1 Wireless Basics

download 1 Wireless Basics

of 33

  • date post

    01-Jun-2018
  • Category

    Documents

  • view

    220
  • download

    0

Transcript of 1 Wireless Basics

  • 8/9/2019 1 Wireless Basics

    1/33

    1

    Lecture #1

    Networks andNetworks and Wireless NetworksWireless Networks

    Dr. Kun YangSchool of Comp. Sci. & Elec. Eng.

    1

    , ,

    Monday 16th March 2009

    Agenda

    Fundamentals of Computer NetworksBasics of Wireless Networks

    PHY: Wireless TransmissionMAC: Medium Access ControlCognitive Radio

    2

  • 8/9/2019 1 Wireless Basics

    2/33

    2

    A General Communication ModelCarries

    data

    Trans- Trans-

    Source System Destination System

    generatesdata to be

    transmitted

    Converts datainto transmittable

    signals

    Convertsreceived signal

    into data

    Takesincoming

    data

    missionSystem

    missionSystem

    Transmitter Receiver Destination

    3

    workstation modem modem server Public telephone

    Network

    Networking

    Point to point comm.not usually practical

    Devices are too far apartLarge set of deviceswould need impracticalnumber of connections

    Solution is acommunications

    4

  • 8/9/2019 1 Wireless Basics

    3/33

    3

    Transmission vs. Switching

    requires manytransmission links

    Centralised switch networkminimises transmission but

    5

    Trade off

    ISO OSI (Open SystemsInterconnection) Reference Model

    7 applicationapplication-specific protocolsA lication-

    3 network

    4 transport

    5 session

    6 presentationdata representation and encoding

    dialog and synchronisation

    message transfer (and maybe error control,flow control, connection management)

    network routing and addressing (and maybe

    End-to-end

    oriented End-to-endscope

    Globalscope

    6

    1 physical

    2 data linkdata link control (framing, datatransparency and maybe error control)

    mechanical, electrical and optical interface

    Hop-by-hop Localscope

  • 8/9/2019 1 Wireless Basics

    4/33

    4

    Layer Specific StandardsService definition

    (Functional descriptionfor internal use) Addressing (Service

    Access Point: SAP)

    Protocol Specification

    7

    (precise syntax andsemantics forinteroperability)

    What’s a protocol?

    A human protocol and a computer network protocol

    Hiya

    HeyGot theplace?

    TCP connectionreq

    TCP connectionresponse

    Get http://www.essex.ac.uk

    8

    time

  • 8/9/2019 1 Wireless Basics

    5/33

    5

    Protocols in OSI RM

    9

    The Full ISO OSI RM

    10

  • 8/9/2019 1 Wireless Basics

    6/33

    6

    Layering: Physical Communicationapplicationtransportnetwork

    data

    link physical

    applicationtransportnetwork

    link

    network link

    physical

    data

    11

    p ys ca app cat ontransportnetwork

    link physical

    The OSI Environment

    12

    At Source: each layer takes data from above,adds header information to create new dataunit, and then passes new data unit to layer

    below.

    At Destination : the oppositeoperation

  • 8/9/2019 1 Wireless Basics

    7/33

    7

    Addressing

    socket

    13Unicast – broadcast - multicast

    Network Structure

    Administrative boundariesAutonomous system (AS):

    intra-domain issuesBorderrouter

    internal policyrouting metric?Routing protocols: RIPv2,

    OSPFv2Interconnection of ASs:inter-domain issuesInterconnectivityinformation

    14

    Routing protocols: BGPService LevelAgreement/SpecificationBusiness Model

  • 8/9/2019 1 Wireless Basics

    8/33

    8

    Network Structure : another viewAccess network:

    With dedicated linksLow level of multiplexing

    core

    low volume of trafficISPsBroadband access: fixed, wireless

    Distribution network: (transit)interconnectivity at local levellow multiplexingmedium volume of trafficMetropolitan Area Network

    Core(backbone)

    metro

    15

    Core network – backbone:international/global interconnectivityhigh volume of traffichigh multiplexing

    Network edge: applications and hosts

    A packet passes through many networks!

