Web Technology
Web Technology
TECHNOLOGY
UTTAM K. ROY
Agenda
Background
HTTP Protocol
Domain Name System (DNS)
Simple Mail Transfer Protocol (SMTP)
HyperText Markup Language(HTML)
JavaScript
XML
JSP
| U. K. Roy | [ 10/22/08 ]
HyperText
Tr ansf er
Pr otocol
(H TTP )
Web technology 4
WWW
• World Wide Web—a repository of Information
• Introduced in 1991
• Originated from the CERN High-Energy Physics
laboratory in Geneva, Switzerland.
• Purpose—create a system to handle distributed resource
• A client-server service
• Service provider—called website
| U. K. Roy | [ 10/22/08 ]
Web technology 5
| U. K. Roy | [ 10/22/08 ]
Web technology 7
URL
URL - continued
• Method
– protocol used to retrieve the document (FTP, HTTP, …)
• Host
– a computer where the info is located
– the name/IP address of the computer can be an alias (not
necessary www)
• Port
– optional port # of the server (default is 80)
• Path
– the path name of the file where the info is located
| U. K. Roy | [ 10/22/08 ]
Web technology 9
HTTP - example
• Suppose user enters URL www.yahoo.com/index.html
| U. K. Roy | [ 10/22/08 ]
Web technology 10
time
| U. K. Roy | [ 10/22/08 ]
Web technology 11
| U. K. Roy | [ 10/22/08 ]
Web technology 12
Method Description
POST Used to provide information (e.g. input) to the server
Used to provide a new or replacement document to be
PUT
stored on the server
Similar to PUT except that the request contains only list of
PATCH
differences that should be implemented in the existing file
MOVE Used to copy a file to another location
DELETE Used to remove a document from the server
Used to create a link or links of a document to another
LINK
location
UNLINK Used to delete link created by LINK
OPTION Used by the client to ask the server about abailable options
| U. K. Roy | [ 10/22/08 ]
Web technology 13
| U. K. Roy | [ 10/22/08 ]
Web technology 14
| U. K. Roy | [ 10/22/08 ]
Web technology 15
| U. K. Roy | [ 10/22/08 ]
Web technology 17
| U. K. Roy | [ 10/22/08 ]
Web technology 18
| U. K. Roy | [ 10/22/08 ]
Web technology 19
Header Description
Cache-control Specifies information about caching
Shows whether the connection should be closed or
Connection
not
Date Shows the current date
MIME-version Shows the MIME version used
Upgrade Specifies the preferred communication protocol
| U. K. Roy | [ 10/22/08 ]
Web technology 20
| U. K. Roy | [ 10/22/08 ]
Web technology 21
Header Description
Shows if server accepts the range requested by
Accept-range
client
Age Shows the age of the document
Public Shows the supported list of methods
Specifies the date after which the server will be
Retry-after
available
Server Shows the server name and version number
| U. K. Roy | [ 10/22/08 ]
Web technology 22
| U. K. Roy | [ 10/22/08 ]
Web technology 25
• Nonpersistent • Persistent
– HTTP 1.0 – default for HTTP 1.1
– one TCP connection for – the server leaves the TCP
each request/response connection open for more
3. the client opens a TCP requests after sending a
connection and sends a response
request – client sends requests for
4. the server sends the all referenced objects as
response and closes the soon as it receives base
connection HTML
5. the client reads data and • pipelining
closes the connection – fewer RTT
| U. K. Roy | [ 10/22/08 ]
Web technology 26
client Origin
server
| U. K. Roy | [ 10/22/08 ]
Web technology 27
institutional
cache
| U. K. Roy | [ 10/22/08 ]
Web technology 28
| U. K. Roy | [ 10/22/08 ]
Domain Name
System
(DNS)
Web technology 30
| U. K. Roy | [ 10/22/08 ]
Web technology 31
| U. K. Roy | [ 10/22/08 ]
Web technology 32
| U. K. Roy | [ 10/22/08 ]
Web technology 34
label
| U. K. Roy | [ 10/22/08 ]
Web technology 35
Domain name
• Domain name – a sequence of labels separated by dots
• read from the node up to the root
• full domain name ends with the null
| U. K. Roy | [ 10/22/08 ]
Web technology 36
Domain
• A sub-tree of the Domain Name Space
• Name of a domain is the domain name of the node at
the root of the subtree
| U. K. Roy | [ 10/22/08 ]
Web technology 37
| U. K. Roy | [ 10/22/08 ]
Web technology 38
• Root servers
– zone is a whole tree
– 13 in the world
• Primary server
– loads the information about the the zone from the
disk
• Secondary server
– loads the info from the primary server
• redundancy against failure
| U. K. Roy | [ 10/22/08 ]
Web technology 39
Zones (cnt’d)
separate name
server
| U. K. Roy | [ 10/22/08 ]
Web technology 40
• Generic domains
– registered host according to their generic behavior
• Inverse domain
– used to map an address to a name
• Country domains
– the same format as in generic domain just 2 character
format
• us; nl; jp; fr; in
| U. K. Roy | [ 10/22/08 ]
Web technology 41
Generic domain
Label Description
| U. K. Roy | [ 10/22/08 ]
Web technology 42
Country domains
| U. K. Roy | [ 10/22/08 ]
Web technology 43
Inverse domain
Example: a server wishes to
determine whether the client is
on the authorized list
| U. K. Roy | [ 10/22/08 ]
Web technology 44
Resolution
• Mapping a name to an address or vice-versa
• Resolver
– DNS client
– When a host needs to map an address to a name it calls
resolver that in turn access the nearest DNS server with a
mapping request
– A server either
• responds directly with an info, or
• refers the resolver to other servers
• asks other servers to provide info
• Recursive resolution
• Iterative resolution
| U. K. Roy | [ 10/22/08 ]
Web technology 45
Recursive resolution
flits.cs.vu.nl -> linda.cs.yale.edu
• if the server is the authority for the domain name it checks its data
base and responds, otherwise
• it sends a request to another server…
| U. K. Roy | [ 10/22/08 ]
Web technology 46
Iterative resolution
• The server returns either IP requested address or the IP
address of the server it thinks can resolve the querry
edu-derver.net
yale.edu
cs.vu.nl
| U. K. Roy | [ 10/22/08 ]
Web technology 47
Dynamic DNS
• What if a new host joins the network or a host is
removed or an IP address is changed?
