Download Seminar Report

Document related concepts

Computer security wikipedia , lookup

Peering wikipedia , lookup

IEEE 1355 wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Distributed firewall wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Computer network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Network tap wikipedia , lookup

Net bias wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Deep packet inspection wikipedia , lookup

Airborne Networking wikipedia , lookup

Wireless security wikipedia , lookup

Quality of service wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
4G TECHNOLOGY 2011
Acknowledgement
I feel immense pleasure in submitting this seminar report on “4G Technology”. The
valuable guidance of my teaching staff department made this study possible. They have
been a constant source of encouragement throughout the completion of this seminar.
I would sincerely like to thank to Mr. Satish Kumar for his help and support
during making this seminar report. This report would not have been successful without
the immense guidance and the valuable time that he has given me during my seminar
report development stages.
Charu Pandey
1
4G TECHNOLOGY 2011
ABSTRACT
The fourth generation of mobile networks will truly turn the current mobile phone
networks, in to end to end IP based networks, couple this with the arrival of IPv6, every device
in the world will have a unique IP address, which will allow full IP based communications
from a mobile device, right to the core of the internet, and back out again. If 4G is
implemented correctly, it will truly harmonize global roaming, super high speed connectivity,
and transparent end user performance on every mobile communications device in the world.
4G is set to deliver 100mbps to a roaming mobile device globally, and up to 1gbps to a
stationary device. With this
in mind, it allows for video conferencing, streaming picture perfect video and much more. It
won’t be just the phone networks that need to evolve, the increased traffic load on the internet
as a whole (imagine having 1 billion 100mb nodes attached to a network over night) will need
to expand, with faster backbones and oceanic links requiring major upgrade. 4G won’t happen
overnight, it is estimated that it will be implemented by 2012, and if done correctly, should
take off rather quickly. 4G networks i.e. Next Generation Networks (NGNs) are becoming fast
and very cost-effective solutions for those wanting an IP built high-speed data capacities in the
mobile network. Some possible standards for the 4G system are 802.20, WiMAX (802.16),
HSDPA, TDD UMTS, UMTS and future versions of UMTS. The design is that 4G will be
based on OFDM (Orthogonal Frequency Division Multiplexing), which is the key enabler of
4G technology. Other technological aspects of 4G are adaptive processing and smart antennas,
both of which will be used in 3G networks and enhance rates when used in with OFDM.
Currently 3G networks still send their data digitally over a single channel; OFDM is designed
to send data over hundreds of parallel streams, thus increasing the amount of information that
can be sent at a time over traditional CDMA networks.
2
4G TECHNOLOGY 2011
Table of Content
1. INTRODUCTION .......................................................................................................................................... 4
2. WHAT IS 4G? ............................................................................................................................................... 9
3. FEATURES ................................................................................................................................................. 13
4. WHAT IS NEEDED TO BUILD 4G NETWORKS OF FUTURE? ............................................................... 15
5. IMPLEMENTATION USING 4G ................................................................................................................ 16
6. ARCHITECTURES IN PROSPECTS .......................................................................................................... 18
6.1 End-to-end Service Architectures for 4G Mobile Systems:- .................................................................. 18
6.2
Middleware Architecture:-........................................................................................................... 19
6.3
Cellular Multi-hop Communications: Infrastructure-Based Relay Network Architecture:- .............. 19
6.4 Overlay network:- ............................................................................................................................. 21
7. A BASIC MODEL FOR 4G NETWORKS .................................................................................................. 23
8.TRANSMISSION.......................................................................................................................................... 25
9. WIRELESS TECHNOLOGIES USED IN 4G ............................................................................................ 27
9.1 Orthogonal Frequency Division Multiplexing: ..................................................................................... 28
9.2 Error Correcting: .............................................................................................................................. 30
9.3 Millimeter Wireless: .......................................................................................................................... 31
9.4 Long Term Power Prediction: ............................................................................................................ 31
9.5 Scheduling among Users: ................................................................................................................... 31
9.6 Adaptive modulation and power control: ............................................................................................. 32
10. 4G SOFTWARE ........................................................................................................................................ 34
10.1
10.2
10.3
10.4
Software Defined Radio .............................................................................................................. 34
Packet Layer .............................................................................................................................. 34
Packets ...................................................................................................................................... 35
Implementation of Packets .......................................................................................................... 37
11. 4G HARDWARE ....................................................................................................................................... 40
11.1
11.2
Ultra Wide Band Networks.......................................................................................................... 40
Smart Antennas .......................................................................................................................... 40
12. LIMITATIONS OF 3G AND DRIVERS FOR 4G ...................................................................................... 42
13. 4G VISIONS MAPPING TO RESEARCH TOPICS................................................................................... 45
14. RESEARCH CHALLENGES..................................................................................................................... 47
15. MOBILITY MANAGEMENT ..................................................................................................................... 52
16. QUALITY OF SERVICE (QOS):-.............................................................................................................. 53
17. SECURITY ................................................................................................................................................ 55
18. ADVANTAGES:- ...................................................................................................................................... 56
19. APPLICATIONS ....................................................................................................................................... 57
20. CONCLUSION ......................................................................................................................................... 59
21. REFERENCES .......................................................................................................................................... 60
3
4G TECHNOLOGY 2011
1. INTRODUCTION
4G (also known as Beyond 3G), an abbreviation for Fourth-Generation, is a
term used to describe the next complete evolution in wireless communications.
A 4G system will be able to provide a comprehensive IP solution where voice,
data and streamed multimedia can be given trousers on an "Anytime,
Anywhere" basis, and at higher data rates than previous generations.
The approaching 4G (fourth generation) mobile communication systems are
projected to solve still-remaining problems of 3G (third generation) systems
and to provide a wide variety of new services, from high-quality voice to
high-definition video to high-data-rate wireless channels. The term 4G
is used broadly to include several types of broadband wireless access
communication systems, not only cellular telephone systems. One of the terms
used to describe
4G is MAGIC-Mobile multimedia, anytime anywhere, Global mobility
support,
integrated-wireless solution, and customized personal service. As a
promise for the future, 4G systems, that is, cellular broadband wireless access
systems have been attracting much interest in
the mobile communication
arena. The 4G systems not only will support the next generation of
mobile service, but also will support the fixed wireless networks. Researchers
and vendors are expressing a growing interest in 4G wireless networks that
support global roaming across multiple wireless and mobile networks—for
example, from a
cellular network to a satellite-based network to a high-bandwidth
wireless LAN. With this feature, users will have access to different
services, increased coverage, the convenience of a single device, one bill
with reduced total access cost, and more reliable wireless access even with the
failure or loss of one or more networks. 4G networks will also feature IP
interoperability for seamless mobile Internet access and bit rates of 50 Mbps or
more.
4
4G TECHNOLOGY 2011
2. HISTORY
At the end of the 1940’s, the first radio telephone service was introduced, and was
designed to users in cars to the public land-line based telephone network. Then,
in the sixties, a system launched by Bell Systems, called IMTS, or, “Improve d
Mobile Telephone Service", brought quite a few improvements such as direct
dialing and more bandwidth. The very first analog systems were based upon IMTS
and were created in the late 60s and early 70s. The systems were called "cellular"
because large coverage areas were split into smaller areas or "cells", each cell is served
by a low power transmitter and receiver. The 1G or First Generation was an analog
system, and was developed in the seventies, 1G had two major improvements, this was
the invention of the microprocessor, and the digital transform of the control link
between the phone and the cell site. Advance mobile phone system (AMPS) was first
launched by the US and is a 1G mobile system. Based on FDMA, it allows users to
make voice calls in 1 country.
2G or Second Generation
2G first appeared around the end of the 1980’s, the 2G system digitized the voice
signal, as well as the control link. This new digital system gave a lot better quality and
much more capacity (i.e. more people could use their phones at the same time), all at a
lower cost to the end consumer. Based on TDMA, the first commercial network for
use by the public was the Global system for mobile communication (GSM).
5
4G TECHNOLOGY 2011
3G or Third Generation
3G systems promise faster communications services, entailing voice, fax and
Internet data transfer capabilities, the aim of 3G are to provide these services anytime,
anywhere throughout the globe, with seamless roaming between standards. ITU’s
IMT-2000 is a global standard for 3G and has opened new doors to enabling
innovative services and application for instance, multimedia entertainment, and
location-based services, as well as a whole lot more .In 2001,Japan saw the first
3G network launched. 3G technology supports around 144 Kbps, with high speed
movement, i.e. in a vehicle. 384Kbps locally, and upto 2Mbps for fixed stations, i.e. in
a building.
6
4G TECHNOLOGY 2011
Fig 1: - History of Mobile Networks
7
4G TECHNOLOGY 2011
8
4G TECHNOLOGY 2011
2. What is 4G?
Fourth generation (4G) wireless was originally conceived by the Defense
Advanced Research Projects Agency (DARPA), the same organization that developed
the wired Internet. It is not surprising, then, that DARPA chose the same
distributed architecture for the wireless Internet that had proven so successful in the
wired Internet. Although experts and policymakers have yet to agree on all the aspects
of 4G wireless, two characteristics have emerged as all but certain components of 4G:
end-to-end Internet Protocol (IP), and peer-to-peer networking. An all IP network
makes sense because consumers will want to use the same data applications they are
used to in wired networks. A peer-to-peer network, where every device is both a
transceiver and a router/repeater for other devices in the network, eliminates this
spoke-and-hub weakness of cellular architectures, because the elimination of a single
node does not disable the network. The final definition of “4G” will have to include
something as simple as this: if a consumer can do it at home or in the office while
wired to the Internet, that consumer must be able to do it wirelessly in a fully
mobile environment.
Let’s define “4G” as “wireless ad hoc peer-to-peer networking.” 4G technology is
significant because users joining the network add mobile routers to the network
infrastructure. Because users carry much of the network with them, network
capacity and coverage is dynamically shifted to accommodate changing user patterns.
As people congregate and create pockets of high demand, they also create additional
routes for each other, thus enabling additional access to network capacity. Users will
automatically hop away from congested routes to less congested routes. This permits
the network to dynamically and automatically self-balance capacity, and increase
network utilization. What may not be obvious is that when user devices act as routers,
these devices are actually part of the network infrastructure. So instead of carriers
subsidizing the cost of user devices (e.g., handsets, PDAs, of laptop computers),
consumers actually subsidize and help deploy the network for the carrier. With a
cellular infrastructure, users contribute nothing to the network. They are just consumers
competing for resources. But in wireless ad hoc peer-to-peer networks, users
cooperate – rather than compete – for network resources.
Thus, as the service gains popularity and the number of user increases, service likewise
improves for all users. And there is also the 80/20 rule. With traditional wireless
networks, about 80% of the cost is for site acquisition and installation, and just 20% is
for the technology. Rising land and labor costs means installation costs tend to rise
over time, subjecting the service providers’ business models to some challenging
issues in the out years. With wireless peer-to-peer networking, however, about 80% of
the cost is the technology and only 20% is the installation. Because technology costs
tend to decline over time, a current viable business model should only become more
profitable over time. The devices will get cheaper, and service providers will reach
economies of scale sooner because they will be able to pass on the infrastructure
savings to consumers, which will further increase the rate of penetration. This new
generation of wireless is intended to complement and replace the 3G systems, perhaps
9
4G TECHNOLOGY 2011
in 5 to 10 years. Accessing information anywhere, anytime, with a seamless connection
to a wide range of information and services, and receiving a large volume of
information, data, pictures, video, and so on, are the keys of the 4G infrastructures. The
future 4G infrastructures will consist of a set of various networks using IP (Internet
protocol) as a common protocol so that users are in control because they will be able to
choose every application and environment. Based on the developing trends of mobile
communication, 4G will have broader bandwidth, higher data rate, and smoother and
quicker handoff and will focus on ensuring seamless service across a multitude of
wireless systems and networks. The key concept is integrating the 4G capabilities with
all of the existing mobile technologies through advanced technologies. Application
adaptability and being highly dynamic are the main features of 4G services of interest
to users. These features mean services can be delivered and be available to the personal
preference of different users and support the users' traffic, air interfaces, radio
environment, and quality of service. Connection with the network applications can be
transferred into various forms and levels correctly and efficiently. The dominant
methods of access to this pool of information will be the mobile telephone, PDA, and
laptop to seamlessly access the voice communication, high-speed information services,
and entertainment broadcast services. Figure 1 illustrates elements and techniques to
support the adaptability of the 4G domain. The fourth generation will encompass all
systems from various networks, public to private; operator-driven broadband networks
to personal areas; and ad hoc networks. The 4G systems will interoperate networks,
public to private; operator-driven broadband networks to personal areas; and ad hoc
networks. The 4G systems will interoperate With 2G and 3G systems, as well as with
digital(broadband) broadcasting systems. In addition, 4G systems will be fully IP-based
wireless Internet. This all-encompassing integrated perspective shows the broad range
of systems that the fourth generation intends to integrate, from satellite broadband to
high altitude platform to cellular 3G and 3G systems to WLL (wireless local loop) and
FWA(fixed wireless access) to WLAN (wireless local area network) and PAN
(personal area network), all with IP as the integrating mechanism. With 4G, a range of
new services and models will be available. These services and models need to be
further examined for their interface with the design of 4G systems.
10
4G TECHNOLOGY 2011
Fig 2: - 4G Mobile Communication
11
4G TECHNOLOGY 2011
4G Open Wireless Architecture
12
4G TECHNOLOGY 2009
3. FEATURES

