Unit I Basics of Communication - Mr.Rajiv Bhandari By Prof. Prashant Lahane Figure 1.1 Components of...
Transcript of Unit I Basics of Communication - Mr.Rajiv Bhandari By Prof. Prashant Lahane Figure 1.1 Components of...
DATA COMMUNICATIONS
• The term telecommunication means communication at
a distance.
• The word data refers to information presented in
whatever form is agreed upon by the parties creating
and using the data.
• Data communications are the exchange of data
between two devices via some form of transmission
medium such as a wire cable.
Prepared By Prof. Prashant Lahane
Characteristics:-
must be a Sender and Receiver A protocol is a set of rules which governs the transfer
of data between computers. Protocols allow communication between computers and networks.
Handshaking is used to establish which protocols to use. Handshaking controls the flow of data between computers
protocols will determine the speed of transmission, error checking method, size of bytes, and whether synchronous or asynchronous
Examples of protocols are: token ring, CSMA/CD, X.25, TCP/IP
Communication Systems
Prepared By Prof. Prashant Lahane
5 Basic Components Every communication system has 5 basic requirements
• Data Source (where the data originates)
• Transmitter (device used to transmit data)
• Transmission Medium (cables or non cable)
• Receiver (device used to receive data)
• Destination (where the data will be placed)
Prepared By Prof. Prashant Lahane
• Bandwidth: The amount of data which can be
transmitted on a medium over a fixed amount of time (second). It is measured on Bits per Second or Baud
• Bits per Second (bps): A measure of
transmission speed. The number of bits (0 0r 1) which can be transmitted in a second
• Baud Rate: Is a measure of how fast a change
of state occurs (i.e. a change from 0 to 1)
Transmission Media Speed
Prepared By Prof. Prashant Lahane
Any transmission May be:
•analog or digital
•Serial or parallel
Communication Concepts
Prepared By Prof. Prashant Lahane
Sender transmitted
Serial Transmission
Data is transmitted, on a single channel, one bit at a time one after another
- Much faster than parallel because of way bits processed (e.g. USB and SATA drives)
Receiver received 1 0 1 0 0 1 1 0
Prepared By Prof. Prashant Lahane
Rec
eiv
er r
ecei
ved
-each bit has it’s own piece of wire along which it travels - often used to send data to a printer
Parallel Transmission
Sen
der tran
smitted
All bits are sent simultaneously
1
0
0
1
1
0
0
1
Prepared By Prof. Prashant Lahane
Why Not use Parallel Instead of serial?
• Due to inconsistencies on channels data arrives at different times
• Because of the way it is transmitted packet switching cannot be used
• The above two points makes parallel slower than serial and requires higher bandwidth.
• Parallel transmissions are rarely used anymore
Prepared By Prof. Prashant Lahane
Half Duplex Transmission
half duplex: Both directions but only one direction at a time
Prepared By Prof. Prashant Lahane
Full Duplex Transmission
full duplex: send and receive both directions at once
Prepared By Prof. Prashant Lahane
ANALOG-TO-DIGITAL CONVERSION
• A digital signal is superior to an analog signal
because it is more robust to noise and can easily be
recovered, corrected and amplified.
• For this reason, the tendency today is to change an
analog signal to digital data.
• There are two techniques, pulse code modulation
and delta modulation.
Prepared By Prof. Prashant Lahane
PCM • PCM consists of three steps to digitize an analog
signal: 1. Sampling
2. Quantization
3. Binary encoding
Before we sample, we have to filter the signal to limit the maximum frequency of the signal as it affects the sampling rate.
Filtering should ensure that we do not distort the signal, ie remove high frequency components that affect the signal shape.
Prepared By Prof. Prashant Lahane
Sampling • Analog signal is sampled every TS secs.
• Ts is referred to as the sampling interval.
• fs = 1/Ts is called the sampling rate or sampling frequency.
• There are 3 sampling methods: – Ideal - an impulse at each sampling instant
– Natural - a pulse of short width with varying amplitude
– Flattop - sample and hold, like natural but with single amplitude value
• The process is referred to as pulse amplitude modulation PAM and the outcome is a signal with analog (non integer) values
Prepared By Prof. Prashant Lahane
Quantization
• Sampling results in a series of pulses of varying amplitude values ranging between two limits: a min and a max.
• The amplitude values are infinite between the two limits.
• We need to map the infinite amplitude values onto a finite set of known values.
• This is achieved by dividing the distance between min and max into L zones, each of height
= (max - min)/L
Prepared By Prof. Prashant Lahane
Quantization Levels
• The midpoint of each zone is assigned a value from 0 to L-1 (resulting in L values)
• Each sample falling in a zone is then approximated to the value of the midpoint.
Prepared By Prof. Prashant Lahane
Quantization Zones
• Assume we have a voltage signal with amplitutes Vmin=-20V and Vmax=+20V.
• We want to use L=8 quantization levels.
• Zone width = (20 - -20)/8 = 5
• The 8 zones are: -20 to -15, -15 to -10, -10 to -5, -5 to 0, 0 to +5, +5 to +10, +10 to +15, +15 to +20
• The midpoints are: -17.5, -12.5, -7.5, -2.5, 2.5, 7.5, 12.5, 17.5
Prepared By Prof. Prashant Lahane
Assigning Codes to Zones • Each zone is then assigned a binary code.
