SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
© Peter R. Egli 2015
1/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
Peter R. Egli
INDIGOO.COM
OVERVIEW OF TECHNOLOGIES AND PROTOCOLS FOR
MOBILE AND WIRELESS NETWORKS
MOBILE & WIRELESS
NETWORKS
© Peter R. Egli 2015
2/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
Contents
1. Wireless technologies overview
2. Radio technology
3. Radio technology problems
4. 802.11 WLAN Wireless LAN
5. Public mobile networks
6. Satellite Internet Access
7. Wireless mobility
8. Mobile IP RFC2002
© Peter R. Egli 2015
3/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
1. Wireless technologies overview (1/5)
Name Standard F-Spectrum Data rate Range Power cons. Applications / comments
WiMAX
IEEE
802.16a, d Div. 75Mbps 6km High Mobile MAN (users w ith PDAs, nomads). Will probably be supplanted by LTE.
WRAN
IEEE
802.22
54MHz -
862MHz
4.54 to 22.69
Mbit/s <30km High
WRAN is a new w orking group in IEEE for using TV frequency for broadband
access (w hite space spectrum). Work in progress.
WiBro
IEEE
802.16e 2.3GHz 1Mbps <=1km Low South Korean competitor to WiMAX. Mobile (60km/h moving mobile devices).
GSM (2G) Div. 850/1800/1900 14.4Kbps 15km Low 2nd generation mobile telephony technology.
CDMA (2G) Div. N/A 2Mbps 15km Low G2 technology used in US and other countries (competitor to GSM).
EDGE (2.5G) N/A
850/1800/1900
Mhz 384Kbps 15km Low
Enhanced Data rates for GSM Evolution (2.5G); technology betw een G2 (GSM) and
UMTS (G3).
EUCH (2.5G) N/A N/A N/A N/A N/A Enhanced Uplink Channel.
CDMA2000 (3G) N/A N/A 144Kbps N/A N/A Competitor to UMTS
UMTS (3G) Div. N/A 2Mbps 15km Low Would-be successor to GSM. Slow adoption rate, but picking up speed.
EV-DO (3.5G) N/A N/A
3.1M bps down
1.8M bps up N/A N/A Enhancement of CDMA2000, competes w ith HSDPA (counterpart in UMTS family).
HSDPA (3.5G) Div. N/A <20Mbps N/A N/A High Speed Dow nlink Packet Access.
LTE (3.9G/4G) 3GPP LTE
Candidate:
2.6GHz
160 Mbit/s (DL)
54Mbit/s (UL) <30km N/A
4G technology, potential successor to UMTS. Based on TCP/IP, no TDM. Low latency
(<5ms) for IP packets.
iMode N/A N/A N/A N/A Low Japanese packet service for mobile devices (GPRS).
VSAT N/A N/A
~0.5Mbps
duplex 3000km High Very small aperture Satellite
TETRAPOL ETSI N/A N/A N/A N/A Voice and data radio technology for public services (police etc.).
© Peter R. Egli 2015
4/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
1. Wireless technologies overview (2/5)
Name Standard F-Spectrum Data rate Range Pow er cons. Applications / comments
DECT ETSI 1800-1900MHz 552Kbps 100m
Low (by
design) Digital Enhanced Cordless Telephony. TDMA. Well established
WLL N/A N/A N/A N/A High Wireless Local Loop.
IrDA IrDA Visible light 1.6Mbps 8m Low Infrared; transmission needs line of sight. Mostly used for remote controls.
BlueTooth BlueTooth 2.45MHz ISM 1Mbps 30m Medium Consumer market (mice, PDAs, keyboards). Pretty complex technology.
WiBree WiBree / BT 2.45MHz ISM 1Mbps 10m Very low
Derived from Bluetooth; targets very low pow er applications. Integrated in bluetooth
standard in 2007 as ULP (Ultra Low Pow er). Apps: consumer, medical, sports &
w ellnes (w atches etc.).
ANT+
Proprietary
(Dynastream) 2.4GHz <57Kbps 30m Very low
See w w w .thisisant.com. Ultra low pow er radio technology for w atches,
sensors etc.
UWB IEEE 802.15.3a
3.1-10.6 GHz
(US)
24GHz (China) <480Mbps 10m N/A Ultra Wide Band. Very high BW for PANs. Discontinued in 2006.
WHDI WHDI 1.0 5GHz <3Gbps 30m High? Home entertainment. Industry initiative (Sony et.al.). Competitor of WirelessHD.
WiGig
IEEE
802.11MAC
1.0 WiGig 2.4/5/60GHz <7Gbps N/A High?
Home entertainment. Industry initiative by HW vendors (Atheros, Nokia et.al.).
Competitor of WirelessHD.
Uses 802.11 MAC for compatibility.
Wireless USB CWUSB <8m <480Mbps 10m N/A Based on UWB radio technology; USB cable replacement.
WirelessHD
WirelessHD 1.0,
IEEE 802.15.3c 57-64GHz 3GBbps 10m N/A Wireless PHY and MAC layer for use in HD WVAN (Wireless Video Are Netw ork)
HomeRF N/A 2.45MHz ISM 20Mbps 150m N/A Was competitor to 802.11. Now defunct
WLAN IEEE 802.11a 5GHz <54Mbps 100m High First 802.11 Phy standard.
WLAN IEEE 802.11b 2.45MHz ISM <11Mbps 100m High Low cost variant of 802.11; in w idespread use.
WLAN IEEE 802.11g 2.45MHz ISM <54Mbps 100m High To supplant 802.11b.
WLAN IEEE 802.11n 2.45MHz ISM 100-200Mbps 100m High High data rates w ith MIMO technology.
WLAN IEEE 802.11ac 5GHz <1Gbps N/A High Enhancement to 802.11n w ith higher throughput. Standard in progress.
WLAN IEEE 802.11ad 60GHz <7Gbps <10m High Forthcoming standard, possibly based on Wigig standard.
HiperLAN2 HiperLAN 5GHz 54Mbps 100m High European competitor to 802.11
WirelessHD
WirelessHD 1.0,
IEEE 802.15.3c 57-64GHz 3GBbps 10m N/A Wireless PHY and MAC layer for use in HD WVAN (Wireless Video Are Netw ork)
© Peter R. Egli 2015
5/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
1. Wireless technologies overview (3/5)
Name Standard F-Spectrum Data rate Range Power cons. Applications / comments
RFID
EPCglobal Gen2
ISO/IEC 18000
Div. (13.56MHz,
135kHz,
2.45GHz, 860
MHz to 960
MHz , 433MHz) 100KBit/s 1m Zero
Radio Frequency ID tags; w ireless access to serial numbers etc.; very low
bandw idth and distances. Huge market in the offing.
NFC
ISO/IEC 18092
ECMA 340
ETSI TS 102
190 13.56MHz < 212KBit/s 0 - 20cm Pass. & Act. Near Field Communication.
Transferjet
ECMA 398,
ISO/IEC 17568 4.48GHz 375 Mbps <10cm N/A Low proximity high throughput technology.
ZigBee
IEEE 802.15.4,
ZigBee
standard
2.45GHz
868MHz (Eu)
915MHz (US) 128KBit/s 100m
Low (by
design)
Control and monitoring (sensors). Aimed at applications w here BlueTooth is too
complex and has too much pow er consumption. Requires certification.
MiWi
IEEE 802.15.4,
MiWi 2.45GHz ISM 128KBit/s 100m
Low (by
design)
ZigBee alternative from Microchip. Uses IEEE 802.15.4 radio; low cost (licenses!)
alternative to ZigBee. No certification required.
Wireless Body
Area Networks IEEE 802.15.6
ISM bands.
Low band:
3.5GHz-4.5GHz
High band:
6.5GHz-9.9GHz <10MBit/s
<3m (low data
rate) Extremely low
Wireless Body Area Netw ork (BAN) standard. Hub and spoke netw ork topologies.
Target applications: Medical (transceiver close to human body).
Short-Range
Wireless
Optical
Communication IEEE 802.15.7
Visible light
(380 - 780nm)
Low rate:
<266KBit/s
High rate:
<96MBit/s A few meters Low Applications w ith increased EMC immunity requirements. Traffic signal to vehicle etc.
© Peter R. Egli 2015
6/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
1. Wireless technologies overview (4/5)
Name Standard F-Spectrum Data rate Range Power cons. Applications / comments
Wireless-M-
Bus
EN13757-4,
EN13757-3 868MHz 16.4KBit/s 15m-25m Low Wireless electrical pow er meter connectivity. Wireless version of M-Bus.
io-homecontrol io-homecontrol 868MHz N/A N/A Low Home automation (light, roller shutter etc.)
Z-Wave
Z-Wave
Alliance
908.42Mhz
(US)
868MHz (Eu)
9.6KBit/s -
100KBit/s 100m
Low (by
design)
Home appliances, sensors. Designed for robustness (crow ded frequency bands).
MAC and PHY layers standardized by ITU-T (G.9959).
NanoNet Proprietary 2.45GHz ISM N/A N/A N/A w w w .nanotron.com
enOcean
ISO/IEC
14543-3-10
315MHz (US),
868MHz,
902MHz 120KBit/s N/A
None (energy
harvesting) No pow er sensors (energy harvesting).
DASH7
ISO/IEC 18000-
7 433MHz 200 kbit/s 1000m Low RFID technology for w orldw ide conformance and interoperability.
Wireless HART IEC EN 62591 2.4GHz 250 kbits/s
30m (indoor)
100m (outdoor) See 802.15.4 Based on IEEE 802.15.4 MAC
SigFox
ETSI GS LTN
003
868MHz (Eu)
902MHz (US) 10b/s to 1kb/s Up to 40km Very low
LPWAN: Wireless technology for IoT sensor netw orks (alternative to costly 3G, 4G
netw orks).
LoRaWAN Proprietary 868MHz 10b/s to 10kb/s Up to 40km Very low
LPWAN: Wireless technology for IoT sensor netw orks (alternative to costly 3G, 4G
netw orks).
Weightless-W Proprietary
54MHZ -
862MHz
(TVWS) N/A Long range High TV Whitespace technology (TVWS).
Weightless-N Proprietary
868MHz (Eu)
900MHz (US) 10b/s to 10kb/s Up to 40km Very low
LPWAN: Wireless technology for IoT sensor netw orks (alternative to costly 3G, 4G
netw orks) developed from Weightless-W to better suit requirements of IoT.
RPMA Proprietary 2.4GHz ISM N/A <30km Very low LPWAN technology by OnRamp Wireless.
© Peter R. Egli 2015
7/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
WANMANLAN
PAN /
HAN
Range [km]
Bandwidth [Mb/s]
0.0001 0.001 0.01 0.1 1 10 100
1. Wireless technologies overview (5/5)
10
0.01
0.001
0.1
1
100
1000
IEEE 802.15.3a UWB
WPAN
110-480Mb/s
10m IEEE 802.16 WiMAX
WMAN
75Mb/s
1-6km
>>100 users
IEEE 802.11b WLAN/WiFi
54Mb/s (802.11a)
5Mb/s (802.11b)
30Mbps (802.11g)
500Mbps (802.11n)
100m
~100 users
HomeRF
<20Mbps
<150m
RFID
~0B/s
<1m
VSAT
Satellite
Kb/s…Mb/s
>300km
IEEE 802.22
WRAN
GSM (2G, HSCSD)
GPRS (2.5G)
CDMA
10Kb/s
15km
CDMA2000
EDGE (2.75G) 384KBps
UMTS (3G)
HSDPA (3.5G)
2Mbps / 15km
IEEE 802.15.1 BlueTooth
WPAN
723Kb/s
10m
IEEE 802.15.4 / ZigBee
WPAN / HAN
128Kb/s
100m
DECT
TDMA
552Kb/s
PAN: Personal Area Network
HAN: Home Area Network
LAN: Local Area Network
MAN: Metropolitan Area Network
WAN: Wide Area Network
© Peter R. Egli 2015
8/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
2. Radio technology
 Technological drivers of radio technology:
1. Hardware: Better batteries, less power consumption, processors with higher performance.
2. Link: Better / more sophisticated antennas, modulation and coding; DSPs with higher perf.
3. Network: Mobility support; dynamic resource allocation.
4. Application: Adaptive QoS (Quality of Service).
And: Radio is more and more becoming a software technology (DSP, protocols).
 Reuse of spectrum through spread-spectrum:
Despite the trend that newer technologies use higher frequencies, radio bandwidth remains
limited.
Spread spectrum is a technology used to distribute the signal over a wide frequency range.
Spread spectrum makes the signal less susceptive to interference and noise.
Original signal The signal is „spread“ over the
frequency spectrum.
The spread signal is immune against
a jamming signal.
The signal interferes less with other
signals due to lower power level.
The receiver reconstructs signal.
© Peter R. Egli 2015
9/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
3. Radio technology problems (1/2)
Radio networks differ from wired networks in a number of aspects. Wireless protocols on
layer 1 (physical) and 2 (data link) have to be augmented with the necessary functions to
address these issues.
1. Hidden station problem:
A wireless station STA3 does not „hear“ STA1 (hidden station). Both STA1 and STA3 may start
sending at the same time thus causing contention at STA2.
2. Eavesdropping:
Wireless networks are inherently open to eavesdropping. This means that wireless networks
need protection (strong encryption) right from the start.
3. Reliability of wireless connections:
Wireless networks suffer from interference, reflections, dropouts etc. Thus wireless
connections are less reliable. New (wireless) routing protocols can be used to provide
multipath routing for better reliability.
STA3STA1 STA2
© Peter R. Egli 2015
10/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
3. Radio technology problems (2/2)
4. Power consumption of wireless devices:
