantages experience from wireless WAN
simple, cheap, available in and mobile phones can be used
many mobile devices coverage of larger areas
no licensesneeded possible (radio can penetrate
simple shielding possible walls, furniture etc.)
Disadvantages Disadvantages
interference by sunlight, heat limited license free frequency sources etc.
bands
many things shield or absorb IR shielding more difficult,
light electrical interference
low bandwidth Example
Example Many different products
infrastructure network
AP: Access Point AP
AP wired network AP
ad-hoc network
802.11 - Architecture of an infrastructure network
Station (STA)
802.11 LAN
802.x LAN terminal with access mechanisms
to the wireless medium and radio
contact to the access point
STA1 Basic Service Set (BSS)
BSS1
group of stations using the same
Access Portal radio frequency
Point Access Point
Distribution System
station integrated into the wireless
Access LAN and the distribution system
ESS Point Portal
bridge to other (wired) networks
BSS2 Distribution System
interconnection network to form
one logical network (ESS:
Extended Service Set) based
STA2 802.11 LAN STA3 on several BSS
• Basic Service Set (BSS) consists of some number of stations
executing the same MAC protocol and competing for access
to the same shared wireless medium.
• A BSS may be isolated or it may connect to a backbone
distribution system (DS) through an access point (AP)
mobile terminal
IEEE 802.11LAYERS
1) PHY or Physical LayerEncoding –decoding , modulation-demodulation.
MAC layer
2) MAC Sub LayerFragmentation and reassembly of packets
3) MAC Management Sub LayerRoaming,power management,Registration and
connection management.
1) Physical layer is further subdivided into sub layers
• The PLCP length word (PLW) field specifies the length of the
PSDU in octets and is used by the MAC layer to detect the end
of a PPDU frame.
• The PLCP signaling field (PSF) identifies the data rate of the
whitened PSDU ranging from 1 to 4.5 Mbps in increments of
0.5 Mbps
• The header error check field contains the results of a
calculated frame check sequence from the sending station.
• At the receiver, the DSSS signal is convolved with the same 11-bit
Barker code and correlated
Frame Format
• The SYNC field is 128 bits (symbols) in length and contains a
string of 1s .The receiver uses this field to acquire the
incoming signal and to synchronize the receiver’s carrier
tracking and timing prior to receiving the SFD
• Steps
1. A station with a frame to transmit senses the medium. If the medium
is idle, it waits to see if the medium remains idle for a time equal to
IFS. If so, the station may transmit immediately.
• During the first part of this interval, the point coordinator issues polls in a
round-robin fashion to all stations configured for polling.
• When a poll is issued, the polled station may respond using SIFS. If the
point coordinator receives a response, it issues another poll using PIFS
• The point coordinator then idles for the remainder of the superframe,
allowing a contention period for asynchronous access
MAC LAYER
STATION 3
2.1.3) PCF Operation
• AP organizes periodical contention free period for the time bounded information.
• Data to be transmitted at the beginning of each CFP, during that period it arrange
NAV for other terminals.
• Length of the PCF is occupied by CFP + DCF packets.
• If DCF packet occupies the channel,and doesnot complete before the start of the
next CFP.
MAC frame Format
• Frame Control: Indicates the type of frame and provides control
information
• Duration/Connection ID: indicates the time (in microseconds) the
channel will be allocated for successful transmission of a MAC
frame. In some control frames, this field contains an association,
or connection identifier.
Sleep mode
Encryption
Power-save mode
• Protocol version00 ,reserved for fututre.
• Type: Identifies the frame as control, management, or data.
• To DS: The MAC coordination sets this bit to 1 in a frame destined to the
distribution system.
• From DS: The MAC coordination sets this bit to 1 in a frame leaving the
distribution system.
Functions
1. Registration
2. Handoff
3. Power management
4. Security
1)Registration
• AP periodically send Beacon frame to MS for
timing synchronization.
• It contains BSS-ID, RSS, Roaming, time
stamp.
• Beacon used to identify the AP and N/W.
• Association REQMS send this request to
AP.
• Association RESAP grant permission MS.
2)Handoff
Mobility Environment
• No Transition MS is static or moving but inside BSA.
• BSS Transition MS moves from one BSS to another BSS but in same ESS.
• ESS Transition MS moves from one BSS to another BSS but in new ESS.
Connection Registration
• Re-Association service MS moves from one BSS to another BSS but in same
ESS.Hence MS send request to distributed system via AP.
• Diassociation service used to terminate the association, for MS when it leave
from BSS.
Handoff Procedure
MS moves from AccessPoint1 to AccessPoint1
PLCP header
96 µs 2, 5.5 or 11 Mbit/s
HIPERLAN
• HIPERLAN -High Performance Radio Local Area Network
• The goal of the HiperLAN was to have data rate higher than
802.11
From Architecture
• Node 1,4,6 are forwarder node, having peer-peer connections
• Node 4 act as a bridge between HIPERLAN A-HIPERLAN B
PHY-MAC Layer
1)PHY Layer
• Bandwidth 5.15-5.35GHZ.Total channel is 5 with 40MHZ spacing
• Transmission power 1W
• GMSK modulation methods, support data rate 23Mbps.
• CSMA/CA used for channel access.
2) MAC Layer
• Handles encryption and power conservation.
• MAC address size is 48 bits.(source, destination and neighbor hop)
Channel Access Methods
• If a terminal senses the medium to be free at least 1700bit durations, it
immediately transmit.
• If the channel is busy the terminal access has three phases .
• Prioritization phaseit has the highest priority. If a MS has a highest priority
survive for the next phase and others are eliminated from the contention.
• Contention phaseit consists of elimination period and yield period.
• elimination period Each terminal run a random number generator to select one
of the available 12 slots in which it sends continuous burst of 256bits.
• After sending burst MS listen the channel, if it doesn’t hear any other burst, then
send another burst after 12 slots for survival..
