Professional Documents
Culture Documents
MCC Searchable
MCC Searchable
ular systems, 6
Telecommunication Generations, Cell
1.0 1.1 Introduction to Mobile Computing,
stics,
,Signal Propagation, Signal Characteri
1.2 Electromagnetic Spectrum, Antenna
ctrum: DSSS & FHSS
Multiplexing, Spread Spe
s , Localization and 10
itecture, Radio interface, Protocol
2.0 2.1 GSM Mobile services, System Arch
security (A3,A5 & A8)
Calling, Handover,
tocol architecture
2.2 GPRS system and pro
: nts on Core Network,
e network ; Improveme
2.3 UTRAN , UMTS cor
Transport layer 12
Mobile Networking : Me diu m Access Protocol, Internet Protocol and
3.0 | 3.1 uction to multiple
rol ; Mo ti va ti on for spe cialized MAC, , Introd
3.2 Medium Access C ont
ACA)
Access techniques (M
Scanned by CamScanner
Mobile IP: IP Packet Delivery, Agent Advertisement and Disco
Routing (DSDV.D SR) trati
very, Regis on,
Tunneling and Encapsulation, Reverse Tunneling, ————__|
. i irect
3.4 | Mobile TCP : Traditional TCP, Classica l TCP Improvements like ae outTCP,Freezin
Snoopin
oe
TCP & Mobile TCP, Fast Retransmit/ Fast Recovery, Transmission/Ti &
Selective Retransmission ;
4.0 4.1 Wireless Local Area Networks: Introduction, Infrastructure and ad-hoc network
4.2 IEEE 802.11:System architecture , Protocol architecture, Physical layer, Medium access
control layer, MAC management, 802.1 1a, 802.1 1b
4.3 Wi-Fi security : WEP ,WPA, Wireless LAN Threats, Securing Wireless Networks ~)
4.4 HiperLAN 1 & HiperLAN 2
6.45 System
ystem Aspects;
Asp LTE Hi gher P Protocol Layers,
LTR MAC layer, LTE PHY Layer,
6.5 Self Organizing Network (SON-LTE),SON for H
etero eneou
Introduction to 5G 8 1s Networks (HetNet),
Scanned by CamScanner
1 Table le ofof Content
Contents
Mobile Communication & Computing (MU-Sem. 7-Comp)
nanrnennnenennssseseeees 2-1
Assignment of Frequencies to Cells .........::.ssesee
1-7 2.1 GSM coccccccecessssssesesssnrsessecececncssscseansnae
1.2.1(b)
Cells... 1-7 GSM Overview.
Advantages of Cellular Systems with Small
2.1.1
1.2.2 ensnentenenenss
Small Cells .... 1-8 2.1.2 Mobile Service .......--:ssessessseereesseercecensercensn
1.2.3 Disadvantages of Cellular System with eccsssrseerrrsresenrercsress 246:
2.1.3 GSM System Architecture ......---sserr
for Cellular
1.2.4 Why Hexagonal Pattem is Preferred osssesecsessseeestesseseeneenenssarenensnes 2-10
eset es 1-8 2.1.4 GSM Radio Interfaces
GyStOMM 2 .essecssecsssecesesssssseceesssenenesscnnnnnessnannneseesne
tecture .......---s+2-42
2.1.5 GSM Protocols and Signaling Archi
. scseesrececcccccs 1-9
1.2.5 Methods of Increasing Cell Capacity.. n of the Call
2.1.6 Localization and Calling Descriptio
---ssssereceerrrrrr 1-10 rnssenseessnrnee Zo VA
1.2.6 Cellular System Using CDM «.......: Setup PrOCEdUre..sseseesssssecssssevesssesssense
Scanned by CamScanner
e
a|
Syllabus :
”
Routing (DSDV)..sneseconsiennssnenenensennssiiniee2B
3.4.2 Dynamic Source Routing (DSR) «.....-sescsssesssssserssess 3-28
Mobile Networking : Medium Access Protocol, Intemet Protocol
and Transport layer, Medium Access Control : Motivation for |] 3.5 Mobile TOPescsssssssssssessesenssrvssseesnnsnetiesseerrvenetnscens 334
Introduction to multiple Access techniques 7 TCP 33)
specialized MAC,
and 3.5.1 Traditional TCP.....sessssssvsessseesessserennnsnsetsnareetssernansne
(MACA), Mobile IP: IP Packet Delivery, Agent Advertisement
Discovery, Registration, Tunneling and Encapsulation, Reverse || 3.5.2 Classical TCP improvement .....ssssecrsessrreressreeeeetszrece3-33
), Mobilei TCP .: Traditional TCP, |} 3.5 2/4) Indirect TCP (IKTCP).wvvnenensrrneinrnrirrre 3.34
4:
ling,
Tunneling,
Routing (DSDV,DSR
Routi
Classical TCP Improvements like Indirect TCP, Snooping TCP &
Fast Recovery, Transmission/ 3.5.2(b) Snooping TCP (S-TCP) ...ssooeesssvsssssecerenssseserstasesete 3-36
Mobile TCP, Fast Retransmit/
Timeout Freezing, Selective Retransmission. 3.5.2(c) Mobile TCP (MeTCP) ...csssssseossnessnsecsesnaenseecsesnsnsnanes3-37
Medium Access Protocols .........::ccccceccesssseseeesenereeee 3-1 3.5.4 Transmission/ Time-out Fre@Zing .......-.eceecvesreeereseees3-39
3.1.1
3.5.5 SAO
Selective Retransmission ..........ssesscceecesneteessneeeeeee
3.1.2 Internet Protocols .........:cceccscsseeesesesesssesereneeesenenseeteeenes 3-1
3.5.6 Transaction oriented TCP (T/TCP) ......-ssssesssesseseenes3-40
3.1.3 Transport Protocols ........cssccccsescsceceesereeteeeseeneaneaeenennes 3-2
dA]
Comparison of TCP Variants .........ssseccecssensessnsse
3.2 Medium Access Comtrol........sssecsesseeessnneseesresseenseesees 3-2 | 3.5.7
IPv4 and IPV6... sever seseesesueseeaeanesaessearsesesesensseeneess "42
3.2.1 Motivation for Specialized MAC .........---.sseesseeseesseesees 32 | 3.6
'
3.2.1(a) Hidden Station Problem and Exposed Station
PLODIOM .......esscccsseeteetentesteneessesseneeatentencens seoeceneeeeeneennes 3-3
Chapter 4: Networking Basics 4-1 to 4-48
3.2.2 Multiple Access with Collision Avoidance (MACA)...... 3-4
Syllabus :
3.3 Mobile IP ..o..esescssccescessseeeeseseeseeerseeseseeseensaneneanennentnnc 3-4
Area Networks : Introduction, Infrastructure and ad-
3.3.1. Mobile IP : Basic COncept....vsssrsnncnntresrasnsee 36 |] Wireless Local
IEEE 802.11:System architecture, Protocol
3.3.1(a) Need for Mobile IP ....-ssssesscessssssseenserseernscenensncee 3-6 || hoc network,
; ; a5 architecture, Physical layer, Medium access control layer, MAC
3.3.1(b) Goals/Requirements Of Mobile IP ..........sesc eeeeseeeeees management, 802.11a, 802.11b, WiFi security : WEP, WPA,
Basic Terminology ......escecseecsecsssesseenessnsrneeenecosssanersaees 3-7 Wireless LAN Threats, Securing Wireless Networks, HIPERLAN 1
. 3.3.A(c) Scenario,
HIPERLAN 2, Bluetooth : Introduction, User
and
, 2 IP Packet Delivery
a Architecture, protocol stack
........s:-s:+sse 3-10
3.3.3 Agent Advertisement and DiSCOVETY sa0 41 Wirelass Local Area N@tworkS ....ccsssssseecsessceeteeesnennes 4-1
.
-
.3.3(a) A ent Advertisement ....cscesecssessssssersnessnnnisessssecnsnets INtrOdUction........ccesssssssescceseeesseeceessesueeneeceeneneneneneonnes 4-1
aac) "9 9.42 4.14
-
3,3(b) Agent Solicitation.......ccrerrssersrreerrerrseerermrens 4.1.2 Types Of WLAN qu... ceccesesesessestsasstenesesreessnessesssnsssenens 4-2
aaah) "0
3-12
3.3.4 Registration .soecscesseeresssnrseersesssneseessanannnarenseneeeseses 4.1.3 Difference between Ad-hoc Network and Infrastructure
3.3.5 Tunnelling and Encapsulation... 3-18 based Wireless Networks ...ssscsssssssssseneeneneenesns 43
3,3,5(a) [Pein Encapsulation .rsorocnesseernrnenernenrerns 317 | 42 IEEE 802.14 vosccsssssstsssssassee cronreuanasiseqnnnsiigsvt 4-4
3.3.6(b) Minimal Encapsulation...nnennnirnnnnenenunnnns S48 | 4.2.4 IEEE 802.11 System Architecture. ..nennnnnnsnen 44
3.3.5(c) Generic Routing Encapsulation (GRE)... 3-18 | 4.9.2 IEEE 802.11 Protocol Architecture ..n.essseenennsee 46
3,3.5(d) Optimization errrrronnrrnnurennenrern sina 3-20 | 4.2.3 IEEE 802.14 Physicat Layer ....ssoserersnnnnnceen48
4.2.3(a) Direct Sequence Spread Spectrum Physical Layer
3.3.6 Reverse TUNNEIIMG ..sccrrsssessrsrerserssereereressssiseeienees 3-24 .c c c c sc ecscecse csens eaese sceseseas n evensenesesnent 48
PHY). csssccssssssssetssssssessssnsneeceessesnsaney
(DSSS-PHY)...e
3-22
3.3.7 _ Limitations Of Mobile IPoessesssessssseestssesesesersesseatieeiss
7 Oy Tecttaveteeé
° publications
Scanned by CamScanner
Table of Contents
3 ooeoumeoees_
Mobiie Communication & Computing (MU-Sem. 7-Comp) —— oees
e S
Frequency Hopping Spread Spectrum Physical Layer
4.2.3(b)
(FHSS — PHY) .ecseccsecssseeeeeeessesesnesessescsansnsseeseeaeneenes 4-9
Mobility Management 5-1 to 5-10
Chapter 5:
4.2.3(C) Infra Red Physical Layet.c.cscsssssssssssssssstessssseeesnees 410
4.2.4 IEEE 802.11 MAC Sublayer ..........ccccssssssssssseeseenee 4-10 Syllabus :
Mobility, Optimization,
MAC Frame FOrmat......sessceccseessssssseesnessseessnessseessae 4-11 Mobility Management : Introduction, IP
4.2.4(a) Micro Mobility : CellulariP,
IPv6; Macro Mobility : MIPv6, FMIPv6;
4,2.4(b) Access Mechanisms in IEEE 802.11 0... cece 4-13 HAWAII, HMIPv6
MAC Management...
ccc ccccseeseceseeteercsreeeens 4078 oe 1
4.2.5 5.1 Introduction to IP Mobility
anannerent 5-1
4.2.5(a) Synchronization in IEEE 802.11............cccceeeeeeeees 4-18 5.1.1 Mobile IP... . veaueneneenssseeveenenseceecersnecerscee
ennnenerercstertets 5-2
4.2.5(b). Power Management in IEEE 802.11 oo... cseeeceeseeeeee 4-19 §.1.2 Optirnization .....essscccreceseccessceeneseeneseeennn
eses 5-4
4.2.5(c) Association/ Reassociation oo... ceeene
ce rercereceeeeee 4-21 5.2 PVG — Internet Protocol Version 6 .....--sssseeeeees
4.2.5(d) MAC Management Information Base (MAC-MIB)...... 4-23 5.3 Macro Mobility
enneeest® 5-5
4.2.6 IEEE 802.11a we 4-24 5.3.1 MIP V6 (Mobile [PV6) ......--esccesssnssneseseessssseressesea
...-.---.-+-++++ 5-6
5.3.2 FMIPv6 (Fast Hand Over for Mobile |PV6)..
4.2.7 8B02.11b ....... eee ssusestntsnananssstantnnetneneeces 4-24
4°28
Wireless LAN threats .......sssscssssdeesecccccsneeeesnseeensntis
4-29 Chapter 6: Long Term Evolution of 3GPP_ 6-1 to 6-32
Securing Wireless N@twork.......seceecccceseereseententers
4-31
HIPERLAN Standards ......-ssssceececscrreeseseeseteneneneenerees Syllabus :
4-31 (LTE) of 3GPP : LTE System Overview,
HIPERLAN Tel ....-sesescescseeeeeeseeeseescsstesesarsesenentaneesesges Long-Term Evolution
from UMTS to LTE; LTE/SAE Requirements, SAE
4-32 Evolution
4.4.1(a) HIPERLAN-1 MAC Sublayel......-..-:ssssseererssrercetees
Architecture; EPS: Evolved Packet System, E-UTRAN, Voice
over
4-33 System Aspects,
4.4.1(b) HIPERLAN-1 CAC Layet ...sececssssessssssetrerssnnenssntscts LTE (VoLTE), Introduction to LTE-Advanced;
secetenennansesscanserensess 4-34 LTE Higher Protocol Layers, LTE MAC layer, LTE PHY Layer, Self
4.4.1(c) HIPERLAN-1 Physical Layer eo s
Organizing Network (SON-LTE),SON for Heterogeneous Network
sess 222 4-35
4.4.2 HIPERLAN -2 seccssesessccsessesnnnesenetcesctsnnnnannneg (HetNet), Introduction to 5G
4-37
4.4.2(a) HIPERLAN-2 Physical Layer .....-+-----rscrerrrerrrren 6.1 Long Term Evolution : OVervieW...ssssesssssssssessseennessnes 6-1
Layer -..eceeeeerceerees 4-38 LTE Systerm OVErViGW ....ssesssosssscesessssnstseantnensiesessnnsnes 6-1
4.4.2(b) HIPERLAN-2 Data Link Cantrol 6.1.1
terete ste 4-40 6.1.2 Evolution from UMTS to LTE... cscs eceeesertneeensees 6-1
45 BIUetOOth .s.secceesccceessecenenecsecestereenenne
6.2 SAE/LTE Architecture + 63
45.1
6.2.1 SAE Requirements ....sssssscecsssesssteersesessssesessesessnenenens 6-3
45.2
6.2.2 SAE Architecture vssssesssecccscsseesssssnessvesssesssssssserseseees 9
4.5.3 Architecture
e 6.2.2(a) Evolved Packet System (EPS)
4.5.4 ....-ssscssereeenssseseeennenertece
Bluetooth Protocol Stack
6.2.2(b) The User Equipment (UE) ........sssssssesneens nueeadsthvach cneey 6-3
4.5.4(a) Bluetooth Baseband States
The E-UTRAN ... Reece ceanen nena Re eae ey eMGaeH ea nana pene en Meee see en nee 6-4
ERLAN-1, 6.2.2(c)
4.6 Comparison of IEEE 802.11, HIP
seerseeeneerersteee seannesagens 6.2.2 (d) Evolved Packet Core (EPC) (The core network)... 64
HIPERLAN-2 and BIUtOOth..cssss
WA TectKnewtedes
Puolications
Scanned by CamScanner
¥ Mobile Communication & Computing (MU-Sem. 7-Comp) _4 _Table of Contents
6.3 Voice over LTE (VOLTE)..cccsssssssssssesessssueessssseseesssne 6-5 | 66.2 Logical Channels to Transport Channel Mapping.......6-18
6.4 Introduction to LTE-AdVanced ........ccceeetesssseessees we BT | 6.6.3 Logical Channel Prioritization ........ss.sssseerererrsereecsee 6-20
6.4.1 LTE Advanced Key Features ..........ssssssssesssesseeseeen 6-7 | 6.6.4 Schedling.....essseesseerersreserrnetnartnersnerrnerenrnee “6-20
6.4.2 LTE - Advanced : System ASpects .........ccssssseseeeee 6-7 6.7 PHY Lay? .csseseccssesscesssecessseensvssszsnsnenssensssscnsensscresssed 6-20
6.4.2(a) Carrier Aggregation ...c.csscssscsssssssssesessecssseeserseeeeeees 6-7 | 6.7.1 Generic Frame Structure ......sssesseseeeesseseesssesetseenseeees6-20
MIMO (Multiple Input and Multiple Output)...............0+. 6-9 | 6.7.2 Downlink Multiplexing ........ssssssssccceressssseeseeeneecetsnsees6-21
6.4.2(b)
6.4.2(c) Relay Nodes ............eccssssssssssssnsennssnnennneees besssnsesesteteees 6-9 | 6.7.3 Physical Channels .......ssscssssssseessecersesnnssssctsnessenansane6-21
6.4.3 LTE Advanced Architecture .........cccccscseereeeenes 6-11 6.7.5 Mapping Downlink Physical Channels to Transport
Channels .......cccccceseessteessseeseseerescecesantenaesseenensnaneneneny 6-22
6.4.3(a) Architecture ...cccscsssessccssvssssesrstcessseeneesnensetneve 6-11
6.4.3(b) Comparison of LTE and LTE-A....... ests 6-12 | &8 Self Organizing Network (SON-LTE)...-xre-crrv eae
6.4.4 © LTE Protocol Stack .....sssscssssscsssssssseeesnneseanesennsete ei3 | &9 SON for Heterogeneous Networks (HetNet) .....-. ee
6.10 O28
Introduction t0 5G v.ssecssssescessessesseceessesssseeseeeeesseerseesn
6.5 Higher Protocol Layers ....scsstsiesssensensenses 6-15
6.10.1 OVEIVIEW on nnnnraninnmnannnnnennennnncn se BOB
6.5.1 Radio Link Control (RLC)..cusscssievsvstseusseneeete 6-15
6-16 6.10.2 5GAA (Autonomous Association) .........:s:sseesseseeseees 6-29
652 Packet Data Convergence Protocol (PCP)...
Scanned by CamScanner
Introduction to Mobile |
Computing
ae
Unit! |
Access (FDMA).
ication.
~ 1G system provided only voice commun tries.
n different network operators and coun
~ 16 was not supporting roaming betwee
Examples of 1G networks are :
ne System) USA
© AMPS (Advanced Mobile Pho
Sweden
© NMT (Nordic Mobile Telephone)
eration (2.56) : 1990s
Second Generation (2G) ~ 2.5 Gen
the early 1990s.
The second generation (2G) of mobile cellula r started In
ua Division Multiple Access (TOMA) or Code Division Multiple Access
It was compleetely digital and used elther Time
(CDMa).
Scanned by CamScanner
Introduction to Mobile Computiny
technology.
It provides increased capacity and security due to the uses of digital cellular
2G systems support international roaming.
lephony but also a new range of low data
2G systems not only provide better voice quality using digital voice te rate
services such as mobile Fax, voice mail, short message service (SMS).
: satellite and wireless-loc
In addition to digital voice telephony, Cordless, public mobile radio, i -local area networ k (WLAN)
solutions began to emerge.
2.5G
Between 2G and 3G there was not much change in the technology hence an intermediary phase, 2.5G was introduced
in the late 1990s.
2.5G is used to describe 2G-systems that have implemented a packet-switched domain in addition to the circuit.
switched domain.
GPRS (General Packet Radio Service) is a 2G service, which delivers packet-switched data capabilities to existing GSM
networks. It allows users to send graphics-rich data as packets.
The importance of packet-switching increased with the rise of the Internet and the Internet Protocol (IP).
Another example of 2.5G mobile technology is EDGE (Enhanced Data rates for GSM Evolution). EDGE provides data
rate up to 384 kbps which is higher than GSM.
Advantages of 2G over 1G
2G standards support roaming between different operators and countries,
In addition to circuit-switched voice services, 2G enabled the first wave of mobile data and
Internet services, now
widely adopted by users.
2.5G services enable high speed data transfer over upgraded existing 2G networks.
Some 2G standards are:
GSM(TDMA-based)
0
D-AMPS
0
1S-95/CDMAone
0
incremental cost than 2G, Mers as well as higher data rates at lowel a
|
We ae
Scanned by CamScanner
M jobile Communi cation & Computing
—
(MU-Sem. 7-Comp) 1-3 Introduction to Mobile Computin
o W-CDMA
o CDMA2000
o UWC-136
o TD-CDMA/ TD-SCDMA
o DECT
4G standards are :
o LTE (Long Term Evolution)
o WiMAX (Worldwide Interoperability for Microwave Access)
Scanned by CamScanner
currently under deVelopmeny :
ieee amete x Se expected to roll out by2004" El
introduced
l in | 1980 1993 20 01 AX LTE Advanced, OMA an do “|
Services Voice only | Voice+data | Voice + ne «deo High quality | latency network for mission
Multime i toes voice over IP, | critical applications, loT and
calling an 3D gamming , surveillance, autonomous
Streaming HD video driving and many more,
conferencing,
HD
multimedia
streaming
ard
viet
Scanned by CamScanner
High ch Hse
Disadvantages | Limited Low network |
oe Hard to Hard to implement, Many of
Capacity, not | range, slow the old devices would not be
secure, poor | data rates ae implement,
Ow network complicated | competent to 5G, Developing
battery life,
coverage, High hardware infrastructure needs high cost.
large phone
size, of spectrum | required .
background “ae
interference
Voic i
lications
Video High speed Super High speed mobile
a = eee calls,
conferencing, applications, | networks, Smart Vehicles, loT,
mess
ages, mobile TV, GPS __ | mobile TV, Virtual and Augmented Reality,
bro
Wearable Low latency mission critical
' wsing
devices applications etc.
L_— : partial)
n cell cluster
cell Fig. 1.2.2 : Cellular System with seve
Fig.1.2.1 : Diagrammatic vs. actual cell coverage
ar Systems
1.2.1 Frequency Reuse in Cellul
TechKnowledgé
Pubbications
Scanned by CamScanner
Introduction to Mobile Computin
"
use.
S full duplex channels available for
Consider a cellular system which has K channels (K<S).
N number of cells and each cel
lis allocate da group of
divided into
— Assume that the S channels are
K =S/N.
Thus, total number of channels per cell is
S = KN
able channels can be expressed as
— Therefore, the total number of avail
frequencies is called cluster.
The N cells which c ollectively use
the complete set of available
and is typically 4, 7 or 12.
The factor N is called the cluster size
of the cluster size i.e. 1/N.
system is given by reciprocal
Frequency reuse factor of a cellular
tor
(b) 7 cell cluster (c) 3 cell cluster with 3 sec
(a) 3 cell cluster
per cell 3 sector antennas
Scanned by CamScanner
to Mobile Computing
Mobile Communicatio : to Mobil Co id
J.
a in & Computing (MU-Sem. 7-Comp)
—
47
ntroduction
Introducti
4 h v Ss. i CO-C| 0)
We first move i=2 successi Cessive cells in: downward direction, From th i. And
. From there we turn 60° in counterclock wise direction.
then move j=1 cellclusters
forward— through8 the centre of the cell thus locating ig cell £4inin cluster
cl 3. Similarly
im we can locate cell
+4 in neighboring sters-—ichster ii clea
Cluster 2 iA
Cluster 3
a
Scanned by CamScanner :
2. Less transmission power
high power to transmiti the signal.
ignal. For vices .
For mobile devices
If the transmitter is far away from the receiver then it requires
power is the main constraint, so reduced cell size requires less transmission power.
4. Robustness
fails, it
Cellular systems are decentralized and so more robust against the failure of single components. If one antenna
only affects communication within a small area.
2. Handover needed
When mobile station moves from one cell to another cell, the process called handover is carried out. Depending on
the cell size and the speed of movement, this can happen quite often.
3. Frequency Planning
Cellular system needs proper planning of frequency distribution to avoid interference between transmitters.
— When considering geometric shapes, which cover an entire region without overlapping or leaving gaps and with equal
areas, there are three sensible choices.
1. Equilateral triangle
2. Square
3. Hexagon
The Table 1.2.1 describes the unit coverage area for each of the above mentioned shapes.
Table 1.2.1 : Unit coverage area for Triangle, square and Hexagon shapes
Triangle | R 1.3 R?
Scanned by CamScanner
intro MobMobii le Compu! ting
icatition
munica
bile Commun -Sem. 7-Comp)
& Computing (MUS
P
ntroduction to
Mobile Com n
in general with the Hexagon pattern i
I
n
We can closely approximat jati for an omnidirectional base statio
3. mate a circu lar radiat ion pattern which would occur
antenna.
3. Microcell Zones
itting
Fig. 1.2.5 : Cell spl
Cell Sectorization
s 60°sectors/cells
420°sectorsicell
360 cells
Sectorization en
Wy Totlic
Fig. 1.2.6 ¢Cell pub ations
Scanned by CamScanner
4-10 Introduction to Mobile Com,
Another Way to Increase cellular system's
capacity Is to replace the omnidirectional
three or More sector antenna at each base Station by.
antennas.
Use of directional sector antennas
substantially reduces the Interference
among co-channel cells, 3
This allows dense r frequency reuse,
The base station can either be locat |
ed at the center of the original (large
Sectorization is less expensive ) cell, or the corners of the original
than cell-splitti (large) cell
ng, as it does not require
Using Micro cell the acquisition of new base stati
zone on sites.
The disadvantage of cell sectorin
g concept is the need for an incr
eased number of handoffs,
The technique known as microcel
l that uses zones instead of sect
ors to reduce the number of hand
As shown in Fig. 1.2.7 this technique empl offs,
oys three antennas that provide
antennas are connected coverage into the micro cell.
to the same base station, All three
Microwave or
fiber optic link
_ Zone selector:
Ww TechKnowledga
Publleatians
Scanned by CamScanner
Fig. 1.2.8 : Cell breathing depending on the current
load
1.3 Electromagnetic Spectrum |
- ror radio transmission, there are many frequency bands. Each frequency band has some advantages and
disadvantages and can be used as per the application.
- Fig. 1.3.1 illustrates the frequency spectrum for radio transmission. Frequencies start at 300Hz and go up to over
300THz.
Twisted . . Optical
+ Coax cable t- transmission |
_pait__t > je
1mm 10 km 400 m tm 10mm 100pm | 1pm
300. Hz 300|kHz 3/MHz | 300)/MHz 30/GHz 3/THz 300|THz >
pg ——§ pig __$§plg——_ pg pli - e+
VLF LF MF HF VHF UHF SHF EHF Infrared Visible UV
light
_ Medium _| Frequency
Twisted Pair | 0-3.5 KHz
Co-axial cable | 0-500 MHz
Fiber Optics 186 = 370 THz
VF(Voice 300 Hz— 3KHz GW Used by telephone system for analog subscriber lines
Frequency)
vay TechKnowledga
Publications
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7-
ea Tee
Signal propagation
Transmitter : i
Earth Receiver
(a)
Fig. 1.3.2 : Contd...
. .
WH Feathnewietgt
Publications
Scanned by CamScanner ;
Mobile Communication Computing (MU-Sem 7-Comp) Introduction to Mobile Computing
113
Ionosphere
Transmitter Receiver
(b)
Signal propagation
Transmitter Receiver
(c)
and Line-of -Sight propagation
Fig. 1.3.2 : Ground Wave propagation, Sky wave Propagation
1.4 Antennas
MU= Dec: 14) May'17; Dec. 18
n. (Dec. 14, 5 Marks)
a. Write about types of antennas and their radiation patter
nae. (May 17,5 Marka)
What is an antenna? Explain different types of anten (Dec. 18,10 Marks)
Vrite a short note on antenna.
ical currents in conductors or
nna is a devic e that conve rts elec tromagnetic radiation in space into electr
An ante
respectively.
used for receiving or for transmitting,
vice-versa, depending on whether it is being
the radiated field in various directions from the
enna describ es the relative strength of
- The radiation pattern of an ant
.
antenna, at a constant distance
tion patterns are a
atio n pa ttern is thre e-di mens ional, but usually the measured radia
- Inreality the radi
horizontal or vertical planes.
three-dimensional pattern, in the
two-dimensional slice of the
antennas discussed below.
- There are various types of
Scanned by CamScanner
Co
introduction to Mobile
Dow
y
rp |
antenna
pattern of Isotropic
Fig. 1 aa : Radiation
sole vadation 93
1.4.2 Omnidirectional Antennas ttern is 360 degrees in the
anten nas, dipol e ante nnas are real antennas. The dipo
— Unlike isotropic
75 degrees in the vertical plane.
horizontal plane and approximately
any particular direction.
l” antenna because it does not favor
— — Itisalso called the "non-directiona
an isotropic antenna. The higher the gain
of 2,14 dB, which is in comparison to
— Dipole antennas are said to have a gain _ .
tennas, the smaller the vertical
i beam wi idth is.
|
s of the compass or when listening for signals from
— This
hee type of antenna is useful for broadcasting a si gnal to all point
all points.
Dipoles
|
— The most commonly used antenna is Hertzian dipole.
by a small feeding gap.
— The dipole consists of two collinear conductors of equal length, separated
energy).
— The length of the dipole is half the wavelength A of the signal (for efficient radiation of
— Fig, 1.4.2 shows a typical Hertzian dipole.
KL *
Side view (xy-plane) . Side view (zy-plane) Top view (xz-plane)
Fig. 1.4.3 : Radiation pattern of Hertzian dipole
ee
, al
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7- Comp) 1-15 Introduction to Mobile Computing
Monopoles
- Shown in Fig. 1.4.4 is the ideal vertical monopole antenna
It has the length A/4 and also known as Markoni antenna
A monopole over an infinite ground plane is theoretically the same as the dipole in free space.
The flat surface of a vehicle’s trunk or roof can act as an adequate ground plane.
Directional Antenna
Adirectional antenna or beam antenna is an antenna which radiates or receives greater power in specific directions.
This allows increased performance and reduced interference from unwanted sources.
transmitter or receiver.
Unlike omnidirectional antennas, directional antennas must be aimed in the direction of the
Examples of directional antennas are parabolic and Yagi antenna shown in Fig. 1.4.5 and Fig. 1.4.6 respectively.
direction of X-axis.
Fig. 1.4.7 shows the radiation pattern of a directional antenna with the main lobe in the
Op Pubbicakions
TectKnomedat :
Scanned by CamScanner
Mobile Communication & Com uting (MU-Sem. 7-Comp) 1-16 Introduction to Mobile Come
a M2 M2
45 Signal Propagation
the direction of
since wireless networks use unguided media such as radio waves, the signal has no wires to determine
. 4
7 Ss. . .
2
propagation, where as signals in wired network only travel along the wire.
along this wire such as received power
In wired network, one can easily determine the behavior of a signal traveling :
depending on the length.
1.5.1 depending upon
ror wireless transmission, this predictable behavior is only valid in a vacuum. As shown in Fig.
the distance from the sender, the transmitted signal can fall into the following ranges.
Transmission Range
and hence able to communicate.
Within this range the receiver receives the signals with a very low error rate
Detection Range
power is large enough to differ signal
Within this range the receiver can detect the transmission i.e. the transmitted
from background.
Interference Range
adding to background noise. The receiver will
Within this range, the sender may interfere with other transmissions by
not be able to detect the signal but the signal may disturb other signals.
Distance
Interference
Ww TechKnowledga
Publications
Scanned by CamScanner
oe
&
small
A radio wave emitted by a sender can take the LOS path (i.e. travel in straight line), or it may be scattered at
Ree
Scanned by CamScanner
1-19 any ; .
i
: Mobile Communicatat&io ting (MU-Sem. 7-Comp).
