Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Sridhar Iyer
K R School of Information Technology
IIT Bombay
sri@it.iitb.ac.in
http://www.it.iitb.ac.in/~sri
Outline
Sridhar Iyer
IIT Bombay
References
J. Schiller, Mobile Communications, Addison Wesley, 2000
802.11 Wireless LAN, IEEE standards, www.ieee.org
Mobile IP, RFC 2002, RFC 334, www.ietf.org
TCP over wireless, RFC 3150, RFC 3155, RFC 3449
A. Mehrotra, GSM System Engineering, Artech House, 1997
Bettstetter, Vogel and Eberspacher, GPRS: Architecture, Protocols
and Air Interface, IEEE Communications Survey 1999, 3(3).
M.v.d. Heijden, M. Taylor. Understanding WAP, Artech House, 2000
Mobile Ad hoc networks, RFC 2501
Others websites:
www.palowireless.com
www.gsmworld.com; www.wapforum.org
www.etsi.org; www.3gtoday.com
Sridhar Iyer
IIT Bombay
Wireless networks
Access computing/communication services, on the move
Cellular Networks
traditional base station infrastructure systems
Wireless LANs
infrastructure as well as ad-hoc networks possible
very flexible within the reception area
low bandwidth compared to wired networks (1-10 Mbit/s)
Ad hoc Networks
useful when infrastructure not available, impractical, or expensive
military applications, rescue, home networking
Sridhar Iyer
IIT Bombay
Palm-sized
Tablets
Clamshell handhelds
Laptop computers
Netenabled mobile
Higher delays
several hundred milliseconds
Sridhar Iyer
IIT Bombay
IIT Bombay
Cellular concept
Limited number of frequencies => limited channels
High power antenna => limited number of users
Smaller cells => frequency reuse possible => more users
Base stations (BS): implement space division multiplex
Cluster: group of nearby BSs that together use all available
channels
Sridhar Iyer
IIT Bombay
MSC
HLR
VLR
Sridhar Iyer
PSTN
MSC
To other
MSCs
IIT Bombay
HLR
VLR
PSTN
10
Network activity:
MSC determines current location of target mobile
using HLR, VLR and by communicating with other
MSCs
Source MSC initiates a call setup message to MSC
covering target area
Sridhar Iyer
IIT Bombay
11
Network activity:
Network completes the two halves of the connection
Sridhar Iyer
IIT Bombay
12
Hand-Offs
BS initiated:
Handoff occurs if signal level of mobile falls below threshold
Increases load on BS
Mobile assisted:
Each BS periodically transmits beacon
Mobile, on hearing stronger beacon from a new BS, initiates
the handoff
Intersystem:
Mobile moves across areas controlled by different MSCs
Handled similar to mobile assisted case with additional
HLR/VLR effort
Sridhar Iyer
IIT Bombay
13
Transport
congestion and flow control
Network
addressing and routing
Link
media access and handoff
Physical
transmission errors and interference
Sridhar Iyer
IIT Bombay
14
Mobile applications - 1
Vehicles
transmission of news, road condition etc
ad-hoc network with near vehicles to prevent
accidents
Emergencies
early transmission of patient data to the hospital
ad-hoc network in case of earthquakes, cyclones
military ...
Sridhar Iyer
IIT Bombay
15
Mobile applications - 2
Travelling salesmen
direct access to central customer files
consistent databases for all agents
Web access
outdoor Internet access
intelligent travel guide with up-to-date
location dependent information
IIT Bombay
16
Mobile applications - 3
Information services
push: e.g., stock quotes
pull: e.g., weather update
Disconnected operations
mobile agents, e.g., shopping
Entertainment
ad-hoc networks for multi user games
Messaging
Sridhar Iyer
IIT Bombay
17
IIT Bombay
18
9.6
14.4
28
64
144
384
2000
Transaction Processing
Messaging/Text Apps
Voice/SMS
Location Services
Still Image Transfers
Internet/VPN Access
Database Access
Document Transfer
Low Quality Video
High Quality Video
Sridhar Iyer
IIT Bombay
19
Sridhar Iyer
IIT Bombay
20
GSM to GPRS
Radio resources are allocated for only one or a
few packets at a time, so GPRS enables
many users to share radio resources, and allow
efficient transport of packets
connectivity to external packet data networks
volume-based charging
IIT Bombay
21
IIT Bombay
22
Evolution to 3G Technologies
2G
3G
IS-95B
CDMA
GSM
cdma2000
W-CDMA
FDD
TDD
GPRS
IS-136
TDMA
Sridhar Iyer
UWC-136
IIT Bombay
136 HS
indoor
23
72 Mbps
72 Mbps
Turbo .11a
54 Mbps
802.11{a,b}
54 Mbps
5-11 Mbps
802.11b
5-11 Mbps
1-2 Mbps
802.11
1-2 Mbps Bluetooth
3G
WCDMA, CDMA2000
384 Kbps
384 Kbps
56 Kbps
56 Kbps
2G
Indoor
Outdoor
Mid range
outdoor
Long range
outdoor
Long distance
com.
10 30m
50 200m
200m 4Km
5Km 20Km
20m 50Km
Sridhar Iyer
IIT Bombay
24
3G Network Architecture
Core Network
Wireless
Access Network
Mobile Access
Router
Programmable
Softswitch
IP
Base Stations
Gateway
Application
Server
IP Intranet
Access
Point
Telephone
Network
IP Intranet
(HLR)
User Profiles &
Authentication
802.11
3G Air
Interface
Sridhar Iyer
802.11
Internet
Access
Point
IIT Bombay
Wired Access
25
Wireless LANs
Infrared (IrDA) or radio links (Wavelan)
Advantages
very flexible within the reception area
Ad-hoc networks possible
(almost) no wiring difficulties
Disadvantages
low bandwidth compared to wired networks
many proprietary solutions
IIT Bombay
26
AP
AP
wired network
AP
ad-hoc network
Sridhar Iyer
IIT Bombay
27
Source: Schiller
Wireless LAN
B
C
A
Sridhar Iyer
IIT Bombay
28
Sridhar Iyer
IIT Bombay
29
IEEE 802.11
Acknowledgements for reliability
Signaling packets for collision avoidance
RTS (request to send)
CTS (clear to send)
Power-save mode
Sridhar Iyer
IIT Bombay
30
Sridhar Iyer
Wireless Carrier
IIT Bombay
Public 802.11
31
Source: Pravin Bhagwat
Wireless Carrier
Public 802.11
Sridhar Iyer
IIT Bombay
Market consolidation
Entry of Wireless
Carriers
Entry of new players
Footprint growth
32
Source: Pravin Bhagwat
Wireless Carrier
Public 802.11
Virtual Carrier
Sridhar Iyer
IIT Bombay
Emergence of virtual
carriers
Roaming agreements
33
Source: Pravin Bhagwat
IIT Bombay
34
MN
Router
3
Home
agent
Router
1
Sridhar Iyer
Router
2
IIT Bombay
35
Source: Vaidya
MN
Foreign agent
Home agent
Router
1
Sridhar Iyer
Router
2
IIT Bombay
36
Source: Vaidya
IIT Bombay
37
IIT Bombay
38
wireless TCP
Sridhar Iyer
wired Internet
standard TCP
IIT Bombay
39
Source: Schiller
Foreign Agent
monitors all packets, if disconnection detected
set sender window size to 0
sender automatically goes into persistent mode
no caching, no retransmission
Sridhar Iyer
IIT Bombay
40
Models
conventional, unaware client/server model
client/proxy/server model
caching/pre-fetching model
mobile agent model
Sridhar Iyer
IIT Bombay
41
HTML characteristics
designed for computers with high performance,
color high-resolution display, mouse, hard disk
typically, web pages optimized for design, not for
communication; ignore end-system characteristics
Sridhar Iyer
IIT Bombay
42
Proxies
Client proxy: pre-fetching, caching, off-line use
Network proxy: adaptive content transformation
for connections
Client and network proxy
Enhanced servers
server-aware support for mobility
serve the content in multiple ways, depending on
client capabilities
New protocols/languages
WAP/WML
Sridhar
Iyer
IIT Bombay
43
IIT Bombay
44
Sridhar Iyer
IIT Bombay
45
Source: Helal
Script language
Similar to Javascript, adapted to mobile devices
Gateway
Transition from wireless to wired world
Server
Wap/Origin server, similar to existing web servers
Protocol layers
Transport layer, security layer, session layer etc.
