Cellular and WirelessII [Compatibility Mode]

download Cellular and WirelessII [Compatibility Mode]

of 43

Transcript of Cellular and WirelessII [Compatibility Mode]

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    1/43

    Systems II

    EmergingTechnologies

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    2/43

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    3/43

    Emerging Technologies Bluetooth 802.15.1a

    is a technology in the personal area network (PAN)

    Radio Frequency Identifier (RFID) is emerging as a leading technology in the logistics, manufacturing, and retail

    industry

    Wireless Broadband WiMax 802.16

    is expected to be a mainstream technology very soon

    Mobile IP

    Allows data handoff over different sub-networks

    IPv6

    Is the next eneration internet rotocol

    Java Card technology

    Is emerging as a forerunner in the security and personal identity domain

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    4/43

    Bluetooth ,

    unified Denmark and Norway in the 10th century

    Allows users to make ad hoc wireless connections between

    ,

    comperters without any cable

    of range or beyond through walls, clothing and even luggage

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    5/43

    Bluetooth scatternet as a combination of Piconets

    Printer

    Headset

    Mouse

    Cellphone

    Piconet 2

    Cordless

    handset

    Piconet 1

    Scatternet

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    6/43

    Bluetooth Protocol .

    Medical) frequency band

    There are 79 channels s aced 1 MHz a art from 2.402 GHz to

    2.480 GHz

    Bluetooth S ecial Interest Grou maintains and mana es bluetooth

    standard IEEE has also adapted Bluetooth as the 802.15.1a standard

    Power levels starting from 1 mW covering 10cm to 100mW

    covering upto 100 meters It supports unicast (point-to-point) and multicast (point-to-

    multipoint) connections

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    7/43

    Bluetooth Protocol

    Upto 7 slaves devices can be set to communicate with a master

    network in an ad hoc manner

    as a member of another piconet

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    8/43

    Bluetooth Protocol Stack

    (both direct sequence and frequency hopping spread

    There are connectless (ACL-Asynchronous

    onnec on ess n an connec on-or en e -Sychronous Connection-oriented Link) links

    1. Bluetooth core Protocols

    Baseband, Link Manager Protocol (LMP), Logical Link controlan A aptation Protoco (L AP), an ervice Discovery

    Protocol (SDP)

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    9/43

    vCard/vCal WAE

    OBEX WAPAT-

    commandsTCS BIN SDP

    IP

    UDP TCP

    RFCOMM

    PPP

    Audio

    L2CAP

    LMPHost Controller Interface

    ase an

    Bluetooth Radio

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    10/43

    Bluetooth Protocol stack

    units forming a piconet.

    ACL packets are used for data only, while the SCO packet can contain audio

    only or a combination of audio and data

    All audio and data packets can be provided with different levels of

    Link Manager Protocol (LMP)

    When the are in ran e, LMP of either device discover each other

    Authentication, encryption

    Link setup and negotiates baseband packet size Control power modes, connection state

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    11/43

    Bluetooth Protocol stack

    Segmentation and reassembly

    Service Discovery Protocol (SDP) enables a Bluetooth device

    Inquires what services are available in a piconet and how to

    access

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    12/43

    Bluetooth Protocol stack.

    RFCOMM is a serial line communication protocol

    -

    baseband protocol

    .

    Telephony Control Protocol Binary TCS BIN is a bit oriented

    rotocol

    Defines the call control signaling protocol to setup of speech and data

    calls between bluetooth devices

    e nes mo ty management proce ures or an ng groups o

    Bluetooth TCS devices

    AT-Command

    A set of AT-commands by which a mobile phone can be used andcontrolled as a modem for fax and data transfers

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    13/43

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    14/43

    Bluetooth Security , ,

    A frequency-hopping scheme with 1600 hops/sece owes eve s o e pro oco s ac , ue oo uses e

    publicly available cipher algorithm known as SAFER+ to

    Different application verticals use their own security

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    15/43

    Bluetooth Application Models

    particular usage model

    File transfer: object types include .xls, .ppt, .wav, .jpg, .doc files, folders ordirectories or streaming media formats

    Internet Bridge: mobile phone or cordless modem acts as modem to the PC,

    rovidin dial-u networkin an d fax ca abilities without need for h sical

    connection to the PC LAN Access: multiple data terminals use a LAN access point (LAP) as a wireless

    Synchronization: a device-to-device synchronization of data

    Headset: Handfree cellular phone usage in automobiles

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    16/43

    RFID

    through radio frequency interfaces

    The ob ect could be an entit in a manufacturin sho oods in

    transit, item in a retail store, a vehicle in a parking lot, a pet, or a

    book in a library

    There are 6 basic frequencies on which RFID operates. 132.4 KHz, 13.56 MHz, 433 MHz, 918 MHz, 2.4 GHz and 5.8 GHz