Wireless devices inherently suffer from a power problem (wireless = mobile = runs-on-
battery). Often wireless technologies (ZigBee 802.15.4, DECT, GSM) are targeted at low power
applications. Other technologies like 802.11 or WiMAX 802.16 are not particularly suited for
low-power applications.
Usually a greater distance between the antennas requires more transmission power and thus
increases the power consumption.
5. Limited bandwidth, need for frequency licensing:
Every country has its own frequency plan that regulates the use or licensing of radio
frequencies. Obtaining a license is costly, thus the number of frequency license holders is
limited.
In order to allow the use of certain frequencies without a costly and time consuming licensing
process, most countries allow using the frequencies in the ISM (Industrial, Science, Medical)
bands as defined by ITU-R (International Telecommunication Union – Radio).
In recent years a number of new radio technologies emerged as a consequence of advances
in technology (cheaper hardware, new modulation technologies etc.).
Naturally many of these technologies (WLAN, Bluetooth, Zigbee) use the (unlicensed) ISM
bands. This in turn means that interferences between different senders become a problem.
© Peter R. Egli 2015
11/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
4. 802.11 WLAN Wireless LAN (1/10)
WLAN technology:
 802.11 networks use free frequency bands (ISM: Industrial, Science, Medical). Thus everybody can
run 802.11 devices without licensing a frequency band.
 Different 802.11 standards:
802.11a: 6, 9, 12, 18, 24, 36, 48, 54 Mbps (5 GHz band).
802.11b: Up to 11Mbps, simple (cheap) technology.
802.11g: Up to 54Mbps.
802.11n: <600Mbps (MIMO=Multiple In Multiple Out antenna technology, uses multi-path
transmission for better signal recovery at the receiver).
802.11ac: Forthcoming standard for higher throughput (802.11n enhancements) using
3-8 spatial streams with beam forming.
802.11ad: Standard in progress by WiGig consortium, even higher throughput (<7Gpbs).
802.11ad is targeted at bridging short distances with wireless links, e.g. in data
centers (5-10m).
 802.11 Pros and Cons:
Mobility
Flexible configuration
Relatively cheap
Weak security (WEP Wired Equivalent Protection, but fixed with WPA Wired Protection Access)
Relatively low bandwidth for data (compared to wired networks)
Electromagnetic interference with other devices (Bluetooth)
Simple installation, but high skills needed for exploitation of full potential of technology
© Peter R. Egli 2015
12/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
Ad-hoc mode:
No access points; STAs communicate
directly with each other.
IBSS:
Independent Basic Service Set
DS: Distribution System (wired LAN)
BSS: Basic Service Set (Single cell)
AP: Access Points
Infrastructure mode:
Usage of access points interconnected with wired
LAN.
ESS: Extended Service Set (Multiple cells)
4. 802.11 WLAN Wireless LAN (2/10)
Operation modes of 802.11:
Handover
STA (STAtion)
STA (STAtion)
© Peter R. Egli 2015
13/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
4. 802.11 WLAN Wireless LAN (3/10)
802.11 protocol stack:
802.11 Physical layer:
The physical layer is concerned with modulation / demodulation. The different WLAN standards
use different modulation techniques (OFDM, DSSS, QAM).
802.11 MAC:
The MAC layer controls the media access (see below).
LLC:
LLC (Logical Link Control) is not part of the WLAN stack, but is often used to provide a generic
access layer to the lower (link) layers.
802.11 MAC
802.11a OFDM
5GHz, <54Mbps
IP (Internet Protocol)
802.11b DSSS
2.4GHz, <11Mbps
802.11g OFDM&DSSS
5GHz, <54Mbps
802.11
PHYs
LLC
802.11
WLAN
stack
802.11n OFDM
2.4/5GHz, <600Mbps
802.11ac 256QAM
5GHz, 1Gbps
Draft standard
802.11ad WiGig
60GHz, <7Gbps
Draft standard
© Peter R. Egli 2015
14/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
4. 802.11 WLAN Wireless LAN (4/10)
802.11 frame structure:
The 802.11 frame structure depends on the frame type (see below).
The general 802.11 frame structure looks as follows:
2 2 6 x
PV
To
DS
From
DS
More
frag.
Retry Power
mgt.
More
data WEP Order
FC Dur Address Type specific fields
Field length
(bytes)
Type Sub-type
0=Management
1=Control
2=Data
Dur: Time in microseconds that the sender needs for sending the frame.
Address: Receiver’s MAC address
DS: Distribution System
(wired or wireless „backbone“ of WLAN)
FC: Frame Control
Management: Beacon, Probe etc. (see below)
Control: RTS, CTS, Ack
Data: No subtypes (always =0)
Protocol
version=0
0 for management
and control frames;
Set for data frames
(see below)
More frag.: 1 indicates that this is a fragmentation frame
Retry: Set to 1 if this is a retransmission frame
Power mgt: Power management bit
More data: Indicates that >= frames are available.
Used for power management.
WEP: WEP bit; obsolete (WEP replaced by WPA2).
Order: Set to 1 if strict ordering of frames is used.
© Peter R. Egli 2015
15/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
4. 802.11 WLAN Wireless LAN (5/10)
802.11 frame types (1/3):
1. Management frame:
Management frames are used to establish and maintain communication.
Management frame structure:
Management frame suptypes:
The management frames are basically used for associating a STA to an AP (procedure see
below).
a. Authentication frame: Basic authentication, e.g. based on MAC-address.
b. Deauthentication frame STA sends deathentication frame to terminate communication.
c. Association request frame STA requests AP to allocate resources for communication.
d. Association response frame Response of an AP to an association request.
e. Reassociation request frame Sent by STA when it roams to another AP.
f. Reassociation response frame Response from the new AP to the reassociation request.
g. Disassociation frame STA requests disassociation from AP.
h. Beacon frame AP periodically sends beacon frames with its identity.
i. Probe request frame When the STA is not associated to an AP, it sends probe request
frames.
j. Probe response frame Reponse from an AP to a probe request frame.
2 2 6 6 6 x2
FC Len Address 1 SeqAddress 2 Address 3 Mgt. info
© Peter R. Egli 2015
16/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
4. 802.11 WLAN Wireless LAN (6/10)
802.11 frame types (2/3):
2. Control frame:
Control frames are optional and are used for assisting in the delivery of data frames
between stations.
Control frames are used in a handshake procedure in the CSMA/CA protocol (see below).
Control frame structure:
2 2 6 6
FC Len Rx address Tx address RTS (Request To Send) frame
2 2 6
FC Len Rx address CTS (Clear To Send) frame
2 2 6
FC Len Rx address Ack frame
Rx: Receiver
Tx: Transmitter
© Peter R. Egli 2015
17/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
4. 802.11 WLAN Wireless LAN (7/10)
802.11 frame types (3/3):
3. Data frame:
Data frames carry user data. Data frames are acknowledged and retransmitted if they are lost.
Data frame structure:
Data frame addresses and DS bits:
Since data frames may be transported between APs over a wired distribution system, 2
additional MAC addresses are required in the WLAN frame header.
The DS bits indicate the meaning of the different addresses fields as follows:
Destination = MAC address of final destination node.
Source = MAC address of original sending node.
Sender & receiver: Sending and receiving AP’s MAC addresses.
To DS From DS Addr. 1 Addr. 2 Addr. 3 Addr. 4
0 0 Dest. Source BSSID N/A
0 1 Dest. BSSID Source N/A
1 0 BSSID Source Dest. N/A
1 1 Receiver Sender Dest. Source
Client to Client
AP to Client
Client to AP
AP to AP
2 2 6 6 6 x2
FC Len Address 1 SeqAddress 2 Address 3 Optional field
x
Payload
WEP parameters (4 bytes) if data is WEP-protected.
Address 4 (6 bytes) if frame is an APAP frame.
APSTA AP STA
© Peter R. Egli 2015
18/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
4. 802.11 WLAN Wireless LAN (8/10)
802.11 MAC (Media Access Control) differs from 802.3 (Ethernet) MAC:
802.3 Ethernet MAC uses CSMA/CD Collision Detection:
1. Before sending check if the line is free (nobody else is sending).
2. If the line is free send the data. At the same time monitor the own data on the line. If the data is
scrambled, there is a collision (another device is sending at the same time).
3. In case of a collision wait some time (backoff time) and restart at 1.
802.11 WLAN MAC uses CSMA/CA Collision Avoidance:
Collisions are costly and difficult to detect in radio networks, thus 802.11 tries to avoid them.
1. Before sending check if the air is free (nobody else is sending).
2. If the air is free send the data. Unlike in wired Ethernet, the monitoring of the own data is useless
since the power level of the sender itself is much higher than the power level of another sender. In
addition a sender can not detect collisions at the receiver due to the “hidden station” problem.
3. Optionally the sender can reserve the air medium for the transmission of a frame with the
(optional) RTS/CTS procedure (Request To Send / Clear To Send) as follows:
STA1
AP
STA2
RTS
CTS
Data
ACK
The CTS/RTS procedure is usually only used for small frames.
STA1 requests air interface by sending an RTS frame containing
the amount of data to be sent (time interval).
STA2 „hears“ RTS and refrains from sending any frames during
requested time interval.
AP grants air interface with CTS frame.
STA1 sends data.
AP sends ACK to finish transaction.
© Peter R. Egli 2015
19/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
4. 802.11 WLAN Wireless LAN (9/10)
802.11 registration with an access point (1/2):
Unlike Ethernet, WLAN stations register with an access point.
AP
Probe request frame
STA
Beacon or probe response frame
Probe request frame
Auth. request
Ack
Assoc. request
Ack
Assoc. response
Ack
Data
Ack
1 Probing / scanning
2
Authentication (exchange pattern
depends on authentication scheme)
3 Association
4 Data exchange
© Peter R. Egli 2015
20/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
4. 802.11 WLAN Wireless LAN (10/10)
802.11 registration with access point (2/2):
1. Probing / scanning:
The STA attempts to find an AP through:
a. (Optional) active scanning (probe request frames) or
b. Passive scanning (client waits for AP’s beacon frames sent in regular intervals).
The user then selects to which AP to associate based on the SSID (beacon contains the SSID).
2. Authentication:
STA authenticates with AP.
Possible authentication schemes:
a. Open (no authentication).
b. PSK (Pre-Shared Key) with WEP (deprecated).
c. 802.1X EAPOL (EAP Over LAN) used with WPA / WPA2.
3. Association:
STA enters the service set serviced by the AP. STA informs AP of its supported data rates.
AP allocates buffers and other data structures for the communication with the STA.
4. Send / receive data:
STA starts sending and receiving data (direct or with RTS/CTS mechanism).
N.B.: All frames are acknowledged with WLAN. Lost frames are retransmitted.
© Peter R. Egli 2015
21/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
5. Public mobile networks (1/4)
Evolution of mobile networks and technologies:
AMPS Analog Mobile Phone Service (e.g. “Natel A – C” in Switzerland).
1G technology: 1st generation mobile cellular networks.
GSM Global System for Mobile Telecommunication.