• The number of bits required to encode the zones, or the number of bits per sample as it is commonly referred to, is obtained as follows:
nb = log2 L
• Given our example, nb = 3
• The 8 zone (or level) codes are therefore: 000, 001, 010, 011, 100, 101, 110, and 111
• Assigning codes to zones: – 000 will refer to zone -20 to -15
– 001 to zone -15 to -10, etc.
Prepared By Prof. Prashant Lahane
Quantization Error • When a signal is quantized, we introduce an error
- the coded signal is an approximation of the actual amplitude value.
• The difference between actual and coded value (midpoint) is referred to as the quantization error.
• The more zones, the smaller which results in smaller errors.
• BUT, the more zones the more bits required to encode the samples -> higher bit rate
Prepared By Prof. Prashant Lahane
PCM Decoder
• To recover an analog signal from a digitized signal we follow the following steps:
– We use a hold circuit that holds the amplitude value of a pulse till the next pulse arrives.
– We pass this signal through a low pass filter with a cutoff frequency that is equal to the highest frequency in the pre-sampled signal.
• The higher the value of L, the less distorted a signal is recovered.
Prepared By Prof. Prashant Lahane
Delta PCM (DPCM)
• Instead of using one bit to indicate positive and negative differences, we can use more bits -> quantization of the difference.
• Each bit code is used to represent the value of the difference.
• The more bits the more levels -> the higher the accuracy.
Prepared By Prof. Prashant Lahane
Adaptive Differential Pulse Code
Modulation (ADPCM)
• More efficient than PCM by removing the redundancies in the speech signal.
• Adjacent samples of a speech waveform are highly correlated.
• This means that the variance of the difference between adjacent speech amplitudes is much smaller than the variance of the speech signal itself.
Prepared By Prof. Prashant Lahane
ADPCM
• Allows speech to be encoded at a bit rate of 32 kbps, while retaining the same voice quality.
• In practice, ADPCM encoders are implemented using signal prediction techniques.
Prepared By Prof. Prashant Lahane
ADPCM
• Instead of encoding the difference between adjacent samples, a linear predictor is used to predict the current sample.
• The difference between the predicted and actual sample called the prediction error is then encoded for transmission.
• Prediction is based on the knowledge of the autocorrelation properties of speech.
Prepared By Prof. Prashant Lahane
Delta Modulation • This scheme sends only the difference between
pulses, if the pulse at time tn+1 is higher in amplitude value than the pulse at time tn, then a single bit, say a “1”, is used to indicate the positive value.
• If the pulse is lower in value, resulting in a negative value, a “0” is used.
• This scheme works well for small changes in signal values between samples.
• If changes in amplitude are large, this will result in large errors.
Prepared By Prof. Prashant Lahane
Adaptive Delta Modulation, where the
step size is made to vary with the input
Signal.
Prepared By Prof. Prashant Lahane
Adaptive Delta Modulation, where the
step size is made to vary with the input
Signal.
Prepared By Prof. Prashant Lahane
ADAPTIVE DELTA MODULATION
Line Coding
• Digital output of the PCM coder is converted to an appropriate waveform for transmission over channel line coding or transmission coding
• Different line codes have different attributes
• Best line code has to be selected for a given application and channel condition
Prepared By Prof. Prashant Lahane
Line Coded Waveforms - I NRZ – Non Return to Zero
-Level
NRZ – Non Return to Zero
-Mark (0no change,
1 change)
NRZ – Non Return to Zero
-Space (1no change,
0 change)
Bipolar Return to Zero
AMI – Alternate Mark Inversion
(zero zero,
1 alternating pulse)
Prepared By Prof. Prashant Lahane
B8ZS
• Bipolar with 8-zero substitution (B8ZS)
– Commonly used in North America
– Eight consecutive zero-level voltages are replaced by the sequence 000VB0VB.
– The V in the sequence denotes violation; that is a nonzero voltage that breaks an AMI rule of encoding (opposite polarity from the previous).
– The B in the sequence denotes bipolar, which means a nonzero level voltage in accordance with the AMI rule.
Prepared By Prof. Prashant Lahane
Block Coding
• Use redundancy to ensure synchronization and to provide some kind of inherent error detecting.
• In general, block coding changes a block of m bits into a block of n bits, where n is larger than m.
• Block coding is referred to as an mB/nB encoding technique.
• For example:
– 4B/5B encoding means a 4-bit code for a 5-bit group.
Prepared By Prof. Prashant Lahane
Block coding is normally referred to as mB/nB coding;
it replaces each m-bit group with an
n-bit group.
Note
Prepared By Prof. Prashant Lahane
Figure 4.15 Using block coding 4B/5B with NRZ-I line coding scheme
Prepared By Prof. Prashant Lahane
4B/5B Encoding
• 5-bit output that replaces the 4-bit input
• No more than one leading zero (left bit) and no more than two trailing zeros (right bits).
• There are never more than three consecutive 0s.
• If a 5-bit group arrives that belongs to the unused portion of the table, the receiver knows that there is an error in the transmission.
