Professional Documents
Culture Documents
TECHNOLOGY
UTTAM K. ROY
Dept. of Information Technology,
Jadavpur University, Kolkata
Web technology
Agenda
Background
HTTP Protocol
Domain Name System (DNS)
Simple Mail Transfer Protocol (SMTP)
HyperText Markup Language(HTML)
JavaScript
XML
JSP
| U. K. Roy |
[ 10/22/08 ]
HyperText
Tr ansf er
Pr otocol
(H TTP )
Web technology
WWW
World Wide Weba repository of Information
Introduced in 1991
Originated from the CERN High-Energy Physics
laboratory in Geneva, Switzerland.
Purposecreate a system to handle distributed resource
A client-server service
Service providercalled website
| U. K. Roy |
[ 10/22/08 ]
Web technology
Linux
Netscape Navigator
Mozzila
Konquor
[ 10/22/08 ]
Web technology
Client-server model
client: browser that requests, receives, displays web
objects
server: Web server sends objects in response to request
| U. K. Roy |
[ 10/22/08 ]
Web technology
URL
[ 10/22/08 ]
Web technology
URL - continued
Method
[ 10/22/08 ]
Web technology
HTTP - example
Suppose user enters URL www.yahoo.com/index.html
1a. http client initiates TCP connection to
http server (process) at www.yahoo.com.
Port 80 is the default for http server
1b. http server at host www.yahoo.com
waiting for TCP connection at port 80
accepts connection, notifying client
2. http client sends http request message
(containing URL) into TCP connection
socket
time
| U. K. Roy |
Web technology
10
| U. K. Roy |
[ 10/22/08 ]
Web technology
11
| U. K. Roy |
[ 10/22/08 ]
Web technology
12
PATCH
MOVE
DELETE
LINK
| U. K. Roy |
Description
UNLINK
OPTION
[ 10/22/08 ]
Web technology
13
http://www.w3.org/Protocols/HTTP/HTRESP.html
[ 10/22/08 ]
Web technology
14
| U. K. Roy |
100 range
200 range
300 range
400 range
Informational
Successful request
Redirectional
Client Error
500 range
Server Error
[ 10/22/08 ]
Web technology
15
Phrase
Description
Informational
100
Continue
101
Switching
200
OK
201
Created
202
Accepted
204
No content
301
Multiple choices
302
Moved permanently
304
Moved temporarily
| U. K. Roy |
[ 10/22/08 ]
Web technology
16
Phrase
Description
Client Error
400
Bad Request
401
Unauthorized
403
Forbidden
Service is denied
404
Not found
405
406
Not acceptable
500
Internal Server
Error
501
Not Implemented
503
Service
unavailable
| U. K. Roy |
[ 10/22/08 ]
Web technology
17
| U. K. Roy |
[ 10/22/08 ]
Web technology
18
| U. K. Roy |
Date
Clients email address
Document age
Content length
[ 10/22/08 ]
Web technology
19
| U. K. Roy |
Description
Specifies information about caching
Shows whether the connection should be closed or
not
Shows the current date
Shows the MIME version used
Specifies the preferred communication protocol
[ 10/22/08 ]
Web technology
20
Accept-encoding
Accept-language
Authorization
From
Host
If-modified-since
If-match
If-non-match
If-range
If-unmodifiedsince
Referrer
User-agent
| U. K. Roy |
Description
Web technology
21
Description
Accept-range
Age
Public
Retry-after
Server
| U. K. Roy |
[ 10/22/08 ]
Web technology
22
Description
Allow
Content-range
Content-type
Etag
Expires
Last-modified
Location
| U. K. Roy |
Web technology
[ 10/22/08 ]
23
Web technology
[ 10/22/08 ]
24
Web technology
25
Nonpersistent
HTTP 1.0
one TCP connection for
each request/response
3. the client opens a TCP
connection and sends a
request
4. the server sends the
response and closes the
connection
5. the client reads data and
closes the connection
Persistent
default for HTTP 1.1
the server leaves the TCP
connection open for more
requests after sending a
response
client sends requests for
all referenced objects as
soon as it receives base
HTML
pipelining
fewer RTT
| U. K. Roy |
[ 10/22/08 ]
Web technology
26
Origin
server
http
Proxy
response server
client
http
request
http
request
client
| U. K. Roy |
http
response
Origin
server
[ 10/22/08 ]
Web technology
27
smaller response
time (improved
latency)
decrease traffic to
distance servers
link out of ISP network
is often a bottleneck
the Internet
10 Mbps LAN
institutional
cache
| U. K. Roy |
[ 10/22/08 ]
Web technology
Push
Whenever a server gives a copy of a web page to a web
cache, they sign a lease with an expiration time;
if the web page is modified before the lease, the server
notifies the cache
| U. K. Roy |
[ 10/22/08 ]
28
Domain Name
System
(DNS)
Web technology
| U. K. Roy |
[ 10/22/08 ]
30
Web technology
Problems:
Host file would be too large to store
Updation problem
Solution
Store this host file centrally
Problem: Huge amount of traffic
| U. K. Roy |
[ 10/22/08 ]
31
Web technology
[ 10/22/08 ]
32
Web technology
| U. K. Roy |
[ 10/22/08 ]
33
Web technology
34
[ 10/22/08 ]
Web technology
35
Domain name
Domain name a sequence of labels separated by dots
read from the node up to the root
full domain name ends with the null
Fully qualified domain name
challenger.atc.fhda.edu.
