DC Unit-V
DC Unit-V
DC Unit-V
Of all the tremendous advances in data communications and telecommunications, perhaps the most
revolutionary is the development of cellular networks.
Cellular technology is the underlying technology for mobile telephones, personal communications systems,
wireless Internet and wireless Web applications, and much more. It is a technique developed to increase the
capacity available for mobile radio telephone service. Contrast with the older mobiles using large area, high-
power transmitters. The essence of a cellular network is the use of multiple low-power transmitters. The area to
be covered is divided into cells in a hexagonal tile pattern that provide full coverage of the area. Because the
range of such a transmitter is small, an area can be divided into cells, each one served by its own antenna.
Each cell is allocated a band of frequencies and is served by a base station, consisting of transmitter, receiver,
and control unit. Adjacent cells are assigned different frequencies to avoid interference or crosstalk. However,
cells sufficiently distant from each other can use the same frequency band.
Cellular Geometries
The first design decision to make is the shape of cells to cover an area. A matrix of square cells would be the simplest layout to
define, as seen here in the above Figure. However, this geometry is not ideal. If the width of a square cell is d, then a cell has four
neighbors at a distance d and four neighbors at a distance d. As a mobile user within a cell moves toward the cell's boundaries, it is
best if all of the adjacent antennas are equidistant. This simplifies the task of determining when to switch the user to an adjacent
antenna and which antenna to choose.
A hexagonal pattern provides for equidistant antennas (Figure 14.1b). The radius of a hexagon is defined to be the radius of
the circle that circumscribes it (equivalently, the distance from the center to each vertex; also equal to the length of a side of a
hexagon). For a cell radius R, the distance between the cell center and each adjacent cell center is d = R. In practice, a precise
hexagonal pattern is not used. Variations from the ideal are due to topographical limitations, local signal propagation conditions,
and practical limitation on siting antennas.
Frequency Reuse
With a wireless cellular system, you are limited in how often you can use the same frequency for different communications because
the signals, not being constrained, can interfere with one another even if geographically separated. Systems supporting a large
number of communications simultaneously need mechanisms to conserve spectrum. In a cellular system, each cell has a base
transceiver. The transmission power is carefully controlled (to the extent that it is possible in the highly variable mobile
communication environment) to allow communication within the cell using a given frequency while limiting the power at that
frequency that escapes the cell into adjacent ones. The objective is to use the same frequency in other nearby cells, thus allowing
the frequency to be used for multiple simultaneous conversations. Generally, 10 to 50 frequencies are assigned to each cell,
depending on the traffic expected.
The essential issue is to determine how many cells must intervene between two cells using the same frequency so that the
two cells do not interfere with each other. Various patterns of frequency reuse are possible. If the pattern consists of N cells and
each cell is assigned the same number of frequencies, each cell can have K/N frequencies, where K is the total number of
frequencies allotted to the system. For AMPS (Section 14.2), K = 395, and N = 7 is the smallest pattern that can provide sufficient
isolation between two uses of the same frequency. This implies that there can be at most 57 frequencies per cell on average.
Frequency Reuse Patterns
Above Figure shows some example reuse patterns. In characterizing frequency reuse, the following parameters are commonly used:
D = minimum distance between centers of cells that use the same band of frequencies (called cochannels)
R = radius of a cell
d = distance between centers of adjacent cells (d = R)
N = number of cells in repetitious pattern (reuse factor), each cell in pattern uses a unique band of frequencies.
With a hexagonal cell pattern, the following values of N possible
N = I2 + J2 + (I x J), I, J = 0, 1, 2, 3, …
Possible values of N are 1, 3, 4, 7, 9, 12, 13, 16, 19, 21, etc
Increasing Capacity
In time, as more customers use the system, traffic may build up so that there are not enough frequencies
assigned to a cell to handle its calls. A number of approaches have been used to cope with this situation,
including the following:
• Adding new channels: Typically, when a system is set up in a region, not all of the channels are used, and
growth and expansion can be managed in an orderly fashion by adding new channels.
• Frequency borrowing: In the simplest case, frequencies are taken from adjacent cells by congested cells.
The frequencies can also be assigned to cells dynamically.
increase. Cells in areas of high usage can be split into smaller cells.
• Cell sectoring: With cell sectoring, a cell is divided into a number of wedge-shaped sectors, each with its own
set of channels, typically three or six sectors per cell. Each sector is assigned a separate subset of the cell's
channels, and directional antennas at the base station are used to focus on each sector.
• Microcells: As cells become smaller, antennas move from the tops of tall buildings or hills, to the tops of
small buildings or the sides of large buildings, and finally to lamp posts, where they form microcells. Each
decrease in cell size is accompanied by a reduction in the radiated power levels from the base stations and the
mobile units. Microcells are useful in city streets in congested areas, along highways, and inside large public
buildings.