Prepared By Prof. Prashant Lahane
Introduction
The multiplexing is used to combined a number of independent
signals into a composite signal suitable for transmission over a
common channel
Type of Multiplexing
Prepared By Prof. Prashant Lahane
Type of Multiplexing:
1. Frequency-Division Multiple Access (FDMA).
3. Code-division Multiple-Access (CDMA)
2. Time-Division Multiple Access (TDMA).
Prepared By Prof. Prashant Lahane
Frequency-Division Multiple
Access (FDMA) It is a communications technique that divides a communications
channel into a number of equally spaced frequency bands
Prepared By Prof. Prashant Lahane
Time-Division Multiple Access
(TDMA) It is a digital transmission technology that allows a number of users to
access a single radio-frequency (RF) channel without interference by
allocating unique time slots to each user within each channel.
Prepared By Prof. Prashant Lahane
Code Division Multiple Access
(CDMA) It is a wireless communications technology that uses the
principle of spread spectrum communication.
There are three ways to spread the bandwidth of the signal:
Frequency hopping
Time hopping
Direct sequence
Prepared By Prof. Prashant Lahane
Code Division Multiple Access
(CDMA)
CDMA Features:
o All users use same frequency and may transmit simultaneously
o Narrowband message signal multiplied by wideband spreading signal, or codeword
o Each user has its own pseudo-codeword (orthogonal to others).
o Receivers detect only the desired codeword. All others appear
as noise.
o Receivers must know transmitter’s codeword.
CDMA is a Direct Sequence Spread Spectrum system
Prepared By Prof. Prashant Lahane
Wavelength-Division Multiplexing (WDM)
Prepared By Prof. Prashant Lahane
• WDM is a technology which multiplexes a number
of optical carrier signals onto a single optical fiber by using
different wavelengths (i.e., colors) of laser light.
WDM
• The term wavelength-division multiplexing is commonly
applied to an optical carrier (which is typically described by
its wavelength), whereas frequency-division
multiplexing typically applies to a radio carrier (which is
more often described by frequency).
• Wavelength and frequency are tied together through a simple
directly inverse relationship, in which the product of frequency
and wavelength equals c (the propagation speed of light), the
two terms actually describe the same concept.
• WDM systems are popular with telecommunications
companies because they allow them to expand the capacity of
the network without laying more fiber. Prepared By Prof. Prashant Lahane
Time Division Synchronous Code Division
Multiple Access (TD-SCDMA)
• TD-SCDMA is the 3G standard developed for and used by China Mobile on the Chinese mainland. When 3G was just beginning in China, ChinaMobile decided to develop their own format of 3G so to avoid paying highly expensive patent fees.
Prepared By Prof. Prashant Lahane
TD-SCDMA
Prepared By Prof. Prashant Lahane
• TD-SCDMA permits adaptation of time, code, and frequency (for 1.6 MHz bandwidth)
• Permits exploitation of multi-user diversity
– Varying conditions and requirements by user
Long Term Evolution (LTE)
• It is a standard for wireless communication of high-
speed data for mobile phones and data terminals (4G
LTE).
• Peak download rates up to 299.6 Mbit/s and upload
rates up to 75.4 Mbit/s
• Low data transfer latencies (5 ms)
• LTE has two variants:
– LTE TDD (Time division duplex)
– LTE FDD (Frequency division duplex)
Prepared By Prof. Prashant Lahane
LTE-TDD & LTE-FDD
• LTE-FDD uses paired frequencies to upload and
download data.
• LTE-TDD uses a single frequency, alternating
between uploading and downloading data through
time.
• The ratio between uploads and downloads on a LTE-
TDD network can be changed dynamically,
depending on whether more data needs to be sent or
received.
Prepared By Prof. Prashant Lahane
LTE-TDD & LTE-FDD
• TD-LTE and LTE FDD operates on different
frequency bands, with LTE-TDD working better at
higher frequencies, and LTE-FDD working better at
lower frequencies.
• Frequencies used for LTE-TDD range from 1850
MHz to 3800 MHz, with several different bands
being used.
• The LTE-TDD spectrum is generally cheaper to
access, and has less traffic
Prepared By Prof. Prashant Lahane
Ethernet
• Ethernet refers to the family of local area networks (LAN) products covered by the IEEE 802.3 that operates at many speeds.
• It defines a number of wiring for the physical layer, through means of Network access at the Media Access Control (MAC)/Data Link Layer, and a Common addressing format.
Prepared By Prof. Prashant Lahane
Ethernet (cont)
• The combination of the twisted pair versions of Ethernet with the fiber optic versions largely replacing standards such as coaxial cable Ethernet.
• In recent years, Wi-Fi, the wireless LAN standardized by IEEE 802.11, has been used instead of Ethernet for many home and small office networks and in addition to Ethernet in larger installations.
Prepared By Prof. Prashant Lahane
History
• The original Ethernet was developed as an experimental coaxial cable Network to operate with a data rate of 3 Mbps using (CSMA/CD) Protocol.
• Success with that project attracted early attention and specification and led to the 1980 joint development of the 10-Mbps Ethernet Version 1.0.
Prepared By Prof. Prashant Lahane
History (cont)
• The draft standard was approved by the 802.3 working group in 1983 and published as an official standard in 1985.
• Since then, a number of supplements to the standard have been defined to take advantage of improvements in the technologies and to support:
1) additional network media
2) higher data rate capabilities
Prepared By Prof. Prashant Lahane
General Description
• Ethernet was originally based on the idea of computers communicating over a shared coaxial cable acting as a broadcast transmission medium.
