CS718 Handouts
CS718 Handouts
Reference Books:
1. Wireless Communications: Principles and Practices by T. S. Rappaport
2. Wireless Communications and Networks by William Stallings
3. WCDMA for UMTS: Radio Access for Third Generation Mobile Communication by H. Holma and A. Toskala
4. CDMA2000 Evolution: System Concepts and Design Principles by K. Etemad
5. WLANs and WPANs towards 4G Wireless by R. Parsad and L. Munoz
6. 802.11 Wireless Networks: The Definitive Guide by Matthew Gast
Lecture 1
Introduction to Wireless Communication
Course Basics
• Instructor : Dr. Ghalib A. Shah
• Pre-requisite : Data Communication and Networks
• Text books
1. Wireless Communication and Networks, 2nd Ed., W. Stalling.
2. Wireless Communications: Principles and Practices, 2nd Ed., T. S. Rappaport.
3. The Mobile Communications Handbook, J. D. Gibson
Objectives of Course
• Introduce
Basics of wireless communication
Evolution of modern wireless communication systems
Wireless Networks
Research issues in emerging wireless networks
• Outcomes
Adequate knowledge of wireless networks
Able to carry research in different domains of wireless networks
Course Syllabus
• Introduction to wireless communication
• Evolution of wireless communication systems
• Medium access techniques
• Propagation models
• Error control techniques
• Cellular systems
AMPS, IS-95, IS-136, GSM,
• Wireless networks
GPRS, EDGE, WCDMA, cdma2000, Mobile IP, WLL, WLAN and Bluetooth
• Emerging networks
WiMAX, MANET, WSN
When two parties communicate without having any physical contact or medium of
communication
There are several driving factors of its popularity.
i. People want connectivity anywhere anytime for example, at airports, hotels, customers
place, or group of people wants to share data at any location. Such requirements have
made the wireless connectivity indispensable.
ii. Keep in mind that the course mainly focuses on wireless networks rather than
communication techniques.
Why go wireless?
• Advantages • Limitations
Sometimes it is impractical to Bandwidth
lay cables Fidelity
User mobility Power
Cost (In) security
Electromagnetic Signal
• Function of time
• Can also be expressed as a function of frequency
Signal consists of components of different frequencies
• EM signal is used as a means to transmit information. EM is a function of time but it can
also be expressed as a function of frequency
• That is the signal consists of components of frequencies. However, the frequency
domain view of a signal is more important.
Time-Domain Concepts
In time domain, the signal can be either analog or digital.
• Analog signal - signal intensity varies in a smooth fashion over time.
For example in speech, voice changes its amplitude/intensity over time with
continuous change.
No breaks or discontinuities in the signal
• Digital signal - signal intensity maintains a constant level for some period of time and
then changes to another constant level
Digital signals are binary 0s, 1s or text
• Periodic signal - analog or digital signal pattern that repeats over time
s(t +T ) = s(t ) - ∞< t < + ∞
where T is the period of the signal
• Aperiodic signal - analog or digital signal pattern that doesn't repeat over time
• Peak amplitude (A) - maximum value or strength of the signal over time; typically
measured in volts
• Frequency (f )
Rate, in cycles per second, or Hertz (Hz) at which the signal repeats
• Period (T ) - amount of time it takes for one repetition of the signal
T = 1/f
• Phase () - measure of the relative position in time within a single period of a signal
• Wavelength () - distance occupied by a single cycle of the signal
Or, the distance between two points of corresponding phase of two consecutive
cycles
= vT
Frequency-Domain Concepts
• Fundamental frequency - when all frequency components of a signal are integer
multiples of one frequency, it‘s referred to as the fundamental frequency
• Spectrum - range of frequencies that a signal contains
• Absolute bandwidth - width of the spectrum of a signal
• Effective bandwidth (or just bandwidth) - narrow band of frequencies that most of the
signal‘s energy is contained in
• Any electromagnetic signal can be shown to consist of a collection of periodic analog
signals (sine waves) at different amplitudes, frequencies, and phases
• The period of the total signal is equal to the period of the fundamental frequency
Nyquist Bandwidth
• For binary signals (two voltage levels)
C = 2B
• With multilevel signaling
C = 2B log2 M
M = number of discrete signal or voltage levels
• Give an example for M = 8 and B 3100 C = 18600
• So the data rate can be increased by increasing the number of different signal elements.
This places an extra burden on receiver
Signal-to-Noise Ratio
• Ratio of the power in a signal to the power contained in the noise that‘s present at a
particular point in the transmission
• Typically measured at a receiver
• Signal-to-noise ratio (SNR, or S/N)
signal power
( SNR) dB 10 log10
noise power
• A high SNR means a high-quality signal, lower number of required intermediate
repeaters
• SNR sets upper bound on achievable data rate
• SNR expresses the amount in decibels that the intended signal exceeds the noise level.
EM Spectrum
• 20 Hz to ~14 kHz, acoustic — normal range of adult human hearing (most children and
some animals perceive sounds outside this range, most teens and children can hear
frequencies from 14 kHz up to ~16 kHz where most adults can't)
• 530 kHz to 1.710 MHz, electromagnetic — AM radio broadcasts
• 42 MHz to 260 MHz, electromagnetic — VHF terrestrial TV broadcast channels
Design Challenges
• Two fundamental aspects of wireless communication
Channel fading
o Multipath fading
o Path loss via distance attenuation
o Shadowing by obstacles
Interference
o Multiple transmitters to a common receiver
o Multiple transmitters to multiple receivers
• In wireless telecommunications, multipath is the propagation phenomenon that results
in radio signals' reaching the receiving antenna by two or more paths. Causes of
multipath include atmospheric ducting, ionospheric reflection and refraction, and
reflection from terrestrial objects, such as mountains and buildings.
• The primary concern in wireless systems is to increase the reliability of air interface.
• This is achieved by controlling the channel fading and interference.
• Recently the focus has shifted to spectral efficiency.
Summary
• EM seen in domain of time and frequency
• Analog and digital signal
• Periodic and aperiodic signal
• Frequency, amplitude and wavelength of signal
• Fundamental frequency
• Channel capacity
Nyquist formula
Shannon formula
• EM Spectrum
• Design challenges in wireless communication
Course Syllabus
• Introduction to wireless communication (3 hrs)
• Evolution of wireless communication systems (3 hrs)
• Medium access techniques (3 hrs)
• Propagation models (3 hrs)
Lecture 2
Introduction to Wireless Communication
Outlines
• Review of previous lecture #1
• Wireless Transmission
• Encoding/Modulation
• Noises
• Losses/Gain
• Summary of today‘s lecture
• In the last lecture that was also the first lecture of this course, we discuss the objectives
of the course. Our focus will be to introduce the current wireless networking technologies
and recent developments in wireless networks.
• Thereafter, the course syllabus was presented. The course consists of different cellular
systems like GSM, AMPS , wireless networks like GPRS, EDGE, WLAN and some
emerging networking technologies like wireless sensor networks, personal area
networks etc.
Wireless Transmission
• Virtually impossible to transmit baseband signals in wireless domain.
• Single transmission medium (air) for all users and applications.
• In wired networks, new wiring can be added to accommodate new applications/users –
one wire for telephone, one for cable, one for LAN, etc.
• Antenna size must correspond to signal‘s wavelength
1 MHz signal few 100 m-s high antenna;
1 GHz signal few cm-s high antenna
• Characteristics of wireless-signal propagation heavily depend on signal‘s frequency
• Low-frequency signals ‗tilt downwards‘ and follow the Earth‘s surface
• Do not propagate very far
Signal Encoding/Modulation
• We are concerned with transmitting digital data.
• Some transmission media will only propagate analog signals e.g., optical fiber and
unguided media
• Therefore, we will discuss transmitting digital data using analog signals.
• The most familiar use of this transformation is transmitting digital data through the public
telephone network.
• In computer networks no matter if its wired or wireless, we are interested to transfer
digital information from one end to other end. Therefore, we will discuss the techniques
which are used to transmit digital data.
Encoding
• Each pulse in digital signal is a signal element.
• Binary data are transmitted by encoding each data bit into signal elements.
• There can be one-to-one correspondence between data elements and signal elements
or one-to-multiple/multiple-to-one
Modulation
• Modulation is how an information signal is added to a carrier signal
• This is the superimposing of the information onto the carrier
• In an RF system a modulator generates this information signal
• Then it is passed to the transmitter and out the antenna
• Then at the other end the signal is demodulated
• The way to think of this is like a letter
The envelope is the carrier and the letter is the information
The envelope is only needed during transmission
• Three types: AM, FM, PM
Types of Encoding
• There are three forms of Encoding
ASK – Amplitude-Shift Keying
FSK – Frequency-Shift Keying
PSK – Phase-Shift Keying
• In general when you see phase modulation schemes explained B stands for binary,
which is only 2 points. Q stands for quadrature, which is 4 points and 16 and 64
represent the higher number of points in the modulation schemes
• Every time the number of points is increased the speed is increased, but interference
tolerance is reduced
• This is one of the reasons for automatic speed reduction in the face of interference
• Going from binary - 2 to 64 requires a really clean signal
Noise
• Noise consists of all undesired radio signals, whether manmade or natural
• Noise makes the reception of useful information difficult
• The radio signal‘s strength is of little use, if the noise power is greater than the received
signal power
• This is why the signal to noise ratio is important
• Categories of Noise
Thermal Noise
Intermodulation noise
Crosstalk
Impulse Noise
Thermal Noise
• Thermal noise due to agitation of electrons
• Present in all electronic devices and transmission media
• Cannot be eliminated
• Function of temperature
• Particularly significant for satellite communication
• Amount of thermal noise to be found in a bandwidth of 1Hz in any device or conductor is:
N0 kT W/Hz
N0 = noise power density in watts per 1 Hz of bandwidth
k = Boltzmann's constant = 1.3803 ´ 10-23 J/K
T = temperature, in kelvins (absolute temperature)
• Noise is assumed to be independent of frequency
• Thermal noise present in a bandwidth of B Hertz (in watts):
N kTB
or, in decibel-watts
N 10 log k 10 log T 10 log B
228.6 dBW 10 log T 10 log B
Noise Terminology
• Intermodulation noise – occurs if signals with different frequencies share the same
medium
Interference caused by a signal produced at a frequency that is the sum or
difference of original frequencies
• Crosstalk – unwanted coupling between signal paths
Nearby twisted pairs, unwanted signals are picked by antennas
• Impulse noise – irregular pulses or noise spikes
Short duration and of relatively high amplitude
Caused by external electromagnetic disturbances, or faults and flaws in the
communications system
Manmade Noise
• Manmade noise is part of modern life
• It is generated almost anywhere that there is electrical activity, such as automobile
ignition systems, power lines, motors, arc welders, fluorescent lights, and so on
• Each occurrence is small, but there are so many that together they can completely hide
a weak signal that would be above the natural noise in a less populated area
Natural Noise
• Naturally occurring noise has two main sources
Atmospheric noise, such as thunderstorms, from 0 to 5 MHz
Galactic noise, such as stars, at all higher frequencies
• Both of these sources generate sharp pulses of electromagnetic energy over all
frequencies
• The pulses are propagated according to the same laws as the desirable signals being
generated by the radio frequency equipment
• The receiving systems must accept them along with the desired signal
Noise Remedy
• Increasing receiver amplification cannot improve the signal to noise ratio since both
signal and noise will be amplified equally and the ratio will remain the same
Loss
• All components exhibit one of two properties: Loss or Gain
• If the signal coming out is smaller than the signal going in, it is loss that appears as heat
• Attenuators produce loss
Attenuation
• Causes of loss or attenuation in RF systems and the environments through which they
transmit include
Water, regardless of how it appears or where it is found including inside
connections
When water is encountered in the air as the signal passes through, the form of
the moisture matters
At frequencies above 10 GHz attenuation from rain becomes significant
When the raindrop‘s size matches the wavelength attenuation occurs
Other Impairments
• Atmospheric absorption – water vapor and oxygen contribute to attenuation
• Multipath – obstacles reflect signals so that multiple copies with varying delays are
received
• Refraction – bending of radio waves as they propagate through the atmosphere
Gain
• If the signal gets larger before it exits the device, it is gain
• RF amplifiers produce gain
• Gain is an active process in most cases, in other words it requires a power source
• Gain can also be the combination of signals from different directions appearing together,
such as the main signal and a reflected signal
• However, the total gain cannot exceed the original level transmitted from the antenna in
such a case
Summary
• Wireless Transmission
Why baseband signal can not be transmitted?
Need bandpass signals whose minimum frequency is higher than 0
Modulator produces bandpass by superomposing basband signal over higher
frequency signals
o AM, FM, PM
• Digital data analog signals
Some transmission media like optical fibers and unguided propagate only analog
signals
For example public telephone network
Requires data encoding
o ASK, FSK, PSK
• Noises
Thermal/white noise
Intermodulation noise
Crosstalk
Impulse noise
Natural noise
o Atmospheric noise like thunderstorms
o Galatic noise such as stars
Manmade noise
o Ignition systems, power lines, motors arc welders, flourscent lightd etc
• Attenuation and other impairments
Lecture 3
Introduction to Wireless Communication
Outlines
• Review of previous lecture #2
• Multiplexing
• Transmission Mediums
• Propagation modes
• Multi-path propagation
• Fading
• Summary of today‘s lecture
Multiplexing Techniques
• Frequency-division multiplexing (FDM)
Takes advantage of the fact that the useful bandwidth of the medium exceeds
the required bandwidth of a given signal
• For example multiplexing of voice signals. The useful spectrum is 300 to 3400 hz. A
channel of bandwidth 4 khz is adequate as it keeps some frequency slots free.
• In Standard telemcom. Voice multiplexing scheme consists of 12 4khz channel voice
channels from 60-108khz
• Guided Media
Waves are guided along a solid medium
E.g., copper twisted pair, copper coaxial cable, optical fiber
• Unguided Media
Provides means of transmission but does not guide electromagnetic signals
Usually referred to as wireless transmission
E.g., atmosphere, outer space
Unguided Media
• Transmission and reception are achieved by means of an antenna
• Configurations for wireless transmission
Directional
Omnidirectional
Terrestrial Microwave
• Description of common microwave antenna
Parabolic "dish", 3 m in diameter
Fixed rigidly and focuses a narrow beam
Achieves line-of-sight transmission to receiving antenna
Located at substantial heights above ground level
Due to attenuation particularly rainfall, requires repeaters/amplifiers placed
farther apart 10-100 km.
• Applications
Long haul telecommunications service
4 – 6 GHz band is common
But due to increased congestion 11 GHz is coming into use now
Microwave links provide TV signals to local CATV and then distributed to
subscribers via coaxial cable.
• Short point-to-point links between buildings
Enterprise offices, university campuses
Satellite Microwave
• Description of communication satellite
Communication satellite is Microwave relay station
Broadcast Radio
• Description of broadcast radio antennas
Omnidirectional
Antennas not required to be dish-shaped
Antennas need not be rigidly mounted to a precise alignment
• Applications
Broadcast radio
VHF and part of the UHF band; 30 MHZ to 1GHz
Covers FM radio and UHF and VHF television
• Characteristics
Because of longer wavelength, radio waves relatively suffer less attenuation.
Prime source of impairments is multi-path interference. Reflection from land
water and human made objects can create multiple paths.
Less sensitive to rainfall
Propagation Modes
• Ground-wave propagation • Line-of-sight propagation
• Sky-wave propagation
• EM waves of low frequency induce current in the earth surface that slow down the
wavefront near the earth causing the wavefront to tilt downward.
• Follows contour of the earth
• Can Propagate considerable distances
• Frequencies up to 2 MHz, which are low frequencies and have tendency to tilt
downwards
• EM waves of low frequency are scattered by the atmosphere such that they do not
penetrate the upper atmosphere.
• Example
AM radio
Line-of-Sight Propagation
Line-of-Sight Equations
• Optical line of sight
d 3.57 h
• Effective, or radio, line of sight
d 3.57 h
d = distance between antenna and horizon (km)
h = antenna height (m)
K = adjustment factor to account for refraction, rule of thumb K = 4/3
• Maximum distance between two antennas for LOS propagation:
3.57 h1 h2
h1 = height of antenna one
h2 = height of antenna two
Example
• Let h1 = 100 m, h2 = 0 or the second antenna is at ground level.
D = 3.57 ( 4/3x100)^1/2 + 0 = 41 km.
• Now suppose that h2 = 10m. To achieve same distance, what must be h1?
41 = 3.57(Kh1)^1/2+(13.3)^1/2
h1 = 46.2m
Propagation Factors
• The transmitter‘s power output
• The frequency being transmitted
• The effect of the Earth‘s shape in between the points
• The conductivity of the Earth along the transmission path
• The microclimate through which the signal passes
Multipath Propagation
• Reflection - occurs when signal encounters a surface that is large relative to the
wavelength of the signal
• Diffraction - occurs at the edge of an impenetrable body that is large compared to
wavelength of radio wave
• Scattering – occurs when incoming signal hits an object whose size in the order of the
wavelength of the signal or less
Types of Fading
• Fast fading
Rapid variation in signal strength occurs over distance about one-half of
wavelength.
At 900 Mhz cellular badn, lambda is 0.33 m.
• Slow fading
Users cover distance well in excess of a wavelength as it passes buildings of
different heights, vacant lots and so on
A slow variation in signal strength.
• Flat fading
• Selective fading
Fading channel
• Additive white Gaussian noise (AWGN) channel
Signal is degraded only by thermal noise
Accurate for space communication and some wire communication such as
coaxial cable.
• Rayleigh fading
Fading occurs when there are multiple indirect paths but no direct LOS path
Suitable for Outdoor environment
• Rician fading
When there exist a direct LOS path in addition to multiple paths.
Suitable for smaller cells and indoor environment
Lecture 4
Error Detecting and Correcting Techniques
Outlines
• Review of previous lecture #3
• Transmission Errors
• Parity Check
• Cyclic Redundancy Check
• Block Error Code
• Summary of today‘s lecture
• Receiver
Separates incoming frame into data bits and check bits
Calculates check bits from received data bits
Compares calculated check bits against received check bits
Detected error occurs if mismatch
Parity Checks
Single bit parity check
• Even or Odd parity
• Only single bit error detection
• What about multiple bit errors
• Use when probability of bit errors is small and independent
• Errors are usually clustered together
• The ability of receiver to both detect and correct errors is known as forward error
correction (FEC)
• Receiver can not only detect but correct as well using row, column indices
CRC Example
• Let d = 10111, P=1001
• Receiver
Incoming signal is demodulated
Block passed through an FEC decoder
Block Codes
• The Hamming distance d of a Block code is the minimum distance between two code
words
• Error Detection:
Upto d-1 errors
• Error Correction:
d 1
Upto
2
Lecture 5
Error Detecting and Correcting Techniques (Part II)
Outlines
• Review of previous lecture #3 • ARQ
• Block Codes Sliding window
Hamming Go-back-N
BCH • Summary of today‘s lecture
Reed Solmon
Hamming Code
• Designed to correct single bit errors
• Family of (n, k) block error-correcting codes with parameters:
Block length: n = 2m – 1
Number of data bits: k = 2m – m – 1
Number of check bits: n – k = m
Minimum distance: dmin = 3
• Single-error-correcting (SEC) code
SEC double-error-detecting (SEC-DED) code
Decoding Hamming
BCH Codes
• BCH Discoverer: Bose, Chaudhuri and Hocquenghem.
• Multiple error correcting codes
• Generalization of Hamming Code.
• Flexibility in choice of parameters
Block length, code rate
• For positive pair of integers m and t, a (n, k) BCH code has parameters:
Block length: n = 2m – 1
Number of check bits: n – k <= mt
Minimum distance:dmin >= 2t + 1
• Correct combinations of t or fewer errors
• The generator polynomial can be constructed from the factors of (X2m-1 +1)
Reed-Solomon Codes
• Subclass of nonbinary BCH codes
• Data processed in chunks of m bits, called symbols
• An (n, k) RS code has parameters:
Symbol length: m bits per symbol
Block length: n = 2m – 1 symbols = m(2m – 1) bits
Data length: k symbols
Size of check code: n – k = 2t symbols = m(2t) bits
Minimum distance: dmin = 2t + 1 symbols
Flow Control
• Assures that transmitting entity does not overwhelm a receiving entity with data
• Protocols with flow control mechanism allow multiple PDUs in transit at the same time
• PDUs arrive in same order they‘re sent
• Sliding-window flow control
Transmitter maintains list (window) of sequence numbers allowed to send
Receiver maintains list allowed to receive
• Reasons for breaking up a block of data before transmitting:
Limited buffer size of receiver
Retransmission of PDU due to error requires smaller amounts of data to be
retransmitted
On shared medium, larger PDUs occupy medium for extended period, causing
delays at other sending stations
Go-Back-N
• Improve Stop-and-Wait by not waiting!
• Keep channel busy by continuing to send frames
• Allow a window of up to Ws outstanding frames
• Use m-bit sequence numbering
• If ACK for oldest frame arrives before window is exhausted, we can continue
transmitting
• If window is exhausted, pull back and retransmit all outstanding frames
• Alternative: Use timeout
Go-Back-N ARQ
• Stop-and-Wait ARQ
• Go-Back-N ARQ
Go-back-N ARQ
• Acknowledgments
RR = receive ready (no errors occur)
REJ = reject (error detected)
• Contingencies
Damaged PDU
Damaged RR
Damaged REJ
Lecture 6
Multiple Access Techniques
Outlines
• Review of previous lecture #5
• FDMA • CDMA
• TDMA
• Random Access
ALOHA Reservation-based ALOHA
Slotted ALOHA
• Summary of today‘s lecture
FDMA
• FDMA was the initial multiple-access technique for cellular systems
• Separates large band into smaller channels.
• Each channel has the ability to support user.
• Guard bands are used to separate channel preventing co-channel interference
• Narrow bandwidth (30 khz).
• Advantages
Simple to implement in terms of hardware.
Fairly efficient with a small base population and with constant traffic.
• Disadvantages
Network and spectrum planning are intensive and time consuming.
Channels are dedicated for a single user, idle channels add spectrum
inefficiency.
TDMA
• Entire bandwidth is available to the user for finite period of time.
• Users are allotted time slots for a channel allowing sharing of a single channel.
• Requires time synchronization.
• Each of the user takes turn in transmitting and receiving data in a round robin fashion.
How it works?
• User presses Push-to-Talk (PTT) button
• A control channel registers the radio to the closest base station.
• The BS assigns an available pair of channels.
• Unlike FDMA, TDMA system also assigns an available time slot within the channel.
• Data transmission is not continuous rather sent and received in bursts.
• The bursts are reassembled and appear like continuous transmission.
• Advantages
Extended battery life and talk time
More efficient use of spectrum, compared to FDMA
Will accommodate more users in the same spectrum space than an FDMA
system
• Disadvantages
Network and spectrum planning are intensive
Multipath interference affects call quality
Dropped calls are possible when users switch in and out of different cells.
Too few users result in idle channels (rural versus urban environment)
Higher costs due to greater equipment sophistication
CDMA
• CDMA is a spread spectrum technique used to increase spectrum efficiency.
• SS has been used in military applications due to anti-jamming and security.
CDMA Example
• If k=6 and code is a sequence of 1s and -1s
For a ‗1‘ bit, A sends code as chip pattern
o <c1, c2, c3, c4, c5, c6>
For a ‗0‘ bit, A sends complement of code
o <-c1, -c2, -c3, -c4, -c5, -c6>
• Receiver knows sender‘s code and performs electronic decode function
<d1, d2, d3, d4, d5, d6> = received chip pattern
<c1, c2, c3, c4, c5, c6> = sender‘s code
• Su d d1 c1 d 2 c2 d 3 c3 d 4 c4 d 5 c5 d 6 c6
Random Access
• Random Access Methods
more efficient way of managing medium access for communicating short bursty
messages
o in contrast to fixed-access schemes, each user gains access to medium
only when needed -has some data to send
o drawback: users must compete to access the medium (‗random access‘)
o collision of contending transmissions
• Random Access Methods in Wireless Networks
Can be divided into two groups:
o ALOHA based-no coordination between users
o carrier-sense based-indirect coordination -users sense availability of
medium before transmitting
Pure-ALOHA
Slotted ALOHA
• Time is divided into equal time slots –when a user has a packet to transmit, the packet is
buffered and transmitted at the start of the next time slot
BS transmits a beacon signal for timing, all users must synchronize their clocks
• advantages:
partial packet collision avoided
• Disadvantages
• throughput still quite low!
there is either no collision or a complete collision
• max throughput = 36% of channel capacity
Reservation ALOHA
• Time slots are divided into reservation and transmission slots / periods
during reservation period, stations can reserve future slots in transmission period
reservation slot size << transmission slot size
collisions occur only in reservation slots
• Advantages:
higher throughput under heavy loads
max throughput up to 80% of channel capacity
• Disadvantages:
more demanding on users as they have to obtain / keep ‗reservation list‘ up-to-
date
• R-Aloha is most commonly used in satellite systems
• satellite collects requests, complies ‗reservation list‘ and finally sends the list back to
users
Summary
• FDMA
• TDMA
• CDMA
• Random Access
ALOHA
Slotted ALOHA
Reservation-based ALOHA
• Next Lecture
Carrier-sense based random access
Spread Spectrum
Lecture 7
CSMA and Spread Spectrum
Last Lecture Review
• FDMA • ALOHA
• TDMA • Slotted ALOHA
• CDMA • Reservation-based ALOHA
• Random Access
Versions of CSMA
• Employs different node behaviour when channel found busy
Non-persistent CSMA
o after sensing busy channel, node waits entire back-off period before
sensing again
Persistent CSMA
o after sensing busy channel, node continues sensing until the channel
becomes free; then …
1-persistent CSMA
o node transmits immediately with probability 1
p-persistent CSMA
o node transmits with probability p; or, it defers transmission with probability
(1-p)
of packet frames
Backoff counter–used only if two or more stations compete for transmission
CSMA/CA Algorithm
Spread Spectrum
• Problem of Radio Transmission
frequency dependent fading can wipe out narrowband signals for duration of
interference
• Solution:
spread narrow band signal into a broad band signal using a special code
Types of spreading:
• Direct sequence spread spectrum (DSSS)
• Frequency hopping spread spectrum (FHSS)
Summary
• CSMA
Versions of CSMA
CSMA/CA
Example
• Spread Spectrum
Frequency Hoping
Direct Sequence
• Next Lecture
Evolution of wireless networks
Lecture 8
Evolution of Wireless Networks
Today Goals
• Review of previous lecture #7 • 2G cellular systems
• 1G wireless cellular networks GSM
NMT IS-136
AMPS PDC
TACS IS-95
• Summary of today‘s lecture
Last Lecture Review
• CSMA • Spread Spectrum
Versions of CSMA Frequency Hoping
CSMA/CA Direct Sequence
Example
• Prior to the introduction of cellular phones, mobile telephone service was provided by a
high power tx/rx.
• A typical system would support about 25 channels with an effective radius of about 80
km.
• The way to increase the capacity of the system is to use lower-power systems with
shorter radius and to use numerous tx/rx. Cellular systems were evolved to provide
organization of tx/rx and to further improve the capacity of systems.
• Explain little bit about cellular architecture….
C-450
o in West Germany, Portugal and South Africa,
Radiocom 2000 in France
RTMI in Italy.
In Japan there were multiple systems. Three standards, TZ-801, TZ-802, and TZ-
803
NMT
• First fully-automatic cellular phone system
Started in 1970, in service 1981
• Two standards NMT-450 and NMT-900
Corresponds to frequency and the later has higher bands.
• Cell size range from 2 km to 30 km.
Use smaller size in urban areas for better quality and larger in less-populated
areas.
• Handsets 1 watt and Car phone uses 6-15 watt
• Automatic switching (dialing) and handover.
• No spec. for voice traffic encryption
Buy a scanner, tune to the desired channel and intercept.
• NMT also supported a simple data transfer mode called DMS (Data and Messaging
Service) or NMT-Text
• Using DMS, also text messaging was possible between two NMT handsets before SMS
service started in GSM
• but this feature was never commercially available except in Russian and Polish NMT
networks.
• NMT Suspended
In Finland TeliaSonera's NMT on December 31, 2002.
Norway's last NMT network on December 31, 2004.
Sweden's TeliaSonera NMT on December 31, 2007.
AMPS
• 1G cellular phone used in US, which uses FDMA
• Operates in 800 MHz band
Total of 832 channels;
o 416 in 824–849 MHz for transmissions from mobile to the base
o 416 in 869–894 MHz for transmissions from base to the mobile.
o Each channel is 30 KHz wide
• Require large bandwidth for large base population.
• No protection against eavesdropper
ESN (Electronic Serial Number) was cloned in 1990s to make free calls from
different cells.
• Replaced with D-AMPS, GSM and CDMA for better security and capacity
TACS
• A variant of AMPS developed by Motorola.
• It has been used in some European countries (including the UK & Ireland), as well as
Japan and Hong Kong.
• ETACS was an extended version of TACS with more channels.
• The last ETACS service operated by Vodafone was discontinued on 31 May 2001
The digital systems were designed to emit less radio power from the handsets.
This meant that cells could be smaller, so more cells could be placed in the same
amount of space. This was also made possible by cell towers and related
equipment getting less expensive.
• 2G Advantages
The lower powered radio signals require less battery power, so phones last much
longer between charges, and batteries can be smaller.
The digital voice encoding allowed digital error checking which could increase
sound quality by reducing dynamic and lowering the noise floor.
Going all-digital allowed for the introduction of digital data services, such as SMS
and email.
Better security, harder to be scanned
GSM
• 2.27 billion subscribers across more than 212 countries, 81% of the global mobile
market
• Its ubiquity provides international roaming very common
• 8-slots TDMA with 200 KHz radio channel, with frame duration of 4.615 ms
• The channel data rate is 270.833 kbit/s
• Operates in four different bands
Mostly 900 MHz or 1800 MHz
US and Canada use 850 MHz and 1900 MHz
25 MHz bandwidth of each subdivided into 124 channels
E.g. in 900 MHz, uplink 890-915 MHz, downlink 935-960 MHz
Others Systems
• IS-136 or D-AMPS
3-Slot TDMA, used in North and South America, Australia
Channel bandwidth is 30 KHz.
Frequency bands (824-849MHz and 869-894 MHz)
• Pacific Digital Cellular (PDC)
Japanese standard similar to IS-136
25 KHz channel
11.2 kbps at 3-slot and 5.6 kbps at 6-slot
Operates in 800 MHz downlink 810-888 MHz, uplink 893-958 MHz)
In 1.5 GHz (downlink 1477-1501 MHz, uplink 1429-1453 MHz)
• IS-95 or cdmaOne
Supports up to 64 users that are orthogonally coded
Channel bandwidth is 1.25 MHz
Widely deployed in N. America, Korea, Japan, China, S. America, Australia
Channel data rate is 1.2288 Mchips/s (Mega Chips)
Lecture 9
Evolution of Wireless Networks (Part II)
Outlines
• Review of last lecture #8 • 3G
• 2.5G UMTS/W-CDMA
HSCSD CDMA2000
GPRS • Summary of today‘s lecture
EDGE
IS-95B
Evolution to 2.5G
• 2.5G upgrade must be compatible with 2G technology
• Three different upgrade paths developed for GSM and two of these supports IS-136
High speed circuit switched data (HSCSD)
General packet radio service (GPRS)
HSCSD
• Works in circuit switch mode.
• Speed increased by allowing single user to use consecutive time slots in GSM standard
• Relaxes error control coding algorithms specified in GSM increasing data rate from
9.600 to 14.400 Kbps
• By using 4 slots, raw data rate of up to 57.6 kbps to individual user.
• Ideal for dedicated streaming or real-time interactive web sessions
GPRS
• Packet-based data networks.
• Well-suited for non real-time traffic like email, faxes, web browsing
• Unlike HSCSD, GPRS allows multi-user channel sharing of individual radio channel and
time slots and supports many more users.
• GPRS units are automatically instructed to tune to dedicated GPRS channels and
particular time slots for always-on access.
• When all 8 slots are dedicated, data rate reaches to 171.2 kbps (8 x 21.4 kbps of raw
un-coded data)
EDGE (2.75G)
• More advanced upgrade to 2G that requires addition of new hardware and software
• Developed as a path to become eventual 3G high speed data access
• New modulation 8-PSK in addition to GSM standard GMSK.
• Allows nine different formats known as Multiple modulation and Coding Scheme (MCS)
• Each MCS state may either use GMSK (low rate) or 8-PSK (high rate).
• A family of MCS for each GSM slot and users can adaptively determine best MCS
setting
• User start first with max error protection and max data rate until the link has
unacceptable outage or delay
• By combining different channels (multi-carrier trans), EDGE provides upto several
megabits per second data throughput.
IS-95B or cdmaOne
• IS-95/CDMA has a single upgrade path IS-95B for eventual 3G operation.
• Dedicate multiple orthogonal user channels for specific users.
• IS-95A support 64 users with data rate 14,400 Kbps
• Medium data rate service by allowing user to command up to 8 Walsh codes.
• The raw data rate reaches to 8x14,400 = 115.2 kbps
• Supports hard handoff procedure
Allow units to search different radio channels without instruction from switch.
User can rapidly tune to different BS.
Evolution to 3G
• Third generation of mobile phone standards based on the International
Telecommunication Union (ITU) family of standards under the International Mobile
Telecommunications programme, "IMT-2000"
• 3G technologies enable network operators to offer users a wider range of more
advanced services while achieving greater network capacity through improved spectral
efficiency. Services include
Broadband wireless data, all in a mobile environment.
Typically, they provide service at 5-10 Mb per second.
• The most significant feature of 3G is that it supports
greater numbers of voice and data customers
at higher data rates at lower incremental cost than 2G
3G Evolution
• The community remain split into two camps
GSM/IS-136/PDC
o The 3G evolution is wideband CDMA (W-CDMA)
o Also known as UMTS
IS-95B or CDMA
o Evolution path is cdma2000
o Several variants exist but all based on IS-95B
• ITU-2000 standards are separated into two major organizations reflecting two 3G camps
3GPP: 3G partnership project for W-CDMA
3GPP2: 3G partnership project 2 for cdma2000
3G W-CDMA (UMTS)
• This standard has evolved under European Telecom. Standards Institute (ETSI).
• Backward compatible with 2G standards GSM, IS-136 and PDC technologies as well as
2.5G
• Bit level packaging of GSM data is retained, with additional capacity and bandwidth
provided by new CDMA air interface
• Always-on packet-based service for computers, entertainment devices and telephone.
• Require expensive new BS equipments making installation slow and gradual
• Data rate supported up to 2.048 Mbps per user
Allowing high quality data, multimedia, streaming audio (for stationary user).
• Future version will support data rate in excess of 8 Mbps
• Minimum spectral allocation of 5 MHz
• Data rates from as low as 8 kbps to as high as 2 Mbps will be carried simultaneously on
a single radio channel.
• Each channel can support between 100 and 350 voice calls simultaneously depending
on propagation conditions
3G CDMA 2000
• Provides seamless and evolutionary upgrade path for 2G and 2.5G CDMA technology.
• Centers on original 1.25 MHz radio channel
• CDMA operators may seamlessly and selectively upgrade without changing entire BS
equipment
• The first 3G CDMA standard cdma2000 1xRTT using single channel (1x => multi-carrier)
• Cdma2000 1x
supports data rate up to 307 kbps in packet mode
Can support up to twice as many users as 2G CDMA
No additional equipment needed, simply software and new channel cards at BS
• Cdma2000 1xEV Evolution by Qualcomm
Proprietary high data rate packet standard to be overlaid on existing
CDMA 1xEC-DO dedicates the channel strictly to data user and support 2.4
Mbps per channel.
• Cdma2000 3xRTT
The ultimate 3G solution relies upon multicarrier that gang adjacent channels
together into 3.75 MHz.
Three non-adjacent channels may be operated simultaneously and in parallel.
Data rate in excess of 2 Mbps similar when compared to W-CDMA
• Advocates of cdma2000 claim their standard much more seamless and less expensive
upgrade path when compared to W-CDMA.
3G TD-SCDMA
• In china, more than 8 millions GSM subscribers were added in just 1 month.
• china‘s desire to craft its own wireless vision.
• Chinese CATT and Siemens jointly submitted IMT-2000 3G standard based on Time
Division Synchronous Code Division Multiple Access
• Relies on existing GSM infrastructure
• 1.6 MHz channel and smart antennas to yield more spectral efficiency.
• 5 ms frames divided into 7 slots allocated to single data only user or several slow users
• TD-SCDMA allows easy upgrade to GSM.
Lecture 10
Evolution of Wireless Networks (Part III)
Limitations of 3G
• Difficulty of CDMA to provide higher data rates
• Need for continuously increasing data rate and bandwidth to meet the multimedia
requirements
• Limitation of spectrum and it‘s allocation
• Inability to roam between different services
• To provide a seamless transport end-to-end mechanism
• To introduce a better system with reduced cost
4G
• Provide a comprehensive IP solution where voice, data and streamed multimedia can be
given to users on an "Anytime, Anywhere" basis, and at higher data rates than previous
generations.
• No formal definition but certain objectives
Fully IP-based integrated system
Provides 100 Mbit/s and 1 Gbit/s speeds both indoors and outdoors, with
premium quality and high security.
4G Objectives
• A spectrally efficient system (in bits/s/Hz and bit/s/Hz/site).
• A nominal data rate of 100 Mbit/s at higher relative speeds and 1 Gbit/s while client and
station are in relatively fixed positions
• High network capacity: more simultaneous users per cell
• Smooth handoff across heterogeneous networks,
• Seamless connectivity and global roaming across multiple networks
• High quality of service for next generation multimedia support (real time audio, high
speed data, HDTV video content, mobile TV, etc)
• Interoperability with existing wireless standards
• An all IP, packet switched network
Convergence of High Speed Internet & Mobility a Major Driver of Future Wireless
• The Wireless Industry has grown at enormous pace over the past decade.
• Over 2.5 billion subscribers to cellular services are enjoying the benefits of staying
connected while on the move.
• With the growth in Internet, a wide range of services are accessed by users through a
wired infrastructure.
• The introduction of mobile Internet brought about by the convergence of Mobile &
Internet technologies is the future objective.
4G Concept
• ―The user has freedom and flexibility to select any desired service with reasonable QoS
and affordable price, anytime, anywhere.‖
Design Objectives
Heterogeneous Networks
Next Generation will also have specifically needs to resolve it’s own multiple issues
• Heterogeneous networks
• Access, handover
• Location coordination, resource coordination
• Adding new users
• QoS, wireless security and authentication
• Network failure backup
• Pricing and billing
Quality of Service
• However, the mobile terminal can not receive IP packets while the process of handover
is finished. This time is called the handover latency.
• Handover latency has a great influence on the flow of multimedia applications in real-
time.
• Mobile IPv6 have been proposed to reduce the handover latency and the number of lost
packets.
• The field ―Traffic Class‖ and ―Flow Label‖ in IPv6 header enables the routers to secure
the special QoS for specific packet series with marked priority.
Security
• Security in wireless networks mainly involves authentication, confidentiality, integrity,
and authorization for the access of network connectivity and QoS resources for the
mobile nodes flow.
• The heterogeneity of wireless networks complicates the security issue.
• Dynamic reconfigurable, adaptive, and lightweight security mechanisms should be
developed.
• AAA (Authentication Authorization Auditing) protocols provide a framework for such
suffered especially for control plane functions and installing security policies in the
mobile node such as encryption, decryption and filtering.
Applications
• Virtual Presence: This means that 4G provides user services at all times, even if the
user is off-site.
• Virtual navigation: 4G provides users with virtual navigation through which a user can
access a database of the streets, buildings etc.
• Tele-geoprocessing applications: This is a combination of GIS (Geographical Information
System) and GPS (Global Positioning System) in which a user can get the location by
querying.
• Tele-Medicine and Education: 4G will support remote health monitoring of patients. For
people who are interested in life long education, 4G provides a good opportunity.
• Crisis management: Natural disasters can cause break down in communication systems.
In today‘s world it might take days or 7 weeks to restore the system. But in 4G it is
expected to restore such crisis issues in a few hours.
WLANs
• Use the unlicensed Industrial Scientific and Medical (ISM) band
• ISM bands in US
900 MHz (902-928 MHz)
2.4 GHz (2400-2483.5 MHz)
5.7 GHz (5725-5850 MHz)
• The most widely adopted standard
IEEE 802.11
• A family of standards define Phy and MAC
• IEEE 802.11:
Infrared (IR)
2.4Ghz ISM band with 1 or 2 Mbps
• IEEE 802.11b: 11 Mbps in 2.4 GHz
• IEEE 802.11a: 54 Mbps in 5.7 GHz
• IEEE 802.11g: 54 MHz in 2.4 GHz
• IEEE 802.11i: Security
• IEEE 802.11e: QoS
• IEEE 802.11f: Inter-access point protocol
Wireless PAN
• IEEE802.15
IEEE 802.15.1 or Bluetooth
o Moderate data range up to 720 kbps
o Operates in ISM band
o 10 m to 100 m range
IEEE 802.15.2
o Co-existence issues of IEEE 802.11 and 802.15
IEEE 802.15.3 high rate
o Low power high data rate up to 20 Mbps
o Designed for multimedia applications over low power devices
IEEE 802.15.4 / ZigBee
o Low power with range of 100m
o Low rate about 20 kbps
Summary
• Next Lecture
Fundamental principles of Cellular networks
Lecture 11
Fundamentals of Cellular Networks (Part I)
Outlines
• Review of last lecture • Locating co-channel cells
• Cellular Concept • Example
• Frequency Reuse • Summary of today‘s lecture
Introduction
• Early mobile system objective was to achieve a large coverage using single high power
antenna
• Impossible to reuse the same frequencies in the same coverage area.
• For example, Bell mobile system in 1970 could support maximum of 12 simultaneous
calls over a thousand square mile.
• The Govt regulatory could not make spectrum allocation proportion to the increasing
demand
• Became imperative to restructure the telephone system to achieve high capacity with
limited radio spectrum.
Cellular Concept
• Cellular concept was a major breakthrough in solving problem of spectrum congestion
and user capacity
• Offers high capacity without any major change in technology
Replacing high-power transmitter (large cell) with many low-power transmitter
(small cells) each providing service to small
Each BS is allocated a portion of the channels.
Nearby BS are assigned different group of channels
So that all the available channels are distributed among the nearby BS.
May be reused as many times as necessary as long as the BS using same
channels are not in overlapping.
• As the demand for service increases, the number of BS can be increased with reduced
transmission power.
• Thereby providing additional capacity with no addition to spectrum.
• This is the foundation of for all modern wireless communication systems.
AMPS Architecture
Frequency Reuse
• Relies on intelligent allocation and reuse of channels.
• A small geographical area with allocation of a group of channels is called cell.
• BS antennas are designed to achieve the desired coverage within a cell avoiding co-
channel interference.
• The design process of selecting and allocating channel groups for all the cellular BS is
called frequency reuse or frequency planning.
• The hexagonal shape representing a cell is conceptual and simplistic model of coverage.
• The actual radio coverage is known as the footprint and is determined from field
measurement, propagation prediction models
• However a regular shape is needed for systematic system design and adaptation to
future growth.
• It might be natural to choose a circle to represent coverage but adjacent circles cannot
be overlaid upon a map without leaving gaps or creating overlapping.
• Thus by using hexagon geometry, the fewest number of cells can cover a geographic
region and it closely approximates circle.
Capacity of System
• When using hexagon to model coverage areas
Center-excited Cell: BS depicted as being either in the center of the cell
o Omni-directional antenna is used
Edge-excited Cell: on three of the six cell vertices
o Sectored direction antenna is used
• Consider a cellular system
which has S duplex channels available for reuse.
Each cell allocated group of k channels (k < S)
S channels divided among N cells (unique and disjoint) then
S = kN
• Cluster: N cells, which collectively use the complete set of available frequencies
• If a cluster is replicated M times in the system, the number of duplex channels C as a
measure of capacity is
C = MkN = MS
• So capacity is directly proportional to the replication factor in a fixed area.
• Factor N is called cluster size and is typically equal to 4, 7, 12.
• If cluster size N is reduced while cell size is kept constant
More clusters are required
More capacity is achieved
• Large cluster size indicates that co-channel cells are far from each other
• Conversely, small cluster size means co-channel cells are located much closer together
• The value of N is a function of how much interference a mobile or BS can tolerate
Clusters are inversely proportion to N
Capacity is directly proportional to Clusters
• Thus frequency reuse factor is given by 1/N.
• In last fig, each hexagon has exactly six equidistant neighbors and that the lines joining
the centers of any cell and its neighbors are separated by multiple of 60 degrees.
There are only certain cluster sizes and layouts possible
Example
• BW = 33 MHz allocated to particular FDD cellular system, where two 25 KHz simplex
channel to provide full-duplex for voice/data.
• Compute the number of channels per cell if a system uses
Four-cell reuse
Seven-cell reuse
Twelve-cell reuse.
• If 1 MHz is dedicated to control channels, determine equitable distribution of control and
voice channels per cell for above three systems?
Solution: Part I
• TotalBW = 33 MHz,
• ChannelBW = 25 KHz x 2 = 50 KHz/duplex channel
• S = 33,000 / 50 = 660 channels
• For N = 4
o k = 660 / 4 ≈ 165 channels
• For N = 7
o k = 660 / 7 ≈ 95 channels
• For N = 12
o k = 660 / 12 ≈ 55 channels
Solution: Part II
• Sc = 1000 / 50 = 20 channels
• Sv = S – Sc = 660 – 20 = 640 channels
• For N=4,
• 5 control channels + 160 voice channel.
• For N=7,
4 cells with 3 control + 92 voice channels
2 cells with 3 control + 90 voice channels
1 cell with 2 control + 92 voice channels
In practice, 1 control/cell and 4x91 + 3x92 voice channels
• For N = 12,
8 cells with 2 control + 53 voice channels
4 cells with 1 control + 54 voice channels
In practice, 1 control and 8x53 + 4x54 voice channels
Summary
• Cellular Concept • Next Lecture
• Frequency Reuse Handoff Strategies
• Locating co-channel cells Interference and System
• Example Capacity
Lecture 12
Fundamentals of Cellular Networks (Part II)
Outlines
• Channel Assignment Strategies • Prioritizing Handoff
• Handoff Strategies Guard channels concept
When to handoff Queuing handoff requests
1G, BS based • Practical handoff considerations
2G or today's, Mobile- Umbrella cell
Assisted Cell dragging
Last lecture
• Cellular Concept • Locating co-channel cells
• Frequency Reuse • Example
Handoff Strategies
• Handoff: a mobile user moves to a different cell while conversation is in progress, MSC
transfers the call to a new BS.
Identifying new BS
New voice and control channels to be allocated
• Handoff must be performed
Successfully
Infrequently
Imperceptible
• To achieve this, designer must specify optimum signal level at which handoff initiates
• Once, a signal level is specified as min usable for acceptable voice quality
A slightly stronger signal level is used as threshold
Normally taken between -90dBm and -100 dBm.
• This margin ∆ = Pr_handoff – Pr_min, can not be too large or too small
If ∆ is too large, unnecessary handoffs, burden on MSC
If ∆ is too small, insufficient time to complete a handoff before a call is lost due to
weak signal
∆ should be chosen carefully to meet conflicting requirements
• Call drops
Excessive delay by MSC due to high traffic load
∆ is set too small for handoff time
No channels are available on any of nearby BS
• When to handoff,
Drop in signal level is not due to momentary fading
Mobile is actually moving away from serving BS
To ensure this,
o BS monitors the signal level for certain period of time
o The period depends on the vehicle speed
If slope of average received signal level is steep, handoff is made quickly
• In 1G, signal level was measured by BS and supervised by MSC
Each BS constantly monitors the signal strength of all its reverse channels to
determine relative location of each mobile user
In addition, the locator receiver (a spare receiver) is used to scan and measure
RSSI of mobile users in neighboring cells and reports to MSC
Based on these measurements, MSC decides if handoff is necessary
Prioritizing Handoffs
• Two methods of handoff prioritizing
Guard channel concept
o A fraction of available channels is reserved exclusively for handoff
requests
o Has disadvantage of reducing total carried traffic
o Offers efficient spectrum utilization when dynamic channel assignment
strategies by minimizing number of required guard channels
Queuing of handoff requests
o Possible due to time interval elapsed when the signal level drops below to
threshold until minimum signal level
o Decrease probability of forced termination due to lack of available
channels
o Tradeoff between decrease in probability of forced termination and total
traffic
o The delay time and queue size is determined from traffic pattern
o Queuing does not guarantee zero probability of call termination since
large delays will signal level to drop min
•
Cell dragging
Problem in micro-cell due to high signal strength of pedestrian users.
Occurs in urban areas when there is a LOS path
Average signal strength does not decay rapidly even if a user travels well beyond
the range of cell
The RSSI may be above the handoff threshold and thus handoff is not made
This creates potential interference since a user has traveled deep within a
neighboring cell
Handoff parameters, threshold must be adjusted carefully
• In 1G,
Time to make handoff when signal drops below threshold is 10s.
This requires that the value of ∆ be on the order of 6 dB to 12 dB.
• In 2G
Such as GSM, MAHO determines the best handoff candidates and requires only
1 or 2 seconds.
∆ is usually between 0 dB and 6 dB.
Provides MSC substantial time to rescue a call that is in need of handoff
• In IS-95 (CDMA) system
Provides unique handoff capability that can not be provided in with other
wireless systems
Unlike channelized (hard handoff), SS mobiles share the same channel in every
cell.
Thus handoff does not assign channel but a different BS handles a
communication task
By simultaneously evaluating RSSI from single user, MSC decides which version
of the signal is best
This ability selects between instantaneous received signals from a variety of BS
is called soft handoff
• In IS-95 (CDMA) system
Provides unique handoff capability that cannot be provided in with other wireless
systems
Unlike channelized (hard handoff), SS mobiles share the same channel in every
cell.
Thus handoff does not assign channel but a different BS handles a
communication task
By simultaneously evaluating RSSI from single user, MSC decides which version
of the signal is best
This ability selects between instantaneous received signals from a variety of BS
is called soft handoff
Summary
• Channel Assignment Strategies
• Handoff Strategies
• Prioritizing Handoff
• Practical handoff considerations
Lecture 13
Fundamentals of Cellular Networks (Part III)
Outlines
• Last lecture review
• Interference and system capacity
Co-channel interference and capacity
Adjacent channel interference and capacity
• Channel Planning for Wireless System
where S is the desired signal power from desired BS and Ii is the interference
power caused by ith interfering co-channel cell
• Average received signal strength at any point decays as a power law of the distance of
separation between transmitter and receiver
• Average received power Pr at a distance d from the transmitting antenna is approx
• Considering only the first layer of interfering cells, which are equidistant D from the
desired BS
• Eqn 4 implies to
It relates S/I to cluster size N, which in turn determines the overall capacity of the
system
• For US AMPS system, tests indicate that for sufficient voice quality S/I should be greater
or equal to 18 dB.
• By using Eqn 5, in order to meet this requirement, N should be at least 6.49 assuming
n=4.
• Thus a minimum cluster size of 7 is required to meet S/I requirement of 18 dB
• It should be noted Eqn 5 is based on hexagonal cell geometry
Example
• If S/I is required 15 dB for satisfactory forward channel performance, what is the
frequency reuse factor and cluster size that should be used for maximum capacity if path
loss exponent n = 4 and n = 3? Assuming 6 co-channel cells in first tier at same distance
from desired BS
n = 4, lets consider 7-cell reuse
o Using Eqn. 1, reuse ratio is 4.583
o Using 5, S/I = 1/6 x (4.583)^4 = 75.3 = 18.66 dB
o Since this is greater than min required, N=7 can be used
n = 3, first consider 7-cell reuse
o S/I = 1/6 x (4.583)^3 = 16.04 = 12.05 dB
o Since this is less than min required,
o Next possible value of N is 12-cell reuse (i = j = 2)
o Using Eqn. 1, reuse ratio is 6.0
o S/I = 1/6 x (6)^3 = 36 = 15.56 dB
o Since this is greater than min required S/I, So N=12 is used
Lecture 14
Fundamentals of Cellular Networks (Part IV)
Outlines
• Trunking and Grade of Service • Improving Coverage and Capacity
Measuring Traffic Intensity Cell Splitting
Trunked Systems Sectoring
o Blocked Calls Repeaters for Range
Cleared Extension
o Blocked Calls Microcell Zone Concept
Delayed
Erlang Charts
Trunking
• Allows a large number of users to share a small number of channels
• Channel allocated per call basis from a pool of available channels
• Relies on statistical behavior of users so that a fixed number of channels (circuits) may
accommodate a large random user community
• Trunking theory is used to determine number of channels for particular area (users)
• Tradeoff between the number of available channels and likelihood of call blocking during
peak calling hours
Trunking Theory
• Developed by Erlang, Danish Mathematician, how a large population can be
accommodated by a limited number of servers, in late 19th century
• Today, used to measure traffic intensity
• 1 Erlang represents the amount of traffic intensity carried by a completely occupied
channel
i.e. one call-hour per hour or one call-minute per minute
0.5 Erlang: Radio channel occupied 30 minutes during 1 hour
Grade of Service
• GOS is a benchmark used to define performance of a particular trunked system
Measure of the ability of a user to access trunked system during the busiest hour.
o Busy hour is based on the demands in an hour during a week, month or
year.
o Typically occur during rush hours between 4 pm to 6 pm.
• GOS is typically given as likelihood of call blocking or delay experienced greater than
certain queue time
Traffic intensity
• Traffic intensity is measured as call request rate multiplied by call holding time
User traffic intensity of Au Erlang is
(1) Au= λH
Where H is average call duration or holding time and λ is average number of call
requests.
For system of U users and unspecified channels, the total offered traffic intensity A is
(2) A = UAu
In a C channel trunked system, traffic equally distributed, traffic intensity per channel Ac
(3) Ac= UAu/C
• Note that traffic is not necessarily the carried traffic but offered to the trunked system
• If offered load increases the system capacity, the carried traffic becomes limited
• In Erlang, max possible carried traffic is the number of channels C
• AMPS is designed for a GOS of 2% blocking
i.e. 2 out of 100 calls will be blocked due to channel occupancy
• There are two types of commonly used trunked systems
Blocked Calls Cleared Blocked Calls Delayed
Erlang B
Erlang C
• if no channels are available immediately, the call is delayed, probability that call is forced
to wait more than t seconds is
Trunking Efficiency
• A measure of the number of users which can be offered a particular GOS with particular
configuration of channels
• The way channels are grouped can alter the number of users handled
• For example, From table
10 trunked channels at GOS of 0.01 can support 4.46 Erlang of traffic
Whereas 2 groups of 5 channels can support 2x1.36=2.72 Erlangs of traffic, 60%
lesser
Cell Splitting
• Achieve capacity improvement by decreasing R and keeping D/R (cell reuse ratio)
unchanged
• Divide the congested cells into smaller cells
Smaller cells are called micro cells
• If radius of cell is cut to half, approximately four cells would be required
Increased number of cells would increase the number of clusters, which in turn
increase the capacity
• Allows a system to grow by replacing larger cells with smaller cells without upsetting the
allocation scheme
• For new cells to be smaller in size, tx power must be reduced. By which factor?
Sectoring
• Keep cell radius unchanged and decrease D/R
• Increases SIR so that cluster size may be reduced
SIR is improved using directional antennas
Hence increasing frequency reuse without changing transmission power
• Cell is partitioned into 3 120o sectors or 6 60o sectors as shown in Fig
Lecture 15
Analog Mobile Phone System
Outlines
• AMPS introduction
• System Overview
• Call handling
• Air interface
• Supervisory signals
• N-AMPS
AMPS Introduction
• First deployed in late 1983 in urban and suburban areas of Chicago.
• Total of 40 MHz in 800 MHz band allocated by FCC
• Later on, Additional 10 MHz allocated as user demand increased
• First AMPS systems used large cells and omni directional antennas to minimize initial
equipment cost
• It covered approximately 2100 square miles
• AMPS system uses 7-cell reuse pattern with provision of sectoring and cell splitting to
increase system capacity.
• After extensive tests, it was found that 30 KHz channel requires s SIR of 18 dB.
• The smallest reuse factor which satisfies this requirement using 120 degree directional
antenna is N = 7
• ETACS: European Total Access Communication System
Identical to AMPS except scaled to 25 KHz as opposed to 30 KHz
Different format of mobile identification number (MIN) due to need of
accommodating different country codes in Europe as opposed to area code in
US
AMPS Architecture
System Overview
• AMPS and ETACS both use FM and FDD for radio transmission like other 1G systems
• In US,
Transmissions from mobiles to BS (reverse link) use frequencies between 824-
849 MHz
While BS transmits to mobiles (forward link) using frequencies between 869-894
MHz
A separation of 45 MHz between forward and reverse channels is due to use of
inexpensive and highly selective duplexers in mobile units.
• The control channel and blank-and-burst data streams are transmitted at 10kbps in
AMPS and 8kbps in ETACS
• These wideband streams have max frequency deviation of + 8KHz and +6.4 KHz for
AMPS and ETACS
• Each BS has
One control channel transmitter that transmits on forward control channel (FCC)
One control channel receiver that listen to reverse control channel (RCC) to set-
up a call
8 or more duplex voice channels
Commercial BS supports as many as 57 voice channels
• Forward Voice Channel (FVC) carry the conversation originating from landline caller to
cellular subscriber
• Reverse Control Channel (RVC) in opposite
• The actual number of control and voice channels varies widely depending on the traffic,
maturity of the system and location of other BSs.
• The number of BS in a service area varies widely as well from few towers in rural area to
several hundred or more BS in a large city.
• Each BS continuously transmits digital FSK data on FCC at all times so that idle
subscriber units can lock onto the strongest FCC.
• All users must be locked onto a FCC in order to originate or receive calls.
• The BS RCC receiver constantly monitors transmission from subscribers that are locked
onto the matching FCC
• In US AMPS, there are 21 control channels and ETACS supports 42 control channels
per provider
• Thus any cellular phone needs to scan limited number of control channels to find best
serving BS
• It is upto the service providers to make sure adjacent FCC are not assigned to nearby
BSs
• The nonwireline service provider (―A‖ provider) is assigned odd system identification
number (SID) and wireline service provider (―B‖ provider) is assigned even SID.
• SID is transmitted once every 0.8 seconds on each FCC, along with other overhead data
which reports the status of cellular system
• In ETACS area identification numbers (AID) are used instead of SID.
Call handling
• Call: landline user cellular subscriber
From PSTN arrives at MSC.
A paging request is sent out with subscriber MIN simultaneously on every BS
FCC.
If intended subscriber receives its page on FCC, it responds with ACK on RCC.
The MSC directs the BS to assign FVC and RVC pair to take place call
The BS also assigns supervisory audio tone (SAT) and a voice mobile
attenuation code (VMAC) as it moves the call to the voice channels
• SAT
It allows user and BS to distinguish each other from co-channel users located in
different cells
Transmitted continuously on the both FVC and RVC at three different
frequencies 5070 Hz, 6000 Hz, 6030 Hz
• VMAC
Instructs the user to transmit at a specific power level
• Once on the voice channel, wideband FSK data is used by BS and subscriber in a blank-
and-burst mode to initiate handoffs, change transmitter power as needed and provide
other system data
• Blank-and-burst signaling allows the MSC to send bursty data on voice channels by
temporarily omitting speech and SAT and replacing with data.
• Call: mobile user landline user
Subscriber transmits request (MIN, electronic serial number, station class mark
and destination number on RCC
If received correctly by BS, sent to MSC
MSC check if user is properly registered, connects to the PSTN
Assigns FVC and RVC with SAT and VMAC
• During a call, MSC issues numerous blank-and-burst commands which switch
Between different voice channels on different BS depending on where the user is
traveling
• The MSC uses scanning receiver called locator in nearby BS to determine RSSI for
handoff
Lecture 16
GSM: Global System for Mobile Communication
Outlines
• Review of Last Lecture • Specifications
• GSM Introduction • Subscriber Services
• GSM System Architecture • Mobility
• GSM Network Areas • Identifiers in GSM Network
Last Lecture
• AMPS introduction • Air interface
• System Overview • Supervisory signals
• Call handling • N-AMPS
GSM Introduction
• Analog systems:
Inability to handle the growing capacity needs in a cost-efficient manner
• Various systems have been developed without the benefit of standardized specifications.
• Digital Systems:
Ease of signaling, lower levels of interference, integration of transmission and
switching, and increased ability to meet capacity demands.
It addresses the specification issue particularly
GSM provides recommendations, not requirements.
The GSM specifications define the functions and interface requirements in detail
but do not address the hardware to limit the designers as little as possible
Specifications
• Frequency band—1,850 to 1,990 MHz (mobile station to base station).
• Duplex distance—80 MHz.
• Channel bandwidth -- 200 kHz.
• Modulation—Gaussian minimum shift keying (GMSK).
• Transmission rate—over-the-air bit rate of 270 kbps.
• Access method—time division multiple access
• (TDMA)
• Speech coder—GSM uses linear predictive coding (LPC). Speech is encoded at 13 kbps
GSM Mobility
• Roaming with GSM is made possible through the separation of switching capability and
subscription data.
• A GSM subscriber has her subscription data permanently registered in the HLR in
his/her HPLMN.
• The GSM operator is responsible for provisioning this data in the HLR. The MSC and
GMSC in a PLMN, on the other hand, are not specific for one subscriber group.
Mobile Station
• Mobile Equipment (ME)
• Subscriber Identification Module (SIM)
This is the chip embedded in the SIM card that identifies a subscriber of a GSM
network;
When the SIM card is inserted in the ME, the subscriber may register with a GSM
network.
The ME is now effectively personalized for this GSM subscriber;
The SIM card contains information such as IMSI, advice of charge parameters,
operator-specific emergency number, etc.
Lecture 17
GPRS: General Packet Radio Service (Part I)
Outlines
• Review of last lecture • Registration and Session
• Identifiers in GSM Network and Call Management
Routing • Routing Scenario in GPRS
• Introduction to GPRS • Channels Classification
• GPRS Architecture
Last Lecture
• GSM Introduction Facsimile group III
• GSM System Architecture Short message services
• GSM Network Areas Cell broadcast
• Specifications Voice and fax mail
• Subscriber Services • Mobility
Dual-tone multifrequency • Identifiers in GSM Network
(DTMF)
• General Packet Radio Service in GSM‖, Jian Cai and David J. Goodman, Rutgers
University,
• IEEE Communications Magazine, Oct 1997
GPRS
• GPRS is an enhancement over the GSM and adds some nodes in the network to
provide the packet switched services. These network nodes are called GSNs (GPRS
Support Nodes) and are responsible for the routing and delivery of the data packets to
and from the MS and external packet data networks (PDN).
Introduction to GPRS
• Goals of GPRS:
Efficient bandwidth usage for bursty data traffic (e.g. Internet)
Higher data rates
New charging models
• Initially specified by ETSI
• A lot of releases (R97, R98, R99, R4 etc.)
• Specifications handed over to 3GPP
• A lot of specifications considered in this overview:
Release 5 (Ganz) / 6 (most recent TS at 3GPP)
GPRS Architecture
• ―General Packet Radio Service in GSM‖, Jian Cai and David J. Goodman, Rutgers
University,
• IEEE Communications Magazine, Oct 1997
A/Gb mode
• Class A: MS can operate simultaneous packet switched and circuit switched services
• Class B: MS can operate either one at one time
Most common for handsets today
• Class C: MS can operate only packet switched services
E.g. expansion cards for laptops
Iu mode
• CS/PS mode: Same as Class A in A/Gb mode
• PS mode: MS can only operate packet switched services
• CS mode: MS can only operate circuit switched services
Service Types
• Point-to-Point
Internet access by user
• Point-to-Multipoint
Delivery of information (e.g. news) to multiple locations or interactive conference
applications
GPRS BSS
• A software upgrade is required in the existing Base Transceiver Site (BTS).
• The Base Station Controller (BSC) also requires a software upgrade, and the
installation of a new piece of hardware called a packet control unit (PCU).
• The PCU directs the data traffic to the GPRS network and can be a separate hardware
element associated with BSC.
• The PCU provides a physical and logical data interface out of BSS for packet data
traffic.
Session Management
• After Successful attach, when it wishes to begin a packet data, it must activate Packet
Data Protocol (PDP) address.This address is unique only for a particular session. It
consists of,
PDP type
PDP address assigned to MS
Requested QoS
• Once PDP Context is activated, a two-way tunnel is established between the device
current SGSN and the corresponding GGSN.
• GGSN hides the mobility from onward
• PDP-Address allocation:
Static:Assigned by network operator of User‘s home PLMN.
Dynamic:Assigned by Corresponding GGSN.
Physical Channels
• Defined by timeslot (0-7) and radio frequency channel
• Shared Basic Physical Sub Channel
Shared among several users (up to 8)
• Dedicated Basic Physical Sub Channel
One user
• Packet Data Channel (PDCH)
Dedicated to packet data traffic from logical channels (next slide)
o Control
o User data
Lecture 18
GPRS: General Packet Radio Service (Part II)
Outlines
• GPRS Protocol Architecture
MS – BSS
BSS – SGSN
SGSN – GGSN
GGSN – PDN
• GPRS Air Interface
• Data Routing and Mobility
• Uplink Data Transfer
• Downlink Data Transfer
• QoS in GPRS
Last Lecture
• Introduction to GPRS
• GPRS Architecture
• Registration and Session Management
• Routing Scenario in GPRS
• Channels Classification
Logical Channels
Control Channels
group of MS
• Packet Dedicated Control Channel (PDCCH)
Slow Associated Control Channel (SACCH)
o Radio measurements, power control and data
o SMS transfer during calls
Fast Associated Control Channel (FACCH)
o For one Traffic Channel (TCH)
o Carry Ack
Stand-alone Dedicated Control Channel (SDCCH)
o is used in the GSM system to provide a reliable connection for signalling
and Short Message Service.
• Packet Broadcast Control Channel (PBCCH)
Frequency correction channels
o Allows the MS to synchronize their Local Oscillator (LO) to the Base
Station LO, using frequency offset estimation and correction.
Synchronization channel (MS freq. vs. BS)
Broadcast control channel for general information on the base station
GPRS Architecture
Protocol Architecture
• Transmission Plane
The protocols provide transmission of user data and its associated signaling
• Signaling Plane
Comprises protocols for the control and support of functions of the transmission
plane
Transmission Plane
• GPRS Backbone:SGSN GGSN
GTP tunnels the user packets and related signaling information between the
GPRS support nodes.
• Sub-network dependent convergence protocol
It is used to transfer packets between SGSN and MS
• Data link layer
LLC(MS-SGSN)
RLC/MAC(MS-BSS)
• Physical layer
PLL:channel coding,detection of errors, forward error correction, interleaving,
detection of physical link congestion
RFL:modulation and demodulation
• Slotted Aloha
Used in PRACH
o MSs send packets in uplink direction at the beginning of a slot
o Collision: Back off -> timer (arbitrary) -> re-transmit
• Time Division Multiple Access (TDMA)
Predefined slots allocated by BSS
Contention-free channel access
Mobility
• A mobile station has three states in GPRS system:
Idle
Standby
Active
• The operation of GPRS is partly independent of the GSM network. However, some procedures
share the network elements with current GSM functions.
• Data is transmitted between a mobile station and the GPRS network only when the mobile
station is in the active state.
• In the active state, the SGSN knows the cell location of the mobile station.
• In the standby state, the location of the station is known only as to which routing area it is in.
• In the idle state, the mobile station does not have a logical GPRS context activated or any
Packet-Switched Public Data Network (PSPDZ) addresses allocated, The MS can receive only
those multicast messages that can be received by any GPRS mobile station.
QoS Support
• Assumes that IP multimedia applications are able to
Define their requirements
Negotiate their capabilities
Identify and select available media components
• GPRS specifies signaling that enable support for various traffic streams
Constant/variable bit rate
Connection oriented/connection less
Etc.
QoS Profile for GPRS Bearers
• 4 parameters:
Service precedence
o 3 classes
Reliability parameter
o 3 classes
Delay parameters
o 4 classes
Throughput parameter
o Maximum and mean bit rates
• QoS profile is included in Packet Data Protocol (PDP) context
• Negotiation managed through PDP procedures (activation, modification and deactivation)
Conclusions
• Same GMSK modulation as GSM
• 4 channel coding modes
• Packet-mode supporting up to about 144 kbps
EDGE Airlink
• Extends GPRS packet data with adaptive modulation/coding
• 2x spectral efficiency of GPRS for best effort data
• 8-PSK/GMSK at 271 ksps in 200 KHz RF channels supports 8.2 to 59.2 kbps per time slot
• Supports peak rates over 384 kbps
Summary
• GPRS Protocol Architecture
MS – BSS
BSS – SGSN
SGSN – GGSN
GGSN – PDN
• GPRS Air Interface
• Data Routing and Mobility
• Uplink Data Transfer
• Downlink Data Transfer
• QoS in GPRS
Lecture 19
cdmaOne/IS-95
Outlines
• Last Lecture Sync Channel
• IS-136 Paging
• CDMA/IS-95 Traffic
• Advantages and drwabacks • IS-95 Reverse Channels
• IS-95 Forward Channels Access Channels
Pilot Channel Traffic
Last Lecture
• GPRS Protocol Architecture
MS – BSS
BSS – SGSN
SGSN – GGSN
GGSN – PDN
• GPRS Air Interface
• Data Routing and Mobility
• Uplink Data Transfer
• Downlink Data Transfer
• QoS in GPRS
IS-136
• Evolution of AMPS
• Based on TDMA
• Operates in 800 / 1900 MHz band
• TDMA frames of 6 time slots, 40 ms in length
• Half rate in 1 slot and double rate in 4 slots
IS-136 Channels
• Digital Control Channel (DCCH)
• Occupies full rate channel (2 time slots)
• Divided into logical channels
• SMS point-to-point, paging and access response channel (SPACH)
• Broadcast control channel (BCCH)
• Shared channel feedback (SCF)
• Random access control channel
Specification summary
What is CDMA
• Both an access method and air-interface
Rest of the network is very similar
Radio resource management, mobility management, security are similar
• Power control and handoffs are different
• Uses DSSS
• Frequency reuse factor is 1
• 3 systems
IS-95 2G, W-CDMA, and CDMA2000
Forward Channels
Sync Channel
• Used to acquire initial time synchronization
• Synch message includes system ID (SID), network ID (NID), the offset of the PN short
code, the state of the PN-long code, and the paging channel data rate (4.8/9.6 Kbps)
• Uses W32 for spreading
• Operates at 1200 bps
Paging Channel
• Uses W1-W7
• There is no power control
• Additionally scrambled by PN long code, which is generated by LFSR of length 42
• The rate 4.8 Kbps or 9.6Kbps
Traffic Channels
• Carry user information
• Two possible date rates
RS1={9.6, 4.8, 2.4, 1.2 Kbps}
RS2={14.4, 7.2, 3.6, 1.8 Kbps}
• RS1 is mandatory for IS-95, but support for RS2 is optional
• Also carry power control bits for the reverse channel
Summary
• IS-136
• CDMA/IS-95
• Advantages and drwabacks
• IS-95 Forward Channels
Pilot Channel
Sync Channel
Paging
Traffic
• Next Lecture
Lecture 20
EDGE
Outlines
• Last Lecture Review • Link Adaptation and Incremental
• Walsh Codes Redundancy
• IS-95 Reverse Link • Capacity Planning
• EDGE Introduction • Dynamic Abis pool
• Modulation and Coding
Schemes
Last Lecture
• IS-136 • IS-95 Forward Channels
• CDMA/IS-95 o Pilot Channel
• Advantages o Sync Channel
o Frequency diversity, o Paging
multipath resistance, o Traffic
privacy, graceful • IS-95 Reverse Channels
degradation o Access Channels
• Drwabacks o Traffic
o Self-jamming, near-far • Next Lecture
problem, soft handoff
Walsh Codes
• 2x2 Walsh Matrix
GPRS Architecture
• Similar to GPRS but some changes for higher data rates. Important change is
modulation scheme
Payload Format
Benefits
• For Operators
Migration to wireless multimedia services
Improved customer satisfaction
Possibility of early market deployment of third generation type applications
• For Users
Improved quality of service
Personal multimedia services
Potentially lower price per bit
Summary
• Walsh Codes
• IS-95 Reverse Link
• EDGE Introduction
• Modulation and Coding Schemes
• Link Adaptation and Incremental Redundancy
• Capacity Planning
• Dynamic Abis pool
• Next Lecture
WCDMA
Lecture 21
WCDMA (Part I)
Outlines
• Last Lecture review • Radio Interface protocol Architecture
• UMTS • Protocol Models for UTRAN
• Service Classes in UMTS • Logical Channels
• UTRAN Architecture
UMTS
• UMTS networks have predominance of data traffic unlike GSM networks.
• The data rate will be significantly higher than that offered by GSM / GPRS / EDGE
• 3G networks serve different purpose and thus the major changes from previous
networks are
Max user data rate up to 384 kbps
Efficient handover between different operators and technologies e.g. GSM and
UMTS
Ability to deliver at requested bandwidth
Ability to deliver different services with the required quality
• Layer 1
The actual medium of transfer
The main functions of this layer include RF processing,
modulation/demodulation, multiplexing / demultiplexing of physical channels
Error detection and correction, rate matching, power control, synchronization etc
• Layer 2
It has two main sub-layer
o RLC
o MAC
• MAC
Responsible for mapping logical channels to the transport channels
An interface between L1 & L3 and provides packet multiplexing / demultiplexing
Measurement related to traffic volume on logical channels and reporting to layer
3
• RLC
Segmentation reassembly of variable size data packets
Error correction by retransmission and ACKed data transfer mode
Controlling rate flow, concatenation, cyphering and preservation of higher-order
PDUs
Operates in three mode as in GPRS
• Layer 3
Contains sub-layers but RRC is the one that interact with layer 2
Handles control plane signaling between UE and network in connected mode
Responsible for bearer functions like establishment, release, maintenance and
reconfiguration in the user plane and of radio resources in control plane
Functions of RRC include radio resource management and mobility
management, as well as power control, routing and paging
• Two other layers
Packet data convergence protocol (PDCP)
o Major functions being compression of PDU at transmitting end and
decompression at receiving end in all of three modes of RLC.
Broadcast – Multicast Control (BMC)
o Functions only in transparent and unACKed modes providing
broadcast/multicast scheduling and transmission of user data.
Common Control channel CCCH Used (usually by UE) for transmitting info related
(UL/DL) to control between network and UE
Common Traffic Channel CTCH Used to transmit dedicated info to a group of UEs
(DL)
Dedicated Control Channel DCCH Dedicated channel for control related information
(UL/DL) between UEs and network
Dedicated Traffic Channel DTCH Similar to DCCH except that it is used for user
(UL/DL) information
Summary
• UMTS
• Service Classes in UMTS
• UTRAN Architecture
• Radio Interface protocol Architecture
• Protocol Models for UTRAN
• Logical Channels
• Next Lecture
WCDMA
Lecture 22
WCDMA (Part II)
Outlines
• Last Lecture Review • Physical Layer Procedures
Spreading and Scrambling RACH Operation
Transport Channels Cell Searching
Physical Channels Power Control
o UL Dedicated o Open Fast loop
• Signalling o Closed Loop
Uplink SF 4 to 256
Downlink SF 4 to 512
Channelization
• Channelisation codes are orthogonal codes, based on Orthogonal Variable Spreading
Factor (OVSF) technique
• The codes are fully orthogonal, i.e., they do not interfere with each other, only if the
codes are time synchronized
• Thus, channelization codes can separate the transmissions from a single source
• In the downlink, it can separate different users within one cell/sector
• Limited orthogonal codes must be reused in every cell
Problem: Interference if two cells use the same code
Solution: Scrambling codes to reduce inter-base-station interference
• It is possible that two mobiles are using the same codes.
• In order to separate different users in the uplink, scrambling codes are used.
• One code tree is used with one scrambling code on top of the tree.
•
Scrambling
• In the scrambling process the code sequence is multiplied with a pseudorandom
scrambling code.
• The scrambling code can be a long code (a Gold code with 10 ms period) or a short
code (S(2) code).
• In the downlink scrambling codes are used to reduce the inter-basestation interference.
Typically, each Node B has only one scrambling code for UEs to separate base stations.
Since a code tree under one scrambling code is used by all users in its cell, proper code
management is needed.
Channel Concept
• Three separate channels concepts in the UTRA: logical, transport, and physical
channels.
Logical channels define what type of data is transferred.
Transport channels define how and with which type of characteristics the data is
transferred by the physical layer.
Physical data define the exact physical characteristics of the radio channel.
(UL / DL) Dedicated channel DCH Dedicated physical data channel DPDCH
Dedicated physical control channel DPCCH
(UL) Random access channel RACH Physical random access channel PRACH
(UL) Common packet channel CPCH Physical common packet channel PCPCH
(DL) Broadcast channel BCH Primary common control physical channel P-CCPCH
(DL) Forward access channel FACH Secondary common control physical channel S-
(DL) Paging channel PCH CCPCH
• Dedicated Physical Data Channel (DPDCH) has a spreading factor from 4 to 256 and its
data rate may vary on a frame-by-frame basis informed on DPCCH channel.
• Parallel channel codes can be used in order to provide 2 Mbps user data
UL receiver in BS
• It performs following
Start receiving the frame, de-spreading DPCCH and buffering the DPDCH
according to max bit rate corresponding to the smallest spreading factor
For every slot
o Obtain channel estimate using pilot bits and estimate SIR
o Send TPC command in DL to UE to control UL tx power
o Decode TPC bit in every slot and adjust DL power for that UE
For every 2nd or 4th slot
o Decode FBI bits, if present in 2 or 4 slots and adjust antenna phases and
amplitude for transmission diversity
For every 10 ms frame
o Decode TFCI information from DPCCH frame to obtain bit rate
For transmission time interval (TTI) of 10, 20, 40 or 80 ms, decode DPDCH data
RACH Operation
• First, UE sends a preamble.
• The SF of the preamble is 256 and contain a signature sequence of 16 symbols – a total
length of 4096 chips.
• Wait for the acknowledged with the Acquisition (AICH) from the BS.
• In case no AICH received after a period of time, the UE sends another preamble with
higher power.
• When AICH is received, UE sends 10 or 20 ms message part.
• The SF for the message is from 32 to 256.
SSC Sequence
Power Control
• Fast Closed Loop PC – Inner Loop PC
Feedback information.
Uplink PC is used for near-far problem. Downlink PC is to ensure that there is
enough power for mobiles at the cell edge.
One PC command per slot – 1500 Hz
Two special cases for fast closed loop PC:
Summary
• Spreading and Scrambling
• Transport Channels
• Physical Channels
UL Dedicated
• Signalling
• Physical Layer Procedures
RACH Operation
Cell Searching
Power Control
o Open Fast loop
o Closed Loop
Lecture 23
WCDMA (Part III)
Outlines
• Compressed mode measurements • Packet scheduling algorithms
• Handover measurements division scheduling
-mode division scheduling
Inter-mode Transmission Power-based
Inter-system scheduling
• WCDMA packet data access
• Transport channels for packet data
Common , dedicated, shared
• No power control during compressed mode. Large step size is used after a compressed
frame to allow the power level to converge more quickly to the correct value after the
break.
Very short values of TGL (1 or 2) is excluded the hardware requires some time
to switch to different frequency and not as much time for measurements
Link performance does not degrade much if the terminal is not at the cell edge
since there is room to compensate with fast power control.
Handover measurements
• Intra-mode handover
Include soft handover, softer handover and hard handover.
• Inter-mode handover
Handover to the UTRA TDD mode.
• Inter-system handover
Handover to other system, such as GSM.
Intra-Mode Handover
• Rely on the Ec/No measurement performed from the CPICH.
• The quantities defined that can be measured by the terminal from CPICH are
Received Signal Code Power (RSCP): received power on one code after de-
spreading
RSSI: wideband received power within channel b/w
Ec/No, representing RSCP/RSSI
• Additional information for soft handover purposes is the relative timing between the cells
to allow coherent combining in the RAKE receiver, otherwise would be difficult to
combine.
If cells are within 10ms window, the relative timing can be found from primary
scrambling code phase
Otherwise terminals need to decode System Frame Number from primary
CCPCH that takes time and may suffer errors.
The 10 ms window has no relevance when timing information provided in
neighboring cells list.
• For hard handover, timing info is not needed and different frequency measurements can
be done with aid of compressed mode
• Dual mode FDD-TDD terminals operating in FDD measure power level from TDD cells
available
• The TDD CCPCH bursts sent twice during 10ms frame can be used for measurement.
• Since TDD cells are synchronized, finding one slot means that other TDD cells have
roughly same timing for their burst.
• Terminal receives GSM synch channel during compressed frames in UTRA FDD.
• GSM 1800 set special requirements for compressed model
Summary
• Compressed mode measurements
• Handover measurements
Intra-mode
Inter-mode
Inter-system
• WCDMA packet data access
• Transport channels for packet data
Common, dedicated, shared
• Packet scheduling algorithms
Time division scheduling
Code division scheduling
Transmission Power-based scheduling
• Next Lecture
cdma2000
Lecture 24
CDMA2000
Outlines
• Last lecture review Packet Data Serving Node
• Cdma2000 introduction (PDSN)
• New MAC and Physical layer • Mobility Management
features • Handoff
• Physical layer of cdma2000 Intra-PCF
• Reverse Physical channels Inter-PCF/Intra-PDSN
• New Network elements in cdma2000 Inter-PDS
Packet Control Function
(PCF)
CDMA2000 Introduction
• Provides seamless and evolutionary upgrade path for 2G and 2.5G cdma technology.
• Centers on original 1.25 MHz radio channel
• CDMA operators may seamlessly and selectively upgrade without changing entire BS
equipment
• The first 3G cdma standard cdma2000 1xRTT using single channel (1x => multi-carrier)
• Cdma2000 1x
Supports data rate up to 307 kbps in packet mode
Can support up to twice as many users as 2G cdma
Cdma 1xEV-DO dedicates the channel strictly to data user and support 2.4 Mbps
per channel.
cdma2000
• Cdma2000 3xRTT
The ultimate 3G solution relies upon multicarrier that gang adjacent channels
together into 3.75 MHz.
Three non-adjacent channels may be operated simultaneously and in parallel.
Data rate in excess of 2 Mbps similar when compared to W-CDMA
• Advocates of cdma2000 claim their standard much more seamless and less expensive
upgrade path when compared to W-CDMA.
Variable data rate implement. Variable SF; multi code Repet., puncturing, multi code
Base station acquisition/detect 3 step; slot, frame, code Time shifted PN correlation
Physical Layer
• The cdma2000 air interface is designed to provide flexible framework for supporting
voice and other circuit-switched data as well as bursty packet data bearer services with
different QoS
• cdma2000 supports RF channel band width of SRx1.25 MHz. currently SR 1 and 3 are
supported and can be extended to 6, 9 and 12.
• A number of fixed and variable rate physical channels are defined with new variable-
length spreading codes and PN codes.
• The data rate, channel encoding and modulation parameters are specified by radio
configurations (RCs)
For SR 1 and 3, there are 7 RCs for reverse link and 9 for forward link
Reverse Common Control 1 1 Common channel used for short burst data
Channel and signaling messages when traffic
channels are not in use
Dedicated Channel
• MS: additional features to support data services and enhanced signaling messages to
both circuit-switched and packet-switched
• BS (BTS & BSC): enhanced radio interface (significant hardware and software changes)
to provide voice, data and multimedia traffic support
• Packet Control Function (PCF):
an entity that manages the buffering and relay the packets between BS and
PDSN
Maintain radio resource status (e.g. active, dormant)
Collects radio link related accounting info to be used by AAA.
• Packet Data Serving Node (PDSN): new network entity
Acting as a FA by providing routing services (maintaining routing tables and route
discovery) according to Mobile IP
Managing the radio-packet (R-P) interface and PPP sessions for MS
Initiating authentication, authorization and accounting for mobile user to the AAA
server
When part of VPN, it can establish a tunnel through the public data network using
layer 2 tunneling protocol (L2TP) to the VPN gateway.
PDSN may optionally use IPSec protocol to further protect the tunnel
• Home Agent
Network element within mobile’s home network
Two major functions: mobile IP registration and packet forwarding
HA interacts with AAA to receive mobile IP registration requests that have been
authenticated and return registration response
HA also forwards IP packets to and from current point of attachment through FA
• AAA
Authentication: verification of devices and subscribers for network access as well
as user-based QoS requests
Authorization: whether a user or device is authorized for particular service with a
specific QoS based on service profile. The requesting entity may cache the
authorization info making further decision itself without going to AAA.
Accounting: involves collecting and storing billing-related data concerning the
offered services. It includes session details (requested and offered QoS, duration
of usage etc) and mobility records (dates and times of attach and detach etc)
Summary
• Cdma2000 introduction
• New MAC and Physical layer features
• Physical layer of cdma2000
• Reverse Physical channels
• New Network elements in cdma2000
Packet Control Function (PCF)
Packet Data Serving Node (PDSN)
• Mobility Management
• Handoff
Intera-PCF
Inter-PCF/Intra-PDSN
Inter-PDSN
Lecture 25
1st Review
Last Lecture
• Cdma2000 introduction Packet Data Serving Node
• New MAC and Physical layer (PDSN)
features • Mobility Management
• Physical layer of cdma2000 • Handoff
• Reverse Physical channels Intera-PCF
• New Network elements in cdma2000 Inter-PCF/Intra-PDSN
Packet Control Function Inter-PDSN
(PCF)
Security
• Security in wireless networks mainly involves authentication, confidentiality, integrity,
and authorization for the access of network connectivity and QoS resources for the
mobile nodes flow.
• The heterogeneity of wireless networks complicates the security issue.
• Dynamic reconfigurable, adaptive, and lightweight security mechanisms should be
developed.
• AAA (Authentication Authorization Auditing) protocols provide a framework for such
suffered especially for control plane functions and installing security policies in the
mobile node such as encryption, decryption and filtering.
Lecture 15 - AMPS
• AMPS introduction • Air interface
• System Overview • Supervisory signals
• Call handling • N-AMPS
Lecture 16 GSM
• GSM Introduction • Specifications
• GSM System Architecture • Subscriber Services
• GSM Network Areas • Mobility
Lecture 19 - IS-95
• IS-136 Less power consumption (6-
• CDMA/IS-95 7 mW)
• Advantages Privacy, graceful degradation
Higher capacity, Improves • Drawbacks
voice quality (new coder),
Self-jamming, near-far Sync Channel
problem, Paging
IS-95 Forward Channels Traffic
Pilot Channel
• IS-95 Reverse Channels
Lecture 20 - EDGE
• EDGE Introduction • Link Adaptation and Incremental
• Modulation and Coding Schemes Redundancy
• Capacity Planning
Lecture 24 - CDMA2000
• New MAC and Physical layer Packet Data Serving Node
features (PDSN)
• Physical layer of cdma2000 • Mobility Management
• Reverse Physical channels • Handoff
• New Network elements in cdma2000 Intra-PCF
Packet Control Function Inter-PCF/Intra-PDSN
(PCF) Inter-PDSN
Lecture 26
Wireless LAN / IEEE 802.11
Outlines
• Overview of IEEE 802.11 • MAC Protocols
• IEEE 802.11 Protocols DCF
• Architecture PCF
• Services
WLAN Requirements
• Throughput • Transmission Robustness and Security
• Number of Nodes/Scalability • Collocated network Operation
• Connection to Backbone LAN • License-free operation
• Service Area: 100 to 300 m • Handoff/Roaming
• Power Consumption • Dynamic Configuration
ESS
• Access Point functions as a bridge and a relay point.
• In BSS, MS communicate through Access Point
• IBSS is typically an ad hoc network, where station communicate directly.
• To integrate 802.11 with 802.2 (Wired LAN), a portal is used.
• Portal is a device such as bridge or router attached to DS.
802.11 Services
• IEEE 802.11 defines nice services.
• Three services for WLAN access and confidentiality.
• Six services used to support delivery of MAC Service Data Unit (MSDU) between stations.
Association-Related Services
• Three services are implemented
Association:
o Establishes an initial association between a station and an AP
o AP can communicate its identity to other APs within ESS to facilitate routing and
delivery of addressed frames.
Re-association
o Enables an established association to be transferred from one AP to another
Disassociation
o A notification from either a MS or AP that an existing association has
terminated.
MAC Protocol
• Two types of algorithms:
Distributed access protocol
o Distribute the decision to transmit
Centralized control
o Better in ESS, when AP connected to DS
CSMA/CA
• A Station willing to transmit senses the medium.
• If the medium is busy, defers
• If idle, wait for Distributed Inter-Frame Space (DIFS) or Exponential back off.
CSMA/CA Algorithm
Example
• A is transmitting a frame when B, C and D sense the channel.
• B, C, and D run their random number generator to get a back off time
• Station C draws the smallest number followed by D and B.
• After completion of A:
B, C, D wait for the IFS period and start their counters.
C finishes first and starts transmission, after checking again whether the medium is idle.
B and D freeze their counters.
After completion of C: B and D wait for the IFS period and (re-) start their counters
Lecture 27
WLAN Part II
Outlines
• Last Lecture Review • PCF
• Problems with DCF • Fragmentation / Reassembly
• Virtual Carrier Sensing • MAC Frame Format
• RTC/CTS Protocol • Frame Types
• Interframe Spacing • Physical Media in Original IEEE 802.11
Last Lecture
• Overview of IEEE 802.11 • MAC Protocols
• IEEE 802.11 Protocols DCF
• Architecture PCF
• Services
RTS/CTS Protocol
• Virtual Carrier Sense technique.
• Source sends Request-to-Send beacon
• Destination, if free, sends Clear-to-Send
beacon.
• Source transmits data packet.
• Destination ACKs if receives successfully
• RTS includes source, destination ID and
duration of following transaction.
• The duration info allows to protect the
transmission from collision on the
transmitter side.
• The destination response in CTS also includes the same duration amount.
• This helps in overcoming hidden terminal problem.
• All the stations hearing RTS/CTS set their Network Allocation Vector (NAV) to the given duration.
• Since RTS/CTS are shorter frames than MSDU, collision is detected fast.
• If MSDU is smaller than RTSThreshold, Standard allows to skip RTS/CTS.
Interframe Spacing
• Short interframe space (SIFS)
The SIFS is used for the highest-priority transmissions, such as RTS/CTS frames and
positive acknowledgments.
• PCF interframe space (PIFS)
The PIFS is used by the PCF during contention-free operation. Stations with data to
transmit in the contention-free period can transmit after the PIFS has elapsed and pre-
empt any contention-based traffic
• DCF interframe space (DIFS)
The DIFS is the minimum medium idle time for contention-based services. Stations may
have immediate access to the medium if it has been free for a period longer than the
DIFS.
• Extended interframe space (EIFS)
The EIFS is not a fixed interval. It is used only when there is an error in frame
transmission.
Addresses
• Destination address
As in Ethernet, the destination address is the 48-bit IEEE MAC identifier that
corresponds to the final recipient: the station that will hand the frame to higher
protocol layers for processing.
• Source address
This is the 48-bit IEEE MAC identifier that identifies the source of the transmission. Only
one station can be the source of a frame, so the Individual/Group bit is always 0 to
indicate an individual station.
• Receiver address
This is a 48-bit IEEE MAC identifier that indicates which wireless station should process
the frame. If it is a wireless station, the receiver address is the destination address.
• Transmitter address
This is a 48-bit IEEE MAC address to identify the wireless interface that transmitted the
frame onto the wireless medium.
Lecture 28
Mobile Ad hoc Network
Outlines
• Introduction Expected Properties of Ad-hoc
What is Ad hoc networks? Routing Protocols
Characteristic A taxonomy for routing
Ad hoc vs. cellular networks protocols in Mobile ad
Application Some common protocols
Challenges (DSDV, AODV, DSR, ZRP, TORA)
• Routing Protocol
What is Ad hoc
• Ad hoc
For a specific purpose of occasion
For this case alone
• IEEE802.11
a network composed solely of stations within mutual communication range of each
other via the wireless media.
an independent basic service set
• Mobile distributed multi-hop wireless network (manet)
A group of mobile, wireless nodes which cooperatively and spontaneously form a
network independent of any fixed infrastructure or centralized administration
A node communicates
o directly with nodes within wireless range
o indirectly with all other destinations using a dynamically determined multi-hop
route though other nodes in the manet
• Self-administering
no central control
• creating a network on the fly
• Ad hoc networks
infrastructureless
multiple hop
o Radio power limitation, channel utilization, and power-saving concerns
DCF(distributed coordination function)
• Cellular networks
infrastructure-based PCF(pointed coordination
one hop(uplink or downlink) function)
Challenges
1. Spectrum allocation 7. Security & privacy
2. Self-configuration 8. Routing protocols
3. Medium access control (MAC) 9. Multicasting
4. Energy efficiency 10. QoS
5. TCP Performance 11. Service Location, Provision, Access
6. Mobility management
Routing Protocols
• Expected Properties of Ad-hoc Routing Protocols
• A taxonomy for routing protocols in Mobile ad hoc networks
Reactive or On-demand routing Hybrid
protocols Hierarchical
Proactive or Table-driven Geographical
• State information
Is network-scale topology obtained at each node?
• Scheduling
Is route information continually maintained for each destination (proactive or reactive)?
DSDV
• Is based on the idea of Ballman-Ford routing algorithm
• Every mobile station maintains a routing table that lists
all available destinations
the number of hops to reach the destination
the sequence number assigned by the destination node
• A station transmits its routing table
periodically
if a significant change has occurred in its table from the last update sent
• The routing table updates can be sent in two ways
full dump
incremental update
• Put figure with same illustration of DSR
AODV
• It borrows
the basic on-demand mechanism of route discovery and route maintenance from DSR
the use of hop-by-hop routing, sequence numbers, and periodic beacons from DSDV
• A node periodic broadcasts hello information to maintain the local connectivity
• It only supports the use of symmetric links
TORA
• Is based on the concept of link reversal
• Finds multiple routes from a source node to a destination node
• The control messages are localized to a very small set of nodes near the occurrence of a
topological change
DSR
• A node maintains route caches containing the source routes that it is aware of
• The node updates entries in the route cache as and when it learns about new routes
• Route discovery
route request packet contains
o the address of the source
o the destination
o a unique identification number
route reply is generated by
o the destination
o an intermediate node with current information about the destination
• Route maintenance
Route error packets are generated at a node when the data link layer encounters a fatal
transmission problem
Acknowledgements, including passive acknowledgments
OL“R ont’d
• Only the multipoint relays nodes (MPRs) need to forward LS updates
• OLSR is particularly suited for dense networks
• In sparse networks, every neighbor becomes a multipoint relay, then OLSR reduces to pure LS
protocol
ZRP
• A hybrid routing protocol that combines both proactive and on-demand routing strategies
• Each node has a predefined zone
• Inside zones: proactive routing
• Outside zones: on-demand routing
• ZRP provides more flexibility
Outlines
• Introduction
What is Ad hoc networks?
Characteristic
Ad hoc vs. cellular networks
Application
Challenges
• Routing Protocol
Expected Properties of Ad-hoc Routing Protocols
A taxonomy for routing protocols in Mobile ad
Some common protocols (DSDV, AODV, DSR, ZRP, TORA)
Lecture 29
Security in IEEE 802.11
Outlines
• Types of Attack • 802.1x Security
• Goals of 802.11 Security AKM Operations with AS
• WEP Protocol AKM operations with PSK
• WEP Authentication • IBSS Security model
• Security flaws in original 802.11
Last Lecture
• Introduction
What is Ad hoc networks?
Characteristic (Heterogeneous, Self-creating, self-organizing, self-adminstrating, on-the-fly)
Ad hoc vs. cellular networks
Challenges (Spectrum allocation, Self-configuration, Medium access control (MAC),
Energy efficiency, TCP Performance, Mobility management, Security & privacy, Routing
protocols, Multicasting, QoS, Service Location, Provision, Access)
• Routing Protocol
Expected Properties of Ad-hoc Routing Protocols
A taxonomy for routing protocols in Mobile ad
Some common protocols (DSDV, AODV, DSR, ZRP, TORA)
Types of Attacks
• Passive attacks
to decrypt traffic based on statistical analysis
• Active attacks
To inject new traffic from authorized mobile stations, based on known plaintext
• Active attacks
To decrypt traffic, based on tricking the access point
• Dictionary building attacks
Allows real-time automated decryption of all traffic
802.11 Security
• Goals of 802.11 security
Access Control
o Ensure that your wireless infrastructure is not used.
Data Integrity
o Ensure that your data packets are not modified in transit.
Confidentiality
o Ensure that the contents of your wireless traffic is not learned
WEP
• Wireless connections has important security issues to keep the intruders from accessing,
reading and modifying the network traffic.
• But mobile systems need to be connected.
• We need an algorithm which provides the same level of security that physical wire does.
• WEP is used to
Protect wireless communication from eavesdropping.
Prevent unauthorized access to wireless network (feature of WEP, but not an explicit
goal in the 802.11 standard)
• WEP relies on a secret key which is shared between the sender and the receiver.
SENDER: Mobile station (e.g. Labtop with a wireless ethernet card)
RECEIVER: Access Point (eg. base station)
• Secret Key is used to encrypt packets before they are transmitted
• Integrity Check is used to ensure packets are not modified in transit.
The standard does not discuss how shared key is established
In practice, most installations use a single key which is shared between all mobile
stations and access points.
WEP Protocol
• To send a message M:
Compute a checksum c(M) (is not depend on secret key k)
Pick an IV v and generate a keystream RC4(v,k)
XOR <M, c(M)> with the keystream to get the ciphertext
Transmit v and ciphertext over a radio link
• When received a message M
Use transmitted v and the shared key k to generate the keystream RC4(v,k)
XO‘ the iphe te t ith ‘C4 ,k to get <M , >
Che k is = M
If it is, a ept M as the essage t a s itted
WEP Encapsulation
Defense of WEP
• Integrity Check(IC) field
Used to ensure that packet has not been modified in transit
• Initialization Vector(IV)
Used to avoid encrypting two ciphertexts with the same key stream
Used to argument the shared key and produce a different RC4 key for each packet to
avoid statistical attacks
WEP Authentication
Security Flaws
• Ph si al th eat: use loses 8 . NIC, does t epo t it
Attacker with physical possession of NIC may be capable of accessing the network
• Impersonation: User Identification
802.11 does not identify users, only NICs
Problems
o MAC may represent more than one user
o Multi-user machines becoming common; which user is logged on with which
MAC?
o Users may move between machines
o Machine may allow logins by other users within the domain
• Mutual Authentication
802.11 shared authentication not mutual
o Client authenticates to Access Point but Access Point does not authenticate to
client
o Enables rogue access points
o Denial of service attacks possible
Solution
o Mutual authentication: Require both sides to demonstrate knowledge of key
• Known Plaintext Attack
WEP supports per-packet encryption, integrity, but not per-packet authentication
Given a known packet (ARP, DHCP, TCP ACK, etc.), possible to recover RC4 stream
Enables spoofing of packets until IV changes
Can insert a packet, calculate ICV, encrypt with known RC4 stream
Solution
o Add a keyed message integrity check
o Change the IV every packet
• Denial of Service: Disassociation Attacks
802.11 associate/disassociate messages unencrypted and unauthenticated
o Enables forging of disassociation messages
o Creates vulnerability to denial of service attacks
• Dictionary Attacks
WEP keys are derived from passwords that makes it much easier to break keys by brute
force
Attacker uses a large list of words to try to guess a password and derive the key
• 802.1X
created to control access to any 802 LAN
used as a transport for Extensible Authentication Protocol (EAP, RFC 2284)
Start message.
EAP authentication frames pass between the Supplicant and AS via the Authenticator
a d “uppli a t s U o t olled Po ts.
The Supplicant and AS authenticate each other and generate a PMK. The PMK is sent
from the AS to the Authenticator over the secure channel.
B1 is sent in an EAPOL-Key frame, encrypted under the EAPOL-Key encryption key (KEK)
portion of the PTK,
and protected from modification by the EAPOL-Key confirmation key (KCK) portion of
the PTK.
• I a IB““, a “TA s “ME espo ds to Deauthe ti atio f a es f o a “TA deleti g the PTK “A
associated with that STA.
Summary
• Types of Attack
• Goals of 802.11 Security
• WEP Protocol
• WEP Authentication
• Security flaws in original 802.11
• 802.1x Security
AKM Operations with AS
AKM operations with PSK
• IBSS Security model
• Next Lecture
QoS in WLAN and Mobile IP
Lecture 30
QoS in WLAN / Mobile IP
Outlines
• Last lecture • Mobile IP
• Limitations of QoS in IEEE 802.11 Care-of-address,
• Overview of 802.11e MIP Protocol (Discovery,
• Traffic Categories Registration, Tunneling)
• EDCF Routing
• HCF Inefficiencies
MIPv6
Last Lecture
• Types of Attack
• Goals of 802.11 Security
Access control, data integrity, confidentality
• WEP Protocol
• WEP Authentication
• Security flaws in original 802.11
Physical threat, impersonation, mutual authentication, dictionary attacks, DOS
• 802.1x Security
AKM Operations with AS
AKM operations with PSK
• IBSS Security model
Overview of 802.11e
• Formed in Sep. 1999. TheQoSbaseline document was approved in November 2000. The first
draft was available in late 2001.
• Aim to support both IntServ and DiffServ
• New QoS mechanisms
EDCF (Enhanced DCF)
HCF (Hybrid Coordination Function)
• Detecting the channel as being idle for PIFS, shorter than DIFS, gives the HC high priority over
EDCF
• HCF model can provide Guaranteed Services with a much higher probability than pure EDCF
• A signaling protocol can be used to facilitate admission control and specify service rate
requirement
Example
Protocol
• In order to support mobility, Mobile IP includes three capabilities:
1. Discovery
o Mobile Agents send ICMP router advertisements with mobility agent
advertisement extension periodically informing mobile nodes of its presence.
o Mobile node is responsible for the discovery process.
o In order to receive an advertisement, the mobile node may optionally request
one from an agent or simply wait for the next advertisement.
2. Registration
o Mobile node recognizes that it is on a foreign network, acquires a Care-of-
Address and requests its home agent to forward its data packets to the foreign
agent.
o The process of registration requires 4 steps:
i. Mobile node request forwarding service by sending registration request
to the foreign agent.
ii. Foreign agent relays this request to the home agent.
iii. Home agent accepts or denies the request and sends registration reply
to the foreign agent.
iv. Foreign agent relays this reply to Mobile node.
3. Tunneling
o After registration, an IP tunnel is set up between the home agent and care-of-
address of the mobile node.
o Home agent broadcasts gratuitous ARP request which causes all nodes in the
subnet to update their ARP caches to map the mobile nodes IP address to the
home agents link level address.
o Thus home agent receives packets destined to the mobile node, and forwards
the packets to the foreign agent through the IP tunnel.
o In the foreign network, decapsulation is done by the foreign agent or by the
mobile node itself.
o A correspondent node assumes that the reply from the mobile node is coming
from its home network and continues to send the packet to the home agent.
IP-in-IP Tunneling
• Packet to be forwarded is encapsulated in a new IP packet
• In the new header:
Destination = care-of-address
Source = address of home agent
Protocol number = IP-in-IP
Routing Inefficiency
Route Optimizations
• Possible Solution:
Home agent sends current care-of address to correspondent host
Correspondent host caches care-of address
Future packets tunneled directly to care-of address
• But!
An instance of the cache consistency problem arises...
Cached care-of address becomes stale when the mobile host moves
Potential security issues with providing care-of address to correspondent
Summary
• Last lecture
• Limitations of QoS in IEEE 802.11
• Overview of 802.11e
• Traffic Categories
• EDCF
• HCF
• Mobile IP
Care-of-address,
MIP Protocol (Discovery, Registration, Tunneling)
Routing
Inefficiencies
MIPv6
Lecture 31
Wireless Mesh Networks
Outlines
• Introduction to WMN • Applications
• Characteristics • Critical factors influencing performance
• WMN vs MANET • Radio techniques, scalability, QoS,
• Architecture security, Ease of Use, Mesh connectivity
Last Lecture
• Limitations of QoS in IEEE 802.11 Care-of-address,
• Overview of 802.11e MIP Protocol (Discovery,
• Traffic Categories Registration, Tunneling)
• EDCF Routing
• HCF Inefficiencies
• Mobile IP MIPv6
Introduction
• Wireless mesh networks (WMNs) comprised of mesh routers and clients
• Mesh clients not only work as host but also perform routing for multi-hop destinations
• Mesh routers support bridge/gateway functionalities enabling integration of WMNs with
existing wireless networks such as cellular, WSN, WiMAX etc
• WMN is dynamically self-organized and self-configured
• Conventional nodes e.g. PC, PDA, PocketPC, phones , equipped with wireless NIC can connect
directly to mesh routers.
• Without Wireless NIC, Ethernet connection is also possible
• Thus WMN will allow always-on-line anywhere anytime.
• Gaining interest as a possible way of ISPs
• Can be deployed incrementally as needed
• Deploying WMN is not difficult because most of the components/protocols are readily available
to some extent e.g. IEEE 802.11, WEP etc.
• However scalability in existing protocol is a great concern.
Characteristics
• Multi-hop
To extend the coverage range of wireless networks without sacrificing the channel
capacity and non line-of-sight.
• Support for ad hoc networking
Due to flexible architecture, easy deployment and configuration, fault tolerance and
mesh connectivity is possible.
Low up-front investment requirements
• Mobility dependence on type of mesh nodes
Mesh routers usually have minimal mobility
Mesh clients can be stationary or mobile
• Multiple type of network access
Both backhaul access to internet and P2P communication are supported
Integration of WMN with other wireless networks allow end-users access to WMN
• Dependence of power-consumption constraints on the type of mesh nodes.
• Compatibility and interoperability with existing wireless networks.
WMN based on IEEE 802.11 should support both mesh clients as well as Wi-Fi clients.
It should also be interoperable with other networks.
WMNs vs MANET
• WMNs are considered ad hoc due to lack of infrastructure (AP/BS).
Although ad hoc techniques like MANET are required but
o WMNs require more sophisticated algorithms and design principles
o WMN diversifies the capabilities of ad hoc that makes MANET subset of WMNs
Following differences will illustrate it more
Wireless Mesh routers as wireless backbone providing more coverage, connectivity and
Backbone robustness. Individual nodes are routers in MANET making unreliable.
Integration Supports client that use the same radio technology. Which is accomplished through
host-routing function available in mesh router
Users of one network can enjoy services of other network
Dedicated In MANET, each host perform routing and configurations which is done by mesh
routing and routers in WMNs. Hence decreasing load on end-user
configuration
Multiple radios Two radios; one for routing and configuration functionalities between mesh routers.
Second radio for network access by end users. These are performed on same channel
in MANET. This significantly improves the performance
Mobility Hosts also working as router in MANET make it more challenging, where the mobility of
mesh routers is very limited
Architecture
• Mesh router
Support routing functions for mesh networking in addition to conventional
gateway/repeater functions.
Furthermore, equipped with multiple interfaces built on either same or different
wireless access technologies.
Achieves the same coverage as the other wireless routers with less energy consumption
through multi-hop routing.
MAC protocols are enhanced with better scalability in multi-hop mesh environment.
WMN Routers
WMN Clients
• Examples of mesh clients: (a) Laptop, (b) PDA, (c) Wi-Fi IP Phone and (d) Wi-Fi RFID Reader.
Infrastructure/backbone WMNs
Hybrid WMNs
• Combination of infrastructure and client meshing
• Most applicable/practical scenario
Application scenario
• Research and development in WMNs is motivated by several applications which can be
supported on cellular, WiMAX etc.
Enterprise networking
• Scalable with enterprise growth
Other applications
• Transportation system
• Instead of limiting access to stations, WMNs can extend access into buses, trains, ferries.
• Remote monitoring of in-vehicle security video and passenger information system
• Building automation
• Health and medical system
• Security surveillance system
Summary
• Introduction to WMN
• Characteristics
• WMN vs MANET
• Architecture
• Applications
• Critical factors influencing performance
Radio techniques, scalability, QoS, security, Ease of Use, Mesh connectivity
Lecture 32
Wireless Mesh Networks Part II
Outlines
• MAC Layer Routing
Scalability Wish List
Single Channel Route Optimization Criteria
Multi-Channel Routing fairness
Some Ideas Routing – Cross-layer design
Research Issues • QoS Support at each layer
• Network Layer • WMN Standards
Last Lecture
• Introduction to WMN • Critical factors influencing performance
• Characteristics Radio techniques, scalability,
• WMN vs MANET QoS, security, Ease of Use,
• Architecture Mesh connectivity
• Applications
MAC Layer
• MAC for WMNs is concerned with more than one hop communication.
• MAC is distributed and cooperative and works for multipoint-to-multipoint communication.
• Network self-organization is needed for the MAC.
• Mobility affects the performance of MAC
• The scalability of MAC can be addressed in two ways.
Enhance the existing or propose new for single channel to increase E2E throughput
Allow transmission on multiple channels of each network node
Basic Techniques
• Scheduled • Channels can be implemented by:
Fix scheduled TDMA FDMA
Polling CDMA (code assignment is an
Impractical due to lack of: issue)
o Central coordination SDMA (with directional
point antennas)
o Reasonable time Combinations of the above
synchronization
• Random Access
CSMA – simple and popular
RTS/CTS – protects the receiver
• B = bandwidth of a channel
MAC – Multichannel
• Perhaps, if a new Multi-Channel Coordination Layer (MCCL) is introduced b/w MAC and Network
• Must work within the constraints of 802.11
• May increase the capacity of the network
MMAC Functions
• Maintaining data structure of all channels in each node.
Classified into three types depending on its status of allocation.
• Negotiating channels during ad hoc traffic indication message (ATIM) window.
Negotiations are done through a pre-defined channel known to all nodes.
• Selecting a channel.
The criterion is to use a channel with the lowest count of source–destination pairs that
have selected the channel.
Network Layer
• WMN will be tightly coupled with internet and IP has been widely accepted in different wireless
networks.
• However routing differs from IP and cellular.
Routing
• Finds and maintains routes for data flows
• The entire performance of the WMN depends on the routing protocol
• May be the main product of a mesh company
• May be missing
Fairness Problem
WMNs Standards
• WPAN: Bluetooth, Zigbee
• WiFi: 802.11a, b, g, n
• WiMAX: 802.16
Summary
• MAC Layer Routing
Scalability Wish List
Single Channel Route Optimization Criteria
Multi-Channel Routing fairness
Some Ideaa Routing – Cross-layer design
Research Issues • QoS Support at each layer
• Network Layer • WMN Standards
Lecture 33
TCP over Wireless Networks
Outlines
• Motivation Pure Link-level Approaches
• TCP Variants Soft-state Transport Layer
Slow start Caching Approaches
Fast Retransmit/Recovery (TCP Soft-state Cross Layer Signalling
Reno) Approaches
• Issues in Heterogeneous Wireless Hard-state Transport Layer
Networks Approache
• TCP Schemes for Wireless
Last Lecture
• MAC Layer Wish List (Scalability, fast route
Scalability discovery/repair, mobility,
Single Channel flexibility, QoS, Multicast)
Multi-Channel Route Optimization Criteria
Some Ideas Routing fairness
Research Issues Routing – Cross-layer design
• Network Layer • QoS Support at each layer
Routing • WMN Standards
Motivation
• Characteristics of wireless networks
Lack of infrastructure in ad hoc Shared channel
networks Limited bandwidth
Mobility
• Transport protocols typically designed for
Fixed end-systems Fixed, wired networks
Characteristics of TCP
o Window-based: not possible to maintain fine-grained timers on a per-flow basis
o Slow –start
o Loss-based congestion indication
o Dependence on ACKs
Schemes
• The various approaches revolve around distinguishing between the following:
Congestion loss
Error loss
Delay beyond the retransmission timer threshold
Out of order delivery beyond the three DUPAK threshold
Classification
• Pure Link-level Approaches:
These approaches aim at hiding the unwanted characteristics of the wireless links from
the higher layers.
but a critical factor is the determination of the link-level timeout value.
• Soft-state Transport Layer Caching Approaches:
not crucial for the end-to-end connection and use caching as a technique to save the
sender from unnecessary invocation of the congestion control mechanism.
but they require changes at the intermediate node (base station) and optionally at the
mobile host and fail in the presence of e ptio due to the i te ediate ode s
dependence
• Soft-state Cross Layer Signaling Approaches:
These approaches make the transport layer sender aware of the wireless link and
separate the congestion losses from the error losses
But involve changes at some or all of the intermediate nodes and at the transport layer
of the se de s p oto ol.
• Hard-state Transport Layer Approaches:
These solutions encompass all forms of splitting and the end-to-end semantics may be
sacrificed.
The advantage of these approaches is that the wireless link is completely shielded from
damage loss.
Snooping TCP I
• it involves modification of the network layer (IP) software at the base station (BS) by adding a
module called snoop.
• Transparent extension of TCP within the BS/FA
• buffering of packets sent to the mobile host
• lost packets on the wireless link (both directions!) will be retransmitted immediately by the
mobile host or foreign agent, respectively (so called local retransmission)
• the foreign agent therefore snoops the packet flow and recognizes acknowledgements in both
directions, it also filters ACKs
• changes of TCP only within the foreign agent (+min. MH change)
Snooping TCP II
• Data transfer to the mobile host
FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated
ACKs or time-out
fast retransmission possible, transparent for the fixed network
• Data transfer from the mobile host
FA detects packet loss on the wireless link via sequence numbers, FA answers directly
with a NACK to the MH
MH can now retransmit data with only a very short delay
• Advantages:
Maintain end-to-end semantics
No change to correspondent node
No major state transfer during handover
• Problems
Snooping TCP does not isolate the wireless link well
Snooping might be useless depending on encryption schemes
Indirect TCP II
• Advantages
no changes in the fixed network necessary, no changes for the hosts (TCP protocol)
necessary, all current optimizations to TCP still work
transmission errors on the wireless link do not propagate into the fixed network
simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent
and mobile host
therefore, a very fast retransmission of packets is possible, the short delay on the
mobile hop is known
• Disadvantages
loss of end-to-end semantics, an acknowledgement to a sender does not any longer
mean that a receiver really got a packet, foreign agents might crash
higher latency possible due to buffering of data within the foreign agent and forwarding
to a new foreign agent
Wireless TCP
• Preserve the end-to-end semantics.
• This Protocol tries to distinguish Random losses from Congestion losses by measuring the packet
inter arrival time with the packet inter departure time.
• WTCP uses rate-based rather than window-based transmission control. Hence it shapes its data
traffic,
• Never allows a burst of packet transmissions, and is fair when competing connections have
different round-trip times.
Mobile TCP
• Special handling of lengthy and/or frequent disconnections with low BER links
• M-TCP splits as I-TCP does
unmodified TCP fixed network to supervisory host (SH)
optimized TCP SH to MH
• Supervisory host
no caching, no retransmission
monitors all packets, if disconnection detected
o set sender window size to 0
o sender automatically goes into persistent mode
• old or new SH reopen the window
• Advantages
maintains semantics, supports disconnection, no buffer forwarding
• Disadvantages
loss on wireless link propagated into fixed network
adapted TCP on wireless link.
ATCP Approach
• ATCP utilizes network layer feedback (from the intermediate nodes) to take appropriate actions
• Network feedback is:
ICMP: The Destination Unreachable ICMP message indicates route disruption
ECN: Indicates network congestion With ECN enabled, time out and 3 dup ACKs are
assumed to no longer be due to congestion
Summary
• Motivation
• TCP Variants
Slow start
Fast Retransmit/Recovery (TCP Reno)
• Issues in Heterogeneous Wireless Networks
• TCP Schemes for Wireless
Pure Link-level Approaches
Soft-state Transport Layer Caching Approaches
Soft-state Cross Layer Signaling Approaches
Hard-state Transport Layer Approaches
Lecture 34
Wireless Sensor Networks Part I
Outline
• Introduction to WSN
• Applications of WSN
• Factors Influencing Performance of WSN
Power consumption, fault tolerance, scalability, topology, cost
• Architecture and Communication Protocols
• Challenges in WSNs.
Introduction to WSNs
• A sensor network is composed of a large number of sensor nodes, which are densely deployed
either inside the phenomenon or very close to it.
• Features:
Random deployment Cooperative capabilities
Self-organizing Local computation
What is a Sensor?
• Sensor is a small sized, low power, low cost, Micro-Electro-Mechanical Systems (MEMS)
• Which is capable of sensing, computing and communicating.
Introduction
Sensor networks VS ad hoc networks:
• Scalability
The number of nodes in a sensor network can be several orders of magnitude higher
than the nodes in an ad hoc network.
• Deployment
Sensor nodes are densely deployed.
• Failure Rate
Sensor nodes are prone to failures.
• Highly Dynamic topology
The topology of a sensor network changes very frequently?
• Communication Paradigm
Sensor nodes mainly use broadcast, most ad hoc networks are based on p2p.
• Power Limitation
Sensor nodes are limited in power, computational capacities and memory.
• Unique IDs
Sensor nodes may not have global ID.
Sensor networks
• temperature • soil makeup
• humidity • noise levels
• vehicular movement • the presence or absence of certain
• lightning condition kinds of objects
• pressure
• Production costs
The cost of a single node is very important to justify the overall cost of the networks.
The cost of a sensor node is a very challenging issue given the amount of functionalities
with a price of much less than a dollar.
• Hardware constraints
Energy Consumption
• Sensor node has limited energy supply
• Nodes may not be rechargeable
• 3000 instructions can be executed for the same energy cost of sending a bit 100m by radio.
Protocol Stack
• Power Management Plan
Turning off the receiver after a msg is received from neighbor in order to avoid getting
duplicate msg and conserving energy.
Informing neighbor nodes during low battery power.
• Mobility Management Plan
The mobility management plane detects and registers the movement of sensor nodes,
so a route back to the user is always maintained, and the sensor nodes can keep track of
who are their neighbor sensor nodes.
• Task Management Plan
The task management plane balances and schedules the sensing tasks given to a specific
region. Not all sensor nodes in that region are required to perform the sensing task at
the same time. As a result, some sensor nodes perform the task more than the others
depending on their power level.
Challenges in WSN
• Cross-layer approach: A Grand Challenge
Traditional layered approach is not suitable for WSNs
Good for design, abstraction & debugging
Bad for energy efficiency, overhead & performance
Research Directions
• Topology Control • Energy Efficient Data Dissemination
• Coverage • QoS Framework
• Data Aggregation • Network Monitoring and Management
• Temporal/Spatial Correlation • How to integrate WSNs into NGWI ?
• Localization / Synchronization
TinyOS
• The role of any operating system (OS) is to promote development of reliable application
software by providing a convenient and safe abstraction of hardware resources.
• Wireless sensor networks (WSNs) are embedded but general-purpose, supporting a variety of
applications, incorporating heterogeneous components, and capable of rapid deployment in
new environments
• An open-source development environment
A programming language and model (NesC)
• TOSSIM for simulating TinyOS
• TinyDB for Sensor DB in TinyOS
Summary
• Introduction to WSN • Architecture and Communication
• Applications of WSN Protocols
• Factors Influencing Performance of • Challenges in WSNs.
WSN
•
Lecture 35
MAC Protocols for WSN Part II
Outlines
• Challenges in WSNs. T-MAC
• Attributes of MAC Protocol DS-MAC
• Overview of MAC protocols Traffic Adaptive MAC
• Energy Efficiency in MAC DMAC
• Proposed Routing Protocol Contention-Free MAC
S-MAC
Last Lecture
• Introduction to WSN
• Applications of WSN
• Factors Influencing Performance of WSN
Power consumption, fault tolerance, scalability, topology, cost
• Architecture and Communication Protocols
Research Directions
• Topology Control • Energy Efficient Data Dissemination
• Coverage • QoS Framework
• Data Aggregation • Network Monitoring and Management
• Temporal/Spatial Correlation • How to integrate WSNs into NGWI ?
• Localization / Synchronization
TinyOS
• The role of any operating system (OS) is to promote development of reliable application
software by providing a convenient and safe abstraction of hardware resources.
• Wireless sensor networks (WSNs) are embedded but general-purpose, supporting a variety of
applications, incorporating heterogeneous components, and capable of rapid deployment in
new environments
• An open-source development environment
A programming language and model (NesC)
• TOSSIM for simulating TinyOS
• TinyDB for Sensor DB in TinyOS
Introduction
• Important attributes of MAC protocols Number of nodes changes
• Collision avoidance overtime
Basic task — medium access • Latency
control • Fairness
• Energy efficiency • Throughput
• Scalability and adaptivity • Bandwidth utilization
• Frame
• Duty cycle
(Listen Interval / Frame Length)
• Frame schedule
Nodes are free to choose their listen/sleep schedule
Requirement: neighboring nodes synchronize together
Exchange schedules periodically (SYNC packet)
o Synchronization period (SP)
• Maintaining Synchronization
Clock drifts – not a major concern (listen time = 0.5s – 105 times longer than typical drift
rates)
Need to mitigate long term drifts – schedule updating using SYNC packet (sender ID, its
next scheduled sleep time – relative);
Listen is split into 2 parts – for SYNC and RTS/CTS
Drawbacks of S-MAC
• Active (Listen) interval – long enough to handle to highest expected load
If message rate is less – energy is still wasted in idle-listening
• S-MAC fixed duty cycle – is NOT OPTIMAL
• High Latency
T-MAC: Preliminaries
• Adaptive duty cycle:
T-MAC: Choosing TA
• Requirement: a node should not sleep while its neighbors are communicating, potential next
receiver
• TA > C+R+T
C – contention interval length;
R – RTS packet length;
T – turn-around time, time bet. end of RTS and start of CTS;
• TA = 1.5 * (C+R+T);
• Pros
Performs better under variable traffic load
• Cons
Higher overheads than SMAC to maintain variable wakeup schedule.
Unfairness and unpredictable delay.
DSMAC Schduling
• The basic idea behind ASAND protocol is demonstrated in the figure. A node first discretizes its
local time into equal sized frames, each consisting of slots. The main task for node i is to select
a conflict-free time slot in its frame. When this occurs we say that the node is ready.
• Initially, node i is nonready and it selects randomly and uniformly a slot i in its frame. In slot i,
node i broadcasts a ͞beacon͟ message mi to its neighborhood. In all other slots in the current
frame, it listens to the channel and marks each slot in which a garbled signal is received. Then in
the next frame, i transmits in all slots that were marked in the previous frame. We call this
technique conflict reporting, and it effectively forces hidden terminals to refrain from obtaining
overlapping time slots.
• If node i's initial broadcast in slot i was collision-free, then i concludes that none of its neighbors
has selected an overlapping time slot. Then, i broadcasts a second time in slot i in the next
frame. If this is also collision-free, then i concludes that none of its 2-hop neighbors selected a
time slot conflicting with i. Hence, the random slot selected by node i is conflict-free in its 2-
neighborhood and i becomes ready. Otherwise, when i detects a collision in either its first or
second broadcast, it goes back to the initial state and tries a new random slot.
• The 2-hop neighbors u and v are unaware that they have selected conflicting time slots (their
transmissions collide on w).
• Having observed a collision in its local time t, node w transmits at time t+, creating a spurious
conflict with both u and v.
• This is called conflict reporting essentially reduces a conflict between hidden terminals to a
conflict between neighbor nodes.
• After t+, u and v will be forced to select new slots
Summary
• Challenges in WSNs.
• Attributes of MAC Protocol
• Overview of MAC protocols
• Energy Efficiency in MAC
• Proposed Routing Protocol
S-MAC Traffic Adaptive MAC
T-MAC DMAC
DS-MAC Contention-Free MAC
Lecture 36
Routing in WSN Part III
Outlines
• Routing Challenges and Design Issues
Deployment, Routing method, heterogeneity, fault tolerance, power, mobility etc
• Routing Protocols
SPIN TEEN/APTEEN
Directed Diffusion GAF
ACQUIRE GEAR
LEACH SPEED
Last Lecture
• Challenges in WSNs. T-MAC
• Attributes of MAC Protocol DS-MAC
• Overview of MAC protocols Traffic Adaptive MAC
• Energy Efficiency in MAC DMAC
• Proposed Routing Protocol Contention-Free MAC
S-MAC
Adjust transmission power, change sensing rate, reroute packets through regions with
more power
• Network dynamics
Mobile nodes
Mobile events, e.g., target tracking
If WSN is to sense a fixed event, networks can work in a reactive manner
o A lot of applications require periodic reporting
• Transmission media
Wireless channel
Limited bandwidth: 1 – 100Kbps
MAC
o Contention-free, e.g., TDMA or CDMA
o Contention-based, e.g., CSMA, MACA, or 802.11
• Connectivity
High density high connectivity
Some sensors may die after consuming their battery power
Connectivity depends on possibly random deployment
• Coverage
A i di idual se so s ie is li ited
Area coverage is an important design factor
• Data aggregation
• Quality of Service
Bounded delay
Energy efficiency for longer network lifetime
• Flooding
Too much waste
Implosion & Overlap
Use in a limited scope, if necessary
• Data-centric routing
No globally unique ID
Naming based on data attributes
SPIN, Directed diffusion, ...
SPIN
• Pros
Each node only needs to know its one-hop neighbors
Significantly reduce energy consumption compared to flooding
• Cons
Data advertisement cannot guarantee the delivery of data
If the node interested in the data are far from the source, data will not be delivered
Not good for applications requiring reliable data delivery, e.g., intrusion detection
Naming
• Content based naming
Tasks are named by a list of attribute – value pairs
Task description specifies an interest for data matching the attributes
Animal tracking:
Request Reply
Interest ( Task ) Description Node data
Type = four-legged animal Type =four-legged animal
Interval = 20 ms Instance = elephant
Duration = 1 minute Location = [125, 220]
Location = [-100, -100; 200, 400] Confidence = 0.85
Time = 02:10:35
Interest
• The sink periodically broadcasts interest messages to each of its neighbors
• Every node maintains an interest cache
Each item corresponds to a distinct interest
No information about the sink
Interest aggregation : identical type, completely overlap rectangle attributes
• Each entry in the cache has several fields
Timestamp: last received matching interest
Several gradients: data rate, duration, direction
Setting up Gradient
Data Propagation
• Sensor node computes the highest requested event rate among all its outgoing gradients
• When a node receives a data:
Find a matching interest entry in its cache
o Examine the gradient list, send out data by rate
Cache keeps track of recent seen data items (loop prevention)
Data message is unicast individually to the relevant neighbors
ACQUIRE
• View a WSN as a distributed DB
• Complex queries can be divided into subqueries
• BS sends a query
• Each node tries to answer the query by using precached info and forwards the query to another
node
• If the cached info is not fresh, the nodes gather info from their neighbors within a lookahead of
d hops
• Once the query is resolved completely, it is sent back to BS via the reverse path or shortest path
• ACQUIRE can deal with complex queries by allowing many nodes send to send responses
Directed diffusion cannot handle complex queries due to too much flooding
ACQUIRE can adjust d for efficient query processing
If d = network diameter, ACQUIRE becomes similar to flooding
In contrast, a query has to travel more if d is too small
Provides mathematical modeling to find an optimal value of d for a grid of sensors, but
no experiments performed
LEACH
• Pros
Distributed, no global knowledge required
Energy saving due to aggregation by CHs
• Shortcomings
LEACH assumes all nodes can transmit with enough power to reach BS if necessary (e.g.,
elected as CHs)
Each node should support both TDMA & CDMA
• Extension of LEACH [5]
High level negotiation, similar to SPIN
Only data providing new info is transmitted to BS
TEEN
• Good for time-critical applications
• Energy saving
Less energy than proactive approaches
Soft threshold can be adapted
Hard threshold could also be adapted depending on applications
• Inappropriate for periodic monitoring, e.g., habitat monitoring
• Ambiguity between packet loss and unimportant data (indicating no drastic change)
GAF
• Three states
Discovery: Determine neighbors in a grid
Active Sleep
• Each node in the grid estimates its time of leaving the grid and sends it to its neighbors
The sleeping neighbors adjust their sleeping time to keep the routing fidelity
GEAR
• Phase 1: Forwarding packets towards the region
Forward a packet to the neighbor minimizing the cost function f
o Forward data to the neighbor which is closest to the sink and has the highest
level of remaining energy
If all neighbors are further than itself, there is a hole Pick one of the neighbors based
on the learned cost
• Phase 2: Forwarding the packet within the target region
Apply either recursive forwarding
o Divide the region into four subareas and send four copies of the packet
o Repeat this until regions with only one node are left
Alternatively apply restricted flooding
o Apply when the node density is low
GEAR successfully delivers significantly more packets than GPSR (Greedy Perimeter
Stateless Routing)
o GPSR will be covered in detail in another class
Summary
• Routing Challenges and Design Issues ACQUIRE
Deployment, Routing method, LEACH
heterogeneity, fault tolerance, TEEN/APTEEN
power, mobility etc GAF, GEAR, SPEED
• Routing Protocols • Next Lecture
SPIN Transport Protocols for WSN /
Directed Diffusion Security Issues
Lecture 37
Transport Protocols/Security in WSN Part IV
Outlines
• Transport Protocols for WSN • Security Threats in WSN
• TCP/UDP for WSN • TinySec
• Protocols • Motivations of Link Layer security
PSFQ • TinySec Design goals
ESRT • Semantic Secure Encryption in TinySec
CODA
Last Lecture
• Routing Challenges and Design Issues
Deployment, Routing method, heterogeneity, fault tolerance, power, mobility etc
• Routing Protocols
SPIN TEEN/APTEEN
Directed Diffusion GAF
ACQUIRE GEAR
LEACH SPEED
Reliable Transport Protocols for Wireless Sensor Networks
• Sink-to-Node(s) Transport
Pump Slow Fetch Quickly (PSFQ)
Reliable Multi-Segment Transport (RMST)
Garuda
• Nodes-to-Sink Transport
Event-to-Sink Reliable Transport (ESRT)
End-to-End Reliable Event Transfer in WSNs
• Congestion Control
Congestion Detection and Avoidance (CODA)
Mitigating Congestion in WSNs
• C.Y. Wan, A.T. Campbell, and L. Krishnamurthy, PSFQ: A Reliable Transport Protocol for
Wireless Sensor Networks, WSNA'02, Atlanta, Georgia, USA, September 28, 2002.
PSFQ Operations
• Pump Operation
User Node broadcasts a packet to its neighbors every Tmin
Decrements TTL and schedules a transmission
o Tmin < Ttransmit < Tmax
o If a node hears same transmission four times before Ttransmit it would cancel
its transmission
• Fetch Operation
Sequence number gap is detected
o Node will send a NACK message upstream, NACK scope is 1 hop
o NACKs are generated every Tr; (Tr << Tmax)
o NACKs can be cancelled if neighbors have sent similar NACKs
Node e te s p oa ti e fet h ode if last seg e t has t ee e ei ed a d no packet
has been delivered after Tpro = a * (Smax - Smin) * Tmax
• Report Operation
Used as a feedback/monitoring mechanism
PSFQ
• C.Y. Wan, S.B. Eisenman, and A.T. Campbell, CODA: Congestion Detection and Avoidance in
Sensor Networks, The First ACM Conference on Embedded Networked Sensor Systems
(Sensys03), Los Angeles, CA, USA. November, 2003.
CODA
• Congestion Detection
Accurate and efficient congestion detection is important
o Buffer queue length or Buffer occupancy – not a good measure of the
congestion.
o Channel loading – sample channel at appropriate time to detect congestion.
• Open loop, hop-by-hop backpressure
A node broadcasts backpressure msgs to upstream nodes as long as it detects
congestion
An upstream node decides whether to further propagate the msg or not, depending on
its own local network condition
• Closed-loop, multi-source regulation
When a source event rate is greater than some max. theoretical throughput, it is more
likely to contribute to congestion, so it enter into sink regulation
The sink sends ACKs at some predefined rate or certain no. of ACKs over a predefined
period. If source does not gets necessary ACKs it decreases its rate.
TINYSEC
• Light weight and efficient link layer security package
• A research platform that is easily extensible and has been incorporated into higher level
protocols.
• Developers can easily integrate into sensor network applications.
Lecture 38
Security/Extensions of WSN Part V
Outlines
• Security primitives in TinySec Design Considerations
• Encryption Schemes Protocols
• Keying mechanism • WSAN
• WMSN Motivation
Architecture WSN vs WSAN
Applications Architecture
Advantages Issues
Last Lecture
• Transport Protocols for WSN • Security Threats in WSN
• TCP/UDP for WSN • TinySec
• Protocols • Motivations of Link Layer security
PSFQ, ESRT, CODA
Security Primitives
• Message Authentication code
A cryptographic secure checksum for checking the message integrity
Computing a MAC requires authorized senders and receivers to share a secret key, and
this key is part of the input to a MAC computation
if an adversary alters a valid message or injects a bogus message, she cannot compute
the corresponding MAC value
• Initialization vector (IV)
Encrypting the same plaintext two times should give two different ciphertexts (semantic
security).
A common technique for achieving semantic security is to use a unique initialization
vector (IV) for each invocation of algorithm
A side input to the encryption algorithm.
TINYSEC-DESIGN
• 2 Security Options-
Authentication Encryption ( Tinysec-AE)
o TinySec encrypts the data payload and authenticates the packet with a MAC.
o The MAC is computed over the encrypted data and the packet header.
Authentication only (Tinysec-Au)
o TinySec authenticates the entire packet with a MAC, but the data payload is not
encrypted.
• Encryption : semantically secure encryption typically requires two design decisions
Specifying the IV format
Selecting an encryption Scheme
Tinysec IV format
• IV too long- add unnecessary bits to the packet
• Too short – Risk of repetition
• How long should be the IV? N bit IV repeat after 2^n +1.
If we use a n bit counter repetitions will not happen before that point.
Pseudorandom would repeat with probability of 2^(n/2)
Encryption schemes
• Symmetric key encryption schemes fall into two classes
Stream ciphers
o A stream cipher (typically) uses a key K and IV as a seed and stretches it into a
large pseudorandom keystream GK(IV ).
o The keystream is then xored against the message
o Stream ciphers have a devastating failure mode: if the same IV is ever used to
encrypt two different packets, then it is often possible to recover both
plaintexts
• Modes of operation using block ciphers.
block cipher is a keyed pseudorandom permutation over small bit strings, typically 8 or
16 bytes
CBC is the most appropriate scheme for sensor networks –why?
Works better with repeated IVs.
CBC
• IV is XOR'ed with the first data block before it is encrypted.
• Feed the result of encryption back into the encryption of the next block.
• The plain-text is XOR'ed with the previous cipher-text block before it is encrypted.
• The encryption of each block depends on all the previous blocks.
• This requires that the decryption side processes all encrypted blocks sequentially
• An error in an encrypted block
Causes the block with the error to be completely garbled.
The subsequent block will have bit errors at the same positions as the original erroneous
block.
The blocks following the second block will not be affected by the error. Hence, CBC is
self-recovering
Keying mechanism
• Use per-link keying,
separate Tinysec key for each pair of node wishing to communicate.
Drawback: Key distribution becomes a challenge.
• Allow a group of nodes to share a TinySec key rather than each pairs.
Group keying provides an intermediate level of resilience.
• Appropriate keying mechanism for a particular network depends on several factors.
• Tinysec key- A pair of skipjack key-one for authentication, one or encryption.
• Simplest keying mechanism:
Use a single key for the entire network, Preload the key before deployment.-Adversary
can compromise on node and get the key.
New Applications
• Storage and Retrieval of Interesting Activities- e.g., IrisNet[93]. (2004)
• Traffic congestion avoidance, traffic. enforcement and control systems.
• Smart parking advice system. (2005)
• Automated Assistance for the elderly and family monitors. (2005)
• Manufacturing process control for semiconductor chip, food or pharmaceutical products.
Advantages
• Enlarging the Views
Provide multiple disparate viewpoints to overcome occlusion effects
• Enhancing the Views
Redundancy provides enhanced quality
• Enabling Multi-resolution Views
Heterogeneous media streams with different granularity can be acquired from the same
point of view
Design Considerations
• Application-specific QoS requirements
Snapshot and Streaming multimedia
Flexible architecture to support heterogeneous applications
• Multimedia source coding
intra-frame/inter-frame
distributed source coding
• Multimedia in-network processing
• Multimedia coverage model development
• Power consumption
Application Layer
• The services offered by the application layer include:
Providing traffic management and admission control functionalities
Performing source coding according to application requirements and hardware
constraints, by using advanced multimedia encoding techniques
Developing flexible OS and Middleware to make functional abstractions and information
gathered by the scalar and multimedia sensors available to higher layer applications
Transport Layer
• TCP or UDP?
For real-time applications like streaming media, UDP seems preferred over TCP
Effect of dropping packets in UDP
Support for traffic heterogeneity
• TCP with appropriate modifications is preferable over UDP for WMSNs, if standardized protocols
are to be used.
Non-Standard Protocols
Focusing on reliability
• Reliable Multi-Segment Transport (RMST) (2004) or the Pump Slowly Fetch Quickly(PSFQ)
protocol (2005)
Loss intolerant packets are separated and ensured to be successfully transmitted
Loss intolerant packets are buffered at intermediate nodes, allowing for faster
retransmission in case of packet loss.
other packets are transmitted in UDP manner
No congestion avoidance
• Event-to-Sink Reliable Transport (ESRT) protocol (2005)
Not best effort but reliable requirement based rate control
Congestion detection and avoidance
WSAN: I. Motivations
• Environmental Applications
Detecting and extinguishing
forest fire
• Distributed Robotics & Sensor Networks
Mobile robots dispersed
throughout the field in sensor
networks, e.g. mines detection
and destruction.
• Battlefield applications
• Sensors detect explosive materials or weapons (objects)
• Actors annihilate them or function as tank
• Microclimate controls in smart buildings
• In case of very low or high temperature/gas leakages, trigger the alarms or corresponding
controller
• [1] I. F. Akyildiz and I. H. Kasimoglu, Wireless Sensor and Actor Networks: Research Challenges,
Ad Hoc Networks, Vol. 2, Issue 4, pp. 351-367, October 2004.
• Automated
Summary
• Security primitives in TinySec Design Considerations
• Encryption Schemes Protocols
• Keying mechanism • WSAN
• WMSN Motivation
Architecture WSN vs WSAN
Applications Architecture
Advantages Issues
Lecture 39
Bluetooth/Wireless Personal Area Networks (WPAN)
Outlines
• Bluetooth introduction • Architecture
• Technical features • Core Protocols
• Access technique • Packet format
• Bluetooth topology/scenario • Link connections
• Specifications
Last Lecture
• Security primitives in TinySec Design Considerations
• Encryption Schemes Protocols
• Keying mechanism • WSAN
• WMSN Motivation
Architecture WSN vs WSAN
Applications Architecture
Advantages Issues
What is Bluetooth?
• Bluetooth wireless technology is
An open specification for a
Low-cost, low-power, short-range radio technology
For ad-hoc wireless communication of
Voice and data anywhere in the world.
Technical features
Radio Specification
• Classes of transmitters
Class 1: Outputs 100 mW for maximum range
o Power control mandatory
o Provides greatest distance
Class 2: Outputs 2.4 mW at maximum
o Power control optional
Class 3: Nominal output is 1 mW
o Lowest power
Piconet Structure
Profiles
• Generic Access Profile • Fax Profile
• Service Discovery Application Profile • LAN Access Profile
• Cordless Telephony Profile • Generic Object Exchange Profile
• Intercom Profile • Object Push Profile
• Serial Port Profile • File Transfer Profile
• Headset Profile • Synchronization Profile
• Dial-up Networking Profile
Architecture
• Core protocols • Telephony control protocol
Radio Telephony control specification
Baseband – binary (TCS BIN)
Link manager protocol (LMP) • Adopted protocols
Logical link control and PPP
adaptation protocol (L2CAP) TCP/UDP/IP
Service discovery protocol (SDP) OBEX
• Cable replacement protocol WAE/WAP
RFCOMM
Core Protocols
• Radio:
Defines technical characteristics of BT radios.
For example licence-free ISM band 2.4 GHz, FHSS at 1600 Hops/sec, 1 MHz channel
bandwidth, GMSK modulation, tx power from 100 mw to 1 mw, raw transmission rate of
1 Mbps and so on.
• Baseband:
Defines procedure to communicate with other BT devices like formation of piconets,
links in a piconet (ACL or SCO), and access of transmit resources in a piconet etc.
• Link Manager protocol (LMP):
It is transactional protocol between two link management entities used to setup
properties of BT link. For example a device may authenticate each other, may learn each
others features (SCO/ACL links, size of packet, power consumption mode).
• Host Constroller Interface (HCI):
It is not a protocol rather an interface through which BT devices access the lower layers
of BT protocol stack. A device may pass and receive data destined to or coming from
another BT device, execute inquiries, request authentication and so on.
• Logical Link Control and Adaptation protocol (L2CAP):
Shields the specifics of BT lower layers and provides a packet interface to higher layers.
Bluetooth protocols
• Service Discovery Protocol (SDP)
Defines a service record format
o Information about services provided by attributes
o Attributes composed of an ID (name) and a value
o IDs may be universally unique identifiers (UUIDs)
Baseband
• Addressing
Bluetooth device address (BD_ADDR)
o 48 bit IEEE MAC address
Active Member address (AM_ADDR)
o 3 bits active slave address
o all zero broadcast address
Parked Member address (PM_ADDR)
o 8 bit parked slave address
• This MAC address is split into three parts
The Non-significant Address Part (NAP)
o Used for encryption seed
The Upper Address part (UAP)
o Used for error correction seed initialization & FH sequence generation
The Lower Address Part (LAP)
o Used for FH sequence generation
Packet Structure
Inquiry Procedure
• Potential master identifies devices in range that wish to participate
Transmits ID packet with inquiry access code (IAC)
Occurs in Inquiry state
• Device receives inquiry
Enter Inquiry Response state
Returns FHS packet with address and timing information
Moves to page scan state
Page Procedure
• Master uses devices address to calculate a page frequency-hopping sequence
• Master pages with ID packet and device access code (DAC) of specific slave
• Slave responds with DAC ID packet
• Master responds with its FHS packet
• Slave confirms receipt with DAC ID
• Slaves moves to Connection state
Channel Establishment
• Seven sub-states Page
Inquiry Page scan
Inquiry scan Master response
Inquiry response Slave response
Connection State
• Active Mode
Device participates actively on the transmission channel. The master regularly sends a
packet to the slaves (polling) to enable the slaves to be able to send a packet to the
master and re-synchronise themselves
• Sniff Mode
This is a low consumption mode. A Bluetooth module in the Sniff mode stays
synchronised in the piconet. It listens to the piconet at regular intervals (Tsniff) for a
short instant on specified slots for its message.
• Hold Mode
The module remains synchronised. This is lower consumption mode than the Sniff
mode. Only the counter on the Bluetooth chip in hold mode is active. At the end of the
Hold period, the Bluetooth module returns to the active mode.
• Park Mode
A Bluetooth module in this mode is no longer an active member of the piconet.
However, it remains synchronised with the master and can listen to a broadcast channel
(Beacon Channel).
L2CAP
• Service provided to the higher layer:
L2CAP provides connection-oriented and connectionless data services to upper layer
protocols
Protocol multiplexing and demultiplexing capabilities
Lecture 40
High Rate Wireless Personal Area Networks (WPAN)
Outlines
• IP Over Bluetooth o Creating child piconet
• Bluetooth Security o Ending a Piconent
• WPAN Standards o Association/Disassociati
• IEEE 802.15.3 Overview on
• 802.15.3 Medium Access (Superframe)
Topology Channel Time Management
Coordination Power management
o Starting a Piconet MAC Frame format
o Handing over control of
piconet
Last Lecture
• Bluetooth introduction • Architecture
• Technical features • Core Protocols
• Access technique • Packet format
• Bluetooth topology/scenario • Link connections
• Specifications
IP over Bluetooth
• IP over Bluetooth v 1.0
Security
WPAN Standards
IEEE standard Topic Data Suitable applications QoS needs
throughput
802.15.1 Bluetooth 1 Mbps Cell phones, Computers, Personal QoS suitable
Digital Assistants (PDAs)/ Handheld for Voice
Personal Computers (HPCs), applications
Printers, Microphones, Speakers,
Handsets, Bar Code Readers,
Sensors, Displays, Pagers and
Cellular & Personal Communications
Service (PCS) phones
802.15.2 Coexistence N/A N/A N/A
of Bluetooth
and 802.11b
802.15.3 High-rate > 20 Mbps Low power, Low cost solutions for Very high QoS
WPAN portable consumers of digital
imaging and multimedia
Applications
802.15.4 Low-rate < 0.25 Mbps Industrial, Agricultural, vehicular, Relaxed needs
WPAN Residential, Medical applications, for data rate
Sensors and actuators with very low and QoS
power consumption and low cost
802.15.3
• IEEE 803.15.3 MAC is designed to support the following goals:
Fast connection time
Ad hoc networks
Data transport with quality of service (QoS)
Security
Dynamic membership
Efficient data transfer
The DEVID, o e o tet i le gth, is used i stead of the DEV s add ess, 8 o tets i le gth,
to save overhead in the system.
The association process optionally provides information about the services available in
the piconet as well as the services provided or PNC capabilities
PNC broadcasts the information about all of the DEVs in the piconet, and places
information in the beacon about the new DEV.
When a DEV wants to leave the piconet or if the PNC wants to remove a DEV from the
piconet, the disassociation process is used.
The DEVID of the disassociated DEV is no longer valid, until reissued by the PNC.
However, the PNC is not allowed to reissue the DEVID until a waiting period hasexpired
Security
• Security for the piconet is one of two modes
Mode 0 Open:
o Security membership is not required and payload protection (either data
integrity or data encryption) is not used by the MAC. The PNC is allowed to use a
list of DEV addresses to admit or deny entry to the piconet.
Mode 1—Secure membership and payload protection:
• The MCTAs are shown first, but the PNC is allowed to place any number of them at any position
in the superframe.
Power Management
• Standard provides three techniques to enable DEVs to turn off for one or more superframes:
device synchronized power save (DSPS) mode
Piconet-synchronized power save (PSPS) mode
Asynchronous power save (APS) mode.
• PSPS
PSPS mode allows DEVs to sleep at intervals defined by the PNC.
The DEV sends a request to the PNC when it wants to enter the PSPS mode.
• DSPS
Besides allowing the DEVs to wake up and exchange traffic at the same time, the use of
DSPS sets makes it easy for other DEVs in the piconet to determine exactly when a DSPS
DEV will be available to receive traffic.
• APS
The only responsibility of a DEV in APS mode is to communicate with the PNC before the
end of its ATP in order to preserve its membership in the piconet.
ACK Policy
• If the source DEV wishes to verify the delivery of a frame, then one of the acknowledgement
(ACK) policies
NO ACK
o The no-ACK policy, is appropriate for frames that do not require guaranteed
delivery, where the retransmitted frame would arrive too late or where an
Lecture 41
IEEE 802.15.4/ZigBee
Outlines
• Overview of ZigBee Phy Layer
Whats is ZigBee, Zigbee in Channel Access Mechanisms
Wireless World, Architecture, o Slotted/Unslotted
Characteristics CSMA/CA
• IEEE 802.15.4 Data Transfer Model
Basics, Type of Devices Superframe Structure
Topology, Addressing
Last Lecture
• IP Over Bluetooth o Creating child piconet
• Bluetooth Security o Ending a Piconent
• WPAN Standards o Association/Disassociati
• IEEE 802.15.3 Overview on
• 802.15.3 Medium Access (Superframe)
Topology Channel Time Management
Coordination Power management
o Starting a Piconet MAC Frame forma
o Handing over control of
piconet
ZigBee/802.15.4 Architecture
FFD vs RFD
• Full function device (FFD)
Any topology
Network coordinator capable
Talks to any other device
• Reduced function device (RFD)
Star Topology
Peer-Peer Topology
Combined Topology
Device Addressing
• Each independent PAN will select a unique PAN identifier
• Addressing modes:
star: Network (64 bits) + device identifier (16 bits)
peer-to-peer: Source/destination identifier (64 bits)
CSMA/CA Algorithm
• Each device shall maintain three variables for each transmission attempt
NB: number of slots the CSMA/CA algorithm is required to backoff while attempting the
current transmission.
BE: the backoff exponent which is related to how many backoff periods a device shall
wait before attempting to assess a channel
• CW: (a special design)
Superframe
• In CFP, a GTS may consist of multiple slots, all of which are assigned to a single device, for either
transmission (t-GTS) or reception (r-GTS).
GTS = guaranteed time slots
• In CAP, the concept of slots is not used.
Each contention slot is of 20 symbols long.
Lecture 42
IEEE 802.16
WiMAX Basics
• WiMAX or 802.16 is an effort by the IEEE to develop a standards based air interfaces for the
licensed and unlicensed radio frequencies from 2 to 66 GHz
• The approach they have taken is to develop a common MAC – Media Access Control sub layer of
the data link layer
• Then to offer differing physical layers to accommodate the needs of the different frequencies
and regulatory environments
• The IEEE believes that the existing approaches to delivering wireless data services do have the
potential for long term growth when used outside of the local area network
WiMAX Forum
• Formed in June 2001 to promote conformance and interoperability of the 802.16 standard
• Develops system profiles that define mandatory and optional features of standard
802.16 Evolution
• Original fixed wireless broadband air
Interface for 10 – 66 GHz
• Line-of-sight only
• Point-to-Multi-Point applications
802.11 v 802.16
• 8 . s edia a ess o t ol p oto ol is opti ized fo sho te -range topologies
• It also was not designed to serve a large number of users
• Wireless MAN, on the other hand, was designed to solve the problems of delivering wireless
broadband networks over longer distances and through more difficult environments, such as
heavily wooded areas
Network Architecture
Physical Layer
• Five physical layer modes
Designation Applicability
WirelessMAN-SC 10 -66 GHz
WirelessMAN-SCa Below 11GHz – Licensed bands
802.16d
WirelessMAN-OFDM Below 11GHz – Licensed bands
802.16e
WirelessMAN-OFDMA Below 11GHz – Licensed bands
WirelessHUMAN Below 11GHz – Licensed-exempt bands
• Source: Broadband Wireless Access (W-PAN, W-LAN, WiMAX, Wi-Mob) (including OFDM
concepts) - A. K. Seth [4]
TDD
• The 802.16e PHY supports TDD and Full and Half-Duplex FDD operation;
• To counter interference issues, TDD does require system-wide synchronization;
• TDD is the preferred duplexing mode for the following reasons:
TDD enables adjustment of the downlink/uplink ratio to efficiently support asymmetric
downlink/uplink traffic,
Unlike FDD, which requires a pair of channels, TDD only requires a single channel for
both downlink and uplink providing greater flexibility
Transceiver designs for TDD implementations are less complex and therefore less
expensive.
MAC Layer
• Connection-oriented
• A fundamental premise of the MAC architecture is quality of service (QoS)
• QoS provided via service flows
MAC Layer
Lecture 43
IEEE 802.16 MAC/QoS
Outlines
• Reference Model • Characteristics of 802.16
• Burst profiles • Why not 802.11 / 802.11 vs 802.16
• Convergence sublayers • Network Architecture
• MAC PDU format • Phy Layer
• MAC PDU Transmission Multiple Access technique
• Fragmentation / Packing HARQ
• Request/Grant Scheme MIMO
• Classes of Uplink service • MAC Layer
• Power management/Handoff QoS
• WiMAX Basics Power Management
• 802.16 Evolution Handoff
Reference Model
Definitions
• Service Data Unit (SDU)
Data units exchanged between adjacent layers
• Protocol Data Unit (PDU)
Data units exchanged between peer entities
• Connection and Connection ID
A unidirectional mapping between MAC peers over the airlink (uniquely identified by a
CID)
• Service Flow and Service Flow ID
A unidirectional flow of MAC PDUs on a connection that provides a particular QoS
(Uniquely identified by a SFID)
Fragmentation
• Partitioning a MAC SDU into fragments transported in multiple MAC PDUs
• Contents of the fragmentation sub-header:
2-bit Fragmentation Control (FC)
o Un-fragmented o First fragment
o Last fragment o Continuing fragment
3-bit Fragmentation Sequence Number (FSN)
o Required to detect missing continuing fragments
Packing
• The process of combining multiple MAC SDUs (or fragments thereof) into a single MAC PDU
• On connections with variable length MAC SDUs
• On connections with fixed length MAC SDUs
• Can, in certain situations, save up to 10% of system bandwidth
Downlink transmissions
• Two kinds of bursts: TDM and TDMA
• All bursts are identified by a DIUC
Downlink Interval Usage Code
• TDMA bursts have resync preamble
Allows for more flexible scheduling
• Each burst may contain data for several terminals
• SS must recognize the PDUs with known CIDs
• DL-MAP message signals downlink usage
Burst profiles
• Each burst profile has mandatory exit
threshold and minimum entry threshold
• SS allowed to request a less robust
DIUC once above the minimum entry
level
• SS must request fall back to more
robust DIUC once at mandatory exit
threshold
• Requests to change DIUC done with
DBPC-REQ or RNG-REQ messages
Request/Grant Scheme
• Self Correcting
• Bandwidth Requests are always per Connection
• Grants are either per Connection (GPC) or per Subscriber Station (GPSS)
Uplink Service - BE
• No QoS guarantees
• Allowed to use contention requests
• May use Grant Management sub-header
Power Management
• Sleep and Idle modes enable power-efficient MS operation
• Sleep mode
• Idle mode
Allows MS to become periodically available for broadcast messages without registering
at a BS
Handoff
• 3 handoff methods supported
Hard Handoff (HHO) – required
o Break-before-make
o Optimized to keep handoff delays below 50 milliseconds
Fast Base Station Switching (FBSS) - optional
Macro Diversity Handover (MDHO) – optional
Lecture 44
4G Issues
Outline
• 4G Overview • Handoffs
• Heterogeneous Wireless networks • Types, VHO process, VHO Issues
• Evolution, Issues in 4G • Standards
• Mobility Management • QoS Considerations
Last Lecture
• Reference Model • Fragmentation / Packing
• Burst profiles • Request/Grant Scheme
• Convergence sublayers • Classes of Uplink service
• MAC PDU format, Transmission • Power management/Handoff
4G Overview
• 4G mobile communication systems tend to mean different things to different people:
For some it is merely a higher-capacity new radio interface,
While for others it is an inter-working of cellular and wireless LAN technologies that
employs a variant of the Mobile IPv6 mobility management protocol for inter-system
handoff.
• There is no doubt that 4G systems will provide higher data rates. Traffic demand estimates
suggest that, to accommodate the foreseen amount of traffic in the 2010 – 2020 timeframe in
an economically viable way, 4G mobile systems must achieve a manifold capacity increase
compared to their predecessors.
• researchers and vendors are expressing a growing interest in 4G wireless networks that support
global roaming across multiple wireless and mobile networks
• a system that enables an Always Best Connected – or ABC
• There are many wireless network technologies Cellular networks, Wireless LANs, Wireless PANs,
mobile Wimax, etc.
• 4G networks will play a key role for integrating various network architectures and technologies
and achieving a seamless wireless access infrastructure
• 4G provides high-speed, large volume, good quality, and global coverage to roam between
different types of technologies
• It is widely accepted that the individual (wireless and/or wireline) access networks will interface
to core and/or backbone network elements over the IP protocol
• these wireless access networks are expected to have the following in common:
A dynamic address assignment mechanism (e.g., DHCP, SLP, IPv6) that is capable of
associating a short-lived or long-lived IP address to the respective wireless interface at
the mobile terminal (e.g., Mobile IP COA association)
A transparent IP forwarding service that is accessible over the logical termination of the
IP layer at the mobile terminal and one or more gateways
Evolution of 4G
Heterogeneous Networks
Issues in 4G
• Need to resolve issues as
Access Support for quality of service
Handoff Wireless security and
Location coordination authentication
Resource coordination to add Network failure and backup
new users Pricing and billing.
Support for multicasting
Mobility Management
• Location Management: enables system to track location of mobile terminal (MT)
Location updates and paging
• Handoff Management: the process by which an MT keeps its connection when it moves from
one point of attachment (base station or access point) to another
Handoff Management
• Low signalling and processing overhead.
• Minimum packet loss and delay (seamless HO).
• Guaranteeing QoS during the process and transfer of context.
• Use of any triggers or metrics available to decide when and where.
• Efficient use of network and MT resources.
• Enhanced scalability, reliability and robustness.
• Allow inter-technology handoff (VHO).
Handoff Types
• Homogeneous (Horizontal) Handovers
Within Single Network (Localized Mobility)
Limited opportunities
Mainly use received signal strength (RSS) to decide handoff
• Heterogeneous (Vertical) Handovers
Across Different Networks (Global Mobility)
More Opportunistic
Handoff metric: RSS, offered bandwidth, price, power consumption, speed,
VHO Issues
• When to switch? • Load balancing between networks.
VHO policies • QoS guarantees
WLAN to Cellula ≠ Cellula to • Security and Authentication.
WLAN • Billing
• Seamless handoff • Implementation.
Packet loss and VHO latency.
Standardization Efforts
• IETF
Mobility for IPv4 (MIPv4)
Mobility for IPv6 (MIPv6)
Mobility for IP: Performance, Signalling and Handoff Optimization (MIPSHOP)
• IEEE 802.21 Media Independent Handover Group is working toward the seamless handoffs
between IEEE 802.XX family and 3G Cellular
• 3GPP and 3GPP2 are working in inter-working with WLAN as an extension of their radio access
networks.
Loosely Coupled Architecture Tightly Coupled Architecture
• Tightly coupling
Provides common charging and billing service
Provides mobility support using traditional 3G technology
Reuses 3G service (e.g., SMS, MMS, etc.)
Causes large traffic load in 3G core network
• Loosely coupling
Provides simple integration approach
Needs minimal requirement on the access network
Provides independent network management
QoS
• Supporting QoS in 4G networks will be a major challenge due to varying bit rates, channel
characteristics, bandwidth allocation, fault-tolerance levels, and handoff support among
heterogeneous wireless networks.
• QoS support can occur at the
Packet,
Transaction
Circuit
User
• Packet-level QoS
Applies to jitter, throughput, and error rate.
Network resources such as buffer space and access protocol are likely influences.
• Transaction-level QoS
Describes both the time it takes to complete a transaction and the packet loss rate.
Certain transactions may be time sensitive, while others cannot tolerate any packet loss.
• Circuit-level QoS
Includes call blocking for new as well as existing calls.
It depe ds p i a il o a et o k s a ilit to esta lish a d ai tai the e d-to-end
circuit.
• User-level QoS
Depends on user mobility and application type.
The new location may not support the minimum QoS needed, even with adaptive
applications.
End-to-End QoS
• Developers need to do much more work to address end-to-end QoS.
They may need to modify many existing QoS schemes, including admission control,
d a i esou e ese atio , a d Qo“ e egotiatio to suppo t 4G use s di e se Qo“
requirements.
• A wireless network could make its current QoS information available to all other wireless
networks in either a distributed or centralized fashion so they can effectively use the available
network resources.
• Additionally, deploying a global QoS scheme may support the diverse requirements of users
with different mobility patterns.
QoS Parameters
• 802.11e
Nominal MSDU size
Min/mean/max data rate
Mean/max service interval
Traffic type (isochronous, asynchronous)
Burst size
• UMTS (Release 5)
Traffic class (conversational, streaming, interactive, or background)
Guaranteed, maximum bit rate
Maximum SDU size
SDU/bit error ratio
Transfer delay
• 802.16-2004
Traffic priority
Maximum sustained traffic rate
Maximum traffic burst
Minimum reserved traffic rate
Scheduling type (best-effort, non-real time polling, real-time polling, unsolicited grant)
Tolerated jitter, maximum latency
Lecture 45
Review of Lectures 26-44
Last Lecture
• 4G Overview • Mobility Management
Heterogeneous Wireless • Handoffs
networks Types, VHO process, VHO Issues
Evolution Standards
Issues in 4G • QoS Considerations
26 – Outlines
• Overview of IEEE 802.11 • MAC Protocols
• IEEE 802.11 Protocols DCF
• Architecture PCF
• Services
27 - Outlines
• Problems with DCF • Fragmentation / Reassembly
• Virtual Carrier Sensing • MAC Frame Format
• RTC/CTS Protocol • Frame Types
• Inter-frame Spacing, PCF • Physical Media in Original IEEE 802.11
28 – Outlines
• Introduction
What is Ad hoc networks?
Characteristic
Ad hoc vs. cellular networks
Application
Challenges
• Routing Protocol
Expected Properties of Ad-hoc Routing Protocols
A taxonomy for routing protocols in Mobile ad
Some common protocols (DSDV, AODV, DSR, ZRP, TORA)
29 - Outlines
• Types of Attack
• Goals of 802.11 Security
• WEP Protocol
• WEP Authentication
• Security flaws in original 802.11
30 - Outlines
• Limitations of QoS in IEEE 802.11
• Overview of 802.11e
• EDCF
• HCF
• QoS is realized by introducing traffic categories (TCs)
• Each instance is parameterized with TC specific parameters
AIFS, CWmin, CWmax, Persistence factor (PF)
Example
31 - Outlines
• Introduction to WMN
• Characteristics
• WMN vs MANET
Backbone, dedicated routing, mobility, multiple radios
• Architecture
• Applications
• Critical factors influencing performance
Radio techniques Security
Scalability Ease of Use
QoS Mesh connectivity
32 – Outlines
• MAC Layer Wish List
Scalability Route Optimization Criteria
Multi-Channel Routing fairness
Some Ideas Routing – Cross-layer design
Research Issues • QoS Support at each layer
• Network Layer • WMN Standards
Routing
33 – Outlines
• TCP Variants
Slow start
Fast Retransmit/Recovery (TCP Reno)
• Issues in Heterogeneous Wireless Networks
• TCP Schemes for Wireless
Pure Link-level Approaches
Soft-state Transport Layer Caching Approaches
Soft-state Cross Layer Signalling Approaches
Hard-state Transport Layer Approaches
34 - Outline
• Introduction to WSN
• Applications of WSN
• Factors Influencing Performance of WSN
Power consumption Scalability
Fault tolerance Topology
• Architecture and Communication Protocols
• Challenges in WSNs.
35 - Outlines
• Attributes of MAC Protocol DS-MAC
• Energy Efficiency in MAC Traffic Adaptive MAC
• Proposed Routing Protocol DMAC
S-MAC Contention-Free MAC
T-MAC
36 – Outlines
• Routing Challenges and Design Issues
Deployment Fault tolerance
Routing method Power
Heterogeneity Mobility etc
• Routing Protocols
SPIN TEEN/APTEEN
Directed Diffusion GAF
ACQUIRE GEAR
LEACH SPEED
37 - Outlines
• Transport Protocols for WSN
• TCP/UDP for WSN
• Protocols
PSFQ
ESRT
CODA
• Security Threats in WSN
• TinySec
• Motivations of Link Layer security
• TinySec Design goals
38 – Outlines
• Security primitives in TinySec
• Encryption Schemes
• Keying mechanism
• WMSN
Architecture
Applications
Advantages
Design Considerations
Protocols
• WSAN
Motivation
WSN vs WSAN
Architecture
39 – Outlines
• Bluetooth introduction
• Technical features
• Access technique
• Bluetooth topology/scenario
• Specifications
• Core Protocols
• Link connections
40 – Outlines
• IP Over Bluetooth
• Bluetooth Security
• WPAN Standards
• IEEE 802.15.3 Overview
• 802.15.3
Topology
Coordination
o Starting a Piconet
o Handing over control of piconet
o Creating child piconet
Medium Access (Super-frame)
Channel Time Management
Power management
MAC Frame format
41 - Outlines
• IEEE 802.15.4
Basics, Type of Devices
Phy Layer
Channel Access Mechanisms
o Slotted/Unslotted CSMA/CA
Super-frame Structure
42 – Outlines
• WiMAX Basics
• 802.16 Evolution
43 – Outlines
• Reference Model
• Burst profiles
• Classes of Uplink service
44 - Outline
• 4G Overview
• Mobility Management
• Handof