Showing posts with label Wireless. Show all posts
Showing posts with label Wireless. Show all posts

Radio-Frequency Identification

RFID is a wireless radio-frequency technology that allows objects, persons, and spaces to be remotely identified using low-cost electromagnetic tags. In its simplest form, an RFID tag attached to an object can store data that can be used to identify the existence of the object or maintain other information regarding the object. The RFID technology has been in place for more than 40 years, primarily being used in a very narrow range of industrial and military applications and remaining unnoticed by the mass market. In the last several years, RFID technology has matured in many ways such as a longer signal range, faster data transfer rate, and shorter tag reading intervals. The reduced cost of RF tags has fostered mass deployment and use of this technology. The retail chain company Wal-Mart was arguably the strongest driving force behind the application of RFID technology. The company requires its top 100 suppliers to have RF tags attached to pallets and cases by 2005 following the Electronic Product Code (EPC).

Source of Information : Elsevier Wireless Networking Complete 2010

UWB Applications

In addition to military use of the UWB technology, many companies are working to bring UWB to industrial operations and to people’s daily lives. The application scenarios of UWB for the consumer market can be summarized as follows:

» High-speed data transfer between mobile devices in a WPAN: Given a data rate of 100 to 500 Mbps at a distance of 1 to 10 m, computers, PDAs, cell phones, and consumer electronic devices are able to exchange data much faster than via other wireless technologies. The fi rst wave of UWB products will probably target wireless home networks, where interconnection between a wide range of computing, communication, and consumer electronic devices has always been a troublesome problem.

» Cable replacement: It may be possible to link an LCD screen or a television to a computer or any other UWB-enabled electronic devices without using a video cable. The data rate may be further improved to 1 to 2.5 Gbps but only within a short distance of several meters. This would allow video streaming over a number of wireless devices, ranging from handheld mobile devices to computers and HDTVs.

» Wireless measurement in a short distance: An example of this application scenario would be measuring the oil level in a storage tank.

» Location and movement detection: Used in vehicular radar systems, UWB devices can detect the locations of fi xed or moving objects near a vehicle. Such information can be used for various applications such as collision avoidance in a parking lot.

» Inventory tracking and supply chain management: Products in a warehouse or a store can have embedded UWB RF tags containing a small amount of data, permitting any UWB readers to access such information.

Source of Information : Elsevier Wireless Networking Complete 2010

Ultra-Wideband

UWB is a disruptive short-range radio-frequency wireless technology that could provide a potential solution to many problems in the WPAN communication and computing domain, such as low data rate and insufficient frequency. Despite the standardization controversy with regard to UWB, commercial UWB products were demonstrated at the Consumer Electronics Show in early 2005. Prototypes of UWB-enabled cell phones, HDTVs, DVD players, and music players are expected to hit the market very soon. One example of such an effort is the wireless USB technology, a short-range wireless connectivity technology resembling the wired USB standard. UWB was initially developed in the 1960s for high-resolution radar communication. The primary inventor of UWB was Gerald Ross, who held several patents for this technology. UWB was originally referred to as “ baseband, ” “ carrier-free, ” or “ impulse. ” In 1978, Bennett and Ross published a seminal paper on UWB titled Time-Domain Electromagnetics and Its Applications . The year 1986 saw the birth of the first UWB system, and the FCC approved the marketing and operation of UWB in 2002.

The FCC’s First Report and Order [6] defi nes a UWB device as any device-emitting signals over a bandwidth that is 20% greater than the center frequency or a bandwidth of at least 500 MHz at all times of transmission within a frequency band between 3.1 and 10.6 GHz. UWB devices operate by emitting a large number of very short pulses (often of a duration of only nanoseconds or less) of signals over a wide bandwidth within a range of 10 m, resulting in an unprecedented data rate on the level of several hundred megabits per second. UWB does not require any dedicated frequency allocation. Instead, it is designed to operate in frequency spectrum occupied by existing radio technologies. The channel capacity of UWB is linearly proportional to the bandwidth occupied for signal transmission. The advantages of UWB include:

» High data capacity: Due to the use of wide bandwidth, UWB offers very high data capacity, up to several gigabits per second.

» Use of a license-exempt frequency band: As a short-range wireless technology, UWB does not require any licensed frequencies to operate.

» Low power: The output power of UWB is at the level of less than 1 mW, compared with tens to a few hundred milliwatts of wireless LAN APs; typically 3 mW is allowed for a cell phone.

» Resilient to multipath fading and distortions: Because the signal is transmitted over a wide bandwidth with sufficient redundancy, fading and distortion are significantly reduced.

» Security: UWB is inherently secure. Like other spread spectrum technologies, the signal appears to be random noise to outsiders.

Source of Information : Elsevier Wireless Networking Complete 2010

Bluetooth Evolution

Since its inception, the Bluetooth SIG has made significant effort to improve and promote the technology. In response to feedbacks on Bluetooth specification 1.1, the Bluetooth SIG has released versions 1.2 and 2.0 of the specifications. Enhancements of Bluetooth include high data rates, interference resistance, and security. As shown in the protocol stack, Bluetooth supports both voice and data, and audio communication can be built directly on top of baseband. Bluetooth audio communication provides two types of encoding schemes: PCM and continuously variable slope delta (CVSD). The voice channels support 64 Kbps. A piconet can have up to three simultaneous full duplex voice channels. For asymmetric data transmission, the data rate can be as high as 721 Kbps one way and 57.6 Kbps the other way. For symmetric data transmission, the maximum data rate is 432.6 Kbps. Bluetooth 1.2 and 2.0 are expected to support a maximum data rate of 2.1 Mbps. The 2.4-GHz ISM band is used by many wireless enabled devices; thus, the potential interference between Bluetooth devices and others such as wireless LANs has to
be addressed. Bluetooth 1.2 incorporates adaptive frequency hopping (AFH), which allows the selection of idle frequencies for frequency hopping, thereby improving resistance to interference.