Compun ntroduction to Mobile Computing
I i -path Propagation
This effect caused by mult ' inal
is called delay spread i.e. th e original signal al iis spread due to different
sign
delays of parts of sign
elays of parts of the al.
Reflection
Multipath
LOS pulses pulses _
Signal at sender
Signal at receiver
1.5.3(b) Fading
over a short
lit ude s, pha ses , or mul tip ath delays of a radio signal
d fluctuations of the amp
The term fading means rapi
distance.
period or short travel
mobility
Fading effect due to due to mobility. Following two
types of
blem cal led fad ing occ urs
propagation, another pro
In addition to multipath
ility.
fading may occur due to mob
Scanned by CamScanner
__Introduction to Mobile Gon’
Mobile Communication
& Computing (MU-Sem. 7- Comp) 1:20.
Long term fading
Power
Signals are the physical representation of data. Data in a communication system can be exchanged through the
signals. Signals are functions of time and location.
Signal parameters represent the data values. Signal parameters are the Amplitude (A), frequency (f) and phase shift
(2). The most interesting type of signal for radio transmission is periodic signal (especially sine wave), used as carriers.
The general function of a sine wave is, s(t) = At sin(2 7 ft t + gt)
AIV]
Fig. 1.6.1 : Time Domain representation of a signal (a sine wave without phase
shift and with a phase shift 9)
eo
Om ated
Scanned by CamScanner
_ a issn means
Multiplexing edn the t th
ability . t os end data coming i| from multiple
i sources, users or| channels over a common shared
ini i use of high-speed
and
i
maximum utilization. To make efficient
c ommunication liines, some form mum interference
of multiplexing is used
_ e
I9Gae
_ It can be noted that there is
tional spaces would be needed.
remaining channels, three addi
ng
Division Multiplexi
Fig. 1.7.1: Space
ype
region ion |(say some
nsmits In a given
Application dio stations if a sin
gle FM station tra w orld without
he me can be use d for FM ra ent rad io stations around the
~ This multiplexing sc
dif fer
n be shared by
ion ranges can the
the same transmiss
city) only. isassigned different
d int o di ff er ent cells. Each cell
interference. service ares is di vi de
systems where the
wet
in cell ular lls.
SDMis also used nce in adjacent ce
-
such that ther e is no! nterfere
frequency band
pubbicactons
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7-Comp) _1-22
Advantage
SDM is easy to implement.
Problem
If two or more channels are established in the same space (For example, severa | radio stations want to broage...
: “ast
the same city), then SDM alone cannot be used.
ta
Advantage
are many users.
med ium at any time whic h resul ts in high throughput even if there
There is only one carrier in the
Disadvantage
, -channel interference may occur.
1. Iftwo transmissions overlap in time co
y synchronized.
co-c hann el inte rfer ence , it is requ ired that different senders are precisel
2. Toavoid
xing
1.7.4 Frequency and Time Division Multiple
xing are combined.
quency and time division multiple
In this multiplexing scheme, fre . Now guard spaces are
cert ain fre que ncy band for a cert ain amount of time
l k; uses
— as shown in Fig. 1.7.4, channe
s.
required in both dimension
multiplexing
y and time division
Fig. 1.7.4 : Frequenc
Application
Communication)
ed in GS M (Gl oba l System for Mobile
The scheme is us
Advantages
on against tapping. .
1. Offers better protecti erference.
aga ins t fr equency selective int
2, Provides pro tec tio n TechKaowledge
publicatians
Meal
Scanned by CamScanner |
Co m| p)
Sem, 7--Co 1-24
cation & Computing (MU-
W_Mobile Comimuni
Disadvantage
senders.
ired betwee n different
Necessary. coordination Is requ
joe
Users are now separated using codes.
i ep)
— In this, signals from multiple independent sources can be transmitted at the same time over the same frequency band.
This task can be achieved via spread spectrum technique in which special codes called as orthogonal codes are used to
spread each signal over a large, common frequency band.
So, in CDM, each channel is assigned a particular orthogonal code and this is how multiplexing is achieved.
Guard spaces are now required in the code dimension.
Advantages
1. It gives good protection against interference and tapping.
2. Bandwidth utilization is very efficient.
3. No synchronization is needed between the sender and the receiver.
Disadvantages
1. Varying user data rates,
2. More complex signal regeneration and hence high complexity at the receiver.
3. Itis implemented using spread spe
ctrum technology,
wien
Scanned by CamScanner
Mobile Communication & Computing (MU-S:
_ 1-25
4. preci l
Areceiver must be precise i
gst ce od
eampracise Wows r control is require with the transmittert 0 apply decoding
¥ synchronizedsignals correctl y.
d. All sh ‘
‘ e power
reach the receiver with more’or less the sam
should
otherwise low power sig‘ nals could be drained by a
ower ones.
dP/dt ;
dP/ct
User signal
)
ii) Broadband interference
;
i Narrowband interference
f
Sender
Receiver
Scanned by CamScanner
to Mobile Comput
Introduction
1. DSSS Transmitter
DSSS transmitter involves two major steps.
Step 1 : Spreading the signal
Spreading in Direct Sequence modulation is achieved by modulating the carrier signal (user data) with a digital code
sequence which has a bit rate much higher than that of the message to be sent.
This digital code sequence is typically a pseudorandom binary code. It is also known as PN ("pseudo-noise") sequence
or chipping sequence.
Spreading can be done by simply XORing user bit stream with chipping sequence.
The time period of a single bit in the PN code is termed a chip, and the bit rate of the PN code is termed the chip rate. -
The spreading process is shown in Fig. 1.8.3.
Scanned by CamScanner
1-27 Introduction to Mobile Computin
‘Mobile Gommunication & Computing (MU-Sem. 7-Comp)
7/0/1.1,0 0)1)0,1,9
psss
Fig. 1.8.3 : Spreading with
ce as 0110101.
— Consider the chipping sequen
sequence itself.
lt of XOR ing is the chipping
If the user bit is 0 the resu
pping sequence.
bit is 1 the res ult is the complement of chi n the spreading factor
If the use r
ati on of one chi p in chi p ping sequence is t, the
r data is t, and the dur
If the bit duration of use
bandwidth of a signal.
5 = tpt, determines the signal needs (s - w) ban
dwidth.
w the n the res ult ing
bandwidth
— If the original sign al has
n
Step 2: Radio modulatio
radio carrier.
w modulate d with a
— Thespread signal is no ncy.
to the carrier freque
hifts this signal
— Theradio carrier s
transmitted.
— This signal is then
2. DSSS Receiver
:
involves three steps
The DSSS receiver
(i) Demodulation
(ii) Correlation
(iii) Decision Making
Received Correlator
Lowpass (7
signal filtered [
Products
signal !
Data
Receiver
Fig. 1.8.4 : psss
Tecticat
Wy pupl etes
taneians
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7-Comp) 1-28 Introduction to Mobile Computing
(i) Demodulator a
:
Demodulation of the received signal is achieved by using the same carrier as the transmitter, reversing the Modulation 2
process. Bandwidth of the resultant signal is approximately same as that of the original spread spectrum signal,
(ii) Correlator
Here the receiver uses the same pseudo random sequence (Chip sequence) as the transmitter. Pseudo random,
sequences at the sender and the receiver have to be precisely synchronized because the receiver calculates the
product of a chip (XOR operation) with the incoming signal. During a bit period an integrator adds all these products,
(iii) Decision Unit ;
Finally the decision unit decides if the sum represents binary 0 or 1, based on the sum generated by the integrator
during each bit period.
Each correlator is synchronized to the transmitter plus the delay on that specific path.
As soon as the receiver detects a new path which is stronger than the currently weakest path, it assigns this new path
to the correlator with the weakest path.
The outputs of the correlators are then combined and fed into the decision unit.
m (t)
signal with >
multipath
Example of DSSS
User Data: 01
Chip : 10110111000 (11-chip Barker code)
XOR of bit 0 with chip: 10110111000
XOR of bit 1 with chip: 01001000111
Spread signal : 1011011100001001000111
Received signal : 1011011100001001000111
Scanned by CamScanner
XOR of received signal with chip:
(101101110001 0110111000) XOR (1011011100001001000111 0000000000:
Result of Integrator: 0, 11 - uu
Result of Decision unit: 0 < 4 so bit is 0
11>7s0 bitis 1
Decoded data: 01
Even iiff error occurs during
i transmission,
issi received signal can still be decoded correct! y.
Is chan ig ed a th en the received SI ig nal would be
, SEV e nth and fourteenth b t in rece ved s gnal
For e B. four th, fifth
Decoded data: 01 ©
Advantages of psss
effects.
interference and anti-jamming
1. Resistance to narrow band
.
2. Resistance to Interception
ltipath Effects).
3. Resistance to Fading (Mu
ss
Disadvantages of Ds
l necessary.
1. Precise power contro
plex.
2, Overall system is com
the receiver.
n the sender and
. 3. ls required betwee
The applications
Applications of
DSSS
ry, Ind ust ria l Sci ent ific, and Civil uses.
ay for Milita
a re widely used tod
The DSSS Communications
owing :
include the foll
shared channel.
1, CDMA radios n ma ny us er s co mmunicate over a
ei
unications wher
ef ul in mu lt ip le access comm
It is us
MA.
For example, CD for mobile
is a st an da rd that i s developed
802. 11
WLAN ications. JEEE pes of Physical
2.
e sp re ad spectr um commun Th e st an da rd defines t hree ty
widely us the world. Spectrum
Wireless LAN im pl em en te d throug hout Di re ct Se qu ence Sprea d
com munication,
and widely Communications,
es e ar e Infrared (IR)
Th communi cations.
Layer communications.
ency Hopping Spread Spectrum
ns, Frequ like security,
Communicatio
du e to the l r advantages
Cordless Phon
es Cordle ss phones
3.
t Sp r ea d Spectrum in
en
cturers implem
Several manu fa range.
imm unity to
noise and longer aric
Wr rpup es
iact ons
Scanned by CamScanner
Introduction to Mobile Compyy.
_Mobile Communication& Computing (MU-Sem. _7-Comp) 1-30
1. Slow hopping
— Transmitter uses one frequency for several bit periods. Fig. 1.8.6 shows six user bits with a period t,. Transmitter uses
frequency f, for transmitting the first three bits and takes dwell time ty, Then transmitter hops to the nex
frequency fy.
ts Saat
— Slow hopping is cheaper and has relaxed tolerance.
— It is less immune to narrowband interference.
a
ite
2. Fast hopping
- Transmitter changes frequency several times during a bit period. In Fig. 1.8.6 the transmitter hops three times during |
a bit period.
1 >t
1 0: 0 1
Oo
a ! th .
- ———7
' 1 t 1 : > t
‘4 [oc
a ee ' 1 1
t i—+t
7; 2T, 3Tp 4T, 5T, 6T,
Fig. 1.8.6 : Slow and fast frequency hopping
— Fast frequency hopping systems are more complex to implement because transmitter and receiver should stay ~
synchronized,
— These systems have better resistance against narrowband interference and frequency selective fading.
FHSS Transmitter
1
Fig. 1.8.7 shows simplified block diagram of FHSS transmitter.
4
Step1: Modulate user data using digital-to-analog modulation such as FSK or BPSK. For example, frequency fo is used. | 4i
for a binary 0 and f, is used for binary 1. 4
Wie
Scanned by CamScanner
__1-31 Introduction to Mobile Computin
puting (MU-Sem.7-Comp)
Mobile Communication & Com ce Is fed into a frequen
ncy hop pin g is per for med by using hopping sequence. The hopping sequen —
Step 2: Fre que
ncy fi.
synthesizer generating the carrier freque generate a new
is done. It uses modul ated narro wband signal and carrier frequency to.
Step 3: Second modulation 1.
j
spread signal with frequency of f,+ fofor a bit O and f, +f; for a bit
Spread
transmitter
signal
Narrow
band signal [a
User data mie
(binary)
Hopping
sequence
FHSS Receiver
tions to reconstruct user data.
FHSS receiver performs reverse func al.
ert signal into narrowband sign
odu lat e rece ived data by using hopping sequence and conv
Step 1: Dem
on to reconstruct user data.
Step2: Perform analog-to-digital modulati
Received
Narrow ——
signal band signal. |: Data
Ge ITE] Li :
Hopping
sequence
Fig. 1.8.8 : FHSS receiver
t hopping
Slow hopping Vs. Fas
g Vs. Fast Hopping
Table 1.8.1: Slow hoppin
ng severa | different
ed using a One bit is transmitted usi
Several bits are transmitt frequencies.
Main Idea
same frequency. band interference
ance to Better resistance to narrow
provides lesser resist ng.
Resistance to narr
owband
nce. and frequency selective fadi
narrowband interfere
is transmitted using:
interference More secured since one bit
mpared to fast
Lower security as co several different frequencies.
hopping. to slow hopping.
ent as More complex as compared
Less complex to implem
pin g.
compared to fast hop
Scanned by CamScanner
Mobile Communication
& Computing (MU-Sem. 7-Com ) 1-32 Introduction to Moblle
Lane
Resistance to DSSS works best for large data packets in a low to FHSS works best for small data packets in
interference medium interference environment. high interference environment.
= 4
Effect of DSSS systems operate over wider bands, FHSS systems operate with narrow band
multipath fading transmitting their signal over a group of frequencies signals located around different carrier
simultaneously. As long as the average level of the frequencies. If at a specific moment, the
received signal is high enaugh, the DSSS receiver will FHSS system is using a carrier frequency
be able to detect the radio signal. significantly faded as a result of multipath,
the FHSS receiver could not get enough
energy to detect the radio signal.
Effect of delay In DSSS systems, the chipping process generates a FHSS systems have better chances to be
Spread high rate transmitted signal. The symbols of this undisturbed by the presence of multipath
transmitted signal are much shorter / narrower (in effects (delay spread).
time) than the symbols generated by an FHSS
system transmitting the same data rate. These
narrow pulses are more sensitive to delays than a
wider pulse used in FHSS systems.
Power control Near far problem exists in DSSS and therefore It is not much affected by near far problem
precise power control is required. as in DSSS hence power control is not a
problem
Acquisition Time Due to long PN codes it requires long acquisition It has relatively short acquisition time
time because the chip rate is considerably less in
the frequency hopping system.
Q.1 What types of mobile and wireless devices are available in the market ?
Q.3
transmission.
Q.4 Explain various wideband modulation techniques employed in cellular/ mobile technologies.
Q.5 Draw the block diagram of FHSS transmitter and receiver. Differentiate between slow hopping and fast hopping.
Oo atoll
Scanned by CamScanner
Mobile Communication & Com ing (MU-Sem. 7:Co 1-33 Introduction to Mobile
Q.6 Explain what is spread spectrum? How spreading can be achieved? What are the merits of spread spectrum
technique?
Q.7 Explain ditferent methods to Increase the capacity of an analog cellular system and without increasing number of
antennas.
Q.8 What are the advantages of cellular System? Explain cellular system in detail also explain frequency reuse concept in
cellular system.
000
Scanned by CamScanner
2.1 GSM Mobile services, System Architecture, Radio interface, Protocols , Localization and Calling, Handover *
security (A3, A5 & A8)
2.2 GPRS system and protocol architecture
2.2 UTRAN, UMTS core network; Improvements on Core Network
.
2.1 GSM
Global System far Mobile communication (GSM) is the most successful digital mobile telecommunication system in
the world today. It is used by over 1000 million people in more than 190 countries. The primary goal of GSM was to provide.
a mobile phone system that allows users to roam throughout Europe and provides voice service that is compatible to ISDN
and PSTN. This chapter gives an insight of GSM system including its services, architecture, call set up procedure, handover -
and other important aspects such as security and authentication.
Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. It is
an ETSI standard for 2G pan-European digital cellular system with international roaming.
The basic version of GSM (i.e. GSM 900) was founded in 1982.
Now it is the most successful mobile communication system in the world and over 1.2 billion users use the system.
The main goal of GSM was to provide voice services that are compatible to ISDN and other PSTN systems at the same
time allowing users of the system to roam throughout Europe.
GSM is a second generation 2G system, replacing the first generation analog systems,
The initial version of GSM was designed in Europe using 890-915MHZ for uplink and 935-960 MHz for downlink. This
system is called GSM 900.
Another version of GSM called Digital Cellular System 1800 (DCS 1800) uses 1710-1785 MHz for uplink and
1805-1880 MHz for downlink.
is called PCS (Pee
GSM at 1900 MHz (1850-1910 MHz uplink and 1930-1990 MHz downlink) used in US
Communication Services) 1900.
GSM
Modifications and Derivatives of
phases.
The system evolution of GSM can be divided Into three
co. -Phase 1 (1991-1994) : The basic version of the GSM system was in operation.
Scanned by CamScanner
Mobile Communication& Computing (MU-Sem.7-Comp) _ 2-2 GSM
° Phase 2 (1994-1995) : The system specification was verified in order to allow future gradual modifications
and
new improvements.
© Phase 3 (from 1995) : The modifications to the original GSM900 are being introduced,
Following are the derivatives of the original GSM 900.
DCS 1800
One important modification to the original GSM900 was the development of Digital Cellular System (DCS 1800).
DCS 1800 is primarily devoted to the operation in areas with high traffic such as urban and suburban areas.
It is called as DCS in United Kingdom and PCS in Hong Kong.
The main difference between GSM900 and DCS1800 was in the lower power of the base station and mobile station. As
a result the cell size becomes smaller.
The bandwidth assigned to the DCS1800 was much higher than the GSM900. This implies that up to 374 carrier
frequency channels can be assigned to the DCS1800. Thus the capacity of DCS1800 is much higher than the GSM900.
But this also implies twice as high sensitivity to Doppler effects. This limits the maximum vehicle speed in DCS1800 up
_ to 130km/hr.
Another essential enhancement of the DCS1800 is the possibility of roaming inside the country. This was not possible
with initial GSM900 due to organization reason.
— Table 2.1.1 summarizes the basic difference between GSMS00 and DCS1800.
| 124 , 374
Number of duplex channels
320W ; . 20W
Maximum Base station power
8W _ | iw
Maximum Mobile station power
| 45MHz ; 95MHz
Spacing between uplink and downlink frequencies
250km/hr .| 130km/hr
Maximum vehicle speed
20W (not implemented) 1W (handheld)
MS classes
W (car/ transportable phone) | 0.25 W (handheld)
5W (car/ transportable phone)
2W (handheld)
0.8 W (handheld
GSM 400
was GSM 400. It has been ween
ncement of the original GSM 900 system
Another promising modification and enha are losing their custom
syst ems opera ting in the 400 MHz bands are now becoming absolute. They
that the analog
as most of them moved to the 2G systems.
Uy Tecninomietes
Publications
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7-Com;
- After shutting these analog systems completely, this frequency range can be used for another GSM version,
- — ETSI standardized the GSM system operating In the band around 450 and 480 MHz called GSM 400. ug
= The whole infrastructure will remain same however software needs to be changed. 4
— The basic feature of GSM 400 are listed below: ,
© Frequency allocation: Uplink : 450.4-457.6 MHz
Downlink : 460.4-496.0 MHz
o Duplex separation : 10 MHz
© Carrier spacing : 200KHz
Table 2.1.2 : Key milestones of the GSM system and its derivatives
iss ee Ss Sei
1982 | Groupe Special Mobile established by CERT to develop the pan-European cellular mobile system standards.
teleservices
Fig. 2.1.1: GSM Mobile ser
vices
YY Tectineniedn
Publication
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7 -Comp) 2-4
1. Bearer services
Bearer services are telecommunication services that. provide capabilities to transfer user data and control signals
between two pieces of equipment in a network.
- GSM provides basically four types of bearer services :
© Transparent |
o Non-transparent
° Synchronous data transmission
o Asynchronous data transmission
(i) Transparent bearer services
These types of bearer services use the functions of physical layer to transmit data.
To improve the transmission quality, it uses forward error correction (FEC) at physical layer.
(ii) Non-transparent bearer services .
Non transparent bearer services use functions of both layer 2 and layer 3 to improve transmission quality.
It implements layer 2 and layer 3 protocols for error correction and flow control.
It also uses radio-link protocol (RLP) that comprises mechanism of High Speed Data Link Control (HDLC) and ‘special
selective-reject mechanism to trigger retransmission of data.
The bit-error rate is less than 10”, and throughput and delay may vary depending upon transmission quality.
- Different data rates for voice and data that can be achieved are listed below.
2. Data Services
(i) Data service (circuit switched)
3. Tele services
- Tele services include encrypted voice transmission, message services, and basic data communication with terminals.
— The GSM was basically designed to provide high quality digital voice transmission, offering at least the bandwidth
‘
— 3.1kHz of analog phone systems.
The various teleservices are :
This number is the common number that can be used throughout country.
Like police (100) or ambulance number and this number is free of charge.
This connection has the highest priority and will automatically be set up with closest emergency center.
|
Scanned by CamScanner
moe Communication & Computing (MU-Sem.7-Com) _ 2-5.
SMS uses unused capacity in the signaling channels .
instead of standard data channe Is.
Itis possible to Send or receive
SMS during voice or data transmis
sion.
SMS can be used for displaying
road conditions, e-mail headers
or stock quotes etc.
SMS
are also used for
updatin & mobile phone software or for implementation of push servi
(iti) ces.
Enhanced Message
Service (EMSs)
Enhanced messa
Be service (EMS) allows tran
images, and ringto smission of larger messages, i d pictures,
nes in a standardized way formatted text, So t ;
, eN small
(Iv) Multimedia Message
service (MMs) oe
.
MMS allows tran
smission of larger
pictures such as JPEG, GIF, WBMP files and also
(v) Group 3 Fax short video clips.
‘
In this Service, fax dat
a is transmitted as
di gital data over the analog telephone network
— It uses ITU-T using modems.
standards T.4 and T.30
for tra nsmission.
Fax data and fax Signaling
is transmitted via transp
arent bearer service,
Supplementary Ser
vices
7
Supplementary services offer various a
enhancements of the standard telephony
provider, services and may vary from provider
, to
;
Supplementary servic
es are additional servi ces that are provided by the GSM system
services, other than teleservices or bearer
These services include faci
lities such as call forwardin
g, caller identification, call waiting, multi
and barring of Outgoing (interna -party conversations, |
tional) calls, among other S. Some
supplementary services are :
© Multiparty Service or conferenc
ing
o Call Waiting
Oo CallHold
© Call Forwarding
© Call Barring
oO Number Identification
© Advice of Charge (AoC)
9 Closed User Groups (CUGs)
© Unstructured supplementary
services data (USSD) : This allo
ws Operator-defined individual
services,
Table 2.1.3: GSM services
A
ay
Emergency call
Short message services
Videotext access
Teletex, Fax
Half rate speech coder
Enhanced full rate
Scanned by CamScanner
Bearer services Synchronous data
Asynchronous data
Synchronous packet data
architecture.
Fig. 2.1.2 shows the simplified view of the GSM system
three main sub systems :
The GSM network architecture can be grouped into
1. Radio subsystem (RSS)
Radio subsystem
Entities of RSS are explained below.
Radio subsystem comprises all radio entities.
wie TechKnowledge
Scanned by CamScanner
puting (MU-Sem. 7 cone
radio cell
RSS
NSS
_sSignaling
TL ISDN,PSTN
| PDN
OSS
Scanned by CamScanner
————
GSM
7-Comp) 2-8
& Compu ting (MU-Sem.
Mobile Communication
and time slots for the MS.
° Assigns and releases frequencies
o Handles inter cell handover.
© ~
of the BSS and MS In Itsarea.
co Controls the power transmission
— Additional functions include : .
from th e MSC
n to reduce the number of lines
° Performing traffic concentratio
BTSs
co Reallocation of frequencies among
Ww TechKnowledye
~ Publications
Se
Scanned by CamScanner
The MSC performs following functions
fixed or mobile network users
° Switching of calls between the mobile and other
oO Management of mobile services
© Registration :
o Authentication .
o Location updating 4
oc Handovers |
o Call routing to a roaming subscriber |
oe Toll ticketing
o Network interfacing
° Common channel signaling
MSCs are connected with each other and also to the Gateway MSCs (GMSC)
Gateway MSC is responsible for communication with the external fixe d networks such as PSTN
and ISON.
interworking functions (IWF).
MSC can also connect to public data networks (PDN) such as x.25 by using additional
Home Location Register (HLR)
of the sub scriber.
The HLR register is the central database that stores and manages the permanent information
on in the form of SIM, all the information about thisi subscripti o is registered in
iption
When an individual buys a subscripti
the HLR of that operator.
HLR contains the following static and dynamic information
Later if the mobile station makes a call, the VLR need not contact HLR each time since the VLR has all the information.
needed to set up the call.
The VLR avoids the frequent HLR access/updates, as all the user information required is available in VLR
Scanned by CamScanner
¥ Mobile Communication & Computing (MU-Sem. 7-Comp) _ 2-10 GSM
7 The OMC monitors and controls all other network entities via the O interface.
— Here are some of the OMC functions :
statistics).
o Administration and commercial operation (subscription, end terminals, charging and
Security Management.
90
Maintenance Tasks.
oOo
Traffic monitoring
o
Um Interface :
telephone standard.
ace i 5 the air int erf ace for the GSM mobile
- The Um interf S).
Base transceiver station (BT
be tw ee n th e mob ile station (MS) and the
It is the interf ace
an alog to the U interf
ace of ISDN.
e it is the mobile
— {tis called Um becaus
series of sp ecifications.
Umis defined in the
GSM 04.xx and 05.xx ision Duplex (F DD).
-
Mul tip le Acc ess ( TD MA) with Frequency Div
ision
is based on Time Div s different
The GSM air interface is, while FDD enable
—
on RF channe l on a time-shari ing bas
users to share a comm
— TDMA allows multiple S to Ms) directions.
be use d in upl ink (MS to BTS) and downlink (BT
frequencies to OY lectknen tede
ications
publ
Scanned by CamScanner
A set of these eight
timeslots is referred
to as a TDMA frame.
Each frame lasts 4.6
15 msec.
The physical channels are
further mapped to various
between the MS and logical channels carrying use
the BTS, r traffic and control inform
ation
The following section
describes the Um interf
ace Protocols used at the 4
MS and the BTS side,
Publications |
Scanned by CamScanner
Mobile Communication
& Computing (MU-Sem.7-Comp) _ 2-12 ees __GSM
- _ Radio resource management (RR) comprises procedures required to establish, maintain, and release the dedicated
radio connections. The RR sub layer functions include :
o Channel assignment and release
Ciphering
0
MS measurement reports
0
Paging
o
The mobility management (MM) sublayer handles functions and procedures related to mobility of the mobile user.
This includes procedures for Authentication and Location registration and periodic updating.
The connection management (CM) sublayer contains the functions and procedures for call control. This includes
procedures to establish, release, and access services and facilities.
(i) Asis Interface : BSC and BTS communicate via Ajj, interface. The Ays interface is associated with the information
exchange related to the radio transmission such as distribution of radio channels, connection supervising, the
queuing of messages before transmission, frequency hopping control, channel coding, decoding etc.
(ii) A interface : The A interface is used to provide communication between the BSS and the MSC. It is based on
circuit switched PCM-30 systems. It carries up to 3064 kbits/s connections. The interface carries information to
enable the channels and timeslots allocated to the mobile equipments. The messaging required within the
network to enable handover is also carried over this interface.
(iii) O interface : The RSS is connected with OSS by O interface. O interface uses the Signaling system No. 7 (SS7)
based on X.25 and carries management data to/from the RSS.
Fig. 2.1.4 presents the protocol architecture of GSM with signaling protocols and interfaces.
TechKnowledga
Publications
Scanned by CamScanner
ye rs:
three general la
: is assembled into
nd siete~
GSM
‘co
Based on the interface, the MSC
Abs
BSC
MS BTS
4
4
|
. 64 kbit/s
Mbit/s
16/64 kbit/s 2,048
k for signaling
Fig. 2.1.4: GSM protocol stac
structures overt he air interface.
Layer 1: The physical layer, which uses the channel
’ The main functions of physical layer are :
° Handles all radio-specific functions
°. Creation of bursts
° Multiplexing of bursts into TDMA frames
oO . Synchronization with the BTS
Ww TechKnowledge. -
Puplicatlans
Scanned by CamScanner
& Computing (MU-Sem. 7-Comp) ace
Communication : OS a
—=§=—<—
, The MS to BTS Protocols
The RR ae irs care of the establishment of a link, both radio and fixed, between the MS and the MSC.
The main functional components involved are the MS, the BSS, and the MSC
The RR layer
! is concerned with the management of an RR-sessi
: on, which
i is the time
i that a mobile
le
mode and is configuring the radio channels..
Fe me |
nevMM layer
The y is bui
uit on top of the RR layer and handles the functions that arise from the mobility of the subscriber. It
also handles authentication and security aspects.
The CM layer i '
management, and Short Message Service
(SMS) nan r is responsible for call control (CC), supplementary service
agement. Each of these may be considered as a separate sub layer within the CM layer.
BSC Protocols
MSC Protocols
¥ TechKnowledge
Publications
= .
Scanned by CamScanner
= Mobile Communication & Computing (MU-Sem. 7- Comp) 2-15
eet
3.
senha a
— To hide the IMSI over radio interface, GSM uses 4 byte TMS! for local subscriber ididentification. ae
— TMS! is selected by the current VLR and is valid for temporarily and within the location area of the VLR.
‘— VLR may change TMS! periodically.
4. Mobile Station Roaming Number (MSRN)
— _ MSRN is a temporary address generated by VLR that is used to hide the identity and locat of a subscriber.
ion
— The VLR generates this address on request from the MSC.
— This MSRN address is also stored in the HLR.
— MSRN contains the current Visitor Country Code wee" the identification of the current MSC and the subscriber
number.
— All these above mentioned numbers are needed ta locate a mobile station and maintain connection with it.
2.1.6(a) Initialization
Whenever a mobile station (MS) is powered on, sequence of operations have to be performed in order to activate the
mobile in the given network.
i
First, MS looks for the carrier on which the broadcast channel is transmitted.
In order to do this, MS scans all 124 channels and measures their received power level. The carrier containing the)
broadcast channel is emitted at a much higher power than other carriers in the same cell.
The MS lists the measured carriers according to their decreasing power.
In the next step, the MS listens to the subsequent carriers from the list and searches for the frequency correction
channel (FCCH). This is done by scanning 0° * slot of the broadcast carrier. i
The MS carrier frequency is then adjusted to that frequency.
MS then finds other important control information by scanning 0" slot of subsequent frames.
At this moment the passive part of the MS activation in the network is completed.
Scanned by CamScanner
3
Mobile Communication & Computing (MU-Sem. 7-Comp) 2-16 GSM
Um ie A
Channel request
RACH
SDCCH Assignment
AGGH
Location Update
fate| |Re Request (TMSI,Old LAI Request IMSI (TMSI)
; SDCCH )
Send IMSI
|
Get Authentication parameters (IMSI)
Authentication parameters (SRES,Ke,RAND)
Authenticate|Mobile Station (RAND)
SDCCH
4
Location|Update Complete
SDCCH
Clear Signaling connection
Clear Complete
Release radio
Signaling Channel
SDCCH
Mobile location update procedure
update
Fig. 2.1.5: Registration and location
that the MS can be de-
rm the HLR that the MS is under control of a new VLR and
At this point, we are ready t o info
the HLR.
location of the user is updated in
registered from the old VL R. The
location update procedure is
to the MS. MS conf irms the new LAI and TMSI. Here the
The new LAI and TMSI is sent
is released.
complete. The SDCCH channel
5.
dure is illustrated in Fig. 2.1.