    ISP: Internet Service Provider

    Tier 1 ISP NAP

    Tier-2 ISPTier-2 ISP

    localISPWireless

    ISPwireless

    ISP

    localISP Tier 3

    ISProut er

    16

    Tier 1 ISP Tier 1 ISP

    Tier-2 ISP Tier-2 ISP

    Tier-2 ISP

    localISP

    localISP

    localISP

    localISP

    mobilehosts

  • 8/9/2019 1 Wireless Basics

    9/33

    9

    Agenda

    Fundamentals of Computer NetworksBasics of Wireless Networks

    PHY: Wireless TransmissionMAC: Medium Access ControlCognitive Radio

    17

    Some slides here pay courtesy to J. Schiller, K.Guild & D. Hunter.

    Frequencies for communication

    1 Mm 10 km 100 m 1 m 10 mm 100 m 1 m

    optical transmissioncoax cabletwistedpair

    VLF = Very Low Frequency UHF = Ultra High FrequencyLF = Low Frequency SHF = Super High FrequencyMF = Medium Frequency EHF = Extra High FrequencyHF = High Frequency UV = Ultraviolet Light

    300 Hz 30 kHz 3 MHz 300 MHz 30 GHz

    3 THz

    300 THz

    visible lightVLF LF MF HF VHF UHF SHF EHF infrared UV

    18

    VHF = Very High Frequency

    Frequency and wave length: λ = c/fwave length λ , speed of light c ≅3x108m/s, frequency f

  • 8/9/2019 1 Wireless Basics

    10/33

    10

    Radio Frequency Spectrum

    19

    Frequencies for mobile communication

    VHF-/UHF-ranges for mobile radiosimple, small antenna for carsdeterministic ro a ation characteristics, reliable connections

    SHF and higher for directed radio links, satellitecommunication

    small antenna, focusinglarge bandwidth available

    Wireless LANs use frequencies in UHF to SHF spectrum

    20

    limitations due to absorption by water and oxygen molecules(resonance frequencies)

    • weather dependent fading, signal loss caused by heavy rainfall etc.

  • 8/9/2019 1 Wireless Basics

    11/33

    11

    Signal propagation ranges

    Transmission rangecommunication possible

    distance

    sender

    transmission

    detection

    low error rate

    Detection rangedetection of the signalpossibleno communicationpossible

    21

    interferenceInterference rangesignal may not bedetectedsignal adds to thebackground noise

    Receiving power proportional to 1/d²

    Signal propagation

    Propagation in free space always like light (straight line)Receiving power proportional to 1/d²d = distance between sender and receiver

    Receiving power additionally influenced byfading (frequency dependent)

    shadowingreflection at large obstaclesscattering at small obstaclesdiffraction at ed es

    22

    reflection scattering diffractionshadowing

  • 8/9/2019 1 Wireless Basics

    12/33

    12

    Signal can take many different paths between senderand receiver due to reflection, scattering, diffraction

    Multipath propagation

    signal at sender signal at receiver

    23

    interference with “neighbor” symbols, Inter SymbolInterference (ISI)

    The signal reaches a receiver directly and phase shifteddistorted signal depending on the phases of the different parts

    Modulation

    Digital modulationdigital data is translated into an analog signal (baseband)differences in s ectral efficienc ower efficienc robustness

    Analog modulationshifts center frequency of baseband signal up to the radio

    carrierMotivation

    smaller antennas (e.g., λ /4)Fre uenc Division Multi lexin

    24

    medium characteristics

    Basic schemesAmplitude Modulation (AM)Frequency Modulation (FM)Phase Modulation (PM)

  • 8/9/2019 1 Wireless Basics

    13/33

    13

    Goal: multiple useof a shared medium

    Multiplexing

    k2 k3 k4 k5 k6k1

    channels k i

    Multiplexing in 4 dimensionsspace (s i)time (t)

    s 2

    s 1 f

    t

    c

    f

    t

    c

    25

    code (c)

    s 3 f

    t

    Spread spectrum technology

    Problem of radio transmission: frequency dependentfading can wipe out narrow band signals for durationof the interferenceSolution: spread the narrow band signal into a broadband signal using a special code

    protection against narrow band interferenceinterference spread

    signal

    signal

    spread

    power power

    26

    protection against narrowband interference

    Side effects: coexistence of several signals withoutdynamic coordination

    receiver

    f f

  • 8/9/2019 1 Wireless Basics

    14/33

    14

    Signal vs. NoiseThe signals at the input of a receiver can be small (< 1uV).

    electronics is significant.

