SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Lecture #1



  Fundamentals on Computer
Networks and Wireless Networks
                Dr. Kun Yang
      School of Comp. Sci. & Elec. Eng.
     University of Essex, Colchester, UK
                   Essex Colchester

             Monday 16th March 2009

                                           1




                   Agenda


   Fundamentals of Computer Networks
   Basics of Wireless Networks
      PHY: Wireless Transmission
      MAC: Medium Access Control
      Cognitive Radio
   Q&A



                                           2




                                               1
A General Communication Model
          Source System                         Carries                    Destination System
                                                 data

Trans
Trans-                                       Trans
                                             Trans-
mission           Transmitter                mission            Receiver           Destination
System                                       System

 generates           Converts data                            Converts               Takes
 data to be        into transmittable                      received signal         incoming
transmitted              signals                              into data               data




 workstation        modem                                         modem             server
                                        Public telephone
                                            Network                                          3




                                Networking

  Point to point comm.
  not usually practical
      Devices are too far apart
      Large set of devices
      would need impractical
      number of connections
  Solution is a
  communications
  network




                                                                                             4




                                                                                                 2
Transmission vs. Switching




requires many                                  Centralised switch network
transmission links                             minimises transmission but
                                               requires complex switch


                                                               Trade off

                                                                                         5




           ISO OSI (Open Systems
      Interconnection) Reference Model

         application-specific protocols         7 application
                                                                    Application
                                                                    Application-
        data representation and encoding       6 presentation       oriented
                                                                                   End-to-end
                                                                                   scope
         dialog and synchronisation               5 session
                                                                    End-to-end
message transfer (and maybe error control,      4 transport
 flow control, connection management)
                                                                                   Global
network routing and addressing (and maybe                                          scope
                                                 3 network
         connection management)

     data link control (framing, data            2 data link        Hop-by-hop      Local
 transparency and maybe error control)                                              scope
mechanical, electrical and optical interface     1 physical


                                                                                         6




                                                                                                3
Layer Specific Standards

               Service definition
             (Functional description
                for internal use)      Addressing (Service
                                       Access Point: SAP)




                                                    Protocol Specification
                                                     (precise syntax and
                                                         semantics for
                                                       interoperability)




                                                                             7




             What’s a protocol?

A human protocol and a computer network protocol


     Hiya
                                         TCP connection
                                         req
     Hey
                                         TCP connection
   Got the                               response
   place?
                                         Get http://www.essex.ac.uk
    Room5
                                               <file>
                          time



                                                                             8




                                                                                 4
Protocols in OSI RM




                      9




The Full ISO OSI RM




                      10




                           5
Layering: Physical Communication
                       data
                 application
                  transport
                   network
                     link
                  physical
                                                network
                                                  link
                application
                                                physical
                 transport
                  network
                    link                                        data
                 physical
                   h i l                                   application
                                                               li i
                                                            transport
                                                             network
                                                               link
                                                            physical


                                                                              11




                  The OSI Environment




At Source: each layer takes data from above,   At Destination: the opposite
adds header information to create new data     operation
unit, and then passes new data unit to layer
below.                                                                        12




                                                                                   6
Addressing


                                        socket




Unicast – broadcast - multicast                13




                  Network Structure
Administrative boundaries
  Autonomous system (AS):             Border
     intra-domain issues              router
     internal policy
     routing metric?
     Routing protocols: RIPv2,
     OSPFv2
  Interconnection of ASs:
     inter-domain issues
     Interconnectivity
     information
     Routing protocols: BGP
  Service Level
  Agreement/Specification
  Business Model

                                               14




                                                    7
Network Structure : another view
         Access network:
             With dedicated links
             Low level of multiplexing
                                                                          Access
             low volume of traffic
             ISPs
             Broadband access: fixed, wireless                             metro
         Distribution network: (transit)
             interconnectivity at local level                              Core
                                                                            core
             low multiplexing                                           (backbone)
             medium volume of traffic
             Metropolitan Area Network
                   p
         Core network – backbone:
             international/global interconnectivity
             high volume of traffic
             high multiplexing
         Network edge: applications and hosts

                                                                                     15




     A packet passes through many networks!

     ISP: Internet Service Provider


               local
                ISP      Tier 3                       local
                                          Wireless           wireless
                          ISP                          ISP
router                                     ISP                 ISP
                        Tier-2 ISP                Tier-2 ISP

                                     Tier 1 ISP
                                                             NAP


     mobile            Tier 1 ISP                    Tier 1 ISP     Tier-2 ISP
      hosts                                                                  local
                  Tier-2 ISP                    Tier-2 ISP
                                                                              ISP
            local          local                   local
             ISP            ISP                     ISP
                                                                                     16




                                                                                          8
Agenda


            Fundamentals of Computer Networks
            Basics of Wireless Networks
                  PHY: Wireless Transmission
                  MAC: Medium Access Control
                  Cognitive Radio
            Q&A


Some slides here pay courtesy to J. Schiller, K.
   Guild & D. Hunter.
                                                                                                        17




             Frequencies for communication
twisted                  coax cable                                             optical transmission
pair


 1 Mm           10 km
                 0             100 m
                                00           1m        10 mm
                                                        0          100 μm          1 μm
300 Hz          30 kHz         3 MHz       300 MHz     30 GHz       3 THz         300 THz


          VLF        LF       MF      HF   VHF   UHF   SHF   EHF     infrared        visible light UV
          VLF = Very Low Frequency                         UHF = Ultra High Frequency
          LF = Low Frequency                               SHF = Super High Frequency
          MF = Medium Frequency                   EHF = Extra High Frequency
          HF = High Frequency                     UV = Ultraviolet Light
          VHF = Very High Frequency

          Frequency and wave length:      λ = c/f
          wave length λ, speed of light c ≅ 3x108m/s, frequency f

                                                                                                        18




                                                                                                             9
Radio Frequency Spectrum




                                                                            19




Frequencies for mobile communication
VHF-/UHF-ranges for mobile radio
   simple, small antenna for cars
   deterministic propagation characteristics, reliable connections
                 p p g                      ,
SHF and higher for directed radio links, satellite
communication
   small antenna, focusing
   large bandwidth available
Wireless LANs use frequencies in UHF to SHF spectrum
   some systems planned up to EHF
   limitations due to absorption by water and oxygen molecules
   (resonance frequencies)
    • weather dependent fading, signal loss caused by heavy rainfall etc.


