Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 30

Emerging Technologies

Lecturers
A. Prof. Ibrarullah A. Prof. Wajid Ali Mir
E-Mail: ibrarullah2001@yahoo.com E-Mail:
mwajid@hotmail.com
MSc (Communication & Electronics Engineering) M.Sc (Telecommunication
Engineering )
UET Peshawar Technical University of Denmark
(DTU)
BSc (Electrical Engineering) B.Sc (Computer and Electronics
Engineering)
UET Peshawar University College of Copenhagen Denmark
(IHK)

(CU-510 Sections A and D) (CU-510 Sections B and C)


Emerging Telecom
Technologies

Chapter # 6
IP Multimedia Subsystem (IMS)
• IP Multimedia Subsystem (IMS) is a generic
architecture for offering multimedia and voice over IP
services, defined by 3rd Generation Partnership Project
(3GPP).
• IMS is access independant as it supports multiple access
types including GSM, WCDMA, CDMA2000, WLAN,
Wireline broadband and other packet data applications.
• IMS made Internet technologies, such as web browsing,
e-mail, instant messaging and video conferencing
available to everyone from any location.
• It is also intended to allow operators to introduce new
services, such as web browsing, WAP and MMS, at the
top level of their packet-switched networks
IMS
• IP Multimedia Subsystem is standardized reference architecture.
• IMS consists of session control, connection control and an
applications services framework along with subscriber and services
data. It enables new converged voice and data services, while
allowing for the interoperability of these converged services
between internet and cellular subscribers.
• IMS uses open standard IP protocols, defined by the IETF(The
Internet Engineering Task Force (IETF) develops and promotes Internet standards,
). So users will be able to execute all their services when roaming
as well as from their home networks. So, a multimedia session
between two IMS users, between an IMS user and a user on the
Internet, and between two users on the Internet is established using
exactly the same protocol. Moreover, the interfaces for service
developers are also based on IP protocols.
IMS applications
Some of the possible applications where IMS can be used
are:
Presence services
Full Duplex Video Telephony
Instant messaging
Unified messaging
Multimedia advertising
Multiparty gaming
Videostreaming
Web/Audio/Video Conferencing
Push-to services, such as push-to-talk, push-to-view, push-
to-video
 
IMS architecture
• Effectively, IMS provides a unified architecture that supports a wide
range of IP-based services over both packet- and circuit-switched
networks, employing a range of different wireless and fixed access
technologies. A user could, for example, pay for and download a
video clip to a chosen mobile or fixed device and subsequently use
some of this material to create a multimedia message for delivery to
friends on many different networks. A single IMS presence-and-
availability engine could track a user's presence and availability
across mobile, fixed, and broadband networks, or a user could
maintain a single integrated contact list for all types of
communications.
• A key point of IMS is that it is intended as an open-systems
architecture: Services are created and delivered by a wide range of
highly distributed systems (real-time and non-real-time, possibly
owned by different parties) cooperating with each other. It is a
different approach to the more traditional telco architecture of a set
of specific network elements implemented as a single telco-
controlled infrastructure.
High Speed Downlink Packet
Access (HSDPA)
• HSDPA is a packet based technology for W-CDMA
downlink with data transmission rates of 4 to 5 times
that of current generation 3G networks (UMTS) and
15 times faster than GPRS. The latest release boosts
downlink speeds from the current end-user rate of
384 kbps (up to 2 Mbps according to standards) to a
maximum value according to standards of 14.4 Mbps.
Real life end-user speeds will be in the range of 2 to
3 Mbps.
High Speed Downlink Packet
Access (HSDPA)
• HSDPA provides a smooth evolutionary path for Universal Mobile
Telecommunications System (UMTS) networks to higher data rates
and higher capacities, in the same way as Enhanced Data rates for
GSM Evolution (EDGE) does in GSM world. The introduction of
shared channels for different users will guarantee that channel
resources are used efficiently in the packet domain, and will be less
expensive for users than dedicated channels.
• HSDPA was introduced in the Third Generation Partnership Project
(3GPP) release 5 standards. Assuming comparable cell sizes, it is
anticipated that by using multi-code transmission it will be possible
to achieve peak data rates of about 10 Mbit/s (the maximum
theoretical rate is 14.4 Mbit/s). This will result in a six- to seven-fold
throughput increase during an average downlink packet session
compared with the Downlink Shared CHannel (DSCH) standards of
3GPP release 99.
HSDPA (cont.)
• 3GPP standards beyond release 5 will aim to achieve further throughput
increases, say peak data rates in the range 20 to 30 Mbit/s, by using Multiple
Input Multiple Output (MIMO) or other antenna array techniques, and possibly
asymmetric allocation of frequency spectrum in multi-carrier cells (e.g. a further
100% downlink packet session throughput increase by allocating an additional 5
MHz unpaired band).
HSDPA achieves its performance gains from the following radio features:
• High speed channels shared both in the code and time domains
• Adaptive modulation and coding schemes: QPSK and 16QAM.
• Hybrid Automatic Repeat reQuest (HARQ) retransmission protocol (Data is
transmitted together with error correction bits. Minor errors can thus be corrected without retransmission.
If retransmission is needed, the user device saves the packet and later combines it with retransmitted
packet to recover the error-free packet as efficiently as possible. Even if the retransmitted packets are
corrupted, their combination can yield an error-free packet. Retransmitted packet may be either identical
or different from the first transmission (incremental redundancy). The round-trip time for retransmissions
is improved since the retransmissions are done from base station instead of Radio Network Controller
(RNC).
• Short transmission time interval (TTI)
• Fast packet scheduling controlled by the Medium Access Control - high speed
(MAC-hs) protocol in Node B. (Each user device continually transmits an indication of the
downlink signal quality, as often as 500 times per second. Using this information from all devices, the
base station decides which users will be sent data on the next 2 ms frame and how much data should be
sent for each user. More data can be sent to users which report high downlink signal quality. When the
base station decides which users will receive data on the next frame, it also decides which
channelisation codes will be used for each user. This information is sent to the user devices over one or
more "scheduling channels“. )
High Speed Downlink Packet
Access (HSDPA)
• HSDPA will make life easy for 3G customers, providing
vastly better service for both corporate users and
individuals, with data delivered at speeds comparable to
or better than fixed-line broadband access systems.
• Corporate users will have easy and secure mobile
access to corporate networks, with rapid retrieval and
downloading of confidential corporate information.
• Consumers will enjoy superior quality for video
services, including video streaming and gaming.
• All customers will enjoying fast Web browsing, with
rapid access to graphics-heavy Internet sites.

