Wireless and Mobile Networks: Guest Lecture By: Roger Piqueras Jover (AT&T Security R&D)
Wireless and Mobile Networks: Guest Lecture By: Roger Piqueras Jover (AT&T Security R&D)
Wireless and Mobile Networks: Guest Lecture By: Roger Piqueras Jover (AT&T Security R&D)
Lecture overview
Cellular communications
Mobile networks
Lecture overview
From: Computer Networking A top down approach. James Kurose, Keith Ross.
Pearson.
Propagation loss
Large scale fading (shadowing)
Propagation loss
Free-space
P: received power
PR: average received power (path-loss)
: shadowing coefficient
(The equation in in dBs)
Fast fading
Fast fading
Multipath
H(f)
Delay 1
TX
Delay 2
TX
10
11
12
TDMA (GSM)
FDMA (AMPS)
OFDMA (LTE)
Theoretically feasible in 5G
mmWave
Massive MIMO arrays
+15dB
-5dB
13
Contention-based methods
Examples
14
15
Throughput:
802.11
802.11n
16
Hidden terminal
Exposed terminal
Solution
18
RTS/CTS messages
RTS (Ready to Send) Message sent to alert terminals within your coverage area that you are about to transmit
CTS (Clear to Send) The receiving terminal ACKs you and alerts all terminals in its coverage area that it is about to start receiving
Slot time Basic unit of time for transmission and backoff delay
Short Inter-Frame Space (SIFS) Time required to sense end of another transmission and transmit control frame
DCF Inter-Frame Space (DIFS) Time to wait before starting to contend (SIFS + 2 slot times)
19
The drivers and controllers for 802.11 cards are open source
Food for thought: What would happen if a user configured CW always to be 1?
20
21
22
Cellular networks
Network planning
23
Interference-limited system
Signal to
Interference
Ratio
Re-use distance
Point with the worst reception
conditions
24
Path-loss
coefficient
Handover
When you move from one cell to another the phone does not disconnect
This makes mobility in cellular networks possible
Types of handover
Hard (GSM, LTE) The phone disconnects from a tower and connects to a new one
Soft (3G UMTS) The phone is always connected to N towers and just updates that list
Rake receiver
BS1
BS2
Signal from BS2
Ideal HO
25
Mobile networks
26
Phone network
Internet
27
s(t)
0 0
s(t) x Ci(t)
1011101011
Spreading
|S(f)|2
|S(f)*Ci(f)|2
A2
A2
B2/G
A2/G
f
W G*Rb
User 1
User 2
28
Despreading
BRb
s(t)
0 0
BRb
s(t)
0 0
s(t) x Ci(t)
1
1011101011
Spreading
|S(f)|2
|S(f)*Ci(f)|2
A2
I2
I2/G
A2/G
BRb
29
Despreading
t
A2
s(t)
0 0
f
W G*Rb
Interfe
ring
signal
BRb
30
Paging
When there is an incoming call/SMS, the network has to find the recipient
A paging message is broadcasted
Broadcasting over every single cell in America sounds like an inefficient way to do it
The network (HLR) knows roughly the area where you were last seen (Tracking Area)
If a user moves
Hey, I am here!
Now the network knows in what specific cell you are
There is not enough spectrum for ever mobile device to be always connected (channel assigned)
RACH
Internet
32
33
Delay t1
TX1
RACH
User 1
TX2
Delay t2
TX2
User 2
TX1
Frame <j>
Time advance 2
Time advance 1
34
Frame <j+1>
Core Network
Location
update**
Radio Access
Bearer (RAB)
SMS SS7
Call PSTN
Data Internet
Paging Ch (PCH)
DTCH (data)
RACH
Access grant +
channel
assignment
Access
petition
35
MAC
Core Network
Location
request
Radio Access
Bearer (RAB)
Paging Ch (PCH)
Incoming
SMS/call/data
DTCH (data)
RACH
Access grant +
channel
assignment
Access
petition
36
MAC
37
Enhanced RAN
OFDMA
MIMO
Robust performance in multipath environments
38
eUTRAN
EPC
39
40
LTE connection
Decode PBCH
Cell Search
Procedure
Power up
RACH
Obtain
System
Configuration
Random
Access
Connected
System configuration
41
User traffic
MT
eNodeB
1
Random access preamble
2
Random access response
3
L2/L3 message
4
Contention resolution message
42
43
RAB setup
(authentication, set-up of
encryption, tunnel set-up,
etc)
Encrypted traffic
44
Motivation
45
RRC Not enough radio resources for all users, they need to be reused when a user is idle
Power management The radio of a mobile device burns a lot of battery, it is necessary to shut it down when the user is idle
Idle low power usage, no active connection (no bearer with P-GW)
Connected high battery usage, active bearer with P-GW
Connected to idle
Idle to connected
46
[RRC Connected RRC Idle] transition occurs after the device has been idle for t seconds
The phones radio is always on for t seconds after the device goes idle
Recommended reading: AT&T Research - A Call for More Energy-Efficient Apps [3]
47
48
49
Bluetooth
Master-slave communications
50
Piconet
ZigBee
IEEE 802.15.4
PHY layer
51
Many easily available open-source and low cost tools to test cool stuff
Arduino: http://www.arduino.cc/
52
Suggested reading
[1] 5G wireless channel measurements: http://ieeexplore.ieee.org/iel7/6287639/6336544/06515173.pdf?arnumber=6515173
[2] Wireless Communications: Principles and Practice (2nd Edition). Theodore Rappaport. Prentice Hall.
[3] AT&T Research - A Call for More Energy-Efficient Apps:
http://www.research.att.com/articles/featured_stories/2011_03/201102_Energy_efficient?fbid=Vss1vjwl65X
[4] A. L. Swindlehurst, E. Ayanoglu, P. Heydari, and F Capolino, "Millimeter-Wave Massive MIMO: The Next Wireless Revolution?" IEEE Comm. Magazine,
Vol. 52, No. 9, pp. 56-62, Sept. 2014.
[5] SESIA, S., BAKER, M., AND TOUFIK, I. LTE, The UMTS Long Term Evolution: From Theory to Practice. Wiley, 2009.
[6] P Kyasanur, NF Vaidya. Selfish MAC layer misbehavior in wireless networks. IEEE Transactions of Mobile Computing:
http://perso.prism.uvsq.fr/users/mogue/Biblio/Sensor/AUTRES/01492362.pdf
[7] F. Ghavimi, Hsiao-Hwa Chen. M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges and Applications.
IEEE Comunication Surveys and Tutorials. 2014.
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6916986&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D69
16986
Technology directions for 5G:
[8] F. Boccardi, et. al. Five Disruptive Technology Directions for 5G. IEEE Communications Magazine. 2014. http://arxiv.org/pdf/1312.0229
Mobile network security:
[9] R. Piqueras Jover. Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions. IEEE Global Wireless Summit
2013. http://web2.research.att.com/techdocs/TD_101153.pdf
53