EC404 ACS Module6 Lecture2
EC404 ACS Module6 Lecture2
The second technique used by HSCSD is that the error correction can be
adapted to the quality of the radio channel. A standard slot can carry 9.6 kbps.
HSCSD makes it possible to increase this to 14.4 kbps. The quality of the radio
channel must be good enough to do so.
GPRS
General Packet Radio System is also known as GPRS is a third-generation
step toward internet access. GPRS is also known as GSM-IP that is a Global-
System Mobile Communications Internet Protocol as it keeps the users of this
system online, allows to make voice calls, and access internet on-the-go. Even
Time-Division Multiple Access (TDMA) users benefit from this system as it
provides packet radio access.
GPRS also permits the network operators to execute an Internet Protocol
(IP) based core architecture for integrated voice and data applications that will
continue to be used and expanded for 3G services.
The GPRS specifications are written by the European Telecommunications
Standard Institute (ETSI), the European counterpart of the American National
Standard Institute (ANSI).
Key Features
Following three key features describe wireless packet data
• The always online feature - Removes the dial-up process, making
applications only one click away.
• An upgrade to existing systems - Operators do not have to replace their
equipment; rather, GPRS is added on top of the existing infrastructure.
• An integral part of future 3G systems - GPRS is the packet data core
network for 3G systems EDGE and WCDMA.
Goals of GPRS
GPRS is the first step toward an end-to-end wireless infrastructure and has the
following goals:
• Open architecture
• Consistent IP services
• Same infrastructure for different air interfaces
• Integrated telephony and Internet infrastructure
• Leverage industry investment in IP
• Service innovation independent of infrastructure
Benefits of GPRS
Easy Billing
GPRS packet transmission offers a more user-friendly billing than that offered by
circuit switched services. In circuit switched services, billing is based on the
duration of the connection. This is unsuitable for applications with bursty traffic.
The user must pay for the entire airtime, even for idle periods when no packets
are sent (e.g., when the user reads a Web page).
In contrast to this, with packet switched services, billing can be based on the
amount of transmitted data. The advantage for the user is that he or she can be
"online" over a long period of time but will be billed based on the transmitted
data volume.
GPRS - Applications
• Communications - E-mail, fax, unified messaging and intranet/internet
access, etc.
• Value-added services - Information services and games, etc.
• E-commerce - Retail, ticket purchasing, banking and financial trading, etc.
• Location-based applications - Navigation, traffic conditions, airline/rail
schedules and location finder, etc.
• Vertical applications - Freight delivery, fleet management and sales-force
automation.
• Advertising - Advertising may be location sensitive. For example, a user
entering a mall can receive advertisements specific to the stores in that
mall.
GPRS - Architecture
GPRS architecture works on the same procedure like GSM network, but, has
additional entities that allow packet data transmission. This data network
overlaps a second-generation GSM network providing packet data transport at
the rates from 9.6 to 171 kbps. Along with the packet data transport the GSM
network accommodates multiple users to share the same air interface resources
concurrently.
Following is the GPRS Architecture diagram:
GPRS attempts to reuse the existing GSM network elements as much as possible,
but to effectively build a packet-based mobile cellular network, some new
network elements, interfaces, and protocols for handling packet traffic are
required.
Therefore, GPRS requires modifications to numerous GSM network elements as
summarized below:
Routing Area
GPRS introduces the concept of a Routing Area. This concept is similar to Location
Area in GSM, except that it generally contains fewer cells. Because routing areas
are smaller than location areas, less radio resources are used While broadcasting
a page message.
GPRS - Quality of Service
The QoS is a vital feature of GPRS services as there are different QoS support
requirements for assorted GPRS applications like realtime multimedia, web
browsing, and e-mail transfer.
GPRS allows defining QoS profiles using the following parameters :
• Service Precedence
• Reliability
• Delay and
• Throughput
These parameters are described below:
Service Precedence
The preference given to a service when compared to another service is known
as Service Precedence. This level of priority is classified into three levels called:
• high
• normal
• low
When there is network congestion, the packets of low priority are discarded as
compared to high or normal priority packets.
