Professional Documents
Culture Documents
WMN Chapter 2
WMN Chapter 2
UNIT2
GPRS and Mobile Data communication (12M)
History Of GPRS:
GPRS was one of the main advances that empowered a cell system to interface with
Internet Protocol systems, accomplishing across the board reception in the mid-
2000s.
The capacity to peruse the web from a telephone whenever through “dependably on”
data networking, while underestimated in a great part of the world today, was as yet
an oddity when it was introduced. Indeed, even now, GPRS keeps on being utilized in
parts of the world where it has been too expensive even to consider upgrading cell
organize framework to move up to newer alternatives.
According to a study on the history of GPRS development Bernhard Walke and his
student, Peter Decker, are the inventors of GPRS – the first system providing universal
mobile Internet access.
Function of GPRS
• A mobile generation called GPRS is used to talk information via mobile
networks.
• It allows clients to access the internet and different data services on their cell
gadgets.
• Due to its low prices and environmental friendliness, GPRS is a famous option
for consumers.
Features of GPRS
• Advantages of GPRS
• A high-speed data transfer cost is offered to mobile devices through General
Packet Radio Service or GPRS.
• Web browsing, email sending and receiving, and online shopping are just a few
of the online services that GPRS users can access while they are on the move.
• Because GPRS is always operational, customers can access the internet quickly
and without any problems without utilizing dial-up.
• GPRS offers a cost-effective approach to transmitting statistics because it only
charges for the volume of data transferred, not for the amount of time spent
online.
• GPRS offers users a flexible option because it functions well with a variety of
mobile devices.
• GPRS tries to make maximum use of the existing physical structure of GSM. It
has introduced a new entity named GPRS support nodes(GSN) whose
responsibility is to route and deliver a data packet. GSN is of two types:
• Serving GPRS Support Node (SGNS)
• Gateway GPRS Support Node (GGNS)
GPRS architecture
• Mobile Station(MS)
• GPRC requires enhanced mobile stations, as existing mobile stations were
designed according to the GSM network, and they were unable in handling
enhanced data packets.
• A variety of high-speed mobile stations are available to support enhanced data
packets.
• These mobile stations are also capable of handling the GSM architecture to
make voice calls.
• Base Station Subsystem (BSC)
• In GSM architecture there is one component called BSC. But in GPRS there is
one component is added to BSC called PCU. PCU stands for Packet Control
Unit.
• If the signal comes to BSC and that signal contains data, then PCU routes to
the SGSN.
• The interface is used between BSC and PCU is the FRI interface.
• After the signal comes to SGSN, it delivers the data packet to the GGSN. GGSN
routes the data packet to the data network (PDN- Predefined Data Network).
• GPRS Support Nodes
• GPRS support nodes are of two types:
• 1. Serving GPRS Support Node (SGSN)
It is responsible for the following tasks:
• Packet Delivery
• Mobility management
• apply/ sign off of terminals
• localization
• LLC (Logical Link Control) management
• Authentication
• billing
• 2. Gateway GPRS Support Node (GGSN)
It is responsible for the following tasks:
• Mediator between GPRS backbone and external data networks.
Saves current data for the SGSN address of the participant as well as their profile and
data for authentication and invoice
• Mobility Support
• GPRS has the following mechanism to support mobility in the network:
1. Attachment Procedure
2. Location and Handoff Management
• Routing Area
• GPRS introduces the concept of a Routing Area.
• This concept is similar to Location Area in GSM, except that it generally
contains fewer cells. Because routing areas are smaller than location areas, less
radio resources are used While broadcasting a page message.
• SMS in GSM
• GSM introduced a mechanism of Short Messaging Service(SMS) which is similar
to peer-to-peer Instant messaging.
• Service Precedence
• Reliability
• Delay and
• Throughput
The GGSN also collects charging information connected to the use of the
external data networks and can act as a packet filter for incoming traffic.
Serving GPRS Support Node (SGSN)
❖ Routing IN GPRS
• Data routing or routing of data packets to and fro from a mobile user, is one
of the pivot requisites in the GPRS network. The requirement can be divided
into two areas:
• Mobility management.
• The important roles of GGSN involve synergy with the external data
network.
• The GGSN updates the location directory using routing information supplied
by the SGSN about the location of an MS.
• It routes the external data network protocol packet encapsulated over the
GPRS backbone to the SGSN currently serving the MS.