• The common cable providing the communication channel was likened to the ether and it was from this reference that the name "Ethernet" was derived.
Prepared By Prof. Prashant Lahane
General Description (cont)
• Three data rates are currently defined for operation over optical fiber and twisted-pair cables:
• 10 Mbps—10Base-T Ethernet
• 100 Mbps—Fast Ethernet
• 1000 Mbps—Gigabit Ethernet
Prepared By Prof. Prashant Lahane
Ethernet Network Elements
• Ethernet LANs consist of network nodes and interconnecting media.
• The network nodes fall into two major classes:
1) Data terminal equipment (DTE).
2) Data communication equipment (DCE).
• The current Ethernet media options include two types of copper cable: (UTP) and (STP), plus several types of optical fiber cable.
Prepared By Prof. Prashant Lahane
802.11 Wireless LAN
Provides network connectivity over wireless media
An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network
The AP is connected to wired network and is equipped with antennae to provide wireless connectivity
LAN Technologies
Network
connecti
vity to
the
legacy
wired
LAN
Desktop
with PCI 802.11 LAN card
Laptop
with PCMCIA 802.11 LAN card Access Point
Prepared By Prof. Prashant Lahane
802.11 Wireless LAN Range ( Distance between Access Point and WLAN client) depends on structural hindrances and RF gain of the antenna at the Access Point
To service larger areas, multiple APs may be installed with a 20-30% overlap
A client is always associated with one AP and when the client moves closer to another AP, it associates with the new AP (Hand-Off)
Three flavors:
802.11b
802.11a
802.11g
LAN Technologies
Prepared By Prof. Prashant Lahane
Multiple Access with Collision Avoidance (MACA)
Before every data transmission Sender sends a Request to Send (RTS) frame containing the length of the transmission Receiver respond with a Clear to Send (CTS) frame Sender sends data Receiver sends an ACK; now another sender can send data
When sender doesn’t get a CTS back, it assumes collision
LAN Technologies
sender receiver other node in
sender’s range RTS
CTS
ACK
data
other node in
receiver’s range
Prepared By Prof. Prashant Lahane
WLAN : 802.11b The most popular 802.11 standard currently in deployment.
Supports 1, 2, 5.5 and 11 Mbps data rates in the 2.4 GHz ISM (Industrial-Scientific-Medical) band
LAN Technologies
Prepared By Prof. Prashant Lahane
WLAN : 802.11a Operates in the 5 GHz UNII (Unlicensed National Information Infrastructure) band
Incompatible with devices operating in 2.4GHz
Supports Data rates up to 54 Mbps.
LAN Technologies
Prepared By Prof. Prashant Lahane
WLAN : 802.11g Supports data rates as high as 54 Mbps on the 2.4 GHz band
Provides backward compatibility with 802.11b equipment
LAN Technologies
Prepared By Prof. Prashant Lahane
Prepared By Prof. Prashant
Lahane
802.16 Standards Development
• Use wireless links with microwave or millimeter wave radios – 10-66 GHz
– 802.16a extension to 2-11 GHz
• Use licensed spectrum (unlicensed too in 802.16a)
• Metropolitan in scale
• Provide public network service to fee-paying customers
• Point-to-multipoint architecture with rooftop or tower-mounted antennas
Prepared By Prof. Prashant
Lahane
802.16 Standards Development
• Provide efficient transport of heterogeneous traffic supporting QoS
• Capable of broadband transmissions (2-75 Mbps)
– Accommodate both continuous and bursty traffic
• Mobile extensions: 802.16e
Prepared By Prof. Prashant
Lahane
Protocol Architecture
• Physical layer functions: – Encoding/decoding of signals
– Preamble generation/removal
– Bit transmission/reception
• Medium access control layer functions: – On transmission, assemble data into a frame with address
and error detection fields
– On reception, disassemble frame, and perform address recognition and error detection
– Govern access to the wireless transmission medium
Prepared By Prof. Prashant
Lahane
Protocol Architecture
• Convergence layer functions: – Encapsulate PDU framing of upper layers into
native 802.16 MAC/PHY frames
– Map upper layer’s addresses into 802.16 addresses
– Translate upper layer QoS parameters into native 802.16 MAC format
– Adapt time dependencies of upper layer traffic into equivalent MAC service
Prepared By Prof. Prashant
Lahane
IEEE 802.16 Services
• Digital audio/video multicast
• Digital telephony
• ATM
• Internet protocol
• Bridged LAN
• Back-haul
• Frame relay
What is ZigBee?
• Technological Standard Created for Control and Sensor Networks
• Based on the IEEE 802.15.4 Standard
• Created by the ZigBee Alliance
Prepared By Prof. Prashant Lahane
– “the software”
– Network, Security &
Application layers
– Brand management
IEEE 802.15.4
– “the hardware”
– Physical & Media Access
Control layers
IEEE 802.15.4 & ZigBee In Context
PHY 868MHz / 915MHz / 2.4GHz
MAC
Network Star / Mesh / Cluster-Tree
Security 32- / 64- / 128-bit encryption
Application
API
ZigBee Alliance
IEEE 802.15.4
Customer
Silicon Stack App
Source: http://www.zigbee.org/resources/documents/IWAS_presentation_Mar04_Designing_with_802154_and_zigbee.ppt
Prepared By Prof. Prashant Lahane
The 802 Wireless Space
Source: http://www.zigbee.org/en/resources/
Prepared By Prof. Prashant Lahane
ZigBee Aims Low
• Low data rate
• Low power consumption
• Small packet devices
Prepared By Prof. Prashant Lahane
ZigBee Frequencies
• Operates in Unlicensed Bands
• ISM 2.4 GHz Global Band at 250kbps
• 868 MHz European Band at 20kbps
• 915 MHz North American Band at 40kbps
Prepared By Prof. Prashant Lahane
What Does ZigBee Do?