Mobile TV
• Mobile TV is the technology where the TV services are
streamed on to the mobile or hand-held devices. Mobile TV is
going to get more and more common over the next couple
years . There is lot of momentum in the area, even if there
are a few commercial products so far.
• Already, many mobile operators offer a selection of television
channels or individual shows, which are streamed across
their 3G networks. In South Korea, television is also sent to
mobile phones via satellite and terrestrial broadcast networks,
which is far more efficient than sending video across mobile
networks.
• At the moment, mobile TV is mostly streamed over 3G
networks. But sending an individual data stream to each
viewer is inefficient and will be unsustainable in the long run if
mobile TV takes off. So the general consensus is that 3G
streaming is a prelude to the construction of dedicated
mobile- TV broadcast networks, which transmit digital TV
signals on entirely different frequencies to those used for
voice and data.
Mobile TV Standards
• There are three main standards:
• 1): DVB-H (Digital Video Broadcasting - Handhelds) , favoured in
Europe;
• 2): DMB (Digital Multimedia Broadcasting), in South Korea and
Japan; and
• 3): Media FLO ,stands for Forward Link Only, meaning that the data
transmission path is one way, from the tower to the device. The
MediaFLO system transmits data on a frequency, separate from the
frequencies used by current mobile telephone networks. )
• MediaFLO is a technology to transmit video and data to portable devices
such as mobile phones and personal TVs, used for mobile TV. In the United
States, the service powered by this technology is branded as FLO TV.
• Broadcast data transmitted via MediaFLO includes live, real time audio and
video streams, as well as scheduled video and audio clips and shows. The
technology can also carry IP datacast application data, such as stock market
quotes, sports scores, and weather reports.).
• Among the three technologies, DVB-H was officially adopted by ETSI
(the European Telecommunications Standards Institute) as the
standard for mobile TV services in Europe. It is considered to be as
the best delivery system currently available for most markets,
according to many of the operators and vendors.
Mobile TV
DVB-H:
• DVB-H is a terrestial digital TV standard that uses less power in receiving
client than DVB-T (DVB Terrestial), and allows the receiving device to
move freely while receiving the transmission, thus making it ideal for
mobile phones and haldheld computers to receive digital TV broadcasting
over the digital TV network (without using mobile phone networks at all) .
There is therefore a trade off between the data rate required for the service
and how much this can be packed into short bursts to save the battery
power of the receiver.
• Like DMB, DVB-H uses OFDM but with a bandwidth of either 6, 7, or 8
MHz. Additionally it uses a range of different types of modulation from
QPSK up to 64QAM and this enables it to have a very high data rate.
However it is more susceptible to signal variations and synchronisation
problems. Additionally higher transmitter powers are required than those
needed for DMB. Also the wide RF bandwidth also means that current
drain is increased, as wide bandwidth amplifiers are inherently more power
hungry.
• As it is really just an extension to DVB-T, DVB-H uses the same specs
DVB-T.
• Video is normally encoded with MPEG-2 and the standard, just like its
other siblings DVB-C (Cable) , DVB-S (Satellite) and DVB-T, is mostly
used in Europe.
Mobile TV
Benefits of DVB-H:
• An approved standard for handheld equipment by ETSI (European
Telecommunications Institute) with a high adoption rate worldwide
• DVB-H is an open industry standard that was developed by the
DVB Project , an industry association /group and is currently being
supported by leading companies throughout the wireless industry.
• It benefits from existing DVB-T infrastructure components, which reduces
initial investments in many cases
• It provides the best user experience in the mobile environment, with an
energy saving handset that is only ‘on’ 10% of the time, soft handover and
in-building coverage
• It offers an excellent, broadcast-quality picture, because the screen
resolution is of a similar standard to VHS
• Battery consumption is reduced by 90% due to time-slicing technology
• DVB-H comes from the proven DVB standard used in Europe for standard
DTV transmission with a low power mode for battery-powered devices.
• Efficient use of bandwidth enables up to 55 mobile channels.
• It is supported by publicly available air interface specifications helping to
drive device interoperability and market development
• Its security includes end-to-end control of stream encryption, generation of
decryption keys and delivery of keys to consumers in a billing-integrated
way.
Mobile Virtual Network Operator
(MVNO)
• Mobile Virtual Network Operator (MVNO) is a GSM phenomenon
where an operator or company which does not own a licenced
sprectrum and generally with out own networking infrastructure.
Instead MVNOs resell wireless services under their brand name,
 using   regular telecom operator's network with which they have a
business arrangements. Usually they buy minutes of use from the
licenced telecom operator and then resell minutes of usage to their
customers of MVNO. Currently MVNOs are  emerging in fast pace
in European markets. Slowly MVNO phenomenon catching up in
Asia and other  parts of the world also.
• An example for MVNO is Virgin Mobile. Virgin Mobile plc is a mobile
phone service provider operating in the UK, Australia and Canada,
and the US. The company was the world's first Mobile Virtual
Network Operator, launched in the UK in 1999. It does  not maintain
its own network, and instead has contracts to use the existing
network(s) of other providers.
Mobile Virtual Network Operator
(MVNO)
• Usually MVNO's do not have their own infrastructure,
some providers are actually deploying their own Mobile
Switching Centers (MSC) and even Service Control
Points (SCP) in some cases. Some MVNO's deploy their
own mobile Intelligent Network (IN) infrastructure in
order to facilitate the means to offer value-added
services.
• MVNO's have full control over the SIM card, branding,
marketing, billing, and customer care operations. While
sometimes offering operational support systems (OSS)
and business support systems (BSS) to support the
MVNO.
(MVNO)
• Characteristics of an MVNO:
• MVNOs are new breed of wireless network operators who
may not own the wireless spectrum, or wireless
infrastructure but give a virtual appearance of owning a
wireless network. These operators lease the pipe or
wireless capacity from traditional operators and then
repackage it for a specific vertical industry application.
• Main added value that MVNO provides is billing and
customer care functions. In that sense MVNOs own the
customers.
• MVNOs generally provide both voice and data services to
end users through a paid up subscription agreement.
• To become an MVNO, one should make together a
partnership that consists of a connectivity of a regular telco,
a customer base, and a sales channel. Most important,
they need unique and compelling data services .
Mobile Virtual Network Operator
(MVNO)
• MVNO Services
For now MVNO services have been limited, but analysts have predicted that as
wireless services grow, so will the availability of MVNO applications. For instance, in
the future a cell phone user may be able to subscribe to a network operator plus
multiple MVNOs for specific data services over the same phone. One MVNO could
provide sports news, another weather and traffic and still another could provide
instant messaging capabilities.

