You are on page 1of 48

Cellular S t llit N t C ll l & Satellite Network k

Dr. Nguyen Tuan Nam

History of Cellular Network


First telephone system:
A single radio transmitter g A single channel was used p , Half-duplex: press button to talk, and release Half- p it to listen

Cellular radio system


Analogue Digital
Nguyen Tuan Nam/WNC 2011 2

The First-generation System First Analogue Started in the 1980s No worldwide coordination for the

development of technical standards for the system Roaming was not possible Efficient use of the frequency spectrum was not there
Nguyen Tuan Nam/WNC 2011 3

The Second-generation System Second Mid-1980 the E Mid-1980s, h European commission started a series of activities to liberalize the i i d i f i ii lib li h
communication sector, including mobile communication Global System for Mobile Communication (GSM)
First specifications The network is based on digital technology 1990s Capable of providing all the basic services such as speech and data services Voice Mail System (VMS) Short Message Service Center (SMSC): proved to be incredibly commercially successful Possible to send packet data on the air-interface air-

GSM and VAS (Value Added Service)

GSM and GPRS (General Packet Radio Services)

GSM and EDGE (Enhancement Data rates in GSM Environment) 2G phone systems were characterized by Smaller phone. Why?
Digital circuit switched transmission Introduction of advanced and fast phone-to-network signaling phone-to-

More sophisticated coding methods over the Internet to increase the data rate

Nguyen Tuan Nam/WNC 2011

The Third-generation Networks Third In EDGE G


Packet transfer on air-interface behaves like a circuit airswitch call low efficiency y Standards for developing the networks were different for different parts of the world

Standardized in the IMT-2000 standardization IMTprocessing

WCDMA for UMTS

Not standardize on a technology Instead standardize in a set of requirements (data Instead, rate)

Nguyen Tuan Nam/WNC 2011

The Fourth-generation Networks Fourth Not discussed here

Nguyen Tuan Nam/WNC 2011

Cellular Network
Radio network made up of a number of radio f f
cells (cells) cells) E h cell served by at least one fixed-llocation Each ll db tl t fixedfi d ti transceiver (known as cell site or base station) These cells cover different land areas provide radio coverage over a wider area than a cell A variable number of portable transceivers can be used in any one cell and moved through more than one during transmission
Nguyen Tuan Nam/WNC 2011 7

Cellular Network Architecture


Mobile station (MS): A device used to communicate over the cellular bil i ( S) d i d i h ll l
network. Base station transceiver (BST):
A transmitter/receiver used to transmit/receive signals over the radio interface section of the network. Fair amount of computing power, correcting errors in the received signal and encrypting the conversation

Mobile switching center (MSC): The heart of the network which sets
up and maintains calls made over the network. Base station controller (BSC): Controls communication between a group of BSTs and a single MSC. Public switched telephone network (PSTN): The land based section bl h d l h k( S ) h l db d of the network.

Nguyen Tuan Nam/WNC 2011

Cellular Network Architecture

Hierarchical fashion. Why? fashion


Nguyen Tuan Nam/WNC 2011 9

Switches
The very first switches
Human manning a switchboard You phoned the switchboard Told them which line you wanted to be connected They plugged your phone line into the appropriate socket

Automatic switch
Invented by Strowger Relay y
Nguyen Tuan Nam/WNC 2011 10

The Structure of a Simple Switch

Nguyen Tuan Nam/WNC 2011

11

Frequency reuse (FDMA)


Problem: bl
Only one transmission can be used on any given frequency Number of available frequencies is very limited A cellular operator has typically been given
Maximum 1,000 subscribers 1 000

Spectrum is like real estate they just don t make it anymore dont anymore 25MHz of radio spectrum Each individual requires 25KHz in order to make a call

Solution:

Same frequency can be reused in a different area for a completely different transmission But some level of interference from cells sharing the same frequencies There must be at least a one cell gap between cells which reuse the same frequency