Support for interactive multimedia, voice, streaming video, Internet, and
Other broadband services

IP based mobile system

High speed, high capacity, and low cost-per-bit

Global access, service portability, and scalable mobile services

Seamless switching, and a variety of Quality of Service-driven services

Better scheduling and call-admission-control techniques

Ad-hoc and multi-hop networks (the strict delay requirements of voice make
Multi-hop network service a difficult problem)
Better spectral efficiency


Seamless network of multiple protocols and air interfaces (since 4G will be
All-IP, look for 4G systems to be compatible with all common network
Technologies, including 802.11, WCDMA, Bluetooth, and Hyper LAN).

An infrastructure to handle pre-existing 3G systems along with other wireless
technologies, some of which are currently under development.
4G TECHNOLOGY 2009
4G TECHNOLOGY 2009
4. What is needed to Build 4G Networks of Future?
A number of spectrum allocation decisions, spectrum standardization decisions, spectrum
availability decisions, technology innovations, component development, signal processing and
switching enhancements and inter-vendor cooperation have to take place before the vision of
4G will materialize. We think that 3G experiences - good or bad, technological or business will be useful in guiding the industry in this effort. We are bringing to the attention of
professionals in telecommunications industry following issues and problems that must be
analyzed and resolved:
* Lower Price Points Only Slightly Higher than Alternatives - The business visionaries
should do some economic modeling before they start 4G hype on the same lines as
3G hype. They should understand that 4G data applications like streaming video must
compete with very low cost wire-line applications. The users would pay only delta premium
(not a multiple) formost wireless applications.
* More Coordination among Spectrum Regulators around the World- Spectrum regulation
bodies must get involved in guiding the researchers by indicating which frequency band might
be used for 4G. FCC in USA must cooperate more actively with International bodies like ITU
and perhaps modify its hands-off policy in guiding the industry. When public interest, national
security interest and economic
interest
(inter-industry
ala
TV
versus
Telecommunications) are at stake, leadership must come from regulators. At appropriate time,
industry builds its own self-regulation mechanisms.
* More Academic Research: Universities must spend more effort in solving fundamental
problems in radio communications (especially multiband and wideband radios, intelligent
antennas and signal processing.
* Standardization of wireless networks in terms of modulation techniques, switching schemes
and roaming is an absolute necessity for 4G.
* A Voice-independent Business Justification Thinking: Business development and
technology executives should not bias their business models by using voice channels as
economic determinant for data applications. Voice has a built-in demand limit - data
applications do not.
* Integration Across Different Network Topologies: Network architects must base their
architecture on hybrid network concepts that integrates wireless wide area networks,
wireless LANS (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.15 and IEEE 802.16,
Bluetooth with fiber-based Internet backbone. Broadband wireless networks must be a part
of this integrated network architecture.
* Non-disruptive Implementation: 4G must allow us to move from 3G to 4G.
4G TECHNOLOGY 2009
5. IMPLEMENTATION USING 4G
The goal of 4G is to replace the current proliferation of core mobile networks
with a single worldwide core network standard, based on IP for control, video, packet
data, and voice. This will provide uniform video, voice, and data services to the mobile
host, based entirely on IP.
The objective is to offer seamless multimedia services to users accessing an all IPbased infrastructure through heterogeneous access technologies. IP is assumed to
act as an adhesive for providing global connectivity
and
mobility
among
networks.
An all IP-based 4G wireless network has inherent advantages over its predecessors. It
is compatible with, and independent of the underlying radio access technology. An IP
wireless network replaces the old Signaling
System 7 (SS7) telecommunications protocol, which is considered massively
redundant. This is because SS7 signal transmission consumes a larger part of network
bandwidth even when there is no signaling traffic for the simple reason that it uses a
call setup mechanism to reserve bandwidth, rather time/frequency slots in the radio
waves. IP networks, on the other hand, are connectionless and use the slots only when
they have data to send. Hence there is optimum usage of the available bandwidth.
Today, wireless communications are heavily biased toward voice, even though studies
indicate that growth in wireless data traffic is rising exponentially relative to demand
for voice traffic. Because an all IP core layer is easily scalable, it is ideally suited to
meet this challenge. The goal is a merged data/voice/multimedia network.
IMPLEMENTATION DIAGRAM OF 4G
4G TECHNOLOGY 2009
4G TECHNOLOGY 2009
6. Architectures in Prospects
6.1 End-to-end Service Architectures for 4G Mobile Systems:A characteristic of the transition towards 3G systems and beyond is that highly
integrated telecommunications service suppliers fail to provide effective economies of
scale. This is primarily due to deterioration of vertical integration scalability with
innovation speed up. Thus, the new rule for success in 4G telecommunications
markets will be to provide one part of the puzzle and to cooperate with other
suppliers to create the complete solutions that end customers require.
A direct consequence of these facts is that a radically new end-to-end service
architecture will emerge during the deployment of 3G mobile networks and will
became prominent as the operating model of choice for the Fourth Generation (4G)
Mobile Telecommunications Networks. This novel end-to-end service architecture is
inseparable from an equally radical transformation of the role of the
telecommunications network operator role in the new value chain of end service
provision. In fact, 4G systems will be organized not as monolithic structures deployed
by a single business entity, but rather as a dynamic confederation of multiple—
sometimes cooperating and sometimes competing—servi ce providers.
End-to-end service architectures should have the following desirable properties:
• Open service and resource allocation model.
• Open capability negotiation and pricing model .
• Trust management. Mechanisms for managing trust relationships among clients and
service providers, and between service providers, based on trusted third party
monitors.
• Collaborative service constellations.
• Service fault tolerance.
4G TECHNOLOGY 2009
6.2
Middleware Architecture:-
The service middleware is decomposed into three layers; i.e. user support layer,
service support layer and network support layer. The criterion for using a layered
approach is to reuse the existing subsystems in the traditional middleware. The
user support layer has autonomous agent aspects that traditional service
middleware lacks. It consists of 4 sub-systems:
‘Personalization’, ‘Adaptation’, ‘Community’ and ‘Coordination’, to provide
mechanisms for context awareness and support for communities and
coordination. Introduction of this functional layer enables the reduction of
unnecessary user interaction with the system and the provision of usercentric services realized by applying agent concepts, to support analysis
of the current context, personalization depending on the user’s situation, and
negotiation for service usage.
The middle layer, the service support layer, contains most functionality of
traditional middleware. The bottom layer, the network layer supports
connectivity for all-IP networks. The dynamic service delivery pattern defines a
powerful interaction model to negotiate the conditions of service delivery by
using three subsystems: ‘Discovery & Advertisement’, ‘Contract Notary’ and
‘Authentication & Authorization’.
6.3
Cellular
Multi-hop
Communications: Infrastructure-Based
Relay Network Architecture:-
It is clear that more fundamental enhancements are necessary for the very
ambitious throughput and coverage requirements of future networks.
Towards that end, in addition to advanced transmission techniques and antenna
technologies, some major modifications in the wireless network architecture
itself, which will enable effective distribution and collection of signals to and
from wireless users, are sought. The integration of “multi-hop” capability into
the conventional wireless networks is perhaps the most promising architectural
upgrade.
In a Multi-hop network, a signal from a source may reach its destination in
multiple hops (whenever necessary) through the use of “relays”. Since we are
here concerned with infrastructure-based networks, either the source or
destination is a common point in the network.
Base station (or, access point, in the context of WLANs).The potential
advantage of relaying is that it allows substituting a poor-quality (due to high
path loss) single-hop wireless link with a composite, two- or more hop,
better-quality link whenever possible. Relaying is not only efficient in
eliminating black spots throughout the coverage region, but more importantly, it
may extend the high data rate coverage range of a single BS; therefore
cost-effective high data rate coverage may be possible through the
augmentation of the relaying capability in conventional cellular networks.
4G TECHNOLOGY 2009
Advantages:• Property owners can install their own access points.
– Spreads infrastructure cost.
• Reduced network access operational cost.
– Backbone access through wireless.
– Wired access through DSL at aggregation points.
• Ad hoc-like characteristics:
– Access points configure into access network.
– Some access points may be moving (bus, train).
• Multi-hop also could reduce costs in heterogeneous 3G networks.
– 802.11 to GPRS for example.
Fig.: - Example of Heterogeneous Network Multihop Architecture
4G TECHNOLOGY 2009
6.4 Overlay network:In this architecture, a user accesses an overlay network consisting of several
universal access points. These UAPs in turn select a wireless network
based on availability, QoS specifications, and user defined choices. A UAP
performs protocol and frequency translation, content adaptation, and QoS negotiationrenegotiation on behalf of users. The overlay network, rather than the user or device,
performs handoffs as the user moves from one UAP to another. A UAP stores user,
network, and device information, capabilities, and preferences. Because UAPs can keep
track of the various resources a caller uses, this architecture supports single billing and
subscription.
Figure1. Possible 4G wireless network architectures.
