1 / 66

Chapter 2 Part II: Wireless Transmission Fundamentals

Chapter 2 Part II: Wireless Transmission Fundamentals. Electromagnetic Spectrum Wireless Propagation Models Digital Modulation Techniques Multiple Access Performance Issues Cellular and Ad Hoc Concepts Link Budget Analysis. Electromagnetic Waves.

tamar
Download Presentation

Chapter 2 Part II: Wireless Transmission Fundamentals

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 2Part II: Wireless Transmission Fundamentals Electromagnetic Spectrum Wireless Propagation Models Digital Modulation Techniques Multiple Access Performance Issues Cellular and Ad Hoc Concepts Link Budget Analysis

  2. Electromagnetic Waves • predicted by British physicist James Maxwell in 1865, and observed by German physicist Heinrich Hertz in 1887 • These waves are created by the movement of electrons and have the ability to propagate through space. • using appropriate antennas, transmission and reception of electromagnetic waves through space becomes feasible. • the speed of electron vibration determines the wave’s frequency. • Hertz: how many times the wave is repeated in 1 sec. (to honor Heinrich Hertz)

  3. Wavelength and Amplitude • l = wavelength, f = frequency, c = speed of light

  4. Electromagnetic Spectrum • spectrum: range of electromagnetic radiation • band: spectrum parts

  5. Radio Waves • HF band enables worldwide transmission: • HF signals are reflected off the ionosphere and thus can travel very large distances

  6. Microwaves • small wavelengths compared to radio waves • easily attenuated by objects

  7. Infrared • emitted by very hot objects • such as human body (night vision applications) • frequency depends on the temperature of the emitting body • line-of-sight, point-to-point • of no use outdoors (interfered by heat of sun) • short-rang: 10 meters • IrDA: Infrared Data Association

  8. Microwave and Infrared Bands • Most wireless networking traffic is in the microwave frequency bands. • some licensed, some unlicensed • Infrared: • for short-range wireless communication

  9. Spectrum Regulation • ITU = Int’l Telecommunications Union • a worldwide spectrum regulation org. • the world is split into 3 parts: • American continent • Europe, Africa, and former Soviet union • rest of Asia and Oceania • Rules of assigning spectrum • lottery • auction • comparative bidding • such as pricing, technology, etc.

  10. Licensed Microwave Band • Examples: cellular, paging, PCS • Use of a license is typically in an order of 10 years. • A company can’t have the license and not use it. • Bandwidth is regarded as a resource that the public wants and needs.

  11. Unlicensed Microwave Band • Also on the same microwave band, but no license required. • To avoid interfering primary (licensed) users, spreading spectrum is required. • Two types: • FHSS: Frequency-hopping spread spectrum • DSSS: Direct sequence spread spectrum • Also known as ISM band. • industrial, scientific, and medical

  12. Model of Wireless Propagation Free space path loss Doppler shift Slow/fast fading Error modeling

  13. Shannon’s Formula • an upper bound on the bit rate W of any channel of bandwidth H Hz: W = H log2(1 + S/N) S/N = signal to thermal noise ratio • However, in real world, the upper bound is difficult to achieve due to: • free space path loss • proportional to r-2, where r is the distance between transmitter and receiver (sometimes at higher exponent) • Doppler shift • a signal transmitter and receiver are moving relative to one another • slow/fast fading

  14. Slow Fading

  15. Definitions • Reflection: • when an electromagnetic wave falls on an object with dimension very large compared to the wave’s wavelength • Scattering: • when obstructed by objects with dimensions in the order of the wavelength • Diffraction (or shadowing): • when the wave falls on an impenetrable object • in which case, the secondary waves are formed behind the obstructing body

  16. Fast Fading: Multipath Effect • waves traveling along different paths may be completely out of phase when they reach the antenna (thereby canceling each other)

  17. Multipath propagation delay can degrade performance in indoor/outdoor environment. • When the path length differences are short, the effect is smaller. • multipath fading is also referred as fast fading • When LOS (line of sight) exists, this kind of fading is known as Ricean Fading • When LOS does not exist, this kind of fading is known as Rayleigh Fading

  18. We say that the relative strength of signal x, P(x), to that of signal y, P(y), is D dB, if D = 10 log10(P(x)/P(y)) In free space, the average path loss (PL) at a distance of r is (in dB): PL(r) = PL(r0) + 10n log(r/r0) r0 = reference distance (typically 1 Km for macrocells; and 100 m for microcells) n = environmental factor (typically >= 2) To take into account of the shadowing effect PL(r) = PL(r0) + 10n log(r/r0) + Xd Xd = zero-mean Gaussian random variable with standard deviation d Propagation Models

  19. Digital Modulation Techniques Binary Modulation Phase Shift Keying Minimum Shift Keying p/4-Shifted QPSK

  20. Basics • Convert digital stream into the analog signal A(t)cos(wt + ), where w = 2f. • The characteristics in this formulation that may be changed are: • amplitude • frequency • phase • Ex: ASK = amplitude shift keying; FSK = frequency shift keying; PSK = phase shift keying

