manet 01

122
Mobile & Ad Hoc Networks Irwan Prasetya Gunawan, Ph.D Informatics Engineering, Bakrie University [email protected] 01: Introduction Version: February 14, 2014 Prepared for Postgraduate Studies of Telecommunications Engineering, ITTelkom

Upload: arif-cupu

Post on 20-Jan-2016

8 views

Category:

Documents


0 download

DESCRIPTION

MANET

TRANSCRIPT

Mobile & Ad Hoc Networks

Irwan Prasetya Gunawan, Ph.D

Informatics Engineering, Bakrie [email protected]

01: IntroductionVersion: February 14, 2014

Prepared for Postgraduate Studies of Telecommunications Engineering, ITTelkom

About the CourseIntroductionApplications

Protocols

Contents

01: Introduction02: Mobile Communications Evolution03: Overview of Ad Hoc Networks04: Medium Access Control05: Routing, Scheduling06: Quality of Services07: Performance Analysis08: Power Management09: Service Discovery10: Security11: Technology Platform12: Applications13: Future Development

2 / 27

About the CourseIntroductionApplications

Protocols

DetailsEvaluation

About the course

Course description: understand mobility factors, mobiletraffic, ad hoc network and future development, designmobile network and services considering performance andcapacityPre-requisite: Information Theory & Coding, Stochastic,Telecom. Network Performance, Network Mathematics,and Data Network Protocol.References (tentantive):

Andrea Goldsmith, “Wireless Communications”, CambridgeUniversity Press, 2005Other papers on mobile communications and ad hocnetworks from IEEE, ACM, Springer, etc

3 / 27

About the CourseIntroductionApplications

Protocols

DetailsEvaluation

About the course

Course description: understand mobility factors, mobiletraffic, ad hoc network and future development, designmobile network and services considering performance andcapacity

Pre-requisite: Information Theory & Coding, Stochastic,Telecom. Network Performance, Network Mathematics,and Data Network Protocol.References (tentantive):

Andrea Goldsmith, “Wireless Communications”, CambridgeUniversity Press, 2005Other papers on mobile communications and ad hocnetworks from IEEE, ACM, Springer, etc

3 / 27

About the CourseIntroductionApplications

Protocols

DetailsEvaluation

About the course

Course description: understand mobility factors, mobiletraffic, ad hoc network and future development, designmobile network and services considering performance andcapacityPre-requisite: Information Theory & Coding, Stochastic,Telecom. Network Performance, Network Mathematics,and Data Network Protocol.

References (tentantive):Andrea Goldsmith, “Wireless Communications”, CambridgeUniversity Press, 2005Other papers on mobile communications and ad hocnetworks from IEEE, ACM, Springer, etc

3 / 27

About the CourseIntroductionApplications

Protocols

DetailsEvaluation

About the course

Course description: understand mobility factors, mobiletraffic, ad hoc network and future development, designmobile network and services considering performance andcapacityPre-requisite: Information Theory & Coding, Stochastic,Telecom. Network Performance, Network Mathematics,and Data Network Protocol.References (tentantive):

Andrea Goldsmith, “Wireless Communications”, CambridgeUniversity Press, 2005Other papers on mobile communications and ad hocnetworks from IEEE, ACM, Springer, etc

3 / 27

About the CourseIntroductionApplications

Protocols

DetailsEvaluation

EvaluationGrades:

Mid Test: 25%

Final Test: 25%

Pop test / quiz: 15%

Assignment: 20%

Others (presentation, paper): 15%

Note:

Late submission of assignment/homeworks/etc: 25% discount

Quiz will not be announced beforehand; so, always be prepared!

Warning

No other types of grade will be given.

There will not be any extra assignments once the Final Test has beenconducted

4 / 27

About the CourseIntroductionApplications

Protocols

DetailsEvaluation

EvaluationGrades:

Mid Test: 25%

Final Test: 25%

Pop test / quiz: 15%

Assignment: 20%

Others (presentation, paper): 15%

Note:

Late submission of assignment/homeworks/etc: 25% discount

Quiz will not be announced beforehand; so, always be prepared!

Warning

No other types of grade will be given.

There will not be any extra assignments once the Final Test has beenconducted

4 / 27

About the CourseIntroductionApplications

Protocols

DetailsEvaluation

EvaluationGrades:

Mid Test: 25%

Final Test: 25%

Pop test / quiz: 15%

Assignment: 20%

Others (presentation, paper): 15%

Note:Late submission of assignment/homeworks/etc: 25% discount

Quiz will not be announced beforehand; so, always be prepared!

Warning

No other types of grade will be given.

There will not be any extra assignments once the Final Test has beenconducted

4 / 27

About the CourseIntroductionApplications

Protocols

DetailsEvaluation

EvaluationGrades:

Mid Test: 25%

Final Test: 25%

Pop test / quiz: 15%

Assignment: 20%

Others (presentation, paper): 15%

Note:Late submission of assignment/homeworks/etc: 25% discount

Quiz will not be announced beforehand; so, always be prepared!

Warning

No other types of grade will be given.

There will not be any extra assignments once the Final Test has beenconducted

4 / 27

About the CourseIntroductionApplications

Protocols

DetailsEvaluation

EvaluationGrades:

Mid Test: 25%

Final Test: 25%

Pop test / quiz: 15%

Assignment: 20%

Others (presentation, paper): 15%

Note:Late submission of assignment/homeworks/etc: 25% discount

Quiz will not be announced beforehand; so, always be prepared!

Warning

No other types of grade will be given.

There will not be any extra assignments once the Final Test has beenconducted

4 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

5 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Why mobile communications?

Largest SW/HW/networked systemLargest number of subscribersMobile devices dominate the InternetMobile applications dominate Internet usageNew possibilities, new threatsTechnology fully integrated into everybody’s life almost24/7, almost anywhere

6 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Why mobile communications?