(a) A multimode device lets the user, device, or network initiate handoff between
networks without the need for network modification or interworking devices.
(b) An overlay network—consisting of several universal access points (UAPs)
that store user, network, and device information—performs a handoff as the user
moves from one UAP to another.
(c) A device capable of automatically switching between networks is possible if
wireless networks can support a common protocol to access a satellite-based
network and another protocol for terrestrial networks.
4G TECHNOLOGY 2009
Fig : -Overlay Networks
4G TECHNOLOGY 2009
7. A Basic Model for 4G Networks
QoS, security and mobility can be viewed as three different, indispensable aspects in
4G networks; however all are related to network nodes involving the controlling or the
processing of IP packets for end-to-end flows between an MN and the CN. I show in
this section how we view the 4G network infrastructure.
Two Planes: Functional Decomposition
Noting that an IP network element (such as a router) comprises of numerous functional
components that cooperate to provide such desired service (such as, mobility, QoS
and/or AAA – Authentication, Authorization and Accounting), we identify these
components in the SeaSoS architecture into two planes, namely the control plane and
the data plane. Fig. 5 illustrates this method of flexible functional composition in
4G networks. As we are mainly concerned with network elements effectively at the
network layer, we do not show a whole end-to-end communication picture through a
whole OSI or TCP/IP stack. The control plane performs control related actions
such as AAA, MIP registration, QoS signaling, installation/maintenance of
traffic selectors and security associations, etc., while the data plane is responsible for
data traffic behaviors (such as classification, scheduling and forwarding) for end-to-end
traffic flows. Some components located in the control plane interact, through
installing and maintaining certain control states for data plane, with data plane
components in some network elements, such as access routers (ARs), IntServ
nodes or DiffServ edge routers.
However, not all control plane components need to exist in all network elements, and
also not all network elements (e.g., AAA server) are involved with data plane
functionalities. I refer these cases as path-decoupled control and other cases as path
coupled control. We argue the separation and coordination of control plane and
data plane is critical for seamless mobility with QoS and security support in 4G
networks, with the reasons as follows. Per-flow or per-user level actions occur much
less frequent than per-packet actions, while per-packet actions are part of critical
forwarding behavior, which involves very few control actions
4G TECHNOLOGY 2009
(which are typically simply to read and enforce according the install state during forwarding
data). Actually, this separation concept is not new – routing protocols have the similar
abstraction together used with the traditional IP packet delivery, this abstraction is recently
being investigated in the IETF For CES working group. However, we emphasize the three
critical dimensions of future 4G networks: mobility, QoS and security, as well as other new
emerging or replacement components might appear, integrated into a unified framework
and allowing more extensibility for 4G networks design.
Fig.: - The decomposition of control plane and data plane
functionalities
4G TECHNOLOGY 2009
8.TRANSMISSION
An OFDM transmitter accepts data from an IP network, converting and encoding the
data prior to modulation. An IFFT inverse fast Fourier transform) transforms the OFDM
signal into an IF analog signal, which is sent to the RF transceiver. The receiver circuit
reconstructs the data by reversing this process. With orthogonal sub-carriers, the receiver can
separate and process each sub-carrier without interference from other sub-carriers. More
impervious to fading and multi-path delays than other wireless transmission techniques,
ODFM provides better link and communication quality.
4G TECHNOLOGY 2009
IP NETWORK
OFDM
MODULATION
TRANSMITTER
RF
TRANSMITTER
IFFT
DIAGRAM: OFDM MODULATION
4G TECHNOLOGY 2009
9. Wireless Technologies Used In 4G
1. OFDM
2. UWB
3. MILLIMETER WIRELESS
4. SMART ANTENNAS
5. LONG TERM POWER PREDICTION
6. SHEDULING AMONG USERS
7. ADAPTIVE MODULATION AND POWER CONTROL
4G TECHNOLOGY 2009
9.1 Orthogonal Frequency Division Multiplexing:
OFDM, a form of multi-carrier modulation, works by dividing the data stream
for transmission at a bandwidth B into N multiple and parallel bit 8streams,
spaced B/N apart. Each of the parallel bit streams has a much lower bit rate than
the original bit stream, but their summation can provide very high data rates. N
orthogonal sub-carriers modulate the parallel bit streams, which are then
summed prior to transmission.
An OFDM transmitter accepts data from an IP network, converting and
encoding the data prior to modulation. An IFFT (inverse fast Fourier transform)
transforms the OFDM signal into an IF analog signal, which is sent to the RF
transceiver. The receiver circuit reconstructs the data by reversing this process.
With orthogonal sub-carriers, the receiver can separate and process each subcarrier without interference from other sub-carriers. More impervious to fading
and multi-path delays than other wireless transmission techniques, ODFM
provides better link and communication quality.
Fig : :Orthogonal Frequency Division Multiplexing:
4G TECHNOLOGY 2009
OFDM BANDWIDTH DIVISION
4G TECHNOLOGY 2009
9.2 Error Correcting:
4G's error-correction will most likely use some type of concatenated
coding and
will provide multiple Quality of Service (QoS) levels. Forward error-correction
(FEC) coding adds redundancy to a transmitted message through encoding prior to
transmission. The advantages of concatenated coding (Viterbi/Reed-Solomon) over
convolution coding (Viterbi) are enhanced system performance through the
combining of two or more constituent codes (such as a Reed-Solomon and a
convolutional code) into one concatenated code. The combination can improve error
correction or combine error correction with error detection (useful, for example, for
implementing an Automatic Repeat Request if an error is found). FEC using
concatenated coding allows a communications system to send larger block sizes
while reducing bit-error rates.
4G TECHNOLOGY 2011
9.3 Millimeter Wireless:
Using the millimeter-wave band (above 20 GHz) for wireless service is
particularly interesting, due to the availability in this region of bandwidth
resources committed by the governments of some countries to unlicensed cellular
and other wireless applications. If deployed in a 4G system, millimeter wireless would
constitute only one of several frequency bands, with the 5 GHz band most likely
dominant.
FIG: MILLI-METER WIRELESS ANTENNA
9.4 Long Term Power Prediction:
Channels to different mobile users will fade independently. If the channel properties of
all users in a cell can be predicted a number of milliseconds ahead, then it would be
possible to distribute the transmission load among the users in an optimal way while
fulfilling certain specified constraints on throughput and delays. The channel timefrequency pattern will depend on the scattering environment and on the velocity of the
moving terminal.
In order to take the advantage the channel variability, we use OFDM
system with spacing between sub-carriers such that no interchannel interface occurs for
the worst case channel scenario (Low coherence bandwidth).A time-frequency grid
constituting of regions of one time slot and several subcarriers is used such that
the channel is fairly constant over each region. These time-frequency regions are then
allocated to the different users by a scheduling algorithm according to some criterion.
9.5 Scheduling among Users:
To optimize the system throughput, under specified QoS requirements and delay
constraints, scheduling will be used on different levels:
Among sectors:-In order to cope with co-channel interference among neighboring
sectors in adjacent cells, time slots are allocated according to the traffic load in each
31
4G TECHNOLOGY 2011
sector .Information on the traffic load is exchanged infrequently via an inquiry
procedure. In this way the interference can be minimized and higher capacity be
obtained.
After an inquiry to adjacent cells, the involved base stations determine the
allocation of slots to be used by each base station in each sector. The inquiry process
can also include synchronization information to align the transmission of packets at
different base stations to further enhance performance.
Among users:-Based on the time slot allocation obtained from inquiry process, the user
scheduler will distribute time-frequency regions among the users of each sector based
on their current channel predictions. Here different degrees of sophistication can be used
to achieve different transmission goals.
9.6 Adaptive modulation and power control:
In a fading environment and for a highly loaded system there will almost exist users
with good channel conditions. Regardless of the choice of criterion, which could be
either maximization of system throughput or equalization to user satisfaction, the
modulation format for the scheduled selected according to the predicted signal to
noise and interference ratio user is by using sufficiently small time-frequency bins
the channel can be made approximately constant within bins. We can thus use a flat
fading AWGN channel assumption. Furthermore since we have already determined
the time slot allocation, via the inquiry process among adjacent cells described above
we may use an aggressive power control scheme, while keeping the interference on
an acceptable level.
For every timeslot, the time-frequency bins in the grid represent separate channels.
For such channels the optimum rate and power allocation for maximizing the
throughput can be calculated under a total average power constraint. The
optimum strategy is to let one user, the one with best channel, transmit in each of the
parallel channels.
ISSUES:
The first issue deals with optimal choice of access technology, or how to be best
connected. Given that a user may be offered connectivity from more than one
technology at any one time, one has to consider how the terminal and an overlay
network choose the radio access technology suitable for services the user is
accessing.
There are several network technologies available today, which can be viewed as
complementary. For example, WLAN is best suited for high data rate indoor coverage.
GPRS or UMTS, on the other hand, are best suited formations wide coverage and can be
regarded as wide area networks, providing a higher degree of mobility. Thus a user of
the mobile terminal or the network needs to make the optimal choice of radio
access technology among all those available. A handover algorithm should both
32
4G TECHNOLOGY 2011
