CHAPTER 6: WIRELESS & MOBILE NETWORKS • • • • • • • • Code Division Multiple Access Spread Spectrum Cellular Telephones 4G Technology IEEE 802.11 Mobile IP Wireless Security Satellite Networks CODE DIVISION MULTIPLE ACCESS TDMA: Everyone gets to talk using the entire bandwidth, but they have to take turns talking. FDMA: Everyone gets to talk at the same time, but only across their narrow channels. CDMA: Everyone gets to talk simultaneously, using the entire bandwidth! They do this by coding their transmissions in a unique fashion (as if every pair were speaking a different language, and each other language merely sounds like background noise). CS 447 Chapter 6 Page 159 COMPARING CELLULAR APPROACHES FDMA… • subject to impairment due to selective channel fading • limited to fixed number of concurrent users • not amenable to privacy needs • wasteful guard bands are needed between channels CS 447 TDMA… • subject to impairment due to noise bursts • limited to fixed number of concurrent users • not amenable to privacy needs • wasteful guard times are needed between time slots to ensure synchronization Chapter 6 CDMA… • frequency diversity avoids transmission impairments • experiences graceful degradation with more users • inherent privacy due to noiselike characteristics of other messages • efficiently utilizes the entire available bandwidth spectrum Page 160 SPREAD-SPECTRUM SIGNALING To eliminate the noise interference and privacy violations that have plagued wireless communication, spread-spectrum signaling was developed in two principal forms: Frequency Hopping Spread Spectrum (FHSS) • Each transmitter changes frequencies at a regular time interval, following a pseudorandom pattern known only to the transmitter and the receiver. • The receiver demodulates the received signal, filtering out any received signals that are not at the appropriate frequency. • FHSS is commonly used in Bluetooth systems. CS 447 Chapter 6 Page 161 Direct-Sequence Spread Spectrum (DSSS) • Each data bit is multiplied by a long bit sequence and modulated for transmission (the sequence used for 0 is the two’s complement of the signal used for 1). • Other transmitters must use orthogonal sequences so they’ll be filtered out at the receiver. CS 447 Chapter 6 Page 162 ORTHOGONAL DIGITAL SIGNALS A chip set of orthogonal vectors is used to “spread” the signals. Chip Code A: (1,1,1,1) Chip Code B: (1,1,-1,-1) Chip Code C: (1,-1,-1,1) Note that the chip codes are mutually orthogonal (i.e., the dot product of any pair of them is zero). Chip Code D: (1,-1, 1,-1) CS 447 Chapter 6 Page 163 CODING OUTGOING MESSAGES A: (1,1,1,1) B: (1,1,-1,-1) C: (1,-1,-1,1) Assume that there are four senders... Sender Message D: (1,-1, 1,-1) ±1 Version Chip Code Encoded Message W 010010 -1 1 -1 -1 1 -1 A (-1,-1,-1,-1), (1,1,1,1), (-1,-1,-1,-1), (-1,-1,-1,-1), (1,1,1,1), (-1,-1,-1,-1) X 111011 1 1 1 -1 1 1 B (1,1,-1,-1), (1,1,-1,-1), (1,1,-1,-1), (-1,-1,1,1), (1,1,-1,-1), (1,1,-1,-1) C (-1,1,1,-1), (-1,1,1,-1), (-1,1,1,-1), (1,-1,-1,1), (1,-1,-1,1), (1,-1,-1,1) D (1,-1,1,-1), (-1,1,-1,1), (1,-1,1,-1), (-1,1,-1,1), (-1,1,-1,1), (1,-1,1,-1) Y Z 000111 101001 -1 -1 -1 1 1 1 1 -1 1 -1 -1 1 Summing the four encoded messages yields: (0,0,0,-4), (0,4,0,0), (0,0,0,-4), (-2,-2,-2,2), (2,2,-2,2), (2,-2,-2,-2) CS 447 Chapter 6 Page 164 DECODING INCOMING MESSAGES What happens when the incoming message arrives? (0,0,0,-4), (0,4,0,0), (0,0,0,-4), (-2,-2,-2,2), (2,2,-2,2), (2,-2,-2,-2) Receiver Original Message Chip Code Decoded Message Decoded Message After Scaling W′ 010010 A -4, 4, -4, -4, 4, -4 010010 X′ 111011 B 4,4,4,-4,4,4 111011 Y′ 000111 C -4,-4,-4,4,4,4 000111 Z′ 101001 D 4,-4,4,-4,-4,4 101001 A: (1,1,1,1) B: (1,1,-1,-1) C: (1,-1,-1,1) The decoded message is “scaled” by converting all positive values to 1, and all non-positive values to 0. D: (1,-1, 1,-1) CS 447 Chapter 6 Page 165 CELLULAR TELEPHONES Cellular phones transmit and receive on two kinds of channels (FDM for analog, TDM for digital): •Control