The use of smaller cells enables the use of lower power and provides superior propagation conditions.
Frequency Reuse Example
Example. Assume a system of 32 cells with a cell radius of 1.6 km, a total of 32 cells, a total frequency bandwidth that supports 336
traffic channels, and a reuse factor of N = 7. If there are 32 total cells, what geographic area is covered, how many channels are there
per cell, and what is the total number of concurrent calls that can be handled? Repeat for a cell radius of 0.8 km and 128 cells.
Figure a shows an approximately square pattern. The area of a hexagon of radius R is . A hexagon of radius 1.6 km has an
area of 6.65 km2, and the total area covered is 6.65 ´ 32 = 213 km2. For N = 7, the number of channels per cell is 336/7 = 48, for a
total channel capacity of 48 ´ 32 = 1536 channels. For the layout of Figure 14.4b, the area covered is 1.66 ´ 128 = 213 km2. The
number of channels per cell is 336/7 = 48, for a total channel capacity of 48 ´ 128 = 6144 channels.
Overview of Cellular System
The above Figure shows the principal elements of a cellular system. In the approximate center of each cell is a
base station (BS). The BS includes an antenna, a controller, and a number of transceivers, for communicating on
the channels assigned to that cell. The controller is used to handle the call process between the mobile unit and the
rest of the network. At any time, a number of mobile user units may be active and moving about within a cell,
communicating with the BS. Each BS is connected to a mobile telecommunications switching office (MTSO), with
one MTSO serving multiple BSs. Typically, the link between an MTSO and a BS is by a wire line, although a
wireless link is also possible. The MTSO connects calls between mobile units. The MTSO is also connected to the
public telephone or telecommunications network and can make a connection between a fixed subscriber to the
public network and a mobile subscriber to the cellular network. The MTSO assigns the voice channel to each call,
performs handoffs, and monitors the call for billing information.
Cellular System Channels
The use of a cellular system is fully automated and requires no action on the part of the
user other than placing or answering a call. Two types of channels are available between
the mobile unit and the base station (BS): control channels and traffic channels.
Control channels are used to exchange information having to do with setting up and
maintaining calls and with establishing a relationship between a mobile unit and the
nearest BS.
Traffic channels carry a voice or data connection between users.
Call Stages
Above Figure illustrates the steps in a typical call between two mobile users within an area controlled by a
single MTSO:
• Mobile unit initialization: mobile unit scans and selects the strongest setup control channel used for this system
(Figure 14.6a). Then a handshake takes place between the mobile unit and the MTSO controlling this cell, through the
BS in this cell, to identify the user and register its location.
• Mobile-originated call: A mobile unit originates a call by sending the number of the called unit on the preselected
setup channel (Figure b).
• Paging: The MTSO then attempts to complete the connection to the called unit, sending a paging message to
certain BSs depending on the called mobile number (Figure c).
• Call accepted: The called mobile unit recognizes its number on the setup channel being monitored and responds to
that BS, which sends the response to the MTSO. The MTSO sets up a circuit between the calling and called BSs, and
also selects an available traffic channel within each BS's cell and notifies each BS, which in turn notifies its mobile unit
(Figure d).
• Ongoing call: While connection is maintained, the mobile units exchange voice or data signals, through respective
BSs and MTSO (Figure e).
• Handoff: If a mobile unit moves out of range of one cell and into the range of another during a connection, the traffic
channel has to change to one assigned to the BS in the new cell (Figure f).
Other Functions
Other functions performed by the system but not illustrated in the previous Figure include:
• Call blocking: During the mobile-initiated call stage, if all the traffic channels assigned to the nearest
BS are busy, then the mobile unit makes a preconfigured number of repeated attempts. After a certain
number of failed tries, a busy tone is returned to the user.
• Call termination: When one of the two users hangs up, the MTSO is informed and the traffic
channels at the two BSs are released.
• Call drop: During a connection, because of interference or weak signal spots in certain areas, if the
BS cannot maintain the minimum required signal strength for a certain period of time, the traffic
channel to the user is dropped and the MTSO is informed.
• Calls to/from fixed and remote mobile subscriber: The MTSO connects to the public switched
telephone network. Thus, the MTSO can set up a connection between a mobile user in its area and a
fixed subscriber via the telephone network. Further, the MTSO can connect to a remote MTSO via the
telephone network or via dedicated lines and set up a connection between a mobile user in its area
and a remote mobile user.
Mobile Radio
Propagation Effects
Mobile radio communication introduces complexities not found in wire communication or in fixed
wireless communication. Two general areas of concern are signal strength and signal propagation
effects.