    Low frequency (30 KHz to 500 KHz) systems

    short reading ranges and lower system costs

    Ta s are slow in data transfer and suitable for slow-movin ob ects

    Security access, asset tracking and animal identification applications

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    17/43

    RFID Hi h fre uenc 850 MHz to 950 MHz and 2.4 GHz to 2.5GHz s stems

    Long read ranges and high data transfer speeds

    Fast moving objects like railway wagon tracking and identification of vehicles on freeways

    for automated toll collection

    Applications

    Power-based grouping

    Passive tags are generally in low frequeny ranges

    It obtains operating power from the readers antenna

    The data within a passive tag is read only and generally cannot be changed during opertion

    It contains data usually 32 to128 bits long

    Active tags are powered by an internal battery

    Data within an active tag can be rewritten or modified

    Memory can vary from a few bytes to 1MB

    A tag migh give a machine a set of instructions, and the machine would then report its

    performance to the tag

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    18/43

    RFID

    or more

    When an RFID ta asses throu h the electroma entic zone of the

    reader, it detects the readers activation signal

    The reader decodes the data encoded in the ta s inte rated circuit

    and the data is passed to the host computer for processing A basic RFID system consists of

    A transponder programmed with unique information (RFID tag)

    A transceiver with decoder (a reader)

    n an enna or co

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    19/43

    RFID

    inductive coupling techniques

    waves techniques

    document-based systems operation at a carrier frequency of

    ISO has already adopted international RFID standards for

    ,

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    20/43

    WiMax - -, ,

    Figure 4.4

    .

    IEEE802.16.1 Air interface for 10 to 66 GHz

    IEEE802.16.2 Coexistence of broadband wireless access systems

    IEEE802.16.3 Air interface for licensed frequencies, 2 to 11 GHz

    The physical layer

    Specifies frequency band, the modulation scheme, error-correction

    techniques, synchronization between transmitter and receiver, data rate and

    the multi lexin structure

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    21/43

    WiMax

    Responsible for transmitting data in frames and controlling

    access to the shared wireless medium throu h media access

    control layer

    Defines how and when a base station or subscriber station ma

    initiate transmission on the channel Convergence layer

    Provides functions specific to the service being provided

    For IEEE802.16.1, bearer services include digital audio/videomulticast, digital telephony, ATM, Internet access, wireless

    trunks in telephone networks and frame relay

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    22/43

    WiMax

    Supports FDD and TDD

    in which modulation and coding options may be dynamically

    assi ned on a burst-b -burst basis

    MAC To accommodate both continuous and burst traffic

    ARQ, and Mesh network architecture

    Broadband mobile cellular s stem Figure 4.5: Moving BTS

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    23/43

    Mobile IP

    device from one location to another and use the network

    while stationar .

    Mobile computing offers seamless computing facility even if

    the user chan es the network

    Mobile IP

    and the users point of attachement changes dynamically, all

    connections are maintained despite the chan e in underl innetwork properties

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    24/43

    Mobile IP

    Source port and IP addresses

    Destination port and IP addresses

    Mobile IP allows the mobile node to use two IP addresses

    Home address is static and known to everybody as the identity of the host

    Care-of address, this changes at each new point of attachement and can bethought of as the mobile nodes location specific address

    arranges to forward them to the mobile nodes current point of

    attachment

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    25/43

    Mobile IP Whenever the mobile node moves it re isters its new care-of address with its

    home agent

    The home agent forwards the packet to the foreign network using the care-ofa ress

    Tunneling, the new header with care-of address encapsulates the original

    acket, causin the mobile nodes home address to have no im act on the

    encapsulated packets routing Discovery

    mo e no e uses a scovery proce ure to ent y prospect ve ome agents an

    foreign agents

    Registration A mobile node uses a registration procedure to inform its home agent of its care-of

    address

    Tunneling procedure is used to forward IP datagrams from a home address to a care-of address

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    26/43

    Mobile IP architectureM bile

    Home

    node A

    Networkfor A

    Forei n

    34

    NetworkHomeAgent

    X2

    AgentInternet

    1 5

    Server X

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    27/43

    Mobile IP

    A router can detect whether a new mobile node has entered

    into its network

    The mobile node determines whether it is in a foreign network

    For the ur ose of discover a router or an a ent eriodicall

    issues a router advertisment ICMP message A router advertisement can carry information about default

    routers and information about one or more care-of addresses

    Or the mobile node can broadcast a solicitation that will beanswered by any foreign agent