• If a node hear any burst during this period,then eliminate itself.
• yield periodIf an MS senses the medium free for the entire yield period,then
start the tx immediately..
HiperLAN--2
• HiperLAN/2 functional specification was accomplished Feb
2000.
Access point
Protocol stack of HIPERLAN/2
1) Physical layerOFDM ,52 Sub carriers(48 for data+4 sync)
– to provide several modulation and coding schemes
according to current radio link quality and meet the
requirements for different physical layer modes as defined
by transport channels within DLC.
2)DLC layer
– The DLC layer constitutes the logical link between an
access point (AP) and mobile terminals (MTs)
The DLC layer consists of
WMT
RAS
EMAS-E
M-NNI
WMT RAS
EMAS-N
LS
AUS
Wireless ATM Protocol Architecture
Radio Access LayerTo support wireless communication,new
wireless channel specific medium access.
1999:
Ericsson mobile
communications AB
reste denna sten till
minne av Harald
Blåtand, som fick ge
sitt namn åt en ny
teknologi för trådlös,
mobil
kommunikation.
…and the real rune stone
Located in Jelling, Denmark,
erected by King Harald “Blåtand”
in memory of his parents.
The stone has three sides – one side
showing a picture of Christ.
Inscription:
"Harald king executes these sepulchral
monuments after Gorm, his father and
Thyra, his mother. The Harald who won
the whole of Denmark and Norway and This could be the “original”
turned the Danes to Christianity." colors of the stone.
Inscription:
Btw: Blåtand means “of dark complexion” “auk tani karthi kristna” (and
(not having a blue tooth…) made the Danes Christians)
Bluetooth
TCP/UDP OBEX
AT modem
IP
commands
TCS BIN SDP
BNEP PPP Control
Baseband
Radio
• The baseband and link control layer enables the physical RF link
between Bluetooth units forming a piconet- addressing, packet
format, timing, and power control.
payload (30)
DV audio (10) header (1) payload (0-9) 2/3 FEC CRC (2)
(bytes)
ACL link
• The master unit controls the link bandwidth and decides how
much piconet bandwidth is given to each slave and the
symmetry of the traffic.
• The ACL link also supports broadcast messages from the master
to all slaves in the piconet
ACL Payload types
payload (0-343)
standby unconnected
• Protocol multiplexing
– RFCOMM, SDP, telephony control
• Group abstraction
– Create/close group, add/remove member
L2CAP logical channels
Connection-oriented PDU
2 2 0-65535 bytes
length CID payload
1 1 2 ≥0
code ID length data
Security
User input
PIN (1-16 byte) (initialization)
Pairing PIN (1-16 byte)
Authentication key
E2 E2
generation
(possibly permanent
link key (128 bit) storage)
Authentication link key (128 bit)
Encryption key
E3 E3
generation
(temporary storage)
encryption key (128 bit) Encryption encryption key (128 bit)
• This uses licensed worldwide spectrum 2.3 GHz, 2.5GHz, 3.3 GHz, and 3.5 GHz
frequency bands
1. Fixed WIMAX (IEEE 802.16d — 2004)
Routing
based on IP destination address,
network prefix (e.g. 129.13.42) determines physical subnet
change of physical subnet => change of IP address to have a topological
correct address (standard IP)
Solution: Temporarily change routing table entries for mobile host
Problem: does not scale if many mobile hosts or frequent location changes
Solution: Change mobile host IP-address
adjust the host IP address depending on the current location
DNS updates take to long time
Old TCP connections break
Requirements to Mobile IP
Transparency
mobile end-systems keep IP address
Continuous service after link interruption
point of connection to the fixed network can be changed
Compatibility
No changes to current hosts, OS, routers
mobile end-systems can communicate with fixed systems
Security
authentication of all registration messages
Efficiency and scalability
only few additional messages to mobile system (low bandwidth)
Global support for large number of mobile systems
Entities and Terminology
Mobile Node (MN)
Laptop, PDA, etc.. that may move about
Home Agent (HA)
Router in home network of the MN, helps in forwarding
registers current MN location, tunnels IP datagrams to COA
Foreign Agent (FA)
Router in current foreign network of MN
forwards tunneled datagrams to the MN
HA
MN
router
end-system router
Overview of Packet Delivery (Mobile Node)
COA
foreign
Internet network
CN router
3.
home router2. router
FA MN
network HA
4.
foreign
Internet network
1.
CN router 2
Packet Routing Procedure
MN FA HA MN HA
t
Registration Request message
Inner Header
Inner Header
3.3) Generic Routing Encapsulation(GRE)
• IP-in-IP encapsulation and minimal encapsulation work only for IP.
• GRE supports other network layer protocols in addition to IP.
• It allows the encapsulation of packets of one protocol suite into the payload
portion of a packet of another protocol suite.
• The packet of one protocol suite with the original packet header and data is
taken and a new GRE header is prepended.
• Together this forms the new data part of the new packet.
• Finally, the header of the second protocol suite is put in front.
• GRE header uses only 4 bytes.
• C bit indicates if the checksum field is present and contains
valid information.
• R bit indicates if the offset and routing fields are present and
contain valid information.
• Checksum field is valid only if C is set
• Offset field is valid only if R is set
• Key field which may be used for authentication. If this field is
present, the K bit is set.
• Sequence number bit S indicates if the sequence number field is
present, if the s bit is set
• Recursion control field (rec.) is an important field that
additionally distinguishes GRE from IP-in-IP and minimal
encapsulation
• Reserved fields must be zero and are ignored on reception. The
• Version field contains 0 for the GRE version.
4)Routing Optimization
• Triangular Routing
sender sends all packets via HA to MN
Triangular routes longer, higher latency and network load
• “Route optimization”
CN learn the current location of MN via HA
forward its pkts directly without HA.
• CN create routing table which has info about MN.(location)
Mobile IP protocol needs 4 messages
• Binding RequestCN send binding request about the Current location of
MN to HA.
