This document discusses wireless and mobile networks. It begins with an introduction to wireless networks and mobility challenges. It then summarizes key standards and technologies for wireless links including characteristics of wireless links, CDMA, IEEE 802.11 wireless LANs, and cellular networks. It outlines addressing and routing challenges for mobile users. Finally, it discusses how mobility is handled in different network types and at higher layers of the network stack.
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Wireless phone standards have a life of their own. You can tell, because they are spoken of reverently in terms of generations. There's Great-Granddad, whose pioneering story pre-dates cellular; Grandma and Grandpa 1G, or analog cellular, Mom and Dad 2G, or digital cellular; 3G wireless, 4G, 5G and so on. This is a survey report PPT on these technology.
A network management system (NMS) refers to a collection of applications that enable network
components to be monitored and controlled.
network management systems have the same basic architecture, a
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
This presentation contains samples/screenshots of some of the work I have done with relation to broadcast design, web, motion graphics,packaging, corporate presentations, multimedia and print.
Wireless phone standards have a life of their own. You can tell, because they are spoken of reverently in terms of generations. There's Great-Granddad, whose pioneering story pre-dates cellular; Grandma and Grandpa 1G, or analog cellular, Mom and Dad 2G, or digital cellular; 3G wireless, 4G, 5G and so on. This is a survey report PPT on these technology.
A network management system (NMS) refers to a collection of applications that enable network
components to be monitored and controlled.
network management systems have the same basic architecture, a
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
This presentation contains samples/screenshots of some of the work I have done with relation to broadcast design, web, motion graphics,packaging, corporate presentations, multimedia and print.
Objektif:
1) Adakah perpaduan kaum dapat dicapai melalui penglibatan dalam bidang sukan.
2)Adakah sukan dapat mewujudkan peluang dalam mempertingkatkan kecemerlanngan individu dan masyarakat.
3) Untuk mengenal pastisejauh manakah sukan dapat membantu memupuk perpaduan dalam masyarakat.
Introductory Approach on Ad-hoc Networks and its Paradigms IJORCS
An ad-hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. With the advancement in wireless communications, more and more wireless networks appear, e.g., Mobile Ad Hoc Network (MANET), Wireless Sensor Network (WSN), etc. So, in this paper we have discussed Ad Hoc Networks along with its energy issues, applications, QoS and challenges.
Wireless Technologies
Presented by
Sean Shields
And
Gabriel Taveras
Definition
Term “Wireless” refers to all the communications sent and received without wires.
So Wireless Technology
Means a technology that use radio waves to transmit or receive data.
Wi-Fi
Bluetooth
Cellular
Wimax
TYPES OF
TECHNOLOGIES
INTRODUCTION:
Wireless Fidelity termed as Wi-Fi uses the IEEE 802.11 specification to create a wireless local-area network.
A Wi-Fi network basically consists of a wired connection to the Internet that leads to a wireless router for transmutation and receiving data from individual devices, connecting them not only to the outside world but also to each other.
HOW WIFI WORKS?
1. All devices use a wireless adapter to convert request into a radio signal and broadcasts it into the air.
2. The Wi-Fi device, or wireless router, picks up the signal and translates it back into its original form.
3. The router passes the request to the Internet using a hardwired connection.
4. The Internet returns the requested information to the router across the same connection.
5. The router converts the information into a radio signal and broadcasts it into the air.
6. The computer or cell phone's wireless adapter picks up the information and displays it on your screen
WIFI TOPOLOGIES
Wifi have following topologies
AP-based topology (Infrastructure Mode)
Peer-to-peer topology (Ad-hoc Mode)
Point-to-multipoint bridge topology
Wi Fi Network
Wireless Standards
802.11
In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first WLAN standard. They called it 802.11 after the name of the group formed to oversee its development. Unfortunately, 802.11 only supported a maximum network bandwidth of 2 Mbps - too slow for most applications. For this reason, ordinary 802.11 wireless products are no longer manufactured.
Wireless Standards
802.11b
IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b specification. 802.11b supports bandwidth up to 11 Mbps, comparable to traditional Ethernet.
Wireless Standards
802.11a
Supports bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz. This higher frequency compared to 802.11b shortens the range of 802.11a networks. The higher frequency also means 802.11a signals have more difficulty penetrating walls and other obstructions.
