Unit5 Kec076
Unit5 Kec076
Unit 5 Notes
Mobile Ad Hoc Network
MANET stands for Mobile Adhoc Network also called a wireless adhoc network or Adhoc
wireless network that usually has a routable networking environment on top of a Link Layer
ad hoc network. They consist of a set of mobile nodes connected wirelessly in a self-
configured, self-healing network without having a fixed infrastructure. MANET nodes are free
to move randomly as the network topology changes frequently. Each node behaves as a router
as it forwards traffic to other specified nodes in the network.
Bluetooth
Bluetooth is a cable replacement technology. It is standard for short range wireless
communication. Bluetooth was first invented by telecoms vendor Ericsson in 1994.
Bluetooth architecture is not easy, rather it is complex. It connects other device by using
frequency hopping in time slots. It creates ad hoc networks. When bluetooth devices first
connect, a piconet master initiates the connection, others are slave devices. Piconet has one
master device, seven active slave devices. There is no direct communication between slave
units . Two or more piconets create scatternet, a master is only one piconet. Any devices that
share a master must be on the same piconet. Different piconets have a common device which
is scatternet member to relay data between the piconets. In piconet, if slave device see a device
want to communicate directly to each other, they create a new piconet, among them one acting
as a Master.
Bluetooth has two way data transfer system [2]. Asynchronous Connectionless
Communications Link (ACL).Synchronous Connection-orientated Communications Link
(SCL). Bluetooth has 3 class. Bluetooth support ad hoc networking. Bluetooth network
topologies called piconet and scatternet. It has low power, low cost, small size, and built-in
security. It offer 2.4 GHz ISM band and frequency hopping techniques with the carrier
modulated using Gaussian frequency shift keying (GFSK). It has 79 channels.
IEEE 802.11b:
It is first standard developed for wireless network (IEEE 802.11) in 1997. It has maximum
coverage network of about 45 meters and operate on 2.4GHz frequency band. It provides a
maximum theoretical speed of 11 Mbps. Components of devices implementing this standard
are cheaper. This standard was very famous among customers because of inexpensive devices
and installation.
IEEE 802.11a:
The letter ‘a’ in this standard makes you think why this standard comes after 802.11b. Actually
802.11a comes along with 802.11b but it uses a new complex technology called OFDM
(orthogonal frequency division multiplexing) for signal generation. Implementation of this
standard was expensive so it was used only in businesses at that time. It operates on 5Ghz
frequency band and has a maximum theoretical speed of 54 Mbps.
IEEE 802.11g:
This standard uses same technology i.e, OFDM as 802.11a. It operates on 2.4GHz frequency
band and provides a maximum theoretical speed of 54 Mbps. 802.11g devices are compatible
with 802.11b devices but with speed of 11 Mbps. This standard provides an improvement over
802.11b standard. Now customers can enjoy a better speed and coverage at some minor
upgrades.
IEEE 802.11n (Wi-Fi 4):
It uses a technology called MIMO (multiple input multiple output) where multiple
transmitters/receivers can operate simultaneously at both transmitting and receiving end.This
multiple use of transmitters/receivers provide a significantly higher bandwidth and power. It
operates on both 2.4GHz and 5GHz frequency band and called dual band Wi-Fi. It provides a
maximum theoretical speed of 300 Mbps (450 Mbps if using three antennas).
Wi Fi Architecture
Based on the above, the aim is to identify the function that each of the computers fulfils within
the network.
Router. Equipment in charge of routing traffic to allow navigation towards the internet
Firewall. Allows traffic from the internal network to the external network and vice versa,
filters traffic by port, host or network segment
Layer 3 Switch. It has the same function of Router, but with several ports which allow direct
connection with devices, such as servers, Wi-Fi controllers, firewall, Layer 2 switches, etc.
Layer 2 Switch. Connects end devices through Ethernet ports Wireless access point or Access
Point. Interconnects wireless communication equipment, propagates SSIDs or network names.
Encryption password.
WIFI network password and each encryption is specified.
MAC Frame Format of IEEE 802.11 and addressing
IEEE 802.11 MAC layer data frame consists of 9 fields:
WiMax
The ‘World Interoperability for MicroAcess, Inc. (WiMAX)’ forum, an industry group, focuses
on creating advanced technology solution for high speed wide area internet access.The
WiMAX product certification program ensures interoperability between WiMAX equipment
from vendors worldwide. WiMAX can serve as a backbone for 802.11 hotspots for connecting
to the internet. Alternatively, users can connect mobile devices such as laptops and handsets
directly to WiMAX base stations. Mobile devices connected directly can achieve a range of 4
to 6 miles.