Partially qualified domain name
challenger
| U. K. Roy |
[ 10/22/08 ]
Web technology
36
Domain
A sub-tree of the Domain Name Space
Name of a domain is the domain name of the node at
the root of the subtree
| U. K. Roy |
[ 10/22/08 ]
Web technology
| U. K. Roy |
[ 10/22/08 ]
37
Web technology
38
Primary server
loads the information about the the zone from the
disk
Secondary server
loads the info from the primary server
redundancy against failure
| U. K. Roy |
[ 10/22/08 ]
Web technology
39
Zones (cntd)
separate name
server
| U. K. Roy |
[ 10/22/08 ]
Web technology
40
Generic domains
registered host according to their generic behavior
Inverse domain
used to map an address to a name
Country domains
the same format as in generic domain just 2 character
format
us; nl; jp; fr; in
| U. K. Roy |
[ 10/22/08 ]
Web technology
41
Generic domain
Label
com
Commercial organizations
edu
Educational institutions
gov
Government institutions
int
International organizations
mil
Military groups
net
org
Nonprofit organizations
aero
biz
coop
info
museu
m
name
pro
| U. K. Roy |
Description
[ 10/22/08 ]
Web technology
42
Country domains
| U. K. Roy |
[ 10/22/08 ]
Web technology
43
Inverse domain
Example: a server wishes to
determine whether the client is
on the authorized list
First-level node arpa for
historical reasons
The servers are also
hierarchical
Domain looks inverted
compared to a generic or
country domain
| U. K. Roy |
[ 10/22/08 ]
Web technology
44
Resolution
Mapping a name to an address or vice-versa
Resolver
DNS client
When a host needs to map an address to a name it calls
resolver that in turn access the nearest DNS server with a
mapping request
A server either
responds directly with an info, or
refers the resolver to other servers
asks other servers to provide info
Recursive resolution
Iterative resolution
| U. K. Roy |
[ 10/22/08 ]
Web technology
45
Recursive resolution
flits.cs.vu.nl -> linda.cs.yale.edu
if the server is the authority for the domain name it checks its data
base and responds, otherwise
it sends a request to another server
| U. K. Roy |
[ 10/22/08 ]
Web technology
46
Iterative resolution
The server returns either IP requested address or the IP
address of the server it thinks can resolve the querry
edu-derver.net
yale.edu
cs.vu.nl
| U. K. Roy |
[ 10/22/08 ]
Web technology
47
Dynamic DNS
What if a new host joins the network or a host is
removed or an IP address is changed?
DNS master file also has to be changed
Changes so dynamic a problem!
Dynamic Domain Name System
When a binding between IP address & host name is
determined (usually) DHCP informs DNS server
Encapsulation
DNS can use either UDP or TCP, using the well-known
port 53
| U. K. Roy |
[ 10/22/08 ]
Web technology
48
DNS Mesaages
Messages
Query
| U. K. Roy |
Response
[ 10/22/08 ]
Web technology
49
Header Format
Identification
16-bit field used by the client to match response with the query
| U. K. Roy |
[ 10/22/08 ]
Web technology
50
Flag Fields
| U. K. Roy |
QR: Query/Response
OpCode: 0 standard, 1 inverse, 2 server status
AA: Authoritative
TC: Truncated
RD: Recursion Desired
RA: Recursion Available
rCode: Status of the error
[ 10/22/08 ]
Web technology
51
Resource Records
Five tupple in the form
Domain_name Time_to_live Type
Type
Value
Meaning
Start of Authority
IP address of a host
32-bit Integer
MX
Mail Exchange
NS
Name Server
Canonical Name
Domain Name
Pointer
Host Description
Text
SOA
A
CNAME
PTR
HINFO
TXT
| U. K. Roy |
Class Value
[ 10/22/08 ]
Web technology
52
Resource Records
$TTL 86400
@
IN
SOA rose.itd.jusl.ac.in. rose.itd.jusl.ac.in. (
2006062101
3H
15M
1W
1D )
;
rose
www
mail
dns
gateway
hporacle
lotus
galaxy
nfs
dhcp
nis
| U. K. Roy |
IN
IN
IN
IN
IN
IN
IN
IN
IN
IN
IN
IN
IN
IN
NS
NS
MX
A
CNAME
CNAME
CNAME
CNAME
A
A
A
CNAME
CNAME
CNAME
rose.itd.jusl.ac.in.
galaxy.itd.jusl.ac.in.
1 rose.itd.jusl.ac.in.
203.197.107.107
rose.itd.jusl.ac.in.
rose
rose
rose
172.16.6.97
172.16.6.107
172.16.6.108
lotus
lotus
lotus
[ 10/22/08 ]
Web technology
54
SMTP
| U. K. Roy |
[ 10/22/08 ]
Web technology
55
SMTP
SMTP Client/Server
User Agent(UA)
Mail Transfer Agent(MTA)
| U. K. Roy |
[ 10/22/08 ]
Web technology
56
SMTP
Relay MTAused to store mail in an intermediate stage
| U. K. Roy |
[ 10/22/08 ]
Web technology
57
SMTP
Mail Gatewayused when either side does not use
TCP/IP protocol
| U. K. Roy |
[ 10/22/08 ]
Web technology
58
SMTP(User Agent)
Example
Elm, Pine, MH, Berkley Mail, Zmail, Mush
Eudora, Webmail etc.