Largest SW/HW/networked system

Largest number of subscribersMobile devices dominate the InternetMobile applications dominate Internet usageNew possibilities, new threatsTechnology fully integrated into everybody’s life almost24/7, almost anywhere

6 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Why mobile communications?

Largest SW/HW/networked systemLargest number of subscribers

Mobile devices dominate the InternetMobile applications dominate Internet usageNew possibilities, new threatsTechnology fully integrated into everybody’s life almost24/7, almost anywhere

6 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Why mobile communications?

Largest SW/HW/networked systemLargest number of subscribersMobile devices dominate the Internet

Mobile applications dominate Internet usageNew possibilities, new threatsTechnology fully integrated into everybody’s life almost24/7, almost anywhere

6 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Why mobile communications?

Largest SW/HW/networked systemLargest number of subscribersMobile devices dominate the InternetMobile applications dominate Internet usage

New possibilities, new threatsTechnology fully integrated into everybody’s life almost24/7, almost anywhere

6 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Why mobile communications?

Largest SW/HW/networked systemLargest number of subscribersMobile devices dominate the InternetMobile applications dominate Internet usageNew possibilities, new threats

Technology fully integrated into everybody’s life almost24/7, almost anywhere

6 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Why mobile communications?

Largest SW/HW/networked systemLargest number of subscribersMobile devices dominate the InternetMobile applications dominate Internet usageNew possibilities, new threatsTechnology fully integrated into everybody’s life almost24/7, almost anywhere

6 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication

1896 Guglielmo Marconi

wireless telegraphy (digital!)long wave transmission

1907 Commercial transatlantic connections1915 Wireless voice transmission NY-SF1920 Discovery of short waves (Marconi)1926 Train-phone on the line Hamburg-Berlin

7 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication

1896 Guglielmo Marconi

wireless telegraphy (digital!)long wave transmission

1907 Commercial transatlantic connections1915 Wireless voice transmission NY-SF1920 Discovery of short waves (Marconi)1926 Train-phone on the line Hamburg-Berlin

7 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication

1896 Guglielmo Marconiwireless telegraphy (digital!)

long wave transmission

1907 Commercial transatlantic connections1915 Wireless voice transmission NY-SF1920 Discovery of short waves (Marconi)1926 Train-phone on the line Hamburg-Berlin

7 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication

1896 Guglielmo Marconiwireless telegraphy (digital!)long wave transmission

1907 Commercial transatlantic connections1915 Wireless voice transmission NY-SF1920 Discovery of short waves (Marconi)1926 Train-phone on the line Hamburg-Berlin

7 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication

1896 Guglielmo Marconiwireless telegraphy (digital!)long wave transmission

1907 Commercial transatlantic connections

1915 Wireless voice transmission NY-SF1920 Discovery of short waves (Marconi)1926 Train-phone on the line Hamburg-Berlin

7 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication

1896 Guglielmo Marconiwireless telegraphy (digital!)long wave transmission

1907 Commercial transatlantic connections1915 Wireless voice transmission NY-SF

1920 Discovery of short waves (Marconi)1926 Train-phone on the line Hamburg-Berlin

7 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication

1896 Guglielmo Marconiwireless telegraphy (digital!)long wave transmission

1907 Commercial transatlantic connections1915 Wireless voice transmission NY-SF1920 Discovery of short waves (Marconi)

1926 Train-phone on the line Hamburg-Berlin

7 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication

1896 Guglielmo Marconiwireless telegraphy (digital!)long wave transmission

1907 Commercial transatlantic connections1915 Wireless voice transmission NY-SF1920 Discovery of short waves (Marconi)1926 Train-phone on the line Hamburg-Berlin

7 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication II

1928 many TV broadcast trials (across Atlantic, color TV,news)1933 Frequency Modulation (E. H. Armstrong)1958 A-Netz in Germany (analog, 160MHz, no handover)1972 B-Netz in Germany (analog, 160MHz)1979 NMT at 450MHz (Scandinavian)1982 Start of GSM specification1983 Start of American AMPS (analog)1984 CT-1 standard (Europe)

8 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication II

1928 many TV broadcast trials (across Atlantic, color TV,news)

1933 Frequency Modulation (E. H. Armstrong)1958 A-Netz in Germany (analog, 160MHz, no handover)1972 B-Netz in Germany (analog, 160MHz)1979 NMT at 450MHz (Scandinavian)1982 Start of GSM specification1983 Start of American AMPS (analog)1984 CT-1 standard (Europe)

8 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication II

1928 many TV broadcast trials (across Atlantic, color TV,news)1933 Frequency Modulation (E. H. Armstrong)

1958 A-Netz in Germany (analog, 160MHz, no handover)1972 B-Netz in Germany (analog, 160MHz)1979 NMT at 450MHz (Scandinavian)1982 Start of GSM specification1983 Start of American AMPS (analog)1984 CT-1 standard (Europe)

8 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication II

1928 many TV broadcast trials (across Atlantic, color TV,news)1933 Frequency Modulation (E. H. Armstrong)1958 A-Netz in Germany (analog, 160MHz, no handover)

1972 B-Netz in Germany (analog, 160MHz)1979 NMT at 450MHz (Scandinavian)1982 Start of GSM specification1983 Start of American AMPS (analog)1984 CT-1 standard (Europe)

8 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication II

1928 many TV broadcast trials (across Atlantic, color TV,news)1933 Frequency Modulation (E. H. Armstrong)1958 A-Netz in Germany (analog, 160MHz, no handover)1972 B-Netz in Germany (analog, 160MHz)

1979 NMT at 450MHz (Scandinavian)1982 Start of GSM specification1983 Start of American AMPS (analog)1984 CT-1 standard (Europe)