determine which network to connect to as well as when to perform a handover
between the different networks. Ideally, the handover algorithm would assure that the
best overall wireless link is chosen. The network selection strategy should
take into consideration the type of application being run by the user at the time
of handover. This ensures stability as well as optimal bandwidth for interactive and
background services.
The second issue regards the design of a mobility enabled IP networking
architecture, which contains the functionality to deal with mobility between access
technologies. This includes fast, seamless vertical (between heterogeneous
technologies) handovers (IP micro-mobility), quality of service (QoS), security and
accounting. Real-time applications in the future will require fast/seamless handovers for
smooth operation.
Mobility in IPv6 is not optimized to take advantage of specific mechanisms that
may be deployed in different administrative domains. Instead, IPv6 provides mobility in
a manner that resembles only simple portability.
To enhance Mobility in IPv6, ‘micro-mobility’ protocols (such as Hawaii [5], Cellular
IP [6] and Hierarchical Mobile IPv6 [7]) have been developed for seamless handovers
i.e. handover that result in minimal handover delay, minimal packet loss, and
minimal loss of communication state.
The third issue concerns the adaptation of multimedia transmission across 4G
networks. Indeed multimedia will be a main service feature of 4G networks, and
changing radio access networks may in particular result in drastic changes in the
network condition. Thus the framework for multimedia transmission must be
adaptive. In cellular networks such as UMTS, users compete for scarce and expensive
bandwidth.
Variable bit rate services provide a way to ensure service provisioning at
lower costs. In addition the radio environment has dynamics that renders it difficult to
provide a guaranteed network service. This requires that the services are adaptive and
robust against varying radio conditions.
High variations in the network Quality of Service (QoS) leads to significant
variations of the multimedia quality. The result could sometimes be unacceptable to the
users. Avoiding this requires choosing an adaptive encoding framework for multimedia
transmission. The network should signal QoS variations to allow the application to be
aware in real time of the network conditions. User interactions will help to ensure
personalized adaptation of the multimedia presentation.
33
4G TECHNOLOGY 2011
10. 4G Software
4G will likely become a unification of different wireless networks, including wireless
LAN technologies (e.g. IEEE 802.11), public cellular networks (2.5G, 3G), and even
personal area networks. Under this umbrella, 4G needs to support a wide range of
mobile devices that can roam across different types of networks (Cefriel ). These
devices would have to support different networks, meaning that one device would have
to have the capability of working on different networks. One solution to this “multinetwork functional device” is a software defined radio.
10.1
Software Defined Radio
A software defined radio is one that can be configured to any radio or frequency
standard through the use of software. For example, if one was a subscriber of Sprint and
moved into an area where Sprint did not have service, but Cingular did, the phone would
automatically switch from operating on a CDMA frequency to a TDMA frequency. In
addition, if a new standard were to be created, the phone would be able to support that
new standard with a simple software update. With current phones, this is impossible. A
software defined radio in the context of 4G would be able to work on different
broadband networks and would be able to transfer to another network seamlessly while
traveling outside of the user’s home network. A software defined radio’s best advantage
is its great flexibility to be programmed for emerging wireless standards. It can be
dynamically updated with new software without any changes in hardware and
infrastructure. Roaming can be an issue with different standards, but with a software
defined radio, users can just download the interface upon entering new territory, or the
software could just download automatically (Wang 2001). Of course, in order to be able
to download software at any location, the data must be formatted to some standard. This
is the job of the packet layer, which will split the data into small “packets.”
10.2
Packet Layer
The packet layer is a layer of abstraction that separates the data being transmitted from
the way that it is being transmitted. The Internet relies on packets to move files, pictures,
video, and other information over the same hardware. Without a packet layer, there
would need to be a separate connection on each computer for each type of information
and a separate network with separate routing equipment to move that information
around. Packets follow rules for how they are formatted; as long they follow these rules,
they can be any size and contain any kind of information, carrying this information from
any device on the network to another. Currently, there is little fault tolerance built into
cellular systems. If a little bit of the voice information is garbled or lost in a transfer
between locations, or if interference from other devices somehow affects the
transmission, there is nothing that can be done about it. Even though the loss is usually
negligible, it still can cause major problems with sensitive devices and can garble voice
information to a point where it is unintelligible. All of these problems contribute to a
low Quality of Service (QoS).
34
4G TECHNOLOGY 2011
10.3
Packets
Advantages
There are many advantages of packets and very few disadvantages. Packets are a proven
method to transfer information. Packets are:
More Secure Packets are inherently more secure for a variety of reasons:
• A predictable algorithm does not split packets — they can be of any size and contain
any amount of data. Packets can also travel across the network right after each other or
separated by packets from other devices; they can all take the same route over networks
or each take a different route.
• The data in packets can be encrypted using conventional data encryption methods.
There are many ways to encrypt data, including ROT-13, PGP, and RSA; the
information in a packet can be encoded using any one of them, because a packet doesn’t
care what kind of data it carries. Within the same packet, no matter how the data
segment is encrypted, the packet will still get from one place to the other in the same
way, only requiring that the receiving device know how to decrypt the data.
• There is no simple way to reconstruct data from packets without being the intended
recipient. Given that packets can take any route to their destination, it is usually hard to
piece them together without actually being at their intended destination. There are tools
to scan packets from networks; however, with the volume of packets that networks
receive and the volume of packets per each communication, it would take a large
amount of storage and processing power to effectively “sniff” a packet communication,
especially if the packets were encrypted.
More Flexible Current technologies require a direct path from one end of a
communication to the other. This limits flexibility of the current network; it is more like
a large number of direct communication paths than a network. When something happens
to the path in the current system, information is lost, or the connection is terminated (e.g.
a dropped call). Packets only require that there is an origin, a destination, and at least
one route between them. If something happens to one of the routes that a packet is using,
the routing equipment uses information in the packet to find out where it is supposed to
go and gives it an alternate route accordingly. Whether the problem with the network is
an outage or a slowdown, the combination of the data in the packet and the routing
equipment lead to the packet getting where it needs to go as quickly as possible.
More Reliable Packets know general things about the information they contain and can
be checked for errors at their destination. Error correction data is encoded in the last part
of the packet, so if the transmission garbles even one bit of the information, the
receiving device will know and ask for the data to be retransmitted. Packets are also
numbered so that if one goes missing, the device on the receiving end will know that
something has gone wrong and can request that the packet(s) in question be sent again.
In addition, when something does go wrong, the rest of the packets will find a way
around the problem, requiring that only the few lost during the actual instant of the
problem will need to be resent.
Proven Technology Packets are the underlying technology in essentially all data based
35
4G TECHNOLOGY 2011
communication. Since the beginning of the Internet over 30 years ago, packets have
been used for all data transmission. Technologies have evolved to ensure an almost
100% QoS for packet transmission across a network.
Easier to Standardize Current technologies use a variety of methods to break up voice
communication into pieces. None of these are compatible with each other. Packets,
however, are extremely compatible with various devices. They can carry different types
of information and be different sizes, but still have the same basic makeup to travel over
any network using any of the methods of transmission. Essentially, this enables different
technologies to be used to handle the same fundamental information
(Howstuffworks.com ). An example of the format of a packet carrying 896 bits of actual
information can be seen in Figure 9: The “Protocol” section would contain whatever
information was needed to explain what type of data was encoded; in the case of voice
using Voice over IP (VoIP), it would read: H.323 (Protocols.com ).
Extensible As shown by the growth of the Internet over the past few years, the capacity
of packets is expandable. They have moved from carrying short text messages to
carrying video, audio, and other huge types of data. As long as the capacity of the
transmitter is large enough, a packet can carry any size of information, or a large number
of packets can be sent carrying information cut up into little pieces. As long as a packet
obeys the standard for how to start and end, any data of any size can be encoded inside
of it; the transmission hardware will not know the difference.
Figure: Packet with 896-bit payload
Disadvantages
Unfortunately, to use packet, all cellular hardware will need to be upgraded or replaced.
Consumers will be required to purchase new phones, and providers will need to install
new equipment in towers. Essentially, the communication system will need to be rebuilt
from the ground up, running off of data packets instead of voice information. However,