Sending Mail
Envelop
Message
Header
Body
Receiving Mail
UA checks mailbox periodically
| U. K. Roy |
[ 10/22/08 ]
Web technology
59
email format
| U. K. Roy |
[ 10/22/08 ]
Web technology
60
Addresses
| U. K. Roy |
[ 10/22/08 ]
Web technology
61
Delayed Delivery
Sender-site Delay
Sender site stipulates a spooling
system
UA creates message and forwards it
to Spooling system to store
MTA checks spool periodically for
new mail
Delay depends upon following
conditions
IP address of the server is obtained
through DNS
Receiver is ready or not
[ 10/22/08 ]
Web technology
62
Delayed Delivery
Receiver-site Delay
After receiving mail, it is
stored in respective mailbox
for reading
Example
Sendmail uses individual files
to store mails
Intermediate Delay
Mails can be stored by
intermediate MTAs to send
them when appropriate
| U. K. Roy |
[ 10/22/08 ]
Web technology
63
Aliases
One-to-many Expansion
Allows one name, called alias to represent several different
email addresses
A list of email addresses is associated with the alias using a
database map
If an alias is defined, mail destined to that name is sent to
every recipients of the list
If not defined, mail is sent to the user only
| U. K. Roy |
[ 10/22/08 ]
Web technology
64
Aliases
| U. K. Roy |
[ 10/22/08 ]
Web technology
65
One-to-many expansion
| U. K. Roy |
[ 10/22/08 ]
Web technology
66
Aliases
Many-to-one Expansion
A user can have many different email addresses
An alias database is used for this map
Single mailbox is used
Mails destined to all theses email addresses are sent to single user
| U. K. Roy |
[ 10/22/08 ]
Web technology
67
Many-to-one expansion
| U. K. Roy |
[ 10/22/08 ]
Web technology
68
| U. K. Roy |
[ 10/22/08 ]
Web technology
69
SMTP
| U. K. Roy |
[ 10/22/08 ]
Web technology
70
SMTP Messages
Messages
Commands
| U. K. Roy |
Response
[ 10/22/08 ]
Web technology
71
SMTP Messages(Commands)
Commands
Commands are sent from
client to server
First five are mandatory
| U. K. Roy |
[ 10/22/08 ]
Web technology
SMTP Messages(Responses)
72
Responses
Commands are sent from server to client
3 digit code of the following form
2yz(positive completion)
Requested command has been successfully completed and new
commands can be started
[ 10/22/08 ]
Web technology
SMTP Messages(Responses)
| U. K. Roy |
[ 10/22/08 ]
73
Figure 22-15
| U. K. Roy |
Web technology
74
Connectionestablishment
[ 10/22/08 ]
Web technology
75
SMTP
An Example
| U. K. Roy |
[ 10/22/08 ]
Web technology
76
Connection Termination
| U. K. Roy |
[ 10/22/08 ]
Web technology
77
MIME
SMTP uses NVT 7-bit ASCII character set
Can not be used for languages that are not supported by 7-bit ASCII
characters. E.g French, German, Hebrew, Russian, Chinese,
Japanese etc.
Can not be used to send binary data or audio or video
| U. K. Roy |
[ 10/22/08 ]
Web technology
78
MIME
| U. K. Roy |
[ 10/22/08 ]
Web technology
79
MIME
Content-Transfer-Encoding
Encoding to be used
Content-Transfer-Encoding: <type>
Type
7bit, 8bit, binary, Base64 etc.
Content-Id
Content-Description
| U. K. Roy |
[ 10/22/08 ]
Figure 22-20
| U. K. Roy |
Web technology
80
Base64
[ 10/22/08 ]
Figure 22-21
| U. K. Roy |
Web technology
81
Quotedprintable
[ 10/22/08 ]
Web technology
82
Mail Delivery
| U. K. Roy |
[ 10/22/08 ]
Web technology
84
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
r- n- p- c-
r- n- p- c-
r- n- p- c-
r-
97 97 98 98 98 98 99 99 99 99 00 00 00 00 01
Asia Pacific
| U. K. Roy |
North America
[ 10/22/08 ]
85
Web technology
86
90
Nov. 88
CDMA
Cellular
Concept
93
95
96
97
CDMA IS-95
standard
issued
Commercial
CDMA launched in
So. Korea
Korea selects
CDMA
PCS PrimeCo
turns up nationwide PCS service
in 14 cities
Nov. 89
San Diego
CDMA
Open
Demonstration
-Power Control
-Rake Receiver
-Soft Handoff
| *U.
K. Roy
According
to |CDG, EMC
94
Sprint PCS
selects
CDMA for
nationwide
network
U.S. PCS standard
First commercial
CDMA system
in Hong Kong using
QUALCOMM phones
98
99
00
Over 74
million
subscribers*
Nov. 99
HDR
mobility
demonstrated
More than 90
licensees
83 CDMA
operators
in
35 nations*
cdma2000 1x
Commercial
Commercial
systems in
100 U.S. cities
Japan selects
CDMA
HDR
Standardized as
1x EV
CDMA subscribers
reach over 12.5
million in 30
countries on
5 continents*
First HDR
call demonstrated
[ 10/22/08 ]
Web technology
87
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
88
Cellular Network
PSTN
MSC
Forward
Reverse
Cell Site
Cell Site
| U. K. Roy |
[ 10/22/08 ]
Web technology
89
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
90
CDMA
ACCESS SCHEMES
| U. K. Roy |
[ 10/22/08 ]
Web technology
91
H I
HI
F re q u e n c y C h a n n e l1
GO
GO
F re q u e n c y C h a n n e l 2
| U. K. Roy |
[ 10/22/08 ]
Web technology
92
H I
G O
| U. K. Roy |
H I
C o m m o n F r e q u e n c y C h a n n e l
u s e r2
u s e r1
u s e r2
u s e r1
G
G O
[ 10/22/08 ]
Web technology
| U. K. Roy |
93
[ 10/22/08 ]
Web technology
94
Selemat Datang
Guten Tag
Buenos Dias
| U. K. Roy |
[ 10/22/08 ]
Web technology
95
CDMA
CODING
| U. K. Roy |
[ 10/22/08 ]
Web technology
96
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
97
CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
98
CDMA
Example
| U. K. Roy |
[ 10/22/08 ]
Web technology
99
CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
100
CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
101
Tx
U s e r 1 D a t a : 0 1
U s e r 2 D a t a : 1 0
B TS
U s e r 1 C o d e : 0 1 0 1
0 1 0 1 1 0 1 0
1 0 0 1 0 1 1 0
Rx
M o b ile
U s e r 1 D a t a : 0 1
U s e r 1 C o d e : 0 1 0 1
U s e r 2 C o d e : 0 1 1 0
| U. K. Roy |
[ 10/22/08 ]
Web technology
102
| U. K. Roy |
[ 10/22/08 ]
Web technology
103
CDMA
1 m
S.T = Si .Ti = 0
m i =m
Following properties also hold
1 m
1 m 2 1 m
S.S = Si .Si = Si = ( 1) 2 = 1
m i =1
m i =1
m i =1
1 m
1 m
S.S = Si .S = 1 = 1
m i =m
m i=m
| U. K. Roy |
[ 10/22/08 ]
Web technology
Transmission:
Stations A, B, C, D each take their next data bit to send,
encode it as -1, +1, or 0; and multiply that code by each
number in the chip sequence to obtain a 4-tuple.