Wireless Standards
802.11g
Attempts to combine the best of both 802.11a and 802.11b. 802.11g supports bandwidth up to 54 Mbps, and it uses the 2.4 Ghz frequency for greater range. 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.
Wireless Standards
802.11n
The newest IEEE standard in the Wi-Fi category is 802.11n.
802.11n connections support data rates of over 100 Mbps. 802.11n also offers somewhat better range over earlier Wi-Fi standards due to its increased signal.
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXcscpconf
Now-a-days there is high demand for broadband mobile services. Traditional high-speed
broadband solutions depend on wired technologies namely digital subscriber line (DSL). Wifi
and Wimax are useful in providing any type of connectivity such as the fixed or portable or
nomadic connectivity without the requirement of LoS (Line of Sight) of the base station. Mobile
Broadband Wireless Network (MBWN) is a flexible and economical solution for remote areas
where wired technology and also terminal mobility cannot be provided. The IEEE Wi-Fi and
Wi-Max/802.16 are the most promising technologies for broadband wireless metropolitan area networks (WMANs) and these are capable of providing high throughput even on long distances with varied QoS. These technologies ensure a wireless network that enables high speed Internet access to residential, small and medium business customers, as well as Internet access for WiFi hot spots and cellular base stations. These offer support to both point-to-multipoint (P2MP) and multipoint-to-multipoint (mesh) nodes and offers high speed data (voice, video) service to the customers. In this paper, we study the issues related to, benefits and deployment of these technologies.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Wireless networks
1. Chapter 6
Wireless and Mobile
Networks
A note on the use of these ppt slides:
We’re making these slides freely available to all (faculty, students, readers).
They’re in PowerPoint form so you can add, modify, and delete slides
(including this one) and slide content to suit your needs. They obviously Computer Networking:
represent a lot of work on our part. In return for use, we only ask the A Top Down Approach
following:
If you use these slides (e.g., in a class) in substantially unaltered form, 5th edition.
that you mention their source (after all, we’d like people to use our book!) Jim Kurose, Keith Ross
Addison-Wesley, April
If you post any slides in substantially unaltered form on a www site, that
you note that they are adapted from (or perhaps identical to) our slides, and
note our copyright of this material. 2009.
Thanks and enjoy! JFK/KWR
All material copyright 1996-2009
J.F Kurose and K.W. Ross, All Rights Reserved
6: Wireless and Mobile 6-1
2. Chapter 6: Wireless and Mobile Networks
Background:
# wireless (mobile) phone subscribers now
exceeds # wired phone subscribers!
computer nets: laptops, palmtops, PDAs,
Internet-enabled phone promise anytime
untethered Internet access
two important (but different) challenges
wireless: communication over wireless link
mobility: handling the mobile user who changes point
of attachment to network
6: Wireless and Mobile 6-2
3. Chapter 6 outline
6.1 Introduction Mobility
6.5 Principles:
Wireless addressing and routing
to mobile users
6.2 Wireless links,
characteristics 6.6 Mobile IP
CDMA 6.7 Handling mobility in
6.3 IEEE 802.11 cellular networks
wireless LANs (“wi-fi”) 6.8 Mobility and higher-
6.4 Cellular Internet layer protocols
Access
architecture 6.9 Summary
standards (e.g., GSM)
6: Wireless and Mobile 6-3
4. Elements of a wireless network
wireless hosts
laptop, PDA, IP phone
run applications
may be stationary
network (non-mobile) or mobile
infrastructure wireless does not
always mean mobility
6: Wireless and Mobile 6-4
5. Elements of a wireless network
base station
typically connected to wired
network
relay - responsible for
sending packets between
wired network and wireless
host(s) in its “area”
network
infrastructure e.g., cell towers, 802.11
access points
6: Wireless and Mobile 6-5
6. Elements of a wireless network
wireless link
typically used to connect
mobile(s) to base station
also used as backbone link
multiple access protocol
coordinates link access
network various data rates,
transmission distance
infrastructure
6: Wireless and Mobile 6-6
7. Characteristics of selected wireless link
standards
200 802.11n
54 802.11a,g 802.11a,g point-to-point data
Data rate (Mbps)
5-11 802.11b 802.16 (WiMAX)
4 UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO 3G cellular
enhanced
1 802.15
.384 UMTS/WCDMA, CDMA2000 3G
.056 IS-95, CDMA, GSM 2G
Indoor Outdoor Mid-range Long-range
10-30m 50-200m outdoor outdoor
200m – 4 Km 5Km – 20 Km
6: Wireless and Mobile 6-7
8. Elements of a wireless network
infrastructure mode
base station connects
mobiles into wired
network
handoff: mobile changes
base station providing
network
connection into wired
infrastructure
network
6: Wireless and Mobile 6-8
9. Elements of a wireless network
ad hoc mode
no base stations
nodes can only transmit to
other nodes within link
coverage
nodes organize themselves
into a network: route
among themselves
6: Wireless and Mobile 6-9
10. Wireless network taxonomy
single hop multiple hops
host connects to host may have to
infrastructure base station (WiFi, relay through several
(e.g., APs) WiMAX, cellular) wireless nodes to
which connects to connect to larger
larger Internet Internet: mesh net
no base station, no
connection to larger
no no base station, no
infrastructure Internet. May have to
connection to larger
relay to reach other
Internet (Bluetooth,
a given wireless node
ad hoc nets)
MANET, VANET
6: Wireless and Mobile 6-
11. Wireless Link Characteristics (1)
Differences from wired link ….
