Вы находитесь на странице: 1из 32

CS364 Mobile Computing Module 6

MODULE VI
Security issues in mobile computing, Information Security, Components of Information Security,
Next Generation Networks- LTE – Architecture & Interface – LTE radio planning and tools, 5G
architecture, MIMO, Super core concept, Features and Application, Setting up of an adhoc network
system, LiFi.

TO SET UP AN AD HOC NETWORK:

1. On the Start menu, click Connect To.


2. In the Connect to a network window, click the Set up a connection or network task.
3. On the Choose a connection option page, click Set up a wireless ad hoc (computer-to-computer)
network, and then click Next. (This option only appears on computers that have wireless adapters.)
4. Read the ad hoc network information, and then click Next.
5. Provide a network name, select whether the network is open or requires authentication, provide a
security phrase if necessary, and then click Next.
After Windows Vista sets up the ad hoc network, you have the option of sharing your Internet
connection.
To disconnect from an ad hoc network, display the Connect To A Network window, click the ad hoc
network, and then click disconnect.
Case Study: T o Setup an Ad Hoc Wireless Network with Windows Built-in Utility
(Windows XP)
 The Ad Hoc mode, also called peer to peer mode, allows nodes to communicate directly (point-
to-point) without the need for an AP, as in the following Figure. There is no fixed infrastructure.
Nodes need to be in range with each other in order to communicate.

Dept of CSE, JBCMET Page 1


CS364 Mobile Computing Module 6

 An Ad Hoc WiFi network should at least consist of 2 clients. In this tutorial, we also take just
two computers for instance: computer A and computer B.
Part 1: Create an Ad Hoc network profile on computer A
 Step 1 : Go to Control Panel -> Network Connections and find Wireless Network Connection.
Right click Wireless Network Connection and select Properties.

 Step 2 : On Wireless Networks tab, click Add button.

Dept of CSE, JBCMET Page 2


CS364 Mobile Computing Module 6

 Step 3 :On Association tab of Wireless network properties window, please type a phrase
for Network Name [SSID]. In our scenario, we take adhoctest for example. Then go to the bottom
and tick This is a computer-to-computer [ad hoc] network; wireless access points are not used.
Then click OK.

Dept of CSE, JBCMET Page 3


CS364 Mobile Computing Module 6

 Step 4: After Step 3, there should be a profile named adhoctest in Preferred Networks. Click OKto
save all the settings.

Dept of CSE, JBCMET Page 4


CS364 Mobile Computing Module 6

Part 2: Manually configure an IP address on computer A


 Step 5 : Right click Wireless Network Connection and select Properties.

 Step 6 : On General tab, please double click Internet Protocol (TCP/IP).

Dept of CSE, JBCMET Page 5


CS364 Mobile Computing Module 6

 Step 7 : Tick Use the following IP address, and input the IP address and Subnet mask. Then
click OK.

Dept of CSE, JBCMET Page 6


CS364 Mobile Computing Module 6

 Step 8 : Click OK on Wireless Network Connection Properties window.

Dept of CSE, JBCMET Page 7


CS364 Mobile Computing Module 6

Part 3: Scan for Ad Hoc network on computer B


 Step 9:Right click Wireless Network Connection, select View available wireless networks

 Step 10: Find adhoctest(which is set up on computer A) network in the scan window. Then
double click it and click connect Anyway?

Dept of CSE, JBCMET Page 8


CS364 Mobile Computing Module 6

Part 4: Manually configure an IP address on computer B


 The steps are the same as which were done on computer A (Step 5 to Step 8). The point is that
we need assign a different IP address for computer B, and it must be in the same subnet with
computer A. In our scenario, we can take 192.168.1.20/255.255.255.0.

Dept of CSE, JBCMET Page 9


CS364 Mobile Computing Module 6

 Here until, all the basic settings for building an Ad Hoc network have been finished. If we open
the network scan window again, we can see the adhoctest network says Connected.