The step by step proce RACH in
does this by t ransmitting the
do is to acq ui re a cha nnel for registration. The MS
has to
The first task an MS .
to be used for registration
the MS req ues ts the BTS for ach annel
which
.
this request to the BSC
The BTS transfers to the MS.
e St an da lo ne De di ca te d Control Channel ( SDCCH)
fre
In tur’ n the BSC informs
the BTS to assig na
and allocates SDCCH to MS.
on to MS on Ac ce ss grant chan nel (AGCH)
confirmati
The BTS sends the t contains TMSI and old
LAI.
t e req ues t on new ly assigned SDCCH. The reques
In turnt he MS send
s the location upda
BTS and BSC.
w MS C an d co rr es pond ing VLR through the
ard ed to the ne
This request is forw
ta.
MSI, it updates its da
alr ead y co ntains the user's T! es the VLR that
If the VL R
r is de co de d. The LAI indirectly d escrib
LAI sent by th e use
t hat user then the
lf no TMS! exist for
the MS.
previously served enn
winnlic ations
Pub
Scanned by CamScanner
The current VLR takes all
the user’s parameters such
the previous VLR. as IMSI number, authentic: ati d encryption parameters ¢.>
on an = , : Moy
.
If the previous VLR does not contain this informati
on then the MS needs to transmititi its IM Sl on SDCCH.
The MS sends its IMs| through
air only once. This happens at
the first entry to the network.
The IMSI num ber determines the address of the
user data . ion fi m the
in the HLR. This information fro HLR is loaded ed iinn +.
Current VLR. The information
contains authentication parameters th, e
for the user.
After that the new VLR initiate
s the user authentication pro
cess and the user replies are
verified.
The new MSC/VLR requests the BSS ’
to cipher the radio channel, The BSS
Ga
cipher complete upon ciphering the downlink channe
Message to l sends,
the MSC.
2.1.6(c) Mobile Te
diucnabicraicsasttin
rminated Call (M
TC)
Wea
Scanned by CamScanner
(MU-Sem. 7-Comp)
+ Mobile Communication & Computing
2-18
Ms MTG BTS
. paging request
channel request
immediate assignment
paging response
. authentication request
authentication response
ciphering command
ciphering complete
setup
call confirmed
assignment command
assignment complete
alerting
connect
__ connect acknowlege
data / speech exchange
v
v
w for MTC
Fig. 2.1.7 : Message flo
er determining this area, the MSC sends a paging
ser ved by ma ny base station 5. $0 aft
location are ais
_ _ Note that the termined location are
a.
op erating in the de
reques t to all BS Cs for the channel on RACH.
pa gi ng di re ct ed toi t, it requests the BTS
n d etects the
_— {f the mobile statio about the assignment
,
CC H ch an ne l to the MS and informs MSC
s the SD
— The BSC then assign CCH.
on this assigned SD
paging respon se
— MS se nd s the es th e MSC, BSC an MS.
h en ti ca ti on process that involv e MSC in turn
VLR ini tia tes the MS aut
MS C to sta rt data encryption. Th
VLR issues @ comman
— No w d to
MS has be en authen ticated, the
— After the BSC and BTS.
mm an d to the MS through reatie!
etlic ae
transfer s thi s co . OF Pub ons:
Scanned by CamScanner
4
Mob ile Com mun ica tio n & Com puting | (Mu-Sem.7-Comp) 27 r the time of connection
¥F_ si gn et to the MS fo
e ris
— After the initiation of the encryption In the MS, anew TMS! numb
! ;
The MS acknowledges reception of this num ber. sendin g a set up mes
sage to it. The Mg|
i
connection setup with the MS by
— At this moment the MSC initiates the 7
: .
acknowledges the receipt of this message. i ber, a time slot and a training.
j e
MS. MS receives the carrier numder,
MSC then informs BSC to assign a traffic channel to the
sequence for the connection. MS acknowledges these parameters.
. ;
it.
- The MS then starts ringing and the MSC is informed ab out
— The MSC then sends the ringing signal to the calling user.
4
- After the MS accepts the call, actual data transfer starts.
MU.--May.16; Dec. 16)
2.1.6(d) Mobile Originated Call (MOC)
owing steps
It is much simpler to perform a mobile originated call (MOC)
compared to MTC. This follows the foll
4
(Refer Fig. 2.1.8).
MS sending a random access
the request for a new connection. This is realized by the
Step1 . The MS transmits
burst on RACH logical channel.
VLA
_GMSG a7],
MSC in turn informs the VLR associated with it about the call set up request issued by the MS.
We Techie
Scanned by coment
em. 7-Comp) 2-20
BTS
‘ MS MOC
channel request
immediate assignment
service request
authentication request
authentication response
ciphering command
ciphering complete
setup
call confirmed
assignment command
assignment complete
alerting
connect
connect acknowlege
data/speech exchange
y
v
MOC
Fig. 2.1.9 : Message flow for
process.
In turn VLR initiates authentication
started by the VLR.
d, the encryption procedure is
After the MS has been authenticate then assigns a fixed
MS ack now led ges the rece ption of TMSI. The MSC
to the MS. The
A new TMS! number is assigned
nel to the MS.
link to the call and a traffic chan
ion reaches the MSC.
l assignm ent. This informat
MS acknowledges the channe station starts ringing.
the MS thr aug h BSC a nd BTS when the called mobile
e to
MSC sends the alert messag t message.
the call, the MS is inf arm ed about it by sending connec
ion accept s
When the called mobile stat
data transfer starts.
this connect message and
Finally MS acknowledges
7 Handover in GSM
.
OY lech tnoutedat
~ Publications
Scanned by CamScanner
Mobile Communication & Com
SSS puting (MU-Sem. 7-Comp)
2-24
There are two basic rea
sons for handover :
1, MS moves out of the range
of BTS
As a mobile Station is
moved out of the ran
requirement of communica ge of BTS, the received
tion. signal level falls below the
,
The error rate grows due
to interference and low
signal strength.
All these effects may
diminish the qualit y Of
radio link and make communicatio
2. Load balancing n impossible,
ae] fae
——B8¢_}
1 _|
[Bsc
|
“TL -
_msc LY) usc”
(iii)
Inter-BSc, intra-MSC handov
er : This han dover takes
handover is controlled by MSC place between two cell
s managed by different
(scenario 3). BSCs. This 1
(iv) Inter MSC handover : Inte
r MSC handover ta kes place
perform the handover togeth between two cells bel
onging to different MSC
er (scenario 4). s. Both MSCs-
Inter-BSC, Intra-MSc handover
So TechKnow!
Publicatians
Scanned by CamScanner
MS BTSs BSC, ,
Measurement * oe arid ee
report Measurement
»| result
HO required HO request
ée allocation
ch. activation
HO request ack ch. activation ack
HO command HO command |, HO command |e —
HO access
Link establishment
2. Confidentiality
data over ai r interface.
, con fid ent ial it y of user data is achieved by encrypting the
In GSM
rmation.
n to voice, data, and signaling info
After authentic ation MS and BTS apply e ncryptio
exist end-to-end.
n MS and BTS only. It does not ¥ TechKnowledge
_The confid entiality exists betwee Publications
Scanned by CamScanner
Anonymity
rote i
is alwaysa hidden over the a ir interface. All data is encryntes
To provide anonymity the identity of a subscriber
not used over the air.
before transmission and user identifiers are
To ensure subscriber identity confidentiality, the Temporary Mobile Subscriber Identity (TMSI) is used. VLR a
change this TMSI at any time.
Three algorithms are used to provide security services in GSM.
asec
sinseceiilinay
mobile network
K, RAND
|
AC 128 bit|
*
| 8 bit
2 .
SIM
SRES* |32 bit
SRES |32 bit
:
BC ee Ree SRES
MSC | | MeeSRES‘ =? SRES- 4
32 bit SRES
K, : individual subscriber
SRES : signed response
authentication key
wom
Scanned by CamScanner
GSM
ce)
mobile network (BTS)
RAND
Kj RAND
Cipher ———— K,
key K,
64 bit
encrypted _ MS
—
data
BSS
Ee Te ctkecretes
Publications
Scanned by CamScanner
Kd Mobile Communication & Computing (MU-Sem. 7-Comp) 2-25
General Packet Radio System (GPRS) standard was defined by European Telecommunications
standards Institute
(ETSI).
Itis a major improvement and extension to the standard GSM system.
GSM is a circuit-switched network which is ideal for the delivery of voice but not
suitable for transmitting data that is
bursty and asymmetric in nature.
GPRS added packet-switched functionality to existing networks as
a result the users of the system can be online,
allowing to make voice calls and access internet
on-the-go,
GPRS uses unused time slots of GSM system
to transmit packet data.
GPRS can allocate one to eight time slots
within a TDMA frame.
Allocation of time slots is an on dema
nd basis instead of fixe d and predetermine
d. This allocation depends on current
network load and the operator preference.
Depending upon the coding, the transfer
rate up to 171.2 kbits/s is possible.
GPRS operators offer a minimum of one
time slot per cell to ensure at least mini
mum data rate.
Charging in GPRS is based on the volume
of data exchanged and not on the connecti
on time.
GPRS also includes several security servi
ces such as authentication, access contr
user data. ol, confidentiality of user identity
and
The available user data rate depe
nds upon the coding scheme and
Table 2.1.3 lists the data rates avail the number of TDMA time slots allocated,
able in GPRS if it used with GSM,
slots | 5 slots.
CS-1 9.05 | 18.1 27.15 | 36.2 45.25 | 54.3 63.35 | 72.4
CS-2 13.4 26.8 40.2 53.6 67 80.4 93.8 107.2
CS-3 ' {156 | 312 46.8 62.4 78 93.6 109.2 | 124.8
CS-4 214 | 42.8 64.2 685.
107
L 128.4 | 149.8
Key Features of GPRS E 171.2
1. e
Alw a
ays e
onl ine feature Since GPRS uses packet
switch ed netetwork, i
it removes the dia i l-up Process. Users
now can be
2. An
the upg radnge in
existi to fr
exias
stitr
ngucsystems : Operators
do no t have to rep|
Place theiri equii pment; :
rather, GPRS isi adde
3. Volume based chargi d on top of
ng : In Circuit switch
unsuit ed servici es
e aable
e f
wit;h bursty traffic. The use '
billing is based
° r must Pay for the ent on the duration of t i
. Wi ' Packet switch ire airtime even ori is is
advantage for the u ed ser vices, billing can ne na
. sis e
thar
t he or she can be "on be based on the
lin e" over a lon & period smite; data, TH
An integral part of future
3G systems + GPR i of ti i
Sis the packet da me, ei
ta core network 4
for 3G systems ED
eet
GE and WCDMA
Dantreae
Scanned by CamScanner
i E : GSM
Mobile Comm unication & C omputing (MU-Sem. 7. Comp) 2-26
2.2.1 Architecture
HLR
‘ROUTER:
Gr Ge
DNS
2 ; : ; Gn Gi Packet
BTS }*—» BSC | PCU- SGSN GGSN data
41 Abis : Gb : Ga network
SMS-IWMSG
} Ga
er eenn
per channel vannel sf
12 Channel spacing
(frequency reuse)
GSM Me
QSM
GSM Volce
GQsM [+ BSC
SGSN QGSN
PGU Paockat
data
Scanned by CamScanner
@
another SGSN.
oO Maintains the Statistic
s of traffic collections,
Gateway GPRS Supp
ort Node (GGSN)
' GGSN is the gateway
to external networks such
GSM network, as PDN (Packet Data Net
work) or IP network.
It is similar to GMSC of”
It does two main fun
ctions.
°
Scanned by CamScanner
GSM
Mobile Communication & Computing (MU-Sem. : 7-Co mp) 2-28
(CG)
6. Charging Gateway
| f th
, ewa Y Is responsible for accounting and billing for th
Charging : gat
vic e or pla n use r h ° . et
y Ser
Charging is done based on Qualit of as opted.
rds
Charging Data Reco
This charging data
generated by allt
SN s in the ne tw or k Is referred to as
¥ he SGSNs and GG
(CDRs). : Billing System.
The Charging Gatewa
y (CG) coll e pro ces ses the sam e and passes it on to the
_ these CDRs,
cts all of
7. DNS server
and to de li ve g
j
to establish inte r net co nnectiion
It converts domain name to ol IP add ress es r equired
terminal screen.
8. PLMN
(i) Intra PLMN MN area.
: tio ned GPR S net wor k elements in one PL
i .
An IP based network ork inter-connecting all the
above men
(ix) Gl in
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. _7- Comp) 20
(x) Gs interface: Between SGSN and MSC/VLR is used to perform paging request of circuit switched GSM cajj for i
combined attachment procedure. |
(xi) Gd interface : Between SMS-Gateway (SMS- GMSC) and SGSN is used to exchange short message service ¥
messages.
(xii) GPRS Tunneling protocol (GTP): All GSNs forming a GPRS backbone network are connected over IP. Within th
backbone the GSNs encapsulate and transmit PDN packets by using GPRS Tunneling Protocol (GTP).
Un, Abis
A
MS ' BTS ! BSC MSC
i fee —BSSAP] }
! es { PRRE NS eel
BM PRISM NI gs7 | |
i i S LAPD», : LAPD - : ‘ S ~ LAPD : as
_ Radio | i] Radio | pom. |i PCM. | PCM. i | PCN
ecture
2 3
2.2. Comymparii son of GPRS Architecture with GSM Archit
fo rm at
services : In ading etc.
Value-added g and financial tr der etc.
le 5 and location fin
ba nk in
ti ck et pu rchasing, in e/ ra il sc he du
E-commerc e : Retailpli, traffic condi tions, girl
PWN
Advertising : Ad
vert
t mall. ¥ TechKnowledge
publications
stores int ha
specific to the
Scanned by CamScanner
SE_Motile Communication & Computing (MU-Sem.7-Comp
7. SMS: It is also possible to send SMS messages over
GPRS.
8. Supplementary services : GPRS also offers supp
lementary services, such as call forwarding
~— (cug). and closed User. gro
2.3 ;
UMTS Terrestrial Radio Active Network (UTRAN
)
2.3.1 UMTS (Universal Mobile Telecommu
nication System) Core Network
Universal Mobile Telecommunication
System (UMTS) is the European Proposal
for IMT-2000 prepared by ETSI,
The UMTS specifically defines new
radio interface called UMTS Terrestria
l Radio Interface (UTRA).
Two radio interfaces have been
defined: UTRA-FDD and UTRA-TDD
,
UMTS does not define a comple
te new 3G system rather it spec
Or TDMA systems to the thir i fies a smooth transition from seco
d generation. nd generation GSM
Many solutions have been
proposed for 3G networks.
One initial enhancement ,
of GSM towards UMTS :
enhanced modulation techniqu was Enhanced Data rates for Global
es. Evol utio n (EDG E) which Uses,
‘UMTS services a
UMTS should provide follow
ing services as a 3G networ
k :
1. Provide various bearer
services,
2. Support real-time and
non real-time services,
3. Support Circuit switched and
packet switched transmission
.
4. Handover should possible ;
between UMTS cells, but also
between other non-UMTS
networks. systems such as GSM or
Satellite
5. The system should be compat
ible with GSM, ATM, IP and
ISDN-based networks.
6. Should provide variable data
rates for uplink and down
link.
2.3.2 UMTS System Architecture
NodeB > |
TechKnowledgt_”
Pudticationss:
Scanned by CamScanner
e Mobile Communication &’_ Computing (MU-
SSem. pis
Comp) 2-32
Three main components of UMTS a ar e:
4, The UTRA network (UTRAN)
2. Core Network (CN)
3, User Equipment (UE)
4. UTRAN
network
— The UMTS Terrestrial n etwork (UTRAN) handles the cell level mobility and comprises sever al radio
subsystems (RNS).
Admission control
Congestion control
System information broadcasting
uration etc. in
Radio network config interface is com parabl
e to Um interface
int erf ace Uu. Uu
t via the radio
UTRAN is co nnecte
d to Users Equipmen
—
GSM.
to the A interface in
GSM.
(CN) via lu interface which is similar
re Network
ates with the Co
UTRAN communic
N)
(i) Core Network (C
and GPRS.
ne tw or k is shared with GSM GGSN.
Co re
MS C, GMSC, SGSN and performs location
othe r networks, and
R, VL R,
co mp on en ts su ch as HL ga te wa ys to
It contains m handover,
fu n ct io ns for inter-syste
contai ns
- core network
management.
Identity Module
UMTS subscriber
nt (UE) d
(ii) User Equipme
ui pm en t (M E) an
: Mobi. le eq
nt ai ns tw o components
nt (UE) co
- The user equip me
Uu interface.
(USIM). rad io in terface using au thentication algo
rithms,
ng to the cr i ber ide nti ty,
nne cti ntains the su
bs
o terminal co e m that co
- MEis the radi GS M sy st
to SIM in
IM is as m ar t card similar : + cig 2.3.2
- US 4
shown In Fig. 2.5.
encryption keys etc. int o two domains as
r sub div ide s the above architecture
- UMTS fur the
aren
Scanned by CamScanner
¥ Mobile Communication & puting (MU-Sem. 7-Comp) 2-33
Homes"
“network:
“domain:
a
a Infrastructure domain
Fig. 2.3.2 : UMTS domain and interfaces
The user equipment domain
— The user equipment domain is assigned
to a single user and comprises all the
services, components needed to access UMTS
)
— The end device itself is in a mobile equi
pment domain. all functions for radio
are located here, transmission as well as user interfaces
.
This domain is further divided into
two sub domains: The USIM domain
and mobile equipment domain.
— The USIM domain contains the
SIM for UMTS and Stores all the
for encryption and authenti necessary user related data. It
cation of users. also performs functions
The infrastructure
domain
The infrastructure domain
is shared among all the use
rs.
It offers UMTS Services
to all the subscribed use
rs,
Publications:
Scanned by CamScanner
‘2 Mobile Communic&atio
Computinng (MU-Sem, 7-Comp) 2-34 os
fig. 2.3.3 shows basic idea of spreading and separation of user data using orthogonal spreading codes.
The first step is spreading the user data using orthogonal
spreading codes
Data, | Data, | Data, |
Data, |
Scrambling
code, ——>
Sender, Sender
Working of OVSF
Orthogonal codes are generated by doubling a chipping sequence X with and without flipping the sign of the chip.
For example if a chipping sequence is X the next set of orthogonal codes would be (X,X) and (X,-X) as shown in
Fig. 2.3.4 (a).
PX]
|
x
Lk aX
Fig. 2.3.4 (a) : Generation of orthogonal codes
BOX KI
+1 X, X,-X, =X
X,-X
~ Now chipping sequence XX is doubled without flipping the signs and with flipping the signs. We get two more sets
(X,X,X,X) and (X,X,-X,-X) (Fig. 2.3.4 (b)).
The whole process of generating OVSF codes Is shown In Fig. 2.3.5 assuming the starting chipping sequence as 1.
Scanned by CamScanner
Ly x,-X
SF=n SF=2n
Taal
SF=1 SF=2 SF=4 SF=8
URSIN MOEN ae
Explain UTRA FOD in detail, May 13, May 16:6 Mi
The FDD mode for UTRA uses wideband CDMA (W-CDMA) with direct
sequence spreading.
In FDD, uplink and downlink uses different frequencies,
W TachKnowledge :
Publications. \-
Scanned by CamScanner
Mobile Communication & Computing
Features of W-CDMA
1920-1980 MHz uplink
Radio frame
10 ms
Tina 30)
Pilot. | tect | Fet | tec | Uplink DPCOH
: 2560 chipd, 10 bits
Data Uplink DPDCH
—> FBI : Feedback Information
2560 chips, 10 2" bits (k = 0.6) TPC : Transmit Power Control
Similar to GSM, UMTS also defines many logical and physical channels and their mapping.
WP Techknowiedge
Publications
Scanned by CamScanner
7 _MobileCommunication
& Computing (MU-Sem. 7- CO e mea
1. Dedicated Physical Data Channel (DPDCH)
This channel is used for transferring user data and signaling data.
The spreading factor of this channel can vary between 4 and 256. This directly sup
ports different data rates.
Table 2.3.1 describes different spreading factors and corresponding da ta rate supported by DPDCH.
(kblts/s)
rateta
“Spreading factor | Da
4 960
8 480
16 240
32 7 120 ; 1
64 60 ; 3
128 30 ; j
256° 15
Thus, maximum data rate supported is 960 kbit/s with spreading factor 4.
The problem of using OSVF is that only certain multiplies of the basic data rate (i.e. 15 kbit/s) can be used,
For example, 250 kbit/s data rate is required then the device has to choose 480 kbit/s, which wastes i
bandwidth.
In each connection in layer1, it can have between zero and six DPDCHs. This results in a theoretical maximum
data rate of 5,740 kbit/s (960 x 6 = 5,740).
Table 2.3.2 shows typical user data rates together with the required data rates on the physical channel.
15 15 ;15 | 15
Secondary synchronizat
ion up of scrambling
2.
ary syn chr oni zat ion code which defines a gro
ond
se, tthe UE receives a sec
During this second pha the frame stsucture.
in this cell . The UE is now sync hronized with
codes used
ambling code
Identification of the scr
r.
h the help of a correlato
gro up of cod es to find the right code wit
the
mbling codes within
The UE tries all scra
D-CDMA)
2.3.2(b) UTRA - TOD (T
in detail.
TRATTOD “mode
r to FDD.
-TDD e of TDD is simila
Features of UTRA Fr am e st ru ct ur
domain. The 3.84 Mchip/s.
up lin k an d down link in time ms . Th e chipping rate is also
te s of 10
UTRA-TDD separa rma radio fram
e with durati
on
pe r $ lot fo
560 chips
-. 15slots! with 2, metrical or
asym metrical.
s ym
e structure
ca n be
d d ownlink sl
ots is same.
— The TDD fram up li nk an
mber of
ri ca l f ra me structure nu ion is used.
- In sy mm et it ra ry combinat
an y a rb d data rate.
fra me structure achieve desire for
In asym me tr ic al t4t o 16 to can be achieved
- fact or between , 1656, 828 an d 414 kbit/s
m ca n c h a n ge spreading ra te s of 66 24, 3312
- The syste shown in Fig.
2. 3.7 da ta
me wi th
Thus using th
etraffic burst
re sp ec ti vely: s. A si mp le power control sche
— 8, and 16 ogonal co de
ctors 1,2,4,6, use of orth
spreading fa synchr on iz ation and
nt ro l is ea sy du e to tight e
co W TechKnicowatleiodgns
~ Power
cy ¢ Jes /s is sufficient. publ
cont ro l
100-800 power
mma
Scanned by CamScanner
WY Mobile Communication & Computing (MU-Sem. 7-Comp) 2-39 st Gq . ;
Radio frame ‘ a
Time slot
I>
_ — GP : Guard period
&
2560 chips 96 chips
Data Fields
- Fig. 2.3.7 shows a burst of type2 which comprises two data fields each of 1,104 chips.
- Spreading is applied to these data fields only.
Midample
- Midample is used for training and channel estimation.
Guard period (GP)
As TDD uses the same scrambling codes for all stations; the stations must be tightly synchronized and the spreading
codes are available only once per slot.
To loosen the tight synchronization little bit, a guard period has been introduced at the end of each slot.
URAD |.
Idea Uses wideband CDMA (W-CDMA) with direct Uses Time domain CDMA
sequence spreading.
Separation of Separates up and downlink in frequency Separates up and down link in time domain.
channels domain
Synchronization | Synchronization is not required in time domain | Tight synchronization is needed in time
domain.
Power control Complex power control scheme required. (1500 | Simple power control scheme is sufficient.
power control cycles/s) (100-800 power control cycles/s)
Spreading . Spreading : Up Link: 4-256; Down Link :4-512 | Spreading between 1-16
Scrambling code Each station within a cell uses the different All the stations in a cell use the same 4
7 scrambling code. scrambling code. —
OF pubiicatiohs)
Teena 5
Scanned by CamScanner
mobile CCommunication & x Computing (MU-a Sem. 7-C ‘om; Pp) 2-40 | GSM
few Guest
call in GSM.
lai n mob ile ter min ate d and mo bile originated
Q.1- Exp
y GSM.
services offered b
Q.2 Explain various security
GSM.
on update occurs in noaQ
Q.3 Explain how the locati
Ww Tech Knowledge
Pudsications
Scanned by CamScanner
\
Mobile Networking
|
3.1 Mobile Networking : Medium Acc
ess Protocol , Internet Protocol and Trans
3.2 port layer
Medium Access Control : Motiv
ation for s pecialized MAG, Introducti
on to multiple Access techniques (MACA)
3.3 Mobile IP: IP Packet Delivery, Agent
Advertisement and Discovery, Registrati
Reverse Tunneling, Routing (DSD on, Tunneling and Encapsulation,
V,DSR)
3.4 Mobile TCP : Traditional TGP, Class
ical TCP Improvements like Indir
Retransmit/ Fast Recovery, Transmission ect TCP, Snooping TCP & Mobile
TCP, Fast
/Tiimeout Freezing, Selective Retransmissi
on. : p
Introduction
With the rapid usage of portable
devices, mobilit y has become an important
Existing network protocols that are factor in the success of mobile networks,
develo ped for fixed network do not work
is because the wireless networks well if used directly in wireless networks.
This
imp ose various . challenges like dynamic
disconnections, security, high error rate topol ogy, asymm etric links,’ frequ ent
etc. To support mobility, either new proto
Protocols need to be modified. This chapt cols have to be developed or existing
er discusses problems with some of the
Protocol and required modifications to suppo existing MAC, Internet and TCP layer
rt mobility. . :
3.1 Mobile Networking
Now a day, people want to access the servi
ces from anywhere, anytime irrespective of
their location. This feature of
moving anywhere and still be able to access the servi
ces is called mobility.
— Making such services mobile, requires modif
ication to existing protocols and at some
extent to existing architecture.
The following section discusses the improvements or
modifications need to be done in Media Access
Control, Internet
and Transport layer protacols to make a network or servi
ces mobile. ,
3.1.1 Medium Access Protocols
— Medium access protocols basically controls access to the shared
medium.
We know many of the MAC protocols for wired (or fixed)
network such as ALOHA, Slotted ALOHA, CSMA, CSMA/CD,
Token bus, token ring etc. Since wireless medium is a shared mediu
m MAC protocols become an important design
decision for wireless network.
But all this MAC protocols from wired networks cannot be
directly used for wireless networks. Here, we have
introduced several Medium Access Control (MAC) algorithms
which are specifically adapted to the wireless domain.
Medium access control comprises all mechanisms that regulat
e user access to a medium using SDM, TDM, FDM, or
CDM. MAC is thus similar to traffic regulations in the multipl
exing.
In this chapter we will discuss various MAC protocols speciall
y designed for wireless networks,
3.1.2. Internet Protocols |
— In traditional IP routing, IP addresses represent a topology. Routing mechanisms rely on the assumption that
each ©
network node will always have the same point of attachment to the Internet. Each node's IP address
identifies ie
network link where it is connected.
P|
Scanned by CamScanner
¥ Mobile Communication
3 ; (MU-Sem, 7-Comp)
& Computing
3-2 Mobile Networking
The Interne t routers look at the Ip
- address prefix, x, Which
whi identi
r
-
At the network thelevel,bitsrouters identifyilook at the cular
next few bits to 0 identi
identify the appropriate subne t. Finally, at the subnet level,
routers look at identifying a parti :
device.
In this routing scheme, ifj you disco
subnet, you have to e,configure the nnect ;
efi a mobi
rhe 1
device from the Internet and want to reconnect through a different
n i °
k and default router.
ne
new IP address, and the appropriate netmas
Oth ' t , routing
erwise protocol Ss have no
m\ deliverin g packets. is because e the de ice's IP address sn't
contain cess infor
. Stisn a no ean ( iveri T his he device doe
OF y Intormation abou he ent point of attachmen nt to the Internet.
. standard
using Mobile IP. Mobile IP (or MIP) is an IETF
This kind of communicat i on can be
nicati effici
n alae
communications protocol that is weceneda 0 . . one network to another while
allow mobile device users to move from
aining a permanent IP address
benini
maint
y18, 10 Marks)
Explain the need of specializeMACd I protocol for wired network. The question is, can we use the same
MAC
CSMA/CD is the most commonly used modifications?
net wor ks to cont rol the medium access without any
CSMA/CD for wirele ss
ch works as follows.
le acce ss with coll isio n detection, (cSMA/CD) whi
sense multip
Let us consider carrier , the sender waits until it is free
. If the
wir e) to see i fit is free. If the medium is busy
medium (a sender detects a
A sender s enses the dat a and con tin ues to listen into t he medium. If the
tting
sender starts tran smi
med jum is free, the signal.
it sto ps at onc e an dsends a jamming
collision while se nd in g, d collisions at the sender,
s is bec aus e, CSM A/C D is not re ally intereste in
works. Thi But the sender is the on
fails in wireless net
e
But this scheme sho uld rea ch the r: eceiver without collisions.
at the receiver. The signal
but rather in those
who detects the collis
ions. assumed all over the wire if the length of the
sa me signal strength c an be
m using a wir e, as the e, everybody will notice it.
This is not a proble If a col lis ion occ urs somewhere in the wir
zed limits. blem occur in
certain sta ndardi and exposed terminal pro
wire stays within le ms hi dd en ter min al
tworks. TWO prob
is di ff er en t in wireles s ne
following sections.
The situat io n
wor k whi ch are dis cusse d on on power in th e area of
the transmitting
wireless net the tr an sm is si
less scenarios as scheme from wired
de te ct io n is ve ry diffic ult i n wire we r, SO, thi s very common MAC
Collision than the receiving
po
se ve ra l ma gn it udes higher
antenn a is k.
a wireless scenar
io. se of wireless networ
network fails in me fo rm fi xe d networks fail i n ca hkn eut edge
D sche * Tec
sh ow sc e na ri os where CSMA/C
ions
tions
- a
Scanned by CamScanner
e .
:
What do you mean by | Hidden foirinal problem? :
Explain. hidden station and esheets station prblems inin WLAN,
- Wireless medium is an open, shared, and broadcast medium. Multiple nodes may access the medium at the same
time.
— Traditional LANs uses CSMA/CD mechanism to control media access. This scheme works for wired network but not
for
wireless,
- CSMA/CD fails in case of wireless networks due to the following reason.
— In the wired network the signal strength can be assumed to be same all over the wire if the length of the wire
stays
within certain standardized limits. If a collision occurs somewhere in the wire, each station will
notice it. But the
situation is different in a wireless LAN. Here, the strength of a signal decreases proportionally to the
square of the
distance to the sender.
— Due to this reason, MAC schemes for wired networks may fail when used for wireless networks.
— Following two scenarios show where conventional CSMA/CD fails when used in wireless networks.
----- Range of A
Range of B
mites Range of C
| Scanned by CamScanner
Mobile Communication & Computing (MU-Sem, -7-Com
7.¢ fs
' Mobile Networking
ps4
(iv) C concludes that the channel is free 2 and s st
i transmitting to B.