Sridhar Iyer
IIT Bombay
46
HTML
HTML
wireless network
WML
filter
WAP
proxy
Binary WML
WML
HTML
web
server
HTML
filter/
WAP
proxy
WTA
server
Binary WML
Binary WML
PSTN
Binary WML: binary file format for clients
Sridhar Iyer
IIT Bombay
47
Source: Schiller
A-SAP
WAP
additional services
and applications
TR-SAP
Transaction Layer (WTP)
SEC-SAP
SSL/TLS
TCP/IP,
UDP/IP,
media
WCMP
WAE comprises WML (Wireless Markup Language), WML Script, WTAI etc.
Sridhar Iyer
IIT Bombay
48
Source: Schiller
WTLS
functionality similar to SSL/TLS (optimized for wireless)
WTP
WSP
WSP/B: analogous to http 1.1 (add features of suspend/resume)
method: analogous to RPC/RMI
features of asynchronous invocations, push (confirmed/unconfirmed)
Sridhar Iyer
IIT Bombay
49
Sridhar Iyer
IIT Bombay
50
Sridhar Iyer
IIT Bombay
51
Outline
Sridhar Iyer
IIT Bombay
52
IIT Bombay
53
Wireless Media
Physical layers in wireless networks
Use a medium that has neither absolute nor readily
observable boundaries outside which stations are unable to
receive frames
Are unprotected from outside signals
Communicate over a medium significantly less reliable than
wired PHYs
Have dynamic topologies
Lack full connectivity and therefore the assumption normally
made that every station (STA) can hear every other STA in
invalid (I.e., STAs may be hidden from each other)
Have time varying and asymmetric propagation properties
Sridhar Iyer
IIT Bombay
54
802.11: Motivation
Can we apply media access methods from fixed networks
Example CSMA/CD
Carrier Sense Multiple Access with Collision Detection
send as soon as the medium is free, listen into the medium if a
collision occurs (original method in IEEE 802.3)
IIT Bombay
55
RTS
RTS
D
CTS
CTS
DATA
Sridhar Iyer
IIT Bombay
56
IEEE 802.11
Wireless LAN standard defined in the unlicensed
spectrum (2.4 GHz and 5 GHz U-NII bands)
IIT Bombay
57
Sridhar Iyer
BSS1
BSS2
IIT Bombay
58
STA1
STA3
BSS1
STA2
BSS2
STA5
STA4
Sridhar Iyer
Direct communication
within a limited range
Station (STA):
terminal with access
mechanisms to the
wireless medium
Basic Service Set (BSS):
group of stations using the
same radio frequency
802.11 LAN
IIT Bombay
59
Source: Schiller
802.11 LAN
STA1
802.x LAN
BSS1
Portal
Access
Point
Access Point
Distribution System
Access
Point
ESS
Sridhar Iyer
Portal
bridge to other (wired) networks
BSS2
STA2
Distribution System
802.11 LAN
STA3
IIT Bombay
60
Source: Schiller
IIT Bombay
61
application
TCP
TCP
IP
IP
LLC
LLC
LLC
802.11 MAC
802.11 MAC
802.3 MAC
802.3 MAC
802.11 PHY
802.11 PHY
802.3 PHY
802.3 PHY
Sridhar Iyer
IIT Bombay
62
access mechanisms,
fragmentation, encryption
MAC Management
synchronization, roaming,
MIB, power management
modulation, coding
LLC
MAC
MAC Management
PHY Management
Sridhar Iyer
Station Management
PLCP
PMD
Station Management
PHY
DLC
PHY Management
coordination of all
management functions
IIT Bombay
7.8.1
63
Infrared
850-950 nm, diffuse light, typ. 10 m range
carrier detection, energy detection, synchonization
Sridhar Iyer
IIT Bombay
64
Spread-spectrum communications
Sridhar Iyer
IIT Bombay
65
Source: Intersil
Sridhar Iyer
IIT Bombay
66
Source: Intersil
DSSS properties
Sridhar Iyer
IIT Bombay
67
Source: Intersil
Access methods
DCF CSMA/CA (mandatory)
collision avoidance via randomized back-off mechanism
ACK packet for acknowledgements (not for broadcasts)
PCF (optional)
access point polls terminals according to a list
Sridhar Iyer
IIT Bombay
68
Sridhar Iyer
IIT Bombay
69
802.11 - Reliability
Use of acknowledgements
When B receives DATA from A, B sends an ACK
If A fails to receive an ACK, A retransmits the DATA
Both C and D remain quiet until ACK (to prevent collision of
ACK)
Expected duration of transmission+ACK is included in
RTS/CTS packets
RTS
RTS
D
CTS
CTS
DATA
ACK
Sridhar Iyer
IIT Bombay
70
802.11 - Priorities
defined through different inter frame spaces mandatory idle time
Sridhar Iyer
IIT Bombay
71
802.11 - CSMA/CA
DIFS
DIFS
medium busy
contention window
(randomized back-off
mechanism)
next frame
direct access if
medium is free DIFS
t
slot time
Sridhar Iyer
IIT Bombay
72
DIFS
station1
station2
DIFS
boe
bor
boe
busy
DIFS
boe bor
boe
boe busy
boe bor
boe
boe
busy
busy
station3
station4
boe bor
station5
busy
bor
t
busy
Sridhar Iyer
IIT Bombay
73
Sridhar Iyer
IIT Bombay
74
DCF Example
B1 = 25
B1 = 5
wait
data
data
B2 = 20
cw = 31
Sridhar Iyer
wait
B2 = 15
B2 = 10
IIT Bombay
75
IIT Bombay
76
802.11 - CSMA/CA II
station has to wait for DIFS before sending data
receivers acknowledge at once (after waiting for SIFS) if the packet
was received correctly (CRC)
automatic retransmission of data packets in case of transmission
errors
DIFS
sender
data
SIFS
receiver
ACK
DIFS
other
stations
Sridhar Iyer
waiting time
data
t
contention
IIT Bombay
77
802.11 RTS/CTS
station can send RTS with reservation parameter after waiting for DIFS
(reservation determines amount of time the data packet needs the medium)
acknowledgement via CTS after SIFS by receiver (if ready to receive)
sender can now send data at once, acknowledgement via ACK
other stations store medium reservations distributed via RTS and CTS
DIFS
sender
RTS
data
SIFS
receiver
other
stations
Sridhar Iyer
CTS SIFS
SIFS
ACK
DIFS
NAV (RTS)
NAV (CTS)
defer access
data
t
contention
IIT Bombay
78
Fragmentation
DIFS
sender
frag1
RTS
SIFS
receiver
CTS SIFS
frag2
SIFS
NAV (RTS)
NAV (CTS)
other
stations