Bluetooth security has been criticized to some extent due to the user’s lack of total control over wireless connections and data transmission. Bluetooth provides link-level authentication and encryption using unit address, a secret authentication key, a secret privacy key, and a random number. A number of concerns have been raised over Bluetooth security mechanisms as a result of a few proof-of-concept attacks on communication and user data, such as Bluesnarfing and Bluejacking.

Source of Information : Elsevier Wireless Networking Complete 2010

Bluetooth protocol stack ➤SDP

A service is a shared function that provides some data and performs an operation on behalf of a consumer. Service discovery is a key issue in an ad hoc network environment such as Bluetooth piconet or PTP direct communication. The SDP in Bluetooth defines a simple request-and-response mechanism that uses service records and service classes for service discovery and browsing. A Bluetooth device that is configured to offer a service should implement an SDP server. The service is described in a service record with a number of service attributes. A service record is identified by a 32-bit handle. A service attribute consists of an attribute ID and a value. SDP defines the following attributes: ServiceRecord-Handle, ServiceClassIDList, ServiceRecordState, ServiceID, ProtocolDescriptionList, BrowseGroupList, LanguageBaseAttributeIDList, ServiceInfoTimeToLive, ServiceAvailability, BluetoothProfi leDescriptorList, DocumentationURL, ClientExecutibleURL, IconURL, ServiceName, ServiceDescription, and ProviderName. Semantics of the attributes are further structured into service classes. As a result, a service record must have a ServiceClassIDList attribute that contains a list of service classes representing the general and exact descriptions of capabilities of the underlying service. Each class ID is a universally unique identifier (UUID) that is guaranteed to be unique in space and time.

Before service discovery between two Bluetooth devices occurs, they must be powered-on and initialized such that a Bluetooth link between them can be established, which may require the discovery of the address of the other device by initiating an inquiry process and the paging of the other device, as introduced in the previous section. Then a client can search for desirable services using a list of service attributes or browse the services offered by an SDP server by issuing a specific UUID of the BrowseGroupList attribute that represents the root browse service group of the SDP server. All services that may be browsed at the top level are members of the root browse group.

Source of Information : Elsevier Wireless Networking Complete 2010

Bluetooth protocol stack ➤ RFCOMM

Radio -Frequency Communications (RFCOMM) is a cable replacement protocol that can be used to connect two Bluetooth devices using a virtual serial line interface. It emulates the 9-pin circuit of an RS-232 interface. Multiple emulated serial connections (up to 60) can be multiplexed into the same Bluetooth connection, while the actual number of connections supported is implementation-specifi c. A complete communication path involves two applications running on two devices with a communication segment between them. The applications utilizing RFCOMM treat the connection as a regular serial line connection via one of its serial ports.

In Bluetooth, a profile is a set of interrelated protocols and pertinent parameters that are chosen for a specific user case. The profile that accounts for virtual serial line communication is the serial port profile, which includes RFCOMM, service discovery protocol (SDP), LMP, and L2CAP in addition to base band and radio. The serial port profile essentially defines a PTP wireless link between two Bluetooth devices that can be used by the general network layer. The two Bluetooth devices are called endpoints , each identified by a unique address. SDP is the protocol used to obtain the address of the other endpoint.

Source of Information : Elsevier Wireless Networking Complete 2010

The L2CAP layer loosely matches the data-link layer of the OSI model. Apart from framing and multiplexing of packet streams, it also supplies QoS for the ACL links. Two alternatives services are provided:

» Connectionless service: Datagram-like service without establishing a connection.

» Connection-mode service: A connection is required before a data exchange between the master and a slave.

» Three types of channels are provided by the L2CAP layer. For each type, a channel identification (CID) is assigned to identify the channel in use:

1. Connectionless: Unidirectional channel used primarily for broadcasting by the master. A slave can only have one connectionless channel to the master. Its CID is 2. Connectionless channels are used to implement connectionless service.

2. Connection-oriented: Full-duplex channel for connection-mode service. Between a slave and the master there can be multiple connection-oriented channels, each of which is identified by a unique CID larger than 63.

3. Signaling: This is not for data exchange but for signaling between L2CAP entities.

Protocol Data Units (PDUs) handled by the L2CAP layer are of a similar format across the three types of channels. In addition to the payload data (in the case of a signaling command PDU, the payload is the command representation), a field of PDU length and a field of CID are encapsulated. CIDs of connection-oriented channels are used to conduct multiplexing and demultiplexing of upper layer data sources. For connectionless channels, a PDU that is carried by the channel has a protocol/service multiplexing (PSM) field to indicate its upper layer source. On the transmitter side, the L2CAP-layer PDUs may be fragmented into small segments if the underlying logical channel cannot send packets of that length.

Source of Information : Elsevier Wireless Networking Complete 2010

Bluetooth protocol stack ➤ Radio and Baseband

The radio layer of Bluetooth utilizes the 2.4-GHz ISM band, the globally free available frequency band, for spread spectrum communication. About 79 MHz of bandwidth is used for frequency hopping, with 1-MHz carrier spacing. The modulation scheme is GFSK at a rate of 1 bit per Hz, providing a data rate of 1 Mbps. The frequency-hopping rate is 1600 hops per second with a dwell time of 625 μ sec. As a WPAN, the radio interface of Bluetooth imposes strict emitted power control. Three classes of transmitters are defined based on power and signal transmission range.

» Class 1 outputs a maximum of 100 mW and a minimum of 1 mW for the greatest distance (around 100 m without obstacles). Power control is mandatory.

» Class 2 outputs power between 0.25 and 2.4 mW for a range of about 10 m without obstacles. Power control is optional.

» Class 3 outputs around 1 mW with range of a few meters or less.