Channels – Used for overhead messages (e.g., network system ID), pages (incoming call signals), access info (connection requests), and channel assignments (when connection is established). •Communication Channels – Used for voice/data, handoff control, and maintenance monitoring. CS 447 Chapter 6 Page 166 CELLULAR BASE STATIONS Cellular providers typically have 832 (analog) channels to use. • 42 are reserved for control info. • The remaining 790 are split into 395 duplex pairs for voice/data. • The service region is split into a hexagonal grid, with approximately 56 channel pairs allocated to each base station. 1) The caller dials and the phone sends the phone number, programmed system ID, and phone serial number to the nearest base station. 2) After verifying everything, the base station relays the info to a mobile switching center, which then uses optical fiber or wireless to forward the caller’s signals. CS 447 Chapter 6 Page 167 CELLULAR HANDOFF As a user moves toward the edge of a cell, the local base station notes that the user’s signal strength is diminishing. Meanwhile, the base station in the cell towards which the user is moving (which is listening and measuring signal strength on all frequencies, not just its own one-seventh) detects the user’s signal strength increasing. The two base stations coordinate with each other through the Mobile Telephone Switching Office, and at some point, the user’s phone gets a signal on a control channel telling it to change frequencies. CS 447 Chapter 6 Page 168 MULTIPATH PROPAGATION Cellular signals may be altered via four principal types of interference. Shadowing occurs when the signal power fluctuates due to objects obstructing the propagation path between the transmitter and the receiver. Scattering occurs Reflection occurs when the signal when a radio wave travels through a collides with an medium containing object which has objects with very large dimensions smaller dimensions than the signal’s compared to the wavelength, such as wavelength of the when the propagating signal. transmission This is often caused Diffraction occurs when the encounters a rough by the surface of path between the transmitter surface or small the earth, buildings, and the receiver is obstructed objects. and walls by an object with sharp edges, causing secondary waves to bend around the object and provide an artificial line-of-sight between the communicating pair. CS 447 Chapter 6 Page 169 1G 2G 3G 4G Firstgeneration cellular systems were analog, using FDMA and emphasizing voice applications. Secondgeneration cellular systems are digital, using TDMA (or CDMA) and emphasizing email & Internet access. Thirdgeneration cellular systems are also digital, using CDMA and stressing video telephony and high-speed Internet access. Fourthgeneration cellular systems will extend the bandwidth and throughput capabilities of 3G. CDMA’s big advantages… • Frequency diversity limits transmission impairments. • Noise-like signal system improves privacy. • Graceful service degradation with increased usage. CS 447 Chapter 6 Page 170 4G’S MULTITECHNOLOGY APPROACH Numerous technologies are competing for a share of the 4G market, including: Orthogonal Frequency-Division Multiple Access (OFDMA) supports multi-user transmissions by separating them in both the time domain and in the frequency domain. Ultra-Wideband (UWB) uses the radio spectrum at low energy levels to produce short-range, high-bandwidth wireless communications. CS 447 Multiple-Input/MultipleOutput (MIMO) uses multiple antennas at both the transmitter and the receiver to improve communication performance. Chapter 6 Page 171 WIRELESS LANS Medium access control on wireless LANs has certain similarities to CSMA/CD. Three “interframe space” time values are defined: • Short IFS: time interval for high-priority traffic (e.g., ACKs and Clear-To-Sends) • Point Coordination Function IFS: time interval for polling messages • Distributed Coordination Function IFS: time interval