WMN Book
WMN Book
g Objectives...
f=) To understand Basic Concept of Wireless and Mobile Networks
@) To learn Basic Concepts of PCS and GSM
{™) To study Typical PCS and GSM Network Architecture
{®) To learn Handoff and Roaming
{®) To understand Concept of Mobility Management and Network Signaling
INTRODUCTION
Wireless and mobile communication networks have tremendous success in today’s communication
market both in general or professional usage.
Wireless refers to a communications, monitoring or control system in which electromagnetic waves
carry a signal through atmospheric space rather than along a wire.
The evolution of radio and mobile core network technologies over the last two decades has enabled
the development of the ubiquitous Personal Communication Services (PCS).
A PCS can provide the mobile user with voice, data and multimedia services at any time, any place
and in any format. The ultimate goal is to provide a PCS, which will move information of all kinds te
and from people in all locations, through an advanced wireless network supporting a wide range of
Services. RAS AN
'SM stands for Global System for Mobile Communication \\t isa
i clgitsl cellular technology used for
anismitting mobile voice an
and data services. — at
———_——
GSM Communication is a wireless communication system that uses digital cellular radio,
communication to provide “voice, data and “multifiiedia | applications ~cOmmunication services.
It
coversWide aréa ofrange of mobility.
A GSM system co-ordinates the communication between mobile telephone units (mobile stations),
base stations system (cell cites) and switching systems (MSC or MTSO),—____
rhe bandwidth of each GSM radio channel is 200 KHz wide and which are fi
ames that hold and rime slots. GSM was original named as (Groupes pe
The Personal Communication Service (PCS) is a high frequency, low‘power, §
mobile communication system, It mainly operates within the rangeoh\. 1800 to1900 MHz.
Sa —
" X honing A057 The roaming service should be greatly expanded to provide universal
y's
__ 2 Diverse Environment: Users must be able to use the PCS in all types of environment. For example,
commercial, residential, mountains and recreational areas.
__& Wariots ‘Bize: With PCS, there will be a mix of broad types of cell sizes. The picocell for low
applications, the microcell for lower-power outdoor pedestri
Fai ta
Strian
z application. The
rs vehicular applications and super macro
cell with ati :
1,PCS provides a low pow = — -
» elephone Network (PSTN),
The user should be via access Connection to the Publi¢
. if _ having to recharge
its battery. try the handset outside without
5. FCC Frequency locatioi The
Allocation, FCC frequene ¥ allocation f or ot oad
20 PCS usa
f Seen ove another 20 MHz
a oe for untcenee? oneal
pie is three times the spectrum currently allocated
Advantages
of PCS:
© PCS offe
a numb
rs er of advantages over traditional cellular
communieati
htweight Phones Cations:
s be tailored to each j with advanced
customer, features such as paging
em acre
; goyama:- and owe doppd ae
nly Integrated Voice and «....°
ersonal Communications Services (PCS) refers to a wide variety of wireless access and personal
mobility services provided through a small terminal, with the goal of enabling communications at
any time, at any place and in any form.
* Business opportunities for such services are tremendous since every person (not just every home) 2
could be equipped as long as the service is fairly inexpensive. ass
“i Meet of them are connected to the public switched telephone network(PSTN) to provide access to
land line telephones. =
= PCS technologies have grown rapidly in the telecommunications industry. Two of the most popular
ee High-Tier Cellular telephony, Cordless and low-Tier PCS telephony.
* These techMologies have similar architectures,as shown inFig.1.1. S eS
oy vf = i oe
c.
5 £
—_ — t
_ a
—
, .
Os) se | = 7
=~ OH i
Sue“<3 |
‘ 3
- - BTS -
2 BTS|-P{BSGH
nN = well | [ers = wre
aoe i / | —
— | E PSTN ey z
Dd
PCS use Mobile Stations (MSs) to communicate with the Base Stations (BSs) in a PCS network. MS is
Wa pty
ee i.
Example:
Subscriber unit: Wireless local loop. |
\ FORIDIE:Tow-tier systems ACS). “i
Mobile Station: GSM system, .
Wireline Transport Network: via la
etwork (core OF backbone network)
The base stations usually reach the wireline transport 7 tailo 8 pecial switch
links or dedicated microwave links. is 4
connected to the base station
The Mobile Switching Center(MSC)
mobile applications. c is conn
The
AXE switching platform.users.
The Ericsson MSC is based on csits users and the wi line TRE”
provide services between the\P
the locations of mobile stations.
mobility databases to track ; —
:
ple: =a
es ‘os nae 2
MSC modified from Lucent Technonologi EW &
The Lucent SESS MSC 2000 is an platf orm is based its
D900/1800/1900 GSM switch
The Siemens
Switching System) platform.
GSM NETWORK AR
CHITECTURE te chnology used fory
)
di gi ta l ce ll ul ar
Communicatio—— n. I tis a
sta nds for Glo bal Sys tem for Mobile .
GSM ———
7 e ee
* In recent years their size has fallen dramatically while the level of functionality has greatly
increased, A further advantage is that the time between charges has significantly increased.
* A further advantage is that the time between charges has significantly HACTEASEG: There
are a
number of elements to the cell phone, although the two main elements are the main hardware and
the SIM.
* The hardware itself contains the main elements of the mobile phone including the display,
case,
battery, and the electronics used to generate the signal, and process the
data receiver and to be
transmitted] it algo contains a mimber known as the International Mobile Equipment
Identity (IMEI).
* This is installed iii the phone at manufacture and "cannot" be chan
It isged.
accessed by the
network
——
during registration to check whether the equipment has been
reported as stolen.
* The SIM or Subscriber Identity Module contains the information
that provides the identity of the
user to the network.
It contains are variety
fntemnational Mobile Subscriber Identity (IMsiy7of information including a number known as the
2, Kase Station Subsystem (BSS);
~* The Base Station Subsystem (BSS) section of the GSM
network architecture that is fundamentally
associated with communicating with the mobil
es on the network.
* Itconsists of two elements:
Zs Base Transceiver Station (BTS):
° The BTS used in a GSM network comp
rises the radio transmitter receiver
antennas that transmit and receive to s, and their associated
directly communicate with the mobiles.
* The BTS is the defining element for
each cell. T he BTS communicates
‘ interface between the two is known as with the mobiles and the
the Um inte Tface with its associated prot
ocols.
Base Station Controller (BSC):
* The BSC forms the next Stage back into the G
SM network. It controls a group
located with one of the BTSs in its group. of BTSs, and is often co-
Coit es the radio resources and controls items su
-
Zee Switching Subsystem (NSS);
* The GSM system architecture con
tains a variety of different ele
network, ments, and is often termed
the core
* It provides the main con
trol and interfacing for
within the core network inc the whole mobile networ
lude: k, The major elements
(i) Mobile Services Switching Ce
ntre (MSC):
1.6
(ii) Home Locati
on Register (HLR);
This database contai
tain : og
information about each subscriber te
known location, In 5 all the administrative
MS. way, the GSM network is able to route calls to the ee , ON
and from this
* Wh
: = user switches on their phone, the phone registers with the Las :
that ine? rep
to determine which BTS it communicates with 80
appropriately. Even when the phone is not active (but switched =
ri ou s gu b-centers t0 for
ross V4
ensure that the network (HLR) is aware of its latest position.
tributed
twork, although it may be dis
There is one HLR per ne
® idu al
operational reasons, f o r t he indiv
R):
ate d
cte services
Re gi st er (VL
(iii) Visitor Location from the HL R tha t ena ble s thes
part of
ai ns sel ect ed information 7 sed 4 an |integral
° This co nt t.
to be pr ov id ed . is co mm on ly
fas “ more C onvenien
subscriber , but" it ad e
im pl em en t ed as a separate entity is
The VLR can be enti ty. In this
way access
dge of
without any knowle
*
tha n a sep ara te
the MSC, rather y ro ut ed :
(GMSC):
Switching Centre initial awh
(iv) Gatewa y Mo bi le
ME te rm in ating call is Nu mber) from the
HLR
e po in t to wh ic h a Sio n go am in g
¢ The GMSC is th d
aoFE “asyan routing the
the MS's location.
ob
N (M(MoD!
SRRN il or y y
in ch ar ge of obtaining the/MS ia a = : re
thus
« The GMSC is e Station ISDN
umber the
y
based on the
MS IS DN (M ob il
. i. op er at io n do es not require an
y op e
t visited MSC. ding, since th
e gatewa
call to the correc SC is mi sl ea
of the term GM
e The "MSC" part
C. ;
linking to an MS age —
wa y (S MS -G ): ti ve ly de sc r! be the two Short Mess
(v) SMS Ga te used to coll ec
or SM S ga te wa y is the term that is ga te wa ys ha n dle messages directed in
* The SMS-G rds. The two
Ga te wa ys de fi ne d in the GSM standa
services
different directions
.
y Mo bi le Sw i tch ing Cen tre) is for short messages
tewa
rt Message Service Ga Switching
» The SMS-GMSC (Sho
s- IW MS C (S ho rt Me ss ag e Service Inter -Working Mobile
being sent to an ME. The sM ate d wit h a mob ile on that S- network. provides a siyed acti 1
es ori gin MSC
Centre) is used for short mes to that of the GMSC, whereas the SM IW
sag
is sim ila r
+ The SMS-GMSC role
Centre.
point to the Short Message Service
can also connect to public dat
(vi) IWF: Using Additional Interworking Function, MSC atnneiwers :
(OSS):
4, Operation and Support Subsystem
« « The OSS or operation support sub system i
is an elem esas
arch it
that ec
is connec tedtu re
to compon ents of the NSS and e aBSC. the overall (Gea
e It is used to control and monitor th
load of the BSS. © overall GSM network and it is also useded to control the traffic
d
Scanned with Camecanner
e
_ Wirel
and Mobile
ess Network 47 _Basica of PCS and GSM. |
¢ ach mobile equipment has a number known as the International Mobile Equipment Identity. This
number, as mentioned above, is installed in the equipment and is checked by the network during
registration.
* Dependent upon the information held in the EIR, the mobile may be allocated one of three states -
allowed onto the network, barred access, or monitored in case its problems. |
(ii) Authentication Centre (AuC):
e The AuC isa protected database that contains the secret key also contained in the user's SIM card.
* “Itisused for authentication and for ciphering on the radio channel.
(iii) Operational Subsystem (OMC): _
* Monitors and maintains the performance of all other entities such as MS, BS, and BSCIOMC
is>
Responsible for traffic monitoring, subscriber and security management, Accounting and Billing.
GSMNetworkinterfacess =|“
= =
_-~ The different interfaces used to provide communication between various elements in a GSM cell
phone network The network structure is defined within the GSM standards.
* Additionally each interface between the different elements of the GSM network is also defined. This
facilitates the information interchanges can take place.
* Italso enables to a large degree that network elements from different manufacturers can be used.
However as many of these interfaces were not fully defined until after many networks had been
deployed, the level of standardization may not be quite as high as many people might like.
i. ) Um Interface: The “air” or radio interface standard that is used for exchanges between a mobile
(ME) and base station (BTS / BSC). For signalling, a modified version of the ISDN LAPD, known as
|
LAPDm is used. _ AM
2., Abis Interface: This is a BSS internal interface linking the BSC anc.s BTS,
$d it has not been
totally standardised. The Abis interface allows control-of the radio eqlipment and radio
frequency allocation in BTS. ae r oe
4 A Interface: The A interface is used to provide communication
between th BSS and the MSC.
Interface carries information to enable the channels,
timeslots and the like to be allocated to the
mobile equipments being serviced by the BSSs. The messaging required
within the network to
enable handover etc to be undertaken is carried over the\interface.
4. B Interface: The B interface exists between the a and the VLR .\It uses protocol known as the
MAP/B protocol. As most VLRs are collocated
With an
MSC, this makes interface purely an
“internal” interface, The interface is used
whenever the MSC needs access to data
located in its area, regarding a MS
Cc
5. C Interface: The C interface is located
between on HL and a GMSC ora SMS-G\
S eses f, ii outside network, |e, from
originat , ; When a call
PSTN or arlother mobile; network itahs es
gateway so that routing information required to pass through
to complete the call may be
used for communication js MAP/C, gained, The protocol
the letter "Cc" indicating that th
interface, In additi fla Mat, , tee
'€ protocol is used for the "cr"C
errata ted andto this, MSC may
the call is comple optionally forward billing information to the HLR after
cleared down. CS)
6. D Interface: The D int
erface js situated betw
excha
nge data related to the location of th een
ba LR and HLR\ It /D 1
e ME and to the man uses é subscr
AP (Dil piptacelty
7. E Interface: The E inter \nagement of thé subscriber,
exchanges data related pec
_ here oh besp
protocol. er Detween the anchor and e, re i y MSCecenaing the tare
s using the MAP/E —_——
OA RLS
Scanned with CamScanner
| Mobile Network
i
terface: The F interface
is used between ai MSC and EIR,
communications along this interface are used to Co
access to the network, ikea ee
9. G Interface; The G interface interconnects two VLRs of different Mscs|and uses the
Protocol to transfer subscriber information, during @&- | eprocedure,
10. H Interface: The H interface exists between the MSC the SMS-G, It transfers short messages.
uses the MAP/H protocol. Bre igh t
11, Interface: The | interface can be found between the MSC and the ME. Messages exchanged
g,
the l interface are relayed transparently through the ss
}
if
NSS ed 1 i as Si
é
set ,’ [GMSGM—'SDN, PSTN
i i! ¢ -" PDN
{ wr -t--a ‘i ee ite
te as |
|
Downlink: 1805 MHz to 1880 MHz, ee
Absolute Radio Frequency Channels (ARFCN)-374.
Pcs 1900; seh eS
Uplink: 1850 MHz to 1910 MHz. ~<
Downlink: 1930 MHz to 1990 MHz. > Q a
Absolute Radio Frequency Channels (ARFCN)-299. Ss ~
{ fe
eGSM uses TDMA andF FDMA whereby the available 25 MHz spectrum is partitioned in to 124
iers (carrier spacing=200 KHz) and each carrier in turn is divided in to 8 time slots(radio
channels). —[S=__
e Each user transmits periodically in every eighth time slot in the uplink radio carrier and receives
in
a corresponding time slot on the down link carrier.
* The several conversations can take place simultaneously at the same pair of transmit/receive radio
frequencies. The radio parameters for GSM are summarized in Table 1.1,
Table 1,1
Sr. No. Parameter Specification —
1. Reverse channel frequency 890-915MHZ
2. Forward channel frequency 935-960MHZ
EF ARFCN Number 0 to 124 and 975 to1023
4. Tx/Rx frequency spacing 45 MHZ
5. Tx/Rx Time slot spacing 3 Time slot
6. Modulation data rate 270.833333kbps
tk Frame period 4,615ms
8. User per frame 8 > y
9. Time slot period 576.9microsecond Coys
10. Bit period 3.692microsecond = ——— S
11, Modulation 0.3GMSK
12. ARFCN channel spacing 200 kHz
13. Interleaving 40ms
| _ 14. Voice coder bit rate 13.4kbps
2) GSM Services
. ;
GC SM provides hale) services for "es and data. There are three ypes of services delivered by a
GSM system as, Teleservices, Bearer (or data) services and Suppleme
ritary ISDN services.
They also include subservices, The various services offered by aa GSM system are as under:
1. Telephone Services:
Standard mobile telephone, Mobile-originated
* Base-originated traffic, emergency
calling
* Fax, Videotext |
E rrr .
Scanned with CamScanner
wireless and Mob!
oo
Scanned with CamScanner
se> ‘\
<
\8 oO a
0 TT on: aa iii Baofsi
PCS cs
and GSM x
A pear
. GSM Control Channel (CCH =
a
tn cate link layer is formatted for the data burst bits. The 184-bits are added
after 40 party bits, four bits and 224 hold convolution coding bits to result in the 456-bit packet. no) |
« There are three main types of control channels in the GSM system. They are: (1) Broadcas
t channel
(2) Common control channel (3)Dedicated control channel,
\ Broadcast Channel (BCH):
e Broadcast Control Channel (BCCH):The BCCH is a forward control channe
l that is used to broadcast
@ ; ation such as cell and network identity, operating characteristics of the
cell (current control
channel structure, channel availability and congestion). The BCCH also
broadcast a list of channels
that are currently in use within the cell.
@ * Frequency Correction Channel (FCCH): The FCCH allows
each subscriber unit to synchronize its
internal frequency standard (local oscillator) to the exact freque
ncy of the base station.
ey Synchronization Channel (SCH): SCH is used to identify
the serving BS while allowing each mobile
to frame synchronizes with the BS. The Frame Numbe
r (FN) is sent with the base station identity
code (BSIC) during the SCH burst,
on Control Channel (CCCH);
Paging Channel (PCH): The PCH provides paging
signals from the BS to all mobiles in the cell, and
tifies a specific mobile of-an ‘incoming call whic
h originates from PSTN, PCH may be used to
provide cell broadcast ASCII text messages to all subscriber
s.
Cy
LD) * Random Acceeess Channel (RACH): The RACH
: is a reverse link channel used by a subscrib
er unit
acknowledge & —— to
page——
from the PCH r
and ise
also m
used by mobiles to originate a call.
ae
Access Grant Channel (AGCH): The AGCH is used by
Ley
in GSM System:
I practice, a multimode terminal used b
y a third generation (3G) mobile
network will have to communication system
scan for s uitable frequency band or channel, identify
Standard and select from application radio and
among the set or available services
If it develops at a very ,
large num ber of frequency ban
need to be searched ds need to be scanned and the man
registerin g such a roaming mul y standards
timode terminal by means of systematic
a i
tem
/i ; fl. this section we study we study messag
es and processing
Mti} Messag
Thees type
in s Gsmof: messages to be transmit
lf ted over the Reverse control
es s
chann el are Page re; =P OD
message, origination mess message.
age, order confirmation
* message and older fixed
; All messages contain an application message header, mandatory seen Mandatop
if , l variab
variable parameters, remaining length and optica "
le parameters
H i * The Mobile Station call processing in GSM
consists of the following four types:
bel 4] 1. Mobile station initiation state.
HA 2. _—s
Mobobl
ile statio
e sta tionn idl
idle
i i e Sta
state.
te.
3; System access state
a
i 4. Mobile station control on the traffic cha
nnel state. - ot
\{
| @
i |
1 1
Bsc MSC [——)| cGmsc
7 7 ?
ahi? 2/}2
i
a a
os ee tit
SJ) Fig. 1.3: Mobile Call Origination
in Gsm
Mobile Call Origination in GsM:
7"
Scanned with CamScanner
Fig. 1.4: Mobile Call termination in GSM ’
Mobile Call Termination:
The PSTN user dials i MSISDN ofithe called user in GSM.
/
The LE routes the call to the GMSC of the called GSM user.
The GMSC uses the dialed MSISDN to determine the serving HLR for the GSM user and interrogates it
to obtain the required routing number.
The HLR requests the curr serving VLR for the called MS for a MSRN (MS roaming number) so that
—> <= ——— a
MOBILITY MANAGEMENT
eS management is one of the major functions of a GSM or eS network that allows mobile \
phones to work. we = oe
¢ The aim of mobility management is to track where t he subscribers.are, allowing calls, SMS and
other mobile phone services to be delivered to them.