2G technology: 2nd generation (digital cellular networks).
GPRS Generalized Packet Radio Service, packet service for GSM (2G) networks.
2.5G technology: addition to GSM service.
EDGE Enhanced Data Rates for GSM Evolution; enhancement (data rates) of GPRS service
(mainly software based, can be deployed in existing GPRS networks with software
upgrades).
2.75G technology: Sometimes also seen as a 3G technology. EDGE is actually a step
between GPRS and UMTS.
UMTS Universal Mobile Telecommunication System.
3G technology: Incompatible with 2G and thus requires new network infrastructure.
Does the same as GSM so adoption rate is slow (but picking up lately).
HSDPA High Speed Downlink Packet Access.
3.5G technology: Enhancement of UMTS for higher speeds in Network-to-mobile
direction. Mainly a software based improvement over plain UMTS.
HSUPA High Speed Uplink Packet Access.
3.75G technology: Further enhancement (higher speeds in mobile-to-network
direction) of UMTS and HSDPA service.
LTE Long Term Evolution.
4G technology, UMTS successor, competitor to WiMAX.
All services are IP-based (no TDM-based voice service anymore).
© Peter R. Egli 2015
22/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
5. Public mobile networks (2/4)
 2G / 2.5G / 3G networks:
BTS
BSC
MSC
HLR
PSTN
SGSN
Mobile
Cell
Cell
Cell
BTS
BTS
GMSC
Internet
GGSN
with
APN
VLR
BSC
Mobile
Cell
Cell
BTS
BTS
Base Transmission Station (“Base Station”):
- Control of radio interface, antenna, sender + receiver.
Base Station Controller:
- Control of multiple Base Stations.
- Control of handover (moving from cell to cell).
- Control of time slots on radio interface.
Mobile Switching Center:
- Acts as a phone switch.
- Route calls through GMSC (even mobile-to-mobile calls).
Serving GPRS Support Node:
- Similar to MSC, but
packet-oriented (does packet routing).
- End user authentication and billing.
- Selection of appropriate GGSN based on
APN from mobile device.
- Tunnel endpoint (GTP protocol)
- Similar to an FA in Mobile IP.
Gateway GPRS Support Node:
- Tunnel endpoint (GTP protocol).
- Gateway (router with NAT) to Internet or
customer Intranet.
- Customer management (IP address
assignment etc.).
- Similar to a HA in Mobile IP.
Tunnel
Home Location Register:
Central database of all customers
of an operator.
Visitor Location Register:
Database with mobile
devices that are currently
attached to this MSC.
© Peter R. Egli 2015
23/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
5. Public mobile networks (3/4)
 GSM protocol stacks:
The data service (TCP/IP) on GSM networks requires a rather complex protocol stack to
achieve transparent mobility (handover between radio cells).
LTE may use a different approach based on PMIPv6 (Proxy Mobile IPv6, RFC5213).
GSM RF
MAC
RLC
LLC
SNDCP
IP / X.25 IP / X.25
GTP
L1
L2
Application
GSM RF
Frame
Relay
MAC
RLC BSSGP
L1bis
BSSGP
Frame
Relay
LLC
SNDCP GTP
L1bis L1
L2
IP
MS BSS (PCU) SGSN GGSN
Um GnGb Gi
IP
UDP/
TCP
UDP/
TCP
© Peter R. Egli 2015
24/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
5. Public mobile networks (4/4)
LTE (Long Term Evolution) is the 4th generation of mobile networks to replace G3 networks.
LTE provides far greater bandwidths, even for moving mobile devices:
LTE features:
- High bandwidths (< 100Mbps)
- Low latency (5ms)
- Mobility support (< 500km/h, see above)
- High spectral efficiency (3-4 times that of UMTS / HSPA)
N.B.: First release of LTE is “only” 3.9G as it does not fully meet the 4G criteria (all IP). First
version of LTE still supports TDM services.
Source: http://www.bakom.admin.ch/dokumentation/Newsletter/01315/02251/02261/index.html?lang=de
© Peter R. Egli 2015
25/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
6. Satellite Internet Access
 Satellite Internet access is relatively cheap to deploy in areas where wired Internet access
is difficult or impossible (remote areas).
 Satellite access is also possible for moving hosts, e.g. Panasonic exConnect for
Internet access & GSM phone service aboard long-haul flights.
 A satellite system is usually optimized for one-way transmission (TV, radio).
Downlink bandwidth is much cheaper than uplink bandwidth.
Phase array
antenna for satellite
uplink (mounted on
plane’s roof top)
KU-band satellite
(leased transponder) (Orbits: GEO - 39000km, LEO - 2000km)
5Mbps downstream
1.5Mbps upstream
Ground station
with NOC (Network
Operating Center)
and Internet
connection 802.11b APs with wired
distribution system (Ethernet)
Satellite
modem
Access
router
To antenna
NOC: Network Operating Center
GEO: Geostationary Orbit
LEO: Low Earth Orbit
AP: Access Point
Onboard
installation
© Peter R. Egli 2015
26/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
7. Wireless mobility
 Mobility not only means obtaining an IP address dynamically (PPP, DHCP). Mobility
means that a mobile host is always reachable irrespective of its current location (location
transparency).
 Mobility (location transparency) can be implemented at:
1. Datat link layer (L2):
Examples: IEEE 802.11r Fast Roaming (not widely used) or GSM/CDMA.
Allows to roam between access points (handover).
No changes to clients (mobile nodes) needed.
Works only for and within specific wireless technologies.
2. Application layer (L5-L7):
Examples: SIP registrations, DNS/dynDNS.
No changes to clients (mobile nodes) needed.
Disruptive (an open connection will be dropped), thus only suited for quasi-static
attachment to network using PPP, DHCP or PPPoE for obtaining IP address, e.g. once a day).
3. Network layer (L3):
Examples: Mobile IP MIP RFC2002 (see below), Proxy MIP RFC5213.
Transparent to transport protocols; thus applications are unaware of changes of network
attachment (handover).
Works for different wireless technologies.
Changes in OS for mobile nodes required.
© Peter R. Egli 2015
27/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
8. Mobile IP RFC2002 (1/5)
 Mobile IP model:
MN: Mobile Node
HA: Home Agent
FA: Foreign Agent
CoA: Care of address (c/o)
BSS: Basic Service Set (radio cell)
CN: Correspondent Node (is either
Mobile or stationary)
 HA acts as an ‚anchor point‘
 MN has always a relationship to HA (is registered with HA).
 FA acts as tunnel endpoint.
 N.B.: Mobile IP is not specifically restricted to wireless networks.
Handover (moving from cell to cell) =
change of ‚point of attachment‘
Cell (e.g. WLAN BSS) /
Home Network
Cell (e.g. WLAN BSS) /
Foreign Network
MN
Visitor
List
Transmission
Network (wired
or wireless)
MN
Home address (fix)
Colocated CoA
CoA
(tunnel endpoint
address)Home address (fix)
Tunnel (IP in IP)
CN
© Peter R. Egli 2015
28/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
8. Mobile IP RFC2002 (2/5)
 MIP components:
1. Home Agent HA:
An MN registers with its Home Agent and informs it about its CoA. A HA
is a special process running on a router.
2. Foreign Agent FA:
Establishes a tunnel with HA and forwards packets to/from MN from/to tunnel. An FA is a
special process running on a router.
3. Correspondent Node CA:
Communication partner for MN; a CA needn‘t have any knowledge about Mobile IP; CA is
either a mobile itself or stationary.
4. Mobile Node MN:
Any wireless appliance (handy, PDA, laptop, server aboard an airplane etc.).
 MIP objectives:
Mobile IP (RFC2002) aims at making the location of machines transparent to applications. If a
user moves around the application communication should not be disrupted (TCP connections
remain open even though MN obtains new IP address = ‚session continuity‘). Since a TCP
connection is defined by the quadruplet {src IP, src port, dst IP, dst port} it is required that the
MN retain its IP address when roaming (point of attachment changes). This in turn means that
IP tunneling must be used. In a way mobile IP is similar to GSM where a user moves (roams)
but can always be called from another phone, irrespective of his current location
(handover/roaming even works during a call!).
© Peter R. Egli 2015
29/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
8. Mobile IP RFC2002 (3/5)
 How Mobile IP works:
1. MN Address:
MN has fixed Home Address that never changes. A roaming MN is identified/addressed
through this Home Address.
2. MIP Agent Discovery:
During agent discovery MN finds HA or FA. MIP uses extensions to RFC1256 Router
Advertisments. HA and FA advertise their capability to act as HA/FA through broadcasts at
regular intervals (agent advertisments every few seconds containing a list of CoAs, also called
beacons).
If NN does not want to wait for router advertisment it can request a CoA through broad- or
multicast (agent solicitation).
3. MIP Registration:
MN registers CoA (endpoint address of tunnel that will be initiated by HA) with HA when it
changes point of attachment (roams).
4. HA routing:
HA adjusts its routing table to deliver (tunnel) packets destined to MN to make the connections
to the MN transparent for applications.
4. Packets from MN to CN are either directly delivered (triangular routing) or the FA routes
them back through the tunnel (‘reverse tunneling’).
© Peter R. Egli 2015
30/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
8. Mobile IP RFC2002 (4/5)
Colocated CoA versus CoA:
The FA either resides on the MN itself (colocated CoA) or on a dedicated device (shared CoA).
1. Colocated CoA:
Mobile Node obtaines IP address through some external means (DHCP, PPP) and uses it as
tunnel endpoint address. The MN itself terminates the tunnel, decapsulates the tunnel packets
(removes outer header) and delivers (routes, forwards) the packet to the application.
No foreign agent required.
Multiple IP‘s required to support multiple mobile nodes
2. Shared CoA:
All MN‘s in a foreign network have the same CoA address. The CoA is simply the IP address of
the FA. The FA termates the tunnel, decapsulates the tunnel packets (removes outer header)
and delivers the packet to the according MN.
1 IP address for multiple nodes
FA required
© Peter R. Egli 2015
31/31
Rev. 4.40
Wireless / Mobile Networks indigoo.com
Foreign
Network
Internet
8. Mobile IP RFC2002 (5/5)
 Mobile IP routing / packet forwarding: MN
Home
Network
(LAN)
HA
CoA
(tunnel endpoint
address)
2
1 CN sends packet to MNs home address. HA performs proxy ARP to deliver L2 address on behalf of (absent) MN. When MN
leaves home network the HA sends gratuitous ARPs (with HA‘s link layer address in order to update the ARP caches of
hosts in the home network).
2 HA finds out that MN is not on home network but reachable through tunnel (routing entry) and sends packet to CoA
(tunnel endpoint address of FA).
3 FA delivers the packet to the MN.
4 MN sends the reply back to the FA.
5a FA sends packet directly to CN (=„triangular routing“); the problem with this approach is that the reply packet does not
take a topologically correct route (packet with IP-source=MN-home address comes from FA). Firewalls / packet filters
along the way with ingress filtering thus may drop the packet.
5b Instead of directly routing the packet back to the CN the FA routes the packet back to the HA through
the tunnel (=reverse tunneling).
 N.B.: MN‘s home address may be private and thus not unique in the foreign network. Thus FA‘s routing entries must consist
of a combination of link layer address (MAC), tunnel identification and MN-IP-address.
5a1
FA
3
45b
CN