» The power control algorithm can be implemented in the link control protocol and controlled by the control component in the protocol stack.

The baseband layer controls transmission of frames in association with frequency hopping. The master in a piconet takes the channel to transmit in even-numbered hops, and slaves transmit in odd-numbered hops, reflecting a time-division duplex for all devices in a piconet. A single frame can be transmitted in the duration of one, three, or five hops. Depending on the nature of the logical link between a slave and the master, two types of links are offered. One is the asynchronous connectionless (ACL) link for best-effort packet data transmission. The other is synchronous connection oriented (SCO) for time-critical data such as voice. Frames sent on ACL links may have to be transmitted if lost, whereas frames sent over SCO links will never be retransmitted, necessitating upper layers for error correction.

The baseband layer has defined some types of frames that correspond to various purposes of the baseband frames. Different types of frames can carry different sizes of payload data and error-correction schemes. In particular, the access code fi eld in a baseband frame indicates the purpose of the frame in a special state. For example, a frame with the inquiry access code (IAC) will be sent when a device elects to scan for other devices within the radio range in a series of 32 frequency hops. Bluetooth devices can be configured to periodically hop according to the inquiry scan hopping sequence to scan inquires. When an inquiry is detected, the device, now the slave, will reply with its address and timing information to the master, then the master and the slave begin the paging process to determine a common hopping sequence to establish a connection. Eventually, both the master and the slave will hop on the same sequence of channels for the duration of the connection.

Source of Information : Elsevier Wireless Networking Complete 2010

Bluetooth Overview

Harald I. Bluetooth (Danish Harald Bl å tand), King of Denmark between 940 and 985 AD, conquered Norway in the year 960 AD. His “ bluetooth ” was a result of eating too many blueberries. More than 1000 years later, in 1994, his nickname was used to name a wireless technology that connects cell phones or other devices without using cables. The company that took the initiative to invent the short-range, low-power, and low-cost radio technology is Ericsson. In February 1998, an industry consortium, called Special Interest Group (SIG), of Bluetooth was formed by fi ve companies — Ericsson, Nokia, IBM, Toshiba, and Intel — across three different sectors of the industry. Ericsson and Nokia were major cell phone manufacturers, IBM and Toshiba were major laptop computer manufacturers, and Intel’s strength was signal processing (in addition to computer processors). In July 1999, the Bluetooth SIG released a 1500-page specification (Bluetooth 1.0). In 2001, the first Bluetooth-enabled products, primarily cell phones and PDAs, were announced. More than 1500 companies adopted Bluetooth for their products. To date, Bluetooth has become the de facto short-range wireless technology for mobile devices. The IEEE 802.15 working group for personal area networks has adopted\ Bluetooth as one of the IEEE 802.15 standards: IEEE Std 802.15.1-2002. Other 802.15 standards are 802.15.2 for the coexistence of WPAN and wireless LAN, 802.15.3 and 802.3a for UWB, and 802.15.4 for ZigBee. The features of Bluetooth are summarized as follows:

» Short range: 10 to 100 m.
» Low cost: less than $5.
» Low power: 10 to 100 mW.
» Low data rate: 1 to 2 Mbps.

The interoperable applications of Bluetooth fall into the following categories:

» Cable replacement: Computers are notorious for having cluttered cables for various peripherals such as a keyboard, a mouse, speakers, and a headset. More and more people use an earpiece connected to a cell phone while making a call. It would be far more convenient to have wireless connections between the peripherals and the devices. Bluetooth can be used for this purpose.

» Ad hoc data networking: As more mobile devices are used by the general public, ad hoc networking capability is often desired to facilitate occasional data transfer and interaction. Bluetooth is designed to allow effortless network setup of a number of compatible devices in a short range.

It is worth noting that Bluetooth and wireless LANs are not exactly targeting the same application scenarios of wireless connectivity, even if both of them (i.e., 802.11b wireless
LANs and Bluetooth) operate at the same 2.4-GHz band. Bluetooth by and large is used for power-limited mobile devices for data transfer within a person’s reach, which is why it is considered a WPAN technology. Wireless LANs, on the other hand, provide much higher bandwidths over a longer distance but consume more power.

Source of Information : Elsevier Wireless Networking Complete 2010

IEEE 802.11 Family

Within the IEEE 802.11 family, a few wireless LAN technologies represent the evolution and refinement of wireless LANs. Table 1.6 provides a comparison of these technologies. Note that, to the general public, Wi-Fi is probably the term that links to 802.11 wireless LANs. The Wi-Fi Alliance is a nonprofit industry association formed in 1999 to certify the interoperability of wireless LAN products based on IEEE 802.11 specifications. It has over 200 member companies. The goal of the Wi-Fi Alliance is to enhance the user experience through product interoperability and, understandably, promote the wireless technology and products for business interest.

The initial 802.11:1997 standard contained three incompatible options — infrared, FHSS, and DSSS — to support data rates of 1 to 2 Mbps. For FHSS, 79 channels are allocated in the 2.4-GHz ISM band in the United States and Europe. For DSSS, an 11-chip Barker sequence is used. A Barker sequence is a special binary sequence of _ 1 and _ 1 possessing mathematical characteristics that can be utilized to improve a coding scheme’s robustness and error-correction capability. Only a few Barker sequences are known. The one that is 11 in length is used in the initial 802.11 DSSS, which only supports data rates of 1 and 2 Mbps. The updated 802.11b:1999 standard discontinued further specification of infrared and FHSS, focusing instead on only enhancements to DSSS WLANs. 802.11b added new 5.5- and 11-Mbps data rates based on CCK modulation, a new chip sequence using 8-chip complementary code keying. Wi-Fi-certified products implement DSSS as defined by 802.11b:1999, supporting both 1 and 2 Mbps with the Barker code and 5.5 _ 11 Mbps with CCK. 802.11b defines a total number of 14 channels separated by a 5-MHz gap, from 2414 to 2484 MHz, but only 11 are usable due to FCC regulations in the United States. Furthermore, for DSSS to operate, the bandwidth of these channels should be 22 MHz apart in the frequency domain. As a result, only channel 1 (2412 MHz), channel 6 (2437 MHz), and channel 11 (2462 MHz) can be used at the same time. In Europe, these channels are channel 1 (2412 MHz), channel 7 (2442 MHz), and channel 13 (2472 MHz).