• DNS master file also has to be changed
• Changes so dynamic – a problem!
• Encapsulation
– DNS can use either UDP or TCP, using the well-known
port 53
| U. K. Roy | [ 10/22/08 ]
Web technology 48
DNS Mesaages
Messages
Query Response
| U. K. Roy | [ 10/22/08 ]
Web technology 49
Header Format
• Identification
– 16-bit field used by the client to match response with the query
| U. K. Roy | [ 10/22/08 ]
Web technology 50
Flag Fields
• QR: Query/Response
• OpCode: 0 standard, 1 inverse, 2 server status
• AA: Authoritative
• TC: Truncated
• RD: Recursion Desired
• RA: Recursion Available
• rCode: Status of the error
| U. K. Roy | [ 10/22/08 ]
Web technology 51
Resource Records
• Five tupple in the form
– Domain_name Time_to_live Type Class Value
| U. K. Roy | [ 10/22/08 ]
Web technology 52
Resource Records
$TTL 86400
@ IN SOA rose.itd.jusl.ac.in. rose.itd.jusl.ac.in. (
2006062101
3H
15M
1W
1D )
IN NS rose.itd.jusl.ac.in.
; IN NS galaxy.itd.jusl.ac.in.
IN MX 1 rose.itd.jusl.ac.in.
rose IN A 203.197.107.107
www IN CNAME rose.itd.jusl.ac.in.
mail IN CNAME rose
dns IN CNAME rose
gateway IN CNAME rose
hporacle IN A 172.16.6.97
lotus IN A 172.16.6.107
galaxy IN A 172.16.6.108
nfs IN CNAME lotus
dhcp IN CNAME lotus
nis IN CNAME lotus
| U. K. Roy | [ 10/22/08 ]
Simple Mail Transfer
Protocol(SMTP)
Web technology 54
SMTP
• Provides electronic mail(email) services using email addresses
– Sending a single message to one or more recipients
– Sending messages that include text, graphics, voice and video
• Asynchronous service
| U. K. Roy | [ 10/22/08 ]
Web technology 55
SMTP
• SMTP Client/Server
– User Agent(UA)
– Mail Transfer Agent(MTA)
| U. K. Roy | [ 10/22/08 ]
Web technology 56
SMTP
• Relay MTA—used to store mail in an intermediate stage
| U. K. Roy | [ 10/22/08 ]
Web technology 57
SMTP
• Mail Gateway—used when either side does not use
TCP/IP protocol
| U. K. Roy | [ 10/22/08 ]
Web technology 58
SMTP(User Agent)
• Defined in SMTP without any implementation details
• Normally a program that provides an interface to send and receive mails
• Example
– Elm, Pine, MH, Berkley Mail, Zmail, Mush
– Eudora, Webmail etc.
• Sending Mail
– Envelop
– Message
• Header
• Body
• Receiving Mail
– UA checks mailbox periodically
| U. K. Roy | [ 10/22/08 ]
Web technology 59
email format
| U. K. Roy | [ 10/22/08 ]
Web technology 60
Addresses
| U. K. Roy | [ 10/22/08 ]
Web technology 61
Delayed Delivery
• Sender-site Delay
– Sender site stipulates a spooling
system
– UA creates message and forwards it
to Spooling system to store
– MTA checks spool periodically for
new mail
– Delay depends upon following
conditions
• IP address of the server is obtained
through DNS
• Receiver is ready or not
– If the message can not be delivered,
it is returned to the sender
| U. K. Roy | [ 10/22/08 ]
Web technology 62
Delayed Delivery
• Receiver-site Delay
– After receiving mail, it is
stored in respective mailbox
for reading
– Example
• Sendmail uses individual files
to store mails
• Intermediate Delay
– Mails can be stored by
intermediate MTAs to send
them when appropriate
| U. K. Roy | [ 10/22/08 ]
Web technology 63
Aliases
• One-to-many Expansion
– Allows one name, called alias to represent several different
email addresses
– A list of email addresses is associated with the alias using a
database map
– If an alias is defined, mail destined to that name is sent to
every recipient’s of the list
– If not defined, mail is sent to the user only
| U. K. Roy | [ 10/22/08 ]
Web technology 64
Aliases
| U. K. Roy | [ 10/22/08 ]
Web technology 65
One-to-many expansion
| U. K. Roy | [ 10/22/08 ]
Web technology 66
Aliases
• Many-to-one Expansion
– A user can have many different email addresses
– An alias database is used for this map
– Single mailbox is used
– Mails destined to all theses email addresses are sent to single user
| U. K. Roy | [ 10/22/08 ]
Web technology 67
Many-to-one expansion
| U. K. Roy | [ 10/22/08 ]
Web technology 68
| U. K. Roy | [ 10/22/08 ]
Web technology 69
SMTP
| U. K. Roy | [ 10/22/08 ]
Web technology 70
SMTP Messages
Messages
Commands Response
| U. K. Roy | [ 10/22/08 ]
Web technology 71
SMTP Messages(Commands)
• Commands
– Commands are sent from
client to server
– First five are mandatory
| U. K. Roy | [ 10/22/08 ]
Web technology 72
SMTP Messages(Responses)
• Responses
– Commands are sent from server to client
– 3 digit code of the following form
• 2yz(positive completion)
– Requested command has been successfully completed and new
commands can be started
• 3yz(positive intermediate response)
– Requested command has been accepted, but recipient needs more
information for completion
• 4yz(transient negative completion reply)
– Command has been rejected, but error is temporary. The command
can be sent again
• 5yz(permanent negative completion reply)
– Command has been rejected permanently. The command can not be
sent again during this session
| U. K. Roy | [ 10/22/08 ]
Web technology 73
SMTP Messages(Responses)
| U. K. Roy | [ 10/22/08 ]
Figure 22-15 Web technology 74
Connection establishment
| U. K. Roy | [ 10/22/08 ]
Web technology 75
SMTP
• An Example
| U. K. Roy | [ 10/22/08 ]
Web technology 76
Connection Termination
| U. K. Roy | [ 10/22/08 ]
Web technology 77
MIME
• SMTP uses NVT 7-bit ASCII character set
– Can not be used for languages that are not supported by 7-bit ASCII
characters. E.g French, German, Hebrew, Russian, Chinese,
Japanese etc.
