Top Banner
Background of Wireless Communication Wireless Communication Technology Wireless Networking and Mobile IP Wireless Local Area Networks Wireless Communication Systems Physical Layer Physical Layer Wireless Personal Area Networks Wireless Metropolitan Area Networks Wireless Wide Area Networks
50

Wireless Communication Systems

Mar 15, 2016

Download

Documents

martin-spears

Wireless Communication Systems. Background of Wireless Communication. Wireless Communication Technology. Wireless Networking and Mobile IP. Wireless Local Area Networks. Wireless Personal Area Networks. Wireless Metropolitan Area Networks. Wireless Wide Area Networks. Physical Layer. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wireless Communication Systems

Background of Wireless Communication

Wireless Communication Technology

Wireless Networking and Mobile IP

Wireless Local Area Networks

Wireless Communication Systems

Physical LayerPhysical Layer

Wireless Personal Area Networks

Wireless Metropolitan Area Networks

Wireless Wide Area Networks

Page 2: Wireless Communication Systems

Overview Random Contention Access Distributed Coordination Function

(DCF) 802.11 Contention Window 802.11 Adaptive Contention Window DCF Protocol Issues Virtual Carrier Sense Physical Carrier Sense Mechanisms Exposed Terminal Problem Double Exposed Terminal Problem Point Coordination Function (PCF)

Physical Properties of Wireless Frequency & Public Use Bands Free-space Path-loss Path-loss Exponents Multi-path Propagation Multi-Path Effect Digital Modulation Examples of Digital Modulation Multi-transmitter Interference Symbol Rate & Bandwidth Thermal Noise Multi-transmitter Interference

Problem Medium Access Control

CSMA, CSMA-CD, CSMA/CA

Page 3: Wireless Communication Systems

Physical Properties of Wireless

Makes wireless network different from wired networks

Should be taken into account by all layers

Page 4: Wireless Communication Systems

Wireless = Waves

Electromagnetic radiation Emitted by sinusoidal current running through a wire

(transmitting antenna) Creates propagating sinusoidal magnetic and electric fields

according to Maxwell’s equations:

Fields induce current in receiving antenna

Page 5: Wireless Communication Systems

Wave Propagation Example

electricfield

magneticfield

propagation direction

Page 6: Wireless Communication Systems

Frequency & Public Use Bands

Propagating sinusoidal wave with some frequency/wavelength

C (speed of light) = 3x108 m/s

Name 900 Mhz 2.4 Ghz 5 Ghz

Range 902 - 928 2.4 - 2.4835 5.15 - 5.35

Bandwidth 26 Mhz 83.5 Mhz 200 Mhz

Wavelength .33m / 13.1” .125m / 4.9” .06 m / 2.4”

cf

Page 7: Wireless Communication Systems

Free-space Path-loss

Power of wireless transmission reduces with square of distance (due to surface area increase of sphere)

Reduction also depends on wavelength Long wave length (low frequency) has less loss Short wave length (high frequency) has more loss

24

DPL

Page 8: Wireless Communication Systems

Other Path-loss Exponents

Path-Loss Exponent depends on environment:

Free space 2 Urban area cellular2.7 to 3.5 Shadowed urban cell 3 to 5 In building LOS 1.6 to 1.8 Obstructed in building 4 to 6 Obstructed in factories 2 to 3

Page 9: Wireless Communication Systems

Multi-path Propagation

Electromagnetic waves bounce off of conductive (metal) objects

Reflected waves received along with direct wave

Page 10: Wireless Communication Systems

Multi-Path Effect

Multi-path components are delayed depending on path length (delay spread)

Phase shift causes frequency dependent constructive / destructive interference

Am

plitu

de

Time

Am

plitu

de

Frequency

Page 11: Wireless Communication Systems

Digital Modulation

Modulation allows the wave to carry information by adjusting its properties in a time varying way Amplitude Frequency Phase

Digital modulation using discrete “steps” so that information can be recovered despite noise/interference

Page 12: Wireless Communication Systems

Examples of Digital Modulation

BPSK QPSK ODFM

Digital modulation Practical examples BFSK - Mote Sensor Networks QPSK - 2 Mbps 802.11 & CMDA(IS-95)

Page 13: Wireless Communication Systems

Multi-transmitter Interference

Similar to multi-path Two transmitting stations will

constructively/destructively interfere with each other at the receiver

Receiver will “hear” the sum of the two signals, which usually means garbage

Page 14: Wireless Communication Systems

Symbol Rate & Bandwidth

Modulation allows transmission of one of several possible symbols

Data stream is encoded by transmitting several symbols in succession

Symbol rate ≈ bandwidth Throughput (bits/sec) Spectrum usage (Hz)

Inter-symbol interference (ISI) occurs unless delay spread << symbol time

Page 15: Wireless Communication Systems

Thermal Noise

Ever-present thermal noise in wireless medium Sums with any wireless transmission Potentially causes errors in reception (digital) or

degradation of quality (analog) Effectively limits transmission range when

transmitting signal strength falls below noise floor

Page 16: Wireless Communication Systems

Noise Limits Transmitting Distance

+

+

=

=

Short range transmission (low path loss)

Long range transmission (high path loss)

Signal to Noise Ratio(SNR)

High

Low

Page 17: Wireless Communication Systems

Physical Channel Properties Review

Wireless signal strength Transmit power Loss over distance (falls off by d2) Shadowing (e.g. absorption by walls) Multi-path (e.g. bouncing off of metal objects)

Noise Thermal noise floor Environmental noise (e.g. microwave ovens)

Channel quality Related to signal to noise ratio

Page 18: Wireless Communication Systems

Multi-transmitter Interference Problem

Similar to multi-path or noise Two transmitting stations will

constructively/destructively interfere with each other at the receiver

Receiver will “hear” the sum of the two signals (which usually means garbage)

Page 19: Wireless Communication Systems

Medium Access Methods

The 802.11 standard ensures that all stations, both radio-based network interface cards (NICs) and access points, implement access methods for sharing the air medium.

