Post on 05-Apr-2018
7/31/2019 Cellular and WirelessII [Compatibility Mode]
1/43
Systems II
EmergingTechnologies
7/31/2019 Cellular and WirelessII [Compatibility Mode]
2/43
7/31/2019 Cellular and WirelessII [Compatibility Mode]
3/43
Emerging Technologies Bluetooth 802.15.1a
is a technology in the personal area network (PAN)
Radio Frequency Identifier (RFID) is emerging as a leading technology in the logistics, manufacturing, and retail
industry
Wireless Broadband WiMax 802.16
is expected to be a mainstream technology very soon
Mobile IP
Allows data handoff over different sub-networks
IPv6
Is the next eneration internet rotocol
Java Card technology
Is emerging as a forerunner in the security and personal identity domain
7/31/2019 Cellular and WirelessII [Compatibility Mode]
4/43
Bluetooth ,
unified Denmark and Norway in the 10th century
Allows users to make ad hoc wireless connections between
,
comperters without any cable
of range or beyond through walls, clothing and even luggage
7/31/2019 Cellular and WirelessII [Compatibility Mode]
5/43
Bluetooth scatternet as a combination of Piconets
Printer
Headset
Mouse
Cellphone
Piconet 2
Cordless
handset
Piconet 1
Scatternet
7/31/2019 Cellular and WirelessII [Compatibility Mode]
6/43
Bluetooth Protocol .
Medical) frequency band
There are 79 channels s aced 1 MHz a art from 2.402 GHz to
2.480 GHz
Bluetooth S ecial Interest Grou maintains and mana es bluetooth
standard IEEE has also adapted Bluetooth as the 802.15.1a standard
Power levels starting from 1 mW covering 10cm to 100mW
covering upto 100 meters It supports unicast (point-to-point) and multicast (point-to-
multipoint) connections
7/31/2019 Cellular and WirelessII [Compatibility Mode]
7/43
Bluetooth Protocol
Upto 7 slaves devices can be set to communicate with a master
network in an ad hoc manner
as a member of another piconet
7/31/2019 Cellular and WirelessII [Compatibility Mode]
8/43
Bluetooth Protocol Stack
(both direct sequence and frequency hopping spread
There are connectless (ACL-Asynchronous
onnec on ess n an connec on-or en e -Sychronous Connection-oriented Link) links
1. Bluetooth core Protocols
Baseband, Link Manager Protocol (LMP), Logical Link controlan A aptation Protoco (L AP), an ervice Discovery
Protocol (SDP)
7/31/2019 Cellular and WirelessII [Compatibility Mode]
9/43
vCard/vCal WAE
OBEX WAPAT-
commandsTCS BIN SDP
IP
UDP TCP
RFCOMM
PPP
Audio
L2CAP
LMPHost Controller Interface
ase an
Bluetooth Radio
7/31/2019 Cellular and WirelessII [Compatibility Mode]
10/43
Bluetooth Protocol stack
units forming a piconet.
ACL packets are used for data only, while the SCO packet can contain audio
only or a combination of audio and data
All audio and data packets can be provided with different levels of
Link Manager Protocol (LMP)
When the are in ran e, LMP of either device discover each other
Authentication, encryption
Link setup and negotiates baseband packet size Control power modes, connection state
7/31/2019 Cellular and WirelessII [Compatibility Mode]
11/43
Bluetooth Protocol stack
Segmentation and reassembly
Service Discovery Protocol (SDP) enables a Bluetooth device
Inquires what services are available in a piconet and how to
access
7/31/2019 Cellular and WirelessII [Compatibility Mode]
12/43
Bluetooth Protocol stack.
RFCOMM is a serial line communication protocol
-
baseband protocol
.