decreased signal strength: radio signal
attenuates as it propagates through matter
(path loss)
interference from other sources: standardized
wireless network frequencies (e.g., 2.4 GHz)
shared by other devices (e.g., phone); devices
(motors) interfere as well
multipath propagation: radio signal reflects off
objects ground, arriving ad destination at
slightly different times
…. make communication across (even a point to point)
wireless link much more “difficult”
6: Wireless and Mobile 6-
12. Wireless Link Characteristics (2)
SNR: signal-to-noise ratio 10-1
larger SNR – easier to 10-2
extract signal from noise (a
“good thing”) 10-3
SNR versus BER tradeoffs
BER
10-4
given physical layer: 10-5
increase power -> increase
SNR->decrease BER 10-6
given SNR: choose physical 10-7
layer that meets BER 10 20 30 40
SNR(dB)
requirement, giving highest
thruput QAM256 (8 Mbps)
• SNR may change with
QAM16 (4 Mbps)
mobility: dynamically adapt
physical layer (modulation BPSK (1 Mbps)
technique, rate)
6: Wireless and Mobile 6-
13. Wireless network characteristics
Multiple wireless senders and receivers create
additional problems (beyond multiple access):
A B C
C
A’s signal C’s signal
B strength strength
A
space
Hidden terminal problem
Signal attenuation:
B, A hear each other B, A hear each other
B, C hear each other B, C hear each other
A, C can not hear each other A, C can not hear each other interfering
at B
means A, C unaware of their
interference at B
6: Wireless and Mobile 6-
14. Code Division Multiple Access (CDMA)
used in several wireless broadcast channels
(cellular, satellite, etc) standards
unique “code” assigned to each user; i.e., code set
partitioning
all users share same frequency, but each user has
own “chipping” sequence (i.e., code) to encode data
encoded signal = (original data) X (chipping
sequence)
decoding: inner-product of encoded signal and
chipping sequence
allows multiple users to “coexist” and transmit
simultaneously with minimal interference (if codes
are “orthogonal”)
6: Wireless and Mobile 6-
17. Chapter 6 outline
6.1 Introduction Mobility
6.5 Principles:
Wireless addressing and routing
to mobile users
6.2 Wireless links,
characteristics 6.6 Mobile IP
CDMA 6.7 Handling mobility in
6.3 IEEE 802.11 cellular networks
wireless LANs (“wi-fi”) 6.8 Mobility and higher-
6.4 cellular Internet layer protocols
access
architecture 6.9 Summary
standards (e.g., GSM)
6: Wireless and Mobile 6-
18. IEEE 802.11 Wireless LAN
802.11b 802.11a
2.4-5 GHz unlicensed spectrum 5-6 GHz range
up to 11 Mbps up to 54 Mbps
direct sequence spread 802.11g
spectrum (DSSS) in physical 2.4-5 GHz range
layer up to 54 Mbps
• all hosts use same chipping
code
802.11n: multiple antennae
2.4-5 GHz range
up to 200 Mbps
all use CSMA/CA for multiple access
all have base-station and ad-hoc network versions
6: Wireless and Mobile 6-
19. 802.11 LAN architecture
wireless host communicates
Internet with base station
base station = access
point (AP)
Basic Service Set (BSS)
(aka “cell”) in infrastructure
hub, switch
or router mode contains:
AP
wireless hosts
BSS 1 access point (AP): base
station
AP
ad hoc mode: hosts only
BSS 2
6: Wireless and Mobile 6-
20. 802.11: Channels, association
802.11b: 2.4GHz-2.485GHz spectrum divided into
11 channels at different frequencies
AP admin chooses frequency for AP
interference possible: channel can be same as
that chosen by neighboring AP!