—~
: 5
i —— GS
scanned with CamsScanner
Wiraless and Mobile Network 11s Bas
of PCS
ic andsGSM
Roaming
+oamin
* g is one of the fundamental mobility management procedures of all cellular networks.
* Roaming is defined as the ability for a cellular customer to automatically make and receive voice
calls, send and receive data, or access other ces, including home data services, when travelling~
outside the geographical coverage area of the home network, by means of
using a visited network.
* This can be done by using a communication terminal or else just by using the subscriber identity in
the visited network. Roaming is technically supported by a mobility management, authentication,
authorization and billing procedures.
Types of Area:
q
= aS
&® Se
* The different types of area in wireless and mobile network are Location
area, Routing area, Tra ing
area. —_
}
ite
scanned with CamsScanner
cking
ting area. A trai mn
: —— ‘ a n be
ea
alley
grouped into l i s t of tracking
oft areas
aioe Sndlibou
(TA ists), which can n be
Snowe Equipment(ug).
Tracking &rea updates are
Not included in its
en
performed
ee
odically or when the UE moves to a tracking
area th
ml
TA list, peri
4 Operators can allocate different TA ferent UEs. This can
avoid sign
ane a
lists to diffe Peaks in
Conditions for instance the UEs of passengers
simultaneously of a train may not p erform tracking area up da
wo aiitt Retwork side, the involved element is the nity Man
Mi agemen
a Configures TA lists using Mobility Man men t Entity (MME), »
Nas messages like Attach Accept, TAU Accept or GUTI Rez
Mand.
CS system
(@.g., thes ys
the system in Los Angeles), the tem in New York Ci
syste mM should be
in fo r,
ty) to another (eg:
Otherwise it would be impossible med of the
to de liver the Serv current loca
ices to the Mo tion of the
bi le user. user.
disconnected, and 4 radio link to the new BS should be established to continue the conversation, ,
* This pr variously referred to as automatic link transfer, handover or handoff, Three
piorlss have been proposed to detect the need for handoff namely, Mobile - Controlled Handoff
(MCHO), Network-Controlled Handoff (NCHO) and Mobile-Asslsted Handoff (MAHO
),
1, Mobile-Controlled Handoff (MCHO);
* The MS continuously monitors the signals of the surrounding B85
and initiates the handoff process
when some handoff criteria are met.
* MCHO is used \n(DECT dnd Pacs,
2, Network-Controlled Handoff (NCHO):
* The surrounding BSs measure the signal from the MS, and the
network initiates the handoff procese,
when some handoff criteria are met,
* NCHO is used in CT-2 Plus and Amps en ee | 6 F
aw aa po ot. eee
3. Mobile-Assisted Handoff(MAHO): 4 9
* The network asks the MS to measure the signal from the surro . FR
unding 884. The network makes the
handoff decision based on reports from the MS.
* MAHOis used in GSM and IS-95 CDMA.
Two Typeof Hando
sff: —
1 The BSs involved in the handoff may be connected
to the sare MSC (inter-cell handoff or inter-
BS handoff)
2, The BSs involved in the handoff may be connected to
two different MCSs (intersystern handoff or
inter-MSC handoff)
Inter-BS Handoff:
The new and the old BSs are connected to the sarne MSC. Assume that the need for
detected by the MS. The following actions are taken: handoff {s
1, The MS momentarily suspends conversation
and initiates the handoff procedure by signaling
an idle (currently free) channel in the new BS. on
Then it resumes the conversation on the old
2 Upon receipt of the signal, the MSC transfers the BS.
encryption information to the selected idle
channel of the new BS and sets up the new conversation
path to the MS through that channel.
The switch bridges the new path with the
old path and informs the MS to transfer
channel to the new channel. from the old
3. After the MS has been transferred to the new # 5, It signals the network, and resumes
conversation using the new channel.
4. Upon receipt of the handoff completion
signal, the network removes the bridg
and releases resources associated e from the path
with the old channel.
This handoff procedure is used with the mobile
controlled handoff strategy.
o-@ O
i =|
i ! 1
| {
A K A
'
KA f b
' \
‘ j
New BS 1 Sige ion 08 aio 8° OWBg.
~
OldB
oa - > New
as ip
(8) Step1
meen 2 (4) Step 4 (a) Step4
Fig. 1.6, ;: Inter-B5 link transfer
rate channels.
Intersystem Handoff:
\ g x
‘ 9
Ly swe stp
(HLR)
SCP : Service Control Point
STP ; Signal Transfer Point
SSP : Service Switching Point
Trunk
lll
Scanned with CamScanner
. ig em 1.22 TCs ng
net Shows the network elements that are involved in the interconnection between
rk an
representa en
tr _ © PSTN. In the fig the dashed lines represent the signaling links, the Solig a
Thes
87 network Consists of three distinct components ’
namely, Service Switching Point (Sspy ;
1, Point (st p) 4nd Service Contro
l Point (SCP).
ice Swi Point(ssp);
eee Switch interconnected by $87 links. The SSPs perform call processing oy, cally
A .
iigae u. “oO
oe os -
ec -
gh = agess
cia
¢ ce” “ @ mo : N (HLR4 )
Cd
£ sf
‘SON
c
Se é Global ‘ \
4 f title Nay
¢ at translation
é ’
/ STP2 —
>| STP3
‘ @) (3) } STP4
/ - I
|
\
\
VLR) LR2) 3
MSC1 s MSC2
ee —
SS
Fig. 1.12; Registrati
on through ss7
Registration:
e Inthis example, the MS moves from VLR1 to VLR2
Step 1: The MS enters the area controlled by MSC2
.Msc2 launch ‘agi
through STP2,assuming that VLR2 and MSC2 are not co-located, &8 @ regis trati:on query to its VIR
Step 2: VLR2 sends a registration message to the MS's HLR.
HLR. Instead,VLR2 sends the message containing the MS identi VLR2 may not know the actual
call : add ressionof
tificat
Number(MIN),to an STP that can translate the MIN into the HLR Ss ed the Mobil e Iden
Step 3: The MIN-to-HLR address tran
slation is performed at STp3 by a
Global Title Translation(GTT). STP3 then forwards the registration fiestage table
x a -
techhniq
niq ue called
— ee ew ee ee ee ee
een
--©. , (HLR)
: 2 - Global
title e
STP3
sm ht? PSTN
@) L{2)- > STP
\
Ly XA
(HLR)
f bdrm a ~.
Discussion: wv acai)
¢ Note that implicit deregistration and periodic re-registration can be used with the cache scheme, but
the obsolete cache information may not be detected until the MS is paged,
« Since the cache information may be obsolete, some heuristics are required to determine whether the
cached information will be used to locate the MS.
* One technique is to have the SSP estimate the cache hit ratio, or the probability that case 2 is true, If
the coral is high, the entry is considered “current” and is enabled; otherwise the entry is
disabled,
+ Another heuristic determines the obsoleteness of an entry based on the period that an MS resides
a VLR as indicated in the cache entry,
in
e If the cache entry indicates that the MS has stayed in a VLR for a period longer than a specified
threshold, the entry is assumed to be obsolete.
e The threshold can be adjusted in real time based on cache hit statistics, If case 3 is more likely to
| occur than case 2, then the cache scheme should not be considered.
* Performance studies indicate that the cache scheme significantly seduces the call delivery cost in
| many case.
Roaming Management for CT-2:
* Ina public environment,CT2 is a one-way calling PCS system; that is a CT2 handset can originate
outgoing calls, but cannot receive incoming calls.
* We describe how to construct two-way calling mechanism in to CT2.As we will demonstrate later,
introducing roaming management for CT2 is expensive.
« Nevertheless, this introduction provides a model so that the reader can understand the design
complexity required to implement a total mobility solution for an one-way PCS system.
Basic Public CT2 System (One-WAY calling):
* Fig. 1.16 shows basic public CT2 system.
Ct2 Control
system
The inconvenience caused by the involvement of the paging sys tem and thus for the ; re,
nati e. A and B use CT2 handsets in different CT2 systems it is imposs ible to connect the cay,
if both
~at-a-Junction cT2 i
. An advanced cr2 System (Two-Way Calling): ction” approach to pr ovide th € call dey
capability, System may follow the “meet-at-a-jun
“me Veren
.
ang CT2 architecture for this approach js illustrated in Fig. 1,16.
. 7
this approach, the cr2 service area is partitioned in to several location areas.
“<All
location area are connected to an area controller.
same Switched Data Network (PSDN) all area controllers are con me,
° BSs in thethe Public
Through o the data
called the location reg
ister.
Area
controller
Fig. 1.17: Meet-at-a-junction architecture
Signaling ——_
Trunk ——
Call to Nr
CC] re 085-123456
oe ©
MSCL VLRI HLRL
2. MAP_UPDATE_LOCATION_AREA
”|3. MAP_UPDATE_LOCATION
4. MAP_UPDATE_LOCATION_ACK
5, MAP_UPDATE_LOCATION_AREA_ack
le.MAP_CANCEL_LOCATION
Two Issues of Gsw bil ‘ Inter-VLR registration message flow
ent
4, MAP_PROVIDE_RO
AMING_N
5. MAP_RESTORE pa
ra
5.MAP_Res TORE_DATA-ac
k
6
6 wINSERT
a; MAP_SEND _SUBSCRIB
ROUT; NG ~' ER DATA_ack
NFORMATIOn
ack
5. ISUP Lay
9 Ot
NEO FOR N
hs sopacmaR
10. MAP_SEAR
CH FoR 14
12.MAP pp
, the data in the backup are reloaded into the HLR. An Uncovered Peri
i
the last backup operation and before the restart of the MLR.
step 4: The HLR sends an $87 TCAP message MAP_RESET to the VLRs where its MSs are located.
Step 2: All the VLRs derive all MSs of the HLR. For each MS, they send an $S7 TCAP message,
the HLR.
MAP_UPDATE_LOCAtoTION,
The HLR restoration procedure is not robust. - An MS may move into a VLR (which does not have any
other MSs from the given HLR residing) during the uncovered period. ~ The new location Is not :
known to the HLR at the last check-pointing time.
If'so, the HLR will not be locate the VLR of the MS during Step 1 of HLR restoration. VLR Identification
Algorithm is to solve the problem,
):
algorithm (VIA) (1/3description,
To simply the we assume that every VLR covers exactly one MSC. To implement VIA,
extra data structures are required.
In the backup, the extra data structure is a set VLR_List* of VLRs that have been modified during the
uncovered period. After an HLR failure, the HLR only needs to send the MAP_RESET messages to VLRs
eee eee ee ee ee eee eee ee eee
4 ! Cis]
1 HLR*
:' VLR_List® | HLR VLR_Counter
| Ms VLR '
1
vir |! MS | PVLR| ts | VLR VLR | Count
,
i
'
Vv, ' Vv,
4 \
‘ \
‘ 1
V2
V2
‘
1
'
;
1
Va V3
i
‘ Va
4 Va |
'
Y\ \
1
1
i \
1 Backup (Non-volatile storgae) \ fo
J
|
}
VIA Procedure 3: Restore
Step 1: TS <- current time;
Step 2;
for (every location entry p in HLR){
HLR[p).PLVR = HLR[p].VLR <- HLR[p]*. VLR; HLR[p).ts <- TS:
}
Step 3:
for (every VLR entry VinVLR_List*){
Send an SS7 TCAP
M, _RESET Message
VLR Overflow Control: to y.
. ne es of records in the
VLR can
Betisivcusins€ corre: call
eee i a
be larger than that a Ti
in eei that the number © .1!
. When a VLR is full, the :
> incomin a short p e r ; and th
. Problem, overflow & Mobilei users Period, erflom
control algorithms
0-1, o-17 Hee oN mat
An extra flag (1 bit) is required "egister using the reciahue
Overflow in the HLR rec ! /and 0.
solve #
Registration Operation: are pres “istration. a
* Fig. 1.27 shows overflow oe
registration read
Peration
scanned with Camscanner
‘Wireless and Mobile Network 1.35 of PCS and GSM
Basics
Step 2
Fig. 1.27 : Overflow registration operation
Algorithm 0-1: Registration
Step 1; Registration Request;
Step 1.1: Same as step 1 of the normal registration procedure
Step 1.2 : V2 is full. V2 follows a replacement policy to select a record to be deleted (u2in Fig. 1.28).
The storage for the delete record is used to store u1's information. The selected user (i.e., u3) is called
overflow user. The replacement policy may be based on various heuristics
Step 1.3 : V2 forwards the registration request to the HLR with indication that u3's record is delete
due to database overflow Cont.
Step 2; Registration Response:
Step 2.1: HLR update the location of u1, and sets the overflow flag in u3's record
Step 2.2: HLR acknowledges the registration operation and sends 1's profile to V2.
Step 2.3 V2 sends an acknowledgment to MS
Cancellation Operation with Overflow VLR
seaseeiower
: NFO.
AUTGOING CALL_2ck |
* (een
4 MAP. ay LOCATIC EA_ack
Algorithm 0-1
4, MAP_UPDATE_LOCATION_AREA_ack
5. MAP SEND_INFO_FOR_OUTGOING_CALL
Dis.
Fig. 1.30: call termin
ation with overf]
Step 1 : Location query:
Step 11: The calli
a eae
"ger thanth e
the size of the datay™’
Wireless and Mobile Network 1.37 Basics
of PCS and GSM.
<i
2.1
x9
Fig. 1.31: Call termination with overflow VLR
ETWORK SIGNALING
¢ To support PCS network management, protocols such as EIA/TIA Interim Standard 41 (IS-41 also
known as ANSI-41) and Global system for Mobile communications (GSM), and Mobile Application
Part(MAP) have been defined for PCS Network (PCN) intersystem operations.
¢ Interactions between a PCN and the PSTN are addressed in four aspects namely, Interconnection
interfaces, Message routing, Mobility management and call control.
Signaling System No 7:
* PSTN isa signaling protocol. The interconnection between a PCN and the PSTN there are six types of
$$7 signaling links. es
* Two types, A-Link(access link) and D-Link (diagonal link).
D-Link 8 SS7 protocol Layers
PSTN|[PCN
a
S (A-Links)
Type 2B wth
“Eng 557 interfz ce
Office
PSTNIPCN
YV-@-—@
Step 6
* Oneof following th
ree €vents occurs:
(@) MS is connected
with another call:
* This situation is refe
rred to as call collision
Call is Processed with
call forwarding or T cal
l
(b) MS is idle:
MSC send address complete Mes
sage (ACM) to Eo, Message inform
indications, and end-to-en s EO of Ms infjenatae
d protocol requirements, 0 [a
¢ When the EO receiyes the
ACM, the 1AM timer is Stoppe
d
(c) MS does not answer the Page:
MSC returns REL message to EO,
Step 4: When MS answers call, An
answer message (ANM) is sent from
MSC to EO
Call is established through trunk path, to EO,
Step 5: EO sends a Release Message (REL) to indicate that
specified trunk is being released f off
connection. Trunk is not set to idle is bein ;
is EO until a RELEASE Complete Messag
e(RLC) eisr
Step 6: When MSC receives REL from Eo, messa :
relies with a RLC. After RLC is sent, EO a tandem ™
for 0.5 to 1 sec, before it seizes the released trunk for the next call.
sent,
Radio systems
A-bis ee
5
00000110
00000111
00001000
Dial
__MAP Service User
Service Request
pnfirm)
oe
_—
a ae ia
| PSM ,
marries
i MAP_USER}—1-4 MAP| DSM
4
bee _
OC cia
PSM tg CARS
i . FE =
res 2
ind) 4.MAMAP_OPEN(ng,
P ry)
MAP_Deso
5 BEGING
a,TeINVOKE ind)
iiMmret
‘ 5.MAP_Opey,
MAP_ Servint
, CONTINUE (req) MAP_DELIMiTe
* TC-RESULT_(req)
R
aa MAP Sen font 7, TC_CONTINUE (Ind)
MAP_DELIM ER nd _TC_RESULT-L (ind) ;
- MAP Service
—
2 (req
MAP_DELIMITER (req] 9. TC_CONTIN
UE (req)
gr
nh
. TC_CONTINUE(Ind)
Er 11. MAP_Service 9
MA
P_DELIMITER
13, TC_END(req) 12. MAP -Service2
Se
5.MMAP
AP_TcL
SERvice 14. TC_END(ind) TC_RESULT _L(req) MAP_CLOSE oq
ose man «—_Teo
1C-RESULT_L(Ind) *
Service User
to the DSM.
The DSM continues to
primitive is encoy
Scanned wi th CamScanner
Wireless and Mobile Network 1.45 Basics
of PCS and GSM
¢ The TC-* Request primitives will be delivered by the TCAP and the lower layer protocols of S$7 to the
peer MAP PM;the primitives are now of type Indication.
Step 3:
4.MAP_OPEN(Ind)
MAP_Service | (|nd)
MAP_DELIMITER (Inq)
* When the MAP PM of the dialogue responder receives the TC-BEGIN Indication, a DSM is invoked.
If
the DSM identifies any error from the received TC-BEGIN Indication, a TC-U-ABORT Request
is sent
back to the dialogue initiator to terminate the dialogue.
* The DSM also checks if the system is overloaded. The DSM issues the MAP-OPE
N Indication primitive
to its MAP service user. The DSM then encounters the TC-INVOKE Indication primitive
, which results
in the creation of a PSM.
* The PSM sends a MAP-NOTICE to its MAP service user. No error occurs,
the PSM issues a MAP- Service
1 Indication primitive to be passed to its service user, and the control is passed
back to the DSM.
* After the DSM has processed all received components, it informs its MAP
service user by the MAP-
DELIMITER Indication primitive.
Step 4:
5.MAP_OPEN(rsp)
MAP_Service(rsp)
MAP_DELIMITER (req)
* The MAP service user processes the Indication primitives received from
the MAP service provider,
and returns the results with the MAP-OPEN and the MAP-Service 1 Respons
e primitives, followed by
the MAP-DELIMITER Request primitive.
Step 5:
6. TC_CONTINUE (req)
TC_RESULT_(req)
D interface
VLR
MAP_PORV) -ROMING_NUMBER
MAP_PORUIDE_ROMIN G_
(a
NUMBER_ack
RAELEND
t+
_ROUTIN
G INFORMAT
ION ack
“Retrieval of
Fig. 1,42, Retr
routing Info
rmation>
ieval ofroutin
.
g ioninformat
ned MAP SEN EA
S=ND-ROUDTRIONUGTIINNG INFORMa
FORMaTionT PaINra Parameters
me ters
Invoke ID
M |__ mi) —} Response)
CUG interlock ae
Number of Forwardin ee : el
S
Network Signal Info e
ie
IMSI oe
Forwarding Data
a
Provider Error
| ae esl
*
7
t
Mer es number generated by th a
e MA P se Tice
in the MAP service us er-provi
der interface.
user to identi
bie fy the Corresponding
a “— service P
scanned with Camscanner
1.47 Baofsi
PCS cs
and GSM
« The General Packet Radio Service (GPRS) is a new bearer service for
GSM that greatly improves and
simplifies wireless access to packet data networks, e.g, to the Internet,
:
* It applies a packet radio principle to transfer user data packets
in an efficient way between mobile
stations and external packet data networks.