Reliability
This parameter signifies the transmission characteristics required by an
application. The reliability classes are defined which guarantee certain maximum
values for the probability of loss, duplication, mis-sequencing, and corruption of
packets.
Delay
The delay is defined as the end-to-end transfer time between two communicating
mobile stations or between a mobile station and the GI interface to an external
packet data network.
This includes all delays within the GPRS network, e.g., the delay for request and
assignment of radio resources and the transit delay in the GPRS backbone
network. Transfer delays outside the GPRS network, e.g., in external transit
networks, are not taken into account.
Throughput
The throughput specifies the maximum/peak bit rate and the mean bit rate.
Using these QoS classes, QoS profiles can be negotiated between the mobile user
and the network for each session, depending on the QoS demand and the
available resources.
The billing of the service is then based on the transmitted data volume, the type
of service, and the chosen QoS profile.
Distance coverage for DECT based system is between about 30-100 meters. It
operates at about 1.88GHz to 1.9GHz Radio frequency carrier band, providing a
bandwidth of about 20MHz. The access technology for resource allocation here is
TDD/TDMA/FDMA. For know more on TDD,TDMA and FDMA refer following links.
Data transmission rate of about 1.152 Mbps is achieved.
Access TDD/TDMA/FDMA
No. of carriers 10
DECT frame duration is about 10ms. It is composed of 24 time slots. 12 time slots
are allocated for base terminal to handset direction and 12 logical time slots are
allocated for handset to base terminal direction.Each time slot is of duration
0.417ms.
One Time slot = preamble(16bits) + sync(16bits) + A field(64 bits) + B field(320
bits) + X field(4 bits) + Guard bits(60bits)
Sync field is used by receiver to synchronize with the start of the frame. A field
carries control or management signals. B field carries user data/information. The
figure-1 depicts the DECT frame structure as explained.
DECT protocol stack
Protocol stack of DECT depicted in figure is used both at Mobile unit and Base
Station Unit. It consists of Physical layer, MAC, Data link control layer and
different services. Services include CC (Call Control), Supplementary services,C
onnection less message service, connection oriented message service and
MM(Mobility Management).
DECT MAC layer controls the layer-1(i.e. physical layer). It also provides
connection oriented, connectionless and broadcast services to the upper layer in
DECT protocol stack. It also provides encryption functionality with the use of
Standard cipher protocol.
Newer PTT systems use voice over Internet Protocol (VoIP) for 3G digital
PTT. For example, an air traffic controller communicates with aircraft via one
radio frequency, and transmitted voice messages are shared between the
controller and each airplane.
The PTT concept has been adopted by cellular systems to offer a service
known as Push To Talk over Cellular (PoC), which allows end users to turn their
cellphone into a walkie talkie with a much wider range.
With PTT, the caller can simply select a contact or a group/ channel, press
the PTT button, speak, and then release the PTT button to get his voice message
delivered instantly. There is no need to go through the traditional lengthy voice-
call process of dialing, network switching and routing, and waiting for the other
party to answer. High-performance PTT solutions can deliver sub-second call set-
up and latency to ensure instantaneous communication.
A PTT call is a barge call, allowing the recipient to hear incoming voice right
away, through the PTT device’s speaker or an accessory in a hands-free, eyes-free
manner, without any action. A barge call eliminates the need for the recipient to
press the answering button in order to answer a call and hear the caller’s voice. To
a construction worker, for example, hearing messages burst out of a speaker on
their handset is much more convenient than putting down tools and removing
gloves to answer a standard phone call. To respond, the recipient can simply push
the PTT button and instantly deliver a voice message back.
A typical PTT call lasts less than a minute, much shorter than a regular
voice call, because it eliminates the typical greetings and ending protocol used in
regular phone conversations. PTT calling allows users to say no more than
necessary, focus on getting the job done, and improve productivity
Mobile Internet Protocol (or Mobile IP)
The following case shows how a datagram moves from one point to another within
the Mobile IP framework.
o First of all, the internet host sends a datagram to the mobile node using the
mobile node's home address (normal IP routing process).
o If the mobile node (MN) is on its home network, the datagram is delivered
through the normal IP (Internet Protocol) process to the mobile node.