host: must associate with an AP
scans channels, listening for beacon frames
containing AP’s name (SSID) and MAC address
selects AP to associate with
may perform authentication [Chapter 8]
will typically run DHCP to get IP address in AP’s
subnet
6: Wireless and Mobile 6-
21. 802.11: passive/active scanning
BBS 1 BBS 2 BBS 1 BBS 2
AP 1 AP 2 AP 1 1 AP 2
1 1 2 2
2 3
3 4
H1 H1
Passive Scanning: Active Scanning:
(1) beacon frames sent from APs (1) Probe Request frame broadcast
(2) association Request frame sent: from H1
H1 to selected AP (2) Probes response frame sent from
(3) association Response frame sent: APs
H1 to selected AP (3) Association Request frame sent:
H1 to selected AP
(4) Association Response frame
sent: H1 to selected AP
6: Wireless and Mobile 6-
22. IEEE 802.11: multiple access
avoid collisions: 2+ nodes transmitting at same time
802.11: CSMA - sense before transmitting
don’t collide with ongoing transmission by other node
802.11: no collision detection!
difficult to receive (sense collisions) when transmitting due
to weak received signals (fading)
can’t sense all collisions in any case: hidden terminal, fading
goal: avoid collisions: CSMA/C(ollision)A(voidance)
A B C
C
A’s signal C’s signal
B strength strength
A
space
6: Wireless and Mobile 6-
23. IEEE 802.11 MAC Protocol: CSMA/CA
802.11 sender
1 if sense channel idle for DIFS then sender receiver
transmit entire frame (no CD)
DIFS
2 if sense channel busy then
start random backoff time
timer counts down while channel idle data
transmit when timer expires
if no ACK, increase random backoff
SIFS
interval, repeat 2
ACK
802.11 receiver
- if frame received OK
return ACK after SIFS (ACK needed due
to hidden terminal problem)
6: Wireless and Mobile 6-
24. Avoiding collisions (more)
idea: allow sender to “reserve” channel rather than random
access of data frames: avoid collisions of long data frames
sender first transmits small request-to-send (RTS) packets
to BS using CSMA
RTSs may still collide with each other (but they’re short)
BS broadcasts clear-to-send CTS in response to RTS
CTS heard by all nodes
sender transmits data frame
other stations defer transmissions
avoid data frame collisions completely
using small reservation packets!
6: Wireless and Mobile 6-
25. Collision Avoidance: RTS-CTS exchange
A B
AP
RTS(A) RTS(B)
reservation collision
RTS(A)
CTS(A) CTS(A)
DATA (A)
defer
time
ACK(A) ACK(A)
6: Wireless and Mobile 6-
26. 802.11 frame: addressing
2 2 6 6 6 2 6 0 - 2312 4
frame address address address seq address
duration payload CRC
control 1 2 3 control 4
Address 4: used only
in ad hoc mode
Address 1: MAC address
of wireless host or AP Address 3: MAC address
to receive this frame of router interface to
which AP is attached
Address 2: MAC address
of wireless host or AP
transmitting this frame
6: Wireless and Mobile 6-
27. 802.11 frame: addressing
Internet
H1 R1 router
AP
R1 MAC addr H1 MAC addr
dest. address source address
802.3 frame
AP MAC addr H1 MAC addr R1 MAC addr
address 1 address 2 address 3
802.11 frame
6: Wireless and Mobile 6-
28. 802.11 frame: more
frame seq #
duration of reserved
(for RDT)
transmission time (RTS/CTS)
2 2 6 6 6 2 6 0 - 2312 4
frame address address address seq address
