SlideShare a Scribd company logo
Unit – V
Mobile Data Networks
Introduction
Data oriented CDPD Network
GPRS and higher data rates
Short messaging service in GSM
Mobile application protocol
Wireless ATM & HIPERLAN: Introduction
Wireless ATM
HIPERLAN
Introduction
• Mobile Data:
–Mobile data networks refer to those services,
technologies and standards over wide area
coverage spanning more than local area or
campus.
–Mobile data networks are classified into three
categories:
• Independent
• Shared
• Overlay
Mobile Data
Networks
Independent
Licensed
bands
Examples:
ARDIS,
Mobitex
Unlicensed
bands
Examples:
Metricom
Ricochet
Shared
Example:
CDPD
Overlay
Overlay on
traffic
channels
Example:
GPRS
Overlay on
signaling
channels
Example: SMS
Figure: Classification of Mobile Data Networks
Independent Mobile Data
• Independent networks have their own spectrum
and infrastructure not shared with any other
service.
• First group uses independent spectrum in licensed
bands.
– Ex: ARDIS and Mobitex (first mobile data services that
were introduced).
– Not economically successful.
Independent Mobile Data
• Second group uses independent spectrum in
unlicensed bands.
– Shared among variety of applications and users.
– Ex: Metricom’s Ricochet service used 915 MHz
unlicensed ISM band.
– This service was deployed in airports and some
metropolitan areas for internet services.
Shared Mobile Data
• These networks share the spectrum and part of the
infrastructure with an already existing analog voice-
oriented service.
• In addition to dedicated channels, these services can also
use the available unused channels.
• Initial deployment could be made in areas where there is
subscriber demand.
• Ex: CDPD service which shares spectrum and part of
infrastructure with AMPS.
Overlay Mobile Data
• These networks not only makes use of the spectrum
allocated for another service but also the air-interface
and MAC frames of an existing voice-oriented digital
cellular network.
• Ex: GPRS and GSM’s SMS are examples of such overlays.
– They make use of free time slots available within the traffic
channels and signaling channels in GSM.
– Amount of infrastructure required is reduced to bare
minimum.
Data-Oriented CDPD Network
• CDPD is one of the longest surviving wide area
mobile data technologies worldwide.
• It is a shared mobile data network that shares
part of the infrastructure and entire spectrum
with AMPS in United States.
• It is an open standard making its implementation
easier and more widespread.
What is CDPD?
• Design goals of CDPD included location independence and
independence from service provider, so that coverage could be
maximized.
• CDPD used primitive RF technology for cost reasons and GMSK
modulation scheme was chosen.
• Raw signaling rate is 19.2 kbps with Reed-Solomon (RS) coding.
• CDPD employs a technique called RF sniffing to detect whether
an AMPS call is trying to access frequency channel
– And hopping to move from such a band to another to give
the voice call priority.
CDPD Services
• Network services are the basic form of services offered by
CDPD.
– Supports for transfer of data from one location to another
via standard network layer protocols.
– CDPD supports connectionless layer 3 protocols (IP or
connectionless network protocol - CLNP).
• Network support services are services necessary to maintain
the operation of mobile data network such as management,
security etc.
– These services include mobility and radio resource
management, that are transparent to the user.
• Network application services:
– These are value added services such as limited size
messaging that need explicit subscription.
Reference Architecture in CDPD
Reference Architecture in CDPD
• There are three key interfaces that form logical boundaries for
CDPD service provider’s network.
• A-Interface: air link interface
• E-Interface:
– external interface by which CDPD operates with the rest of
data network.
– Protocols IP, CLNP and IPv6 will be supported.
• I-Interface: Interservice provider interface
– Supports E-interface protocols plus two CDPD specific
protocols
• MNLP: Mobile Network Location Protocol – by which
mobile users from one system are supported by another
system.
• Network management protocols.
Physical Architecture
Physical Architecture
1. Mobile-End System (M-ES):
• ultimate source and destination of PDUs.
• Equipped with a CDPD radio and software.
• Ex: telemetry devices, laptops, vending machines etc.
• Can be full duplex or half duplex.
• Employs variety of power sources such as internal batteries,
laptop based PC card etc.
• Has three functional units:
i. Subscriber unit (SU) establishes and maintains data comm.
ii. Subscriber identity module (SIM) is a repository of identity
and authentication credentials.
iii. Mobile application system (MAS) deals with higher layer
protocols.
Physical Architecture
2. Mobile Data Base Station (MDBS):
• Is the system end of the MAC sublayer over the air
interface.
• Communicates with M-ES through the A-interface.
• Performs modulation of data bits and demodulation
of RF signal.
• Actively participates in the medium access scheme
called digital sense multiple access (DSMA).
Physical Architecture
2. Mobile Data Intermediate System (MD-IS):
• Is the focal point of CDPD mobility management and
packet forwarding.
• Has mobile serving function (MSF) that serves as a
foundation for registration of a mobile.
• Also performs accounting services.
3. Fixed-end system (F-ES):
• Conventional network node that includes PCs,
workstations etc.
• Internal F-ES operates within the boundaries of CDPD
network and is under the control of service provider.
Mobility Support in CDPD
• Mobility Management:
• Mobility Management Service manages network roaming and
tracks the location of each CDPD subscriber, as well as keep the
serving MD-IS informed of that location down to the specific cell
site.
