Wireless vs. mobile S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WLAN vs. 2G/3G Performance, roaming, mobility, security...

Slides:



Advertisements
Similar presentations
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Advertisements

Mobile Application Architectures
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Introduction to Unlicensed Mobile Access. Contents Basic Concept Operation Overview Major Advantages.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Nafi Ul KarimID: Masud Rana RashelID:
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Wireless Design for Voice Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
FIXED MOBILE CONVERGENCE  Sravanthi  Suparna  Swathi  Shilpa.
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
TNC 2003 Wireless Campus project Coletta Elisa Marchioro -
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
Computer Networks IGCSE ICT Section 4.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
By: Matthew Follett. Introduction  A Wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Fundamental of wireless network.  Heinrich Hertz discovered and first produced radio waves in 1888 and by 1894 the modern way to send a message over.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
INTRODUCTION Wireless communication technology Provide high speed internet to large geographical areas Part of 4 th generation(4G) Alternative to cable.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
WLAN, part 1 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE WLAN architecture Basic routing example IAPP.
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
SEMINAR ON “ GPRS “ GPRS- General Packet Radio Service provides a direct link into the Internet from a GSM phone Downloaded From Projectsbhangar.com.
OSI Reference Model and Security COMP 423. The Physical Layer Establish and terminate the physical and logical connections to the media Manage the flow.
1 Chapter Overview Wireless Technologies Wireless Security.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
DECT Data Applications Contents DECT Data Application Scenarios DECT Data Interoperability DECT Data Standards DECT Data Trends Conclusions.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
Communications and Networks © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
GENERIC ACCESS NETWORK TOWARD FIXED–MOBILE CONVERGENCE
Wireless Networking Nandakumar.P. Web Resource
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Femto Network Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
 GPRS What’s in this slide?  Introduction to GPRS.  History  GPRS Service.  GPRS Speeds.  GPRS Mobile Devices.  Services of GPRS.  GPRS in practice.
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
COMPUTER FUNDAMENTALS David Samuel Bhatti
Network media, protocols and networking standards, networking hardware.
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
ICT Unit 4: Network and the effects of using them
BITS Pilani Pilani | Dubai | Goa | Hyderabad EA C451 Vishal Gupta.
Wi-Fi Technology.
Seminar on 4G wireless technology
“An Eye View On the Future Generation Of Phones”
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
5G MOBILE TECHNOLOGY By J.YOGESH 08M31A0425.
Wireless Local Area Network (WLAN)
Wireless Mesh Networks
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Wireless LAN Security 4.3 Wireless LAN Security.
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Wireless Campus project
Discussion Issues on IMS-based NGN
Presentation transcript:

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WLAN vs. 2G/3G Performance, roaming, mobility, security... Services in WLAN vs. 2G/3G Web browsing, VoIP, , messaging Location based services Unlicensed Mobile Access (UMA) Basic idea and UMA architecture

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks2 WLAN vs. 2G/3G: Bit rates IEEE WLANGPRS 3G (WCDMA) b: 11 Mbit/s (in practice 6 … 8 Mbit/s max.) a/g: 54 Mbit/s (in practice 30 … 40 Mbit/s max. over short distances) 170 kbit/s theoretically (in practice much less) Up to 2 Mbit/s (in indoor networks)

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks3 WLAN vs. 2G/3G: Coverage IEEE WLAN2G/3G Hundreds of meters (at best) around each AP => Full outdoor coverage is difficult to achieve. WLANs are optimised for indoor usage. Macro/micro/picocell networks cover all kinds of environments (indoor, urban, rural) => Full coverage even in remote areas.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks4 WLAN vs. 2G/3G: Frequency bands IEEE WLAN2G/3G The 2.4 GHz ISM band (free for all) causes problems. Interference from other WLAN networks, Bluetooth equipment, microwave ovens, etc. Frequency bands are reserved for 2G/3G networks. Interference is usually not a problem (good network planning).

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks5 WLAN vs. 2G/3G: Spectrum efficiency IEEE WLAN2G/3G The CSMA/CA access method is not very spectrum efficient. Spectrum efficiency is given as bits/Hz/area Spectrum efficiency is better than for WLAN. Various advanced methods for increasing spectrum efficiency.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks6 WLAN vs. 2G/3G: Roaming IEEE WLAN2G/3G WLANs do not support roaming in a strict sense. However, WLANs support portability. International roaming agreements between operators => 2G/3G networks support roaming on a wide scale.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks7 Roaming vs. portability Roaming means that it is possible to use a terminal when moving from one network to another. Additional features (mobility, security) that involve cooperation between network operators or service providers are usually supported, due to roaming agreements between these operators or service providers. Portability means that it is possible to use a terminal anywhere in a certain network (e.g. WLAN). However, when moving to another network, mobility or security features are not automatically maintained.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks8 WLAN vs. 2G/3G: Mobility IEEE WLAN2G/3G Terminal mobility is not supported (except when moving within the WLAN). Terminal mobility is supported (using techniques such as location updating, paging, and handover). Personal mobility requires e.g. SIP (Session Initiation Protocol) and specialised network resources (SIP proxy, location server)

