Wi-Fi and Cellular Handoff Sowjanya Talasila Shilpa Pamidimukkala Sravanthi Yalamanchili.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Doc.: IEEE xxx Submission May 10-14, 2004 Alan Carlton, Interdigital CommunicationsSlide 1 Defining Layer 2.5 Alan Carlton Interdigital Communications.
Performance Analysis Lab,
Advantage Century Telecommunication Corp. AIL: Actively Intelligent Link-Layer Handoff Guo-Yuan Mikko Wang
Introduction to Unlicensed Mobile Access. Contents Basic Concept Operation Overview Major Advantages.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Capacity Limit Problem in 3G Networks By Fahd Ahmad Saeed.
Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WLAN vs. 2G/3G Performance, roaming, mobility, security...
Wireless Design for Voice Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
FIXED MOBILE CONVERGENCE  Sravanthi  Suparna  Swathi  Shilpa.
Protection notice / Copyright notice HiPath MobileConnect Delivering on the Promise of Enterprise FMC February 2007.
Handoff in Hybrid Mobile Data Networks Vijay Dadlani.
Security Awareness: Applying Practical Security in Your World
System Architecture for Billing of Multi- Player Games in a Wireless Environment using GSM/UMTS and WLAN Services Femi Adeyemo 11/21/02.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
WiMAX Vs Wi-Fi. 2 WiMAX Worldwide Interoperability for Microwave Access Brand licensed by the WiMax Forum. “a standards-based technology enabling the.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Jim Grams Azaire Networks Chief Technology Officer WiFi and 3G Convergence Made Easy.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
1 Chapter Overview Wireless Technologies Wireless Security.
Vertical Handover Nawshad Rehan Rasha
generic access network
IEEE & Priyanka Vanjani CST 554: Short Presentation ASU Id #
VoFi standards & deployment models Thenu Kittappa.
CWNA Guide to Wireless LANs, Second Edition
Modularized Two Step Vertical Handoff Scheme In Integrated WWAN and WLAN Shimin Li Ying Wang.
KARTIK DABBIRU Roll # EE
WiMAX, meaning Worldwide Interoperability for Microwave Access Emerging technology that provides wireless transmission of data using a variety of transmission.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
PRESENTATION ON WI-FI TECHNOLOGY
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Completing the Convergence Puzzle: A Survey and A Roadmap IEEE Wireless Communications ‧ June 2009 DJAMAL-EDDINE MEDDOUR, USMAN JAVAID, AND NICOLAS BIHANNIC,
IEEE &
Cdma CDMA SYSTEMSERICSSON PROPRIETARYExecutive Briefing on 3G Services Supported today with cdmaOne and tomorrow with cdma2000 Gwenn Larsson Director Strategic.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
October 4-7, 2004 Los Angeles, CA VoWLAN Trends and Opportunities Kamal Anand Vice President Marketing Meru Networks
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Femtocell Femtocell Definition A small cellular base station, designed for use in residential or enterprise. Connects to the service.
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
GENERIC ACCESS NETWORK TOWARD FIXED–MOBILE CONVERGENCE
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
Implementing VoIP in a wireless world Herman Abel Product Manager Aculab (booth 402) Phone:
Lecture 24 Wireless Network Security
Femto Network Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 9: Σύγκλιση Σταθερών και Κινητών Επικοινωνιών (Fixed-Mobile Convergence) Διδάσκων: Βασίλειος Σύρης Τμήμα:
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Submission May 2016 H. H. LEESlide 1 IEEE Framework and Its Applicability to IMT-2020 Date: Authors:
WiMAX Chapter 11. Wireless Technologies WWAN (proposed) WMAN 70 Mbps ~50 Km a/e WiMAX New standard for Fixed broadband Wireless. Trying to.
IEEE Wireless LAN Standard
Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef.
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
LONG TERM EVOLUTION DANISH HASRAT (091042) DEEPAK SINGH (091043) GAURAV THAWANI (091052) NILESH SINGH (091079)
Introduction to “Tap – Dance ”. Company Proprietary Presentation Topics  Introduction  Handover scenarios  Inter-Network Handover consequences  Common.
BITS Pilani Pilani | Dubai | Goa | Hyderabad EA C451 Vishal Gupta.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
4G-WIRELESS NETWORKS PREPARED BY: PARTH LATHIGARA(07BEC037)
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Presentation transcript:

Wi-Fi and Cellular Handoff Sowjanya Talasila Shilpa Pamidimukkala Sravanthi Yalamanchili

Agenda Cellular Networks WLAN Vertical Handoff Fixed Mobile Convergence Introduction to HTN HTN working Performance Introduction to UMA UMA specifications UMA technology

Cellular Networks Wide coverage (km range) Large number of users Low speeds (in Kbps) High deployment costs

Wireless LANs High Inexpensive to set up Speeds up to 108 Mbps Low coverage Small number of users

Vertical Handoff Vertical handoff is a technique that allows a mobile user to roam between different networks and access technologies,in a manner that is transparent to the applications and users, without disrupting connectivity.

