Vous êtes sur la page 1sur 43

Cellular and Wireless Communication Systems II

Emerging Technologies Wireless LAN

Emerging Technologies

Emerging Technologies
Bluetooth (802.15.1a) ( . . )
is a technology in the personal area network (PAN)

Radio Frequency Identifier (RFID)


is emerging as a leading technology in the logistics, manufacturing, and retail

industry
Wireless Broadband (WiMax 802.16) ( )
is expected to be a mainstream technology very soon

Mobile IP
Allows data handoff over different sub-networks

IPv6
Is the next generation internet protocol

Java Card technology Is emerging as a forerunner in the security and personal identity domain

Bluetooth
It was the nickname of a Danish king Harald Bltand, who Bltand

unified Denmark and Norway in the 10th century Unifying the telecom and computing industries Allows users to make ad hoc wireless connections between devices linke mobile phones desktop or notebook phones, comperters without any cable Transfer data at a speed of about 720 Mbps within 50 meters of range or beyond through walls, clothing and even luggage bags

Bluetooth scatternet as a combination of Piconets


Headset Printer Mouse Mouse

Piconet 2 Cellphone Piconet 1 Cordless handset

Scatternet

Bluetooth Protocol
Globally unlicensed 2.4 GHz ISM (Industrial Scientific and 24

Medical) frequency band There are 79 channels spaced 1 MHz apart from 2.402 GHz to p p 2.480 GHz Bluetooth Special Interest Group maintains and manages bluetooth p p g standard IEEE has also adapted Bluetooth as the 802.15.1a standard Power levels starting from 1 mW covering 10cm to 100mW covering upto 100 meters It supports unicast (point-to-point) and multicast (point-tomultipoint) connections

Bluetooth Protocol
Master and slave form a piconet Upto 7 slaves devices can be set to communicate with a master Several of these piconets can be linked together to form a larger

network in an ad hoc manner A scatternet is formed when a device from one piconet also acts as a member of another piconet

Bluetooth Protocol Stack


At the physical layer: spread spectrum technologies

(both direct sequence and frequency hopping spread spectrum) There are connectless (ACL-Asynchronous Connectionless li k) and connection-oriented (SCOC ti l link) d ti i t d (SCO Sychronous Connection-oriented Link) links 1. Bluetooth core Protocols
Baseband, Link Manager Protocol (LMP), Logical Link control

and Ad d Adaptation Protocol (L2CAP) and S P l (L2CAP), d Service D Discovery Protocol (SDP)

Bluetooth Protocol Stack


vCard/vCal OBEX WAE WAP
UDP IP PPP TCP

ATcommands

TCS BIN

SDP

RFCOMM L2CAP

Audio

Host Controller Interface


Baseband B b d Bluetooth Radio

LMP

Bluetooth Protocol stack


Baseband layer enables the physical RF link between Bluetooth

units forming a piconet.


ACL packets are used for data only, while the SCO packet can contain audio

only or a combination of audio and data All audio and data packets can be provided with different levels of CRC/FEC for error detection/correction

Link Manager Protocol (LMP) When they are in range, LMP of either device discover each other y g, Authentication, encryption Link setup and negotiates baseband packet size Control power modes, connection state

Bluetooth Protocol stack


Logical Link Control and Adptation Protocol (L2CAP)
Segmentation and reassembly Multiplexing of Bluetooth packets from different applications

Service Discovery Protocol (SDP) enables a Bluetooth device

to join a piconet
Inquires what services are available in a piconet and how to

access

Bluetooth Protocol stack


2. 2 Cable Replacement Protocol
RFCOMM is a serial line communication protocol Emulates RS-232 control and data signals over Bluetooth RS 232

baseband protocol

3. Telephony Control Protocol


Telephony Control Protocol Binary TCS BIN is a bit oriented

p protocol
Defines the call control signaling protocol to setup of speech and data

calls between bluetooth devices D fi Defines mobility management procedures for handling groups of bili d f h dli f Bluetooth TCS devices

AT-Command A set of AT-commands by which a mobile phone can be used and controlled as a modem for fax and data transfers