In 802.11a, OFDM is used instead of DSSS. 802.11a operates on the UNNI 5-GHz band with a total number of 12 non-overlapping channels. Channel spacing is 20 MHz. Recall that OFDM leverages multiple carriers (52 in the case of 802.11a) of different frequencies to transmit the same bitstream. Each channel of 802.11a leverages 52 subcarriers that are evenly separated by a distance of 312.5 KHz, plus some virtual subcarriers that are not used. The data rates of 802.11a are 6, 9, 12, 18, 24, 36, 49, and 54 Mbps, each of which is realized by a combination of a specific PSK or QAM digital modulation scheme and OFDM symbol setting.

802 .11g wireless LANs operate at the 2.4-GHz band but can offer much higher data rates,
up to 54 Mbps. To be backward compatible, 802.11g incorporates 802.11b’s CCK to achieve bit transfer rates of 5.5 and 11 Mbps in the 2.4-GHz band. To obtain higher data rates at the 2.4-GHz band, it adopts 802.11a’s OFDM scheme. Use of the 2.4-GHz ISM band permits 802.11g to have almost the same signal coverage as 802.11b.

802 .11n is the latest wireless LAN standard and promises to offer data rates up to 108 _ 320 Mbps at the 2.4-GHz ISM band. As of this writing, no offi cial release has been made by the IEEE 802.11n working group. Two proposals are being considered, and it is unclear which one will finally win. One group, TG n Synch, advocates using a 40-MHz bandwidth for each channel. The competing World Wide Spectrum Efficiency (WWiSE) group wants to retain the 20-MHz bandwidth (as in 802.11b, a, and g) and utilize 2 _ 2 MIMO (two transmitters and two receivers in each device) and OFDM. Recall that MIMO is in essence a spatial-division multiplexing technology that leverages multipath propagation to generate quasi-independent paths in space in order to boost the capacity of the system.

In addition to new wireless LANs, some other 802.11 working groups are focusing on specific issues of general wireless LANs. For example, 802.11c and 802.11d work on wireless switching that enables extension of wireless LANs, while 802.11e emphasizes providing QoS support at the MAC layer for audio and video services. Probably the most notable one is 802.11i, the new security mechanism to replace WEP and intermediate WPA. HIPERLAN is a wireless standard developed by ETSI. HIPERLAN version 1 offers up to 10 Mbps of data rate within a range of 50 m, targeting the wireless home networking market.

HIPERLAN version 2 was actually codeveloped with 802.11a. As a result, HIPERLAN/2 uses the 5-GHz UNNI band and provides data rates up to 54 Mbps. An interesting component of the HIPERLAN/2 is the so-called convergence layer defined in its protocol stack. The convergence layer unifies the data-link layer (data-link control layer in HIPERLAN terminology) functionality of various wireless access technologies and provides a unified interface and services to the network layer. This enables a HIPERLAN/2 node to interconnect with heterogeneous networks such as UMTS and the Internet. The standard specifies a cellbased convergence layer for ATM networks and a packet-based convergence layer for general packet-switching networks.

Source of Information : Elsevier Wireless Networking Complete 2010

802.11 Wireless LANs

A wireless LAN is a LAN that utilizes radio-frequency communication to permit data transmission among fi xed, nomadic, or moving computers. Wireless LANs can be divided into two operational modes: infrastructure mode and ad hoc mode, depending on how the network is formed. Most wireless LANs operate in infrastructure mode. In many cases, a wireless LAN is used to avoid the hassle of establishing a wired LAN (e.g., cabling in a multiroom building or a large open space such as a warehouse or a manufacturing plant). Several computers are connected over the air to a central AP that in turn links to the wired network. At the same time, a laptop computer with a wireless LAN interface is able to access the backend wired network across different APs in an intermittent or real-time fashion. In all these scenarios, a wireless LAN infrastructure of networked APs is needed. These APs may connect directly to each other via wireless links or rely on the wired network for interconnection.

Ad hoc mode is more flexible than infrastructure mode in that it does not require any central or distributed infrastructure devices or computers to operate. Instead, computers in an ad hoc wireless LAN temporarily self-organize into a group to serve each other in a peer-to-peer manner. In some cases when it is not feasible to build a network infrastructure for technical or other reasons (e.g., troops on the battlefield or sports spectators in a huge stadium), an ad hoc wireless LAN seems a good solution.

Today, the dominant radio-frequency technology used to build a wireless LAN is a spread spectrum on the unlicensed 2.4-GHz frequency band, as defi ned in the IEEE 802.11 standards and ETSI HIPERLAN (High-Performance Radio Local Access Network). Other radiofrequency technologies such as infrared wireless LANs and narrowband microwave LANs have faded away following the explosive growth of spectrum wireless LANs. The following is a list of advantages of radio-frequency wireless LANs over infrared; narrowband microwave LANs are not considered because they are primarily used for PTP wireless communication rather than group communication:

● High bandwidth: 802.11 wireless LANs support a link bandwidth up to 11 Mbps for 802.11b and 55 Mbps for 802.11a and HIPER-LAN2, much higher than that of infrared, which is only up to several megabits per second.

● No LOS restriction: Infrared requires LOS for transmission, but radio does not as long as the frequency in use is not too high. This is the major reason why 802.11 wireless LANs are the number one choice for home networking.