– Can not be used to send binary data or audio or video
| U. K. Roy | [ 10/22/08 ]
Web technology 78
MIME
| U. K. Roy | [ 10/22/08 ]
Web technology 79
MIME
• Defines five additional headers
– MIME-version
• MIME-Version: 1.1
– Content-Type
• Type of the data used in the body
• Content-Type: <type/subtype; parameters>
• Subtype
– Text, Message, Image, Video, Audio etc
– Content-Transfer-Encoding
• Encoding to be used
• Content-Transfer-Encoding: <type>
• Type
– 7bit, 8bit, binary, Base64 etc.
– Content-Id
– Content-Description
| U. K. Roy | [ 10/22/08 ]
Figure 22-20 Web technology 80
Base64
| U. K. Roy | [ 10/22/08 ]
Figure 22-21 Web technology 81
Quotedprintable
| U. K. Roy | [ 10/22/08 ]
Web technology 82
Mail Delivery
| U. K. Roy | [ 10/22/08 ]
Code Division Multiple
Access(CDMA)
Web technology 84
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy | [ 10/22/08 ]
Web technology 85
100,000,000
90,000,000
80,000,000
70,000,000
60,000,000
50,000,000
40,000,000
30,000,000
20,000,000
10,000,000
0
Se De Ma Ju Se De Ma Ju Se De Ma Ju Se De Ma
p- c- r- n- p- c- r- n- p- c- r- n- p- c- r-
97 97 98 98 98 98 99 99 99 99 00 00 00 00 01
Asia Pacific North America Caribbean & Latin America Europe, Middle East, & Africa
| U. K. Roy | [ 10/22/08 ]
Web technology 86
89 90 93 94 95 96 97 98 99 00
Nov. 88 CDMA IS-95 Commercial Nov. 99 Over 74
CDMA standard CDMA launched in HDR million
Cellular issued So. Korea mobility subscribers*
Concept demonstrated
Korea selects PCS PrimeCo More than 90
CDMA turns up nation- 83 CDMA licensees
wide PCS service operators
in 14 cities in cdma2000 1x
35 nations* Commercial
Sprint PCS Commercial
selects HDR
systems in
CDMA for Standardized as
100 U.S. cities
nationwide 1x EV
Nov. 89
San Diego network Japan selects CDMA subscribers
CDMA CDMA reach over 12.5
Open U.S. PCS standard million in 30
Demonstration countries on
First commercial 5 continents*
-Power Control CDMA system
-Rake Receiver in Hong Kong using First HDR
-Soft Handoff QUALCOMM phones call demonstrated
| *U. K. Roy
According to |CDG, EMC [ 10/22/08 ]
Web technology 87
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy | [ 10/22/08 ]
Web technology 88
Cellular Network
PSTN
MSC
Forward
Reverse
Cell Site
Cell Site
| U. K. Roy | [ 10/22/08 ]
Web technology 89
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy | [ 10/22/08 ]
Web technology 90
CDMA
• ACCESS SCHEMES
– Frequency Division Multiple Access
(FDMA)
• Each station is allocated its own frequency.
| U. K. Roy | [ 10/22/08 ]
Web technology 91
H I I H HI
F re q u e n c y C h a n n e l 1
GO
O G GO
F re q u e n c y C h a n n e l 2
| U. K. Roy | [ 10/22/08 ]
Web technology 92
H I C o m m o n F r e q u e n c y C h a n n e l H I
I O H G
G O G O
| U. K. Roy | [ 10/22/08 ]
Web technology 93
| U. K. Roy | [ 10/22/08 ]
Web technology 94
| U. K. Roy | [ 10/22/08 ]
Web technology 95
CDMA
• CODING
| U. K. Roy | [ 10/22/08 ]
Web technology 96
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy | [ 10/22/08 ]
Web technology 97
CDMA
• THE SPREAD SPECTRUM
| U. K. Roy | [ 10/22/08 ]
Web technology 98
CDMA
• THE DIRECT SEQUENCE SPREAD SPECTRUM
– Example
| U. K. Roy | [ 10/22/08 ]
Web technology 99
CDMA
• THE SPREADING PROCESS
| U. K. Roy | [ 10/22/08 ]
Web technology 100
CDMA
| U. K. Roy | [ 10/22/08 ]
Web technology 101
Tx 0 1 0 1 1 0 1 0 Rx
1 0 0 1 0 1 1 0
U s e r 1 D a t a : 0 1
B TS M o b ile U s e r 1 D a t a : 0 1
U s e r 2 D a t a : 1 0
U s e r 1 C o d e : 0 1 0 1 U s e r 1 C o d e : 0 1 0 1
U s e r 2 C o d e : 0 1 1 0
| U. K. Roy | [ 10/22/08 ]
Web technology 102
| U. K. Roy | [ 10/22/08 ]
Web technology 103
CDMA
• The chip sequences are chosen to be pair wise orthogonal:
– Normalized inner product of any two chip sequences, S and
T(written as S.T) is 0. Mathematically
1 m
S.T = ∑ Si .Ti = 0
m i =m
• Following properties also hold
1 m 1 m 2 1 m
S.S = ∑ Si .Si = ∑ Si = ∑ (± 1) 2 = 1
m i =1 m i =1 m i =1
1 m 1 m
S.S = ∑ Si .S = − ∑1 = −1
m i =m m i=m
| U. K. Roy | [ 10/22/08 ]
Web technology 104
| U. K. Roy | [ 10/22/08 ]
Web technology 105
CDMA multiplexing
| U. K. Roy | [ 10/22/08 ]
Web technology 106
Decoding CDMA
• The input to the demultiplexer is a 4-tuple of values
between -4 and +4.
• Each station takes the four values, and multiplies the
values by the chip sequence.
• The resulting values are then summed to obtain a single
value. The result will always be -4, +4, or 0.