(v)_ Signals from A and C both collide at 8 . ™“
(vi) “A” is hidden for “Cc”.
possible
= Range of C
Range of B
“---- Range of A
- a
"
Scanned by CamScanner
Mobile Communication & Computing (MU-
Sem.7-Comp) 3-5
MACA uses two short signaling packets
called RTS and CTS for collision avoidance,
(i) RTS (request to send) : A sender requ
ests the ‘right to send’ from a rece
iver by transmitting RTS packet befor
data transmission. e ue
‘ oa
{ii} CTS (clear to send) : The receiver grant
s the ‘ ight to send’ as soon as It is
ready to receive by sending back a Ce.
packet.
fi
These packets contain sender
address, receiver address and length
of future transmission.
MACA solves Hidden Station Probl
em.
oo
-"
< c y s
iat Hons) — == <3 =e am Nona nae
Cats [lO Cj
“CTS _|Be4 cts
A B c
Fig. 3.2.3 : MACA solves Hidden station probl
em
MACA avoids the problem of hidden stati
ons. Consider the scenario shown in Fig.
3.2.3.
1. AandCwantto communicate to B.
2. Asends RTS first,
3. Breceives RTS that contains name of the sende
r (A), receiver (B) and the length of future
transmission. This RTS is
not heard by C (Not in C’s range).
~ B responds to RTS by sending CTS, CTS packet
contains the sender (A), the receiver (B) and
the length of the
future transmission. This CTS is received by bath
A and C( Bis in range of both A and C).
. * etr
5. C waits after receiving CTS from B and is not allowe
d to transmit anything for the duration indicated
in received
CTS.
Still there are chances of collision during the sendin
g of an RTS. Both A and C could send an RTS at the
same time that
collides at B. An RTS packet is very small as compared
to data packet, so the probability of a collision is much
lower.
In such cases, B resolves this contention and sends CTS to
only one station.
MACA Solves Exposed Terminal Problem
MACA also avoids the problem of exposed terminals.
--
-_—
, ’ ‘\ ~
\Y
A uo”
re a Th tear —_ Poymer
a
C) ___RTS cI RTS.
— Ss >
S CTS S S
A B C
Fig. 3.2.4 : MACA solves exposed terminal problem
Consider the scenario shown in Fig. 3.2.4,
1. Bwants to send data to A,
2 C also wants to send data to someone else (Not to A and B)
3. Bsends RTS with sender as B, Receiver as A and length of the data packet. This RTS is received by both A and C. ,
4. Cdoes not react to this RTS as it is not the receiver,
: . .
5 A responds to RTS by sending CTS.
Scanned by CamScanner
“a Mobile Communication & Compyt
muting (MU-Sem, =P
7.¢ )
g, This CTSis not received by ¢ (a ig = Mobile Networking
'SNotin C’s
e) and C cone! e.
yj, ascum; j t rang
Ccannow start its transmission ‘ass uming wi ncludes that A Is outside the detection rang
il not cause a collision at A
prawbacks of MACA
with MACA is the o ;
4, one problem :
Vetheads associated with RTS and CTS transmission for short and time critical data
packets.
5 MACA also assumes that th
e transmis i
sion
.
links are 5 m , iin both the uplink and the downlink directions.
.
direct
otherwise a strong sender, di rected antenna ete, could enenay
act with the above scheme.
Mobile IP
3.3 3_
3
3,3.1 Mobile IP : Basic Concept
tition protocol developed by Internet Engineering Task Force (IETF) standa
is ac ommunicaica rd.
_ Mobile IP (or IP mobility)
ue t 0 rece ‘ . modifying the
_ In mobile IP, nodes contin en er of thei r loc ation which is achieved by
way. It is deed cach suc that mobile: users can move from one networ
k to another while
standard IP in a certain
pat ng a permanent IP address
maintaini
le IP
3,3.1(a) Need for Mobi
ol (IP).
: ’
tand the problem with the internet protoc
d
Tou nderstan the is for Mobile IP, let us first unders .
twork identifier
a host identifier. This ne
, ; a network identifier and
the standard IP, a host’s IP address is made up of
In th ched to.
specifies the network the host is atta ess, made up of its network
identifier and
con tai nin g a dest inat ion addr
with the header
A host sends an IP Packet
destination identifier. kets.
network, it can receive pac
er rem ain s connected to its original would
slong as the rec eiv network, the receiver
_
m its ori gin al net wor k and joi ns another
elf fro new
eiver disconnects its y not correct in the
- Now suppos e the rec IP add res s of the host is no’ w topologicall
cause, the
never re ceive any
packets. This is be
.
developed.
network. rec t add res s and Mob ile IP standard was
polo gically cor
s a so-called to
- Hence,ah ost need
iremen s of Mobile IP
t
3.3.1(b) Goals/Requ
IP de vi ce s can
Mobile
and vice-versa.
Scanned by CamScanner
W Mobile Communication &
Computing (MU Sem. 7-C
omp) 3-7
4. Transparency of Layers Mobile Networking :
An end-system or a router (node) that can change its point of connection to the network
without changing its IP
address.
It is the communication partner for the mobile node. The CN can be fixed or mobite.
The home network is the subnet to which the MN belongs to with respect to its IP address.
oO The FA is typically a router in the foreign network to which the mobile node is currently attached.
. . : ag ite visit to the FN
. Oo The FA usually implements Mobile IP functions
| like providing security services to the MN during its visit to re.
and forwarding the datagrams received from the home agent to the MN.
o It also supports the sharing of mobility information so that Mobile IP operates smoothly.
Scanned by CamScanner
Home Agent (HA)
Mobile Networking
o HAisa system inthe home network
Or Of the
o HA
can be Implem
ented on
; router th
implemented on 4 node :ina home subnet,at mIs respons; Ponsible for the home network, or alternatively, it can be
o HAmaintains a location reg
istry i.e.“€. j
itis j
o The tunnel for packet
s towards the m
7. Care of Address (CoA)
o The COA defines the
current location of the
MN
o Packet delivery toward
s the MN is done usi
ng a ;
tunnel.
o All IP Packets sent
to the MN are deli
vered to the COA,
There are 2 differen
t Possibilities for the
location of th ey
(i) s
Foreign Agent coa
i
- The foreign network’s router acts as the FA. Currently, the MN is in the foreign network. The tunnel’s start point is at
HA and end point is at FA, for the packets directed towards the MN.
ile IP network
Fig. 3.3.1: An example mob
rts at HA a nd ends at either FA or MNe depending
nel for a packet sent to
the MN always sta
| ends at FA. If the CanO
is Aco-loce _—
n the tunne
eA is
.the eCO
IfMN. forel gn agent COA, the
at A
C, O
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7-Comp) _3-9 Mobile Networking
3.3.2 IP Packet Delivery
MU —'May 12, Dec. 13, Dec. 16, Dec.
List ‘the ¢ titles of mobile IP and describe data transfer from a mobile node to a fixed node and vice \ versa.
Consider data transmission between CN and MN. There are four scenarios.
1. CNisa fixed node and data is to be transferred from CN to MN.
2. CNisa fixed node and data is to be transferred from MN to CN.
3. CNisa mobile node and data is to be transferred from CN to MN.
4. CNis a mobile node and data is to be transferred from MN to CN.
Fig. 3.3.2 shows the packet delivery to and from MN.
router router
, 4
(eS ied
’ \- foreign
_ / Noes LEG
\enetwork ;
Ns
ees
ed
Step 1: The ‘packet is sent by the MN with its original IP address as the sender-and the CN’s IP address as the
receiver.
Step 2: The FA responsible for the foreign network acts as a default router and forwards the packet to the router
responsible for the CN (The router is located in CN’s home network).
Step 3: The router responsible for CN then forwards the packet to CN.
(c) Data transfer from Mobile CN to the MN
Step 1: The CN sends the packet with its original IP address as the source address and MN’s original IP address as the
destination address,
Step 2: Since the CN is also in the visiting network, the FA responsible for the CN sends the packet to the router
responsible for the home network of MN.
Scanned by CamScanner
¥¢ Mobile Communication & Computing (MU-Sem 7-C Mobile Networking
_/-Comp) 3-10
; step 3: The HA of MN realizes that the MN i . the received packet and
COA with anctt ine in the home network. It then encapsulate
forwards it to the address as COA.
agen t (FA address as HA’s IP address and the destination
Step 4: The foreign and f forwards ds it ittoto the tneIV".
ates itit and
ates
psul
MN
to a )
mobi of
lethe
CN MN rece ives this packet, 1, decapsul
(d) Data transfer from MN
S tep 1: The MN sends the packet as u ith i P | asa a is ree
with its own fixed IP address as a source address
destination. sual
(F
Step 2: The foreign agent
respons home. network of the CN. and
ible for MN sends . this packet toCN theis; not
step 3: The HA sea, i r che
CN receives t
elie and realizes that the
in the home network
hence
COA of
tunnel the packet towards
: CN.
Step 4: The FA responsi decapsulates it and forwards. it to the
ponsible for CN receives the packet,. : .
about these
Some additional mechaninisms are ne mobile IP to work.. The following section discusses.
for eded
enhancements.
to anot her netw ork one initia l problem is how to find a foreign
After moving
.
ertisement and Agent Solicitation
describes two messages: Agent Adv
ent
3.3.3(a) Agent Advertisem
t in Mobile IP.
a. “Explain Agent advertisemen rlay of agent advertise
- How the age nt cou ld be dis covered using Mobile IP? Give the ove
-Q: :
“mobility extension.
achieved by messages from home
e out tha t it has cha nged network recently? This is
e mak
— How does a mobile nod
nts.
agents and foreign age ng messages called agent
advertisement.
pre sen ce and ser vic es usi
agents advertise their
- Home agents and foreign tain the following detail
s
t mé ssa ges are per iod ically broadcast and con
- Agent advertisemen
rthe MN.
List of COAs available fo ation available. For example,
o
ed by FA suc h as differen t types of encapsul
servi ces pro vid
o Special features and ulation.°
n or generi c encaps
minimal encapsulatio a link to the Internet.
net wor k nu mb er and conges tion details of
the
co. Allows MN to detect
WwW TechKnowledge
Pudlicatians
Scanned by CamScanner
Mobile Networking
3-11
Mobile Communication & Computing
(MU-Sem. 7-Comp)
¥
are U: sed. The a
gent advertisement packet jg”
mob ili
ili ty i
extension
wit h so me
— For agent advertise ment ICMP messages
shown in Fig, 3.3.3.
0 7|8 15 | 16 2aj24
ae ype ale E checksum:
H bit : This bit is set if the agent offers services as a home agent.
oO
F bit : This bit is set if the agent offers services as foreign agent on the link where the advertigem
ent has been
sent.
M and G bit : M and G bits specify the method of encapsulation used for the
tu nnel. M for minimal encapsulation
and G for generic routing encapsulation.
wW TechKnowledge
Pudlications
Scanned by CamScanner
——SSSSaatin
3.3.3(0) Agent Solicitatio
o Theinter-
ement ;
o AnMN has not received g COA Message is tog high or,
by ot her means,
- To reduce the congestion on the j
network, nk the MN Can sen va.
d out three Solicitations, per second, as soon as it enters a new
_ Any agent that receives the Solicita
tion
not receive an answer to its soli Message,
must d
t ansmits
asin
gle agent advertisement in response. If a node does
ec Tease the rate of solicitations
a exponentially to avoid flooding the
co-located COA.
Now the next step is, t .
Pls, the MN has to register with the HA if the MN
is ina foreign network
33.4 Registration .
xplain registration
with respect to mobileIP
- After agent discovery is done by a mobile
node , it knows whether it is in its home network or in a foreign network. If it
is in its home network, it communicates like
'
activate Mobile" IP. a regular IP device, but t ifif iti has moved to a foreign.
i network, iit must
For activating Wlabile IP, a process called home agent registration, or simply registration is used. For registration, the
MN exchanges information and instructions with the home agent. The main purpose of registration is to get the
Mobile IP working. The mobile node must inform the home that it is on a foreign network so that all datagrams must
be forwarded to its foreign network. .
It also must inform the home agent about its care of address (COA) so the home agent can send the forwarded
datagrams appropriately.
When registration is performed, the home agent, in turn, needs to communicate various types of information back to
the mobile nade.
Registration can be done in two different ways depending on the location of the COA.
3.3.4.
1. COAat the FA: In this case, registration is done as shown in Fig.
(containing COA).
— The MN sends its registration request to the FA
W TechKnowledge
Publications
Scanned by CamScanner
) wie
(MU-Sem. 7-Comp
ion & Computin
17 Mobile Communicat
=>! have|Moved °
Registration Request
Put registration
Reglstration Request
request on Binding
Registration Reply
Put MN on r
Registration list
Registration Reply °
OA at FA)
4 : Reg ist rat ion pro ced ure of mobile node via FA (C
Fig. 3.3.
3.3.5 |
: In this case , the regi stra tion is very simple and sh own in Fig.
2. COAis co-locat ed
a.
est directly to the HA and vice vers
— The MN may send registration requ
s FA if the R bit is set in the
an agen t adv ert ise men t from the FA, it should register via thi
= If the MN received
advertisement.
>
New ? eat
link Agent Solicitation
seen (No answer)
Agent Solicitation
>
(No answer)
Registfation time exceeded
DHCP Request
(DHCP details omitted)
| DHCP Reply
Registration request
Tunnel Establishment 0.
Fig. 3.3.5 : Registration procedure of mobile node via HA (Co- located COA)
Scanned by CamScanner
“3 Mobile Networking
ss “home address
_ ~ home agent: igi
COA...
= identification =.
extensions...
B bit : If set, indicate s that an MN also wants to receive the broadcast packets whic
h have been recel
HA in home network.
Home address : The home address is the fixed IP address of the MN.
0000
- identification -
extensions...
Scanned by CamScanner
WF Mobis Communication & Computing (MU-Sem.7-Comp) 3-15 —__Mobile Networkinn
o Code=68; _ home agent failed authentication S
© Code =69; requested lifetime too long
— Registration denied by HA
© Code = 129; administratively prohibited
o Code = 131; mobile node failed authentication
o Code =133; registration identification mismatch
° Code = 135; too many simultaneous mobility bindings
Extensions
It contains the parameters for authentication and may also contain other information as required.
What is tunneling ?
When a mobile node moves out from home network, the HA sends packet to COA of the MN via a tunnel.
Original IP header
o _Encapsulation means putting a packet made up of a packet header and data into the data field of anew packet.
Decapsulation is the reverse process of encapsulation, that is removing the packet from the data part of another ‘
oO
packet. Oe
Scanned by CamScanner
‘
' | |
psulatio mare.
2Mm.
(MU-Se 7-Co p) 3
____ Mobile Networks
sidisadvantages of enca
_ —. The nape
packet size is larger than the “i
original
o al packet
be done on|
o Encapsulation can nly when th the IP datagram.
ere nti ty at the tunnel end that decapsulates
is an enti
Mobile
node
s
{implement .
‘the wan e d
on ! “asi it
10: Encapsulati s t o Mo b i l e N o d e
Fig. 3 3. ou e packeetts t o the
e d to OAito rout
the Cc
H A
e el ; by the
‘ag na tunn
e
ess of
u n n e l l i n g '5i the proc
Thus t data strea
m
roams. It establishes @ pi pe (a W TechblKnicow ledge
pu a rians
order.
Scanned by CamScanner
WW. Mobile Communication & Computing (MU-S
em. 7-Comp) 3-17
3
within another IP datagram
z
IP address of HA
__Care-of address COA
1 eS TOSS poe Jength
Ss laa a8
lay. 2 prot apes “IP checksum =
IP address of0 CN
IP address of MN
TCP/UDP/ - payload ©
The fields of inner header are almost same as the outer header the only differences
are
The address fields consist of the address of the original sender and receiver.
The TTL value of the inner header is decremented by 1. This means that the
whole tunnel considered a-single hop
from the original packet’s point of view.
The TCP/UDP payload contains the actual user data to be transmitted
Advantage
It is simple to implement and it is a default encapsulation mechanism
Disadvantage
Most of the outer header fields are same as inner header so this method increases redundan
cy
a We ete
Publications
Scanned by CamScanner
_
-
<-~ wom, /Comp)
3-18
5 Mobile Networking
3.3.5(b) Minim ——$—
al Encapsula
tion /
MU — May 12, May 15, May 17
The outer header fields are almost same as for IP encapsulation; the only difference is in the Type field. It is set to 55.
The inner header is much smaller than IP encapsulation packet.
The S bit indicates whether the original sender's IP address is included in the header or not. Value 0 indicates sender’s
IP address can be omitted.
redundancy.
Advantage: Lower overhead as compared to IP-in-IP encapsulation as it avoids
with smaller path maximum transmission units
Disadvantage: It does not support fragmentation to deal with tunnel
(MTU).
(GRE)
3.3.5(c) Generic Routing Encapsulation
ts ar
capsulation. Also discuss meri
n
technique of encapsulati
wer TachKnauiled
Scanned by CamScanner
id Mobile Communication & Computing (MU-Sem. 7-Comp) 3-19 Mobile Networking
Original»
eo) header.
The various fields of the GRE header that follow the outer header are described as follows :
Protocol type : Protocol type is set to 47 for GRE encapsulation.
YoPwnp
C bit : If C bit is set, the checksum field contains the valid IP checksum of the GRE header and the payload.
R bit : If set, it indicates that the offset and routing fields are present and contains valid information.
K bit : If it is set, indicates the key field is present and may be used for authentication. ,
S bit : If set, indicates that the sequence number field is present.
5 bit : If set, indicates that the strict source routing is used.
N oa
rec. (recursion control) : It represents a counter that shows the number of allowed recursive encapsulations.
’ identification. °° pee ft
TT Cs [es GRE _ IP checksum oo:
THL ngth
IP identification s fragment o'
TTL lay. 4 ; IP checksum
IP address of CN
IP address of MN
TCP/UDP’ ...payload
8. rev. (reserved) : This field is reserved for future used and must be set to 0.
9. ver. (version) :It is set to O-for the GRE version.
10. Protocol : Indicates the protocol used by the packet following the GRE header.
11. Checksum : Contains a valid IP checksum of the GRE header and the payload (present only when C bit is set).
12. Offset : It represents the offset in bytes for the first source routing entry (present only when R bit is set).
13. Key : Contains a key that can be used for authentication (present only when K bit is set).
14. Routing : It is a variable length field and contains the fields for source routing.
Advantage
GRE supports other network layer protocols in addition to IP.
Scanned by CamScanner
Clee
ivewne~ ser OL
<=
@aceea
iulat. routigng pro
nos Toutin blem? How de yous YOU ¢ i
g
Triangular routin
SUN ees
o If CN receives
es t
° If the HA receiv
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7-Comp) _ 3-21 Mobile Networking
The Fig. 3.3.16 explains the four messages together with the case of an MN changing its FA and shows the exchange of
messages in optimization protocol. Frew un
FA |
CN HA |
—
Data ; Data |:
_ Update
ACK
|
Data
— MN changes |
ee i location
ee
n . :
a (n Update . Registration |
- FAgg might now forward these packets to the new COA of MN which is new foreign agent. -
Thus the packets that are in transit are not lost. This behavior is another optimization to basic mobile IP and provides
smooth handover.
— FAgg sends binding warning message to CN. CN then requests a binding update.
The HA sends an update to inform the CN about the new location, which is acknowledged. Now, CN can send data
directly to FAney, and avoid triangular binding.
However, the optimization will not work if the MN does not want to reveal its current location to the CN because of
security.
There may-be a situation where it is not feasible or desired to have the mobile node (MN) send packets directly to the
internetwork via FA.
In that case, an optional feature called reverse tunneling is used if it is supported by mobile node, home agent and
foreign agent.
As shown in Fig. 3.3.17 , a reverse tunnel is setup between MN and HA (If COA is co-located), or between FA and HA
(if FA acts as COA)
~ All transmission from MN are now tunneled back to the home network where HA transmits them over the Internet.
¥ Tecnenierag
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem, 7-¢
—¥OMp) 3-22 Mobile Networkin
home network
itt FA Foreign
Ly network
2. Multi-cast
Reverse tunneling is required for multicasting where the nodes in multicast group are in the home network, as an MN
in a foreign network cannot transmit multicast packets directly in this case, as the foreign network might not provide
the technical infrastructure for multicast communication. :
1. Frequent Mobility
devices, but only relatively infrequent mobility. This is due to the work
Mobile IP was designed to handle mobility of
big deal when you move a computer once a week, a day or even an
involved with each change. This overhead isn't a
functions
hour. It can be an issue for “real-time”mobility suc h as roaming In a wireless network, where hand-off
TechKnowledge
Publications
Scanned by CamScanner
W Mobile Communication & Computing (MU-Sem. 7-Comp) 3-23 . Mobile Networkin:
operating at the data link layer may be more suitable. Mobile IP was designed under
the specific assumption that the
attachment point would not change more than once per second.
i
2. Issue with DHCP
Mobile IP is intended to be used with devices that maintain a static IP configur
ation. Since the device needs to be able 4
to always know the identity of its home network and normal IP address, it is much
more difficult to use it with a devicg
that obtains an IP address dynamically, using something like DHCP.
3. Security Issue
Firewalls, causes difficulty for mobile IP because they block ail classes of incoming
packets that do not meet specifieg
criteria. Enterprise firewalls are typically configured to block packets from
entering via the internet. In many cases
authentication with FA is problematic as the FA typically belongs to another
organization or network.
4. QoS Issue
— The QoS solution for mobile IP should Satisfy requirements such as scalability, conservation of wireless
bandwidth, low processing overhead, authorization and accounti
ng etc.
— When handover occurs in mobile IP environment, some applications such as
web browser and file transfer using
TCP connection will face disconnection or a degradation of the
performance.
Another problem is with the tunnel based communication. In tunnel
based communications different data flows
addressed to the same IP address are treated in the same manner.
Thus tunneling makes it hard to give a flow of
packets a special treatment needed for QoS,
Scanned by CamScanner
Mobile Networking
ad antages of IPv6
arger address space-An IPV6 address is 128 bit Jo fig, . .
-
in address space. &: Compared with the 32 bit long IPva address, this is huge increase
petter Hea der format-IPv6 uses a new head .
applications.
Combining the features of address auto configuration and neighbor discovery enables every Ipv6 mobile node to
create and obtain a topologically correct address or the current point of attachment.
Every Ipv6 node can send binding updates to another node, so the MN can send its COA directly to the CN and HA. The
FA is no longer needed. The CN processes the binding updates and makes corresponding entries in its routing cache.
The MN is now able to:
o Decapsulates the packets
o To detect when it needs a new COA and
o To determine when to send binding updates to the HA and CN
Asoft handover is possible with Ipv6. The MN sends its new COA to the old router serving the MN at the old COA, and
COA.
the old router can encapsulate all incoming packets for the MN and forwards them to new
3.4 Routing _
Routing in wireless ad-hoc networks is different and complicated than wired networks or wireless networks with
infrastructure. This difference can be explained by example shown in Fig. 3.4.1.
two different time t, and ty,
Fig. 3.4.1 shows the network topology at
between them.
Seven nodes are connected depending upon the current transmission characteristics
via a weak link. Links may not have the same
At time t; node N4 can receive N1 ov er a good link, but N1 receives N4
characteristics in both directions.
Ni via a weak link. Network
The situation may change at time tz N1 cannot receive N4 any longer, N4 can receive
topology is frequently changed in ad-hoc networks.
W TechKnowledga
Publications
Scanned by CamScanner
time = to
—» Good link
— > Weak link
4. Dynamic topology
This is the greatest problem in routing for ad-hoc networks.
Mobile nodes moves or medium characteristics might change
fre quently. This results frequent changes in
topology as shown in Fig. 3.4.1 (at time=t,). Due to change in topology,
in ad-hoc networks the routing tables
have to be updated frequently.
There are basically two classes of flat routing algorithms :
TechKnowledyé
Publications
Scanned by CamScanner
‘4 Mobile Communicatiation &
Computing (MU-Se
mZComp) 3.96
ing
examples of proactive rout Protoc
: Mobile Networking
_ he vel
& Destination Sealien ce Distance ols
|
(0 or (DSDv) ei, oe
Optimized Link State Routing
_ LSR)
_ Fisheye State Routing (FSR)
_ Wireless Routing Protocol (wr
P)
Advantage
‘ These p prot _ Can n give
gi good real timet ffic Q
Route availabilit Y reduces delay (no route
seg
acquisitteion d elay)
Disadvantage
The proactive protocols ar @ not suitabl e for | arger networks, as they need to maintain nod eve ry
intain node entries for each and
-
Advantage -
rtisements
odic route adve
Eliminates peri
requirements.
r and bandw idth
— Mayreduce powe
Disadvantage
ition delay e too short
- Adds route-acquis ex pi ra tion times ar
te
signaling if rou g (DSDV)
- Maycausem ore Vector Routin
Distance distance vector
Se que nce It is an en hancement of
De st in at io n uting protoc ol .
3.4.1 network ro
e ad-hoc
ta bl e d r i ven mobil
ive
DSDV is a proact
gorithm).
routing (Bell man Ford al
or pe ri od ic al ly with its neighbors.
Dista nce Vect g ta bl e
Problems with anges its routin
ac h node
ex ch
t ab le. ha ns sc one node inthe twork propagate.
routin g & g
g its roruteine caus e
In Distance vector at in, Sistemas
rmation for cre
- . i
its loc al in fo
Each node uses e old an nvaiv
~ . ; may b
local information
~ However, the
Scanned by CamScanner
- cele Communic&at
Compio
utinng (MU-Sem.7-Comp)_ eer 3-27 a Mobile Networking
However, the local information may be old and invalid
. This is becaus e changes at one node
slowly in
through the network (step-by-step with
promptly, _— every exchange). TI hus t' he local information
i may not be updateg
ee ride
This gives rise to loops. A message may loop aroun
d a cycle for a long time (count- to-infinity problem).
Solutions used for this problem in wired netwo
rks such as poisoned reverse and split horizon do
ad-hoc networks due to the rapidly chang not work in case of
ing topology.
DSDV now adds two things to the distance
vector algorithm.
1. Sequence numbers
Each node advertise routing table with a sequence number
.
This sequence number used to distinguish stale route with the fresh route
and help the nodes to process
advertisements in correct order thus avoids loops that are likely in distance vector.
2. Damping .
It prevents temporary change in the network topology from destabilize the routing. These changes are of short
duration only,
|
When a node receives an advertisement containing a change in the current network topology, it waits for a
certain time before forwarding the updates in routing table to other nodes.
Waiting time depends on the time interval between the first and the best announcement of a path to a certain
destination.
DSDV algorithm
.— Each node maintains a routing table which stores
o Next hop and cost metric towards each destination.
o Also a sequence number that is created by the destination itself.
— In DSDV each node periodically forwards its own routing table to its neighbors. And each node increments and
appends its sequence number when sending its local routing table.
- Each route is tagged with a sequence number, the routes with greater sequence numbers are preferred.
— Each node advertises a monotonically increasing even sequence number for itself.
— When anode finds that a route is broken, it increments the sequence number of the route and advertises it with
infinite metric. Thus infinite metric indicates the route is broken.
— Destination advertises new sequence number.
Example
Scanned by CamScanner
mobile Com neaton & Computing (MU-
Sem, 7-Co
3-28
———
ag is anafiDSOV
Mobile Networking
‘avant
psDV es efficient protoco| for route d
iscove
at the source. .
'y. Whene ve
; "a route to a new destination Is required, it already exists
Hence, latency for route discovery is very |
ow.
pspv also guarantees loop-free paths
of DSDV
pisadvantages
However, DSDV needs to send a lot
-
of contro| mess :
topology at each node. aBes. These Messages are important for maintaining the network
_ This may generate hi
gh volume of traffi C
i for high
high- densiti y and highly
special care should be taken to reduce mobile networks.
-
© number of co
ntrol messages
,
3.4.2 Dynamic Source Routing (DSR)
ct
na
as specifically desi :
creed Y aan for Use In multi-hop wireless ad hoc networks of mobile nod
_ It uses an on-demand approach for finding routes vas :
‘se:
node for transmitting ‘
data packets, This approach that i'S, a route iis established only when 1it is required by a source
aves the bandwidth
It uses Source
sectination noderouting
nd for ro i .
outs discovery that is the source node determines the whole path from the source to the
es eposits the addresses of the intermediate nodes of the route
in the packets.
DSR contains 2 phases
1, Route Discovery (find a path)
2. Route Maintenance (maintain a path)
1. Route Discovery
- Anode only tries to discover a route to a destination if it has to send something to this
destination and there is no
known route.
- If node A has in his Route Cache a route to the destination E, this route is immediately used. If not, the Route
Discovery protocol is started :
1. Node A (initiator) sends a Route Request packet by flooding the network
2. If node B has recently seen another Route Request from the same target or if the address of node B is
already listed in the Route Record, Then node B discards the request!
3. If node B is the target of the Route Discovery, it returns a Route Reply to the initiator. The Route Reply
contains a list of the “best” path from the initiator to the target. When the initiator receives this Route |
n.
use in sending subsequent packets to this destinatio
Reply, ’ it caches this route in its Route Cache for
4. Otherwise node B isn’t the target and it forwards the Route Request to his neighbors (except to the initiator).
Reatard ST
ee = - r Ww TechKnowledga =
Publications .
Scanned by CamScanner
Ww Mobile Communication & Computing (MU-Sem. 7-Comp) 3-29 . Mobile Networking
2. Route Maintenance
— _ In DSR every node is responsible for confirming that the next hop in the Source Route receives the packet. Also each
packet is only forwarded once by a node (hop-by-hop routing).
- Ifa packet can’t be received by a node, it is retransmitted up to some maximum number of times until a confirmation
is received from the next hop. Only if retransmission results then in a failure, a Route Error message is sent to the
initiator that can remove that Source Route from its Route Cache. So the initiator can check his Route Cache for
another route to the target.
- If there is no route in the cache, a Route Request packet is broadcasted.
Error message
DSR Advantages
Routes maintained only between nodes who need to communicate
Reduces overhead of route maintenance
Route caching can further reduce route discovery overhead.
A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local
caches.
DSR Disadvantages
Packet header size grows with route length due to source routing
Flood of route requests may potentially reach all nodes in the network.
Potential collisions between route requests propagated by neighboring nodes
‘Oo Insertion of random detays before forwarding RREQ
© Increased contention if too many route replies come back due to nodes replying using their local cache
© Route Reply Storm problem
Scanned by CamScanner
Mobile Networking
x 8
KP CH) [0,C/EH.I0-471
Scanned by CamScanner
| 3-31 Mobile Netw, i a
¥ Mobile Communication & Computing (MU-Sem. 7-Comp)
ork:
[0,C/E/H/J/L,ID-47]
(alternatively:[0,C/G/V/K/L,ID-47))
Explain snooping TCP and mobile TCP with their merits and demerits. -—=s===S(May 12, Dee. 13,
Discuss Mobile Transport Layer, ee
Explain merits and demerits of snooping TCP and indirect TCP?
the functioning of I-TCP and SNOOP -TCP, giving advantages
Explain 15, 10 |
and disadvantagesof both.(May
3.5.1 Traditional TCP
~ Traditional TCP’s performance is deteriorated in wireless networks causing many errors and disconnections as it was
designed to perform well in wired networks and stationary node environments, and not in wireless networks. .