Weitere ähnliche Inhalte

Was ist angesagt?

IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs BluetoothArun ACE
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guideNishant Gandhi
 
Generations of wireless technologies
Generations of wireless technologiesGenerations of wireless technologies
Generations of wireless technologiessaikiran harinarthini
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab FileNitin Bhasin
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layerSerious_SamSoul
 
FINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKFINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKKulsumKhan13
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolUjjayanta Bhaumik
 
Ring Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerRing Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerMaksudujjaman
 
Networks classification
Networks classificationNetworks classification
Networks classificationMukesh Chinta
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
 
IP Address
IP AddressIP Address
IP AddressRahul P
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 

Was ist angesagt? (20)

TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Packet tracer practical guide
Packet tracer practical guidePacket tracer practical guide
Packet tracer practical guide
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Generations of wireless technologies
Generations of wireless technologiesGenerations of wireless technologies
Generations of wireless technologies
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab File
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
FINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKFINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORK
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Ipv4
Ipv4Ipv4
Ipv4
 
Ethernet
EthernetEthernet
Ethernet
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Ring Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet TracerRing Topology Design with Cisco Packet Tracer
Ring Topology Design with Cisco Packet Tracer
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
IP Address
IP AddressIP Address
IP Address
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 

Andere mochten auch

LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
 
Cubase Presentation Cain
Cubase Presentation CainCubase Presentation Cain
Cubase Presentation CainZoe Harris
 
The Beautyness of Red Colour
The Beautyness of Red ColourThe Beautyness of Red Colour
The Beautyness of Red ColourFera Zaemri
 
Communication middleware
Communication middlewareCommunication middleware
Communication middlewarePeter R. Egli
 
USING COLOR (Intro to GD: Wk 5a)
USING COLOR (Intro to GD: Wk 5a)USING COLOR (Intro to GD: Wk 5a)
USING COLOR (Intro to GD: Wk 5a)Shawn Calvert
 
Open Source World : Using Web Technologies to build native iPhone and Android...
Open Source World : Using Web Technologies to build native iPhone and Android...Open Source World : Using Web Technologies to build native iPhone and Android...
Open Source World : Using Web Technologies to build native iPhone and Android...Jeff Haynie
 
TCP IP
TCP IPTCP IP
TCP IPhivasu
 
Telecom self organizing network
Telecom self organizing networkTelecom self organizing network
Telecom self organizing networkPankaj Chomal
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking ConceptsPeter R. Egli
 
Presentation on Vowifi
Presentation on VowifiPresentation on Vowifi
Presentation on Vowifisrishti jain
 
SIGTRAN - An Introduction
SIGTRAN - An IntroductionSIGTRAN - An Introduction
SIGTRAN - An IntroductionTareque Hossain
 
Perception about Colour Red
Perception about Colour Red Perception about Colour Red
Perception about Colour Red Mehak Gupta
 

Andere mochten auch (20)

LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
 
Transferjet
TransferjetTransferjet
Transferjet
 
Cubase Presentation Cain
Cubase Presentation CainCubase Presentation Cain
Cubase Presentation Cain
 
Green
GreenGreen
Green
 
Red Colour
Red ColourRed Colour
Red Colour
 
The Beautyness of Red Colour
The Beautyness of Red ColourThe Beautyness of Red Colour
The Beautyness of Red Colour
 
Communication middleware
Communication middlewareCommunication middleware
Communication middleware
 
USING COLOR (Intro to GD: Wk 5a)
USING COLOR (Intro to GD: Wk 5a)USING COLOR (Intro to GD: Wk 5a)
USING COLOR (Intro to GD: Wk 5a)
 
Open Source World : Using Web Technologies to build native iPhone and Android...
Open Source World : Using Web Technologies to build native iPhone and Android...Open Source World : Using Web Technologies to build native iPhone and Android...
Open Source World : Using Web Technologies to build native iPhone and Android...
 
TCP IP
TCP IPTCP IP
TCP IP
 
Unit 3
Unit 3Unit 3
Unit 3
 
Telecom self organizing network
Telecom self organizing networkTelecom self organizing network
Telecom self organizing network
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
sigtran
sigtransigtran
sigtran
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking Concepts
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Presentation on Vowifi
Presentation on VowifiPresentation on Vowifi
Presentation on Vowifi
 
SIGTRAN - An Introduction
SIGTRAN - An IntroductionSIGTRAN - An Introduction
SIGTRAN - An Introduction
 
Perception about Colour Red
Perception about Colour Red Perception about Colour Red
Perception about Colour Red
 

Ähnlich wie Mobile wireless-networks

Mobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdfMobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdfvaibhav457294
 
Sky Con Presentation
Sky Con PresentationSky Con Presentation
Sky Con PresentationEvert Bopp
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber LineKashif Akram
 
02 M Walker Vodafone
02 M Walker Vodafone02 M Walker Vodafone
02 M Walker Vodafonedarshanai
 
2011 Broadband Tech Update to Electronic Engineers in the Philippines
2011 Broadband Tech Update to Electronic Engineers in the Philippines 2011 Broadband Tech Update to Electronic Engineers in the Philippines
2011 Broadband Tech Update to Electronic Engineers in the Philippines Francisco "Cocoy" Claravall
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless TechnologyNafees Alam
 
WiMax and non standard solutions
WiMax and non standard solutionsWiMax and non standard solutions
WiMax and non standard solutionsMario B.
 