• Divide the result by 4 to get a value -1, +1, or 0.
• Decode this result to a data bit of 0, 1, or no data.
| U. K. Roy | [ 10/22/08 ]
Web technology 107
CDMA Demultiplexing
| U. K. Roy | [ 10/22/08 ]
Web technology 108
CDMA
A: 0 0 0 1 1 0 1 1 A: (–1 –1 –1 +1 +1 –1 +1 +1)
B: 0 0 1 0 1 1 1 0 B: (–1 –1 +1 –1 +1 +1 +1 –1)
C: 0 1 0 1 1 1 0 0 C: (–1 +1 –1 +1 +1 +1 –1 –1)
D: 0 1 0 0 0 0 1 0 D: (–1 +1 –1 –1 –1 –1 +1 –1)
– – 1 – C S1 = (–1 +1 –1 +1 +1 +1 –1 –1)
– 1 1 – B+C S2 = (–2 0 0 0 +2 +2 0 –2)
1 0 – – A+B´ S3 = ( 0 0 –2 +2 0 –2 0 +2)
1 0 1 – A+B´+C S4 = (–1 +1 –3 +3 +1 –1 –1 –1)
1 1 1 1 A+B+C+D S5 = (–4 0 –2 0 +2 0 +2 +2)
1 1 0 1 A+B+C´+D S6 = (–2 –2 0 –2 0 –2 +4 0)
S1 C = (+1 +1 +1 +1 +1 +1 +1 +1)/8 = 1
S2 C = (+2 +0 +0 +0 +2 +2 +0 +2)/8 = 1
S3 C = (+0 +0 +2 +2 +0 –2 +0 –2)/8 = 0
S4 C = (+1 +1 +3 +3 +1 –1 +1 –1)/8 = 1
S5 C = (+4 +0 +2 +0 +2 +0 –2 +2)/8 = 1
S6 C = (+2 –2 +0 –2 +0 –2 –4 +0)/8 = –1
| U. K. Roy | [ 10/22/08 ]
Web technology 109
CDMA
Proof:
S C = (A + B´ + C) C = A C + B´ C + C C = 0 + 0 + 1 = 1
| U. K. Roy | [ 10/22/08 ]
Web technology 110
A n ten na
V oic e A /D E n c o d e r &
C o n v e rt er V o c od er
I n t e r le a v e r
D /A
S pre ad er
RF
Code
G en era to r
| U. K. Roy | [ 10/22/08 ]
Web technology 111
| U. K. Roy | [ 10/22/08 ]
Web technology 112
P u ls e C o d e d
M o d u la tio n V o c od ed
(P C M ) V o ic e
A /D VO CODE R 1 0 1 1
| U. K. Roy | [ 10/22/08 ]
Web technology 113
P u ls e C o d e d
Vocoded D e m o d u la t i o n
V o ic e (P C M )
1 0 1 1 V OCO DER A /D
| U. K. Roy | [ 10/22/08 ]
Web technology 114
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy | [ 10/22/08 ]
Web technology 115
Section Introduction
■ Universal Frequency Reuse
■ Power Control
■ Soft Handoff
| U. K. Roy | [ 10/22/08 ]
Web technology 116
C
A
C DMA201. 1 4
| U. K. Roy | [ 10/22/08 ]
Web technology 117
E F D A A A
C B E F A A A A
G C B A A A
D A G C A A A A
F D A A A A
B E F D A A A A
C B E A A A
A G C B A A A A
N=7 N=1
| U. K. Roy | [ 10/22/08 ]
Web technology 118
Increased Power
Decreased
Power
Decreased Increased
Power Power
Decreased Power
Near/Far Problem
Increased Power Path Loss
Fading
| U. K. Roy | [ 10/22/08 ]
Web technology 119
• All users are controlled so that their signals reach the base station at
approximately the same level of power
• CDMA uses a 2-step Power Control process on the Reverse Link
– Estimate made by the mobile: Open Loop
– Correction supplied by the BS: Closed Loop
| U. K. Roy | [ 10/22/08 ]
Web technology 120
| U. K. Roy | [ 10/22/08 ]
Web technology 121
| U. K. Roy | [ 10/22/08 ]
Web technology 122
40
30
FM (AMPS)
20
Transmit
Power 10
CDMA
0
-10
| U. K. Roy | [ 10/22/08 ]
Web technology 124
| U. K. Roy | [ 10/22/08 ]
Web technology 125
dB -20 τ 3 Correlator 3
PN
Σ
Direct Multi
-30 XMTR
Path Paths
-40
τ ν Correlator n
-12 0 +12
Chips
1 Chip = 0.83 Microseconds
| U. K. Roy | [ 10/22/08 ]
Web technology 126
| U. K. Roy | [ 10/22/08 ]
Web technology 127
What is Handoff?
Cell Cell
| U. K. Roy | [ 10/22/08 ]
Web technology 128
| U. K. Roy | [ 10/22/08 ]
Handoffs in Analog and
Web technology 129
TDMA Networks
| U. K. Roy | [ 10/22/08 ]
Web technology 130
– Hard Handover
• Break before make
– Soft Handover
• Make before break—possible a mobile station can be connected to
more than one BTS simultaneously
• Requires less power—reduces interference
| U. K. Roy | [ 10/22/08 ]
Web technology 131
BSC
BTS
BTS
PSTN
MTSO BSC
| U. K. Roy | [ 10/22/08 ]
Web technology 132
Soft Handoff
Cell B
Cell A
Cell B
Cell A
Cell B
Cell A
| U. K. Roy | [ 10/22/08 ]
Web technology 133
Soft Handoff
Frame Selection
BSC
Selector
| U. K. Roy | [ 10/22/08 ]
Web technology 134
| U. K. Roy | [ 10/22/08 ]
Web technology 135
| U. K. Roy | [ 10/22/08 ]
Web technology 136
FDMA
(Analog) CDMA
MTSO BSC
| U. K. Roy | [ 10/22/08 ]
Web technology 137
Idle Handoff
Access
Pilot
BTS BTS
Pilot
Paging
| U. K. Roy | [ 10/22/08 ]
Web technology 138
Agenda
BACKGROUND
THE CELLULAR SYSTEM
MULTIPLE ACCESS SYSTEMS
CDMA INTERNALS
FEATURES OF CDMA
ADVANTAGES OF CDMA
| U. K. Roy | [ 10/22/08 ]
Web technology 139
| U. K. Roy | [ 10/22/08 ]
Web technology 140
| U. K. Roy | [ 10/22/08 ]
Web technology 142
MOS
Voice clarity or speech quality is measured by
a Mean Order Score (MOS) and Bit/Frame Error Rates
| U. K. Roy | [ 10/22/08 ]
Web technology 143
| U. K. Roy | [ 10/22/08 ]
Web technology 144
| U. K. Roy | [ 10/22/08 ]
Web technology 145
CDMA Capacity
FDMA
TDMA
CDMA
C = W log2(1 + S/N)
C = Capacity (bps)
W = Bandwidth (Hz)
S = Signal Power
N = Noise Power
| U. K. Roy | [ 10/22/08 ]
Web technology 146
Frequency Reuse
n=7 n=1
Capacity Comparison
| Note:
U. K.ForRoy | the same frequency is reused in all 3 sectors.
CDMA [ 10/22/08 ]
Web technology 149
| U. K. Roy | [ 10/22/08 ]
Web technology 150
Coverage
• Link budget equal to or better than AMPS & GSM
• Due to:
Spread-spectrum processing gain
Strong channel coding, reducing Eb/No requirement
| U. K. Roy | [ 10/22/08 ]
Web technology 151
CDMA Coverage
M
GS
CDMA
13 kbps
CD kbp
8
M s
A
| U. K. Roy | [ 10/22/08 ]
Web technology 153
| U. K. Roy | [ 10/22/08 ]
Web technology 154
Compatibility
1.25 MHz
CDMA2000
1xEV
3 Operators
98 Operators
DATA
1.25 MHz 1.25 MHz
up to 2.0 Mbps
DATA
1.25 MHz DATA Up to 307 kbps
DATA Up to 64 kbps
14.4 kbps VOICE
CDMA is VOICE VOICE
INCREASED VOICE
CAPACITY
the Only 95A 95B CDMA2000 WCDMA /
Technology cdmaOne 1X / 1xEV CDMA2000
That Protects
Your Investment
A A B A B 1X/ A B 1X/ World
1xEV 1xEV Phone
Compatibility
CDMA Mobile Terminals are Forward & Backward Compatible
IS-95A to 1X
IS-95A/B to 1X
IS-95A/B to 1X
1x to 1xEV-DO
| U. K. Roy | [ 10/22/08 ]
Web technology 157
Customer Satisfaction
■ Voice Quality
■ Battery Life
■ No Crosstalk
■ Privacy
| U. K. Roy | [ 10/22/08 ]
Switching Networks
Web technology 159
Switching Networks
• Why switching networks?
– Two stations can communicate if they are connected
– Stations can be connected in two ways
– Directly
– Via switched networks
– Problems of connecting
stations directly
Devices may be far apart—
expensive to setup a dedicated link
A station may not require a link to
every other stations all the time
No of links required is N(N-1)/2
Cost grows with the square of the
number of devices
| U. K. Roy | [ 10/22/08 ]
Web technology 160
Switching Networks
• Solution
– Attach a communication network—called switched network
| U. K. Roy | [ 10/22/08 ]
Web technology 161
Switching Networks
• Example
• Observations
– Some nodes connect only to
other nodes
– The sole task is the internal
switching of data
– Network is not fully connected
in general
– Node to node links are multiplexed links using either FDM or TDM
| U. K. Roy | [ 10/22/08 ]
Web technology 162
Switching Networks
– Switching network
Circuit Switching
Telephone network
Packet switching
| U. K. Roy | [ 10/22/08 ]
Web technology 163
| U. K. Roy | [ 10/22/08 ]
Web technology 164
Single-Node Network
• Collection of stations are attached to a central switching node
• Central switch establishes a dedicated connection between two
devices that wish to communicate
• Digital switch
• Provides a transparent signal
path between any pair of
connected devices
• Network interface
• Hardware needed to connect
devices to the network
• Control Unit
• Establishes connection
(generally on demand basis)
• Maintains connection during
data communication
• Tears down connection
| U. K. Roy | [ 10/22/08 ]
Web technology 165
Switch
• The switch hierarchy
– Five classes of
switching offices
• 10 regional offices
• 67 sectional offices
• 230 primary offices
• 1300 toll offices
• 19,000 end offices
– Calls are generally
connected at lowest
possible lable
| U. K. Roy | [ 10/22/08 ]
Web technology 166
Digital Switches
• Digital switch
• Space Division switch
• Time division switch
• Crossbar switch
– N input lines, N output lines
– N2 number of cross points
– Semiconductor switch is used to enable a cross point to connect an input to
output
| U. K. Roy | [ 10/22/08 ]
Web technology 167
• Problems
– Number of cross points?
Number of cross points grows with the square of the number of attached stations
– Only one path exists between pair of stations—Loss of cross points ?
Prevents connection between two devices whose line intersect at that cross point
– Number of cross points used?
Cross points are inefficiently used (at most N out of N2)
| U. K. Roy | [ 10/22/08 ]
Web technology 168
| U. K. Roy | [ 10/22/08 ]
Web technology 169
– 3rd stage: kN
2
N
– Total: 2kN + k
n
– Implication of K
– No of distinct paths from input to output
| U. K. Roy | [ 10/22/08 ]
Web technology 170
– Blocking switch
– If one or more input-output pair can not be connected even if they are
available
– Example
– N=9, n=3, k=3
– Heavier lines indicate the
lines already in use
– Input line 9 can not be
connected to either 4 or 6
| U. K. Roy | [ 10/22/08 ]
Web technology 171
Non-blocking Switch
• Condition for a switch to be non-blocking
• For a switch to be non-blocking
• k = 2n-1
• Total number of cross points in a three
stage switch 2
N
N x = 2kN + k
n 2
N
N x = 2(2n − 1) N + (2n − 1)
n
• Nx depends on number of switches (N/n)
• For optimal number of crosspoints
dN x
=0
dn
1
N 2
⇒ n = and
2
( N x ) opt = 4N ( )
2 N −1
| U. K. Roy | [ 10/22/08 ]
Web technology 172
• Number of cross
points? 4 N ( 2 N − 1)
• 2N instead of
| U. K. Roy | [ 10/22/08 ]
Web technology 173
• Example
• During 1st time slot input gate
of 1 and output gate of 3 are
enabled
| U. K. Roy | [ 10/22/08 ]
Web technology 174
• Capacity?
