Department of Computer Science Institute for System Architecture, Chair for Computer Networks
Mobile Communication and Mobile Computing
Prof. Dr. Alexander Schill [Link]
Structure of the Lecture
Part I: Mobile Communication
Introduction and Principles GSM and Extensions UMTS LTE and beyond WLAN Satellite and Broadcast Systems
Part II: Mobile Computing
Mobile IP and TCP Location Based Services Context Awareness and Adaptation Service Based Architecture Mobile File Systems, Databases, Information Services Mobile Applications
Reference: - Jochen Schiller: Mobile Communications, Addison-Wesley
2
Introduction and Principles
Application Example: Civil Engineering, Field Service
Drafts, urgent modification
Fast Ethernet
Large archives, Videoconferences Enterprise A (main office)
Gigabit Ethernet
Gigabit Ethernet
Enterprise A (branch office)
Architect
Selected drafts, Videoconferences
UMTS, LTE
Enterprise B
Construction supervisor Material data, status data, dates
GSM, UMTS
Building site
Example: Consumer Application
8:56PM
[Link]
Rent-A-Bike
Service Login
Login:
Alexander Schill
Password:
**********
URL
LOGIN
Mobile Multimedia
Local Resources, Test Protocols
Product Data Main office Caching
Maintenance technician Mobile Access
Client LAN-Access
Very different performances and costs: radio networks versus fixed networks Software-controlled, automatic adaptation to concrete system environments Example: Access to picture data / compressed picture data / graphics / text
Traffic Telematics Systems
Content Provider Main Office Content Provider Gigabit Ethernet Internet
Point-to-Point Radio, Internet
GSM
Radio/Infrared
DAB: Digital Audio Broadcasting
RDS/TMC: Radio Data System/ Traffic Message Channel
Infrastructure
Mobile Communication: Development
Mobile Phone Networks
C D (GSM900) E (GSM1800) HSCSD GPRS EDGE
Packet Networks Circuit Switched Networks Satellite Networks Cordless Telephony Local Networks
CT
Modacom Mobitex Tetra Iridium/ Globalstar IMT/ UMTS LTE
Inmarsat
4G (LTE advanced, WiMAX)
DECT
Radio-LAN IR-LAN IEEE 802.11 Bluetooth
1990
1995
2000
2005
2010
2015
8
Used Acronyms
C: C: Analog C Network (1st Generation) CT: CT: Cordless Telephone DECT DECT :: Digital Enhanced Cordless Telecommunications GSM GSM : : Global System for Mobile Communications (2nd Generation) GPRS GPRS :: General Packet Radio Service HSDPA+ : :High Speed Downlink Packet Access (advanced) HSCSD HSUPA+: High Speed Uplink Packet Access (advanced) HSCSD: High Speed Circuit Switched Data EDGE EDGE :: Enhanced Data Rates for GSM Evolution IMT IMT : : International Mobile Telecommunications LTE: Long Term Evolution LTE: TETRA :: Terrestrial Trunked Radio (Multicast Communication System) TETRA UMTS: : Universal Mobile Telecommunications System (3rd Generation) UMTS 4G:4G: 4th Generation Networks WiMAX : Worldwide Interoperability for Microwave Access WiMAX
9
Correspondent data rates
300 Mbit/ s
200 Mbit/ s 100 Mbit/ s 50 Mbit/ s HSUPA+ 10 Mbit/ s WLAN 1 Mbit/ s 100 kbit/ s 10kbit/ s GSM DECT EDGE HSCSD/ GPRS Satellites UMTS (pico cell) LTE (uplink) / HSDPA+ LTE (downlink)
UMTS (macro cell)
1995
2000
2005
2010
2015
10
Frequency Assignment
Circuit Switched Radio Mobile Phones Cordless Phones Wireless LANs TETRA NMT TETRA LTE 800 CT2 CT1+ GSM900 CT1+ GSM900
380-400 453-457 450-470
500Mhz
790-862 864-868 885-887 890-915 930-932
935-960
1GHz
410-430 463-467 (nationally different) TFTS (Pager, aircraft phones) GSM1800 TFTS GSM1800 DECT UMTS
1670-1675 WLAN IEEE 802.11b/g/n Bluetooth
1710-1785 1800-1805 1805-1880
1880-1900
(1885-2025 2110-2200)
LTE 2600 WIMAX
IEEE 802.11a: 5,15-5,25; 5,25-5,35; 5,725-5,825 HIPERLAN1 HIPERLAN2 HIPER-Link MHz
2400-2483 2402-2480 2412-2472 HomeRF...(approx.2400)
2500-2690
3500
5176-5270
(~5200-5600)
(~17000)
TFTS - Terrestrial Flight Telephone System NMT Nordic Mobile Telephone
- 2,4 GHz and higher: often license free, nationally different -> interesting for high data rates
11
Principles of Mobile Communication
Based on electro-magnetic radio transmission
radio transmission terrestrial point-to-point Broadcast radio cellular non-cellular orbital (satellite) equatorial orbit non-equatorial orbit
Principles: Propagation and reception of electro-magnetic waves Modulation and multiplex methods; focusing on cellular networks
12
Cellular networks
well known from mobile networks (GSM, UMTS) base station (BS) covers at least one cell; a combination of multiple cells is also called a cellular structure provides different kinds of handovers between the cells higher capacity and better coverage than non-cellular networks bidirectional* antennas instead of omni-directional** can better serve the selected sectors
along highways or train lines
for covering of larger areas
**
13
Cellular networks: handover (1)
A procedure inside a cellular network, which controls the switching process between the cells and end devices Reasons for handovers are:
leaving the transmission range of a cell overloading or breakdown of the used cell loss of connection quality
14
Cellular networks: handover (2)
Handover classes
Intra-cell: switch-over inside the cell onto other frequency or other timeslot Inter-cell: switch-over to a neighboring cell Inter-system: switch-over between different technologies (e.g. GSM and UMTS); roaming