• Signal strength: The strength of the signal between the base station and the mobile unit
must be strong enough to maintain signal quality at the receiver but no so strong as to create
too much cochannel interference with channels in another cell using the same frequency
band. Several complicating factors exist. Human-made noise varies considerably, resulting in
a variable noise level. For example, automobile ignition noise in the cellular frequency range
is greater in the city than in a suburban area. Other signal sources vary from place to place.
The signal strength varies as a function of distance from the BS to a point within its cell.
Moreover, the signal strength varies dynamically as the mobile unit moves.
• Fading: The term fading refers to the time variation of received signal power caused by
changes in the transmission medium or path(s). In a fixed environment, fading is affected by
changes in atmospheric conditions, such as rainfall. But in a mobile environment, where one
of the two antennas is moving relative to the other, the relative location of various obstacles
changes over time, creating complex transmission effects. Even if signal strength is within an
effective range, signal propagation effects may disrupt the signal and cause errors.
Design Factors
In designing a cellular layout, the communications engineer must take account of these
various propagation effects, the desired maximum transmit power level at the base
station and the mobile units, the typical height of the mobile unit antenna, and the
available height of the BS antenna. These factors will determine the size of the
individual cell. Unfortunately, as just described, the propagation effects are dynamic
and difficult to predict. The best that can be done is to come up with a model based on
empirical data and to apply that model to a given environment to develop guidelines for
cell size. One of the most widely used models was developed by Okumura et al
[OKUM68] and subsequently refined by Hata [HATA80]. The original was a detailed
analysis of the Tokyo area and produced path loss information for an urban
environment. Hata's model is an empirical formulation that takes into account a variety
of environments and conditions. See text for more details.
Multipath Propagation
Three propagation mechanisms, illustrated in Stallings DCC8e Figure 14.7, play a role. These three propagation effects influence
system performance in various ways depending on local conditions and as the mobile unit moves within a cell.
Reflection occurs when an electromagnetic signal encounters a surface that is large relative to the wavelength of the signal.
For example, suppose a ground-reflected wave near the mobile unit is received. Because the ground-reflected wave has a 180º
phase shift after reflection, the ground wave and the line-of-sight (LOS) wave may tend to cancel, resulting in high signal loss.
Further, because the mobile antenna is lower than most human-made structures in the area, multipath interference occurs. These
reflected waves may interfere constructively or destructively at the receiver.
Diffraction occurs at the edge of an impenetrable body that is large compared to the wavelength of the radio wave. When a
radio wave encounters such an edge, waves propagate in different directions with the edge as the source. Thus, signals can be
received even when there is no unobstructed LOS from the transmitter.
If the size of an obstacle is on the order of the wavelength of the signal or less, scattering occurs. An incoming signal is
scattered into several weaker outgoing signals. At typical cellular microwave frequencies, there are numerous objects, such as lamp
posts and traffic signs, that can cause scattering. Scattering effects are difficult to predict.
Effects of Multipath Propagation
As just noted, one unwanted effect of multipath propagation is that multiple copies of a signal may arrive at different phases. If
these phases add destructively, the signal level relative to noise declines, making signal detection at the receiver more difficult. A
second phenomenon, of particular importance for digital transmission, is intersymbol interference (ISI). Consider that we are
sending a narrow pulse at a given frequency across a link between a fixed antenna and a mobile unit. Stallings DCC8e Figure 14.8
shows what the channel may deliver to the receiver if the impulse is sent at two different times. The upper line shows two pulses at
the time of transmission. The lower line shows the resulting pulses at the receiver. In each case the first received pulse is the desired
LOS signal. The magnitude of that pulse may change because of changes in atmospheric attenuation. Further, as the mobile unit
moves farther away from the fixed antenna, the amount of LOS attenuation increases. But in addition to this primary pulse, there
may be multiple secondary pulses due to reflection, diffraction, and scattering. Now suppose that this pulse encodes one or more
bits of data. In that case, one or more delayed copies of a pulse may arrive at the same time as the primary pulse for a subsequent
bit. These delayed pulses act as a form of noise to the subsequent primary pulse, making recovery of the bit information more
difficult. As the mobile antenna moves, the location of various obstacles changes; hence the number, magnitude, and timing of the
secondary pulses change. This makes it difficult to design signal processing techniques that will filter out multipath effects so that
the intended signal is recovered with fidelity.