                                                                            20




                                                                                 10
Signal propagation ranges

 Transmission range
                    p
     communication possible
     low error rate
 Detection range                               sender
     detection of the signal
     possible                                transmission
     no communication                                                     distance
     possible                                 detection

 Interference range                          interference

     signal may not be
     detected                  Receiving power proportional to 1/d²
     signal adds to the
     background noise
                                                                               21




             Signal propagation
Propagation in free space always like light (straight line)
Receiving power proportional to 1/d²
(d = distance between se de and receiver)
     d sta ce bet ee sender a d ece e )
Receiving power additionally influenced by
   fading (frequency dependent)
   shadowing
   reflection at large obstacles
   scattering at small obstacles
   diffraction at edges
                     g




shadowing             reflection       scattering           diffraction

                                                                               22




                                                                                     11
Multipath propagation

      Signal can take many different paths between sender
      and receiver due to reflection, scattering, diffraction




signal at sender
                                                             signal at receiver
      Time dispersion: signal is dispersed over time
            interference with “neighbor” symbols, Inter Symbol
           Interference (ISI)
      The signal reaches a receiver directly and phase shifted
           distorted signal depending on the phases of the different parts
                                                                              23




                          Modulation
      Digital modulation
           digital data is translated into an analog signal (baseband)
           differences in spectral efficiency, power efficiency, robustness
      Analog modulation
           shifts center frequency of baseband signal up to the radio
           carrier
      Motivation
           smaller antennas (e.g., λ/4)
           Frequency Division Multiplexing
           medium characteristics
      Basic schemes
           Amplitude Modulation (AM)
           Frequency Modulation (FM)
           Phase Modulation (PM)                                              24




                                                                                   12
Multiplexing

                                                  channels ki
Goal: multiple use
of a shared medium                                      k1      k2       k3         k4            k5       k6

                                                            c
                                                                     t                        c

Multiplexing in 4 dimensions                                                                                t
                                                       s1
        space (si)                                                              f
                                                                                         s2
        time (t)                                                                                                     f
        frequency (f)                                                     c
        code (c)                                                                          t


                                                                     s3
                                                                                                       f

                                                                                                                25




             Spread spectrum technology
        Problem of radio transmission: frequency dependent
        fading can wipe out narrow band signals for duration
        of the interference
        Solution: spread the narrow band signal into a broad
        band signal using a special code
        protection against narrow band interference
power    interference      spread              power                          signal
                           signal
                                                                                              spread
                                        detection at                                          interference
                                        receiver

                                    f                                                             f

                        protection against narrowband interference

        Side effects: coexistence of several signals without
        dynamic coordination                                                                                    26




                                                                                                                         13
Signal vs. Noise
  The signals at the input of a receiver can be small (< 1
  uV).
  At this level thermal noise generated by the receiver
  electronics is significant.
      A perfect receiver at room temperature would generate 4 x 10-
      21 W of noise per Hz of bandwidth.
      Noise power is proportional to absolute temperature, cooling
      the receiver is nice.
      Real receivers generate 2 –8 times more noise power than this
      in the active devices used to amplify the small signal.
  The receiver performance is characterised in terms of
  signal to noise ratio (SNR)


                                                                   27




               Bit Error Rate (BER)
The receiver is trying to determine
the sequence of bits that were sent   Bit Error Rate (BER)
by the transmitter.
A low signal to noise ratio (SNR)
means that there is a probability
that the wrong decision will be
made.
Bit error rate (BER) characterises
the performance of a receiver.
The relationship between bit error
rate and SNR depends on the
modulation type.                                             SNR
The signal to noise ratio needed
for a particular minimum BER is
termed the power efficiency.
                                                                   28




                                                                        14
Payload Bit Error Rate



                                                                 Leave it to
                                                                 L        t
                                                                 upper layers


                                                                    The physical
                                                                    radio layer
                                                                    cannot
                                                                    support these
                                                                    low error
                                                                    rates.



                                                                                29




 An Mechanism to Reduce BER: ARQ

ARQ: Automatic Repeat ReQuest: to repeat data that contains errors.
   Terminal A sends a message to Terminal B.
   Terminal B receives the packet with one or more errors.
   Terminal B has the ability to detect that errors are present.
   Terminal B sends a message to Terminal A requesting re-transmission.
   Terminal A re-transmits the errored packet.
   The new packet is received successfully.
ARQ is only applicable when the channel error rate is very low.
   If the probability of a bit error occurring in a packet is significant the
   system will be overwhelmed by repeat requests and throughput
   collapses.
ARQ results in a throughput reduction even when there are no errors.
   Terminal A has to idle while it waits for a repeat request from Terminal B.


                                                                                30




                                                                                     15
Error Detection
  EDC= Error Detection and Correction bits (redundancy)
  D = Data protected by error checking, may include header fields

  • Error detection not 100% reliable!
       • protocol may miss some errors, but rarely
       • larger EDC field yields better detection and correction




                                                                                       31




                           Parity Checking

Single Bit Parity:
Detect single bit errors



    Single Bit Parity
         If the sum of the bits in a packet is even, add an extra ‘0’ to the packet.
         If the sum of the bits in a packet is odd, add and extra ‘1’ to the
         packet.
         This will only detect a single bit error, if two bits are in error then it
         will fail.
    Radio channels can give rise to bursts of errors.
         More complex error detection schemes are needed.
    Cyclic Redundancy Check (CRC) codes have become the standard
    way of solving the problem.

                                                                                       32




                                                                                            16
Cyclic Redundancy Check

   view data bits, D, as a binary number
   choose r+1 bit pattern (generator), G
                       bits, R,
   goal: choose r CRC bits R such that
         <D,R> exactly divisible by G (modulo 2)
        receiver knows G, divides <D,R> by G. If non-zero remainder:
        error detected!
        can detect all burst errors less than r+1 bits
   widely used in practice (ATM, HDCL)




                                                                       33




                        CRC Example
Want:
    D.2r XOR R = nG
equivalently:
    D.2r = nG XOR R
equivalently:
  if we divide D.2r by G, we
   get remainder R




                      D.2r
     R = remainder[          ]
                       G

                                                                       34




                                                                            17
Agenda


  Fundamentals of Computer Networks
  Basics of Wireless Networks
    PHY: Wireless Transmission
    MAC: Medium Access Control
    Cognitive Radio
  Q&A



                                                   35




          Multiple Access Links


         Wireless is Broadcast in nature.




single shared broadcast channel but two or more
simultaneous transmissions by nodes interference
  only one node can send successfully at a time
                                                   36




                                                        18
Multiple Access protocols



  Distributed algorithm that determines how nodes share
  channel, i.e., determine when a node can transmit
  Communication about channel sharing must use channel
  itself!
  What to look for in multiple access protocols?




                                                             37




      Ideal Multiple Access Protocol

Broadcast channel of rate R bps
1. When one node wants to transmit, it can send at rate R.
2. When M nodes want to transmit, each can send at
   average rate R/M
3. Fully decentralized:
     no special node to coordinate transmissions
     no synchronization of clocks, slots
4.
4 Simple




                                                             38




                                                                  19
Medium Access Control (MAC)

MAC is concerned with controlling each terminal’s
access to the radio resource.
   Prevention of collisions –blocking.
   P      i     f lli i      bl ki
   Fairness in allocating resource
Quality of service (QoS): latency (delay), jitter, loss.
Distinction between infrastructure networks and ad-
hoc networks
   Infrastructure networks can have a centralised view of the
   problem
       bl
    • Each terminal can be allocated its resource
    • The infrastructure is responsible for solving the MAC problem
   Ad-hoc networks require distributed MAC
    • Each terminal has to be responsible for its own MAC
                                                                  39




 Basic Wireless Network Types




                                                                  40




                                                                       20
MAC Protocols: a taxonomy
Three broad classes:
  Channel Partitioning
     divide h
     di id channel into smaller “ i
                    li t      ll “pieces” (ti
                                          ” (time slots, f
                                                   l t frequency,
     code)
     allocate piece to node for exclusive use
  Random Access
     channel not divided, allow collisions
     “recover” from collisions
  “Taking turns”
   Taking turns
     tightly coordinate shared access to avoid collisions




                                                                    41




                Channel Allocation

    Fixed Channel Allocation
       Certain Channels are assigned to each cell.
                                g
       Easy to implement but problems when traffic load changes
    Borrowing Channel Allocation
       Neigbouring busy cells borrow channels from quiet ones
       The borrowed channel may be being re-used in a neighbouring
       cell.
    Dynamic Channel Allocation
     y
       A brain dynamically allocates channels to cells depending on
       their load
       Where is the brain??


