Professional Documents
Culture Documents
Electromagnetic Spectrum
Wireless Propagation Models
Digital Modulation Techniques
Multiple Access
Performance Issues
Cellular and Ad Hoc Concepts
Link Budget Analysis tseng:1
Electromagnetic Waves
predicted by British physicist James Maxwell in
1865, and observed by German physicist Heinrich
Hertz in 1887
These waves are created by the movement of
electrons and have the ability to propagate through
space.
using appropriate antennas, transmission and reception
of electromagnetic waves through space becomes
feasible.
the speed of electron vibration determines the wave’s
frequency.
Hertz: how many times the wave is repeated in 1
sec. (to honor Heinrich Hertz)
tseng:2
Wavelength and Amplitude
l = wavelength, f = frequency, c = speed of
light
tseng:3
Electromagnetic Spectrum
spectrum: range of electromagnetic
radiation
band: spectrum parts
tseng:4
Radio Waves
tseng:6
Infrared
emitted by very hot objects
such as human body (night vision applications)
frequency depends on the temperature of the
emitting body
line-of-sight, point-to-point
of no use outdoors (interfered by heat of sun)
short-rang: 10 meters
IrDA: Infrared Data Association
tseng:7
Microwave and Infrared Bands
Most wireless networking traffic is in the
microwave frequency bands.
some licensed, some unlicensed
Infrared:
for short-range wireless communication
tseng:8
Spectrum Regulation
ITU = Int’l Telecommunications Union
a worldwide spectrum regulation org.
the world is split into 3 parts:
American continent
Europe, Africa, and former Soviet union
rest of Asia and Oceania
Rules of assigning spectrum
lottery
auction
comparative bidding
such as pricing, technology, etc.
tseng:9
Licensed Microwave Band
Examples: cellular, paging, PCS
Use of a license is typically in an order of
10 years.
A company can’t have the license and not use
it.
Bandwidth is regarded as a resource that the
public wants and needs.
tseng:10
Unlicensed Microwave Band
Also on the same microwave band, but no
license required.
To avoid interfering primary (licensed) users,
spreading spectrum is required.
Two types:
FHSS: Frequency-hopping spread spectrum
DSSS: Direct sequence spread spectrum
Also known as ISM band.
industrial, scientific, and medical
tseng:11
Model of Wireless Propagation
tseng:14
Definitions
Reflection:
when an electromagnetic wave falls on an
object with dimension very large compared to
the wave’s wavelength
Scattering:
when obstructed by objects with dimensions in
the order of the wavelength
Diffraction (or shadowing):
when the wave falls on an impenetrable object
in which case, the secondary waves are formed
behind the obstructing body
tseng:15
Fast Fading: Multipath Effect
waves traveling along different paths may
be completely out of phase when they reach
the antenna (thereby canceling each other)
tseng:16
Multipath propagation delay can degrade
performance in indoor/outdoor environment.
When the path length differences are short, the
effect is smaller.
multipath fading is also referred as fast fading
When LOS (line of sight) exists, this kind of
fading is known as Ricean Fading
When LOS does not exist, this kind of fading is
known as Rayleigh Fading
tseng:17
Propagation Models
We say that the relative strength To take into account of the
of signal x, P(x), to that of signal shadowing effect
y, P(y), is D dB, if
PL(r) = PL(r0) +
D = 10 log10(P(x)/P(y))
10n
In free space, the average path log(r/r0) + X
loss (PL) at a distance of r is (in
dB): X = zero-mean Gaussian
PL(r) = PL(r0) + random variable with
standard deviation
10n
log(r/r0)
r0 = reference distance
(typically 1 Km for
macrocells; and 100 m for
microcells)
n = environmental factor
(typically >= 2)
tseng:18
Digital Modulation Techniques
Binary Modulation
Phase Shift Keying
Minimum Shift Keying
/4-Shifted QPSK
tseng:19
Basics
Convert digital stream into the analog signal
A(t)cos(wt + ), where w = 2f.