• Mobility Management
In GPRS, three mobile station (MS) mobility management states,
i.e., idle, ready, and standby are defined in order to accommodate
bursty traffic characteristics of data services, and thus, GPRS results
in efficient management of radio resources and signaling networks.
Logical CHANNELS IN GPRS
GPRS Channels
Let us go through GPRS logical channels. Logical channels are named and used in
GPRS network are PBCCH, PPCH, PAGCH,PNCH,PRACH, PACCH,PTCCH,PDTCH.
These channels are divided as mentioned below based on their functions.
Broadcast channel-
Packet Broadcast Central Channel (PBCCH)
Common control channels- Packet Paging Channel (PPCH)
Packet Access Grant Channel (PAGCH)
Packet Notification Channel (PNCH)
Packet Random Access Channel (PRACH)
Dedicated control channels-Packet Associated Control Channel (PACCH)
Packet Timing Advance Common Control Channel (PTCCH)
Dedicated traffic channel-Packet Data Traffic Channel (PDTCH)
GPRS Logical Channel functions are described below.
PDTCH- Used for data traffic, bidirection between MS(Mobile Subscriber) and
BSS(base station subsystem)
PBCCH- Used for Broadcast signalling control, from BSS to MSs
PRACH- Used for random access, from MSs to BSS
PAGCH- Used for Access Grant indication, from BSS to MSs
PPCH-Used for Paging, from BSS to MSs
PNCH- USed for notification purpose, from BSS to MSs
PACCH- Used for Associated control, bidirectional
PTCCH- Used for timing advance control, bidirectional
Wireless LANs(WLAN)
WLAN stands for Wireless Local Area Network. WLAN is a wireless network that allows
devices to associate and communicate wirelessly.
Just like a traditional wired LAN in which the device transmits over Ethernet cables, the
devices using the WLAN transmit through WiFi.
Mobile users can connect to a WLAN through wireless connection. The IEEE 802.11 group
of standards describe the technologies for LANs.
Though WLAN looks dissimilar to the traditional LAN, it works in the same way
• The LANs are scalable in nature, i.e. devices may be added or removed from
the network at a greater ease than wired LANs.
• The system is portable within the network coverage and access to the
network is not bounded by the length of the cables.
Disadvantages of WLANs
• Since radio waves are used for communications, the signals are noisier with
more interference from nearby systems.
• Greater care is needed for encrypting information. Also, they are more
prone to errors. So, they require greater bandwidth than the wired LANs.
WLAN APPLICATIONS
• Wireless LANs have a great deal of applications.
• Users can access the Internet from WLAN hotspots in restaurants, hotels,
and now with portable devices that connect to 3G or 4G networks
(WLAN)IEEE 802.11 Architecture
1) Stations (STA) − Stations comprise all devices and equipments that are connected
to the wireless LAN. A station can be of two types:
• Wireless Access Pointz (WAP) − WAPs or simply access points (AP) are generally wireless
routers that form the base stations or access.
• Client. − Clients are workstations, computers, laptops, printers, smartphones, etc.
2) Basic Service Set (BSS) −A basic service set is a group of stations communicating
at physical layer level. BSS can be of two categories depending upon mode of operation:
• Infrastructure BSS − Here, the devices communicate with other devices through access points.
• Independent BSS − Here, the devices communicate in peer-to-peer basis in an ad hoc manner.
Radio Frequency Identification (RFID) is the application of radio waves to read and
capture information stored on tags affixed to objects.
RFID readers are installed at tracking points and can read information from tags when
they come into range, which can be of several feet radius.
A tag need not be within direct line-of-sight of the reader to be tracked. RFID is used to
check identities and track inventory, assets and people.
RFID tags can be attached to a variety of objects like cash, clothing, baggage, parcels,
and even implanted in animals and people.
Working Principle
• a tag or label
• a reader
RFID tags are affixed on the object and have a transmitter and a receiver embedded on
it. It contains the serial number that uniquely identifies a specific object. The tags have
two parts−
It is a two-way radio transmitter-receiver that emits a signal for the tag. The tag
responds by sending the information embedded in its memory. The reader captures the
results and transmits to the RFID computer program, which then performs the necessary
processing.
• Passive tags− They use the radio wave energy of the reader to transmit its ID to the reader.
• Active tags− They are equipped with an on-board battery and transmit their ID periodically.