Bluetooth Protocol stack


4. 4 Adopted Protocols
PPP: Point-to-Point protocol is the means of taking IP packets to/from the

PPP layer and placing them onto the LAN TCP/IP OBEX (Object Exchange Protocol) is a session protocol developed by the Infrared Data Associcaiton (IrDA) to exchange objects
Functionality of HTTP in a much lighter fashion Defines a folderlisting object, which can be used to browse the contents of folders

on remote d i t devices
Content Formats vCard and vCalendar
Defines format of an electronic business card and personal calendar entries

developed by Versit consortium vMessage and vNote are defined in the IrMC (IrDA Mobile Communication) specification

Bluetooth Security
Authentication key exchange and encryption Authentication, exchange, A frequency-hopping scheme with 1600 hops/sec At th l the lowest levels of the protocol stack, Bluetooth uses th t l l f th t l t k Bl t th the

publicly available cipher algorithm known as SAFER+ to authenticate a devices identity devices Different application verticals use their own security infrastructure at the application layer

Bluetooth Application Models


Profiles define the protocols and protocol features supporting a

particular usage model


File transfer: object types include .xls, .ppt, .wav, .jpg, .doc files, folders or

directories or streaming media formats Internet Bridge: mobile phone or cordless modem acts as modem to the PC, p providing dial-up networking an|d fax capabilities without need for p y g p g | p physical connection to the PC LAN Access: multiple data terminals use a LAN access point (LAP) as a wireless connection to an Ethernet LAN Synchronization: a device-to-device synchronization of data Headset: Handfree cellular phone usage in automobiles

RFID
It is a radio transponder (tags) carrying an ID that can be read

through radio frequency interfaces The object could be an entity in a manufacturing shop, g j y g p, goods in transit, item in a retail store, a vehicle in a parking lot, a pet, or a book in a library There are 6 basic frequencies on which RFID operates.
132.4 KHz, 13.56 MHz, 433 MHz, 918 MHz, 2.4 GHz and 5.8 GHz Low frequency (30 KHz to 500 KHz) systems
short reading ranges and lower system costs Tags are slow in data transfer and suitable for slow-moving objects g g j Security access, asset tracking and animal identification applications

RFID
High frequency (850 MHz to 950 MHz and 2.4 GHz to 2.5GHz) systems g q y( ) y
Long read ranges and high data transfer speeds Fast moving objects like railway wagon tracking and identification of vehicles on freeways

for automated toll collection

Applications Power-based grouping


Passive tags are generally in low frequeny ranges
It obtains operating power from the readers antenna The data within a passive tag is read only and generally cannot be changed during opertion It contains data usually 32 to128 bits long

Active tags are powered by an internal battery


Data within an active tag can be rewritten or modified Memory can vary from a few bytes to 1MB A tag migh give a machine a set of instructions, and the machine would then report its

performance to the tag

RFID
The reader emits radio waves in any range from 1 cm to 25 meters

or more When an RFID tag passes through the electromagentic zone of the gp g g reader, it detects the readers activation signal The reader decodes the data encoded in the tags integrated circuit g g and the data is passed to the host computer for processing A basic RFID system consists of
A transponder programmed with unique information (RFID tag) A transceiver with decoder (a reader) A antenna or coil An t il

RFID
Close proximity passive tags rely on electromagnetic or

inductive coupling techniques Active tags are based upon propagating electromagnetic waves techniques ANSIs X3T6 group is currently developing a draft ANSI s document-based systems operation at a carrier frequency of 2.45 GHz ISO has already adopted international RFID standards for animal tracking, ISO 11784 and 11785 tracking

WiMax
Last-mile subscriber access WLL wireless local loop Last mile, access, WLL-wireless Figure 4.4 IEEE802 16 IEEE802.16 IEEE802.16.1 Air interface for 10 to 66 GHz IEEE802.16.2 Coexistence of broadband wireless access systems y IEEE802.16.3 Air interface for licensed frequencies, 2 to 11 GHz The physical layer Specifies frequency band, the modulation scheme, error-correction techniques, synchronization between transmitter and receiver, data rate and the multiplexing structure p g