• In a wireless mobile data network, the endpoints of the data
connections can be located anywhere in the network coverage
area, and the location of these endpoints can change over time
thus mobility management is important.
• Like voice cellular networks, CDPD supports roaming. CDPD
devices have a home sub-domain usually the home city of the
subscriber. One may travel from a sub-domain registered as one’s
home area to a new serving area.
Mobility Support in CDPD (cont…)
• Mobility Management:
• The CDPD network’s Mobility Management Service handles the
routing of packets for all visiting M-ESs in its serving area.
• The home area is that in which the CDPD subscriber has registered
their device with a CDPD service provider. If the subscriber travels
to another area, the mobility management services maintain
information about their current serving area.
• Mobility management services in the new serving area regularly
notify the subscriber’s home-area CDPD network of the
subscriber’s new location. Therefore, a CDPD subscriber can travel
throughout the country and still obtain CDPD network services.
Mobility Support in CDPD (cont…)
• Mobility Management:
Mobility Support in CDPD (cont…)
• Mobility Management:
• CDPD mobility management is based on principles similar to
mobile-IP. The MD-IS is the central element in the process.
• An MD-IS is logically separated into a home MD-IS and serving
MD-IS. A home MD-IS contains a subscription database for its
geographic area. Each subscriber is registered in his home. MD-IS
associated with his home area.
• The IP address of a subscriber points to his home MD-IS. At the
home MD-IS, MHF maintains information about the current
location of MHS associated with that home MD-IS.
• The MHS also encapsulates any packet that is addressed to an M-
ES homes with it directing it to an MSF associated with the serving
MD-IS, whose serving area the M-ES is currently visiting
Mobility Support in CDPD (cont…)
• Mobility Management:
• A serving MD-IS manages one serving MD-IS, whose MSF contains
information about all subscribers currently visiting the area and
registered with it.
• The MSF employs the mobile network location protocol (MNLP) to
notify the MHF about the presence of the M-ES in its service area.
The channel stream in which a subscriber is active is also
indicated. The MSF decapsulates forwarded packets and routes
them to the correct channel stream in the cell.
Mobility Support in CDPD (cont…)
• Handoff procedure in CDPD:
• Handoff in CDPD occurs when the M-ES moves from one cell to
another or if the CDPD channel quality deteriorates, the current
CDPD channel is requested by an AMPS voice call, or if the load on
the CDPD channels in the current cell is much more than the load
on the channels in an overlapping cell.
• The physical layer of CDPD provides the ability to tune to a specific
RF channel, the ability to measure the received signal strength of
the received signal, the ability to set the power of the M-ES
transmitted signal to a specified level and the ability to suspend
and resume monitoring of RF channels in the M-ES.
Mobility Support in CDPD (cont…)
• Handoff procedure in CDPD:
• The handoff is mobile controlled. The M-ES always measures the
signal strength of the reference channel. M-ES scans for the
alternative channels when its signal deteriorates.
• Because certain cells may have large shadowing effects within
them the operator can set a RSSI scan value to determine when a
M-ES should scanning for alternative channels. M-ES will ignore a
drop in signal level if the RSSI scan value is large enough or start
scanning for alternative channels if it is small.
• This value is also useful when the signal strength does not drop
even the M-ES has moved well into a neighbouring cell.
Mobility Support in CDPD (cont…)
Handoff procedure in CDPD
Mobility Support in CDPD (cont…)
• Handoff procedure in CDPD:
• When additional threshold for RSSI hysteresis block error rate
(BLER) and symbol error rate (SER) are reached, the M-ES will go
through a list of channels of adjacent cells that the current BS is
broadcasting and tune in to the one with the best signal strength.
• The M-Es informs the new BS that it has entered its cell.
• The mobile serving function of the new MD-IS uses a redirect-
request and redirect-confirm procedure with the mobile home
function of M-ES.
• Depending on the nature of handoff the delay of registration and
traffic redirection will vary.
Mobility Support in CDPD (cont…)
• Security:
• Security functions in CDPD are limited to data link confidentiality
and M-ES authentication.
• CDPD authentication is performed by the mobile network
registration protocol management entity (MME) that exists in
both MD-IS and M-ES.
• It uses network entity identifier (NEI)along with an authentication
sequence number (ASN) and an authentication random number
(ARN) for authentication.
• CDPD confidentiality is based on encrypting all data using a secret
key that is different for each session.
Mobility Support in CDPD (cont…)
• Security:
• The usual concept of using public key for exchanging keys and
secret keys for block data encryption is employed.
• The session key generation is based on “Diffie-Hellman” key
exchange with 256 bit values. RC-4 is used for block data
encryption.
• There are no mechanisms for data integrity, nonrepudiation or
traffic flow confidentiality.
Mobility Support in CDPD (cont…)
• Radio Resource Management (RRM):
• RRM is handled by a management layer in CDPD and contains the
procedure to handle dynamically changing RF environment.
• It takes care of:
– Acquiring and releasing channels due to competition between
CDPD and AMPS.
– Handoff from one cell to another or from one channel to
another.
• Its function is to provide best possible RF channel between M-ES
and the fixed network.
• Also ensures that the transmission powers are set dynamically to
minimize co-channel interference.