• In this way, each MVNO and the network operator could focus on their own markets
and form customized detailed services that would expand their customer reach and
brand.
Regulation
So far MVNOs have not been regulated in any country. The ITU has received several
requests to study the issue, specifically to provide input on whether government
intervention is necessary to allow MVNOs to offer services and applications at a lower
price to consumers. This would help to ensure a more efficient use of the spectrum
but some present providers argue that the market is already competitive and
intervention is not necessary.
IPv4
• Internet Protocol version 4 (IPv4) is the fourth
revision in the development of the
Internet Protocol (IP) and it is the first version of
the protocol to be widely deployed.
• IPv4 is still by far the most widely deployed
Internet Layer protocol.
• IPv4 is a connectionless protocol for use on
packet-switched Link Layer networks (e.g.,
Ethernet). It operates on a best effort delivery
model, in that it does not guarantee delivery, nor
does it assure proper sequencing or avoidance of
duplicate delivery. These aspects, including data
integrity, are addressed by an upper layer
transport protocol (e.g.,
Transmission Control Protocol).
IPv4
• IPv4 uses 32-bit (four-byte) addresses, which limits the
address space to 4,294,967,296 ( ) possible unique
addresses. However, some are reserved for special purposes such
as private networks (~18 million addresses) or multicast addresses
(~270 million addresses). This reduces the number of addresses
that can potentially be allocated for routing on the public Internet.
As addresses are being incrementally delegated to end users, an
IPv4 address shortage has been developing. However, network
addressing architecture redesign via classful network design,
Classless Inter-Domain Routing, and network address translation
(NAT) has contributed to delay significantly the inevitable
exhaustion.
• This limitation has stimulated the development of IPv6, which is
currently in the early stages of deployment, and is the only long-
term solution.
IPv4
• IPv4 Addressing Notation
• An IPv4 address consists of four bytes (32 bits). These
bytes are also known as octets. For readability purposes,
humans typically work with IP addresses in a notation called
dotted decimal. This notation places periods between each
of the four numbers (octets) that comprise an IP address.
For example, an IP address that computers see as
• 00001010 00000000 00000000 00000001
• is written in dotted decimal as
• 10.0.0.1
• Because each byte contains 8 bits, each octet in an IP
address ranges in value from a minimum of 0 to a maximum
of 255. Therefore, the full range of IP addresses is from
0.0.0.0 through 255.255.255.255. That represents a total of
4,294,967,296 possible IP addreses.