for regular traffic A transmitting wireless station waits the appropriate IFS time, listening for traffic. If it hears a message, it waits until the message has passed, and then waits another IFS, plus an added exponential backoff time. Note that there is no collision detection (it’s too hard to tell the difference between external noise and one’s own transmission on such a wide-open medium). Corrupted signals must be handled at a higher protocol layer. CS 447 Chapter 6 Page 172 IEEE 802.11 TOPOLOGIES The 802.11 architecture hierarchically defines its topologies. An Independent Basic Service Set has wireless stations communicating directly with each other in a peer-to-peer fashion. An Infrastructure Basic Service Set has a component called an Access Point that serves as a relay through which the stations communicate with each other and which provides a connection to an external Distribution System. An Extended Service Set is a set of infrastructure BSS’s, where the access points communicate with each other to forward traffic from one BSS to another in order to facilitate movement of stations between BSS’s. CS 447 Chapter 6 Page 173 IEEE 802.11 FRAME FORMAT Preamble PLCP Header MAC Data CRC Preamble: 10 bytes of alternating 0’s and 1’s (for synch) & a 2-byte start delimiter PLCP (Physical Layer Convergence Protocol) Header: Length & rate fields, and a HEC. MAC Data: The MAC frame, described below. CRC: 4 bytes to error-check the entire frame. IEEE 802.11 MAC FRAME FORMAT FC DI Address1 Address2 Address3 SC Address4 Data Frame Control: 2-bit protocol version; 6-bit message type; 1-bit flag indicating transmission to the Distribution System; 1-bit flag indicating transmission from the DS; 1-bit fragmentation flag; 1-bit retransmission flag; 1-bit power management flag (Power Save vs. Active); 1-bit Access Point polling flag; 1-bit encryption flag; 1-bit Strictly-Ordered flag Duration/ID: Either the time that the channel is being allocated, or, in control frames, the station ID number for Power-Save polling responses. Address1-4: The 6-byte addresses for the source, destination, source Access Point, and destination Access Point. Sequence Control: 4-bit fragment number and 12-bit sequence number. Data: 0-2312 bytes of LLC data or control info. CS 447 Chapter 6 Page 174 MOBILE IP Mobile IP was developed to allow users to seamlessly roam among wireless networks, with no interruptions to IP applications like media streaming or VoIP as network boundaries are crossed. Mobile IP service requires every mobile device to contain Mobile Node software, Home Agent software on a router in the user’s home network, and (if used) Foreign Agent software on a router in the remote network. Mobile IP datagrams may flow in a network without a Foreign Agent, as long as the Mobile Node has a public IP address in the visited network. CS 447 If the visited network has a Foreign Agent, the Mobile Node doesn’t require any IP address, and the Foreign Agent only requires one public IP address for all Mobile Nodes. Chapter 6 Page 175 WIRELESS SECURITY Extra security mechanisms are required in wireless environments, due to the lack of physical connections: • Authentication - Establishing identity (e.g., passwords) • Deauthentication - Terminating authentication (e.g., if reauthentication is needed) • Encryption - Ensuring privacy (e.g., encoding to inhibit unauthorized reading) CS 447 Chapter 6 Page 176 SATELLITE NETWORKS Each method of medium access has problems when applied to satellites: FDMA •Wide guard bands are needed to separate channels. •Power must be carefully controlled to preserve the signal’s integrity. •Digital communication isn’t supported; only analog is. TDMA •Ground stations have varying propagation times, so synchronization is tough. •Ground stations must be capable of high burst speeds. CDMA •Channels have low capacity due to noise and lack of synchronization. •Transmitters must have extremely fast rates to accommodate spread. CS 447 Chapter 6 Page 177