• Binding updateIt contains MN-IP address + COA
• Binding AckCN reply to HA
• Binding warningafter decapsulating pkt,if MN is not current location of
FA,then CN send warning msg.
1
3
• Case(1)Routing (Directly)
• CN send request to HA about the current location of MN
• HAsend update msg about MN to CN
• CNsend ACK to HA
• CNSend data directly to FA old,forward data to MN.
• Case(2)Routing (Handover)
• MN changes its location and register under new FA.
• FA(new)informs FA old about the new registration of MN by sending
update.
• FA(old)reply ACK to FA new
• CNDoesn’t know about the new location,still it send data to FA(old).
• FA(old)forward the data to FA (new) and send warning msg to CN.
• Case(3)Routing
• CN send request to HA about the New location of MN
• HAsend update msg about MN to CN
• CNsend ACK to HA
• CNSend data directly to FA new,forward data to MN.
Reverse Tunneling
• MN can directly send its packets to the CN.
• MN can request a reverse tunnel between its FA and its HA.
IPv6
Problems with mobile IP
Security
FA typically belongs to another organization
authentication with FA problematic
patent and export restrictions
Firewalls
Firewalls filter based on IP addresses
FA encapsulates packets from MN
Home firewalls rejects packet from MN (unless reverse tunneling)
MN can no longer send packets back to home network QoS, etc..
IPV6 Introduction
• IPv6 is the next generation network protocol to restore the
current IP and simplifies the protocol.
• COA can be assigned via auto-configuration (DHCPv6 is one
candidate) by every node
• MN can signal a sender directly the COA, without HA
• MN sends the new COA to its old router
• old router encapsulates all packets for MN, forwards them to
new COA
• authentication is always granted
• IP address size is 128bits
• IPSEC provide solid security for communication
• Checksum field is not available
IPv6 Header format
Example approaches:
1. Cellular IP
2. HAWAII
3. Hierarchical Mobile IP (HMIP)
1)Cellular IP
• It provides local handovers without renewed registration by installing a single
cellular IP gateway (CIPGW) for each domain.
• In cellular IP domain, all nodes collect routing information from CIPGW.
• Soft handovers are achieved by allowing simultaneous forwarding of packets
destined for a mobile node along multiple paths.
• A mobile node moving between adjacent cells temporarily be able to receive
packets via both old and new base stations (BS)
• Cellular IP requires changes to the basic mobile IP protocol and is not
transparent to existing systems.
• The foreign network’s routing tables are changed based on messages sent by
mobile nodes.
• These should not be trusted blindly even if they have been authenticated. This
could be exploited by systems in the foreign network
1)Cellular IP
Operation:
„CIP Nodes“ maintain routing Internet
entries (soft state) for MNs
Multiple entries possible Mobile IP
Routing entries updated based
CIP Gateway
on update packets sent by MN data/control
CIP Gateway: packets
Mobile IP tunnel endpoint from MN 1
Initial registration processing
BS BS BS
packets from
MN2 to MN 1
Advantages
• Manageability: Cellular IP is mostly self-configuring.
• Integration with firewalls.
• All control messages by MN are authenticated
Disadvantages
• MN can directly influence routing entries.
• Multipath forwardingmay cause BW
• Efficiency: Additional network load is induced by forwarding
packets on multiple paths.
• Transparency: Changes to MNs are required.
2)HAWAII(Handoff-Aware Wireless Access
Internet Infrastructure)
• Keep micro-mobility support as transparent as possible for both
HA and MN.
• It doesn’t replace IP but works better than IP.
• Each station maintains routing cache to deal with mobility and
hop-hop tx of pkts.
• It support 2types of Handover.
• Page request reach all stations (multicast group)
• step 1MN obtains a COA
• step 2 MN registers with the HA
MN moving to foreign domain
• step 3MN sends a registration request
to the new base station as to a FA
• step 4 New BS intercepts the registration
request.
• Also it sends out a handoff message, and
routers paths from the old and new BS.
Advantages
•Security: In contrast to Cellular IP, routing changes are always
initiated by the foreign domain’s infrastructure.
•Transparency: mostly transparent to mobile nodes.
Disadvantages
•Security: There are no provisions regarding the setup of IPSec
tunnels.
• Implementation: No private address support is possible
because of co-located COAs.
3)Hierarchical Mobile IP (HMIP)
• provides micro-mobility support by installing a mobility
anchor point (MAP).
• MAPresponsible for a certain domain and acts as a local
HA within this domain for visiting MNs.
• The MAP receives all packets on behalf of the MN, encapsulates
and forwards them directly to the MN’s current address.
•MAP domain’s boundaries are defined by the access
routers (AR) advertising the MAP information to the
attached MNs
ii
iii
iv
v
• Step(i) DHCP Discover client broadcasts a DHCPDISCOVER into the
subnet.(asking IP address)
• Step(ii) DHCP Offer Two servers receive the broadcast and checking of
available IP addresses and choosing one for the client.
Servers reply to the client’s request with DHCPOFFER by a list of
configuration parameters.
• Step(iv) DHCP Ack server-2 with the configuration accepted by the client
confirms the configuration with DHCPACK.
• This completes the initialization phase.
• 4xxclient error
• 5xxserver error
Mobile Ad-hoc Networks(MANET)
MANET-Introduction
2. Crisis-management applications:
–These arise as a result of natural disasters in which the entire
communication infrastructure is in disarray.
6. Virtual navigation:
– A remote database contains the graphical
representation of streets, buildings, etc of places.
Time t1
• Five nodes, N1 to N5, are connected
• In this N4 can receive N1 over a good link, but N1 receives N4 only via a weak link.
• N1 cannot receive N2 at all, N2 receives a signal from N1.
• This situation can change quite fast at t2.
Time t2
• N1 cannot receive N4 any longer.
• N4 receives N1 only via a weak link. But now N1 has an asymmetric but bi-directional
link to N2 that did not exist before.