The characteristics in this formulation that
may be changed are:
amplitude
frequency
phase
Ex: ASK = amplitude shift keying; FSK =
frequency shift keying; PSK = phase shift
keying
tseng:20
Most systems modulate the information
onto a carrier centered in a (small) allocated
spectrum.
tseng:21
tseng:22
Binary Modulation Scheme
Amplitude Shift Keying (ASK):
using ON/OFF to represent 1/0
“keying”: like a telegraph key
Frequency Shift Keying (FSK):
1/0 represented by two different frequencies
separated by some distance
tseng:23
Binary Phase Shift Keying
Binary Phase Shift Keying (BPSK)
use alternative sine wave phases to encode bits
simple to implement
very robust, used extensively in satellite
communications
tseng:24
Quarternary Phase Shift Keying
QPSK:
multi-level modulation: 2 bits per symbol
more spectrally efficient, more complex
receiver
tseng:25
Differential PSK (DPSK)
1 = changing the phase relative to the
previous symbol by some amount
0 = having the same phase as the previous
symbol
adv: self-clocked
tseng:26
/4-Shifted QPSK
coding by bit pairs
varying the phase of the
current bit pair to the
phase of the previous bit
pair by a multiple of /4
example:
10 10 01 (Fig. 2.27)
(i.e., -/4, -/4, +5/4)
tseng:27
Hybrid of PSK + ASK
QAM = Quadrate Amplitude Modulation
mixture of PSK and ASK
3 bits at a time
tseng:28
Multiple Access
tseng:29
Objectives
MAC layer is to define how a user access a
channel when he needs one.
Random access: ALOHA and CSMA
Ordered access: Token bus and Token Ring
Deterministic access: FDMA, TDMA, and
CDMA
Combinations: TDMA-over-FDMA, TDD-
CDMA, and TDMA/CSMA
tseng:30
FDMA
frequency division multiple access
tseng:32
CDMA
code division multiple access
each station has a “station code”
each bit is encoded by station code
code 1 is mapped to 1
code 0 is mapped to -1
tseng:33
ALOHA
A type of packet-radio network.
The first well-known wireless network as
well as network system.
Very simple, but not efficient!
Variations:
pure-ALOHA: whenever desired, send the
packet
slotted-ALOHA: further divide time axis into
slots
tseng:34
CSMA
Before sending, sense the carrier.
tseng:35
Persistent and Non-persistent CSMA
Persistent CSMA:
when the medium is busy, a station can
persistently wait for the medium to become
idle, and then transmit with a probability p
This is called 1-persistent or p-persistent
CSMA.
Non-persistent CSMA:
A station can stop monitoring the wireless
medium, and listen to the medium again at
predefined time.
tseng:36
Hidden-Node Problem
CSMA has the following problem:
when two nodes are too far away, carrier
sensing is difficult
tseng:37
CSMA/CA
CA = collision avoidance
sender first does carrier sense
sender broadcasts RTS (request to send) to
receiver
receiver broadcasts CTS (clear to send) to
sender
then send data packet
tseng:38
tseng:39
Ordered MAC Techniques
Can a token-ring or token-bus protocol be
applied to a wireless network?
Problems:
mobility (nodes joining or leaving the ring)
token loss
tseng:40
Comparison and Summary
Random access: CSMA
under light load: fast response time
under heavy load: throughput declines
simplicity
Deterministic protocols: TDMA, FDMA
guaranteed bandwidth
larger average delay
small delay variance
Hybrid: CSMA/TDMA
adaptive, higher overhead
tseng:41
Spread Spectrum
FHSS
DSSS
tseng:42
Spread Spectrum Technology
Spread spectrum must be used in ISM band.
Two major technologies:
Frequency Hopping SS (FHSS)
Direct Sequence SS (DSSS)
Located at the PHY of the network stack:
tseng:43
FHSS
Most Wireless LANs Hopping Pattern
use the ISM bands as In each time slot, the
secondary users. occupied frequencies
They must use SS in are separated by some
order not to interfere distance to avoid
with the primary
interference.
users.
FHSS: send info in
different frequencies
on different time slots.
tseng:44
FHSS is different from FDM (frequency
division multiplexing).