                                                                    42




                                                                         21
Can we apply media access methods
       from fixed networks?

Example CSMA/CD
  Carrier Sense Multiple Access with Collision Detection
  send as soon as the medium i f
      d             h     di    is free, li
                                         listen i
                                                into the medium if a
                                                      h    di
  collision occurs (original method in IEEE 802.3)
Problems in wireless networks
  signal strength decreases proportional to the square of the
  distance
  the sender would apply CS and CD, but the collisions happen
  at the receiver
  it might be the case that a sender cannot “hear” the collision,
  i.e., CD does not work
  furthermore, CS might not work if, e.g., a terminal is “hidden”


                                                                       43




   Hidden and exposed terminals
Hidden terminals
   A sends to B, C cannot receive A
   C wants to send to B, C senses a “free” medium (CS fails)
   collision at B, A cannot receive the collision (CD fails)
   A is “hidden” for C




Exposed terminals                  A            B           C
   B sends to A, C wants to send to another terminal (not A or B)
                                                      (            )
   C has to wait, CS signals a medium in use
   but A is outside the radio range of C, therefore waiting is not
   necessary
   C is “exposed” to B


                                                                       44




                                                                            22
Near and far terminals
 Terminals A and B send, C receives
     signal strength decreases proportional to the square of the distance
     the signal of terminal B therefore drowns out A’s signal
     C cannot receive A
              t     i




                            A                   B         C
 If C for example was an arbiter for sending rights, terminal B
 would drown out terminal A already on the physical layer
 Also severe problem for CDMA-networks where transmitters
 share transmission frequencies and transmission time - precise
 power control needed!


                                                                            45




Access methods SDMA/FDMA/TDMA

SDMA (Space Division Multiple Access)
   segment space into sectors, use directed antennas
   cell structure
FDMA (Frequency Division Multiple Access)
   assign a certain frequency to a transmission channel between a sender
   and a receiver
   permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast
   hopping (FHSS, Frequency Hopping Spread Spectrum)
TDMA (Time Division Multiple Access)
   assign the fixed sending frequency to a transmission channel between
   a sender and a receiver for a certain amount of time


The multiplexing schemes are now used to control medium access!


                                                                            46




                                                                                 23
An FDD/FDMA Example - GSM


            f
 960 MHz                           124




935.2 MHz                           1                       200 kHz
                                                   20 MHz
 915 MHz                           124




                                    1
890.2 MHz
                                                                 t




                                                                      47




     A TDD/TDMA Example: DECT

DECT: Digital Enhanced Cordless Telecommunications




            417 µs

                1 2 3           11 12 1 2 3         11 12
                                                             t
                     downlink             uplink




                                                                      48




                                                                           24
Aloha/slotted aloha
   Mechanism
      random, distributed (no central arbiter), time-multiplex
      Slotted Aloha additionally uses time-slots, sending must always
      start at slot boundaries
       t t t l tb       d i
   Aloha                             collision

    sender A
    sender B
    sender C
                                                                 t
   Slotted Aloha                     collision

    sender A
    sender B
    sender C
                                                                 t
                                                                        49




DAMA - Demand Assigned Multiple Access

   Channel efficiency only 18% for Aloha, 36% for Slotted
   Aloha (assuming Poisson distribution for packet arrival
   and packet l
     d    k t length)
                   th)
   Reservation can increase efficiency to 80%
     a sender reserves a future time-slot
     sending within this reserved time-slot is possible without
     collision
     reservation also causes higher delays
     typical scheme for satellite links
   Examples for reservation algorithms:
     Explicit Reservation (Reservation-ALOHA)
     Implicit Reservation (PRMA: Packet Reservation MA)

                                                                        50




                                                                             25
MACA - collision avoidance

  MACA (Multiple Access with Collision Avoidance) uses short
  signaling packets for collision avoidance
      RTS (request to send): a sender requests the right to send from a
      receiver with a short RTS packet before it sends a data packet
      CTS (clear to send): the receiver grants the right to send as soon as it is
      ready to receive
  Signaling packets contain
      sender address
      receiver address
      p
      packet size


  Variants of this method can be found in IEEE802.11 as DFWMAC
  (Distributed Foundation Wireless MAC)


                                                                                   51




           MACA examples: RTS/CTS
MACA avoids the problem of hidden terminals
   A and C want to
   send to B
   A sends RTS first                                RTS
   C waits after receiving
   CTS from B                                   CTS (A)         CTS(A)
                                            A               B            C


MACA avoids the problem of exposed terminals
   B wants to send to A, and C
                        ,
 wants to send to another terminal
   now C does not have                                RTS                        RTS
   to wait because it cannot
   receive CTS from A                                 CTS
                                                A               B            C   CTS    D

                                                                                   52




                                                                                            26
Polling mechanisms

If one terminal can be heard by all others, this “central” terminal
(a.k.a. base station) can poll all other terminals according to a
certain scheme
Example: Randomly Addressed Polling
   base station signals readiness to all mobile terminals
   terminals ready to send can now transmit a random number without
   collision with the help of CDMA or FDMA (the random number can
   be seen as dynamic address)
   the base station now chooses one address for polling from the list of
   all random numbers (collision if two terminals choose the same
   address)
    dd      )
   the base station acknowledges correct packets and continues polling
   the next terminal
   this cycle starts again after polling all terminals of the list


                                                                           53




            Access method CDMA

CDMA (Code Division Multiple Access)
   all terminals send on the same frequency probably at the same time and
   can use the whole bandwidth of the transmission channel
   each sender has a unique random number, the sender XORs the signal
   with this random number
   the receiver can “tune” into this signal if it knows the pseudo random
   number, tuning is done via a correlation function
Disadvantages:
   higher complexity of a receiver (receiver cannot just listen into the
   medium and start receiving if there is a signal)
   all signals should have the same strength at a receiver
Advantages:
   all terminals can use the same frequency, no planning needed
   huge code space (e.g. 232) compared to frequency space
   forward error correction and encryption can be easily integrated


                                                                           54




                                                                                27
Comparison SDMA/TDMA/FDMA/CDMA
Approach              SDMA                       TDMA                FDMA                      CDMA
Idea           segment space into         segment sending      segment the            spread the spectrum
               cells/sectors              time into disjoint   frequency band into    using orthogonal codes
                                          time-slots, demand   disjoint sub-bands
                                          driven or fixed
                                          patterns
Terminals      only one terminal can      all terminals are    every terminal has its all terminals can be active
               be active in one           active for short     own frequency,         at the same place at the
               cell/one sector            periods of time on   uninterrupted          same moment,
                                          the same frequency                          uninterrupted
Signal         cell structure, directed   synchronization in   filtering in the       code plus special
separation     antennas                   the time domain      frequency domain       receivers

Advantages very simple, increases established, fully           simple, established,   flexible, less frequency
               capacity per km²           digital, flexible    robust                 planning needed, soft
                                                                                      handover
Dis-       inflexible,
           inflexible antennas            guard space          inflexible,
                                                               inflexible             complex receivers needs
                                                                                                 receivers,
advantages typically fixed                needed (multipath    frequencies are a      more complicated power
                                          propagation),        scarce resource        control for senders
                                          synchronization
                                          difficult
Comment        only in combination        standard in fixed    typically combined     still faces some problems,
               with TDMA, FDMA or         networks, together   with TDMA              higher complexity,
               CDMA useful                with FDMA/SDMA       (frequency hopping     lowered expectations; will
                                          used in many         patterns) and SDMA     be integrated with
                                          mobile networks      (frequency reuse)      TDMA/FDMA
                                                                                                             55
Source: IEEE Comm. Mag.