8 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication II

1928 many TV broadcast trials (across Atlantic, color TV,news)1933 Frequency Modulation (E. H. Armstrong)1958 A-Netz in Germany (analog, 160MHz, no handover)1972 B-Netz in Germany (analog, 160MHz)1979 NMT at 450MHz (Scandinavian)

1982 Start of GSM specification1983 Start of American AMPS (analog)1984 CT-1 standard (Europe)

8 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication II

1928 many TV broadcast trials (across Atlantic, color TV,news)1933 Frequency Modulation (E. H. Armstrong)1958 A-Netz in Germany (analog, 160MHz, no handover)1972 B-Netz in Germany (analog, 160MHz)1979 NMT at 450MHz (Scandinavian)1982 Start of GSM specification

1983 Start of American AMPS (analog)1984 CT-1 standard (Europe)

8 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication II

1928 many TV broadcast trials (across Atlantic, color TV,news)1933 Frequency Modulation (E. H. Armstrong)1958 A-Netz in Germany (analog, 160MHz, no handover)1972 B-Netz in Germany (analog, 160MHz)1979 NMT at 450MHz (Scandinavian)1982 Start of GSM specification1983 Start of American AMPS (analog)

1984 CT-1 standard (Europe)

8 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication II

1928 many TV broadcast trials (across Atlantic, color TV,news)1933 Frequency Modulation (E. H. Armstrong)1958 A-Netz in Germany (analog, 160MHz, no handover)1972 B-Netz in Germany (analog, 160MHz)1979 NMT at 450MHz (Scandinavian)1982 Start of GSM specification1983 Start of American AMPS (analog)1984 CT-1 standard (Europe)

8 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication III

1991 DECT

used to be Digital European Cordless Telephone;now: Digital Enhanced Cordless Telecommunications1880–1900MHz, 1̃00–500m range, 120 duplex channels,1.2Mbit/s data transmission, voice encryption,authentication, up to several 10000 user/km2, used in morethan 50 countries

1992 GSM

fully digital, 900MHz, 124 channelsautomatic location, hand-over, cellularroaming in Europe – now worldwide in more than 200countriesservices: data with 9.6kbit/s, FAX, voice, ...

9 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication III

1991 DECT

used to be Digital European Cordless Telephone;now: Digital Enhanced Cordless Telecommunications1880–1900MHz, 1̃00–500m range, 120 duplex channels,1.2Mbit/s data transmission, voice encryption,authentication, up to several 10000 user/km2, used in morethan 50 countries

1992 GSM

fully digital, 900MHz, 124 channelsautomatic location, hand-over, cellularroaming in Europe – now worldwide in more than 200countriesservices: data with 9.6kbit/s, FAX, voice, ...

9 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication III

1991 DECTused to be Digital European Cordless Telephone;now: Digital Enhanced Cordless Telecommunications

1880–1900MHz, 1̃00–500m range, 120 duplex channels,1.2Mbit/s data transmission, voice encryption,authentication, up to several 10000 user/km2, used in morethan 50 countries

1992 GSM

fully digital, 900MHz, 124 channelsautomatic location, hand-over, cellularroaming in Europe – now worldwide in more than 200countriesservices: data with 9.6kbit/s, FAX, voice, ...

9 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication III

1991 DECTused to be Digital European Cordless Telephone;now: Digital Enhanced Cordless Telecommunications1880–1900MHz, 1̃00–500m range, 120 duplex channels,1.2Mbit/s data transmission, voice encryption,authentication, up to several 10000 user/km2, used in morethan 50 countries

1992 GSM

fully digital, 900MHz, 124 channelsautomatic location, hand-over, cellularroaming in Europe – now worldwide in more than 200countriesservices: data with 9.6kbit/s, FAX, voice, ...

9 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication III

1991 DECTused to be Digital European Cordless Telephone;now: Digital Enhanced Cordless Telecommunications1880–1900MHz, 1̃00–500m range, 120 duplex channels,1.2Mbit/s data transmission, voice encryption,authentication, up to several 10000 user/km2, used in morethan 50 countries

1992 GSM

fully digital, 900MHz, 124 channelsautomatic location, hand-over, cellularroaming in Europe – now worldwide in more than 200countriesservices: data with 9.6kbit/s, FAX, voice, ...

9 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication III

1991 DECTused to be Digital European Cordless Telephone;now: Digital Enhanced Cordless Telecommunications1880–1900MHz, 1̃00–500m range, 120 duplex channels,1.2Mbit/s data transmission, voice encryption,authentication, up to several 10000 user/km2, used in morethan 50 countries

1992 GSM

fully digital, 900MHz, 124 channels

automatic location, hand-over, cellularroaming in Europe – now worldwide in more than 200countriesservices: data with 9.6kbit/s, FAX, voice, ...

9 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication III

1991 DECTused to be Digital European Cordless Telephone;now: Digital Enhanced Cordless Telecommunications1880–1900MHz, 1̃00–500m range, 120 duplex channels,1.2Mbit/s data transmission, voice encryption,authentication, up to several 10000 user/km2, used in morethan 50 countries

1992 GSM

fully digital, 900MHz, 124 channelsautomatic location, hand-over, cellular

roaming in Europe – now worldwide in more than 200countriesservices: data with 9.6kbit/s, FAX, voice, ...

9 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication III

1991 DECTused to be Digital European Cordless Telephone;now: Digital Enhanced Cordless Telecommunications1880–1900MHz, 1̃00–500m range, 120 duplex channels,1.2Mbit/s data transmission, voice encryption,authentication, up to several 10000 user/km2, used in morethan 50 countries

1992 GSM

fully digital, 900MHz, 124 channelsautomatic location, hand-over, cellularroaming in Europe – now worldwide in more than 200countries

services: data with 9.6kbit/s, FAX, voice, ...

