GPRS Chapter 2
GPRS Chapter 2
UNIT2
GPRS and Mobile Data communication (12M)
History Of GPRS:
GPRS was one of the main advances that empowered a cell system to
interface with Internet Protocol systems, accomplishing across the board
reception in the mid-2000s.
The capacity to peruse the web from a telephone whenever through
“dependably on” data networking, while underestimated in a great part of
the world today, was as yet an oddity when it was introduced. Indeed, even
now, GPRS keeps on being utilized in parts of the world where it has been
too expensive even to consider upgrading cell organize framework to move
up to newer alternatives.
According to a study on the history of GPRS development Bernhard Walke
and his student, Peter Decker, are the inventors of GPRS – the first system
providing universal mobile Internet access.
Function of GPRS
• A mobile generation called GPRS is used to talk information via mobile
networks.
• It allows clients to access the internet and different data services on
their cell gadgets.
• Due to its low prices and environmental friendliness, GPRS is a famous
option for consumers.
Features of GPRS
• Advantages of GPRS
• A high-speed data transfer cost is offered to mobile devices through
General Packet Radio Service or GPRS.
• Web browsing, email sending and receiving, and online shopping are
just a few of the online services that GPRS users can access while they
are on the move.
• Because GPRS is always operational, customers can access the
internet quickly and without any problems without utilizing dial-up.
• GPRS offers a cost-effective approach to transmitting statistics
because it only charges for the volume of data transferred, not for the
amount of time spent online.
• GPRS offers users a flexible option because it functions well with a
variety of mobile devices.
• GPRS tries to make maximum use of the existing physical structure of
GSM. It has introduced a new entity named GPRS support nodes(GSN)
whose responsibility is to route and deliver a data packet. GSN is of
two types:
• Serving GPRS Support Node (SGNS)
• Gateway GPRS Support Node (GGNS)
GPRS architecture
• Mobile Station(MS)
• GPRC requires enhanced mobile stations, as existing mobile stations
were designed according to the GSM network, and they were unable in
handling enhanced data packets.
• A variety of high-speed mobile stations are available to support
enhanced data packets.
• These mobile stations are also capable of handling the GSM
architecture to make voice calls.
• Base Station Subsystem (BSC)
• In GSM architecture there is one component called BSC. But in GPRS
there is one component is added to BSC called PCU. PCU stands for
Packet Control Unit.
• If the signal comes to BSC and that signal contains data, then PCU
routes to the SGSN.
• The interface is used between BSC and PCU is the FRI interface.
• After the signal comes to SGSN, it delivers the data packet to the
GGSN. GGSN routes the data packet to the data network (PDN-
Predefined Data Network).
• GPRS Support Nodes
• GPRS support nodes are of two types:
• 1. Serving GPRS Support Node (SGSN)
It is responsible for the following tasks:
• Packet Delivery
• Mobility management
• apply/ sign off of terminals
• localization
• LLC (Logical Link Control) management
• Authentication
• billing
• 2. Gateway GPRS Support Node (GGSN)
It is responsible for the following tasks:
• Mediator between GPRS backbone and external data networks.
Saves current data for the SGSN address of the participant as well as their
profile and data for authentication and invoice
• Mobility Support
• GPRS has the following mechanism to support mobility in the network:
1. Attachment Procedure
2. Location and Handoff Management
• Routing Area
• GPRS introduces the concept of a Routing Area.
• This concept is similar to Location Area in GSM, except that it
generally contains fewer cells. Because routing areas are smaller than
location areas, less radio resources are used While broadcasting a
page message.
• SMS in GSM
• GSM introduced a mechanism of Short Messaging Service(SMS) which
is similar to peer-to-peer Instant messaging.
Service Precedence
Reliability
Delay and
Throughput
The GGSN also collects charging information connected to the use of the
external data networks and can act as a packet filter for incoming traffic.
Routing IN GPRS
• Mobility Management
In GPRS, three mobile station (MS) mobility management
states,
i.e., idle, ready, and standby are defined in order to
accommodate
bursty traffic characteristics of data services, and thus, GPRS
results
in efficient management of radio resources and signaling
networks.