- The traditional TCP does not censider properties of wireless network such as limited bandwidth, long latency, high bit
error rate, and frequent disconnections and hence, does not guarantee reliable and efficient data transmission in
wireless environment.
— TCP assumes that most of the packet losses in wired network are due to congestion. But in wireless environment,
there could be many reasons for packet losses thase need to be considered.
W TechKnowledse
PubitcatiohS =o
Scanned by CamScanner
mobile communicatton & Computing (MU-Sem, 7
is SOM. 7-Comp) us
— following section describes the tradit = he need for
norder to use it effi, ic fora a sath
modification to the traditional TCP j brace design ently in wir eless networks.
i
estion Contro l
cong
TCP was orlginall ly designed for fixed
=- networks with fixed end s
ystems.
__ Routers are responsib le to transfer Packets
from so urce to destinatio n.
hing but 4
_ tifa packet is lost
in the wired netw
ork, th € probable reason of that is congestion. Congestion is not
temporary overload at some e point
poi i n the transmission path, Le. a state of congestion at a node
utput link
_ Each router maintains buff ers fo
pack ets’ inpu t rate destined for one ©
If the sum of b the ckets fast
r packli ets.then
exceeds the capacity of th e output put link, the buffer er becomes full and .it cannot forward the P2
enough, so the packet $ are dropped by the rout
er.
_ Adropped packet is lost and a gap iis noticed by the receiver in the packet
acket stream.
con tin ues to a ‘ ;
The receiver the mismis sing one.
ti ckn owl edg e all in-sequence packets up to ass ume s @ pac ket is lost due to
The receive r notices the missi n & acknowledgement of the lost packet and
congestion.
tion.
Retransmitting the lost packet a nd co ntinuing
ntinui to send packets at full sending rate would only increase conges
gestion, the transmission
To reduce congesti issi rate is slowed down considerably by TCP .
the conges i
same proc ess. By doing this,
CP connections wi I t
t he same pro b lem follow the
All other
resolved soon.
called slow-start
This behavior of TCP during congestion is
equally.
res that even unde r heav y load the available bandwidth will be shared
TCP ensu
9, Slow start
lled slow start
e be ha vi or of TC P af te r detection of congestion is ca
Th
n quickly.
It is used to resolve congestio
rking segment (TCP pack’ et).
Slow-start wo iver . The start size of window is one
win dow for the rece
a congestion arrives, the sender
Sender calculates ent . If. this acknowledgement
an ack now led gem
e pac ket and waits for
The sender sends on no w sends two packets (conge
stion window = 2).
n do w by one . And for each
tion wi
increases the conges sen der add s 2 i n the congestion window, one
s, the
Afte r arrival of two corres
ponding acknowledgement
_
acknowledgement. led as an exponential
e the ac kn ow le dg em ent arrives. This is cal
windo w every tim
es the congestion
- This scheme d oubl congestion threshold
.
tain valu e called as
inues till a cer i.e.
n rate is linear
increase, and it cont thr esh old , fur the r increase in t ransmissio
congestion
ndo w crosses the ement is received.
- Once congestion wi ea ch time th e acknowledg
is iner ease d by on e
congestion window the packet loss.
se co nt in ue s till the sender detects its current congestion
window
s lin ear in cr ea d to hal f of
- Thi ngestion threshol
ct ed ; the sender sets the co
Once the packet
loss is de te
are repeated again.
- e. The above steps
ndow is set to on
and congestion wi
recovery
3. Fast retransmit/fast ways.
the los s of packets in two slow start.
- Thesender de te ct s
e the se nd er activates normal
eiver, in that cas ledgements).
curs at the rec (Duplicate acknow
(i) Ifa time-out oc for the same pac
ket
us acknowledgements ” “elay TechKnowledg
ives continuo publicati on
(ii) If the sender rece -
Scanned by CamScanner
& Computing (MU-Sem.7-Comp)_ Mobile Networking
®
BF_MobileCommunication ent
the
If this is the case, then the sender can deduce two things - one is that the receiver got all packets up to
receiving something from the
acknowledgement in sequence and second is that the receiver is continuously
network
sender. Therefore, the packets must have been lost due to simple transmission error and not due to
|
congestion.
as a fast
The sender can now retransmit the missing packet(s) before the timer expires. This behavior is called
retransmit.
— The receipt ofan acknowledgements show that there is no congestion to justify a slow start. The sender can
loss,
continue with the current congestion window. The sender performs a fast recovery from the packet
— This mechanism improves the efficiency of TCP dramatically.
4. Implication on mobility
There are many problems that degrade the performance of TCP.
Transmission errors
TCP assumes congestion if packets are dropped. This is not always true for wireless networks, where often, packet loss
is due to transmission errors.
High delay
Wireless networks have a considerably longer latency (delay) than wired network.
Limited Bandwidth
Available bandwidth within a cell may change dramatically. This leads to difficulties in guaranteeing QoS parameters
such as delay bounds and bandwidth guarantees.
Slow start is the mechanism of traditional TCP for wired network to deal congestion. In that, TCP assumes packet
losses due to congestion. However, in wireless network there could be some other reasons that cause packet loss such
as BER, and frequent disconnections by handoff.
If we use traditional TCP in wireless environment, it drastically reduces the congestion window size and doubles the
transmission timeout value. This unnecessary congestion control reduces the utilization rate of the bandwidth,
reduces the network performance severely.
Serial time-out at TCP sender degrades overall throughput more than losses due to bit errors or small congestion
window do.
—- Hence we required to change TCP for mobile environment. There are large number of devices and applications that
are using current TCP; it is not possible to change TCP completely just to support mobile users or wireless links.
Therefore any enhancement to TCP has to be compatible with the standard TCP.
Scanned by CamScanner
Mobile Co mmunicati ion & Computing (MU-Sem /VOmp)
7 Cc 3-34 ‘ Mobile Networkin
2 Maintenance of e nd-to-end T CP sema ntics.
|
Explal
‘Explain merits and demerits of indirect TCR?
ng and S n o 7
of |-TCP
‘Explain functioni ntag es syid digaa vanta ged of boi ee
ee one oree ng TCP. Givin g adva
y May 17;
0 (aa18:
“(Dec
Mobile es
xplal
within the
poor ly toge ther with wire less links and second is that T P
performs
There are two facts: one is t hat TCP
nged.
fixed network cannot be cha to the wired internet
i : host connected via a wireless link and an access point
s an vexeme with a mobile
owres
Figg. 3.5.1ne shcor ld also use wireless access.
po nd en t no de res ides. The correspondent node cou
where t
a wireless part.
\|-TCP separ ates a TCP conn
ection into two parts : a fixed and ne twork.
~
rou ter (ac ces s poi nt ) and the fixed host over the fixed
n the mobile support
o. Fixed parti s betwee r the wireless medium.
n the MH (Mo bil e host ) and its access point ove
wee
o Wireless part! 5 bet
the access point.
be tw ee n the fixed computer and t he foreign agent
of
Standard TCP is us ed
ile hos t an d cor res pondent host is at
ection between mob
go od po in t for segment ing the conn
A transfers the
IP. An d du ri ng ha nd over, foreign agent
mobile g the user mobili
ty.
t is re sp on si ble for controllin
The foreign ag en
agent.
the new foreign directions.
connection to y 5 all data in both
ox y an d re la
t acts as a pr
— The foreign agen
access point
(foreignagen')
mobile host
standardTCP
P
Indirect TC
Fig- 3.5.1:
-
y be fo ll ow in g 5¢¢ narios pile host
There ma TCP.
p a c ket to mo it et via a standard
t se n d s 4 ed ode , 4 TC P pa c
Correspondent h os
ax sends . ledg?
1.
dent node isa
ixe a NOU, ¥ TechKnow
public ations
pon
- Since the corres
Scanned by CamScanner
Ww Mobile Communication & Computing (MU-Sem. 7-Comp) 3-35 Mobile Networking
An access point receives that packet and sends an acknowledgement to a fixed host for the received packet.
The access point buffers the packet and forwards this packet to a mobile host using wireless TCP.
If there is any transmission error on wireless link then access point retransmits that packet instead of fixed host
retransmitting it. (This is also called local retransmission). , @
Once the acknowledgement is received for the packet form the mobile host; the access point then removes that
packet from its buffer.
Thus the access point acts as a proxy.
3. The mobile host moves to a new location and handover takes place
When mobile host moves to a new location, it registers with new foreign agent. After registration the new foreign
agent informs the old foreign agent about its current location.
The old foreign agent forwards all the buffered packets to new foreign agent as the packet in the buffer have
already been acknowledged.
With the buffered data the sockets of the access point must also migrate to the new foreign agent. This is shown
in Fig. 3.5.2.
access point,
|
access pointy
mobile host
Fig. 3.5.2 : Socket migration after handover of a mobile host
The socket reflects the current state of the TCP connection i.e. sequence number, addresses, port numbers etc.
The handover is transparent to the correspondent host and no new connection is established for the mobile host.
Advantages of I-TCP
I-TCP does not require any changes in the standard TCP used for wired networks.
Due to the partitioning transmission errors on the wireless link cannot propagate into the fixed network.
It is simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host.
A very fast retransmission of packets is possible, the short delay on the mobile hop is known.
TechKnowledge
Publications
Scanned by CamScanner
Mobpil
ileCommunicat
& Com
ioput
n
:
Mobile Networking
U-Sem,. 7-
9 (MS Om
a
os Te
Due to the segmentation of the TcP ¢ onne
layer protocols.
i ~
Ction, the mobi ile host and correspondent host j can use different transport -
ges of I-TCP
pi gadvanta
nti
it losses end-to-end sema ntics; , ana cknowled, that a
=
a pac k ess poi nt to a sen der does now no longer mean
receiver really got gement sent by acc ile host; the
ign agent crae shbe. before sendin. g acknowledged packet to a mob
et. Ifa forei
tra nsp are ntl y and leav es the TCP end-to-end connection intact.
y
_ Snooping TCP works completel |-TCP.
cks of the
It overcomes the some drawba Correspondent
local retransmission . host
<< Foreign
as follows :
~ Snooping TCP works
host
t ho st se nd s a pac ket to mobile s the packet
1. Correspond en
via wi re d TC P co nn ection. The access point buffer
l e host
po nd en t ho st sends a packet to mobi
— Corres
ndent host. acknowledgements.
sent by correspo in po th di re ctions to reorganize
pack et dgement also
po in t al so snoops on the ac kn ow le dg em en t and this acknowle
° Access , it sends an
le ho st re ce ives the packet
o Once the mobi n amount of time,
th ro ug h th e access point. en t fr om a mo bi le host within certai
em d to the
passes
re ce iv e an y ackn owledg fa st er re tr an smission com pare
n’t
ss point does its buffer, pe
rforming a much
olf the acce pa ck et fr om
smits the of one hop plus
then it retran ref lects only the delay
ec au se it
fixed host. shorter,
em en ts can be much
ledg
ut for acknow TechKnowledgs
o. The time-o Pubtication:
.
processing time
Scanned by CamScanner
W Mobile Communication & Computing (MU-
Sem. 7-Comp) 3-37
Mobile Networking
© It is also possible that mobile host sends
duplicate acknowledgements for the same
packet to indicate a
packet loss; the foreign agent can filter these duplicate acknowledgements so, that unnecessary
retransmissions from the correspondent host
can be avoided.
2. Mobile host transmits a packet to a correspo
ndent host
When a mobile host sends a packet to correspondent host, the foreign
agent keeps track of the sequence
numbers of these packets.
When a foreign agent detects a gap in the sequence numbers, i.e. packet loss, it sends a negative
acknowledgement (NACK) to the mobile host.
Once the mobile host receives the NACK, it can retransmit the
missing packet immediately.
Reordering of the packets is done automatically at the correspondent
node by TCP.
Note that to maintain end-to-end semantics of TCP, foreign agent must
not acknowledge data itself to the
correspondent host (instead FA forwards the ACK received from the MH). This
ensures the correspondent host that
the mobile host has actually received the data. Now if foreign agent crashes,
the time-out mechanism of
correspondent host still works and triggers a retransmission
of a lost packet.
Advantages of Snooping-TCP
— The end-to-end semantics are preserved,
Correspondent host need not to be changed; most of the enhancements are done in the
foreign agent.
It doesn’t need handover of the state as soon as the mobile host moves to another foreign agent.
Assume there might
still be data in the buffer not transferred to the new foreign agent. All that happens is a time-out at the correspond
ent
host and the retransmission of the packets to the new foreign agent.
— It doesn’t matter if the new foreign agent uses the enhancement or not. If not, snooping TCP automatically falls
back
to the standard solution.
— If user applies end-to-end encryption, S-TCP fails. Because TCP header would be encrypted and hence snooping on the
sequence numbers is meaningless.
ExplainM-TCPindetal,=
with its merits and demerits.
Explain mobTCPile
Write a short note on M-TCP, oe
Explain two TCP for Mobile communication.
— The occurrence of lengthy and/or frequent disconnection Is the major problem in wireless networks. M-ICP deals with
the lengthy and/or frequent disconnections.
ww TechKnowledge
Publications
Scanned by CamScanner
M-TCP aims :
o Toimprove over all throy tworkin 9
Working of M-TCP
€ Wire ess link, M- T Cc Pp A
eed Saba
b dwidth manager ‘
Once the SH detects the connectivity again, the sender’s window size is again set to the old value, enabling the sender
to send at full speed.
t
. — hostnden
Correspo
Supervisory
wired"Interr
mobile
host
end-to-end TCP connection
)
Fig. 3.5.4 : Mobile TCP (M-TCP
Scanned by CamScanner
Siete
t SS
benisirpace
eerese
Additionally, the MAC layer knows the actual reason of the disconnection and does not assume congestion as TCP
does. .
MAC layer can now inform the TCP layer for the upcoming loss in connection
TCP can now stop packet sending and freeze the current state of congestion window and all timers of TCP.
If the disconnections occur frequently then additional mechanism in the access paint must be included to inform the
correspondent host about the reason of interruption.
Scanned by CamScanner
+ Mobile Communication & Computing (MU-
S . 7-Com
-9emM . Mobile Networking
p). 3-4 0 | .
on
AS soon as the MAC layer detects connectivi the same congesti
_ Ctivity again, it infor
th e TC P to re su me operation with
the timer s, ms
wind ow and
gap to be filled.
(T/TCP)
Tr an sa ct io n oriente d TCP s: co nn ec ti on setup, data tra
nsmission, and
3.5.6 it requires th
ree $ tep
via TCP,
ho st wa nt s to send a packet
— {fa mobile
! nd shaking.
connection release- three way ha
lease req uir e up, one for data and
and co nn ection re s. Th re e for connection set
Both conne ction se
tup seven packet
-
pa ck et , TCP requires
ha s to send one (Fig. 3.5.5).
= Ifa mobilé host release am ou nt of d ata it is not negl
igible.
on
bu t for sm al l
again three for conn
ec ti
is negligible
é a nd connection re
lease with the
er he ad se tu p
si on this ov the connection
~ For the large transmis ut io n. It combine 5
pro vides 4 sol
tr an sa ct io n or iented TCP
- The
user data packet. n.
to t w o from seve
packet s
mber of
—- This can reduc e the nu omtedse
OF TechKn
lications
Pub
eat
Scanned by CamScanner
W Mobile Communication & Computing (MU-Sem. 7-Comp) 3-41
Client Server
TCPSYN
TCPSYN/ACK
TCP ACK
perce
Data transfer.
=FIN/ACK
| —-————_,
__—_" J
1 v
Disadvantage
1. | Indirect TCP Splits TCP connection into Isolation of wireless link, Loss of TCP semantics, higher
two connections simple latency at handover
2. | Snooping TCP “Snoops” data and Transparent for end-to-end Problematic with encryption,
acknowledgements, local connection, MAC integration bad isolation of wireless link
retransmission possible
3. | M-TCP Splits TCP connection, chokes Maintains end-to-end Bad isolation of wireless link,
sender via window size semantics, handles long term processing overhead due to
and frequent disconnections bandwidth management
4. | Fast retransmit/ Avoids slow-start after Simple and efficient Mixed layers, not transparent
fast recovery roaming
5. | Transmission/ Freezes TCP state at Independent of content or Changes in TCP required, MAC -
time-out disconnect, resumes after encryption, works for longer dependant
freezing reconnection interrupts
W TechKnowledgé
Pudlicatians
Scanned by CamScanner
Mobile Networking
Retransmi a
Selective V
It only lost data ; receiver
retransmission ery efficient Stightly more complex
ded
Combi software, more buffer nee
Transaction ombine connection
dantediTe : Ch anges iin TCP requirireed, not
setup/release and data Efficient for certain .
oO P applications
transmission transparent
Ipv4
The network layer prot ocol in th tPv4. IPv4 provides the host-to-host
suite is currently
protocol for the fast growing
communication between
met. IPv4 has some deficiencies that make it unsuitable
systems in the vey
lowing:
Internet, including the fol
ion is still a long ,
ss addressing, and NAT, address deplet
Despite all short term solution Ss, such as subnetting, classle
term problem in the Internet. imum
real time audio and video transmission. This type of transmission requires min
The Internet must accommo date
not provided by |Pv4 design.
delay strategies and reservation of resources or
for some applications. No encryption
ern
net must acco mmod ate encry ption and authentication of data
The Inter
ed by IPv4.
authentication is provid
applications.
Scanned by CamScanner
ps ObIIE Networking
(v) Support for resource allocation : In IPv6, the type-of-service field has been removed, but
mechanism called Flow
label has been added to enable the source to request special handling of packet. This mechanis
m can be used to
support traffic such as real-time audio and video.
(vi) Support for more security : The encryption and authentication options in IPv6 provide
confidentiality and integrity of
the packet.
No special mechanisms are needed for securing mobile IP registration. In every Ipv6 node address auto-configuration
i.e. the mechanism for acquiring a COA is inbuilt.
Neighbor discovery mechanism is also mandatory for every Ipv6 node. So
special foreign agents are no longer needeg
to advertise services,
Combining the features of address auto-configuration and neighbor discovery enable every Ipv6 mobile node
to create
and obtain a topologically correct address or the current point of attachmen
t.
Every Ipv6 nade can send binding updates to another node, so the MN can send its COA directly
to the CN and HA. The
FA is no longer needed, The CN processes the binding updates and makes
corresponding entries in its routing cache,
The MN is now able to:
,
© Decapsulate the packets
oO Detect when it needs a new COA and
© Determine when to send binding updates to the
HA and CN
A soft handover is possible with Ipv6. The MN sends its new COA to the old
router serving the MN at the old COA, and
the old router can encapsulate all incoming packets for the
MN and forwards them to new COA.
Ipv6 Header
\Pv4 header
wW TechKnowledge
Publications
Scanned by CamScanner
.
LMS
& Computing (MU
mobile Communication
—next
gy
Comp) a.
Header : 8 bits. Specifi next
=
Mobile Net working
“ncapsulated Protoc—ol
es the
tina
ination address :: 1 16 bytes, T € sending node
( viii) Des he IPv6 address of the destinati lon node.
performance.
s? Explain |-TCP.
the proble ms of using traditional TCP in wireless network
@.9 Discus s
IPv6 provide over IPv4?
ble ms with IPv 4 pro toc ol? What advantages does
Q.10 What are the pro
pi acket format.
of IPv6? Explain IPv6
Q.11 What ar e the features
Q00
W TechKnow ledye
lications
pub
Scanned by CamScanner
Wireless Local Area Networks
—=—=—=——!2
:
a
Introduction
Scanned by CamScanner
Com, tworks
= peemeeneee i Wireless Local Area Ne
advantages of wireless LAN
r bandwidth and transmissi on quality : wi
) compared t°
offers ; very low bandwidth (1-10 Mbit/s
Lowe > Wireless
LAN . nce it offers low QoS as
wired networks due to shared medium. ‘ Also it h as high
error rates due to interference He
wi wired network,
compar ed to
solution i
any proprietary luti S exist, due to slow standa fi
M
Zation procedure
difficult to
:
Local regulatory restrictions Several countri :
untries jimpose different spectral restrictions. Due to this it is
solutions.
establish global WLAN
m akes
: Securi i
Lower safety and security : works. The open radio interface
ty concerns are high in wireless net
eavesdropping much easier in WLANs than wired network
etwork.
4] 2 Types of WLAN
: .
; fied into two categories
Based on the
hen
etwork configuration, wireless LANs can be classi
Infrastructure based wireless networks
Ad hoc wireless networks
work
1. Infrastructure based wireless net
is Access point (AP).
An important element of this type of network
network infrastructure.
een the wireless terminals and wired
APp rovides an interface betw
with each other via an access point.
Herew ireless nodes communicate er management has bee
n
es like med ium acce ss cont ro |, synchronization, pow
edur
All the net work control proc
done by the AP.
ks anda wired network.
ess poi nts wit h three wireless networ
Fig. 4.1.1 shows thr ee acc Since AP performs
net wor k is ver y sim ple r than ad-hoc networks.
tructure based wirel ess
The design of infras of ind ividual node is less.
l pro ced ures, the complexity
most of the transmiss
ion con tro er they cannot be used
fle xib le. For exa mpl e, in the case of disast
less
wireless network is
Infrastructure based
ture is left.
when no infrastruc
phone network.
For Example, Cellul ar
networks
based wireless dgs
frastructure Knowleons
Fig. 4.1.1:1n
Techlic
Ww Pub ati
Scanned by CamScanner
SF Mobile Communication & Computing (MU-Sem. 7-Com
p) 4-3 Wireless Local Area Netw,
oo
ed
Scanned by CamScanner
works
m.7-Comp) 4 ; Wireless Local Area Net
& Computing (MU-SeS “4
bile communication S ————
M
frastructure based power manageme
nt,
control medium access mechanism, within
most of the transmission aoaei n etc. have to be imp lemented
performs reducing the c omplexi
of | synchronizatio
procedures, ode. thus plexity
_ dual
indivi the node itself. can be
= ity as these networks
basased wireless netwosk is Jess | It offers higher flexibil astructure.
| Infrastructure i d of any infr
— in case of disaster, , th they | in i i
e,
flexible. For exampl , stalled instantly withow
ns
ras tru cture is left ’
d whe n no inf
cannot be use
| No planning is ne
_ |
e pla nni ng and tak es time to set up. 4.1.2.
Requires mor = own in Fig.
7.
k is Ar ch it ec tu re of ad- hoc ne twork is sh
| ucture based networ
itte
chhi
Arrc tuure of Infrastr
ecct
8.
shown in Fig. 4.1.1. 3 ;
. |
z frequency
42 (EEE 802.11_ network (WLA
N) in 2. 4, 3.6 and 5 GH
nda rds for imp lem ent ing wireless local area
sta
IEEE 802.11 is a set of
(IEEE 802).
bands. N/ MA N Sta ndards Committee
the IEE E LA
and main tained by 112, etc.
They are created 802.11b, 802. cifies the
s ver sio ns of 802 .11 - 80 2. 11 ,
to hi gh er la yers, put spe
oduced variou ace as the ot
hers
IEEE 802.11 intr the same in terf
s st an da rd use s wireless LANS.
in ta in in te roperability, thi th e sp ec ia | re quirement of
layer adapted to
— To ma
medium access
physical layer and
ture
stem Architec
4.2.1 IEEE 802.11 Sy ne tw ork or as ad ho
c networks.
ba se d
i gured as infrastructure
Ns can be conf
JEEE 802.11 LA
network
of In fr a st ructure based
Architecture d network.
1.
FE E 80 2. 11 in frastruct! ure base
ture of |
s the architec
Fig. 4.2.1 show .
goe.11 LAN
a g02.11 LAN
d IEEE 802.11
ec tu re of an in frastructure base
Fig. 4.2.1: Archit
7 TechblKnicowatletadsl
pu
Scanned by CamScanner
_Wireless Local Area Networ
Basic Service Set (BSS)
The basic bullding block of IEEE 802.11 architecture is the Basic Service Set (BSS).
The stations and access point which are within the same radio coverage form a Basic Service Set (BSS).
- Allstations within a BSS communicate with the same access point and compete for shared medium.
Access point can be connected to other access points via distribution system.
Station (STA)
The station is a wireless node and it is connected to an access point.
All stations are equipped with wireless network interface cards (WNICs) and contain the functionalities of the 802.11
protocol.
Wireless station can be mobile devices such as laptops, personal digital assistants, IP phones and
other smart phones,
or fixed devices such as desktops and workstations that are equipped with a wireless network interface.
- Each ESS has an ID called the ESSID which is a 32-byte (maximum) characte
r String,
Portal
It acts as an internet working unit to connect other LANs. .
Distribution System (DS)
A distribution system works as a backbone network and handle
s data transfer between different AP’s. It connects
several BSS’s via AP’s to portal thus forming a single network
.
The DS is not really the part of IEEE802.11 standard.
The DS could consist of bridged IEEE LAN wireless
links or any other network,
2. Architecture of ad hoc network
Scanned by CamScanner
ing (MU-Sem EtNs
AreaeNs CES
Moe o communication & Comput Locael l
_Wir
7602.11 LAN
,
Fig. 4.2.2 : Architecture of IEEE 802.11 ad-hoc wireless LAN |
n in Fig. 4.2.2 STAr STA2, and
ns usi ng the sa me radio frequency. For example, as shyowwith STAs but not with ST Ay.
s mean, STA, can communicate ‘rectl
1ass compri se s a gr ou p of sta tio
s in IBSS>. Thi
cths are in IBSS1, where as STA, and STA
hitecture
42.2 IEEE 802.11 Protocol Arc
s point).
less LAN con nec ted to a swi tch ed IEEE 802.3 Ethernet via a bridge (Acces
As shown in Fig. 4.2.3 an 802.11 wire
wired node.
The higher layers (Application, TCP, IP) of wireless node works same as
- medium access
layer i.e. logic al link contr ol (LLC) covers the differences of the
The upper part of data link control
t media.
control layers needed for differen
MAC layer.
stan dard only cove rs the specification of physical layer and
_ {EEE 802. 11
Fixed
tse terminal
. -
aul i |
: ie
Mobile terminal
ae
network
Application
TCP
IP
|
LLC
802.3 MAC
802.3 PHY
| go2.3PHY
DLC
|
PHY
Fig. 4.2.4 : IEEE protocol architecture and management
Physical Layer
The Physical layer (PHY) is subdivided into 2 parts :
© Physical layer convergence protocol (PLCP) and
© Physical medium dependent (PMD) sub layer.
Protocol architecture is shown in Fig. 4.2.4:
© The PLCP sub layer provides
(a) “Modulation
MAC layer
The basic tasks of MAC layer :
MAC management
Tasks of MAC Management :
(d) Encryption
PHY management
Tasks of PHY management :
(a)
(b)
FHSS Physical layer (FHSS — PHY)
hronization| SF
PLCP header
PLGP preamble { Mbit/s DBPSK Ba
rker
it /s DO PS K Ba rker
SK Barker 2 Mb
4 Mbit/s DBP 5.5 or 11 Mbit/s cc K
at
r packet form
ss PL CP Physical laye
1 ps-
Fig. 4.2.5: IEEE g02.1 2.9.
own in Fig. 4.
80 2.11 is sh
t of IEEE
P L C P p a cket forma
~The DS-SS Physical la yer rate of 1 M
bit/s. que used.
a n s m i t t e d at t he
u po n th e mo dulation techni |
~ The PLCP part is alway s
tr depending |
r2 Mbit/s
er qo
oa d can be tr an sm it t ed at eith , energy detec
tion ,
~ Payl tions. g a i n s e t t i n g
fo j l o wing func d for sy nchronization,
e have th e
The fields of a fram
© Synchronization :
fset
and for frequency of
Scanned by CamScanner
so
vv __Mobile Communication & Computing (MU-Sem. 7-Comp) 4-9 Wireless Local Area Networic = g
© Start frame delimiter (SDF) : This field indicates the starting of a frame and consist. the Pattern
1111001110100000.
‘ 4
° Signal: This field indicates the data rate of the payload. The value
Ox0A is for 11 Mbit/s and 0x14 is for 2 Mbits/s,
other values are reserved for future use.
/
©
2
Service: This field is reserved for future
use.
oO Length: This 16 bit field is used to indicate the length of a payload in microseconds
a ae ae
PLCP preamble PLCP header |
1 Mbit/s - 2 level GFSK 1 Mbit/s - 2 level GFSK
. 2 Mbit/s - 4 level GFSK
Fig. 4.2.6 : IEEE 802.11 FH-SS PLCP Physical layer packet format
Scanned by CamScanner
ea Networks
7Wireless Local Ar
:
a Me"o“eea frahie are as follows Ows :
The fel patttern is used
fo
: This pat
achronization r the syn
chron detection by the ccA (Clear
It i whi ch is . subibicio. of the receivers and signal
ssm ent ). ). It is 80 bit fiel d
nel asse
chan This | isa 16 Bit pattern.
l i m i ter (SFD) : ovides frame sy
nchroniz ation: The
bit fleld indicate s
fr a m e d e pr
arrtt the start of fr am e an d
2? a 0¢
SED is 0000110 01011101,
t
LW): The a nacke
e length word (P
acket 12 bit packet length wididth shows t he length of the payload. The length of
6,
ould
pe up to 4k bytes.
to zero
\cP signaling field (PSF): 4 bit PSF fieldMbit/s),
‘Specifies the data rate of the payload following. If all bits are set
(1
rate Maximum
4,
mean s the lowest d ata 2M is represented by 0010 bit sequence:
oot it bit/s data rate
1111.
rate 8.5 Mbits/s is represented by
gata : 16 bit HFC
i errors of up to 2 bits,
check (HEC) It can recover
Header error to protect the PLCP header.
added
P bits areC iscorrupted.
otherwise identify whether PLC
"
Layer
4,2.3(¢) infra Red Physical
ra red for transmission.
The physical layer uses inf 85 0- 95 0n m ran ge and Pulse Position Mo
dulation (PPM).
the wave len gth
using infra red rays of
Digital signals are sent zed.
Mbit/s have been standardi
two data rates, 1 and 2 and 16-PPM is applied.
dat a rat e, tra nsm itt ed bits are grouped in 4-bit blocks
o «Forl Mbit/s applied.
4-PPM is
t/s , the dat a str eam is divided into 2-bit blocks and
o «For2 Mbi
layer
ru ct ur e of Infra red physical
st .7.
Frame
ra red phy sic al lay er has been shown in Fig. 4.2
of Inf 1 to 2500 octets
The PLCP packet format slo ts 3 slots 32 slots 16slots 16 slots
4
57-74 slots ies
e DC level... |.
al ogt
ae we Adjustment, :te
Ab Ce
|.
PLCP header
PLCP preamble | Mbit/s- 2 level ors
k |
.