9 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication III

1991 DECTused to be Digital European Cordless Telephone;now: Digital Enhanced Cordless Telecommunications1880–1900MHz, 1̃00–500m range, 120 duplex channels,1.2Mbit/s data transmission, voice encryption,authentication, up to several 10000 user/km2, used in morethan 50 countries

1992 GSM

fully digital, 900MHz, 124 channelsautomatic location, hand-over, cellularroaming in Europe – now worldwide in more than 200countriesservices: data with 9.6kbit/s, FAX, voice, ...

9 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication IV

1996 HiperLAN (High Performance Radio Local AreaNetwork)

ETSI, Std 1: 5.15–5.30GHz, 23.4 MbpsStd 2 and 3 (5GHz) and 4 (17GHz) as wirelessATM-networks (up to 155 Mbps)

1997 Wireless LAN – IEEE 802.11IEEE standard2.4 – 2.5 GHz and infrared2 Mbps

1998 Spec. GSM successorsUMTS (European proposal for IMT-2000)Iridium

10 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication IV

1996 HiperLAN (High Performance Radio Local AreaNetwork)

ETSI, Std 1: 5.15–5.30GHz, 23.4 MbpsStd 2 and 3 (5GHz) and 4 (17GHz) as wirelessATM-networks (up to 155 Mbps)

1997 Wireless LAN – IEEE 802.11IEEE standard2.4 – 2.5 GHz and infrared2 Mbps

1998 Spec. GSM successorsUMTS (European proposal for IMT-2000)Iridium

10 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication IV

1996 HiperLAN (High Performance Radio Local AreaNetwork)

ETSI, Std 1: 5.15–5.30GHz, 23.4 MbpsStd 2 and 3 (5GHz) and 4 (17GHz) as wirelessATM-networks (up to 155 Mbps)

1997 Wireless LAN – IEEE 802.11IEEE standard2.4 – 2.5 GHz and infrared2 Mbps

1998 Spec. GSM successorsUMTS (European proposal for IMT-2000)Iridium

10 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication IV

1996 HiperLAN (High Performance Radio Local AreaNetwork)

ETSI, Std 1: 5.15–5.30GHz, 23.4 MbpsStd 2 and 3 (5GHz) and 4 (17GHz) as wirelessATM-networks (up to 155 Mbps)

1997 Wireless LAN – IEEE 802.11IEEE standard2.4 – 2.5 GHz and infrared2 Mbps

1998 Spec. GSM successorsUMTS (European proposal for IMT-2000)Iridium

10 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication V

1999 Standardization of additional wireless LANsIEEE standard 802.11b, 2.4–2.5GHz, 11MbpsBluetooth, 2.4GHz, < 1MbpsIMT-2000: UMTS, cdma2000, DECT, . . .

Start of WAP

first step −→ unified Internet/mobilemobile phone for access to many services

2000 GSM with higher data ratesHSCSD: up to 57.6 kbpsfirst GPRS trials up to 50 kbps (packet oriented)bankruptcy of Iridium

2001 Start of 3G systemsCdma2000 in KoreaUMTS tests in EuropeFoma (almost UMTS) in Japan

11 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication V

1999 Standardization of additional wireless LANsIEEE standard 802.11b, 2.4–2.5GHz, 11MbpsBluetooth, 2.4GHz, < 1MbpsIMT-2000: UMTS, cdma2000, DECT, . . .

Start of WAP

first step −→ unified Internet/mobilemobile phone for access to many services

2000 GSM with higher data ratesHSCSD: up to 57.6 kbpsfirst GPRS trials up to 50 kbps (packet oriented)bankruptcy of Iridium

2001 Start of 3G systemsCdma2000 in KoreaUMTS tests in EuropeFoma (almost UMTS) in Japan

11 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication V

1999 Standardization of additional wireless LANsIEEE standard 802.11b, 2.4–2.5GHz, 11MbpsBluetooth, 2.4GHz, < 1MbpsIMT-2000: UMTS, cdma2000, DECT, . . .

Start of WAP

first step −→ unified Internet/mobilemobile phone for access to many services

2000 GSM with higher data ratesHSCSD: up to 57.6 kbpsfirst GPRS trials up to 50 kbps (packet oriented)bankruptcy of Iridium

2001 Start of 3G systemsCdma2000 in KoreaUMTS tests in EuropeFoma (almost UMTS) in Japan

11 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication V

1999 Standardization of additional wireless LANsIEEE standard 802.11b, 2.4–2.5GHz, 11MbpsBluetooth, 2.4GHz, < 1MbpsIMT-2000: UMTS, cdma2000, DECT, . . .

Start of WAP

first step −→ unified Internet/mobilemobile phone for access to many services

2000 GSM with higher data ratesHSCSD: up to 57.6 kbpsfirst GPRS trials up to 50 kbps (packet oriented)bankruptcy of Iridium

2001 Start of 3G systemsCdma2000 in KoreaUMTS tests in EuropeFoma (almost UMTS) in Japan

11 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication VI

2002 WLAN hot-spots started to spread2003 DVB-T started to replace analog TV2005

WiMax started as DSL alternativefirst zigBee products

2006HSDPA startedWLAN draft for 250 Mbps (802.11n) using MIMOWPA2 mandatory for Wi-Fi WLAN devices

2008“real” internet availability on mobile phones7.2 Mbps HSDPA, 1.4 Mbps HSUPAfirst LTE tests (>100 Mbps)