4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGY4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGYTarun chandel
 
U.S. Wireless Overview & Outlook Presentation (V02C)
U.S. Wireless Overview & Outlook Presentation (V02C)U.S. Wireless Overview & Outlook Presentation (V02C)
U.S. Wireless Overview & Outlook Presentation (V02C)Mark Goldstein
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyNitin .
 
Qualcomm 5g-vision-presentation
Qualcomm 5g-vision-presentationQualcomm 5g-vision-presentation
Qualcomm 5g-vision-presentationYali Wang
 
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative StudyIRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative StudyIRJET Journal
 
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
 	 Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -... 	 Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...tecnoimprese
 
Report on Gi-Fi
Report on Gi-FiReport on Gi-Fi
Report on Gi-FiNitesh Sah
 
Report on Gi-Fi
Report on Gi-FiReport on Gi-Fi
Report on Gi-FiNitesh Sah
 

Ähnlich wie Mobile wireless-networks (20)

Mobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdfMobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdf
 
Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik
 
Sky Con Presentation
Sky Con PresentationSky Con Presentation
Sky Con Presentation
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber Line
 
02 M Walker Vodafone
02 M Walker Vodafone02 M Walker Vodafone
02 M Walker Vodafone
 
2011 Broadband Tech Update to Electronic Engineers in the Philippines
2011 Broadband Tech Update to Electronic Engineers in the Philippines 2011 Broadband Tech Update to Electronic Engineers in the Philippines
2011 Broadband Tech Update to Electronic Engineers in the Philippines
 
4 G
4 G4 G
4 G
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
WiMax and non standard solutions
WiMax and non standard solutionsWiMax and non standard solutions
WiMax and non standard solutions
 
From 0G to 5G network
From 0G to 5G networkFrom 0G to 5G network
From 0G to 5G network
 
4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGY4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGY
 
U.S. Wireless Overview & Outlook Presentation (V02C)
U.S. Wireless Overview & Outlook Presentation (V02C)U.S. Wireless Overview & Outlook Presentation (V02C)
U.S. Wireless Overview & Outlook Presentation (V02C)
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Qualcomm 5g-vision-presentation
Qualcomm 5g-vision-presentationQualcomm 5g-vision-presentation
Qualcomm 5g-vision-presentation
 
V_Tikhvinskiy.pdf
V_Tikhvinskiy.pdfV_Tikhvinskiy.pdf
V_Tikhvinskiy.pdf
 
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative StudyIRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
 
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
 	 Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -... 	 Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici -...
 
Report on Gi-Fi
Report on Gi-FiReport on Gi-Fi
Report on Gi-Fi
 
Report on Gi-Fi
Report on Gi-FiReport on Gi-Fi
Report on Gi-Fi
 
4g
4g4g
4g
 

Mehr von Peter R. Egli

Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Peter R. Egli
 
Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Peter R. Egli
 
Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET PlatformPeter R. Egli
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingPeter R. Egli
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyPeter R. Egli
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development KitPeter R. Egli
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingPeter R. Egli
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBAPeter R. Egli
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Peter R. Egli
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging ServicePeter R. Egli
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Peter R. Egli
 
REST - Representational State Transfer
REST - Representational State TransferREST - Representational State Transfer
REST - Representational State TransferPeter R. Egli
 
MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented MiddlewarePeter R. Egli
 
Windows Communication Foundation (WCF)
Windows Communication Foundation (WCF)Windows Communication Foundation (WCF)
Windows Communication Foundation (WCF)Peter R. Egli
 
Java API for XML Web Services (JAX-WS)
Java API for XML Web Services (JAX-WS)Java API for XML Web Services (JAX-WS)
Java API for XML Web Services (JAX-WS)Peter R. Egli
 

Mehr von Peter R. Egli (20)

Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)Transaction Processing Monitors (TPM)
Transaction Processing Monitors (TPM)
 
Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)Business Process Model and Notation (BPMN)
Business Process Model and Notation (BPMN)
 
Microsoft .NET Platform
Microsoft .NET PlatformMicrosoft .NET Platform
Microsoft .NET Platform
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technologyOverview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technology
 
Android Native Development Kit
Android Native Development KitAndroid Native Development Kit
Android Native Development Kit
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Web services
Web servicesWeb services
Web services
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
MSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message QueueingMSMQ - Microsoft Message Queueing
MSMQ - Microsoft Message Queueing
 
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBACommon Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBA
 
Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)Component Object Model (COM, DCOM, COM+)
Component Object Model (COM, DCOM, COM+)
 
JMS - Java Messaging Service
JMS - Java Messaging ServiceJMS - Java Messaging Service
JMS - Java Messaging Service
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)
 
REST - Representational State Transfer
REST - Representational State TransferREST - Representational State Transfer
REST - Representational State Transfer
 
MOM - Message Oriented Middleware
MOM - Message Oriented MiddlewareMOM - Message Oriented Middleware
MOM - Message Oriented Middleware
 
Windows Communication Foundation (WCF)
Windows Communication Foundation (WCF)Windows Communication Foundation (WCF)
Windows Communication Foundation (WCF)
 
Java API for XML Web Services (JAX-WS)
Java API for XML Web Services (JAX-WS)Java API for XML Web Services (JAX-WS)
Java API for XML Web Services (JAX-WS)
 

Kürzlich hochgeladen

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Kürzlich hochgeladen (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Mobile wireless-networks