Benefits of Vertical Handoff Simultaneous use of different access networks and technologies. Seamless transfer of connection between different networks and access technologies.

Motivations 3G2G WLAN LAN Data rate Mbit/s Mobility Vehicle Walk Fix Complementary performance Mobility vs. Throughput for communication systems Vertical handover

Combining both WLAN and Cellular Combine advantages of cellular networks and Wi-Fi hotspots  Higher bandwidth  Extended coverage  Inexpensive  Large number of users

Goals of Vertical Handoff Low handoff latency Power saving Low bandwidth overhead

Vertical Handoff Procedure - Mobile Downward CDMA cellular card activate

Vertical Handoff Procedure - Mobile Upward check beacon and activate WLAN card

Handoff Decision Radio link characteristic Application traffic classes

Fixed Mobile Convergence Fixed mobile convergence (FMC) solutions enable seamless handoff of calls and call features across wireline (Wi-Fi or ) and wireless (cellular) networks. FMC solutions available today enable wireline carriers to recapture lost revenue and subscribers by extending mobility into the enterprise while keeping wireless minutes on the wireline network.

Contd.. These solutions use dual-mode handsets to seamlessly roam between Wi-Fi and cellular networks and provide users with one set of business telephony features, one phone number, and one user interface.

FMC

FMC Approaches Two approaches to Fixed Mobile Convergence Handoff Trigger Node(HTN) Unlicensed Multiple Access(UMA)

Handoff Trigger Node

Handoff Trigger Node (HTN) A simple WiFi handoff trigger node can be installed in the WLAN/cellular transition region and generates link layer triggers which cause the initiation of the vertical handoff process.

HTN Two solutions for inter-working of WLAN/ Cellular Tight-coupling Integrates WLAN hotspot into cellular infrastructure. WiFi operate as a slave to cellular coverage cell. Loosely-coupling No such close relation between the networks and allows many network operators and service providers to operate in the same market.

HTN (contd..) When roaming inside a WiFi hotspot, a dual mode MS uses IEEE layer 2 roaming procedures. When the receive signal strength indication (RSSI) drops consistently below a certain threshold, MS scans for the new access point (AP) using standard IEEE procedures.

Without HTN

HTN (contd..) The latency associated with the above can be significant and includes components such as BS searching and higher layer signaling functions. Existing WiFi/cellular transition coverage areas are highly site specific.

Using HTN HTN can be installed in the WLAN/cellular transition region, generate link layer triggers which cause the initiation of the vertical handoff process. HTN does not function as an access point but as a regular data station with enhanced capabilities.

HTN (contd..) During a successful vertical handoff, the MS is assigned capacity in the cellular system. In a tightly-coupled WIFI/cellular design it is possible to reserve capacity for WiFi-cellular handoffs, so that call dropping probability is acceptably low. In loosely- coupled BS may not be able to distinguish WiFi-cellular handoff from new call request.

Handoff Trigger Node (HTN)

How HTN works HTN acts as a simple WiFi end station and associates with the closest AP i.e. AP3 in fig just as normal IEEE station. HTN then continuously scans IEEE channel corresponding to the coverage area of AP3. The scanning that is performed is done in “promiscuous mode”, i.e. normal HTN MAC filtering is disabled and it intercepts and listens to all the station transmissions.

How HTN works (contd..) The packets that are received are then filtered at higher protocol layers for active voice connections. The objective of this is to identify, if possible, all active voice connections that are with in the range of the HTN. When the HTN is installed, it is configured with a site-specific receive signal strength indication (RSSI) threshold, denoted by yhot.

How HTN works (contd..) When an end station is detected HTN station scanning, whose RSSI exceeds yHOT, a HO_TRIGGER_CMD is sent to the MS in question. HTN must extract the MS MAC address from the scanned packets and use this information to send a trigger command to the station in question. Once the mobile station receives the HO_TRIGGER_CMD, it initiates the vertical handoff procedure.

How HTN works (contd..) This includes having the MS turn on its cellular radio prior to setting up the vertical handoff. A handoff Trigger Node can easily perform handoff trigger in mulitichannel/multi-AP coverage situations simply by serially scanning on the various channels of interest.

HTN Performance Here are some of the results obtained from a stimulation of HTN design using the below table.

Performance (contd..) In the result there is a comparison between LHO- legacy handoff case. HOT-Handoff triggering case.

Handoff Dropping Probability This is the probability that a call with at least one handoff attempt from the WLAN to the cellular system is dropped. This is computed by the total number of stations that have at least one handoff request.

Handoff Dropping Probability

Cellular Time Fraction This is the average fraction of time that a call which has stared inside the WiFi hotspot, spends being served by the cellular system.