GFSK
level GFSK
2 /s 2 Mbit/s- 4 level
4 Mbit
layer pack et format
ar ed PLCP Physical l of the
Fig. 4.2.7 : IEEE
80 2. 11 In fr
re ce iv in g st at io n to set the DC leve
h enables the
st me nt co nt ai ns pattern whic
level adju
- Here the field DC
signal. interfaces.
all 802.11 physical
IR in te rf ac e is the cheapest of
- Th e
ti ons.
y frequency regula only be used
- Itdoes not need an it ha s lower coverage: su ch networks can
g- Bu t ur ce s etc ,
eavesdroppin s like-sunlig ht
or heat so
itis resistant to ot he r re so ur ce
fr a re d li gh t in terferes with eting hall, conference hall etc. |
~ As In s, €- 8- classrooms, me in di ff erent classrooms
.
within bu il di ng can be us ed
pl e. Th e same frequency
sim
Frequency reuse is very
blayer
42.4 IEEE 802.11 MAC su sublayer MAC e
Y TechKnowledg
Pubticati ons
Scanned by CamScanner
i = Wireless
Local Area Networ,
layer responsibilities arare divided
MAC layer
“The MAC MAC ~sub layer and MAC layer manage ment sub layer.
ded between MAC
— _ Responsibilities of MAC sub layer :
© To handle access mechanism
© Define addressing and frame format
Responsibilities of MAC layer management sub layer :
© Roaming in the DSS
© Power management
oO Authentication
oO — Security
|
: MAC layer
MAC Sublayer management sublayer |,
Y ‘ ’ ’ oan
Access | Roaming in | thentication _ | Security |
mechanism : Frame format | theDSS_ | Pawer : au eee
C frame format
in detail,
Fig. 4.2.9 shows the general MAC frame format of JEEE 802.11.
bytes 2 2 6 6 6 2 6 0-2312 4
ee
ali): <2 2 4 1 4 17 a tenn 1 4
Protocol | =. To |From| More Power] More
sion | 7° | SHYPE) ps | Ds| Frag [| Mamt| Data |WEP | °F
Fig. 4.2.9 : IEEE 802.11 MAC frame format
Frame control : This field carries the instructions on the nature of the packet. It distinguishes data from control and
management frames. Frame control contains several sub-fields
2. Protocol version : Shows the current protocol version and is fixed by 0
3. Type : : Determines
De the functions of a frame: management (00), control (01) and data (10). The value 11 is reserved
Subtype : Values 0000 for association request, 1000 for beacon, 1011 for RTS control frame, 1100 is for CTS frame
User data transmits with 0000 subtype.
5. To DS/From DS: Used to control meaning of the address field in the MAC frame
ig Technomate
Scanned by CamScanner
g Mobile Communication 3 Comp
ting (M
— more fragments : Value 1 rep
iW. U-Sem, Comp)
le €sents that there
are m x2 Wireless Local Area Networks
|
(i) Address 1 identifies the physical receiver. Every station, access point or wireless node filters on address 1.
Ad hoc network :;
-
fr om 0
tw or k,
infrastructure ne a
; ;
AP
1
to AP
infrastructure network,
1
; infrastructure network,
within DS
id
cket.
RTS, and CTS pa
ment packet,
ackets
MAC C ontrol packe t types of controi packets ;: Acknow ledge
feren
Fig. 4.2.10 shows three dif
~ y Tecinonieds i
publications
Scanned by CamScanner
ww Mobile Communication & Computing (MU-Sem. 7-Comp) Wireless Local Area Networks 4, £
4-13
a
bytes 2 2 6 4
ACK Frame.
‘ont :
bytes
RTS
bytes
CTS
Fig. 4.2.10 : IEEE 802.11 special control packets ACK, RTS and CTs
RTS packet contains the receiver address of the intended recipient and the transmitter address of the station
The duration specifies the time required to send CTS, data and its ACK plus three SIFS.
The immediately following CTS frame copies the transmitter address from the RTS packet in to the receiver address
field.
Function) : DCF offers only asynchronous data service and it includes two
1. DCF (Distributed Coordination
mechanisms.
It is mandatory service.
time bounded service. It includes:
2. PCF (Point Coordination Function) : PCF offers asynchronous data service as well as
Scanned by CamScanner
Are
Wireless Local
“DOF (a
fog weSyehronous eras
ae Eomvices) ‘de, PCF (time-bounded and
Mandatory: "asynchronous services)”
ROGER Optional
| Contention freepain |
Fig. 4.2.11 : MAC mechanisms
inter-Frame Spacing
s
e spacing n(IFS)havibetween transmission of fi Ta
me .
2- 11 off ers th re e in te r- fr am ing on the
- yeE€ 80 .
of tr an sm is
—
si on , each sta tio
of the thr ee IFS periods depe nd
one
-
after completion aving a packet waits for
type Oo f the packet.
Spacing (SIFS)
(i) short Inter-Frame
cess
test waiting time for medium ac
° This is the shor acknowledgement © ¢ data packets or
polling
as short control messages,
° The higher priority packets such
before medium access.
res ponses have to wait for SIFS
Function IFS (DIFS)
(i) Distributed Coordinating for medium access.
ges t waiting time and has the lowest priority
This denotes the lon DIFS before the
oO
(packets containing data) have to wait for
such as payload packets
o Lowest priority packets
medium access.
slot times.
o DIFSis a SIFS plus two
Function IFS (PIFS)
(Iii) Point Coordinating
S and SIFS.
Thi s is the wa it in g time between DIF
0
point.
0 Itis used by the access to wait for PIFS time for
medium access.
acc ess poi nt has
Before poll ing other
nodes, the
o DIFS
DIFS
PIFS
“Next treme
Ay
Scanned by CamScanner
r;
ee
= | ae
Contention window
(randomize back-off mechanism)
DIFS
-— Direct access if
medium is free = DIFS slot time (20s)
Node checks whether the medium is free or not with the help of the CCA (Clear Channel Assessment signal) in the PHY
layer.
If the medium is busy, then all the nodes wanting to access the medium wait until the medium becomes free,”
Once the medium is free, all the competing nodes wait for DIFS time period. After waiting for a DIFS time, competing
nodes enter in contention phase.
Now each node chooses a random back-off time within the contention window and does not try to access the medium
for this random amount of time.
Once the randomized waiting time for a node is over, the node continues to sense the medium. As soon as the node
senses the channel is busy, it has lost this cycle and has to wait for a next chance i.e. until the medium becomes idle
for at least DIFS time.
But if the randomized additional waiting time for a node is over and the medium is still idle, the node can access the
medium immediately and can start transferring data.
To provide fair access mechanism, IEEE 802.11 adds a back off timer.
— Each station now chooses a back-off timer in the range of contention window.
If a station does not get access to the medium in the first cycle, the back-off timer is not cleared, instead it is just
paused.
In the next contention cycle, the node does not choose a new random back-off time, the timer continues from where
it was paused.
Thus the stations that have waited for a longer time access the medium first.
Fig. 4.2.14 shows unicast data transfer using DFWMAC-DCF.
,. . DIFS
it .
Sender
4 SIFS || ACK
.
saa
Receiver
cee
Other stations
Waiting time
Contention
Fig. 4.2.14 ; IEEE 802.11 unicast data transfer
Scanned by CamScanner
AS shown in Fig. 4.2.14, the Sender a
,
e other stations read the M CCessas tl
r
qnerefore they can set their NAV (y Tame Or Wak
_ aiting for DIFS time , Wireless Li ocal Area Networks
7 e t alloc;
all _ “stec
To : an transmits data.
after waiting fo for SIFS the receiver ackn ton vector fon © duratioOn n
| -
7
;
fno ACK is returned by the senqe, ’afte
Owle.
a
.
the packet
e field how
@PPropriate time pertoa = the channel will be busy.
||
T the ti ri ived Correctl
Was Sce .
ntion wi y,
er expire S, thes,
- The conte windowti starts after T na
NAV
random ized back off timer after Which th *
de ' that
T retransmits
Dis Period. ij “ packet,
|
eV sense ag a other Stations ¢
The station with the shortest back off i!
Ompeting for the . channel now choose a
- “ Ime fin
AC-DCF with RTS/ CTs extension
Sethe ch annel idle and Starts to transmit dat ‘a.
The source terminal receives the CTS and sends data after waiting for SIFS.
The destination terminal sends ACK after another SIFS.
ed and channel is available for other users.
5 just After completion of trans mission, NAV of each station terminat
here
sender —
receiver ————_ |
other
Defer access Contention
stations
mechanisms in the IEEE 802.11
entatation of RTSICTS
Fig, 4.2.15 : Iimplem
9 DCF with RTS
ICTS l re main the same
but now
es then the b it error rate wil
Fragmented mode of DFWMAC- frame) decrease s, Fig. 4.2.16
shows the
rar or per
Scanned by CamScanner
Wireless Local Area
WF _ Mobile Communication & Computing (MU-Sem.
7-Comp) _4-17
:— Here the data frame is
fragmented into smaller of the first frag ae
Sender sends an RTS
after waiting DIFS time
frames.
atl on for the transmission
ent
. This RTS Wicludea the
and the Correspondin “
g ack. . ified in RTS.
— ; uration specifie
Other stations receiving this RTS sets their NAV (for RTS) according to thed
DIFS
sender
receiver
other
Stations
Contention
Again, all other stations receive this reservation and adjust their NAV (for frag1) accordingly. |
'
The receiver of fragi sends ack for frag1 after waiting for SIFS time. This ack includes reservation for the next \
fragment.
Other stations receiving this ack set their NAV for (ack1) accordingly.
If the fragment is the last fragment then it does not reserve the medium (Duration
field is empty) and the mediumis
now free for other stations.
wt feck lett
pupric®
Z
Scanned by CamScanner
w. =!
the point coordinator rio se t
not receive SDs
coordinator will = ;
:
7
Now, the point coordi
Nythin
This time th itd station has Wirel ess Local Area Networks
sto r can poly Other Station nothing t
: Oo send. The point
The point coordinator can s, end en S
contention period. d marker (c F
The contention period can be y
Sed f free period and the start of
Once the e contentiion peri.od js over oF BASIC. DFWMac or
_
SUpees
(after) the next sume Nt hs RTS/CTS .
a
tek _.
rfra me start
abi and the
eae § Ove process starts again. he
Ppa nee
Medi
jedium fp
op) per Frame
busy! ipirs—_} f -
:
ep) Sst
Point
coordinator !
>t |\
Wireless \
stations 7
Stations
NAV
(c) Association/Reassociation
nedium is
on Base(MAC MIB)
(d) MAC Management Informati
n in IEEE 802.11
4,2,5(a) Synchronizatio MESS
well Ad-hoc WLANs:
G ma na ge me nt aye r for both infrastructure as (May 15, 10 Marks)
Q. Explain ‘synchronization in
44 MA
eansowtelts
mice atl
Scanned by CamScanner
Mobile Commun
ica
~The tion & Computing
(MU-Sem. ce) Wireless Loca
SS e Are
AP transmits Sb ee gy e
acon ca
perin odic
ecial frame
© consists of a called beacon
A beacon
-~
a
V
el,
Access
Point
*
—
Busy) Zr
|Busy: ‘Busy:
as
-
. ‘Busy.
ges —>
:
{
——F—__»
.
Station,
.
Station, B. B
cee ae
Since wireless devices are
powered by battery; Po (May 12, Dec. 13, Dec, 17
Wer saving is
— . The basic idea to sav a big challeng
e power in WLAN is to swit e in IEEE 802.
ch off the tran 11,
~ Each station can be in one of the sceiver w he
ne ve r
two States (1) sleep (2 it is not needed
.
) awake,
i
wig Tent
Scanned by CamScanner
: management in infrastructure base
0 wehn infrastructure networks,
an access point j
S Tes j
* Ponsible
access point buffers data packets for the pawer manageme:nt
for all sle function.
he access point transmits a Tra Eping stations, .
ffic Indica ti
\
‘on Map (TIM) with
puffered data. a beacon frame. TIM consists of a list of destinat
aatiions of
additionally, the access
point also ma intai
ns a Dek ee Ae
sending broadcast/multicast frames, clivery Traffic Indication Map (DTIM) interval. DTIM ;is used for
the DTIM interval is always a multiple Of TIM intervals.
TIM interval DTIM interval
Access D
point =| i 7] B
Medium |Busy | Busy Busy |
Station f ; | / cB
Scanned by CamScanner
Somp)
: _____WWi
All stations an irreless Local
nounce q estina Area Ne
the ATIM interval
tions for which pa
ckets are buffered usin Works
. g ATIM (Ad-hoc traffic indicati
on Map) durin
Beacon interval
Station,
£5
¥
Station,
By
d Acknowledge data
Fig. 4.2.21 : Power manage
ment in IEEE 802.14 ad-hoc
In the first two ATIM networks
intervals, Stations have noth
ing to send, hence, stations stay
back to sleep, awake for ATIM interval and later
go
In the third ATIM interval, Station, has buffered data for station, hence
Fig. 4.2.21). station, sends ATIM (Shown as A in
2: Association response
“Here is your association ID"
3: Traffic
Client
Scanned by CamScanner
communication & Computing (MU-Sem, 7-Comp)
Me pile — Wireless Local Area Netw’ orks
rhe access point then processes the association request ;
(i (a) when the associatIDion(AID).
request
The isAlpBranted,
is a the acce s $ point responds with a- status code of 0 (successte & andto
the Association
numerical i dentifier used to logically identify the mobile
which buffered frames need to be delivered sta
unsuccessful association requests in
1:Reassaociation re 3:]APP
“My old AP was. "Please send any 4: APP ty!
buffered frames “Why certainly...
—> for..."
4
2:Reassociation response
“Lam your new AP, and here is
your new association ID." ——
Client
5: (Optional)
1. “Here are same frames
| buffered from your old AP."
| peassociation Procedure :
procedure.
| -
Scanned by CamScanner
4-23 Wireless Local Area Networks
¥ Mobile Communication & Computing (MU-Sem. 7-Comp)
6. The old access point terminates its association with the mobile station.
7. The new access point begins processing frames for the mobile station. When it receives a frame destined for the
mobile station.
Roaming/ Scanning
access
When a mobile station moves from one access point to another access point then it has to associate with new
point for uninterrupted service, this moving between access points called roaming (Handoff). The steps for roaming
handoff between access points are as follows (Refer Fig. 4.2.24) :
5. Choose AP
with strongest
response
LT eee
renee eee! 2, Weak signal; “*-,,
start scanning for . .
handoff eget
The new access point used IAPP (Inter Access Point Protocol) to inform to the old access point AP, about the change of
access point.
Scanned by CamScanner
"(cee 802.11a SSS _ Wireless Local Area Networks
operates at 5 GHz frequency band.
t
- - offers maximum data rate of 54 Mbit
|
s/s .
. Me for achiay;
T ransmission range Is 100m outdoor, 19m indo or, Schieving such a high data rate.
—_—
eh ie
~ Compared to IEEE 802.11b that operates in 2.4 GHz the IEEE802.11a offers higher data rate and more coverage,
however shading at 5GHz is much more severe compared to 2.4 GHz.
42.7 802.11b
Unlike IEEE 802.11a, IEEE 802.11b operates at 2.4 GHz.
~
~
It provides raw data rates up to 11 Mbps.
~
It provides a wireless range of roughly 35 meters indoors and 140 meters outdoors.
Ituses the CSMA/CA technique. even
mentary Code Keying.
‘The RF signal format used for 802.1:1b is CCK or comple
Scanned by CamScanner
2
3 _ Mobile Communication & Computing (MU-Sem. 7-Comp) Wireless Local Area Networks
4-25
— EEE 802. j .
nan 11b supports Adaptive Rate selection. The system monitors the signal quality. If the signal falls o,
toarat nes levels rise, then system adopt a slower data rate with more error correction. The system will first fall back
€ of 5.5 Mbps, then 2, and finally 1 Mbps. This scheme is known as Adaptive Rate Selection (ARS).
4.2.8 Comparison of Various IEEE 802.11x Sta
ndards
CEEEEY
62
Se IEEE :
| Operates
0 at 2.4GHz | GHz 2.4GHz — | 2.4GHz 5 GHz or 2.4 GHz
Mexinun
Maxi data} 2Mbps | 54Mbps_ | 11Mbps__| 54 Mbps 300 Mbps _
| Modulati
ulation DSss, OFDM _ DSSS _—_ or | DSSS or CCK or OFDM DDSSS or CCK or OFDM
FHSS CCK
nang! width 20 MHz 20 MHz 20 MHz 20 MHz 20 MHz or 40 MHz
Typical range 66 feet 75 feet 100 feet | 150 feet 150 feet
Antenna 1x1SISO | 1x1SISO_ | 1x1SISO | 1x1 $1SQ(Single ~Input- | 4x4. MIMO (Multiple Input-
configuration : Single Output) Multiple Output)
IEEE 802.11 is mainly designed for enhanced security purposes. It addresses two main weaknesses of wireless security
networks which are encryption and authentication. Encryption is accomplished by replacing WEP’s original PRNG RC4
algorithm by stronger cipher that performs three steps on every block of data. The authentication and key management is
accomplished by the IEEE 802.1x standard.
Since wireless networks transmit data over radio waves, it is easy to intercept data or "eavesdrop" on wireless data’
transmissions.
Several Wi-Fi security algorithms have been developed since the inception of Wi-Fi.
The wireless security protocols prevent unwanted parties from connecting to your wireless network and also encrypt
your private data sent over the airwaves.
Different types of wireless security protocols have been discussed below.
Sek ‘ Be Techtcowledyt
Publications
Scanned by CamScanner
Wireless Local Area Net
A uthe Access Point
ron Pa ntication
ce Request
enery Challenge
Ext Packet
ysing WEP Key
Ch allenge Respo
ranse Enerypted Text
C ontirm Succass pack
cket) Decry Verifty Using
WEP ptKeyTextand Packe is the
|
Same as Original Packet
ee
Fig. 9- 4.3.4.34:
.1: WE p authentica
tion
_ eg requesting station sends an Authentica
. tion Requestto Othea
th Ccess point (AP).
Fir
aceiving the request, the AP,
nv
‘questing node then copies the text into th se oe cereale LV WVESalEDEI
ere © the authenti
7send «the frame back to the AP, Entication frame and encrypts it with a shared key , and then
ge AP then will decrypt the value of the challenging
text usin the sam B g
challengin
e shared key and compare it to the
g i
- i
rext sent earlier.
the AP. will reply wi iti .
ifmatch occurs, ply with a positive authentication indicating a successful authentication.
iithere is not a match, the AP will send back a negative authentication
a weP Encryption
ncryption process
wep uses RC4 encryption which is a symmetric stream cipher to provide confidentiality.
The 40-bit secret key is connected with a 24-bit Initialization vector (IV) resulting in a total 64 —bit key(shown as a seed
in Fig. 4.3.2).
The resulting key (seed) is the input for the Pseudo Random Number Generator (PRNG). The PRNG (RC4) outputs a
pseudo random key sequence based on the input key.
The resulting sequence is used to encrypt the data by doing a bitwise XOR.
be e yt | a "1 N
oes
Initialization Key Sequence
Vector (IV) © Seed =| WEP.
ecret Key —?] _PRNG. : :
~ (max_MsG_sz) |© giphertext
aintex TL o Bi
- —— Integrity Check Value (ICV ;
a (ICV) + 10V
Integrity Algorithm
Message
Fig. 4.3.2 shows the encryption algorithm and Fig. 4.3.3 shows the Aecrypdion algorithm.
operates on the plain text to produce ICV.
To prevent unauthorized data modification an integrity algorithm, CRC-32
The Output of the whole process is a message containing three parts: the resulting ciphertext, the IV, and the ICV.
a8 — - ; We TechKnowledga
Scanned by CamScanner
W Mobile Communication & Computing (MU-Sem. 7-Comp) 4-27 Wireless Local Area Networks
Decryption process
Secret Key ———+}:, Key
’ WEP. :| Sequence
_PRNG ie Plaintext
XY
Integrity Algorithm
ICV' = ICV?
Message
Fig. 4.3.3 : WEP Decryption
The incoming message has three parts: Ciphertext, IV and ICV.
The IV of the incoming message is used to generate the key sequence to decrypt the incoming message.
Combining the ciphertext with the proper key sequence will give the original plaintext and ICV.
The decryption is verified by performing integrity check algorithm on the recovered plain text and comparing the
output of the ICV’ (Calculated ICV) to the ICV submitted with the message. If calculated ICV (ICV’) is not same as Icv,
the received message is in error.
WEP vulnerabilities
Although WEP attempts to achieve wired equivalent security, there are still many weaknesses in WEP which may be
used by the malicious user to compromise the security of WLAN.
W TechKnowledgé
Puptications
Scanned by CamScanner
A also .
ne cyclic redundancy check (CRC) used jn WEP is j Provides vastly improved payload integrity.
one without knowing the WEP key, Secure; it is Possible to alter the payload and update the message
wea uses 2 solution called Michael, which isa Mess
wea yses a 32 bit Integrity Check Value (ICV). Messa
This i Integrity Check (MIC), to the checksum being corrupted issue.
counter, which helps to prevent replay attacks nserted after payload and before IV. The MIC includes a frame
wPA Modes
Enterprise Mode
Enterprise Mode requires an authentication server. It uses more stringent 802.1x authentication with the Extensible
Authentication Protocol (EAP). It Uses RADIUS protocols for authentication and key distribution. In this mode, the
user credentials are managed centrally.
wPA2 vs. WPA and WEP
Among all three wireless LAN security protocols, WEP is the least secure which provides security equal to that of a
wired connection.
WEP broadcasts messages using radio waves and is much easier to crack. This is because it uses
the same encryption
for every data packet. If enough data is analyzed by an eavesdropper, the key can he easily found with automated
software.
WPA improves on WEP by using the TKIP encryption scheme to scramble the encryption key and verify
that it hasn't
been altered during the data transfer.
Further, WPA2 improves the security of a network by using stronger encryption methad called AES.
There are a number of threats that exist to wireless LANS, these include:
Rogue Access Points/Ad-Hoc Networks
Evil Twin APs
Denial of Service
Configuration Problems also called Mis-Configurations or Incomplete Configurations
Passive Capturing
Misbehaving Clients
Rogue Access Points/Ad-Hoc Networks
> One Way that is the attackers target wireless LANs is by setting up a rogue access point,
~ Arogue access point (AP) is a wireless AP that has been installed on a secured network without any authorization
from the network administrator.
The idea is to ‘fool’ some of the legitimate devices and to make them connect to the rogue access point.
Scanned by CamScanner
two ms
_4-29 ; Wireless Local Area Ne
ing (MU-Sem. 7-Comp)
¥F_Mobile Communication & Comput
2.. Evil Twin Aps ame (SSID) as 4 legitimate WLAN, causing
— In this type of attack, the fraudulent AP advertises the same network n
nearby Wi-Fi clients to connect to them.
802.1X.
- The only effective defense against Evil Twins is server authenticatio n from
3. Denial of Service”
ss network by limiting the access to
— This is the most common and simplest attack. It can cripple or disabl ea wirele
the services.
This can be done by simply sending a large amount of traffic at a s pecific target.
n the capabilities of a target
Here the amount of traffic generated to affect a target device is mu ch higher tha
machine.
A denial of service attack can also be used in conjunction with a rog ue access point. For example,
; ; access
a rogue
denial of service attack
point could be setup in a channel that is not used by th e legitimate access point. Then the
sociate onto a
could be launched at the channel currently being used causing endpoint devices to try 9 reas
different channel which is used by the rogue access point. —
4. Configuration Problems
‘— Simple configuration problems are often the cause of many vulnerabi lities. A novice user can set up one
of these
devices quickly and gain access. However, they also open up their network to exte rnal use without further
configuration.
Other issues with configuration include weak passphrases, weak security algcrithm’ deployments (i.e. WEP vs
WPA vs WPA2), and default SSID usage.
5. Passive Capturing ;
Passive capturing is performed by simply getting within the range of a target wireless LAN and then listening and
capturing data. ,
This information can be used for a number of things including attempting to break existing security settings and
analyzing non-secured traffic.
It is almost impossible to really prevent this type of attack because of the nature of a wireless network; what can
be done is to implement high security standards using complex parameters.
6. Misbehaving Clients
Sometimes clients form unauthorized Wi-Fi connections accidentally or intentionally. By doing this, they put
themselves and corporate data at risk.
Some enterprises use Group Policy Objects to configure authorized Wi-Fi connections and prevent end-user
changes. Others use host-resident agents to monitor Wi-Fi client activity and disconnect high-risk connections.
co. The Service Set Identifier (SSID) is one of the most basic Wi-Fi network settings. Avoid using too common SSID,
like “wireless” or the vendor's default name.
o This can make it easier for someone to crack the personal mode of WPA security
Scanned by CamScanner
C in: g M
com munication & ‘omput
Sem, 7-Com
: pil
wi ' Networks
ise WPA2 Local Areaes
4-30
—=—
Mp) _—_———
— Wireless
a“ with 802.1x authenti
‘cation —___-_
-_
use enterPr .
:
i of Wi-Fi ind .
7 Decause it authenticates every user
b
mode Security
enterprise ve their
and pas Everyone can ha
Use
own Wi-Fi username sword.
+90
So j
if er in di vi du al ly -
a lapto
P or mobi ile devi le aves the
device js lost or stolen, or an employee
eth that Particular user’s log-
revoke
al mode, all us ins
in contrast, in person , rd sh a every € sing
sswoers i-Flce password, rd, sso when devices go missing
or employees
to change the pa
samlee Wi
devi
ne you have
eee doeee. i
jeave on
: Ode is ic
th wsconene eee or her own encryption key. That means
, eless traffic.
on anyone else’s wir
users can only decrypt data traffic for thei sear wer ie oping
k
re your Wi-fi networ
use firewalls to secu
Ah Ahardware fir e one ex tra ra layer laye of
use —_ A hardware firewall. . wall doe s the same thing as a software one, but but itit ad s add
security.
. |
dware re fi i e a bui lt -i n firewall that
The best part about har the e best best wiwireless router s hav
y o u r
you ne tw or k fromFirpot ent thatr mosat t s.of
ewalls {s cybe
ial
5
hould pro tec t er attack
i all a good firewall
if your router doesn’t have one, , you can n inst i device to your router in order to protect Your
Oo
att
system from malicious hacking empts against you r home network
ss
4, restrict acce toatl etwo k has
ha r dwa r e conn ec ted
o i of
only allow auth
networ k. Each piece
C addresses.
rized users to access y'‘ou r
AC ) ad dr ess. Yo
ca n re st
ri
ri ct ac ce ss to yo ur network by filtering these MA
access contro
l (M u
on your network
EncryP ¢ the data tio n protocols availabl e
to provide this
e are se ver al enc ryp
encrypt da ta. Ther n being
crypti on algorithm to WPA2 encrypt in formatio
Use strong. en i Protecte d A cce ss (WP A), and
uivalent Privacy (WEP), Wi-F
Wired Eq ption.
y
protection. d wi re less device s. WPA2 is currentl
y the strongest encr
n wirele ss ro ut er s an
transmitted betwee
al
rus software also have addition
Mainta in antivi uP -t o- da te . Ma ny antivirus programs
initions
soft ware and keep the virus def
Install antivirus e and adware.
de te ct or pr ot ect against spywar
features th at
networks,
ar in g wi th ca ut ion w file sha rin g over home or work
Use file sh not needed. Al
lo to al other directories.
ou ld be disabled when d restrict access |
tw ee n devi ces sh
fil e sh aring an
File shar in g be or y fo r
dicated direct
pu bl ic ne tworks. Crea te a de d.
never on pa ssw ord protecte
at is be en sh ared should be
Anything th o-date bsite
re pa tc he d and up-t Up da te ac ce ss point software we
Keep your access po
i nt softwa relea se updates.
po in t periodically
of your wire Jess access
The manufacturer
regularly.
ployees to connect securely
at e ne tw ork PN ). VPNs allow em
Connect using a virtual priv Vi rt ua l pr iv at e Network (V
th e se nd in g 2 nd receivin
g ends an d keep
have 4 tion s at
an d or ga ni zations F encrypt connec
Many comp anie s fice. V P N
en aw ay fr om t he of
to their network wh
ted.
Out traffic that is not Pproperly encryP
Ww Tec hKnowledgi
Pubflcations
Scanned by CamScanner
Wireless Local Area Networks
(MU-Sem. 7-Comp) 4-31
Mobile Communication & Computing
WF
— There are two main standard families which are used for Wireless LAN:
(MAC) sublayer
Scanned by CamScanner
High Cr layer prot “i a —
—
Cols
mee
- meee
wee
MSAP>>--
my
Service "~~ <=> :
Protoco?
HIPERLAN Physica
Protocol
Fig. 4.4.2 :: HIP HIPERLA
ayer N Communication model
44 (a)
HIPERLAN-1 MAC Subl
yer,
jain HIPE1RMALCALaN
s are listed below.
yacsublayer function
ma c address mapping
1.
structure
defines internal address second part
The st andard par t def ine s the network name and the
tains two part 5. The firs t
The addre ss
of a HIPERLAN terminal con
e station.
determines th
eneve
Switch off terminals wh
Scanned by CamScanner
. Wireless Local Area N a
¥_ Mobile Communication & Computing (MU-Sem. 7-Comp) _4-33 ee ts
EY-NPMA
The most important part of CAC sub layer is the Elimination Yield Preemptive Priority Multiple Access (EY- NPMA)
protocol.
- — Itis a variant of CSMA protocol with prioritization.
It divides the medium access of different competing nodes into three phases.
1. Prioritization 2. Contention 3. Transmission
Cycle
‘4
Contention Transmission
Prioritization
:
2] [|
Pe 7
3
Elimination sufvival identification interval
—y &
at se AK)
1. Prioritization
onization.
Time is divided into channel access cycles. Each cycle starts with the channel access synchr
168-bit slots starting from the
The synchronization is followed by the prioritization phase. This phase contains five
slot of highest priority (p=1).
the first (p-1) slots.
- If the terminal has the priority, p it senses the channel for
an access pattern.
if the channel remains idle, the node sends
Tecttsonilt
Op publications i
.
Scanned by CamScanner
a n nel eh
a 134 ___Wireless Loca
th e c h pe ncenet
nds that
.
the= node fifi usy, it Wa alts for th
l
beninedinrgeooff the next access cy
cle.
io n ca n ha v
7 re than one
st at e
e the sa priority,
m
phase Is carried out to resoly
next contention has € contentio n problem.
ph
® | this phase is further divided into two ases: Eliminati
ination phase and Yiel ioritizatio
n
, elimination phase is divided into 0-12 slots. Each terminal which ; eebeen eliminate din the pr
ich has not
~ ase sends the eliminati on burst. The length of this bursti is random between 0 to 12.
ph rification
n b im in at io n survival ve
g an eliminatio urst, each Station se nses the chann el during el
Aft er sendin
interval.