Requirement of routing protocol
1. Provide the maximum possible reliability by selecting
alternative routes if a node connectivity fails.
F K
H
Q A
S E G D P
J
B M
R
I
L
C
N
DSR: Route discovery (2)
F K
H
Q A
S E G D P
(S)
J
B M
R
I
L
C
N
DSR: Route discovery (3)
(S,A) K
F H
Q A
(S,E)
S E G D P
J
B M
R
I
L
C
N
DSR: Route discovery (4)
F K
H
Q A
E (S,E,G) P
S G D
J
B M
R
I
L
C
(S,B,C) N
DSR: Route discovery (5)
(S,A,F,H)
F K
H
Q A
E (S,E,G,J) P
S G D
J
B M
R
I
L
C
N
DSR: Route discovery (6)
F K
H (S,A,F,H,K)
Q A
S E G D P
J
B M
R
I
L
C
N
DSR: Route discovery (7)
F K
H
Q A
S E G D P
J (S,A,F,H,K,P)
B M
R
I
L
C
N
DSR: Route discovery (8)
F K
H
Q A
S E G D P
J RREP(S,E,G,J,D)
B M
R
I
L
C
N
DSR: Route Discovery (9)
F K
H
Q A
DATA(S,E,G,J,D)
S E G D P
J
B M
R
I
L
C
N
DSR: Route maintenance (1)
F K
H
Q A
DATA(S,E,G,J,D)
E P
X
S G D
J
B M
R
I
L
C
N
DSR: Route maintenance (2)
F K
H
Q A
RERR(G-J)
E P
X
S G D
J
B M
R
I
L
C
N When receiving the Route Error message (RERR),
S removes the broken link from its cache.
It then tries another route stored in its cache; if none,
it initializes a new route discovery
Overview of UTMS Terrestrial Radio access network-UMTS
Core network Architecture: 3GPP Architecture, User
equipment, CDMA2000 overview- Radio and Network
components, Network structure, Radio Network, TD-CDMA,
TD – SCDMA.
TRANSMISSION CONTROL
PROTOCOL(TCP)
Traditional TCP
• Guarantees or Reliable message delivery
• It support connection oriented data/voice services
• Delivers messages in the same order they were sent
• Delivers at most one copy of each message
• Supports arbitrarily large messages
• Supports synchronization between the sender and the receiver
• It provide end to end flow control mechanism.
• It incorporates congestion control mechanism
• It uses sliding window mechanism for data transmission
Flow control VS Congestion control
• Flow control involves preventing senders from
overrunning the capacity of the receivers
• Congestion control involves preventing too much
data from being injected into the network, thereby
causing switches or links to become overloaded
TCP Header
TCP Header
• The SrcPort and DstPort fields identify the source and destination ports,
respectively.
• SequenceNum field contains the sequence number for the first byte of data
carried in that segment.
• The 6-bit Flags field is used to relay control information between TCP peers.
• The possible flags include SYN, FIN, RESET, PUSH, URG, and ACK.
• The SYN and FIN flags are used when establishing and terminating a TCP
connection, respectively.
• The ACK flag is set any time the Acknowledgment field is valid, implying that
the receiver should pay attention to it.
• The URG flag signifies that this segment contains urgent data.
• The PUSH flag signifies that the sender invoked the push operation, which
indicates to the receiving side of TCP that it should notify the receiving
process of this fact.
• Finally, the RESET flag signifies that the receiver has become confused
Connection Establishment/Termination in TCP
Controlling mechanism
• Additive Increase Multiplicative Decrease
• Slow start or exponential start
• Fast Retransmit/Recovery
1) Additive Increase Multiplicative Decrease
CWND=1
ACK
segment
CWND=1+1
CWND=1+1+1
CWND=1+1+1+1
At start CWND=1
New Congestion Window(CWND) = CWND+1
Additive Increase Multiplicative Decrease
– TCP does not wait for an entire window’s worth of ACKs to add 1
packet’s worth to the congestion window, but instead increments
Congestion Window by a little for each ACK that arrives.
– Specifically, the congestion window is incremented as follows each
time an ACK arrives:
• Increment = MSS × (MSS/Congestion Window)
• Congestion Window+= Increment
• That is, rather than incrementing Congestion Window by an entire MSS
bytes each RTT, we increment it by a fraction of MSS every time an ACK is
received.
• Assuming that each ACK acknowledges the receipt of MSS bytes, then that
fraction is MSS/Congestion Window.
2)Slow start or exponential start
• Slow start effectively increases the congestion window
exponentially, rather than linearly.
• source starts out by setting Congestion Window to one packet.
• When the ACK for this packet arrives, TCP adds 1 to Congestion
Window and then sends two packets.
• Upon receiving the corresponding two ACKs, TCP increments
Congestion Window by 2—one for each ACK—and next sends
four packets.
• The end result is that TCP effectively doubles the number of
packets it has in transit every RTT.
TCP Congestion Control-Mechanism
20 ACK
• Slow Start
segment
21
22
23
At start CWND=1
Congestion Window(CWND) = 2n
• Slow Start
– There are actually two different situations in which
slow start runs.
• The first is at the very beginning of a connection, at which time
the source has no idea how many packets it is going to be able to
have in transit at a given time.
• In this situation, slow start continues to double Congestion
Window each RTT until there is a loss, at which time a
timeout causes multiplicative decrease to divide Congestion
Window by 2.
• The second situation in which slow start is used is a bit more
subtle; it occurs when the connection goes dead while
waiting for a timeout to occur.
2)Fast Retransmit and Fast Recovery
– Every time a data packet arrives at the receiving side, the receiver responds
with an acknowledgment.
– when a packet arrives out of order TCP resends the same acknowledgment
it sent the last time.
– This second transmission of the same acknowledgment is called a
duplicate ACK.
