Mode of evaluation Quiz Assignments CAT1 CAT2 Term end Text Book:Mobile communication Schiller 2ed Pearson education Computer networks A Tanenbaum 4ed Reference:wireless communications T S Rappaport 2ed pearson
Types of mobility 1)User mobility eg: vodofone service 2)Device mobility eg:mobile phones
Characteristic of communication devices Fixed & wired eg:Desktop Mobile & wireless eg:Laptop Fixed & wireless eg:wireless on historical buildings Mobile and wireless eg:GSM Applications Vehicles Emergencies Business Replacement of wired networks- sensor networks Infotainment
Mobile & wireless devices Sensors Embedded Controllers Pagers Mobile phones Personal digital assistance Pocket computers Notepad/lap tops Simple n/w & reference Model
Frequency Spectrum
Frequency Allocations(in MHz)
Signals Signals are function of time & location Carrier signals Periodic signals(sine waves)
A-amplitude F-frequency -phase swift
Time domain
Signal reconstruction by Fourier
C-determine direct current component of signal a n & b n amplitudes of nth sine & cosine functions
Frequency domain &Phase domain
M-amplitude of signal I-in phase(phase 0) Q-Quadrature(90 phase shift) Antennas It couples electromagnetic energy to and from space to and from a wire or a coaxial cable Theoretical reference : it is isotropic radiator i.e a point in a space radiating equal power in all directions Radiation pattern is symmetric in all directions Isotropic antennas does not exist in reality Real antennas exhibit directive effect(intensity is not same in all directions) Types of antennas Dipole Omni directional Directional Sectorized diversity
Dipole antennas Consist of two collinear conductors of equal length , separated by small gap
Omni directional Radiation pattern in one plane This is used to overcome environmental challenges by boosting power level of signal Challenges could be mountains, valley, building etc
Directional antennas Radiation pattern only in x-axis Special eg: Satellite dishes
Sectorized antennas Several directional antennas combined on a single pole
Diversity combining Constitutes a power of all signals to produce gain Phase is corrected to avoid cancellation
Signal propagation One can determine the behavior of a signal travelling along wire, e.g., received power depending on the length of wire For wireless ,the above prediction is valid only in vacuum Transmission Range: with this radius of the sender transmission is possible
Detection range: within a second radius , detection of transmission is possible. i.e transmitted power is large enough to differ from background noise
Interference range:background noise is added with the transmission. Path Loss of radio signals Line-of-sight Path loss in vacuum Received energy p r =1/d 2 d is distance between sender & receiver Sender in a space radiate energy in spherical shape,surface area is s=4d 2 increasing results loss Received power depends on the wavelength, gain of the receiver & transmitter antennas Penetration of signal on object depends on the frequency Lower frequency better penetration
3 fundamental behavior of radio waves Ground waves Sky waves Line of sight Ground waves(<2MHz) It follows earths surface and propagate long distance Sky waves (2-30 MHz)-(short waves) Reflected by ionosphere Line of sight (>30MHz) Follows straight line of sight No reflection in ionosphere Cable of bending due to refraction Mobile phone system, satellite system, cordless phone Additional Signal propagation effects Blocking or shadowing of radio signals due to large obstacles Reflection Refraction-bending effect of signal Scattering :size of obstacle is in order of the wavelength or less,radio waves get scattered
Diffraction: Deflection at the edge of object and propagate in different direction Multi-path propagation
Along with direct transmission from a sender to a receiver the propagation effects like scattering, reflection,difraction leads to one of the severe effect called Multi-path propagation signals travelling along different paths with different lengths arrive at the receiver at different times This effect is called delay spread Typical values for delay spread are approximately 3 s in cities, up to 12 s GSM, for example, can tolerate up to 16 s of delay spread, i.e., almost a 5 km path difference Effects of spread delay a short impulse will be smeared out into a broader impulse, or rather into several weaker impulses. Intersymbol Interference(ISI) -At the receiver, both impulses interfere, i.e., they overlap in time
Avoiding ISI Knowing the channel characteristic If sender knows the delay of different path ,it can compensate the distortion caused by the channel How? sender may first transmit a training sequence known by the receiver. The receiver then compares the received signal to the original training sequence and programs an equalizer that compensates for the distortion Fading The power of the received signal changes considerably over time
Short time fading-quick changes in the received power are called short-term fading signals may have a different phase due to different paths and cancel each other Long term fading: The average power over time, is caused by, for example, varying distance to the sender senders can compensate for long-term fading by increasing/decreasing sending power MULTIPLEXING Multiplexing describes how several users can share a medium with minimum or no interference For wireless communication, multiplexing can be carried out in four dimensions: space, time, frequency, and code Space Division Multiplexing (SDM)
Guard Space Frequency Division Multiplexing(TDM) Adjacent channel interference Guard Space
Time Division Multiplexing(TDM) Co-Channel Interference Mix of FDM & TDM
Code Division Multiplexing (CDM) Secure Codes are used Orthogonal code Guard space as codes
Modulation g(t) = A t cos(2 f t t + t ) 3 parameters A t amplitude f t frequency