Functions of 5G network:
1. NRF(Network Repository Function): All of the 5G network functions (NFs) in the
operator’s network are stored centrally in the Network Repository Function (NRF).
The NRF provides a standards-based API that enables 5G NFs to register and find one
another. A crucial element needed to execute the new service-based architecture (SBA)
in the 5G core is NRF.
2. PCF (Policy Control Function): Policy Control Function makes it simple to develop
and implement policies in a 5G network. PCF will help you monetize and reap the
rewards of 5G because it was created and designed using cloud-native principles to
address the demands of 5G services.
3. BSF (Binding Support Function): The Session Binding Function on the Diameter
Routing Agent (DRA) used in 4G is comparable to the 5G Binding Support Function
(BSF). When numerous Policy Control Function (PCF) systems are installed in the
network, it becomes a necessary necessity.
4. SCP (Service Communication Proxy): By granting routing control, resiliency, and
observability to the core network, Service Communication Proxy (SCP) enable
operators to securely and effectively operate their 5G network. To address many of the
issues brought on by the new service-based architecture (SBA) in the 5G core, SCP
makes advantage of IT service mesh (ISTIO) and adds crucial capabilities to make it
5G-aware.
5. NSSF (Network Slicing Selection Function): In the 5G environment, where a variety
of services are offered, the NSSF (Network Slicing Selection Function) system is a
solution to choose the best network slice available for the service requested by the user.
6. UDM (Unified Data Management)& UDR (User Data Repository): UDM is cloud-
native and created for 5G, similar to Home Subscriber Server (HSS) in LTE. It is in
charge of creating the credentials needed for authentication, granting access depending
on user subscription, and sending those credentials to the other network functions. It
retrieves the credentials from the User Data Repository (UDR). Different key 5G
features are supported by the UDM network function. In order to complete the
authentication process, it creates authentication credentials. Based on user
subscriptions, it approves network access and roaming.
7. AUSF (Authentication Server Function): 5G authentication and Key Agreement
method 5G AKA are carried out via the authentication server function. In order to
manage hidden or privacy-protected subscription identifiers, AUSF also provides
additional functionality. During the registration process, AMF(Access and Mobility
Function) is in charge of choosing the proper Authentication Server Function (AUSF).
8. NWDAF (Network Data Analytics Function): The 5G Network Data Analytics
Function (NWDAF) is intended to improve the end-user experience by streamlining
the production and consumption of key network data as well as generating insights and
taking appropriate action. By expediting the production and consumption of core
network data, creating insights, and acting on these insights, NWDAF is intended to
address market fragmentation and proprietary solutions in the field of network
analytics.
5G Core Network:
The 5G core network is the heart of 5G networking, it provides secure and reliable
connectivity to the internet and access to all of the networking services. 5G core network has
numerous essential functions for mobile networking like mobile management, subscriber data
management, authorization, authentication policy management, etc.
The 5G core network is completely software-based and native to the cloud, it allows higher
deployment agility and has flexibility and infrastructure which is similar to the cloud. Industry
experts designed the 5G core to support the network functioning of the 5G network. Therefore,
the 3GPP standard was developed which was named 5G core, it has the power to control and
manage network functions.
Next Generation Network (NGN) refers to a packet-based network and it can be used for
both telecommunication services as well as data and it supports mobility. It is able to make use
of multiple broadband capabilities, especially Quality of Services (QoS) enabled transport
technologies where the service-related functions are independent of the underlying transport-
related technologies. International Telecommunication Union Telecommunication
Standardization Sector (ITU-T) defines Next Generation Network (NGN) is a packet based
network which provides telecommunication services to users and it uses multiple broadbands,
QoS enabled transport technologies.
Fundamental characteristics of NGN :
• Packet based transfer.
• Separation of control functions for bearer capabilities, call/session – service.
• Decoupling of service and network, and provision of open interfaces (I/F).
• A wide range of services like (Real Time(RT)/ streaming/ non Real Time (RT)/
multimedia).
• Interworking with legacy networks via open I/F.
• Support of Generalized mobility.
• Support to unrestricted access by users to different service providers.
Services supported in NGN :
• Data communication services.
• Multimedia Services.
• Public interest services.