  • 1. © Peter R. Egli 2015 1/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com Peter R. Egli INDIGOO.COM OVERVIEW OF TECHNOLOGIES AND PROTOCOLS FOR MOBILE AND WIRELESS NETWORKS MOBILE & WIRELESS NETWORKS
  • 2. © Peter R. Egli 2015 2/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com Contents 1. Wireless technologies overview 2. Radio technology 3. Radio technology problems 4. 802.11 WLAN Wireless LAN 5. Public mobile networks 6. Satellite Internet Access 7. Wireless mobility 8. Mobile IP RFC2002
  • 3. © Peter R. Egli 2015 3/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 1. Wireless technologies overview (1/5) Name Standard F-Spectrum Data rate Range Power cons. Applications / comments WiMAX IEEE 802.16a, d Div. 75Mbps 6km High Mobile MAN (users w ith PDAs, nomads). Will probably be supplanted by LTE. WRAN IEEE 802.22 54MHz - 862MHz 4.54 to 22.69 Mbit/s <30km High WRAN is a new w orking group in IEEE for using TV frequency for broadband access (w hite space spectrum). Work in progress. WiBro IEEE 802.16e 2.3GHz 1Mbps <=1km Low South Korean competitor to WiMAX. Mobile (60km/h moving mobile devices). GSM (2G) Div. 850/1800/1900 14.4Kbps 15km Low 2nd generation mobile telephony technology. CDMA (2G) Div. N/A 2Mbps 15km Low G2 technology used in US and other countries (competitor to GSM). EDGE (2.5G) N/A 850/1800/1900 Mhz 384Kbps 15km Low Enhanced Data rates for GSM Evolution (2.5G); technology betw een G2 (GSM) and UMTS (G3). EUCH (2.5G) N/A N/A N/A N/A N/A Enhanced Uplink Channel. CDMA2000 (3G) N/A N/A 144Kbps N/A N/A Competitor to UMTS UMTS (3G) Div. N/A 2Mbps 15km Low Would-be successor to GSM. Slow adoption rate, but picking up speed. EV-DO (3.5G) N/A N/A 3.1M bps down 1.8M bps up N/A N/A Enhancement of CDMA2000, competes w ith HSDPA (counterpart in UMTS family). HSDPA (3.5G) Div. N/A <20Mbps N/A N/A High Speed Dow nlink Packet Access. LTE (3.9G/4G) 3GPP LTE Candidate: 2.6GHz 160 Mbit/s (DL) 54Mbit/s (UL) <30km N/A 4G technology, potential successor to UMTS. Based on TCP/IP, no TDM. Low latency (<5ms) for IP packets. iMode N/A N/A N/A N/A Low Japanese packet service for mobile devices (GPRS). VSAT N/A N/A ~0.5Mbps duplex 3000km High Very small aperture Satellite TETRAPOL ETSI N/A N/A N/A N/A Voice and data radio technology for public services (police etc.).
  • 4. © Peter R. Egli 2015 4/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 1. Wireless technologies overview (2/5) Name Standard F-Spectrum Data rate Range Pow er cons. Applications / comments DECT ETSI 1800-1900MHz 552Kbps 100m Low (by design) Digital Enhanced Cordless Telephony. TDMA. Well established WLL N/A N/A N/A N/A High Wireless Local Loop. IrDA IrDA Visible light 1.6Mbps 8m Low Infrared; transmission needs line of sight. Mostly used for remote controls. BlueTooth BlueTooth 2.45MHz ISM 1Mbps 30m Medium Consumer market (mice, PDAs, keyboards). Pretty complex technology. WiBree WiBree / BT 2.45MHz ISM 1Mbps 10m Very low Derived from Bluetooth; targets very low pow er applications. Integrated in bluetooth standard in 2007 as ULP (Ultra Low Pow er). Apps: consumer, medical, sports & w ellnes (w atches etc.). ANT+ Proprietary (Dynastream) 2.4GHz <57Kbps 30m Very low See w w w .thisisant.com. Ultra low pow er radio technology for w atches, sensors etc. UWB IEEE 802.15.3a 3.1-10.6 GHz (US) 24GHz (China) <480Mbps 10m N/A Ultra Wide Band. Very high BW for PANs. Discontinued in 2006. WHDI WHDI 1.0 5GHz <3Gbps 30m High? Home entertainment. Industry initiative (Sony et.al.). Competitor of WirelessHD. WiGig IEEE 802.11MAC 1.0 WiGig 2.4/5/60GHz <7Gbps N/A High? Home entertainment. Industry initiative by HW vendors (Atheros, Nokia et.al.). Competitor of WirelessHD. Uses 802.11 MAC for compatibility. Wireless USB CWUSB <8m <480Mbps 10m N/A Based on UWB radio technology; USB cable replacement. WirelessHD WirelessHD 1.0, IEEE 802.15.3c 57-64GHz 3GBbps 10m N/A Wireless PHY and MAC layer for use in HD WVAN (Wireless Video Are Netw ork) HomeRF N/A 2.45MHz ISM 20Mbps 150m N/A Was competitor to 802.11. Now defunct WLAN IEEE 802.11a 5GHz <54Mbps 100m High First 802.11 Phy standard. WLAN IEEE 802.11b 2.45MHz ISM <11Mbps 100m High Low cost variant of 802.11; in w idespread use. WLAN IEEE 802.11g 2.45MHz ISM <54Mbps 100m High To supplant 802.11b. WLAN IEEE 802.11n 2.45MHz ISM 100-200Mbps 100m High High data rates w ith MIMO technology. WLAN IEEE 802.11ac 5GHz <1Gbps N/A High Enhancement to 802.11n w ith higher throughput. Standard in progress. WLAN IEEE 802.11ad 60GHz <7Gbps <10m High Forthcoming standard, possibly based on Wigig standard. HiperLAN2 HiperLAN 5GHz 54Mbps 100m High European competitor to 802.11 WirelessHD WirelessHD 1.0, IEEE 802.15.3c 57-64GHz 3GBbps 10m N/A Wireless PHY and MAC layer for use in HD WVAN (Wireless Video Are Netw ork)
  • 5. © Peter R. Egli 2015 5/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 1. Wireless technologies overview (3/5) Name Standard F-Spectrum Data rate Range Power cons. Applications / comments RFID EPCglobal Gen2 ISO/IEC 18000 Div. (13.56MHz, 135kHz, 2.45GHz, 860 MHz to 960 MHz , 433MHz) 100KBit/s 1m Zero Radio Frequency ID tags; w ireless access to serial numbers etc.; very low bandw idth and distances. Huge market in the offing. NFC ISO/IEC 18092 ECMA 340 ETSI TS 102 190 13.56MHz < 212KBit/s 0 - 20cm Pass. & Act. Near Field Communication. Transferjet ECMA 398, ISO/IEC 17568 4.48GHz 375 Mbps <10cm N/A Low proximity high throughput technology. ZigBee IEEE 802.15.4, ZigBee standard 2.45GHz 868MHz (Eu) 915MHz (US) 128KBit/s 100m Low (by design) Control and monitoring (sensors). Aimed at applications w here BlueTooth is too complex and has too much pow er consumption. Requires certification. MiWi IEEE 802.15.4, MiWi 2.45GHz ISM 128KBit/s 100m Low (by design) ZigBee alternative from Microchip. Uses IEEE 802.15.4 radio; low cost (licenses!) alternative to ZigBee. No certification required. Wireless Body Area Networks IEEE 802.15.6 ISM bands. Low band: 3.5GHz-4.5GHz High band: 6.5GHz-9.9GHz <10MBit/s <3m (low data rate) Extremely low Wireless Body Area Netw ork (BAN) standard. Hub and spoke netw ork topologies. Target applications: Medical (transceiver close to human body). Short-Range Wireless Optical Communication IEEE 802.15.7 Visible light (380 - 780nm) Low rate: <266KBit/s High rate: <96MBit/s A few meters Low Applications w ith increased EMC immunity requirements. Traffic signal to vehicle etc.
  • 6. © Peter R. Egli 2015 6/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 1. Wireless technologies overview (4/5) Name Standard F-Spectrum Data rate Range Power cons. Applications / comments Wireless-M- Bus EN13757-4, EN13757-3 868MHz 16.4KBit/s 15m-25m Low Wireless electrical pow er meter connectivity. Wireless version of M-Bus. io-homecontrol io-homecontrol 868MHz N/A N/A Low Home automation (light, roller shutter etc.) Z-Wave Z-Wave Alliance 908.42Mhz (US) 868MHz (Eu) 9.6KBit/s - 100KBit/s 100m Low (by design) Home appliances, sensors. Designed for robustness (crow ded frequency bands). MAC and PHY layers standardized by ITU-T (G.9959). NanoNet Proprietary 2.45GHz ISM N/A N/A N/A w w w .nanotron.com enOcean ISO/IEC 14543-3-10 315MHz (US), 868MHz, 902MHz 120KBit/s N/A None (energy harvesting) No pow er sensors (energy harvesting). DASH7 ISO/IEC 18000- 7 433MHz 200 kbit/s 1000m Low RFID technology for w orldw ide conformance and interoperability. Wireless HART IEC EN 62591 2.4GHz 250 kbits/s 30m (indoor) 100m (outdoor) See 802.15.4 Based on IEEE 802.15.4 MAC SigFox ETSI GS LTN 003 868MHz (Eu) 902MHz (US) 10b/s to 1kb/s Up to 40km Very low LPWAN: Wireless technology for IoT sensor netw orks (alternative to costly 3G, 4G netw orks). LoRaWAN Proprietary 868MHz 10b/s to 10kb/s Up to 40km Very low LPWAN: Wireless technology for IoT sensor netw orks (alternative to costly 3G, 4G netw orks). Weightless-W Proprietary 54MHZ - 862MHz (TVWS) N/A Long range High TV Whitespace technology (TVWS). Weightless-N Proprietary 868MHz (Eu) 900MHz (US) 10b/s to 10kb/s Up to 40km Very low LPWAN: Wireless technology for IoT sensor netw orks (alternative to costly 3G, 4G netw orks) developed from Weightless-W to better suit requirements of IoT. RPMA Proprietary 2.4GHz ISM N/A <30km Very low LPWAN technology by OnRamp Wireless.
  • 7. © Peter R. Egli 2015 7/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com WANMANLAN PAN / HAN Range [km] Bandwidth [Mb/s] 0.0001 0.001 0.01 0.1 1 10 100 1. Wireless technologies overview (5/5) 10 0.01 0.001 0.1 1 100 1000 IEEE 802.15.3a UWB WPAN 110-480Mb/s 10m IEEE 802.16 WiMAX WMAN 75Mb/s 1-6km >>100 users IEEE 802.11b WLAN/WiFi 54Mb/s (802.11a) 5Mb/s (802.11b) 30Mbps (802.11g) 500Mbps (802.11n) 100m ~100 users HomeRF <20Mbps <150m RFID ~0B/s <1m VSAT Satellite Kb/s…Mb/s >300km IEEE 802.22 WRAN GSM (2G, HSCSD) GPRS (2.5G) CDMA 10Kb/s 15km CDMA2000 EDGE (2.75G) 384KBps UMTS (3G) HSDPA (3.5G) 2Mbps / 15km IEEE 802.15.1 BlueTooth WPAN 723Kb/s 10m IEEE 802.15.4 / ZigBee WPAN / HAN 128Kb/s 100m DECT TDMA 552Kb/s PAN: Personal Area Network HAN: Home Area Network LAN: Local Area Network MAN: Metropolitan Area Network WAN: Wide Area Network
  • 8. © Peter R. Egli 2015 8/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 2. Radio technology  Technological drivers of radio technology: 1. Hardware: Better batteries, less power consumption, processors with higher performance. 2. Link: Better / more sophisticated antennas, modulation and coding; DSPs with higher perf. 3. Network: Mobility support; dynamic resource allocation. 4. Application: Adaptive QoS (Quality of Service). And: Radio is more and more becoming a software technology (DSP, protocols).  Reuse of spectrum through spread-spectrum: Despite the trend that newer technologies use higher frequencies, radio bandwidth remains limited. Spread spectrum is a technology used to distribute the signal over a wide frequency range. Spread spectrum makes the signal less susceptive to interference and noise. Original signal The signal is „spread“ over the frequency spectrum. The spread signal is immune against a jamming signal. The signal interferes less with other signals due to lower power level. The receiver reconstructs signal.
  • 9. © Peter R. Egli 2015 9/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 3. Radio technology problems (1/2) Radio networks differ from wired networks in a number of aspects. Wireless protocols on layer 1 (physical) and 2 (data link) have to be augmented with the necessary functions to address these issues. 1. Hidden station problem: A wireless station STA3 does not „hear“ STA1 (hidden station). Both STA1 and STA3 may start sending at the same time thus causing contention at STA2. 2. Eavesdropping: Wireless networks are inherently open to eavesdropping. This means that wireless networks need protection (strong encryption) right from the start. 3. Reliability of wireless connections: Wireless networks suffer from interference, reflections, dropouts etc. Thus wireless connections are less reliable. New (wireless) routing protocols can be used to provide multipath routing for better reliability. STA3STA1 STA2