t Phase Can be varied in accordance with data or another signal Digital Modulation Digital data (0 and 1) is translated into an analog signal (base band) Digital modulation is required if digital data has to be transmitted over a medium that only allows for analog transmission the binary bit-stream has to be translated into an analog signal first Three basic digital modulation Amplitude shift keying (ASK) frequency shift keying (FSK) and phase shift keying (PSK). Analog Modulation wireless transmission requires an additional modulation, an analog modulation Baseband signal is connected to radio carrier Reasons for why baseband cannot send directly Antennas Frequency Division Multiplexing Medium Characteristic (path loss, penetration of obstacles, reflection, scattering & diffraction) (short waves for handheld device, VSW for microwave & Long waves for submarines)
Block Diagram of radio transmitter and receiver
Amplitude shift keying The two binary values, 1 and 0, are represented by two different amplitudes This simple scheme only requires low bandwidth very susceptible to interference Effects like multi-path propagation, noise, or path loss heavily influence the amplitude the wired transmission scheme with the highest performance, namely optical transmission, uses ASK ASK can also be applied to wireless infra red transmission Frequency shift keying The simplest form of FSK is called binary FSK assigns one frequency f1 to the binary 1 another frequency f2 to the binary 0
How to implement to switch between two oscillators, one with the frequency f1 and the other with f2, depending on the input To avoid sudden changes in phase, continuous phase modulation (CPM) can be used demodulation is by using two bandpass filters, one for f1 the other for f2. Phase shift keying shifts in the phase of a signal to represent data shifting the phase by 180 each time the value of data changes, is also called binary PSK (BPSK) modulator could multiply a frequency f with +1 if the binary data is 1 and with 1 if the binary data is 0.
the receiver must synchronize in frequency and phase with the transmitter Compared to FSK, PSK is more resistant to interference Advanced frequency shift keying Minimum shift keying(MSK) First step: Data bit is separated into even and odd bits, Duration of each bit being doubled The scheme also uses two frequencies: f1, the lower frequency, and f2, the higher frequency, with f2 = 2f1 MSK
if the even and the odd bit are both 0, then the higher frequency f2 is inverted (i.e., f2 is used with a phase shift of 180)
if the even bit is 1, the odd bit 0, then the lower frequency f1 is inverted. This is the case, e.g., in the fifth to seventh columns
if the even bit is 0 and the odd bit is 1, as in columns 1 to 3, f1 is taken without changing the phase
if both bits are 1 then the original f2 is taken A high frequency is always chosen if even and odd bits are equal The signal is inverted if the odd bit equals 0 Advance Phase shift keying BPSK scheme only uses one possible phase shift of 180
Above figure shows BPSK in the phase domain Quadrature PSK (QPSK) coding two bits into one phase shift
phase shift can always be relative to a reference signal If this scheme is used, a phase shift of 0 means that the signal is in phase with the reference signal phase shift of 45 for the data 11 135 for 10 225 for 00 315 for 01 with all phase shifts being relative to the reference signal The transmitter selects parts of the signal as shown below and concatenates them.
To reconstruct data, the receiver has to compare the incoming signal with the reference signal One problem of this scheme involves producing a reference signal at the receiver Transmitter and receiver have to be synchronized very often differential QPSK (DQPSK) the phase shift is not relative to a reference signal but phase shift is relative to phase of the previous two bits In this case, the receiver does not need the reference signal but only compares two signals to reconstruct data quadrature amplitude modulation (QAM) The PSK scheme could be combined with ASK Here three different amplitudes and 12 angles are combined coding 4 bits per phase/amplitude change Multi-carrier modulation used in the European digital radio system DAB and the WLAN standards IEEE 802.11a and HiperLAN2 The main attraction of MCM is its good ISI mitigation property MCM splits the high bit rate stream into many lower bit rate streams , each stream being sent using an independent carrier frequency
for example, n symbols/s have to be transmitted, each subcarrier transmits n/c symbols/s with c being the number of subcarriers frequency selective fading only influences some subcarriers,and not the whole signal an additional benefit of MCM Spread spectrum techniques involve spreading the bandwidth needed to transmit data The main advantage is the resistance to narrowband interference i) shows an idealized narrowband signal from a sender of user data The sender now spreads the signal in step ii) i.e., converts the narrowband signal into a broadband signal During transmission, narrowband and broadband interference add to the signal in step iii). The sum of interference and user signal is received The receiver now knows how to despread the signal, converting the spread user signal into a narrowband signal again v) the receiver applies abandpass filter to cut off frequencies left and right of the narrowband signal Finally, the receiver can reconstruct the original data because the power level of the user signal is high enough Consider the situation shown in Figure below Six different channels use FDM for multiplexing, which means that each channel has its own narrow frequency band for transmission Depending on receiver characteristics, channels 1, 2, 5, and 6 could be received while the quality of channels 3 and 4 is too bad to reconstruct transmitted data. Narrowband interference destroys the transmission of channels 3 and 4.
