Chapter 10 Mobile Communication Systems

Size: px
Start display at page:

Download "Chapter 10 Mobile Communication Systems"

Transcription

1 Chapter 10 Mobile Communication Systems Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1

2 Outline Cellular System Infrastructure Registration Handoff Parameters and Underlying Support Roaming Support Multicasting Security and Privacy Firewalls and System Security Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 2

3 Cellular System Infrastructure MS Base Station System BTS BTS BSC VLR HLR AUC BTS EIR MSC BTS MS BTS BTS BSC MSC Gateway MSC PSTN/ISDN Base Station System Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 3

4 VLR/HLR/AUC/EIR VLR contains information about all visiting MSs in that particular area of MSC VLR has pointers to the HLR s of visiting MS VLR helps in billing and access permission to the visiting MS AUC provides authentication and encryption parameters EIR contains identity of equipments that prevents service to unauthorized MSs Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 4

5 Classical Mail Forwarding Technique? Mail from the world Post Office Cincinnati Post Office Washington, DC Cincinnati Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. Washington, DC

6 Automatic Location Update MS HLR 1 2 Home network Home Mobile Switching Center VLR Update location Info. sent to HLR Visiting Mobile Switching Center PSTN Caller MS Visiting area Location update request Using Becon Signals Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 6

7 Automatic Call Forwarding using HLR-VLR Home MSC checks HLR; gets current location of MS in visiting area MS HLR 2 4 Home Network home Mobile Switching Center VLR Mobile Switching Center Visiting Area Caller 1 Call sent to home location PSTN Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 7 3 Home MSC forwards call to visiting MSC MSC in visiting area sends call to BS and connects MS

8 Redirection of Call to MS at a Visiting Location Home MSC Another MSC Call routed as per called number to MS Home MSC HLR Visiting MSC VLR Cell where MS is currently located BS MS Through backbone Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 8

9 Registration Wireless system needs to know whether MS is currently located in its home area or some other area (routing of incoming calls) This is done by periodically exchanging signals between BS and MS known as Beacons BS periodically broadcasts beacon signal (1 signal per second) to determine and test the MSs around Each MS listens to the beacon, if it has not heard it previously then it adds it to the active beacon kernel table This information is used by the MS to locate the nearest BS Information carried by beacon signal: cellular network identifier, timestamp, gateway address ID of the paging area, etc. Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 9

10 Steps for Registration MS listens to a new beacon, if it s a new one, MS adds it to the active beacon kernel table If MS decides that it has to communicate through a new BS, kernel modulation initiates handoff process. MS locates the nearest BS via user level processing The visiting BS performs user level processing and decides: Who the user is? What are its access permissions? Keeping track of billing Home site sends appropriate authentication response to the current serving BS The BS approves/disapproves the user access Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 10

11 Using a Mobile Phone Outside the Subscription Area Through backbone 3 Authentication request 4 Authentication response MS Visiting BS (Visiting MSC) Home BS (Home MSC) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 11

12 Applications and Characteristics of Beacon Signals Application Frequency band Information carried Cellular networks Wireless LANs (discussed in Chapter 15) Ad hoc networks (discussed in Chapter 14) GPS (discussed in Chapter 12) MHz (AMPS/CDPD), 1,850-1,910 MHz (GSM) MHz (industrial, scientific, and medical band for analog and mixed signals) GHz (ISM band for digital signals) MHz (ISM band for analog and mixed signals) GHz (ISM band for digital signals) Cellular IP network identifier, Gateway IP address, Paging area ID, Timestamp Traffic indication map Network node identify MHz Timestamped orbital map and astronomical information Search and rescue 406 and MHz Registration country and ID of vessel or aircraft in distress Mobile robotics 100 KHz - 1 MHz Position of pallet or payload Location tracking 300 GHz THz (infrared) Digitally encoded signal to identify user's location Aid to the impaired 176 MHz Digitally coded signal uniquely identifying physical locations Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 12

13 Handoff Parameters and Underlying Support Change of radio resources from one cell to an adjacent one Handoff depends on cell size, boundary length, signal strength, fading, reflection, etc. Handoff can be initiated by MS or BS and could be due to Radio link Network management Service issues Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 13

14 Handoff Parameters (Cont d) Radio link handoff is due to mobility of MS It depends on: Number of MSs in the cell Number of MSs that have left the cell Number of calls generated in the cell Number of calls transferred from the neighboring cells Number and duration of calls terminated in the cell Number of calls that were handoff to neighboring cells Cell dwell time Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 14

15 Handoff Parameters (Cont d) Network management may cause handoff if there is drastic imbalance of traffic in adjacent cells and optimal balance of resources is required Service related handoff is due to the degradation of QoS (quality of service) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 15

16 Time for Handoff Factors deciding right time for handoff: Signal strength Signal phase Combination of above two Bit error rate (BER) Distance Need for Handoff is determined by: Signal strength CIR (carrier to interference ratio) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 16

17 Handoff Region Signal strength due to BS i Signal strength due to BS j P i (x) P j (x) E P min BS i MS BS X 1 X 3 X 5 X j th X 4 X 2 By looking at the variation of signal strength from either base station it is possible to decide on the optimum area where handoff can take place Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 17

18 Handoff initiation (Cont d) Region X 3 -X 4 indicates the handoff area, where depending on other factors, the handoff needs to be performed One option is to do handoff at X 5 where the two signal strengths are equal If MS moves back and forth around X 5, it will result in too frequent handoffs (ping-pong effect) Therefore MS is allowed to continue with the existing BS till the signal strength decreases by a threshold value E Different cellular systems follow different handoff procedure Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 18