IPv4
Classes of IP Addresses, IP Broadcast and IP Multicast
IPv4 Address Classes
• The IPv4 address space can be subdivided into 5 classes - Class Leftmost Start Finish address
Class A, B, C, D and E. Each class consists of a contiguous bits address
subset of the overall IPv4 address range.
With a few special exceptions explained further below, the
values of the leftmost four bits of an IPv4 address
determine its class as follows:
• A 0xxx 0.0.0.0 127.255.255.255
All Class C addresses, for example, have the leftmost three
bits set to '110', but each of the remaining 29 bits may be B 10xx 128.0.0.0 191.255.255.255
set to either '0' or '1' independently (as represented by an x
in these bit positions):110xxxxx xxxxxxxx xxxxxxxx
xxxxxxxx Converting the above to dotted decimal notation,
it follows that all Class C addresses fall in the range from C 110x 192.0.0.0 223.255.255.255
192.0.0.0 through 223.255.255.255.
• IP Address Class E and Limited Broadcast
• The IPv4 networking standard defines Class E addresses D 1110 224.0.0.0 239.255.255.255
as reserved, meaning that they should not be used on IP
networks. Some research organizations use Class E
addresses for experimental purposes. However, nodes that E 1111 240.0.0.0 255.255.255.255
try to use these addresses on the Internet will be unable to
communicate properly.
• A special type of IP address is the limited broadcast
address 255.255.255.255. A broadcast involves delivering
a message from one sender to many recipients. Senders
direct an IP broadcast to 255.255.255.255 to indicate all
other nodes on the local network (LAN) should pick up that
message. This broadcast is 'limited' in that it does not reach
every node on the Internet, only nodes on the LAN.
• Technically, IP reserves the entire range of addresses from
255.0.0.0 through 255.255.255.255 for broadcast, and this
range should not be considered part of the normal Class E
range.
IPv4
• Address space exhaustion:
• Since the 1980s it has been apparent that the number of
available IPv4 addresses is being exhausted at a rate
that was not initially anticipated in the design of the
network. This was the driving factor for the introduction of
classful networks, for the creation of CIDR addressing,
and finally for the redesign of the Internet Protocol, based
on a larger address format (IPv6).
• The accepted and standardized solution is the migration
to IPv6. The address size jumps dramatically from 32 bits
to 128 bits, providing a vastly increased address space
that allows improved route aggregation across the
Internet and offers large subnet allocations of a minimum
of 264 host addresses to end-users. Migration to IPv6 is
in progress but is expected to take considerable time.
Internet Protocol Version 6 (IPv6)
• Internet Protocol Version 6 (IPv6) is a new suite of
standard protocols for the network layer of the Internet
defined by IETF to replace the current version of Internet
Protocol version 4 (IPv4). IPv6 is also called as Next
Generation Internet Protocol or IPng.
• IPv6 is designed to be an evolutionary step from IPv4. It
is a natural increment to IPv4. It can be installed as a
normal software upgrade in internet devices and is
interoperable with the current IPv4. Its deployment
strategy is designed to not have any flag days or other
dependencies. IPv6 is designed to run well on high
performance networks (e.g. Gigabit Ethernet, OC-12,
ATM, etc.) and at the same time still be efficient for low
bandwidth networks (e.g. wireless). In addition, it
provides a platform for new internet functionality that will
be required in the near future.
IPv6
• IPv6 describes rules for three types of addressing: unicast (one host
to one other host), anycast (one host to the nearest of multiple
hosts), and multicast (one host to multiple hosts). Additional
advantages of IPv6 are:
• Options are specified in an extension to the header that is examined
only at the destination, thus speeding up overall network
performance.
• The introduction of an "anycast" address provides the possibility of
sending a message to the nearest of several possible gateway
hosts with the idea that any one of them can manage the forwarding
of the packet to others. Anycast messages can be used to update
routing tables along the line.
• Packets can be identified as belonging to a particular "flow" so that
packets that are part of a multimedia presentation that needs to
arrive in "real time" can be provided a higher quality-of-service
relative to other customers.
• The IPv6 header now includes extensions that allow a packet to
specify a mechanism for authenticating its origin, for ensuring data
integrity, and for ensuring privacy.
• IPv6 Addressing Notation
IPv6
• IP addresses change significantly with IPv6. IPv6 addresses are 16 bytes (128 bits)
long rather than four bytes (32 bits). This larger size means that IPv6 supports more
than
• 300,000,000,000,000,000,000,000,000,000,000,000,000
• possible addresses! In the coming years, as an increasing number of cell phones,
PDAs, and other consumer electronics expand their networking capability, the smaller
IPv4 address space will likely run out and IPv6 address become necessary. IPv6
addresses are generally written in the following form:
• hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh
• In this full notation, pairs of IPv6 bytes are separated by a colon and each byte in
turns is represented as a pair of hexadecimal numbers, like in the following example:
• E3D7:0000:0000:0000:51F4:9BC8:C0A8:6420
• As shown above, IPv6 addresses commonly contain many bytes with a zero
value.Shorthand notation in IPv6 removes these values from the text representation
(though the bytes are still present in the actual network address) as follows:
• E3D7::51F4:9BC8:C0A8:6420
• Finally, many IPv6 addresses are extensions of IPv4 addresses. In these cases, the
rightmost four bytes of an IPv6 address (the rightmost two byte pairs) may be
rewritten in the IPv4 notation. Converting the above example to mixed notation
yields
• E3D7::51F4:9BC8:192.168.100.32
• IPv6 addresses may be written in any of the full, shorthand or mixed notation
illustrated above.
IPv6