given the current pace of technological development, most consumers buy new phones
every six to twelve months, and providers are constantly rolling out new equipment to
either meet expanding demand or to provide new or high-end services. All networks will
be compatible once the switch is completed, eliminating roaming and areas where only
36
4G TECHNOLOGY 2011
one type of phone is supported. Because of this natural pace of hardware replacement, a
mandated upgrade in a reasonable timeframe should not incur undue additional costs on
cellular companies or consumers. The technological disadvantage of using packets is not
really a disadvantage, but more of an obstacle to overcome. As the voice and data
networks are merged, there will suddenly be millions of new devices on the data
network. This will require either rethinking the address space for the entire Internet or
using separate address spaces for the wireless and existing networks.
10.4
Implementation of Packets
Current System: IPv4
Currently, the Internet uses the Internet Protocol version 4 (IPv4) to locate devices. IPv4
uses an address in the format of xxx.xxx.xxx.xxx where each set of three digits can
range from 0 to 255 (e.g 130.207.44.251). Though combinations are reserved, but this
address format allows for approximately 4.2 billion unique addresses. Almost all IP
addresses using IPv4 have been assigned, and given the number of new devices being
connected to the Internet every day, space is running out. As people begin to connect
refrigerators, cars, and phones to the Internet, a larger address space will be needed.
Recommended System: IPv6
The next generation addressing system uses the Internet Protocol version 6 (IPv6) to
locate devices. IPv6 has a much larger address space. Its addresses take the form
x:x:x:x:x:x:x:x where each x is the hexadecimal value that makes up one eighth of the
address. An example of this is: FEDC:BA98:7654:3210:FEDC:BA98:7654:3210 (The
Internet Engineering Task Force Network Working Group ). Using this address format,
there is room for approximately 3.40 _ 1038 unique addresses. This is approximately
8.05 _ 1028 times as large as the IPv4 address space and should have room for all wired
and wireless devices, as well as room for all of the foreseeable expansion in several
lifetimes. There are enough addresses for every phone to have a unique address. Thus,
phone in the future can use VoIP over the Internet instead of continuing to use their
existing network.
Voice over IP (VoIP)
Voice over IP is the current standard for voice communication over data networks.
Several standards already exist for VoIP, the primary one being International
Multimedia Telecommunications Consortium standard H.323. VoIP is already in use in
many offices to replace PBX-based systems and by several companies that offer cheap
long distance phone calls over the Internet, such as Net2Phone and Go2Call. VoIP
allows for flexibility the same way that data packets do; as far as the network is
concerned, VoIP packets are the same as any other packet. They can travel over any
equipment that supports packet-based communication and they receive all of the error
correction and other benefits that packets receive. There are many interconnects between
the data Internet and the phone network, so not only can VoIP customers communicate
with each other, they can also communicate with users of the old telephone system.
One other thing that VoIP allows is slow transition from direct, connection based
communication to VoIP communication. Backbones can be replaced, allowing old-style
37
4G TECHNOLOGY 2011
telephone users to connect to their central office (CO) the same way. However, the CO
will then connect to an IPv6 Internet backbone, which will then connect to the
destination CO. To the end user, there will not seem to be any difference, but the
communication will occur primarily over a packet-based system, yielding all of the
benefits of packets, outside of the short connections between either end of the
communication and their CO. Of course, in order to keep curious users from listening in
by “sniffing,” all data, including voice, should be encrypted while in transit.
Encryption
Two encryption/decryption techniques are commonly used: asymmetric and symmetric
encryption. Symmetric encryption is the more traditional form, where both sides agree
on a system of encrypting and decrypting messages — the reverse of the encryption
algorithm is the decryption algorithm. Modern symmetric encryption algorithms are
generic and use a key to vary the algorithm. Thus, two sides can settle on a specific key
to use for their communications. The problem then is the key transportation problem:
How do both sides get the key without a third party intercepting it? If an unauthorized
user receives the key, then he too can decrypt the messages. The solution to this problem
is asymmetric encryption. In symmetric encryption, the encryption and decryption
algorithms are inverses, but the key is the same. In asymmetric encryption, the keys are
inverses, but the algorithm is the same. The trick is that one cannot infer the value of one
key by using the other. In an asymmetric (also called publickey) system, an end user
makes one key public and keeps the other private. Then all parties know the algorithm
and the public key. If any party wishes to communicate with the users, that party can
encrypt the message using the public key, and only the user (with her private key) can
decrypt the message. Moreover, the user can prove that she generated a message by
encrypting it with her private key. If the encrypted message makes sense to other parties
when decrypted with the public key, then those parties know that the user must have
generated that message (Dankers, Garefalakis, Schaffelhofer, and Wright 2002, 181).
Situations exist in cellular wireless systems where either symmetric or asymmetric keys
are particularly useful. Asymmetric keys are useful for one-time connections, especially
when used to create a symmetric key for an extended connection. Meanwhile,
symmetric keys are smaller and faster, and thus are strongly preferred if key
transportation is not a problem. An excellent example of this is the GSM system’s
subscriber information card placed into each phone. The card holds a unique symmetric
key for each subscriber.
Flexibility
In reality, however, the usage of different encryption schemes depends on many factors,
including network data flow design. Thus, it is important that the encryption method be
able to change when other determining factors change. Al-Muhtadi, Mickunas, and
Campbell of University of Illinois at Urbana-Champaign showed great foresight in
admitting that “existing security schemes in 2G and 3G systems are inadequate, since
there is greater demand to provide a more flexible, reconfigurable, and scalable security
mechanism as fast as mobile hosts are evolving into full-fledged IP-enabled devices”
(Al-Muhtadi, Mickunas, and Campbell 2002, 60). Unfortunately, IPv6 can only protect
data in transmission. Individual applications may contain flaws in the processing of data,
thereby opening security holes. These holes may be remotely exploited, allowing the
38
4G TECHNOLOGY 2011
security of the entire mobile device to be compromised. Thus, any wireless device
should provide a process for updating the application software as security holes are
discovered and fixed.
Anti-Virus
As wireless devices become more powerful, they will begin to exhibit the same security
weaknesses as any other computer. For example, wireless devices may fall victim to
trojans or become corrupt with viruses. Therefore, any new wireless handheld device
should incorporate antivirus software. This software should scan all e-mail and files
entering through any port (e.g. Internet, beaming, or synchronizing), prompting the user
to remove suspicious software in the process. The antivirus software should also allow
secure, remote updates of the scanning software in order to keep up with the latest
viruses (NIST, U.S. Dept. of Commerce , 5-34).
39
4G TECHNOLOGY 2011
11. 4G Hardware
11.1
Ultra Wide Band Networks
Ultra Wideband technology, or UWB, is an advanced transmission technology that can
be used in the implementation of a 4G network. The secret to UWB is that it is typically
detected as noise. This highly specific kind of noise does not cause interference with
current radio frequency devices, but can be decoded by another device that recognizes
UWB and can reassemble it back into a signal. Since the signal is disguised as noise, it
can use any part of the frequency spectrum, which means that it can use frequencies that
are currently in use by other radio frequency devices (Cravotta ). An Ultra Wideband
device works by emitting a series of short, low powered electrical pulses that are not
directed at one particular frequency but rather are spread across the entire spectrum
(Butcher ). As seen in Figure 6, Ultra Wideband uses a frequency of between 3.1 to 10.6
GHz. The pulse can be called “shaped noise” because it is not flat, but curves across the
spectrum. On the other hand, actual noise would look the same across a range of
frequencies — it has no shape. For this reason, regular noise that may have the same
frequency as the pulse itself does not cancel out the pulse. Interference would have to
spread across the spectrum uniformly to obscure the pulse.
Figure: Switched Beam Antenna
UWB provides greater bandwidth — as much as 60 megabits per second, which is 6
times faster than today’s wireless networks. It also uses significantly less power, since it
transmits pulses instead of a continuous signal. UWB uses all frequencies from high to
low, thereby passing through objects like the sea or layers of rock. Nevertheless,
because of the weakness of the UWB signal, special antennas are needed to tune and
aim the signal.
11.2
Smart Antennas
Multiple “smart antennas” can be employed to help find, tune, and turn up signal
information. Since the antennas can both “listen” and “talk,” a smart antenna can send
signals back in the same direction that they came from. This means that the antenna
40
4G TECHNOLOGY 2011
system cannot only hear many times louder, but can also respond more loudly and
directly as well (ArrayComm2003). There are two types of smart antennas: Switched
Beam Antennas (as seen in Figure 7) have fixed beams of transmission, and can switch
from one predefined beam to another when the user with the phone moves throughout
the sector Adaptive Array Antennas represent the most advanced smart antenna
approach to date using a variety of new signal processing algorithms to locate and track
the user, minimize interference, and maximize intended signal reception (ArrayComm
2003).
Smart antennas can thereby:
• Optimize available power
• Increase base station range and coverage
• Reuse available spectrum
• Increase bandwidth
• Lengthen battery life of wireless devices
Figure: Adaptive Array Antenna
Although UWB and smart antenna technology may play a large role in a 4G system,