More Related Content

What's hot

CDMA
CDMACDMA
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
RCC Institute of Information Technology
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
Arpita Sanghani
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
junnubabu
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
Kundan Kumar
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
GSM channels
GSM channelsGSM channels
GSM channels
Mohd Nazir Shakeel
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
Bibhu Prasad
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
Ipsita Sharma
 
Cellular network
Cellular networkCellular network
Cellular networkMr SMAK
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
AJAL A J
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
METHODIST COLLEGE OF ENGG & TECH
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Miles Kevin Galario
 

What's hot (20)

CDMA
CDMACDMA
CDMA
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Concepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cellConcepts of & cell sectoring and micro cell
Concepts of & cell sectoring and micro cell
 
Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Cordless Technology
Cordless TechnologyCordless Technology
Cordless Technology
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Cellular network
Cellular networkCellular network
Cellular network
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 

Similar to Mobile Data Networks

Unit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptxUnit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptx
devicaf983
 
Cellular_Net.pdf
Cellular_Net.pdfCellular_Net.pdf
Cellular_Net.pdf
adnanmunirkhokhar
 
Mobile computing
Mobile computing Mobile computing
3G component
3G component3G component
3G component
Jamal Jamali
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
 
GPRS architecture
GPRS architectureGPRS architecture
GPRS architecture
Ekansh Agarwal
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
RMK ENGINEERING COLLEGE, CHENNAI
 