• IPv6 Address Types


• IPv6 does not use classes. IPv6 supports the following three IP
address types:
• unicast
• multicast
• anycast
• Unicast and multicast messaging in IPv6 are conceptually the same
as in IPv4. IPv6 does not support broadcast, but its multicast
mechanism accomplishes essentially the same effect. Multicast
addresses in IPv6 start with 'FF' (255) just like IPv4 addresses.
Anycast in IPv6 is a variation on multicast. Whereas multicast
delivers messages to all nodes in the multicast group, anycast
delivers messages to any one node in the multicast group. Anycast
is an advanced networking concept designed to support the failover
and load balancing needs of applications.
Internet Protocol Version 6 (IPv6)
• Mobile IPv6:
• Mobile IPv6 allows an IPv6 node to be mobile - to
arbitrarily change its location on an IPv6 network - and
still maintain existing connections. When an IPv6 node
changes its location, it might also change its link. When
an IPv6 node changes its link, its IPv6 address might
also change in order to maintain connectivity. There are
mechanisms to allow for the change in addresses when
moving to a different link, such as stateful and stateless
address autoconfiguration for IPv6. However, when the
address changes, the existing connections of the mobile
node that are using the address assigned from the
previously connected link cannot be maintained and are
ungracefully terminated. The key benefit of Mobile IPv6
is that even though the mobile node changes locations
and addresses, the existing connections through which
the mobile node is communicating are maintained.
Internet Protocol Version 6 (IPv6)

• IPv6 Features:
• New header format
• Large address space
• Efficient and hierarchical addressing and faster
routing infrastructure
• Stateless and stateful address configuration
• Mobile support (Mobile IPv6)
• Built-in network layer security
• Better support for QoS
• New protocol for neighboring node interaction
Congratulation

END

You might also like