                              Wireless vs. Wired
       Wireless transmissions are far less robust than wired
             Noise
              • If the link is too long the noise is bigger than the signal.
             Interference
              • Our own, generated within the network
              • Other people using the radio spectrum
             Mobility
       Wireless systems are inherently broadcast
             We may talk about point to point comm but the signals still go
             eve yw e e
             everywhere
             We have to engineer a multiple access scheme so that all terminals can
             share the available radio resource
       Radio spectrum is an expensive and scarce commodity ->
       cognitive radio?
       The radio channel is challenging - particularly indoors -> femto
       cell?                                                                                                 56




                                                                                                                    28
Agenda


Fundamentals of Computer Networks
Basics of Wireless Networks
  PHY: Wireless Transmission
  MAC: Medium Access Control
  Cognitive Radio
Q&A



                                                   57




 Pondering on Spectrum Usage


        The Ofcom Spectrum Vision
Spectrum should be free of technology, policy and
usage constraints as far as possible
It should be simple and transparent for licence
holders to change the ownership and use of
spectrum
Rights of spectrum users should be clearly defined
and users should feel comfortable that they will not
be changed without good cause.


                         Source: Ofcom
                                                   58




                                                        29
Three possible ways of managing Spectrum


 Command & Control Zone        Market Force Zone        Licence-exempt Zone

 Managed       Authorities:
                                  Companies                 nobody
    by:   (No variations allowed,
             for ~100 years!)
    Current        94%               0%                      6%
percentage (UK)

   Future
   Trend:

The regulator cannot know as   Trading existing          Key area for innovation
much as the market.            spectrum between users    but do we need more?

                                                                            59




                 What is Cognitive Radio?

            “… a radio that is aware of its surroundings and adapts
            intelligently….” – Mitola 2000
                   g    y
            Primary users vs. secondary users




                                                                            60
 Source: Ofcom




                                                                                   30
A Spectrum Usage Test (London)




                                              Source: Ofcom
                                                                           61




          Challenges of Cog. Radio
Economics
  Cost of CR devices over simpler delivery mechanism likely to be higher
  Non-real time services for CR not as valuable
  Depends on spectrum congestion and demand
Hidden node / sharing issues
  Ensure CRs do not interfere with each other
  Making sure that they can exist with legacy users and other
Cog. Radio devices
  Controlling CRs to ensure they have the same spectrum picture
  How will groups of CRs know what’s going on?
  Devices need to be aware of regulatory constraints
Security and malicious use
  The flexibility of CRs enables illegal transmissions
  AAA
                                                                           62




                                                                                31
Where can I use Cog. Radio?


licence-exempt (LE) bands: all right.
and Licenced Bands!: not fair?! restricted to licensees?

Non-time sensitive services, such as downloading
could be most appropriate.
But,
   Emergency communications (with priority flag) ??
   Broadband wireless services
   Multimedia wireless networking



                                                           63




  Conceptual Timeline (IEEE 1900)




                                                           64




                                                                32
Contact, Q&A


Dr Kun Yang
Reader in Pervasive Networks & Services
School of Comp. Science & Electronic Engineering (CSEE),
University of Essex, Wivenhoe Park, Colchester,
CO4 3SQ, UK
  Email: kunyang@essex.ac.uk
  http://privatewww.essex.ac.uk/~kunyang/
     p //p                      /     y g/




                                                     65




                                                           33

Contenu connexe

Tendances

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyIOSR Journals
 
2003 salih 3_gdata1
2003 salih 3_gdata12003 salih 3_gdata1
2003 salih 3_gdata1tapansaha26
 
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSEFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSijwmn
 
Fast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location InformationFast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location InformationCSCJournals
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)mashiur
 
Fast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksFast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksSneha Vurrakula
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksambitlick
 

Tendances (19)

my project publication
my project publicationmy project publication
my project publication
 
Chapter 1 services in a converged wan
Chapter 1   services in a converged wanChapter 1   services in a converged wan
Chapter 1 services in a converged wan
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
 
2003 salih 3_gdata1
2003 salih 3_gdata12003 salih 3_gdata1
2003 salih 3_gdata1
 
Ccna presentation
Ccna presentationCcna presentation
Ccna presentation
 
CCNA Training
CCNA Training CCNA Training
CCNA Training
 
Chapter3[one.]
Chapter3[one.]Chapter3[one.]
Chapter3[one.]
 
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSEFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
MPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) TechnologyMPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) Technology
 
Sdn04
Sdn04Sdn04
Sdn04
 
Fast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location InformationFast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location Information
 
Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)Mazharul Islam Khan (063457056)
Mazharul Islam Khan (063457056)
 
4 network.key
4 network.key4 network.key
4 network.key
 
Chapter 2 point-to-point protocol (ppp)
Chapter 2   point-to-point protocol (ppp)Chapter 2   point-to-point protocol (ppp)
Chapter 2 point-to-point protocol (ppp)
 
04ip
04ip04ip
04ip
 
Fast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless NetworksFast Handovers in heterogeneous Wireless Networks
Fast Handovers in heterogeneous Wireless Networks
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networks
 

En vedette

Comment Letter on New Regulations Addressing BDPOs -- Letter dated January 3,...
Comment Letter on New Regulations Addressing BDPOs -- Letter dated January 3,...Comment Letter on New Regulations Addressing BDPOs -- Letter dated January 3,...
Comment Letter on New Regulations Addressing BDPOs -- Letter dated January 3,...Samuel Grilli
 
Cat orgin ofmfr
Cat orgin ofmfrCat orgin ofmfr
Cat orgin ofmfrdrrodasg
 
مفهوم الضرر بين الشرع والطب
مفهوم الضرر بين الشرع والطبمفهوم الضرر بين الشرع والطب
مفهوم الضرر بين الشرع والطبDr Ghaiath Hussein
 
Open stack in action cern _openstack_accelerating_science
Open stack in action  cern _openstack_accelerating_scienceOpen stack in action  cern _openstack_accelerating_science
Open stack in action cern _openstack_accelerating_scienceeNovance
 
365 产品介绍 产品推广app_20150721
365 产品介绍 产品推广app_20150721365 产品介绍 产品推广app_20150721
365 产品介绍 产品推广app_20150721Rui (Nash) Yang
 
OICX Retail Customer Experience
OICX Retail Customer ExperienceOICX Retail Customer Experience
OICX Retail Customer ExperienceDamian Kernahan
 
Climb - Property-based dispatch in functional languages [Report]
Climb - Property-based dispatch in functional languages [Report]Climb - Property-based dispatch in functional languages [Report]
Climb - Property-based dispatch in functional languages [Report]Christopher Chedeau
 
Hybrid-Active-Optical-Cable-White-Paper
Hybrid-Active-Optical-Cable-White-PaperHybrid-Active-Optical-Cable-White-Paper
Hybrid-Active-Optical-Cable-White-PaperNguyen Nguyen
 
Stokvis Tapes
Stokvis TapesStokvis Tapes
Stokvis Tapesstokvis
 
Critical purviews where information and communication technology (ICT) can pr...
Critical purviews where information and communication technology (ICT) can pr...Critical purviews where information and communication technology (ICT) can pr...
Critical purviews where information and communication technology (ICT) can pr...Adamkolo Mohammed Ibrahim Jinjiri
 