• Battery – assisted Passive− They have a small battery on-board and are activated only within
the range of an RFID reader.
• Read-only tags− They have a factory-assigned ID which serves as a key into a database.
• Read/write tags− In these tags, object-specific data can be written and retrieved by the system
user.
• Field programmable tags− These are written once by the system, thereby they can be read
multiple times.
• Blank tags− They may be electronically written by the user.
• Passive readers− They can only receive signals from active tags.
• Active readers− They can transmits interrogator signals to both passive, active as well as battery-
assisted tags and also receives replies from them.
• Fixed readers− They are used to create a highly defined and tightly controlled interrogation area.
Tags are read when they enter this area. Active readers are deployed here.
• Mobile readers− They are used for creating handheld tag reading devices. They may be also
installed in moving vehicles.
RFID-fEATURES
• A unique ID
• Automatic recognition
• security
RFID-Advantages
RFID-Disadvantages
• It is susceptible to virus
RFID-Application
• Baggage Applications
• Assets tracking
• Animal tracking
• Automotive
Bluetooth
• Bluetooth is universal for short-range wireless voice and data communication.
• It is a Wireless Personal Area Network (WPAN) technology and is used for
exchanging data over smaller distances.
• This technology was invented by Ericson in 1994. It operates in the unlicensed,
industrial, scientific, and medical (ISM) band from 2.4 GHz to 2.485 GHz.
• Maximum devices that can be connected at the same time are 7.
• Bluetooth ranges up to 10 meters.
• It provides data rates up to 1 Mbps or 3 Mbps depending upon the version.
• The spreading technique that it uses is FHSS (Frequency-hopping spread
spectrum).
• A Bluetooth network is called a piconet and a collection of interconnected
piconets is called scatternet.
What is Bluetooth?
Bluetooth simply follows the principle of transmitting and receiving data using radio
waves.It can be paired with the other device which has also Bluetooth but it should be
within the estimated communication range to connect. When two devices start to share
data, they form a network called piconet which can further accommodate more than
five devices.
Points to remember for Bluetooth:
• Bluetooth Transmission capacity 720 kbps.
• Bluetooth is Wireless.
• Bluetooth is a Low-cost short-distance radio communications standard.
• Bluetooth is robust and flexible.
• Bluetooth is cable replacement technology that can be used to connect almost
any device to any other device.
• The basic architecture unit of Bluetooth is a piconet.
Bluetooth Architecture:
Piconet is a type of Bluetooth network that contains one primary node called the
master node and seven active secondary nodes called slave nodes. Thus, we can say
that there is a total of 8 active nodes which are present at a distance of 10 meters.
The communication between the primary and secondary nodes can be one-to-one or
one-to-many. Possible communication is only between the master and slave; Slave-
slave communication is not possible. It also has 255 parked nodes, these are
secondary nodes and cannot take participation in communication unless it gets
converted to the active state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act
as master or we can say primary in another piconet. This kind of node can receive a
message from a master in one piconet and deliver the message to its slave in the
other piconet where it is acting as a master. This type of node is referred to as a
bridge node. A station cannot be mastered in two piconets.
Types of Bluetooth
Various types of Bluetooth are available in the market nowadays. Let us look at them.
• In-Car Headset: One can make calls from the car speaker system without the
use of mobile phones.
• Stereo Headset: To listen to music in car or in music players at home.
• Webcam: One can link the camera with the help of Bluetooth with their
laptop or phone.
• Bluetooth-equipped Printer: The printer can be used when connected via
Bluetooth with mobile phone or laptop.
• Bluetooth Global Positioning System (GPS): To use GPS in cars, one can
connect their phone with car system via Bluetooth to fetch the directions of
the address.
Advantage:
Disadvantages:
Applications:
Architecture:
2. MAC Layer:
This layer provides and interface between convergence layer and physical
layer of WiMax protocol stack. It provides point to multipoint communication
and is based on CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance). The MAC layer is responsible for transmitting data in frames and
controlling access to shared wireless medium. The MAC protocol defines
how and when a subscriber may initiate a transmission on the channel.
3. Convergence Layer:
This layer provides the information of the external network. It accepts higher
layer protocol data unit (PDU) and converts it to lower layer PDU. It provides
functions depending upon the service being used.
Advantages of WiMAX:
Disadvantages of WiMAX: