Mobile Computing
Mobile Computing
MOBILE COMPUTING
UNIT - I
Mobile Computing - Dialog Control - Networks - Middleware and Gateways -
Application and Services - Developing Mobile Computing Applications - Standards -
Standard Bodies – Players in Wireless Space. Mobile Computing Architecture:
Architecture for Mobile Computing – Three Tier Architecture - Design
Considerations for Mobile Computing
UNIT - II
Mobile Computing Through Telephony: Evolution of Telephony - Multiple Access
Procedure - Mobile Computing Through Telephone - Voice XML - TAPI - Emerging
Technologies: Bluetooth - RFID - Mobile IP - IPV6.
UNIT - III
GSM: Global System for Mobile Communications - GSM Architecture - GSM
Entities- Call Routing in GSM - GSM Address and Identifiers - Network Aspects in
GSM. SMS: Mobile Computing Over SMS - SMS - Value Added Services through
SMS.
UNIT - IV
GPRS: GPRS and Packet Data Network - GPRS Network Architecture - Data Services
in GPRS - Billing and Charging in GPRS. WAP: Evolution of Wireless Data and
WAP- GPRS Applications.
UNIT - V
CDMA and 3G: Introduction -Architecture CDMA versus GSM -IEEE
802.11Standards- Wireless Data. Wireless LAN: Introduction - Wireless Advantages-
Wireless LAN Architecture - Types of Wireless LAN - Mobility in Wireless LAN -
Wireless LAN Security. Next Generation Networks – OFDM – MPLS - Wireless
synchronous transfer Mode-Multimedia Broadcast Services.
TEXT BOOK
1. Asoke K Talukder, Roopa RYavagal, Mobile Computing , 2nd Edition,Tata MC
Graw Hill PublishingCompany Limited 2010.
REFERENCE BOOK
1. Jochen Schiller, Mobile Communications, Pearson Education, Second Edition,
2011.
2. William C.Y. Lee, Mobile Cellular Telecommunications, Second Edition,
McGraw Hill, 1995.
Vidhyaa Arts and Science College - Konganapuram
UNIT - I
1. 1. Mobile Computing
1
Vidhyaa Arts and Science College - Konganapuram
• User Mobility: User should be able to move from one physical location to
another location and use the same service. The service could be in the home
network or a remote network.
2
Vidhyaa Arts and Science College - Konganapuram
• Network Mobility: User should be able to move from one network to another
network and use the same service.
• Bearer Mobility: User should be able to move from one bearer to another
and use the same service.
• Device Mobility: User should be able to move from one device to another
and use the same service.
• Session Mobility: A user session should be able to move from one user-
agent environment to another.
• Service Mobility: User should be able to move from one service to another.
• Host Mobility: The user device can be either a client or server. When it is a
server or host, some of the complexities change. In case of host mobility the
mobility of IP needs to be taken care of.
The mobile computing functions can be logically divided into following major
segments
• User with device: The user device, this could be a fixed device like desktop
computer in office or a portable device like mobile phone. Example: laptop
computers, desktop computers, fixed telephone, mobile phones, digital TV
with set-top box, palmtop computers, pocket PCs, two way pagers,
handheld terminals, etc.
• Network: Whenever a user is mobile, he will be using different networks at
different places at different time. Example: GSM, CDMA, iMode, Ethernet,
3
Vidhyaa Arts and Science College - Konganapuram
In any communication there are two types of user dialogues. These are
• Long session-oriented transactions - Going through a monolithic
document page by page can be considered as a session-oriented
transaction.
• Short transaction – Going to a particular page directly through an
index can be considered as a short transaction.
Selection of the transaction mode will depend on the type of device we use. A
session may be helpful in case of services offered through computers with large
4
Vidhyaa Arts and Science College - Konganapuram
screens and mouse. For devices with limited input/output like SMS for instance,
short transactions may be desired. Let us consider an example of bank balance
enquiry over the Internet. In case of Internet banking through desktop computer,
the user has to go through the following minimum dialogues:
Mobile computing will use different types of networks. These can be fixed
telephone network, GSM, GPRS, ATM (Asynchronous Transfer Mode), Frame Relay,
ISDN (Integrated Service Digital Network), CDMA, CDPD (Cellular Digital Packet
data), DSL (Digital Subscriber Loop), Dial-up, Wi-Fi (Wireless Fidelity), 802.11,
Bluetooth, Ethernet, Broadband, etc.
Wire-line Networks
This is a network, which is designed over wire or tangible conductors. This
network is called fixed or wire-line network. Fixed telephone networks over copper
and fiber-optic will be part of this network family. Broadband networks over DSL or
cable will also be part of wire-line networks. Wire-line network are generally public
networks and cover wide areas. Though microwave or satellite networks do not use
wire, when a telephone network uses microwave or satellite as a part of its
infrastructure, it is considered part of wire-line networks. When we connect to ISPs it
is generally a wire-line network. The Internet backbone is a wire-line network as
well.
Wireless Networks
Mobile networks are generally termed as wireless network. This includes
wireless networks used by radio taxis, one way and two way pager, cellular phones.
Example will be PCS (Personal Cellular System), AMPS (Advanced Mobile Phone
System), GSM, CDMA, DoCoMo, GPRS etc. WiLL (Wireless in Local Loop) networks
5
Vidhyaa Arts and Science College - Konganapuram
Any software layered between a user application and operating system can be
termed as middleware. Middleware examples are communication middleware,
object oriented middleware, message oriented middleware, transaction processing
middleware, database middleware, behavior management middleware, RPC
middleware etc. There are some middleware components like behavior management
middleware, which can be a layer between the client device and the application. In
mobile computing context we need different types of middleware components and
gateways at different layers of the architecture. These are:
• Communication middleware
• Transaction processing middleware
• Behavior management middleware
• Communication gateways
6
Vidhyaa Arts and Science College - Konganapuram
Communication Middleware
The application will communicate with different nodes and services through
different communication middleware. Different connectors for different services
will fall in this category. Examples could be TN3270 for IBM mainframe services, or
Javamail connector for IMAP or POP3 services
Transaction Processing Middleware
In many cases a service will offer session oriented dialogue (SoD). For a
session we need to maintain a state over the stateless Internet. This is done through
an application server. The user may be using a device, which demands a short
transaction whereas the service at the backend offers a SoD. In such cases a separate
middleware component will be required to convert a SoD to a short transaction.
Management of the Web components will be handled by this middleware as well.
7
Vidhyaa Arts and Science College - Konganapuram
Data and information, through mobile computing services are required by all
people regardless of the fact that they are mobile are not. There can be many
applications and services for the mobile computing space. These application or
services run on origin server. These are also known as content servers. Contents will
primarily be lifestyle specific. From lifestyle perspective they can be grouped into
different categories like:
8
Vidhyaa Arts and Science College - Konganapuram
• News: News could be political, current affair, breaking news, business news,
sports news, community news etc.
9
Vidhyaa Arts and Science College - Konganapuram
• Sports: This service offers online sports update. In India live cricket score is
the most popular mobile computing application. Live cricket score is
available in India with many service providers through Web, Voice, SMS and
WAP.
• Digital library: Internet converted the world into a global village and global
library. Accessing this library from anywhere anytime will only help
reducing the digital divide.
Any portal system today supports user mobility. If I have an Internet mail
account like hotmail or yahoo, I can access my mail from anywhere. I need a desktop
or laptop computer to access my mailbox. I may not be able to access the same mail
through some other device like a fixed phone. There are a number of factors that
10
Vidhyaa Arts and Science College - Konganapuram
• The application has moved into the sustenance phase in the software
development lifecycle.
11
Vidhyaa Arts and Science College - Konganapuram
• Products and packaged software where enterprise does not have any control.
This could be due to high cost of ownership for new upgrade or the vendor
does not have any plan to support the new requirement.
1.1.6. Standards
There are many institutes that generate and provide standards across the
world. There are standard bodies at the regional or country level; also, there are
bodies at the international level. Based on the area of operations, standard bodies
are formed by the governments, professional institutes or industry consortiums.
These standard bodies sometime also function as regulators. In India there is a
12
Vidhyaa Arts and Science College - Konganapuram
standard body under the Government of India, which is called Bureau of Indian
Standard or simply BIS. A standards process include following steps:
• Right to appeal by any participant that believes that due process principles
were not sufficiently respected during the standards development in
accordance with the ANSI-accredited procedures of the standards developer.
ISO
IETF
The Internet Engineering Task Force (IETF) is the standard-making body for
Internet and related technologies. IETF is an open international community of
network designers, operators, vendors and researchers concerned with the evolution
of the Internet architecture and the smooth operation of the Internet. The Internet
Assigned Numbers Authority (IANA) is the central coordinator for the assignment
of unique IP address. Standards defined by IETF are called Request For Comment or
RFC. The standard for email is defined in RFC821 (Simple Mail Transfer Protocol or
SMTP); RFC2616 describes the version 1.1 of Hypertext Transfer Protocol
(HTTP/1.1).
ETSI
14
Vidhyaa Arts and Science College - Konganapuram
OMA
The Open Mobile Alliance (OMA) has been established by the consolidation
of the WAP Forum and the Open Mobile Architecture initiative. WAP and MMS
standards are created, maintained and managed by OMA.
ITU
15
Vidhyaa Arts and Science College - Konganapuram
IEEE
16
Vidhyaa Arts and Science College - Konganapuram
Language), PNG (Portable Network Graphics), SGV (Scalable Vector Graphics), RDF
(Resource Description Framework), P3P (Platform for Privacy Preferences) etc.
3GPP
17
Vidhyaa Arts and Science College - Konganapuram
18
Vidhyaa Arts and Science College - Konganapuram
PAM
19
Vidhyaa Arts and Science College - Konganapuram
input, dialog and display management) reside. The second tier is the Process
Management or Application Tier. This layer is for application programs or process
management where business logic and rules are executed. This layer is capable of
accommodating hundreds of users. In addition, the middle process management tier
controls transactions and asynchronous queuing to ensure reliable completion of
transactions. The third and final tier is the Database Management or Data Tier. This
layer is for database access and management.
The three-tier architecture is better suited for an effective networked
client/server design. It provides increased performance, flexibility,
maintainability, reusability, and scalability, while hiding the complexity of
distributed processing from the user.
20
Vidhyaa Arts and Science College - Konganapuram
There are agent software in the Internet that access the remote service through
telnet interface. There are different flavors of telnet agents in use. These are standard
telnet for Unix servers; TN3270 for IBM OS/390; TN5250 for IBM AS/400 or VT3K
for HP3000.
Application Tier (Tier-2)
21
Vidhyaa Arts and Science College - Konganapuram
• Message-Oriented Middleware
• Transaction Processing Middleware
• Database Middleware
• Communication Middleware
• Distributed Object and Components
• Trans-coding Middleware.
Message-oriented Middleware (MOM)
Message-oriented Middleware is a middleware framework that loosely
connects different applications through asynchronous exchange of messages. A
MOM works over a networked environment without having to know what platform
or processor the other application is resident on. The message can contain formatted
data, requests for action, or unsolicited response. The MOM system provides a
message queue between any two interoperating applications. If the destination
process is out of service or busy, the message is held in a temporary storage location
until it can be processed. Example of MOM are Message Queue from IBM known as
MQ Series. The equivalent from Java is JMS (Java Message Service).
Transaction Processing (TP) Middleware
Transaction Processing Middleware provides tools and an environment for
developing transaction-based distributed applications. An ideal TP system will be
able to input data into the system at the point of information source and the output
22
Vidhyaa Arts and Science College - Konganapuram
of the system is delivered at the point of information sink. In an ideal TP system, the
device for input and output can potentially be different. TP systems are generally
capable of providing services to thousands of clients in a distributed client/server
environment.
Communication Middleware
Communication Middleware is used to connect one application to another
application through some communication middleware, like connecting one
application to another application through telnet. These types of middleware are
quite useful in the telecommunication world.
Distributed Object and Components
An example of distributed objects and components is CORBA (Common
Object Request Broker Architecture). CORBA is an open distributed object
computing infrastructure being standardized by the Object Management Group.
CORBA is useful in many situations because of the easy way that CORBA integrates
machines from so many vendors, with sizes ranging from mainframes through minis
and desktops to hand-helds and embedded systems. One of its most important, as
well as the most frequent, uses is in servers that must handle a large number of
clients, at high hit rates, with high reliability.
Trans-coding Middleware
Trans-coding Middleware is used to trans-code one format of data to another
format to suit the need of the client.
23
Vidhyaa Arts and Science College - Konganapuram
The ICAP server executes the ICAP resource's service on the request and
sends the possibly modified request, or a response to the request back to
the ICAP client.
The surrogate sends the request, possibly different from the original client
request, to the origin server.
24
Vidhyaa Arts and Science College - Konganapuram
The surrogate sends the reply (from either the ICAP server or the origin
server) to the client.
In future, ICAP servers may be available to provide some of the following services:
25
Vidhyaa Arts and Science College - Konganapuram
• Exchanging messages.
26
Vidhyaa Arts and Science College - Konganapuram
resolution of synchronization conflicts. The protocol works over all networks used
by mobile devices, both wireless and wireline. Since wireless networks employ
different transport protocols and media, a SyncML will work smoothly and
efficiently over:
• WSP (the Wireless Session Protocol, part of the WAP protocol suite)
• OBEX (Object Exchange Protocol, i.e. Bluetooth, IrDA and other local
connectivity)
transparent to the client. In this case the service is the same for Internet,
PDA and WAP.
28
Vidhyaa Arts and Science College - Konganapuram
W3C has proposed a standard for context information. This standard is called
Composite Capabilities/Preference Profiles (CC/PP), for describing device
capabilities and user preferences.
Composite Capabilities/Preference Profiles (CC/PP)
The CC/PP model is based on RDF (Resource Description Framework) and
can be serialized using XML. A CC/PP profile contains a number of attribute names
and associated values that are used by an application to determine the appropriate
form of a resource to deliver to a client. This is to help a client or proxy/middleware
to describe their capabilities to an origin server or other sender of resource data. It is
anticipated that different applications will use different vocabularies to specify
application-specific properties within the scope of CC/PP. However, for different
applications to interoperate, some common vocabulary is needed. The CC/PP
standard defines all these.
30
Vidhyaa Arts and Science College - Konganapuram
CC/PP is designed in such a way that an origin server or proxy can perform
some sort of content to device matching. CC/PP is designed to suit an adaptation
algorithm. The sequence of steps in the general case would look something like the
following:
Device sends serialized profile model with request for content.
Origin server receives serialized RDF profile and converts it into an in-
memory model.
The profile for the requested document is retrieved and an in-memory model
is created.
The device profile model is matched against the document profile model.
A suitable representation of the document is chosen. At this stage the
document to be returned can be chosen from a number of different versions of
the same document (content switch on context) or it can be dynamically
generated (content trans-coding on context).
Document is returned to device and presented.
Policy Manager
The Policy Manager is responsible for controlling policies related to mobility.
A policy is a set of rules; these rules need to be followed under different conditions.
Semantic Web
Facilities to put machine understandable data on the Web are becoming a
necessity. The Semantic Web is targeted to address this need. The idea of having
data on the web defined and linked in a way that it can be used by machines not just
for display purposes, but for automation, security, filtering, integration and reuse of
data across various applications.
31
Vidhyaa Arts and Science College - Konganapuram
The Semantic Web is generally built on syntaxes which use URIs to represent
data, usually in tuple-based structures: i.e. many tuples of URI data that can be held
in databases, or interchanged on the world Wide Web using a set of particular
syntaxes developed especially for the task. These syntaxes are called 'Resource
Description Framework (RDF)' syntaxes.
Security Manager
The Security Manager provides secure connection between the client device
and the origin server. Depending on the security policies of an organization, if the
security requirements are not met, some content may not be viewable. Security
manager will ensure security with respect to:
• Confidentiality-the message being transacted needs to be confidential.
Nobody will be able to see it.
• Integrity-the message being transacted needs to be tamper-resistant. Nobody
will be able to change any part of the message.
• Availability—the system will be available. Nobody will be able to stop the
service.
• Non-repudiation-the users of the system can be identified. Nobody after
using the system can claim otherwise.
• Trust-there are complex issues of knowing what resources, services or agents
to trust. The system will be trusted.
Confidentiality is managed by encryption. Using encryption techniques we
change the message to some other message so that it cannot be understood. There
are different types of encryption algorithms and standards. In a defined
environment like enterprise LAN or a VPN (Virtual Private Network), we can
standardize some encryption algorithm like 128 bits AES to be used. Integrity can be
managed using different hashing algorithms. Availability relates to peripheral
security related to Web server, firewall etc. The non-repudiation can be managed
with digital signature. For trust we may need to establish some sort of third-party
recommendation system. Third party rating system can also help establish trust. The
security manager needs to manage all these aspects.
32
Vidhyaa Arts and Science College - Konganapuram
33
Vidhyaa Arts and Science College - Konganapuram
34
Vidhyaa Arts and Science College - Konganapuram
Content providers do not have to change the way they author or serve content.
However, there are a number of drawbacks to this approach:
Content providers have no control over how their content will appear to
different clients.
There may be legal issues arising from copyright that may preclude or
severely limit the trans-coding by proxies.
HTML tags mainly provide formatting information rather than semantic
information.
Trans-coding sometimes-could be difficult to apply to many media types
such as video and audio.
Developing a general purpose trans-coding engine is very difficult if not
impossible.
Trans-coding through middleware is transparent to both device and content.
Therefore, this trans-coding technique has to be very robust and universal. That is
why this trans-coding technique is the most difficult to engineer. It is most desirable
for content aggregators and value added service providers.
Content Rating and Filtering
W3C has proposed a standard called PICS (Platform for Internet Content
Selection) for rating of web content. Filtering of the content can take place depending
on this rating. PICS specification is a set of technical specifications for labels (meta-
data) that help software and rating services to work together. Rating and labeling
services choose their own criteria for proper identification and filtering of the
content. Since rating will always involve some amount of subjective judgment, it is
left to the service provider to define the ratings. Rating can be through self-labeling
or third party labeling of content. In a third party labeling some independent rating
agency can be used
The W3C is working to extend Web meta-data capabilities generally and is
applying them specifically in the following areas:
35
Vidhyaa Arts and Science College - Konganapuram
Single service request—this works at user level and works for only one user.
For example, a user may request the proxy server at the NO to translate the
36
Vidhyaa Arts and Science College - Konganapuram
page into Hindi and then deliver the same to the user. In this case, the end
user buys the content and the translation service.
Group service request—this works for a group of users. This type of request
is initiated either at the CA level or the NO level. For example, the content
aggregator has some arrangement for advertisement. The content aggregator
examines all the HTML pages and inserts an advertisement at an appropriate
place.
Seamless Communication
The seamless communication offers users to roam across different wireless
networks. Roaming generally works within homogeneous networks, like GSM to
GSM or CDMA2000 to CDMA2000. True seamless roaming will include handoff and
roaming in a heterogeneous hybrid network. User will move from a WiFi to 3 G to
wired LAN to GSM while the session is in progress. Users will be able to
communicate using whatever wireless device is currently at hand. Thus, GPRS-
enabled cell phones, PDAs and laptops will be able to roam and communicate freely
and access the Internet across both WLANs and WWANs.
In a seamless roaming, the following aspects need to be maintained and
managed in a seamless fashion without any disruption of service:
37
Vidhyaa Arts and Science College - Konganapuram
38
Vidhyaa Arts and Science College - Konganapuram
Global Positioning System (GPS) is a system that gives us the exact position
on the Earth. GPS is funded by and controlled by the US Department of Defense.
39
Vidhyaa Arts and Science College - Konganapuram
There are GPS satellites orbiting the Earth, which transmit signals that can be
detected by anyone with a GPS receiver. Using the receiver, we can determine the
location of the receiver. GPS has 3 parts: the space segment, the user segment, and
the control segment.
The space segment consists of 24 satellites, each in its own orbit 11,000
nautical miles above the Earth. The GPS satellites each take 12 hours to orbit the
Earth. Each satellite is equipped with an accurate clock to let it broadcast signals
coupled with a precise time message.
The user segment consists of receivers, which can be in the users' hand,
embedded in a mobile device or mounted in a vehicle. The user segment receives the
satellite signal which travels at the speed of light. Even at this speed, the signal takes
a measurable amount of time to reach the receiver. The difference between the time
the signal is sent and the time it is received, multiplied by the speed of light, enables
the receiver to calculate the distance to the satellite. To measure precise latitude,
longitude and altitude, the receiver measures the time it took for the signals from
four separate satellites to get to the receiver. If we know our exact distance from a
satellite in space, we know we are somewhere on the surface of an imaginary sphere
with radius equal to the distance to the satellite radius. If we know our exact
distance from four satellites, we know precisely where we are on the surface of the
each.
40
Vidhyaa Arts and Science College - Konganapuram
UNIT - II
41
Vidhyaa Arts and Science College - Konganapuram
was that the analog voice is digitized before it is given to a switch for switching. The
1960s and 1970s saw the advent of telephone exchanges that were controlled by
processors and software (digital computers). These were called stored program
control exchanges. The primary objective of a sophisticated telephone exchange is
still the same as that of the manual exchange a century ago. These are to detect the
A-subscriber's (calling party) call attempt, connect him to the correct B-subscriber
(called party), and to save data about the call for the purpose of billing.
• Finds the right way to connect the caller's line to the line being called.
• Notes down the call details: time of call, duration of call, calling number
and called number.
Having removed the need for an operator in the automated exchange, a
system was necessary to indicate the progress of the call to the caller. A series of
distinct tones were generated by a machine called Ring Generator. The tones
produced were as follows:
• Dial Tone (DT). This is a signal applied to the line after the calling party
(A party) has lifted his handset and the switching equipment has allocated
him an available outlet (a circuit) for this call to proceed.
• Busy Tone (BT). Busy tone indicated either that the called subscriber (B
party) is already off-hook (busy) or that the route to the called subscriber
is congested.
• Ring Tone (RT). When a circuit between A party and the B party is
established, the telephone rings at B party's end and a ring tome is
generated for the A party.
A normal telephone system is called Public Switched Telephone Network
(PSTN). PSTN nodes can be subdivided into three main categories:
Local exchanges (also known as End Office) - used for the connection of
subscribers.
Transit exchanges (also known as Local Access Tandem) - switch traffic
within and between different geographical areas.
International exchanges (also known as Interexchange Carrier) and
other gateway-type exchanges - switch traffic to telecommunication
networks in foreign countries and other networks.
43
Vidhyaa Arts and Science College - Konganapuram
A physical wire (also known as local loop) is laid from the local exchange to
the telephone device at each subscriber's place. In case of a wireless network like
GSM or WILL (Wireless in Local Loop), there is no wire from the local exchange to
the telephone. The communication between the local exchange and the telephone
device is managed over the wireless radio interface. In India, there are network
operators who are offering basic or fixed telephone, WiLL and GSM.
44
Vidhyaa Arts and Science College - Konganapuram
45
Vidhyaa Arts and Science College - Konganapuram
offering telephone banking for quite some time using this technology. In a telephone
banking application, the user calls a number and then does his banking transaction
through a fixed telephone. In this application the telephone does many functions of
a bank teller. Input to this system is a telephone keyboard and output is a
synthesized voice. These applications can be used from anywhere in the world. The
only issue in this case is the cost of a call
To make this type of mobile computing work through voice interfaces, we use
Interactive Voice Response (IVR). In USA and Japan IVRs are commonly known as
Voice Response Unit (VRU). The technical name for this technology is CT (Computer
Telephony) or CTI (Computer Telephony Interface or Computer Telephony
Integration). IVR software can be hosted on a Windows-NT, Linux, or other
computers with the voice cards. There are many companies who manufacture voice
cards; however, one of the most popular card vendors is from Intel/Dialogic. IVR
works as the gateway between a voice-based telephone system and a computer
system. Multiple telephone lines are connected to the voice card through appropriate
telecom interfaces (El or an analog telephone extension). When a caller dials the IVR
number, a ring tone is received by the voice card within the IVR. The voice card
answers the call and establishes a connection between the caller and the IVR
application. The caller uses the telephone keyboard to input data. The switch can be
either a PSTN exchange or a local PBX in the office. For PSTN switch, the voice card
will have El interface whereas for a PBX, the voice card will have analog interface.
The IVR will have all the gateway-related functions. The server will host the
business application.
46
Vidhyaa Arts and Science College - Konganapuram
1. Alphabet A, B, C on key 2
2. Alphabet D, E, F on key 3
3. Alphabet G, H, I on key 4
4. Alphabet J, K, L on key 5
5. Alphabet M, N, O on key 6
6. Alphabet P, Q, R, S on key 7
7. Alphabet T, U, V on key 8
8. Alphabet W, X, Y, Z on key 9
941 Hz * 0 #
If we press key 1, it will generate a frequency 697 + 1209 Hz. Likewise 0 will
be 941+1336 Hz. These DTMF signals are different audio frequencies interpreted by
the voice card and passed to the IVR program as numbers through appropriate APIs.
For example the user presses '2' three times. The voice card will receive 697+1336
Hz-697+1336 Hz-697+1336 Hz. This will be interpreted by a program as 2-2-2.
Looking at the time interval between the numbers, the program can decide whether
47
Vidhyaa Arts and Science College - Konganapuram
the user entered '222' or 'B'. When the application needs to send an output to the
user, the standard data is converted into voice either through synthesizing voice files
or through TTS (Text To Speech). In a cheque-printing software we print the amount
in both words and figure. For example an amount of 'Rs. 320,145.00' will be printed
on a cheque as 'Rupees three lacs twenty thousand one hundred forty-five only'.
Within the cheque-printing application, one function converted the numeric number
320145 into text. Likewise in the case of IVR application, we assemble a series of
prerecorded voice prompts to generate the equivalent sound response. In this case
we assemble voice data 'three' 'lacs' 'twenty' 'thousand' 'one' 'hundred' 'forty' 'five'
'only' and then give the voice card to play. We can generate the same voice response
by giving the number 320,145 to the TTS interface to convert the text into speech and
play through the IVR. TTS is a interface software which takes text and numbers as
input and generates equivalent sounds at the run time. There are different TTS
available for different languages. In India there are companies who have Hindi TTS
software. Hindi TTS software takes Devanagari text stream as input and generates
the voice as if someone is reading the same text.
48
Vidhyaa Arts and Science College - Konganapuram
One of the most popular voice cards used for small office interface is
D/41JCT-LS from Dialogic. The D/41JCT-LS board is a four-port analog converged
communications voice, fax, and software-based speech recognition board. This
board is ideal for building enterprise unified messaging and interactive voice
response (IVR) applications. The D/41JCT-LS provides four telephone line interface
circuits for direct connection to analog loop start lines through RJ11 (the standard
telephone jack used in homes) interface. D/41JCT-LS possesses dual-processor
architecture, comprising a digital signal processor (DSP) and a general-purpose
microprocessor, which handles all telephony signaling and performs DTMF
(touchtone) and audio/voice signal processing tasks. A voice card also has some on-
board memory and with voice store-and-forward feature.
Voice Driver and API
Dialogic is now part of Intel and one of the leading vendors on voice-based
hardware. Many IVR vendors around the world use Dialogic cards from Intel in
their IVR systems. Voice driver in an IVR system is used to communicate and control
the voice hardware on the IVR system. A voice driver can make calls, answer calls,
identify caller id, play and record sound from the phone line, detect DTMF signals
(touch-tones) dialed by the caller. It can tear down a call, detect when the caller has
hung up. It also offers APIs to record the transaction details. Transaction information
is required for audit trail and for charging. Voice boards are treated as board
devices, channels within a board are treated as channel devices or board sub-
devices by the voice driver.
49
Vidhyaa Arts and Science College - Konganapuram
IVR Programming
There are different voice libraries provided by Dialogic to interface with the
voice driver. The voice libraries for single-threaded and multi-threaded applications
include:
• Configure devices
50
Vidhyaa Arts and Science College - Konganapuram
Dialogic function is completed, the operating system wakes up the function's thread
so that processing continues. This model enables the IVR system to assign distinct
applications to different channels dynamically in real time.
Voice APIs
To use the voice board, Dialogic provides different APIs. All Dialogic APIs are
prefixed with dx_; this helps to identify them easily. APIs are available for device
management, configuration function, input output functions, play and record
functions, tone detection functions, tone generation functions, call control functions
etc. Following are some of the important functions in Dialogic voice card, which are
used quite often to develop a mobile computing application.
- dx_open( ) - open a voice channel
- dx_close( ) - close a voice channel
- dx_wtcallid( ) - waits for rings and reports Caller ID
- dx_getdig( ) - get digits from channel digit buffer
- dx_play( ) - plays recorded voice data
- dx_jplayvox () - play a single vox file
- dx playwav() - play a single wave file
- dx_rec( ) - record voice data
- dx_recvox( ) - records voice data to a single vox file
- dx_recwav( ) - records voice data to a single wave file
- dx_dial( ) - dial an ASCII string of digits.
51
Vidhyaa Arts and Science College - Konganapuram
with DSP (Digital Signal Processing) and are capable of recognizing voice. The
output is synthesized voice through TTS (Text to Speech).
The Voice extensible Markup Language (VoiceXML) is an XML-based
markup language for creating distributed voice applications. VoiceXML is designed
for creating audio dialogs that feature synthesized speech, digitized audio,
recognition of spoken voice and DTMF key input. Using VoiceXML, we can create
Web-based voice applications that users can access through telephone. VoiceXML
supports dialogs that feature :
• Spoken input
• Scoping of input
Architectural Model
All of us are familiar with the web as it works today. We use a visual GUI web
browser which renders and interprets http requests to present information to the
user. When the user makes a selection the web browser sends an HTTP request to
the web server. The web server responds by locating the new page and returns the
page to the user. The content server may also have to interact with a back-end
infrastructure (database, servlets, etc.) to obtain and return the requested
information.
The Voice Browser extends this paradigm. A telephone and a Voice Server
have been added to the web environment. The Voice Server manages several Voice
53
Vidhyaa Arts and Science College - Konganapuram
Browser sessions. Each Voice Browser session includes one instance of the Voice
Browser, the speech recognition engine, and the text-to-speech engine.
• Menus - present the user with choices or options and then transition to
another dialog based on the choice.
Essential Elements of Voice XML Documents
The first line of any VoiceXML application must contain the <?xml> element.
The second line must contain the <vxml> element. And each VoiceXML <tag>, must
have an associated <Jtag>. The very last line of VoiceXML document must be the
</vxml> tag. So, a VoiceXML document looks like this:
<?xml version="l.0"?>
<vxml versions"1.0">
54
Vidhyaa Arts and Science College - Konganapuram
.
.
.
Interesting stuff goes here
.
.
.
</vxml>
In between the <vxml> and the </vxml> tags we put all the really interesting
stuff, the VoiceXML code that defines the dialog with the user.
Prompts
In a VoiceXML application, we present information to the user through audio
prompts. These prompts can either be prerecorded audio, or they can be synthesized
speech (TTS). We use the <prompt> element in VoiceXML to generate TTS. Any text
within the body of a <prompt> element is spoken.
<prompt>
Would you like coffee, tea, milk or nothing
</prompt>
Grammars
Each dialog has one or more speech and/or DTMF grammars associated with
it. In VoiceXML, we use the <grammar> element to define what the caller can say to
the application at any given time. There are three different types of grammars
supported in VoiceXML: Inline, External, Built-in
o Inline grammars are those that are defined right in the VoiceXML
code. For example
<grammar>
credit card | credit | tuition | tuition bill
</grammar>
55
Vidhyaa Arts and Science College - Konganapuram
Form is one of the ways of developing a dialog with the caller in VoiceXML.
Forms are central to VoiceXML. A VoiceXML form is a process to present
information and gather input from the caller. A form is, basically, a collection of one
or more fields that the caller fills in by saying something. A VoiceXML form is a very
similar concept to a paper or online form, except that in the case of VoiceXML, we
cannot see the field and instead of typing or writing in a field, we say something to
fill it in.
In VoiceXML, we define a form using the <form> element and fields within
the form using the <field> element. Here is a simple Voice Form.
</field>
<field>
56
Vidhyaa Arts and Science College - Konganapuram
57
Vidhyaa Arts and Science College - Konganapuram
58
Vidhyaa Arts and Science College - Konganapuram
• Use simple graphical interface to set up a conference call and then attend
the call at the scheduled time
• Attach voice greeting with an email. This will allow the receiver to listen
to this greeting while opening the email
• Set groups and security measures such that a service can receive phone
calls from certain numbers (but not from others)
• Same set of TAPI APIs are available in many smart phones. This facilitates
accessing telephony interfaces from a mobile phone along with from a
desktop computer
2.2. Emerging Technologies
2.2.1. Bluetooth
The concept behind Bluetooth wireless technology was unifying the telecom
and computing industries. Bluetooth technology allows users to make
ad hoc wireless connections between devices like mobile phones, desktop or
notebook computers without any cable. Devices carrying Bluetooth-enabled chips
59
Vidhyaa Arts and Science College - Konganapuram
can easily transfer data at a speed of about 720 Kbps within 50 meters (150 feet) of
range or beyond through walls, clothing and even luggage bags.
Bluetooth Protocol
The Bluetooth radio is built into a small microchip and operates in a globally
available frequency band ensuring interoperability worldwide. Bluetooth uses the
unlicensed 2.4 GHz ISM (Industrial Scientific and Medical) frequency band. There
are 79 available Bluetooth channels spaced 1 MHz apart from 2.402 GHz to 2.480
GHz. Bluetooth supports both unicast (point-to-point) and multicast (point-to-multi-
point) connections. Bluetooth protocol uses the concept of master and slave. In a
master-slave protocol a device cannot talk as and when they desire. They need to
wait till the time the master allows them to talk. The master and slaves together form
a piconet. Up to seven 'slave' devices can be set to communicate with a 'master'.
Several of these piconets can be linked together to form a larger network in an ad
hoc manner. The topology can be thought as a flexible, multiple piconet structure.
This network of piconets is called scatternet. A scatternet is formed when a device
from one piconet also acts as a member of another piconet. In this scheme, a device
being master in one piconet can simultaneously be a slave in the other one.
Bluetooth protocol is a combination of different protocols. The Bluetooth Core
protocols plus the Bluetooth radio protocols are required by most of Bluetooth
devices, while the rest of the protocols are used by different applications as needed
60
Vidhyaa Arts and Science College - Konganapuram
Bluetooth protocol stack can be divided into four basic layers according to
their functions. These are:
o Baseband The Baseband and Link Control layer enables the physical
RF link between Bluetooth units forming a piconet. All audio and data
packets can be provided with different levels of CRC
(Cyclic Redundancy Code) or FEC (Forward Error Correction) for
error detection/ correction.
o Link Manager Protocol (LMP) When two Bluetooth devices come
within
each other's radio range, link managers of either device discover each
other. LMP then engages itself in peer-to-peer message exchange.
These messages perform various security functions starting from
authentication to encryption.
61
Vidhyaa Arts and Science College - Konganapuram
• Cable Replacement Protocol this protocol stack has only one member viz.,
Radio Frequency Communication (RFCOMM).
62
Vidhyaa Arts and Science College - Konganapuram
• File Transfer The file transfer usage model offers the ability to transfer data
objects from one device (e.g., PC, smart-phone, or PDA) to another. Object
types include .xls, .ppt, .wav, .jpg,.doc files, folders or directories or
streaming media formats.
63
Vidhyaa Arts and Science College - Konganapuram
• Internet Bridge In this usage model, mobile phone or cordless modem acts
as modem to the PC, providing dial-up networking and fax capabilities
without need for physical connection to the PC.
• LAN Access In this usage model multiple data terminals use a LAN access
point (LAP) as a wireless connection to an Ethernet LAN. Once connected,
the terminals operate as if they were connected directly to the LAN.
• Headset The headset can be wirelessly connected for the purpose of acting
as a remote device's audio input and output interface. This is very
convenient for hands free cellular phone usage in automobiles.
64
Vidhyaa Arts and Science College - Konganapuram
RFID tags are categorized on three basic criteria. These are based on
frequency, application area and the power level.
65
Vidhyaa Arts and Science College - Konganapuram
• Security
• Animal tagging
• Store in an enterprise
• Retail store
• Community library
• Postal tracking
2.2.3. Mobile IP
A data connection between two end-points through TCP/IP network requires
a source IP address, source TCP port and a target IP address with a target TCP port.
TCP port number is application-specific and remains constant. IP address, on the
other hand, is network specific and varies from network to network. IP addresses
are assigned to a host from a set, of addresses assigned to a network. This structure
works well as long as the client is static and is using a desktop computer. Let us
assume that the user is mobile and is using a laptop with WiFi. As the user moves,
the point of attachment will change from one subnet to another subnet resulting in a
change of IP address. This will force the connection to terminate. The technology to
do so is 'Mobile IP'. The term 'mobile' in 'Mobile IP' signifies that, while a user is
connected to applications across the Internet and the user's point of attachment
changes dynamically, all connections are maintained despite the change in
66
Vidhyaa Arts and Science College - Konganapuram
Whenever the mobile node moves, it registers its new care-of address with its
home agent. The home agent forwards the packet to the foreign network using the
care-of address. The delivery requires that the packet header is modified so that the
care-of address becomes the destination IP address. This new header encapsulates
the original packet, causing the mobile node's home address to have no impact on
the encapsulated packet's routing. This phenomenon is called tunneling.
67
Vidhyaa Arts and Science College - Konganapuram
68
Vidhyaa Arts and Science College - Konganapuram
the foreign network. The foreign agent strips off the outer IP header, and
delivers the original datagram to A.
• The IP datagram from A to X travels directly across the network, using X's
IP address as the destination address.
To support the operations illustrated in the example above, mobile IP needs to
support three basic capabilities:
The Mobile IP discovery procedure has been built on top of an existing ICMP
router discovery and advertisement procedure as specified in RFC 1256. Using these
procedures a router can detect whether a new mobile node has entered into its
network. Also, using this procedure the mobile node determines whether it is in a
foreign network. For the purpose of discovery, a router or an agent periodically
issues a router advertisement ICMP message. The mobile node on receiving this
advertisement packet compares the network portion of the router IP address with
the network portion of its own IP address allocated by the home network. If these
network portions do not match, then the mobile node knows that it is in a foreign
network. A router advertisement can carry information about default routers and
information about one or more care-of addresses.
69
Vidhyaa Arts and Science College - Konganapuram
Registration
Once a mobile node obtained a care-of-address from the foreign network, the
same needs to be registered with the home agent. The mobile node sends a
registration request to the home agent with the care-of address information. When
the home agent receives this request, it updates its routing table and sends a
registration reply back to the mobile node.
The registration process involves the following four steps:
The mobile node requests for forwarding service from the foreign network
by sending a registration request to the foreign agent.
The foreign agent relays this registration request to the home agent of that
mobile node.
The home agent either accepts or rejects the request and sends a
registration reply to the foreign agent.
70
Vidhyaa Arts and Science College - Konganapuram
Cellular IP
71
Vidhyaa Arts and Science College - Konganapuram
forwarded to the wrong (old) address. Mobile IP fails to update the addressed
properly for high speed mobility. Cellular IP a new host mobility protocol has been
designed to address this issue.
In a Cellular IP, none of the nodes know the exact location of a mobile host.
Packets addressed to a mobile host are routed to its current base station on a hop-by-
hop basis where each node only needs to know on which of its outgoing ports to
forward packets. This limited routing information (referred as mapping) is local to
the node and does not assume that nodes have any knowledge of the wireless
network topology. Mappings are created and updated based on the packets
transmitted by mobile hosts.
Cellular IP uses two parallel structures of mappings through Paging Caches
(PC) and Routing Caches (RC). PCs maintain mappings for stationary and idle (not
in data communication state) hosts; whereas, RC maintains mappings for mobile
hosts. Mapping entries in PC have a large timeout interval, in the order of seconds
or minutes. RCs maintain mappings for mobile hosts currently receiving data or
expecting to receive data. For RC mappings, the timeout are in the packet time scale.
72
Vidhyaa Arts and Science College - Konganapuram
Idle mobile hosts periodically generate short control packets, called paging-
update packets. These are sent to the nearest available base station. The paging-
update packets travel in the access network from the base station toward the
gateway router, on a hop-by-hop basis. Handoff in Cellular IP is always initiated by
the mobile host. As the host approaches a new base station, it redirects its data
packets from the old to the new base station. First few redirected packets will
automatically configure a new path of RC mappings for the host to the new base
station. For a time equal to the timeout of RC mappings, packets addressed to the
mobile host will be delivered at both old and new base stations.
Address Space
IPv6 uses 128 bit addresses for each packet, creating a virtually infinite
number of IP addresses (approx. 3.4*10**38 IP addresses), as opposed to 3758096384
IPv4 addresses (2**31 A Class address + 2**30 B Class + 2**29 C Class address). This
73
Vidhyaa Arts and Science College - Konganapuram
also means that if we set the world population at 10 billion in 2050, there will be
3.4*10**27 addresses available per person.
In IPv6, there are global addresses and local addresses. Global addresses are
used for routing of global Internet. Link local addresses are available within a
subnet. IPv6 uses hierarchical addressing with three-level of addresses.
This includes a Public Topology (the 48 bit external routing prefix), a Site
Topology (typically a 16 bit subnet number), and an Interface Identifier (typically an
automatically generated 64 bit number unique on the local LAN segment).
IPv6 Security
One of the biggest differences between IPv6 and IPv4 is that all IPv6 nodes
are expected to implement strong authentication and encryption features to improve
Internet security. IPv6 comes native with a security protocol called IP Security
(IPSec). IPSec protocol is a standards-based method of providing privacy, integrity
and authenticity to information transferred across IP networks.
Each IPv6 packet payload is attached a tag which can be customized to enable
a better quality in the packet flow, or by a price of other class, such as non-real time
quality of service or 'real-time' service. Information is packetized into IPv6 packets,
with the corresponding levels of control.
The Migration from IPv4 to IPv6 is quite an involved task. This includes the
following:
• Migration of the computing nodes in the network: this will need the
operating system upgrades so that they support IPv6 along with IPv4.
Upgraded systems will have both IPv4 and IPv6 stacks. Therefore, both
the IPv4 and IPv6 applications can run without any difficulty.
key deployment strategies for both service providers as well as enterprises during
the period of IPv4 and IPv6 coexistence. Tunneling service providers can offer an
end-to-end IPv6 service without major upgrades to the infrastructure and without
impacting current IPv4 services.
76
Vidhyaa Arts and Science College - Konganapuram
UNIT - III
3.1. GSM
The proposed GSM system had to meet certain business objectives. These are:
• Spectral efficiency
• ISDN compatibility.
GSM uses a combination of FDMA (Frequency Division Multiple Access) and
TDMA (Time Division Multiple Access). The GSM system has an allocation of 50
MHz (890-915 MHz and 935-960 MHz) bandwidth in the 900 MHz frequency band.
77
Vidhyaa Arts and Science College - Konganapuram
Using FDMA, this band is divided into 124 (125 channels, 1 not used) channels each
with a carrier bandwidth of 200 KHz. Using TDMA, each of these channels is then
further divided into 8 time slots. Therefore, with the combination of FDMA and
TDMA we can realize a maximum of 992 channels for transmit and receive. In order
to be able to serve hundreds of thousands of users, the frequency must be reused.
This is done through cells. The essential characteristics of this reuse are as follows:
• Each cell / receives a subset of frequencies fbi from the total set assigned to
the respective mobile network. To avoid any type of co-channel interference,
two neighboring cells never use the same frequencies.
78
Vidhyaa Arts and Science College - Konganapuram
79
Vidhyaa Arts and Science College - Konganapuram
Cells are formed by the radio areas covered by a BTS (Base Transceiver
Station). Several BTSs are controlled by one BSC. Traffic from the MS (Mobile
Station) is routed through MSC. Calls originating from or terminating in a fixed
network or other mobile networks is handled by the GMSC (Gateway MSC). It’s an
architecture of a GSM PLMN from technology point of view, whereas the below
shows the same architecture from operational point of view.
80
Vidhyaa Arts and Science College - Konganapuram
• Storage of SMS Service Center (SC) number in case the mobile is not
connectable so that whenever the mobile is connectable, a paging signal is
sent to the SC
• Information related to auxiliary services like Voice mail, data, fax services
etc.
81
Vidhyaa Arts and Science College - Konganapuram
• The Mobile Station (MS). This includes the Mobile Equipment (ME) and the
Subscriber Identity Module (SIM).
• The Base Station Subsystem (BSS). This includes the Base Transceiver Station
(BTS) and the Base Station Controller (BSC).
• The Operation and Support Subsystem (OSS). This includes the Operation
and Maintenance Center (OMC).
Mobile Station
Mobile Station is the technical name of the mobile or the cellular phone. MS
consists of two main elements:
• The mobile equipment or the mobile device. In other words, this is the
phone without the SIM card.
The SIM is installed in every GSM phone and identifies the terminal. Without
the SIM card, the terminal is not operational. The SIM cards used in GSM phones are
smart processor cards. These cards posses a processor and a small memory. By
inserting the SIM card into the terminal, the user can have access to all the
subscribed services. The SIM card contains the International Mobile Subscriber
82
Vidhyaa Arts and Science College - Konganapuram
Identity (IMSI) used to identify the subscriber to the system, a secret key for
authentication, and other security information. Another advantage of the SIM card is
the mobility of the users. Typically SIM cards contain 32 K bytes of memory. Part of
the memory in the SIM card is available to the user for storing address book and
SMS messages. Applications are developed and stored in SIM cards using SAT (SIM
Application Toolkit).
• It acts like a normal switching node for mobile subscribers of the same
network (connection between mobile phone to mobile phone within the
same network).
• It acts like a normal switching node for the PSTN fixed telephone
(connection between mobile phone to fixed phone).
83
Vidhyaa Arts and Science College - Konganapuram
Equipment Identity Register (EIR) is a database that contains a list of all valid
mobile equipment within the network, where each mobile station is identified by its
International Mobile Equipment Identity (IMEI).
Message Centre
Short message or SMS is one of the most popular services within GSM. SMS is
a data service and allows a user to enter text message up to 160 characters in length
when 7-bit English characters are used. It is 140 octets when 8-bit characters (some
European alphabets or binary data) are used, and 70 characters in length when non-
Latin alphabets such as Arabic, Chinese or Hindi are used (70 characters of 16-bit
Unicode). SMS is a proactive bearer and is an always ON network. Message center is
also referred to as Service Centre (SC) or SMS Controller (SMSC). SMSC is a system
within the core GSM network, which works as the store and forward system for SMS
messages. There are two types of SMS,
84
Vidhyaa Arts and Science College - Konganapuram
compresses these 160 samples into 260-bits GSM frames resulting in one second of
speech compressed into 1625 bytes and achieving a rate of 13 Kbits/sec.
Channel coding
This step introduces redundancy information into the data for error
detection and possible error correction. The gross bit rate after channel coding is
22.8 kbps (or 456 bits every 20 ms). These 456 bits are divided into eight 57-bit
blocks, and the result is interleaved amongst eight successive time slot bursts for
protection against burst transmission errors.
Interleaving
This step rearranges a group of bits in a particular way. This is to improve
the performance of the error-correction mechanisms. The interleaving decreases the
possibility of losing whole bursts during the transmission, by dispersing the errors.
Ciphering
Encrypts blocks of user data using a symmetric key shared by the mobile
station and the BTS.
Burst formatting
Adds some binary information to the ciphered block. This additional
information is used synchronization and equalization of the received data.
Modulation
The modulation technique chosen for the GSM system is the Gaussian
Minimum Shift Keying (GMSK). Using this technique the binary data is converted
back into analog signal to fit the frequency and time requirements for the multiple
access rules. This signal is then radiated as radio wave over the air. Each time slot
burst is 156.25 bits and contains two 57-bit blocks, and a 26-bit training sequence
used for equalization (Fig 5.9). A burst is transmitted in 0.577 ms for a total bit rate
of 270.8 kbps.
At the GSM frequency bands, radio waves reflect from buildings, cars, hills,
etc. So not only the 'right' signal (the output signal of the emitter) is received by an
86
Vidhyaa Arts and Science College - Konganapuram
antenna, but also many reflected signals, which corrupt the information, with
different phases are received. An equalizer is in charge of extracting the 'right' signal
from the received signal. It estimates the channel impulse response of the GSM
system and then constructs an inverse filter. In order to extract the 'right' signal, the
received signal is passed through the inverse filter.
Synchronization
87
Vidhyaa Arts and Science College - Konganapuram
• Local Mobile Subscriber Identity (LMSI): This is assigned by the VLR and
also stored in the HLR. This is used as a searching key for faster database
access within the VLR.
• Cell Identifier: Within a LA, every cell has a unique Cell Identifier (CI).