19 Types of Handoff Hard Handoff (break before make) Releasing current resources from the prior BS before acquiring resources from the next BS FDMA,TDMA follow this type of handoff Soft Handoff (make before break) In CDMA, since the same channel is used, we can use the same if orthogonal to the codes in the next BS Therefore, it is possible for the MS to communicate simultaneously with the prior BS as well as the new BS Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 19

20 Hard Handoff BS 1 MS BS 2 BS 1 MS BS 2 (a). Before handoff (c). After handoff BS 1 MS BS 2 (b). During handoff (No connection) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 20

21 Soft Handoff (CDMA only) BS 1 MS BS 2 (a). Before handoff BS 1 MS BS 2 (c). After handoff BS 1 MS BS 2 (b). During handoff Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 21

22 Roaming Support To move from a cell controlled by one MSC area to a cell connected to another MSC Beacon signals and the use of HLR-VLR allow the MS to roam anywhere provided the same service provider using that particular frequency band, is there in that region Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 22

23 Roaming Support Home MSC Visiting MSC Home MSC Visiting MSC BS 1 MS BS 2 MS moves BS 1 MS BS 2 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 23

24 Handoff Scenarios with Different Degree of Mobility PSTN MSC 1 MSC 2 MSC 3 MSC 4 MS a b c d e Paging Area 1 Paging Area 2 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 24

25 Possible Handoff Situations Assume MSC 1 to be the home of the MS for registration, billing, authentication, etc. When handoff is from position a to b, the routing can be done by MSC 1 itself When handoff is from position b to c, then bi-directional pointers are set up to link the HLR of MSC 1 to VLR of MSC 2 When handoff occurs at d or e, routing of information using HLR-VLR may not be adequate ( d is in a different paging area) Concept of Backbone network Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 25

26 Information Transmission Path when MS Hands Off from b to c Information to MS being sent Initial path of information transfer MSC 1 HLR MSC 2 VLR Connection Path after handoff MS a b c Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 26

27 Illustration of MSC Connections to Backbone Network and Routing/Rerouting R: Routers From rest of the backbone Router R1 (a,b,c,d,e) R12 MSC R3 R2 (a,b,c,d) (d) R4 R6 (a,b) (c) (e) R7 R10 R5 R8 R11 R13 R9 MSC 1 (a,b) MSC 2 (c) Paging area 1 (PA1) MSC 3 (d) MSC 4 (e) Paging area 2 (PA2) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 27

28 Backbone Network Routing done according to the topology and connectivity of the backbone network The dotted lines show the possible paths for a call headed for different MS locations One option is to find a router along the original path, from where a new path needs to start to reach the MSC along the shortest path Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 28

29 Home Agents (HA), Foreign Agents (FA) and Mobile IP Two important software modules are associated with routers, home agent (HA) and foreign agent (FA) MS is registered with a router, mostly a router closest to the home MSC can be used to maintain its HA A router other than closest one could also serve as an HA Once a MS moves from the home network, a software module in the new network FA assists MS by forwarding packets for the MS This functionality is somewhat similar to HLR-VLR Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 29

30 Home MSC and Home Agent (HA) for the Previous Network Home MSC MSC 1 MSC 2 MSC 3 MSC 4 Selected router for maintaining its home agent R 3 R 4 R 6 R 9 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 30

31 Call Establishment using HA-FA Whenever a MS moves to a new network, it still retains its initial HA The MS detects the FA of the new network, by sensing the periodic beacon signals which FA transmits MS can also itself send agent solicitation messages to which FA responds When FA detects a new MS, it allocates a CoA (care of address) to the MS, using dynamic host configuration protocol (DHCP) Once MS receives CoA, it registers its CoA with its HA and the time limit binding for its validity Such registration is initiated either directly by MS to the HA of the home router or indirectly through FA Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 31

32 Call Establishment (Cont d) HA confirms its binding through a reply to the MS A message sent from an arbitrary source to the MS at the home address is received by the HA Binding is checked, the CoA of the MS is encapsulated in the packet and forwarded to the network If CoA of the FA is used, then packet reaches FA, it decapsulates packet and passes to MS at the link layer In an internet environment, it is called Mobile IP After binding time, if MS still wants to have packets forwarded through HA, it needs to renew its registration When MS returns to its home network, it intimates its HA Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 32

33 Registration Process Between FA, MS, and HA When the MS Moves to a Paging area HA 4 MS Here is my HA and binding information FA 3 Here is CoA or co-located CoA (C-CoA) for this MS 4 Same as step Beacon Signal (Any one new) I am new here OK, send information 4 Same as step 4 CoA or C-CoA created Acknowledge Registration + binding Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 33

34 Message Forwarding using HA-FA Pair Incoming message for MS Source To MS Payload Data HA Encapsulation HA CoA/C-CoA Source To MS Payload Data FA Forwarding through intermediate router if CoA used Source To MS Payload Data Forwarding through intermediate router if C-CoA used MS Decapsulation done at MS Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 34

35 Routing in Backbone Routers How FA finds HA of the MS? One approach is to have a global table at each router of each MSC so that the route from FA to HA for that MS can be determined Disadvantages: Information too large, one network might not like to give out information about all its routers to any external network (only gateways information is provided) Use of Distributed Routing Scheme Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 35

36 Illustration of Paging Areas (PAs) and Backbone Router Interconnect Network 1 Router W PA 1 PA 2 Router X Router Y MS moves PA 3 PA 4 Router Z PA 5 Network 2 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 36

37 Distributed Routing Table and Location PAs Table at router W Route to PA Next hop Table at router X Route to PA Next hop Table at router Table at router Y Z Route to PA Next hop Route to PA Next hop 1 X 1-1 X 1 Y 2 X 2-2 X 2 Y 3 X 3 Y 3 Z 3-4 X 4 Y 4 Z 4-5 X 5 Y 5 Z 5 - Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 37