* The impressive growth of cellular mobile telephony as well
as thenumber of internet users promises
an exciting potential for a market that combines both cellular (mobile
) service and data service,
* These services when combined is known as cellular wireless
data services which can provide high-
performance wireless internet access to the users.
* Existing cellular data services do not fulfill the needs
of users and providers, From the user's point of
view, existing cellular data services lags in-data rates are too slow,
connection set up takes too long
and is rather complicated, service is too expensive for most
users,
* From the technical point of view, current wireless
data services are based on circuit switched radio
transmission. At the air interface, a complete traffic channel is
allocated for a Single user for the
entire call period.
* Incase of bursty traffic (eg. Internet traffic), this result
in highly inefficient resource utilization, It is
obvious that for bursty traffic, packet switched bearer
services result in a much better utilization of
the traffic channels.
[2.1]
2.2 GPRS and Mobile Pate Conn | "
Wireless and Mobile Network
immediately att
° This is because a channel will only be allocated when needed and will be released
can share one physical channul
the transmission of the packets. With this principle, multiple users
(statistical multiplexing).
dat a technologies have been developed,
e Inorder to address these inefficiencies, two cellular packet
far:
1. Cellular digital packet data (CDPD) (for AMPS, IS-95,1S-136) and
2. General Packet Radio Service (GPRS). a
for GSM, but can also be integrated within IS-136.GPRS is q
* GPRS was originally developed
access to packet data Networks
bearer service for GSM that greatly improves and simplifies wireless
é.g., to the Internet. 2 ;
¢ It applies a packet radio principle to transfer user data packets in an efficient way Detweeniamy
mobile stations and external packet data networks. Packets can be directly routed from the GPRs
mobile stations to packet switched networks.
Intranets)
* Networks based on the Internet protocol (IP)(eg., the global Internet or private/corporate
and X.25 networks are supported in the current version of GPRS.
Circuit
switched ! a
weeeee Signalling --- Circuit switched GSM ——— Packet switched data and singalling
Fig. 2.1 (a) : GPRS Architecture
¢ GPRS architecture works on the same procedure like GSM network, but, has additional entities thét:
allow packet data transmission.
e idi
This data network overlaps a second generation GSM network providing pack
§ packet data transp
nsport at @
rates from 9.6 to 171 kbps.
e Along with the packet data transport the GSM network accommodates multiple users to share the
same air interface resources concurrently. GPRS usually attem ts gs e twork
reuse the existing GSM n
to a
:
y P
elements as much as possible.
4
Zz eee
— “2, LL. wo OU ™@ 6 i hUTl lO ee ee
Wireless and Mobile Network 2.3 GPRS and Mobile Data Communication
BTS.
— I BTS Ly BSC
[HL
15
' pee 4
MS 1 Z ;
ed 1
I I
I !
1 ! ! I
i| FieBIS
v a ; !
1 I I
—
1 I I !
!j S 8TS zi I ! !
= \ I! I I
Um interface
' —— oy , ’ if
Abis interface Gb interface Gn Interface Gi interface
Base station subsystem GPRS network
Fig. 2.1 (b): GPRS Architecture with Network Nodes
* There are new entities called GPRS that supports nodes (GSN) which are responsible for delivery and
routing of data packets between mobile stations and external packets networks.
* There are two types of GSNs namely, Serving GPRS Support Node (SGNS) and Gateway GPRS Support
Node (GGNS).
* There is also a new database called GPRS register which is located with HLR. It stores routing
information's and maps the IMSI to a PDN (Packet Data Network) address.
GPRS Mobile Stations:
*
New Mobile Stations (MS) are required to use GPRS services because existing GSM phones do not
handle the enhanced air interface or packet data.
* These mobile stations are backward compatible for making voice calls using GSM,
GPRS Base Station Subsystem:
*« Each BSC requires the installation of one or more Packet Control Units (PCUs) and a software
upgrade.
e The PCU provides a physical and logical data interface to the Base Station Subsystem (BSS) for packet
data traffic. The BTS can also require a software upgrade but typically does not require hardware
enhancements.
© When either voice or data traffic is originated at the subscriber mobile, it is transported over the air
interface to the BTS, and from the BTS to the BSC in the same way as a standard GSM call.
¢ However, at the output of the BSC, the traffic is separated; voice is sent to the Mobile Switching
Center (MSC) per standard GSM, and data is sent to a new device called the SGSN via the PCU over a
Frame Relay interface.
GPRS Support Nodes (GSN):
* AGSN isa network node which supports the use of GPRS in the GSM core network. All GSNs should
have a GN interface and support the GPRS tunneling protocol. There are two key variants of the GSN,
namely Gateway and Serving GPRS support node.
* Twonewcomponents are added namely, Called Gateway GPRS Support Nodes (GGSNs) and Serving
GPRS Support Node (SGSN). .
1, Gateway GPRS Support Node (GGSN):
* The Gateway GPRS Support Node acts as an interface and a router to external networks, It contains
routing information for GPRS mobiles, which is used to tunnel packets through the IP based interna}
backbone to the correct Serving GPRS Support Node.
el > eo re i a i
r
Wiranc
el Mobi
e les
Netw
sork Se
eS GPRS and Mobile Data Commun,
= | =
orks antl |
The GGSN also collects charging information con nected to the use of the external data netw
=
2a
&
8
5
ee ee $$$ 5S ee Se SaaS et eS Url lO eee
Wireless and Mobile Network 2.5 GPRS and Mobile Data Communication
¢ The end user device will be a large footprint device like laptop computer or small footprint
device
like PDA‘s. The MS will be connected to the device and used as a modem to access the wireless data
network.
GPRS Bearer Services:
* GPRS is a wireless extension of data networks. It can access to data networks, such as IP-based
networks (public internet, private intranet, and IPv4 and IPv6 protocols) and X.25 based networks.
1, GPRS upgrades GSM Data Services and Provides the following
Services :
2. Point-to-Point (PTP) Service: Internetworking with the Internet (IP protocols) and X.25
networks,
3. Point-to-Multipoint (PTM) Service: Point-to-multipoint multicast and point-to-multipoint
group
calls.
4, SMS Service: Bearer for SMS
5. Anonymous Service: Anonymous access to predefined services.
6. Future Enhancements: Flexible to add new functions, such as more capacity,
more users, new
accesses, new protocols, new radio networks.
PRS ARCHIT
AND EC
GPRS NETWO
TURK RE
NODE
GPRS architecture works on the same procedure like GSM network
, but, has additional entities that
allow packet data transmission. There are two key variants of
the GSN, namel y Gateway and Serving
GPRS support node.
vives) §=GPRS Network Nodes
* There are two Network Operation Nodes in GPRS:
1, GGSN:
e The first is the access point for an external data network and
is known as the gateway GPRS supp
node (GGSN). It contains the routing for GPRS-attached ort
users, With this information, GGSN
capable of delivering the packet data units (PDU) to the user’s is
current access p Oint.
e The location information can be obtained from the HLR via the oO
ptional Gc interface, The Gat
eway
ae eS
i
Wireless and Mobile Network
27 GPRS and Mobile Data Communication
To do all this, the GGsn keeps a record of active mobile users and
the SGSN the mobile users are
attached to. It allocates IP addresses to mobile users and last but not least, the GGSN is
responsible
for the billing.
. SGSN:
N
The second is the SGSN that serves the need of mobile users. When a user
is GPRS-attached, the
SGSN establishes a Mobility Management (MM) context containing information
pertaining to
routing, security and mobility, such as the identity of RA and LA where the MS is residing, and the
MS's MM states, etc.
The SGSN also ciphers Ps traffic, given that the base transceiver station (BTS, in GPRS, BTS
replaces
the BS in GSM,) is only responsible to cipher CS traffic
The Serving GPRS Support Node (SGSN) is a main component of the GPRS network
, which handles all
packet switched data within the network, e.g. the mobility management and authentication of the
users. The SGSN performs the same functions as the MSC for voice traffic.
The SGSN and the MSC are often co-located. The SGSN is connected to the BSC. The SGSN is the
service access point to the GPRS network for the
mobile user.
On the other side the SGSN relays the data between the SGSN and relevant GGSN (and vice versa).
The SGSN handles the protocol conversion from the IP used in the backbone network to the Sub-
Network-Dependent Convergence Protocol (SNDCP) and Logical Link Control (LLC) protocols used
between the SGSN and the mobile users, These protocols handle compression and ciphering.
The SGSN is also responsible for the authentication of GPRS mobiles, When the authentication is
successful, the SGSN handles the registration of the mobile to the GPRS network and takes care of its
mobility management.
le Data Communication :
Wireless and Mobile Network >.
2.8 a
GPRS attach
GPRS detach ;
STANDBy timer
expired
pete
? ‘
Fig. 2.2: State Model of GPRS Mobile Station
s in one LA, ~
Location Area (LA) and Routing Area (RA) consist of one or several cells and RA is alway
gS
When MS crosses LA border, a location update and RA update shall be done.
d. When the
In case MS moves within the same LA but crosses different RA, the RA update is neede
ds on the current state of
MS moves within the same LA and RA, cell update may be needed. It depen
ag
the MS.
is used in READY state. This |
The first case, that the MS updates the location every cell change,
is always known and packet data can be —
strategy ensures that the accurate location of the MS
delivered faster as no paging procedure is necessary.
d for cell updates. The
However the MS battery is drained more and uplink radio capacity is waste
MS moves to a
second case, used in STANDBY state, is that the MS updates the location only when the
|
new Routing Area (RA).
In this strategy, when data packet is sent to the MS, 10 paging is required iin order to find out the”
every
current location of the MS. Thus, uplink capacity will be wasted for paging response and
UlUD”™
: Location Area |
Location Area —-
2
#2
et
RA Update Whenever the MS moves to a new RA, it sends a routing area update request including 4
routing area identity (RAI) of the old RA to its assigned SGSN. When the message arrives at the be
station subsystem (BSS), the BSS adds the cell identifier (CI) of the new cell. Based on the RAI and(
data, the SGSN can derived the new RAI.
Two different cases are possible; Intra-SGSN and Inter-SGSN routing area update.
Intra-SGSN Routing Area Update:
The MS has moved to an RA, assigned to the same SGSN as the old RA.
ee a a ee
Cee
Aw Se ,
ae a ee eh mee nme es mi amb" fee
GGSN address _
OK
~-
update database
¥
. OK
Paging Request
* The inter-SGSN routing update is the most complicated routing © pdate. The MS changes from on,
SGSN area to another, and it must establish anew connection to a new SGSN.
¢ This means creating a new logical link context between the MS and the new SGSN and informing th,
GGSN about the new location of the MS.
Packet channel
request
Packet immediate
assignments
Packet resource
request
Packet resource
assignments
(Optional)
Physical layer
PHY Convergence -
Procedure (PCLP)}
Management
The MIMO power saving mode mitigates to multipath only when it improves the overall performance
of WLAN.
The highest raw data rate will increase to 65Mbps from 54Mbps if the devices show compatibility .
with 802.1in standard.
‘Beam forming’ and ‘Diversity’ are two other techniques supported by 802.11n.
Beam forming focuses the beam directly towards the intended antennas at the receiver.
Diversity sums up the response of all antennas, takes the best subset, rejecting weak responses,
802,11n also supports aggregation. It bundles several frames and sends them together, reducing the
by 802.11g.
total time required. This aggregation enhances the mixed mode operation offered
Doubling the channel width from 20MHz to 40MHz increases data rates. However, it is used by
properly managing the needs of clients requiring high speeds and other clients which are connecteq
to the network.
The 802.11n specification was developed with previous standards in mind to ensure compatibility.
Table 2.2 : Primary IEEE 802,11 specifications and their comparisons =
_802141a | 802.11b__ 802.11 2]. e0zdin Say
Approval date July 1999 July 1999 June 2003 August 2006
Maximum data rate 54 Mbps 11 Mbps 54 Mbps 600 Mbps
Modulation OFDM DSSS orCCK | DSSS orCCK DSSS or CCK of
or OFDM OFDM
WLAN Applications
WLANs are designed to operate in Industrial, Scientific, and Medical (ISM) radio bands and
Unlicensed-National Information Infrastructure (U-NIJ) bands. These bands are license free.
Manufacturers have deployed WLANs for process and control applications.Retail applications have
expanded to include wireless point of sale (WPOS),
The health-care and education industry are also fast-growing markets for WLANs. WLANs provide
high-speed, reliable data communications in a building or campus environment as well as coverage
in rural areas. WLANs are simple to install
WLAN Applications
e Public
o Coffeeshop
o Airport
o Convention Centre
e Private
o Government
o Enterprise
o Manufacturing facility
o Home
« Semi-Public
o University
o Hospital
J
Wireless and Mobile Network 2.17 GPRS and Mobile Data Communication
Access point
(AP)
\«
Wireless and Mobile Network 2.18 GPRS and Mobile Data Commun,
a
* The message is sent to the local AP (input AP), then distributed through the DS oe AP (output
that the recipient is associated with. If the sender and receiver are in the same BSS, the input ang ous
AP's are the same. ;
* So the distribution service is logically invoked whether the data is going Pe ee ee OF not
Integration is when the output AP is a portal. Thus, 802.x LANs are integrated dee e t DS,
* Station services are Authentication, Deauthentication, Privacy and MAC Service Data Unit (MSDy)
Delivery.
IEEE 802.11
* In 1997, IEEE developed an international standard for WLANs, i.e. IEEE 802.11. Like ne IEEE 802
standards, this layer also focuses on the bottom two layers of the OSI model i.e. physical layer ang
data link layer.
* The objective of IEEE 802.11 was to define a medium access control (MAC) sublayer, Mac
management protocol and service and 3 physical layers for wireless connectivity of fixed, portable
and movable devices.
Comparison of Various IEEE 802.11x Standards (a/b/g/i/n etc):
Table 2.3
EEE 802.11 | IEEE802.1ia | IEEE 802.11b IEEE
Seema eee é i _ 802.11g
Applications WLAN WLAN WLAN
Modulation DSSS , FHSS OFDM DSSS orCCK | DSSSorCCK | DSSS orCCKor
or OFDM OFDM
Channel width 20 MHz 20 MHz 20 MHz 20 MHz 20 MHz or 40
MHz
Typical range 66 feet 75 feet 100 feet 150 feet 150 feet
Antenna 1x1 SISO ix1 SISO 1x1 SISO 1x1 SISO 4x4 MIMO
configuration (Single (Multiple
Input-Single | Input-Multiple
Output) Output)
e IEEE 802.11i is mainly designed for enhanced security purposes. It addresses two
main weaknesses
of wireless security networks which are encryption and authentication. Encryption is accomplished
by replacing WEP’s original PRNG RC4 also by stronger cipher that
performs three steps on every
block of data.
e The authentication and key management is accomplished by the IEEE 802.1x standard.
Components
Radio frequency identification (RFID) is an automatiticic i identification
i ion eeaeeigo
m ethod,10s
d, based on scene
storing ! and
: aoe 7 '
*
remotely retrieving data using devices called RFID tags or transpon
RFID.
Personal |P_
computer | =
—_,—_——_
RFID station
Although the technology has been around for decades, recent advances in tag
design have driven
the cost down to levels that are helping fuel its acceptance in a wide variety of industries.
RFID interrogators, which capture and transfer information to and from tags (transponders) via
radio waves, are ideal for the most challenging industrial environments.
RFID, in contrast to traditional vision-based bar code reading systems, doesn't require a direct line of
sight to object identifiers.
As a result, High Frequency (HF) and Ultra High Frequency (UHF) RFID systems have made it possible
to track a wide range of products through the entire supply chain with more accuracy and
timeliness. .
Yet, despite the advantages, many industrial facilities are still hesitant to incorporate RFID into their
mix of automation solutions,
Improve the quality and transparency of data across the supply chain ;
Accurate data that is easily accessed makes it possible to solve a multitude of process inefficiencies.
The best way to implement a system that results in the highest reliability and availability is by using
the concept of ‘distributed data.”
In this context, distributed data refers to live data that is attached directly to the object and can be
modified automatically at process checkpoints,
When data is read from a tag, answers are provided to the questions: What? Why? Where? and
When? This is the very essence of RFID applications in industry.
. Make it easier to implement flexible manufacturing processes
Staying competitive often means producing more from the same production line. In order to make
production processes more flexible, there must also be flexibility in the content and delivery of data
to the various manufacturing cells.
The ability to accommodate and respond to a higher influx of constantly changing data is necessary.
RFID is used to reliably read and write data directly to a tag on an object in real-time. This capability
can be leveraged to make flexible manufacturing a reality.
. Increase the accuracy of and reduce the time spent taking inventories
Manually counting inventory is an extremely tedious; time consuming, inefficient, and inaccurate
method.
RFID can be used to reduce or eliminate the need for "hand-scanning,' resulting in immediate and
significant improvements in inventory tracking. These results directly impact the customer
experience and lead to increased sales.
. Reliable track and trace in challenging physical environments
Since RFID does away with the requirement that there be a direct line of sight to the object's
identifier, standard barcode labels (that can be ruined by extreme environmental conditions) can be
replaced with encapsulated RFID tags.
The need for reading and/or writing data to an object, when process conditions are extreme, can be
handled by attaching these durable RFID tags.
Conditions such as high humidity, drastic temperature swings, exposure to chemicals and paints,
extremely high temperatures, rough handling, and dirt wreak havoc on conventional paper barcode
labels,
Specially encapsulated RFID tags are designed to survive and perform reliably in even the most
challenging of environments.
Increase efficiency and cut down on rework
RFID can be particularly advantageous in closed loop systems where reusable transport mechanisms
are used.
2 Ce Te eo
Advantages of RFID
1. The RFID systems need low maintenance cost. : pe
2. As line of sight communications is not needed the RFID tags can be read/written in dirty
conditions also,
3. They can handle large amount of data. .
RFID is not affected by objects like paper, plastic, clothing, non- metallic materials that placed
*
Bluetooth Technology
Bluetooth is a wireless personal area network (WPAN) technology. It is based on IEEE 802.151
standards.
Bluetooth provides short-range, low-cost connectivity between portable devices. Bluetooth is limited
in range (<10 meters) and provides speeds of about 780 kbps. Thus, Bluetooth is used as a
replacement for cables and wired networks to form small Ad hoc private wireless LANs.
Definition of the Terms Used in Bluetooth:
1. Piconet:
e Acollection of devices connected via Bluetooth technology in an ad hoc fashion.
¢ A piconet starts with two connected devices, such as a PC and cellular phone, and may grow to eight
connected devices. All Bluetooth devices are peer units and have identical implementations.
¢ However, when establishing a piconet, one unit will act as a master for synchronization purposes:
and the other(s) as slave(s) for the duration of the piconet connection.
2. Scatternet:
¢ Two or more independent and non-synchronized piconets that communicate with each other.
A slave as well as a master unit in one piconet can establish this connection by becoming a slave i!"
other piconet.
yams ES ee ee eee ae
work
wireless and Mobile Net
unication
GPRS and Mobile Data Comm
3, Master Unit: =
e The device in the piconet whose clock
devices in the piconet,
and hopping sequence are used to synchronize all other
4, Slave Units:
e Alldevices in a piconet that are not the mas
ter (up to seven active units for each master).