2009 netbooks, iphones, VoIPoWLAN, . . .2010 LTE became more available

12 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication VI

2002 WLAN hot-spots started to spread

2003 DVB-T started to replace analog TV2005

WiMax started as DSL alternativefirst zigBee products

2006HSDPA startedWLAN draft for 250 Mbps (802.11n) using MIMOWPA2 mandatory for Wi-Fi WLAN devices

2008“real” internet availability on mobile phones7.2 Mbps HSDPA, 1.4 Mbps HSUPAfirst LTE tests (>100 Mbps)

2009 netbooks, iphones, VoIPoWLAN, . . .2010 LTE became more available

12 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication VI

2002 WLAN hot-spots started to spread2003 DVB-T started to replace analog TV

2005WiMax started as DSL alternativefirst zigBee products

2006HSDPA startedWLAN draft for 250 Mbps (802.11n) using MIMOWPA2 mandatory for Wi-Fi WLAN devices

2008“real” internet availability on mobile phones7.2 Mbps HSDPA, 1.4 Mbps HSUPAfirst LTE tests (>100 Mbps)

2009 netbooks, iphones, VoIPoWLAN, . . .2010 LTE became more available

12 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication VI

2002 WLAN hot-spots started to spread2003 DVB-T started to replace analog TV2005

WiMax started as DSL alternativefirst zigBee products

2006HSDPA startedWLAN draft for 250 Mbps (802.11n) using MIMOWPA2 mandatory for Wi-Fi WLAN devices

2008“real” internet availability on mobile phones7.2 Mbps HSDPA, 1.4 Mbps HSUPAfirst LTE tests (>100 Mbps)

2009 netbooks, iphones, VoIPoWLAN, . . .2010 LTE became more available

12 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication VI

2002 WLAN hot-spots started to spread2003 DVB-T started to replace analog TV2005

WiMax started as DSL alternativefirst zigBee products

2006HSDPA startedWLAN draft for 250 Mbps (802.11n) using MIMOWPA2 mandatory for Wi-Fi WLAN devices

2008“real” internet availability on mobile phones7.2 Mbps HSDPA, 1.4 Mbps HSUPAfirst LTE tests (>100 Mbps)

2009 netbooks, iphones, VoIPoWLAN, . . .2010 LTE became more available

12 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication VI

2002 WLAN hot-spots started to spread2003 DVB-T started to replace analog TV2005

WiMax started as DSL alternativefirst zigBee products

2006HSDPA startedWLAN draft for 250 Mbps (802.11n) using MIMOWPA2 mandatory for Wi-Fi WLAN devices

2008“real” internet availability on mobile phones7.2 Mbps HSDPA, 1.4 Mbps HSUPAfirst LTE tests (>100 Mbps)

2009 netbooks, iphones, VoIPoWLAN, . . .2010 LTE became more available

12 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication VI

2002 WLAN hot-spots started to spread2003 DVB-T started to replace analog TV2005

WiMax started as DSL alternativefirst zigBee products

2006HSDPA startedWLAN draft for 250 Mbps (802.11n) using MIMOWPA2 mandatory for Wi-Fi WLAN devices

2008“real” internet availability on mobile phones7.2 Mbps HSDPA, 1.4 Mbps HSUPAfirst LTE tests (>100 Mbps)

2009 netbooks, iphones, VoIPoWLAN, . . .

2010 LTE became more available

12 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

A brief history of wireless communication VI

2002 WLAN hot-spots started to spread2003 DVB-T started to replace analog TV2005

WiMax started as DSL alternativefirst zigBee products

2006HSDPA startedWLAN draft for 250 Mbps (802.11n) using MIMOWPA2 mandatory for Wi-Fi WLAN devices

2008“real” internet availability on mobile phones7.2 Mbps HSDPA, 1.4 Mbps HSUPAfirst LTE tests (>100 Mbps)

2009 netbooks, iphones, VoIPoWLAN, . . .2010 LTE became more available

12 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Aspects of Mobile Communications

Mobile networks: ad-hoc and infrastructure networks aswell as communication properties, protocols, data formatsand concrete technologiesMobile hardware: mobile devices or device componentsMobile software: characteristics and requirements ofmobile applications

13 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Aspects of Mobile CommunicationsMobile networks: ad-hoc and infrastructure networks aswell as communication properties, protocols, data formatsand concrete technologies

Mobile hardware: mobile devices or device componentsMobile software: characteristics and requirements ofmobile applications

13 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Aspects of Mobile CommunicationsMobile networks: ad-hoc and infrastructure networks aswell as communication properties, protocols, data formatsand concrete technologiesMobile hardware: mobile devices or device components

Mobile software: characteristics and requirements ofmobile applications

13 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Aspects of Mobile CommunicationsMobile networks: ad-hoc and infrastructure networks aswell as communication properties, protocols, data formatsand concrete technologiesMobile hardware: mobile devices or device componentsMobile software: characteristics and requirements ofmobile applications

13 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Major Driver: Computing

Computers are integrated (95% embedded systems!)small, cheap, portable, replaceable -no more separate devices

Technology is in the backgroundcomputer are aware of their environment and adapt (location awareness)computer recognize the location of the user and react appropriately (e.g.,call forwarding, fax forwarding, context awareness)

Advances in technologymore computing power in smaller devicesflat, lightweight displays with low power consumptionnew user interfaces due to small dimensionsmore bandwidth per cubic metermultiple wireless interfaces: wireless LANs, wireless WANs, regionalwireless telecommunication networks

14 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Major Driver: ComputingComputers are integrated (95% embedded systems!)

small, cheap, portable, replaceable -no more separate devices

Technology is in the backgroundcomputer are aware of their environment and adapt (location awareness)computer recognize the location of the user and react appropriately (e.g.,call forwarding, fax forwarding, context awareness)

Advances in technologymore computing power in smaller devicesflat, lightweight displays with low power consumptionnew user interfaces due to small dimensionsmore bandwidth per cubic metermultiple wireless interfaces: wireless LANs, wireless WANs, regionalwireless telecommunication networks