38 Multicasting Process of transmitting messages from a source to multiple recipients by using a group address for all hosts that wish to be the members of the group Reduces number of messages to be transmitted as compared to multiple unicasting Useful in video/audio conferencing, multi party games Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 38

39 Multicasting Multicasting can be performed either by building a source based tree or core based tree In source based tree, for each source of the group a shortest path is maintained, encompassing all the members of the group, with the source being the root of the tree In core based tree, a particular router is chosen as a core and a tree is maintained with the core being the root -- Every source forwards the packet to a core router, which then forwards it on the tree to reach all members of the multicast group Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 39

40 Multicasting Bi-directional Tunneling (BT) and Remote Subscription approaches have been proposed by IETF for providing multicast over Mobile IP In BT approach, whenever a MS moves to a foreign network, HA is responsible for forwarding the multicast packets to the MS via FA In Remote Subscription protocol, whenever a MS moves to a foreign network, the FA (if not already a member of multicast group) sends a tree join request Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 40

41 Multicasting Remote Subscription based approach is simple and prevents packet duplication and non optimal path delivery It can cause data interruption till the FA is connected to the tree It results in a number of tree join and tree leave requests when MS are in continuous motion In contrast, in the BT approach, the HA creates a bi-directional tunnel to FA and encapsulates the packets for MS FA then forwards the packets to the MS Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 41

42 Multicasting BT approach prevents data disruption due to the movement of MS But causes packet duplication if several MSs of the same HA, that have subscribed to the same multicast group move to same FA Also causes Tunnel Convergence Problem, where one FA may have several MSs subscribed to the same group, belonging to different HAs and each HA may forward a packet for its MSs to the same FA Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 42

43 Packet Duplication in BT Tunnel Approach Multicast packets from the multicast tree MS1 MS 1 HA MS2 FA MS 2 MS3 MS 3 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 43

44 Tunnel Convergence Problem Multicast packets from the multicast tree HA 1 CoA (MS1) MS 1 FA HA 2 CoA (MS2) MS 2 HA 3 CoA (MS3) CoA (MS4) MS 3 MS 4 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 44

45 Multicasting To overcome Tunnel Convergence Problem, MoM protocol is proposed wherein the FA selects one of the HAs, called the Designated Multicast Service Provider (DMSP), from the HA List for a particular group The remaining HAs do not forward packets to FA Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 45

46 Illustration of MoM Protocol Multicast packets from the multicast tree HA 1 Stop CoA (MS1) MS 1 Forward MS 2 HA 2 CoA (MS2) FA DMSP Selection MS 3 HA 3 Stop CoA (MS3) CoA (MS4) MS 4 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 46

47 Security and Privacy Transfer through an open air medium makes messages vulnerable to various attacks One such problem is Jamming by a very powerful transmitting antenna Can be overcome by using frequency hopping. Many encryption techniques used so that unauthorized users cannot interpret the signals Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 47

48 Encryption Techniques Permuting the bits in a pre specified manner before transmitting them Such permuted information can be reconstructed by using reverse operation This is called Data Encryption Standard (DES) on input bits Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 48

49 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 49 Input Output Simple Permutation Function W I R E L E S S W L I E R S E S

50 Initial Bit Patterns and effect of before Transmission and after Reception using DES (a) Information sequence to be transmitted (b) Permutation of information sequence before transmission (c) Permutation to be performed on received information sequence Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 50

51 Encryption Techniques A complex encryption scheme involves transforming input blocks to some coded form Encoded information is uniquely mapped back to useful information Simplest transformation involves logical or arithmetic or both operations Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 51

52 A Generic Process of Encoding and Decoding Information block Encoding at transmitter Encoded signal Transmitted signal Received signal Encoded signal Decoding Information at block receiver (Original) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 52

53 A Generic Process of Encoding and Decoding Encoding Information at block transmitter Encoded signal Received signal Transmitted signal Encoded signal Decoding at receiver Information block (Original) Initial pattern EX-OR bits Bits after EX-OR Transmitted Shuffle bits Received Inverse bits Shuffle Bits after shuffle EX-OR bits Air Operations done at the transmitting MS Operations done at the receiving MS Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. Bits after EX-OR

54 Permutation and Coding of Information Input (64 bits) Initial Permutation (IP) 32 bits 32 bits Left half: L1 + f Right half: R1 Key K1 Left half: L1 = R1 R1 = L1 f(r1, K1) + + f R16 = L16 f(r15, K16) + Left half: L16 = R15 Inverse initial permutation (IP 1) Coded Output Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 54

55 Authentication Making sure user is genuine Using a Hash Function from an associated unique identification of the user (not full proof) Another approach is to use two different interrelated keys One known only to system generating the key (private key), other used for sending to outside world (public key) RSA algorithm (best known public key system) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 55

56 Public/Private Key Authentication Steps System (1) Compute Public Key for User i from its private key (2) Send Public Key User i Save Public Key usually done off line System (4) Verify using private key of User i (3) ID, Signature User i Use public key to generate signature. online test System (5) Authentication Result User i Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 56

57 Authentication (RSA Algorithm) Let us take p=3 and q=11, giving n=pq=33 Assume e=7, gives (n,e) as public key of (33,7) For message m=4, c= m e mod n = 4 7 mod 33 = 16 d is computed such that ed mod (p-1)(q-1) = ed mod 20 = 1, thus, d=3, giving private key of (33,3) After receiving c=16, compute c d mod 30 = 16 3 mod 33 =4 Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 57

58 Authentication (RSA Algorithm) In RSA method 2 large prime numbers (p,q) are selected. n = p*q, A number e is selected to use (n,e) as the public key and is transmitted to the user, User stores this, whenever a message m< n needs to be transmitted, user computes c = m e mod n and sends to the system. After receiving c, the system computes c d mod n where d is computed using the private key (n,e) c d mod n = (m e mod n ) d mod n = (m e ) d mod n = m ed mod n To make this equal to m, ed should be equal to 1. This means e and d need to be multiplicative inverse using mod n (or mod p*q) This can be satisfied if e is prime with respect to (p-1)*(q-1) Using this restriction original message is reconstructed. Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 58