M2M.pptx
M2M.pptxM2M.pptx
M2M.pptx
AmolMahore
 
2 g 3g_4g - brief
2 g 3g_4g - brief2 g 3g_4g - brief
2 g 3g_4g - brief
QuangMan2
 
Cdpd
CdpdCdpd
Hina
HinaHina
Communication and computer networks
Communication and computer networksCommunication and computer networks
Communication and computer networks
Rabail Khowaja
 
unit-1 notes
unit-1 notesunit-1 notes
unit-1 notes
RSathyaPriyaCSEKIOT
 
Bsnl
BsnlBsnl
IT8602 Mobile Communication Unit II
IT8602 Mobile Communication   Unit II IT8602 Mobile Communication   Unit II
IT8602 Mobile Communication Unit II
pkaviya
 
1cellulñar network
1cellulñar network1cellulñar network
1cellulñar network
Emiii
 
5432 cellular network
5432 cellular network5432 cellular network
5432 cellular network
Raafat younis
 
5432 cellular network
5432 cellular network5432 cellular network
5432 cellular network
Bikash Dash
 

Similar to Mobile Data Networks (20)

Unit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptxUnit1_4G-5G_Part1.pptx
Unit1_4G-5G_Part1.pptx
 
Cellular_Net.pdf
Cellular_Net.pdfCellular_Net.pdf
Cellular_Net.pdf
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
3G component
3G component3G component
3G component
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
GPRS architecture
GPRS architectureGPRS architecture
GPRS architecture
 
Cellular network
Cellular networkCellular network
Cellular network
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
M2M.pptx
M2M.pptxM2M.pptx
M2M.pptx
 
2 g 3g_4g - brief
2 g 3g_4g - brief2 g 3g_4g - brief
2 g 3g_4g - brief
 
Cdpd
CdpdCdpd
Cdpd
 
Hina
HinaHina
Hina
 
Communication and computer networks
Communication and computer networksCommunication and computer networks
Communication and computer networks
 
Jaya ppt(2)
Jaya ppt(2)Jaya ppt(2)
Jaya ppt(2)
 
unit-1 notes
unit-1 notesunit-1 notes
unit-1 notes
 
Bsnl
BsnlBsnl
Bsnl
 
IT8602 Mobile Communication Unit II
IT8602 Mobile Communication   Unit II IT8602 Mobile Communication   Unit II
IT8602 Mobile Communication Unit II
 
1cellulñar network
1cellulñar network1cellulñar network
1cellulñar network
 
5432 cellular network
5432 cellular network5432 cellular network
5432 cellular network
 
5432 cellular network
5432 cellular network5432 cellular network
5432 cellular network
 

Recently uploaded

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 

Recently uploaded (20)