Types of Fading
Fading effects in a mobile environment can be classified as either fast or slow. Referring to Stallings
DCC8e Figure 14.7, as the mobile unit moves down a street in an urban environment, rapid
variations in signal strength occur over distances of about one-half a wavelength. At a frequency of
900 MHz, which is typical for mobile cellular applications, a wavelength is 0.33 m. Changes of
amplitude can be as much as 20 or 30 dB over a short distance. This type of rapidly changing fading
phenomenon, known as fast fading, affects not only mobile phones in automobiles, but even a
mobile phone user walking down an urban street. As the mobile user covers distances well in excess
of a wavelength, the urban environment changes, as the user passes buildings of different heights,
vacant lots, intersections, and so forth. Over these longer distances, there is a change in the average
received power level about which the rapid fluctuations occur. This is referred to as slow fading.
Fading effects can also be classified as flat or selective. Flat fading, or nonselective fading, is
that type of fading in which all frequency components of the received signal fluctuate in the same
proportions simultaneously. Selective fading affects unequally the different spectral components of
a radio signal. The term selective fading is usually significant only relative to the bandwidth of the
overall communications channel. If attenuation occurs over a portion of the bandwidth of the signal,
the fading is considered to be selective; nonselective fading implies that the signal bandwidth of
interest is narrower than, and completely covered by, the spectrum affected by the fading.
Error Compensation Mechanisms
The efforts to compensate for the errors and distortions introduced by multipath fading fall
into three general categories: forward error correction, adaptive equalization, and
diversity techniques. In the typical mobile wireless environment, techniques from all three
categories are combined to combat the error rates encountered.
Forward error correction is applicable in digital transmission applications: those in
which the transmitted signal carries digital data or digitized voice or video data. Typically
in mobile wireless applications, the ratio of total bits sent to data bits sent is between 2
and 3. This may seem an extravagant amount of overhead, in that the capacity of the
system is cut to one-half or one-third of its potential, but the mobile wireless environment
is so difficult that such levels of redundancy are necessary. Chapter 6 discusses forward
error correction.
Adaptive equalization can be applied to transmissions that carry analog
information (e.g., analog voice or video) or digital information (e.g., digital data, digitized
voice or video) and is used to combat intersymbol interference. The process of
equalization involves some method of gathering the dispersed symbol energy back
together into its original time interval. Equalization is a broad topic; techniques include the
use of so-called lumped analog circuits as well as sophisticated digital signal processing
algorithms.
Error Compensation Mechanisms
Diversity is based on the fact that individual channels experience independent fading events. We
can therefore compensate for error effects by providing multiple logical channels in some sense
between transmitter and receiver and sending part of the signal over each channel. This technique
does not eliminate errors but it does reduce the error rate, since we have spread the transmission
out to avoid being subjected to the highest error rate that might occur. The other techniques
(equalization, forward error correction) can then cope with the reduced error rate.
Some diversity techniques involve the physical transmission path and are referred to as
space diversity. For example, multiple nearby antennas may be used to receive the message, with
the signals combined in some fashion to reconstruct the most likely transmitted signal. Another
example is the use of collocated multiple directional antennas, each oriented to a different
reception angle with the incoming signals again combined to reconstitute the transmitted signal.
More commonly, the term diversity refers to frequency diversity or time diversity techniques. With
frequency diversity, the signal is spread out over a larger frequency bandwidth or carried on
multiple frequency carriers.
First Generation Analog
The original cellular telephone networks provided analog traffic channels; these are now referred
to as first-generation systems. Since the early 1980s the most common first-generation system in
North America has been the Advanced Mobile Phone Service (AMPS) developed by AT&T. This
approach is also common in South America, Australia, and China. Although gradually being
replaced by second-generation systems, AMPS is still in common use. In this section, we provide
an overview of AMPS.
AMPS Spectral Allocation In North America
In North America, two 25-MHz bands are allocated to AMPS (see Stallings DCC8e
Table 14.2), one for transmission from the base station to the mobile unit (869–894
MHz), the other for transmission from the mobile to the base station (824–849 MHz).
Each of these bands is split in two to encourage competition (i.e., so that in each market
two operators can be accommodated). An operator is allocated only 12.5 MHz in each
direction for its system. The channels are spaced 30 kHz apart, which allows a total of
416 channels per operator. Twenty-one channels are allocated for control, leaving 395
to carry calls. The control channels are data channels operating at 10 kbps. The
conversation channels carry the conversations in analog using frequency modulation.
Control information is also sent on the conversation channels in bursts as data. This
number of channels is inadequate for most major markets, so some way must be found
either to use less bandwidth per conversation or to reuse frequencies. Both approaches
have been taken in the various approaches to mobile telephony. For AMPS, frequency
reuse is exploited.