59 Message Authentication using Public/Private Keys Base Station Select p and q as two prime numbers n = p*q 1 < e < n Public Key (n,e) Mobile Station Save public key (n, e) Base Station Compute d from e (n,d) private key Receive c c Mobile Station Message m < n Sent as c = m e mod n Base Station Compute c d mod n = m de mod n = m If de = 1 Authentication Mobile station OK Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 59

60 Authentication of a MS by the BS (ID) e mod n Base Station Authentication Mobile Station Base Station (a) Authentication based on ID (ID) e mod n R: Random Number as a Challenge Send R e mod n Authentication (b) Authentication using a challenge Mobile Station Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 60

61 Wireless System Security Basic services of security: Confidentiality Non-repudiation: sender and receiver cannot deny the transmission Authentication: sender of the information is correctly identified Integrity: content of the message can only be modified by authorized user Availability: resources available only to authorized users Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 61

62 Wireless System Security Security Mechanisms: Security Prevention: Enforces security during the operation of the system Security Detection: Detects attempts to violate security Recovery: Restore the system to presecurity violation state Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 62

63 Cost Function of a Secured Wireless System Cost Expected total cost Expected total cost with violations Optimal Level Cost for Security enhancing mechanisms 100% Security Level Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 63

64 Security Threat Categories S Source I Intruder D Destination Message S I D Interruption S Message Message I Interception D S Message I D Message S I Message Modification Fabrication Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 64 D

65 Wireless Security Active Attacks: When data modification or false data transmission takes place Masquerade: one entity pretends to be a different entity Replay: information captured and retransmitted to produce unauthorized effect Modification of message Denial of service (DoS) Passive Attacks: Goal of intruder is to obtain information (monitoring, eavesdropping on transmission) Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 65

66 Firewalls and System Security Firewall carries out traffic filtering, web authentication, and other security mechanisms Filtering can be configured by fixing: Source IP Destination IP Source TCP/UDP port Destination TCP/UDP port Arrival interface Destination interface IP protocol Firewall resides at wireless access point to carry out authentication Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 66

2018/5/23. YU Xiangyu

2018/5/23. YU Xiangyu 2018/5/23 YU Xiangyu yuxy@scut.edu.cn Structure of Mobile Communication System Cell Handover/Handoff Roaming Mobile Telephone Switching Office Public Switched Telephone Network Tomasi Advanced Electronic

More information

2016/10/14. YU Xiangyu

2016/10/14. YU Xiangyu 2016/10/14 YU Xiangyu yuxy@scut.edu.cn Structure of Mobile Communication System Cell Handover/Handoff Roaming Mobile Telephone Switching Office Public Switched Telephone Network Tomasi Advanced Electronic

More information

UCS-805 MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2011

UCS-805 MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2011 Location Management for Mobile Cellular Systems SLIDE #3 UCS-805 MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com

More information

MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012

MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012 Location Management for Mobile Cellular Systems MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Cellular System

More information

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit. MOBILE COMPUTING CSE 40814/60814 Spring 2018 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch

More information

Chapter 1 Basic concepts of wireless data networks (cont d.)

Chapter 1 Basic concepts of wireless data networks (cont d.) Chapter 1 Basic concepts of wireless data networks (cont d.) Part 4: Wireless network operations Oct 6 2004 1 Mobility management Consists of location management and handoff management Location management

More information

Data and Computer Communications. Chapter 10 Cellular Wireless Networks

Data and Computer Communications. Chapter 10 Cellular Wireless Networks Data and Computer Communications Chapter 10 Cellular Wireless Networks Cellular Wireless Networks 5 PSTN Switch Mobile Telecomm Switching Office (MTSO) 3 4 2 1 Base Station 0 2016-08-30 2 Cellular Wireless

More information

Chapter 5 Acknowledgment:

Chapter 5 Acknowledgment: Chapter 5 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. Manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

CS 621 Mobile Computing

CS 621 Mobile Computing Lecture 11 CS 621 Mobile Computing Location Management for Mobile Cellular Systems Zubin Bhuyan, Department of CSE, Tezpur University http://www.tezu.ernet.in/~zubin Several slides and images in this presentation

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 GSM 2 GSM Architecture Frequency Band and Channels Frames in GSM Interfaces, Planes, and Layers of GSM Handoff Short Message Service (SMS) 3 subscribers

More information

Mobile & Wireless Networking. Lecture 4: Cellular Concepts & Dealing with Mobility. [Reader, Part 3 & 4]

Mobile & Wireless Networking. Lecture 4: Cellular Concepts & Dealing with Mobility. [Reader, Part 3 & 4] 192620010 Mobile & Wireless Networking Lecture 4: Cellular Concepts & Dealing with Mobility [Reader, Part 3 & 4] Geert Heijenk Outline of Lecture 4 Cellular Concepts q Introduction q Cell layout q Interference

More information

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( ) CHAPTER 2 Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication (2170710) Syllabus Chapter-2.1 Cellular Wireless Networks 2.1.1 Principles of Cellular Networks Underlying technology

More information

Developing Mobile Applications

Developing Mobile Applications Developing Mobile Applications GSM networks 1 carriers GSM 900 MHz 890-915 MHz 935-960 MHz up down 200 KHz 200 KHz 25 MHz 25 MHz 2 frequency reuse A D K B J L C H E G I F A 3 Reuse patterns 4/12 4 base