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks9 Terminal vs. personal mobility Terminal mobility means the ability of the network to locate a mobile terminal, route incoming or outgoing calls (or packet sessions) regardless of the point of attachment to the network, and maintain connections while the terminal moves around in the network. Personal mobility means that a person can be reached via any one of several terminals (that can be located at different places) using a single address (e.g. SIP address). This concept has not been widely used yet.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks10 WLAN vs. 2G/3G: Security IEEE WLAN2G/3G No security as default. WEP (if used) offers poor security. WPA (if used) provides better security due to the support of key management. Always supported: User authentication Encryption over the radio interface Key management. 3G provides additional security features.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks11 WLAN vs. 2G/3G: Network planning IEEE WLAN2G/3G Usually no network planning (due to the inexpensive network parts). This (+ usage of ISM band) may result in poor WLAN network performance. Network planning is rather complicated (since equipment is expensive and should not be underused). As a benefit => good coverage and spectrum utilisation.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks12 WLAN vs. 2G/3G: Cost of equipment IEEE WLAN2G/3G Network infrastructure is inexpensive (existing LAN + additional APs) if no advanced network concepts are used. End user equipment is also inexpensive. Network infrastructure is expensive. 2G/3G terminals are not dramatically more expensive than WLAN cards.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks13 WLAN vs. 2G/3G: Charging IEEE WLAN2G/3G Charging solutions are difficult to implement (specialised network elements required). WLAN users are used to having “free” access in many places. Charging is part of the system infrastructure. Without charging, the expensive 2G/3G network infrastructure would not be economically viable.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks14 Services: Web browsing Web browsing applications are of client - server type WLAN and 2G/3G networks are equally well suited for such applications (disregarding differences in bitrates, coverage, etc.). Web server Terminal = Client 1 2 http request html page download

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks15 Services: VoIP If reachability is an important issue, a client - client type of communication system requires some IP layer or application layer mobility solution => new network elements are required both in 2G/3G and in WLAN. Terminal = Client IP network(s) Terminal = Client

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks16 Services: (1) is a store-and-forward service. Messages are sent to a server (using e.g. the SMTP protocol), from which the recepient of the message can fetch it any time (using e.g. the POP or IMAP protocol). server SenderRecepient 1 2 3

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks17 Services: (2) WLAN and 2G/3G networks are equally well suited for this kind of task, since both transactions are of the client - server type (in other words a mobility solution is not required). server SenderRecepient 1 2 3

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks18 Services: (3) However, if the recepient wishes to be notified about incoming messages, this requires IP layer mobility (inherent in 2G/3G but not in WLAN). server SenderRecepient Notification

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks19 Services: Messaging (1) Messaging (short messages, multimedia messaging) is a typical 2G/3G service, also of store-and-forward type (messages are stored in a message server). Message server SenderRecepient Notification

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks20 Services: Messaging (2) In this case, notification is essential. Again, 2G/3G systems have notification inbuilt into the system, whereas WLAN networks require some IP layer mobility solution. Message server SenderRecepient Notification

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks21 Location based services (1) Location based services require knowledge about the location of the terminal. A typical service scenario is shown below: Server Location server User sends enquiry to server (containing relevant data)

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks22 Location based services (2) Server Location server The server needs location information to customise the service and contacts location server Location server determines location and returns the location information to the server 34

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks23 Location based services (3) Server Location server User obtains customised information (e.g. nearest restaurants) Nearest restaurants: Old goose Green horse Castle inn

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks24 Location based services (4) Server Location server Location based services require specialized network elements (location server, positioning equipment) usually available in 2G/3G but not in WLAN networks.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks25 Location based services (5) Server 12 3 If the wireless station in the WLAN is equipped with a GPS receiver and supporting software, location based services may still be possible (?) GPS 1 Wireless station sends location information with service request 2 Service request Response from server

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks26 Unlicensed Mobile Access (UMA) Unlicensed Mobile Access (UMA) technology provides access to GSM and GPRS mobile services over wireless networks based on unlicensed spectrum technologies, e.g. Bluetooth and IEEE networks. By deploying UMA technology, service providers can enable subscribers to roam and perform seamless handovers between cellular networks and public and private unlicensed wireless networks, and to use for instance SIM/AuC authentication also in the wireless networks, using dual-mode handsets.

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks27 UMA architecture Base station BSC Access point UNC IP access network Core mobile network Radio access network Unlicensed mobile access network (UMAN) UMA network controller

Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks28 UMA standardization In order to promote the widespread adoption of UMA technology, a number of companies within the cellular & wireless industry have jointly developed a set of open specifications. See: What is needed to implement UMA infrastructure? 1. UMA-capable terminals 2. UMA network controller 3. Protocols that offer secure transport of GSM/GPRS signalling and user plane traffic over IP.