Together with a LAI a cell can be identified uniquely through Global Cell
Identity (LAI+CI).
Transmission of voice and data over the radio link is only a part of the
function of a cellular mobile network. A GSM mobile can seamlessly roam nationally
and internationally. This requires that registration, authentication, call routing and
location updating functions are standardized across GSM networks. The
geographical area covered a network is divided into cells of small radius. When a
call is in progress and the user is on the move, there will be a handover mechanism
from one cell to another. These functions are performed by the Network Subsystem,
89
Vidhyaa Arts and Science College - Konganapuram
mainly using the Mobile Application Part (MAP) built on top of the Signaling
System # 7 (SS7) protocol.
90
Vidhyaa Arts and Science College - Konganapuram
channel or cell. This procedure of changing the resources is called handover. This
procedure is called 'handoff in North America. There are four different types of
handover in the GSM system, which involve transferring a call between:
• Cells (Base Transceiver Stations) under the control of the same Base Station
Controller (BSC),
• Cells under the control of different BSCs, but belonging to the same Mobile
services Switching Center (MSC)
Mobility Management
The Mobility Management (MM) function handles the functions that arise
from the mobility of the subscriber. MM is in charge of all the aspects related to the
mobility of the user, especially the roaming, the location management, and the
security/authentication of the subscriber. Location management is concerned with
the procedures that enable the system to know the current location of a powered-on
mobile station so that the incoming call routing can be completed.
When a mobile station is switched on in a new location area (for example,
the user is roaming and has disembarked from an aircraft in a new city) or the
subscriber moves to a new location area or a different operator's PLMN, the
subscriber must register with the new network to indicate its current location. The
first location update procedure is called the IMSI attach procedure where the MS
indicates its IMSI to the network. When a mobile station is powered off, it performs
an IMSI detach procedure in order to tell the network that it is no longer connected.
Normally, a location update message is sent to the new MSC/VLR, which records
the location area information, and then sends the location information to the
subscriber's HLR. If the mobile station is authenticated and authorized in the new
91
Vidhyaa Arts and Science College - Konganapuram
MSC/VLR, the subscriber's HLR cancels the registration of the mobile station with
the old MSC/VLR A location updating is also performed periodically. If after the
updating time period, the mobile station has not registered, it is then deregistered.
Unlike routing in the fixed network, where a terminal is semi-permanently
wired to a central office, a GSM user can roam nationally and even internationally.
When there is an incoming call for a subscriber, the mobile phone needs to be
located, a channel needs to be allocated and the call connected. A powered-on
mobile is informed of an incoming call by a paging message sent over the paging
channel of the cells within the current location area. The location updating
procedures, and subsequent call routing, use the MSC and both HLR and the VLR.
The information sent to the HLR is normally the SS7 address of the new VLR. If the
subscriber is entitled to service, the HLR sends a subset of the subscriber
information needed for call control to the new MSC/VLR, and sends a message to
the old MSC/VLR to cancel the old registration.
The most general routing procedure begins with the GMSC querying the
called subscriber's HLR for an MSRN. The HLR typically stores only the SS7 address
of the subscriber's current VLR. The VLR temporarily allocates an MSRN from its
pool for the call. This MSRN is returned to the HLR and back to the GMSC, which
can then route the call to the new MSC. At the new MSC, the IMSI corresponding to
the MSRN is looked up, and the mobile is paged in its current location area. As a
92
Vidhyaa Arts and Science College - Konganapuram
rule of thumb, HLR is referred for incoming call; whereas VLR is referred for
outgoing call.
3.2. SMS
Strengths of SMS
93
Vidhyaa Arts and Science College - Konganapuram
For a SMMT message, the message is sent from SC to the MS. This whole
process is done in one transaction. For the delivery of MT or incoming SMS
messages, the SC of the serving network is never used. This implies that a SMS
message can be sent from any SC in any network to a GSM phone anywhere in the
world. This makes any SM MT message mobile operator independent.
95
Vidhyaa Arts and Science College - Konganapuram
96
Vidhyaa Arts and Science College - Konganapuram
97
Vidhyaa Arts and Science College - Konganapuram
We have seen that it is possible to send a SMS to any phone in any network.
For example, a MT message can be delivered from a network in India to a MS of UK
roaming in Germany. Which in other words means that any push, which may be an
alert, notification or even response from a pull message generated by an application,
can be serviced by any network and delivered to any GSM phone in any network
without any difficulty.
Assuming that appropriate roaming tie-ups are in place, an enterprise can use
SMS to send business alerts or proactive notifications to its customer anywhere,
anytime on any GSM phone. With roaming tie-ups, operators reach an agreement on
revenue share and call forwarding mechanism. Roaming tie-ups are a commercial
issue rather than technical. Some credit card companies in India send SMS
notifications to its cardholders in different networks using operator independent
push.
As the SME is always connected to the home network's SC, with the
conventional framework, it is not possible to route mobile originated SMS messages
to any application or any SME of choice. There are ways by which a SMS message
can be routed to some enterprise SME connected to external SC. This is achieved
through SAT, where the SAT application running on the SIM card changes the SC
number during the transmission of the SMS and forces the SMS to recognize a
different SC of a different network as its home SC. In this case also, technically the
SMS is sent to the SME connected to the home SC. SMS has always been considered
a revenue generating tool for cellular operators. Therefore, the current framework
suits a cellular operator very well. If a SMS service is operator dependent, the
cellular operator can use this to its advantage. In today's global scenario an
enterprise or a MVNO has its customers around the world subscribing to different
GSM networks. To make this possible, enterprises need operator-independent pull
as well. Operator-independent pull services can be achieved using GSM modem
98
Vidhyaa Arts and Science College - Konganapuram
technology described in the following sections. Also, the same can be done using
Intelligent Network Technologies.
Value Added Services (VAS) can be defined as services, which share one or
more of the following characteristics:
• Supplementary service (not a part of basic service) but adds value to total
service offering.
the response into multiple message responses. It is advised that while the message is
broken into multiple messages, it is broken at the word boundary. It is also advised
that a sequence number like ... 1/3, . . . 2/3, and ... 3/3 is added in the first, second and
third messages respectively.
VAS Examples
In a service like News or Stock Quote, we get the latest news or stock
information. This will be a Short transaction. The keyword for news will be News,
whereas the keyword for stock quote can be BSE.
These are proactive alert services. For a stock quote the alert services can be of
the following kind.
Time-based: In this service, proactive alerts are sent to the mobile phone at a
pre-assigned time of the day.
Watermark based: In this service whenever the stock price goes up or falls
down to a certain level, alerts are sent. This information will help the
subscriber to decide whether to buy or sell some particular stock.
Location-based software
Location-based services could be road direction, restaurant guide etc. Some
location-aware VAS services provide shopping alerts as well. In location-based
services only the information relevant to the current location of the mobile phone (or
the subscriber) is provided. Device-specific location awareness requires either of the
following technologies:
100
Vidhyaa Arts and Science College - Konganapuram
101
Vidhyaa Arts and Science College - Konganapuram
UNIT - IV
4.1. GPRS
GPRS will thrive in both vertical and horizontal markets where high-speed
data transmission over wireless networks is necessary. The deployment of GPRS
networks will allow a variety of new applications ranging from mobile e-commerce
to mobile corporate VPN access.
Capacity and Other End-user Aspects
GPRS has the ability to offer data speeds of 14.4 KBps to 171.2 KBps, which
allow for comfortable Internet access. It allows for short 'bursty' traffic, such as e-
mail and web browsing, as well as large volumes of data. To support GPRS
operations, new protocols and new network devices are required. For GPRS, no dial-
up modem connection is necessary. It offers fast connection set-up mechanism to
offer a perception of being 'always on'. This is why GPRS users are sometimes
referred to as being 'always connected'.
Quality of Service (QoS)
GPRS allows definition of QoS profiles using the parameters of service
precedence, reliability, delay and throughput.
• Delay parameters define maximum values for the mean delay and the 95-
percentile delay. The delay is defined as the end-to-end transfer time
between two communicating mobile stations or between a mobile station
and the signaling interface to an external packet data network.
102
Vidhyaa Arts and Science College - Konganapuram
• Throughput specifies the maximum/peak bit rate and the mean bit rate.
Integral Part of the Future 3G Systems
GPRS is introduced as an intermediate step to efficiency transport high-speed
data over the current GSM and TDMA-based wireless network infrastructures.
GPRS is therefore called the 2.5G (two and half G or two and half generation) in the
evolution process of wireless cellular networks.
103
Vidhyaa Arts and Science College - Konganapuram
Serving GPRS Support Node (SGSN): A serving GPRS support node (SGSN)
is at the same hierarchical level as the MSC. Whatever MSC does for voice,
SGSN does the same functions for packet data. SGSN's tasks include packet
switching, routing and transfer, mobility management (attach/detach and
location management), logical link management, and authentication and
charging functions. SGSN processes registration of new mobile subscribers
and keeps a record of their location inside a given service area. The location
register of the SGSN stores location information (e.g., current cell, current
VLR) and user profiles of all GPRS users registered with this SGSN. SGSN
sends queries to Home Location Register (HLR) to obtain profile data of
GPRS subscribers. The SGSN is connected to the base station system with
Frame Relay.
Gateway GPRS Support Node (GGSN): A gateway GPRS support node
(GGSN) acts as an interface between the GPRS backbone network and the
external packet data networks. GGSN's function is similar to that of a router
in a LAN. GGSN maintains routing information that is necessary to tunnel the
Protocol Data Units (PDUs) to the SGSNs that service particular mobile
stations. It converts the GPRS packets coming from the SGSN into the
appropriate packet data protocol (PDP) format for the data networks like
Internet or X.25. PDP sends these packets out on the corresponding packet
data network. In the other direction, PDP receives incoming data packets
from data networks and converts them to the GSM address of the destination
user. The readdressed packets are sent to the responsible SGSN. For this
purpose, the GGSN stores the current SGSN address of the user and his or her
profile in its location register. The GGSN also performs authentication and
charging functions related to data transfer.
104
Vidhyaa Arts and Science College - Konganapuram
105
Vidhyaa Arts and Science College - Konganapuram
Signaling Plane
The protocol architecture of the signaling plane comprises
protocols for control and support of the functions of the transmission plane.
This includes GPRS attach and detach, PDP context activation, control of
routing paths, and allocation of network resources. The signaling architecture
between SGSN and the registers like HLR, VLR, and EIR uses the same
protocols as GSM. However, they are extended to support GPRS-specific
functionality. Between SGSN and HLR as well as between SGSN and EIR, an
enhanced MAP (Mobile Application Part) is employed. MAP is a mobile
network-specific extension of the Signaling System SS#7 used in GSM. It
transports the signaling information related to location updates, routing
information, user profiles, and handovers. The exchange of MAP messages is
accomplished over the transaction capabilities application part (TCAP) and
the signaling connection control part (SCCP). The base station system
106
Vidhyaa Arts and Science College - Konganapuram
108
Vidhyaa Arts and Science College - Konganapuram
111
Vidhyaa Arts and Science College - Konganapuram
support simultaneous attaches, activation, and monitor but not simultaneous traffic.
As with Class A, the GPRS virtual circuits will not be closed down when circuit-
switched traffic is present. Instead, they will be switched to busy or held mode.
Thus, users can make or receive calls on either a packet or a switched call type
sequentially but not simultaneously. SMS is supported in Class A terminal. Like
GSM, a SMS can be received while a voice or data call is in progress.
A Class C terminal supports only non simultaneous attach. The user must
select which service to connect to. Therefore, a Class C terminal can make or receive
calls from only the manually selected network service. The service that is not
selected is not reachable. The GPRS specifications state that support of SMS is
optional for Class C terminals.
Device Types
In addition to the three types of terminals, each handset will have a unique
form factor. Terminals will be available in the standard form factor with a numeric
keypad and a relatively small display. Other types of phones with different form
factors, color displays, with cameras are common. Smart phones with built-in voice,
non-voice and Web-browsing capabilities are common too. Smart phones have
various form factors, which may include a keyboard or an icon drive screen.
Bearers in GPRS
The bearer services of GPRS offer end-to-end packet switched data transfer.
GPRS is planned to support two different kinds of data transport services. These are
the point-to-point (FTP) service and the point-to-multipoint (PTM) service. Out of
these two, FTP is available now; PTM will be available in future releases of GPRS.
