Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

WMN CH 2 Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

Unit 2 GPRS and Mobile Data Communication (12 M)

2.1 General Packet Radio Services (GPRS):


GPRS stands for General Packet Radio Service. It is the modified version of GSM architecture.
GPRS is a packet-oriented mobile data mechanism that can carry data packets as well. In GSM
architecture, only voice signals can be transported, so being an enhanced version GPRS is able to
transmit voice as well as data packets.

GPRS stands for General Packet Radio Service. It is the modified version of GSM
architecture. GPRS is a packet-oriented mobile data mechanism that can carry data packets as
well. In GSM architecture, only voice signals can be transported, so being an enhanced
version GPRS is able to transmit voice as well as data packets.
Components of GPRS Architecture
Mobile Station (MS)
GPRC requires enhanced mobile stations, as existing mobile stations were designed
according to the GSM network, and they were unable in handling enhanced data packets. A
variety of high-speed mobile stations are available to support enhanced data packets. These
mobile stations are also capable of handling the GSM architecture to make voice calls.
Base Station Subsystem (BSC)
In GSM architecture there is one component called BSC. But in GPRS there is one
component is added to BSC called PCU. PCU stands for Packet Control Unit. If the signal
comes to BSC and that signal contains data, then PCU routes to the SGSN. The interface is
used between BSC and PCU is the FRI interface. After the signal comes to SGSN, it delivers
the data packet to the GGSN. GGSN routes the data packet to the data network (PDN-
Predefined Data Network).

Gateway GPRS Support Node (GGSN)

The Gateway GPRS Support Node acts as an interface and a router to external networks. It
contains routing information for GPRS mobiles, which is used to tunnel packets through the
IP based internal backbone to the correct Serving GPRS Support Node. The GGSN also
collects charging information connected to the use of the external data networks and can act
as a packet filter for incoming traffic.

Serving GPRS Support Node (SGSN)

The Serving GPRS Support Node is responsible for authentication of GPRS mobiles,
registration of mobiles in the network, mobility management, and collecting information on
charging for the use of the air interface.

2.2 GPRS Network Nodes:


1. Serving GPRS Support Node (SGSN): Within the service area of SGSN, it delivers
packets to MS (mobile stations). SGSN send queries to home location registers (HLRS) for
obtaining profile data of GPRS subscribers.
• In a given service area, SGSN detects new GPRS MS and processes registration of
new mobile subscribers and keep records of their locations inside a predefined area.
• Mobility management functions such as handling of a roaming subscriber from the
equipment in one cell to the equipment in other cell is performed by SGSN.
The main functions of SGSN are as follows:
1. Routing of data to and from mobile station.
2. Verification and charging of calls.
3. Tracking of location and mobility administration.
4. Stores the location and profile of users.
2. Gateway GPRS Support Node (GGSN): GGSNS are used as interfaces to external IP
networks such as the public internet, mobile service provider's GPRS services or enterprise
intranets.
• GGSNS keeps routing information required to tunnel the PDUs (Protocol Data Units)
to the SGSN which service particular mobile stations.
• Network and subscriber screening and address mapping takes place in GGSN. To
support SGSNS one or more GGSNs can be provided.
The main functions of GGSN are as follows:
1 It helps in data Conversion from SGSN to PDP (Packet data protocol format).
2. It reserves the SGSN address.
3. It reserves the users location in the location register.
GPRS Interfaces
• The GPRS architecture includes signaling interfaces with various protocols, which
controls and support the transmission of packets across the networks and to the mobile
stations.
Following are the GPRS interfaces:
1. Air Interface (Um): It connects MS and BTS (Base transceiver station).
2. Abis Interface: It connects BTS and BSC (Base station controller).
3. Gb Interface: It connects BSC with SGSN.
4. Gn Interface: It connects SGSN and GGSN.
5. Gi Interface: It connects GGSN with external PDN (Packet Data Network)
6. Gr Interface: It connects SGSN and HLR. Exchange the user information between SGSN
and HLR.
7. Gc Interface: It connects GGSN and HLR. Exchange the location information between
GGSN and HLR
GPRS Services
• Bearers in GPRS:
• Bearer services of GPRS offers End-to-End packet switched data transfer services.
• A GPRS supports the two types of data transfer services such as PTP (point-to-point)
and PTM (point-to multipoint) services. Now a day, the Point-to-Point (PTP) service is
available and in the future releases of GPRS PTM will be available.
• The types of data services supported by GPRS are as follows:
1. SMS (Short Message Service): GPRS will support SMS as a data bearer service. SMS
offers text messages.
2. MMS (Multimedia Messaging Service): GPRS supports MMS. MMS offers
multimedia messages. Audio, pictures, clips or videos can be sent via MMS.
3. WAP (Wireless Application Protocol): GPRS supports WAP. WAP is a data bearer
service over HTTP protocol.
Quality of service (QoS) in GPRS
• The Quality of Service (QoS) requirements for various mobile packet data
applications are different.
• GPRS allows defining QoS using following parameters:
• 1. Service precedence
• 2. Reliability
• 3. Delay Service precedence
• 4. Throughput
1. Service Precedence: It is defined as the priority of a GPRS service related to another
service. Three levels of priorities are: High, normal and low.
2. Reliability: The transmission characteristics of an application are indicated by
reliability. Three reliability classes (i.e. duplication, mis- sequencing and corruption of
packets) are defined which guarantee certain maximum values for the probability of loss.
3. Delay: For the mean delay, delay parameters define maximum values. The end-to-
end transfer between two communicating mobile stations, or between a mobile station and the
signaling interface to an external packet network is known as delay.
4. Throughput: Throughput states the peak / maximum bit rate and mean bit rate.
Mobility Management in GPRS
• Mobility Management in GPRS is used to track the location of the GPRS mobile
handset as it moves from one location to other within the PLMN.
• In the different regions to update the mobile station's location, the SGSNS
communicate with each other. VLR stores the MS's profile that is accessible to SGSN's
through the local Mobile Switching Centre (MSC).
• At each PLMN, a logical link between MS and SGSN is established and maintained.
When the GPRS mobile moves out of the specific SGSN area, the logical link is released and
resources assigned with it are reallocated.
Routing in GPRS