Logical CHANNELS IN GPRS
GPRS Channels
Let us go through GPRS logical channels. Logical channels are named and used in
GPRS network are PBCCH, PPCH, PAGCH,PNCH,PRACH, PACCH,PTCCH,PDTCH.
These channels are divided as mentioned below based on their functions.
Broadcast channel-
Packet Broadcast Central Channel (PBCCH)
Common control channels- Packet Paging Channel (PPCH)
Packet Access Grant Channel (PAGCH)
Packet Notification Channel (PNCH)
Packet Random Access Channel (PRACH)
Dedicated control channels-Packet Associated Control Channel (PACCH)
Packet Timing Advance Common Control Channel (PTCCH)
Dedicated traffic channel-Packet Data Traffic Channel (PDTCH)
GPRS Logical Channel functions are described below.
PDTCH- Used for data traffic, bidirection between MS(Mobile Subscriber) and
BSS(base station subsystem)
PBCCH- Used for Broadcast signalling control, from BSS to MSs
PRACH- Used for random access, from MSs to BSS
PAGCH- Used for Access Grant indication, from BSS to MSs
PPCH-Used for Paging, from BSS to MSs
PNCH- USed for notification purpose, from BSS to MSs
PACCH- Used for Associated control, bidirectional
PTCCH- Used for timing advance control, bidirectional
Wireless LANs(WLAN)
WLAN stands for Wireless Local Area Network. WLAN is a wireless network that
allows devices to associate and communicate wirelessly.
Just like a traditional wired LAN in which the device transmits over Ethernet cables, the
devices using the WLAN transmit through WiFi.
Mobile users can connect to a WLAN through wireless connection. The IEEE 802.11
group of standards describe the technologies for LANs.
Though WLAN looks dissimilar to the traditional LAN, it works in the same way
Advantages of WLANs
• They provide clutter free homes, offices and other networked
places.
• The LANs are scalable in nature, i.e. devices may be added or
removed from the network at a greater ease than wired LANs.
• The system is portable within the network coverage and access to
the network is not bounded by the length of the cables.
• Installation and setup is much easier than wired counterparts.
Disadvantages of WLANs
• Since radio waves are used for communications, the signals are
noisier with more interference from nearby systems.
• Greater care is needed for encrypting information. Also, they are
more prone to errors. So, they require greater bandwidth than the
wired LANs.
• WLANs are slower than wired LANs.
WLAN APPLICATIONS
• Wireless LANs have a great deal of applications.
• Modern implementations of WLANs range from small in-home
networks to large, campus-sized ones to completely mobile
networks on airplanes and trains.
• Users can access the Internet from WLAN hotspots in restaurants,
hotels, and now with portable devices that connect to 3G or 4G
networks
1) Stations (STA) − Stations comprise all devices and equipments that are connected
to the wireless LAN. A station can be of two types:
Wireless Access Pointz (WAP) − WAPs or simply access points (AP) are
generally wireless routers that form the base stations or access.
Client. − Clients are workstations, computers, laptops, printers, smartphones,
etc.
Each station has a wireless network interface controller.
2) Basic Service Set (BSS) −A basic service set is a group of stations communicating
at physical layer level. BSS can be of two categories depending upon mode of
operation:
RFID readers are installed at tracking points and can read information from tags when
they come into range, which can be of several feet radius.
A tag need not be within direct line-of-sight of the reader to be tracked. RFID is used to
check identities and track inventory, assets and people.
RFID tags can be attached to a variety of objects like cash, clothing, baggage, parcels,
and even implanted in animals and people.
Working Principle
RFID tags are affixed on the object and have a transmitter and a receiver embedded on
it. It contains the serial number that uniquely identifies a specific object. The tags have
two parts−
The RFID reader (also called interrogator) captures the information encoded on the tag
using an antenna.
It is a two-way radio transmitter-receiver that emits a signal for the tag. The tag
responds by sending the information embedded in its memory. The reader captures the
results and transmits to the RFID computer program, which then performs the
necessary processing.
Passive tags− They use the radio wave energy of the reader to transmit its ID
to the reader.