Sridhar Iyer
ACK1 SIFS
SIFS
NAV (frag1)
NAV (ACK1)
ACK2
DIFS
data
t
contention
IIT Bombay
79
Sridhar Iyer
IIT Bombay
80
802.11 - PCF I
t0 t1
medium busy PIFS
point
coordinator
wireless
stations
stations
NAV
Sridhar Iyer
SuperFrame
SIFS
D1
SIFS
D2
SIFS
SIFS
U1
U2
NAV
IIT Bombay
81
802.11 - PCF II
t2
point
coordinator
wireless
stations
stations
NAV
Sridhar Iyer
D3
PIFS
SIFS
D4
t3
t4
CFend
SIFS
U4
NAV
contention free period
IIT Bombay
contention
period
82
Sridhar Iyer
IIT Bombay
83
Sridhar Iyer
IIT Bombay
84
Polling Mechanisms
With DCF, there is no mechanism to guarantee
minimum delay for time-bound services
PCF wastes bandwidth (control overhead) when
network load is light, but delays are bounded
With Round Robin (RR) polling, 11% of time was
used for polling
This values drops to 4 % when optimized polling is
used
Implicit signaling mechanism for STAs to indicate
when they have data to send improves performance
Sridhar Iyer
IIT Bombay
85
IIT Bombay
86
Sequence numbers
important against duplicated frames due to lost ACKs
Addresses
receiver, transmitter (physical), BSS identifier, sender (logical)
Miscellaneous
sending time, checksum, frame control, data
bytes
2
Frame
Control
2
6
6
6
2
6
Duration Address Address Address Sequence Address
ID
1
2
3
Control
4
0-2312
Data
CRC
Sridhar Iyer
IIT Bombay
87
Sridhar Iyer
IIT Bombay
88
Types of Frames
Control Frames
RTS/CTS/ACK
CF-Poll/CF-End
Management Frames
Beacons
Probe Request/Response
Association Request/Response
Dissociation/Reassociation
Authentication/Deauthentication
ATIM
Data Frames
Sridhar Iyer
IIT Bombay
89
to DS from
DS
0
0
0
1
SA
BSSID
BSSID
SA
BSSID
SA
DA
RA
TA
DA
SA
Sridhar Iyer
IIT Bombay
90
Power management
sleep-mode without missing a message
periodic sleep, frame buffering, traffic measurements
Association/Reassociation
integration into a LAN
roaming, i.e. change networks by changing access points
scanning, i.e. active search for a network
Sridhar Iyer
IIT Bombay
91
802.11 - Synchronization
All STAs within a BSS are synchronized to a common
clock
PCF mode: AP is the timing master
periodically transmits Beacon frames containing Timing
Synchronization function (TSF)
Receiving stations accepts the timestamp value in TSF
IIT Bombay
92
beacon interval
access
point
medium
B
busy
busy
busy
B
busy
t
Sridhar Iyer
beacon frame
IIT Bombay
93
station1
B1
B1
B2
station2
medium
busy
busy
Sridhar Iyer
B2
busy
B
busy
beacon frame
IIT Bombay
t
random delay
94
Infrastructure
Traffic Indication Map (TIM)
list of unicast receivers transmitted by AP
Ad-hoc
Ad-hoc Traffic Indication Map (ATIM)
announcement of receivers by stations buffering frames
more complicated - no central AP
collision of ATIMs possible (scalability?)
Sridhar Iyer
IIT Bombay
95
IIT Bombay
96
access
point
DTIM interval
D B
T
busy
medium
busy
D B
busy
busy
p
station
d
t
TIM
broadcast/multicast
Sridhar Iyer
DTIM
awake
p PS poll
d data transmission
to/from the station
IIT Bombay
97
station1
beacon interval
B1
station2
B2
B2
B1
t
B
beacon frame
awake
Sridhar Iyer
random delay
a acknowledge ATIM
A transmit ATIM
D transmit data
d acknowledge data
IIT Bombay
98
802.11 - Roaming
No or bad connection in PCF mode? Then perform:
Scanning
scan the environment, i.e., listen into the medium for beacon signals or
send probes into the medium and wait for an answer
Reassociation Request
station sends a request to one or several AP(s)
Reassociation Response
success: AP has answered, station can now participate
failure: continue scanning
Sridhar Iyer
IIT Bombay
99
Hardware
Original WaveLAN card (NCR)
WaveLAN II (Lucent)
2.4 GHz radio frequency range
Transmit Power 30mW
Transmission range 376 m (outdoors) at 2 Mbps (60m
indoors)
Receive Threshold = 81dBm
Carrier Sense Threshold = -111dBm
Sridhar Iyer
IIT Bombay
100
802.11i
security
WEP
802.11f
Inter Access Point Protocol
MAC
802.11e
QoS enhancements
MAC
Mgmt
PHY
DSSS
FH
IR
802.11b
5,11 Mbps
802.11g
20+ Mbps
Sridhar Iyer
MIB
IIT Bombay
OFDM
802.11a
6,9,12,18,24
36,48,54 Mbps
101
IIT Bombay
102
Outline
Sridhar Iyer
IIT Bombay
103
Traditional Routing
A routing protocol sets up a routing table in routers
IIT Bombay
104
105
Changing of IP address
DNS updates take to long time
TCP connections break
security problems
Solution requirements
retain same IP address, use same layer 2 protocols
authentication
of registration
messages,
Sridhar
Iyer
IIT Bombay
106
MN
Router
3
Home
agent
Router
1
Sridhar Iyer
Router
2
IIT Bombay
107
MN
Foreign agent
Home agent
Router
1
Sridhar Iyer
Router
2
IIT Bombay
108
Sridhar Iyer
IIT Bombay
109
MN
home network
receiver
Internet
FA
CN
sender
Sridhar Iyer
foreign
network
IIT Bombay
110
Source: Schiller
home network
MN
sender
Internet
FA
foreign
network
CN
receiver
Sridhar Iyer
IIT Bombay
111
Source: Schiller
MN Registration
MN signals COA to the HA via the FA
HA acknowledges via FA to MN
limited lifetime, need to be secured by authentication
HA Proxy
HA advertises the IP address of the MN (as for fixed systems)
packets to the MN are sent to the HA
independent of changes in COA/FA
Packet Tunneling
HA to MN via FA
Sridhar Iyer
IIT Bombay
112
Agent advertisement
0
7 8
type
#addresses
15 16
23 24
checksum
lifetime
31
code
addr. size
router address 1
preference level 1
router address 2
preference level 2
...
type
length
registration lifetime
sequence number
R B H F M G V reserved
COA 1
COA 2
...