Operation
AMPS-capable phone has numeric assignment
module (NAM) in read-only memory
NAM contains number of phone
serial number of phone
channel access
(DSSS)
Code Division Multiple
Access (CDMA) Advantages
frequency diversity
noise bursts & fading have less effect
multipath resistance
chipping codes have low cross & auto correlation
privacy
inherent in use of spread-spectrum
graceful degradation
more users means more noise
leads to slow signal degradation until unacceptable
Code Division Multiple Access
(CDMA) Disadvantages
self-jamming
some cross correlation between users
near-far problem
signals closer to receiver are received with
less attenuation than signals farther away
RAKE Receiver
IS-95
second generation CDMA scheme
primarily deployed in North America
transmission structures different on
forward and reverse links
IS-95 Channel Structure
IS-95 Forward Link
four types of channels
Pilot (channel 0)
• allows mobile unit to acquire timing information
Synchronization (channel 32)
• 1200-bps channel used by mobile station to obtain
identification information about the cellular system
Paging (channels 1 to 7)
• Contain messages for one or more mobile stations
Traffic (channels 8 to 31 and 33 to 63)
• 55 traffic channels
all channels use same bandwidth
Forward
Link
Processing
Forward Link - Scrambling
after interleaver, data scrambled
privacy mask
prevent sending of repetitive patterns
reduces probability of users sending at peak power at
same time
scrambling done by long code
pseudorandom number from 42-bit shift register
initialized with user's electronic serial number
guaranteed
Third Generation Systems
high-speed wireless communications to support
multimedia, data, and video in addition to voice
3G capabilities:
• voice quality comparable to PSTN
• 144 kbps available to users over large areas
• 384 kbps available to pedestrians over small areas
• support for 2.048 Mbps for office use
• symmetrical and asymmetrical data rates
• packet-switched and circuit-switched services
• adaptive interface to Internet
• more efficient use of available spectrum
• support for variety of mobile equipment
• allow introduction of new services and technologies
Driving Forces
trend toward universal personal telecommunications
universal communications access
GSM cellular telephony with subscriber identity module,
is step towards goals
personal communications services (PCSs) and personal
communication networks (PCNs) also form objectives for
third-generation wireless
technology is digital using time division multiple access
or code-division multiple access
PCS handsets low power, small and light
IMT-2000 Terrestrial Radio
Alternative Interfaces
CDMA Design Considerations
– Bandwidth and Chip Rate
dominant technology for 3G systems is CDMA
3 CDMA schemes, share some design issues
bandwidth (limit channel to 5 MHz)
5 MHz reasonable upper limit on what can be
allocated for 3G
5 MHz is enough for data rates of 144 and 384 kHz
chip rate
given bandwidth, chip rate depends on desired data
rate, need for error control, and bandwidth limitations
chip rate of 3 Mbps or more reasonable
CDMA Design Considerations
– Multirate
provision of multiple fixed-data-rate channels to user
different data rates provided on different logical channels
logical channel traffic can be switched independently
through wireless fixed networks to different destinations
flexibly support multiple simultaneous applications
efficiently use available capacity by only providing the
capacity required for each service
use TDMA within single CDMA channel
or use multiple CDMA codes
CDMA Multirate
Time and Code Multiplexing
Summary
principles of wireless cellular networks
operation of wireless cellular networks
first-generation analog
second-generation CDMA
third-generation systems
Wireless LANs
Overview of Wireless LANs
wireless transmission medium
issues of high prices, low data rates,
occupational safety concerns, & licensing
requirements now addressed
key application areas:
LAN extension
cross-building interconnect
nomadic access
used to connect
wired or wireless
LANs in nearby
buildings
point-to-point
connect wireless link
bridges or used
routers • not a LAN per
se
Nomadic Access
link LAN hub & mobile data terminal
also
useful in extended environment such
as campus or cluster of buildings
users move around with portable computers
access to servers on wired LAN
Infrastructure Wireless LAN
Ad Hoc Networking
temporary peer-to-peer network
Wireless LAN Requirements
CONNECTION TO
THROUGHPUT – NUMBER OF NODES-
BACKBONE LAN –
should make efficient hundreds of nodes
use of control
use of medium across multiple cells
modules
BATTERY POWER
TRANSMISSION
SERVICE AREA – CONSUMPTION –
ROBUST AND
coverage area of 100 reduce power
SECURITY– reliability
to 300m consumption while
and privacy/security
not in use
LICENSE-FREE
COLLOCATED
OPERATION – not HANDOFF/ROAMING–
NETWORK
having to secure a enable stations to
OPERATION –