– When the sender sees a duplicate ACK, it knows that the other side must
have received a packet out of order, which suggests the earlier packet
might have been lost or delayed
– TCP waits until it has seen three duplicate ACKs before retransmitting the
missing packet
Fast Recovery
– When the fast retransmit mechanism signals congestion,
rather than drop the congestion window all the way back to
one packet and run slow start, it is possible to use the ACKs
that are still in the pipe to clock the sending of packets.
– This mechanism, which is called fast recovery, effectively
removes the slow start phase that happens between when fast
retransmit detects a lost packet and additive increase begins.
TCP Congestion control
Multiplicative decrease
Additive Increase
Slow start
Classical TCP Solutions
Methods
1. Indirect TCP
2. Snooping TCP
3. Mobile TCP
4. Fast Retransmit/fast recovery
5. Transmission/time out freezing
6. Selective retransmission
7. Transaction –oriented TCP
1)Indirect TCP (I-TCP)
•mobile host connected via a wireless link and an access point to the ‘wired’ internet where the
correspondent host resides
CN
mobile host
access point
(foreign agent) „wired“ Internet
• Instead of the mobile host, the access point now terminates the standard TCP
connection, acting as a proxy.
• This means that the access point is now seen as the mobile host for the fixed host and
as the fixed host for the mobile host.
• If the correspondent host sends a packet,the foreign agent acknowledges this packet
and tries to forward the packet to the mobile host.
• If a packet is lost on the wireless link due to a transmission error, the correspondent
host would not notice this. In this case, the foreign agent tries to retransmit this packet
locally to maintain reliable data transport
• If the packet is lost on the wired link, the mobile hosts notice this much faster due to
the lower round trip time and can directly retransmit the packet
• Packet loss in the wired network is now handled by the foreign agent.
I-TCP socket and state migration after handover
new CN
access point1
socket migration
and state transfer Internet
Disadvantages
loss of end-to-end semantics, an acknowledgement to a sender does
now not any longer mean that a receiver really got a packet, foreign
agents might crash
higher latency possible due to buffering of data within the foreign
agent and forwarding to a new foreign agent
2)Snooping TCP I
Disadvantage
Cooperation required between IP and TCP, no transparent
approach
5)Transmission/time-out freezing
TCP phases
connection setup, data transmission, connection release
using 3-way-handshake needs 3 packets for setup and release,
respectively
thus, even short messages need a minimum of 7 packets!
Advantage
efficiency
Disadvantage
requires changed TCP
mobility not longer transparent
Example TCP connection
setup overhead
Comparison of different approaches for a
Approach
Indirect TCP
Mechanism
“mobile”
splits TCP connection
Advantages
TCP loss of TCP semantics,
isolation of wireless
Disadvantages
Suggestions
Large (initial) sending windows, large maximum transfer unit, selective
acknowledgement, explicit congestion notification, time stamp, no
header compression
Already in use
i-mode running over FOMA
WAP 2.0 (“TCP with wireless profile”)
TCP Improvements II
UTRAN
UMTS Terrestrial Radio Access Network (UTRAN)
Architecture (2/3)
• RNC
– Owns and controls the radio resources in its domain
– Radio resource management (RRM) tasks include e.g. the following
• Mapping of QoS Parameters into the air interface
• Air interface scheduling
• Handover control
• Outer loop power control
• Admission Control
• Initial power and SIR setting
• Radio resource reservation
• Code allocation
• Load Control
UMTS Terrestrial Radio Access Network (UTRAN)
Architecture (3/3)
• Node B
– Main function to convert the data flow between Uu and Iub interfaces
– Some RRM tasks:
• Measurements
• Innerloop power control
• The Iu is split functionally into two logical interfaces.
• Iups connecting the packet switched domain to the access network .
• Iucs connecting the circuit switched domain to the access network.
• The Iur logically connects radio network controllers (RNCs) but could be
physically realized by a direct connection between RNCs or via the core
network.
NSS Operations
• Two types of services are providedby GPRS:
• Point-to-point (PTP)MS-MS
• Point-to-multipoint (PTM)BS-MS
Uu
Uu
MOBILE TERMINAL MOBILE TERMINAL
• Node B is responsible for radio transmission and reception in one or more cells to/from the
user equipment (UE).
• Responsibilities of the Node B:
• Termination of Iub interface from RNC
• Termination of MAC protocol for transport channels RACH, FACH
• Termination of MAC, RLC, and RRC protocols for transport channels BCH, PCH
• Radio environment survey (BER estimate, receiving signal strength, etc.)
• power control
• Radio channel coding/decoding
• Macro diversity combining/splitting of data streams from its cells (sectors)
• Termination of Uu interface from UE
• Error detection and correction(FEC),Mux and Demux
• Modulation and spreading/demodulation and despreading of physical channels
• Frequency and time (chip, bit, slot, frame) synchronization
UTRAN Logical Interfaces
• The protocol structure contains two main layers, the radio network layer
(RNL) and the transport network layer (TNL).
• RNLall UTRAN-related functions are visible.
• The transport network control plane carries all control signaling within the
transport layer.
• User information is carried by the user plane
• It contains access link control application part (ALCAP) required to set up the
transport bearers (data bearers) for the user plane
Interfacing types
1. lu Interface interconnects one UTRAN to the
UMTS core network
2. Iur Interface connection between two RNCs
3. lub Interface connection between the RNC
and Node B
4. Uu Interface Radio interface between a Node
B and one of its UE.
1) Iu Interface
• SIGNALING CONNECTION CONTROL PART (SCCP)
• MESSAGE TRANSFER PART (MTP3-B)
• SIGNALING ASYNCHRONOUS TRANSFER MODE (ATM)
• SERVICE-SPECIFIC COORDINATION FUNCTION (SSCF) SERVICE-SPECIFI
C CONNECTION-ORIENTED PROTOCOL (SSCOP)
• Iu interface has three protocol planes Radio network control plane (RNCP),
Transport network control plane (TNCP), and the user plane (UP).