• A Mobile Station (MS) located in PLMN A sends Ip packets to a host which is


connected to the IP network.
• The registered SGSN encapsulates the IP packets coming from the MS, examines and
routes to an appropriate GGSN through the Intra-PLMN GPRS backbone.
• The GGSN decapsulates the received IP packets and sends them to the PDN (packet
data network) where the IP routing mechanism is used for transfer of the packet to the access
router of the destination. After that IP packet is delivered to the host network.
• If we assume that, PLMN B is the home-PLMN of the MS. GGSN of PLMN B
assigns an IP address to the MS. Hence the network prefix of the MS's IP address and IP
address of GGSN of PLMN B are same.
• Now corresponding host is sending IP packets to the MS. The IP packets are sent to
the IP network (PDN) and routed to the GGSN of PLMN B.
• The HLR do the enquiry and obtains the data about location of MS in PLMN A. It
encapsulates the received IP packets and tunnels them to the appropriate SGSN in PLMN A
through the inter-PLMN GPRS backbone. The SGSN will decapsulate the IP packets and
sends them to the MS.
Logical Channels in GPRS
1. Packet Broadcast Control Channel (PBCCH):
• PBCCH is a downlink channel. The PBCCH transmits general information to mobiles
and informs them about incoming calls.
• It broadcasts general information required to set up the calls such as power control
parameters, access methods, operational modes and network parameters etc.

2. Packet common control channels:


I. Packet Paging Channel (PPCH): PPCH is a downlink channel used to aware the
mobile about an incoming call and to make it ready for the data reception.
II. Packet Access Grant Channel (PAGCH): PAGCH is a downlink channel, which sends
information to the mobile about which traffic channel has been assigned to it. PAGCH occurs
after the PPCH.
III. Packet Notification Channel (PNCH) PNCH is a downlink channel used to alert
mobiles that, for a large number of mobiles there is broadcast traffic intended. It is used in
point-to-point multicasting.
IV. Packet Random Access Channel (PRACH): PRACH is an uplink channel, which
allows the mobile to begin the data burst in the uplink.

3. Packet dedicated control channels:


I. Packet Associated Control Channel (PACCH): PACCH exists in both uplink and
downlink directions which is used for signal control while a call is in progress.
II. Packet Timing Advance Common Control Channel (PTCCH): PTCCH exists in both
the uplink and downlink directions and is used to adjust the timing advance. PTCCH is
required to make sure that messages reach the destination in the correct time.
4. Packet data traffic channels:
• Packet Data Traffic Channel (PDTCH): PDTCH exists in both uplink and downlink
and is used to send the traffic. To provide high speed data, up to eight PDTCHS can be
allocated to a mobile.