• For 100 lines with 19.2 Kbps each, bus must be at least 1.92 Mbps
• Statistical TDM
• No fixed time slot for input, they are allocated on demand
• May be blocking
• Example:
• 200 stations 19.2 Kbps each
• Bus speed 2 Mbps
• About a half of devices can be connected at any time
• Varying data rate
• 9600-bps line gets one time slot while 19.2 Kbps line gets two time slots
• Circuit switching?
• TDM ?
| U. K. Roy | [ 10/22/08 ]
Web technology 175
• Example:
• Station 4 is connected to 0
• Station 7 is connected to 1
| U. K. Roy | [ 10/22/08 ]
Web technology 176
TSI Mechanism
• Disadvantage
• Before constructing the output
frame, entire input frame mustr be
read—delay
• Example:
• n lines
• Memory access time is T µs
• Then time needed to process a
frame is 2nT
• For a frame period of 125 µs
and T=100 nsec
• number of lines that can be
allocated is 625
| U. K. Roy | [ 10/22/08 ]
Web technology 177
| U. K. Roy | [ 10/22/08 ]
Web technology 178
• Example:
• Telephone line
• Bandwidth 4KHz/line
• Data rate 8Kbps/line
• Memory access time 100 nsec
• Maximum number of lines that can be allocated is 625
| U. K. Roy | [ 10/22/08 ]
Web technology 179
| U. K. Roy | [ 10/22/08 ]
Web technology 181
• ISDN services
• Voice services
• Instant call setup
• Telephones that displays caller’s telephone number, name, address while ringing
• Call forwarding
• Conference calls worldwide
• Non-voice services
• Remote electric meter reading
• On-line medical, burglar, smoke alarms that automatically call the hospital, police
or fire department and give their address to speed up response
| U. K. Roy | [ 10/22/08 ]
Web technology 182
• ISDN Interface
• The ISDN bit pipe supports following channels
• A – 4-kHz analog telephone channel
• B – 64 Kbps digital PCM channel for voice or data
• C – 8 or 16 Kbps digital channel
• D – 16-Kbps digital channel for out-of-band signaling
• E – 16-Kbps digital channel for internal ISDN signaling
• H – 384, 1536 or 1920-Kbps digital channel
• The ISDN bit pipe supports following channels
• Basic rate: 2B+1D
• Primary rate: 23B + 1D(U.S. and Japan) or 30B + 1D
(Europe)
• Hybrid: 1A + 1C
| U. K. Roy | [ 10/22/08 ]
Web technology 183
| U. K. Roy | [ 10/22/08 ]
Web technology 184
ATM Switch
• Some input lines and some output (normally equal) lines
| U. K. Roy | [ 10/22/08 ]
Web technology 185
• Solution
1. Provide a queue for each input
line—if two or more cells collide,
one is chosen (randomly or
cyclically) for delivery, rest are
held for next cycles
• Head of line blocking—when a cell has to held up, it blocks rest of the cells behind
it even they could otherwise be switched
• To avoid head of line blocking a recirculating path can be used to send the losing
cells back to the input side
• Care must be taken to avoid out of order delivery
| U. K. Roy | [ 10/22/08 ]
Web technology 186
| U. K. Roy | [ 10/22/08 ]
Web technology 187
Knockout Switch
• Uses multiple limited number of output queue
• Concentrator selects a fraction of total cells eliminating (knockout) the rest
| U. K. Roy | [ 10/22/08 ]
Web technology 188
Batcher-Banyan Switch
• Basic element
0
0 0 0 0 0 0
1
4 4 2 2 1 1
2
1 1 1 1 2 2
3
5 5 3 3 3 3
4
2 2 4 4 4 4
5
6 6 6 6 5 5
6
3 3 5 5 6 6
7
7 7 7 7 7 7
| U. K. Roy | [ 10/22/08 ]
Web technology 189
Batcher-Banyan Switch
000001 01 000010 02 000100 04
010011 23 001011 13 001101 15
100101 45 100110 46 010110 26
110111 67 101111 57 011111 37
Stage 0 Stage 1 Stage 2
0
0 0 0 0 0 0
1
4 4 2 2 1 1
2
1 1 1 1 2 2
3
5 5 3 3 3 3
4
2 2 4 4 4 4
5
6 6 6 6 5 5
6
3 3 5 5 6 6
7
7 7 7 7 7 7
| U. K. Roy | [ 10/22/08 ]
Web technology 190
Example
3 000101
4
001000
5
010110
6
7
| U. K. Roy | [ 10/22/08 ]
Web technology 191
| U. K. Roy | [ 10/22/08 ]
Web technology 192
Batcher Switch
| U. K. Roy | [ 10/22/08 ]
Web technology 193
| U. K. Roy | [ 10/22/08 ]
Web technology 194
Switch
| U. K. Roy | [ 10/22/08 ]
B RIDGE
S
Web technology 196
Introduction
• Many organizations have multiple (possibly different type) LANs
• Bridges can be used to connect them
• Operates at the data link layer
• Examples where bridges are used
5.
• Multiple LANs come into existence due to the autonomy of their owners
• Later there is a need for interaction, so bridges are needed
•
• Organizations may be geographically separated by considerable distance
• Cheaper connect them using bridges
•
• LAN is divided into separate LANs
to accommodate load
| U. K. Roy | [ 10/22/08 ]
Web technology 197
Examples(cont.)
1.
• Limitation on the maximum physical distance between two machines in some LANs
• e.g. 2.5 Km for IEEE 802.3
• Only option is to partition the LAN and install bridges between segments
2.