RNCP functions
• It carries information for the general control of UTRAN radio network operations.
• It carries information for control of UTRAN in the context of each specific call.
• It carries user call control (CC) and mobility management (MM) signaling
messages.
TNCP functions
• carries information for the control of transport network used within UCN.
UP functions
carries user voice and packet data information.(up to 64 kbps)
• SSCF and SSCOP layers are specifically designed for signaling transport in ATM
networks.
• Also it will take care of signaling connection management functions.
• AAL5 is used for segmenting the data to ATM cells.
• SCTP layer is specifically designed for signaling transport on the Internet.
2)Iur Interface
Functions of Iur
1. Basic inter-RNC mobility support
• Support of Serving RNC relocation
• Support of inter-RNC cell and UTRAN registration area update
• Support of inter-RNC packet paging
• Reporting of protocol errors
2. Dedicated channel traffic support
• Establishment, modification, and release of a dedicated channel during
handoff.
• Transfer of DCH transport blocks between Serving RNC and Drift RNC
• Perform Power Management
3. Common channel traffic support
• Setup and release of the transport connection
• Splitting of the MAC layer between the SRNC (MAC-d) and DRNC
• Flow control between the MAC-d and MAC-c/MAC-sh
4. Global resource management support
• Transfer of cell measurements between two RNCs
• Transfer of Node B timing between two RNCs
3)Iub Interface
• Iub interface provides communications between Node B and the RNC of the
same RNS.
Iub interface is used to carry:
• Information for the general control of Node B for radio network operation on
RNCP
• Information for the control of a transport network used within UTRAN on TCNP
• User CC and MM signaling message on RNCP
• User voice and packet data information on UP
UMTS Core Network Architecture(UCN)
UMTS core network (UCN) in relation to all other entities within the UMTS network
and all of the interfaces to the associated networks.
• UCN consists of a CS entity for providing voice and CS data services and a PS
entity for providing packet-based services.
• Network management systems (billing and provisioning, service
management, element management.
CN has different functional areas:
• Functional entities needed to support PS services (e.g. 3G-SGSN, 3G-GGSN)
• Functional entities needed to support CS services (e.g. 3G-MSC/VLR)
• Functional entities common to both types of services (e.g. 3G-HLR)
Logical architecture of the UMTS core
network.
3G-MSC
• provides the necessary control and corresponding signaling interfaces
including SS7, MAP, ISUP (ISDN user part).
• provides the interconnection to external networks like PSTN and ISDN
3G-MSC Services
• Mobility management Handles attach, authentication, updates to the HLR,
SRNS relocation, and intersystem's handover.
• Call management Handles call set-up messages from/to the UE.
• Supplementary services Handles call-related services.(call waiting, etc.)
• CS data services The IWF provides rate adaptation and message translation
for circuit mode data services, such as fax.
• Short message services (SMS) allows the user to send and receive SMS data
to and from the SMS-GMSC/SMS-IWMSC.
• VLR functionality database is located within the 3G-MSC and can serve as
intermediate storage for visitor subscriber data.
• OAM (operation, administration, and maintenance) agent functionality
3G-SGSN
• Provides the necessary control function both UE and the 3G-GGSN.
• It also provides the appropriate signaling and data interfaces including
connection to an IP-based network.
3G-SGSN Services
• Session management Handles session set-up messages from/to the UE
• SMS allows the user to send and receive SMS data to and from the SMS-
GMSC /SMS-IWMSC.
• Mobility management Handles attach, authentication, updates to the HLR
and SRNS relocation, and intersystem handover.
• Subscriber database functionality:similar to the VLR.located within the 3G-
SGSN and serves as intermediate storage for subscriber data to support
subscriber mobility.
• Charging The SGSN collects charging information related to radio network
usage by the user.
3G-GGSN
• GGSN provides interworking with the external PS network.
• GGSN may optionally support an SS7 interface with the HLR to handle mobile
terminated packet sessions.
3G-GGSN Services
• Maintain information locations at SGSN level (macro-mobility)
• Gateway between UMTS packet network and external data networks (e.g. IP,
X.25)
• Gateway-specific access methods to intranet
• User level address allocation GGSN may have to allocate (depending
on subscription) a dynamic address to the UE.(With the help of DHCP)
• Charging:collects charging information related to external data
network usage by the user.
SMS-GMSC/SMS-IWMSC
SMS-GMSC provides the following functions
• Reception of short message packet data unit (PDU)
• Interrogation of HLR for routing information
• Forwarding of the short message PDU to the MSC or SGSN using the
• routing information.
SMS-IWMSC provides the following functions
• Reception of the short message PDU from either the 3G-SGSN or3G-MSC
• Establishing a link with the addressed service center
• Transferring the short message PDU to the service center
Firewall
• used to protect the service providers’ backbone data networks
from attack from external packet data networks.
• The security of the backbone data network can be ensured by
applying packet filtering mechanisms.
• It is based on access control lists or any other methods deemed
suitable.
DNS/DHCP
• DNS server is used, as in any IP network, to translate host names into IP
addresses
• used to translate the access point name (APN) into the GGSN IP address
• DHCP protocol server is used to manage the allocation of IP addresses to
systems
High-Speed Downlink Packet Access
(HSDPA)
Introduction
2)HSS – (Home Subscriber Server) contains users’ SAE subscription data such
as the EPS-subscribed QoS profile and any access restrictions for roaming.
• It also holds information about the PDNs to which the user can connect.
• In addition the HSS holds dynamic information such as the identity of the
MME to which the user is currently attached or registered.
3) P-GW – (PDN Gateway) responsible for IP address allocation for the UE and
flow-based charging.
• It is responsible for the filtering of downlink user IP packets into the
different QoS-based bearers.
• It also serves as the mobility anchor for interworking with non-3GPP
technologies such as CDMA2000 and WiMAX networks.
4)S-GW ( Serving Gateway) serves as the local mobility UE moves between
eNodeBs.