Characteristics of GPRS
1. GPRS uses packet switched network.
2. It uses GSM architecture and GPRS support nodes.
3. It enables voice and data flow through the network.
4. It has dynamic time slot allocation.
5. It is faster than GSM and code division multiple access (CDMA).

Advantages of GPRS
1. Speed: GPRS technology offers higher data rate than GSM. GPRS provides speed
limit upto 171 kbps and offers throughput upto 40 kbps.
2. Packet switched GPRS is packet switched system circuit and parallelly packet
switching can be used.
3. Always on: GPRS provides "Always on capability.
4. Spectral efficiency: Because of shared use of radio channels, GPRS provides a better
traffic management and it has service access to a greater number of users.
5. Packet transmission: For long data packet transmission GPRS works more efficiently.
Disadvantages of GPRS
1. As GPRS uses GSM band for data transfer, when a connection is active, calls and
other network related functions cannot be used.
2. It does not provide store and forward service therefore if the MS is not available the
data gets lost.
Application of GPRS:
• Communications - E-mail, fax, unified messaging and intranet/internet access, etc.
• Value-added services - Information services and games, etc.
• E-commerce - Retail, ticket purchasing, banking and financial trading, etc.
• Location-based applications - Navigation, traffic conditions, airline/rail schedules
and location finder, etc.
• Vertical applications - Freight delivery, fleet management and sales-force
automation.
• Advertising - Advertising may be location sensitive. For example, a user entering a
mall can receive advertisements specific to the stores in that mall.

2.3 What is WLANs?


• A wireless LAN is a wireless computer network that links two or more devices using
wireless communication to form a local area network within a limited area such as a home,
school, computer laboratory, campus, or office building.

Wireless LANs
• The wireless LANS can satisfy the requirements like mobility, relocation of user, ad-
hoc networking and cover locations which are difficult to wire.
• Earlier the wireless LANs were costly, they could support only low data rates and a
license was required to build and operate them. Hence there were limitations on the practical
utility of wireless LANS.
• But all these problems are being addressed now which is increasing the popularity of
wireless LANs day by day.
Applications of Wireless LANs

 LAN extension
 Cross building interconnection
 Nomadic access
 Ad-hoc networks
 Coffee Shop
 Airport
 Manufacturing Facility
 Home
 University
 Hospital

Requirements of Wireless LANs


• Throughput
• Number of nodes
• Connection to backbone LAN
• Service area
• Longer battery life
• Robustness and security
• License free operation
• Collocated network operation
• Roaming facility
• Dynamic configuration

Design issues of wireless networks


Some of the important issues that must be addressed while designing a wireless network are
as follows:
1. Bandwidth
2. Security

Characteristics of WLAN
1. Attenuation
2. Interference
3. Multipath propagation
4. Errors

IEEE 802.11 Standard


• The 802.11 is the specifications for the wireless LANS, defined by IEEE. This
specification defines the physical and data link layers. It is sometimes called as Wireless
Ethernet.
• Generally the term Wi-Fi (Wireless fidelity) is used as a synonym for wireless LAN.
• However in reality, Wi-Fi is a wireless LAN which is certified by the
Wi-Fi Alliance a global industry association.

Classification of WLANs:
1. Infrastructure Networks
2. Ad-hoc LANs

Infrastructure networks:
• These WLANS contain special nodes called Access Points (APS) via existing
networks.
• APs can interact with wireless nodes as well as wired networks. The other wireless
nodes known as mobile stations (STAS) communicate via APs. The APs can also work as
bridges with other networks.

Ad-hoc LANS:
• These WLANS do not have any fixed architecture. They can be set up at any place. It
is a peer-to-peer network without any centralized server. The ad-hoc networking scheme is as
shown in Fig.
• The Ad Hoc LAN is set up temporarily to meet some immediate requirements. Such
as a group of people with laptops conferencing with each other in a room. The difference
between the nomadic access and ad-hoc networking is evident from Fig.
• As seen from Fig. the ad-hoc LAN does not have any infrastructure.
IEEE 802.11 system architecture
• IEEE 802.11 defines 2 types of services:
• Basic Service Set (BSS)
• Extended Service Set (ESS)

 IEEE.802.11n specification & comparison:


802.11a 802.11b 802.11g 802.11n
Approval date July 1999 July 1999 June 2003 August 2006
Max data rate 54 Mbps 11 Mbps 54 Mbps 600 Mbps
DSSS or CCK DSSS or CCK
Modulation OFDM DSSS or CCK
or OFDM or OFDM
2.4 GHz or
RF band 5 GHz 2.4 GHz 2.4 GHz
5GHz
No. of Spatial
1 1 1 1,2,3 or 4
streams
20 MHz or 40
Channel Width 20 MHz 20 MHz 20 MHz
MHz

 Radio Frequency Identification (RFID) :

 It is automatic identification method, relying on storing and remotely retrieving data.