• Designed for wireless controls and sensors
• Operates in Personal Area Networks (PAN’s) and device-to-device networks
• Connectivity between small packet devices
• Control of lights, switches, thermostats, appliances, etc.
Prepared By Prof. Prashant Lahane
How ZigBee Works
• Topology
– Star
– Cluster Tree
– Mesh
• Network coordinator, routers, end devices
Prepared By Prof. Prashant Lahane
How ZigBee Works
• States of operation – Active
– Sleep
• Devices – Full Function Devices (FFD’s)
– Reduced Function Devices (RFD’s)
• Modes of operation – Beacon
– Non-beacon
Prepared By Prof. Prashant Lahane
Slide Courtesy of
ZigBee Mesh Networking
Source: http://www.zigbee.org/en/resources/#SlidePresentations Prepared By Prof. Prashant Lahane
Slide Courtesy of
ZigBee Mesh Networking
Source: http://www.zigbee.org/en/resources/#SlidePresentations Prepared By Prof. Prashant Lahane
Slide Courtesy of
ZigBee Mesh Networking
Source: http://www.zigbee.org/en/resources/#SlidePresentations Prepared By Prof. Prashant Lahane
Slide Courtesy of
ZigBee Mesh Networking
Source: http://www.zigbee.org/en/resources/#SlidePresentations Prepared By Prof. Prashant Lahane
Slide Courtesy of
ZigBee Mesh Networking
Source: http://www.zigbee.org/en/resources/#SlidePresentations Prepared By Prof. Prashant Lahane
Bluetooth
• Bluetooth is a standard developed by a group of electronics manufacturers that will allow any sort of electronic equipment -- from computers and cell phones to keyboards and headphones -- to make its own connections, without wires, cables or any direct action from a user.
• A key difference with other existing wireless technologies is that bluetooth enables combined usability models based on functions provided by different devices.
Prepared By Prof. Prashant Lahane
• The Bluetooth Special Interest Group comprises more than 1000 companies.The major companies who created the technology include Intel
3 com
Ericcson
IBM
Motorola
Nokia
Toshiba
Prepared By Prof. Prashant Lahane
The Name –Bluetooth?
• The name is attributed to Harald Bluetooth was
king of Denmark around the turn of the last
millennium.
• Choosing this name for the standard indicates
how important companies from the Baltic region
(nations including Denmark, Sweden, Norway
and Finland) are to the communications industry
Prepared By Prof. Prashant Lahane
• Present wireless technology like infra red data communication has two problems –1)Line of Sight 2) One to One
• Using data synchronizing– e.g. hot syn on a PDA --- problem of using the right cradle and cable.
• BLUETOOTH OVERCOMES THESE PROBLEMS
Prepared By Prof. Prashant Lahane
• It provides agreement at the physical level -- Bluetooth is a radio-frequency standard.
• Provides agreement at the data link level where products have to agree on
when bits are sent
how many will be sent at a time
how the parties in a conversation can be sure that the message received is the same as the message sent
Prepared By Prof. Prashant Lahane
The Basic Idea
• Bluetooth is a standard for a small , cheap radio chip to be plugged into computers, printers, mobile phones, etc
• Bluetooth chip is designed to replace cables.Information normally carried by the cable, is transmitted at a special frequency to a receiver Bluetooth chip.
• These devices can form a quick ad-hoc secure “piconet” and start communication.
• Connections in the “piconets” can occur even when mobile.
Prepared By Prof. Prashant Lahane
“Piconet”
– A collection of devices connected via Bluetooth technology in an ad hoc fashion.
– A piconet starts with two connected devices, and may grow to eight connected devices.
– All Bluetooth devices are peer units and have identical implementations. However, when establishing a piconet, one unit will act as a Master and the other(s) as slave(s) for the duration of the piconet connection.
Prepared By Prof. Prashant Lahane
Requirements
• Low cost as cables – chip $5
• Secure as cables – must support authentication and encryption
• Must support both data and voice.
• Must connect to a variety of devices.
• Must be able to function in a noisy environment.
• Data rates – 721kbps , using the 2.45Ghz radio frequency band –I.S.M (Industrial, scientific and medical)
• Must support many simultaneous and private “piconets”.
• Must be low power, compact and global.
Prepared By Prof. Prashant Lahane
Why Satellite Networks ?
• Wide geographical area coverage
• From kbps to Gbps communication everywhere
• Faster deployment than terrestrial infrastructures
• Bypass clogged terrestrial networks and are oblivious to terrestrial disasters
• Supporting both symmetrical and asymmetrical architectures
• Seamless integration capability with terrestrial networks
• Very flexible bandwidth-on-demand capabilities
• Flexible in terms of network configuration and capacity allocation
• Broadcast, Point-to-Point and Multicast capabilities
• Scalable
Prepared By Prof. Prashant Lahane
Orbits
• Defining the altitude where the satellite will
operate.