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 

Mobile Data Networks

  • 1. Unit – V Mobile Data Networks Introduction Data oriented CDPD Network GPRS and higher data rates Short messaging service in GSM Mobile application protocol Wireless ATM & HIPERLAN: Introduction Wireless ATM HIPERLAN
  • 2. Introduction • Mobile Data: –Mobile data networks refer to those services, technologies and standards over wide area coverage spanning more than local area or campus. –Mobile data networks are classified into three categories: • Independent • Shared • Overlay
  • 4. Independent Mobile Data • Independent networks have their own spectrum and infrastructure not shared with any other service. • First group uses independent spectrum in licensed bands. – Ex: ARDIS and Mobitex (first mobile data services that were introduced). – Not economically successful.
  • 5. Independent Mobile Data • Second group uses independent spectrum in unlicensed bands. – Shared among variety of applications and users. – Ex: Metricom’s Ricochet service used 915 MHz unlicensed ISM band. – This service was deployed in airports and some metropolitan areas for internet services.
  • 6. Shared Mobile Data • These networks share the spectrum and part of the infrastructure with an already existing analog voice- oriented service. • In addition to dedicated channels, these services can also use the available unused channels. • Initial deployment could be made in areas where there is subscriber demand. • Ex: CDPD service which shares spectrum and part of infrastructure with AMPS.
  • 7. Overlay Mobile Data • These networks not only makes use of the spectrum allocated for another service but also the air-interface and MAC frames of an existing voice-oriented digital cellular network. • Ex: GPRS and GSM’s SMS are examples of such overlays. – They make use of free time slots available within the traffic channels and signaling channels in GSM. – Amount of infrastructure required is reduced to bare minimum.
  • 8. Data-Oriented CDPD Network • CDPD is one of the longest surviving wide area mobile data technologies worldwide. • It is a shared mobile data network that shares part of the infrastructure and entire spectrum with AMPS in United States. • It is an open standard making its implementation easier and more widespread.
  • 9. What is CDPD? • Design goals of CDPD included location independence and independence from service provider, so that coverage could be maximized. • CDPD used primitive RF technology for cost reasons and GMSK modulation scheme was chosen. • Raw signaling rate is 19.2 kbps with Reed-Solomon (RS) coding. • CDPD employs a technique called RF sniffing to detect whether an AMPS call is trying to access frequency channel – And hopping to move from such a band to another to give the voice call priority.
  • 10. CDPD Services • Network services are the basic form of services offered by CDPD. – Supports for transfer of data from one location to another via standard network layer protocols. – CDPD supports connectionless layer 3 protocols (IP or connectionless network protocol - CLNP). • Network support services are services necessary to maintain the operation of mobile data network such as management, security etc. – These services include mobility and radio resource management, that are transparent to the user. • Network application services: – These are value added services such as limited size messaging that need explicit subscription.
  • 12. Reference Architecture in CDPD • There are three key interfaces that form logical boundaries for CDPD service provider’s network. • A-Interface: air link interface • E-Interface: – external interface by which CDPD operates with the rest of data network. – Protocols IP, CLNP and IPv6 will be supported. • I-Interface: Interservice provider interface – Supports E-interface protocols plus two CDPD specific protocols • MNLP: Mobile Network Location Protocol – by which mobile users from one system are supported by another system. • Network management protocols.
  • 14. Physical Architecture 1. Mobile-End System (M-ES): • ultimate source and destination of PDUs. • Equipped with a CDPD radio and software. • Ex: telemetry devices, laptops, vending machines etc. • Can be full duplex or half duplex. • Employs variety of power sources such as internal batteries, laptop based PC card etc. • Has three functional units: i. Subscriber unit (SU) establishes and maintains data comm. ii. Subscriber identity module (SIM) is a repository of identity and authentication credentials. iii. Mobile application system (MAS) deals with higher layer protocols.
  • 15. Physical Architecture 2. Mobile Data Base Station (MDBS): • Is the system end of the MAC sublayer over the air interface. • Communicates with M-ES through the A-interface. • Performs modulation of data bits and demodulation of RF signal. • Actively participates in the medium access scheme called digital sense multiple access (DSMA).
  • 16. Physical Architecture 2. Mobile Data Intermediate System (MD-IS): • Is the focal point of CDPD mobility management and packet forwarding. • Has mobile serving function (MSF) that serves as a foundation for registration of a mobile. • Also performs accounting services. 3. Fixed-end system (F-ES): • Conventional network node that includes PCs, workstations etc. • Internal F-ES operates within the boundaries of CDPD network and is under the control of service provider.
  • 17. Mobility Support in CDPD • Mobility Management: • Mobility Management Service manages network roaming and tracks the location of each CDPD subscriber, as well as keep the serving MD-IS informed of that location down to the specific cell site. • In a wireless mobile data network, the endpoints of the data connections can be located anywhere in the network coverage area, and the location of these endpoints can change over time thus mobility management is important. • Like voice cellular networks, CDPD supports roaming. CDPD devices have a home sub-domain usually the home city of the subscriber. One may travel from a sub-domain registered as one’s home area to a new serving area.