Sridhar Iyer
IIT Bombay
113
Registration
MN re
FA
gist
requ ration
es
HA
MN r
HA
egis
requ tration
e
st
regi
s
requ tration
es t
n
ratio
t
s
i
reg
y
repl
n
ratio
t
s
i
reg
y
repl
stra
regi
y
repl
tion
Sridhar Iyer
IIT Bombay
114
Registration request
0
7 8
type
15 16
S B DMG V rsv
home address
home agent
COA
23 24
lifetime
31
identification
extensions . . .
Sridhar Iyer
IIT Bombay
115
IP-in-IP encapsulation
IP-in-IP-encapsulation (mandatory in RFC 2003)
tunnel between HA and COA
ver.
IHL
TOS
length
IP identification
flags
fragment offset
TTL
IP-in-IP
IP checksum
IP address of HA
Care-of address COA
ver. IHL
TOS
length
IP identification
flags
fragment offset
TTL
lay. 4 prot.
IP checksum
IP address of CN
IP address of MN
TCP/UDP/ ... payload
Sridhar Iyer
IIT Bombay
116
Optimizations
Triangular Routing
HA informs sender the current location of MN
Change of FA
new FA informs old FA to avoid packet loss, old FA now
forwards remaining packets to new FA
Sridhar Iyer
IIT Bombay
117
Mobile IP Summary
Reverse tunneling
Optimizations for triangular routing
Sridhar Iyer
IIT Bombay
118
Outline
Sridhar Iyer
IIT Bombay
119
End-to-end semantics
Acknowledgements sent to TCP sender confirm
delivery of data received by TCP receiver
Ack for data sent only after data has reached
receiver
Cumulative Ack
IIT Bombay
120
Sridhar Iyer
Not transmitted
IIT Bombay
121
14
Congestion
avoidance
12
10
8
Slow start
threshold
Slow start
4
2
0
Sridhar Iyer
IIT Bombay
122
Duplicate acknowledgements
Initiate Fast Retransmit
IIT Bombay
123
cwnd = 20
20
15
10
5
ssthresh = 8
ssthresh = 10
Sridhar Iyer
IIT Bombay
124
10
Receivers advertized window
8
6
4
2
0
Time (round trips)
125
IIT Bombay
126
Sridhar Iyer
BS
MH
Base Station
Mobile Host
IIT Bombay
127
TCP connection
application
application
transport
transport
transport
network
network
network
link
link
link
physical
physical
physical
Sridhar Iyer
rxmt
wireless
IIT Bombay
application
128
Snoop Protocol
Buffers data packets at the base station BS
to allow link layer retransmission
Sridhar Iyer
BS
MH
IIT Bombay
129
Snoop Protocol
Per TCP-connection state
TCP connection
application
application
application
transport
transport
transport
network
network
link
link
link
physical
physical
physical
FH
Sridhar Iyer
BS
rxmt
wireless
IIT Bombay
network
MH
130
Impact of Handoffs
Split connection approach
hard state at base station must be moved to new base station
Snoop protocol
soft state need not be moved
while the new base station builds new state, packet losses may
not be recovered locally
Sridhar Iyer
IIT Bombay
131
M-TCP
Similar to the split connection approach, M-TCP
splits one TCP connection into two logical parts
the two parts have independent flow control as in ITCP
Sridhar Iyer
Ack 1000
BS
MH
IIT Bombay
132
M-TCP
When a new ack is received with receivers
advertised window = 0, the sender enters
persist mode
Sender does not send any data in persist mode
except when persist timer goes off
IIT Bombay
133
FreezeTCP
M-TCP needs help from base station
Base station withholds ack for one byte
The base station uses this ack to send a zero window
advertisement when a mobile host moves to another
cell
Sridhar Iyer
BS
IIT Bombay
MH
134
IIT Bombay
135
Outline
Sridhar Iyer
IIT Bombay
136
Sridhar Iyer
IIT Bombay
137
Rate adaptation
IIT Bombay
138
Assigns and releases frequencies and time slots for all the
MSs in its area
Reallocation of frequencies among cells
Hand over protocol is executed here
IIT Bombay
139
Mobility of subscribers
Location registration of subscriber
Sridhar Iyer
IIT Bombay
140
Sridhar Iyer
IIT Bombay
141
TDMA
Burst
Modulation used
Gaussian Minimum Shift Keying (GMSK)
Sridhar Iyer
IIT Bombay
142
Sridhar Iyer
IIT Bombay
143
Bursts
Building unit of physical channel
Types of bursts
Normal
Synchronization
Frequency Correction
Dummy
Access
Sridhar Iyer
IIT Bombay
144
Normal Burst
Normal Burst
2*(3 head bit + 57 data bits + 1 signaling bit) + 26
training sequence bit + 8.25 guard bit
Used for all except RACH, FSCH & SCH
Sridhar Iyer
IIT Bombay
145
Sridhar Iyer
IIT Bombay
146
Sridhar Iyer
IIT Bombay
147
Traffic Channel
Transfer either encoded speech or user data
Bidirectional
Full Rate TCH
Rate 22.4kbps
Bm interface
IIT Bombay
148
78 bits unprotected
Channel Encoding
Codes 260 bits into (8 x 57 bit blocks) 456 bits
Interleaving
2 blocks of different set interleaved on a normal
burst (save damages by error bursts)
Sridhar Iyer
IIT Bombay
149
Speech
20ms
20ms
SpeechCoder
SpeechCoder
260
260
ChannelEncoding
ChannelEncoding
456bit
456bit
Interleaving
NORMALBURST
3
Outoffirst20ms
Sridhar Iyer
57
26
57
IIT Bombay
8.25
150
Outofsecond20ms
TrafficChannelStructureforFullRateCoding
Slots 1
BurstsforUsersallocatedinSlot
1 2
T
T T
9 10 11 12 13 14 15 16 17
T
T T T T S T T T T
T=Traffic
S=Signal(containsinformationaboutthesignalstrengthin
neighboringcells)
Sridhar Iyer
IIT Bombay
151
26
I
Slots 1
Burstforoneusers
1 2
T
5
T
7
T
9 10
11 12 13 14 15 16 17
26
BurstsforanotherusersallocatedinalternateSlots
T
1 2 3 4 5 6 T7 8 9 10 11 12 13 14 15 16 17
T
T
T
T
T
T
T
T
=
26
S
TrafficChannelStructureforHalfRateCoding
Sridhar Iyer
IIT Bombay
152
BCCH
Broadcast Control Channel (BCCH)
BTS to MS
Radio channel configuration
Synchronizing information
Registration Identifiers
Sridhar Iyer
IIT Bombay
153
Synchronization Channel
Repeated broadcast of SB
Message format of SCH
PLMNcolor
3bits
BScolor
3bits
T1Superframe
index11bits
T2multiframe
index11bits
T3blockframe
index3bits
BSIC6bits"
FN19bits
Sridhar Iyer
IIT Bombay
154
IIT Bombay
155
Sridhar Iyer
IIT Bombay
156
Handover
Pre-emptive multiplexing on a TCH, Stealing Flag (SF)
Sridhar Iyer
IIT Bombay
157
Sridhar Iyer
---------------------------------------------------------------------------------
Paging request
Channel request
Immediate Assignment
Paging Response
Authentication Request
Authentication Response
Cipher Mode Command
Cipher Mode Compl.