• Determining the right orbit depends on proposed
service characteristics such as coverage,
applications, delay.
Prepared By Prof. Prashant Lahane
Orbits (cont.)
Outer Van Allen Belt (13000-20000 km)
MEO ( < 13K km)
GEO (33786 km)
LEO ( < 2K km)
Inner Van Allen Belt (1500-5000 km)
GEO: Geosynchronous Earth Orbit
MEO: Medium Earth Orbit
LEO: Low Earth Orbit
Prepared By Prof. Prashant Lahane
Types of Satellites
LEO: < 2K km
MEO: < 13K km (Odyssey, Inmarsat-P)
GEO: 33786 km
(Globalstar, Iridium, Teledesic)
• Geostationary/Geosynchronous Earth Orbit Satellites (GSOs) (Propagation Delay: 250-280 ms)
• Medium Earth Orbit Satellites (MEOs) (Propagation Delay: 110-130 ms)
• Highly Elliptical Satellites (HEOs) (Propagation Delay: Variable)
• Low Earth Orbit Satellite (LEOs) (Propagation Delay: 20-25 ms)
Prepared By Prof. Prashant Lahane
Geostationary/Geosynchronous Earth Orbit
Satellites (GSOs)
• 33786 km equatorial orbit
• Rotation speed equals Earth rotation speed (Satellite seems fixed in the horizon)
• Wide coverage area
• Applications (Broadcast/Fixed Satellites, Direct
Broadcast, Mobile Services)
Prepared By Prof. Prashant Lahane
Advantages of GSOs
• Wide coverage
• High quality and Wideband communications
• Economic Efficiency
• Tracking process is easier because of its
synchronization to Earth
Prepared By Prof. Prashant Lahane
Disadvantages of GSOs
• Long propagation delays (250-280 ms). (e.g., Typical Intern. Tel. Call 540 ms round-trip delay.
Echo cancelers needed. Expensive!)
(e.g., Delay may cause errors in data;
Error correction /detection techniques are needed.)
• Large propagation loss. Requirement for high
power level. (e.g., Future hand-held mobile terminals have limited power supply.)
Currently: smallest terminal for a GSO is as large as an A4 paper and as
heavy as 2.5 Kg.
Prepared By Prof. Prashant Lahane
Disadvantages of GSOs (cont.)
• Lack of coverage at Northern and Southern latitudes.
• High cost of launching a satellite.
• Enough spacing between the satellites to avoid collisions.
• Existence of hundreds of GSOs belonging to different countries.
• Available frequency spectrum assigned to GSOs is limited.
Prepared By Prof. Prashant Lahane
Medium Earth Orbit Satellites (MEOs)
• Positioned in 10-13K km range.
• Delay is 110-130 ms.
• Will orbit the Earth at less than 1 km/s.
• Applications
– Mobile Services/Voice (Intermediate Circular Orbit
(ICO) Project)
– Fixed Multimedia (Expressway)
Prepared By Prof. Prashant Lahane
Highly Elliptical Orbit Satellites (HEOs)
• From a few hundreds of km to 10s of
thousands allows to maximize the coverage
of specific Earth regions.
• Variable field of view and delay.
• Examples: MOLNIYA, ARCHIMEDES (Direct
Audio Broadcast), ELLIPSO.
Prepared By Prof. Prashant Lahane
Low Earth Orbit Satellites (LEOs)
• Usually less than 2000 km (780-1400 km are favored).
• Few ms of delay (20-25 ms).
• They must move quickly to avoid falling into Earth
LEOs circle Earth in 100 minutes at 24K km/hour.
(5-10 km per second).
• Examples:
– Earth resource management (Landsat, Spot, Radarsat)
– Paging (Orbcomm)
– Mobile (Iridium)
– Fixed broadband (Teledesic, Celestri, Skybridge)
Prepared By Prof. Prashant Lahane
Low Earth Orbit Satellites (LEOs) (cont.)
• Little LEOs: 800 MHz range
• Big LEOs: > 2 GHz
• Mega LEOs: 20-30 GHz
Prepared By Prof. Prashant Lahane
Comparison of Different Satellite
Systems
LEO MEO GEO
Satellite Life 3-7 10-15 10-15
Hand-held Terminal Possible Possible Difficult
Propagation Delay Short Medium Long
Propagation Loss Low Medium High
Network Complexity Complex Medium Simple
Hand-off Very Medium None
Visibility of a Satellite
Short Medium Mostly Always
Cellular Network
MSC MSC
MSC
MSC
Public (Wired)
Telephone
Network
MSC – Mobile Switching Centers
Prepared By Prof. Prashant Lahane
Cellular Identifiers
• In AMPS, a cell phone subscription is identified using three numbers:
– Electronic Serial Number (ESN): unique 32 bit number programmed into the cell when it was manufactured.
– Mobile Identification Number (MIN): 10 digit phone number.
– System Identification Code (SID): Unique 5 bit code assigned by the FCC to each service provider.
Prepared By Prof. Prashant Lahane
What happens when you receive a call?
• When you first power the phone, it listens for an SID on the control channel.