  • 10. © Peter R. Egli 2015 10/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 3. Radio technology problems (2/2) 4. Power consumption of wireless devices: Wireless devices inherently suffer from a power problem (wireless = mobile = runs-on- battery). Often wireless technologies (ZigBee 802.15.4, DECT, GSM) are targeted at low power applications. Other technologies like 802.11 or WiMAX 802.16 are not particularly suited for low-power applications. Usually a greater distance between the antennas requires more transmission power and thus increases the power consumption. 5. Limited bandwidth, need for frequency licensing: Every country has its own frequency plan that regulates the use or licensing of radio frequencies. Obtaining a license is costly, thus the number of frequency license holders is limited. In order to allow the use of certain frequencies without a costly and time consuming licensing process, most countries allow using the frequencies in the ISM (Industrial, Science, Medical) bands as defined by ITU-R (International Telecommunication Union – Radio). In recent years a number of new radio technologies emerged as a consequence of advances in technology (cheaper hardware, new modulation technologies etc.). Naturally many of these technologies (WLAN, Bluetooth, Zigbee) use the (unlicensed) ISM bands. This in turn means that interferences between different senders become a problem.
  • 11. © Peter R. Egli 2015 11/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 4. 802.11 WLAN Wireless LAN (1/10) WLAN technology:  802.11 networks use free frequency bands (ISM: Industrial, Science, Medical). Thus everybody can run 802.11 devices without licensing a frequency band.  Different 802.11 standards: 802.11a: 6, 9, 12, 18, 24, 36, 48, 54 Mbps (5 GHz band). 802.11b: Up to 11Mbps, simple (cheap) technology. 802.11g: Up to 54Mbps. 802.11n: <600Mbps (MIMO=Multiple In Multiple Out antenna technology, uses multi-path transmission for better signal recovery at the receiver). 802.11ac: Forthcoming standard for higher throughput (802.11n enhancements) using 3-8 spatial streams with beam forming. 802.11ad: Standard in progress by WiGig consortium, even higher throughput (<7Gpbs). 802.11ad is targeted at bridging short distances with wireless links, e.g. in data centers (5-10m).  802.11 Pros and Cons: Mobility Flexible configuration Relatively cheap Weak security (WEP Wired Equivalent Protection, but fixed with WPA Wired Protection Access) Relatively low bandwidth for data (compared to wired networks) Electromagnetic interference with other devices (Bluetooth) Simple installation, but high skills needed for exploitation of full potential of technology
  • 12. © Peter R. Egli 2015 12/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com Ad-hoc mode: No access points; STAs communicate directly with each other. IBSS: Independent Basic Service Set DS: Distribution System (wired LAN) BSS: Basic Service Set (Single cell) AP: Access Points Infrastructure mode: Usage of access points interconnected with wired LAN. ESS: Extended Service Set (Multiple cells) 4. 802.11 WLAN Wireless LAN (2/10) Operation modes of 802.11: Handover STA (STAtion) STA (STAtion)
  • 13. © Peter R. Egli 2015 13/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 4. 802.11 WLAN Wireless LAN (3/10) 802.11 protocol stack: 802.11 Physical layer: The physical layer is concerned with modulation / demodulation. The different WLAN standards use different modulation techniques (OFDM, DSSS, QAM). 802.11 MAC: The MAC layer controls the media access (see below). LLC: LLC (Logical Link Control) is not part of the WLAN stack, but is often used to provide a generic access layer to the lower (link) layers. 802.11 MAC 802.11a OFDM 5GHz, <54Mbps IP (Internet Protocol) 802.11b DSSS 2.4GHz, <11Mbps 802.11g OFDM&DSSS 5GHz, <54Mbps 802.11 PHYs LLC 802.11 WLAN stack 802.11n OFDM 2.4/5GHz, <600Mbps 802.11ac 256QAM 5GHz, 1Gbps Draft standard 802.11ad WiGig 60GHz, <7Gbps Draft standard
  • 14. © Peter R. Egli 2015 14/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 4. 802.11 WLAN Wireless LAN (4/10) 802.11 frame structure: The 802.11 frame structure depends on the frame type (see below). The general 802.11 frame structure looks as follows: 2 2 6 x PV To DS From DS More frag. Retry Power mgt. More data WEP Order FC Dur Address Type specific fields Field length (bytes) Type Sub-type 0=Management 1=Control 2=Data Dur: Time in microseconds that the sender needs for sending the frame. Address: Receiver’s MAC address DS: Distribution System (wired or wireless „backbone“ of WLAN) FC: Frame Control Management: Beacon, Probe etc. (see below) Control: RTS, CTS, Ack Data: No subtypes (always =0) Protocol version=0 0 for management and control frames; Set for data frames (see below) More frag.: 1 indicates that this is a fragmentation frame Retry: Set to 1 if this is a retransmission frame Power mgt: Power management bit More data: Indicates that >= frames are available. Used for power management. WEP: WEP bit; obsolete (WEP replaced by WPA2). Order: Set to 1 if strict ordering of frames is used.
  • 15. © Peter R. Egli 2015 15/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 4. 802.11 WLAN Wireless LAN (5/10) 802.11 frame types (1/3): 1. Management frame: Management frames are used to establish and maintain communication. Management frame structure: Management frame suptypes: The management frames are basically used for associating a STA to an AP (procedure see below). a. Authentication frame: Basic authentication, e.g. based on MAC-address. b. Deauthentication frame STA sends deathentication frame to terminate communication. c. Association request frame STA requests AP to allocate resources for communication. d. Association response frame Response of an AP to an association request. e. Reassociation request frame Sent by STA when it roams to another AP. f. Reassociation response frame Response from the new AP to the reassociation request. g. Disassociation frame STA requests disassociation from AP. h. Beacon frame AP periodically sends beacon frames with its identity. i. Probe request frame When the STA is not associated to an AP, it sends probe request frames. j. Probe response frame Reponse from an AP to a probe request frame. 2 2 6 6 6 x2 FC Len Address 1 SeqAddress 2 Address 3 Mgt. info
  • 16. © Peter R. Egli 2015 16/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 4. 802.11 WLAN Wireless LAN (6/10) 802.11 frame types (2/3): 2. Control frame: Control frames are optional and are used for assisting in the delivery of data frames between stations. Control frames are used in a handshake procedure in the CSMA/CA protocol (see below). Control frame structure: 2 2 6 6 FC Len Rx address Tx address RTS (Request To Send) frame 2 2 6 FC Len Rx address CTS (Clear To Send) frame 2 2 6 FC Len Rx address Ack frame Rx: Receiver Tx: Transmitter
  • 17. © Peter R. Egli 2015 17/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 4. 802.11 WLAN Wireless LAN (7/10) 802.11 frame types (3/3): 3. Data frame: Data frames carry user data. Data frames are acknowledged and retransmitted if they are lost. Data frame structure: Data frame addresses and DS bits: Since data frames may be transported between APs over a wired distribution system, 2 additional MAC addresses are required in the WLAN frame header. The DS bits indicate the meaning of the different addresses fields as follows: Destination = MAC address of final destination node. Source = MAC address of original sending node. Sender & receiver: Sending and receiving AP’s MAC addresses. To DS From DS Addr. 1 Addr. 2 Addr. 3 Addr. 4 0 0 Dest. Source BSSID N/A 0 1 Dest. BSSID Source N/A 1 0 BSSID Source Dest. N/A 1 1 Receiver Sender Dest. Source Client to Client AP to Client Client to AP AP to AP 2 2 6 6 6 x2 FC Len Address 1 SeqAddress 2 Address 3 Optional field x Payload WEP parameters (4 bytes) if data is WEP-protected. Address 4 (6 bytes) if frame is an APAP frame. APSTA AP STA
  • 18. © Peter R. Egli 2015 18/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 4. 802.11 WLAN Wireless LAN (8/10) 802.11 MAC (Media Access Control) differs from 802.3 (Ethernet) MAC: 802.3 Ethernet MAC uses CSMA/CD Collision Detection: 1. Before sending check if the line is free (nobody else is sending). 2. If the line is free send the data. At the same time monitor the own data on the line. If the data is scrambled, there is a collision (another device is sending at the same time). 3. In case of a collision wait some time (backoff time) and restart at 1. 802.11 WLAN MAC uses CSMA/CA Collision Avoidance: Collisions are costly and difficult to detect in radio networks, thus 802.11 tries to avoid them. 1. Before sending check if the air is free (nobody else is sending). 2. If the air is free send the data. Unlike in wired Ethernet, the monitoring of the own data is useless since the power level of the sender itself is much higher than the power level of another sender. In addition a sender can not detect collisions at the receiver due to the “hidden station” problem. 3. Optionally the sender can reserve the air medium for the transmission of a frame with the (optional) RTS/CTS procedure (Request To Send / Clear To Send) as follows: STA1 AP STA2 RTS CTS Data ACK The CTS/RTS procedure is usually only used for small frames. STA1 requests air interface by sending an RTS frame containing the amount of data to be sent (time interval). STA2 „hears“ RTS and refrains from sending any frames during requested time interval. AP grants air interface with CTS frame. STA1 sends data. AP sends ACK to finish transaction.
  • 19. © Peter R. Egli 2015 19/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 4. 802.11 WLAN Wireless LAN (9/10) 802.11 registration with an access point (1/2): Unlike Ethernet, WLAN stations register with an access point. AP Probe request frame STA Beacon or probe response frame Probe request frame Auth. request Ack Assoc. request Ack Assoc. response Ack Data Ack 1 Probing / scanning 2 Authentication (exchange pattern depends on authentication scheme) 3 Association 4 Data exchange
  • 20. © Peter R. Egli 2015 20/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 4. 802.11 WLAN Wireless LAN (10/10) 802.11 registration with access point (2/2): 1. Probing / scanning: The STA attempts to find an AP through: a. (Optional) active scanning (probe request frames) or b. Passive scanning (client waits for AP’s beacon frames sent in regular intervals). The user then selects to which AP to associate based on the SSID (beacon contains the SSID). 2. Authentication: STA authenticates with AP. Possible authentication schemes: a. Open (no authentication). b. PSK (Pre-Shared Key) with WEP (deprecated). c. 802.1X EAPOL (EAP Over LAN) used with WPA / WPA2. 3. Association: STA enters the service set serviced by the AP. STA informs AP of its supported data rates. AP allocates buffers and other data structures for the communication with the STA. 4. Send / receive data: STA starts sending and receiving data (direct or with RTS/CTS mechanism). N.B.: All frames are acknowledged with WLAN. Lost frames are retransmitted.