Cellular Time Fraction

Mean Vertical Handoff Deadline This is the average time the MS has to complete a vertical handoff after its first handoff attempt.

Mean Vertical Handoff Deadline

False vertical Handoff Rate This is the false alarm rate,i.e. the rate at which unnecessary vertical handoffs are triggered. This is obtained by computing the fraction of vertical handoffs that occur which are unnecessary because the MS completes its call before leaving the WiFi coverage area.

False vertical Handoff Rate

Result: An important function provided by the HTN is to significantly reduce the call dropping rate even when there is very little collaboration between the cellular and WLAN hotspot providers.

UMA

What is UMA? Unlicensed Mobile Access  UMA establishes a standard for seamless hand-off and roaming between a cellular network and fixed IP-based wireless networks  UMA is an extension of GSM/GPRS mobile services.

UMA (Unlicensed Mobile Access) UMA lets mobile operators deliver voice, data and IMS/SIP(IP Multi media Subsystem /Session Initiated Protocol) applications to mobile phones on Wi-Fi access network.

UMA Protocols UMA is on top of it at the transport layer (Layer 4) and has its own set of control protocols. Limits IP packet Delivery??

UNC  The UMA specification is based around UNC. What is UNC??? A UMA Network Controller (UNC) acts as a virtual base station, providing handoff between cellular and Wi-Fi networks.

How UMA Technology Works A mobile subscriber with a UMA-enabled, dual- mode handset moves within range of an unlicensed wireless network to which the handset is allowed to connect. Upon connecting, the handset contacts the UMA Network Controller (UNC) over the broadband IP access network to be authenticated and authorized to access GSM voice and GPRS data services via the unlicensed wireless network.

(Contd..) If approved, the subscriber’s current location information stored in the core network is updated, and from that point on all mobile voice and data traffic is routed to the handset via the Unlicensed Mobile Access Network (UMAN) rather than the cellular radio access network (RAN).

ROAMING When a UMA-enabled subscriber moves outside the range of an unlicensed wireless network to which they are connected, the UNC and handset facilitate roaming back to the licensed outdoor network. This roaming process is completely transparent to the subscriber.

HANDOVER  Handover in: The mobile station moves from macro network to a UMAN.  Handover out: The mobile station moves from UMAN to macro network.  Handover UMA: The mobile station moves with in a UMAN or from UMAN to UMAN.

Handoff Specifications  Subject to mode selection, UMA shall support seamless handover in and handover out,provided the following conditions are true:  The mobile station stays within the limits of service (pedestrian state of motion)  The mobile station remains during the time of handover within the coverage of both the networks

(Contd…)  UMA shall manage bandwidth during handover between macro network and UMAN.  UMA shall produce seamles handover if  If the MS stays with in the coverage limit  If the MS remains during the time of handover with in the coverage of UMAN.  Selection of APs and Macro-UMAN.

Security in UMA UMA does not mandate any security mechanism, but can coexist with those available, such WPA, WPA2, or WEP. (WPA & WEP???)  WEP (wired equivalent privacy)  WPA  Temporal Key Integrity Protocol (TKIP)

UMA service providers to terminate tunnels while concurrently providing advanced security and routing functions. This allows service providers to deploy a single platform that can support IMS termination as well as additional security services such as firewalls, Denial of Service (DoS) attack prevention and Virtual Private Networks (VPNs).firewallsDoSVPNs Security in UMA

Advantages Availability &Pricing  UMA could be used to provide better in-building coverage for customers who don't get a good cellular signal in some areas, including basements.  It enables service providers to deliver voice at a lower cost when handsets are within range of an unlicensed wireless network.

Issues  If a customer doesn't have a wireless network already in the house, a wireless access point would be needed in addition to a broadband link (ATA).  The most expensive and technologically challenging component of UMA solution is the Wi-Fi and cellular handset, because of battery-life limitations, cost, and size

 UMA cannot guarantee the quality of a voice call or the throughput of a data connection and traffic prioritization with QoS can significantly improve performance, especially in a residential environment where traffic is likely to be less heavy than in the enterprise. (fixed line divisions ) Contd..

Conclusion  As a growing number of handsets incorporate Wi-Fi, users will be able to take advantage of the proliferation of Wi-Fi WLANS- both in private and public enviro mants to route lower cost VoIP calls.

References IEEE White Paper: Handoff Trigger Nodes for Hybrid IEEE WLAN/Cellular Networks. e_021805/ e_021805/ epartments Cellular-to-WLAN.html epartmentshttp:// Cellular-to-WLAN.html

What is FMC and it’s two approaches?  Solution: Refer to slide 13 and 16. What are the two solutions for inter-working of WLAN/ Cellular and which is preferred?  Solution: Refer to slide 19 and 24. What are UMA handoff specifications?  Solution: Refer to slide 52. Questions?