The four 4-tuples are added together and the sum is
transmitted.
The values will be the range -4 to +4, so 9 levels of physical
layer coding are needed.
| U. K. Roy |
[ 10/22/08 ]
104
Web technology
105
CDMA multiplexing
| U. K. Roy |
[ 10/22/08 ]
Web technology
106
Decoding CDMA
The input to the demultiplexer is a 4-tuple of values
between -4 and +4.
Each station takes the four values, and multiplies the
values by the chip sequence.
The resulting values are then summed to obtain a single
value. The result will always be -4, +4, or 0.
Divide the result by 4 to get a value -1, +1, or 0.
Decode this result to a data bit of 0, 1, or no data.
| U. K. Roy |
[ 10/22/08 ]
Web technology
107
CDMA Demultiplexing
| U. K. Roy |
[ 10/22/08 ]
Web technology
A: 0 0 0 1 1 0 1 1
B: 0 0 1 0 1 1 1 0
C: 0 1 0 1 1 1 0 0
D: 0 1 0 0 0 0 1 0
1
1
1
1
1
0
0
1
1
1
1
1
1
0
1
1
CDMA
A: (1 1 1 +1 +1 1 +1 +1)
B: (1 1 +1 1 +1 +1 +1 1)
C: (1 +1 1 +1 +1 +1 1 1)
D: (1 +1 1 1 1 1 +1 1)
C
B+C
A+B
A+B+C
A+B+C+D
A+B+C+D
S1 = (1 +1 1 +1 +1 +1 1 1)
S2 = (2 0 0 0 +2 +2 0 2)
S3 = ( 0 0 2 +2 0 2 0 +2)
S4 = (1 +1 3 +3 +1 1 1 1)
S5 = (4 0 2 0 +2 0 +2 +2)
S6 = (2 2 0 2 0 2 +4 0)
S1 C = (+1 +1 +1 +1 +1 +1 +1 +1)/8
S2 C = (+2 +0 +0 +0 +2 +2 +0 +2)/8
S3 C = (+0 +0 +2 +2 +0 2 +0 2)/8
S4 C = (+1 +1 +3 +3 +1 1 +1 1)/8
S5 C = (+4 +0 +2 +0 +2 +0 2 +2)/8
S6 C = (+2 2 +0 2 +0 2 4 +0)/8
| U. K. Roy |
108
= 1
= 1
= 0
= 1
= 1
= 1
[ 10/22/08 ]
Web technology
109
CDMA
Proof:
S C = (A + B + C) C = A C + B C + C C = 0 + 0 + 1 = 1
| U. K. Roy |
[ 10/22/08 ]
Web technology
A n ten na
V oic e
A /D
C o n v e rt er
V o c od er
E n c o d e r &
I n t e r le a v e r
S pre ad er
D /A
RF
Code
G en era to r
| U. K. Roy |
[ 10/22/08 ]
110
Web technology
| U. K. Roy |
111
[ 10/22/08 ]
Web technology
| U. K. Roy |
VO CODE R
V o c od ed
V o ic e
1 0 1 1
[ 10/22/08 ]
112
Web technology
P u ls e C o d e d
D e m o d u la t i o n
(P C M )
Vocoded
V o ic e
1 0 1 1
| U. K. Roy |
V OCO DER
A /D
[ 10/22/08 ]
113
Web technology
114
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
115
Section Introduction
| U. K. Roy |
UniversalFrequencyReuse
PowerControl
SoftHandoff
[ 10/22/08 ]
Web technology
116
B
C
C DMA201.1 4
| U. K. Roy |
[ 10/22/08 ]
Web technology
117
CDMA Systems
E
F
D
F
C
B
E
G
C
B
A
C
D
G
A
F
D
D
B
E
F
C
B
E
B
A
G
C
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
N=7
N=1
| U. K. Roy |
[ 10/22/08 ]
Web technology
118
Decreased
Power
Increased
Power
Decreased
Power
Decreased Power
Increased Power
| U. K. Roy |
Near/Far Problem
Path Loss
Fading
[ 10/22/08 ]
Web technology
119
All users are controlled so that their signals reach the base station at
approximately the same level of power
CDMA uses a 2-step Power Control process on the Reverse Link
Estimate made by the mobile:
Open Loop
Correction supplied by the BS:
Closed Loop
| U. K. Roy |
[ 10/22/08 ]
Web technology
120
| U. K. Roy |
[ 10/22/08 ]
Web technology
121
| U. K. Roy |
[ 10/22/08 ]
Web technology
122
20
Transmit
Power 10
CDMA
0
-10
-20
Average Transmit
Power
-30
0
50
100
150
200
250
300
350
CDMA
2 mW
FM (AMPS) 700 mW
CDMA < 1/100 th
the power of FM
| U. K. Roy |
[ 10/22/08 ]
Web technology
123
| U. K. Roy |
[ 10/22/08 ]
Web technology
124
| U. K. Roy |
[ 10/22/08 ]
Web technology
-10
dB -20
-30
-40
-12
Direct
Path
Multi
Paths
125
Combiner
Correlator 1
Correlator 2
Correlator 3
PN
XMTR
Correlator n
0
+12
Chips
1 Chip = 0.83 Microseconds
| U. K. Roy |
[ 10/22/08 ]
Web technology
| U. K. Roy |
[ 10/22/08 ]
126
Web technology
127
What is Handoff?