BÍ QUYẾT QUẢN LÝ HIỆU QUẢ CÂU LẠC BỘ CHA MẸ VÀ VỊ THÀNH NIÊN, THANH NIÊN
BÍ QUYẾT QUẢN LÝ HIỆU QUẢ CÂU LẠC BỘ CHA MẸ VÀ VỊ THÀNH NIÊN, THANH NIÊNBÍ QUYẾT QUẢN LÝ HIỆU QUẢ CÂU LẠC BỘ CHA MẸ VÀ VỊ THÀNH NIÊN, THANH NIÊN
BÍ QUYẾT QUẢN LÝ HIỆU QUẢ CÂU LẠC BỘ CHA MẸ VÀ VỊ THÀNH NIÊN, THANH NIÊNCGFED
 
Working capital
Working capitalWorking capital
Working capitalNits Kedia
 
Pass Love Charity Foundation (PLCF)
Pass Love Charity Foundation (PLCF)Pass Love Charity Foundation (PLCF)
Pass Love Charity Foundation (PLCF)PassLoveCharity
 
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue1402 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14Akhil Bharat Mahasabha
 
Q35 maths error quran
Q35 maths error quranQ35 maths error quran
Q35 maths error quransaud777
 
Pengumuman sipencatar 2015
Pengumuman sipencatar 2015Pengumuman sipencatar 2015
Pengumuman sipencatar 2015raizin
 
The Invention of Capitalism - Michael Perelman
The Invention of Capitalism - Michael PerelmanThe Invention of Capitalism - Michael Perelman
The Invention of Capitalism - Michael Perelmanberat celik
 

En vedette (19)

Portugal Global Times Feature
Portugal Global Times FeaturePortugal Global Times Feature
Portugal Global Times Feature
 
Comment Letter on New Regulations Addressing BDPOs -- Letter dated January 3,...
Comment Letter on New Regulations Addressing BDPOs -- Letter dated January 3,...Comment Letter on New Regulations Addressing BDPOs -- Letter dated January 3,...
Comment Letter on New Regulations Addressing BDPOs -- Letter dated January 3,...
 
Cat orgin ofmfr
Cat orgin ofmfrCat orgin ofmfr
Cat orgin ofmfr
 
مفهوم الضرر بين الشرع والطب
مفهوم الضرر بين الشرع والطبمفهوم الضرر بين الشرع والطب
مفهوم الضرر بين الشرع والطب
 
Open stack in action cern _openstack_accelerating_science
Open stack in action  cern _openstack_accelerating_scienceOpen stack in action  cern _openstack_accelerating_science
Open stack in action cern _openstack_accelerating_science
 
365 产品介绍 产品推广app_20150721
365 产品介绍 产品推广app_20150721365 产品介绍 产品推广app_20150721
365 产品介绍 产品推广app_20150721
 
OICX Retail Customer Experience
OICX Retail Customer ExperienceOICX Retail Customer Experience
OICX Retail Customer Experience
 
Climb - Property-based dispatch in functional languages [Report]
Climb - Property-based dispatch in functional languages [Report]Climb - Property-based dispatch in functional languages [Report]
Climb - Property-based dispatch in functional languages [Report]
 
Hybrid-Active-Optical-Cable-White-Paper
Hybrid-Active-Optical-Cable-White-PaperHybrid-Active-Optical-Cable-White-Paper
Hybrid-Active-Optical-Cable-White-Paper
 
Stokvis Tapes
Stokvis TapesStokvis Tapes
Stokvis Tapes
 
lwen
lwenlwen
lwen
 
Critical purviews where information and communication technology (ICT) can pr...
Critical purviews where information and communication technology (ICT) can pr...Critical purviews where information and communication technology (ICT) can pr...
Critical purviews where information and communication technology (ICT) can pr...
 
BÍ QUYẾT QUẢN LÝ HIỆU QUẢ CÂU LẠC BỘ CHA MẸ VÀ VỊ THÀNH NIÊN, THANH NIÊN
BÍ QUYẾT QUẢN LÝ HIỆU QUẢ CÂU LẠC BỘ CHA MẸ VÀ VỊ THÀNH NIÊN, THANH NIÊNBÍ QUYẾT QUẢN LÝ HIỆU QUẢ CÂU LẠC BỘ CHA MẸ VÀ VỊ THÀNH NIÊN, THANH NIÊN
BÍ QUYẾT QUẢN LÝ HIỆU QUẢ CÂU LẠC BỘ CHA MẸ VÀ VỊ THÀNH NIÊN, THANH NIÊN
 
Working capital
Working capitalWorking capital
Working capital
 
Pass Love Charity Foundation (PLCF)
Pass Love Charity Foundation (PLCF)Pass Love Charity Foundation (PLCF)
Pass Love Charity Foundation (PLCF)
 
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue1402 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
 
Q35 maths error quran
Q35 maths error quranQ35 maths error quran
Q35 maths error quran
 
Pengumuman sipencatar 2015
Pengumuman sipencatar 2015Pengumuman sipencatar 2015
Pengumuman sipencatar 2015
 
The Invention of Capitalism - Michael Perelman
The Invention of Capitalism - Michael PerelmanThe Invention of Capitalism - Michael Perelman
The Invention of Capitalism - Michael Perelman
 

Similaire à Wireless network basics

Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012Samuel Dratwa
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Designnakomuri
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security7wounders
 
Chapter 4
Chapter 4Chapter 4
Chapter 4asguna
 
OSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil ShaikhOSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil ShaikhMujmmil Shaikh
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
communication system l2
communication system l2communication system l2
communication system l2MR Z
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
Troytech 640 407 ccna edt.2
Troytech 640 407 ccna edt.2Troytech 640 407 ccna edt.2
Troytech 640 407 ccna edt.2rickybcool
 
Internet protocol stack
Internet protocol stackInternet protocol stack
Internet protocol stackAmi Prakash
 
Chapter 3 a
Chapter 3 aChapter 3 a
Chapter 3 alara_ays
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IPMannu Khani
 

Similaire à Wireless network basics (20)

VOICE
VOICEVOICE
VOICE
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
OSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil ShaikhOSI REFRENCE MODEL by- Mujmmil Shaikh
OSI REFRENCE MODEL by- Mujmmil Shaikh
 
Day01
Day01 Day01
Day01
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
 
communication system l2
communication system l2communication system l2
communication system l2
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Troytech 640 407 ccna edt.2
Troytech 640 407 ccna edt.2Troytech 640 407 ccna edt.2
Troytech 640 407 ccna edt.2
 
Internet protocol stack
Internet protocol stackInternet protocol stack
Internet protocol stack
 
Chapter 3 a
Chapter 3 aChapter 3 a
Chapter 3 a
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 

Plus de Kumar

Graphics devices
Graphics devicesGraphics devices
Graphics devicesKumar
 
Fill area algorithms
Fill area algorithmsFill area algorithms
Fill area algorithmsKumar
 
region-filling
region-fillingregion-filling
region-fillingKumar
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivationKumar
 
Bresenham circles and polygons derication
Bresenham circles and polygons dericationBresenham circles and polygons derication
Bresenham circles and polygons dericationKumar
 
Introductionto xslt
Introductionto xsltIntroductionto xslt
Introductionto xsltKumar
 
Extracting data from xml
Extracting data from xmlExtracting data from xml
Extracting data from xmlKumar
 