Nguyen Tuan Nam/WNC 2011

12

Frequency reuse
The frequency reuse factor: h f factor: f
The rate at which the same frequency can be used in the network. It is 1/K (or K according to some books) where K is the number of cells which cannot use the same frequencies for transmission. Common values for the frequency reuse factor are 1/3, 1/4, 1/7, 1/9 and 1/12 (or 3, 4, 7, 9 and 12 depending on notation). One base station can have N sector antennas, each with different direction
Nguyen Tuan Nam/WNC 2011 13

N sector antennas

Examples
F1 F3 F2 F4 F1 F3 F2 F4 F2 F1 F2 F3 F2 F1 F1

Nguyen Tuan Nam/WNC 2011

14

CDMA
Adjacent base station sites use the same
frequencies The different base stations and users are separated by codes rather than frequencies Requires certain signall-to-noise ratio to operate signal-to Near-far problem: Nearproblem:
As receiver moves away from transmitter the power transmitted is reduced signal becomes corrupted and unusable
Nguyen Tuan Nam/WNC 2011 15

Advantages of Cellular Network


Reduce power usage Larger coverage area Increase capacity Reduce interference from other signals
Since most mobile phones use cellular network cell phones In cities, cell site range is shorter compared to rural areas

Nguyen Tuan Nam/WNC 2011

16

Setting up a Call
P lli scheme Polling h
A control channel exists permanently between mobile stations and base station Base station send a request for a call setup to mobile station using the control channel M bil station continually poll channel for connection request Mobile t ti ti ll ll h lf ti t If mobile station and radio resources are available a dedicated voice circuit is setup voice circuit only exist when necessary, and then get destroyed Well known pulse code modulation (PCM) encoding scheme used in most public switched telephone networks (PSTN) output data at a rate of 64 kbps GSM only 34kbps RPE-LC encoding scheme at 25kbps (added overhead) RPE No data is transmitted during a user's silent period Each person on average speaks no more than 40% of the time effective

Original analogue representation of speech is encoded into digital


representation using a speech coder: coder:

GSM systems operate in a discontinuous transmission mode: mode:

Nguyen Tuan Nam/WNC 2011

17

Handover/Handoff
Mobile transceiver moves from one cell to
another during ongoing continuous communication switch from one cell frequency to a different cell frequency Intra-cell handoff vs. inter-cell handoff Intrainter Soft-handoff vs Hard handoff Softvs.

Nguyen Tuan Nam/WNC 2011

18

Registering

Per-user location caching Pointer forwarding Local anchoring

Nguyen Tuan Nam/WNC 2011

19

Roaming
A service that enables customers of a particular h bl f l
network operator to make calls from areas not served by that network operator y p Network operator within the area of the call initiation contacts a Gateway MSC (GMSC), which links the user to its own network operator Using mobile station ISDN number (MSISDN), which uniquely identifies a mobile station MSISDN consists of a country code (CC), national destination code (NDC) and a subscriber number (SN).
Nguyen Tuan Nam/WNC 2011 20

Frequency Choice
Quiz: higher frequency better or worse?
Why? Effect of frequency on cell coverage and bandwidth different frequencies serve better for different uses: b tt f diff t
Low frequencies such as 450Mhz serve well for countryside coverage GSM 900 is suitable for light urban coverage 1.8 2.1 GSM 1 8 or UMTS 2 1 provide higher capacity
Nguyen Tuan Nam/WNC 2011 21

Some Technology
S S SMS GPRS
Store and forward principles

EDGE WAP

GSM is circuit switched Inefficient to create a virtual network circuit every time transmit a small amount of data Allow user to connect to packet-switched data network user pay for packetthe amount of data, not the time spent connected to the network Quiz: packet-switch vs circuit switch which one better? packetswitch, Up to 500 kbps WAP gateway between web server and WAP client HTML translated into WML and compressed into binary form Client has WAP browser

Nguyen Tuan Nam/WNC 2011

22

Satellite Phone Network


G Geosynchronous services h i
Satellites in geosynchronous orbit, remain in a fixed position in the sky at all times Can maintain near-continuous global coverage with only three or four satellites near reduce the launch cost 22,000 miles (35,000 km) a noticeable delay present while making a phone call or using data services The user will need to find an area with line-of-sight before being able to use the line-ofp phone

Low Earth orbit

Altitude of 400-700 miles (640-1120 kilometers), and provide coverage cells of 400(640about (at a 100-minute orbital period) 1740miles (2800km) in radius 100 A usable pass of an individual LEO satellite will typically last 415 minutes on 4 average If the signal is blocked by an obstacle, one can wait a few minutes until another satellite passes overhead

When t Wh to use which? hi h?