Telephony Control Protocol Binary TCS BIN is a bit oriented
rotocol
Defines the call control signaling protocol to setup of speech and data
calls between bluetooth devices
e nes mo ty management proce ures or an ng groups o
Bluetooth TCS devices
AT-Command
A set of AT-commands by which a mobile phone can be used andcontrolled as a modem for fax and data transfers
7/31/2019 Cellular and WirelessII [Compatibility Mode]
13/43
7/31/2019 Cellular and WirelessII [Compatibility Mode]
14/43
Bluetooth Security , ,
A frequency-hopping scheme with 1600 hops/sece owes eve s o e pro oco s ac , ue oo uses e
publicly available cipher algorithm known as SAFER+ to
Different application verticals use their own security
7/31/2019 Cellular and WirelessII [Compatibility Mode]
15/43
Bluetooth Application Models
particular usage model
File transfer: object types include .xls, .ppt, .wav, .jpg, .doc files, folders ordirectories or streaming media formats
Internet Bridge: mobile phone or cordless modem acts as modem to the PC,
rovidin dial-u networkin an d fax ca abilities without need for h sical
connection to the PC LAN Access: multiple data terminals use a LAN access point (LAP) as a wireless
Synchronization: a device-to-device synchronization of data
Headset: Handfree cellular phone usage in automobiles
7/31/2019 Cellular and WirelessII [Compatibility Mode]
16/43
RFID
through radio frequency interfaces
The ob ect could be an entit in a manufacturin sho oods in
transit, item in a retail store, a vehicle in a parking lot, a pet, or a
book in a library
There are 6 basic frequencies on which RFID operates. 132.4 KHz, 13.56 MHz, 433 MHz, 918 MHz, 2.4 GHz and 5.8 GHz
Low frequency (30 KHz to 500 KHz) systems
short reading ranges and lower system costs
Ta s are slow in data transfer and suitable for slow-movin ob ects
Security access, asset tracking and animal identification applications
7/31/2019 Cellular and WirelessII [Compatibility Mode]
17/43
RFID Hi h fre uenc 850 MHz to 950 MHz and 2.4 GHz to 2.5GHz s stems
Long read ranges and high data transfer speeds
Fast moving objects like railway wagon tracking and identification of vehicles on freeways
for automated toll collection
Applications
Power-based grouping
Passive tags are generally in low frequeny ranges
It obtains operating power from the readers antenna
The data within a passive tag is read only and generally cannot be changed during opertion
It contains data usually 32 to128 bits long
Active tags are powered by an internal battery
Data within an active tag can be rewritten or modified
Memory can vary from a few bytes to 1MB
A tag migh give a machine a set of instructions, and the machine would then report its
performance to the tag
7/31/2019 Cellular and WirelessII [Compatibility Mode]
18/43
RFID
or more
When an RFID ta asses throu h the electroma entic zone of the
reader, it detects the readers activation signal
The reader decodes the data encoded in the ta s inte rated circuit
and the data is passed to the host computer for processing A basic RFID system consists of
A transponder programmed with unique information (RFID tag)
A transceiver with decoder (a reader)
n an enna or co
7/31/2019 Cellular and WirelessII [Compatibility Mode]
19/43
RFID
inductive coupling techniques
waves techniques
document-based systems operation at a carrier frequency of
ISO has already adopted international RFID standards for
,
7/31/2019 Cellular and WirelessII [Compatibility Mode]
20/43
WiMax - -, ,
Figure 4.4
.