5, MAC Address:
¢ A 3-bit medium access
control address used to distinguish between units participating in the
piconet.
6. Parked Units:
e Devices in a piconet which are time-synchronized bu:
t do o notnoth have MAC addresses ;
7, Sniff and Hold Mode:
pe that 3 synchronized to a piconet, and which have temporaril
y entered power-saving mode
in which device activity is reduced,
: Fie
38 $1
$1
3125 ps
1, One-slot symmetrical, 3. Three-slot symmetrical,
2. Three-slot asymmetrical,4. Five-solt asymmetrical
Fig. 2.11 (a): Bluetooth Packets
* Each packet consists of a 72 bit access code. The access code
is used for packet identification, Every
packet exchanged on the channel is preceded by its access code.
* Recipients on the piconet compare incoming signals with access code. If the two do not match, the
received packet is not considered valid and rest of its contents are ignored.
* The72 bit access code is derived from masteridentity.Thus, access code is also used for
synchronization and compensating for offset. The access code is robust and resistant to
interference,
72 bits 54 bits 2745 bits
Traller
Preamble | Synchronization
(64) (4)
(4)
etooth
Fig, 2.11 (b): Packet Format in Blu
:
Header part of the packet is used by the Link Control (LC) logical channel. It has the following format
— =
Bluetooth Architecture
* Bluetooth is both a hardware-based radio system and a software stack that specifies the linkages
between the architecture layers of the two, The heart of this specification is the protocol stack, which
is used to define how Bluetooth works,
The Bluetooth architecture, showing all the major layers in the Bluetooth system, are depicted in the
Fig. 2.13.
The layers below can be considered to be different hurdles in an obstacle course. This is because all
the layers function one after the other. One layer comes into play only after the data has
been
through the previous layer.
ss
_. ee ae ee ae a, doe
2.25
GPAS and Mobile Data Communication
2. Baseband: The Baseband layer describes the specification of the Bluetooth Link Controller (LC),
which carries out the baseband Protocols and other low-level link routines. It specifies
Piconet/Channel definition, “Low-level” packet
definition, Channel sharing
3. LMP: The Link Manager Protocol (LMP) is used by the Link Managers (on either side) for link set-
up and control.
4. HCI: The Host Controller Interface (HCI) provides a command
interface to the Baseband Link
Controller and Link Manager, and access to hardware status and
control registers,
5. L2CAP: Logical Link Control and Adaptation Protocol (L2CAP) supports higher level protocol
multiplexing, packet segmentation and reassembly, and the conveying of quality of service
information.
6. RFCOMM: The RFCOMM protocol provides emulation of serial ports over the L2CAP
protocol. The
protocol is based on the ETSI standard TS 07.10.
7. SDP: The Service Discovery Protocol (SDP) provides a means for applications to discove
r, which
services are provided by or available through a Bluetooth device. It also allows
applications to
determine the characteristics of those available services.
Ewa Wi-Max
* The ‘World Interoperability for MicroAcess, Inc. (WiMAX)’ ee an industry group, focuses on
creating advanced technology solution for high speed wide area acre access. .
The WiMAX product certification program ensures interoperability between WiMAX equipment
from vendors worldwide. ‘ 4
WiMAX can se serve as a backbone for 802.11 hotspots for connecting to the internet. Alternatively,
Users can connect mobile devices such as laptops and handsets directly to WiMAX base stations.
i i i
directly can achieve a range 0 f 4 to 6 miles.
€reoe areoe oes
2 types o ae a WiMAX (IEEE 802.16d-2004) and mobile WiMAX (IEEE802.16e-
is a multipoint-to-
Fixe WiMAX is a point-to-multipoint technology, whereas mobile WiMAX
2005). - Fixed
infrastructure.
multipoint technology, similar to that ofa cellular
Wireless and Mobile Network 2.26 GPRS and Mobile Data Communication
munication
Table 2.4
| Sr. No | Wi-Fi.
1. | Wi-Fi technology is based on
IEEE 802.11 | wimax technology is base
standards. d on IEEE 802.16
2 standards.
802.11a-OFDM, maxim um
802.16-OFDM, maximum rate = 50OMbps.,
rate=54Mbps.,802.11b-
DSSS,maxi mum 802.16e-OFDM, maximum rate~3OMbps.
rate=11Mbps.,802.11g-OFDM,m
aximum
rate=54Mbps.
3. The stations gain access to media
based on There is time slot for each station and there is
CSMA/CA and back off algorithm schemes.
scheduling algorithm used by base station.
4. Range is less than 100 meters,
A kilometer non-line-of-sight, more with
line-of-sight.
Indoor Environment.
Outdoor Environment.
No Quality of Service.
Five Quality of service enforced by base
station.
Se
Radio Tower
[i 2
2
Ss Xx Our
J iy
Home with po! portable CPE
QTY
x ‘)Rei
o
XY
*
*)
A‘
Fixed backhaul
IEEE 802.11
IEEE 802.16:
Digital audio/ —_Digital
video multicast telephony Back Virtual Frame
—atyy IP Bridged LAN haui point-to-point relay
- a “4
&,
Coverage is 50 km.
Modulation.
Uplink S OFDMA
Downlink S OFDMA.
Channel bandwidth 40MHz.
PM
. Speed-—120 Km/hr.
10. Compliance ~ non compliant with 2G and
36.
2.4.3 BY so31
* WiFi stands for Wireless Fidelity. WiFiis lt
based on the IEEE 802.11 family of standards and is
ep 2 Local Area Networking (LAN) techno logy designed to provide in-building bro
adband
coverage.
. t WiFi systems t a peak physical-layer data rate of $4
Mbps and typically provide
indoor coverage over a distance of 100 feet.
* WiFi has become the de facto standar Ce
public f oe eee ee
can typically providc
e a cove
erage c eYann bones, offices, and
range of only about 1,000 feet
«aifom
e the
caeaccess point. , peak data rates than do 3G systems, prim
imari
arilly y sinsi ce it operat
es over a
larger 20 MHz bandwidth, but WiFi systems are not designed to support high-speed mobili
ty.
°.
Wireless and Mobile Network 2.32 GPRS and Mobile Data Commun
———catlon
Furthermore, all Pocket PCs or Palm units with Compact Flash, SD 1/0 support, or built-in WiFi, Can
access hotspots.
* Some Hotspots require WEP key to connect, which is considered as private and secure. As t0n Open
connections, anyone with a WiFi card can have access to that hotspot. So in order to have internet
access under WEP, the user must input the WEP key code.
Wireless and Mobile Network 2.36 GPRS and Mo bile Data Communicat on
6. To access WiFi, we need WiFi enabled devices (laptops or PDAs). These devices can send and
receive data wirelessly in any location equipped with WiFi
access.
Wireless and Mobile Network 2,38 GPRS and Mobile Data Communication
25 MOBILE IP
Mobile IP is a proposed standard protocol that builds on the Internet Protocol oy maine mobility
transparent to applications and higher level protocols like TCP.
Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 2002 that
allows users to keep the same IP address, stay connected, and maintain ongoing applications while
roaming between IP networks.
Mobile IP is scalable for the Internet because it is based on IP—any media that can support IP can
support Mobile IP.
Server X
Fig. 2.21: Mobile IP Scenario
Mobile IP is designed to support host mobility on the internet. User is connected to one or more
applications across the internet, the user's point of attachment changes dynamically and that all
connections are automatically maintained despite the change.
Server X transmits an IP datagram for mobile nodes A with A's address in IP header. IP datagram is
routed to A’s home network.
At home N/w the incoming IP datagram is intercepted by home agent. The home agent encapsulates
the entire datagram inside a new IP datagram. The use of an outer IP datagram with a different
destination IP address is known as “tunneling”. This IP datagram is routed to foreign agent.
Foreign agent strips off the outer IP header, encapsulates the original IP datagram in a N/w level
Packet Data Unit (PDU) and delivers the original datagram to A across the foreign network.
When A sends the IP datagram to X, it uses X's IP address. This is a fixed address that is X is not
mobile node. Each IP datagram is sent by A to a router on the foreign network to X. This router is al5°
a foreign agent.
The IP datagram from A to X travels directly across the Internet to X, using X’s IP address.
41. Mobile IP Capabilities
2. Registration
3. Discovery
4. Tunneling
: i ee Oe abl. ae eee
eless and Mobile Network
wires
2.39 GPRS and Mobile Data Communication
Agent Advertis
ement Packet in cluding Mo
bility Extension
Mobile nodes use agent advertisements to determine
internet or to an organization's network their current point of attachment to the
An agent advertisement is an Inte
has been extended to also carry a ae Control Message Protocol (ICMP) router advertisement that
t packet
Fig. 2.22: Agent advertisemen
The Tr, field of the IP packet is set to 1 for all advertisements to avoid forwarding them. The Type is
Setto9 the codecan = 0, if the agent also routes traffic from non-mobile nodes, or 16, if it does not
ute anything other than mobile traffic.
“number of addresses advertised with this packet is in #addresses while the addresses themselves
low as shown,
Wireless and Mobile Network 2.40 GPRS and Mobile
Mobile Data Com MUNI Cation
Lifetime denotes the length of time this advertisement is valid. Preference levels for each addrag,
help a node to choose the router that is the most eager one to geta new node,
The extension for mobility has the following fields defined: type is set to 16, length depends on the
number of COAs provided with the message and equals 6 + 4*(number of addresses).
The sequence number shows the total number of advertisements sent since initialization by the
agent. By the registration lifetime the agent can specify the maximum lifetime in seconds a node
can request during registration.
* The following bits specify the characteristics of an agent in detail:
5 The R bit (registration) shows, if a registration with this agent is required even when using a co.
located COA at the MN.
© Ifthe agent is currently too busy to accept new registrations it can set the B bit.
The following two bits denote if the agent offers services as a home agent (H) or foreign agent
(F) on the link where the advertisement has been sent.
Bits M and Gspecify the method of encapsulation used for the tunnel. While IP-in-Ip
encapsulation is the mandatory standard.
M can specify minimal encapsulation and G generic routing encapsulation,
In the first version of mobile IP (RFC 2002) theV bit specified the use of header compression
according to RFC 1144, Now the field r at the same bit position is set to zero and must
be ignored.
The new field T indicates that reverse tunneling is supported by the FA. The following
fields
contain the COAs advertised. A foreign agent setting the F bit must advertise at least
one COA.
A mobile node in a sub-net can now receive agent advertisements from either
its home agent ora
foreign agent. This is one way for the MN to discover its location,
2 Agent Solicitation:
.
Every mobile node should implement agent solicitation, The mobile node
uses the same procedures, _
defaults, and constants for agent solicitation, as specified
for ICMP router solicitation messages.
The rate at which a mobile node sends solicitations is limited by the mobile
node. The mobile node
can send three initial solicitations at a maximum rate of one per second
while searching for an
agent,
* After registering with an agent, the rate at which solicitations
are sent is reduced, to limit the
overhead on the local network.
Components of Mobile IP
* Mobile IP (or MIP) is a communications protocol that allows users
to move from one network to
another network with same IP address, |
* It ensures that communication will continue without
user's sessions or connections being dropped. .
When a user leaves the home network and enters in another network
(foreign network), the foreign
network uses the mobile IP protocol to inform the home
network of a care-of address to which all
packets for the user's device should be sent.
* Home Address is the permanent IP address
assigned to the mobile node. Mobile node
address in its home address. Care-Of Address uses this
(COA) is the temporary address used by a mobile node
while it is moving away from its home network,
* Mobile IP has the following three components
namely, Mobile Node, Home Agent and Foreign
1, Mobile Node: Any device those have roaming Agent.
facility such as a cell phone, personal digital
assistant, or laptop,
ee Oe NCU, OOP a ee ee
20 Compare various IEEE 802.11 standards w.r.t applications, modulation, channel width,
typical
range, antenna configurations. ue
2 What is RFID? Discuss some of its applications.
i
- What is RFID? Discuss different components of RFID and explain how communication takes
Place among the components.
- Explain the risks and benefits of applying RFID in the manufacturing sector. How
ector.
can it be
adopted in tracking parcels for the ecommerce s
= @ wee es i —
—
a *
3
GPRS and Mobile Data COMMUNIcation
Wirstess: act Wobile Network mae a
Wrieee = — Sal ie cutie a RFID. :
Nm ascent ei amon
MAC address, parked unit, sniff and hold mode.
se Blutooth ; Piconet, scatternet, Master unit, slave ypiy
+e
aah
ee
ST eRe
a
SOL utcomes...
eee i eee eee ee ae
meas
meen a Zoe ae
To study Features of 4G
&
cme
oes
Sars
* WAP (Wireless Application Protocol) WAP is a universal open standard developed by the WAP forum
to provide mobile users of wireless phones and other wireless terminals.
* WAP standard represents the first successful attempt to establish a broadly accepted environment
for delivering information, data and services to both enterprise and consumer users over wireless
networks.
* WAP is based on existing internet standard such as IP, XML, HTML and HTTP. It also includes security
features,
* WAP bridges the gap between mobile world and Internet as well as corporate intranets and offers the
ability to deliver an unlimited range of mobile value added services to subscribers-independent of
their network, bearer and terminal. ‘
Mobile subscribers can access the same wealth of information from a pocket-sized device as they can
from the desktop. ‘
WAP is a global standard and is not controlled by any single company. E rricson, Nokia, Motorola and
unwired planet founded the WAP forum in the summer of 1997 with the initial purpose of defining
an industry-wide specification for developing applications over wireless communications networks,
[3.1]
e ee ee eS 8g
74
ake nb BLAND
hi Shine
+ the ele
e WAP utilizes Internet standards such as XML, user datagram protocol (UDP).and IP. Many of the
protocols are based on Internet standards such as Hypertext Transfer Protocol (HTTP) and TLS
(Transport Layer Security) but have been optimized for the unique constraints of the wireless
environment: low bandwidth, high latency and less connection stability.
Internet standards such as Hypertext Markup Language (HTML), HTTP, TLS and transmission control
protocol (TCP) are inefficient over mobile networks, , requiri ‘ d
requiring lar
g large amount of mainly text bas¢
data to be sent.
, wee ili 7 i
WAP Gateway
qhe WAP Gateway utilizes Web pro:
t ern
:
Aproxy plays the roles of both Es cli
aide o> DRE etnies ieiats
be e client. es EET:
half of thutcees
ha nd se t (a client) rca N noen t.making requesuntsicon
ate with the origin server(a ss web
pe ca us e th e WP
A P Ga te wa y se rv es asa p t di re ct ly co mm se t, an ' d pa es
server), the WA le the requests from the
WAP ha nd
igin servers. oxy to hand
the requests to the or
y ).9translates requests from the WAP protocol stack to the
Internet si
5 on the Internet tocol side the WAP Gat
and ewa
TCP /1p
internet pro stack (HTTP in the
b .On the wire less net wor k side,the encoder/decoder
forms WML text and ation transmitt ed
waP Gateway perhet
wir ele ss nrke, ytecode conversion to reduce the inform
over the
d in URLs.It
‘ e WAP Gateway typicall
eee ee service to resolve the domain names use
a provides am if regating data from different orig
in
y used Kh@omter by agg
gervers,and by caching frequentl
ica tio ns do not s pecicity : s for chargi:ng or subscription
» Though the WAP spe cif ; fy mec han ism
ation can be collected
management, the WAP arc hit ecture suggests that appropriate chargin, inform
y ,wh ere the WAP secu to mer
ri ty protocolaecan be usedpea nme
authen ticate the subscribi er.
inth e WAP Gat ewa illation
Alt hou gh
ae
it is not def ine d in the WAP specifications, WAP Gateway may Use the dist
‘
ation,which effectively reduces the wireless traffic.
techmigue be perform on-demand transform preserves most of the
type specific compression that
+ Distillation is highly lossy, real time, data colors and
ten t of a doc ume nt. It scal es dow n a color image by reducing the number of
semantic con tion of video to
of the rep res ent ati on or red uce s the frame size,frame rate and resolu
thus the size
on.
create a reduced quality representati retr ieve a simplified version of an object.I
f
ows the user to quic kly
* The distilled representation all t is used to fetch extra information to enh
ance
is req uir ed, ref ine men
more information of the object
cate that this
the distilled object.
ormation increases the latency at the proxy,studies indi
« Although on-demand transf to end late ncy with better output for the
clients.
less handheld devices can
red uce s end
technique significantly s in the WAP Gat ewa y,w ire
* By installing dynamic adaptation mechanism their own.
not achieve on
erf ul inf ras tru ctu re to achieve capabilities they could Gateway and
leverage a pow
pro duc t avai labl e on the market.The Motorola WAP
ware -
* The WAP Gateway is a middle win dow s NT pla tform.
y are based on the are
the Erricson WAP Gatewaped ys on the Uni x pla tfo rm.Nokia 3s WAP Gateways
their WAP Gatewa its WAP Gateway beta
* APION and CMG develo offers a free download of
and Windows NT.Nokia
developed in both Unix
Web site, forum.nokia.com.
product from its
c h i t e c t u r e and Protocols
WAP Ar
EE WAP Gateway tu re is given below:
A P Ar ch it ec
* The description of W ve lo pm en t of mobile. This
is
at io n de
WaP Architecture: nment for applic l.
an d ex t en si ble enviro mb le the layers of OSI mode
a sc al ab le Th e la ye rs re se
* It provides re d de sign 0 f protocol
stac k.
es an d applications
through a set of
achi ev ed us in g la ye ll as by ot he r se rv ic
transport
ac ce ss ib le by la yers above as: we ce ss se ss io n, transa ction, security and
* Each layer is
ac
e. External applic ation 5 may
well de fi ne d in te rf ac
layers directly.
in Proto
Layer WAE)
aye Lae
hey ee
TLS-SSL
ee ane
San sennan AALS
_ TCP/IP
ture
Fig. 3.1: WAP Architec
; e over a variety of
ol s: de si gn ed to operat
WAP Protoc protocols,
cif ica tio ns def ine a set of li ghtweight
WAP spe clear
rer ser vic es. -b as ed (e. g-, SMS and USSD).It is
wireless bea ), or non-IP
es can be IP- bas ed ( e.g ., GPRS and CDPD
These servic characteristics.
y different QOS
S requirements.
ele ss bea rer s hav e ver
that the wir era te the se v2 ry in g QO
mpensate for or) tol
The WAP protocols co ed on
vironment (WAE): environme nt bas
Wireless Application En stack. It is gen era l pu rp os e
t layer in the WAP
WAE is the uppermos hnologies.
mb in at io n of WW W and mobile telephony tec tha t allows operators an
d service
co e en vi ro nm en t
is to achieve interoperabl
Its primary objective rea ch wide variety of wirele
ss platforms.
lic ati ons tha t can t can be used
providers to build app ge use d is WM L and WML script. WML scrip
addressing. Lang ua
It uses URL and URI for
input.
for validation of user
plication (WTA):
Wireless Telephony Ap P. It uses WTA Interface (WTA
l) which
te telephony services using WA
WTA provides a means to crea script.