Nguyen Tuan Nam/WNC 2011 23

Nguyen Tuan Nam/WNC 2011

24

Geostationary Orbit

Nguyen Tuan Nam/WNC 2011

25

Quiz
Satellite network vs. Cellular Network?

Nguyen Tuan Nam/WNC 2011

26

Wireless Application Protocol (WAP)


Dr. Nguyen Tuan Nam songuku99@yahoo.com

Examples of Interactive Data p Services for PDA


Email Stock tracking Sport results News headlines Music downloads Social networks Instant messengers g
Nguyen Tuan Nam/WNC 2011 28

WAP
Wireless Application Protocol Application layer network communications
in a wireless environment Enable access to the mobile web from a mobile phone or PDA (Personal Digital Assistant)
Why do we need WAP?
Nguyen Tuan Nam/WNC 2011 29

WAP Protocol Suite


Wireless Application Environment Wireless Session Protocol Wireless Transaction Protocol Wireless Transport Layer Security Wireless UDP Datagram Protocol g Non-IP IP
Wireless Data Network

Nguyen Tuan Nam/WNC 2011

30

WTP

Nguyen Tuan Nam/WNC 2011

31

WAP Datagram Protocol (WDP)


Represents the transfer or transmission layer Adaptation layer that makes data network look
like UDP to the upper layers
Unreliable transport of data T Two 16-bi port numbers for origin and destination 16-bit b f i i dd i i

WAP is completely independent from any


network operator

Nguyen Tuan Nam/WNC 2011

32

Wireless Transport Layer Security p y y (WTLS)


A secure data pipe Above the transport protocol layer (WDP) A protocoll based on TLS b d Provide (end-to-end) (end-to Optimized for low-bandwidth networks with relatively lowlong latency Privacy (Confidentiality) Data integrity Authentication

Nguyen Tuan Nam/WNC 2011

33

WTLS
Includes 2 layers l d l
WTLS Record Protocol WTLS Handshake Protocol

At each communications beginning


connection

2 party need to do a handshake N ti t th parameters and methods f th secure Negotiate the t d th d for the Once the secure channel is established, each party will store all the parameters with a session ID Multiple secure connection can take advantage of the same secure session

Nguyen Tuan Nam/WNC 2011

34

(cont ) WTLS (cont.)


Di id d into 2 layers Divided i l
Record protocol: Data compression (optional) MAC (message authentication code) Encryption (symmetric cryptography) Transmission of the cryptographically protected data May fragment data into manageable blocks WTLS Handshake Protocol layer Handshake protocol p Alert protocol Change Cipher Spec protocol Operating environment for Record Protocol Processed and negotiated in Handshake protocol Processed in advance Allow communication peers too agree upon security parameters such as a session key,

Connection State

peer certificates, compression method, master secret and a key refreshed Negotiated security parameters are then used to provide services in Record Protocol

Nguyen Tuan Nam/WNC 2011

35

(cont ) WTLS (cont.)


Take messages from higher level layer Compress data (optional) Deliver to higher layer

Decompress

Apply MAC Encrypts Transmits the result

Verify

Decrypts Received data

Nguyen Tuan Nam/WNC 2011

36

WTLS Handshake Protocol


Exchange Hello message to negotiate algorithms h ll i l ih Using public key encryption techniques to exchange necessary
cryptographic parameters so that client and server can generate the sa e p e aste secret ey same pre-master sec et key preExchange certificate and cryptographic information so that either client, server, or both can authenticate each other Generate master secret key from the pre-master secret key preProvide P id security parameters t th record l it t to the d layer Client and server may verify that each peer shares the same security parameters, and the handshake didnt compromised by attackers

Why do we need to generate the secret key from PKI? Why dont we use PKI instead?