• It also retainsthe information about the bearers when the UE is in the idle
state “IDLE” [ECM-IDLE])
• performs some administrative functions in the visited network such as
collecting information for charging packet radio service (GPRS) and UMTS.
5)MME –( Mobility Management Entity)is the control node processes the
signaling between the UE and the CN.
• Functions related to bearer management – This includes the establishment,
maintenance and release of the bearers
• Functions related to connection management – This includes the
establishment of the connection and security between the network and UE
Protocol architecture-user plane
• Consisting of the Packet Data Convergence Protocol (PDCP), Radio Link
Control (RLC) and Medium Access Control (MAC) sublayers.
• The above layers are terminated in the eNodeB on the network side.
• In the absence of any centralized controller node, data buffering during
handover due to user mobility in the E-UTRAN must be performed in the
eNodeB itself.
• Data protection during handover is a responsibility of the PDCP layer.
• The RLC and MAC layers both start afresh in a new cell after handover.
Protocol architecture-control plane
• The blue region of the stack indicates the AS protocols.
• The lower layers perform the same functions as for the user plane with the
exception that there is no header compression function for the control plane.
• The Radio Resource Control (RRC) protocol is known as “layer 3” in the AS
protocol stack.
• AS responsible for establishing the radio bearers and configuring all the
lower layers using RRC signaling between the eNodeB and the UE.
Introduction – 4G vision – 4G features and challenges -
Applications of 4G – 4G Technologies: Multicarrier
Modulation, Smart antenna techniques, IMS Architecture,
LTE, Advanced Broadband Wireless Access and Services,
MVNO.
Introduction-4G
1G
320
Features
• Circuit-switched technology.
• FDMA (Frequency Division Multiple Access).
• Analog system.
• Basic mobility.
• Poor voice quality.
• Poor security.
• Poor spectrum allocation
321
2G
322
2G
• Digital data can be compressed and multiplexed much
more effectively than analog voice encodings.
•Multiplexing -multiple analog message signals or digital
data streams are combined into one signal.
323
• CODEC introduction -program that encodes and
decodes digital data stream or signal.
•Translates data from digital to analog and vice .
Eg(LPC,CELP)
Speaker
Voice CODEC
0101110
324
2G
•Advantages:
• The digital voice encoding allows digital error
checking
•increase sound quality
•lowers the noise level
Going all-digital allowed for the introduction of
digital data transfer.
•SMS –“short message service”
•E-mail
325
2G
Disadvantages
326
2.5G
2G Enhanced
327
• Lies somewhere between 2G and 3G.
328
• Extends the capabilities of 2G systems by providing
additional features, such as a packet-switched
connection(GPRS) in the TDMA-based GSM system,
and enhanced data rates (HSCSD and EDGE).
329
3G
330
3G
• Large capacity and broadband capabilities. •Allows the
transmission of 384kbps for mobile systems and up to
2Mbps.
331
3G
• CDMA –Code Division Multiple Access.
• Does not divide up the channel by time or frequency.
• Encodes data with a special code associated with each
channel.
332
Evolution to 4G
CDMA GSM/UMTS IEEE Cellular IEEE LAN
IEEE 802.11a
2.5G CDMA IS-95B GPRS
High speed
4G
3G LTE
3G
(IMT2000)
Mobile
Mediu
CDMA/GSM/TDMA WiMAX
m speed (WiBRO)
2G
(Digital)
CDMA/GSM/TDMA
High Speed
1G WPAN
WLAN
(Analog)
5 GHz
Low speed WLAN
2.4 GHz
WLAN
Bluetooth Data Rates
High speed
Medium
speed
3thGeneration 4th Generation
(IMT-2000)
2G (2001) (2007-2010)
2.5G
Walking/ 2G
Local area
Standing/
Indoor Data Rates
0.1 1 10 335
100
4G
4G
Fourth generation Mobile Communications
•A network that operates on Internet technology, combines it with
other applications and technologies such as Wi-Fi.
• Fully IP-based wireless internet.
100 Mbps (outdoor) and 1Gbps (indoor).
Any services, anytime, anywhere.
Always Be Connected (ABC).
Seamless roaming
Smoother handover
High bandwidth
End-to-end QoS (Quality of service).
High security.
Seamless Roaming
Digital
Audio/Video
Broadcast Connection Layer
Core IP Network
Cellular 4G
Short Range
PAN/LAN/
MAN/WAN
WLAN/
HIPER-LAN
4G-Vision
•4G systems designed to provide a new services, from high-quality voice to
high-definition video to high-data-rate wireless channels.
• 4G is described as MAGIC —Mobile multimedia, Anytime anywhere,
Global mobility support, Integrated wireless and Customized personal
service.
•support the next generation mobile services, and also fixed wireless
networks.
4G Features and Challenges
• High usabilityanytime, anywhere, and with any technology
• Support for multimedia services at low transmission cost
Personalization
• Integrated services
•Multi-standard wireless system.
–Bluetooth, Wired, Wireless (802.11x)
•Ad Hoc Networking.
•IPv6 Core.
•OFDM used instead of CDMA.
Applications of 4G
• Virtual presence provide user services at all times, even if the user
is off-site.
• Virtual navigation provide users with virtual navigation through which a user
can access a database of streets, buildings, etc., of a large city.
• Tele-medicine support the remote health monitoring of patients via video
conference assistance for a doctor at anytime and anywhere.
• Tele-geo-processing applications combine geographical information
systems (GIS) and global positioning systems (GPS) in which a user will
get location querying.
• Education provide a good opportunity to people anywhere in the world to
continue their education on-line in a cost-effective manner.
vs.
Technology 3G 4G
Frequency
Band 1.8 - 2.5GHz 2 - 8GHz
344
4G Technologies
1. Multicarrier Modulation
2. Smart Antenna Techniques
3. OFDM-MIMO Systems
4. Adaptive Modulation and Coding with Time-
Slot Scheduler (AMCTSS)
5. Cognitive Radio
1)Multicarrier Modulation(MCM)
• It is a derivative of frequency-division multiplexing.