license for the move from one cell to
possible interference
frequency band used another
between LANs
by the LAN
DYNAMIC
CONFIGURATION-
addition, deletion,
relocation of end
systems without
disruption
Wireless LANs
spread
infrared (IR)
spectrum OFDM LANs LANs
LANs
Interference
• many devices around 900 MHz: cordless
telephones, wireless microphones, and
amateur radio
• fewer devices at 2.4 GHz; microwave oven
• little competition at 5.8 GHz
IEEE 802
Standards
IEEE 802 Terminology
IEEE 802.11 Architecture
IEEE 802.11 - BSS
basic service set (BSS) building block
may be isolated
may connect to backbone distribution
system (DS) through access point (AP)
BSS generally corresponds to cell
DS can be switch, wired network, or
wireless network
have independent BSS (IBSS) with no AP
Extended Service Set (ESS)
possible configurations:
simplest is each station belongs to single BSS
can have two BSSs overlap
BSS, distribution
service logically goes
through single AP of
that BSS
Association Related Services
DS requires info about stations within ESS
provided by association-related services
station must associate before
communicating
3 mobility transition types:
no transition - stationary or in single BSS
BSS transition - between BSS in same ESS
access
control
reliable
data security
delivery
MAC layer
covers
three
functional
areas:
Reliable Data Delivery
can be dealt with at a higher
layer
more efficient to deal with 802.11 physical and MAC
errors at MAC level layers unreliable
802.11 includes frame noise, interference, and
exchange protocol other propagation effects
station receiving frame result in loss of frames
returns acknowledgment even with error-
(ACK) frame correction codes, frames
exchange treated as may not successfully be
atomic unit received
if no ACK within short
with ACK
Media Access Control
Distributed Coordination
Function
DCF sublayer uses CSMA
CF-End + CF-Ack:
• acknowledges CF-
Acknowledgment Contention-Free (CF) end to end
(ACK) -end contention-free
period and release
• acknowledges • announces end of stations from
correct receipt contention-free associated
period part of PCF restrictions
Data Frames – Data Carrying
eight data frame subtypes
organized in two groups
• first four carry upper-level data
• remaining do not carry any user data
Data
simplest data frame, contention or contention-free use
Data + CF-Ack
carries data and acknowledges previously received data
during contention-free period
Data + CF-Poll
used by point coordinator to deliver data &request send
Data + CF-Ack + CF-Poll
combines Data + CF-Ack and Data + CF-Poll
Data Frames –
Not Data Carrying
Null Function
carries no data, polls, or acknowledgments
carries power management bit in frame control field to
AP
indicates station is changing to low-power state
used to manage
communications management of
between stations and associations
Aps
• requests, response,
reassociation, dissociation, and
authentication
802.11 Physical Layer
Original 802.11 Physical Layer
- DSSS
Direct-sequence spread spectrum (DSSS)
2.4 GHz ISM band at 1 Mbps and 2 Mbps
up to seven channels, each 1 Mbps or 2 Mbps,
can be used
depends on bandwidth allocated by various
national regulations
13 in most European countries
one in Japan
pseudonoise sequence
1-MHz channels are used
5 MHz in Japan
architecture
• most important enhancement
radio transmission scheme
• increased capacity
MAC enhancements
• most significant change is to aggregate multiple
MAC frames into a single block for transmission
Access and Privacy Services
- Authentication
used to establish station identity
wired LANs assume physical connection gives
authority to useLAN
not a valid assumption for wireless LANs
802.11 supports several authentication schemes
does not mandate any particular scheme
from relatively insecure handshaking to public-key
encryption
802.11 requires mutually acceptable, successful
authentication before association
Access and Privacy Services
Deauthentication & Privacy
Deauthentication Privacy
used to prevent
invoked whenever an
messages being read by
existing authentication
others
is to be terminated
802.11 allows optional
use of encryption
original WEP security
features were weak
subsequently 802.11i and
WPA alternatives evolved
giving better security
802.16: WiMAX
point-to-point
like 802.11 & cellular:
base station model
transmissions to/from
base station by hosts
with omnidirectional
antenna
base station-to-base point-to-multipoint
station backhaul with
point-to-point antenna
unlike 802.11:
range ~ 6 miles (“city
rather than coffee
shop”)
Lappeenranta University of
Technology / JP, PH, AH
WPAN
(Bluetooth & ZigBee)
Bluetooth Overview
• Universal short-range wireless capability
• Uses 2.4-GHz band
• Available globally for unlicensed users
• Devices within 10 m can share up to 720 kbps
of capacity
• Supports open-ended list of applications
– Data, audio, graphics, video
Bluetooth Application Areas
• Data and voice access points