• Reliability increases
• Bridges can be inserted critical places to prevent bringing down entire system
• Unlike repeaters, bridges can be programmed to exercise some discretion about what
it should forward and what it should not
•
• Security reason
• By inserting various places and being careful not to forward sensitive traffic, it is
possible to isolate parts of the network so that its traffic cannot escape and fall into the
wrong hands
| U. K. Roy | [ 10/22/08 ]
Web technology 198
Operation of a Bridge
| U. K. Roy | [ 10/22/08 ]
Web technology 199
| U. K. Roy | [ 10/22/08 ]
Web technology 200
• Timer problem
• —faster LAN starts timer after forwarding a message to a slower LAN and
waits for the acknowledgement
• —timer expires before the message is delivered
• —source just retransmits the entire message increasing the load
| U. K. Roy | [ 10/22/08 ]
Web technology 202
Transparent Bridge
• Challenges
• Topology change
• Station moves from one LAN to another
• Attach arrival time in each entry of the lookup table
• Update it with new one
• Station is unplugged
• Scan the lookup table periodically and drop all entries a few minutes old
• Increased reliability
• Problems
• Cycle for ever
• Solution
• Spanning tree bridges
| U. K. Roy | [ 10/22/08 ]
Web technology 205
| U. K. Roy | [ 10/22/08 ]
Web technology 206
| U. K. Roy | [ 10/22/08 ]
Web technology 207
• Construction of path
• Each LAN has a unique 12-bit number (LAN id)—used to identify each
LAN uniquely
• Each bridge has a 4-bit number(Bridge id)—used to identify each bridge
in the context of its LANs
• Two bridges far apart may both have same number, but two bridges
between the same two LANs must have different bridge number
| U. K. Roy | [ 10/22/08 ]
Web technology 208
• Function of bridges
• A source routing bridge is only interested in those frames with high-order bit
of the destination set to 1
• For each such frame, it scans the route included in the frame header looking
for the number of LAN on which the frame arrived
• If the LAN number is followed by its own bridge number(i.e. the bridge is on
the path), the bridge forwards the frame onto the LAN whose number follows
its bridge number in the path
• If the incoming LAN number is followed by the number of some other bridge,
it does not forward the frame
| U. K. Roy | [ 10/22/08 ]
Web technology 209
Implementation
• Software:
• Bridge runs in promiscuous mode, copying all frames to its memory to see
they have the high-order destination bit set to 1. If so, frame is inspected;
otherwise not
• Hybrid:
• Bridge’s LAN interface inspects the high-order destination bit and only
accepts frames with the bit set.
• easy to build into hardware and greatly reduces the number of frames the
bridge must inspect
• Hardware:
• Bridge’s LAN interface not only inspects the high-order destination bit, but it
also scans the route to see if this bridge must do forwarding
• frames that must actually be forwarded are given to the bridge
• requires complex hardware but wastes no CPU cycles as irrelevant frames
are screened out
| U. K. Roy | [ 10/22/08 ]
Web technology 210
| U. K. Roy | [ 10/22/08 ]
Web technology 211
| U. K. Roy | [ 10/22/08 ]
Web technology 212
• Example
• No of frames at in LAN N is 3N-1
• N=13, no of frames is more than half a million—causing congestion
• Solution
• When an unknown frame arrives, it is flooded, but only along spanning tree
—total volume of frames is linear with the size of the network not exponential
• Improvement
• Once a host is discovered a route to a certain destination, it stores the route
in a cache, so that the discovery process will not have to be run next time for
this destination.
| U. K. Roy | [ 10/22/08 ]
Web technology 213
| U. K. Roy | [ 10/22/08 ]
Web technology 214
END
| U. K. Roy | [ 10/22/08 ]
Web technology 215
Example
| U. K. Roy | [ 10/22/08 ]
Web technology 216
Example
| U. K. Roy | [ 10/22/08 ]
H IGH-
S PE ED
LAN S
Web technology 218
High-Speed LANs
• Motivation
• 802 LANs and MAN are (generally) based on copper wire
• Work fine for short distance and low speed
• For longer distance and high speed, optical fiber must be used
• Advantage of optical fiber
• High bandwidth
• Not affected by electromagnetic interference from heavy machinery, power
surges, or lightning
• Impossible to wiretap without detection—Excellent security
• High-Speed LANs
• FDDI (Fiber Distributed Data Interface)—uses optical fiber
• Fast Ethernet—uses copper wire
| U. K. Roy | [ 10/22/08 ]
Web technology 219
FDDI
• Features
• Topology
• Ring topology
• Data rate
• 100 Mbps
• Distance
• 200 km
• Capacity
• 1000 stations
• Error Rate
• 1 out of 2.5x1010
• Usage
• Can be used as any of the 802 LANs
• Can be used as a backbone to connect copper LANs
| U. K. Roy | [ 10/22/08 ]
Web technology 220
FDDI
• Cabling
• Uses multimode fibers
Multimode fiber
• Uses LEDs instead of laser
• Due to lower cost Single mode fiber
• Does not harm human body (eye)
• FDDI cabling consists of two fibers one transmitting clockwise and another
transmitting anticlockwise
| U. K. Roy | [ 10/22/08 ]
Web technology 221
FDDI
• Cabling
• If both breaks at a point, two rings can be joined into a single ring
• Each station contains relays that can be used to join two rings or bypass
the station in the event of station problem
FDDI
• Frame Format
• MAC Protocol
• Similar to 802.5
• To transmit a frame, a station must capture token. Then it transmits a
frame and removes when it comes back
• Difference
• Mac layer in FDDI puts a new token as soon as it has finished transmitting
its frames
• This is necessary to increase performance as the length of the ring could be 200
km long
• FDDI permits synchronous frames for circuit-switched PCM or ISDN data
| U. K. Roy | [ 10/22/08 ]
Web technology 223
Fast Ethernet
• FDDI is too complex, costly due to the use of optical fiber
• Solution?