Otherwise the home agent picks up the datagram.
o If the mobile node (MN) is on foreign network, the home agent (HA)
forwards the datagram to the foreign agent.
o The foreign agent (FA) delivers the datagram to the mobile node.
o Datagrams from the MN to the Internet host are sent using normal IP
routing procedures. If the mobile node is on a foreign network, the packets
are delivered to the foreign agent. The FA forwards the datagram to the
Internet host.
In the case of wireless communications, the above illustrations depict the use
of wireless transceivers to transmit the datagrams to the mobile node. Also, all
datagrams between the Internet host and the MN use the mobile node's home
address regardless of whether the mobile node is on a home or foreign network.
The care-of address (COA) is used only for communication with mobility agents
and is never seen by the Internet host.
Components of Mobile IP
The mobile node is an end system or device such as a cell phone, PDA (Personal
Digital assistant), or laptop whose software enables network roaming capabilities.
The home agent provides several services for the mobile node and is located in the
home network. The tunnel for packets towards the mobile node starts at home
agent. The home agent maintains a location registry, i.e. it is informed of the
mobile node's location by the current COA (care of address). Following
alternatives for the implementation of an HA exist.
The foreign agent can provide several services to the mobile node during its visit
to the foreign network. The FA can have the COA (care or address) acting as a
tunnel endpoint and forwarding packets to the MN. The foreign agent can be the
default router for the MN.
Foreign agent can also provide security services because they belong to the foreign
network as opposed to the MN which is only visiting.
In short, FA is a router that may function as the point of attachment for the mobile
node when it roams to a foreign network delivers packets from the home agent to
the mobile node.
The Care- of- address defines the current location of the mobile node from an IP
point of view. All IP packets sent to the MN are delivered to the COA, not directly
to the IP address of the MN. Packet delivery toward the mobile node is done using
a tunnel. To be more precise, the COA marks the endpoint of the tunnel, i.e. the
address where packets exit the tunnel.
There are two different possibilities for the location of the care of address:
1. Foreign Agent COA: The COA could be located at the foreign agent, i.e. the
COA is an IP address of the foreign agent. The foreign agent is the tunnel
endpoint and forwards packets to the MN. Many MN using the FA can share
this COA as common COA.
2. Co-located COA: The COA is co-located if the MN temporarily acquired an
additional IP address which acts as a COA. This address is now topologically
correct, and the tunnel endpoint is at the mobile node. Co-located address
can be acquired using services such as DHCP. One problem associated with
this approach is need for additional addresses if MNs request a COA. This is
not always a good idea considering the scarcity of IPv4 addresses.
The home network is the subset the MN belongs to with respect to its IP address.
No mobile IP support is needed within this network.
7. Foreign network
The foreign network is the current subset the MN visits and which is not the home
network.
Process of Mobile IP
The mobile IP process has following three main phases, which are:
1. Agent Discovery
During the agent discovery phase the HA and FA advertise their services on the
network by using the ICMP router discovery protocol (IROP).
Mobile IP defines two methods: agent advertisement and agent solicitation which
are in fact router discovery methods plus extensions.
2. Registration
The main purpose of the registration is to inform the home agent of the current
location for correct forwarding of packets.
Registration can be done in two ways depending on the location of the COA.
o If the COA is at the FA, the MN sends its registration request containing the
COA to the FA which is forwarding the request to the HA. The HA now set up
a mobility binding containing the mobile node's home IP address and the
current COA.
Additionally, the mobility biding contains the lifetime of the registration which is
negotiated during the registration process. Registration expires automatically
after the lifetime and is deleted; so a mobile node should register before
expiration. After setting up the mobility binding, the HA send a reply message
back to the FA which forwards it to the MN.
o If the COA is co-located, registration can be very simpler. The mobile node
may send the request directly to the HA and vice versa. This by the way is
also the registration procedure for MNs returning to their home network.
3. Tunneling
A tunnel is used to establish a virtual pipe for data packets between a tunnel entry
and a tunnel endpoint. Packets which are entering in a tunnel are forwarded
inside the tunnel and leave the tunnel unchanged. Tunneling, i.e., sending a packet
through a tunnel is achieved with the help of encapsulation.