● Easy to set up and use: The 802.11 protocols are designed to allow almost zero configuration of the network and the interfaces. Of course, the default setting is by no means secure but it does work.

Source of Information : Elsevier Wireless Networking Complete 2010

Wireless Technologies Landscape

In the wireless world, aside from cellular technologies, myriad wireless technologies have emerged and matured. At the eve of the new millennium, “ wireless ” typically referred to the use of cell phones. After only a few years, the dramatic growth of new wireless communication and computing technologies has fundamentally changed our perception of wireless technologies. This section discusses these technologies from an overall perspective. Once again, the emphasis of the discussion is on mobile data access in the greater domain of mobile computing, rather than on wireless communication. The picture depicts the landscape of existing and emerging wireless technologies with respect to two signifi cant characteristics pertaining to mobile computing: data rate and signal transmission range. As the fi gure suggests, cellular systems are positioned in a grid of low data rate and high signal range. Wireless LANs (the 802.11 family) provide medium and high data rates in a local area range. Within the body area network (BAN)/ personal area network (PAN) range, UWB is expected to supply a quite high data rate, whereas Bluetooth, ZigBee, and infrared fall into the low data rate range. For PTP and multipoint wireless communications, 802.16a and 802.16e offer a high data range for communication over a metropolitan area network (MAN). A broad set of applications has been created to make use of the data rates in each range for various cases where wireless communication is preferred.

Source of Information : Elsevier Wireless Networking Complete 2010

No one ever expected that SMS would be such a tremendous success, one that exemplifies the perfect marriage of a business model with a wireless technology. European and Asian subscribers have been using SMS for years. More than a billion SMS messages are sent each month in some countries. Finally, as of 2004, SMS began to take off in North America. SMS allows two-way transmission of 160-character alphanumeric messages between mobile subscribers and external computing systems such as e-mail systems and paging systems. Because of its increasing popularity, SMS has been extensively combined with many new types of information services in addition to traditional usage. For example, both Google and Yahoo offer Internet searching via SMS. SMS was initially designed to replace alphanumeric paging service with two-way guaranteed messaging and notification services.

Two new types of SMS components have been added to the cellular network: short message service center (SMSC) and signal transfer point (STP). An SMSC is a central controller of SMS services for the entire network. It interfaces with external message sources, such as voice-mail systems, e-mail systems, and the web. Messages sent from a mobile subscriber will also be stored and forwarded by the SMSC. An STP is a general network element connecting two separate portions of the network via SS7 signaling protocol. In the case of SMS, numerous STPs interface with the SMSC, each handling SMS transmission and delivery to and from a large number of mobile stations. No matter where the messages come from, the SMSC will guarantee delivery and inform the transmitter. For the SMSC to locate a mobile station for message delivery, it must utilize the cellular network, especially the HLR, VLR, and MSC of the mobile station.

SMS has been enhanced with new capabilities to support enhanced message service (EMS) and multimedia message service (MMS). If you consider SMS to represent very early plaintext e-mails, you might think of EMS as the fancier HTML e-mails containing pictures, animations, embedded objects such as sound clips, and formatted text. MMS is the next generation messaging service that supports rich media such as video and audio clips. The wide use of picture messages sent from a camera cell phone is merely one example of MMS in action. MMS consumes more bandwidth so it requires a high data rate for the underlying network and considerable computing capability of the mobile handset. The multimedia service center (MMSC) performs similar tasks as the SMSC for SMS. The following list outlines the necessary steps of an MMS procedure:

» The transmitter sends a message to the MMSC from a cell phone, PDA, or networked computer.

» The MMSC replies to the transmitter with a confi rmation of “ message sent. ” In fact, it is not sent to the receiver yet, as the message is stored at the MMSC.

» The MMSC locates the receiver with the help of a number of cellular network elements, such as MSCs, HLRs, and VLRs. If the mobile station of the receiver is ON, the MMSC sends a notifi cation of a new message to it, along with a URL to the new message. Otherwise, it waits and tries again later

» The receiver can choose to download the message right away or save the URL to download it later.

» The MMSC will be notifi ed by the receiver that the message has been downloaded and presumably read. Then the MMSC notifi es the transmitter that the message has been delivered.

MMS is the natural evolution of SMS, with EMS as an optional intermediate messaging service, but it is very unlikely that MMS will replace SMS completely as plain text messages are preferable in many cases. Additionally, MMS does not require 3G; it can be done in 2.5G systems such as GPRS and EDGE. Problems that may hinder the widespread use of MMS include digital rights management of content being exchanged among many mobile subscribers, development of a user-friendly interface design, and sufficiently large bandwidth for message delivery.

Source of Information : Elsevier Wireless Networking Complete 2010

2G Mobile Wireless Services - WAP and iMode

WAP is an open-application layer protocol for mobile applications targeting cell phones and wireless terminals. It was developed by the WAP Forum, which has been consolidated into the Open Mobile Alliance (OMA). The current release is WAP 2.0. WAP is intended to be the World Wide Web for cell phones. It is independent of the underlying cellular networks in use. To a cell phone or PDA user, WAP is perceived as a small browser application that can be used to browse some specific websites, quite similar to the web browsing experience on a desktop computer but with significant constraints due to the form factor of the mobile terminal. A WAP system employs a proxy-based architecture to overcome the inherent limitations of mobile devices with respect to low link bandwidth and high latency. Below is a list of features that separate WAP from other application protocols:


• Wireless markup language (WML), WML script, and supporting WAP application environment: Together, they are referred to as WAE. WML is an HTML-like markup language specifically devised for mobile terminals that have limited bandwidth, fairly small screen size, limited battery time, and constrained input methods. WSL is a scaled-down scripting language supported by the WAP application environment. In addition, WAP 2.0 supports XHTML language, which allows developers to write applications for both desktop computers and mobile terminals.