IEEE802.16.1 Air interface for 10 to 66 GHz
IEEE802.16.2 Coexistence of broadband wireless access systems
IEEE802.16.3 Air interface for licensed frequencies, 2 to 11 GHz
The physical layer
Specifies frequency band, the modulation scheme, error-correction
techniques, synchronization between transmitter and receiver, data rate and
the multi lexin structure
7/31/2019 Cellular and WirelessII [Compatibility Mode]
21/43
WiMax
Responsible for transmitting data in frames and controlling
access to the shared wireless medium throu h media access
control layer
Defines how and when a base station or subscriber station ma
initiate transmission on the channel Convergence layer
Provides functions specific to the service being provided
For IEEE802.16.1, bearer services include digital audio/videomulticast, digital telephony, ATM, Internet access, wireless
trunks in telephone networks and frame relay
7/31/2019 Cellular and WirelessII [Compatibility Mode]
22/43
WiMax
Supports FDD and TDD
in which modulation and coding options may be dynamically
assi ned on a burst-b -burst basis
MAC To accommodate both continuous and burst traffic
ARQ, and Mesh network architecture
Broadband mobile cellular s stem Figure 4.5: Moving BTS
7/31/2019 Cellular and WirelessII [Compatibility Mode]
23/43
Mobile IP
device from one location to another and use the network
while stationar .
Mobile computing offers seamless computing facility even if
the user chan es the network
Mobile IP
and the users point of attachement changes dynamically, all
connections are maintained despite the chan e in underl innetwork properties
7/31/2019 Cellular and WirelessII [Compatibility Mode]
24/43
Mobile IP
Source port and IP addresses
Destination port and IP addresses
Mobile IP allows the mobile node to use two IP addresses
Home address is static and known to everybody as the identity of the host
Care-of address, this changes at each new point of attachement and can bethought of as the mobile nodes location specific address
arranges to forward them to the mobile nodes current point of
attachment
7/31/2019 Cellular and WirelessII [Compatibility Mode]
25/43
Mobile IP Whenever the mobile node moves it re isters its new care-of address with its
home agent
The home agent forwards the packet to the foreign network using the care-ofa ress
Tunneling, the new header with care-of address encapsulates the original
acket, causin the mobile nodes home address to have no im act on the
encapsulated packets routing Discovery
mo e no e uses a scovery proce ure to ent y prospect ve ome agents an
foreign agents
Registration A mobile node uses a registration procedure to inform its home agent of its care-of
address
Tunneling procedure is used to forward IP datagrams from a home address to a care-of address
7/31/2019 Cellular and WirelessII [Compatibility Mode]
26/43
Mobile IP architectureM bile
Home
node A
Networkfor A
Forei n
34
NetworkHomeAgent
X2
AgentInternet
1 5
Server X
7/31/2019 Cellular and WirelessII [Compatibility Mode]
27/43
Mobile IP
A router can detect whether a new mobile node has entered
into its network
The mobile node determines whether it is in a foreign network
For the ur ose of discover a router or an a ent eriodicall
issues a router advertisment ICMP message A router advertisement can carry information about default
routers and information about one or more care-of addresses
Or the mobile node can broadcast a solicitation that will beanswered by any foreign agent
7/31/2019 Cellular and WirelessII [Compatibility Mode]
28/43
Mobile IP
The mobile node sends a registration request to the home agent
with the care-of address information
Home agent will update its routing table and reply an
acknowled e to the mobile node
Using 128-bit secret key and MD5 hashing algorithm, a digitalsignature is generated for authentication
Home address, care-of address, and registration lifetime is
maintained in the home agent which is called binding
Tunneling
IP-within-IP encapsulation mechanism is used
7/31/2019 Cellular and WirelessII [Compatibility Mode]
29/43
IPv6
define the next generation IP protocol originally known as
IPN now renamed as IPv6
IPv6 uses 128 bit addresses
,
Site topology, typically 16 bit subnet number
Interface indentifier t icall an automaticall enerated 64 bit
number unique on the local LAN segment
7/31/2019 Cellular and WirelessII [Compatibility Mode]
30/43
IPv6 security IPv6 comes native with a securit rotocol called IPSec