  • 21. © Peter R. Egli 2015 21/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 5. Public mobile networks (1/4) Evolution of mobile networks and technologies: AMPS Analog Mobile Phone Service (e.g. “Natel A – C” in Switzerland). 1G technology: 1st generation mobile cellular networks. GSM Global System for Mobile Telecommunication. 2G technology: 2nd generation (digital cellular networks). GPRS Generalized Packet Radio Service, packet service for GSM (2G) networks. 2.5G technology: addition to GSM service. EDGE Enhanced Data Rates for GSM Evolution; enhancement (data rates) of GPRS service (mainly software based, can be deployed in existing GPRS networks with software upgrades). 2.75G technology: Sometimes also seen as a 3G technology. EDGE is actually a step between GPRS and UMTS. UMTS Universal Mobile Telecommunication System. 3G technology: Incompatible with 2G and thus requires new network infrastructure. Does the same as GSM so adoption rate is slow (but picking up lately). HSDPA High Speed Downlink Packet Access. 3.5G technology: Enhancement of UMTS for higher speeds in Network-to-mobile direction. Mainly a software based improvement over plain UMTS. HSUPA High Speed Uplink Packet Access. 3.75G technology: Further enhancement (higher speeds in mobile-to-network direction) of UMTS and HSDPA service. LTE Long Term Evolution. 4G technology, UMTS successor, competitor to WiMAX. All services are IP-based (no TDM-based voice service anymore).
  • 22. © Peter R. Egli 2015 22/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 5. Public mobile networks (2/4)  2G / 2.5G / 3G networks: BTS BSC MSC HLR PSTN SGSN Mobile Cell Cell Cell BTS BTS GMSC Internet GGSN with APN VLR BSC Mobile Cell Cell BTS BTS Base Transmission Station (“Base Station”): - Control of radio interface, antenna, sender + receiver. Base Station Controller: - Control of multiple Base Stations. - Control of handover (moving from cell to cell). - Control of time slots on radio interface. Mobile Switching Center: - Acts as a phone switch. - Route calls through GMSC (even mobile-to-mobile calls). Serving GPRS Support Node: - Similar to MSC, but packet-oriented (does packet routing). - End user authentication and billing. - Selection of appropriate GGSN based on APN from mobile device. - Tunnel endpoint (GTP protocol) - Similar to an FA in Mobile IP. Gateway GPRS Support Node: - Tunnel endpoint (GTP protocol). - Gateway (router with NAT) to Internet or customer Intranet. - Customer management (IP address assignment etc.). - Similar to a HA in Mobile IP. Tunnel Home Location Register: Central database of all customers of an operator. Visitor Location Register: Database with mobile devices that are currently attached to this MSC.
  • 23. © Peter R. Egli 2015 23/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 5. Public mobile networks (3/4)  GSM protocol stacks: The data service (TCP/IP) on GSM networks requires a rather complex protocol stack to achieve transparent mobility (handover between radio cells). LTE may use a different approach based on PMIPv6 (Proxy Mobile IPv6, RFC5213). GSM RF MAC RLC LLC SNDCP IP / X.25 IP / X.25 GTP L1 L2 Application GSM RF Frame Relay MAC RLC BSSGP L1bis BSSGP Frame Relay LLC SNDCP GTP L1bis L1 L2 IP MS BSS (PCU) SGSN GGSN Um GnGb Gi IP UDP/ TCP UDP/ TCP
  • 24. © Peter R. Egli 2015 24/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 5. Public mobile networks (4/4) LTE (Long Term Evolution) is the 4th generation of mobile networks to replace G3 networks. LTE provides far greater bandwidths, even for moving mobile devices: LTE features: - High bandwidths (< 100Mbps) - Low latency (5ms) - Mobility support (< 500km/h, see above) - High spectral efficiency (3-4 times that of UMTS / HSPA) N.B.: First release of LTE is “only” 3.9G as it does not fully meet the 4G criteria (all IP). First version of LTE still supports TDM services. Source: http://www.bakom.admin.ch/dokumentation/Newsletter/01315/02251/02261/index.html?lang=de
  • 25. © Peter R. Egli 2015 25/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 6. Satellite Internet Access  Satellite Internet access is relatively cheap to deploy in areas where wired Internet access is difficult or impossible (remote areas).  Satellite access is also possible for moving hosts, e.g. Panasonic exConnect for Internet access & GSM phone service aboard long-haul flights.  A satellite system is usually optimized for one-way transmission (TV, radio). Downlink bandwidth is much cheaper than uplink bandwidth. Phase array antenna for satellite uplink (mounted on plane’s roof top) KU-band satellite (leased transponder) (Orbits: GEO - 39000km, LEO - 2000km) 5Mbps downstream 1.5Mbps upstream Ground station with NOC (Network Operating Center) and Internet connection 802.11b APs with wired distribution system (Ethernet) Satellite modem Access router To antenna NOC: Network Operating Center GEO: Geostationary Orbit LEO: Low Earth Orbit AP: Access Point Onboard installation
  • 26. © Peter R. Egli 2015 26/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 7. Wireless mobility  Mobility not only means obtaining an IP address dynamically (PPP, DHCP). Mobility means that a mobile host is always reachable irrespective of its current location (location transparency).  Mobility (location transparency) can be implemented at: 1. Datat link layer (L2): Examples: IEEE 802.11r Fast Roaming (not widely used) or GSM/CDMA. Allows to roam between access points (handover). No changes to clients (mobile nodes) needed. Works only for and within specific wireless technologies. 2. Application layer (L5-L7): Examples: SIP registrations, DNS/dynDNS. No changes to clients (mobile nodes) needed. Disruptive (an open connection will be dropped), thus only suited for quasi-static attachment to network using PPP, DHCP or PPPoE for obtaining IP address, e.g. once a day). 3. Network layer (L3): Examples: Mobile IP MIP RFC2002 (see below), Proxy MIP RFC5213. Transparent to transport protocols; thus applications are unaware of changes of network attachment (handover). Works for different wireless technologies. Changes in OS for mobile nodes required.
  • 27. © Peter R. Egli 2015 27/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 8. Mobile IP RFC2002 (1/5)  Mobile IP model: MN: Mobile Node HA: Home Agent FA: Foreign Agent CoA: Care of address (c/o) BSS: Basic Service Set (radio cell) CN: Correspondent Node (is either Mobile or stationary)  HA acts as an ‚anchor point‘  MN has always a relationship to HA (is registered with HA).  FA acts as tunnel endpoint.  N.B.: Mobile IP is not specifically restricted to wireless networks. Handover (moving from cell to cell) = change of ‚point of attachment‘ Cell (e.g. WLAN BSS) / Home Network Cell (e.g. WLAN BSS) / Foreign Network MN Visitor List Transmission Network (wired or wireless) MN Home address (fix) Colocated CoA CoA (tunnel endpoint address)Home address (fix) Tunnel (IP in IP) CN
  • 28. © Peter R. Egli 2015 28/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 8. Mobile IP RFC2002 (2/5)  MIP components: 1. Home Agent HA: An MN registers with its Home Agent and informs it about its CoA. A HA is a special process running on a router. 2. Foreign Agent FA: Establishes a tunnel with HA and forwards packets to/from MN from/to tunnel. An FA is a special process running on a router. 3. Correspondent Node CA: Communication partner for MN; a CA needn‘t have any knowledge about Mobile IP; CA is either a mobile itself or stationary. 4. Mobile Node MN: Any wireless appliance (handy, PDA, laptop, server aboard an airplane etc.).  MIP objectives: Mobile IP (RFC2002) aims at making the location of machines transparent to applications. If a user moves around the application communication should not be disrupted (TCP connections remain open even though MN obtains new IP address = ‚session continuity‘). Since a TCP connection is defined by the quadruplet {src IP, src port, dst IP, dst port} it is required that the MN retain its IP address when roaming (point of attachment changes). This in turn means that IP tunneling must be used. In a way mobile IP is similar to GSM where a user moves (roams) but can always be called from another phone, irrespective of his current location (handover/roaming even works during a call!).
  • 29. © Peter R. Egli 2015 29/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 8. Mobile IP RFC2002 (3/5)  How Mobile IP works: 1. MN Address: MN has fixed Home Address that never changes. A roaming MN is identified/addressed through this Home Address. 2. MIP Agent Discovery: During agent discovery MN finds HA or FA. MIP uses extensions to RFC1256 Router Advertisments. HA and FA advertise their capability to act as HA/FA through broadcasts at regular intervals (agent advertisments every few seconds containing a list of CoAs, also called beacons). If NN does not want to wait for router advertisment it can request a CoA through broad- or multicast (agent solicitation). 3. MIP Registration: MN registers CoA (endpoint address of tunnel that will be initiated by HA) with HA when it changes point of attachment (roams). 4. HA routing: HA adjusts its routing table to deliver (tunnel) packets destined to MN to make the connections to the MN transparent for applications. 4. Packets from MN to CN are either directly delivered (triangular routing) or the FA routes them back through the tunnel (‘reverse tunneling’).
  • 30. © Peter R. Egli 2015 30/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com 8. Mobile IP RFC2002 (4/5) Colocated CoA versus CoA: The FA either resides on the MN itself (colocated CoA) or on a dedicated device (shared CoA). 1. Colocated CoA: Mobile Node obtaines IP address through some external means (DHCP, PPP) and uses it as tunnel endpoint address. The MN itself terminates the tunnel, decapsulates the tunnel packets (removes outer header) and delivers (routes, forwards) the packet to the application. No foreign agent required. Multiple IP‘s required to support multiple mobile nodes 2. Shared CoA: All MN‘s in a foreign network have the same CoA address. The CoA is simply the IP address of the FA. The FA termates the tunnel, decapsulates the tunnel packets (removes outer header) and delivers the packet to the according MN. 1 IP address for multiple nodes FA required
  • 31. © Peter R. Egli 2015 31/31 Rev. 4.40 Wireless / Mobile Networks indigoo.com Foreign Network Internet 8. Mobile IP RFC2002 (5/5)  Mobile IP routing / packet forwarding: MN Home Network (LAN) HA CoA (tunnel endpoint address) 2 1 CN sends packet to MNs home address. HA performs proxy ARP to deliver L2 address on behalf of (absent) MN. When MN leaves home network the HA sends gratuitous ARPs (with HA‘s link layer address in order to update the ARP caches of hosts in the home network). 2 HA finds out that MN is not on home network but reachable through tunnel (routing entry) and sends packet to CoA (tunnel endpoint address of FA). 3 FA delivers the packet to the MN. 4 MN sends the reply back to the FA. 5a FA sends packet directly to CN (=„triangular routing“); the problem with this approach is that the reply packet does not take a topologically correct route (packet with IP-source=MN-home address comes from FA). Firewalls / packet filters along the way with ingress filtering thus may drop the packet. 5b Instead of directly routing the packet back to the CN the FA routes the packet back to the HA through the tunnel (=reverse tunneling).  N.B.: MN‘s home address may be private and thus not unique in the foreign network. Thus FA‘s routing entries must consist of a combination of link layer address (MAC), tunnel identification and MN-IP-address. 5a1 FA 3 45b CN