– Real-time voice and data transmissions
• Cable replacement
– Eliminates need for numerous cable attachments
for connection
• Ad hoc networking
– Device with Bluetooth radio can establish
connection with another when in range
Bluetooth Standards
Documents
• Core specifications
– Details of various layers of Bluetooth protocol
architecture
• Profile specifications
– Use of Bluetooth technology to support various
applications
Protocol Architecture
• Bluetooth is a layered protocol architecture
– Core protocols
– Cable replacement and telephony control protocols
– Adopted protocols
• Core protocols
– Radio
– Baseband
– Link manager protocol (LMP)
– Logical link control and adaptation protocol (L2CAP)
– Service discovery protocol (SDP)
Protocol Architecture
• Cable replacement protocol
– RFCOMM
• Telephony control protocol
– Telephony control specification – binary (TCS BIN)
• Adopted protocols
– PPP
– TCP/UDP/IP
– OBEX
– WAE/WAP
Usage Models
• File transfer
• Internet bridge
• LAN access
• Synchronization
• Three-in-one phone (Cordless, Phone2Phone,
Cellular)
• Headset
Usage Models
Piconets and Scatternets
• Piconet
– Basic unit of Bluetooth networking
– Master and one to seven slave devices
– Master determines channel and phase
• Scatternet
– Device in one piconet may exist as master or slave in
another piconet
– Allows many devices to share same area
– Makes efficient use of bandwidth
Wireless Network
Configurations
Radio Specification
• Classes of transmitters
– Class 1: Outputs 100 mW for maximum range
• Power control mandatory
• Provides greatest distance
– Class 2: Outputs 2.4 mW at maximum
• Power control optional
– Class 3: Nominal output is 1 mW
• Lowest power
Frequency Hopping in
Bluetooth
• Provides resistance to interference and
multipath effects
• Provides a form of multiple access among co-
located devices in different piconets
Frequency Hopping
• Total bandwidth divided into 1MHz physical channels
• FH occurs by jumping from one channel to another in
pseudorandom sequence
• Hopping sequence shared with all devices on piconet
• Piconet access:
– Bluetooth devices use time division duplex (TDD)
– Access technique is TDMA
– FH-TDD-TDMA
Frequency Hopping
Physical Links between
Master and Slave
• Synchronous connection oriented (SCO)
– Allocates fixed bandwidth between point-to-point
connection of master and slave
– Master maintains link using reserved slots
– Master can support three simultaneous links
• Asynchronous connectionless (ACL)
– Point-to-multipoint link between master and all slaves
– Only single ACL link can exist
Bluetooth Baseband format
Bluetooth Packet Fields
• Access code – used for timing
synchronization, offset compensation, paging,
and inquiry
• Header – used to identify packet type and
carry protocol control information
• Payload – contains user voice or data and
payload header, if present
Types of Access Codes
• Channel access code (CAC) – identifies a
piconet
• Device access code (DAC) – used for paging
and subsequent responses
• Inquiry access code (IAC) – used for inquiry
purposes
Access Code
• Preamble – used for DC compensation
– 0101 if LSB of sync word is 0
– 1010 if LSB of synch word is 1
• Sync word – 64-bits, derived from:
– 7-bit Barker sequence
– Lower address part (LAP)
– Pseudonoise (PN) sequence
• Trailer
– 0101 if MSB of sync word is 1
– 1010 if MSB of sync word is 0
Packet Header Fields
• AM_ADDR – contains “active mode” address of one
of the slaves
• Type – identifies type of packet
• Flow – 1-bit flow control
• ARQN – 1-bit acknowledgment
• SEQN – 1-bit sequential numbering schemes
• Header error control (HEC) – 8-bit error detection
code
Payload Format
• Payload header
– L_CH field – identifies logical channel
– Flow field – used to control flow at L2CAP level
– Length field – number of bytes of data
• Payload body – contains user data
• CRC – 16-bit CRC code
Error Correction Schemes
• 1/3 rate FEC (forward error correction)
– Used on 18-bit packet header, voice field in HV1
packet
• 2/3 rate FEC
– Used in DM packets, data fields of DV packet, FHS
packet and HV2 packet
• ARQ
– Used with DM and DH packets
ARQ Scheme Elements
• Error detection – destination detects errors, discards
packets
• Positive acknowledgment – destination returns
positive acknowledgment
• Retransmission after timeout – source retransmits if
packet unacknowledged
• Negative acknowledgment and retransmission –
destination returns negative acknowledgement for
packets with errors, source retransmits
Bluetooth ARQ
Logical Channels
• Link control (LC)
• Link manager (LM)
• User asynchronous (UA)
• User isochronous (UI)
• Use synchronous (US)
Channel Control
• States of operation of a piconet during link
establishment and maintenance
• Major states
– Standby – default state
– Connection – device connected
Channel Control
• Interim substates for adding new slaves
– Page – device issued a page (used by master)