duration payload CRC
control 1 2 3 control 4
2 2 4 1 1 1 1 1 1 1 1
Protocol To From More Power More
Type Subtype Retry WEP Rsvd
version AP AP frag mgt data
frame type
(RTS, CTS, ACK, data)
6: Wireless and Mobile 6-
29. 802.11: mobility within same subnet
H1 remains in same IP router
subnet: IP address
can remain same hub or
switch: which AP is switch
associated with H1? BBS 1
self-learning (Ch. 5):
switch will see frame AP 1
from H1 and AP 2
“remember” which
switch port can be H1 BBS 2
used to reach H1
6: Wireless and Mobile 6-
30. 802.11: advanced capabilities
Rate Adaptation 10-1
base station, mobile
10-2
10-3
dynamically change
BER
10-4
transmission rate 10-5
(physical layer 10-6
modulation technique) 10-7
10 20 30 40
as mobile moves, SNR SNR(dB)
varies 1. SNR decreases, BER
increase as node moves
QAM256 (8 Mbps) away from base station
QAM16 (4 Mbps)
BPSK (1 Mbps) 2. When BER becomes too
operating point
high, switch to lower
transmission rate but with
lower BER
6: Wireless and Mobile 6-
31. 802.11: advanced capabilities
Power Management
node-to-AP: “I am going to sleep until next
beacon frame”
AP knows not to transmit frames to this
node
node wakes up before next beacon frame
beacon frame: contains list of mobiles with AP-
to-mobile frames waiting to be sent
node will stay awake if AP-to-mobile frames
to be sent; otherwise sleep again until next
beacon frame
6: Wireless and Mobile 6-
32. 802.15: personal area network
less than 10 m diameter
replacement for cables
(mouse, keyboard, S P
headphones) P radius of
M
ad hoc: no infrastructure coverage
master/slaves: S S P
P
slaves request permission to
send (to master)
master grants requests
802.15: evolved from M Master device
Bluetooth specification S Slave device
2.4-2.5 GHz radio band P Parked device (inactive)
up to 721 kbps
6: Wireless and Mobile 6-
33. 802.16: WiMAX
point-to-point
like 802.11 & cellular:
base station model
transmissions to/from
base station by hosts
with omnidirectional
antenna
base station-to-base point-to-multipoint
station backhaul with
point-to-point antenna
unlike 802.11:
range ~ 6 miles (“city
rather than coffee
shop”)
~14 Mbps
6: Wireless and Mobile 6-
34. 802.16: WiMAX: downlink, uplink scheduling
transmission frame
down-link subframe: base station to node
uplink subframe: node to base station
… …
pream.
DL- UL- DL DL DL Initial request
SS #1 SS #2 SS #k
MAP MAP burst 1 burst 2 burst n maint. conn.
… …
downlink subframe uplink subframe
base station tells nodes who will get to receive (DL map)
and who will get to send (UL map), and when
WiMAX standard provide mechanism for
scheduling, but not scheduling algorithm
6: Wireless and Mobile 6-
35. Chapter 6 outline
6.1 Introduction Mobility
6.5 Principles:
Wireless addressing and routing
to mobile users
6.2 Wireless links,
characteristics 6.6 Mobile IP
CDMA 6.7 Handling mobility in
6.3 IEEE 802.11 cellular networks
wireless LANs (“wi-fi”) 6.8 Mobility and higher-
6.4 Cellular Internet layer protocols
Access
architecture 6.9 Summary
standards (e.g., GSM)
6: Wireless and Mobile 6-
36. Components of cellular network architecture
MSC
connects cells to wide area net
manages call setup (more later!)
handles mobility (more later!)