14 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Major Driver: ComputingComputers are integrated (95% embedded systems!)

small, cheap, portable, replaceable -no more separate devices

Technology is in the backgroundcomputer are aware of their environment and adapt (location awareness)computer recognize the location of the user and react appropriately (e.g.,call forwarding, fax forwarding, context awareness)

Advances in technologymore computing power in smaller devicesflat, lightweight displays with low power consumptionnew user interfaces due to small dimensionsmore bandwidth per cubic metermultiple wireless interfaces: wireless LANs, wireless WANs, regionalwireless telecommunication networks

14 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Major Driver: ComputingComputers are integrated (95% embedded systems!)

small, cheap, portable, replaceable -no more separate devices

Technology is in the backgroundcomputer are aware of their environment and adapt (location awareness)computer recognize the location of the user and react appropriately (e.g.,call forwarding, fax forwarding, context awareness)

Advances in technologymore computing power in smaller devicesflat, lightweight displays with low power consumptionnew user interfaces due to small dimensionsmore bandwidth per cubic metermultiple wireless interfaces: wireless LANs, wireless WANs, regionalwireless telecommunication networks

14 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .

Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.

Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.

VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery power

Expensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devices

Battery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Comms

Insufficient bandwidth:

Mobile Internet access (using GPRS, EDGE, HSDPA,HSUPA 3G networks) is generally slower than direct cableconnections .Available within range of commercial cell phone towers.Wireless LANs: higher speed, inexpensive but very limitedrange.

Security standards:

Dependent on public networks, hence careful use of VPN.VPN can easily be attacked

Power consumption:

Mostly rely on battery powerExpensive batteries due to compact size of mobile devicesBattery life

15 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Computing (cont’d)

Transmission interferences:

Weather, terrain, and the range from the nearest signalpointReception in tunnels, some buildings, and rural areas

Potential health hazards:

Distractions whilst drivingNot clear whether banning mobile device use while drivingreduces accidents or notInterference with sensitive medical devicesSignals causing health problems

Human interface with device:

Smaller screen and keyboardsAlternative input: speech, handwriting, etc

16 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Computing (cont’d)

Transmission interferences:

Weather, terrain, and the range from the nearest signalpointReception in tunnels, some buildings, and rural areas

Potential health hazards:

Distractions whilst drivingNot clear whether banning mobile device use while drivingreduces accidents or notInterference with sensitive medical devicesSignals causing health problems

Human interface with device:

Smaller screen and keyboardsAlternative input: speech, handwriting, etc

16 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Computing (cont’d)

Transmission interferences:

Weather, terrain, and the range from the nearest signalpointReception in tunnels, some buildings, and rural areas

Potential health hazards:

Distractions whilst drivingNot clear whether banning mobile device use while drivingreduces accidents or notInterference with sensitive medical devicesSignals causing health problems

Human interface with device:

Smaller screen and keyboardsAlternative input: speech, handwriting, etc

16 / 27

About the CourseIntroductionApplications

Protocols

Why mobile communications?Brief historyAspects of Mobile CommunicationsLimitations

Limitations of Mobile Computing (cont’d)

Transmission interferences:

Weather, terrain, and the range from the nearest signalpointReception in tunnels, some buildings, and rural areas

Potential health hazards:

Distractions whilst drivingNot clear whether banning mobile device use while drivingreduces accidents or notInterference with sensitive medical devicesSignals causing health problems

Human interface with device:

Smaller screen and keyboardsAlternative input: speech, handwriting, etc

16 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-Tpersonal communication using GSM/UMTS/LTEposition via GPSlocal ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancyvehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergencies

early transmission of patient data to the hospital, currentstatus, first diagnosisreplacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-T

personal communication using GSM/UMTS/LTEposition via GPSlocal ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancyvehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergencies

early transmission of patient data to the hospital, currentstatus, first diagnosisreplacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-Tpersonal communication using GSM/UMTS/LTE

position via GPSlocal ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancyvehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergencies

early transmission of patient data to the hospital, currentstatus, first diagnosisreplacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-Tpersonal communication using GSM/UMTS/LTEposition via GPS

local ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancyvehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergencies

early transmission of patient data to the hospital, currentstatus, first diagnosisreplacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-Tpersonal communication using GSM/UMTS/LTEposition via GPSlocal ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancy

vehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergencies

early transmission of patient data to the hospital, currentstatus, first diagnosisreplacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-Tpersonal communication using GSM/UMTS/LTEposition via GPSlocal ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancyvehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergencies

early transmission of patient data to the hospital, currentstatus, first diagnosisreplacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-Tpersonal communication using GSM/UMTS/LTEposition via GPSlocal ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancyvehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergencies

early transmission of patient data to the hospital, currentstatus, first diagnosisreplacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-Tpersonal communication using GSM/UMTS/LTEposition via GPSlocal ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancyvehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergenciesearly transmission of patient data to the hospital, currentstatus, first diagnosis

replacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-Tpersonal communication using GSM/UMTS/LTEposition via GPSlocal ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancyvehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergenciesearly transmission of patient data to the hospital, currentstatus, first diagnosisreplacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.

crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

ApplicationsVehicles

transmission of news, road condition, weather, music viaDAB/DVB-Tpersonal communication using GSM/UMTS/LTEposition via GPSlocal ad-hoc network with vehicles close-by to preventaccidents, guidance system, redundancyvehicle data (e.g., from busses, high-speed trains) can betransmitted in advance for maintenance

Emergenciesearly transmission of patient data to the hospital, currentstatus, first diagnosisreplacement of a fixed infrastructure in case ofearthquakes, hurricanes, fire etc.crisis, war, ...