How can spread spectrum help in such a situation?
narrowband signals are now spread into broadband signals using the same frequency range To separate different channels, CDM is now used instead of FDM Each channel is allotted its own code, which the receivers have to apply to recover the signal One disadvantage is the increased complexity of receivers that have to despread a signal
Direct sequence spread spectrum (DSSS) DSSS systems take a user bit stream and perform an (XOR) with a so-called chipping sequence The example shows that the result is either the sequence 0110101 if data bit is 0 its complement 1001010 (if data bit equals 1). User bit has a duration tb, the chipping sequence consists of smaller pulses, called chips, with a duration tc. spreading factor s = tb/tc determines the bandwidth original signal needs a bandwidth w then the resulting signal needs sw after spreading. civil applications use spreading factors between 10 and 100, military applications use factors of up to 10,000. Wireless LANs use, for example, the sequence 10110111000, a so-called Barker code Barker codes exhibit a good robustness against interference and insensitivity to multi- path propagation Other known Barker codes are 11, 110,1110, 11101, 1110010, and 1111100110101 DSSS transmitter
DSSS receiver
Calculating the products of chips and signal, and adding the products in an integrator is also called correlation, the device a correlator. Case If transmitter and receiver are perfectly synchronized and the signal is not too distorted by noise or multi-path propagation, DSSS works perfectly Sending the user data 01 and applying the 11-chip Barker code 10110111000 results in the spread signal 1011011100001001000111. the sum of products equal to 0 for the first bit and to 11 for the second bit The decision unit can now map the first sum (=0) to a binary 0 second sum (=11) to a binary 1 Frequency hopping spread spectrum(FHSS) the total available bandwidth is split into many channels of smaller bandwidth +guard spaces Transmitter and receiver stay on one of these channels for a certain time and then hop to another channel system implements FDM and TDM The pattern of channel usage is called the hopping sequence time spend on a channel with a certain frequency is called the dwell time FHSS comes in two variants, slow and fast hopping Slow Hopping one frequency is used for several bit periods user bits with a bit period t b
first three bits during the dwell time t d
frequency f 2 is used Then, the transmitter hops to the next frequency f 3
Fast Hopping The transmitter changes the frequency several times during the transmission of a single bit Transmitter hops three times during a bit period example of an FHSS system is Bluetooth,it performs 1,600 hops per second and uses 79 hop carriers equally spaced with 1 MHz in the 2.4 GHz ISM band. FHSS Transmitter
first step, the modulation of user data according to one of the digital-to-analog modulation schemes, e.g., FSK or BPSK,this results in a narrowband signal
next step, frequency hopping is performed, based on a hopping sequence
frequency synthesizer generating the carrier frequencies f i
A second modulation uses the modulated narrowband signal and the carrier frequency to generate a new spread signal with frequency of f i +f 0 (Zero) & f i +f 1 (one) FHSS Receiver
Medium access control -MAC Medium access control comprises all mechanisms that regulate user access to a medium using SDM, TDM, FDM, or CDM MAC algorithms which are specifically adapted to the wireless domain Which layer it belongs to?
Specialized MAC It has to differ from the MAC of wires netwoks Why? Consider CSMA / CD How it works in a wired networks? Why does this scheme fail in wireless networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send when medium is free, listen to medium if collision occurs (IEEE 802.3) Problems in wireless networks signal strength decreases with distance sender applies CS and CD, but collisions happen at receiver sender may not hear collision, i.e., CD does not work Hidden terminal: CS might not work
In wired network collision is detected at the sender. Collision detection is very difficult in wireless scenarios as the transmission power in the area of the transmitting antenna is several magnitudes higher than the receiving power. So, this very common MAC scheme from wired network fails in a wireless scenario Hidden and exposed terminals
Near and far terminals
SDMA Space Division Multiple Access (SDMA) is used for allocating a separated space to users in wireless networks. Cellular systems for mobile communications implement SDM Advantages of cellular systems with small cells Higher capacity Less transmission power Local interference only Robustness Small cells also have some disadvantages Infrastructure needed Handover needed Frequency planning
FDMA Duplex Channel (Simultaneous transmission in both direction Use two different frequencies for Uplink and Downlink This scheme is called Frequency Division Duplex (FDD)
TDMA allocate certain time slots for communication synchronization between sender and receiver has to be achieved in the time domain Fixed Pattern Dynamic
Fixed TDMA allocating a certain time slot for a channel this results in a fixed bandwidth is the typical solution for wireless phone systems each mobile station knows its turn and no interference will happen if synchronization is assured The fixed pattern can be assigned by the base station
these patterns guarantee a fixed delay one can transmit, e.g., every 10 ms as this is the case for standard DECT systems. IS-54, IS-136, GSM, DECT, PHS, and PACS uses fixed TDMA
Assigning different slots for uplink and downlink using the same frequency is called time division duplex (TDD). For eg: DECT cordless phone system, the pattern is repeated every 10 ms, i.e., each slot has a duration of 417 s repetition guarantees access to the medium every 10 ms fixed access patterns, are perfectly apt for connections with a constant data rate(Voice data) they are very inefficient for bursty data or asymmetric connections Dynamic TDMA -Classical Aloha TDM is applied without controlling access Aloha neither coordinates medium access each station can access the medium at any time without a central arbiter controlling access without coordination among the stations If two or more stations access the medium at the same time, a collision occurs and the transmitted data is destroyed Resolving this problem is left to higher layers (e.g., retransmission of data) simple Aloha works fine for a light load Classical Aloha
Slotted Aloha Aloha scheme is provided by the introduction of time slots (slotted Aloha) transmission can only start at the beginning of a time slot all senders have to be synchronized Slotted Aloha
Demand assigned multiple access Reservation mechanisms and combinations with some (fixed) TDM patterns are used a reservation period followed by a transmission period During the reservation period, stations can reserve future slots in the transmission period collisions occur during the reservation period transmission period accessed without collision demand assigned multiple access (DAMA) a scheme typical for satellite systems It is Explicit (Reservation initiated ground station )
PRMA packet reservation multiple access implicit reservation scheme Satellite broadcasts the status of each TDM slot All stations receiving this vector will then know which slot is occupied and which slot is currently free
For example, the base station broadcasts the reservation status ACDABA-F to all stations, here A to F. Reservation TDMA Fixed TDM pattern with random access N- mini slots followed by N.K data slots form a frame ,is repeated Each station is allocated with minislot ,this guarantees certain band with & delay Other station can use unused slots in round robin scheme or Aloha scheme Reservation TDMA
Multiple access with collision avoidance-Hidden Terminal Soln
Exposed Terminal Solution
State Machines-Seder & receiver
CDMA example explains the basic function of CDMA
Two senders, A and B, want to send data.