L and for WML
can be evoked from WM es in device which can b e accessed
without
sib le to sto re WT A ser vic
The Repository makes it pos answer etc.
g the netw ork. The acce ss can be base d on any event like call disconnect, call
accessin by users The
ther e can be noti fica tion to user based on which WTA services are accessed
Sometimes,
d WTA service indication.
notification is calle
ol (WSP):
Wireless Session Protoc e WS?
id es rel iab le, or ga ni ze d exchange of content between client and server. The cor of
WSP prov
HTTP. All methods defined by HTTP 1.1 are supported
design is binary form of
d to agree o n common level of protocol functionality as well as to agree
Capability negotiation is use £
ona set of extended request met
hods so that full co mpatib+Lility to HTTP app
ppllicicaatitions can be retal i ned.
load 0
ork resources and can be resumed ad without over!oa!
An idle session can be suspended to free netw
WSP also
ishment. ous requests, Hence, multiple
ron asynch
full-blown session establ
. supports
air time.
requests will improve utilization of
(WTP):
Wireless Transaction Protocol : ‘
WTP is defined as light-we
i hin
ght-weight transaction-oriented protocol
suitable f or implementation int
clients.
fa wrP - i security mechanisms and no
oe wire! ansport Laye: i set-up or tear-down phases.
yer Security (wr1s).explicit Connection
5 is5 ae protocol based on ind ):
port layer security betwee n @ WAP neustry
cli :
stand
ard t Transport layer security A (TLS). It provides
WA P Ga te wa y / Pro xy
; egrity, A ent and the
data int
, Te goals of f WTLS are protection. It has
4 am s upport, opt;imized
features like datagr
h cy, a uthenticatioatlic. n, Denial-of-service
Tiva
;
| andshake and dyn
ol (WDP):
| wireless Datagram Protoc
; mine ee
ee
{ » WDP provides application optional segmentation and reasse
mbly
& by port numbers,
optional error detection.
‘
, Itsupports :simultaneous com munication Ins
i tances :
: ieee a ee
pearer service. The port number identifies higher sel ae ve
abo WDP.
, The adaptation layer of WD P maps WDP functions directly on to a bearer based on its specific
characteristics. : On the GSMS z :
y is provided by WDP.
MS, data’
gram func tion alit
7. optimal WAP Bearers:
uit Switched D
» WAP is’ desi
The ,,
(cs0y
gned to oper.
GPRS, Unstructu perate over a variety of different service like SMS,’ Circ
a
: red Supplementary Services Data(USSD)’
WAP Programming Model
fos
» The similarity with WWW M odel, standard com ponents of WAP i
—ale -
functionality of WAP Proxy is described in following point
Similarity with WWW Model:
art
to be hosted on WWW Servers and
to be build using
all
WWW technologies like ‘Cell global
identity (CGI)’ scripting,
cal
CLIENT —s
ii a
CHEUNG ORIGIN SERVER
: -| Tequest _21{ Requests
a
:
CGI
: ut : Scripts
~. -| Encoders |!
| |Responses
fn @ atc.
“| (content)
Br
_ Advantages, Disadvantages an
d Applications of wap
* Inthis section we will study advantage disadv s, antages an d applications —
Advantages of WAP: ;
1. Implementation near to Internet model,
2. Most modern mobile telephone devices s
Upport Wap,
3. Real-Time send/receive data.
4, Multiplatform functionality (little change is Nee
ded to run oo i
5. Nohardware obsolescence, on any website since XMI is used)
Advantages of WAP 2.0:
1. WAP 2.0 uses é ‘Cascading Style She
et (Css)’ Plus some
CSS2 which is language of Www. ; ; ‘ cet of
° WAP specific extensions, CSS is sub
2. With WAP 2.0, Web developers can use familiar a
building mobile Internet sites, 1s fot
Uthoring tools and PC web browsé
Wireless Application Proto! i,
eth an eR
evap
=
Greater control on appearance of color
un
_ If there is only single Css to whole sit Sackground, berders, fonts, st site is first
visited. It is then stored in cache » Mobile will download it only once when the
tting j .
5 _ The
smaller ut and
layoand shortforma
Sv en palais can be moved to separate CSS which makes file size
, tapaieanialivinc hear me. Since the content and presentation can be separated:
ha
possible using WAP.
ML pre sen ts mai nly text bas ed info rmation that attempts t° rs
- "W y access for users of
mobile devices.
that is organized for eas limited
are P ro vided for text and
Features of WML: t commands
ag e su pp or t: Fo rm atting and layou
~ 1, Text and Im i
ividedided into sma ll, well-defined
image cap abi lit y. sub div
ts moving back and forth between cards. A
are
ard Org ani zat ion al Metaphor: WML ee
2. Dec k/C entry field). a
called cards. Users nav) : n of text, or a text
units of user interaction as cr ee
spe cif ies one or mor e uni t of interaction (a menu, by a web address (URL) and is the unit
card ntifie d
HTML page in that it is ide
WML deck is similar to an
dling,
of content transmission. rds and Decks provisions for event han
2 WM. L includes ML-based
g Ca web browser, a user
3. Support for Navigation Amon scr ipt s. In an
c utin g
which is used for navigation or exe
rough the
navigates by clicking on links.
with cards, moving
forward and back th
interacts elements are
At a WML capable mobile device, a user ch individual language
similar to HTML, in whi
deck, WML is tagged language, , : :
ine ate d by low erc ase tag s enc los ed in ang le brackets. h con tai ns
del visible portion, whic
ica lly , The WM L def ini tio n of a card begins with the non
Typ
t.
executable elements, followed the visible conten ed for
Scr ipt is a scr ipt ing lan gua ge wit h sim ilarities to JavaScript. It is design
WML Script WM L .
ipt -ty pe pro gra ms in a use r dev ice wit h limited processing power and memory
defining scr
(IMT 2000)
International Mobile Telecommunications-2000
ons-2000. An initiative of the
e IMT-2000 Stands for International Mobile Telecommunicati
wireless data networks.
International Telecommunication Union (ITU) to create a global standard for
support data
The goal of International Mobile Telecommunications-2000 (IMT-2000) is to
transmission rates of up to 2 Mbps for fixed stations and 384 Kbps for mobile stations.
Note that the “2000” in the term “International Mobile Telecommunications-2000” refers to the
transmission speed (approximately 2000 Kbps), not the deployment date (which might be several
years beyond the year 2000). .
The European proposal for IMT-2000 prepared by ETSI is called as Universal Mobile
_ Telecommunication System (UMTS).
twee Features
The features of IMT-2000 are as follows:
1. Itis used for all radio environments.
2: It supports both packet switc
i hed and circuit switched data transmis
sion
3. Itoffers high spectrum efficiency.
a
pS:
itis used the direct spread technology,
itis also called Wideband CDMA.
itis part of Third Generation Partnershj j
hero ership Project (3GPP).
ituses Time Code Technology,
itar-MC:
further divided into 2 standards TD D and TD-SCDMA.’
5
Ufpaires spectrurt
spectrum
{MT-DS
W-C DMA
(UTRAN FDD)
Direct
Spread
TDMA
Fig. 3.4: IMT 2000
System
wea IMT 2000 (CDMA 2000) the United National (UN) organization
n Union (ITU),
International Telecommunicatio working since 1986 toward
The standards, has been
telecommunica tion
n
for global to worldwide telecommunicatio
responsible standard for wireless access
developing an international
cen
Wide range of telecommunication services
Flexible radio bearers for increased spectrum et".
oO 9 nowy
environments
Data rates up to 2 Mbps for indoor
Maximum use of IN capabilities.
Global seamless roaming.
.
3. Suburban (macrocell).
4. Global (satellite).
data and images. ©
5, Communication types that include voice,
Radio aspects of IMT2000 are:
1. Uplink frequency: 1885-2025 MHz
2. Downlink frequency: 2110-2200 MHz
and TDD for indoor and pedestrian
3, Transmission mode: FDD for mobile and satellite applications
type applications.
Global
Satellite ,
Subarban
Batic Terminal
PDA terminal
audio visual terminal
000 Sys em
A significan t element of IMT 2000 is the need po m
to sites e
efficiency compared to the currently available in the 2g mobil Se ee ores :
sharin € communication. wee
In context of managing the access the spectrum,
6 & common pool of spectrum be <
operators and/or between terrestrial and satellite services is
Key Features of the Radio Access for IMT 2000 are: used to improve spectrum efficien:
1. High level of flexibility
2. Cost effectiveness in all operating environmen: is
[Sas
.
Mobile Network Wirelese Appiloation Protocol..
3
agg rsge
=
3. commonality of design worldwide
4. Operation within the designated IMT 2000 frequency band
global radio channels are scanned by IMT terminal to find the required information on available
networks/standards and services.
qhese channels carry information like bands used for IMT 2000, frequency rasters, modulation
characteristics, guard bands, duplex direction and spacing, list of application services etc.
Implementation of IMT 2000:
in
asa stand-alone network with gateway and internetworking units towards supporting networ ks
cular towards PSTN, ISDN, and Packet DATA Networks.
radio
it may be integrated with the fixed networks. In this functions needed to support specific
are conn ected directly to a
network requirements are integrated to the fixed networks. Base stations
integrated functions and by accessing
jocal exchange that can support IMT 2000 traffic by locally
functions in other network elements.
support of multimedia services. IMT
Requirements for network functions must take into account the
concept.
2000 system should support global roaming and virtual home environment
epee -
MT 2000 Service and Network Capabilities: up to 384 kbps
144 kbps in vehicular radio environment,
Circuit and packet bearer capability up to ent.
2048 kbps for indoor and office radio environm
for pedestrian radio environment and up to
y of systems.
Interoperability and roaming among the IMT 2000 famil
ent.
Service portability and support of virtual home environm
Multimedia terminals and services.
Emergency and priority calls.
connection control.
Separation of call and bearer channel/
User authentication and ciphering.
authentication.
User-network and network-network
ce.
Geographic position/location servi
surveillance.
Lawfully authorised electronic
tions by the ITU:
IMT 2000 Interfaces for Specifica vide
sys tem s bel ong ing to diff eren t IMT 200 0 family members can interoperate to pro
* Toensure that
service delivery.
seamless global roaming and of layer
ires the spec ific atio ns not only of the physical radio interface but also
requ this
protocol that may be required across
* MT-RAN interfac e
some supplication
2 and layer 3 protocols as well as support
interface.
MT-RAN RAN-CN
itt interface
intertace intertace
Sa
ee
ts cae
phases
in ied
To be specif
CN Core Networt
ITU
em interfaces for specification by the
Tig. 3.6) DHT 2000 family member syst
use RAN-CN
family systems operators may prefer to
ln the inidal implementslion of IMT 2000
*
cweee isi
IMT 2000 Vision : i servi
demand for mobile : ice in the twenty. am
rket
IMT-2000 is a global standard to satisfy ma
century. . ilities Bani T:
The rs for IMT-2000 system services and its capabili is as unde
Common worldwide spectrum. rdless, cellular).
Se
i
Oe
Se
ene eet EITETE TSN STN
Ee WIDEBAND COD: )IVISION MULTIPLE
ACCESS (WCDMA) » a
WCDMA stands for Wideband Code Division Multiple Access and is the 3G technology that employ
the Direct-Sequence Code Division Multiple Access (DS-WCDMA) channel access method and th:
Frequency Division Duplexing (FDD) method to provide high-speed and high capacity service
Third generation (3G) wireless capability has been developed in response to a growing
demand ft
data services,
There are several different radio access technologies defin
ed within ITU, based on either CDM ©
TDMA technology. Different regional solutions were
proposed as solutions to the requirements of
IMT-2000,
These included Time Division Multiple Acce 1a
ss (TDMA) and Code Division Multiple
utilizing Frequency Division Duplex (FDD) and Time Divi
sion Duplex (TDD)
Access (CDMA)|
The fragmentation of the Proposals a
led to the creat;
the Third Generation Partnership Project
(3
Telecommunication Standard (UMTS) base
d on WCDMA.
The other group is known as 3GPP2
works on ¢ DMA 2000 4
Organization 3rd Generation Partnershi i
fulfils the mt-2000 i
mobile system that
en oe a
continued that work
Telecommunication System (UMTS) by defining
* ous system a called Universal Mobil”
ITU finally approved a family of
fi ve 3G st
IMT-2000. These standards are: andards Which
are Part of the
_ WCDMA (UMTS 99) 3G framework kn
own
WCDMA (Hspa)
PWNr
CDMA2000
TD-CDMA
5. TD-SCDMA
\ WCDMA Features Two
Modes:
1. Frequency. Div
ision Dup le
frequencies. One frequenc xis (FDp),
y Used roe arately Users b
© Uplin I, while y mploying both codes as ’
walt
a | i ther js used for downlink - a
usersandbyd em Pos
tes link codes, frequencies and time wherein
Nn timin chro:
to provide support of mu fican
ltiple users it tes Pendteent data
Esai rate,s. Thhe
e fl
aexsibtileityy necessca
rms for Validation itin
atees ta
the
and test.
CO CMMAP
ary
pundament al ierstime
tTeserve : Real Tim
< —_—
Best Effort vss
i hie (tals
eiteai
ff
eer
characteristics relation
bk ( Ses
Variation) Preserve
relation (variatitim © | Request response | best er is not
Destination
we tween . between On) | pattern expecting the data
information i within a certain
entities of th, nformation time
| enti
eee stream erie of the
| m
Conversational |
pattern (stringent Preserve payload Preserve payload
and for delay) content content
Example of the | Voi
P ake Streaming video Web browsing Telemetry, emails
application
Si Rey as
« UMTS stands for Universe of Mobile Telecommunications System. To handle a mixed range of traffic,
a mixed cell layout that would consist of microcells overlaid on microcells and picocells is one of the
architecture plans being considered.
* This type of network distributes the traffic with the local traffic operating on the microcells and
' picocells, while the high mobile traffic is operated on the microcells. Thus, reducing the number of
hand-offs required for the fast moving traffic.
MHz.
Power control frequency : 1.5
Asynchro nous.
Base station synchron ization:
{oo
USIM
Domain E iis Access Servin Transit
Domai rf Network Newer Network
n Domain Domain Domain
I OR)
: Network subsystem '
Motte station 1 Base station subsystem Other networks
!
a \ f " —\ ! !
1 I
! ‘BSS | i 1
| 1 |
SIM — 1
1 |
' 1
|
I
! I
I !
Cy | !
I 1 I
!
GGSN
uy m
SCN ee —1
| | Internet }°
ri I CEES Ahan:
I
\
» i
. I : = : x S . !
!
I oe MINES I
1
I' 1 i
!
' 1
1
; !
1
; 1
! | i
|
! SpA
I
| I
|
! 1 |
| 1 '
! 1 1
' \ |
I 1 '
| '
' lu
Uu
Fig. 3.8: UMTS Architecture
ete pi
Access
The main signaling protocol used is Radio
ae
ce.
rks is the A-i rfa
nte
interface in GSM/GPRS netwo
sign naling protocg) ae
e Bs. | The mainin sig
ss poy
3¢ a This is the interface u sed by i: an RNC to control multiple Nodpis interface. The lub int
i erface is= then. t : ‘1 a;
nae is the A-
orks
Node B Application Part (NBAF).
a
The equivalent interface in GS
standardized and open, unlike the A
Tu -PS: :
This is the packet-switch networks ‘ :
work. sivalent inter face in GSM/GPRS
UTRAN and the core data GPRS net
d is RANAP. The ed
The main signaling protocol use
Gb-interface.
subscribe
Tur:
po rt in te r- MS C mo bility. When a mobile
ace is to uP
The primary purpose of the lur interf le subscriber's data is now transferr
ed j,
moves between areas served by different RNCs, t
he mobi
the new RNC via ur.
the new RNC is known as the drift RNC.
The original RNC is known as the serving RNC and
Network Subsystem App lication Part (RNSAP). There ig no
The main signaling protocol used is Radio
equivalent interface in GSM/GPRS networks.
!
I
ene I
= Node B s I
te eet his I
PSTN/ISON
Node B- |
Pa? ote l
lee
!
1
: ar bss Soo ae
l: location sensitive informati lon and guidance, e-tour, location awareness, time tables, e-
40. Traveing:
seat
41. Add -on: TV, , radiYadio, PC, access to remote computer,MP3 player, camera, video camera, watch,
pager, GPS, remote control unit.
penefits to Operators:
4, Automatic international roaming.
2, Integral security and billing functions.
3, Retaining many of the existing back-office systems.
to business users and consumers while
4. Flexibility to introduce new multimedia services
providing an enhanced user experience.
revenues.
er dem and for valu e adde d serv ices and a corresponding increase in
: High ting 2G networks are facing
wn
ea : 2.5G
1985 1990 2000
Design began
1984 1991 1999 2002 2012-2015 _|
Implementation
Service Analogue Digital voice | High-capacity High- Higher
voice packets, MMS capacity capacity,
broadband completely
data IP, |
|
ce-we VOLTE and its Features
* It is-a standard for high speed wireless
wi com: i on for mobile phones and data terminal’
including IOT devices and wearables, ili
e It is based on the IP Multimedia Subsystem
netwi and medi?
planes of voice service on LTE defined by GSM rk, with specific profiles for control
in ea DIR.gz.
° Vaire over Long Term Evolution (VoLTE)
is a st
mobile phones and data terminals -including lotTM tate for high speed wire less communicatio? fof
nternet of Things) devices and wearables.
oui sale el tes? Vy
e 5 and Mobile Network
ne
3.23
jg based on the IP Multimedia subsystem network with isspecific profiles for control and media
me (Long Terma standard for high-speed wireless
Evolution)
ye planes of voice service on LTE
defined by GSMA (Global System for Mobile
communication for mobile devices and data terminals
association).
3,10 shows architecture of VoLTE system.
» Fig HSS
ENODEB
a
=. @®) MME
lod
S/P-GW
Control
Access Evolved packet core
izzae
aie
Fig. 3.10 : VoLTE System Architecture
ENODEB : Evolved Node B.
MME: Mobility Management Entity.
s/P-GW : Serving/PDN(Packet Data Network) Gateway.
HSS: Home Subscriber Server.
IMS : IP Multimedia Subsystem.
PCRF : Policy and Charging Rules Functions.
handle cellular voice calls over LTE. Most major
* Voice over LTE(VoLTE) aims to provide the ability to
least begin to deploy VoLTE within the next
network providers have a nnounced their intensions to at
couple years.
VoLTE Features:
the terminal and IMS.
1, Setupo f the transmission path between
a tion providing.
2. Security features for user authentic
t he establishment and termination of the call(via SIP).
3, Providing the core functionality for
g ,caller ID present ation and restriction, call waiting and multiparty
4. Support to call forwardin
conference.
traffic.
5. Designed for both voice and data
ee
s of VoLTE
Ey Advantages and Disadvantage
s VoLTE are as follows:-
* The advantages and disadvantage of
Advantages of VoLTE:
sa
legacy infrastructure.
to 2G/3G voice calls.