17 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

More Applications...

Traveling salesmendirect access to customer files stored in a central locationconsistent databases for all agentsmobile office

Replacement of fixed networksremote sensors, e.g., weather, earth activitiesflexibility for trade showsLANs in historic buildings

Entertainment, education, ...outdoor Internet accessintelligent travel guide with up-to-datelocation dependentinformationad-hoc networks formulti user games

18 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

More Applications...Traveling salesmen

direct access to customer files stored in a central locationconsistent databases for all agentsmobile office

Replacement of fixed networksremote sensors, e.g., weather, earth activitiesflexibility for trade showsLANs in historic buildings

Entertainment, education, ...outdoor Internet accessintelligent travel guide with up-to-datelocation dependentinformationad-hoc networks formulti user games

18 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

More Applications...Traveling salesmen

direct access to customer files stored in a central locationconsistent databases for all agentsmobile office

Replacement of fixed networksremote sensors, e.g., weather, earth activitiesflexibility for trade showsLANs in historic buildings

Entertainment, education, ...outdoor Internet accessintelligent travel guide with up-to-datelocation dependentinformationad-hoc networks formulti user games

18 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

More Applications...Traveling salesmen

direct access to customer files stored in a central locationconsistent databases for all agentsmobile office

Replacement of fixed networksremote sensors, e.g., weather, earth activitiesflexibility for trade showsLANs in historic buildings

Entertainment, education, ...outdoor Internet accessintelligent travel guide with up-to-datelocation dependentinformationad-hoc networks formulti user games

18 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Location dependent services

Location aware serviceswhat services, e.g., printer, fax, phone, server etc. exist inthe local environment

Follow-on servicesautomatic call-forwarding, transmission of the actualworkspace to the current location

Information services“push”: e.g., current special offers in the supermarket“pull”: e.g., where is the Black Forrest Cheese Cake?

Support servicescaches, intermediate results, state information etc. “follow”the mobile device through the fixed network

Privacywho should gain knowledge about the location

19 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Location dependent services

Location aware serviceswhat services, e.g., printer, fax, phone, server etc. exist inthe local environment

Follow-on servicesautomatic call-forwarding, transmission of the actualworkspace to the current location

Information services“push”: e.g., current special offers in the supermarket“pull”: e.g., where is the Black Forrest Cheese Cake?

Support servicescaches, intermediate results, state information etc. “follow”the mobile device through the fixed network

Privacywho should gain knowledge about the location

19 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Location dependent services

Location aware serviceswhat services, e.g., printer, fax, phone, server etc. exist inthe local environment

Follow-on servicesautomatic call-forwarding, transmission of the actualworkspace to the current location

Information services“push”: e.g., current special offers in the supermarket“pull”: e.g., where is the Black Forrest Cheese Cake?

Support servicescaches, intermediate results, state information etc. “follow”the mobile device through the fixed network

Privacywho should gain knowledge about the location

19 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Location dependent services

Location aware serviceswhat services, e.g., printer, fax, phone, server etc. exist inthe local environment

Follow-on servicesautomatic call-forwarding, transmission of the actualworkspace to the current location

Information services“push”: e.g., current special offers in the supermarket“pull”: e.g., where is the Black Forrest Cheese Cake?

Support servicescaches, intermediate results, state information etc. “follow”the mobile device through the fixed network

Privacywho should gain knowledge about the location

19 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Location dependent services

Location aware serviceswhat services, e.g., printer, fax, phone, server etc. exist inthe local environment

Follow-on servicesautomatic call-forwarding, transmission of the actualworkspace to the current location

Information services“push”: e.g., current special offers in the supermarket“pull”: e.g., where is the Black Forrest Cheese Cake?

Support servicescaches, intermediate results, state information etc. “follow”the mobile device through the fixed network

Privacywho should gain knowledge about the location

19 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Location dependent services

Location aware serviceswhat services, e.g., printer, fax, phone, server etc. exist inthe local environment

Follow-on servicesautomatic call-forwarding, transmission of the actualworkspace to the current location

Information services“push”: e.g., current special offers in the supermarket“pull”: e.g., where is the Black Forrest Cheese Cake?

Support servicescaches, intermediate results, state information etc. “follow”the mobile device through the fixed network

Privacywho should gain knowledge about the location

19 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Effects of device portability

20 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Mobile Devices

21 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Wireless networks in comparison to fixed networks

Higher loss-rates due to interference: emissions ofengines/lightningRestrictive regulations of frequencies: frequencies have to becoordinated, useful frequencies are almost all occupiedLower transmission rates: local some Mbit/s, regional currently,e.g., 53kbit/s with GSM/GPRS or about 150 kbit/s using EDGEsoon Mbit/s with LTEHigher delays, higher jitter: connection setup time with GSM inthe second range, several hundred milliseconds for otherwireless systems - soon in ms range with LTELower security, simpler active attacking: radio interfaceaccessible for everyone, base station can be simulated, thusattracting calls from mobile phonesAlways shared medium: secure access mechanisms important

22 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Wireless networks in comparison to fixed networks

Higher loss-rates due to interference: emissions ofengines/lightning

Restrictive regulations of frequencies: frequencies have to becoordinated, useful frequencies are almost all occupiedLower transmission rates: local some Mbit/s, regional currently,e.g., 53kbit/s with GSM/GPRS or about 150 kbit/s using EDGEsoon Mbit/s with LTEHigher delays, higher jitter: connection setup time with GSM inthe second range, several hundred milliseconds for otherwireless systems - soon in ms range with LTELower security, simpler active attacking: radio interfaceaccessible for everyone, base station can be simulated, thusattracting calls from mobile phonesAlways shared medium: secure access mechanisms important

22 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Wireless networks in comparison to fixed networks