Dept of CSE, JBCMET Page 10


CS364 Mobile Computing Module 6

NEXT GENERATION NETWORKS- LTE – ARCHITECTURE &


INTERFACE – LTE RADIO PLANNING AND TOOLS

 LTE stands for Long Term Evolution and it was started as a project in 2004 by telecommunication
body known as the Third Generation Partnership Project (3GPP).
 LTE evolved from an earlier 3GPP system known as the Universal Mobile Telecommunication
System (UMTS), which in turn evolved from the Global System for Mobile Communications
(GSM).
 The high-level network architecture of LTE is comprised of following three main components:
1. The User Equipment (UE).
2. The Evolved UMTS Terrestrial Radio Access Network (E-UTRAN).
3. The Evolved Packet Core (EPC).

Dept of CSE, JBCMET Page 11


CS364 Mobile Computing Module 6

LTE NETWORK REFERENCE MODEL


 LTE network reference model, consisting of LTE entities (UE and eNB) and EPC entities (S-GW,
P-GW, MME, HSS, PCRF, SPR, OCS and OFCS).
 A PDN is an internal or external IP domain of the operator that a UE wants to communicate with,
and provides the UE with services such as the Internet or IP Multimedia Subsystem (IMS).

LTE entities

Dept of CSE, JBCMET Page 12


CS364 Mobile Computing Module 6

EPC entities

Dept of CSE, JBCMET Page 13


CS364 Mobile Computing Module 6

Dept of CSE, JBCMET Page 14


CS364 Mobile Computing Module 6

LTE interfaces

Dept of CSE, JBCMET Page 15


CS364 Mobile Computing Module 6

Dept of CSE, JBCMET Page 16


CS364 Mobile Computing Module 6

LTE PROTOCOL STACKS

 Based on the EPS entities and interfaces, the LTE protocol stacks for the user plane and control
plane

User plane protocol stacks

Dept of CSE, JBCMET Page 17


CS364 Mobile Computing Module 6

1) LTE-Uu interface

 PDCP: The PDCP protocol supports efficient transport of IP packets over the radio link. It
performs header compression, Access Stratum (AS) security (ciphering and integrity
protection) and packet re-ordering/retransmission during handover.
 RLC: In the transmitting side, the RLC protocol constructs RLC PDU and provides the RLC
PDU to the MAC layer. The RLC protocol performs segmentation/concatenation of PDCP
PDUs during construction of the RLC PDU. In the receiving side, the RLC protocol performs
reassembly of the RLC PDU to reconstruct the PDCP PDU. The RLC protocol has three
operational modes (i.e. transparent mode, acknowledged mode and unacknowledged mode),
and each offers different reliability levels. It also performs packet (the RLC PDU) re-ordering
and retransmission.
 MAC: The MAC layer lies between the RLC layer and PHY layer. It is connected to the RLC
layer through logical channels, and to the PHY layer through transport channels. Therefore, the
MAC protocol supports multiplexing and de-multiplexing between logical channels and

Dept of CSE, JBCMET Page 18


CS364 Mobile Computing Module 6

transport channels. Higher layers use different logical channels for different QoS metrics. The
MAC protocol supports QoS by scheduling and prioritizing data from logical channels. The
eNB scheduler makes sure radio resources are dynamically allocated to UEs and performs QoS
control to ensure each bearer is allocated the negotiated QoS.

2) S1-U/S5/X2 interface
 GTP-U: GTP-U protocol1 is used to forward user IP packets over S1-U, S5 and X2 interfaces.
When a GTP tunnel is established for data forwarding during LTE handover, an End Marker
packet is transferred as the last packet over the GTP tunnel.

Control plane protocol stacks

Dept of CSE, JBCMET Page 19


CS364 Mobile Computing Module 6

1) LTE-Uu Interface
 NAS2: NAS protocol performs mobility management and bearer management functions.
 RRC: RRC protocol supports the transfer of the NAS signaling. It also performs functions
required for efficient management of the radio resources. The main functions are as follows:
o Broadcasting of system information

Dept of CSE, JBCMET Page 20


CS364 Mobile Computing Module 6

o Setup, reconfiguration, reestablishment and release of the RRC connection


o Setup, modification and release of the radio bearer

2) X2 interface
 X2AP: X2AP protocol supports UE mobility and SON functions within the E-UTRAN. To
support UE mobility, the X2AP protocol provides functions such as user data forwarding,
transfer of SN status and UE context release. For SON functions, eNBs exchange resource
status information, traffic load information and eNB configuration update information, and
coordinate each other to adjust mobility parameters using the X2AP protocol.