The PTP service offers transfer of data packets between two users. GPRS will
support the following types of data services:
SMS: Short message service was originally designed for GSM network. GPRS
will continue to support SMS as a bearer. Please refer to chapter 6 for details
on SMS and application development using SMS.
112
Vidhyaa Arts and Science College - Konganapuram
113
Vidhyaa Arts and Science College - Konganapuram
Billing
GPRS is essentially a packet switching overlay on a circuit switching network.
The GPRS specifications stipulate that the minimum charging information that must
be collected are:
114
Vidhyaa Arts and Science College - Konganapuram
4.2. WAP
joined hands to launch the WAP Forum (www.wapforum.com). WAP Forum is now
known as Open Mobile Alliance. The goal of this effort was to produce a refined,
license-free protocol, which is independent of the underlying airlink standard. The
WAP inherited its main characteristics and functionality from HDML and HDTP
developed by Unwired Planet, the Smart Messaging specification based on TTML
and NBS developed by Nokia, and the ITTP specification developed by Ericsson.
The first release of the WAP 1.0 specifications was released in the spring of 1998.
• Dating: This is an interactive dating system that exploits data bearer rather
than the SMS bearer.
• Games: Online games, cartoons can be better suited for GPRS network.
116
Vidhyaa Arts and Science College - Konganapuram
updates, movie and music clips. As these services take off, it is crucial to take into
account Digital Rights Management (DRM) for the distribution and consumption of
mobile content. With DRM, the content owner or service provider can determine if
and how his content can be distributed if at all from person to person. Of course,
some content will be available even without DRM. All the content created by mobile
users themselves such as capturing and sending of photo and video clips, or
advertising content like sponsored movie trailers that promote new films in the
cinema, will be free. Companies involved in mobile content services such as ring
tones, wallpapers, or games where the business plan is based on being able to collect
the rightful payment, will be interested in implementing DRM technology.
OMA Digital Rights Management
OMA has proposed Digital Rights Management and OMA Download
standards. By implementing OMA DRM, service providers can allow end users to
preview content before making a purchase decision. OMA DRM also allows end
users to distribute content to other users via super distribution. The OMA DRM
standard will govern the use of mobile-centric content types. The first DRM
standard, OMA DRM version 1.0, was officially approved in October 2002. The
standard provides three DRM methods as following:
• Combined Delivery enables usage rules to be set for the media object. This
method extends Forward-lock by adding a rights object to the DRM
Message. Rights define how the device is allowed to render the content and
can be limited using both time and count constraints. This method allows
previews.
117
Vidhyaa Arts and Science College - Konganapuram
118
Vidhyaa Arts and Science College - Konganapuram
UNIT - V
5.1.1. Introduction
119
Vidhyaa Arts and Science College - Konganapuram
120
Vidhyaa Arts and Science College - Konganapuram
There are quite a few types of wireless LANs. However, IEEE 802.11 is
gaining fast momentum in India and other parts of the world. When we refer to
802.11, we generally mean the generic 802.11 families of standards. There are many
standards within this family with almost all the letters of the English alphabet
starting from 'a' to 'x'. Different standards cover different aspects like bandwidths,
modulation techniques, physical media, security etc.
Standard Description Status
IEEE 802.11 Standard for WLAN operations at data Approved in July 1997.
rates up to 2 Mbps in the 2.4-GHz ISM
(Industrial, Scientific and Medical) band.
IEEE 802.11a Standard for WLAN operations at data Approved in Sept 1999.
rates up to 54 Mbps in the 5-GHz End-user products began
Unlicensed National Information shipping in early 2002.
Infrastructure (UNII) band.
IEEE 802.11b Standard for WLAN operations at data Approved in Sept 1999.
rates up to 11 Mbps in the 2.4-GHz ISM End- user products began
(Industrial, Scientific and Medical) band. shipping in early 2000.
121
Vidhyaa Arts and Science College - Konganapuram
Upcoming Description
Standard
IEEE 802.lie Enhance the 802.11 Medium Access Control improve and
managed (MAC) to Quality of Service, provide classes of
service, and enhanced security and authentication
mechanisms. These enhancements should provide the quality
required for services such as IP telephony and video
streaming.
IEEE 802.1 If Develop recommended practices for an Inter-Access Point
Protocol (LAPP),which provides the necessary capabilities to
achieve multi-vendor Access Point interoperability across a
Distribution System supporting IEEE P802.11 Wireless LAN
Links.
IEEE 802. llh Enhance the 802.11 Medium Access Control (MAC) standard
and 802.11a High Speed Physical Layer (PHY) in the 5GHz
band. Objective is to make IEEE 802.1 lah products compliant
with European regulatory requirements.
IEEE 802.111 Enhance the 802.11 Medium Access Control (MAC) to enhance
security and authentication mechanisms.
IEEE 802.15 Developing Recommended Practices to facilitate coexistence
TG2 of Wireless Personal Area Networks™ (802.15) and Wireless
Local Area Networks (802.11).
IEEE 802.15 Draft and publish a new standard for high-rate (20Mbit/s or
TG3 greater) WPANs™ .
IEEE 802.15 Investigate a low data rate WPAN solution with multi- month
TG4 to multi – year battery life and very low complexity.
122
Vidhyaa Arts and Science College - Konganapuram
Network layer: The network layer for CDMA asynchronous data and fax
services is based on IP. The standard IP protocol has been enhanced for IS-95.
123
Vidhyaa Arts and Science College - Konganapuram
layer. In the reverse operation, it receives network layer data grams with
compressed header from the PPP layer and passes it to the network layer.
Data Link layer: This layer uses PPP. The PPP Link Control Protocol (LCP) is
used for initial link establishment and for the negotiation of optional link
capabilities.
Radio Link Protocol Layer: This layer provides octet stream service over the
air. This service is responsible for reducing the error rate over the forward
and reverse channels. There is no direct relationship between PPP packet and
the traffic channel frame. A large packet may span multiple traffic channel
frame. A single traffic channel frame may contain multiple PPP packets. RLP
frames may be transported as traffic or signaling via data burst message.
SMS in IS-95 is similar to SMS in GSM. Unlike GSM, the maximum size of a
SMS in IS-95 is 120 octets. The SMS in IS-95 work the same way as in GSM. It
supports SMPP protocol and other features as in GSM. Like in GSM, the SMS in IS-
95 uses the signaling channel for data transfer. SMS administration features include
storage, profiling, verification of receipt and status enquiry capabilities.
124
Vidhyaa Arts and Science College - Konganapuram
5.2.1. Introduction
Wireless Local Area Network (LAN) is a local area data network without
wires. Wireless LAN is also known as WLAN in short. Mobile users can access
information and network resources through wireless LAN as they attend meetings,
collaborate with other users, or move to other locations in the premises. Wireless
LAN is not a replacement for the wired infrastructure. It is implemented as an
extension to a wired LAN within a building or campus.
• Low Implementation Costs: WLANs are easy to set up, relocate, change and
manage. Networks that frequently change, both physically and logically, can
benefit from WLAN's ease of implementation. WLANs can operate in
locations where installation of wiring may be impractical.
125
Vidhyaa Arts and Science College - Konganapuram
• Higher User to Install Base Ratio: Wireless environment offers a higher user
to capacity ratio. For example in a wired network like telephone, physical
wire needs to be laid for each and every subscriber. Whereas, for a cellular
network the ratio between subscribers and available channel is from 10 to 25
or even more. This means that if there is capacity for 100 channels, the
network operator can safely have 2500 subscribers. Likewise in a wireless
LAN, the network can offer a very high level of return on investment.
126
Vidhyaa Arts and Science College - Konganapuram
In a university campus, a student can move from the library to the cafeteria
and continue working. In a hotel, a guest can move to the pool and work. In a
hospital, a doctor can carry the patient information with him while on a
regular round.
Factory Shop Floor -This includes environments like factory shop floor,
warehouse, exhibition sites, retail shops, labs etc. These are very dynamic
environments, where floor layouts change very frequently; objects within the
building are constantly moving. Laying cables and setting up a wired LAN in
these kinds of facilities are almost impossible. Wireless LAN can be very
useful in such situations.
Homes - In homes WLAN can be used for convergence applications. These will
include networking of different home devices like phones, computers and
appliances.
Heritage Buildings - There are many building of national heritage, where a data
network needs to be set up. In a very old church for example, if we need to
setup a virtual reality show, it is difficult to install a wired LAN. Wireless
LAN can solve the problem.
Public Places - This includes airports, railway stations or places where many
people assemble and need to access information.
War/Defense Sites - When there is a war or war game, access to networks help.
There is some major research going on in US on mobile ad hoc networks for
defense establishments.
128
Vidhyaa Arts and Science College - Konganapuram
129
Vidhyaa Arts and Science College - Konganapuram
corporate access, and a VLAN for special access (such as VoIP). All these VLANs
must be configured each time you add a new AP.
With a “Centralized” WLAN architecture, it is infinitely easier to add Aps
when we send traffic to controller with Tunnel mode. The access layer is configured
once at the handoff to the controller and the system manages the rest. The
centralized controller provides rich functionality for automating deployment
complexity, eliminating the need for frequent, error-prone changes to the access
layer. You simply plug in the AP and it automatically self-configures.
Still if we required some AP to be configured for (bridge mode) sending
traffic locally in “Centralized” WLAN architecture, those AP’s it is necessary to
configure all virtual LANs (VLANs) on the switch port that is needed.
130
Vidhyaa Arts and Science College - Konganapuram
devices within the home. SWAP uses frequency hopping spread spectrum
modulation and offers 1 Mbps and 2 Mbps at 2. 4 GHz frequency band.
Bluetooth - Bluetooth was promoted by big industry leaders like IBM,
Ericsson, Intel, Lucent, 3Com, Microsoft, Nokia, Motorola, and Toshiba. It was
named after Harold Bluetooth, King of Denmark during 952 t o 995 A.D., who
had a vision of a world with cooperation and interoperability. Bluetooth is
more of a wireless Personal Area Network (PAN) operating at 2. 4 GHz band
and offers 1Mbps data rate. Bluetooth uses frequency hopping spread-
spectrum modulation with relatively low power and smaller range (about 10
meters).
When a station wants to access an existing BSS (either after power-up, sleep
mode, or physically entering into the BSS area), the station needs to get
synchronization information from the AP (or from the other stations when in ad hoc
mode).
The station can get this information by one of two means:
• Passive Scanning - In this case the station just waits to receive a Beacon Frame
from the AP, or
• Active Scanning - In this case the station tries to locate an Access Point by
transmitting Probe Request Frames, and waits for Probe Response from the AP.
The Authentication Process
Once a wireless station has located an AP and decides to join its BSS, it goes
through the authentication process. This is interchange of authentication information
between the AP and the station, where the WLAN device proves its identity.
131
Vidhyaa Arts and Science College - Konganapuram
Roaming
Roaming is the process of moving from one cell (or BSS) to another without
losing connection. This function is similar to the cellular phones' handover, with two
main differences:
On a packet-based LAN system, the transition from cell to cell may be per-
formed between packet transmissions, as opposed to telephony where the
transition may occur during a phone conversation.
On a voice system, a temporary disconnection during handoff does not affect
the conversation. However, in a packet-based environment it significantly
reduces performance because retransmission is performed by the upper layer
protocols.
The 802.11 standard does not define how roaming should be performed, but
defines the basic tools. These include active/passive scanning, and a re-association
process, where a station that is roaming from one AP to another becomes associated
with the new AP. The Inter-Access Point Protocol (LAPP) specification addresses a
common roaming protocol enabling wireless stations to move across multivendor
access points. IAPP is the scope of IEEE standard 802.1 If.
IAPP defines two basic protocols, viz., Announce protocol and Handover
protocol. The announce protocol provides coordination information between access
points. This information relates to network wide configuration information about
active APs. The handover protocol allows APs to coordinate with each other and
determine the status of a station. When a station associates with a different AP, the
old AP forwards buffered frames for the station to the new AP. The new AP updates
132
Vidhyaa Arts and Science College - Konganapuram
the necessary tables in the MAC layer to ensure that the MAC level filtering will
forward frames appropriately. This type of roaming is called horizontal roaming.