VoLTE make calls much faster compare
gens
It offers better security and QoS (Quality of Service) compare to legacy 2G/3G networks.
pwn
3.24
Co mm un ic at ion ( 5G)
Next Generation of Mo bi le ta rate are Pushing
data and higher da
—_—
n
icatio n, The next or fifth generatio
¢ The rapidly increasing number of mobile devices, van
cellular mobile Sate
to rethink the current generation of the high end requirements. «
5G cellular networks are expected to meet ubiquitous connectivity,
unique features:
e The 5G networks are broadly characterized by three
;
Extremely low late ncy and very high speed data tra nsfer. e of mobile
entl y unde r deve lopm en ¢. It denotes the next major phas
ed standards.5G networks will
e 5G is a gene rati on curr
beyo nd the curr ent 4G/I MT Adv anc
telecommunications standards as broadcast like
such as Internet of Things (IoT) as well
also need to meet the needs of new use-cases is
of disaster.
services and lifeline communications in times bandwidth,
the means to use cellphones within very high
® 5G (2021) mobile technology has changed
of the cellphone (mobile) technology. The 5G
* Now days mobile users have much awareness
5G mobile technology most
technologies include all types of advanced features which make
powerful and in huge demand in near future.
Features of 5G:
1, The5G technology is providing up to 25Mbps connectivity speed.
2. 5G technology offer high resolution for crazy cell phone user and bi-directional large bandwidth
shaping.
3. 5G technology also providing subscriber supervision tools for fast action.
4. The advanced billing interfaces of 5G technology makes it more attractive and effective.
5. The high quality services of 5G technology based on policy to avoid error.
6 . The traffic statistics by 5G technology makes it more accurate.
7 5G technology is providing large broadcasting of data in Gigabit which supporting almost 65,000
. connections.
8. The remote diagnostics also a great feature of 5G odinslogy.
9. 5G technology offer transporter class gateway with unparalleled consistency
0 ae remote management of ‘oes by 5G technology a user can get better and fast
solution.
. The 5G technology network otfering enhanced and available connectivity just about
the world.
kere 4G Architecture
* 4G stands for fourth generation cellular system, 4G
demand. is evaluation of 3G to meet the forecasted rising
s It is an integration of various technologies inclu
MT-2000 Wireless LAN. Dat@
rate in 4G system will range from 20 to 109 Mb ding GSM,CDMA,GPRS,I
i ps.
Features:
1. Fully IP based Mobile System,
; : : i 8 V i deo inter
5 i
~ thas better spectrum ef ficiency,
> seswpports Ad-hoc and multi
hop network
architecture:
ag 3,11 snecus
shows Gene ric Mobi
wittless. le Com sine
acceas muni Ca tion| architecture.4 G network is an integration of all
an tks such as Ad-hoc, cellular, hotspot and satellite radio
ologies used in 4G are smart an
' yolP, OFDM and Software Defined
widic aes bay peenieen caer
cpstt antennas: i Til
‘
Antennas are Transmittin & and receiving
‘ rrdoes not require increase antennas,
pow: er and additional
frequency.
gre Technolgy:
, aguses IPV6 Technology in order to support a large number of wireless enable devices.
, nenables a number of application with better multicast, security and route optimization
sates :
capabilities.
volP: :
, Itstands for Voice over IP,
He
s Itallows only packet to be transferred eliminating complexity of 2 protocols over the same circuit.
OFDM:
« OFDM stands for Orthogonal Frequency Division Multiplexing.
+ Itiscurrently used as WiMax and WiFi.
SR
« SDRstands for Software Defined Radio.
« Itisthe form of open wireless architecture.
Advantages:
* Itprovides better spectral efficiency.
* Ithashigh speed, high capacity and low cost per bit.
Diradvantage:
' Eattery usageis more.
* Hard to implement.
=
SGa Hss [PORE
S1-MMF $11
se Gx
al Bo
Uu
Serving PDN
kK x2 $1-U gateway
(S-GW) Tsar Sa'eway
(P-GW) TSGi
: :
TE UE = IP Networks
IMS
eNodeB Internet
Apps
3.5.5 Bays , |
LTE stands for Long Term Evolution and it was started as a project in 2004 by telecommunication
body known as the Third Generation Partnership Project (3GPP).
SAE (System Architecture Evolution) is the corresponding evolution of the GPRS/3G packet core
LTE and SAE.
network evolution. The term LTE is typically used to represent both
Long Term Evolution is the next step forward in cellular 3G services. LTE enhanced the Universal
Mobile Telecommunication Services (UMTS) in asset of points on account of the future generation
ents.
cellular technology needs and growing mobile communication services requirem
LTE evolved from an earlier 3GPP system known as the Universal Mobile Telecommunication System
(UMTS) which is turn evolved from the Global System of Mobile Communication.
(E-
e Even related specifications were formerly known as the evolved UMTS Terrestrial Radio Access
UTRA) and evolved UMTAS terrestrial radio access network (E-UTRAN). First version of LTE was
documented in Release 8 of the 3GPP specifications.
A rapid increase of mobile data usage and emergence of new applications such as MMOG
(Multimedia Online Gaming), mobile TV, Web 2.0, streaming contents have motivated the 3rd
Generation Partnership Project (3GPP) to work on LTE on the way towards 4th Generation mobile.
LTE offers a reduced latency delay, which is achieved with a simplified flat radio infrastructure in
which some of the functions have been moved from the Radio Network Controller (RNC) to the
evolved NodeB (eNB)
Another design goal is to increase spectrum efficiency and as such as a better cost per bit ratio and
better service provisioning.
Increased data rates will be realized the including the support of multi antenna techniques and in
combination with techniques such as Orthogonal Frequency Division Multiplexing (OFDM). — |
It will offer the flexibility in spectrum deployment and provide higher robustness against frequen
. .
Facts/Objective/Details of LTE
¢ The objectives of LTE are as follows:
1, LTE is the successor technology not only of UMTS but also of CDMA 2000
2. LTE is important because it will bring up to 50 times ,
‘ -_ PM _t__
performance improvement and much b 4
aa
:
; vi de o
Sy to support high dat
ed ea ti n the ser vic es suc h as VoIP. Streaming
timedia, conferencing or even high spe cellular modem.
mie
LTE uses both Time Division Du l
:
is siplex (TDD) and Frequency Division Duplex (TDD) mode. In FDD
tr an sm
uplink and downli nk
h uplink and
jownlink use the same : Ssion used different in frti equen cy, whihilele ini TDD bot
carrier and same separated in time.
;
_ LTE supports flexible carrier bandwidths, from 1.4Mhz up to 20Mhz as well as both FDD and TDD.
i bandwidth from 1.4Mhz up to 20Mhz which bandwidth is
LTE designed with a scalab le carrier
ysed depends on the frequency ba of spe ctrum available with
a network
band and
cy the amo unt
operator.
. AILLTE devices have to (MI MO) Mul tip le Inp ut and Mul tip le Output transmissions, which
support rier simultaneously.
allow the base sta tio n to transmit; several data streams over the same car
the backhaul
network nodes in LTE are now IP base d, including
, All interfaces between
i ‘
tio ns. Thi : is great simplification compared to earlier
s
connection to th e radio bas e sta
t of them
wer e init iall y bas ed on E1/T 1, ATM and frame relays links, with mos
technologies that
being narrowed and expensive. s to ensure that the
mec han ism hav e bee n standardized on all interface
. Quality of Service(QoS) can still met when capacity
limits
sta nt del ay and ban dwi dth
for a con
requirement of voice calls
are reached. um and new spectrum.
GE /U MT S sys tem s exi sting 2G and 3G spectr
10. Works with GSM/ED .
ve r an d ro am in g to existing mobile networks
Supports hand-o
Servers
SGl PDNs
Wireless and Mobile Network 3.28
User ; a
a ewe orhitcture of the user equipment for LTE is identical to the one used by Ups and :
+s
cue
GSM which is actually a Mobile Equipment (ME).
The mobile equipment comprised of the following important modules:
1. Mobile Termination (MT) : This handles all the communication functions.
2. T : erminates the data streams.
9, vail terete hr (UICC) : This is also known as the SIM card for y.
equipments. It runs an application known as the Universal Subscriber Identity Module (UsMy,
E-UTRAN (The Access Network):
* The architecture of evolved UMTS Terrestrial Radio Access Network (E-UTRAN) has been illustrateg
below:
o The E-UTRAN handles the radio communications between the mobile and the evolved packet cote
and just has one component, the evolved base stations, called eNodeB or eNB. Each eNB is a base
station that controls the mobiles in one or more cells. The base station that is communicating
with a mobile is known as its serving eNB.
E-UTRAN
2. The eNB controls the low-level operation of al its mobiles, by sending them signals
messages such as handover commands, » DY sending
* Each eBN connects with the EPC by means of the s1 interface and it can als b
base stations by the X2 interface, which is mainly used for signall also be conne cted
‘i to neat”Y
oii
handover, ng and packet forwarding
e Ahome eNB belongs toa Closed Subscriber Group
(CsG a hb
USIM that also belongs to the closed subscriber ds ) and Can only be acce ssed by mobiles with Es
Oup, mn)
4
i
‘pi
sires ge
n
eee tege
tu
fic
Signals = ————— Traf
saosin ina
5 MME :
fret weg
1
'S10
}
a
>
1) S1-MME |
eo
"
1 7
'Sit
2 = wa
S1-U Servers
-GWa-———=
P.GW
=| SGI PDNs
S
s5/s8. ||
mee
The
ecture
Fig. 3.14: EPC Archit
shown in the above architecture:
,. Abrief description of each of the components carried forward from UMTS and GSM
The Home Subscriber Server (HSS) component has been subscribers.
mation about all the network operator's
0
s TCP/IP
Practice Question P? What are th e di sa dv an ta ge s of implementing
1 ar ee the the de si gn guidelines for WA .
What at ar
mobile i network? ? ? .
directly over the In wh ic h si tu at ion is WTP not used
otocol stac k.
Sesciie the waP pr mechanism?
which layer of WAP implements this
ve ribeibe didistillation t profile? what happens if a user agent profile is not used in WAP? How can
Desc
at is a user agen , ile be used oe?
a us er ag en t prof
distillation and da rd in
?
Internet stan
erent mobile
What are diff
uw
teway? s.
sociated protocol
. Explain WAP Ga e with diag ra m an d its as
res
chitectur
ano
Descri ng m od
elin detail.
programmi
APan
| ee
- Exe ain We
ple
Le
Ps a Ly se re
e
s
4
than
system that uses wireless link rather
Bsences
is a gener ic term for an acces s
* Wireless Local Loop (WLL) telephone company’s switch.
cribers to the local
conventional copper wire to connect subs o. This type of system uses
* WLLis also known as Fixe d Wireless Access (FWA) or simply fixed radi
services to business and
og or digi tal radi o tec hno log y to provide telephone, facsimile, and data
anal
residential subscribers. terrain or
rapi d dep loy men t of basi c pho ne service in areas, where the
* WLL systems provide
pme nt mak es inst alla tion of trad itio nal wirelines service too expensive.
telecommunications develo Network (PSTN) for
can be eas ily inte grat ed in toa wireline Public Switched Telephone
* WLL system s
al wireline installations.
more quickly than the tradition ne code”, A line code is a chosen for use within a
© Electrical representation of bina ry codes is called “li
tio ns sys tem for tran s mitting a digital signal down a transmission line.
com mun ica
sig nal is use d to cre ate an “RF signal” that can be sent through free space. The line-coded
© Line coded
to bits on an optical disc.
signal can be converted
example of a satel}; 49
. sail (TES)technology saved echnolog—_ si
—
y ,
Sal Seting.
Raity de
tages: signed for WLL
is the HNS Tel
4. Low bit rate for voice
and data ephony1
2. Low cost mobile term
inals
4 It provid es quality and Rrade
of SETVice for
tages:
i. WILL @pplications
Thenumber of Satellite
s q
2. Handover Capability is on
an ia na EO Put restrictions on the syst
surface, 80 they need hang Over capah
-. I,
Satellites are em design
in motion rela :
2 Cellular-Based Systems, Pability for aij fixed and cellular . totive
the earth's
an
» These systems provide | pow
quality WLL services. » ¢, Cellular
a wiz ™,technolo
large gi
range, median subscriber density, and median
circuit
services. *S are primarily used to expand the basic telephony
The primary muadeanegs of low-tier PCS and microcellular approaches is their range. FWA systems
for zonal areas are designed to cover the local telephone area directly from the PSTN switches.
# The systems for rural areas provide connection at the remote ends
of rural links to the end users.
* Less expensive
: Itcan be easily installed
Yaag The installation time need is less.
* e service area
They are typically operated at 800 MHz, 1.5 GHz, 1.8 GHz, and 1.9 GHz eae ~~
with the cellular-based WLL, more base stations are required to —_ ms ceuve te fa la
2” existing in" Place to
* Operators may consider low-tier WLL technologies when
support backhaul. . existing low-tier PCS raqj
¢ For densely populated urban environments, WLL technologies based on °
technologies.
Advantages:
1. High Subscriber density.
2. Low power.
3. High circuit quality.
Disadvantages:
1. Transmission cost is more.
_ o
geri WLL Types (FWT and WT with Mobility)
WLL: FWT (Fixe d Wirel ess Tele phon e) and WT with Mobility as described in this
© There are two types of
section.
FWT (Fixed Wireless Telephone): e recuse concept
ems re simpl er form of cellu lar mobile systems. They utilize the fre
® WlLLsyst ers with a fixed
hand ing over conce pt. They are used to provide large number of subscrib
but without 60
withi n a short perio d of time. Omni directional or sectorial antennae, typically
telephone service use simple
ons whereas the subscribers stations can
degrees are installed at the central stati
directional antennae.
ng subscribers by radio with a nearby exchange (up
FWT systems are short distance systems connecti
nation point (typically 300m to 3Km away).
to 15Km away) or outside line plant access cable termi
nge to subscriber.
FWT systems are basically part of access network from excha
WT with Mobility:
ation is possible within the
These systems still provide a local terminal mobility since communic
ms are given below.
confines of the cell in which the subscriber is located. The major cordless syste
T-2)
4, British cordless Telephone System(C
2. Digital European Cordless Telecom System(DECT)
HS)
3. Japanese Personal Handy Phone System(P
4. North American Personal Access Communication System.
an Institute of
* Without going in to the details of the above systems, it may be noted that Indi
em in 1800 MHz band known as CORDECT.
Technology, Chennai has developed an indigenous syst
ent to localloop b etween
It has a range of about 3Km and has bright prospects for usage as replacem
To ° PoP 4 the
telephone exchange and subscriber. This system has already been su ly int rod uce d 10
ccessful
local network.
wireless. and Mobile Network WLL, Signal Encoding...
4s
WLL Application
WLL applications includes;
4, Local phone service via wi relesslinecon
s nection
ed
than wir
2, Cheaper to install
3, Very prominent in non-industrialized nations,
Table 4.1: Radio Parameters of CT-2,DECT and PHS
Nall cece Wy fieabah __DECT ea re ead on PHS a
nies ~ : ANSTO
ETSI ETSI Lapanese__
Lene
___—_ Frequency MHz 864-868 4880-1900 1895-1918
| _Access Method FDMA MC TDMA MCTDMA__
1 12 4 ie
|___ Voice Chis per car
100 KHz 1.728MHz 300 KHz
|___RF chi spacing -
ADPCM ADPCM ADPCM
|_ Voice coding Algorithm
32 Kbps 32 Kbps 32 Kbps
as Voice coding rate
72 Kbps 1152 Kbps 384 Kbps
Channel bit rate
2 level FSK _ GFSK Pi/4QPSK__
| __ Modulation
sna
wae CON
ny in the U.S that provides
« LEC (Local Exchange
local service. grouped in to holding
the larg est LECs and the Bell operating companies which were
Some of when the Bell
coll ecti vely a s the Regi onal Bell Operating Companies (RBOCS)
companies known e are a
a 1983 cons ent decr ee. In addi tion to the Bell companies, ther
system was broken up by
as GTE.
number of independent LECs, such the local “central
also som eti mes refe rred to as “telcos” A “local exchange” is
« LEC Companies are .
of an LEC. Line s from hom es and businesses terminate at a local exchange
office” Transport Area (LATA) or
con nec t to oth er loca l exc hanges within a Loca ] Access and
Local exchanges T, MCI and Sprint.
Inte r Exc han ge Car rie rs (IXC s) such as long distance carriers. AT&
to
1QU
eed
ae. eee
t 4
Bipolar
| Polar
ve
foRZ
NRZ
o4
NRZ Manchester Differential
RZ
manchester AMI
Fig. 4.2 : Classification of Line coding
Wireless and Mobile Network on WLL, Signal Encoding
Mobile Network
988 and
47 Signal Enco
ding.--
we! WLL,
lity;
self Clocking Capabi
prrespective of information bit sequence line co de used should take at least one transition during
gac erval.
h bit int fo
qhese transitions are used by receivers
ervor Detection: ¥ synchronizations with transmitter.
i of li .
. tify the errors in the received si signal
helps to iden
‘
ek j oat f line code
Multilevel binary group codes provides self error detectio n capability. :
pandwidth Compression:
Line come ue should = the minimum necessary bandwidth for transmission.
The multileve codes requires less bandwidth as compared to other cod
uN:
pifferential Encoding:
gen era ted usin g diff eren tial enco ding is usef ul for thos e communication system where
Line cote
rsion
transmitted waveform sometimes experiences an inve
ror example, differential machester.
Transperancy:
’s and zero’s.
it should be possible to correctly tetrive data regardless of the pattern of one
phase encoded having good transparency.
;
Noise Immunity: ty.
used should have very high noise immuni
Ability to reject noise called noise immunity. Line co des e they will have high
The NRZ format have better noise immu nity than t hat of other codes becaus
average power.
Minimum Crosstalk: er to minimize
uld be suc h tha t at low freq uenc ies it should have low average pow
Line codes sho
crosstalk between adjacent channels.
crosstalk.
RZ group signal provides minimum
ar NRZ Encoding Scheme
Comparison of Unipolar RZ and Unipol
Table ae —*
ate
ented by an
aah RZ
Codes
O4 y Guidelines to Draw Line
Guide;
Uidelines to draw line codes waveforms are as follows:-
l
NRZ- L: One is rep res ent ed by one level, zero is represented by other leve
1.
—_
Wireless and Mobile Network WLL, Signalg 3
4.8
2. NRZ-M: One is represented by change in polarity and zero is represented by no change ‘
polarity.
3. NR2-S: One is represented by no change in polarity and zero is — by ee in Polarity
y zero level, :
4. Unipolar NRz: One is represented by high level and zero is represented
5. Unipolar RZ:One is represented by half bit width pulse and zero is represented by y, Pulse
condition.
6. Polar RZ (Bipolar RZ): One and zero are represented by opposite level polar pulses that are One
half bit in width.
7. i and ze, is
RZ AMI: One is represented by show half wave ,for alternate one change polarity
representedby zero level.
8. Bi-g-L ae Level or Split Phase Manchester): One is represented by 10 and zero is
represented by 01.
9. Bi--M (Biphase Mark):
* A transitions occurs at beginning of every bit p eriod. ;
¢ One is represented by second transition one half bit period later.
* Zero is represented by No second transition.