• Recall: control channel is special frequency that the phone and base station use to talk to each other about things like call setup and channel changing, etc.
• If phone cannot find any control channels, then it is out of range and it lights up the “No Service” light.
Prepared By Prof. Prashant Lahane
Call Reception
• When it receives in SID, the phone compares it to the SID programmed in the phone.
– If it matches, then phone is in the home system.
– If it does not match, the phone is roaming.
• Phone transmits a registration request to the base, which
forward this request to the MSC.
Prepared By Prof. Prashant Lahane
Location Registry
• MSC uses this registration request to update a large database (called the location registry) which keeps track of the latest location of the cell phone.
• This helps network find a phone when a call comes in for it.
• Also it informs the MSC if the cell phone user is valid (legitimate paying customer).
• MSC also learns of phone subscription features, like caller-id, etc., from the MSC.
Prepared By Prof. Prashant Lahane
Call Reception
• Assume a call comes in for the phone.
• The MSC tries to find the phone by looking up the database.
• MSC uses a frequency in the cell in which the phone was last in, and transmits an “incoming call” message over the control channel with the phone’s ESN and MIN numbers.
• This message also tells the phone which frequency to switch to communicate with the base and complete the conversation.
Prepared By Prof. Prashant Lahane
Call Reception; Call Handoff
• The phone and base station tower switch to these frequencies and the call is connected.
• Now assume the phone user is moving around and moves to the edge of its serving cell.
• Base station notes that the strength of the radio waves from this phone is diminishing.
• Meanwhile, a nearby base station notes that the signal strength to this phone is increasing.
Prepared By Prof. Prashant Lahane
Call Handoff
• All base stations constant monitor the signal strength on all voice channels (all 416) in order to pinpoint users who may be moving into their coverage area.
• When the signal gets weak enough at the first base station and strong enough at the second base station, the base stations send a signal to the MSC.
• The MSC determines the new frequency in the new cell that user should switch to.
Prepared By Prof. Prashant Lahane
Call Handoff (Cont’d)
• The new frequency is conveyed to the phone.
• The phone switches to the new frequency (seamlessly) and the new base station tunes into this frequency and starts receiving signals from the phone.
• This way the phone gets handed-over to the new base station.
Prepared By Prof. Prashant Lahane
Roaming
• When SID of the phone does not match the SID of the nearest base station, the phone knows its roaming.
• The MSC of the system that the phone is roaming in contacts the MSC of the phone’s home system.
• The home MSC verifies the phone (valid, paying user, etc.) to the local MSC. The local MSC then keeps track of the phone as it moves thru the local system. Each time updating the database at the home system.
Prepared By Prof. Prashant Lahane
Cell to Cell Call
• Let’s say there is a phone in a cell that wishes to talk to another phone in that cell.
• Assume that both the phones are in a cell of their home system (thereby, they both have the same home system).
• These two phones must talk to each other via the base station.
• Future cell phones systems (perhaps 4G) may allow phones to connect directly with each other (peer-to-peer connection).
Prepared By Prof. Prashant Lahane
Cell to Cell Call (Cont’d)
• Now assume the two phones are in the same cell, but current cell is part of home system for only one of the phones.
• Assume current cell is in Susquehanna County.
• The other cell phone user is visiting from Florida, where its home system is.
• Assume that the phone from Florida makes a phone call to the Susquehanna phone.
Prepared By Prof. Prashant Lahane
Cell to Cell Call (Cont’d)
India
Phone
Florida Phone
Susquehanna
MSC
Wired
Network
Florida
MSC
Registration
Request
Verify
Phone
Verify
Phone Verified
Verified
Assign
Frequency
Registration Request
All of this happens in the matter of a few seconds!
Location
Registry Location
Registry
Prepared By Prof. Prashant Lahane
Advent of Ad hoc Wireless Networks
• The principle behind ad hoc networking is multi-hop relaying in which messages are sent from the source to the destination by relaying through the intermediate hops (nodes).
• In multi-hop wireless networks, communication between two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another. A static string topology is an example of such network:
0 1 2 3 4 5 6 7
In the last few years, efforts have been focused on multi-hop "ad
hoc" networks, in which relaying nodes are in general mobile, and
communication needs are primarily between nodes within the same
network. Prepared By Prof. Prashant Lahane
Advent of Ad hoc Wireless Networks
An examples of such developments is the Bluetooth standard that
is one of the first commercial realizations of ad hoc wireless
networking developed by Bluetooth Special Interest Group (SIG):
• A piconet formed by a group of nodes establishes a single-hop (master node)
point-to-point wireless link.
• A scatternet formed by multiple piconets (master nodes) can establish a
multi-hop wireless network.
Though the IEEE 802.11 protocols have developed for the wireless
networks, they don’t function well in multi-hop networks.
Realizing the necessity of open standards in this emerging area of
computer communication, the mobile ad hoc networks (MANET)
standards are being developed by the Internet Working Tasking
Force (IETF) MANET working group.
Prepared By Prof. Prashant Lahane
Advent of Ad hoc Wireless Networks
Even though ad hoc wireless networks are expected to work in the
absence of any fixed infrastructure, recent advances in wireless
network architectures enable the mobile ad hoc nodes to function
in the presence of infrastructure
Multi-hop cellular networks (MCNs), self-organizing packet radio
ad hoc networks with overlay (SOPRANO), and mesh networks
are examples of such types of networks.