CDMA assigns the following unique and orthogonal key sequences: key Ak = 010011 for sender A, key BK = 110101 for sender B. Sender A wants to send the bit Ad = 1, sender B sends Bd = 0. To illustrate this example, let us assume that we code a binary 0 as 1, a binary 1 as +1. We can then apply the standard addition and multiplication rules.
Both senders spread their signal using their key as chipping sequence As = Ad*Ak = +1*(1, +1, 1, 1, +1, +1) = (1, +1, 1, 1, +1, +1) Bs = Bd*Bk = 1*(+1, +1, 1, +1, 1, +1) = (1, 1, +1, 1, +1, 1). Both signals are then transmitted at the same time using the same frequency,so, the signals superimpose in space C is received at a receiver: C = As + Bs = (2, 0, 0, 2, +2, 0)
The receiver now wants to receive data from sender A and, therefore, tunes in to the code of A, i.e., applies As code for despreading: C*Ak = (2, 0, 0, 2, +2, 0)*(1, +1, 1, 1, +1, +1) = 2 + 0 + 0 + 2 + 2 + 0 = 6 As the result is much larger than 0, the receiver detects a binary 1 sender B, i.e., applying Bs code gives C*Bk = (2, 0, 0, 2, +2, 0)*(+1, +1, 1, +1, 1, +1) = 2 + 0 + 0 2 2 + 0 = 6. The result is negative, so a 0 has been detected. Coding and spreading of data from sender A
Coding and spreading of data from sender B
Super Impose As+Bs
Receiver
Comparison of S/T/F/CDMA
GSM: Mobile Services GSM offers several types of connections voice connections, data connections, short message service multi-service options (combination of basic services) Three service domains Bearer Services Telematic Services Supplementary Services
GSM-PLMN transit network (PSTN, ISDN) source/ destination network TE TE bearer services R, S (U, S, R) U m
MT MS GSM ARCHITECTURE The components of the tree GSM network subsystems Radio Subsystem (RSS) consisting of the BSSs and all BSS connected MS devices . Network and Switching Subsystem (NSS) Operation Subsystem (OSS)
Radio Substation comprises all radio specific entities like the mobile stations (MS) and the base station subsystem (BSS) RSS connected to NSS via the A interface RSS connected to OSS via the O interface A intefaced is based on circuit-switched PCM-30 systems the O interface uses the Signalling System No. 7 (SS7) based on X.25 Base station subsystem (BSS) controlled by a base station controller (BSC) Functions necessary to maintain radio connections to an MS, coding/decoding of voice, and rate adaptation to/from the wireless network part
Base transceiver station (BTS): comprises all radio equipment like antennas, signal processing, amplifiers Forms a radio cell using sectorized antennas It is connected to MS via the Um interface It is connected to the BSC via the Abis interface The Um interface contains all the mechanisms necessary for wireless transmission (TDMA, FDMA etc.) Abis interface consists of 16 or 64 kbit/s connections Base station controller (BSC): manages the BTSs reserves radio frequencies, handles the handover Mobile station subscriber identity module (SIM) international mobile equipment identity (IMEI)
NSS The NSS connects the wireless network with standard public networks, performs handovers between different BSSs functions for worldwide localization of users and supports charging, accounting, and roaming The NSS consists of switches and databases Mobile services switching center (MSC): Digital ISDN switches set up connections to other MSCs and to the BSCs via the A interface Gateway MSC (GMSC) has additional connections to other fixed networks, such as PSTN and ISDN handles all signaling needed for connection setup connection release and handover of connections to other MSCs
The standard signaling system No. 7 (SS7) Features of SS7 are number portability,free phone/toll/credit calls, call forwarding etc Home location register (HLR): information, such as the mobile subscriber ISDN number (MSISDN), subscribed services Operation subsystem It contains functions for network operation and maintenance Operation and maintenance center (OMC) functions are traffic monitoring, status reports of network entities, subscriber and security management, or accounting and billing
Authentication centre (AuC): protect user identity and data transmission Contains algorithms for authentication and encryption Equipment identity register (EIR): is a database for all IMEIs it stores all device identifications registered for this network
Radio interface GSM implements SDMA,FDD, TDMA and FDMA In GSM 900, 124 channels, each 200 kHz wide, are used for FDMA GSM 1800 uses, 374 channels In GSM 900 channels 1 and 124 are not used for transmission, 32 channels are reserved for Organizational data the remaining 90 are used for customers Example GSM 900
tail are all set to 0 and used to enhance the receiver performance training sequence in the middle of a slot is used to adapt the parameters of the receiver to the current path propagation characteristics to select strongest path in multipath propagation S indicates whether the data field contains user or network control data. Localization and calling The HLR always contains information about the current location the VLR currently responsible for the MS informs the HLR about location changes MS moves into the range of a new VLR (a new location area), the HLR sends all user data needed to the new VLR Mobile station international ISDN number (MSISDN): Number consists of the country code (CC) (e.g., +49 179 1234567 with 49 for Germany), the national destination code (NDC) (i.e., the address of the network provider, e.g., 179), and the subscriber number (SN)