Active tags− They are equipped with an on-board battery and transmit their ID
periodically.
Battery – assisted Passive− They have a small battery on-board and are
activated only within the range of an RFID reader.
Passive readers− They can only receive signals from active tags.
Active readers− They can transmits interrogator signals to both passive, active
as well as battery-assisted tags and also receives replies from them.
Fixed readers− They are used to create a highly defined and tightly controlled
interrogation area. Tags are read when they enter this area. Active readers are
deployed here.
Mobile readers− They are used for creating handheld tag reading devices. They
may be also installed in moving vehicles.
RFID-fEATURES
• A unique ID
• Automatic recognition
• Can detect ‘hidden’ objects
• Multiple tags can be read at once
• Rugged and weatherproof
• security
RFID-Advantages
• Low maintenance cost
• Can handle large amount of data
• It provides secure and reliable data
• Detection process is automatic
RFID-Disadvantages
RFID-Application
• Security & Control Applications
• Toll Road Applicatiosns
• Baggage Applications
• Assets tracking
• Animal tracking
• Automotive
Bluetooth
Bluetooth is universal for short-range wireless voice and data
communication.
It is a Wireless Personal Area Network (WPAN) technology and is used
for exchanging data over smaller distances.
This technology was invented by Ericson in 1994. It operates in the
unlicensed, industrial, scientific, and medical (ISM) band from 2.4 GHz
to 2.485 GHz.
Maximum devices that can be connected at the same time are 7.
Bluetooth ranges up to 10 meters.
It provides data rates up to 1 Mbps or 3 Mbps depending upon the
version.
The spreading technique that it uses is FHSS (Frequency-hopping
spread spectrum).
A Bluetooth network is called a piconet and a collection of
interconnected piconets is called scatternet.
What is Bluetooth?
Piconet:
Scatternet:
Types of Bluetooth
Various types of Bluetooth are available in the market nowadays. Let us look
at them.
In-Car Headset: One can make calls from the car speaker system
without the use of mobile phones.
Stereo Headset: To listen to music in car or in music players at
home.
Webcam: One can link the camera with the help of Bluetooth with
their laptop or phone.
Bluetooth-equipped Printer: The printer can be used when
connected via Bluetooth with mobile phone or laptop.
Bluetooth Global Positioning System (GPS): To use GPS in cars, one
can connect their phone with car system via Bluetooth to fetch the
directions of the address.
Advantage:
Disadvantages:
Applications:
Architecture:
2. MAC Layer:
This layer provides and interface between convergence layer and
physical layer of WiMax protocol stack. It provides point to
multipoint communication and is based on CSMA/CA (Carrier Sense
Multiple Access with Collision Avoidance). The MAC layer is
responsible for transmitting data in frames and controlling access to
shared wireless medium. The MAC protocol defines how and when a
subscriber may initiate a transmission on the channel.
3. Convergence Layer:
This layer provides the information of the external network. It
accepts higher layer protocol data unit (PDU) and converts it to
lower layer PDU. It provides functions depending upon the service
being used.
Advantages of WiMAX:
Disadvantages of WiMAX:
Working:
The correspondent node sends the data to the mobile node. Data packets
contain the correspondent node’s address (Source) and home address
(Destination). Packets reach the home agent. But now mobile node is not in
the home network, it has moved into the foreign network. The foreign agent
sends the care-of-address to the home agent to which all the packets should
be sent. Now, a tunnel will be established between the home agent and the
foreign agent by the process of tunneling.
Tunneling establishes a virtual pipe for the packets available between a
tunnel entry and an endpoint. It is the process of sending a packet via a
tunnel and it is achieved by a mechanism called encapsulation.
Now, the home agent encapsulates the data packets into new packets in
which the source address is the home address and destination is the care-
of-address and sends it through the tunnel to the foreign agent. Foreign
agent, on another side of the tunnel, receives the data packets,
decapsulates them, and sends them to the mobile node. The mobile node in
response to the data packets received sends a reply in response to the
foreign agent. The foreign agent directly sends the reply to the
correspondent node.