More information

King Fahd University of Petroleum & Minerals Computer Engineering Dept

King Fahd University of Petroleum & Minerals Computer Engineering Dept King Fahd University of Petroleum & Minerals Computer Engineering Dept COE 543 Mobile and Wireless Networks Term 022 Dr. Ashraf S. Hasan Mahmoud Rm 22-148-3 Ext. 1724 Email: ashraf@ccse.kfupm.edu.sa 4/14/2003

More information

Cellular Wireless Networks. Chapter 10

Cellular Wireless Networks. Chapter 10 Cellular Wireless Networks Chapter 10 Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells Each cell is served by base station consisting of transmitter,

More information

Cellular Network. Ir. Muhamad Asvial, MSc., PhD

Cellular Network. Ir. Muhamad Asvial, MSc., PhD Cellular Network Ir. Muhamad Asvial, MSc., PhD Center for Information and Communication Engineering Research (CICER) Electrical Engineering Department - University of Indonesia E-mail: asvial@ee.ui.ac.id

More information

An Introduction to Wireless Technologies Part 2. F. Ricci

An Introduction to Wireless Technologies Part 2. F. Ricci An Introduction to Wireless Technologies Part 2 F. Ricci Content Medium access control (MAC): FDMA = Frequency Division Multiple Access TDMA = Time Division Multiple Access CDMA = Code Division Multiple

More information

Communication Systems GSM

Communication Systems GSM Communication Systems GSM Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 last to final

More information

Chapter 7 GSM: Pan-European Digital Cellular System. Prof. Jang-Ping Sheu

Chapter 7 GSM: Pan-European Digital Cellular System. Prof. Jang-Ping Sheu Chapter 7 GSM: Pan-European Digital Cellular System Prof. Jang-Ping Sheu Background and Goals GSM (Global System for Mobile Communications) Beginning from 1982 European standard Full roaming in Europe

More information

Intersystem Operation and Mobility Management. First Generation Systems

Intersystem Operation and Mobility Management. First Generation Systems Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html

More information

Outline / Wireless Networks and Applications Lecture 18: Cellular: 1G, 2G, and 3G. Advanced Mobile Phone Service (AMPS)

Outline / Wireless Networks and Applications Lecture 18: Cellular: 1G, 2G, and 3G. Advanced Mobile Phone Service (AMPS) Outline 18-452/18-750 Wireless Networks and Applications Lecture 18: Cellular: 1G, 2G, and 3G 1G: AMPS 2G: GSM 2.5G: EDGE, CDMA 3G: WCDMA Peter Steenkiste Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17

More information

Background: Cellular network technology

Background: Cellular network technology Background: Cellular network technology Overview 1G: Analog voice (no global standard ) 2G: Digital voice (again GSM vs. CDMA) 3G: Digital voice and data Again... UMTS (WCDMA) vs. CDMA2000 (both CDMA-based)

More information

First Generation Systems

First Generation Systems Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University of Pittsburgh Telcom 2720 Slides 6 http://www.tele.pitt.edu/tipper.html

More information

10EC81-Wireless Communication UNIT-6

10EC81-Wireless Communication UNIT-6 UNIT-6 The first form of CDMA to be implemented is IS-95, specified a dual mode of operation in the 800Mhz cellular band for both AMPS and CDMA. IS-95 standard describes the structure of wideband 1.25Mhz

More information

UNIT- 2. Components of a wireless cellular network

UNIT- 2. Components of a wireless cellular network UNIT- 2 Components of a wireless cellular network These network elements may be divided into three groups. MS- Provides the user link to wireless network RBS, BSC The B.S system provides the wireless system

More information

Chapter 8: GSM & CDAMA Systems

Chapter 8: GSM & CDAMA Systems Chapter 8: GSM & CDAMA Systems Global System for Mobile Communication (GSM) Second Generation (Digital) Cellular System Operated in 900 MHz band GSM is also operated in 1800 MHz band and this version of

More information

Chapter- 5. Performance Evaluation of Conventional Handoff

Chapter- 5. Performance Evaluation of Conventional Handoff Chapter- 5 Performance Evaluation of Conventional Handoff Chapter Overview This chapter immensely compares the different mobile phone technologies (GSM, UMTS and CDMA). It also presents the related results

More information

Page 1. Problems with 1G Systems. Wireless Wide Area Networks (WWANs) EEC173B/ECS152C, Spring Cellular Wireless Network

Page 1. Problems with 1G Systems. Wireless Wide Area Networks (WWANs) EEC173B/ECS152C, Spring Cellular Wireless Network EEC173B/ECS152C, Spring 2009 Wireless Wide Area Networks (WWANs) Cellular Wireless Network Architecture and Protocols Applying concepts learned in first two weeks: Frequency planning, channel allocation

More information

Chapter 2: Global System for Mobile Communication

Chapter 2: Global System for Mobile Communication Chapter 2: Global System for Mobile Communication (22 Marks) Introduction- GSM services and features, GSM architecture, GSM channel types, Example of GSM Call: GSM to PSTN call, PSTN to GSM call. GSM frame

More information

G 364: Mobile and Wireless Networking. CLASS 21, Mon. Mar Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

G 364: Mobile and Wireless Networking. CLASS 21, Mon. Mar Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob G 364: Mobile and Wireless Networking CLASS 21, Mon. Mar. 29 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Global System for Mobile Communications (GSM) Digital wireless network standard

More information

CHAPTER4 CELLULAR WIRELESS NETWORKS

CHAPTER4 CELLULAR WIRELESS NETWORKS CHAPTER4 CELLULAR WIRELESS NETWORKS These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic

More information

Wireless WANS and MANS. Chapter 3

Wireless WANS and MANS. Chapter 3 Wireless WANS and MANS Chapter 3 Cellular Network Concept Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of