Mobile Terminated Call
In step 1, a user dials the phone number of a GSM subscriber (2)GSM network forwards the call setup to the Gateway MSC identifies the HLR signals the call setup to the HLR (3) requests an MSRN from the current VLR (4) receiving the MSRN (5), the HLR can determine the MSC responsible for the MS forwards this information to the GMSC (6) The GMSC can now forward the call setup request to the MSC indicated (7) MSC requests the current status of the MS from the VLR (8) BTSs of all BSSs transmit this paging signal to the MS (11) If the MS answers (12 and 13) the VLR has to perform security checks then signals to the MSC to set up a connection to the MS (steps 15 to 17). Mobile Originated Call
MS transmits a request for a new connection (1) the BSS forwards this request to the MSC (2). The MSC then checks if this user is allowed to set up a call with the requested service (3 and 4) 802.11 Wireless LAN Types Infrastructure based Ad-hoc Advantages Flexible deployment Minimal wiring difficulties More robust against disasters (earthquake etc) Historic buildings, conferences, trade shows, Disadvantages Low bandwidth compared to wired networks (1-10 Mbit/s) Proprietary solutions Need to follow wireless spectrum regulations
Comparison: infrared vs. radio transmission
Infrared uses IR diodes, diffuse light, multiple reflections (walls, furniture etc.) Advantages simple, cheap, available in many mobile devices no licenses needed simple shielding possible Disadvantages interference by sunlight, heat sources etc. many things shield or absorb IR light low bandwidth Example IrDA (Infrared Data Association) interface available everywhere Radio typically using the license free ISM band at 2.4 GHz Advantages experience from wireless WAN and mobile phones can be used coverage of larger areas possible (radio can penetrate walls, furniture etc.) Disadvantages very limited license free frequency bands shielding more difficult, interference with other electrical devices Example WaveLAN, HIPERLAN, Bluetooth Architecture of WLAN IEEE802.11
Access Points (APs) Similar to base stations in cellular networks Perform wireless-to-wired bridging Distribution System, or backbone network (typically, Ethernet) Basic Service Set (BSS) Group of communicating stations in a basic service area, similar to a cell in cellular networks Extended Service Set (ESS) All APs in ESS share the same network name, Service Set IDentifier (SSID) Architecture of Adhoc WLANS
IEEE standard 802.11 mobile terminal access point fixed terminal application TCP 802.11 PHY 802.11 MAC IP 802.3 MAC 802.3 PHY application TCP 802.3 PHY 802.3 MAC IP 802.11 MAC 802.11 PHY LLC infrastructure network LLC LLC
802.11 - Layers and functions PLCP Physical Layer Convergence Protocol clear channel assessment signal (carrier sense) PMD Physical Medium Dependent modulation, coding PHY Management channel selection, MIB Station Management coordination of all management functions PMD PLCP MAC LLC MAC Management PHY Management MAC access mechanisms, fragmentation, encryption MAC Management synchronization, roaming, MIB, power management P H Y
D L C
S t a t i o n
M a n a g e m e n t
802.11 - Physical layer 3 versions: 2 radio (typ. 2.4 GHz), 1 IR data rates 1 or 2 Mbit/s FHSS (Frequency Hopping Spread Spectrum) spreading, despreading, signal strength, typ. 1 Mbit/s min. 2.5 frequency hops/s (USA), two-level GFSK modulation DSSS (Direct Sequence Spread Spectrum) DBPSK modulation for 1 Mbit/s (Differential Binary Phase Shift Keying), DQPSK for 2 Mbit/s (Differential Quadrature PSK) preamble and header of a frame is always transmitted with 1 Mbit/s, rest of transmission 1 or 2 Mbit/s chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code) max. radiated power 1 W (USA), 100 mW (EU), min. 1mW Infrared 850-950 nm, diffuse light, typ. 10 m range carrier detection, energy detection, synchonization
FHSS PHY packet format synchronization SFD PLW PSF HEC payload PLCP preamble PLCP header 80 16 12 4 16 variable bits Synchronization synch with 010101... pattern SFD (Start Frame Delimiter) 0000110010111101 start pattern PLW (PLCP_PDU Length Word) length of payload incl. 32 bit CRC of payload, PLW < 4096 PSF (PLCP Signaling Field) data of payload (1 or 2 Mbit/s) HEC (Header Error Check) CRC with x 16 +x 12 +x 5 +1
DSSS PHY packet format synchronization SFD signal service HEC payload PLCP preamble PLCP header 128 16 8 8 16 variable bits length 16 Synchronization synch., gain setting, energy detection, frequency offset compensation SFD (Start Frame Delimiter) 1111001110100000 Signal data rate of the payload (0A: 1 Mbit/s DBPSK; 14: 2 Mbit/s DQPSK) Service Length future use, 00: 802.11 compliant length of the payload HEC (Header Error Check) protection of signal, service and length, x 16 +x 12 +x 5 +1