Cell
| U. K. Roy |
Cell
[ 10/22/08 ]
Web technology
128
| U. K. Roy |
[ 10/22/08 ]
| U. K. Roy |
129
[ 10/22/08 ]
Web technology
130
HANDOVER
Hard Handover
Break before make
Soft Handover
Make before breakpossible a mobile station can be connected to
more than one BTS simultaneously
Requires less powerreduces interference
| U. K. Roy |
[ 10/22/08 ]
Web technology
131
BSC
BTS
BTS
PSTN
MTSO
| U. K. Roy |
BSC
[ 10/22/08 ]
Web technology
132
Soft Handoff
CellB
CellB
CellB
| U. K. Roy |
CellA
CellA
CellA
[ 10/22/08 ]
Web technology
133
SoftHandoff
FrameSelection
BSC
Selector
| U. K. Roy |
[ 10/22/08 ]
Web technology
134
| U. K. Roy |
[ 10/22/08 ]
Web technology
135
Hard Handoff
Analog, TDMA and GSM
| U. K. Roy |
Soft Handoff
CDMA
[ 10/22/08 ]
Web technology
136
FDMA
(Analog)
MTSO
| U. K. Roy |
CDMA
BSC
[ 10/22/08 ]
Web technology
137
Idle Handoff
Access
BTS
Pilot
BTS
Pilot
Paging
| U. K. Roy |
[ 10/22/08 ]
Web technology
138
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
139
The 6 Cs of CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
140
$USD $0.078
$0.08
$0.065
$0.056
$0.07
$0.047
$0.06
$0.039
$0.05
$0.04
$0.03
$0.02
$0.01
$0.00 WCDMA TDMA GSM cdmaOne CDMA2000
$USD
$0.50
$0.45
$0.40
$0.35
$0.30
$0.25
$0.20
$0.15
$0.10
$0.05
$0.00
| U. K. Roy |
$0.47
$0.07
GPRS
$0.06
$0.02
[ 10/22/08 ]
Web technology
141
The 6 Cs of CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
142
CDMA
13 kbps
CDMA
EVRC
GSM 5
BER %
CDMA
2 FER %
3
1
1
2.0
2.33
2.66
3.0
3.33
3.66
4.0
MOS
Voice clarity or speech quality is measured by
a Mean Order Score (MOS) and Bit/Frame Error Rates
| U. K. Roy |
[ 10/22/08 ]
Web technology
143
The 6 Cs of CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
AMPS = 1
| U. K. Roy |
GSM/TDMA
CDMA
[ 10/22/08 ]
144
Web technology
145
CDMA Capacity
FDMA
TDMA
CDMA
C = W log2(1 + S/N)
C = Capacity (bps)
W = Bandwidth (Hz)
S = Signal Power
N = Noise Power
| U. K. Roy |
[ 10/22/08 ]
Web technology
146
Frequency Reuse
n=7
n=1
[ 10/22/08 ]
Web technology
147
[ 10/22/08 ]
Web technology
148
Capacity Comparison
Sector
Frequency
Reuse
Carrier
Spacing
Users/
Carrier
Carriers/
Sector/
5 MHz
AMPS
7/21
30 kHz
8 (24)
GSM
3/9
200 kHz
16 (48)
TDMA (U.S.)
7/21
30 kHz
24 (72)
CDMA-Cellular
1.25 MHz
22
66 (198)
CDMA-1X
1.25 MHz
35
105 (315)
WCDMA
5 MHz
62
62 (186)
Technology
CDMA
| Note:
U. K.ForRoy
| the same frequency is reused in all 3 sectors.
Users/
Sector/(Cell)
5 MHz
[ 10/22/08 ]
Web technology
149
The 6 Cs of CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
150
Coverage
Link budget equal to or better than AMPS & GSM
Due to:
Spread-spectrum processing gain
Strong channel coding, reducing Eb/No requirement
Soft Handoff provides additional coverage gain
Improved FER - e.g. 10% FER from each of 2 sites, combined
gives 1% FER.
Theoretical 4.1 dB additional coverage
In practice, up to 10dB coverage improvement in a fading
channel, depending on standard deviation of shadowing
| U. K. Roy |
[ 10/22/08 ]
Web technology
151
dB dB
dB
dB dB
Capital Budgets
| U. K. Roy |
[ 10/22/08 ]
Web technology
152
GS
M
CDMA Coverage
CDMA
13 kbps
A
M s
CD kbp
8
| U. K. Roy |
Link
Radius
143
148
150
3.6 km
5.1 km
5.9 km
[ 10/22/08 ]
Web technology
153
The 6 Cs of CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
154
Compatibility
1.25 MHz
3 Operators
7 Operators
up to 2.4 Mbps
98 Operators
Up to 307 kbps
DATA
Up to 64 kbps
14.4 kbps
VOICE
VOICE
INCREASED VOICE
CAPACITY
95A
95B
CDMA2000
1X / 1xEV
A B
A B 1X/
cdmaOne
up to 2.0 Mbps
DATA
1.25 MHz
DATA
VOICE
WCDMA /
CDMA2000
A B 1X/ World
1xEV Phone
1xEV
1995
1.25 MHz
1.25 MHz
CDMA is
the Only
Technology
That Protects
Your Investment
CDMA2000
1xEV
1999
2000
2001
2002
2003
[ 10/22/08 ]
Web technology
155
Compatibility
CDMA Mobile Terminals are Forward & Backward Compatible
cdmaOne Handsets
Pin Compatibility:
3G Handsets
IS-95A to 1X
IS-95A/B to 1X
IS-95A/B to 1X
1x to 1xEV-DO
RF Compatibility:
No changes required for
RF Front-end
Over 65 manufacturers
| U. K. Roy |
First commercial
cdma2000 1x
handsets
available now
[ 10/22/08 ]
Web technology
156
The 6 Cs of CDMA
| U. K. Roy |
[ 10/22/08 ]
Web technology
157
Customer Satisfaction
VoiceQuality
BatteryLife
NoCrosstalk
| U. K. Roy |
Privacy
[ 10/22/08 ]
Switching Networks
Web technology
159
Switching Networks
Why switching networks?