_ station gives UP if the channel nnel isi occupied uring th this interval.
i by some other station during
ne l during n slots (0 9)
te n 168- bit slots. Each station senses chan
The yield phase contains
: n consecutiveive slotslos ts iIS 1/10
- ‘
ty that t he gii ven station senses the channe for
l
The P robabili y
— shh
tti ng and
arts transmi
n .
ransmissio
oa
4 q ct any activityvity in
i o n mmediately st
stening, it i
e s t a t i o n d oes not dete y i n th e c h a nnel during li
if th . t
n s m i s s i o n p h a s e.
th e b e g i n n ing of the nex
enter s t r a it s ti ll
s cycle and wa
i :
ted that the ch nnel is busy, it has lost it
a
o n h a s d e t e c
\f the stati
ac c e s s cy cl e.
cal Layer =
E R L A N - 1 P h y s i
44.A(C) HIP
listed below :
ys ic a | la ye r of HIPERLAN are
e ph
Fu nctions of th
dulat jon (u
ses FSK,GMSK)
demo
- Modulation,
ation
synchroniz
Bit and frame (uses BCH code
s)
anisms
d er ro r co rrection mech
Forwar
th
of signal streng
Measurements equencies.
rd in g t o their carrier fr
Channel sensing
co
| channels ac
-
ma nd at or y and 2 optiona
ides 3
- HIPERLAN-1 prov
ls
(i) Mandatory channe
64680 GHz
° Channel 0: 5.17
974 GHz
© Channel 1: 5.1999
8 GHZ
o Channel 2: 5.223526
Scanned by CamScanner
Mobile Communication & COMPU layer.
thet err all
izeer ors at physical
~ HIPERLAN-1 also employs BCH error correcting cades fo m! inim
in than 5~ bits
oO rrors bursts not longer
—~ This code is able to correct a single error and detect two ran
physical layer.
t s HI PE RL AN -1 dat a packet forma t used at
~ Fig. 4.4.4 DATA PACKET
-
|_ Higi h rate 23.5 Mbps
|, Low rate1.5Mbps
DATA BLOCK
TOWN:RATE. HEADER | 496 bits
HEADER
4-47 BLOCKS
ACK PACKET
Low rate 1.5 Mbps
LOW RATE Ne
NO MAC HEADER
iMMEDIATE TRANS
4.4.2 HIPERLAN -2
Features of HIPERLAN- 2
— Operates at 5 GHz frequency band
— Provides Connection-oriented service
— _ High speed transmission up to 54 Mbit/s (same as IEEE 802.11a)
— Quality-of-Service (QoS) support
— Automatic frequency allocation
- Security support
— Mobility support
— Network and application independent
— Power saving
vist
WF Techhoony
Scanned by CamScanner -
can
2 icMISfrean moveselect m )oneDES.cell area to ams
froion
} , it que ncy
bi aye?
oes aa
oe S Seater.
URL
Fig. 4.4.5 : HIPE RLAN/2 Basic structure and Handoff ' i
Ff eaaOR
ve are three types of handover which might occur : —_
The
(Inter sector)
Pe eG
, 9ector Handover
if the sectorized antennas are u sed for access point then AP supports this h
2
(Inter-APT/Intra-AP)
| Radio Handover
dled within the AP.
radio handover is also han
the same AP.
in Fig. 4.4. 5, MT3 mov es from one APT to another APT of
as sho wn
ter-AP/ Intra network)
4, Network Handover (In AP to another AP (in Fig. 4.4.
6 MT).
mov es fro m one
when MT
_ This handover occur
are also involved.
e, the cor e ne tw ork and higher layers
- Inthis cas
o modes
ks operate in tw
HIPERLAN-2 networ
)
1. Centralized Mode (CM
Scanned by CamScanner
LVI OUI, FUUTIP) ———— —
HIPERLAN-2 Protocol
Stack
>
DCC-DLC connection control
EC — Error Control
CL — Convergence Layer
© Signal Detection
© Synchronization etc.
Key features
It uses different modulation schemes such as BPSK, QPSK, 16-QAM, 64 -QAM to achieve different data rates
It employs OFDM.
Scanned by CamScanner
2
PUD train
from DLC
(transmit)
2. Scrambled bits
ji informati ion
bits
4. Interleaved bits
bits 7, PHY bursts
4, encoded OFDM symbols
s 6. Complex baseband
rrier symbol n
5, ou p-ca
L A N - 2 Ph ys ic al La ye r re ference configuratio
Fig.g 4.4.7 : HIPER
from DLC Layer.
RL AN -2 phy sic al lay er receives the PSDU
the HIPE
for pc
'+ 1. This i s done
gop scrambling the generator po ly no mi al ax
en is sc ra mb li ng of all data bits with led bits.
The first steP th
e ou tc om e of th is step is the scramb
um . Th
ening of the spectr
plocking and whit
d correction.
fo r er ror detection an
step 2 * FEC Coding rambled bits. This
is do ne
ap pl y FE C co ding on these sc
to
The next step is
ded bits.
is step is enco
The result of th
d bits.
di ng . Th e re su lt is interleave
eaving e fa
Step 3: Interl equency selectiv
te rl ea ve d to mitig ate the fr
bits are in
Next, encoded
modulation
or 6 bit : s de pending on the
Step 4: Mapping oup of 1, 2,4 to the
de s th e bit sequence in gr es e gr ou ps are mapped on
ocess firs t di vi Th
The mapping pr M respectively.
SK , 16-QAM,64-QA symbols.
us ed su ch as BP SK , QP
ep is su b ca rr ie r modulation
schemes sult of this st
e mo du la t io n symbol. The re
appropri at
is 4p.
ti on Th e sy mb ol interval
Step5; OFDM Modula
nal .
a baseband sig
er ts th es e symbols into
lation co nv
The OFDM modu
payload.
preamble and
Step6: PHY burst st con tai ns
d. This bur
p the phy sic al burst is create
In this ste
uency.
Step 07: 7» Radio. transmission si gn a Jinto a carrier freq
e baseband
n shifts th
Finally radio tra nsmissio er
ro | Lay
Link cont
44. 2b) HIPERLAN-2 Data to p 9 f the physic
a l layer.
~ Th on
layer is si tuated
; Data Link control (DLC) :
sub functions
r cont ains the following
° Laye
* MAC function
2 Tetlic
Op Pub dat
mteons
knoati
: Error Control (EC)
in turn is su
' RLC sub layer that
Scanned by CamScanner
Wireless Local Area Natio
=
Variable Variable
Variable
Scanned by CamScanner
LCH (Long support channel) :: T Trans Ports user ang control
: cH (Short transport channe
d ata
for downlinks and uplinks.
l): : Tran Sports ¢ Ont
rol data for downlinks
and upli nkKs.
plIn
ch
> «RCH (Random channel) : Using this channel, » MT: MTs Can send .information to AP/CC via slotted Aloha
.
defines some logical ch annel S for Sig
. naling, control and information transfer. These | veh \
HIPERLAN -2 also These logical ¢ ann
els
ion trans er.
RCH transport ch annels,
are mapped on SCH, LCH, and
“ SBCH a: Used only; in downlink to broadcast
as i helps in handover,
cn
control fun ctio information related to the cell. It
association, security and radio link ns,
Scanned by CamScanner
e
¥F Mobile Communication & Computing (MU-
Sem. 7-Comp) 4-41
i
:
SESE Local Area Network 4
4.5.2 User Scenario
oS
Many different Configurations with Bluetoot
h based piconet are possible.
1. Connection of Peripheral devices : Today
most of the devices use wires to connect
to the peripheral devices SUCH ag
keyboard, Mouse, headset, speakers etc. Each
type of device has its own type of cable, conn
ectors, plugs ete, Ina
wireless networks no wires are needed to connect
such devices. Bluetooth piconet can be used to Conne
ct such
Peripherals without wires to the wireless
terminals such as laptop or PDA.
2. Support for ad hoc networking : Ad-hoc networks are useful for trades
hows and exhibitions where several People
come together and exchange data. Wireles
s networks can su pport this type of interac
tion. Small devices may not have
WLAN adapte rs of IEEE802.11 standard, but cheaper Bluetoo
th chips built in.
3. Bridging of Networks : Using wireless piconets, a
mobile phone can be connected to a PDA or laptop
ina simple Way,
The mobile phone that has bluetooth chip
can now act as a bridge between the local
piconet and the 8lobal Gsyy
network. ,
4.5.3 Architecture
Ca
Piconet and Scatternet
1. Piconet
— The master (M) gives its clock and 48-bit device ID to all slaves in a piconet.
Hopping sequence is determined by
device ID and hopping pattern is determined by master’s
clock.
~ Allactive devices use the same hopping sequence
and hops together,
Scanned by CamScanner
Are a Networks
munication & Computing (MU-Sem. : 7- Com 4-42 Wireless Local
z
Piconets
(each with a
kbit/s)
capacity of 720
M= Master device
S= Slave device
P = Parked device
SB = Standby device
(b)
ternet
Piconet (b) Scat
Fig. 4.5.1 : (a)
g
through the sharin
2 Scatternet be con nec ted to form a scatternet
can
than one piconet
is a gr ou p of piconets. More
~ Scatternet
or slave devices.
of common master er in anothe
r. ts.
et and mast n the picone
Devices can be slave in one pic on de vi ce s ba ck a nd forth betwee
g
_ e py jumpin ter of that
BE
wee n pic one t s can take plac is al wa ys determined by the mas
ommunication bet g sequence
th at
. us es 4 di ff erent hoppin
E .
scatternet
ach piconet in a :
Piconet,
s its simritati
ons.
Als, discus
TechKnowledge «=
Ww Publications
Scanned by CamScanner
AT : Attention sequence
0
Radio Layer
Radio layer defines the carrier frequencies and output power.
Bluetooth uses 2.4 GHZ license free band.
'
Frequency hopping and TDD (time division duplex) is used for transmission with fast hopping rate of 1600 hops/s.
It uses 79 hop carriers equally spaced with 1 MHz.
Gaussian FSK used for modulation.
|
Baseband Layer
— Baseband layer performs frequency hopping to avoid interference and to access the medium.
— Defines physical links and many packet formats.
— It controls:
Device Addressing ;
Channel control (how devices find each other) through paging and inquiry methods
°
© Power-saving operations
o. Flowcontrol and synchronization among Bluetooth devices.
o. Synchronization
o Capability negotiation
Scanned by CamScanner
e SSruing — (MU-
yopie Commun ~
_ gos negotiation _ Wireless Local Area Networks
.
oO”
power control
Shee
ision
Link superv
o.0hCUl8
ission mode ch
state and transm ange
UE g ne
tion Layer p
ical Link Control and Adapta
enar
CAP)
the B
CAP is layered over
ae
thesdata a lin|; k layer.
PN SA
ot oc ol in e
and residid
as eb an d Pr
Ne WE
e des :
-
L2caP ? providvi
ao Fe
BA
connec“tion-oriented and connecti lexxiing
wi protocol multipiple
Pe
|
to u
. lonless data services pper layer protocols s with fe
capability.
‘
Group abstract
ions.
between master
and slave i
d via AC L lin k iy
three different
ty pes 0 j that are transporte
L2CAP provides f logical channels
these are :
t
used for broadcas
oO Connectionless
specificati fon.
ti on -o ri en te d for da ta transfer with QoS flow
Connec ities
°
to ex ch an ge sig nal ing messages between L2CAP ent
o Signaling used
Interface (HCI)
Host Controller link manager
mm an d int erf ace to the baseband controller and
_ The HCI provides a co
trol registers.
es ac ce ss to ha rd ware status and con tooth baseband cap
abilities.
it provid of ac ce
od ss in g t he Bl ue
different role
rf ac e pr ov id es a uniform meth of the sections has a
te h
Essentially this in r. Eac
_ r, Host Controlle
ns , Th e Ho st , Transport Laye
across 3 sectio
- The HCl exists its application.
th e HC I sy st em .
ar e ac ce ss ib le to the host and
to play in module that
of fu nc ti on so fa Bluetooth
e set
- HCldefines th undary.
4 so ft wa re /hardware bo
en as
- HClcan be se
e L2CAP pr otocol.
RFCOMM er ia l po rts over th .
n of s applications
provide s emulatio in te rf ac e to all the
- The RFCOMM
protocol a serial line
that provides
ement protocol
- Itisacable replac
based
- The protocol is ine
and to determ
ltiple serial lable
~ Itsupports mu rvices are avai
sc ov er y Pr ot o col (SDP)
Service Di helps * e@
ol (spp)
y protoc
~ The service discover lable services
:
rout theit usage:
thos© ava
the characteristics of a
< th e di sc ov er of service? noe —_ teria.
SDP define s on ly q service a services at match to client’s cri
q as follows
i scovere asto search for an tereste
~ New servvii ce is wdi
a g e a realest e of interest
Be
n sends a req thelist of 2Y4
onds t0 t
© Then server resp
this list tore"?
© The client uses
Scanned by CamScanner
. Wireless Local Area Netweu:
4-45 3 Orks
YF _ Mobile Communication & Computing (MU-Sem. 7-Comp)
Profiles ,
be used in a specific application and as thus ensure
Profiles are specifications which describe how Bluetooth should
er. There are about a dozen Profiles.
that all devices from different manufacturers can seamlessly wor & with one anoth Gener
ic Object Exchange (OBEx), File
.
Generic Access, Serial Port, Dialup Networking, FAX, Headset, LAN Access Point,
oint
th netwrk
is established using bas
A typical Bluetooth device has a power of 100mW and can have a range of upto 100m.
Having such huge power and relying on battery as its source will result in a huge wastage if the device lies idle for long
time.
Bluetooth defines several low-power states for a device. The major states present can be seen in the Fig. 4.5.3.
Standby : A device which is currently ON and not part of any piconet is in standby mode. In this low-power mode only
the native-clock runs.
Inquiry : Now the movement to the next node i.e. inquiry state is based on either of two ways :
1. A device wants to establish a piconet : The user wants to scan all the devices in its range. This inquiry
procedure is started by sending an Inquiry access Code (IAC) to all devices in range.
2. Device in Standby that listens periodically : A device which is in Standby may enter the Inquiry state
periodically to search for IAC messages. If it finds one such, then it transfers the necessary information about
itself and becomes a slave.
Page mode : On successful inquiry, the device enters the page mode. In the page state two different roles are defined.
1. After the master finds all the devices required for a connection, it sets up a piconet.
2. The master then calculates special hopping sequences based on the device addresses received to contact each
device individually.
3. The-slaves answer to calls by the master and synchronize their clocks accordingly.
4. Inthe meantime, the master may continue to page more devices to the piconet.
5. As soon as the device (slave) synchronizes to the hopping pattern of the piconet, it enters the connected state.
Connected : The connected state contains the active state and three low Power states
Active :
o Inactive state the slave participates in the piconet by listeni ng, transmitti a + adicall
synchronizes with these slaves. ng and receiving. A master periodically
o The communication is done via ACL and SCO links.
o Every device which is active needs ta have a 3-bit Active Member Addres (Aa)
: s A). vat
o Inthe active state, if the device is not transmitting, ? it can dis connect itself and d
80 to standby by detach method. _
Scanned by CamScanner
+ = ee
Wireless Lover e
_, Noize s the into either of theth
i to go 0
; guetoor" also ha choice .
ree low-power states which are :
4
\. snl t f all the three low power states, ’ this Ooneh jas max
- POWer consumption
unlik4. e
in a active
state where th e slave lis: tens to picon
: et at every slot, here it listens at a reduced rate which can
0 be programmed as per the need,
the master also allocates a reduced number of slots for the e slslave in sniff mode.
pold .
. i
e here sto pped
ps all ACL link transmissions are sto
h
t.
9 thedevic co ns um pt io n or pa rt icipates in another picone
e in the piconet we r
fno activity is ther , the slave reduce the po
|
FA park
power consumption of the thre
e.
Connecting
- Page
; “Connected”
Transmit = ae AMA
AMA
Wee eee
Park
fi
PMA
nd states
tooth baseba
Fig. 4.5 3: Blue
N -2 and Bluet
ooth
H I P E R L A
R LAN-1,
E 802.11, HIPE
46 Comparison of IEE Marks)
(Dec. 12, Dec. 13, Dec. 17, 10
ae aeet
epHIe e -1"ee w-LAN. |
ee
)
re HIPERLAN1, PERLAN-2 and 802 =r
s)
LAN-1 VS HIPERLAN-2
. (May 16, Dec. 16, 10 Mark
on HI PE R
hort not
eS
e
1EEE 802.11.
pERLAN 2, BLUETOOTH: 80
2.11 HIPERLAN and
Bluetooth
=)
rison of |EEE Bluetooth
. ’
Se
2.4 GHz
ES
<1 Mbps
fe
Ma
Xdata rate [2 Mbps (11 * ee i
W
Mbp s with CCK)
.
Scanned by CamScanner
Wireless Local Area Networks
4-47
; ; <1Mbps
4 User 6 Mbps 34Mbps <20Mbps 34Mbps
Pp throughput - [nf
r — = _
Medium CSMA/CA CSMA/CA Variant of CSMA/CA i.e. [CSMA/CA Master is responsible for
Gare>> EYNPMA protocol Medium access.
Error control |ARQ ARQ,FEC at PHY |FEC at Physical layer. It. |ARO/FEC at PHY |ARQ/FEC at MAC layer
layer uses BCH codes. layer
QoS support Optional -QoS is |Optional -QoS is |CAC sub layer of Yes: Uses Link Manager protocol
supported by |supported by —_ | HIPERLAN1 provides five |connection provides means to negotiate
providing Point {providing Point priority levels for QoS _joriented service |QoS such as flow
Discuss the advantages and disadvantages of WLAN over wired network. Explain two basic types of WLAN
Q.1
architecture.
CAC sublayer.
Q.2. Explaini n detail function of HIPERLAN-1
col architecture.
Q.3 Draw and explain IEEE 802.11 proto
Scanned by CamScanner
¥ Mo! pile Communicati
ication & Computing (MU-Sem.7-Comp) 4-48 Wireless Local Area Networks
Q.6 Describe MAC mechanism Schemes used in IEEE802.11. Explain in detail MAC scheme that uses DCF with
RTS/CTS extension,
Scanned by CamScanner
a n a g eme nt
Mobili t y m
__ eee
Optimization, IPv6
5.1 Mobility Management : Introduction, IP Mobility,
5.2 Macro Mobility : MIPv6,.FMIPv6,
ty
: Cellula
5.3 Micro Mobili rlP, HAWAII, HMIPV6,
Introduction hout
fro m one ne tw or k to another network wit
mobile device t o move was the first
IP Mobility is a mechanism that allows
to Suppo rt IP Mobility. Mobile IP Mobi
discusses various protocols
changing its permanent IP address. This chapter the current version of IPV4. Later
Mobile IPVv6
by IETF to suppo rt IP mobil ity with
communication protocol developed s to supp orts IP mobi lity . IPV6 header has so me
new features and
update to IPV6 prot ocol
(MIPV6) was developed as an isms to support fast and
IP mobi lity . The chap ter also disc usses various Micro mobility mechan
options that supports of attachment.
ce is changing its network or point
seamless handover while mobile devi
5.1.1 Mobile IP
mobile device users to move
Mobile IP (or MIP) is an IETF standard communications protocol that is designed to allow
.
from one network to another while maintaining a permanent IP address
isms for forwarding internet traffic to
Mobile IP is an enhancement of the internet protocol (IP) that adds mechan
their home network. Fig. 5.1.1 shows generic Mobile |P
mobile devices when they are connecting through other than
topology.
Scanned by CamScanner
& Co .
‘g Mobile Communication
w i l h me g (MU-Sem. ae 7.69 OMP) 5-9 Mobility Management
t
every hoshost will . hav e a "H om e
Address Within a «
:
Home Network
¥v vv
[= Router:2] Routers.
5.1.2 Optimization
a CN
Triangular routing rn. As shown i n Fig. 5.1.2 the IP
packet from
r traffic patte foreign agent of
there is always 4 triangula then tunneled to the
With Mobile IPv4 needs to be routed t 0 its HA firs t and
) destined to an MN
(Correspondent Node
long way to reach the
the MN. the n als o the IP packet has to travel a
are very near,
Co rr es po nd in g Node (CN)and MN IP is called Triangular
Routing.
_ If the optimi zed mob ile
behavior of anon MN and MN bac
k to CN.
MN. This in efficient to HA, HA to COA/
- The tri ang le is m ade of the three se
gments - CN
Ta
. 2
Tunneling
HA
MN
Packets for
near
Mobile host
the CN
Routing
Triangular
Fig. 5-1. 2:
Scanned by CamScanner
, ;
Ww Mobile Communication & Computing (MU-Sem. 7-Comp) 5-3 - . Mobility Managemen
Route optimization
=
to avoid triangular routing »
To salve triangular routing problem, a route optimization protocol! has been introduced. Basically
this Protoco}
defines some messages as to inform CN of an upto date location of MN. Once the current location of the MN is
known, the
CN itself performs tunneling and sends packet directly to MN.
The optimized mobile IP protocol needs four additional messages; these are :
1. Binding request
If a node wants to know where the MN is currently located, it can send a binding request to the HA.
Binding update .
The HA sends a binding update to the CN and informs the CN the current location of an MN. The binding update can |
request an acknowledgement.
\
Binding acknowledgement
:
On request, after receiving a binding update message, anode returns a binding acknowledgement. i
Binding warnings
A binding warning message is sent by anode if it decapsulates a packet for an MN but it is not the FA for that MN
currently.
If CN receives the binding warning, it requests the HA for a new binding update.
If the HA receives the warning it directly sends a binding update to the CN.
Fig. 5.1.3 explains how these four messages are used together when an MN changes its FA and also shows the
exchange of messages in optimization protocol.
CN HA FAgig FAnew MN
Data Data_
-—_vala -
eat p-———D ata_
ACK
ees
-—————*Data___ Data
[| MN changes
Registration
Data
Warning
Data | p-——Sata
ata
Request
Update
ACK.
. ¥ Data
PE Data
{y |
v vt
Fig. 5.1.3 : Optimized mobile IP working
The CN requests the current location of MN from the HA.
HA returns the COA of the MN via update message.
CN acknowledge this updated message and stores mobility binding.
Now CN can send data directly to the current foreign agent FAgjg. FA old NOW forwards these data to MN.
The MN might now change its location and register with an new foreign agent FA...
FAnew informs FAgig about new registration of MN via an update Message and FA, acknowledged this update
message.
—<—<———
Tachi mowledgy?
Pubricacians
Scanned by CamScanner
s
Mobile Communication & Computing (Mu-
“SEM. 7-Co
’t know ab mp) je
cn doesn Out the curr ent loca tion of M = Mobility Management
to MNb N, Its till tunn els its
the FAcid notices packets destined
o
ac
: ut also knows MN Packets for MN to the old foreign agent FAcu-
Currently not
Agu might now forward thes .
e se packets to the new in current FA.
thus the packet s that are in transit are not | COA of MN wh ich is new foreign agent.
.
security. MN does not want to reveal its current location to the CN because of
TRIE
52 _|Pv6 — Internet Protocol Versio
n 6
To overcome these problems, : IPv6 als : ” |
© known as IPng (Internet Protocol next generation) was proposed. In IPv6, the |
:
Internet protocol was extensivel Y modified to accomm odate th
the Internet. The format
nie demands of
of the IP addrese s were changed along with the sachet rmat.
and the length
.
Related protocols such as ICM network layer, such as ARP, RARP, IGMP
SATE
P were also modified. Other protocols in the
were either deleted
o semirnndaté these orchendes"y
incl i
hewn ptatocol, Routing protocols such as RIP and OSPF were slightly modified to
capable mobile teleph » The fast spreading use of Internet and new services such as mobile IP, IP telephony, and
er
-cap elephony, may require the total replacement of IPv4 by IPv6.
Advantages of IPv6
ae
IPv4 address, this is huge
4, Larger address space : An IPv6 address is 128 bit long. Compared with the 32 bit long
increase in address space.
from the base header and
2. Better Header format : IPv6 uses a new header format in which options are separated
data. This simplifies and speeds up the routing
inserted when needed, between the base header and the upper layer
by routers.
process because most of the options do not need to be checked
for additional functionalities.
3... New Options : IPv6 has new options to allow
by new technologies or
ance for exten sion : IPv6 is desig ned to allow the extension of protocol if required
4. Allow
applications. label
removed, but mechanism called Flow
IPv6, the type-of-service field has been
5. Support for resource allocation : In can be used to suppo rt
e the sourc e to reque st specia l handling of packet. This mechanism
has been added to enabl
and video.
traffic such as real-time audio integrity of
:and authe ntica tion option s in |Pv6 provide confidentiality and
The encryption
6. Support for more security :
the packet.
ility
Features of Ipv6 to support mob configuration
mob ile IP regi stra tion . In every \pv6 node address auto
needed for securing
- No special mechanisms are
uiring a COA is inbuilt.
ie. the mechanism for acq Ipv6 node. So special foreign
agents are no longer needed
ory fo r every
chanism is also mandat
— Neighbor discovery me
to advertise services. y Ipv6 mobile node to
o con fig ura tio n and nei ghbor discovery enables ever |
address aut
- Combining the features of the cur ren t poi nt of attachment.
s or
ologically correct addres ly to the CN and HA.
The
create and obtain a top MN can send its COA direct
nod e, so the cac he.
to another entries inits routing
send binding updates makes corresponding
~ Every Ipv6 node can din g up dat es and
The CN processes the bin OF bet ter,
FA is no longer needed. Publicatl
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7-Comp) Mobility Manage.
5-5 Semen
The MN is now able to dec
apsulates the packets
© To detect when it needs
a new COA and
© To determine when to send bin
ding updates to the HA and CN
A soft handover is Possible with Ipv6. The MN sends its new COA to the old router serving con at the old COA, ang
the old router can encapsulate all incoming packets for the MN and forwards them to new 7
Limitation of Ipv6é
It does not solve any firewall or privacy problems. Additional mechanisms on higher layers are needed for
this,
Ipv6 Header
Fig. 5.2.1 shows both Ipv4 and Ipv6
header format.
0.3 7 15 23
Total
IPv4 header
Destination address (128
Scanned by CamScanner
TT TT SiSbedipaeeermesyuoee
mobile IF aaa se _MIPv4 and MIPVv6, but IPvahag a cou ale of draw! Th draw
adress exhaustion, ma; ing MIPv6 the future option
neh: for
TOr mobile pecttocol
valine - sis
7 mobility:pro in:IP. Networks. ae
Mobile IPv6 (MIPv6)is a protocol developed as a subset of IPv6 to sup port rt mobility.
mobility. ~
M pv6 is an update of the Mobile I
¢ IP standard designed to authenticate mobile devices using IPv6 addresses:
addres umption that each
In traditional IP routing, IP tin g mechanisms rely on the ass
a top olo gy. Rou
have the vane earn
'
network node will always point of
ee
identifies the network link where it is connected attachment to the internet, and, thet.eaeh node's Ie
' . want to reconnect through @ different
ting hav
this krouyou
M n wor to , wonif figyouitedithe nes a mobile device from the Internet and
sche eme
te mask and default router.
serwige, rut e device with a new IP address, and the appropria net
s doesn't
erwise, routing proto
a nave no mea ns of del
we
ive rin g pac kets, because the device's network addres
ot tain the Teceecay ‘cf
con ry information about the node's network point of att achment to the Internet.
i e node to transparently maintaina connections while moving from one subnet to another.
Mo bile IPv6 allows a mobobil
ice is identi . ng to through another network. When
Each wi L iene by its home address although it may be connecti
a home agent, which
connecting roup a foreign network, a mobile device sends its:location information to
intercepts packets intended for the device and tunnels them to the current location.
Scanned by CamScanner
Mobility Managem, ie
¥ Mobile Communication & Computing (MU-Sem. 7-Comp),
2
5.4.1 Cellular IP
Why Cellular IP ?
Mobile IP exhibits several problems when there is. a large number of i obil
he e tat
devices
e changing network frequently ang
k is gene rate d by registration ai
moving very fast. In such cases, a high load on home agent
s and o
binding update messages.
: and relatively
i low
slow m oving hosts.
Mobile IP is basically designed only for macro level mobility
.
Cellular IP (CIP) is a new robust, simple, and flexible protocol for highly mobililee hosts.
— CIP complements Mobile IP by supporting local mobility.
Ra
. idle hosts from activ’ive
It can accommodate large number of users by separating hosts.
CIP architecture
.
The architecture of Cellular IP is shown in Fig. 5.4.1. It consists of three majoi r compone nts.
oO Cellular IP gateway (GW),
© Cellular IP node or the base station (BS)
o Cellular IP mobile host (MH)
Mobile IP
mobility/handoff
Cellular IP
Scanned by CamScanner
ommunication & Computin 9 (MU-Sem. _/-Comp)
7-Co 5-8 li Man agement
Mobie e
a
“pouting in CIP
_ Ther ath taken by these packets ts Is cached in base statlons. This cache Is called routing ng cach e.
resse ( t
: ed by the host tha
_ To route downlink packets add d toersa edmobile hos t the pat h use d b y rec ent packets transmitt
stored| n route cache) Is rev
jreaeagdyy
are alr
Scanned by CamScanner
/
Movuey +s
\ "
:
7-Comp) 5-9 : 4 3
ing (MU-SeX i
ication & comput .
W_ Mobile Commun .: 6
.
gement
3. Efficient Location Mana \ a
4. Flexible Handoff . s
t 5 we
Mobile hosts
Simple Memory less ig
5.
transparent
HAWAII e: sto kee P mi cr o- mobility support as
5.4.2
t infrastru cture) tri
Access interne
-Aware Wireless
HAWAII (Handoff
MN.
home agent and
as possible for both
COA.
Working s a co"! located
a mo bil e node obtain moon w base
quest to the ne
WAII dom ain ,
Step1: On entering an HA ra :
h the HA. sends a reg! giiagis Wile
MIN registers wit for eig n dom ain, the MN ;
Step2: inside the ic
ng another cell ee
Step 3: When MN movi off a hand uP ate |
eign agent. sends out ) en the
station as to a for request and ossover router
.
{
tsthe registration sta tio
, n to the cr in as if it.
base station inter| pre bas e , aga
Step 4: The fro m the o Id and new ati on rep ly to the MN
on the pat hs ds a registr
reconfigures all routers base station sen
routing has been
reconfigure successfully, the
2 |
were a foreign agent.
(internat |
nop ihe
Mobile IP
4
of HAWAII
.
Advantages
are always initiated
1. Security ; Challenge response exte
nsions are mandatory. Inc ontrast to cellular IP, routing changes
by the foreign domain’s infrastructure.
mobile nodes.
2.. Transparency : HAWAII is mostly transparent to
Disadvantages
Co- ; os
‘o-located COA raises DHCP security issues(DHCP has no strong authentication)
p ‘ocessing during handove T jin base stations.
i
ity: critical
se cu rity- i
f unctiona lity(Mobile |P regist! T atio npr
- Decen ali ed
centraliz
station a ry n od es in for e gn
Eg networ
| k )
B' s
message un pecifITI ed
uns (p oO te ntial attackers:
Authentication of HAWAII pr otocol
OF Techha swteite i
lications
Pub
Scanned by CamScanner
MN authentication requires PKI or AAA infrastructure
there are nO provisions regarding the setup of IPsec tunnels.
No private address support is possible because of co-located COAs
'
/ Internet ~
1 1
Binding
update AR
LCOAngw \ LCOAgig
al mobile IP
Fig. 5.4.3 : Basic architecture of hierarchic
Advantages
s can be hidden.
rity : MNs can hav e (lim ited) locati on privacy because LCOA
4. Secu
the same link is possible
2. t routing between CN s sharing
Efficiency : Direc
Disadvantages
P).
infrastructure component (MA
1. Transparency : Additional authentication
d on mes sag es sent by mobi le nodes. This requires strong
changed base
2, Security : Routing tables are tions might be necessary in MAPs
nst deni al of serv ice attack s. Additional security func
and protection agai
in details.
ane e of Mic ro Mob ility? Explain HAWAII
Q.1 Whatis d
with respect to IP mobility.
tch of IPv6 hea der . Compare IPv4 and IPv6
Q2 Drawaneat ske
.
Q3 What advantages IPv6 offer over IPv4
ty.
FMIPvé6 for Micro mobili
Q.4 ~~ Explain MIPv6 and cedure in CIP.
hit ect ure alo ng wit h routing and paging pro
lain CIP arc
Whatis Cellular IP. Exp problems.