802.11 - MAC layer I - DFWMAC Traffic services Asynchronous Data Service (mandatory) exchange of data packets based on best-effort support of broadcast and multicast Time-Bounded Service (optional) implemented using PCF (Point Coordination Function) Access methods DFWMAC-DCF CSMA/CA (mandatory) collision avoidance via randomized back-off mechanism minimum distance between consecutive packets ACK packet for acknowledgements (not for broadcasts) DFWMAC-DCF w/ RTS/CTS (optional) Distributed Foundation Wireless MAC avoids hidden terminal problem DFWMAC- PCF (optional) access point polls terminals according to a list
802.11 - MAC layer II Priorities defined through different inter frame spaces no guaranteed, hard priorities SIFS (Short Inter Frame Spacing) highest priority, for ACK, CTS, polling response PIFS (PCF IFS) medium priority, for time-bounded service using PCF DIFS (DCF, Distributed Coordination Function IFS) lowest priority, for asynchronous data service t medium busy SIFS PIFS DIFS DIFS next frame contention direct access if medium is free DIFS 802.11 MAC The basic services provided by the MAC layer are the mandatory asynchronous data service and an optional time-bounded service. 802.11 only offers the asynchronous service in ad-hoc network both service types can be offered using an infrastructure-based network the access point coordinates medium access three basic access mechanisms 1. Basic method based on a version of CSMA/CA 2. Method avoiding the hidden terminal problem 3. Contention free polling method for time- bounded service The first two methods are also summarized as distributed coordination function (DCF) the third method is called point coordination function (PCF) The MAC mechanisms are also called distributed foundation wireless medium access control (DFWMAC).
Medium access and inter-frame spacing Short inter-frame spacing (SIFS): The shortest waiting time for medium access (so the highest priority) is defined for short control messages, such as acknowledgements of data packets or polling responses .eg. For DSSS SIFS is 10 s and for FHSS it is 28 s
PCF inter-frame spacing (PIFS): A waiting time between DIFS and SIFS (and thus a medium priority) is used for a time- bounded service.AP during polling the nodes wait PIFS
DCF inter-frame spacing (DIFS): This parameter denotes the longest waiting time and has the lowest priority for medium access. Basic DFWMAC-DCF using CSMA/CA a random access scheme with carrier sense collision avoidance through random back off
Mechanism If the medium is idle for at least the duration of DIFS , a node can access the medium at once. Results in less delay under light load if many nodes try additional mechanism is needed
Many node are tying to access medium If the medium is busy, nodes have to wait for the duration of DIFS then enter in to contention phase After this each node chooses a random back off time The node continues to sense the medium If again the medium is busy ,he lost his cycle and has to wait for next chance If the waiting time for a node is over and the medium is still idle, the node can access the medium immediately To provide fairness, IEEE 802.11 adds a backoff timer. each node selects a random waiting time, If a certain station does not get access it stops its backoff timer , starts the counter again in next cycle.
five stations trying to send a packet at the marked points in time Station3 has the first request to send a packet The station senses the medium, waits for DIFS and accesses the medium, i.e.,sends the packet Station1, station2, and station5 have to wait at least until the medium is idle for DIFS again after station3 has stopped sending. Now all three stations choose a backoff time within the contention window While above process describes the complete access mechanism for broadcast frames, additional feature is provided by the standard for unicast data transfer In unicast the receiver answers directly with an acknowledgement (ACK) receiver accesses the medium after waiting for a duration of SIFS
DFWMAC-DCF with RTS/CTS extension 802.11 node has to implement the functions to react on reception of RTS/CTS control packets
The RTS packet includes the receiver and the duration of the whole data transmission(Data + Ack time) Every node receiving this RTS, set its net allocation vector (NAV Which specifies the earliest point at which the station can try to access the medium again. Reciever answers with a CTS after waiting SIF all stations receiving CTS adjust their NAV fragmentation mode bit error rates in transmission that are typically several orders of magnitude higher than, e.g., fiber optics Probability of error is high in longer frames So the frames are fragmented in to small fragments which reduces the frame error rate First fragments contains the duration of the next fragment with ack time So the other nodes can update the NAV
DFWMAC PCF with polling (almost never used) The two previous methods cannot guarantee a maximum delay or minimum bandwidth PCF provides time-bounded service It requires an access point that control medium access and polls the single nodes Ad Hoc network cant use this function so it provides only best-effort service The point coordinator in the access point splits the access time into super frame periods. A super frame comprises an contention-free period and a contention period If only PCF is used and polling is distributed evenly, the bandwidth is also distributed evenly static centrally controlled TDMA with TDD transmission Much overhead if nodes have nothing to send.