10. Bi--S (Biphase Space):
e Atransition occurs at the beginning of every bit per: iod.
© Oneis represented by no second transition.
later.
* Zero is represented by second transition one half bit period
11. Dicode NRZ:
is sent.
© AOne to zero or zero to one change polarity. Otherwise zero
12. Dicode RZ:
* AOne to zero or zero to one transition produces a half duration polarity change.
¢ Otherwise zero is sent.
13. Delay Mode: .
One is represented by transition at the midpoint of the bit interval.
Zero is represented by no transition unless it is followed by another zero.
In this case a transition is placed at the end of bit period of the first zero.
14. Polar Quaternary:
« Two bits are grouped together.
00 -3A/2
01 -A/2
10 A/?
a 3A/2
15. Gray coded: Two bits are grouped together
00
04 -A/2
11 A/2
10 3A/2
se
Va erential Manchester:
bj
46° qransition at middle of every
t interya}
trans
zero is represented using
ition at
ora RZ, NRZ Manchester an ap
o NRZZ
Manchester Rinni
>
|
S
ao
=
.
é
:
.
mannchester
Differential
t—
- ODULATION
woltude Shift Keying (ASK) is the digital modulation technique in which the amplitude of the
usoidal carrier will take one of the two predetermined values in response to 0 or 1 value of the
sie Mput modulating message signal.
ade shift keying is the simplest form of digital modulation. | Here the: carrier is a sine wave of
hea.
Wency,
; digital signal from the information source is a unipolar NRZ signal which acts as the modulating
- The ASK modulator is nothing but a multiplier followed by a band pass filter as shown in
Carrier signal
(a)
_ (b)
Fig. 4.4: ASK
binary ,1 is to be sent the carrier is
¢ From the waveform analysis we can conclude that when a
itted.
transmitted and when binary ,,0 is to be sent then the carrier is not transm
Carrier
BPSK
OV ee
'
' I Time
' Inqut binary eq uence
' ' 1
'
'
'
1
'
'
I Time
'
Rb
o t hits/sec
— Error Noise due
x(t)
to quantization
7 Se
x',(KT,)
6 25
2
5 1.6
1
4 0.5
0
3 -0.5
=1
2 -1.5
-2
1 -2.5
-3 1
0 -3.5 -4
1
! 2 4 a 4
I t
ot “25 -3.5
Natural sample value 1.3 3.6 2.3 0.7
0.5 -0.5 7 0
3.5 2.5
Quaentized sample value 1.5 7 6 4 001 000
Code number 5 414 110 400 011
PCM sequence 101
n : for the
les, and pulse codemodulatio modulation
Fig. 4.8: Natural samples, quantized samp signal processing and
ken for furt her digi tal
* The PCMcoded bit stream may be ta
purpose of transmission. par all el bi t- st re am at its input so that it can
expects a se rial or sample
* The PCM decoder at the receiver the enco ding ope rat ion ) to generate quantized
of bits (as per
decode the respective groups
on filter
sequence [x', (kTs)].
ore m for ban d lim ite d sig nal s, the low pass reconstructi
Following Nyquist’s samp lin
g the
ginal speech si gnal x (t).
a close replica x"(t ) of the ori
e
uces
whose f, = message BW is prod 0
: I
0 0 1 0 1
110 4 1 1
|
T ;*—Bit time slot
o tT a oF 47 ST GT 7T BT ST 40T = 12T
Fig. 4.9:
4.9 : (a) PCM seq uence. @):(b) Pulse PCM
(c) Pulse waveform(transition bisteraait ele
s
a and Mobile Network
4.19 bs
wultiplexing WL, Signal Encoet
pifferent message sources a re Tj
synchronized. tire = Multiplexed for this receiver and transmitter are
channel Noise and Error Probability
the Performance of pcm system
isin
1, Channel Noise : Introduceg i nt fluenced by two major sources of Noice.
ansmission path
2, Quantizing Noise : Introduc
ed in transmitter
4, Channel Noise
pue to Channel Noise Symbol ‘0’ a
PPears as ‘4’ and Vic
probability of error e versa.
P, = 1 /2*
where No is noise power, erfc (1/2*(Emax /No)””)
quantizing Noise
Is produced at transmitter of PCM
b Y founding off analog sample value to nearby permissible level.
quantizing Noise
v9 = A/12
where A is step size
Characteristics of PCM
1, Average Probability of error depends on ratio of Peak Signal energy to Noise spectral energy.
2, In PCM signal is regenerated so effects of amplitude , phase and nonlinear effects in one link has
no effect on next link.
3. Transmission requirement PCM link are independent of total length of system.
4. PCM is very rugged system , means less noise effect unless noise amplitude is greater than half of
pulse height.
Advantages
1, In PCM signal is regenerated so effects of amplitude, phase and nonlinear effects in one link has
no effect on next link.
2. Transmission requirement PCM link are independent of total length of system.
Disadvantages:
1, High bit rate and noise limits the use.
Model Waveforms:
Fig. 4.10 : Waveforms of (a) Modulating Signal (b) Sampling Signal (c) PCM output
—
“a
Predicti
current sample | To be transmited
Prediction error
SG U(nT 3)
;
Fig. 4.12 : Schematic diagram of a DPCM demodulat
Or
a
pisadvantages
4, Predicator increase hardware co mplexit:
plexity of system,
model Waveforms:
1
|
Slope overload
distortion
ulator
Fig. 4.14 :Block diagram ofa delta mod
Note that, e(kTs) = x(kTs) -x”(kTs)
= x(kTs) -u([k -1]Ts)
Features of Delta Modulation eliminated and
dic tio n unit - the pre dic tio n unit 0 f a DPCM coder (Fig. 4.14) is
e No effective pre
replaced by a single-unit delay element. t
levels is used. The quantizer output s imp
ly indicates whether the presen
* A1-bit quantizer with two
its accumulated approximation x*( kTs)
input sample x(KTs) is more or less compared to
ll steps.
® Output x‘(kTs) of the delay unit changes in sma ed version
zer outpu t with the previous accumulat
e The accumulator unit goes on adding the quanti
xA(kTs) . u(kTs), is an approximate version of x(kTs).
is dependent on the sampling rate.
e Performance of the Delta Modulation scheme y close
e when two consecutive input samples are ver
© Most of the above comments are acceptabl only
to each other.
e(KT,) = x(KT)—{x({k- 1]T.) + v([k- 1]TS)}
further, v(kT,) = €q(kT,) = s.sign[e(kT;)]
Here, ‘s’ is half of the step-size 6 as indicated in Fig below
+8
6=2s
q
-S
Fig. 4.15
¢ This diagram indicates the output levels of 1-bit quantizer. - No Note that of 8 is the step size,
‘ the two
output levels are+s
nditi iti
® assuming
Now, w, assuming 2 zero initial condition of the accumulator, it is easy to see that
winglos® 4.17
k
u(kT,) = z Vv (jT,)
1
X(KT,)
3. Model Waveforms:
output Waveforms
t and message signal (c) D/A converter
(a) Clock input (b) Delta modulation outpu
Fig. 4.18 ; Waveforms
Delta Modulation
Slope Overload and Granular Noise with Respect to
f |
|
Slope
overload
| Granular NOISE
od
daptive delta modulation is the modification to overcome these errors.
Comparison in PCM, DPCM a nd DM
ae na
in satellite communica
tion
SNXNawnan
GPS
Multi ' :
ultipath rejection in ground based mobile station.
Clock a
Explanation:
ry dat a is applied to an X-
bloc k dia gra m of DSSS tran smit ter is shown in Fig. 4.20. The serial bina
e The
c ode that occurs faster than binary data.
random
| OR gate along witha serial pseudo
ator. The carrier
al deve lope d at the outp ut of the X- OR gate is then applied to a BPSK modul
© The sign
X-OR output.
d 180° by the 1s and O“s of
phase is switched between 0°an es the
tin g carr ier, bein g muc h high er in frequency than the data signal caus
The signal phase modula complete
tiple wide ly spaced sidebands whose strength is such that the
modulator to produce mul
at dea l o f the spec trum . Thus the signal is spread. Also because of its
signal takes up 2 gre
than wideband noise to a
om ne ss , the res ult ing signa 1 is appears to be nothing more
rand
ban d receiver.
conventional narrow
pse udorandom code is called a chip and the rate of the
code is called the
© One bit time for the
an the data rate.
chippin g rate is faster th
chipping rate. The are applied to
si gn al X(t ) and the locally generated replica of the PN sequence generator
* The receiver tion
er thi s is 3 tage of multiplication. The multiplier performs the de-spreading opera
a multipli local carrier applied to it.
of mu lt ip li er is th en applied to a coherent BPSK detector with
output
_
data signal.
¢ At the output of coherent BPSK detector we get back the original signal d(t)
Receiver:
| Coherent os| ¥(!) output
ignal
fe BPSK
detector — =
|
The DS-BPSK recelver
(OR)
ifv> Osay'1’
if v <0 say ‘0’
Pseudo-nols
Thershold = 0
oer
Fig. 4.21: DSSS Receiver
:
Features of DSSS: ation
1. Itprovides good security against pote
ntial jamming or interpret
nst narrowband jamming signal
2. The DSSS is extremely effective agai DSSS signal
tion signal can coexist with
3. The narrowband communica erference.
effective against broadband int
4. The DSSS signal is not very
Disadvantages of DSSS: S system slow
ch syst em, the acqu isit ion time is too large. This makes DSS
4. With the serial sear The length of such
rate d at the PN code gene rator output must have high rate,
2. The sequence gene
ugh to make the sequence truly random
sequence needs t o be long eno dth is less than that of FHSS
ed is very large, But thi s bandwi
The channel bandwidth requir
system
distance between the transmitter and receiver
4. The synchronization is affected by the variable
Applications of DSSS System:
4. Tocompact intentional interference
To reject unintentional interference
tipath propogation
To minimize self interference due to mul
pwn
signal
In the low probability of intercept
y
In obtaining message privac
DSSS
code division multiple access with
AY
(a) Transmitter
4,24 WLL, Signal Encodin
Wireless and Mobile Network
FH Spreader
Spread Binary data
spectrum signal
(b) Receiver
2%
Fig. 4.23 transmission, binary
.For
uency-hopping system
e Fig. 4.23 shows a typical block diagr am for a freq such as Frequency
digital-to-analo g encoding scheme,
data are fed into a modulator using some
(BPSK).
Shift Keying (FSK) or Binary Phase Shift Keying or pseudorandom
on some base freq uenc y. A Pseu d o Noise (PN),
¢ The resulting signal s,(t) is centered this is the spreading code
referred to
into a table of freq uenc ies;
number, source serves as an index
previously. At each successive interval
2* carrier freque ncies.
* Each k bits of the PN source specifies one of the
selected.
(each k PN bits), a new carrier frequency is quency hops among a set
zer gene rate s a cons tant -frequency tone whose fre
¢ The frequency synthesi m t he PN sequence. This is
ping pattern determined by k bits fro
of 2" frequencies, with the hop
ng signal c(t).
known as the spreading or chippi signal
the sign al pro duc ed from the initial modulator to produce a new
¢ This is then modulated by
on the selected carrier frequency.
with the same shape but now centered quency, yielding the
filte r is used to bloc k the diff eren ce frequency and pass the sum fre
e Abandpass
final FHSS signal s(t). of PN-derived
the spr ead spe ctr um sign al i 5 demodulated using the same sequence
On reception,
ed to produce the output data.
frequencies and the n demodulat
of the form s (t) defined on the pre
vious slide, will be received. This is
At the receiver, a signal
multiplied by a replica of the spreading sign al to yield a product signal.
ck the sum frequency and pass the difference frequency, which is
A bandpass filter is used to blo
the binary data.
then demodulated to recover
:
Advantages of FHSS System
S needs shorter time for acquisition.
4. Theserial search system with FHS
dependent on the distance.
2. The synchronization is not greatly
of DSSS system.
3, The processing gain is higher than that
tem:
Disadvantages of FHSS Sys to be used.
quency synthesizers are required
4. Complex and costly digital fre
is too large (GHZ).
2. Bandwidth of FHSS system
FHSS:
Applications of
k LAN) standard for wi-fi,
4. Wireless local area networ (W
ard of Bluetooth
2. Wireless personal area network (WPAN) stand
ots 0 Moblle Network
4,25 w
comparison of FHSS and Dsgg System:
gies?
2. What are various WLL technolo
3 . What are different WLL types?
4 - Compare CT-2,DECT,PHS?
) Explain the feature of given component in MANET architecture
riWSN
the given
of te
Explain charac starchit
ic s,
ecture
Describe the given design challeng WSN,
esin
- thm.
Classify the given clustering algori
m,
= State the procedure of scheduled maintenance of the given syste
and Mobile Network
| __spemn npeme teerreittic.
ogy Formation:
internal data structure so that it ca n re Once this infor mation is gathered, the node keeps it in an
rent networking activaudities such as routing.
the behaviour of an Ad-hoc node : © used in diffe nodes because it
sens e the med ium befo re it €pen ds on the behaviour of its neighbouring
must i interfering Tange,
: Starts transmitti
which can cause collision at the other nodes ee a eS ELE:
Nod e discovery Ty ca can be achiieved with
i periodic
transmission of beacon packets or with
snooping on the channel to dete promis. cuous
2, Packet F orwarding Algori ct the com mun i cation activity.
* The Partial Topology Knowledge Forwarding (PTKF) algorithm chooses a node using @ localised
shortest path weighted routing where routes are calculated based on the local topological view and
considering the transmission power needed to transmit in that link.
Features of MANET
* It is an infrastructure less IP based network of mobile and wireless machine nodes connected with
the radio, In operation, the nodes of a MANET does not have centralized administration mechanism.
* It is known for its routeable network properties where each node acts as a “Router” to forward the
traffic to other specified node in the network.
Characteristics of MANET:
1, In MANET, each node acts as both host and router, Thus it shows autonomous behavior.
2. Multi-hop radio relaying- When a source node and destination node are out of the radio range,
the MANETs are capable of multi-hop routing.
3. It posses distributed nature of operation for security, routing and host configuration. A
centralized firewall is absent.
4. The nodes can join or leave the network anytime, making the network topology dynamic in
nature,
5. Mobile nodes are characterized by lesser memory, power and lighter in weight features.
6. The reliability, efficiency, stability and capacity of wireless links are often inferior when
compared with wired links. This shows the fluctuating link bandwidth of wireless links.
7. It needs mobile and quick behavior which needs minimum human intervention in configuring
the network.
8. All nodes possess identical features with similar responsibilities and capabilities and thus it
i
ors a completely symmetric environment.
8 High user density and larger level of user mobility,
a
10. Nodal connectivity irregular:
I
le ork
automatically establ
ishing 4 data
rescuers are already carrying, theip n etwork with the communications equipment that the
ship-to-ship Ad-hoc mobile seat job mad narios include ¢.g-
low lee Mun cat ion © easier. Other commercial sce
Low Level: Appropriate Wavetions, law enforcement, etc,
communicate directly to exch Pplication might be in domestic networks where devices can
tard, sports stadium, boat a i: 8¢ information, Similarly in other civilian environments like
4.
pplication for MANETS includ
e wide range computing. By
ey data to others, data networ
kse may be extended far
ructure. Networks may be mad
more widely available bey
andondeasthe
ier
Access
_* The benefit
of dividing a flat network into smaller, more manageable blocks is that local traffic
-dictable manner since nodes are free to move.
change in topology made kn OWN to other nodes so that outdated topology information can be
updated or removed,
enges in MANET;
4, Routing: Since the topology of the hetwork is constantly changing, the issue of routing packets
between any pair of nodes becomes a challengi kb routes between nodes may
potentially contain multiple hops, which is mor ~/ Decieyll canara munication.
’ e complex than the single hop com
9, Security and Reliability: An Ad hoc network has its
particular security pr oblems due to nasty
| neighbor relaying packets, The feature of distributed operation requires different schemes of
authentication and key management, Further, wireless link characteristics introduce also
reliability problems, because of the limited wireless transmission range, the broadcast nature of
| the wireless medium, mobility-induced packet losses, and data transmission errors.
| 3, Quality of Service (QoS); Providing different quality of service levels in a constantly changing
environment will be challenge. The inherent stochastic feature of communications quality in 4
MANET makes it difficult to offer fixed guarantees on the services offered to a device. An
| adaptive QoS must be implemented over the traditional resource reservation to support the
multimedia services,
4, Internetworking: Addition to the communication within an Ad hoc network, inter-networking
between MANET and fixed networks is often expected in many cases. The coexistence of routing
protocols in such a mobile device is a challenge for the harmonious mobility management
tion-related functions
5. Power Consumption: For most of the mobile terminals, the communica
should be optimized for lean power consumption. Conservation of power and power-aware
routing must be taken into consideration.
in the wireless
6. Restricted Wireless Transmission Range: The radio group will be restricted
a bound network
networks and as a result data amounts it can provide much slighter than what
use bandwidth in
can provide. This involves routing procedures of wireless networks must be
. The
ideal way. This can be achieved through protecting ine overhead as minimum as conceivable
the
restricted transmission range also enforces restraint on routing procedures for sustaining
topographical information. Particularly in MANETs because of regular variations in topology,
results
preserving the topological data for every node includes more controller overhead which
in additional bandwidth depletion.
7. Time-Varying Wireless Link Characteristics: Wireless channel is liable to a range of broadcast
disorders such as path harm, declining, intervention and obstruction. These features resist the
of these cordless transmissions. The range of which these
series, data rate, and consistency
features disturb the transmission that rest on atmospheric situations and flexibility of receiver
and transmitter. Even two dissimilar key restraints, Nyquist’s and Shannon’s theorems that rule
over capability to communicate the information at diverse data degrees can be measured.
Errors: Adsion
8, Packet Losses due to Transmis hoc wireless networks practices very advanced
packet damage due to reasons such as extraordinary Bit Error Rate (BE wireless channel,
in theR)
ee rashes because of the existence of unseen terminals, occurrence of interventions,
9. Mobility-Induced Route Changes; The systern topography in ad hoc wireless network is
extremely active be-cause of node movement; as a result, a constant meeting undergoes .
numerous pathway breakages. Such position often results in regular path alterations. So
flexibility administration is massive investigation theme in ad hoc networks.
10. Mobility-Induced Packet Losses; Communication contacts in an Ad hoc network are insecure
such that con-seductively conservative procedures for MANETs over a great damage frequency
will suffer from performance deprivation. Though, with large frequency of inaccuracy, it is
problematic to supply a data-packet to its target.
11. Battery Constraints: It is due to restricted resources that arrange main limitation on the mobile
devices in an ad hoc network. Nodes which are contained in such network have restrictions on
the supremacy foundation in order to preserve movability, dirnension and capacity of the node.
Due to accumulation of power and the processing capacity and less
make the nodes heavyweight
portable. Consequently only MANET devices have to use these resources.
* A Wireless Mesh Network (WMN) is amesh network created through the connection of
wireless access points installed. at each network user's locale. Each networ k user is also a provider,
forwarding data to the next node,
e The networking infrastructure is decentralized and simplified because each n ode
need only transmit
as far as the next node.
areas and small businesses operating
¢ Wireless mesh networking could allow people living in remote
in rural neighborhoods to connect their networks together for affordable Internet connections.