    A perfect receiver at room temperature would generate 4 x 10-21 W of noise per Hz of bandwidth.Noise power is proportional to absolute temperature, coolingthe receiver is nice.Real receivers generate 2 –8 times more noise power than this

    27

    in the active devices used to amplify the small signal.The receiver performance is characterised in terms ofsignal to noise ratio (SNR)

    Bit Error Rate (BER)

    The receiver is trying to determinethe sequence of bits that were sentby the transmitter.

    Bit Error Rate (BER)

    A low signal to noise ratio (SNR)means that there is a probabilitythat the wrong decision will be

    made.Bit error rate (BER) characterisesthe performance of a receiver.The relationship between bit error

    28

    rate and SNR depends on themodulation type.The signal to noise ratio neededfor a particular minimum BER istermed the power efficiency.

    SNR

  • 8/9/2019 1 Wireless Basics

    15/33

    15

    Payload Bit Error Rate

    The physicalradio layercannot

    eave oupper layers

    29

    support theselow errorrates.

    An Mechanism to Reduce BER: ARQ

    ARQ: Automatic Repeat ReQuest: to repeat data that contains errors.Terminal A sends a message to Terminal B.Terminal B receives the packet with one or more errors.Terminal B has the ability to detect that errors are present.Terminal B sends a message to Terminal A requesting re-transmission.

    Terminal A re-transmits the errored packet.The new packet is received successfully.

    ARQ is only applicable when the channel error rate is very low.If the probability of a bit error occurring in a packet is significant the

    30

    system will be overwhelmed by repeat requests and throughputcollapses.

    ARQ results in a throughput reduction even when there are no errors.Terminal A has to idle while it waits for a repeat request from Terminal B.

  • 8/9/2019 1 Wireless Basics

    16/33

    16

    Error DetectionEDC= Error Detection and Correction bits (redundancy)D = Data protected by error checking, may include header fields

    • Error detection not 100% reliable!• protocol may miss some errors, but rarely• larger EDC field yields better detection and correction

    31

    Parity Checking

    Single Bit Parity:Detect single bit errors

    Single Bit Parity

    If the sum of the bits in a packet is even, add an extra ‘0’ to the packet.If the sum of the bits in a packet is odd, add and extra ‘1’ to thepacket.This will only detect a single bit error, if two bits are in error then itwill fail.

    32

    Radio channels can give rise to bursts of errors.More complex error detection schemes are needed.

    Cyclic Redundancy Check (CRC) codes have become the standardway of solving the problem.

  • 8/9/2019 1 Wireless Basics

    17/33

    17

    Cyclic Redundancy Checkview data bits, D, as a binary numberchoose r+1 bit pattern (generator), G

    , , exactly divisible by G (modulo 2)receiver knows G, divides by G. If non-zero remainder:error detected!can detect all burst errors less than r+1 bits

    widely used in practice (ATM, HDCL)

    33

    CRC Example

    Want:

    D.2r XOR R = nG

    D.2r = nG XOR Requivalently:

    if we divide D .2r by G, weget remainder R

    34

    R = remainder[ ]D.2 rG

  • 8/9/2019 1 Wireless Basics

    18/33

    18

    Agenda

    Fundamentals of Computer NetworksBasics of Wireless Networks

    PHY: Wireless TransmissionMAC: Medium Access ControlCognitive Radio

    35

    Multiple Access Links

    Wireless is Broadcast in nature.

    36

    single shared broadcast channel but two or moresimultaneous transmissions by nodes interference

    only one node can send successfully at a time

  • 8/9/2019 1 Wireless Basics

    19/33

    19

    Multiple Access protocols

    channel, i.e., determine when a node can transmitCommunication about channel sharing must use channelitself!What to look for in multiple access protocols?