3) S1-MME interface
 S1AP: S1AP protocol supports functions such as S1 interface management, E-RAB
management, NAS signaling transport and UE context management. It delivers the initial UE
context to the eNB to setup E-RAB(s) and manages modification or release of the UE context
thereafter.

4) S11/S5/S10 interfaces
 GTP-C: GTP-C protocol supports exchange of control information for creation, modification
and termination for GTP tunnels. It creates data forwarding tunnels in case of LTE handover.

5) S6a interface
 Diameter: Diameter protocol supports exchange of subscription and subscriber authentication
information between the HSS and MME.

6) Gx interface
 Diameter: Diameter protocol supports delivery of PCC rules from the PCRF to the PCEF (P-
GW).

7) Gy interface
 Diameter: Diameter protocol supports exchange of real-time credit control information
between the P-GW and OCS.

8) Gz interface
 GTP’: GTP’ protocol supports CDR transfer from the P-GW to the OFCS.

Dept of CSE, JBCMET Page 21


CS364 Mobile Computing Module 6

5G ARCHITECTURE
1G
 1G refers to 1st generation of mobile telecommunication
 It is developed in 1980s and completed in early 1990s.
 It provides a speed up to 2.4kbps.
 It is based on analog system.
 It allows user to make call in one country.

2G
 2G refers to 2nd generation of mobile telecommunication.
 It was developed in late 1980s and completed in late 1990s.
 It is based on digital system.
 It provides a speed of up to 64 kbps.
 It provides services like voice and sms with more clarity.
 It provides semi global facilities.

3G
 It was developed between 1990s & early 2000 and even present days.
 It provides a transmission speed from 125kbps to 2mbps.
 It provides superior voice quality & video conference.
 It provides global facilities.

4G
 4G stands for 4th generation mobile telecommunication.
 It was developed in the year 2010.
 It is faster and more reliable.
 It provides speed up to 100mbps.
 It provides high performance like uploading and downloading speed.
 It provides easy roaming as compaired to 3G.

5G
 It is the next major phase of mobile telecommunication & wireless system.
 It is 10 times more faster than 4G.
 It has a expected speed of 1gbps.
 Lower cost than the previous version.

Dept of CSE, JBCMET Page 22


CS364 Mobile Computing Module 6

 It is expected to come around the year 2020.

FUNCTIONAL ARCHITECTURE OF 5G MOBILE NETWORKS

GPRS (General Packet Radio Service)


a) It is used to transmit data at 60kb/sec.
b) It also consume less battery during sending and receiving mail or to browse internet.
EDGE (Exchanged Data Rate for GSM Evolution)
a) It is an advanced version of GPRS.
b) It provide a data speed of 473kb/sec.
3G
a) 3G makes it possible to do video call on mobile network.
b) It also provide efficient way to browse internet on mobile network.
WLAN(Wireless LAN)
a) Wireless LAN provides short range,high speed wireless data connection between mobile data device
using radio signal.
LTE(Long Term Evolution)

Dept of CSE, JBCMET Page 23


CS364 Mobile Computing Module 6

a) LTE is a standard for mobile communication for high speed data transmission for mobile network.
b) Speed up to 100mbps.