Two stations can communicate if they are connected
Stations can be connected in two ways
Directly
Via switched networks
Problems of connecting
stations directly
Devices may be far apart
expensive to setup a dedicated link
A station may not require a link to
every other stations all the time
No of links required is N(N-1)/2
Cost grows with the square of the
number of devices
| U. K. Roy |
[ 10/22/08 ]
Web technology
160
Switching Networks
Solution
Attach a communication networkcalled switched network
| U. K. Roy |
[ 10/22/08 ]
Web technology
161
Switching Networks
Example
Observations
Some nodes connect only to
other nodes
The sole task is the internal
switching of data
Network is not fully connected
in general
Node to node links are multiplexed links using either FDM or TDM
| U. K. Roy |
[ 10/22/08 ]
Web technology
162
Switching Networks
Switching network
Circuit Switching
Telephone network
Packet switching
| U. K. Roy |
[ 10/22/08 ]
Web technology
| U. K. Roy |
[ 10/22/08 ]
163
Web technology
164
Single-Node Network
Digital switch
Provides a transparent signal
path between any pair of
connected devices
Network interface
Hardware needed to connect
devices to the network
Control Unit
Establishes connection
(generally on demand basis)
Maintains connection during
data communication
Tears down connection
| U. K. Roy |
[ 10/22/08 ]
Web technology
165
Switch
The switch hierarchy
Five classes of
switching offices
10 regional offices
67 sectional offices
230 primary offices
1300 toll offices
19,000 end offices
| U. K. Roy |
[ 10/22/08 ]
Web technology
166
Digital Switches
Digital switch
Space Division switch
Time division switch
Crossbar switch
Multistage switch
Crossbar switch
N input lines, N output lines
N2 number of cross points
Semiconductor switch is used to enable a cross point to connect an input to
output
| U. K. Roy |
[ 10/22/08 ]
Web technology
167
Problems
Number of cross points?
Number of cross points grows with the square of the number of attached stations
[ 10/22/08 ]
Web technology
168
| U. K. Roy |
[ 10/22/08 ]
Web technology
169
N N
N
k = k
n n
n
3rd stage: kN
N
Total: 2kN + k
Implication of K
No of distinct paths from input to output
| U. K. Roy |
[ 10/22/08 ]
Web technology
170
Non-Blocking switch
A path is always available to connect an input to an output
Examplecrossbar switch
Blocking switch
If one or more input-output pair can not be connected even if they are
available
Example
| U. K. Roy |
[ 10/22/08 ]
Web technology
171
Non-blocking Switch
N
N x = 2(2n 1) N + (2n 1)
n
N
n = and
2
( N x ) opt
| U. K. Roy |
= 4N
2 N 1
[ 10/22/08 ]
Web technology
172
TDM concept
N input and N output lines are connected
through controlled gates to a high speed
digital bus
During a time slot input-output line gates are
enabled
Number of cross
points?
4 N ( 2 N 1)
2N instead of
| U. K. Roy |
[ 10/22/08 ]
Web technology
173
6 stations, 5 s each
Assume propagation time is zero
30 s frame
Control memory
Indicates gates to be enabled
during successive time slots
6 words are needed
Example
During 1st time slot input gate
of 1 and output gate of 3 are
enabled
| U. K. Roy |
[ 10/22/08 ]
Web technology
174
Capacity?
2N instead of 4 N ( 2 N 1)
For 100 lines with 19.2 Kbps each, bus must be at least 1.92 Mbps
Statistical TDM
No fixed time slot for input, they are allocated on demand
May be blocking
Example:
200 stations 19.2 Kbps each
Bus speed 2 Mbps
About a half of devices can be connected at any time
Circuit switching?
TDM ?
| U. K. Roy |
[ 10/22/08 ]
Web technology
175
| U. K. Roy |
[ 10/22/08 ]
Web technology
Disadvantage
176
TSI Mechanism
| U. K. Roy |
[ 10/22/08 ]
Web technology
177
| U. K. Roy |
[ 10/22/08 ]
Web technology
[ 10/22/08 ]
178
Web technology
Solution
[ 10/22/08 ]
179
Web technology
Example
| U. K. Roy |
[ 10/22/08 ]
180
Web technology
181
ISDN services
Voice services
Non-voice services
Remote electric meter reading
On-line medical, burglar, smoke alarms that automatically call the hospital, police
or fire department and give their address to speed up response
| U. K. Roy |
[ 10/22/08 ]
Web technology
182
ISDN Architecture
ISDN Interface
The ISDN bit pipe supports following channels
| U. K. Roy |
[ 10/22/08 ]
Web technology
183
| U. K. Roy |
[ 10/22/08 ]
Web technology
ATM Switch
184
| U. K. Roy |
[ 10/22/08 ]
Web technology
Problem arises when cells arriving at two or more input lines want to go to the
same output line
Solution
185
| U. K. Roy |
Head of line blockingwhen a cell has to held up, it blocks rest of the cells behind
it even they could otherwise be switched
To avoid head of line blocking a recirculating path can be used to send the losing
cells back to the input side
Care must be taken to avoid out of order delivery
[ 10/22/08 ]
Web technology
| U. K. Roy |
[ 10/22/08 ]
186
Web technology
187
Knockout Switch
| U. K. Roy |
[ 10/22/08 ]
Web technology
188
Batcher-Banyan Switch
Basic element
Cross
2x2 switch
| U. K. Roy |
parallel
lower broadcast
upper broadcast
0
1
2
3
4
5
6
7
[ 10/22/08 ]
Web technology
189
Batcher-Banyan Switch
000001
01
000010
02
000100
04
010011
23
001011
13
001101
15
100101
45
100110
46
010110
26
110111
67
101111
57
011111
37
Stage 0
| U. K. Roy |
Stage 1
Stage 2
0
1
2
3
4
5
6
7
[ 10/22/08 ]
Web technology
190
Example
0
1
2
3
000101
001000
5
6
010110
| U. K. Roy |
[ 10/22/08 ]
Web technology
| U. K. Roy |
[ 10/22/08 ]
191
Web technology
192
Batcher Switch
| U. K. Roy |
[ 10/22/08 ]
Web technology
193
| U. K. Roy |
[ 10/22/08 ]
Web technology
194
Switch
| U. K. Roy |
[ 10/22/08 ]
B RIDGE
S
Web technology
5.
196
Introduction
Multiple LANs come into existence due to the autonomy of their owners
Later there is a need for interaction, so bridges are needed
| U. K. Roy |
[ 10/22/08 ]
Web technology
197
Examples(cont.)
1.