Xml basics
Xml basicsXml basics
Xml basicsKumar
 
XML Schema
XML SchemaXML Schema
XML SchemaKumar
 
Publishing xml
Publishing xmlPublishing xml
Publishing xmlKumar
 
Applying xml
Applying xmlApplying xml
Applying xmlKumar
 
Introduction to XML
Introduction to XMLIntroduction to XML
Introduction to XMLKumar
 
How to deploy a j2ee application
How to deploy a j2ee applicationHow to deploy a j2ee application
How to deploy a j2ee applicationKumar
 
JNDI, JMS, JPA, XML
JNDI, JMS, JPA, XMLJNDI, JMS, JPA, XML
JNDI, JMS, JPA, XMLKumar
 
EJB Fundmentals
EJB FundmentalsEJB Fundmentals
EJB FundmentalsKumar
 
JSP and struts programming
JSP and struts programmingJSP and struts programming
JSP and struts programmingKumar
 
java servlet and servlet programming
java servlet and servlet programmingjava servlet and servlet programming
java servlet and servlet programmingKumar
 
Introduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC DriversIntroduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC DriversKumar
 
Introduction to J2EE
Introduction to J2EEIntroduction to J2EE
Introduction to J2EEKumar
 

Plus de Kumar (20)

Graphics devices
Graphics devicesGraphics devices
Graphics devices
 
Fill area algorithms
Fill area algorithmsFill area algorithms
Fill area algorithms
 
region-filling
region-fillingregion-filling
region-filling
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivation
 
Bresenham circles and polygons derication
Bresenham circles and polygons dericationBresenham circles and polygons derication
Bresenham circles and polygons derication
 
Introductionto xslt
Introductionto xsltIntroductionto xslt
Introductionto xslt
 
Extracting data from xml
Extracting data from xmlExtracting data from xml
Extracting data from xml
 
Xml basics
Xml basicsXml basics
Xml basics
 
XML Schema
XML SchemaXML Schema
XML Schema
 
Publishing xml
Publishing xmlPublishing xml
Publishing xml
 
DTD
DTDDTD
DTD
 
Applying xml
Applying xmlApplying xml
Applying xml
 
Introduction to XML
Introduction to XMLIntroduction to XML
Introduction to XML
 
How to deploy a j2ee application
How to deploy a j2ee applicationHow to deploy a j2ee application
How to deploy a j2ee application
 
JNDI, JMS, JPA, XML
JNDI, JMS, JPA, XMLJNDI, JMS, JPA, XML
JNDI, JMS, JPA, XML
 
EJB Fundmentals
EJB FundmentalsEJB Fundmentals
EJB Fundmentals
 
JSP and struts programming
JSP and struts programmingJSP and struts programming
JSP and struts programming
 
java servlet and servlet programming
java servlet and servlet programmingjava servlet and servlet programming
java servlet and servlet programming
 
Introduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC DriversIntroduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC Drivers
 
Introduction to J2EE
Introduction to J2EEIntroduction to J2EE
Introduction to J2EE
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Wireless network basics