ARCHITECTURE OF 5G MOBILE NETWORKS

 OWA stands for Open Wireless Architecture : This layer is used to define the wireless technology to
be used.
 Physical Layer + Data Link Layer=OWA
 Network Layer is divided into two sublayer : Lower Network Layer and Upper Network Layer
 Network Layer is used to route the data from source to destination
 Open Transport Layer perform the operation of both transport layer and session layer.
 Transport Layer + Session Layer=OTL
 Application Layer is responsible for providing good quality of service.
 Application Layer selects the best wireless connection for a given service.
Features of 5G
 High resolution for crazy cell phone users
 Bi-directional large BW
 Less traffic
 25 Mbps connectivity speed
 Enhanced & available connectivity just about the world
 Uploading & Downloading speed of 5G touching the peak (up to 1 Gbps)

Dept of CSE, JBCMET Page 24


CS364 Mobile Computing Module 6

 Better & fast solution


Advantages of 5G
 Data BW of 1 Gbps or higher
 Globally accessible
 Dynamic information access
 Available at low cost
 The high quality services of 5G technology based on Policy to avoid error
Applications of 5G
 Global networks
 Wearable devices with AI (Artificial Intelligence) capabilities
 Media independent handover
 Radio resource management
 VoIP (Voice over IP) enabled devices
 With 6th sense technology

MIMO
 MIMO stands for Multiple Input and Multiple Output.
 In wireless communication system this method is used to increase the capacity of channel in radio
link by using multiple transmit and receive antennas.
 MIMO has become an important element of wireless communication system standards including
IEEE 802.11ac (WI-FI), WI-MAX (4G) etc.
 MIMO system consist multiple antennas at both the transmitter and receiver. In MIMO system
the transmitter and receiver part contained large number of antennas or array of antennas.
 One of the big advantage of this system is more data can be added to the wireless channels. So by
using this method the energy efficiency, spectral efficiency and reliability can be improved.
 Several different diversity modes are available and provide a number of advantages:
 Time diversity: Using time diversity, a message may be transmitted at different times, e.g.
using different timeslots and channel coding.
 Frequency diversity: This form of diversity uses different frequencies. It may be in the form
of using different channels, or technologies such as spread spectrum / OFDM.
 Space diversity : Space diversity used in the broadest sense of the definition is used as the
basis for MIMO. It uses antennas located in different positions to take advantage of the different
radio paths that exist in a typical terrestrial environment.

Dept of CSE, JBCMET Page 25


CS364 Mobile Computing Module 6

MIMO System

 MIMO is effectively a radio antenna technology as it uses multiple antennas at the transmitter and
receiver to enable a variety of signal paths to carry the data, choosing separate paths for each
antenna to enable multiple signal paths to be used.
 Multiple-Input Multiple-Output (MIMO) is a wireless technology that uses multiple transmitters
and receivers to transfer more data at the same time. All wireless products with 802.11n support
MIMO. The technology helps allow 802.11n to reach higher speeds than products without
802.11n.
 To implement MIMO, the station (mobile device) or the access point (AP) must support MIMO.
For optimal performance and range, both the station and the AP must support MIMO.
 MIMO technology uses a natural radio-wave phenomenon called multipath. With multipath,
transmitted information bounces off walls, ceilings, and other objects, reaching the receiving
antenna multiple times at different angles and slightly different times. In the past, multipath caused
interference and slowed down wireless signals. With multipath, MIMO technology uses multiple,
smart transmitters and receivers with an added spatial dimension, increasing performance and
range.

Dept of CSE, JBCMET Page 26


CS364 Mobile Computing Module 6

 MIMO increases receiver signal-capturing power by enabling antennas to combine data streams
arriving from different paths and at different times. Smart antennas use spatial diversity
technology, which puts surplus antennas to good use. When antennas outnumber spatial streams,
the antennas can add receiver diversity and increase range.
 More antennas usually equate to higher speeds. A wireless adapter with three antennas can have a
speed of 600 Mbps. An adapter with two antennas has a speed of 300 Mbps. The router needs
multiple antennas and must fully support all features of 802.11n to attain the highest speed
possible.
 Legacy wireless devices use Single-Input Single-Output (SISO) technology. They can only send
or receive one spatial stream at a time.