Limitation on the maximum physical distance between two machines in some LANs
e.g. 2.5 Km for IEEE 802.3
Only option is to partition the LAN and install bridges between segments
Reliability increases
Bridges can be inserted critical places to prevent bringing down entire system
Unlike repeaters, bridges can be programmed to exercise some discretion about what
it should forward and what it should not
Security reason
By inserting various places and being careful not to forward sensitive traffic, it is
possible to isolate parts of the network so that its traffic cannot escape and fall into the
wrong hands
2.
| U. K. Roy |
[ 10/22/08 ]
Web technology
198
Operation of a Bridge
| U. K. Roy |
[ 10/22/08 ]
Web technology
[ 10/22/08 ]
199
Web technology
200
Timer problem
faster LAN starts timer after forwarding a message to a slower LAN and
waits for the acknowledgement
timer expires before the message is delivered
source just retransmits the entire message increasing the load
| U. K. Roy |
[ 10/22/08 ]
Web technology
| U. K. Roy |
[ 10/22/08 ]
201
Web technology
202
Transparent Bridge
Features
[ 10/22/08 ]
Web technology
203
[ 10/22/08 ]
Web technology
204
Transparent Bridge
Challenges
Topology change
Station moves from one LAN to another
Attach arrival time in each entry of the lookup table
Update it with new one
Station is unplugged
Scan the lookup table periodically and drop all entries a few minutes old
Increased reliability
Problems
Cycle for ever
Solution
Spanning tree bridges
| U. K. Roy |
[ 10/22/08 ]
Web technology
205
Example
| U. K. Roy |
[ 10/22/08 ]
Web technology
| U. K. Roy |
[ 10/22/08 ]
206
Web technology
Assumption
Sender of each frame knows whether or not the destination is on its own
LAN
Every machine in the internetwork knows, or can find, the best path to
every other machine
Construction of path
Each LAN has a unique 12-bit number (LAN id)used to identify each
LAN uniquely
Each bridge has a 4-bit number(Bridge id)used to identify each bridge
in the context of its LANs
Two bridges far apart may both have same number, but two bridges
between the same two LANs must have different bridge number
| U. K. Roy |
[ 10/22/08 ]
207
Web technology
208
Construction of path(contd.)
Example
Function of bridges
A source routing bridge is only interested in those frames with high-order bit
of the destination set to 1
For each such frame, it scans the route included in the frame header looking
for the number of LAN on which the frame arrived
If the LAN number is followed by its own bridge number(i.e. the bridge is on
the path), the bridge forwards the frame onto the LAN whose number follows
its bridge number in the path
If the incoming LAN number is followed by the number of some other bridge,
it does not forward the frame
| U. K. Roy |
[ 10/22/08 ]
Web technology
209
Implementation
Software:
Bridge runs in promiscuous mode, copying all frames to its memory to see
they have the high-order destination bit set to 1. If so, frame is inspected;
otherwise not
Hybrid:
Bridges LAN interface inspects the high-order destination bit and only
accepts frames with the bit set.
easy to build into hardware and greatly reduces the number of frames the
bridge must inspect
Hardware:
Bridges LAN interface not only inspects the high-order destination bit, but it
also scans the route to see if this bridge must do forwarding
frames that must actually be forwarded are given to the bridge
requires complex hardware but wastes no CPU cycles as irrelevant frames
are screened out
| U. K. Roy |
[ 10/22/08 ]
Web technology
Discovering routes
Original source can then see the exact route taken and choose the best
route
| U. K. Roy |
[ 10/22/08 ]
210
Web technology
| U. K. Roy |
[ 10/22/08 ]
211
Web technology
212
Example
No of frames at in LAN N is 3N-1
N=13, no of frames is more than half a millioncausing congestion
Solution
When an unknown frame arrives, it is flooded, but only along spanning tree
total volume of frames is linear with the size of the network not exponential
Improvement
Once a host is discovered a route to a certain destination, it stores the route
in a cache, so that the discovery process will not have to be run next time for
this destination.
| U. K. Roy |
[ 10/22/08 ]
Web technology
Transparent Bridge
Source Routing
Bridge
Orientation
Connectionless
Connection-Oriented
Transparency
Fully Transparent
Not Transparent
Configuration
Automatic
Manual
Routing
Sub optimal
Optimal
Locating
Backward learning
Discovery frames
Failures
Handled by bridges
Handled by hosts
Complexity
In the bridges
In the hosts
| U. K. Roy |
[ 10/22/08 ]
213
Web technology
214
END
| U. K. Roy |
[ 10/22/08 ]
Web technology
215
Example
| U. K. Roy |
[ 10/22/08 ]
Web technology
216
Example
| U. K. Roy |
[ 10/22/08 ]
H IGHS PE ED
LAN S
Web technology
Motivation
218
High-Speed LANs
High-Speed LANs
FDDI (Fiber Distributed Data Interface)uses optical fiber
Fast Ethernetuses copper wire
| U. K. Roy |
[ 10/22/08 ]
Web technology
Features
219
FDDI
Topology
Ring topology
Data rate
100 Mbps
Distance
200 km
Capacity
1000 stations
Error Rate
1 out of 2.5x1010
Usage
Can be used as any of the 802 LANs
Can be used as a backbone to connect copper LANs
| U. K. Roy |
[ 10/22/08 ]
Web technology
Cabling
220
FDDI
FDDI cabling consists of two fibers one transmitting clockwise and another
transmitting anticlockwise
If one breaks, other can be used as back up.
| U. K. Roy |
[ 10/22/08 ]
Web technology
Cabling
221
FDDI
If both breaks at a point, two rings can be joined into a single ring
Each station contains relays that can be used to join two rings or bypass
the station in the event of station problem
[ 10/22/08 ]
Web technology
Frame Format
MAC Protocol
222
FDDI
Similar to 802.5
To transmit a frame, a station must capture token. Then it transmits a
frame and removes when it comes back
Difference
Mac layer in FDDI puts a new token as soon as it has finished transmitting
its frames
This is necessary to increase performance as the length of the ring could be 200
km long
[ 10/22/08 ]
Web technology
223
Fast Ethernet
Cabling
Name
Cable
Max. Segment
Advantage
100Base-T4
Twisted pair
100 m
100Base-TX
Twisted pair
100 m
100Base-F
Optical fiber
2000 m
| U. K. Roy |
[ 10/22/08 ]
N ETW ORK
S EC URITY
Web technology
225
Athentication Protocols
Authorization/Authentication
Authentication Protocol Model
An initiating user (or process/party), say, Alice wants to establish a secure
communication with a second user Bob.