IPSec protocol is a standards-based method of providing privacy, integrity and
authenticity to information transferred across IP networks Diffie-Hellman key exchange mechanism for deriving key between peers on a public
network
Public key cryptography to guarantee the identity of the two parties and avoid man-
in-the-middle attacks
Bulk encryption algorithms, such as 3DES, for encrypting the data
Ke ed hash al orithm, such as HMAC, combined with traditional has al orithms such
as MD5 or SHA for providing packet authentication
Digitla certificates signed by a certificate authority to act as digital ID cards
-
7/31/2019 Cellular and WirelessII [Compatibility Mode]
31/43
IPv6
Packet is attached a tag for customizing the quality of service
Network components: Routers upgrading or using IP tunneling,
Computing nodes: Operating system upgrades
Networkin a lications: Portin of the a lications from IPv4
to IPv6 environment
7/31/2019 Cellular and WirelessII [Compatibility Mode]
32/43
7/31/2019 Cellular and WirelessII [Compatibility Mode]
33/43
Java Card
Smart card is a plastic card with intelligence and memory
s an ar s
ISO 7816-1 defines physical characteristic of the card
- : mens ons an oca ons o e con ac s
ISO 7816-3: electronic signals and transmission protocols
- : n er n us ry omman s or n erc ange
7/31/2019 Cellular and WirelessII [Compatibility Mode]
34/43
Java Card
A microprocessor and a memory chip or
Only a memory chip with non-programmable logic
A microprocessor card
An intelligence program resident within the card which can add, delete, and
otherwise manipulate information on the card
A memory card can store some information for some pre-defined
Smart card are capable of carrying data, functions, and
Unlike memory strip cards, they do not require access to remote
databases at the time of the transaction
7/31/2019 Cellular and WirelessII [Compatibility Mode]
35/43
Java Card ,
interoperability
All the micro rocessor based smart card now offer ava APIframework on the smart card
3GPP has decided to use Java Card as the standard for USIM and
ICC (Integrated Circuit cards) Productivity, security, robustness, tools, and portability
JVM, the language definition, and the core packages have been
made more compact to bring Java technology to the resourceconstrained smart card
7/31/2019 Cellular and WirelessII [Compatibility Mode]
36/43
Java Card
functionalities may typically have
8 to 16 bit microprocessor running at speed between 5 MHz to 40 MHzwith 32K to 128K bytes of EEPROM
Using proactive SIM technology of GSM Phase 2+, the application on the
Java Card technology supports OTA (Over the air) downloads
,
downloaded by the network operator proactively or by the user
interactively over the wireless media Applications written for the Java Card platform are referred to as
applets
7/31/2019 Cellular and WirelessII [Compatibility Mode]
37/43
Java Card
two parts
-
execute at runtime, such as class loading, bytecode verification,
resolution and linkin , and o timization
Runs on-card: JCVM, Java card runtime environment (JCRE),and the Java API
7/31/2019 Cellular and WirelessII [Compatibility Mode]
38/43
Architecture of Java card applications
development process
Java program Compile
Class
files CAP
-
VM
Converter
File
Export
files Installer
Interpreter
On-card
VM
7/31/2019 Cellular and WirelessII [Compatibility Mode]
39/43
Java Card application development process
The converter will convert class files into a format downloable
into the smart card Ensures the byte code validity before the application is installed into the card
Conversion b the off-card VM into CAP Converted APlet
format The applet is transferred into the card using the installer
7/31/2019 Cellular and WirelessII [Compatibility Mode]
40/43
Java Card application development process
-
API classes
CRE erforms additional runtime securit checks throu h a letfirewall
A let firewall artitions the ob ects stored into se arate
protected object spaces, called contexts Controls the access to shareable interfaces of these objects
A Java card applet is not intended to run within an Internet
browser environment
7/31/2019 Cellular and WirelessII [Compatibility Mode]
41/43
Backup
7/31/2019 Cellular and WirelessII [Compatibility Mode]
42/43
re ess ensor etwor ,
Low cost, low power disposal devices
ac ev ce o s sens ng, memory, an commun ca on
module
ower contro s a ma or c a enge
Applications??
7/31/2019 Cellular and WirelessII [Compatibility Mode]
43/43