SUPER CORE CONCEPT

 The 5G will have the following three main technologies:


• Nanotechnology.
• Cloud Computing.
• All Flat IP Platform.
 The existing telecom networks are arranged in an ordered way, where subscriber traffic is
aggregated at aggregation point (BSC/RNC) and then drives off to gateways. Flat Internet Protocol
architecture will lessen burden on aggregation point and traffic will directly move from Base
station to Media gateways. When transition from legacy (TDM, ATM) platforms to IP will be
concluded, a common ALL IP platform will be appeared. All network operators (GSM, CDMA,
Wi-max, Wire line) can be connected to one Super core with enormous capacity. The super core
concept will roughly calculate all interconnecting charges, which is now days network operator is
facing.

Dept of CSE, JBCMET Page 27


CS364 Mobile Computing Module 6

LiFi

 Light-Fidelity
 LiFi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data
transmission.

 LI-FI is transmission of data through illumination, sending data through a LED light bulb that
varies intensity faster than human eye can follow.

Dept of CSE, JBCMET Page 28


CS364 Mobile Computing Module 6

Issues of Radio Spectrum


 Capacity
 Radiowaves
 Cost and Expensive
 Less Bandwidth compared to other spectrums
 Insufficient spectrum for increasing data
 Efficiency
 Millions of base stations consume huge amount of energy for
• 1.Transmitting the radio waves
• 2.To cool the base station cabins
 5% Efficiency
 Availability
 Available within the range of Base stations
 Limited availabity
 Unavailable in aircrafts
 Security
 Less secure(passes through the walls)
Working of LiFi

Dept of CSE, JBCMET Page 29


CS364 Mobile Computing Module 6

 Operational procedure is very simple, if the led is on, you transmit a digital 1, if its off you transmit
a 0.
 The LEDs can be switched on and off very quickly, which gives nice opportunities for transmitting
data. Hence all that us required is some LEDs and a controller that code data into those LEDs.
 We have to just vary the rate at which the LED’s .
 Flicker depending upon the data we want to encode .
 Thus every light source will works as a hub for data transmission .
 On one end all the data on the internet will be streamed to a lamp driver when the led is turned on
the microchip converts the digital data in form of light .
 A light sensitive device (photo detector) receives the signal and converts it back into original data.
This method of using rapid pulses of light to transmit information wirelessly is technically referred
as Visible Light Communication .
Comparision between Li-Fi and Wi-Fi
 Li-Fi can be thought of as a light-based Wi-Fi. That is, it uses light instead of radio waves to
transmit information.
 Instead of Wi-Fi modems, Li-Fi would use transceiver-fitted LED lamps that can light a room as
well as transmit and receive information.
 WI-FI is great for general wireless coverage within buildings, and li-fi is ideal for high density
wireless data coverage in confined area and for relieving radio interference issues .
 So the two technologies can be considered complimentary

Dept of CSE, JBCMET Page 30


CS364 Mobile Computing Module 6

Application of LiFi
 Traffic Lights : Traffic lights can communicate to the car and with each other. Cars have LED-
based headlights, LED-based cack lights, and cars can communicate with each other and prevent
accidents in by exchanging information.
 Intrinsically Safe Environment : Visible Light is more safe than RF, hence it can be used in
places where RF can't be used such as petrochemical plants .
 Hospitals: In Few Medical Equipements
 Airlines : Whenever we travel through airways we face the problem in communication media
,because the whole airways communication are performed on the basis of radio waves. To
overcome this drawback on radioways , li-fi is introduced.
 On Ocean Beds : Li-Fi can even work underwater were Wi-Fi fails completely, thereby throwing
open endless opportunities for military/navigation operations
 Street Lamps (As free Access Points) : There are millions of street lamps deployed around the
world. Each of these street lamps could be a free access point.
Limitation of LiFi
 Light can't pass through objects .

Dept of CSE, JBCMET Page 31


CS364 Mobile Computing Module 6

 Interferences from external light sources like sun light, normal bulbs, and opaque materials in the
path of transmission will cause interruption in the communication.
 Li-Fi requires line of sight.
 High installation cost of the VLC systems .
 A major challenge facing Li-Fi is how the receiving device will transmit back to transmitter.

Dept of CSE, JBCMET Page 32

Вам также может понравиться