WiMax
The MAC layer
Responsible for transmitting data in frames and controlling

access to the shared wireless medium through media access g control layer Defines how and when a base station or subscriber station may y initiate transmission on the channel
Convergence layer
Provides functions specific to the service being provided For IEEE802.16.1, bearer services include digital audio/video

multicast, digital telephony, ATM, Internet access, wireless trunks in telephone networks and frame relay

WiMax
Physical Layer
Supports FDD and TDD Both TDD and FDD alternatives support adaptive burst profiles

in which modulation and coding options may be dynamically assigned on a burst-by-burst basis g y
MAC
To accommodate both continuous and bursty traffic y ARQ, and Mesh network architecture

Broadband mobile cellular system y


Figure 4.5: Moving BTS

Mobile IP
In a portable computing environment we move with the

device from one location to another and use the network w e stat o a y. while stationary. Mobile computing offers seamless computing facility even if the user changes the network Mobile IP
While a user is connected to applications across the Internet

and the users point of attachement changes dynamically, all p g y g connections are maintained despite the change in underlying network properties

Mobile IP
TCP connection is identified by Source port and IP addresses Destination port and IP addresses Mobile IP allows the mobile node to use two IP addresses Home address is static and known to everybody as the identity of the host Care-of address, this changes at each new point of attachement and can be thought of as the mobile nodes location specific address Home agent receives all the packets for the mobile node and

arranges to forward them to the mobile nodes current point of attachment

Mobile IP
Whenever the mobile node moves, it registers its new care-of address with its , g

home agent
The home agent forwards the packet to the foreign network using the care-of

address dd
Tunneling, the new header with care-of address encapsulates the original

p packet, causing the mobile nodes home address to have no impact on the , g p encapsulated packets routing
Discovery
A mobile node uses a di bil d discovery procedure to id if prospective h d identify i home agents and d

foreign agents
Registration
A mobile node uses a registration procedure to inform its home agent of its care-of

address
Tunneling
Tunneling procedure is used to forward IP datagrams from a home address to a care-

of address

Mobile IP architecture
Mobile node A Home Network for A

X
Home Agent 2 Internet 1 5

X
Foreign Agent

Foreign g Network

Server X

Mobile IP
Discovery procedure
A router can detect whether a new mobile node has entered

into its network The mobile node determines whether it is in a foreign network For the purpose of discovery, a router or an agent periodically p p y, g p y issues a router advertisment ICMP message A router advertisement can carry information about default routers and information about one or more care-of addresses Or the mobile node can broadcast a solicitation that will be answered b any foreign agent d by f

Mobile IP
Registration procedure
The mobile node sends a registration request to the home agent

with the care-of address information Home agent will update its routing table and reply an acknowledge to the mobile node g Using 128-bit secret key and MD5 hashing algorithm, a digital signature is generated for authentication Home address, care-of address, and registration lifetime is maintained in the home agent which is called binding
Tunneling
IP-within-IP encapsulation mechanism is used

IPv6
IETF has produced a comprehensive set of specifications that

define the next generation IP protocol originally known as IPNg now renamed as IPv6 g ow e a e v6 IPv6 uses 128 bit addresses
Public topology, 48 bit external routing prefix topology Site topology, typically 16 bit subnet number Interface indentifier, typically an automatically generated 64 bit

number unique on the local LAN segment

IPv6 security
IPv6 comes native with a security p y protocol called IPSec S IPSec protocol is a standards-based method of providing privacy, integrity and

authenticity to information transferred across IP networks


Diffie-Hellman key exchange mechanism for deriving key between peers on a public

network Public key cryptography to guarantee the identity of the two parties and avoid manin-the-middle attacks Bulk encryption algorithms, such as 3DES, for encrypting the data Keyed hash algorithm, such as HMAC, combined with traditional has algorithms such y g , , g as MD5 or SHA for providing packet authentication Digitla certificates signed by a certificate authority to act as digital ID cards IPSec provides IP network-layer encryption

IPv6
Packet payload
Packet is attached a tag for customizing the quality of service