    37

    Ideal Multiple Access Protocol

    Broadcast channel of rate R bps1. When one node wants to transmit it can send at rate R. 2. When M nodes want to transmit, each can send at

    average rate R/M

    3. Fully decentralized:no special node to coordinate transmissionsno synchronization of clocks, slots

    38

    . mp e

  • 8/9/2019 1 Wireless Basics

    20/33

    20

    Medium Access Control (MAC)MAC is concerned with controlling each terminal’saccess to the radio resource.

    revent on o co s ons – oc ng.Fairness in allocating resource

    Quality of service (QoS): latency (delay), jitter, loss.Distinction between infrastructure networks and ad-hoc networks

    Infrastructure networks can have a centralised view of the

    39

    pro em• Each terminal can be allocated its resource• The infrastructure is responsible for solving the MAC problem

    Ad-hoc networks require distributed MAC• Each terminal has to be responsible for its own MAC

    Basic Wireless Network Types

    40

  • 8/9/2019 1 Wireless Basics

    21/33

    21

    MAC Protocols: a taxonomyThree broad classes:

    Channel Partitioning “ ”v e c anne n o sma er p eces me s o s, requency,

    code)allocate piece to node for exclusive use

    Random Accesschannel not divided, allow collisions“recover” from collisions

    “ ”

    41

    tightly coordinate shared access to avoid collisions

    Channel Allocation

    Fixed Channel AllocationCertain Channels are assigned to each cell.Easy to implement but problems when traffic load changes

    Borrowing Channel Allocation

    Neigbouring busy cells borrow channels from quiet onesThe borrowed channel may be being re-used in a neighbouringcell.

    Dynamic Channel Allocation

    42

    A brain dynamically allocates channels to cells depending ontheir loadWhere is the brain??

  • 8/9/2019 1 Wireless Basics

    22/33

    22

    Can we apply media access methods

    from fixed networks?Example CSMA/CD

    Carrier Sense Multiple Access with Collision Detection sen as soon as t e me um s ree, sten nto t e me um a

    collision occurs (original method in IEEE 802.3)

    Problems in wireless networkssignal strength decreases proportional to the square of thedistancethe sender would apply CS and CD, but the collisions happenat the receiver

    43

    it might be the case that a sender cannot “hear” the collision,i.e., CD does not workfurthermore, CS might not work if, e.g., a terminal is “hidden”

    Hidden terminalsA sends to B, C cannot receive AC wants to send to B, C senses a “free” medium (CS fails)

    Hidden and exposed terminals

    collision at B, A cannot receive the collision (CD fails)A is “hidden” for C

    Exposed terminalsB sends to A, C wants to send to another terminal (not A or B)

    B A C

    44

    C has to wait, CS signals a medium in usebut A is outside the radio range of C, therefore waiting is notnecessaryC is “exposed” to B

  • 8/9/2019 1 Wireless Basics

    23/33

    23

    Terminals A and B send, C receivessignal strength decreases proportional to the square of the distancethe signal of terminal B therefore drowns out A’s signal

    Near and far terminals

    canno rece ve

    If C for example was an arbiter for sending rights, terminal B A B C

    45

    Also severe problem for CDMA-networks where transmittersshare transmission frequencies and transmission time - precisepower control needed!

    Access methods SDMA/FDMA/TDMA

    SDMA (Space Division Multiple Access)segment space into sectors, use directed antennas

    FDMA (Frequency Division Multiple Access)

    assign a certain frequency to a transmission channel between a senderand a receiverpermanent (e.g., radio broadcast), slow hopping (e.g., GSM), fasthopping (FHSS, Frequency Hopping Spread Spectrum)

    TDMA (Time Division Multiple Access)assi n the fixed sendin fre uenc to a transmission channel between

    46

    a sender and a receiver for a certain amount of time

    The multiplexing schemes are now used to control medium access!