* Wireless Mesh Network (WMN) has recently being emerged as trend for the next generation wireless
network.
Mesh router
Mesh client
; : Mesh client
Wired link — — — — Wireless link
Base station/Sink f
Cluster 1.
Network BAQ
a
sN) into clust
There! fore it is desirable to partitio
n a Wireless Sensor Network (w a n ced to" " |
e th a n d i s t
reachable by path length less umption,
all the sensor nodes in a cluster ra ll en ergyataconswith in each
d that mini mizes a s
e Determining optimal value of distance to ane
take into account of data ee: e oe
comple x problem and it also ne ed to le latency: nant
n clu ste rs, fre que ncy of tra nsm iss ion, maximum allowable e
and betwee
* To select Cluster Head (CH) usually the
sensor node
ae
7 its cluster
As Cluster Head (CH) does aggregation of data eae
neighbors) is selected,
schedule to its members andt ae sane oe
members, it is usually trusted with transmission
wae ue e
Head (CH) needs to perform more functions than sensor nodes it may run
Cluster
Cluster Head (CH) has been sugs
much faster rate, Hence dynamically changing
ble.
distribute energy consumption as evenly as possi
wireless se
autonornous and operate unattended, and be adaptive to the environment. As
with a limited
are typically very small electronic devices, they can only be equipped
:
andr 1.2-3.7 volts.
less than 0.5-2 ampere-hou = = = 828
Sensors are classified into two categories: PassiveandActivesensors.
the 54
1 Passive sensors sense the data without actually pens
)
hi.
Wireless and Mobile Network 5.14
ve sensors. Each ae ae
Most theoretical work on WSNs assumes the use of passi
es nee of
area of coverage for which it can reliably and accurately report the particular _ 4 e Sp ae
in sensors are: signal ae ne
observing. Several sources of power consumption ae
g-to-digital ©
physical signals to electrical ones, signal conditioning, and analo encore
as 20 nodes per cubic meter.
density of sensor nodes in the field may be as high a sick
sses data and controls ue
Microcontroller: The controller performs tasks, proce oller is a mlesesee ca ie a
While the most common contr
other components in the sensor node.
se desktop microprocessor,
alternatives that can be used as a controller are: a general purpo ion Speci
asics (Applicat pecific
signal processors, FPGAs (Field Programmable Gate Array) and
Integrated Circuits). s because of its
such as sensor node
> Amicrocontroller is often used in many embedded systems ming, and low aepower
low cost, flexibility to connect to other devices, ease of program
consumption. A general purpose microprocessor generally has higher forapower consumption than a
choice sensor node. gs.
microcontroller;therefore it is often not considered a suitable
broadband wireless communication applications,
o Digital Signal Processors may be chosen for
modest: i.é., simpler, easier
but in Wireless Sensor Networks the wireless communication is often = less
to process modulation and processing tasks of actual sensing of data
the signal
complicated. Therefore, the advantages of DSPs are not usually of much importance to wireless
to requirements, but this
sensor nodes. FPGAs can be reprogrammed and reconfigured according
takes more time and energy than desired. .
often make use of ISM band, which gives free radio, spectr um allocation
Transceivers: Sensor nodes
and global availability. The possible choices of wireless transmission media are radio
frequency (RF), optical communication (laser) and infrared.
n and are sensitive to
o Lasers require less energy, but need line-of-sight for communicatio
it is limited in
atmospheric conditions. Infrared, like lasers, needs noantenna but
t that fits
its broadcasting capacity. Radio frequency-based communication is the most relevan
n frequencies: 173,
most of the WSN applications. WSNs tend to use license-free communicatio
433, 868, and 915 MHz; and 2.4 GHz.
o The functionality of both transmitter and receiver are combined into a single device known as
a transceiver. Transceivers often lack unique identifiers. The operational states are transmit,
receive, idle, and sleep. Current generation transceivers have built-in state machines that
perform some operations automatically. Most transceivers operating in idle mode have a power
consumption almost equal to the power consumed in receive mode. Thus, it is better to
completely shut down the transceiver rather than leave it in the idle mode when it is not
transmitting or receiving. A significant amount of power is consumed when switching from
sleep mode to transmit mode in order to transmit a packet.
Memory: Flash memories are used due to their cost and storage capacity. Memory requirements are
very much application dependent. Two categories of memory based on the purpose of storage are:
4, User memory used for storing application related or personal data and
2. Program memory used for programming the device. Program memory also contains
identification data of the device.
al
sensor node to sleep/wake up mech
jnvolves in putting the radio t,
sath g a
adependin on saa
netw ork activ or
the besensreferre
makeitys can nodes to altern a:
rred as duty cycling.
g, Network Layer: Routing is the process which finds the path between the sour impo
while initiating data communicationin the network. Routing is much more
other networks compared to WSNs. ve
Table 5.1: Radio ch
dio M se
Transmitter Electronics (ElecTx)
Receiver Electronics (E-elecRx) 50nj/bit pak
(Eelec = EelecRx = EelectTx) he
100 pJ/bit/m? a
Transmit Amplifier (camp)
Idle (Eidle) 40nj/bit "
Sleep ?
sleep
The energy spent in communication (transmission and reception) is much higher than Idle and
state of the sensor node. Energy efficient routing can be done through Cluster based hierarchical
Routing, flat routing, multipath routing, and geographical routing. ay
LEACH Protocol is a kind of cluster-based routing protocols, which includes distributed cluster ‘te
role to
formation. LEACH randomly selects a few sensor nodes as cluster heads (CHs) and rotates this
evenly distribute the energy load among the sensors in the network. The idea is to form clusters of
the sensor nodes based on the received signal strength and use local cluster heads as routers to the
sink. In LEACH, the CH nodes compress data arriving from nodes that belong to the respective
cluster, and send an aggregated packet to the BS in order to reduce the amount of information that
vision
must be transmitted to the BS. LEACH uses a Time division multiple access (TDMA) and code-di
multiple access (CDMA) MAC to reduce inter-cluster and intra-cluster collisions. Cluster heads
change randomly over time in order to balance the energy dissipation of nodes
or
. Transport Layer: When multiple nodes want to transmit data through the same channel at a time
when the routing node fails to forward the received data to the next routing nodes congestion
occurs, Congestion and data loss occurs at nodes which are nearer to the sink nodes. Energy saving
can be achieved in transport layer of WSNs through energy aware congestion avoidance, energy
efficient load sharing and energy efficient reliable mechanisms between end to end communication
,
in WSNs,
-
. Application layer: Energy saving in the application layer is achieved through application service —
d from data-retri Fh
ae
updates from sensors to observers reduces the total number of packet transmissions in the
WSN Based Techniques ; ™
* Energy Efficient Deployment in WSN : The optimal deployment of nodes adds to the lif
Network, along with determination of deployment cost, coverage, connectiv
deployment is important to achieve load balance and prolong the network lifetime
5.18 *
in WS Ns is to cover a _
of the area covera ge
¢ Energy Efficient Coverage in WSNs: The main objective
athonpoien region
nt ofethe hat d to
neee
n all spa ce poi nts wit hin the sen sor fiel Seeac
) and
d), ao
lec tio of
: ion (the col
reg
) wi ; :
be monitored. Point coverage is to cover a set of point (target sensor nodes’ exact positions, which
focuses on deter minin g
monitored. The point coverage scheme ts). The
of immobile Poe (targe
guarantee efficient coverage application for a limited number lifetime
coverage issues improve minimization of power utilization of WSNs and WSNs
Sensor Hardware
The energy consumption in WSN hardware involves three different components
4. Sensing Unit (Sensing Transducer and ADC)
2. Communication Unit (Transmitter and receiver radio)
3. Computing and Processing Unit
this part depends on the Hardware and
o Sensing Transducer: The energy consumption of
of the total energy consumed.
Application. Sensing energy is the small fraction31pJ/8 bit-sample at 4volt supply. The standby
ADC: ADC for sensor consumes only 3.1pW,in
power consumption at 1V supply is 41pW.
d can be
Transmission Energy: Transmission energy transmits a k-bit message to distance
computed as:
Erx(K,d) = Evetec.(k)+e. k.d?
k = no. of bits per messages
d = distance between the SN
E.ec = Transmission electronic energy consumption.
Receiver Energy: To receive k bit message the energy consumed Is
Epx(k) = Ectec-(K)
r with
o Computation : The computing unit associated with a WS is a microcontroller /Processo
memory which can control and operate the sensing ,computing and communication unit.
The energy consumption of this unit has mainly two parts: Switching Energy, Leakage
Energy.
Switching Energy is given by
Switching energy = Eswitch=Ctotal*vdd*
Where,
Vdd = supply voltage.
Ctotal = Total capacitance switched by computation.
o Leakage Energy: This is the energy consumed when no computation work is done.
The energy consumed in one bit of data can be used to perform large number of arithmetic
operations in the sensor processor.
Residual Energy: the remaining energy of sensor node is known as residual energy which
Oo
reflects how long the sensor node can perform all its functions correctly.
S19
and Mobile Network
— dt
1. § calable and Flexib} * Architecture: In the sensor network the number of sensor nodes deploye: d
ay be order of
Pccrtminatin fe en ; of nallione 50 SE Weer aes ae a
= See
the network does not affect elastin ne ae we
more n oe and routing. In other words, the networkal must ee =
stability. Introducing network means that addition commu n on
into the
messages will be excha nged, so odes
that these nodes are integrated into the existing network.
2, Error-Prone Wireless Medium: Since sensor networks can be deployed in different situations,
the requirements of each different applicati Py Id consider ; that
the wireless medium can b pplication may vary significantly. We shou
An attacker interferes
affected by noisy environments.
By knowingly and causes eno 7 a
aul: Tolanae ugh noise to affect the communication. ai
: ee ee and Adaptability: Fault tolerance means to maintain sensor network
node because in sensor network
functionalities without any interruption due to failure of sensor node doesn’t affect the overall
every node have limited power of energy so the failure of single
new links in case of node failure oF
task of the sensor network. Adaptable protocols can establish |
link congestion. Network can able to adapt by changing its connectivity in case of any fault. In
of
that case, well- efficient routing algorithm is applied to change the overall configuration
network. j
icate
4. Infrastructure: Sensors network are infrastructure less in which nodes can commun
directly with base station. It utilizes. multi-hop radio relaying and number of base station
depends upon area covered by node and its radio range.
5, Node Deployment: Sensor network can be deployed randomly in geographical area. After
. In sensor network
deployment, they can be maintained automatically without human presence
ent or a sparse deployment. In
node deployment falls into two categories either a dense deploym
targeted field while in a
dense deployment we have relatively high number of sensor nodes in the
the cost of sensor nodes increases
sparse deployment we have fewer nodes and-it is used when
ent is used when it is important
and prohibited the use of dense deployment. The dense deploym
for covering an area.
to detect the every moment or when we have multiple sensors
It must support maximum
6. Real Time: Achieving Real-time in WSN is difficult to maintain.
parameters. This issue can affect time |
bandwidth, minimum delay and several QOS
synchronization algorithm.
yed without any topology and they are
7. Dynamic Changes: As in sensor network nodes are deplo
failure of nodes. Thus, unlike traditional
adaptable to changes due to addition of new nodes or node
the channel throughput or minimize the
networks, where the goal is to maximize
to extend the system lifetime and the system
deployment, but in a sensor network focus is
robustness. ;
it is equipped with |
8. Power Consumption : Wireless sensor node is microelectronic device means
power. Hence power |
a limited number of power source. Nodes are dependent on battery for their
conservation and power management is an important issue in wireless sensor network. Due to
aware protocols and algorithm for
this reason researchers are focusing on the design of power
|
|
sensors network. é.
we know that in the sensor network we
9, Production Cost: As the name suggests production cost,
will be very high then the cost of over all
have large no of nodes deployed, so if a single node to
network will be very high. As a result the cost of each sensor node has to be kept low. In order
d be less. As a result the cost of sensor
make sensor network feasible the cost of sensor node shoul
issue.
node will be a very challenging
11, Hardware Design: While designing any hardware of sensor jetwork, it | =
efficient. Hardware such as micro-controller, power cont
androl,
communic | nar
design to consume less energy. ae co cecleaalaes
12, Limited Computational Power and Memory Size: It is another factor that affects WSN
sense that each node stores the data individually and sometime more than one node stored s
data and transferred to the base station which waste the power and storing capacity of ae se
we must develop effective routing schemes and protocols to minimize the redundancy in the i 1
network,
13. Operating Environment: Sensor nodes are deployed densely either very closed
or inside the
phenomenon which is to be observed. These nodes may work under-busy interaction, at the
bottom of an ocean, in the interior of a large machinery, on the surface of an ocean during a
tornado, in a home or large building and in a large warehouses. (
14. Simplicity; Simplicity is an important point in the wireless sensor network since sensor nodes
are small and there is restriction on the utilization of energy as they are energy dependent so the ~
computing and communicating software used in the nodes should be computation efficient and
less in size than the traditional software in the network
15. Quality of Service: It means data should be delivered within time period. Some real time sensor
applications are based on time means if data should not be delivered on time from the moment it
is sensed; the data will become unusable for e. g. fire detection requires good quality of services.
16. Security: Security is very important parameter in sensor network since sensor networks are data
centric so there is no particular id associated with sensor nodes and attacker can easily inserted
himself into the network and stole the important data by becoming the part of network without
the knowledge of sensor nodes of the network. So it is difficult to identify whether the
information is authenticated or not.
802.15.4
IEEE cost,
+ low is suggested as typical fort low rate particular areas and wireless sensor network withhe ip
ty, the range of communication to improve the battery life.
power consumption, densi
pata Link Layer:
Access
« The data link layer is responsible fo vr multi
plexing of data streams, frame detection, nae
l j |
Control (MAC) and error control,
: = meant hl at ave tt ana sensor nodes can be mobile, the MAC protocol must be power
sion with neighbors’ broadcast.
Transport Layer:
+ The ee of the transport layer is to deliver congestion avoidance and reliability where a lot of
protocols intended to offer this function are either practical on the upstream.
° These protocols use dissimilar mechanisms for loss recognition and loss recovery. The transport
layer is exactly needed when a system is planned to contact other networks.
why
« Providing a reliable loss recovery is more energy efficient and that is one of the main reasons
Event driven.
TCP is not fit for WSN. In general, Transport layers can be separated into Packet driven,
Network Layer:
based on the application, but
¢ The main function of the network layer is routing, it has a lot of tasks
actually, the main tasks are in the power conserving, partial memory, buffers, and sensor don’t have
a universal ID and have to be self-organized.
to
¢ The simple idea of the routing protocol is to explain a reliable lane and redundant lanes, according
a convinced scale called metric, which varies from protocol to protocol.
separate into; flat routing and
* There area lot of existing protocols for this network layer, they can be
& event driven.
hierarchal routing or can be separated into time driven, query-driven
STCP (Sensor Transmission Control
* There are some popular protocols in the transport layer namely
PSFQ (pump slow fetch quick).
Protocol), PORT (Price-Oriented Reliable Transport Protocol and
Application Layer:
and offers software for numerous
* The application layer is liable for traffic management
find positive information. :
applications that convert the data in a clear form to
applications in different fields such as agricultural,
* Sensor networks arranged in numerous
etc.
military, environment, medical,
t Planes:
Power, Mobility and Task Managemen ement, and
management planes monitor the power, mov
* Inaddition, the power, mobility, and task
or nodes.
task distribution among the sens
or node uses its power. When the power level
1. Power Management Planes: It manages how a sens
that it is low in power and
or node broadcast to its neighbors
of a sensor node is low, the sens
rved for sensing.
age. The remaining power is rese
cannot participate in routing mess
ster the movement of sensor nodes; so a route
2. Mobility Management planes: It detect and regi
or nodes can keep track of who their neighbor
back to the user is always maintained. The sens
node are and then sens or node s can balance their power task usage.
sens or the senatng task given to specific regi
on. .
Plan e: It bala nces and sche dule s
3. Task Management all energy |
dinate the sensing task and lower the over
These planes help the sensor nodes coor
consumption.
Classification of Clustering Algorithms
* There have been several different methods to classify the algorithms used for WSNs |
of the most common classifications are shown in Fig. 5,15, a*~
eterogeneous algorithms ,
Homogeneous algorithms
Centralized algorithms
istribut
Distri ed algalgorithms
buted
Clustering algorithms:
Static algorithms
Dynamic algorithms
Probabilistic algorithms
Non-probabilistic algorithms
Fig. 5.15 : Common Classification Algorithm
* Clustering Algorithms Homogeneous or Heterogeneous Networks: This classification according to
the characteristics and performance of sensor nodes in a cluster. In heterogeneous sensor networks,
all nodes have the same specifications, hardware and processing capabilities. In these networks,
which are common in nowadays applications, each node can be a CH. In addition to these networks,
the CH role can be replaced between the nodes periodically (for the creation of better and more
integrated load balancing energy). Against in heterogeneous sensor networks, generally, there are
two types of sensor, the first type sensors with more processing abilities and complex hardware.
These sensors predetermined as a CH node. The other type conventional sensors, with lower abilities,
which in fact, used to sense the environment properties.
e Centralized or Distributed Clustering Algorithms: These clustering algorithms imply on the
method utilized for shaping clusters. A distributed CH selection and shaping process are the most
suitable way to obtain enhanced flexibility and faster convergence times independent of the number
of nodes of the WSN. This approach is the most efficient method, particularly for large networks.
Also, there are a few approaches using centralized or hybrid method, which one or more coordinate
nodes or base stations (sink), responsible for the break up into detached and control of all network
cluster members. These networks are not appropriate for overall objective large-scale practical
application WSNs. They may be appropriate just for specific targets bounded-scale applications in
which high-quality connectivity and network separation is needed. :
¢ Static and Dynamic Clustering Algorithms: Other conventional classification is static or dynamic
clustering. Process shaping clusters is dynamic (otherwise as static) when it contains regular
(periodic or event-oriented) CH re-election or includes cluster reorganization routine, these
procedures may be effective in order to respond to changes in network topology and only accurately
the cluster topology or proper movement with the purpose CH role between the nodes to obtain
in
energy saving. Dynamic cluster architectures make a better use of the sensors in a WSN
and
naturally result in improved energy consumption management and network lifetime.
* Probabilistic and Non-Probabilistic Clustering Algorithms: This classification based on
cluster
shape parameters can be used to select the CH. These clustering algorithms are divided into two
categories namely. Probabilistic (random or hybrid) and Non-probability (deterministic),
Most clustering algorithms are known, they can be divided into two main categories.
In the
probabilistic clustering algorithm for determining the initial CH, a probability assigned to each
node. Probabilistic clustering algorithms, beyond the more energy-efficient, often running faster at
the convergence and reduce the volume of messages they exchange. In the non-probabilistic
Bs
:
Wireles s and Mobile Network Mobile Ac-t
r.
clustering es basically criteria (deterministic) more specific for CH selection and cluste
ae take into consideration. These criteria are essentially based on the proximity of adjacent
other closely located nodes.
nodes like (connectivity, degree, etc.) and information received from
Internat
oe