Setup
Call Confirmation
Assignment Command
Assignment Compl.
Alert
Connect
Connect Acknowledge
Data
IIT Bombay
(PCH)
(RACH)
(AGCH)
(SDCCH)
(SDCCH)
(SDCCH)
(SDCCH)
(SDCCH)
(SDCCH)
(SDCCH)
(SDCCH)
(FACCH)
(FACCH)
(FACCH)
(FACCH)
(TCH)
158
Selectthechannelwith
highestRFlevelamong
thecontrolchannels
ScanChannels,
monitorRFlevels
PowerOn
Scanthechannelforthe
FCCH
NO
Selectthechannelwith
nexthighestRflevelfrom
thecontrollist.
Is
FCCHdetected?
YES
ScanchannelforSCH
NO
Is
SCHdetected?
YES
ReaddatafromBCCH
anddetermineisitBCCH?
Fromthechanneldata
updatethecontrolchannel
list
Sridhar Iyer
NO
Is
thecurrentBCCH
channelincluded?
CamponBCCHand
startdecoding
IIT Bombay
YES
159
IIT Bombay
160
Sridhar Iyer
IIT Bombay
161
Physical Channel
Mapping in frequency
Mapping in time
Sridhar Iyer
IIT Bombay
162
1Hyperframe=2048Superframes=2715648TDMAframes(3h28min53sec760ms)
2045
2046 2047
1Superframe=1326TDMAframes(6.12s)
=51(26frames)Multiframe
50
0 12 3
1Superframe=1326TDMAframes(6.12s)
=26(51frames)Multiframe
23 24
25
1(26frames)Multiframe=26TDMAframes(120ms)
T0
T1
T2
T12
(SACCH)
T23
Sridhar Iyer
0 1
3 4
49 50
2 3
IIT Bombay
163
Outline
Sridhar Iyer
IIT Bombay
164
GSM architecture
Sridhar Iyer
IIT Bombay
Sridhar Iyer
IIT Bombay
166
ISDN
4. MSRN
BSC
MS
GMSC/I
WF
BTS
2. MSISDN
MSC
3. MSRN
7. TMSI
7. TMSI
EIR
BSC
AUC
HLR
VLR
BTS
LA1
7. TMSI
BTS
5. MSRN
6. TMSI
MS
8. TMSI
Sridhar Iyer
IIT Bombay
167
IIT Bombay
168
GPRS features
Radio resources are allocated for only one or a
few packets at a time, so GPRS enables
many users to share radio resources, and allow
efficient transport of packets
fast setup/access times
connectivity to external packet data n/w
volume-based charging
IIT Bombay
169
GPRS Architecture
Sridhar Iyer
IIT Bombay
170
GPRS Architecture
Requires addition of a new class of nodes called
GSNs (GPRS Support Nodes)
SGSN: Serving GPRS Support Node,
GGSN: Gateway GPRS Support Node
IIT Bombay
171
GGSN
Serves as the interface to external IP networks
which see the GGSN as an IP router serving all
IP addresses of the MSs
GGSN stores current SGSN address and profile
of the user in its location register
It tunnels protocol data packets to and from the
SGSN currently serving the MS
It also performs authentication and charging
GGSN can also include firewall and packetfiltering mechanisms
Sridhar Iyer
IIT Bombay
172
SGSN
Analog of the MSC in GSM
Routes incoming and outgoing packets
addressed to and from any GPRS subscriber
located within the geographical area served by
the SGSN
Location Register of the SGSN stores
information (e.g. current cell and VLR) and user
profiles (e.g. IMSI, addresses) of all GPRS
users registered with this SGSN
Sridhar Iyer
IIT Bombay
173
IIT Bombay
174
IIT Bombay
175
Sridhar Iyer
IIT Bombay
176
Sridhar Iyer
IIT Bombay
177
Air Interface Um
Is one of the central aspects of GPRS
Concerned with communication between MS and
BSS at the physical, MAC and RLC layers
Physical channel dedicated to packet data traffic is
called a packet data channel (PDCH)
Capacity on Demand:
Allocation/Deallocation of PDCH to GPRS traffic is
dynamic
BSC controls resources in both directions
No conflicts on downlink
Conflicts in uplink are resolved using slotted ALOHA
Sridhar Iyer
IIT Bombay
178
IIT Bombay
179
Sridhar Iyer
IIT Bombay
180
MS - state model
In Idle State MS is not
reachable
With GPRS Attach MS
moves into ready state
With Detach, it returns to
Idle state: all PDP
contexts are deleted
Standby state is reached
when MS does not send
data for a long period
and ready timer expires
Sridhar Iyer
IIT Bombay
181
Sridhar Iyer
IIT Bombay
182
GPRS - Routing
Sridhar Iyer
IIT Bombay
183
GPRS - Routing
MS from PLMN-2 is visiting PLMN-1.