  • 1. Lecture #1 Fundamentals on Computer Networks and Wireless Networks Dr. Kun Yang School of Comp. Sci. & Elec. Eng. University of Essex, Colchester, UK Essex Colchester Monday 16th March 2009 1 Agenda Fundamentals of Computer Networks Basics of Wireless Networks PHY: Wireless Transmission MAC: Medium Access Control Cognitive Radio Q&A 2 1
  • 2. A General Communication Model Source System Carries Destination System data Trans Trans- Trans Trans- mission Transmitter mission Receiver Destination System System generates Converts data Converts Takes data to be into transmittable received signal incoming transmitted signals into data data workstation modem modem server Public telephone Network 3 Networking Point to point comm. not usually practical Devices are too far apart Large set of devices would need impractical number of connections Solution is a communications network 4 2
  • 3. Transmission vs. Switching requires many Centralised switch network transmission links minimises transmission but requires complex switch Trade off 5 ISO OSI (Open Systems Interconnection) Reference Model application-specific protocols 7 application Application Application- data representation and encoding 6 presentation oriented End-to-end scope dialog and synchronisation 5 session End-to-end message transfer (and maybe error control, 4 transport flow control, connection management) Global network routing and addressing (and maybe scope 3 network connection management) data link control (framing, data 2 data link Hop-by-hop Local transparency and maybe error control) scope mechanical, electrical and optical interface 1 physical 6 3
  • 4. Layer Specific Standards Service definition (Functional description for internal use) Addressing (Service Access Point: SAP) Protocol Specification (precise syntax and semantics for interoperability) 7 What’s a protocol? A human protocol and a computer network protocol Hiya TCP connection req Hey TCP connection Got the response place? Get http://www.essex.ac.uk Room5 <file> time 8 4
  • 5. Protocols in OSI RM 9 The Full ISO OSI RM 10 5
  • 6. Layering: Physical Communication data application transport network link physical network link application physical transport network link data physical h i l application li i transport network link physical 11 The OSI Environment At Source: each layer takes data from above, At Destination: the opposite adds header information to create new data operation unit, and then passes new data unit to layer below. 12 6
  • 7. Addressing socket Unicast – broadcast - multicast 13 Network Structure Administrative boundaries Autonomous system (AS): Border intra-domain issues router internal policy routing metric? Routing protocols: RIPv2, OSPFv2 Interconnection of ASs: inter-domain issues Interconnectivity information Routing protocols: BGP Service Level Agreement/Specification Business Model 14 7
  • 8. Network Structure : another view Access network: With dedicated links Low level of multiplexing Access low volume of traffic ISPs Broadband access: fixed, wireless metro Distribution network: (transit) interconnectivity at local level Core core low multiplexing (backbone) medium volume of traffic Metropolitan Area Network p Core network – backbone: international/global interconnectivity high volume of traffic high multiplexing Network edge: applications and hosts 15 A packet passes through many networks! ISP: Internet Service Provider local ISP Tier 3 local Wireless wireless ISP ISP router ISP ISP Tier-2 ISP Tier-2 ISP Tier 1 ISP NAP mobile Tier 1 ISP Tier 1 ISP Tier-2 ISP hosts local Tier-2 ISP Tier-2 ISP ISP local local local ISP ISP ISP 16 8
  • 9. Agenda Fundamentals of Computer Networks Basics of Wireless Networks PHY: Wireless Transmission MAC: Medium Access Control Cognitive Radio Q&A Some slides here pay courtesy to J. Schiller, K. Guild & D. Hunter. 17 Frequencies for communication twisted coax cable optical transmission pair 1 Mm 10 km 0 100 m 00 1m 10 mm 0 100 μm 1 μm 300 Hz 30 kHz 3 MHz 300 MHz 30 GHz 3 THz 300 THz VLF LF MF HF VHF UHF SHF EHF infrared visible light UV VLF = Very Low Frequency UHF = Ultra High Frequency LF = Low Frequency SHF = Super High Frequency MF = Medium Frequency EHF = Extra High Frequency HF = High Frequency UV = Ultraviolet Light VHF = Very High Frequency Frequency and wave length: λ = c/f wave length λ, speed of light c ≅ 3x108m/s, frequency f 18 9
  • 10. Radio Frequency Spectrum 19 Frequencies for mobile communication VHF-/UHF-ranges for mobile radio simple, small antenna for cars deterministic propagation characteristics, reliable connections p p g , SHF and higher for directed radio links, satellite communication small antenna, focusing large bandwidth available Wireless LANs use frequencies in UHF to SHF spectrum some systems planned up to EHF limitations due to absorption by water and oxygen molecules (resonance frequencies) • weather dependent fading, signal loss caused by heavy rainfall etc. 20 10
  • 11. Signal propagation ranges Transmission range p communication possible low error rate Detection range sender detection of the signal possible transmission no communication distance possible detection Interference range interference signal may not be detected Receiving power proportional to 1/d² signal adds to the background noise 21 Signal propagation Propagation in free space always like light (straight line) Receiving power proportional to 1/d² (d = distance between se de and receiver) d sta ce bet ee sender a d ece e ) Receiving power additionally influenced by fading (frequency dependent) shadowing reflection at large obstacles scattering at small obstacles diffraction at edges g shadowing reflection scattering diffraction 22 11
  • 12. Multipath propagation Signal can take many different paths between sender and receiver due to reflection, scattering, diffraction signal at sender signal at receiver Time dispersion: signal is dispersed over time interference with “neighbor” symbols, Inter Symbol Interference (ISI) The signal reaches a receiver directly and phase shifted distorted signal depending on the phases of the different parts 23 Modulation Digital modulation digital data is translated into an analog signal (baseband) differences in spectral efficiency, power efficiency, robustness Analog modulation shifts center frequency of baseband signal up to the radio carrier Motivation smaller antennas (e.g., λ/4) Frequency Division Multiplexing medium characteristics Basic schemes Amplitude Modulation (AM) Frequency Modulation (FM) Phase Modulation (PM) 24 12
  • 13. Multiplexing channels ki Goal: multiple use of a shared medium k1 k2 k3 k4 k5 k6 c t c Multiplexing in 4 dimensions t s1 space (si) f s2 time (t) f frequency (f) c code (c) t s3 f 25 Spread spectrum technology Problem of radio transmission: frequency dependent fading can wipe out narrow band signals for duration of the interference Solution: spread the narrow band signal into a broad band signal using a special code protection against narrow band interference power interference spread power signal signal spread detection at interference receiver f f protection against narrowband interference Side effects: coexistence of several signals without dynamic coordination 26 13
  • 14. Signal vs. Noise The signals at the input of a receiver can be small (< 1 uV). At this level thermal noise generated by the receiver electronics is significant. A perfect receiver at room temperature would generate 4 x 10- 21 W of noise per Hz of bandwidth. Noise power is proportional to absolute temperature, cooling the receiver is nice. Real receivers generate 2 –8 times more noise power than this in the active devices used to amplify the small signal. The receiver performance is characterised in terms of signal to noise ratio (SNR) 27 Bit Error Rate (BER) The receiver is trying to determine the sequence of bits that were sent Bit Error Rate (BER) by the transmitter. A low signal to noise ratio (SNR) means that there is a probability that the wrong decision will be made. Bit error rate (BER) characterises the performance of a receiver. The relationship between bit error rate and SNR depends on the modulation type. SNR The signal to noise ratio needed for a particular minimum BER is termed the power efficiency. 28 14
  • 15. Payload Bit Error Rate Leave it to L t upper layers The physical radio layer cannot support these low error rates. 29 An Mechanism to Reduce BER: ARQ ARQ: Automatic Repeat ReQuest: to repeat data that contains errors. Terminal A sends a message to Terminal B. Terminal B receives the packet with one or more errors. Terminal B has the ability to detect that errors are present. Terminal B sends a message to Terminal A requesting re-transmission. Terminal A re-transmits the errored packet. The new packet is received successfully. ARQ is only applicable when the channel error rate is very low. If the probability of a bit error occurring in a packet is significant the system will be overwhelmed by repeat requests and throughput collapses. ARQ results in a throughput reduction even when there are no errors. Terminal A has to idle while it waits for a repeat request from Terminal B. 30 15
  • 16. Error Detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields • Error detection not 100% reliable! • protocol may miss some errors, but rarely • larger EDC field yields better detection and correction 31 Parity Checking Single Bit Parity: Detect single bit errors Single Bit Parity If the sum of the bits in a packet is even, add an extra ‘0’ to the packet. If the sum of the bits in a packet is odd, add and extra ‘1’ to the packet. This will only detect a single bit error, if two bits are in error then it will fail. Radio channels can give rise to bursts of errors. More complex error detection schemes are needed. Cyclic Redundancy Check (CRC) codes have become the standard way of solving the problem. 32 16
  • 17. Cyclic Redundancy Check view data bits, D, as a binary number choose r+1 bit pattern (generator), G bits, R, goal: choose r CRC bits R such that <D,R> exactly divisible by G (modulo 2) receiver knows G, divides <D,R> by G. If non-zero remainder: error detected! can detect all burst errors less than r+1 bits widely used in practice (ATM, HDCL) 33 CRC Example Want: D.2r XOR R = nG equivalently: D.2r = nG XOR R equivalently: if we divide D.2r by G, we get remainder R D.2r R = remainder[ ] G 34 17
  • 18. Agenda Fundamentals of Computer Networks Basics of Wireless Networks PHY: Wireless Transmission MAC: Medium Access Control Cognitive Radio Q&A 35 Multiple Access Links Wireless is Broadcast in nature. single shared broadcast channel but two or more simultaneous transmissions by nodes interference only one node can send successfully at a time 36 18
  • 19. Multiple Access protocols Distributed algorithm that determines how nodes share channel, i.e., determine when a node can transmit Communication about channel sharing must use channel itself! What to look for in multiple access protocols? 37 Ideal Multiple Access Protocol Broadcast channel of rate R bps 1. When one node wants to transmit, it can send at rate R. 2. When M nodes want to transmit, each can send at average rate R/M 3. Fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4. 4 Simple 38 19