• WAP protocol stack: WAP Version 1.0 includes wireless session protocol (WSP), wireless transaction protocol (WTP), wireless transport layer security (WTLS), and wireless datagram protocol (WDP). Version 2.0 incorporates standard Internet protocols into its protocol stack, such as TCP, transport layer security (TLS), and Hyper Text Transport Protocol (HTTP). Both TCP and HTTP are optimized for wireless environments.

• WAP services, such as push and traditional request/response, user agent profile, wireless telephony application, external functionality interface, persistent storage interface, data synchronization, and multimedia messaging service.

WAP 1.0 has proved to be a technological hype; it has been intensively promoted by wireless operators and content providers but has received little, if any, positive feedback from users. Because of that, WAP has sometimes been referred to as “ wait and pay. ” Interestingly, it is not only the protocol but also the applications utilizing WAP that, as a whole, push users away because of application performance, input methods, and the GUI interface, among other reasons. Moving toward standard IP protocols rather than specialized wireless protocols, WAP 2.0 addresses most of the problems of the protocol stack and the application environment, thereby giving the technology a brighter future.

iMode is a successful wireless application service provided by NTT DoCoMo. It is very similar to WAP in that it defi nes an architecture of web access on mobile terminals, primarily cell phones. Like WAP 2.0, iMode adopts standard Internet protocols as transport for applications, but iMode does not use any gateways. Instead, it utilizes overlay packet network on top of a cellular network for direct communication. The fundamental difference between WAP and iMode is that iMode requires mobile terminals to be designed to adapt to the services and applications of iMode, while WAP focuses on adapting itself to fi t into general mobile terminals. Furthermore, NTT DoCoMo’s effective WAP initiative has managed to attract many satisfied providers who can offer a wide array of services and applications to users.

Source of Information :  Elsevier Wireless Networking Complete 2010

4G Cellular Systems

As of 2004, UMTS/WCDMA and cdma2000 3G services have been rolled out in a number of countries and continue to gain some ground among business professionals. It is widely agreed that 3G will replace 2G and 2.5G systems in the next several years, providing a seemingly high throughput of several megabits per second for a mobile station. While this data rate seems sufficiently large for popular applications such as text messaging and web browsing on a cell phone, it cannot meet the relentless demand of emerging applications such as fullmotion video broadcasting and videoconferencing. In response, researchers have moved on to 4G cellular systems, which provide even higher data rates of 20 to 100 Mbps. It has to be noted that wireless LANs can now provide data rates of up to 54 Mbps, much higher than current and future variants of 3G systems, whether UMTS or cdma2000. On the other hand, a signifi cant effort has been made to coalesce voice and data communication in all 3G systems to leverage the legacy systems as much as possible. As voice over IP technology matures, an all-IP wireless network that supports voice and data over the same packet-switching infrastructure will become technically feasible to build and will be more cost-effective than current 3G frameworks. Emerging technologies for 4G wireless networks are summarized as follows; note that the application of these technologies is not limited to cellular systems:

• Smart antenna technologies exploit spatial separation of signals to allow an antenna to focus on desired signals as a way to reduce interference and improve system capacity.

• MIMO utilizes antenna arrays at both the transmitter end and receiver end to boost the link data rate and system capacity. MIMO takes advantages of multipath propagation of signals by which more data can be sent in a single channel by splitting and recombining data onto multiple paths.

• OFDM, multiple-carrier-code-division multiple access (MC-CDMA), modulation, and multiplexing technologies will improve the robustness of signal transmission and the data rate.

• Software radio or software-defi ned radio will make it possible to reconfi gure channel modulation and multiplexing on the fly.

In a broader vision, 3G cellular systems are merely one type of wireless access in the world of mobile computing. Other wireless access technologies, such as wireless LANs and WiMax, have demonstrated great potential to become a primary means of network access. These technologies may complement each other and may certainly compete head-on with each other in a variety of industry segments, leading to coexistence and integration of these systems and spurring new services and applications. The following section talks about a galaxy of new services and applications in the wireless arena.

3G Cellular Systems

There is some debate over which cellular systems are so-called 3G systems, especially with regard to EDGE and some cdma2000 systems. Because GPRS and EDGE are GSM based, it is fairly intuitive to put them into the 2.5G category. In the CDMA camp, one cdma2000 system, called cdma2000 1x RTT, has been arguably considered a 3G system. Generally, all cdma2000 and UMTS/WCDMA systems may be considered 3G systems.

The International Telecommunication Union (ITU) made a request for proposal (RFP) in 1997 for cellular technologies for the International Mobile Telecommunication (IMT)-2000 program. A proposal for a UMTS was submitted by the European Telecommunication Standards Institute (ETSI) to ITU. Its radio interface is universal terrestrial radio access (UTRA). Other 3G radio access technologies are listed as
follows:

• IMT-2000 TDMA single carrier, originally promoted by the Universal Wireless Communications Consortium (UWCC); EDGE is one of the IMT-2000 TDMA SC technologies.

• IMT-2000 FDMA/TDMA, also known as DECT, the enhanced version of the cordless phone standard.



UMTS/WCDMA Versus cdma2000
A UMTS system works in two modes: Its frequency-division duplex (FDD) mode is the wellknown wideband CDMA (WCDMA), whereas its time-division duplex (TDD) mode seems to remain unnoticed by the public. The cdma2000 is the evolution of cdmaOne, the current CDMA system in the United States. In fact, strictly speaking, WCDMA only refers to the radio interface aspect of the entire UMTS system. The same radio interface technology is used by NTT DoCoMo and J-Phone (a subsidiary of Vodafone) as well. As an FDD system, WCDMA does not require time synchronization among base stations. It allows a bit rate up to 384 Kbps, compared with the maximum rate of 2 Mbps in TDD UMTS systems. In particular, China has proposed a TDD UMTS system, called TD-SCDMA, and is vigorously promoting this technology among Chinese telecommunications device manufacturers and wireless operators.

