LN-cn04e-Wireless
LN-cn04e-Wireless
LANs: WIRELESS
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 2
Outline
• CDMA
• Communication Issues
• MACA
• Bluetooth
• Broadband Wireless
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 3
Dynamic LANs
• Wireless networks are formed by groups of nodes within “range
of each other”.
• BSS (Basic Service Set) is a group of nodes that coordinate
their access to the medium and forming a BSA (Basic Service
Area), i.e., a geographic area covered by a BSS. Each BSS has
an AP (Access Point)
• A distribution system is being used to extend a set of BSSs to
an ESS (Extended Service Set).
• To join an ESS a node must select an AP and establish an
association with it. The node can reassociate by moving
association to another AP. It disconnects by dissociating.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 4
A B
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 5
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 6
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 7
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 8
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 9
DSSS Example
• If chip code for 0 is 101101 and for 1 is 000111 then
• Sender:
Input Data 0 1 0 0 1
↓ ↓ ↓ ↓ ↓
Chip Code 101101 000111 101101 101101 000111
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 10
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 11
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 12
CDMA
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 13
Sharing a Channel
• A familiar Question:
• How is it possible for both pairs to use the same wire without
interfering with each other?
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 14
Sharing Methods
• Exclusive use of FDMA or TDMA
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 15
CDMA: Idea
• Calls are distinguished along the “code” dimension.
• All calls may operate over the same frequencies and at the
same times, because each transmission in the network is
assigned a unique code
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 16
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 17
CDMA
• Consider a simple example with k = 6.
• It is simplest to write a code as a sequence of
– (+1)s and (−1)s.
• For three users, A, B, C, each of which is communicating with
the same base station receiver, say R. let the codes be
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 18
CDMA Example
• If A wants to send a 1 bit:
A transmits its code as a chip pattern (1, −1, −1, +1, −1, +1).
• If A wants to send a 0 bit:
A transmits the complement (+1s and −1s reversed) of its
code, (−1, +1, +1, −1, +1, −1)
• Something analogous happens with B and C.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 19
CDMA Example
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 20
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 21
CDMA (1/2)
• Each of n users, U , is assigned a vector u ∈ {−1, +1}n .
U ←u
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 22
CDMA (2/2)
• Orthogonality Condition: The vectors assigned to the users
are pairwise orthogonal, i.e. for any users U 6= V ,
n
1X
< u, v >:= ui vi = 0
n i=1
• Hence, also
n
1X
< u, v̄ >:= ui (−vi ) = 0
n i=1
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 23
CDMA Example
• Code assignment
User {0, 1}-Vector {−1, +1}-Vector
A 00011011 a := -1-1-1+1+1-1+1+1
B 00101110 b := -1-1+1-1+1+1+1-1
C 01011100 c := -1+1-1+1+1+1-1-1
D 01000011 d := -1+1-1-1-1-1+1+1
To transmit data sequence 1011:
• A sends: aāaa = 00011011111001000001101100011011
• B sends: bb̄bb = 00101110110100010010111000101110
• etc
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 24
CDMA: Additivity
• Let {bU : U is a user} be the vectors transmitted by the users
on a given transmitted bit b = 1 or b = 0.
• According to our assumptions/definitions this means that
bU = u if b = 1
bU = ū if b = 0
is being transmitted.
• How does a user recover the bit from this sum?
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 25
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 26
• This is because:
– if U 6= V then < u, v >=< u, v̄ >= 0;
– if U = V and bV = v then < u, bV >=< u, v >= 1;
– if U = V and bV = v̄ then < u, bV >=< u, v̄ >= −1;
• In other words, each user V will recover the bit that was sent
to it in encoded form!
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 27
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 28
Communication Issues
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 29
Communication Problems
• Collision Avoidance
• Exposed Node
• Communication Paths
• Asymmetry
• Attenuation
• Power Level
• Interference
• SIR
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 30
Collision Avoidance
• B and C will collide if they transmit at the same time.
A D
B C
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 31
Exposed Node
• C can hear if B sends to A.
• It is a mistake for C to assume that it cannot transmit to D.
A D
B C
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 32
A B C D E F G
A→B→C→D→E→F →G
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 33
A B
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 34
Attenuation
• The farther a transmitter is from its receiver, the higher the
attenuation is, and the more objects there are to obstruct the
path.
• Here, A has a short, clear path to the tower, while B has a long
path that is obstructed by objects (e.g., trees)
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 35
Power Levels
• Transmission power control (TPC) algorithm.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 36
Interference
• Ideally, only the power from the transmitter of a link would be
present at its receiver.
• But this is not the reality: here, some of A’s transmission will
be coupled into B’s receiver, and vice versa.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 37
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 38
MACA
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 39
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 40
MACA Algorithm
• 802.11 uses Multiple Access Collision Avoidance (MACA):
1. Sender sends Request To Send (RTS) message to receiver
that includes how long it wants to hold medium.
2. Receiver responds with Clear To Send (CTS) message.
3. If CTS not received nodes realize after a period of time that
collision occurred, in which case a backoff algorithm is being
used.
4. Receiver sends ACK after receiving.
5. All other nodes must wait for ACK prior to transmitting.
• In practice, it is much more complicated than this!