  • 8/9/2019 1 Wireless Basics

    24/33

    24

    An FDD/FDMA Example - GSM

    f 960 MHz

    1

    124

    20 MHz

    200 kHz935.2 MHz

    915 MHz

    47

    t

    1890.2 MHz

    A TDD/TDMA Example: DECT

    DECT: Digital Enhanced Cordless Telecommunications

    1 2 3 11 12 1 2 3 11 12

    tdownlink uplink

    417 µs

    48

  • 8/9/2019 1 Wireless Basics

    25/33

    25

    Mechanismrandom, distributed (no central arbiter), time-multiplexSlotted Aloha additionally uses time-slots, sending must always

    Aloha/slotted aloha

    s ar a s o oun ar esAloha

    Slotted Aloha

    sender A

    sender B

    sender C

    collision

    t

    49

    sender A

    sender B

    sender Ct

    DAMA - Demand Assigned Multiple Access

    Channel efficiency only 18% for Aloha, 36% for SlottedAloha (assuming Poisson distribution for packet arrivalan pac e engReservation can increase efficiency to 80%

    a sender reserves a future time-slotsending within this reserved time-slot is possible withoutcollisionreservation also causes higher delays

    50

    Examples for reservation algorithms:Explicit Reservation (Reservation-ALOHA)Implicit Reservation (PRMA: Packet Reservation MA)

  • 8/9/2019 1 Wireless Basics

    26/33

    26

    MACA - collision avoidanceMACA (Multiple Access with Collision Avoidance) uses shortsignaling packets for collision avoidance

    RTS re uest to send : a sender re uests the ri ht to send from areceiver with a short RTS packet before it sends a data packetCTS (clear to send): the receiver grants the right to send as soon as it isready to receive

    Signaling packets containsender addressreceiver addresspacket size

    51

    Variants of this method can be found in IEEE802.11 as DFWMAC(Distributed Foundation Wireless MAC)

    MACA avoids the problem of hidden terminalsA and C want tosend to B

    MACA examples: RTS/CTS

    A sends RTS firstC waits after receivingCTS from B

    MACA avoids the problem of exposed terminalsB wants to send to A, and C

    A B C

    RTS

    CTS(A)CTS (A)

    52

    wants to send to another terminalnow C does not haveto wait because it cannotreceive CTS from A

    A B C

    RTS

    CTSD

    RTS

    CTS

  • 8/9/2019 1 Wireless Basics

    27/33

    27

    Polling mechanismsIf one terminal can be heard by all others, this “central” terminal(a.k.a. base station) can poll all other terminals according to acertain schemeExample: Randomly Addressed Polling

    base station signals readiness to all mobile terminalsterminals ready to send can now transmit a random number withoutcollision with the help of CDMA or FDMA (the random number canbe seen as dynamic address)the base station now chooses one address for polling from the list ofall random numbers (collision if two terminals choose the same

    53

    a ressthe base station acknowledges correct packets and continues pollingthe next terminalthis cycle starts again after polling all terminals of the list

    Access method CDMA

    CDMA (Code Division Multiple Access)all terminals send on the same frequency probably at the same time andcan use the whole bandwidth of the transmission channeleach sender has a unique random number, the sender XORs the signalwith this random numberthe receiver can “tune” into this signal if it knows the pseudo randomnumber, tuning is done via a correlation function

    Disadvantages:higher complexity of a receiver (receiver cannot just listen into themedium and start receiving if there is a signal)all signals should have the same strength at a receiver

    54

    Advantages:all terminals can use the same frequency, no planning neededhuge code space (e.g. 2 32) compared to frequency spaceforward error correction and encryption can be easily integrated