IP address prefix of MS is the same as GGSN-2
Incoming packets to MS are routed to GGSN-2
GGSN-2 queries HLR and finds that MS is
currently in PLMN-1
It encapsulates the IP packets and tunnels them
through the GPRS backbone to the appropriate
SGSN of PLMN-1
SGSN decapsulates and delivers to the MS
Sridhar Iyer
IIT Bombay
184
GPRS Summary
Enables many users to share radio resources
by dynamic, on-demand, multi-slot allocation
Provides connectivity to external packet data
networks
Modification to the GSM air-interface
Addition of new GPRS Support Nodes
Assignment of PDP context to MS
Enables volume-based charging as well as
duration based charging
Sridhar Iyer
IIT Bombay
185
Outline
Sridhar Iyer
IIT Bombay
186
Connectivity
Mobile Device Capability
form
factor
GUI
multimedia
real-time multimedia
Sridhar Iyer
IIT Bombay
connected
semi-connected
(asymmetric)
disconnected
187
IIT Bombay
188
Internet
HTTP/HTML
<HTML>
<HEAD>
<TITLE>NNN Interactive</TITLE>
<META HTTP-EQUIV="Refresh" CONTENT="1800,
URL=/index.html">
</HEAD>
<BODY BGCOLOR="#FFFFFF"
BACKGROUND="/images/9607/bgbar5.gif" LINK="#0A3990"
ALINK="#FF0000" VLINK="#FF0000" TEXT="000000"
ONLOAD="if(parent.frames.length!
=0)top.location='http://nnn.com';">
<A NAME="#top"></A>
<TABLE WIDTH=599 BORDER="0">
<TR ALIGN=LEFT>
<TD WIDTH=117 VALIGN=TOP ALIGN=LEFT>
Sridhar Iyer
<HTML>
<HEAD>
<TITLE
>NNN
Intera
ctive<
/TITLE
>
<META
HTTPEQUIV=
"Refre
sh"
CONTEN
T="180
0,
URL=/i
ndex.h
tml">
WAP
<WML>
<CARD>
<DO TYPE="ACCEPT">
<GO URL="/submit?Name=$N"/>
</DO>
Enter name:
<INPUT TYPE="TEXT" KEY="N"/>
</CARD>
</WML>
Content encoding
010011
010011
110110
010011
011011
011101
010010
011010
IIT Bombay
189
WHY WAP?
Wireless networks and phones
have specific needs and requirements
not addressed by existing Internet technologies
WAP
Enables any data transport
TCP/IP, UDP/IP, GUTS (IS-135/6), SMS, or USSD.
Sridhar Iyer
IIT Bombay
190
Markup language
Similar to HTML, adapted to mobile devices
Script language
Similar to Javascript, adapted to mobile devices
Gateway
Transition from wireless to wired world
Server
Wap/Origin server, similar to existing web servers
Protocol layers
Transport layer, security layer, session layer etc.
Sridhar Iyer
IIT Bombay
191
Internet model
HTML
HTTP
TLS/SSL
TCP/IP
Sridhar Iyer
IIT Bombay
192
WAP architecture
WML
WMLScript
Web Server
WAP Gateway
WML Encoder
WSP/WTP
WTAI
Etc.
Sridhar Iyer
WMLScript
Compiler
HTTP
Protocol Adapters
IIT Bombay
CGI
Scripts
etc.
Content
WML Decks
with WML-Script
Client
193
Client
WML
WMLScript
WTAI
WML Encoder
WSP/WTP
WMLScript
Compiler
Protocol Adapters
Application
Logic
Content
WML Decks
with WML-Script
Etc.
Sridhar Iyer
IIT Bombay
194
WAP specifies
Wireless Application Environment
WML Microbrowser
WMLScript Virtual Machine
WMLScript Standard Library
Wireless Telephony Application Interface (WTAI)
WAP content types
Sridhar Iyer
IIT Bombay
195
WAP stack
WAE (Wireless Application Environment):
Architecture: application model, browser, gateway,
server
WML: XML-Syntax, based on card stacks,
variables, ...
WTA: telephone services, such as call control,
phone book etc.
IIT Bombay
196
Sridhar Iyer
IIT Bombay
197
WDP
Transport layer protocol within the WAP architecture
uses the Service Primitive
T-UnitData.req .ind
Sridhar Iyer
IIT Bombay
198
T-SAP
T-DUnitdata.ind
(SA, SP, UD)
T-DUnitdata.req
(DA, DP, SA, SP, UD)
T-DError.ind
(EC)
Sridhar Iyer
IIT Bombay
199
Source: Schiller
Mobile
WAE
WSP
IWF
ISP/RAS
WTP
UDP
WTP
UDP
IP
PPP
CSD-RF
WAE
Apps on
Other Servers
WSP
IP
IP
PSTN Subnetwork
Circuit
Subnetwork
PPP
CSDRF
PSTN
Circuit
Sridhar Iyer
IIT Bombay
200
Mobile
WAE
WAE
Apps on
other servers
WSP
WSP
SMSC
WTP
WDP
SMS
Sridhar Iyer
WTP
WDP
SMS
WDP Tunnel
Protocol
WDP Tunnel
Protocol
Subnetwork
Subnetwork
IIT Bombay
201
WTLS
is based on the TLS/SSL (Transport Layer Security) protocol
optimized for low-bandwidth communication channels
provides
privacy (encryption)
data integrity (MACs)
authentication (public-key and symmetric)
Sridhar Iyer
IIT Bombay
202
peer
SEC-SAP
SEC-Create.ind
(SA, SP, DA, DP, KES, CS, CM)
SEC-Create.res
(SNM, KR, SID, KES, CS, CM)
SEC-Create.cnf
(SNM, KR, SID, KES, CS, CM)
SEC-Exchange.ind
SEC-Exchange.res
(CC)
SEC-Commit.req
SEC-Exchange.req
KES: Key Exchange Suite
CS: Cipher Suite
CM: Compression Mode
SNM: Sequence Number Mode
SEC-Exchange.cnf
(CC)
SEC-Commit.ind
SEC-Commit.cnf
Sridhar Iyer
IIT Bombay
203
Source: Schiller
WTP
supports peer-to-peer, client/server and multicast
applications
efficient for wireless transmission
support for different communication scenarios
Sridhar Iyer
IIT Bombay
204
WTP transactions
class 0: unreliable message transfer
unconfirmed Invoke message with no Result message
a datagram that can be sent within the context of an existing
Session
Sridhar Iyer
IIT Bombay
205
supports
header compression
segmentation /re-assembly
retransmission of lost packets
selective-retransmission
port number addressing (UDP ports numbers)
flow control
Sridhar Iyer
IIT Bombay
206
WTP services
message oriented (not stream)
supports an Abort function for outstanding
requests
supports concatenation of PDUs
supports two acknowledgement options
User acknowledgement
acks may be forced from the WTP user (upper layer)
Stack acknowledgement: default
Sridhar Iyer
IIT Bombay
207
responder
TR-SAP
Invoke
PDU
TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=0, H)
A: Acknowledgement Type
(WTP/User)
C: Class (0,1,2)
H: Handle (socket alias)
Sridhar Iyer
IIT Bombay
208
Source: Schiller
TR-SAP
Invoke
TR-Invoke.cnf
(H)
Ack PD
initiator
TR-SAP
TR-Invoke.req
(SA, SP, DA, DP, A, UD, C=1, H)
TR-Invoke.cnf
(H)
Sridhar Iyer
PDU
TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=1, H)