– Page scan – device is listening for a page
– Master response – master receives a page response from
slave
– Slave response – slave responds to a page from master
– Inquiry – device has issued an inquiry for identity of
devices within range
– Inquiry scan – device is listening for an inquiry
– Inquiry response – device receives an inquiry response
State Transition Diagram
Inquiry Procedure
• Potential master identifies devices in range that wish
to participate
– Transmits ID packet with inquiry access code (IAC)
– Occurs in Inquiry state
• Device receives inquiry
– Enter Inquiry Response state
– Returns FHS packet with address and timing information
– Moves to page scan state
Page Procedure
• Master uses devices address to calculate a
page frequency-hopping sequence
• Master pages with ID packet and device access
code (DAC) of specific slave
• Slave responds with DAC ID packet
• Master responds with its FHS packet
• Slave confirms receipt with DAC ID
• Slaves moves to Connection state
Slave Connection State
Modes
• Active – participates in piconet
– Listens, transmits and receives packets
• Sniff – only listens on specified slots
• Hold – does not support ACL packets
– Reduced power status
– May still participate in SCO exchanges
• Park – does not participate on piconet
– Still retained as part of piconet
Bluetooth Audio
• Voice encoding schemes:
– Pulse code modulation (PCM)
– Continuously variable slope delta (CVSD)
modulation
• Choice of scheme made by link manager
– Negotiates most appropriate scheme for
application
Bluetooth Link Security
• Elements:
– Authentication – verify claimed identity
– Encryption – privacy
– Key management and usage
• Security algorithm parameters:
– Unit address
– Secret authentication key
– Secret privacy key
– Random number
LMP PDUs
• General response
• Security Service
– Authentication
– Pairing
– Change link key
– Change current link key
– Encryption
LMP PDUs
• Time/synchronization
– Clock offset request
– Slot offset information
– Timing accuracy information request
• Station capability
– LMP version
– Supported features
LMP PDUs
• Mode control
– Switch master/slave role
– Name request
– Detach
– Hold mode
– Sniff mode
– Park mode
– Power control
LMP PDUs
• Mode control (cont.)
– Channel quality-driven change between DM and
DH
– Quality of service
– Control of multislot packets
– Paging scheme
– Link supervision
L2CAP
• Provides a link-layer protocol between entities with a
number of services
• Relies on lower layer for flow and error control
• Makes use of ACL links, does not support SCO links
• Provides two alternative services to upper-layer
protocols
– Connection service
– Connection-mode service
L2CAP Logical Channels
• Connectionless
– Supports connectionless service
– Each channel is unidirectional
– Used from master to multiple slaves
• Connection-oriented
– Supports connection-oriented service
– Each channel is bidirectional
• Signaling
– Provides for exchange of signaling messages between
L2CAP entities
L2CAP Packet Fields for
Connectionless Service
• Length – length of information payload, PSM fields
• Channel ID – 2, indicating connectionless channel
• Protocol/service multiplexer (PSM) – identifies higher
-layer recipient for payload
– Not included in connection-oriented packets
• Information payload – higher-layer user data
Signaling Packet Payload
• Consists of one or more L2CAP commands,
each with four fields
– Code – identifies type of command
– Identifier – used to match request with reply
– Length – length of data field for this command
– Data – additional data for command, if necessary
L2CAP Signaling Command
Codes
L2CAP Signaling Commands
• Command reject command
– Sent to reject any command
• Connection commands
– Used to establish new connections
• Configure commands
– Used to establish a logical link transmission
contract between two L2CAP entities
L2CAP Signaling Commands
• Disconnection commands
– Used to terminate logical channel
• Echo commands
– Used to solicit response from remote L2CAP entity
• Information commands
– Used to solicit implementation-specific
information from remote L2CAP entity
Flow Specification
Parameters
• Service type
• Token rate (bytes/second)
• Token bucket size (bytes)
• Peak bandwidth (bytes/second)
• Latency (microseconds)
• Delay variation (microseconds)
802.15.4 “Zigbee”
• ZigBee is a low-power wireless
communications technology
• ZigBee uses the PHY and MAC layers defined
by IEEE 802.15.4, which is the short-distance
wireless communication standard for 2.4 GHz
band.
• 250 kbit/s
• Regional operation on 915 MHz (Americas)
and 868 MHz (Europe)
• 20-40 kbit/s
Zigbee Features
• Low Power
– 1 mW output power and 10-20 m range
• Support for power saving and power
harvesting
• Robust
• Mesh Networking
• Interoperability
• Simple MAC layer
• Secure
Applications
• Industrial control
• Monitoring
• Smart badges
• Interconnections of environmental sensors
• Remote controls
Thank You...