  • 8/9/2019 1 Wireless Basics

    28/33

    28

    Appr oach SDMA TDMA FDMA CDMAIdea segment space into

    cells/sectorssegment sendingtime into disjointtime-slots, demanddriven or fixed

    segment thefrequency band intodisjoint sub-bands

    spread the spectrumusing orthogonal codes

    Comparison SDMA/TDMA/FDMA/CDMA

    patternsTerminals only one terminal can

    be active in onecell/one sector

    all terminals areactive for shortperiods of time onthe same frequency

    every terminal has itsown frequency,uninterrupted

    all terminals can be activeat the same place at thesame moment,uninterrupted

    Signalseparation

    cell structure, directedantennas

    synchronization inthe time domain

    filtering in thefrequency domain

    code plus specialreceivers

    Advantages very simple, increasescapacity per km²

    established, fullydigital, flexible

    simple, established,robust

    flexible, less frequencyplanning needed, softhandover

    - inflexible antennas uard s ace inflexible com lex receivers needs

    55

    -advantages

    ,

    typically fixed

    needed (multipathpropagation),synchronizationdifficult

    ,

    frequencies are ascarce resource

    ,

    more complicated power control for senders

    Comment only in combinationwith TDMA, FDMA or CDMA useful

    standard in fixednetworks, together with FDMA/SDMAused in manymobile networks

    typically combinedwith TDMA(frequency hoppingpatterns) and SDMA(frequency reuse)

    still faces some problems,higher complexity,lowered expectations; willbe integrated withTDMA/FDMA

    Source: IEEE Comm. Mag.

    Wireless vs. Wired

    Wireless transmissions are far less robust than wiredNoise

    • If the link is too long the noise is bigger than the signal.Interference

    • Our own, generated within the network• Other people using the radio spectrum

    MobilityWireless systems are inherently broadcast

    We may talk about point to point comm but the signals still goever where

    56

    We have to engineer a multiple access scheme so that all terminals canshare the available radio resource

    Radio spectrum is an expensive and scarce commodity ->cognitive radio ?The radio channel is challenging - particularly indoors -> femtocell?

  • 8/9/2019 1 Wireless Basics

    29/33

    29

    Agenda

    Fundamentals of Computer NetworksBasics of Wireless Networks

    PHY: Wireless TransmissionMAC: Medium Access ControlCognitive Radio

    57

    Pondering on Spectrum Usage

    The Ofcom Spectrum Vision

    Spectrum should be free of technology, policy andusage constraints as far as possible

    It should be simple and transparent for licenceholders to change the ownership and use ofspectrum

    58

    and users should feel comfortable that they will notbe changed without good cause.

    Source: Ofcom

  • 8/9/2019 1 Wireless Basics

    30/33

    30

    Three possible ways of managing Spectrum

    Command & Control Zone Market Force Zone Licence-exempt Zone

    Authorities:(No variations allowed,

    for ~100 years!)

    Managedby:

    Companies

    94%Currentpercentage (UK)

    0% 6%

    Future

    nobody

    59

    Trend:

    The regulator cannot know asmuch as the market.

    Trading existingspectrum between users

    Key area for innovation but do we need more?

    What is Cognitive Radio?

    “… a radio that is aware of its surroundings and adaptsintelligently….” – Mitola 2000Primary users vs. secondary users

    60Source: Ofcom

  • 8/9/2019 1 Wireless Basics

    31/33

    31

    A Spectrum Usage Test (London)

    61Source: Ofcom

    Challenges of Cog. Radio

    EconomicsCost of CR devices over simpler delivery mechanism likely to be higherNon-real time services for CR not as valuableDepends on spectrum congestion and demand

    Hidden node / sharing issues

    Ensure CRs do not interfere with each otherMaking sure that they can exist with legacy users and other

    Cog. Radio devicesControlling CRs to ensure they have the same spectrum picture

    62

    How will groups of CRs know what’s going on?Devices need to be aware of regulatory constraints

    Security and malicious useThe flexibility of CRs enables illegal transmissionsAAA

  • 8/9/2019 1 Wireless Basics

    32/33

    32

    Where can I use Cog. Radio?

    licence-exempt (LE) bands: all right.and Licenced Bands!: not fair?! restricted to licensees?

    Non-time sensitive services, such as downloadingcould be most appropriate.But,

    63

    Broadband wireless servicesMultimedia wireless networking

    Conceptual Timeline (IEEE 1900)

    64

  • 8/9/2019 1 Wireless Basics

    33/33

    Contact, Q&A

    Dr Kun Yang Reader in Pervasive Networks & ServicesSchool of Comp. Science & Electronic Engineering (CSEE),University of Essex, Wivenhoe Park, Colchester,CO4 3SQ, UK

    Email: [email protected] : rivatewww.essex.ac.uk ~kun an

    65