• Public Switched Telephone Network (PSTN)/Integrated Services Digital Network
(ISDN) simulation services.
• Public Switched Telephone Network (PSTN)/ Integrated Services Digital Network
(ISDN) emulation services
Next Generation Network Layer :
• In Access Layer, different types of media gateways that support connection to and
from access network with the core network are included.
• Core network layer is network handling converged services based on Internet Protocol
(IP). Control layer works as call server. It provides call control functions also provides
control of a media gateway.
• Service layer is an IT platform that creates a service creation environment extending its
functionality in order to cover new network scenarios as an intelligent network.
The below figure illustrates Next Generation Network (NGN) Layers as follows.
This basic reference model separated Transport layer (Access and Core) from Service layer. In
short Access Layer elements handles different media gateways. Core Layer handles networks
based on IP. Control Layer handles call control functions and control of media gateways.
Service Layer is an IT platform that plays role of an Intelligent Network Service Creation
Environment.
Li-Fi
LiFi (Light Fidelity) is a wireless communication technology that uses visible
light, particularly LED bulbs, to transmit data. It was first demonstrated in 2011 by Light
Fidelity (Li-Fi) technology is a wireless communication system based on the use of visible
light between the violet (800 THz) and red (400 THz). Unlike Wi-Fi which uses the radio part
of the electromagnetic spectrum, Li-Fi uses the optical spectrum i.e. Visible light part of the
electromagnetic spectrum. The principle of Li-Fi is based on sending data by amplitude
modulation of the light source in a well-defined and standardized way. LEDs can be switched
on and off faster than the human eyes can detect since the operating speed of LEDs is less than
1 microsecond. This invisible on-off activity enables data transmission using binary codes. If
the LED is on, a digital ‘1’ is transmitted and if the LED is off, a digital ‘0’ is transmitted. Also
these LEDs can be switched on and off very quickly which gives us a very nice opportunity for
transmitting data through LED lights, because there are no interfering light frequencies like
that of the radio frequencies in Wi-Fi. Li-Fi is thought to be 80% more efficient, which means
it can reach speeds of up to 1Gbps and even beyond. Li-Fi differs from fibre optic because the
Li-Fi protocol layers are suitable for wireless communication over short distances (up to 10
meters).
Hence all that is required, is some or an array of LEDs and a controller that controls/encodes
data into those LEDs. All one has to do is to vary the rate at which the LEDs flicker depending
upon the data input to LEDs. Further data rate enhancements can be made in this method, by
using array of the LEDs for parallel data transmission, or using mixtures of red , green and
blue LEDs to alter the light’s frequency, with each frequency encoding a different data
channel.
The Visible Light Communication interest group, certified by the IEEE, with its standard
approved in 2011 by IEEE as IEEE 802.15.7 is the most active one. The standard of VLC
(IEEE 802.15.7) specifies VLC consisting of mobile-to-mobile (M2M), fixed-to-mobile (F2M)
and infrastructure-to-mobile (I2M) communications. The main purpose of VLC standard is to
focus on medium-range communications for intelligent traffic systems at low-speed and on
shortrange mobile to mobile and fixed to mobile communications at high speeds to exchange
data. Data rates are supported up to 1 Gbps using various modulation schemes. IEEE 802.15.7
defines physical layer (PHY) & media access control (MAC) layer for VLC/Li-Fi. The MAC
layer supports 3 multi-access technologies: peer-to-peer, star configuration and broadcast
mode. It also handles physical layer management issues such as addressing, collision
avoidance and data acknowledgement protocols. The physical layer is divided into 3 types:
PHY I, II, III and employ a combination of different modulation schemes.
• The PHY I was established for outdoor application and works from 11.67 kbps to 267.6
kbps.
• The PHY II layer permits reaching data rates from 1.25 Mbit/s to 96 Mbit/s.
• The PHY III is used for many emissions sources with a particular modulation method called
colour shift keying (CSK). PHY III can deliver rates from 12 Mbit/s to 96 Mbit/s. The
modulation formats recognized for PHY I and PHY II are on-off keying (OOK) and variable
pulse position modulation (VPPM). The Manchester coding used for the PHY I and PHY II
layers includes the clock inside the transmitted data by representing a logic 0 with an OOK
symbol "01" and a logic 1 with an OOK symbol "10", all with a DC component. The DC
component avoids light extinction in case of an extended run of logic 0's. There are also two
Japanese standards for VLC networking (JEITA CP-1221 and CP-1222).