advanced software will be needed to process data on both the sending and receiving
side. This software should be flexible, as the future wireless world will likely be a
heterogeneous mix of technologies.
41
4G TECHNOLOGY 2011
12. Limitations of 3G and drivers for 4G
From its basic conception to the time of roll-out took around ten years for 2G; a similar
period will apply to 3G, which will commence service in 2001/2 and reach full
deployment by 2005. Thus by 2010 it will be time to deploy 4G networks and, working
backwards with the ten year cycle, it is clear that the year 2000 is appropriate to start
with visions for 4G and a research programme aimed at the key issues. The Mobile
VCE’s second phase research programme has been constructed to meet this aim.
The starting point was to look at current trends. Here we see a phenomenal growth in
mobiles with an estimated global user base that will exceed one billion by 2003. Already
mobile communications exceed fixed communications in several countries and it is
foreseen that mobile communications will subsume fixed by 2010 (fixed—mobile
convergence will be complete). Currently short messaging is booming, especially among
the younger generation, with averages of upwards of 100 messages per month
dominating monthly bills. Business take-up of SMS via information services is also
increasing and providing a start for mobile e-commerce, but this is currently very much
limited by the bit rates available. This will be improved with the introduction of GPRS.
In Europe the WAP system (using Wireless Markup Language—WML) has been slow
to gain market ground; in contrast, in Japan NTT DoC0oMo’s ‘i-mode’ system had over
10 million subscribers by summer 2000 and is picking up 50000 new customers per day.
Customers are already browsing the Internet, exchanging e-mail, conducting banking
and stock transactions, making flight reservations and checking news and weather via
HTML- based (Hyper Text Markup Language) text information on their phones. Java is
expected to be available on i-mode phones soon, allowing the download of agents,
games etc. and the introduction of location-based services. In Japan, the number of net
phones has now passed the number of wired Internet customers and is setting the trend
that others will surely follow when 3G opens up more bandwidth and improved quality.
Thus 3G will provide a significant step in the evolution of mobile personal
communications. Mobility appears to be one of the fundamental elements in the
evolution of the information society. As service provision based on ‘network centric’
architectures gradually gives way to the ‘edge-centric’ architectures, access is needed
from more and more places at all times. But can 3G deliver?
It is true that 3G can support multimedia Internet-type services at improved speeds and
quality compared to 2G. The W-CDMA based air-interface has been designed to provide
improved high-capacity coverage for medium bit rates (384 kbit/s) and limited coverage
at up to 2Mbit/s (in indoor environments). Statistical multiplexing on the air also
improves the efficiency of packet mode transmission. However, there are limitations
with 3G as follows:
42
4G TECHNOLOGY 2011
•
Extension to higher data rates is difficult with CDMA due to excessive
interference between services.
•
It is difficult to provide a full range of multirate services, all with different QoS
and performance requirements due to the constraints imposed on the core network by the
air interface standard. For example, it is not a fully integrated system.
In addition, the bandwidth available in the 2GHz bands allocated for 3G will soon
become saturated and there are constraints on the combination of frequency and time
division duplex modes imposed by regulators to serve different environments efficiently.
By the year 2010, one of the key enabling technology developments will be embedded
radio—the widespread availability and use of the $1 radio chip, which will evolve from
short-range wireless developments such as Bluetooth. Embedded radio will eventually
become as common as embedded microprocessors are today, with perhaps 50 such
devices in the typical home, the user being mostly unaware of their presence. As they
interact, in response to the user arriving home for example, they will form a home area
network (HAN). Similarly, such devices will be present in large numbers in vehicles
(the vehicular area network, or VAN), in personal belongings (the personal area
network, or PAN), in the public environment, etc. Such chips will serve as a means of
short-range communication between objects and devices, offering capabilities for
monitoring and control, in most cases without the knowledge or intervention of the user.
As a person moves between these environments such short-range links will allow their
personal profiles and preferences to move with them, with the hotel room automatically
configuring itself to their personal preferred temperatures, TV channels/interests,
lighting etc. However, the integration of such links with wide-area mobile access will
enable far more powerful service concepts, as mobile agents access this pervasive
network of sensors and access information on the user’s behalf to perform and even preempt their needs and wishes.
In the 1G to 2G transition, as well as a transition from analogue to digital we saw a
mono-service to multi-service transition. From 2G to 3G, as well as a mono-media to
multimedia transition we are also seeing a transition from person-to-person to person-tomachine interactions, with users accessing video, Internet/intranet and database feeds.
The 3G to 4G transition, supported by such technologies, will see a transition towards a
pre-dominance of automated and autonomously initiated machine-to-machine
interactions.
Such developments will of course be accompanied by ongoing evolution of already
anticipated 3G services, such as:
•
send/receive e-mail
•
Internet browsing (information)
•
on-line transactions (e-business)
43
4G TECHNOLOGY 2011
•
location-dependent information
•
company database access
•
large-file transfer.
These services in themselves represent an increase in requirements for accessing
information, for business and commercial transactions, as well as for a raft of new
location-dependent information services, all including significantly higher bit-rate
requirements. There is a requirement for a mixture of unicast, multicast and broadcast
service delivery with dynamic variation between application services both spatially and
temporally. Above all, there is a demand for ease of user access and manipulation, with
minimal user involvement—complexity hidden from the user—and intelligence to learn
and adapt with use.
From the above it will be seen that 4G will need to be highly dynamic in terms of
support for:
•
the users’ traffic
•
air interfaces and terminal types
•
radio environments
•
quality-of-service types
•
mobility patterns.
4G, then, must itself be dynamic and adaptable in all aspects, with built-in intelligence.
Thus a ‘software system’ rather than a hard-and-fixed physical system is indicated.
Integration, needed to reflect the convergence issues already mentioned, is also a key to
4G, in particular integration of the radio access and the core network elements, which
must be designed as a whole rather than segmented as in the past. Key drivers to 4G will
be:
•
a multitude of diverse devices (distributed, embedded, wearable, pervasive)
•
predominance of machine-to-machine communications
•
location-dependent and e-business applications
•
the extension of IF protocols to mobility and range of QoS
•
privacy and security
•
dynamic networking and air-interfaces
•
improved coverage mechanisms
•
improved and dynamic spectrum usage.
44
4G TECHNOLOGY 2011
13. 4G visions mapping to research topics
The Mobile VCE vision for 2010 is embodied in the five key elements shown in Fig. 2
and detailed as follows:
•
Fully converged services: Personal communications, information systems,
broadcast and entertainment will have merged into a seamless pool of content available
according to the user’s requirement. The user will have access to a wider range of
services and applications, available conveniently, securely and in a manner reflecting the
user’s personal preferences.
•
Ubiquitous mobile access: The dominant mode of access to this pool of content
will be mobile, accounting for all voice communications, the majority of high-speed
information services, and a significant proportion of broadcast and entertainment
services. Mobile access to commercial and retail services will be the norm, replacing
current practices in most cases.
•
Diverse user devices: The user will be served by a wide variety of low-cost
mobile devices to access content conveniently and seamlessly. These devices will
commonly be wearable—in some cases disposable— and will normally be powered
independently of the mains. Devices will interact with users in a multi sensory manner,
encompassing not only speech, hearing and sight but also the other human senses, and
biological and environmental data pertinent to the application. Special devices tailored
for people with disabilities will be common place
•
Autonomous networks: Underlying these systems will be highly autonomous
adaptive networks capable of self-management of their structure to meet the changing
and evolving demands of users for both services and capacity. Efficient and costeffective use of the radio spectrum will be an essential element of their operation, and
here, too, autonomy and self- management will be the norm.
•
Software dependency: Intelligent mobile agents will exist throughout the
networks and in user devices, and will act continually to simplify tasks and ensure
transparency to the user. These mobile agents will act at all levels, from managing an
individual user’s content preferences to organising and reconfiguring major elements of
networks.
45
4G TECHNOLOGY 2011
46
4G TECHNOLOGY 2011
14. Research challenges
Analysis of the underlying technical challenges raised by the above vision and its five
elements has produced three research areas: Networks and services, Software based
systems, Wireless access. These form the basis of the Mobile VCE Phase 2 research
programme.
Networks and services
The aim of 3G is ‘to provide multimedia multirate mobile communications anytime and
anywhere’, though this aim can only be partially met. It will be uneconomic to meet this
requirement with cellular mobile radio only. 4G will extend the scenario to an all-IP
network (access + core) that integrates broadcast, cellular, cordless, WLAN (wireless
local area network), short-range systems and fixed wire. The vision is of integration
across these network—air interfaces and of a variety of radio environments on a
common, flexible and expandable platform — a ‘network of networks’ with distinctive
radio access connected to a seamless IP-based core network a (Fig. 3).
The functions contained in this vision will be:


a connection layer between the radio access and the IP core including mobility
management
internetworking between access schemes — inter and intra system, handover,
QoS negotiations, security and mobility
47
4G TECHNOLOGY 2011

ability to interface with a range of new and existing radio interfaces
A vertical view of this 4G vision (Fig. 4) shows the layered structure of hierarchical
cells that facilitates optimisation for different applications and in different radio
environments. In this depiction we need to provide global roaming across all layers.
Both vertical and horizontal handover between different access schemes will be
available to provide seamless service and quality of service.
Network reconfigurability is a means of achieving the above scenario. This encompasses
terminal reconfigurability, which enables the terminal to roam across the different air
interfaces by exchanging configuration software (derived from the software radio
concept). It also provides dynamic service flexibility and trading of access across the
different networks by dynamically optimising the network nodes in the end-to- end
connection. This involves reconfiguration of protocol stacks, programmability of
network nodes and reconfigurability of base stations and terminals.
The requirement is for a distributed reconfiguration control. Fig. 5 demonstrates both
internal node and external network reconfigurability.
48
4G TECHNOLOGY 2011
For internal reconfiguration the functionality of the network nodes must be controlled
before, during and after reconfiguration and compliance to transmission standards and
regulations must be facilitated.
External reconfiguration management is required to monitor traffic, to ensure that the
means for transport between terminals and network gateways (or other end points) are
synchronised (e.g. by conforming to standards) and to ensure that the databases/content
servers needed for downloadable reconfiguration software are provided.
The research challenges are to provide mechanisms to implement internal and external
configuration, to define and identify application programming interfaces (APIs) and to
design mechanisms to ensure that reconfigured network nodes comply with regulatory
standards.
An example of evolved system architectures is a combination of ad hoc and cellular
topologies. A ‘mobile ad hoc network’ (MANET) is an autonomous system of mobile
routers (and connected hosts) connected by wireless links. The routing and hosts are free
to move randomly and organise themselves arbitrarily; thus the network wireless
topology can change rapidly. Such a network can exist in a stand-alone form or be
connected to a larger internet.
49
4G TECHNOLOGY 2011
In the current cellular systems, which are based on a star-topology, if the base stations
are also considered to be mobile nodes the result becomes a ‘network of mobile nodes’
in which a base station acts as a gateway providing a bridge between two remote ad hoc
networks or as a gateway to the fixed network. This architecture of hybrid star and ad
hoc networks has many benefits; for example it allows self-reconfiguration and
adaptability to highly variable mobile characteristics (e.g. channel conditions, traffic
distribution variations, load-balancing) and it helps to minimise inaccuracies in
estimating the location of mobiles.
Together with the benefits there are also some new challenges, which mainly reside in
the unpredictability of the network topology due to mobility of the nodes; this
unpredictability, coupled with the local-broadcast capability, provides new challenges in
designing a communication system on top of an ad hoc wireless network. The following
will be required:



distributed MAC (medium access control) and dynamic routing support
wireless service location protocols
wireless dynamic host configuration protocols
50
4G TECHNOLOGY 2011

distributed LAC and QoS-based routing schemes.
In mobile IP networks we cannot provide absolute quality-of-service guarantees, but
various levels of quality can be ‘guaranteed’ at a cost to other resources. As the
complexity of the networks and the range of the services increase there is a trade-off
between resource management costs and quality of service that needs to be optimised.
The whole issue of resource management in a mobile IP network is a complex trade-off
of signaling, scalability, delay and offered QoS.
As already mentioned, in 4G we will encounter a whole range of new multirate services,
whose traffic models in isolation and in mixed mode need to be further examined. It is
likely that aggregate models will not be sufficient for the design and dynamic control of
such networks. The effects of traffic scheduling, MAC and CAC (connection admission
control) and mobility will be required to devise the dimensioning tools needed to design
4G networks.
51
4G TECHNOLOGY 2011
15. MOBILITY MANAGEMENT
Features of mobility management in Ipv6:
-bit address space provides a sufficiently large number of addresses
-time audio and video transmission, short/ busty
connections of web applications, peer-to-peer applications, etc.
f processing – no header checksum at each relay,
fragmentation only at endpoints.
in its Care-of Address.
52
4G TECHNOLOGY 2011
16. Quality of Service (QoS):The Internet provides users with diverse and essential quality of service
(QoS), particularly given the increasing demand for a wide spectrum of network
services.
Many services, previously only provided by traditional circuit-switched networks,
can now be provided on the Internet. These services, depending on their inherent
characteristics, require certain degrees of QoS guarantees. Many technologies are
therefore being developed to enhance the QoS capability of IP networks. Among these
technologies, differentiated services (DiffServ) and MPLS are paving the way for
tomorrow’s QoS services portfolio.
DiffServ is based on a simple model where traffic entering a network is
classified, policed, and possibly conditioned at the edges of the network, and assigned
to different behavior aggregates. Each behavior aggregate is identified by a single DS
code point (DSCP). At the core of the network, packets are fast forwarded according to
the per-hop behavior (PHB) associated with the DSCP. By assigning traffic of
different classes to different DSCPs, the DiffServ network provides different
forwarding treatments and thus different levels of QoS.
MPLS integrates the label swapping forwarding paradigm with network layer
routing. First, an explicit path, called a label switched path (LSP), is determined, and
established using a signaling protocol. A label in the packet header, rather than the
IP destination address, is then used for making forwarding decisions in the network.
Routers that support MPLS are called label switched routers (LSRs). The labels can be
assigned to represent routes of various granularities, ranging from as coarse as the
destination network down to the level of each single flow.
Moreover, numerous traffic engineering functions have been effectively achieved
by MPLS. When MPLS is combined with DiffServ and constraint-based routing, they
become powerful and complementary abstractions for QoS provisioning in IP backbone
networks. Supporting QoS in 4G networks will be a major challenge due to varying
bitrates, channel characteristics, bandwidth allocation, fault-tolerance levels, and
handoff support among heterogeneous wireless networks. QoS support can occur at
the packet, transaction, circuit, user, and network levels
• Packet-level QoS applies to jitter, throughput, and error rate. Network resources such
as buffer space and access protocol are likely influences.
• Transaction-level QoS describes both the time it takes to complete a transaction and
the packet loss rate. Certain transactions may be time sensitive, while others cannot
tolerate any packet loss.
• Circuit-level QoS includes call blocking for new as well as existing calls. It
depends primarily on a network’s ability to establish and maintain the end-to-end
circuit. Call routing and location management are two important circuit-level attributes.
• User-level QoS depends on user mobility and application type. The new location
may not support the minimum QoS needed, even with adaptive applications. In a
complete wireless solution, the end-to-end communication between two users will
53
4G TECHNOLOGY 2011
likely involve multiple wireless networks. Because QoS will vary across different
networks, the QoS for such users will likely be the minimum level these networks
support.
54
4G TECHNOLOGY 2011
17. Security
Security in 4G networks mainly involves authentication, confidentiality, integrity, and
authorization for the access of network connectivity and QoS resources for the
MN’s flows.
Firstly, the MN needs to prove authorization and authenticate itself while
roaming to a new provider’s network. AAA protocols (such as Radius,
COPS or Diameter [10]) provide a framework for such support especially for
control plane functions (including key establishment between the MN and AR,
authenticating the MN with AAA server(s), and installing security policies in the
MN or ARs’ data plane such as encryption, encryption, and filtering), but they are not
well suited for mobility scenarios.
There needs to an efficient, scalable approach to address this. The
Extensible Authentication Protocol (EAP) [6], a recently developed IETF protocol,
provides a flexible framework for extensible network access authentication and
potentially could be useful.
Secondly, when QoS is concerned, QoS requests needs to be integrity-protected, and
moreover, before allocating QoS resources for an MN’s flow, authorization needs to be
performed to avoid denial of service attacks. This requires a hop-by-hop way of
dynamic key establishment between QoS-aware entities to be signaled on. Finally, most
security concerns in this paper lie in network layer functions: although security can also
be provided by higher layers above the network layer.
55
4G TECHNOLOGY 2011
18. Advantages:• Property owners can install their own access points.
– Spreads infrastructure cost.
• Reduced network access operational cost.
– Backbone access through wireless.
– Wired access through DSL at aggregation points.
• Ad hoc-like characteristics:
– Access points configure into access network.
– Some access points may be moving (bus, train).
• Multi-hop also could reduce costs in heterogeneous 3G networks.
– 802.11 to GPRS for example.
Fig.: - Example of Heterogeneous Network Multihop Architecture
56
4G TECHNOLOGY 2011
19. Applications
1) Application to Admission Control in Cellular Packet Networks:Based on the developing trends of mobile communication, 4G will have
broader bandwidth, higher data rate, and smoother and quicker handoff and
will focus on ensuring seamless service across a multitude of wireless
systems and networks. The key concept is integrating the 4G capabilities with
all of the existing mobile technologies through advanced technologies.
Application adaptability and being highly dynamic are the main features of
4G services of interest to users.
Emerging wireless technologies such as 4G tend to be packet-switched rather
than circuit-switched because the packet-based architecture allows for
better
sharing
of
limited wireless resources. In a packet network,
connections (packet flows) do not require dedicated circuits for the entire
duration of the connection. Unfortunately, this enhanced flexibility makes it more
difficult to effectively control the admission of connections into the network.
2) 4G in normal life:2.1 Traffic Control:Beijing is a challenging city for drivers, with or without an Olympics going
on. The growing middle class, and their new-found ability to purchase
automobiles, is increasing the number of passenger vehicles on the road at a
staggering annual rate of 30%. 4G networks can connect traffic control boxes to
intelligent transportation management systems wirelessly. This would create a
traffic grid that could change light cycle times on demand, e.g., keeping
some lights green longer temporarily to improve traffic flow. It also could
make vehicle-based on-demand “all green” routes for emergency vehicles re
sponding to traffic accidents, reducing the likelihood that those vehicles will
themselves be involved in an accident en route.
Using fiber to backhaul cameras means that the intelligence collected flows
one way: from the camera to the command center. Using a 4G network, those
images can also be sent from the command center back out to the streets.
Ambulances and fire trucks facing congestion can query various cameras to
choose an alternate route. Police, stuck in traffic on major thoroughfares,
can look ahead and make a decision as to whether it would be faster to stay on the
main roads or exit to the side roads.
2.2 Sensors on Public Vehicles:Putting a chemical-biological-nuclear (CBN)
warning sensor on
every
government-owned vehicle instantly creates a mobile fleet that is the equivalent of
an army of highly trained dogs. As these vehicles go about their daily duties
of law enforcement, garbage collection, sewage and water maintenance, etc.,
municipalities get the added benefit of early detection of CBN agents. The
57
4G TECHNOLOGY 2011
sensors on the vehicles can talk to fixed devices mounted on light poles
throughout the area, so positive detection can be reported in real time. And since
4G networks can include inherent geo-location without GPS, first responders will
know where the vehicle is when it detects a CBN agent.
3) Security:Beijing has already deployed cameras throughout the city and sends those images
back to a central command center for the OLYMPIC games2008. This is generally
done using fiber, which limits where the cameras can be hung, i.e., no fiber,
no camera. 4G networks allow Beijing to deploy cameras and backhaul them
wirelessly. And instead of having to backhaul every camera, cities can backhaul
every third or fifth or tenth camera, using the other cameras as router/repeaters.
58
4G TECHNOLOGY 2011
20. Conclusion
As the history of mobile communications shows, attempts have been made to
reduce a number of technologies to a single global standard. Projected 4G systems
offer this promise of a standard that can be embraced worldwide through its key
concept of integration. Future wireless networks will need to support diverse IP
multimedia applications to allow sharing of resources among multiple users. There
must be a low complexity of implementation and an efficient means of negotiation
between the end users and the wireless infrastructure. The fourth generation promises
to fulfill the goal of PCC (personal computing and communication)—a vision
that affordably provides high data rates everywhere over a wireless network.
Although 4G wireless technology offers higher bit rates and the ability to roam across
multiple heterogeneous wireless networks, several issues require further research and
development. It is not clear if existing 1G and 2G providers would upgrade to 3G or
wait for it to evolve into 4G, completely bypassing 3G. The answer probably lies in the
perceived demand for 3G and the ongoing improvement in 2G networks to meet user
demands until 4G arrives.
59
4G TECHNOLOGY 2011
21. References
1.”eMobility Technology Platform Whitepaper”edited by Didier Bourse (Motorola Labs) and
Rahim Tafazolli (University of Surrey, CCSR)
2.”Intuitive Guide to Principle of Communications” copyright 2004 Charan Langton
3.”Paper on 4g evolution” By Abhijit Hota
4. www.wikipedia.com
5. www.4g.co.uk
6. www.wiley.com
7. www.mobilecomms-technology.com
60