t stations NAV wireless stations point coordinator D 3
NAV PIFS D 4
U 4
SIFS SIFS CF end
contention period contention free period t 2 t 3 t 4
PIFS stations NAV wireless stations point coordinator D 1
U 1
SIFS NAV SIFS D 2
U 2
SIFS SIFS SuperFrame t 0
medium busy t 1
802.11 - Frame format Types: control frames, management frames, data frames Sequence numbers important against duplicated frames due to lost ACKs Addresses receiver, transmitter (physical), BSS identifier, sender/receiver (logical) Miscellaneous Duration (to set the NAV), checksum, frame control, data
Frame Control Duration/ ID Address 1 Address 2 Address 3 Sequence Control Address 4 Data CRC 2 2 6 6 6 6 2 4 0-2312 bytes Protocol version Type Subtype To DS More Frag Retry Power Mgmt More Data WEP 2 2 4 1 From DS 1 Order bits 1 1 1 1 1 1 Frame Control Protocol version: 2 bits Type (management 00, control 01, data 10) Subtype (e.g. Management- association 0000, beacon 100 Control RTS 1011, CTS 1100) More fragments: 1 if another fragment to follow Retry: 1 if retransmission of an earlier frame Power Management: 1 if the station will go to power save mode More Data: A sender has more data to send Wired Equivalent Privacy (WEP): Standard security mechanism applied Order: frame must be processed in strict order Frame Control Duration/ ID Address 1 Address 2 Address 3 Sequence Control Address 4 Data CRC 2 2 6 6 6 6 2 4 0-2312 bytes Protocol version Type Subtype To DS More Frag Retry Power Mgmt More Data WEP 2 2 4 1 From DS 1 Order bits 1 1 1 1 1 1 MAC address format
scenario to DS from DS address 1 address 2 address 3 address 4 ad-hoc network 0 0 DA SA BSSID - infrastructure network, from AP 0 1 DA BSSID SA - infrastructure network, to AP 1 0 BSSID SA DA - infrastructure network, within DS 1 1 RA TA DA SA
DS: Distribution System AP: Access Point DA: Destination Address SA: Source Address BSSID: Basic Service Set Identifier RA: Receiver Address TA: Transmitter Address Network Protocols/Mobile IP Motivation for Mobile IP Transparency mobile end-systems keep their IP address continuation of communication after interruption of link possible point of connection to the fixed network can be changed Compatibility support of the same layer 2 protocols as IP no changes to current end-systems and routers required mobile end-systems can communicate with fixed systems Security authentication of all registration messages Efficiency and scalability only little additional messages to the mobile system required (connection typically via a low bandwidth radio link) world-wide support of a large number of mobile systems in the whole Internet Terminology
Mobile Node (MN) system (node) that can change the point of connection to the network without changing its IP address Home Agent (HA) system in the home network of the MN, typically a router registers the location of the MN, tunnels IP datagrams to the COA Foreign Network :is current subnet of the MN visits and which s not a home network Foreign Agent (FA) system in the current foreign network of the MN, typically a router forwards the tunneled datagrams to the MN, typically also the default router for the MN Care-of Address (COA) address of the current tunnel end-point for the MN (at FA or MN) actual location of the MN from an IP point of view can be chosen, e.g., via DHCP Correspondent Node (CN) communication partner IP packet Delivery
CN router HA router FA Internet router 1. 2. 3. home network MN foreign network 4. CN router HA router FA Internet router home network MN foreign network COA
Network integration Agent Advertisement HA and FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in the home or a foreign network (standard case for home network) MN reads a COA from the FA advertisement messages Registration (always limited lifetime!) MN signals COA to the HA via the FA, HA acknowledges via FA to MN these actions have to be secured by authentication Advertisement HA advertises the IP address of the MN (as for fixed systems), i.e. standard routing information routers adjust their entries, these are stable for a longer time (HA responsible for a MN over a longer period of time) packets to the MN are sent to the HA, independent of changes in COA/FA
type = 16 length = 6 + 4 * #COAs R: registration required B: busy, no more registrations H: home agent F: foreign agent M: minimal encapsulation G: GRE encapsulation r: =0, ignored (former Van Jacobson compression) T: FA supports reverse tunneling reserved: =0, ignored Agent advertisement preference level 1 router address 1 #addresses type addr. size lifetime checksum COA 1 COA 2 type = 16 sequence number length 0 7 8 15 16 31 24 23 code preference level 2 router address 2 . . . registration lifetime . . . R B H F M G r reserved T ICMP part: Type -9 Code: 0(non mobile nodes) 16 for mobile traffic #address:no of addresses
Registration t MN HA t MN FA HA
Mobile IP registration request home agent home address type = 1 lifetime 0 7 8 15 16 31 24 23 T x identification COA extensions . . . S B D M G r S: simultaneous bindings B: broadcast datagrams D: decapsulation by MN M mininal encapsulation G: GRE encapsulation r: =0, ignored T: reverse tunneling requested x: =0, ignored