cell
covers geographical
region
base station (BS) Mobile
analogous to 802.11 AP Switching
Center
mobile users attach Public telephone
to network through BS network, and
air-interface: Internet
physical and link layer Mobile
protocol between Switching
mobile and BS Center
wired network
6: Wireless and Mobile 6-
37. Cellular networks: the first hop
Two techniques for sharing
mobile-to-BS radio
spectrum
combined FDMA/TDMA:
divide spectrum in time slots
frequency channels, divide
each channel into time
slots frequency
bands
CDMA: code division
multiple access
6: Wireless and Mobile 6-
38. Cellular standards: brief survey
2G systems: voice channels
IS-136 TDMA: combined FDMA/TDMA (north
america)
GSM (global system for mobile communications):
combined FDMA/TDMA
most widely deployed
IS-95 CDMA: code division multiple access
TDMA/FDMA
CDMA-2000
GPRS EDGE UMT Don’t drown in a bowl
IS-136 S
GSM IS-95 of alphabet soup: use this
for reference only
6: Wireless and Mobile 6-
39. Cellular standards: brief survey
2.5 G systems: voice and data channels
for those who can’t wait for 3G service: 2G extensions
general packet radio service (GPRS)
evolved from GSM
data sent on multiple channels (if available)
enhanced data rates for global evolution (EDGE)
also evolved from GSM, using enhanced modulation
data rates up to 384K
CDMA-2000 (phase 1)
data rates up to 144K
evolved from IS-95
6: Wireless and Mobile 6-
40. Cellular standards: brief survey
3G systems: voice/data
Universal Mobile Telecommunications Service (UMTS)
data service: High Speed Uplink/Downlink packet
Access (HSDPA/HSUPA): 3 Mbps
CDMA-2000: CDMA in TDMA slots
data service: 1xEvlution Data Optimized (1xEVDO)
up to 14 Mbps
….. more (and more interesting) cellular topics due to mobility (stay
tuned for details)
6: Wireless and Mobile 6-
41. Chapter 6 outline
6.1 Introduction Mobility
6.5 Principles:
Wireless addressing and routing
to mobile users
6.2 Wireless links,
characteristics 6.6 Mobile IP
CDMA 6.7 Handling mobility in
6.3 IEEE 802.11 cellular networks
wireless LANs (“wi-fi”) 6.8 Mobility and higher-
6.4 Cellular Internet layer protocols
Access
architecture 6.9 Summary
standards (e.g., GSM)
6: Wireless and Mobile 6-
42. What is mobility?
spectrum of mobility, from the network perspective:
no mobility high mobility
mobile wireless user, mobile user, mobile user, passing
using same access connecting/ through multiple
point disconnecting access point while
from network maintaining ongoing
using DHCP. connections (like cell
phone)
6: Wireless and Mobile 6-
43. Mobility: Vocabulary
home network: permanent home agent: entity that will
“home” of mobile perform mobility functions on
(e.g., 128.119.40/24)
behalf of mobile, when mobile
is remote
wide area
network
Permanent address:
address in home
network, can always be
used to reach mobile
e.g., 128.119.40.186 correspondent
6: Wireless and Mobile 6-
44. Mobility: more vocabulary
visited network: network
Permanent address: remains in which mobile currently
constant (e.g., 128.119.40.186) resides (e.g., 79.129.13/24)
Care-of-address: address
in visited network.
(e.g., 79,129.13.2)
wide area
network
foreign agent: entity
in visited network
that performs
correspondent: wants mobility functions on
to communicate with behalf of mobile.
mobile
6: Wireless and Mobile 6-
45. How do you contact a mobile friend:
Consider friend frequently changing I wonder where
addresses, how do you find her? Alice moved to?
search all phone
books?
call her parents?
expect her to let you
know where he/she is?
6: Wireless and Mobile 6-
46. Mobility: approaches
Let routing handle it: routers advertise permanent
address of mobile-nodes-in-residence via usual
routing table exchange.
routing tables indicate where each mobile located
no changes to end-systems
Let end-systems handle it:
indirect routing: communication from
correspondent to mobile goes through home
agent, then forwarded to remote
direct routing: correspondent gets foreign
address of mobile, sends directly to mobile
6: Wireless and Mobile 6-
47. Mobility: approaches
Let routing handle it: routers advertise permanent
address of mobile-nodes-in-residence via usual
not
scalable
routing table exchange.
to millions of
routing tables indicate where each mobile located
mobiles
no changes to end-systems
let end-systems handle it:
indirect routing: communication from
correspondent to mobile goes through home
agent, then forwarded to remote
direct routing: correspondent gets foreign
address of mobile, sends directly to mobile
6: Wireless and Mobile 6-
48. Mobility: registration
visited network
home network
1
2
wide area
network
mobile contacts
foreign agent contacts home foreign agent on
agent home: “this mobile is entering visited
resident in my network” network
End result:
Foreign agent knows about mobile
Home agent knows location of mobile
6: Wireless and Mobile 6-
49. Mobility via Indirect Routing
foreign agent
receives packets,
home agent intercepts forwards to mobile
packets, forwards to visited
foreign agent network
home
network
3
wide area
network
2
1
correspondent 4
addresses packets
mobile replies
using home address
directly to
of mobile
correspondent
6: Wireless and Mobile 6-
50. Indirect Routing: comments
Mobile uses two addresses:
permanent address: used by correspondent (hence
mobile location is transparent to correspondent)
care-of-address: used by home agent to forward
datagrams to mobile
foreign agent functions may be done by mobile itself
triangle routing: correspondent-home-network-
mobile
inefficient when
correspondent, mobile
are in same network
6: Wireless and Mobile 6-
51. Indirect Routing: moving between networks
suppose mobile user moves to another
network
registers with new foreign agent
new foreign agent registers with home agent
home agent update care-of-address for mobile
packets continue to be forwarded to mobile (but
with new care-of-address)
mobility, changing foreign networks
transparent: on going connections can be
maintained!