Nguyen Tuan Nam/WNC 2011

37

Wireless Transaction Protocol (WTP)


Provide transaction support (reliable d ( l bl
request/response) that is adapted to the wireless world Include optional user-to-user reliability by user-totriggering the confirmation of each received message Delaying ACK is used to reduce the number of message sent Message orientation: basic unit of interchange is an entire message, not a stream of bytes
Why dont we use TCP?
Nguyen Tuan Nam/WNC 2011 38

WTP Transaction Classes


Unreliable invoke message with no result
message
Intended for an application using WTP to occasionally send a datagram within the same occasionally context of an existing session using WTP A li ti requiring datagram service as their Application ii d t i th i primary means of data delivery should use WDP Transaction Initiator sends the invoke message to the Responder Responder does not ACK I iti t d Initiator does not perform retransmission t f t i i
Nguyen Tuan Nam/WNC 2011 39

WTP Transaction Classes (cont)


Reliable invoke message with no result
message
Reliable datagram service (reliable push) Transaction Initiator sends the invoke message Responder ACKs If User ACK function is enabled, the WTP user at
the Responder confirms the invoke message before the ACK is sent back to the Initiator
Nguyen Tuan Nam/WNC 2011

40

WTP Transaction Classes


Reliable invoke message with one reliable result l bl k h l bl l
message
Invoke message is sent from Initiator to Responder R Responder replies with exactly one result message (implicitly d li ith tl lt (i li itl ACKs the invoke message) If Responder takes longer to service the invoke than Responders ACK timer interval Responder may reply with a p p y py holdhold-on message (prevent Initiator from unnecessarily retransmit the invoke message) The result message is ACKed by the Initiator If User ACK function is enabled

WTP user at the Responder confirms the invoke message before the
result is generated WTP user at the Initiator confirms the result message before ACK is sent to Responder
Nguyen Tuan Nam/WNC 2011

41

Wireless Session Protocol


Provide the Wireless Application Environment a
consistent interface with 2 services
Connection-oriented service to operate above the ConnectionTransaction Layer Protocol (WTP) Connectionless service to operate above either secure or non-secure d t nondatagram service (WDP) i

Currently provide HTTP functionality and

semantics in a compact encoding, long lived encoding session state with session suspend and resume capabilities
Nguyen Tuan Nam/WNC 2011 42

Wireless Application Environment pp (WAE)


Two languages
WML (Wireless Markup Language) ( p g g ) A WML document is known as a deck Data in the deck is structured into one or more

cards, each of which represent a single interaction d h f hi h i l i i with user Why did they combine a group of related pages into a deck?

XHTML Mobile Profile


Nguyen Tuan Nam/WNC 2011 43

Project 1
Download Nokia Mobile Browser 4.0 (4.1) l d k bl 0( ) Creating a HelloWorld.wml, with 2 cards (pages)
in a single deck (1 wml file)
Card 1: Show a Hello world text, with a link to card 2 Card 2: Show a You got it text Show the name of FIT and its telephone number with a link
to call A link back to card 1

Project description will be posted


Nguyen Tuan Nam/WNC 2011 44

Screen 1

Nguyen Tuan Nam/WNC 2011

45

Screen 2

Nguyen Tuan Nam/WNC 2011

46

Screen 3

Nguyen Tuan Nam/WNC 2011

47

WiMAX
R idl growing broadband wireless access technology 802.16/802.16e Rapidly i b db d i l h l 802 16/802 16 One base station and a group of subscriber station form a cell with a pointpoint
toto-multipoint structure Use OFDMA (Orthogonal Frequency Division Multiple Access) ( g q y p ) Provide a connection-oriented to upper-layers of the protocol stack connectionupperHigh data rates Quality of Service

Can operate at either higher bitrates or over longer distance but not both.
Why?

Connections have QoS characteristic granted and maintained by the MAC The QoS parameters for a connection can be varied by the subscribers making requests to the base station to change them while a connection is in progress Four forms: constant bit rate grant, real time polling, non-real-time polling, and non-realbest effort

Nguyen Tuan Nam/WNC 2011

48

You might also like