Basics of Lower Layers: Dmitri A. Moltchanov E-Mail: Moltchan@cs - Tut.fi
Basics of Lower Layers: Dmitri A. Moltchanov E-Mail: Moltchan@cs - Tut.fi
Dmitri A. Moltchanov
E-mail: [email protected]
http://www.cs.tut.fi/kurssit/TLT-2616/
OUTLINE
Mobile ad hoc networks
Classification of wireless networks
The electromagnetic spectrum
Radio propagation
Modulation techniques
Two-way communications
Centralized multiple access schemes
Random multiple access schemes
Error control
Channel adaptation techniques
8
4
2
3
1
6
7
8
4
5
D-L
PHY
D-L
PHY
BAN
PAN
~1 m
~10 m
LAN
WAN
~500 m
WAN
>10 km
WBAN networks
what: BAN is the network consisting of wearable computers;
aim: is to provide the connectivity between wearable computers: headphones, displays, etc.
WPAN networks
what: PAN is a network in the environment around the person;
aim: PAN connects BAN devices to other mobile and stationary devices.
WLAN networks
what: usually, is a network of laptops;
aim: provide connectivity and Internet access in the high density areas.
WWAN/WMAN networks
what: is a network of arbitrary mobile devices;
aim: is to provide connectivity between remote mobile devices.
(1)
102
104
106
Ultraviolet
108
1010 1012 1014 1016 1018 1020 1022 1024 1026 1028
100
Radio
108
106
104
102
Wavelength (m)
Visible
Microwave
X-ray
Gamma ray
not usable:
- affect health
- difficult to modulate
- do not propagate through obstacles
Infrared waves:
cannot pass through obstacles;
relatively directional and inexpensive to implement;
used in short range communications.
Visible light:
may provide very high bandwidth at a very low cost using optical laser signalling;
hard to focus a very narrow uni-directional laser;
cannot penetrate through rain and fog.
Allocation of waves:
electromagnetic spectrum is a common resource;
international agreements have been drawn to allocate it;
national agreements may override them;
note: remember military usage!
10
4. Radio propagation
Radio waves experience the following propagation mechanisms:
Reflection:
when: wave hits an objects which is very large compared to its wavelength;
result: phase shift of 180 degrees between the incident and the reflected rays.
Diffraction:
when: wave hits an object that is comparable to its wavelength;
result: wave bends at the edges of the object, propagating in different directions.
Scattering:
when: wave goes through a medium with objects that are small compared to its wavelength;
result: wave gets scattered into several weaker outgoing signals.
11
12
Historic aspects:
most are designed for applications in cellular networks;
some are applicable to other wireless networks (e.g. ad hoc, vehicular).
13
Classification:
analytical models:
capture path loss based on analytical representation of propagation phenomenons;
+: allows to get predictions very quickly;
: often too complicated;
: limited to the complexity of mathematics.
empirical model:
based on fitting empirical formulas to a set of statistical data;
+: implicitly include all propagation phenomenons;
: cannot be derived without measurements;
: always specific to those environment in which measurements have been carried out.
14
Figure 6: Illustration of the areas with different received local average signal strength.
Examples:
free-space propagation model;
two-ray ground reflection model.
See: T. Rappaport, Wireless communications, 2nd edition, Prentice Hall, 2002.
15
Figure 7: Attenuation due to distance and rapid fluctuations of the received signal strength.
16
I
,
p() = 2 exp
0
2 2
2
As A 0 the Rician distribution degenerates to Rayleigh one:
2
p() = 2 exp 2 , 0,
0,
(2)
(3)
17
Nakagami-m fading:
m
mm m1
exp
p() =
,
(E[])m (m)
E[]
0,
(4)
18
5. Modulation techniques
Modulation:
why: information cannot be transferred as is;
what: converting data into electromagnetic waves;
how: altering certain properties of the carrier wave.
Classification based on the nature of the data to be transmitted :
analog modulation techniques:
amplitude modulation;
frequency modulation;
phase modulation.
digital modulation techniques:
amplitude shift keying;
frequency shift keying;
phase shift keying.
19
20
21
22
23
24
A cos2f t, for 1,
c
c
s(t) =
0,
for 0.
(5)
25
(6)
26
A cos(2f t + ), for 1,
c
c
s(t) =
Ac cos2fc t,
for 0.
(7)
A
cos(2f
t
+
),
c
c
4
A cos(2f t + 3 ),
c
c
4
s(t) =
Ac cos(2fc t + 5
),
Ac cos(2fc t + 7
),
4
for 10,
for 11,
(8)
for 01,
for 00.
27
5.3. x-QAM
Characteristics:
BPSK, QPSK, 16-QAM, 64-QAM, 256-QAM, etc.
combines advantages of amplitude and phase keying.
28
6. Two-way communications
Two approaches:
Time division duplex: uplink and downlink on the same frequency;
Frequency division duplex: uplink and downlink on different frequencies.
downlink
uplink
downlink
uplink
FRAME
FRAME
FRAME
FRAME
time
frequency
29
30
F1
F2
Fn
Bandwidth (Hz)
31
...
...
TDMA frame
32
33
Basic techniques:
ALOHA and slotted ALOHA;
Carrier Sense Multiple Access (CSMA);
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA);
Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
32
8.1. ALOHA
Pure ALOHA
a terminal transmits whenever the user data is ready;
if the sender finds that the packet get collided:
it waits for a random period of time;
sends the packet again.
Throughput: low, depends on stations and traffic they generate.
Slotted ALOHA
time is slotted, length on the slot is the time to transmit a packet;
node starts transmission in the beginning of slots only;
if collision occurs:
sender waits for a random number of slots;
transmits packet again.
Throughput: higher than ALOHA but still low.
33
34
start of sensing
t
node 2
start of sensing
t
node 1
t
35
Non-persistent CSMA
This scheme was introduced to combat with the synchronization problem. It works as follows:
when the packet is ready for transmission the sender listens the channel;
if the channel is busy the sender goes in the waiting state for a randomly chosen time;
after this time the sender sense the channel again.
random waiting
node 3
node 2
start of sensing
start of sensing
random waiting
t
t
node 1
t
36
p-persistent CSMA
the channel is slotted;
transmission is a free channel is performed with probability p.
The scheme operates as:
when the packet is ready for transmission the sender listens the channel;
if the channel is busy the sender kepdf listen the channel until it finds the channel idle;
if the channel is idle:
the sender transmits the packet in this slot with probability p;
defers transmission to the next slot with probability q = 1 p.
p1>p
node 2
node 1
p1<p
p1<p
t
t
37
collision is detected
node 2
node 2
t
node 1
t
node 1
38
9. Error control
BER can be high (around 10E 4 10E 2):
using channel coding (adding additional bits;)
using protocols with retransmission.
We distinguish between following channel coding:
coding using error detecting codes:
cyclic redundancy check (CRC).
coding using error correcting codes:
block codes (BCH);
convolutional codes, turbo codes, etc.
Protocols with retransmissions:
stop-and-wait ARQ (SW-ARQ);
go-Back-N ARQ (GBN-ARQ);
selective-repeat ARQ (SR-ARQ).
39
40