Example
Bob is a banker and Alice is a customer
Alice starts out by sending a message either to Bob or to a trusted Key
Distribution Center(KDC)
Several other messages will be exchanged during the communication
As these messages are being sent, a nasty intruder, say, Trudy may
intercept, modify, or replay them in order to trick Alice and Bob or just to
gum up the works
Nevertheless, when the protocol has been completed, Alice is sure she is
talking to Bob and Bob is sure he is talking to Alice
They will establish a secret session key to encrypt messages that will be
exchanged during communication
| U. K. Roy |
[ 10/22/08 ]
Web technology
226
Assumptions:
Alice and Bob already share a secret key, KAB (A for Alice and B for Bob).
This shared key might have been agreed upon in person or in any event
not on the insecure network
A Challenge response protocol
Notation used:
A, B are identities of Alice and Bob respectively
Ris are the challenges, subscript being the challenger
Kis are keys, i indicates owner,
Ks is the session key
| U. K. Roy |
[ 10/22/08 ]
Web technology
227
RB
KAB(RB)
4
RA
KAB(RA)
A, RA
RB, KAB(RA)
Bob
Alice
Protocol
Alice
Bob
KAB(RB)
[ 10/22/08 ]
Web technology
228
Trudy
RB, KAB(RT)
3
A, RT
Bob
A, RB
RB2, KAB(RB)
5
KAB(RA)
Now Trudy has the missing information, so she can complete the first session and
abort the second one. Bob is know convinced that Trudy is Alice
| U. K. Roy |
[ 10/22/08 ]
Web technology
229
Have the initiator prove who she is before the responder has to. (In the above case,
Bob gives valuable information before Trudy has to give any evidence who she is)
Have initiator and responder use different keys for proof.(This means having two
shared keys KAB and KAB
Have the initiator and responder draw their challenges from different sets. For
example, initiator must use even number and the responder must use odd number
| U. K. Roy |
[ 10/22/08 ]
Web technology
230
Alice and Bob have to agree on two large prime numbers, n, and g, where
(n-1)/2 is also a prime number.
These number may be public.
Alice picks a large (say, 512-bit) number, x, and keeps it secret. Similarly,
Bob picks a large secret number, y.
1 n, g, gx mod n
| U. K. Roy |
gy mod n
Alice computes
(gy mod n)x =gxy
mod n
Bob
Alice
Bob computes
(gx mod n)y =gxy
mod n
[ 10/22/08 ]
Web technology
231
7, 3, 38 mod 7
2
Basic idea
310 mod 7
Alice computes
(310 mod 7)8 =380
mod 7= 2
Bob
n = 7, g = 3,
Alice picks x = 8 and Bob picks y = 10
Alice
Bob computes
(38 mod n)10 =380
mod 7 = 2
When Bob gets the first message, how does he know it is from Alice?
Trudy can exploit this fact to deceive both Alice and Bob.
| U. K. Roy |
[ 10/22/08 ]
Web technology
232
Trudy picks z, and sends message 2 to Bob, using correct g and n obtained from
message 1. She also sends message 3 back to Alice
Later, Bob sends message 4 to Alice which Trudy again intercepts and keeps.
Now everybody does the modular arithmetic. Alice computes secret key gxz mod n so
does TrudyAlice thinks she is talking to Bob, so she establishes a session key
(with Trudy). So does Bob.
Both are under illusion that they have a secure channel to each other, but actually
not
Alice
Trudy
Bob
picks x
picks z
picks y
| U. K. Roy |
gz mod n
n, g, gz mod n
4
gy mod n
Bob
n, g, gx mod n
Trudy
Alice
[ 10/22/08 ]
Web technology
233
Problems
Solution
| U. K. Roy |
[ 10/22/08 ]
Web technology
234
Alice picks a session key and tells the KDC that she wants to talk to Bob using Ks
This message is encrypted with the secret key KA Alice shares(only) with KDC
KDC decrypts this message to extract Bobs identity and session key
It then constructs a new message containing Alices identity and session key and
sends this message to Bob.
This message is encrypted with the secret key KA Alice shares(only) with KDC.
When Bob decrypts this message, he learns that Alice wants to talk to him and which
key she wants to use.
KDC
| U. K. Roy |
KB(A, KS)
Bob
A, KA(B, KS)
Alice
[ 10/22/08 ]
Web technology
235
Trudy can figure out some legitimate service she can perform for Alice, makes an
attractive offer and gets the job
After doing the work, Trudy politely requests Alice to pay by bank transfer.
Meanwhile, Trudy is back and she copies both message 2 and the message follows
it.
Bob thinks that Alice might have hired Trudy again. Bob then transfers an equal
amount of money from Alices account to Trudys account
| U. K. Roy |
KB(A, KS)
Bob
A, KA(B, KS)
KDC
Alice
[ 10/22/08 ]
Web technology
236
Problem
Clocks are never synchronized. Trudy can replay the message during this
interval and get away with it
Problems
nonces must be remembered for ever. Trudy can try a 5-year old message
Timestamps and nonces can be combined to limit how long nonces have to be
remembered
| U. K. Roy |
[ 10/22/08 ]
Web technology
237
Alice
| U. K. Roy |
RA, A, B
KS,(RA2-1), RB
KS(RB-1)
Bob
KDC
[ 10/22/08 ]
Web technology
238
1
2
EB(A, RA)
Bob
Alice
KS(RB)
When Alice gets this message, she decrypts it using her private key. She sees RA.
This message must have come from Bob since Trudy has no way of determining RA.
Furthermore, it must be fresh not a replay since she just sent it.
Bob sees RB encrypted with the session key he just generated, he knows Alice got
the message and verified RA
| U. K. Roy |
[ 10/22/08 ]
Web technology
239
Digital Signatures
| U. K. Roy |
[ 10/22/08 ]