More information

CS 218 Fall 2003 October 23, 2003

CS 218 Fall 2003 October 23, 2003 CS 218 Fall 2003 October 23, 2003 Cellular Wireless Networks AMPS (Analog) D-AMPS (TDMA) GSM CDMA Reference: Tanenbaum Chpt 2 (pg 153-169) Cellular Wireless Network Evolution First Generation: Analog AMPS:

More information

RADIO SYSTEMS ETIN15. Lecture no: GSM and WCDMA. Ove Edfors, Department of Electrical and Information Technology

RADIO SYSTEMS ETIN15. Lecture no: GSM and WCDMA. Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 11 GSM and WCDMA Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 1 Contents (Brief) history of mobile telephony Global System for

More information

GSM and WCDMA RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

GSM and WCDMA RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 11 GSM and WCDMA Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2015-05-12 Ove Edfors - ETIN15 1 Contents (Brief) history of mobile

More information

Mobile Network Evolution Part 1. GSM and UMTS

Mobile Network Evolution Part 1. GSM and UMTS Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Wireless CommuniCation. unit 5

Wireless CommuniCation. unit 5 Wireless CommuniCation unit 5 V. ADVANCED TRANSCEIVER SCHEMES Spread Spectrum Systems- Cellular Code Division Multiple Access Systems- Principle, Power control, Effects of multipath propagation on Code

More information

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network

More information

Principles of Ad Hoc Networking

Principles of Ad Hoc Networking Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Wireless Mobility Ad hoc Sensor Challenge Open medium Handover implies

More information

Introduction to IS-95 CDMA p. 1 What is CDMA p. 1 History of CDMA p. 2 Forms of CDMA p MHz CDMA p MHz CDMA (PCS) p. 6 CDMA Parts p.

Introduction to IS-95 CDMA p. 1 What is CDMA p. 1 History of CDMA p. 2 Forms of CDMA p MHz CDMA p MHz CDMA (PCS) p. 6 CDMA Parts p. Introduction to IS-95 CDMA p. 1 What is CDMA p. 1 History of CDMA p. 2 Forms of CDMA p. 3 800 MHz CDMA p. 6 1900 MHz CDMA (PCS) p. 6 CDMA Parts p. 7 Mobile Station p. 8 Base Station Subsystem (BSS) p.

More information

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009 An Introduction to Wireless Technologies Part 2 F. Ricci 2008/2009 Content Multiplexing Medium access control Medium access control (MAC): FDMA = Frequency Division Multiple Access TDMA = Time Division

More information

Chapter 4. TETRA and GSM over satellite

Chapter 4. TETRA and GSM over satellite Chapter 4. TETRA and GSM over satellite TETRA and GSM over satellite have been addressed a number of times in the first three chapters of the document. Their vital roles in the present project are well

More information

Wireless and mobile communication

Wireless and mobile communication Wireless and mobile communication Wireless communication Multiple Access FDMA TDMA CDMA SDMA Mobile Communication GSM GPRS GPS Bluetooth Content What is wireless communication? In layman language it is

More information

G 364: Mobile and Wireless Networking. CLASS 22, Wed. Mar Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

G 364: Mobile and Wireless Networking. CLASS 22, Wed. Mar Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob G 364: Mobile and Wireless Networking CLASS 22, Wed. Mar. 31 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Logical vs. Physical Channels Logical channels (traffic channels, signaling (=control)

More information

GSM and Similar Architectures Lesson 04 GSM Base station system and Base Station Controller

GSM and Similar Architectures Lesson 04 GSM Base station system and Base Station Controller GSM and Similar Architectures Lesson 04 GSM Base station system and Base Station Controller 1 GSM network architecture Radio subsystem (RSS) Network subsystem (NSS) Operation subsystem (OSS) 2 RSS Consists

More information

Cellular systems & GSM Wireless Systems, a.a. 2014/2015

Cellular systems & GSM Wireless Systems, a.a. 2014/2015 Cellular systems & GSM Wireless Systems, a.a. 2014/2015 Un. of Rome La Sapienza Chiara Petrioli Department of Computer Science University of Rome Sapienza Italy 2 Voice Coding 3 Speech signals Voice coding:

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

Modeling and Dimensioning of Mobile Networks: from GSM to LTE. Maciej Stasiak, Mariusz Głąbowski Arkadiusz Wiśniewski, Piotr Zwierzykowski

Modeling and Dimensioning of Mobile Networks: from GSM to LTE. Maciej Stasiak, Mariusz Głąbowski Arkadiusz Wiśniewski, Piotr Zwierzykowski Modeling and Dimensioning of Mobile Networks: from GSM to LTE Maciej Stasiak, Mariusz Głąbowski Arkadiusz Wiśniewski, Piotr Zwierzykowski Modeling and Dimensioning of Mobile Networks: from GSM to LTE GSM

More information

Wireless Cellular Networks. Base Station - Mobile Network

Wireless Cellular Networks. Base Station - Mobile Network Wireless Cellular Networks introduction frequency reuse channel assignment strategies techniques to increase capacity handoff cellular standards 1 Base Station - Mobile Network RCC RVC FVC FCC Forward

More information

)454 1 '%.%2!,!30%#43 /& 05",)#,!.$ -/"),%.%47/2+3 05",)#,!.$ -/"),%.%47/2+3. )454 Recommendation 1 INTERNATIONAL TELECOMMUNICATION UNION

)454 1 '%.%2!,!30%#43 /& 05,)#,!.$ -/),%.%47/2+3 05,)#,!.$ -/),%.%47/2+3. )454 Recommendation 1 INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION )454 1 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU 05",)#,!.$ -/"),%.%47/2+3 '%.%2!,!30%#43 /& 05",)#,!.$ -/"),%.%47/2+3 )454 Recommendation 1 (Extract from the

More information

Chapter 1 INTRODUCTION

Chapter 1 INTRODUCTION Chapter 1 INTRODUCTION 1 The History of Mobile Radio Communication (1/3) 1880: Hertz Initial demonstration of practical radio communication 1897: Marconi Radio transmission to a tugboat over an 18 mi path

More information

Section A : example questions

Section A : example questions 2G1723 GSM Network and Services The exam will consist of two sections: section A (20p) and section B (8p). Section A consist of 20 multiple-choice questions (1p each), where exactly one answer is correct.