Q.5
toc ol? Exp lai n how MIPv6 overcome these
standard Mobile IP pro
Q.6 What are the problems with
ww TechKnow ledgs
ications
3 Publ
Scanned by CamScanner
Long Term Evolution of 3GPP
Long-Term Evolution (LTE) of 3GPP : LTE System Overview, Evolution from UMTS to LTE
6.2 LTE/SAE Requirements, SAE Architecture
6.3 EPS: Evolved Packet System, E-UTRAN, Voice over LTE (VoLTE), Introduction to LTE-Advanced,
6.4 System Aspects, LTE Higher Protocol Layers, LTE MAC layer, LTE PHY Layer,
6.5 Self Organizing Network (SON-LTE),SON for Heterogeneous Networks (HetNet), Introduction to 5G
Introduction
In chapter 2 we discussed about 2G (GSM , GPRS) and 3G (UMTS) networks. This chapter focuses on 4G network
architecture LTE (Long Term Evolution). The chapter discusses detailed system architecture and other system aspects of
Long Term Evolution (LTE). With LTE providing much higher data rate and low latency, it is also important that it supports
voice transmission. VoLTE is a technology that transmits Voice over LTE network. Also Self Organizing Networks (SON)
which supports dynamic configuration of LTE base stations (eNB) to automate the human efforts for setting up network has
been discussed.
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7-Comp)
a Soe Long Term Evolution of 3GPP
WCDMA’ was upgraded to HSPA » and cdma 200 ad wi —
= still
widely deployed. 0 was expanded with 1xRTT EV-DO releases A and B.-Both are
_ The Third Generation P artnershipi Project
j ‘
(3GPP), developed the widely used UMTS WCDMA/HSPA 3G standards. As a
4G successor to WCDMA, , 3GPP developed L oneg- .
an upgrade to the 3G
standards. P ng-Term Evolution (LTE). Thus, LTE was created as
is-136 |. la
TDMA POC
Z
XN
Fr
a > | A ‘
\
{~ » — -
W-CDMA | ,
3G
FDD and TOD [| 'O-SCDMA ae
Zz I =
fz : Yon
(ia
HSDPA/ ) (-4% Ev-do
3.56 HSUPA EDGE Release
FDD and TDD Evolution | oss
\
t — Sree : eo0
LTE 802.16e
3.946 |) Hee FDD and TDD Fixed
L Release 8/9 WiMAX
A4GAMT- | . LTE-Advanced
HSDPA
*HSUPA
HSPA+
009 :
(2008) 7% | 2009).
Fig. 6.1.1 : Evolution from UMTS to LTE
Scanned by CamScanner
¥ & Computing (MU-Sem. 7-Comp)
Mobile Communication SS 6-3 Long Term Evolution of 3GPP
——S ee
Scanned by CamScanner
: Mobile Communic
ation
& Com Put ' (MU
ing
The mobile equipment , Sem. 7-Com Long Term Evolution of 3GPP.
°OmPrised of the Bisb
° Mobile Ter mination (mT) : This h followi
Owing important: modules: :
tr SNandles alj the c
Terminal Equipment
brso. aversolsintag E) : This terminate 7 Ommunication functions. °
rated Circ ult ¢ S the dat ‘a streams.
. application known a Sth . ard (uIc C) : Thisi ~j also known as the SIM card for LTE equipment. It runs an
;USIM storés usehspacin sera Subscriber
eeoos Signals .
Traffic
Fig. 6.2.2 : Architecture of E-UTRAN
(ME) and the evolved packet core
The E-UTRAN handles the radio communications between the mobile equipment
stations, called eNodeB or eNB.
(EPC). It contains only one component, the evolved base
ols the mobiles in one or more cells.
Fach eNB is a base station that contr
n as its serving eNB.
communicating with a mobile is know
- The base station that is currently
ace.
by m eans of the S1 interf
'- ach eBN connects with the EPC
used for signaling and packet
tio ns can be con nect ed via the X2 interface, which is mainly
- Two nearby base sta
forwarding during handover.
‘co re network)
422(d) Evo lve d Pac ket Cor e (EP C) (The
) is fully !P based has been illustrated in Fig. 6.2.3..
4 EPC
ket Core (EPC
The architecture of Evolv ed Pac
user plane i
——
TechKinowledga
Wy Natentntel
ar]
Scanned by CamScanner
. ¥ Mobile Communication & Computing (MU-Sem. 7-Comp) _6-5 Long Term Evolution of sepE. Ba
1. Serving GW
and the PDN gateway.
The serving gateway (S-GW) acts as a router, and forwards data between the base station
— It is also responsible for inter-eNB handovers in the U-plane.
2G/3G and P-GW).
It provides mobility between LTE and other types of networks (such as between
n, and stores the UE
- The SGW keeps context information such as parameters of the IP bearer and routing informatio
contexts when paging happens.
— It is also responsible for replicating user traffic for lawful interception.
2. PDNGW
l IP networks. PDN GW routes packets to
The PDN GW is the point of interconnect between the EPC and the externa
and from the PDNs. The functions of the PGW include :
— Policy enforcement
— Packet filtering
— Charging support
— Lawful interception
— Packet screening
3. HSS
information.
ase that contains user- related and subscriber-related
The HSS (for Home Subscriber Server) is a datab
ks.
and Authentication Centre (A uC) used in 3G networ
It is similar to - Home Location Register (HLR)
4. MME
) deals with the control plane.
The MME (for Mobility Management Entity
nsible for the tracking
ity and security for E-UTRAN access. The MME is respo
— It handles the signaling relate d to mobil (NAS).
termination point of the Non -Access Stratum
and the paging of UE in idle-mode. It is the
itecture.
Fig. 6.2.4 shows the entire SAE arch
( HSS PCRF
eNodeB
< Uu —
X2 S1-U
Serving PDN IP Network
LTE Uu STITT - IMS
G yy) Gateway _ Gateway
UE A (S-GW) (P-GW) - Internet
< Apps
dl pene
eNodeB L
eee
6.3. Voice over LTE (VoLTE)
Scanned by CamScanner
ee
basics
Voice over LTE - VoLTE
VoLTE, Voice o ver LTE isi an IMS (IP multimedia System)
, based technique :
.
VoLTE enables the s e of other applications for LTE.
to be integrated with the suit
ystem defined.
n of IMS network was
To make i implementation i of VoLTE easy and cost effective to operators, cut down versio
. IMS network, but it also simp l ified the interconnectivity.
This not only Y redu ced the number of entities required in the
tance of IMS. The
the cost s for netw ork oper ator s as this had been a major issue for accep
This considerably y re reduced
6 3.1
reduced IMS network for LTE has been shown in Fig.
= HSSo)
The increase in bandwidth in LTE-Advanced is achieved through aggregation of carriers. Carrier aggregation ¢can be See
used for both FDD and TDD.
Scanned by CamScanner
Mobile Communication g, Computin
g (MU-Sem. 7-Comp) of 3GPP
Long Term Evolution
. Each aggregated carrier is refe : 6-5
. a bandwidth of 1.4, 3,
5, 10, 15 or 20 MHz, resto 85.2 ‘component carrier’, The component canter.cany{lave
_ Maximum of five
component Carrie
rs can bea
The numb er of a
Intra-band,contiguous
Intra-band, non-contiguous
Intra-band,non-contiguous
Band 1 Band 2
LTE-Advanced .
Fig. 6.4.2 : Intra and Inter band carrier aggregation
For each component carrier there is a one serving cell.
The Coverage of the serving cells may differ due to the component carrier
frequencies.
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7-Comp) 6-9 Long Term Evolution of 3Gbp
The RRC connection is handled by one cell called the Primary serving cell, served by the Primary component carrier.
The other component carriers are all referred to as Secondary component carrier serving the Secondary serving Cells.
Uu
eLow power
«Cell edge coverage
Donor cell
Fig. 6.4.4 shows the Relay Node (RN) is connected to the DeNB via the radio interface Un. UEs at the edge of the donor
cell are connected to the RN via Uu, while UEs closer to the DeNB are directly connected to the DeNB via the Uu
interface. The frequencies used on Un and Un can be different, outband, or the same, inband. 9° :
I
Wee zi
Scanned by CamScanner
——~'INy OO 1U f ewer + ~~~
2
4. ™ (Transmit) points
7, RX (Receive) Points
PELE)
Both the green and the blue TX-point
transmits in each subframe
point
The green and the blue TX-
frame
transmits in different sub
(b)
ction
t Tr an sm is si on (b) Dyna’ mic point sele
(a ) Join
Fig. 6.4.5 Down Link CoMP two, or more,
sm is si on fro m two TX-points. When
ailable for tr an
n li nk (DL) data is av oint Transmission.
In both these ca
ses Do w
am e su bf rame it is called J
— equency in thes
m e fr from one TX-point in
each
sched uled
po in ts , tra ns mi t on the sa mo r e TX-points but only
- Tx X- at two or
la b le fo r transmiss ion
av ai one UE, and
— When data is Po in t Se lection. -p oi nt s re ce iv e the UL data from
c number of RX
called D ynami ion i.e. a
subframe it is o r e
Jo in theRe ce
qu ptal
p, dthere nis
a
(UL) ehne ation for
~ incase of Uplink UE sc he duling inform
. to provid e
si gn al in g is required e.g
for
io na l radio resources
P e at
7 ae resources:
DL/UL
the different
Scanned by CamScanner
ae . of 3GPp*
Long Term Evolution
‘Mobile Communication & Computing (MU-Sem. 7-Comp) 6-11 ~ ae
6.4:3(a) Architecture
E-UTRAN
Relay node
— The Fig. 6.4.6 depicts LTE Advanced (LTE-A) Architecture for E-UTRAN.
It consists of P-GW, S-GW, MME, S1-MME, eNB, HeNB, HeNB-GW and Relay Node etc. Following are the functions of
these architecture entities. Ls
P-GW
It stands for PDN Gateway.
— It interfaced with S-GW using SS interface and with operator's IP services using SGi interface.
- It has connectivity with PCRP using Gx interface.
— It connects UE to packet data networks.
— P-GW assigns IP address to the UE. One UE can have connectivity with more than one PGWs in
order to have access to
multiple PDNs.
— It takes care of packet filtering, policy enforcement and chargin ;
” g related services. Moreover i nnectivity..
between 3GPP (LTE, LTE-A) and non 3GPP (WiMAX, CDMA etc.) technologies a 2
S-GW
—_ Itstands for Serving Gateway.
— Itinterfaces with MME using S11 interface and with
SGSN using S4 interface
It connects with PDN-GW using S5 interface as mentioned above.
t
Scanned by CamScanner
bile Communi Long Term Evolution of 3GPP
Me mcation & Computing (MU-Sem, 7. Comp) 6-12
It helps in inter-eNB handover as well as inter-3GPP
mobility
t helps in inter-
mer operator charging. it does packet routing and packet forwarding.
MME
=
it stands for Mobility Management Entity
It is major control plane element in LTE advanced architecture
It takes care of au thentication,
icati =e
authorization and NAS signaling related security functions.
It takes care of selecting either S-GW
or PDN-GW or P-GwW
$1-MME
It provides connectivity betwee
n EPC and eNBs
eNB
Itis main building block or system in LTE-A.
It provides interface with UEs or LTE-A phones
.
It has similar functionality as base station used in GSM or other cellular systems.
Each of the eNBs serve one or several E-UTRAN cells. Interface between two eNBs is known as X2 interface.
HeNB
HeNB-GW
It provides connectivity of HeNB with S-GW and MME.
It aggregates all the traffic from number of Home eNBs to core network.
It uses S1 interface to connect with HeNBs.
Relay Node :
e.
It is used for improving network performanc
carrier aggregation
antennas and added een LTE an
:
differences betw
‘.> Table 6.4.2 summarize s the key Tech Knowledga
:
Pubilcations
- ee
Scanned by CamScanner
- Long Term Evolution of 3GPP"
Mobile Communication& Computing (MU-Sem. 7-Comp) 6-13
ee
Data rate 300 Mbps Downlink(DL) 4x4MIMO and 20MHz, *SbPS rewniingN)
i 5 00 MbpsPp:
75 Mbps Uplink(UL) Uplink(
: a :
Theoretical Throughput About 100Mbps for single chain i
2 times than L TE
(20MHz,100RB,64Q0AM), 400Mbps for 4x4
MIMO. 25% of this is used for control/signaling
(OVERHEAD)
Maximum No. of Layers 2(category-3) and 4(category-4,5) in the. 8 in the downlink, 4 in the uplink
downlink, 1 in the uplink
Maximum No. of 2 in the downlink, 1 in the uplink 2 in the downlink, 2 in the uplink
codewords '
Spectral ‘ 16.3 for 4x4 MIMO in the downlink, 4.32 for 30 for 8x8 MIMO in the downlink, 15
Efficiency(peak,b/s/Hz) 64QAM SISO case in the Uplink for 4x4 MIMO in the Uplink
PUSCH and PUCCH Simultaneously not allowed Simultaneously allowed
transmission
Modulation schemes QPSK, 16QAM, 640AM QPSK, 16QAM, 64QAM
supported ;
Access technique _ | OFDMA (DL),DFTS-OFDM (UL) Hybrid OFDMA(DL), SC-FDMA(UL) -
Carrier aggregation Not supported Supported
Applications Mobile broadband and VOIP 7 Mobile broadband and VOIP
6.4.4 LTE Protocol Stack
1
i
| |: if
i
Non-access :
Stratum i
t
(NAS) i
Access
Stratum
(AS)
Contro} User
plane}
Tech
Pusiirations |
Scanned by CamScanner
| |
eee wou, -Gomp) 6-14 . nee LU eo
_
Fig. 6.4.7 depicts LTE Protocol ess
sta
Stratum). ck. It is divided into two main parts - NAS (Non-Access Stratum) and AS (Acc
Further it is catego
rized into Control
plane and us er I
user plane of eNB cons
ists of PHY, MAC » RL
Control plane of eNB consists of a ‘Pin
Cand PDCP layers.
4 layers and in addition RRC layer also.
Following are functions of each layer
PHY
This layer takes care o f frame formation
: as per TDD or FDD topology and as per OFDMA structure.
Moreover, it takes car :
n coversiseransibi @ of modulation and coding of different control and traffic channels.
ing and codeword to layer mapping functionalities.
It incorporates reference nee signals
si i are used for channel estimation and channel equalization
which i .
MAC-Medium Access Control
it takes care of following functions :
Multiplexing/demultiplexing of RLC Packet Data Units (PDUs)
.
Scheduling information reporting.
Error correction through Hybrid ARQ (HARQ).
Local Channel Prioritization.
Padding.
Scanned by CamScanner
¥ Mobile Communication & Computing (MU-Sem. 7-Comp is Long Term Evolution of 3Gpp
_ 6-15
)
Registration.
Bearer context activation/deactivation.
Location registration management.
RLC Modes:
An RLC entity can be configured to perform data transfer in one of the following three
modes.
1. Transparent Mode (TM)
.
As the name suggests the Transparent mode entity in RLC does not add
any overhead to the upper layer SDUs.
The entity just transmits the SDUs coming from upper layer to MAC,
In this mode :
oO Segmentation or reassembly of RLC SDUs is not allowed
Oo NORLC headers are added.
© Does not guarantees delivery
RLC TM is used for transmission of paging messa
ges on PCCH, system information tra nsmitted
on BCCH and SRBO
messages transmitted on CCCH.
In this made :
oO Segmentation or reassembly of RLC
SDUs is allowed
© RLC headers are added,
© Does not guarantees delivery
© This mode is suitable for carrying
streaming traffic.
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem, 7 of 3GPP
_/-Comp) 6-16 Long Term Evolution
Acknowledged Mode (AM)
RLC AM is used both in use he
r plane and cases PDCP is the upper layer. So all th
SDUs which come to RLC control plane packets. But in both the
AM entity are security
protected.
In this mode ;
Segmentation or reasse
° mb| Y of RLC SDUs j
fe] RLC headers are addeg. Pe sallowed
° Guarantees In-“Sequence delivery of SDUs. It supports HARQ mechanism
to retransmit lost PDUs.
° This mode is suitable for
Carrying TCP traffic..
RLC PDU (Protocol Data Unit
)
— RLC PDUs can be categorized into RLC data PDUs
and RLC control PDUs.
- RLCdata PDUs are used by TM, UM and AM RIC entities to transfer upper layer PDUs (i.e. RLC SDUS).
- RLCcontrol PDUs are used by AM RLC entity to perform ARQ
procedures.
6.5.2 Packet Data Convergence Protocol (PDCP)
The PDCP layer is located above the RLC layer and below the IP layer (in the user plane) or the RRC layer (in the
control plane).
- PDCPisakind of interface between inside world and outside world.
- _Inother words, the data coming into the eNB first go through PDCP and then gets into RLC (Downlink). Data waiting in
RLC trying to go out to the outside world has to go through PDCP to reach outside world(Uplink Path)
oO Duplicate detection
Ciphering and integrity protection
UE/E-UTRAN
Radio Bearers
PDCP
ently -ppCP-SAP PDCP-SAP |
i PDCP
sublayer
CSO
4 | “PDCP-PDU: 4
| | TALC - SOUL |
Ric
sublayer
RLC UM-SAP "___RLC AM-SAP
ure view
Fig. 6.5.1: PDCP layer, struct
yer (RLC UM and RLC AM). Note that PDCP has no connection to RLC TM mode,
~ PDCP is directly connected to RLC La
not go through PDCP.
meaning RLC TM mode data does
—
We TethKnemladna
Scanned by CamScanner
Long Term Evolution of 3Gpp -
. e
7-Comp) 6-17
- Mobile Communication & Computing (MU-Sen.
mittin: Receiving
Bote
PDCP entityy PDCP entity -
<>- —cf
licate
in order delivery and dup
Sequence numbering detect ion (u- pla ne onl y)
Reordering
Integrity Protection {u-plane only)
(c-plane only} ee
Integrity Verification
Ciphering (c-plane only)
so Pubrications:
TechKnewledgt
Scanned by CamScanner
ae) uo =
-
QoS management functions
The Hybrid Automatic Repeat-reQuest (HARQ) process is done in combination between the MAC and the PHY layer.
The PHY performs the retention and re-combination and the MAC performs the management
and signaling.
The MAC indicates a NACK whenever there’s a transport block (TB) CRC failure; the PHY usually indicates that failure.
Retransmission is done by the eNodeB or the sender on the downlink using
a different type of coding.
The coding is sent and maintained in buffers in the eNodeB. Eventually, after one or two attempts, there will be
enough data to reconstruct the signal.
In HARQ operation, the retransmission does not have to be fully correct. It has to be correct enough that it can be
combined mathematically with the previous transport block (TB) in order to produce a good transport block.
MAC sends “NACK” message when transport block (TB) fails CRC check.
Scanned by CamScanner
Mobile Communication
& Computing (MU-Sem.
7-Comp) 6-19 Long Term Evolution of
3GPp
Downlink
Transport
Channels
Terminates
in MAC Layer
OoO0a00
nel BCH : Broadcast Channel
CCCH : Common Control Channel
DL-SCH : Downlink Shared Channel
DCCH : Dedicated Control Chan
nel MCH : Multicast Channel
DTCH : Dedicated Traffic Channel
MCCH : Multicast Control Channel
:MTCH : Multicast Traffic Channel
——
Hy Tecatnomiete:
Scanned by CamScanner
aw tP) —O-ZU
6.6.3 Logical Channel Prioritization
_ When the radio resources for a newt ran y instructs the
smission are alloc ated, the logical channel prioritization entit
multiplexing and de- multiplexi : :
SDUs.
entity to generate MAC PDUs from the MACeach
— The logical channel Fiore
pDy when entity also decides how much data from
configured logical channel should be
included in each MAC
never radio resource for a new transmission is available.
6.6.4 Scheduling
: : urce
- _ Scheduling is a process through which eNodeB d e i 7
(RBs) should be given to send or receive data See ES ie Eran ie hte me
- InLTE, scheduling is done at per subframe basis i.e. every 1 mili second
— Resources are com posed of Physical
i Resource Blocks (PRB) and Modulation Coding Scheme (MCS).
- The MCS determines the bit rate, and thus the capacity, of PRBs.
An LTE scheduler performs following function for efficient scheduling :
and
eters such as modulation, channel Coding
(i) ink Adaptation : It selects the optimal combination of param
transmit schemes.
which are available at the
(ii) Rate Control : It is in charge of resource allocation among radio bearers of the same UE
eNB for DL and at the VE for UL.
(ili) Packet Scheduler : It controls access to air interface resources amongst all active Users.
active users on per TTI basis.
(iv) Resource Assignment : It allocates air interface resources to selected
the desired data rate, but also controls the
(v) Power Control ; Provides the desired SINR level for achieving
interference to the neighbouring cells.
al errors by link adaptation.
(vi) HARQ (ARQ + FEC) : It allows recovering from residu
Scanned by CamScanner
PRBs thus have both-a time and frequency dimension.
Allocation of PRBs is handled by a scheduling function at eNodeB.
LTE transmissions are segmented into frames, which are:10 msec in duration
One frames consist of 20 slot periods of 0.5
msec.
Sub-frames contain two slot periods and are 1.0 msec in duration
Downlink
The LTE PHY spécification accommodates bandwidths from 1.25 MHz to 20 MHz
. . :
The basic modulation scheme is OFDM which is very robust in the presence of severe multipat h fadin ig
Downlink multiplexing is accomplished via OFDMA.
The DL supports physical channels, which convey information from higher layers in the LTE stack
Physical channels map to transport channels, which are service access points (SAPs) for the
L2/L3 layers
Depending on the assigned task, physical channels and signals use different modulation and coding parameters
Three different types of physical channels are defined for the LTE downlink.
Scanned by CamScanner
Ss uit for
able transm i Ssion
i Ove
ver enti re cel
l Ove
cov
. er ‘ag.e areea
Suitable for use with
beam forming
_— Suppore
t e
for dynamic and sem
i “Static resour: ce allocatio
n
pp ' discontinuous rec
eive (DRX) for po
3. Paging Channel (PCH)
vee
— Support for UE DRX
— Requiremen it for broadcast
over entire cell coverage are
M appe a
;
d to dynamicall y allocated physical resou
rces
4. Multicast Channel (MCH)
Requi
equirement for broadcast over entire
cell coverage area
Support for MB-SFN
Support for semi-static resource allocation
ON-LTE) -
6.8 Self Organizing Network (S
nizing Network.
— SON stands for Self Orga
power and switch on, it would configure all
ad d an eN B wh er ev er you wan t to put and just connect
- It means that just for service.
ig ur at io n by its elf and make s itself ready
of its co nf
d-Play’ functionality.
- SONislikea ‘Plug-an ing steps.
or con str uct s a net wor k, they go through follow
operat
Normally whe nasystem
Scanned by CamScanner
WF Mobile Communication & Comp
uting (MU-Sem. 7-Comp) 6-23
. eNB Power on
Self-Configuration
(pre-operational state)
Self-optimization
(operational state)
Self-Healing
(Operational state)
In Centralized SON, optimization algorithms are stored and execute d from the OAM
functionality resides in a small number System. Here, the SON
of locations, at a high level in the archi
tecture.
Fig. 6.8.2 shows an example of Centrali
zed SON. Here, all SON functions are
located in OAM systems, so it is easy
deploy them but does not support
thos
to
e simple and quick optimization cases
.
To implement Centralized SON, exist
ing Northbound Interface (Itf-N), whic
h is the interface between the Elem
Manager and the Network Manager, ent
needs to be extended.
Also, as the number of nodes in the netw
ork increases, computational requirem
ents will also increase, which might
cause problems in scalability, -
- whe Techinowledgt
Scanned by CamScanner
_—
Oe
S QL
:
PP
olution of 3G
". Mobile Communication & C omputing (MU-Sem. .7-Comp) . Long Term Ev
7-C 6-24
Itf-N
ens
so
SON
6 £
ibuted SON
Fig. 6.8.3 :Distr
ed in eNB.
ed in the OA M sys tem , while others are execut
.
ar’ e execut
lgorithms
3.
Scanned by CamScanner
Long Term Evolution of 3Gpp :
flexibility t i i ca ses.
ed in OAM s to provide kinds of i
optimization
i plemen y to suppor t different
But on the other hand, it costs lots of depl ffort and interface extension wor ,
k.
oyment effo i
_
CB
— — Small cells
have smaller co
vera Be and ca
of decreasing ba pacity and are of
se Station power) three types, Micr
, o , Pic
i in order
Eso and Ferme
ee
age of offloading traffic
from the macro cell
Scanned by CamScanner
eI SE UUILIp) 0-20
(i) Microcells
Macro cells
Macro cells have large coverage and capacity and are controlled by High power base stations. These are the cells
which have been traditionally used in all cellular systems.
Heterogeneous networks consist of different types of base stations supporting different types of cells such as Macro
Micro, Pico and Femto cells.
© Macro cells are controlled by High Power eNBs.
Scanned by CamScanner
‘Mobile Commun
icatio n & Computin
g (MU-Se
° Small Cells (M
icro, Pico and Femto)
Remote Radio Head are
Controlled by Low po
s (RRH), relay nod wer eNBs. Low Powe
es r nodes include mic
These can use and fem to nodes, - ro, Pico,
the same Or differen
t technologies,
Relay Node (R
N)
Relay 4 interface
Uu,
RRHs (Remote Ra
dio Head)
Mictocell
—— Wireless
fink
soee--- Backhaul
Macrocell
Fig. 6.9.4: Heteroge
neous Network Arc
hitecture
wer TechKnewledsé
Scanned by CamScanner
——
—=== :
is network
A key compone
nt of such hete rogen tw whi ch help s in mee tin g the above requirements
geneous networks,
intelli gence viai the SON (Self Organizing Network)
. and
— SON is automatition technolo gy that enables; the network to set itself up and self-manage resources.
configuration to achi ch i approach.
leve optimal performance in an integrated network
such
- The self-organizin 8 and self-optimizi 7
of the small cell smoothen the path for implementation of
optimizing capability
heterogeneous networks. -
n environment conditions and
— Aself-organizin 8 micro base station can automatically detect the surroundi g radio
ion power.
automatically plan scrambling code, and transmiss
plan and configure radio parameters such as frequency,
- Atraditional base station cannot do this
6.10 Introduction to 5G
6.10.1 Overview
l be
ali ;
bin ati on of sev era l tec hno log ies in one. The system, however, wil
ju
SG is not jus t one technology, it is actually a com
which technology for maximum efficiency.
a smart and know when to make use of
rate up to 10Gbps.
5G will be much more faster than 4G. It will provide data
coverage even att he cell boundaries.
It will provide 100% coverage area. That is better like industry,
to 1 msec ) whic h will be helpf ul for the critical applications
cy (up
5G will also provide low network laten
healthcare and medical. tation to
il to education, transpor
prov ide wide rang e of future industries from reta
5G technology, aims to
homes to healthcare.
entertainment and smart to mobile networks toindustries
ng. from vehicles
pro vid e ubi qui tou s connectivity means everythi
5G technology will
be connected together.
to smart homes will se are called millimetre wav
es.
spe ctru m band bet ween 3GHz to 30 GHz. The
y
ely High frequenc tacles..
5G will utiliz e Extrem covers S hort distance
since they cannot p enetrate obs
hig h sp ee d but
travel at very distance, 5G will use a large
These wave can stat ions to transmit signal over long
red cellular ba se
quire s high powe
Unlike 4G that re d onsma Il towers or bui
lding roofs.
y be locate times faster as
er of sm al l cel l stations that ma da rd s to make is 100
numb t M ultiple Ou tp ut ) st an
(Multiple Inpu
th e use of Ma ssiv e MIMO . Mu lt iple antennas allow
for
5G make s s th e us 0
e
as 10 0 an te nn as
MO
MI ma ke
f as much
opposed to standard MIMO. Massive
sion.
data transmis
better an d faster me s more devices
in market.
th 1 00 ti
k will come wi
The 5G networ'
this time; the market is still
:
5G standards t. S o, no firm standards is in place at
er developmen
a n d a r d are still u nd
5G technology st alities.
fe at ur e s and function ect (3GPP), the
the es se nt ial 5G se s ar e t he 3rd Generation Partnership Proj
figuring out lved in these
proc es
).
5G standard s bodies invo the International Tel eco mmunication Union (ITU
The pri mary Force (IETF)
, and
Internet Engineering Tas
k
YY Tectinen tatet
ications
Pubs
Scanned by CamScanner
wv Mobile Communication &
Computing (MU-Sem. 7-Comp Long Term Evolution of 3GPp
) _ 6-29
6.10.2 5GAA (Autonom —
ous Association)
The 5G Automotiv
e Associa tion (5GAA) is a global, cross-i
ndustry organization of companies that work together to
develop end-to-end solution for
future mobility and transportati
on services.
These companies include the automotive, technology, and telecom
munications industries (ICT).
SGAA was created on September 2016. It consi
sts of 8 founding members: AUDI AG, BMW
Ericsson, Huawei, Intel, Nokia, and Qualcomm Incorporated. More Group, Daimler AG,
than 110 companies have now joined 5GAA,
The 5G Automotive Association is a strong
advocate of Cellular-Vehicle 2X (C-V2X). The
objectives of SGAA. following are the key
Making vehicles Smarte
r
Communication and connectivity are key
to the development of autonomous vehic
—. Cellu
lar based technologiesV2x :vehi
les.
cle-to-eve rything communication protocol allows
with other vehicles (V2V), pedestrians (V2P), netw vehicles to communicate
orks (V2N), and the surrounding infrastructu
re (V2I).
Making Vehicle Safer
1. Device-to-Device Communication
Scanned by CamScanner
-. Mobile Communication & Computing (MU-S
em. 7-Comp) 6-30 ti
ang Term Evolution of 3GPP
V2P) and longer-range
Collectively, the transmission modes of shorter-range direct communications (V2V, v2l,
|,
-
|
network-based communications (V2N) comprise what we call Cellular-V2X
~ Weall know that frequency spectrum is a scarce resource. The existing bands are crowded. One way to get around
this problem is to simply transmit signals on a whole new swath of the spectrum, one that’s never been used for
mobile service before.
So now, all 5G service providers are experimenting with broadcasting on millimeter waves, Millimeter waves are
higher frequency waves than the radio waves. Millimeter wave Is the band of spectrum between 30 gigahertz (Ghz)
and 300 Ghz (Extremely High Frequency). It lies between the super high frequency (SHF) band, and the far infrared
(IR) band. They are called millimeter waves because thelr wavelength vary from 1 to 10 mm, compared to the radio
waves that serve today’s smartphones. The radio waved wavelength Is in tens of centimeters.
Millimetre waves were first investigated In the 1890s by Indian sclentist Jagadish Chandra Bose.
Scanned by CamScanner
Mobile Communication & Computing (MU-Sem. 7- Comp) 6-31 Long Term Evolution of app
applications.
Until now, only operators of satellites and radar systems used millimeter waves for real-world
There is one major drawback to millimeter waves, though ~ they can’t easily travel through buildings or obstacles ang:
they can be absorbed by foliage and rain. That’s why 5G networks will likely augment traditional cellular towers with
another new technology, called small cells.
Q.8 What do you mean by Self Organizing Networks? Explain SOIN architecture.
Scanned by CamScanner