• Keep 802.3 as it was, but make it faster
• Redo it totally and give it lots of new feature such as real-time traffic and
digitized voice
• IEEE chose the first one for the following reasons
• The need to be backward compatible with thousands of existing LANs
• The fear that a new protocol might have unforeseen problems
• The desire to get the job done before the technology changed
• 802.3u evolves—called fast Ethernet
• Supports a data rate of 100 Mbps
• Uses hubs/switches—vampire tap or BNC connectors are not allowed
• Cabling
Name Cable Max. Segment Advantage
100Base-T4 Twisted pair 100 m Uses category 3 UTP
100Base-TX Twisted pair 100 m Full duplex 100 Mbps
100Base-F Optical fiber 2000 m Full duplex at 100 Mbps; long run
| U. K. Roy | [ 10/22/08 ]
N ETW ORK
S EC URITY
Web technology 225
Athentication Protocols
• Authentication is the technique by which a process verifies that its
communication partner is who it is supposed to be and not an imposter
• Authorization/Authentication
• Authentication Protocol Model
• An initiating user (or process/party), say, Alice wants to establish a secure
communication with a second user Bob.
• Example
• Bob is a banker and Alice is a customer
• Alice starts out by sending a message either to Bob or to a trusted Key
Distribution Center(KDC)
• Several other messages will be exchanged during the communication
• As these messages are being sent, a nasty intruder, say, Trudy may
intercept, modify, or replay them in order to trick Alice and Bob or just to
gum up the works
• Nevertheless, when the protocol has been completed, Alice is sure she is
talking to Bob and Bob is sure he is talking to Alice
• They will establish a secret session key to encrypt messages that will be
exchanged during communication
| U. K. Roy | [ 10/22/08 ]
Web technology 226
• Assumptions:
• Alice and Bob already share a secret key, KAB (A for Alice and B for Bob).
• This shared key might have been agreed upon in person or in any event
not on the insecure network
• A Challenge response protocol
• Notation used:
• A, B are identities of Alice and Bob respectively
• Ri’s are the challenges, subscript being the challenger
• Ki’s are keys, i indicates owner,
• Ks is the session key
| U. K. Roy | [ 10/22/08 ]
Web technology 227
Alice
Bob
3
random number, RB, and sends it back KAB(RB)
to “Alice”
4
• Alice then encrypts the message with RA
the key shared with Bob and sends the 5
cipher text, KAB(RB) back. KAB(RA)
Alice
Bob
2 RB, KAB(RA)
• Above protocol works but it contains
extra messages
• These messages can be eliminated by
combining information as 3
KAB(RB)
Is it an improvement over the original one?
No, by using reflection attack, Trudy can defeat this protocol
| U. K. Roy | [ 10/22/08 ]
Web technology 228
Trudy
Bob
• Bob responds as usual with his own 3 A, RB
challenge RB
4 RB2, KAB(RB)
• Now Trudy is stuck. What can she do?
She does not know KAB(RB). She can open 5 KAB(RA)
a second session with message 3
supplying RB taken from message 2 as her
challenge
• Now Trudy has the missing information, so she can complete the first session and
abort the second one. Bob is know convinced that Trudy is Alice
| U. K. Roy | [ 10/22/08 ]
Web technology 229
| U. K. Roy | [ 10/22/08 ]
Web technology 230
Bob
containing (n, g, gx mod n)
| U. K. Roy | [ 10/22/08 ]
Web technology 231
1 7, 3, 38 mod 7
• Alice initiates the key exchange
protocol by sending Bob a message
containing (7, 3, 38 mod 7) 2
310 mod 7
Alice
Bob
• Bob responds by sending a message
containing (310 mod 7) Alice computes Bob computes
(310 mod 7)8 =380 (38 mod n)10 =380
mod 7= 2 mod 7 = 2
| U. K. Roy | [ 10/22/08 ]
Web technology 232
• Trudy picks z, and sends message 2 to Bob, using correct g and n obtained from
message 1. She also sends message 3 back to Alice
• Later, Bob sends message 4 to Alice which Trudy again intercepts and keeps.
• Now everybody does the modular arithmetic. Alice computes secret key gxz mod n so
does TrudyAlice thinks she is talking to Bob, so she establishes a session key
(with Trudy). So does Bob.
• Both are under illusion that they have a secure channel to each other, but actually
not
Alice Trudy Bob
picks x picks z picks y
1 n, g, gx mod n 2 n, g, gz mod n
3
Trudy
gz mod n
Alice
Bob
4
gy mod n
| U. K. Roy | [ 10/22/08 ]
Web technology 233
• Problems
• To talk to n people n, shared secret keys are necessary.
• Key management would become a real burden
• Solution
• Introduce a trusted Key Distribution Center(KDC)
• Each user has a single shared key with KDC
• Authentication and session management now goes through KDC
| U. K. Roy | [ 10/22/08 ]
Web technology 234
• This message is encrypted with the secret key KA Alice shares(only) with KDC
• KDC decrypts this message to extract Bob’s identity and session key
• It then constructs a new message containing Alice’s identity and session key and
sends this message to Bob.
• This message is encrypted with the secret key KA Alice shares(only) with KDC.
• When Bob decrypts this message, he learns that Alice wants to talk to him and which
key she wants to use.
1 A, KA(B, KS) 2 KB(A, KS)
Alice
KDC
Bob
• Is this algorithm secure?
• Answer:No, replay attack can break this algorithm
| U. K. Roy | [ 10/22/08 ]
Web technology 235
KDC
Bob
| U. K. Roy | [ 10/22/08 ]
Web technology 236
| U. K. Roy | [ 10/22/08 ]
Web technology 237
1 RA, A, B
KDC
2 KA(RA, B, KS, KB(A, KS))
Alice
Bob
4 KS,(RA2-1), RB
5 KS(RB-1)
| U. K. Roy | [ 10/22/08 ]
Web technology 238
Bob
Alice
• When Bob receives this message, he has
no idea of whether it came from Alice or
3 KS(RB)
Trudy
• So he sends Alice back a message
containing Alice’s RA, his own random
number, RB, and a proposed session key,
KS
• When Alice gets this message, she decrypts it using her private key. She sees RA.
This message must have come from Bob since Trudy has no way of determining RA.
Furthermore, it must be fresh not a replay since she just sent it.
• Alice agrees the session key by sending message 3
• Bob sees RB encrypted with the session key he just generated, he knows Alice got
the message and verified RA
| U. K. Roy | [ 10/22/08 ]
Web technology 239
Digital Signatures
| U. K. Roy | [ 10/22/08 ]