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95 ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2003 Lecture 9: Multiple Access, GSM, and IS-95 Outline: Two other important issues related to multiple access space division with smart

More information

Wireless Telecommunication Systems GSM as basis of current systems Enhancements for data communication: HSCSD, GPRS, EDGE UMTS: Future or not?

Wireless Telecommunication Systems GSM as basis of current systems Enhancements for data communication: HSCSD, GPRS, EDGE UMTS: Future or not? Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction 1.1Motivation The past five decades have seen surprising progress in computing and communication technologies that were stimulated by the presence of cheaper, faster, more reliable

More information

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 14 Cellular Wireless Networks Eighth Edition by William Stallings Cellular Wireless Networks key technology for mobiles, wireless nets etc developed to increase

More information

GTBIT ECE Department Wireless Communication

GTBIT ECE Department Wireless Communication Q-1 What is Simulcast Paging system? Ans-1 A Simulcast Paging system refers to a system where coverage is continuous over a geographic area serviced by more than one paging transmitter. In this type of

More information

Introduction to Wireless Networks p. 1 Evolution of Wireless Networks p. 2 Early Mobile Telephony p. 2 Analog Cellular Telephony p.

Introduction to Wireless Networks p. 1 Evolution of Wireless Networks p. 2 Early Mobile Telephony p. 2 Analog Cellular Telephony p. Preface p. xv Introduction to Wireless Networks p. 1 Evolution of Wireless Networks p. 2 Early Mobile Telephony p. 2 Analog Cellular Telephony p. 3 Digital Cellular Telephony p. 4 Cordless Phones p. 7

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

UNIT- 3. Introduction. The cellular advantage. Cellular hierarchy

UNIT- 3. Introduction. The cellular advantage. Cellular hierarchy UNIT- 3 Introduction Capacity expansion techniques include the splitting or sectoring of cells and the overlay of smaller cell clusters over larger clusters as demand and technology increases. The cellular

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

CPET 565/499 Mobile Computing Systems. Mobile Wireless Networking Infrastructure & Technologies

CPET 565/499 Mobile Computing Systems. Mobile Wireless Networking Infrastructure & Technologies CPET 565/499 Mobile Computing Systems Lecture 2 Mobile Networking Communication Infrastructures and Technologies Fall 202 A Specialty Course for Purdue University s M.S. in Technology Graduate Program

More information

Introduction to Wireless and Mobile Networking. Hung-Yu Wei g National Taiwan University

Introduction to Wireless and Mobile Networking. Hung-Yu Wei g National Taiwan University Introduction to Wireless and Mobile Networking Lecture 3: Multiplexing, Multiple Access, and Frequency Reuse Hung-Yu Wei g National Taiwan University Multiplexing/Multiple Access Multiplexing Multiplexing

More information

Lecture #6 Basic Concepts of Cellular Transmission (p3)

Lecture #6 Basic Concepts of Cellular Transmission (p3) November 2014 Integrated Technical Education Cluster At AlAmeeria E-716-A Mobile Communications Systems Lecture #6 Basic Concepts of Cellular Transmission (p3) Instructor: Dr. Ahmad El-Banna Agenda Duplexing

More information

OSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda

OSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda OSPF Domain / OSPF Area OSPF Advanced Topics Areas,, Backbone, Summary-LSA, ASBR, Stub Area, Route Summarization, Virtual Links, Header Details OSPF domain can be divided in multiple OSPF areas to improve

More information

Cellular Network Planning and Optimization Part VI: WCDMA Basics. Jyri Hämäläinen, Communications and Networking Department, TKK, 24.1.

Cellular Network Planning and Optimization Part VI: WCDMA Basics. Jyri Hämäläinen, Communications and Networking Department, TKK, 24.1. Cellular Network Planning and Optimization Part VI: WCDMA Basics Jyri Hämäläinen, Communications and Networking Department, TKK, 24.1.2008 Outline Network elements Physical layer Radio resource management

More information

CDMA - QUESTIONS & ANSWERS

CDMA - QUESTIONS & ANSWERS CDMA - QUESTIONS & ANSWERS http://www.tutorialspoint.com/cdma/questions_and_answers.htm Copyright tutorialspoint.com 1. What is CDMA? CDMA stands for Code Division Multiple Access. It is a wireless technology

More information

CDMA Principle and Measurement

CDMA Principle and Measurement CDMA Principle and Measurement Concepts of CDMA CDMA Key Technologies CDMA Air Interface CDMA Measurement Basic Agilent Restricted Page 1 Cellular Access Methods Power Time Power Time FDMA Frequency Power

More information

Global System for Mobile Communications

Global System for Mobile Communications Global System for Mobile Communications Contents 1. Introduction 2. Features of GSM 3. Network Components 4. Channel Concept 5. Coding, Interleaving, Ciphering 6. Signaling 7. Handover 8. Location Update

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

IS-95 /CdmaOne Standard. By Mrs.M.R.Kuveskar.