6: Wireless and Mobile 6-
52. Mobility via Direct Routing
foreign agent
receives packets,
correspondent forwards forwards to mobile
to foreign agent visited
network
home
network 4
wide area
2 network
3
correspondent 1 4
requests, receives
mobile replies
foreign address of
directly to
mobile
correspondent
6: Wireless and Mobile 6-
53. Mobility via Direct Routing: comments
overcome triangle routing problem
non-transparent to correspondent:
correspondent must get care-of-address
from home agent
what if mobile changes visited network?
6: Wireless and Mobile 6-
54. Accommodating mobility with direct routing
anchor foreign agent: FA in first visited network
data always routed first to anchor FA
when mobile moves: new FA arranges to have data
forwarded from old FA (chaining)
foreign net visited
at session start
anchor
foreign
wide area agent
2
network
1 4
3
5
new
correspondent foreign
new foreign
agent network
correspondent agent
6: Wireless and Mobile 6-
55. Chapter 6 outline
6.1 Introduction Mobility
6.5 Principles:
Wireless addressing and routing
to mobile users
6.2 Wireless links,
characteristics 6.6 Mobile IP
CDMA 6.7 Handling mobility in
6.3 IEEE 802.11 cellular networks
wireless LANs (“wi-fi”) 6.8 Mobility and higher-
6.4 Cellular Internet layer protocols
Access
architecture 6.9 Summary
standards (e.g., GSM)
6: Wireless and Mobile 6-
56. Mobile IP
RFC 3344
has many features we’ve seen:
home agents, foreign agents, foreign-agent
registration, care-of-addresses, encapsulation
(packet-within-a-packet)
three components to standard:
indirect routing of datagrams
agent discovery
registration with home agent
6: Wireless and Mobile 6-
57. Mobile IP: indirect routing
foreign-agent-to-mobile packet
packet sent by home agent to foreign dest: 128.119.40.186
agent: a packet within a packet
dest: 79.129.13.2 dest: 128.119.40.186
Permanent address:
128.119.40.186
Care-of address:
79.129.13.2
dest: 128.119.40.186
packet sent by
correspondent
6: Wireless and Mobile 6-
58. Mobile IP: agent discovery
agent advertisement: foreign/home agents advertise
service by broadcasting ICMP messages (typefield = 9)
0 8 16 24
type = 9 code = 0 checksum
=9 =9
H,F bits: home standard
and/or foreign agent router address ICMP fields
R bit: registration
required type = 16 length sequence #
RBHFMGV
registration lifetime reserved
bits mobility agent
advertisement
0 or more care-of- extension
addresses
6: Wireless and Mobile 6-
59. Mobile IP: registration example
visited network: 79.129.13/24
home agent foreign agent
HA: 128.119.40.7 COA: 79.129.13.2 ICMP agent adv.
Mobile agent
COA: 79.129.13.2 MA: 128.119.40.186
….
registration req.
registration req. COA: 79.129.13.2
COA: 79.129.13.2 HA: 128.119.40.7
HA: 128.119.40.7 MA: 128.119.40.186
MA: 128.119.40.186 Lifetime: 9999
Lifetime: 9999 identification:714
identification: 714 ….
encapsulation format
….
registration reply
time HA: 128.119.40.7 registration reply
MA: 128.119.40.186
Lifetime: 4999 HA: 128.119.40.7
Identification: 714 MA: 128.119.40.186
encapsulation format Lifetime: 4999
…. Identification: 714
….