  • 18. Mobility Support in CDPD (cont…) • Mobility Management: • The CDPD network’s Mobility Management Service handles the routing of packets for all visiting M-ESs in its serving area. • The home area is that in which the CDPD subscriber has registered their device with a CDPD service provider. If the subscriber travels to another area, the mobility management services maintain information about their current serving area. • Mobility management services in the new serving area regularly notify the subscriber’s home-area CDPD network of the subscriber’s new location. Therefore, a CDPD subscriber can travel throughout the country and still obtain CDPD network services.
  • 19. Mobility Support in CDPD (cont…) • Mobility Management:
  • 20. Mobility Support in CDPD (cont…) • Mobility Management: • CDPD mobility management is based on principles similar to mobile-IP. The MD-IS is the central element in the process. • An MD-IS is logically separated into a home MD-IS and serving MD-IS. A home MD-IS contains a subscription database for its geographic area. Each subscriber is registered in his home. MD-IS associated with his home area. • The IP address of a subscriber points to his home MD-IS. At the home MD-IS, MHF maintains information about the current location of MHS associated with that home MD-IS. • The MHS also encapsulates any packet that is addressed to an M- ES homes with it directing it to an MSF associated with the serving MD-IS, whose serving area the M-ES is currently visiting
  • 21. Mobility Support in CDPD (cont…) • Mobility Management: • A serving MD-IS manages one serving MD-IS, whose MSF contains information about all subscribers currently visiting the area and registered with it. • The MSF employs the mobile network location protocol (MNLP) to notify the MHF about the presence of the M-ES in its service area. The channel stream in which a subscriber is active is also indicated. The MSF decapsulates forwarded packets and routes them to the correct channel stream in the cell.
  • 22. Mobility Support in CDPD (cont…) • Handoff procedure in CDPD: • Handoff in CDPD occurs when the M-ES moves from one cell to another or if the CDPD channel quality deteriorates, the current CDPD channel is requested by an AMPS voice call, or if the load on the CDPD channels in the current cell is much more than the load on the channels in an overlapping cell. • The physical layer of CDPD provides the ability to tune to a specific RF channel, the ability to measure the received signal strength of the received signal, the ability to set the power of the M-ES transmitted signal to a specified level and the ability to suspend and resume monitoring of RF channels in the M-ES.
  • 23. Mobility Support in CDPD (cont…) • Handoff procedure in CDPD: • The handoff is mobile controlled. The M-ES always measures the signal strength of the reference channel. M-ES scans for the alternative channels when its signal deteriorates. • Because certain cells may have large shadowing effects within them the operator can set a RSSI scan value to determine when a M-ES should scanning for alternative channels. M-ES will ignore a drop in signal level if the RSSI scan value is large enough or start scanning for alternative channels if it is small. • This value is also useful when the signal strength does not drop even the M-ES has moved well into a neighbouring cell.
  • 24. Mobility Support in CDPD (cont…) Handoff procedure in CDPD
  • 25. Mobility Support in CDPD (cont…) • Handoff procedure in CDPD: • When additional threshold for RSSI hysteresis block error rate (BLER) and symbol error rate (SER) are reached, the M-ES will go through a list of channels of adjacent cells that the current BS is broadcasting and tune in to the one with the best signal strength. • The M-Es informs the new BS that it has entered its cell. • The mobile serving function of the new MD-IS uses a redirect- request and redirect-confirm procedure with the mobile home function of M-ES. • Depending on the nature of handoff the delay of registration and traffic redirection will vary.
  • 26. Mobility Support in CDPD (cont…) • Security: • Security functions in CDPD are limited to data link confidentiality and M-ES authentication. • CDPD authentication is performed by the mobile network registration protocol management entity (MME) that exists in both MD-IS and M-ES. • It uses network entity identifier (NEI)along with an authentication sequence number (ASN) and an authentication random number (ARN) for authentication. • CDPD confidentiality is based on encrypting all data using a secret key that is different for each session.
  • 27. Mobility Support in CDPD (cont…) • Security: • The usual concept of using public key for exchanging keys and secret keys for block data encryption is employed. • The session key generation is based on “Diffie-Hellman” key exchange with 256 bit values. RC-4 is used for block data encryption. • There are no mechanisms for data integrity, nonrepudiation or traffic flow confidentiality.
  • 28. Mobility Support in CDPD (cont…) • Radio Resource Management (RRM): • RRM is handled by a management layer in CDPD and contains the procedure to handle dynamically changing RF environment. • It takes care of: – Acquiring and releasing channels due to competition between CDPD and AMPS. – Handoff from one cell to another or from one channel to another. • Its function is to provide best possible RF channel between M-ES and the fixed network. • Also ensures that the transmission powers are set dynamically to minimize co-channel interference.