  21. Most systems modulate the information onto a carrier centered in a (small) allocated spectrum.

  22. Binary Modulation Scheme • Amplitude Shift Keying (ASK): • using ON/OFF to represent 1/0 • “keying”: like a telegraph key • Frequency Shift Keying (FSK): • 1/0 represented by two different frequencies separated by some distance

  23. Binary Phase Shift Keying • Binary Phase Shift Keying (BPSK) • use alternative sine wave phases to encode bits • simple to implement • very robust, used extensively in satellite communications

  24. Quarternary Phase Shift Keying • QPSK: • multi-level modulation: 2 bits per symbol • more spectrally efficient, more complex receiver

  25. Differential PSK (DPSK) • 1 = changing the phase relative to the previous symbol by some amount • 0 = having the same phase as the previous symbol • adv: self-clocked

  26. coding by bit pairs varying the phase of the current bit pair to the phase of the previous bit pair by a multiple of /4 example: 101001 (Fig. 2.27) (i.e., -p/4, -p/4, +5p/4) /4-Shifted QPSK

  27. Hybrid of PSK + ASK • QAM = Quadrate Amplitude Modulation • mixture of PSK and ASK • 3 bits at a time

  28. Multiple Access defining how nodes in a wireless network to share a common medium

  29. Objectives • MAC layer is to define how a user access a channel when he needs one. • Random access: ALOHA and CSMA • Ordered access: Token bus and Token Ring • Deterministic access: FDMA, TDMA, and CDMA • Combinations: TDMA-over-FDMA, TDD-CDMA, and TDMA/CSMA

  30. FDMA • frequency division multiple access ** NMT = nordic Mobile Telephony

  31. TDMA • time division multiple access

  32. CDMA • code division multiple access • each station has a “station code” • each bit is encoded by station code • code 1 is mapped to 1 • code 0 is mapped to -1

  33. ALOHA • A type of packet-radio network. • The first well-known wireless network as well as network system. • Very simple, but not efficient! • Variations: • pure-ALOHA: whenever desired, send the packet • slotted-ALOHA: further divide time axis into slots

  34. CSMA • Before sending, sense the carrier.

  35. Persistent and Non-persistent CSMA • Persistent CSMA: • when the medium is busy, a station can persistently wait for the medium to become idle, and then transmit with a probability p • This is called 1-persistent or p-persistent CSMA. • Non-persistent CSMA: • A station can stop monitoring the wireless medium, and listen to the medium again at predefined time.

  36. Hidden-Node Problem • CSMA has the following problem: • when two nodes are too far away, carrier sensing is difficult

  37. CSMA/CA • CA = collision avoidance • sender first does carrier sense • sender broadcasts RTS (request to send) to receiver • receiver broadcasts CTS (clear to send) to sender • then send data packet • Q: Is CSMA/CD possible in wireless network?

  38. Ordered MAC Techniques • Can a token-ring or token-bus protocol be applied to a wireless network? • Problems: • mobility (nodes joining or leaving the ring) • token loss

  39. Comparison and Summary • Random access: CSMA • under light load: fast response time • under heavy load: throughput declines • simplicity • Deterministic protocols: TDMA, FDMA • guaranteed bandwidth • larger average delay • small delay variance • Hybrid: CSMA/TDMA • adaptive, higher overhead

  40. Spread Spectrum FHSS DSSS

  41. Spread Spectrum Technology • Spread spectrum must be used in ISM band. • Two major technologies: • Frequency Hopping SS (FHSS) • Direct Sequence SS (DSSS) • Located at the PHY of the network stack:

  42. Most Wireless LANs use the ISM bands as secondary users. They must use SS in order not to interfere with the primary users. FHSS: send info in different frequencies on different time slots. Hopping Pattern In each time slot, the occupied frequencies are separated by some distance to avoid interference. FHSS

  43. FHSS is different from FDM (frequency division multiplexing). • Example: (Fig. 4.7) • In the 2.4 GHz band of ISM, we have a space of 80 MHz. (2400~2483MHz) • A typical bandwidth of the information signal is 1 MHz. • Maximum occupancy is 1MHz regulated by FCC. • One time slot = 0.1 sec.

  44. Primary vs. Secondary Users • In FHSS, a typical power limit is 1 watt. • For primary users, the power limit is much larger. • So the interference from FHSS will not be noticeable primary users. • For FHSS secondary user, • when there is 1 primary user  there will be a throughput loss of 1/80 = 1.25%; • when there are 2 primary users  there will be a throughput loss of 2/80 = 2.5%. • fig 4.8

  45. primary user primary user

  46. DSSS • The input data stream is transferred to a chip stream that is x times higher by XOR. • a chip is 0 or 1, but is called so to distinguish from a bit • example: x = 11, 13, 15, 16 chips/bit

  47. The frequency spectrum is spread out and the spectral energy is x times lower. • It’s so low that primary users are not interfered.

  48. Comparison of Interference • Degradation due to existence of interference: • FHSS: linear to the level of interference • DSSS: • degraded by half after a certain point (since it typically occupies 50% of the bandwidth) • won’t work after a certain level

More Related