Higher loss-rates due to interference: emissions ofengines/lightningRestrictive regulations of frequencies: frequencies have to becoordinated, useful frequencies are almost all occupied

Lower transmission rates: local some Mbit/s, regional currently,e.g., 53kbit/s with GSM/GPRS or about 150 kbit/s using EDGEsoon Mbit/s with LTEHigher delays, higher jitter: connection setup time with GSM inthe second range, several hundred milliseconds for otherwireless systems - soon in ms range with LTELower security, simpler active attacking: radio interfaceaccessible for everyone, base station can be simulated, thusattracting calls from mobile phonesAlways shared medium: secure access mechanisms important

22 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Wireless networks in comparison to fixed networks

Higher loss-rates due to interference: emissions ofengines/lightningRestrictive regulations of frequencies: frequencies have to becoordinated, useful frequencies are almost all occupiedLower transmission rates: local some Mbit/s, regional currently,e.g., 53kbit/s with GSM/GPRS or about 150 kbit/s using EDGEsoon Mbit/s with LTE

Higher delays, higher jitter: connection setup time with GSM inthe second range, several hundred milliseconds for otherwireless systems - soon in ms range with LTELower security, simpler active attacking: radio interfaceaccessible for everyone, base station can be simulated, thusattracting calls from mobile phonesAlways shared medium: secure access mechanisms important

22 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Wireless networks in comparison to fixed networks

Higher loss-rates due to interference: emissions ofengines/lightningRestrictive regulations of frequencies: frequencies have to becoordinated, useful frequencies are almost all occupiedLower transmission rates: local some Mbit/s, regional currently,e.g., 53kbit/s with GSM/GPRS or about 150 kbit/s using EDGEsoon Mbit/s with LTEHigher delays, higher jitter: connection setup time with GSM inthe second range, several hundred milliseconds for otherwireless systems - soon in ms range with LTE

Lower security, simpler active attacking: radio interfaceaccessible for everyone, base station can be simulated, thusattracting calls from mobile phonesAlways shared medium: secure access mechanisms important

22 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Wireless networks in comparison to fixed networks

Higher loss-rates due to interference: emissions ofengines/lightningRestrictive regulations of frequencies: frequencies have to becoordinated, useful frequencies are almost all occupiedLower transmission rates: local some Mbit/s, regional currently,e.g., 53kbit/s with GSM/GPRS or about 150 kbit/s using EDGEsoon Mbit/s with LTEHigher delays, higher jitter: connection setup time with GSM inthe second range, several hundred milliseconds for otherwireless systems - soon in ms range with LTELower security, simpler active attacking: radio interfaceaccessible for everyone, base station can be simulated, thusattracting calls from mobile phones

Always shared medium: secure access mechanisms important

22 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Wireless networks in comparison to fixed networks

Higher loss-rates due to interference: emissions ofengines/lightningRestrictive regulations of frequencies: frequencies have to becoordinated, useful frequencies are almost all occupiedLower transmission rates: local some Mbit/s, regional currently,e.g., 53kbit/s with GSM/GPRS or about 150 kbit/s using EDGEsoon Mbit/s with LTEHigher delays, higher jitter: connection setup time with GSM inthe second range, several hundred milliseconds for otherwireless systems - soon in ms range with LTELower security, simpler active attacking: radio interfaceaccessible for everyone, base station can be simulated, thusattracting calls from mobile phonesAlways shared medium: secure access mechanisms important

22 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Areas of research in mobile comms

Wireless Communicationstransmission quality (BW, error rate, delay)modulation, coding, interferencemedia access, regulations. . .

Mobilitylocation dependent serviceslocation transparencyQoS support (delay, jitter, security). . .

Portabilitypower consumptionlimited computing powerlimited sizes of displayusability. . .

23 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Areas of research in mobile comms

Wireless Communicationstransmission quality (BW, error rate, delay)modulation, coding, interferencemedia access, regulations. . .

Mobilitylocation dependent serviceslocation transparencyQoS support (delay, jitter, security). . .

Portabilitypower consumptionlimited computing powerlimited sizes of displayusability. . .

23 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Areas of research in mobile comms

Wireless Communicationstransmission quality (BW, error rate, delay)modulation, coding, interferencemedia access, regulations. . .

Mobilitylocation dependent serviceslocation transparencyQoS support (delay, jitter, security). . .

Portabilitypower consumptionlimited computing powerlimited sizes of displayusability. . .

23 / 27

About the CourseIntroductionApplications

Protocols

ExamplesServicesDevicesResearch areas

Areas of research in mobile comms

Wireless Communicationstransmission quality (BW, error rate, delay)modulation, coding, interferencemedia access, regulations. . .

Mobilitylocation dependent serviceslocation transparencyQoS support (delay, jitter, security). . .

Portabilitypower consumptionlimited computing powerlimited sizes of displayusability. . .

23 / 27

About the CourseIntroductionApplications

Protocols

Network protocolsLayered ModelOverlay Networks

Network protocol model

24 / 27

About the CourseIntroductionApplications

Protocols

Network protocolsLayered ModelOverlay Networks

Layered model of mobile communications

25 / 27

About the CourseIntroductionApplications

Protocols

Network protocolsLayered ModelOverlay Networks

Overlay Networks

26 / 27

Assignment

Find 2-3 papers in the IEEE/ACM journals on mobile & ad hocnetworks

Write up short report on these papers, up to 4 pages

Report should be written in English as a review paper

Cite/mention the papers’ detail clearly in the report

Report format: LATEX, Word, or pdf

Papers and report must be submitted by email [email protected]

Email Subject: [MANET] Report 01 < Name >< StudentNo >

Due date: by Thursday, 27 February 2014, 23:59 WIB

Notes

No two students should discuss/review the same paper!

Doing so will incur discount on your mark