responder
TR-SAP
Invoke
PDU
Ack PD
TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=1, H)
TR-Invoke.res
(H)
IIT Bombay
209
Source: Schiller
TR-Invoke.cnf
(H)
responder
TR-SAP
Invoke
P
DU
PDU
Result
TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=2, H)
TR-Result.req
(UD*, H)
TR-Result.ind
(UD*, H)
TR-Result.res
(H)
Sridhar Iyer
Ack PD
TR-Result.cnf
(H)
IIT Bombay
210
Source: Schiller
responder
TR-SAP
Invoke
PDU
TR-Invoke.cnf
(H)
U
Ack PD
TR-Result.ind
(UD*, H)
PD
Result
TR-Result.res
(H)
Sridhar Iyer
Ack PD
TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=2, H)
TR-Invoke.res
(H)
TR-Result.req
(UD*, H)
TR-Result.cnf
(H)
IIT Bombay
211
Source: Schiller
WSP Services
provides shared state between client and server, optimizes
content transfer
session management (establish, release, suspend, resume)
efficient capability negotiation
content encoding
Push
Sridhar Iyer
IIT Bombay
212
WSP overview
Header Encoding
compact binary encoding of headers, content type identifiers
and other well-known textual or structured values
reduces the data actually sent over the network
Sridhar Iyer
IIT Bombay
213
S-Connect.cnf
(SH, NC)
server
S-SAP
Conne
ct PDU
eply P
R
n
n
o
C
DU
S-Connect.ind
(SA, CA, CH, RC)
S-Connect.res
(SH, NC)
WTP Class 2
transaction
Sridhar Iyer
IIT Bombay
214
Source: Schiller
Suspe
S-Suspend.ind
(R)
S-Resume.req
(SA, CA)
S-Resume.cnf
server
S-SAP
nd PD
U
S-Suspend.ind
(R)
WTP Class 0
transaction
Resum
eP
~
DU
PDU
Reply
S-Resume.ind
(SA, CA)
S-Resume.res
WTP Class 2
transaction
Sridhar Iyer
IIT Bombay
215
Source: Schiller
Sridhar Iyer
server
S-SAP
S-Disconnect.ind
Discon
nect P
DU (R)
WTP Class 0
transaction
IIT Bombay
216
Source: Schiller
confirmed/non-confirmed push
client
S-SAP
S-Push.ind
(PH, PB)
Push P
DU
server
S-SAP
S-Push.req
(PH, PB)
WTP Class 0
transaction
client
S-SAP
S-ConfirmedPush.ind
(CPID, PH, PB)
server
CPID: Client Push ID
S-SAP
S-ConfirmedPush.req
(SPID, PH, PB)
U
D
ush P
ConfP
S-ConfirmedPush.res
(CPID)
S-ConfirmedPush.cnf
(SPID)
WTP Class 1
transaction
Sridhar Iyer
IIT Bombay
217
Source: Schiller
WTLS
functionality similar to SSL/TLS (optimized for wireless)
WTP
WSP
WSP/B: analogous to http 1.1 (add features of suspend/resume)
method: analogous to RPC/RMI
features of asynchronous invocations, push (confirmed/unconfirmed)
Sridhar Iyer
IIT Bombay
218
Sridhar Iyer
IIT Bombay
219
WAE components
Architecture
Application model, Microbrowser, Gateway, Server
User Agents
WML/WTA/Others
content formats: vCard, vCalendar, Wireless Bitmap, WML..
WML
XML-Syntax, based on card stacks, variables, ...
WMLScript
procedural, loops, conditions, ... (similar to JavaScript)
WTA
telephone services, such as call control, text messages,
phone book, ... (accessible from WML/WMLScript)
Proxy (Method/Push)
Sridhar Iyer
IIT Bombay
220
other content
server
response
with
content
Method proxy
encoded
response
with
content
Push proxy
push
content
request
Sridhar Iyer
Client
Gateway
encoders
&
decoders
IIT Bombay
encoded
push
content
encoded
request
WTA
user agent
WML
user agent
other
WAE
user agents
221
WAP microbrowser
Sridhar Iyer
IIT Bombay
222
Content(XML)
XSLProcessor
WML Stylesheet
WMLBrowsers
IIT Bombay
HTML StyleSheet
HTTPBrowser
223
WML
XML-based language
describes only intent of interaction in an abstract
manner
presentation depends upon device capabilities
IIT Bombay
224
WML
The basic unit is a card. Cards are grouped together into Decks Document ~ Deck (unit of
transfer)
All decks must contain
Document prologue
XML & document type declaration
<WML> element
Must contain one or more cards
Sridhar Iyer
IIT Bombay
225
WML cards
<WML>
<CARD>
<DO TYPE=ACCEPT>
<GO URL=#eCard/>
Navigation
</DO
Welcome!
</CARD>
<CARD NAME=eCard>
<DO TYPE=ACCEPT>
<GO URL=/submit?N=$(N)&S=$
Variables
(S)/>
</DO>
Enter name: <INPUT KEY=N/>
Choose speed:
Input
<SELECT KEY=S>
Elements
<OPTION VALUE=0>Fast</OPTION>
<OPTION VALUE=1>Slow</OPTION>
<SELECT>
</CARD>
Sridhar Iyer</WML>
IIT Bombay
Card
Deck
226
Example
calling a number (WML)
wtai://wp/mc;07216086415
calling a number (WMLScript)
WTAPublic.makeCall("07216086415");
Implementation
Extension of basic WAE application model
Extensions added to standard WML/WMLScript browser
Exposes additional API (WTAI)
Sridhar Iyer
IIT Bombay
227
WTA features
Extension of basic WAE application model
network model for interaction
client requests to server
event signaling: server can push content to the client
event handling
table indicating how to react on certain events from the
network
client may now be able to handle unknown events
telephony functions
some application on the client may access telephony
functions
Sridhar Iyer
IIT Bombay
228
WTA Interface
generic, high-level interface to mobiles
telephony functions
setting up calls, reading and writing entries in
phonebook
Call control
Network text messaging
Phone book interface
Event processing
IIT Bombay
229
WTAI Call
Input Element
Sridhar Iyer
<WML>
<CARD>
<DO TYPE=ACCEPT>
<GO URL=wtai:cc/mc;$(N)/>
</DO>
Enter phone number:
<INPUT TYPE=TEXT KEY=N/>
</CARD>
</WML>
IIT Bombay
230
WML
Scripts
WTA & WML
server
mobile
network
WTA
user agent
WAP Gateway
WAE
services
WML
decks
WTA
services
network operator
trusted domain
third party
origin servers
Sridhar Iyer
encoders
&
decoders
other WTA
servers
firewall
IIT Bombay
231
Source: Schiller
Sridhar Iyer
IIT Bombay
232
Source: Heijden
Sridhar Iyer
IIT Bombay
233
IIT Bombay
234
WTA Events
Network notifies device of event (such as
incoming call)
WTA events map to devices native events
WTA services are aware of and able to act on
these events
example: incoming call indication, call cleared,
call connected
Sridhar Iyer
IIT Bombay
235
WTA Repository