IS-95 /CdmaOne Standard. By Mrs.M.R.Kuveskar. IS-95 /CdmaOne Standard By Mrs.M.R.Kuveskar. CDMA Classification of CDMA Systems CDMA SYSTEMS CDMA one CDMA 2000 IS95 IS95B JSTD 008 Narrow Band Wide Band CDMA Multiple Access in CDMA: Each user is assigned

More information

EE 304 TELECOMMUNICATIONs ESSENTIALS HOMEWORK QUESTIONS AND ANSWERS

EE 304 TELECOMMUNICATIONs ESSENTIALS HOMEWORK QUESTIONS AND ANSWERS Homework Question 1 EE 304 TELECOMMUNICATIONs ESSENTIALS HOMEWORK QUESTIONS AND ANSWERS Allocated channel bandwidth for commercial TV is 6 MHz. a. Find the maximum number of analog voice channels that

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

CHAPTER 13 CELLULAR WIRELESS NETWORKS

CHAPTER 13 CELLULAR WIRELESS NETWORKS CHAPTER 13 CELLULAR WIRELESS NETWORKS These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial

More information

CHAPTER 2 WCDMA NETWORK

CHAPTER 2 WCDMA NETWORK CHAPTER 2 WCDMA NETWORK 2.1 INTRODUCTION WCDMA is a third generation mobile communication system that uses CDMA technology over a wide frequency band to provide high-speed multimedia and efficient voice

More information

TELE4652 Mobile and Satellite Communications

TELE4652 Mobile and Satellite Communications Mobile and Satellite Communications Lecture 1 Introduction to Cellular Mobile Communications Public Switched Telephone Networks (PSTN) Public Land Mobile Networks (PLMN) evolved from the PSTN - Aimed to

More information

RADIO LINK ASPECT OF GSM

RADIO LINK ASPECT OF GSM RADIO LINK ASPECT OF GSM The GSM spectral allocation is 25 MHz for base transmission (935 960 MHz) and 25 MHz for mobile transmission With each 200 KHz bandwidth, total number of channel provided is 125

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Chapter 5. North American Cellular System Based on Time Division Multiple Access

Chapter 5. North American Cellular System Based on Time Division Multiple Access Chapter 5. North American Cellular System Based on Time Division Multiple Access Background and Goals AMPS can not support user transparency roaming Interim Standard 41 (IS 41) is to deliver AMPS services

More information

Working Party 5B DRAFT NEW RECOMMENDATION ITU-R M.[500KHZ]

Working Party 5B DRAFT NEW RECOMMENDATION ITU-R M.[500KHZ] Radiocommunication Study Groups Source: Subject: Document 5B/TEMP/376 Draft new Recommendation ITU-R M.[500kHz] Document 17 November 2011 English only Working Party 5B DRAFT NEW RECOMMENDATION ITU-R M.[500KHZ]

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

CDMA is used to a limited extent on the 800-MHz band, but is much more common in the 1900-MHz PCS band. It uses code-division multiple access by

CDMA is used to a limited extent on the 800-MHz band, but is much more common in the 1900-MHz PCS band. It uses code-division multiple access by IS-95 CDMA PCS CDMA Frequency Use CDMA Channels Forward Channel Reverse Channel Voice Coding Mobile Power Control Rake Receivers and Soft handoffs CDMA Security CDMA is used to a limited extent on the

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (8 th Week) Cellular Wireless Network 8.Outline Principles of Cellular Networks Cellular Network Generations LTE-Advanced

More information

GSM NCN-EG-01 Course Outline for GSM

GSM NCN-EG-01 Course Outline for GSM GSM NCN-EG-01 Course Outline for GSM 1 Course Description: Good understanding of GSM technology and cellular networks is essential for anyone working in GSM or related areas. This course is structured

More information

Course Overview. AMPS: History

Course Overview. AMPS: History Course Overview Introduction and History Data in Wireless Cellular Systems: AMPS and CDPD Data in Wireless Local Area Networks Internet Protocols Routing and Ad-Hoc Networks TCP over Wireless Link Services

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

ETI2511-WIRELESS COMMUNICATION II HANDOUT I 1.0 PRINCIPLES OF CELLULAR COMMUNICATION

ETI2511-WIRELESS COMMUNICATION II HANDOUT I 1.0 PRINCIPLES OF CELLULAR COMMUNICATION ETI2511-WIRELESS COMMUNICATION II HANDOUT I 1.0 PRINCIPLES OF CELLULAR COMMUNICATION 1.0 Introduction The substitution of a single high power Base Transmitter Stations (BTS) by several low BTSs to support

More information

More Efficient Routing Algorithm for Ad Hoc Network

More Efficient Routing Algorithm for Ad Hoc Network More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks

More information

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone Politecnico di Milano Facoltà di Ingegneria dell Informazione 3 Basic concepts Wireless Networks Prof. Antonio Capone Wireless Networks Wireless or wired, what is better? Well, it depends on the situation!

More information

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study 216 Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Dr Basil M Kasasbeh, Applied Science University,

More information

3.1. Historical Overview. Citizens` Band Radio Cordless Telephones Improved Mobile Telephone Service (IMTS)

3.1. Historical Overview. Citizens` Band Radio Cordless Telephones Improved Mobile Telephone Service (IMTS) III. Cellular Radio Historical Overview Introduction to the Advanced Mobile Phone System (AMPS) AMPS Control System Security and Privacy Cellular Telephone Specifications and Operation 3.1. Historical

More information

Multiple Access Techniques for Wireless Communications

Multiple Access Techniques for Wireless Communications Multiple Access Techniques for Wireless Communications Contents 1. Frequency Division Multiple Access (FDMA) 2. Time Division Multiple Access (TDMA) 3. Code Division Multiple Access (CDMA) 4. Space Division

More information

Introduction of USRP and Demos. by Dong Han & Rui Zhu

Introduction of USRP and Demos. by Dong Han & Rui Zhu Introduction of USRP and Demos by Dong Han & Rui Zhu Introduction USRP(Universal Software Radio Peripheral ): A computer-hosted software radio, which is commonly used by research labs, universities. Motherboard

More information