Handover types
Hard handover: active connection gets disconnected before the connection to a new cell is established Soft handover: active connection gets disconnected after the connection to a new cell is established
15
Structure of a cellular network
Major problems: limited frequency resources interference reuse of frequency channels in remote cells cluster of N cell types
1 2 1 4 3 1 2 3 1 4
N i2 i j j2
i, j 0,1,2,
reuse distance
D 3N R
where R cell radius
16
D/R Ratios versus Reuse Patterns
D
D/R-Ratio 3,46 4,6 6 7,55 3
3N R
Cluster size, N 4 7 12 19 3
Cluster of N cells with R cell radius; D reuse distance with the use of sectorized antennas
17
Frequency Distribution: Examples
D/R=3 with N=3 Frequency distribution according to IEEE 802.11b/g/n D/R=4.6 with N=7 Frequency distribution according to IEEE 802.11a
18
Multiplex Methods: Principles
Multiplex
Concurrent usage of the medium without interference 4 multiplex methods: Space Time Frequency Code
Medium Access
controls user access to medium implemented by combining and exploiting multiplex methods
19
SDMA (Space Division Multiple Access)
Communication channel relates to definite regional area or physical infrastructure
Space Multiplex for instance in the Analog Phone Systems (for each participant one line), for Broadcasting Stations, and in Cellular Networks Problem: secure distance (interferences) between transmitting stations is required (using one frequency), and by pure Space Multiplex each communication channel would require an own transmitting station Therefore space Multiplex is only reasonable in combination with other multiplex methods
20
SDMA: Example
k1 k2 k3 k4 k5 k6
f1
s
SDMA selects cell
s secure distance
21
FDMA (Frequency Division Multiple Access)
frequencies are permanently assigned to transmission channels (known from broadcast radio)
k1
k2
k3
k4
k5
k6
f
k6 k5
f1
f2 f3
FDMA selects frequency
f4
f5 f6
k4 k3 k2 k1
s secure distance
22
TDMA (Time Division Multiple Access)
transmission medium is slot-assigned to channels for certain time, is often used in LANs Synchronization (timing, static or dynamic) between transmitting and receiving stations is required
k1
k2
k3
k4
k5
k6
TDMA selects slot
f1
k1
k2
k3
k4
k5
k6
k1
t
23
Combination: FDMA and TDMA, (e.g. in GSM)
GSM uses combination of FDMA and TDMA for better use of narrow resources the used bandwidth for each carrier is 200 kHz => approx. 124 * 8 = 992 channels
f in MHz 960 TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7 TS0 TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7 TS0 25 MHz 935,2 TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7 TS0 downlink
915
200 kHz
TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7 TS0
uplink
TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7 TS0
25 MHz 45 MHz t
24
890,2
TS0 TS1 TS2 TS3 TS4 TS5 TS6 TS7 TS0
CDMA (Code Division Multiple Access)
k1 k2 k3 k4 k5 k6
CDMA decoded
f1
definite Codes are assigned to transmission channels, these can be on the same Frequency for the same Time uses cost-efficient VLSI components high security level using spread spectrum techniques but: exact synchronization is required, code of transmitting station must be known to receiving station, complex receivers for signal separation are required; noise should not be very high
25
CDMA illustrated by example
The principle of CDMA can be illustrated by the example of some party:
communication partners stand close to each other, each transmission station (Sender) is only so loud that it does not interfere to neighbored groups transmission stations (Senders) use certain Codes (for instance, just different languages) receiving station (Listener) tunes to a specific language (Code) in order to decode the content if other receiving station (Listener) cannot understand this language (Code), then it can recognize the data (as a kind of background noise), but it cannot do anything with them if two communication partners would like to have some secure communication line, then they should simply use a secret language (Code)
Potential Problems: security distance is sometimes too small: interferences (i.e. Polish und Russian)
26
CDMA example technically
Sender A Sends Ad =1, Key Ak = 010011 (set: 0= -1, 1= +1) Transmit signal As =Ad *Ak = (-1, +1, -1, -1, +1, +1) Sender B sends Bd =0, Key Bk = 110101 (set: 0= -1, 1= +1) Transmit signal Bs =Bd *Bk = (-1, -1, +1, -1, +1, -1)
Both signals overlay on the air Faults are ignored here (noises etc.) C = As+ Bs =(-2,0,0,-2,+2,0) Receiver will listen to Sender A uses Key Ak bitwise (internal product) Ae = C * Ak =2 +0+0 +2 +2+0 = 6 Result is greater than 0, so sent bit was 1 likewise B Be = C * Bk =-2 +0 +0 -2 -2 +0 = -6, i.e. 0
27
Spread Spectrum Techniques
dP df dP df dP df dP df dP df
Signal is spread by the Sender before the transmission Small-bandwidth faults are spread by de-spreading in receiving station; especially important for CDMA (highly sensitive to faults) band-pass deletes redundant frequency parts dP/df value corresponds to called Power Density, Energy is constant (in the Figure: the filled areas) Objective: Increase of robustness against small-bandwidth faults Protection against unauthorized receivers: power density of spread-spectrum signals can be lower than that of background noise 28