Mobile IP registration reply home agent home address type = 3 lifetime 0 7 8 15 16 31 code identification extensions . . . Example codes: registration successful 0 registration accepted 1 registration accepted, but simultaneous mobility bindings unsupported registration denied by FA 65 administratively prohibited 66 insufficient resources 67 mobile node failed authentication 68 home agent failed authentication 69 requested Lifetime too long registration denied by HA 129 administratively prohibited 131 mobile node failed authentication 133 registration Identification mismatch 135 too many simultaneous mobility bindings Encapsulation original IP header original data new data new IP header outer header inner header original data Encapsulation I Encapsulation of one packet into another as payload IP-in-IP-encapsulation, minimal encapsulation GRE (Generic Routing encapsulation) IP-in-IP-encapsulation (mandatory, RFC 2003) tunnel between HA and COA length DS (TOS) ver. IHL Care-of address COA IP address of HA TTL IP identification IP-in-IP IP checksum flags fragment offset IP address of MN IP address of CN TTL IP identification lay. 4 prot. IP checksum flags fragment offset length DS (TOS) ver. IHL TCP/UDP/ ... payload Ver-IP version 4 IHL-internet header length denotes length of the outer header DS(TOS)-just copied form the inner header Length covers the complete encapsulated packet TTL no special meaning IP-in-IP denotes the type of encapsulation IP address of HA(tunnel entry address) COA (tunnel exit point) Encapsulation II Minimal encapsulation (optional) avoids repetition of identical fields e.g. TTL, IHL, version, DS (RFC 2474, old: TOS) only applicable for non fragmented packets, no space left for fragment identification care-of address COA IP address of HA TTL IP identification min. encap. IP checksum flags fragment offset length DS (TOS) ver. IHL IP address of MN original sender IP address (if S=1) S lay. 4 protoc. IP checksum TCP/UDP/ ... payload reserved Generic Routing Encapsulation The previous two encapsulation works only for IP. The GRE allows encapsulation of packets of one protocol suit into payload of a packet of another protocol suite
original header original data new data new header outer header GRE header original data original header Generic Routing Encapsulation Care-of address COA IP address of HA TTL IP identification GRE IP checksum flags fragment offset length DS (TOS) ver. IHL IP address of MN IP address of CN TTL IP identification lay. 4 prot. IP checksum flags fragment offset length DS (TOS) ver. IHL TCP/UDP/ ... payload routing (optional) sequence number (optional) key (optional) offset (optional) checksum (optional) protocol rec. rsv. ver. C R K S s RFC 1701 Optimization of packet forwarding Problem: Triangular Routing sender sends all packets via HA to MN higher latency and network load Solutions sender learns the current location of MN direct tunneling to this location HA informs a sender about the location of MN big security problems! Change of FA packets on-the-fly during the change can be lost new FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA this information also enables the old FA to release resources for the MN Binding Request: Any node needs the location of MN can send binding request to the HA.If MN allows HA can reveal the location by sending binding update
Binding Update: send by HA to CN.It contains the fixed IP address of the MN and the COA.It can request the ack.
Binding Acknowledgement: on receiving binding update node replies with ack
Binding Warning: If a node decapsulates a packet for an MN,but it is not the current FA for this MN,This node sends a binding warning Change of foreign agent CN HA FA old FA new MN MN changes location t Data Data Data Update ACK Data Data Registration Update ACK Data Data Data Warning Request Update ACK Data Data Reverse tunneling (RFC 3024, was: 2344) Internet receiver FA HA MN home network foreign network sender 3 2 1 1. MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver (standard case) CN Firewalls: Multicast:foreign network cannot transmit multi cast packets in a way like the home network does TTL:TTL might be low enough so that no packet is transmitted outside a certain region. DHCP: Dynamic Host Configuration Protocol Application simplification of installation and maintenance of networked computers supplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default router etc. enables automatic integration of systems into an Intranet or the Internet, can be used to acquire a COA for Mobile IP Client/Server-Model the client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay) client relay client server DHCPDISCOVER DHCPDISCOVER DHCP - protocol mechanisms server (not selected) client server (selected) initialization collection of replies selection of configuration initialization completed release confirmation of configuration delete context determine the configuration DHCPDISCOVER DHCPOFFER DHCPREQUEST (reject) DHCPACK DHCPRELEASE DHCPDISCOVER DHCPOFFER DHCPREQUEST (options) determine the configuration