• MCM systems are currently used in DSL modems and digital audio/video
broadcast (DAB/DVB).
• MCM is a baseband process that uses parallel equal bandwidth sub-channels
to tx information ( implemented with fast Fourier transform (FFT))
• To overcome ISI effect a cyclic extension or guard band must be added to
the data.(Peak to avg ratio high)
• The difference, D, of the peak-to-average ratio between MCM and a single
carrier system is a function of the number of subcarriers, N,
• Lb original length of block.
• Lc channel’s response length.
• Lb+ Lc- 1 cyclically extended symbol new length
• At MCM receiver, only Lb samples are processed
and Lc-1 samples are discarded
• SNR is given by
Modulation methods
• MC-CDMA each user can be allocated several
codes, where the data is spread in time or
frequency
• MC-OFDM(TDMA)users are assigned time slots
to transmit and receive data.
MC-OFDM(TDMA)
• OFDM divides a broadband channel into many parallel sub channels.
• The sub channel pulse shape is a square wave.
• Pulse forming and modulation is performed by a simple IFFT.
• To decode the transmission, a receiver needs only to implement FFT.
• OFDM receiver senses the channel and corrects distortion on each sub channel before
the transmitted data can be extracted.
• In OFDM, each of the frequencies is an integer multiple of a fundamental frequency.
This ensures that even though sub channels overlap, they do not interfere with each
other
2) Smart Antenna Techniques
• Smart antenna techniques, such as multiple-input multiple-output (MIMO).
• MIMO systems use multiple antennas at both the transmitter and receiver to
increase the capacity of the wireless channel
• MIMO systemsto provide 20 Mbps for 4G systems.
• MIMO different signals are transmitted out of each antenna simultaneously
in the same bandwidth and then separated at the receiver.
Methods
• Single-Input, Single-Output (SISO)
• Single-Input, Multiple-Output (SIMO)
• Multiple-Input, Single-Output (MISO)
• Multiple-Input, Multiple-Output (MIMO)
MIMO System
• Four antennas at the transmitter and receiver to provide four times the data rate of a
single antenna system, without an increase in transmit power or bandwidth.
• Support multiple independent channels in the same bandwidth, provided the
multipath environment.
• Number of transmitting antennas is M, and the number of receiving antennas is N,
where N≥M
1) Single-Input,Single-Output (SISO)
• channel capacity C is
3) Multiple-Input,Single-Output (MISO)
• Consider M transmitting antennas
• The total power is divided into M transmitter branches.
• If the signals add coherently at the receiving antenna, we get an M-fold
increase in SNR as compared to SISO.
• Because there is only one receiving antenna, the noise level is same as SISO.
• Overall SNR is given by
4) Multiple-Input,Multiple-Output (MIMO)
• Assuume N≥ M, we can send different signals using the same BW and still be
able to decode correctly at the receiver.
• Thus, we are creating a channel for each one of the transmitters.
• Channel capacity
MIMO-Block diagram
3)OFDM-MIMO Systems
• OFDM and MIMO techniques can be combined to achieve high spectral
efficiency and increased throughput.
• The OFDM-MIMO system transmits independent OFDM modulated data
from multiple antennas simultaneously.
• At the receiver, after OFDM demodulation, MIMO decodes each sub channel
to extract data from all transmit antennas on all the sub channels.
4) Adaptive Modulation and Coding
with Time Slot Scheduler(AMCTSS)
• TCP/IP is designed for a highly reliable transmission medium in wired N/W
• But wireless network uses a time varying channel where packet losses may be
common due to severe fading.
• To overcome the above problem we need a system with efficient packet data
transmission using TCP in 4G.
• This can be achieved by using a suitable Automatic Repeat Request (ARQ) scheme
combined with AMCTSS.
• Lower layers are adapted to channel conditions while still providing some
robustness through retransmission.
• If the channel quality for each radio link can be predicted about 10 ms into the
future ARQ along with an AMCTSS can be selected for each user to satisfy the
BER requirement and provide high throughput.
• scheduler uses this information about individual data streams and distributes the
time slots among the users
5) Software-Defined Radio(SDR)
• Software-Defined Radio (SDR) system is a radio communication system
which uses software for the modulation and demodulation of radio signals.
• An SDR performs significant amounts of signal processing in a general
purpose computer
• The goal of this design is to produce a radio that can receive and transmit a
new form of radio protocol just by running new software.
• It have significant utility for cell phone services, which must serve a wide
variety of changing radio protocols in real time.
• The hardware of a SDR consists of a super heterodyne RF front end which
converts RF signals from and to analog RF signals, and analog to digital
converters and digital to analog converters which are used to convert digitized
intermediate frequency (IF) signals from and to analog form, respectively.
• SDR can talk and listen to multiple channels at the same time.
6)Cognitive Radio(CR)
• It is not only a radio technology, also includes how the spectrum can be
efficiently shared by operators/users/systems.
• The main functions of CRSensing,dynamic spectrum allocation and
adaptive communication
• The CR focuses on applying software capabilities to determine when
frequencies are free to use and then use them in the most efficient manner
possible.
Uses
• Determine which portion of the spectrum are available and detect.
• Select the best available channel
• Sharing channel between users
• Vacate the channel when license user is detected
CR-Architecture
• There are two main subsystems in a cognitive radio.
1) Cognitive unit makes decision based on various inputs.
2) SDR unit operating software provides a range of possible
operating modes
• Cognitive enginetries to find a solution based on received
inputs.
• Policy engineverify and ensure that the solution provided by
Cognitive engine with regulatory rules.
• The utilization of all elements use of available spectrum and
access common set of radio hardware..
Features
• Cognitive capabilitydetect the existence of the information from
the surrounding environment of the radio.
• sense and ability to capture the different variations of environment