The data is stored on and retrieved from RFID tags.
 The tags contains a transponder with digital memory chip that is given a unique
electronic product code. The data is written onto the memory and read from it.
 RFID tagging involves small devices that use radio frequencies to transfer data,
mainly to track and identify objects, animals and people.
 RFID antenna packaged with a transceiver and decoder emits activation the RFID tag
so it can read and write data to the tag.
 When RFID tag passes through electromagnetic zone, it detects the reader’s
activation signal. The reader decodes the code ID of the tag and the data encoded in
the tag’s integrated circuit. (silicon chip)
 In this way, an RFID tag is an information source. The data written on it can be
retrieved whenever needed or it can be transmitted to different RFID reader.
 RFID is also called dedicated Short Range Communication(DSRC)

RFID Features:

 No Line of Sight: To read or write RFID tags doesn’t require line of sight
 Robust: Because RFID systems do not need to be visible, they can be encased within
rugged material protecting it from environment.
 Read speed: Tags can be read from significant distances and can also be read
quickly.
 Reading Multiple Item: A number of tagged items can be read at same time within
RF field
 Security: Because tags can be enclosed. They are much more difficult to tamper
with.
 Programmability: Many tags are read/write capable, rather than read only.

Application of RFID :
 It utilized in tracking shipping containers, trucks and railroad, cars.
 It uses in Asset tracking.
 It utilized in credit-card shaped for access application.
 It uses in Personnel tracking.
 Controlling access to restricted areas.
 It uses ID badging.
 Supply chain management.
 Counterfeit prevention (e.g., in the pharmaceutical industry).
Advantages of RFID :
 It provides data access and real-time information without taking to much time.
 RFID tags follow the instruction and store a large amount of information.
 The RFID system is non-line of sight nature of the technology.
 It improves the Efficiency, traceability of production.
 In RFID hundreds of tags read in a short time.

Disadvantages of RFID :
 It takes longer to program RFID Devices.
 RFID intercepted easily even it is Encrypted.
 In an RFID system, there are two or three layers of ordinary household foil to dam the
radio wave.
 There is privacy concern about RFID devices anybody can access information about
anything.
 Active RFID can costlier due to battery.

 RFID System Components


 An RFID solution typically consists of four RFID system components: RFID tags,
RFID Antennas, RFID readers, and RFID software.
1 – RFID Tags
 RFID tags are a common form of RFID transponders, which are devices that emit
radio waves to transmit information about the object to which they are attached. RFID
tags usually contain a microchip that stores and processes information, such as the
tag’s unique identifier and an antenna that allows the tag to receive and transmit radio
signals.
 In the case of RFID, there are two primary types of tags: active and passive. Active
tags have their own power source, which allows them to transmit data over long
distances. Passive tags rely on the power of the reader to transmit data, and they have
a shorter range.
2 – RFID Antennas
 RFID antennas are devices that emit radio waves and receive reflected signals from
RFID tags. The primary link between the tag and the reader, the antenna, is the most
important RFID system component, as it determines the range, speed, and accuracy of
RFID tag reads.
 There are two main types of RFID antennas: linear and circular. Linear antennas emit
a linear polarized signal, while circular antennas emit a circularly polarized signal.
Each has its own advantages and disadvantages, and the type of antenna used will
depend on the specific application.
 When choosing an RFID antenna for an RFID solution, it is important to consider the
operating environment and the desired range. In general, linear antennas are more
efficient for long-range applications, while circular antennas are more efficient for
short-range applications.

3 – RFID Readers
 RFID readers are devices that use antennae to capture and read the radio waves
emitted by RFID tags. The antenna sends out a Radio Frequency (RF) signal that
energizes the tag, allowing the tag to reflect back its unique ID code.
4 – RFID Software
 RFID software is a vital part of any RFID solution. It provides the brainpower behind
the operation, by managing and processing the data collected by the other RFID
system components. It also offers end-to-end visibility of tag-related data and
generates meaningful insights for businesses through data filtering, task automation,
event management, and advanced reporting.

2.4 Bluetooth Technology:

You might also like