Example: (Fig. 4.7)
In the 2.4 GHz band of ISM, we have a space
of 80 MHz. (2400~2483MHz)
A typical bandwidth of the information signal
is 1 MHz.
Maximum occupancy is 1MHz regulated by FCC.
One time slot = 0.1 sec.
tseng:45
Primary vs. Secondary Users
In FHSS, a typical power limit is 1 watt.
For primary users, the power limit is much larger.
So the interference from FHSS will not be noticeable
primary users.
For FHSS secondary user,
when there is 1 primary user there will be a
throughput loss of 1/80 = 1.25%;
when there are 2 primary users there will be a
throughput loss of 2/80 = 2.5%.
fig 4.8
tseng:46
primary
user
primary
user
tseng:47
DSSS
The input data stream is transferred to a
chip stream that is x times higher by XOR.
a chip is 0 or 1, but is called so to distinguish
from a bit
example: x = 11, 13, 15, 16 chips/bit
tseng:48
The frequency spectrum is spread out and
the spectral energy is x times lower.
It’s so low that primary users are not
interfered.
tseng:49
Comparison of Interference
Degradation due to existence of
interference:
FHSS: linear to the level of interference
DSSS:
degraded by half after a certain point (since it
typically occupies 50% of the bandwidth)
won’t work after a certain level
tseng:50
tseng:51
tseng:52
Link Budget Analysis
tseng:53
Communication Basics
When evaluating a wireless link, there are 3
most important questions to be answered:
How much radio frequency (RF) power is
available?
How much bandwidth is available?
What is the required reliability?
evaluated by BER (bit error rate)
tseng:54
Link Budget Example 1
Wireless Link to Modem
required rate: 40 Kbps (28.8 Kbps plus
framing, overhead, checksum)
range: 5 meters
BER: 10-6
tseng:55
Choices of Technology:
900 MHz
2.4GHz and 5GHz are not selected since the
required rate is low.
no spread spectrum
since low transmission power is sufficient for 5
meters
Orthogonal FSK
simplicity: two separated frequencies (one for “1”
and the other for “0”)
separated by 40 kHz (called “orthogonal” since
frequency-separation/bit-rate = 1)
tseng:56
Link Budget Example 2
Wireless USB
required data rate = 2 Mbps (1.408 Mbps plus
framing, overhead, and checksum)
range = 30 meters
BER = 10-6
tseng:57
Selection of Technologies:
ISM band in 2.4 GHz (with 83MHz of band to
use)
DSSS spreading to support long distance
transmission
will occupy 2 x 11 = 22 MHz of bandwidth due to
spreading
DQPSK (differential quadrature phase shift
keyed) modulation
tseng:58
Performance Increasing Techniques
for Wireless Networks
antenna diversity
coding
power control
tseng:59
Diversity
definition:
to send multiple copies of the same
information signal through several channels
goal:
to combat fading in wireless channels
example:
time, frequency, antenna
tseng:60
Antenna Diversity
also known as space diversity
method
a set of array elements (also referred to as
branches), spaced sufficiently apart from each
other
usually 2 elements
can combat multipath fading
because multipath fading is usually
independent at distances in the order of
channel’s wavelength
tseng:61
Example
a 2-branch diversity system
a number of algorithms have been proposed to
reconstruct the original transmission
ex: pick the strongest signal from one of the
antennas
tseng:62
Smart Antennas
multi-antennas that change in order to adapt
to the conditions of wireless channels
can focus toward the receivers
can focus to the transmitters
also known as beamforming
Already available for
several years
not widely used due to costs
tseng:63
Coding
Parity check
Hamming code
Cyclic redundancy check (CRC)
tseng:64
Power Control
properly tuning the transmission power to
reduce coverage and interference
tseng:65
Summary
What have we discussed?
Electromagnetic Spectrum
Wireless Propagation Models
Digital Modulation Techniques
Multiple Access
Performance Issues
Cellular and Ad Hoc Concepts
Link Budget Analysis
Performance Improvement Techniques
tseng:66