The cdma2000 is a general term representing technical specifi cations such as cdma2000 1x RTT, cdma200 1x EV-DO, cdma2000 1x EV-DV, and cdma2000 3x RTT. RTT stands for radio transmission technology, EV-DO for evolution-data optimized, and EV-DV for evolution-data and voice. 1x RTT can provide a peak rate of 153.6 Kbps, while 3x RTT may theoretically offer a peak rate of 3.09 Mbps. The fi rst commercial system of cdma2000 1x EVDO was launched in South Korea in January 2002. The cdma2000 is backward compatible with existing IS95/cdmaOne systems, whereas WCDMA requires an overhaul of existing base stations. There is no synchronization in WCDMA systems, thus sophisticated protocol designs and handoff mechanisms are not required. On the other hand, cdma2000 requires base-station synchronization. In some sense, WCDMA can be seen as an opportunity for operators to challenge Qualcomm’s CDMA technology monopoly. Readers interested in the evolution of mobile networks are encouraged to refer to Vriendt et al.



UMTS/WCDMA
A UMTS system comprises three components and two interfaces. The components are the user environment (UE), the UMTS terrestrial radio access network (UTRAN), and the core network (CN). The interface between UE and UTRAN is referred to as Uu. The interface between UTRAN and a Node B is Iub. UMTS introduces Node Bs as base stations (BTSs in GSM) and radio network controllers (RNCs) as BSCs in GSM. Similar to GSM and GPRS, MSCs and SGSNs control RNCs through the Iu interface. In particular, an MSC connects to an RNC through an Iu – CS (circuit-switching) interface, whereas an SGSN connects to an RNC through an Iu – PS (packet-switching) interface. In UMTS, GMSCs and GGSNs connect to PSTN and PDNs. Other components such as HLR and VLR are the same as in GSM but with enhanced functionality for UMTS.

UMTS uses a pair of 5-MHz channels, one in the 1900-MHz range for uplink and one in the 2100-MHz range for downlink. In contrast, cdma2000 uses one or more arbitrary 1.25-MHz channels for each direction of transmission. UMTS is expected to deliver a user data rate of 1920 Kbps, although in reality 384 Kbps is probably what the system can really offer. A future version of UMTS/WCDMA, high-speed downlink packet access (HSDPA), will offer data speeds up to 8 – 10 Mbps and 20 Mbps MIMO antenna systems. The data modulation scheme is QPSK for uplink and BPSK for downlink. The chip rate is 3 M chips per second.

As a spread spectrum radio interface, WCDMA uses soft handoff just as cdmaOne does for the same reason: It is quite diffi cult to control power beyond the hysteresis if hard handoff is employed because in CDMA systems forcing a mobile station to operate over some hysteresis level will cause large interference.

The first UMTS network went into operation in the United Kingdom in 2003. AT & T
Wireless in the United States deployed UMTS in selected cities in late 2004. Japan’s largest telecommunication service provider NTT DoCoMo launched the fi rst WCDMA-based 3G network, dubbed Freedom of Mobile Multimedia Access (FOMA), in 2001.



cdma2000
cdma2000 is another standard under the ITU-2000 program. It comes in two stages: 1x and 3x. Using the existing cdmaOne infrastructure, cdma2000 1x can supply a maximum user data rate of 207 Kbps and a typical data rate of 144 Kbps in general. It doubles the voice capacity of cdmaOne systems and offers six times the capacity of GSM or TDMA systems. cdma2000 3x further improves the user data rate to 2 Mbps.

In cdma2000, three major components exist in the overall network architecture: mobile station, radio access network, and core network. The interface between a mobile station and radio access network is called Um, and the interface between radio access network and core network is called A. In addition, the core network can be further decomposed into two portions: One portion, the packet core network (PCN), connects to external IP networks via a Pi interface, whereas the other connects to PSTN via an Ai interface. Similar to a UMTS network; the core network of cdma2000 also has MSCs, HLRs, and VLRs. The principal difference between the core network of cdma2000 and those of other cellular systems is the PCN that provides IP network access to mobile stations. A component in PCN, the packet data service node (PDSN), performs roughly the same task as an SGSN in UMTS or GPRS; however, in cdma2000, two IP access methods are provided: simple IP access and mobile IP access. Simple IP access is the traditional way to obtain and retain an IP address within a geographically located subnet. When the mobile station moves to another subnet, it has to redo the DHCP procedure and obtain a new IP address. This is the case when a mobile worker uses a laptop computer to connect to an enterprise network across several buildings. Mobile IP access enables a mobile station to use the same IP address across different regions. In this case, a home agent of the mobile station will assume the responsibility of maintaining the same IP address for the mobile station. A foreign agent that is part of the PDSN is used to assign a temporary address to the mobile station that just moved in, and tunnels packets from the home agent to the mobile station. Note that GPRS has only a single IP access method: the simple IP access. It has to be emphasized that cdma2000 has better IP support. This is indeed a tremendous advantage of cdma2000 over UMTS, as in the long run the core cellular network will be interoperable with other wired or wireless networks with IP as the underlying network protocol.

Another major task of the PCN is authentication, authorization, and accounting (AAA). Three parties are involved: home AAA (HAAA), broker AAA (BAAA), and visited AAA (VAAA). HAAA stores a subscriber’s profi le information. Once requested by a VAAA, it will authenticate and authorize a subscriber and send the response back to the VAAA. For accounting, VAAA is able to receive accounting information from HAAA and provides the subscriber’s profi le to the PDSN. BAAA is used as an intermediate server when VAAA and HAAA are not directly associated with each other.