Migrating from IPv4 to IPv6


Network components: Routers upgrading or using IP tunneling,

IPv6 can propagate over an IPv4 envelop Computing nodes: Operating system upgrades Networking applications: Porting of the applications from IPv4 to IPv6 environment

IPv6
Migration Windows system
Windows 9x families do not support IPv6 Windows XP and Windows server 2003 support IPv6 natively Windows 2000 Professional can be upgraded ipv6.exe, ping6.exe, tracert6.exe, ttcp.exe,

Linux system
Linux kernel 2.4.x either supports IPv6 directly or can be upgarded All versions afer Red Hat Linux 7.1 supports IPv6 directly ping6, traceroute6, tracepath6, tcpdump, proto,

Applications pp
To allow the larger address space for the destination endpoint

Java Card
A smart card with Java framework Smart card is a plastic card with intelligence and memory ISO 7816 standards t d d
ISO 7816-1 defines physical characteristic of the card ISO 7816 2 di 7816-2: dimensions and l ti of th contacts i d locations f the t t ISO 7816-3: electronic signals and transmission protocols ISO 7816 4 Interindustr Commands for Interchange 7816-4: Interindustry

Java Card
A smart card is embeded with either A microprocessor and a memory chip or Only a memory chip with non-programmable logic A microprocessor card An intelligence program resident within the card which can add, delete, and otherwise manipulate information on the card h l f h d A memory card can store some information for some pre-defined

operation Smart card are capable of carrying data, functions, and information on the card Unlike memory strip cards, they do not require access to remote databases at the time of the transaction

Java Card
To allow interoperability, Java was chosen as the vehicle for interoperability

interoperability All the microprocessor based smart card now offer J API p Java framework on the smart card 3GPP has decided to use Java Card as the standard for USIM and J ICC (Integrated Circuit cards) Productivity, security, robustness, tools, and portability JVM, the language definition, and the core packages have been made more compact to bring Java technology to the resource constrained smart card

Java Card
A smart card of a GSM SIM card supporting Java Card

functionalities may typically have


8 to 16 bit microprocessor running at speed between 5 MHz to 40 MHz

with 32K to 128K bytes of EEPROM Using proactive SIM technology of GSM Phase 2+, the application on the SIM card can be activated in an automated fashion

Java Card technology supports OTA (Over the air) downloads In OTA download, a Java applet (through SMS) can be download

downloaded by the network operator proactively or by the user interactively over the wireless media y Applications written for the Java Card platform are referred to as applets

Java Card
Java card virtual machine on smart card is splited into

two parts
Runs off card: processing tasks that are not constrained to off-card:

execute at runtime, such as class loading, bytecode verification, g, p resolution and linking, and optimization Runs on-card: JCVM, Java card runtime environment (JCRE), and the Java API

Architecture of Java card applications pp development process


Java program

Compile

Class files

Off-card Off card VM

Converter

CAP File

Export files

Installer

Interpreter

On-card VM

Java Card application development process


Complier is used to convert a Java source into Java class files The converter will convert class files into a format downloable

into the smart card


Ensures the byte code validity before the application is installed into the card

Conversion by the off-card VM into CAP (Converted APlet) y ( )

format The applet is transferred into the card using the installer

Java Card application development process


JCRE is made up of the on-card virtual machine and the Java Card on card

API classes JCRE p J performs additional runtime security checks through applet y g pp firewall Applet firewall partitions the objects stored into separate pp p j p protected object spaces, called contexts
Controls the access to shareable interfaces of these objects

A Java card applet is not intended to run within an Internet

browser environment

Backup

Wireless S Wi l Sensor N t k Network


Useful in unpredictable, unreliable environments unpredictable Low cost, low power disposal devices E h device holds sensing, memory, and communication Each d i h ld i d i ti

module P Power control i a major challenge l is j h ll Applications??

Ad h networks hoc t k
Peer-to-peer, multihop networks p , p Data packets are transmitted from a source to destination via

intermediate nodes Communication links could be either symmetric or asymmetric Dynamic topology Limited security Bandwidth limited No backbone to handle or mux higher bw g Routing Complex and depends on finding the routing path, selection of routers, topology, protocols etc. l l

Vous aimerez peut-être aussi