6: Wireless and Mobile 6-
60. Components of cellular network architecture
recall: correspondent
wired public
telephone
network
MSC MSC
MSC
MSC
MSC
different cellular networks,
operated by different providers
6: Wireless and Mobile 6-
61. Handling mobility in cellular networks
home network: network of cellular provider you
subscribe to (e.g., Sprint PCS, Verizon)
home location register (HLR): database in home
network containing permanent cell phone #,
profile information (services, preferences,
billing), information about current location
(could be in another network)
visited network: network in which mobile currently
resides
visitor location register (VLR): database with
entry for each user currently in network
could be home network
6: Wireless and Mobile 6-
62. GSM: indirect routing to mobile
home
HLR
network correspondent
2
home
Mobile
home MSC consults HLR, Switching
gets roaming number of Center
mobile in visited network
1 call routed
to home network
3 Public
VLR switched
Mobile
telephone
Switching
network
Center
4
home MSC sets up 2nd leg of call
to MSC in visited network
mobile
user MSC in visited network completes
visited call through base station to mobile
network
6: Wireless and Mobile 6-
63. GSM: handoff with common MSC
Handoff goal: route call via
new base station (without
interruption)
VLR Mobile reasons for handoff:
Switching stronger signal to/from new
Center
BSS (continuing connectivity,
less battery drain)
old new
routing routing load balance: free up channel
old BSS in current BSS
new BSS
GSM doesn’t mandate why to
perform handoff (policy), only
how (mechanism)
handoff initiated by old BSS
6: Wireless and Mobile 6-
64. GSM: handoff with common MSC
1. old BSS informs MSC of impending
handoff, provides list of 1+ new BSSs
2. MSC sets up path (allocates resources) to
new BSS
VLR Mobile 3. new BSS allocates radio channel for use
Switching by mobile
Center 2
4 4. new BSS signals MSC, old BSS: ready
1
7 5. old BSS tells mobile: perform handoff to
8
3 new BSS
old BSS 5 6
new BSS 6. mobile, new BSS signal to activate new
channel
7. mobile signals via new BSS to MSC:
handoff complete. MSC reroutes call
8 MSC-old-BSS resources released
6: Wireless and Mobile 6-
65. GSM: handoff between MSCs
anchor MSC: first MSC
home network
visited during cal
correspondent call remains routed
Home
MSC through anchor MSC
new MSCs add on to end
anchor MSC
MSC
PSTN of MSC chain as mobile
moves to new MSC
MSC
IS-41 allows optional
MSC
path minimization step
to shorten multi-MSC
chain
(a) before handoff
6: Wireless and Mobile 6-
66. GSM: handoff between MSCs
anchor MSC: first MSC
home network
visited during cal
correspondent call remains routed
Home
MSC through anchor MSC
new MSCs add on to end
anchor MSC
MSC
PSTN of MSC chain as mobile
moves to new MSC
MSC
IS-41 allows optional
MSC
path minimization step
to shorten multi-MSC
chain
(b) after handoff
6: Wireless and Mobile 6-
67. Mobility: GSM versus Mobile IP
GSM element Comment on GSM element Mobile IP element
Home system Network to which mobile user’s permanent Home
phone number belongs network
Gateway Mobile Home MSC: point of contact to obtain routable Home agent
Switching Center, or address of mobile user. HLR: database in
“home MSC”. Home home system containing permanent phone
Location Register number, profile information, current location of
(HLR) mobile user, subscription information
Visited System Network other than home system where mobile Visited
user is currently residing network
Visited Mobile Visited MSC: responsible for setting up calls Foreign agent
services Switching to/from mobile nodes in cells associated with
Center. MSC. VLR: temporary database entry in visited
Visitor Location system, containing subscription information for
Record (VLR) each visiting mobile user
Mobile Station Routable address for telephone call segment Care-of-
Roaming Number between home MSC and visited MSC, visible address
(MSRN), or “roaming to neither the mobile nor the correspondent.
number”
6: Wireless and Mobile 6-
68. Wireless, mobility: impact on higher layer protocols
logically, impact should be minimal …
best effort service model remains unchanged
TCP and UDP can (and do) run over wireless, mobile
… but performance-wise:
packet loss/delay due to bit-errors (discarded
packets, delays for link-layer retransmissions), and
handoff
TCP interprets loss as congestion, will decrease
congestion window un-necessarily
delay impairments for real-time traffic
limited bandwidth of wireless links
6: Wireless and Mobile 6-
69. Chapter 6 Summary
Wireless Mobility
wireless links: principles: addressing,
capacity, distance routing to mobile users
channel impairments home, visited networks
CDMA direct, indirect routing
IEEE 802.11 (“wi-fi”) care-of-addresses
CSMA/CA reflects case studies
wireless channel mobile IP
characteristics mobility in GSM
cellular access impact on higher-layer
architecture protocols
standards (e.g., GSM,
CDMA-2000, UMTS)
6: Wireless and Mobile 6-