Source of Information :  Elsevier Wireless Networking Complete 2010

GSM Versus CDMA

The two major 2G cellular systems are not compatible with each other. GSM and CDMA networks are both widely used worldwide. For example, in the United States, Verizon Wireless, Sprint PCS, and ALLTEL are CDMA operators, whereas Cingular Wireless, AT & T Wireless (merged with Cingular in 2004), and T-Mobile USA are GSM operators. Another wireless operator, Nextel, uses iDEN, a TDMA technology developed by Motorola. While the Europeans enjoy continent-wide, GSM-dominated wireless services, the world’s largest mobile wireless market, China, with a total number of about 398 million subscribers as of 2005 (Source: Computer Industry Almanac Inc.), is basically shared by two companies: China Telecom, which operates a GSM network, and China Unicom, which operates both GSM and CDMA networks. Most differences between the two types of systems have been extensively discussed in the preceding sections, except speech encoding and power control. CDMA employs variable-rate codec for speech encoding, which is more efficient than GSM’s fixed-rate codec. Power control of CDMA systems requires a closed-loop approach, thus it is faster than GSM’s open-loop approach.

Source of Information :  Elsevier Wireless Networking Complete 2010

Road to 4G

IS -95, or cdmaOne, has been designated by Qualcomm as the second-generation digital CDMA cellular system standard. The next generation of cdmaOne is cdma2000, and others are in various stages of development, such as cdma2000 1x RTT, cdma2000 1x EV, cdma2000 1x DV, cdma2000 1x DO, and cdma2000 3x RTT. As mentioned before, the second-generation GSM systems are evolving to a different type of CDMA system: UMTS/WCDMA. It is quite clear that the concept and underlying technologies of CDMA finally dominate the air interface of the future cellular world, after a long round of debates and remarkable business practices.

On the road to 4G, TDMA systems such as GSM, PDC, and D-AMPS may take different paths involving GPRS, EDGE, or HSCSD as 2.5G solutions. Things are much clearer on the CDMA side: cdmaOne (IS-95A) will be first replaced by IS-95B as a 2.5G system, then by cdma2000 systems. The standardization body supporting UMTS/WCDMA is 3GPP, whereas the counterpart for cdma2000 is 3GPP2.

Source of Information :  Elsevier Wireless Networking Complete 2010

IS-95

IS -95 is the underlying standard of CDMA systems. It is worth noting that CDMA is primarily designed and promoted by Qualcomm Inc., which holds key intellectual property rights related to CDMA technology. IS-95 is also commonly referred to as cdmaOne.

The forward link refers to the link from a base station to a mobile station, whereas the reverse link is the link from a mobile station to a base station. For both types of links, voice is encoded at a rate of 9600 bps after some error-correction code is added. In a forward link, both data and voice are encoded by a forward error-correction (FEC) scheme, resulting in a doubled bit rate of 19.2 Kbps. In a reverse link, because a different FEC scheme is used, the resulted data rate is 28.8 Kbps. For each forward link, 64 logical channels, each corresponding to a mobile station, are scrambled to prevent repetitive patterns. A reverse link comprises up to 32 logical access channels for paging and 62 logical traffi c channels. For both types of links, the DSSS function spreads data of the logical channels over the available frequency range, resulting in an overall 1.228-Mbps data rate. Specifi cally, a 42-bit-long mask code is used on a reverse link to identify logical traffi c channels that are dedicated to connecting mobile stations to a base station. The same mask code is also used to produce a bitstream that will be modulated onto the carrier using orthogonal QPSK or offset QPSK (OQPSK). OQPSK differs from QPSK in that in the implementation of OQPSK one of the two half-rate bitstreams of the original input signal is delayed for one-bit period to reduce phase shift at a time. Because of duplex communication, the total number of reverse-link logical channels for traffic must be the same as the total number of forward-link channels.

Source of Information :  Elsevier Wireless Networking Complete 2010

Code-Division Multiple Access Concept

CDMA is actually DSSS utilizing CDM. Like GSM, CDMA uses a dedicated frequency band for multiple simultaneous signal transmission, but what underlies this frequency use scheme is spread spectrum, which essentially spreads a single signal from a transmitter over the entire shared frequency band in such a way that signals will not interfere with each other, thanks to a spreading code assigned to each signal. A single data bit of 1 from a mobile station is mapped to a chip sequence that identifies the mobile station. For a data bit of 0, the complement of the chip sequence is used. The chip sequence is normally 64 or 128 chips long and is pairwise orthogonal, meaning that the normalized inner product (i.e., dot product) of any two distinct chip sequences (they are considered vectors of _ 1 and _ 1 in mathematical terms) is 0. After the mapping, multiple data bitstreams from different mobile stations are added linearly and transmitted. The intended receiver knows the chip sequence of the individual mobile station and uses it, along with the received aggregated bitstream, to compute data bits of that mobile station. The computation is quite straightforward: Simply compute the normalized inner product of the chip sequence of the desired mobile station and the received bitstream. In this way, the data bits sent by that mobile station will be recovered. Without knowing the correct chip sequence of a transmitter, the computation will yield some pseudorandom bits like noise. An implicit assumption of the decoding procedure is that the receiver and the transmitter are well synchronized in time, which allows the necessary computations for the correct portion of the transmitted bitstream. This is often done by utilizing a special synchronization bit sequence.

The chip sequences assigned to mobile stations can be generated by the Walsh code, an algorithm that produces mathematically orthogonal codes derived from the Walsh matrix. The Walsh-encoded chip sequences appear to be random noise to mobile terminals. Initially, the chip sequences are of equal length. To increase the number of usable chip sequences in the coding space, variable-length chip sequences have been devised and used in today’s CDMA systems. Interested readers can refer to A. J. Viterbi’s book “ CDMA — Principles of Spread Spectrum Communication ” for more details of CDMA codes.

Source of Information :  Elsevier Wireless Networking Complete 2010


Subscribe to Developer Techno ?
Enter your email address:

Delivered by FeedBurner