133
Vidhyaa Arts and Science College - Konganapuram
According to the 802.11 standard, a mobile station has to use the SSID of the
access point for association between the NIC (Network Interface Card) in the client
and the AP. The SSID is a network name (Id of the BSS or Cell) that identifies the
area covered by an AP. The AP periodically broadcasts its SSID as a part of the
management frame (beacon packet). The broadcast of beacon packet is necessary for
clock synchronization. Unfortunately, as management frames of 802.11 are always
sent in the clear, an attacker can easily listen on the wireless media for the
management frames and discover the SSID to connect to the AP. The SSID can be
used as a security measure by configuring the AP to broadcast the beacon packet
without its SSID. The wireless station wishing to associate with the AP must have its
SSID configured to that of the AP. If the SSID is not known, management frames sent
to the AP from the wireless station will be rejected. It is also advised that the SSID of
the AP is changed from the factory set defaults to some name, which is difficult to
guess.
MAC Address Access Control
Many access points support MAC address filtering. This is similar to IP
Filtering. The AP manages a list of MAC addresses that are allowed or disallowed in
the wireless network. The idea is that the MAC address of the network card is
unique and static. By controlling the access from known addresses, the administrator
can allow or restrict the access of network only to known clients.
134
Vidhyaa Arts and Science College - Konganapuram
Authentication Modes
135
Vidhyaa Arts and Science College - Konganapuram
It is assumed that the secret key has been distributed to both the transmitting
and receiving stations by some secure means.
On the transmitting station, the 40-bit secret key is concatenated with a 24-bit
Initialization Vector (IV) to produce a seed for input into the WEP PRNG
(Pseudo Random Number Generator).
The seed is passed into the PRNG to produce a stream (key stream) of pseudo
random octets.
The plaintext PDU is then XORed with the pseudo-random key stream to
produce the cipher text PDU.
This cipher text PDU is then concatenated with the 24-bits IV and transmitted
on the wireless media.
The receiving station reads the IV and concatenates it with the secret key,
producing the seed that it passes to the PRNG.
The receiver's PRNG produces identical key stream used by the transmitting
station. When this PRNG is XORed with the cipher text, the original plaintext
PDU is produced.
It is worth mentioning that the plaintext PDU is also protected with a CRC to
prevent random tampering with the cipher text in transit.
136
Vidhyaa Arts and Science College - Konganapuram
Possible Attacks
The possible security attacks on wireless LAN are:
• Active attack to inject new traffic from unauthorized mobile stations, based
on known plaintext.
• The authentication server Resides on the server authenticating the client (e.g.,
RADIUS Kerberos, or other servers)
137
Vidhyaa Arts and Science College - Konganapuram
The authenticator creates one logical port per client, based on the client's
association ID. This logical port has two data paths. The uncontrolled data path
allows network traffic through to the network. The controlled data path requires
successful authentication to allow network traffic through. In order to obtain
network connectivity, a wireless client must associate with the AP. Complete
association with an AP involves three states:
Unauthenticated and unassociated
Authenticated and unassociated
Authenticated and associated
IEEE 802.lx offers flexibility in authentication and possible encryption. After
the link has been established, PPP (Point-to-Point Protocol) provides for an optional
authentication phase before proceeding to the network layer protocol phase. This is
called EAP (Extensible Authentication Protocol). Through the use of EAP, support
for a number of authentication schemes may be added, including Smart cards,
138
Vidhyaa Arts and Science College - Konganapuram
There are still some vulnerabilities in the EAP. To overcome this, a new
standard is being proposed in IETF to override the EAP proposal. This new standard
is called PEAP (Protected EAP). PEAP uses an additional phase of security over and
above EAP.
Wireless VPN
139
Vidhyaa Arts and Science College - Konganapuram
5.3.1. OFDM
Orthogonal Frequency Division Multiplexing or OFDM is a modulation
format that is being used for many of the latest wireless and telecommunications
standards.
OFDM has been adopted in the Wi-Fi arena where the standards like 802.11a,
802.11n, 802.11ac and more. It has also been chosen for the cellular
telecommunications standard LTE / LTE-A, and in addition to this it has been
adopted by other standards such as WiMAX and many more.
Orthogonal frequency division multiplexing has also been adopted for a
number of broadcast standards from DAB Digital Radio to the Digital Video
Broadcast standards, DVB. It has also been adopted for other broadcast systems as
well including Digital Radio Mondiale used for the long medium and short wave
bands.
Although OFDM, orthogonal frequency division multiplexing is more
complicated than earlier forms of signal format, it provides some distinct advantages
in terms of data transmission, especially where high data rates are needed along
with relatively wide bandwidths.
What is OFDM?
140
Vidhyaa Arts and Science College - Konganapuram
OFDM
DM is a form of multicarrier modulation. An OFDM signal consists of a
number of closely spaced modulated carriers. When modulation of any form - voice,
data, etc. is applied to a carrier, then sidebands spread out either side. It is necessary
for a receiverr to be able to receive the whole signal to be able to successfully
demodulate the data. As a result when signals are transmitted close to one another
they must be spaced so that the receiver can separate them using a filter and there
must be a guard band between them. This is not the case with OFDM. Although the
sidebands from each carrier overlap, they can still be received without the
interference that might be expected because they are orthogonal to each another.
This is achieved by having the carrier spacing
spacing equal to the reciprocal of the symbol
period.
To see how OFDM works, it is necessary to look at the receiver. This acts as a
bank of demodulators, translating each carrier down to DC. The resulting signal is
integrated over the symbol period to regenerate the data from that carrier. The same
demodulator also demodulates the other carriers. As the carrier spacing equal to the
reciprocal of the symbol period means that they will have a whole number of cycles
in the symbol period and their contribution
contribut will sum to zero - in other words there is
no interference contribution.
141
Vidhyaa Arts and Science College - Konganapuram
One requirement of the OFDM transmitting and receiving systems is that they
must be linear. Any non-linearity will cause interference between the carriers as a
result of inter-modulation distortion. This will introduce unwanted signals that
would cause interference and impair the orthogonality of the transmission.
In terms of the equipment to be used the high peak to average ratio of multi-
carrier systems such as OFDM requires the RF final amplifier on the output of the
transmitter to be able to handle the peaks whilst the average power is much lower
and this leads to inefficiency. In some systems the peaks are limited. Although this
introduces distortion that results in a higher level of data errors, the system can rely
on the error correction to remove them.
Data on OFDM
The data to be transmitted on an OFDM signal is spread across the carriers of
the signal, each carrier taking part of the payload. This reduces the data rate taken by
each carrier. The lower data rate has the advantage that interference from reflections
is much less critical. This is achieved by adding a guard band time or guard interval
into the system. This ensures that the data is only sampled when the signal is stable
and no new delayed signals arrive that would alter the timing and phase of the
signal.
The distribution of the data across a large number of carriers in the OFDM
signal has some further advantages. Nulls caused by multi-path effects or
interference on a given frequency only affect a small number of the carriers, the
remaining ones being received correctly. By using error-coding techniques, which
142
Vidhyaa Arts and Science College - Konganapuram
does mean adding further data to the transmitted signal, it enables many or all of the
corrupted data to be reconstructed within the receiver. This can be done because the
error correction code is transmitted in a different part of the signal.
OFDM advantages
OFDM has been used in many high data rate wireless systems because of the
many advantages it provides.
Immunity to selective fading: One of the main advantages of OFDM is that
is more resistant to frequency selective fading than single carrier systems
because it divides the overall channel into multiple narrowband signals that
are affected individually as flat fading sub-channels.
Resilience to interference: Interference appearing on a channel may be
bandwidth limited and in this way will not affect all the sub-channels. This
means that not all the data is lost.
Spectrum efficiency: Using close-spaced overlapping sub-carriers, a
significant OFDM advantage is that it makes efficient use of the available
spectrum.
Resilient to ISI: Another advantage of OFDM is that it is very resilient to
inter-symbol and inter-frame interference. This results from the low data rate
on each of the sub-channels.
Resilient to narrow-band effects: Using adequate channel coding and
interleaving it is possible to recover symbols lost due to the frequency
selectivity of the channel and narrow band interference. Not all the data is
lost.
Simpler channel equalization: One of the issues with CDMA systems was
the complexity of the channel equalization which had to be applied across the
whole channel. An advantage of OFDM is that using multiple sub-channels,
the channel equalization becomes much simpler.
OFDM disadvantages
OFDM has been widely used, there are still a few disadvantages to its use
which need to be addressed when considering its use.
143
Vidhyaa Arts and Science College - Konganapuram
High peak to average power ratio: An OFDM signal has a noise like
amplitude variation and has a relatively high large dynamic range, or peak to
average power ratio. This impacts the RF amplifier efficiency as the amplifiers
need to be linear and accommodate the large amplitude variations and these
factors mean the amplifier cannot operate with a high efficiency level.
Sensitive to carrier offset and drift: Another disadvantage of OFDM is that
is sensitive to carrier frequency offset and drift. Single carrier systems are less
sensitive.
5.3.2. MPLS
Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology.
MPLS-enabled routers apply numerical labels to packets, and can make forwarding
decisions based on these labels. The MPLS architecture is detailed in RFC 3031.
MPLS reduces CPU-usage on routers, by allowing routers to make forwarding
decisions solely on the attached label, as opposed to parsing the full routing table.
Labels can based on a variety of parameters:
Destination IP network
Source IP address
QoS parameters
VPN destination
Outgoing interface
Layer-2 circuit
MPLS is not restricted to IP, or any specific Layer-2 technology, and thus is
essentially protocol-independent. Labels are applied to and removed from packets
on edge Label Switch Routers (edge LSRs). Only edge routers perform a route-table
lookup on packets. All core routers (identified simply as LSRs) in the MPLS network
forward solely based on the label. As a packet traverses the core MPLS network, core
routers will swap the label on hop-by-hop basis. MPLS is completely dependent on
Cisco Express Forwarding (CEF) to determine the next hop.
144
Vidhyaa Arts and Science College - Konganapuram
Cell Mode MPLS – used with ATM, and utilizes the VPI/VCI fields ATM
header as the label.
This guide will concentrate on Frame Mode MPLS. The32-bit label has the following
format:
146
Vidhyaa Arts and Science College - Konganapuram
The Control Plane, in charge of information exchange, builds and maintains the
following tables:
Routing Table – routing information is exchanged between LSRs using a
routing protocol, such as IGRP, EIGRP, IS-IS, OSPF, or BGP.
Label Information Base (LIB) –label information is exchanged between LSRs
using a label protocol, such as LDP (Label Distribution Protocol) or TDP (Tag
Distribution Protocol).
LDP is now default on Cisco devices, and uses TCP port 646. TDP is a Cisco-
proprietary label protocol, and uses TCP port711. Label convergence will occur after
routing convergence is completed. Label protocols require the underlying routing
infrastructure in order to function.
The Data Plane, in charge of information forwarding, maintains the following
tables:
The CEF Forwarding Information Base (FIB) –for forwarding unlabeled
packets. Contains destination IP networks, and the Layer-2 address of the
next-hop router.
Label Forwarding Information Base (LFIB)– for forwarding labeled packets.
The MPLS Process
There are four scenarios detailing how LSRs forward packets:
An unlabeled IP packet is received, and is routed unlabeled to the next
hop.
An unlabeled IP packet is received; a label is inserted in the header, and is
switched to the next hop.
A labeled IP packet is received; the label is swapped, and is switched to
the next hop.
A labeled IP packet is received; the label is stripped off, and is routed to
the next hop or destination.
Frame-mode MPLS performs as follows:
An edge LSR receives a packet.
147
Vidhyaa Arts and Science College - Konganapuram
The edge LSR performs a routing table lookup to determine the next hop
(or exit interface).
If destined for the MPLS network, the edge router inserts the label
between the Layer-2 and Layer-3 headers.
The edge LSR forwards the labeled packet to the core LSR.
Core LSRs will route solely based on the label, and will not perform a
routing table lookup.
MPLS VPNs
Cisco identifies two key categories of VPNs:
Overlay – connections are set up and maintained by the service provider.
However, the provider has no knowledge of, and does not participate in,
the customer’s routing infrastructure.
Peer-to-Peer– the provider directly participates in routing the customer’s
infrastructure. Routes from multiple customers are not kept separate.
This may require customers to readdress their networks.
MPLS VPNs provide the best of both words. Advantages of MPLS VPNs
include:
The provider directly participates in routing the customer infrastructure.
Peer-to-peer peering is not required, leading to a scalable infrastructure.
Customer networks do not need to be readdressed
Routes from multiple customers are kept separate.