local store for content related to WTA services
(minimize network traffic)
Channels: define the service
content format defining a WTA service stored in repository
XML document specifying eventid, title, abstract, and
resources that implement a service
IIT Bombay
236
Sridhar Iyer
IIT Bombay
237
Source: Heijden
IIT Bombay
238
WTAI (network)
Network Specific WTAI
specific to type of bearer network
example: GSM: call reject, call hold, call transfer, join
multiparty, send USSD
Sridhar Iyer
IIT Bombay
240
Event handling
channel for each event defines the content to be
processed upon reception of that event
Sridhar Iyer
IIT Bombay
241
Temporary binding:
resources to be executed are defined by the already executing
service
example: yellow pages lookup and call establishment
Sridhar Iyer
IIT Bombay
242
Sridhar Iyer
IIT Bombay
243
Source: Heijden
Sridhar Iyer
IIT Bombay
244
Source: Heijden
no real-time alerting/response
example: stock quotes
Wireless push
accomplished by using the network itself
example: SMS
WAP push
Network supported push of WML content
example: Alerts or service indications
Sridhar Iyer
IIT Bombay
245
Sridhar Iyer
IIT Bombay
246
Source: Heijden
Sridhar Iyer
IIT Bombay
247
Sridhar Iyer
IIT Bombay
248
Connectionless mode
well known ports, one for secure and other for non-secure push
Sridhar Iyer
IIT Bombay
249
WAE Summary
WML and WML Script
analogous to HTML and JavaScript (optimized for wireless)
microbrowser user agent; compiler in the network
WTA
WTAI: different access rights for different applications/agents
WTA User Agent (analogy with operating systems)
Push
no analogy in Internet
Sridhar Iyer
IIT Bombay
250
Outline
Sridhar Iyer
IIT Bombay
251
Client
Server
results
Data
Procedure
Client Server
Procedure
Client
results
Server
Data
Remote Evaluation
Client
Server
Procedure
Sridhar Iyer
Code on Demand
IIT Bombay
Data
252
Procedure
+
State
Client
Server
Data
Procedure
+
State
Procedure
+
State
Server
Data
Sridhar Iyer
Server
Procedure
+
State
Data
Procedure
+
State
Server
Mobile Agents
IIT Bombay
Data
253
Interaction Model
Request
Client
Server
Response
Client/server communication
Mobile agent
Request
Client
Server
Response
IIT Bombay
254
Execution environment
Communication (agent
dispatching)
Event Manager
User identification
Mobile
Agent
Protection
(agent, server)
Agent Manager
Authentication
Agent state
Security Manager
Agent checkpoint
(fault tolerance)
Sridhar Iyer
IIT Bombay
Persistent
Manager
255
5
4
Paper Assembler
Cloning
Partial Question
Paper
ToSridhar
Distribution
Center
Iyer
IIT Bombay
256
Dynamic Upgrade
Sridhar Iyer
IIT Bombay
257
Distribution
Server
Exam Center
Distribution
Server
c9611060
Sridhar Iyer
IIT Bombay
258
Examiner B
Distributor
Distribution
Server
Examiner A
Examiner C
Examiner D
Results
Sridhar Iyer
IIT Bombay
Agents collaborate
to produce the final result
259
IIT Bombay
260
Outline
Sridhar Iyer
IIT Bombay
261
Multi-Hop Wireless
May need to traverse multiple links to reach destination
Sridhar Iyer
IIT Bombay
262
IIT Bombay
263
Many Applications
Ad hoc networks:
Applications:
Military environments
Emergency operations
Civilian environments
taxi cab network
meeting rooms
sports stadiums
Sridhar Iyer
IIT Bombay
264
802.11 DCF:
Uses RTS-CTS to avoid hidden terminal problem
Uses ACK to achieve reliability
IIT Bombay
265
A starts sending to B.
C senses carrier, finds medium in use and has to
wait for A->B to end.
D is outside the range of A, therefore waiting is not
necessary.
A and C are exposed terminals
Sridhar Iyer
IIT Bombay
266
Routing Protocols
Proactive protocols
Reactive protocols
Determine route if and when needed
Source initiates route discovery
Example: DSR (dynamic source routing)
Hybrid protocols
Adaptive; Combination of proactive and reactive
Example : ZRP (zone routing protocol)
Sridhar Iyer
IIT Bombay
267
Sridhar Iyer
IIT Bombay
268
E
F
G
H
K
I
D
N
Sridhar Iyer
IIT Bombay
269
Broadcast transmission
[S]
S
Z
E
F
G
H
K
I
D
N
Sridhar Iyer
IIT Bombay
270
[S,E]
F
[S,C]
H
G
K
D
N
Sridhar Iyer
IIT Bombay
271
E
F
[S,E,F]
G
H
I
[S,C,G] K
D
N
Sridhar Iyer
IIT Bombay
272
E
[S,E,F,J]
G
H
K
I
D
[S,C,G,K]
Sridhar Iyer
IIT Bombay
273
[S,E,F,J,M]
G
H
Sridhar Iyer
IIT Bombay
274
RREP [S,E,F,J,D]
F
G
H
K
I
D
N
Sridhar Iyer
IIT Bombay
275
E
F
G
H
K
I
D
N
Sridhar Iyer
IIT Bombay
276
TCP in MANET
Several factors affect TCP in MANET:
Wireless transmission errors
reducing congestion window in response to errors
is unnecessary
IIT Bombay
277
MANET Summary
Routing is the most studied problem
Interplay of layers is being researched
Large number of simulation based expts
Small number of field trials
Very few reported deployments
Fertile area for imaginative applications
Standardizing protocols does not seem to be a
very good idea
Scope for proprietary solutions with limited interop
Sridhar Iyer
IIT Bombay
278
References
J. Schiller, Mobile Communications, Addison Wesley, 2000
802.11 Wireless LAN, IEEE standards, www.ieee.org
Mobile IP, RFC 2002, RFC 334, www.ietf.org
TCP over wireless, RFC 3150, RFC 3155, RFC 3449
A. Mehrotra, GSM system engineering, Artech House, 1997
Bettstetter, Vogel and Eberspacher, GPRS: Architecture, Protocols
and Air Interface, IEEE Communications Survey 1999, 3(3).
M.v.d. Heijden, M. Taylor. Understanding WAP, Artech House, 2000
Mobile Ad hoc networks, RFC 2501
Others websites:
www.palowireless.com
www.gsmworld.com; www.wapforum.org
www.etsi.org; www.3gtoday.com
Sridhar Iyer
IIT Bombay
279
Thank You
Other Tutorials at: www.it.iitb.ac.in/~sri
Contact Details:
Sridhar Iyer
School of Information Technology
IIT Bombay, Powai, Mumbai 400 076
Phone: +91-22-2576-7901
Email: sri@it.iitb.ac.in
Sridhar Iyer
IIT Bombay
280