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    28/43

    Mobile IP

    The mobile node sends a registration request to the home agent

    with the care-of address information

    Home agent will update its routing table and reply an

    acknowled e to the mobile node

    Using 128-bit secret key and MD5 hashing algorithm, a digitalsignature is generated for authentication

    Home address, care-of address, and registration lifetime is

    maintained in the home agent which is called binding

    Tunneling

    IP-within-IP encapsulation mechanism is used

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    29/43

    IPv6

    define the next generation IP protocol originally known as

    IPN now renamed as IPv6

    IPv6 uses 128 bit addresses

    ,

    Site topology, typically 16 bit subnet number

    Interface indentifier t icall an automaticall enerated 64 bit

    number unique on the local LAN segment

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    30/43

    IPv6 security IPv6 comes native with a securit rotocol called IPSec

    IPSec protocol is a standards-based method of providing privacy, integrity and

    authenticity to information transferred across IP networks Diffie-Hellman key exchange mechanism for deriving key between peers on a public

    network

    Public key cryptography to guarantee the identity of the two parties and avoid man-

    in-the-middle attacks

    Bulk encryption algorithms, such as 3DES, for encrypting the data

    Ke ed hash al orithm, such as HMAC, combined with traditional has al orithms such

    as MD5 or SHA for providing packet authentication

    Digitla certificates signed by a certificate authority to act as digital ID cards

    -

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    31/43

    IPv6

    Packet is attached a tag for customizing the quality of service

    Network components: Routers upgrading or using IP tunneling,

    Computing nodes: Operating system upgrades

    Networkin a lications: Portin of the a lications from IPv4

    to IPv6 environment

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    32/43

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    33/43

    Java Card

    Smart card is a plastic card with intelligence and memory

    s an ar s

    ISO 7816-1 defines physical characteristic of the card

    - : mens ons an oca ons o e con ac s

    ISO 7816-3: electronic signals and transmission protocols

    - : n er n us ry omman s or n erc ange

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    34/43

    Java Card

    A microprocessor and a memory chip or

    Only a memory chip with non-programmable logic

    A microprocessor card

    An intelligence program resident within the card which can add, delete, and

    otherwise manipulate information on the card

    A memory card can store some information for some pre-defined

    Smart card are capable of carrying data, functions, and

    Unlike memory strip cards, they do not require access to remote

    databases at the time of the transaction

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    35/43

    Java Card ,

    interoperability

    All the micro rocessor based smart card now offer ava APIframework on the smart card

    3GPP has decided to use Java Card as the standard for USIM and

    ICC (Integrated Circuit cards) Productivity, security, robustness, tools, and portability

    JVM, the language definition, and the core packages have been

    made more compact to bring Java technology to the resourceconstrained smart card

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    36/43

    Java Card

    functionalities may typically have

    8 to 16 bit microprocessor running at speed between 5 MHz to 40 MHzwith 32K to 128K bytes of EEPROM

    Using proactive SIM technology of GSM Phase 2+, the application on the

    Java Card technology supports OTA (Over the air) downloads

    ,

    downloaded by the network operator proactively or by the user

    interactively over the wireless media Applications written for the Java Card platform are referred to as

    applets

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    37/43

    Java Card

    two parts

    -

    execute at runtime, such as class loading, bytecode verification,

    resolution and linkin , and o timization

    Runs on-card: JCVM, Java card runtime environment (JCRE),and the Java API

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    38/43

    Architecture of Java card applications

    development process

    Java program Compile

    Class

    files CAP

    -

    VM

    Converter

    File

    Export

    files Installer

    Interpreter

    On-card

    VM

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    39/43

    Java Card application development process

    The converter will convert class files into a format downloable

    into the smart card Ensures the byte code validity before the application is installed into the card

    Conversion b the off-card VM into CAP Converted APlet

    format The applet is transferred into the card using the installer

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    40/43

    Java Card application development process

    -

    API classes

    CRE erforms additional runtime securit checks throu h a letfirewall

    A let firewall artitions the ob ects stored into se arate

    protected object spaces, called contexts Controls the access to shareable interfaces of these objects

    A Java card applet is not intended to run within an Internet

    browser environment

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    41/43

    Backup

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    42/43

    re ess ensor etwor ,

    Low cost, low power disposal devices

    ac ev ce o s sens ng, memory, an commun ca on

    module

    ower contro s a ma or c a enge

    Applications??

  • 7/31/2019 Cellular and WirelessII [Compatibility Mode]

    43/43