MPLS VPNs use two labels. MPLS separates customer routes by assigning
each a unique Virtual Routing Instance (VRI), stored in a Virtual Routing and
Forwarding (VRF) table. If the addressing structure of multiple clients overlaps, each
network is assigned a unique 64-bit route distinguisher (RD). The IP network and
RD combination is called a VPNv4 address. Route targets are BGP attributes that
designate MPLS VPN membership of routes.
148
Vidhyaa Arts and Science College - Konganapuram
149
Vidhyaa Arts and Science College - Konganapuram
A system reference model for WATM is the system consists of a fixed ATM
network infrastructure and a radio access segment. In the fixed ATM network, the
switches, which communicate directly with wireless station or wireless end user
devices, are mobility enhanced ATM switches. These switches setup connections on
behalf of the wireless devices. They serve as the "entrance" to the infrastructure
wired ATM networks. The other ATM switching elements in the wired ATM
networks remain unchanged. Based on the different types of wireless applications,
the radio access segment falls into a number of areas which may need different
solutions.
Fixed Wireless Components - in fixed wireless LANs or network
interconnection via satellite or microwaves links, the end user devices and
switching devices are fixed. They establish connections with each other via
wireless channel, not through cable. In these kinds of applications, the data
transmissions are wireless, yet without mobility. Since the user devices do not
roam around, some design issues, e.g. handover, location management, and
re-routing, are not presented.
Mobile End Users - In digital cellular, PCS, and wireless LANs, the
end user devices, which are mobile, communicate directly with the fixed
network switching devices via wired or wireless channels. To support the
ATM connections, the end user devices are required to be equipped with a
Wireless Terminal Adaptor which communicates with the Wireless Access
Point in the fixed switching elements.
Mobile Switches with Fixed End Users - End user devices are
connected to switches via wired or wireless channels. The end user device
and the switch, as a unit, are mobile. There can be more than one end user
devices attach to one switch. An end user device is fixed to one switch instead
of roaming around different switches. The switch is responsible to establish
connections with the fixed infrastructure network component, either through
wired channel or wireless channel. In this case, Wireless Access Points and
150
Vidhyaa Arts and Science College - Konganapuram
Wireless Terminal Adapters are needed by the fixed mobility enhanced ATM
switches and the mobile switches.
Mobile Switches with Mobile End Users - In this case, end user devices
are mobile. There are also some mobile switching elements. When the end
user wants to establish a connection, it first setups a connection with a mobile
switch, which then setups a connection with the fixed network switches,
either directly, or via another mobile switches. Wireless Access Points and
Wireless Terminal Adapters are also needed to support the mobility.
Interworking with PCS - In PCS networks, the users are PCS terminals.
PCS terminals send data to proper PCS base stations via wireless link, which
then establish connections to the fixed network switching elements through a
base station controller. The base station controller is a logical element which
function as the ATM<->PCS
Wireless Ad Hoc Networks - An Ad Hoc network is the cooperative
engagement of a collections of mobile terminals without the required
intervention of any centralized access point. An auto-configuration of a
wireless ATM network will be required for this kind of application. In
wireless Ad Hoc Networks, an end user can communicate with the mobility
enhanced ATM switches either directly, or via a central controller.
WATM Design Issues
WATM adopts ATM to provide the data communications services so the
overall architecture is based on the ATM protocol stack. To support mobility,
appropriate extensions need to be added to the ATM protocol stack. The wireless
segment of the network will require new mobility functions.
151
Vidhyaa Arts and Science College - Konganapuram
The WATM items are divided into two distinct parts: Mobile ATM (Control
Plane), and Radio Access Layer (Wireless Control). Mobile ATM is dealing with the
higher-layer control/signaling functions needed to support mobility. These
control/signaling include handover, location management, routing, addressing, and
traffic management. Radio Access Layer is responsible for the radio link protocols
for wireless ATM access. Radio Access Layers consists of PHY (Physical Layer),
MAC (Media Access Layer), DLC (Data Link Layer), and RRC (Radio Resource
Control).
Radio Access Layer
To support wireless communication, new wireless channel specific physical,
medium access and data link layers are need to be added below the ATM network
layer. These layers are called Radio Access Layer in the WATM network. The
following sections address the design issues of the Radio Access Layer.
Physical Layer (PHY) - While a fixed station may own an 25 Mbit/s up to
155 Mbit/s data rate ATM link, a 25 Mbit/s data link in a wireless
environment is currently difficult to implement. A several GHz spectrum
would be required to provide high speed wireless transmission. Currently, 5
GHz band is considered to be used to provide 51 Mbit/s channel with
advanced modulation and special coding techniques. Although 155 Mbit/s is
unreachable due to the limitation of today's techniques, people believe that it
152
Vidhyaa Arts and Science College - Konganapuram
will soon be available in the 60 GHz band and 622 Mbit/s would be reached
in the not-too-distant future. Based on this belief, two separate PHY layer
specifications are recommended, one for 5 GHz band, one for the 60 GHz
band since they will require different operations.
Low speed wireless PHY High speed wireless PHY
Frequency band 5.15 – 5.35GHz. 59 GHz – 64 GHz
5.725 – 5.875GHz
Cell radius 80m 10 – 15 m
Transmit power 100 mW 10-20mW
Frequency reuse factor Upto 12 7
Channel band width 30 MHz 150/700 MHz
Data rate 25 Mbit/s 155/622 Mbit/s
Modulation 16 tone DQPSK 32 tone DQPSK
MAC interface Parallel, transfer speed Parallel, transfer speed
3.27Mbyte/s 87.5Mbyte/s
Fixed packet length PHY reader+ MAC reader + 4*ATM cells
153
Vidhyaa Arts and Science College - Konganapuram
other design issues like error recovery, support for sleep are also under
consideration
Data Link Control (DLC) - Data Link Control is responsible for providing
service to ATM layer. Mitigating the effect of radio channel errors should be
done in this layer before cells are sent to the ATM layer. In order to fulfill this
requirement, error detection/retransmission protocols and forward error
correction methods are recommended. Currently, the DLC protocol and
syntax, interface to MAC layer, and interface to ATM layer have not been
proposed yet.
Radio Resource Control (RRC) - RRC is needed for support of control
plane functions related to the radio access layer. It should support radio
resource control and management functions for PHY, MAC, and DLC layers.
The design issues of RRL will include control/management syntax for PHY,
MAC and DLC layers; meta-signaling support for mobile ATM; and interface
to ATM control plane
Mobile ATM
To support mobility, new higher layer control/signaling functions are needed
to handling handover, location management, routing, addressing, and traffic
management. The item, which defines the design the functions of control/signaling,
are called Mobile ATM.
Handover - In WATM networks, a mobile end user establish a virtual
circuit (VC) to communicate with another end user (either mobile or ATM
end user). When the mobile end user moves from one AP (access point) to
another AP, proper handover is required. To minimize the interruption to cell
transport, an efficient switching of the active VCs from the old data path to
new data path is needed. Also the switching should be fast enough to make
the new VCs available to the mobile users. When the handover occurs, the
current QoS may not be support by the new data path. In this case, a
negotiation is required to set up new QoS. Since a mobile user may be in the
access range of several APs, it will select the one which can provides the best
154
Vidhyaa Arts and Science College - Konganapuram
QoS. During the handover, an old path is released and a new path is then re-
established. There is a possibility that some cells will get lost during this
process (when the connection is broken). In case no cell lost is allowed. Cell
buffering is used to guarantee that no cell is lost and cell sequence is
preserved. Cell buffering consists of Uplink Buffering and Downlink
Buffering. If VC is broken when the mobile user is sending cells to APs,
Uplink Buffering is required. The mobile user will buffer all the outgoing
cells. When the connection is up, it send out all the buffered cells so no cells
are lost unless the buffers is overflowed. Downlink Buffering is performed by
APs to preserve the downlink cells for sudden link interruptions, congestion,
or retransmissions. It may also occur when handover is executed. There are
severing options for downlink buffering based on different handover
situations.
Location Management - When a connection is needed to be established
between an mobile ATM end point and another ATM end point, the mobile
ATM end point is needed to be located. There are two basic location
management schemes:
o The mobile PNNI scheme and
o The location register scheme.
In the mobile PNNI scheme, when a mobile moves, the reach ability update
information only propagates to the nodes in a limited region. The switches
within the region has the correct reachable information for the mobiles. When
a call is originated by a switch in this region, it can use the location
information to directly establish the connection. If a call is originated by a
switch outside this region, a connect is established between this switch and
the mobile's Home Agent, which then forward the cells to the mobile. This
scheme decreases the number of signaling messages during a local handover.
In the location register scheme, an explicit search is required to prior to the
establishment of connections. A hierarchy of location registers, which is
limited to a certain level, is used.
155
Vidhyaa Arts and Science College - Konganapuram
156
Vidhyaa Arts and Science College - Konganapuram
Economies of scale will yield a greater value to mobile users who will be able to
receive rich content, such as video, at a fraction of the cost.
For example, during major sporting events and concerts, instead of a single mobile
user receiving related video services at a very high premium and using dedicated
resources, LTE MBMS will be able to provide the same video services to multiple
users at a much lower cost per user and using the same amount of resources.
Architecture
MBMS are delivered by the collaboration of four main network components:
Broadcast multicast service center (BMSC) — located at the core of the
network, managing the interface with content providers including billing and
the content to be transmitted over the wireless network
MBMS gateway (MBMS-GW) — a logical element that delivers MBMS traffic
using IP-multicast reaching multiple cell sites in a single transmission
Multi-cell/multicast coordination entity (MCE) responsible for the
administration of radio resources for MBMS to all radios that are part of the
MBMS service area
The mobility management entity (MME) which performs the MBMS session
control signaling including session start, update, and stop, as well as
delivering additional MBMS information to the MCE including QoS and
MBMS service area MBMS provides broadcast multimedia services through
the LTE network combining unicast (PDSCH) and multicast (PMCH) services
in the same LTE frame.
LTE-MBMS radiates the same content to multiple users located within a
predefined MBMS service area, allowing all the users subscribed to MBMS to
simultaneously receive the same multimedia content.
Delivery
Transmissions from all the sectors of the MBMS service area are time
synchronized and transmitted over the same frequency in the network, also referred
as single frequency network (SFN), therefore the resulting MBMS-SFN signal is
received from users as if the signal would be transmitted for a single point.
157
Vidhyaa Arts and Science College - Konganapuram
158
Vidhyaa Arts and Science College - Konganapuram
SECTION - A
(OR)
b) Discuss about Bluetooth security.
3. a) List and explain the value added services through SMS.
(OR)
b) Write about GSM.
4. a) Discuss about GPRS architecture.
(OR)
b) Describe about evolution of WAP.
5. a) Explain the difference between CDMA and GSM.
GSM
(OR)
b) Explain about wireless data.
159
Vidhyaa Arts and Science College - Konganapuram
SECTION - B
(OR)
b) Write about standard bodies.
7. a) Write about multiple access procedure.
(OR)
b) Explain in detail about Bluetooth.
8. a) Discuss in detail about GSM entities.
(OR)
b) Describe in detail about SMS architecture.
9. a) Write in detail about data services in GPRS.
(OR)
b) List and explain in detail about GPRS applications.
10. a) Write in detail about wireless LAN security.
(OR)
b) Explain in detail about MPLS.
160
Vidhyaa Arts and Science College - Konganapuram
SECTION - A
(OR)
b) List and explain the categories of middleware.
2. a) Discuss about elements of XML document.
(OR)
b) Write in detail about IPV6.
3. a) Discuss about handover.
(OR)
b) Describe about GSM address and identifiers.
4. a) Discuss about billing and charging in GPRS.
(OR)
b) Describe about multiple access radio resource management.
5. a) List and explain the IEEE 802.11 standard.
(OR)
b) Write about the types of wireless LAN.
161
Vidhyaa Arts and Science College - Konganapuram
SECTION - B
(OR)
b) Discuss about GPS.
7. a) Explain about voice software.
(OR)
b) Discuss in detail about mobile IP.
8. a) Discuss in detail about GSM architecture.
(OR)
b) Explain about call routing in GSM.
9. a) Discuss in detail about transmission plane protocol architecture.
(OR)
b) Write in detail about GPRS network enhancement.
10. a) Discuss in detail about OFFDM.
(OR)
b) Describe in detail about WATM.
162
Vidhyaa Arts and Science College - Konganapuram
OBJECTIVE TEST-I
163