  • 20. Medium Access Control (MAC) MAC is concerned with controlling each terminal’s access to the radio resource. Prevention of collisions –blocking. P i f lli i bl ki Fairness in allocating resource Quality of service (QoS): latency (delay), jitter, loss. Distinction between infrastructure networks and ad- hoc networks Infrastructure networks can have a centralised view of the problem bl • Each terminal can be allocated its resource • The infrastructure is responsible for solving the MAC problem Ad-hoc networks require distributed MAC • Each terminal has to be responsible for its own MAC 39 Basic Wireless Network Types 40 20
  • 21. MAC Protocols: a taxonomy Three broad classes: Channel Partitioning divide h di id channel into smaller “ i li t ll “pieces” (ti ” (time slots, f l t frequency, code) allocate piece to node for exclusive use Random Access channel not divided, allow collisions “recover” from collisions “Taking turns” Taking turns tightly coordinate shared access to avoid collisions 41 Channel Allocation Fixed Channel Allocation Certain Channels are assigned to each cell. g Easy to implement but problems when traffic load changes Borrowing Channel Allocation Neigbouring busy cells borrow channels from quiet ones The borrowed channel may be being re-used in a neighbouring cell. Dynamic Channel Allocation y A brain dynamically allocates channels to cells depending on their load Where is the brain?? 42 21
  • 22. Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send as soon as the medium i f d h di is free, li listen i into the medium if a h di collision occurs (original method in IEEE 802.3) Problems in wireless networks signal strength decreases proportional to the square of the distance the sender would apply CS and CD, but the collisions happen at the receiver it might be the case that a sender cannot “hear” the collision, i.e., CD does not work furthermore, CS might not work if, e.g., a terminal is “hidden” 43 Hidden and exposed terminals Hidden terminals A sends to B, C cannot receive A C wants to send to B, C senses a “free” medium (CS fails) collision at B, A cannot receive the collision (CD fails) A is “hidden” for C Exposed terminals A B C B sends to A, C wants to send to another terminal (not A or B) ( ) C has to wait, CS signals a medium in use but A is outside the radio range of C, therefore waiting is not necessary C is “exposed” to B 44 22
  • 23. Near and far terminals Terminals A and B send, C receives signal strength decreases proportional to the square of the distance the signal of terminal B therefore drowns out A’s signal C cannot receive A t i A B C If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer Also severe problem for CDMA-networks where transmitters share transmission frequencies and transmission time - precise power control needed! 45 Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) segment space into sectors, use directed antennas cell structure FDMA (Frequency Division Multiple Access) assign a certain frequency to a transmission channel between a sender and a receiver permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) TDMA (Time Division Multiple Access) assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time The multiplexing schemes are now used to control medium access! 46 23
  • 24. An FDD/FDMA Example - GSM f 960 MHz 124 935.2 MHz 1 200 kHz 20 MHz 915 MHz 124 1 890.2 MHz t 47 A TDD/TDMA Example: DECT DECT: Digital Enhanced Cordless Telecommunications 417 µs 1 2 3 11 12 1 2 3 11 12 t downlink uplink 48 24
  • 25. Aloha/slotted aloha Mechanism random, distributed (no central arbiter), time-multiplex Slotted Aloha additionally uses time-slots, sending must always start at slot boundaries t t t l tb d i Aloha collision sender A sender B sender C t Slotted Aloha collision sender A sender B sender C t 49 DAMA - Demand Assigned Multiple Access Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet l d k t length) th) Reservation can increase efficiency to 80% a sender reserves a future time-slot sending within this reserved time-slot is possible without collision reservation also causes higher delays typical scheme for satellite links Examples for reservation algorithms: Explicit Reservation (Reservation-ALOHA) Implicit Reservation (PRMA: Packet Reservation MA) 50 25
  • 26. MACA - collision avoidance MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance RTS (request to send): a sender requests the right to send from a receiver with a short RTS packet before it sends a data packet CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain sender address receiver address p packet size Variants of this method can be found in IEEE802.11 as DFWMAC (Distributed Foundation Wireless MAC) 51 MACA examples: RTS/CTS MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first RTS C waits after receiving CTS from B CTS (A) CTS(A) A B C MACA avoids the problem of exposed terminals B wants to send to A, and C , wants to send to another terminal now C does not have RTS RTS to wait because it cannot receive CTS from A CTS A B C CTS D 52 26
  • 27. Polling mechanisms If one terminal can be heard by all others, this “central” terminal (a.k.a. base station) can poll all other terminals according to a certain scheme Example: Randomly Addressed Polling base station signals readiness to all mobile terminals terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address) the base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address) dd ) the base station acknowledges correct packets and continues polling the next terminal this cycle starts again after polling all terminals of the list 53 Access method CDMA CDMA (Code Division Multiple Access) all terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel each sender has a unique random number, the sender XORs the signal with this random number the receiver can “tune” into this signal if it knows the pseudo random number, tuning is done via a correlation function Disadvantages: higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal) all signals should have the same strength at a receiver Advantages: all terminals can use the same frequency, no planning needed huge code space (e.g. 232) compared to frequency space forward error correction and encryption can be easily integrated 54 27
  • 28. Comparison SDMA/TDMA/FDMA/CDMA Approach SDMA TDMA FDMA CDMA Idea segment space into segment sending segment the spread the spectrum cells/sectors time into disjoint frequency band into using orthogonal codes time-slots, demand disjoint sub-bands driven or fixed patterns Terminals only one terminal can all terminals are every terminal has its all terminals can be active be active in one active for short own frequency, at the same place at the cell/one sector periods of time on uninterrupted same moment, the same frequency uninterrupted Signal cell structure, directed synchronization in filtering in the code plus special separation antennas the time domain frequency domain receivers Advantages very simple, increases established, fully simple, established, flexible, less frequency capacity per km² digital, flexible robust planning needed, soft handover Dis- inflexible, inflexible antennas guard space inflexible, inflexible complex receivers needs receivers, advantages typically fixed needed (multipath frequencies are a more complicated power propagation), scarce resource control for senders synchronization difficult Comment only in combination standard in fixed typically combined still faces some problems, with TDMA, FDMA or networks, together with TDMA higher complexity, CDMA useful with FDMA/SDMA (frequency hopping lowered expectations; will used in many patterns) and SDMA be integrated with mobile networks (frequency reuse) TDMA/FDMA 55 Source: IEEE Comm. Mag. Wireless vs. Wired Wireless transmissions are far less robust than wired Noise • If the link is too long the noise is bigger than the signal. Interference • Our own, generated within the network • Other people using the radio spectrum Mobility Wireless systems are inherently broadcast We may talk about point to point comm but the signals still go eve yw e e everywhere We have to engineer a multiple access scheme so that all terminals can share the available radio resource Radio spectrum is an expensive and scarce commodity -> cognitive radio? The radio channel is challenging - particularly indoors -> femto cell? 56 28
  • 29. Agenda Fundamentals of Computer Networks Basics of Wireless Networks PHY: Wireless Transmission MAC: Medium Access Control Cognitive Radio Q&A 57 Pondering on Spectrum Usage The Ofcom Spectrum Vision Spectrum should be free of technology, policy and usage constraints as far as possible It should be simple and transparent for licence holders to change the ownership and use of spectrum Rights of spectrum users should be clearly defined and users should feel comfortable that they will not be changed without good cause. Source: Ofcom 58 29
  • 30. Three possible ways of managing Spectrum Command & Control Zone Market Force Zone Licence-exempt Zone Managed Authorities: Companies nobody by: (No variations allowed, for ~100 years!) Current 94% 0% 6% percentage (UK) Future Trend: The regulator cannot know as Trading existing Key area for innovation much as the market. spectrum between users but do we need more? 59 What is Cognitive Radio? “… a radio that is aware of its surroundings and adapts intelligently….” – Mitola 2000 g y Primary users vs. secondary users 60 Source: Ofcom 30
  • 31. A Spectrum Usage Test (London) Source: Ofcom 61 Challenges of Cog. Radio Economics Cost of CR devices over simpler delivery mechanism likely to be higher Non-real time services for CR not as valuable Depends on spectrum congestion and demand Hidden node / sharing issues Ensure CRs do not interfere with each other Making sure that they can exist with legacy users and other Cog. Radio devices Controlling CRs to ensure they have the same spectrum picture How will groups of CRs know what’s going on? Devices need to be aware of regulatory constraints Security and malicious use The flexibility of CRs enables illegal transmissions AAA 62 31
  • 32. Where can I use Cog. Radio? licence-exempt (LE) bands: all right. and Licenced Bands!: not fair?! restricted to licensees? Non-time sensitive services, such as downloading could be most appropriate. But, Emergency communications (with priority flag) ?? Broadband wireless services Multimedia wireless networking 63 Conceptual Timeline (IEEE 1900) 64 32
  • 33. Contact, Q&A Dr Kun Yang Reader in Pervasive Networks & Services School of Comp. Science & Electronic Engineering (CSEE), University of Essex, Wivenhoe Park, Colchester, CO4 3SQ, UK Email: kunyang@essex.ac.uk http://privatewww.essex.ac.uk/~kunyang/ p //p / y g/ 65 33