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 41
Distribution System
A
B
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 42
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 43
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 44
Bluetooth
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 45
iphone
android
scanner
• What protocol should they follow to get connected?
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 46
Bluetooth
• Originally conceived as cable replacement technology.
• Is the first defacto standard for ad hoc networking brought
about by several companies.
• Its particular design is less suited for other applications.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 47
Organization: Piconets
• They are star networks.
• In the leftmost piconet the master has seven slaves, in the
rightmost it has three.
= Master = Slave
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 48
Organization: Piconets
• They are managed by a single master that implements
centralized control over channel access.
• All other participants are called slaves.
• Communication is strictly
master → slave,
and
slave → master.
• Direct slave-to-slave communication is impossible.
• A master has at least one and at most seven slaves.
• Piconets can be enlarged to form scatternets.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 49
Double Personalities
• Roles of Master and Slave:
– Since a slave may want to set up a new piconet or take over
an existing piconet, during the existence of a piconet the
role of master and slave can be switched.
– This is done by employing a different frequency.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 50
= Master
= Bridge = Slave
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 51
Bluetooth Communication
• If you want to communicate with more than eight nodes at the
same time multiplexing is required. Moreover, nodes would
need to alternate between their respective piconets.
• Bluetooth does not provide for slave-to-slave communication
(maybe technology will improve in the future).
To solve this problem one has
1. either to channel traffic through a master (this increases
communication and power consumption)
2. or one of the two slaves could setup its own piconet or even
switch roles with a master.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 52
Scatternet
Scatternets are collections of piconets satisfying the following rules.
1. The scatternet is a connected network formed from piconets.
2. It has masters and slaves. Slaves are of two types:
“pure” slaves (i.e., slaves belonging to a single piconet), and
“bridge” slaves (i.e.. slaves that belong to multiple piconets).
3. Two masters can share only a single slave.
4. A bridge may connect only two piconets.
5. A piconet can have at most seven slaves.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 53
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 54
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 55
Connection Establishment
• Once a unit has discovered another unit, connection
establishment is very fast.
• In an ideal scenario, the expected delay for link formation
(Discovery plus Connection) is about 1 sec when both nodes
follow the uniform distribution between the Inquiry and
InquiryScan.
• In practice this takes several seconds.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 56
Application
Application Profiles
Middleware
Other Service
RFComm Telephony
LLC Discovery
Audio Control
Logical Link Control Adaptaion
DLC
Link Manager
Baseband
Physical
Physical Radio
The Radio layer moves bits from master to slave. The baseband
resempbles the MAC sublayer.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 57
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 58
Broadband Wireless
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 59
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 60
Upper Layers
Service Specific
MAC Sublayer (Common Part) DLC
Security Sublayer
Transmission Convergence Sublayer Physical
Physical QPSK QAM−16 QAM−64 Layer
Medium
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 61
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 62
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 63
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 64
WiMax
• The name ”WiMAX” was created by the WiMAX Forum,
which was formed in June 2001 to promote conformity and
interoperability of the standard.
• WiMAX (Worldwide Interoperability for Microwave Access) is
a trademark for a family of telecommunications protocols that
provide fixed and mobile Internet access.
• The 2005 WiMAX revision provided bit rates up to 40 Mbit/s
with the 2011 update up to 1 Gbit/s for fixed stations.
• WiMAX is a standards-based technology enabling the delivery
of last mile wireless broadband access as an alternative to cable
and DSL.
• WiMax requires special antennae and Network Interface Cards.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 65
LTE Wireless
• Long Term Evolution (LTE) is a standard for wireless
communication of high-speed data.
• Goal of LTE is to increase the capacity and speed of wireless
data networks utilizing cutting-edge hardware and DSP
techniques that have recently been developed.
• Its wireless interface is incompatible with 2G and 3G networks,
and so it must be operated on separate wireless spectrum.
• LTE includes an all-IP flat network architecture, end-to-end
QoS including provisions for low-latency communications, peak
download rates nearing 300 Mbps and upload rates of 75 Mbps,
capacity exceeding 200 active users per cell, the ability to
manage fast-moving mobiles, and support for multi-cast and
broadcast streams.
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 66
Satellite Based
• Satellite based services deliver broadband to customers in the
US and Canada.
• ViaSat (a recent satellite) with a total data throughput of some
140 Gbps, the satellite has more capacity than all other
commercial communications satellites over North America
combined.
• This is a wave of new satellites operating in the Ka-band, a
part of the satellite-apportioned radio spectrum that allows
high data-rates (download range of 8-12 Mbps)
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 67
Exercisesa
1. What are the differences between TDMA, FDMA, and CDMA.
2. Can you devise an algorithm for sharing a given bandwidth
both with TDMA and FDMA? Give details of how it would
work.
3. What are the difference between Multiple Access Collision
Avoidance and Multiple Access Collision Detections? Why do
they have to be different?
4. Compute
(a) the inner product of the vectors
u := (−1, +1, +1, +1, −1, −1),
v := (+1, +1, −1, +1, −1, +1),
(b) and the complements ū, v̄, where u, v are as above.
a Not to submit!
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 68
November 7, 2019
Principles of Computer Networks, COMP 3203. Evangelos Kranakis, Carleton University, SCS 69
November 7, 2019