Mesh networks serve as access networks that employ multi-hop
wireless forwarding by non-mobile nodes to relay traffic to and
from the wired Internet. In such an environment, hybrid
technologies and/or hierarchical network organization can be used
for ad hoc and infrastructure wireless links.
Prepared By Prof. Prashant Lahane
Cellular and Ad Hoc Wireless Networks
The following figure represents different wireless networks.
• Infrastructure: cellular wireless networks
• Ad hoc: wireless sensor networks
• Hybrid: mesh networks
Cellular Wireless
Networks
Hybrid Wireless
Networks
Wireless Mesh
Networks
Wireless Sensor
Networks
Prepared By Prof. Prashant Lahane
Comparisons between Cellular and Ad Hoc Wireless Networks (I)
Cellular Networks Ad Hoc Wireless Networks
Fixed infrastructure-based Infrastructureless
Guaranteed bandwidth (designed for
voice traffic)
Shared radio channel (more suitable for
best-effort data traffic)
Centralized routing Distributed routing
Circuit-switched (evolving toward
packet switching)
Packet-switched (evolving toward
emulation of circuit switching)
Seamless connectivity (low call drops
during handoffs)
Frequent path breaks due to mobility
High cost and time of deployment Quick and cost-effective deployment
Reuse of frequency spectrum through
geographical channel reuse
Dynamic frequency reuse based on
carrier sense mechanism
Easier to employ bandwidth reservation Bandwidth reservation requires complex
medium access control protocols Prepared By Prof. Prashant Lahane
Comparisons between Cellular and Ad Hoc Wireless Networks (II)
Cellular Networks Ad Hoc Wireless Networks
Application domains include mainly
civilian and commercial sectors
Application domains include battlefields,
emergency search and rescue operations,
and collaborative computing
High cost of network maintenance
(backup power source, staffing, etc.)
Self-organization and maintenance
properties are built into the network
Mobile hosts are of relatively low
complexity
Mobile hosts require more intelligence
(should have a transceiver as well as
routing/switching capability)
Major goals of routing and call
admission are to maximize the call
acceptance ratio and minimize the call
drop ratio
Main aim of routing is to find paths with
minimum overhead and also quick
reconfiguration of broken paths
Widely deployed and currently in the
third generation of evolution
Several issues are to be addressed for
successful commercial deployment even
though widespread use exists in defense Prepared By Prof. Prashant Lahane
Applications of Ad hoc Wireless Networks
Military applications
• Ad hoc wireless networks is useful in establishing communication in a battle
field.
Collaborative and Distributed Computing
• A group of people in a conference can share data in ad hoc networks.
• Streaming of multimedia objects among the participating nodes.
Emergency Operations
• Ad hoc wireless networks are useful in emergency operations such as search
and rescue, and crowd control.
A Wireless Mesh Network is a mesh network that is built upon
wireless communications and allows for continuous connections
and reconfiguration around blocked paths by "hopping" from node
to node until a connection can be established.
Prepared By Prof. Prashant Lahane
VLAN Overview (1)
• A VLAN allows a network administrator to create groups of logically networked devices that act as if they are on their own independent network, even if they share a common infrastructure with other VLANs.
• Using VLANs, you can logically segment switched networks based on functions, departments, or project teams.
• You can also use a VLAN to geographically structure your network to support the growing reliance of companies on home-based workers.
• These VLANs allow the network administrator to implement access and security policies to particular groups of users.
Prepared By Prof. Prashant Lahane
VLAN in details (1)
• A VLAN is a logically separate IP subnetwork.
• VLANs allow multiple IP networks and subnets to exist on the same switched network.
• For computers to communicate on the same VLAN, each must have an IP address and a subnet mask that is consistent for that VLAN.
• The switch has to be configured with the VLAN and each port in the VLAN must be assigned to the VLAN.
Prepared By Prof. Prashant Lahane
VLAN in details (2)
• A switch port with a singular VLAN configured on it is called an access port.
• Remember, just because two computers are physically connected to the same switch does not mean that they can communicate.
• Devices on two separate networks and subnets must communicate via a router (Layer 3), whether or not VLANs are used.
Prepared By Prof. Prashant Lahane
Benefits of VLAN (1)
• Security - Groups that have sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches.
– Faculty computers are on VLAN 10 and completely separated from student and guest data traffic.
• Cost reduction - Cost savings result from less need for expensive network upgrades and more efficient use of existing bandwidth and uplinks.
Prepared By Prof. Prashant Lahane
Benefits of VLAN (2)
• Higher performance - Dividing flat Layer 2 networks into multiple logical workgroups (broadcast domains) reduces unnecessary traffic on the network and boosts performance.
• Broadcast storm mitigation - Dividing a network into VLANs reduces the number of devices that may participate in a broadcast storm.
– In the figure you can see that although there are six computers on this network, there are only three broadcast domains: Faculty, Student, and Guest.
Prepared By Prof. Prashant Lahane
Applications of VLAN
• Simpler project or application management - VLANs aggregate users and network devices to support business or geographic requirements. – Having separate functions makes managing a
project or working with a specialized application easier, for example, an e-learning development platform for faculty.
– It is also easier to determine the scope of the effects of upgrading network services.
Prepared By Prof. Prashant Lahane