When installing wireless LANs (WLAN), most people don't give much thought to these mechanisms.

A solid understanding of 802.11's medium access methods, will enable us to deal more effectively with issues such as radio frequency interference, denial of services attacks and throughput issues.

Page 20: Wireless Communication Systems

Medium Access Control (MAC)

Protocol required to coordinate access i.e. transmitters must take turns

Similar to talking in a crowded room

Also similar to hub based Ethernet

Page 21: Wireless Communication Systems

Carrier Sense Multiple Access (CSMA)

Procedure Listen to medium and wait until it is free (no one

else is talking) Wait a random back off time then start talking

Advantages Fairly simple to implement Functional scheme that works

Disadvantages Can not recover from a collision

(inefficient waste of medium time)

Page 22: Wireless Communication Systems

Carrier Sense Multiple Accesswith Collision Detection (CSMA-CD) Procedure

Listen to medium and wait until it is free Then start talking, but listen to see if someone else starts

talking too If a collision occurs, stop and then start talking after a random

back off time This scheme is used for hub based Ethernet Advantages

More efficient than basic CSMA Disadvantages

Requires ability to detect collisions

Page 23: Wireless Communication Systems

Collision Detection Problem

Transmit signal is MUCH stronger than received signal

Due to high path loss in the wireless environment

Impossible to “listen” while transmitting because you will drown out anything you hear

Also transmitter may not even have much of a signal to detect due to geometry

Page 24: Wireless Communication Systems

Carrier Sense Multiple Accesswith Collision Avoidance (CSMA-CA)

Procedure Similar to CSMA but instead of sending packets

control frames are exchanged RTS = request to send CTS = clear to send DATA = actual packet ACK = acknowledgement

Page 25: Wireless Communication Systems

Carrier Sense Multiple Accesswith Collision Avoidance (CSMA-CA)

Advantages Small control frames lessen the cost of collisions

(when data is large) RTS + CTS provide “virtual” carrier sense protects

against hidden terminal collisions (where A can’t hear B)

A B

Page 26: Wireless Communication Systems

Carrier Sense Multiple Accesswith Collision Avoidance (CSMA-CA)

Disadvantages Not as efficient as CSMA-CD Doesn’t solve all the problems of MAC in wireless

networks

Page 27: Wireless Communication Systems

Random Contention Access Slotted contention period

Used by all carrier sense variants Provides random access to the channel

Operation Each node selects a random back off number Waits that number of slots monitoring the channel If channel stays idle and reaches zero then transmit If channel becomes active wait until transmission

is over then start counting again

Page 28: Wireless Communication Systems

Distributed Coordination Function (DCF)

The 802.11 standard makes it mandatory that all stations implement the DCF, a form of carrier sense multiple access with collision avoidance (CSMA/CA).

CSMA is a contention-based protocol making certain that all stations first sense the medium before transmitting.

The main goal is to avoid having stations transmit at the same time, which results in collisions and corresponding retransmissions.

Page 29: Wireless Communication Systems

Distributed Coordination Function (DCF)

If a station wanting to send a frame senses energy above a specific threshold on the medium (which could mean the transmission of another station), the station wanting access will wait until the medium is idle before transmitting the frame.

The collision avoidance aspect of the protocol pertains to the use of acknowledgements that a receiving station send to the sending station to verify error-free reception.

Think of this process of accessing the medium as a meeting where everyone is polite and each person only speaks when no one else is talking.

In addition, everyone who understands what the person is saying nods their head in agreement.

Page 30: Wireless Communication Systems

Distributed Coordination Function (DCF)

The DCF protocol is somewhat more complex than this, though.

For example, an 802.11 station utilizes information it gains from other frames that stations are sending over the wireless network.

In the control field of each frame, there is a duration field that a sending station places a value in, to indicate how long the station will require the medium.

As part of making a decision on whether to transmit a frame, a station must see that the time associated with the duration value of the last frame sent has expired, as well as sense that no physical transmission is taking place.

The duration field enables stations to reserve the medium for subsequent frames of some specific 802.11-defined frame exchanges (e.g. RTS/CTS)

Page 31: Wireless Communication Systems

802.11 DCF Example with Backoff

data

waitB1 = 5

B2 = 15

B1 = 25

B2 = 20

data

wait

B1 and B2 are backoff intervalsat nodes 1 and 2cw = 31

B2 = 10

Page 32: Wireless Communication Systems

802.11 Contention Window Random number selected from [0,cw] Small value for cw

Less wasted idle slots time Large number of collisions with multiple senders (two or

more stations reach zero at once) Optimal cw for known number of contenders & know packet

size Tricky to implement because number of contenders is

difficult to estimate and can be VERY dynamic

Page 33: Wireless Communication Systems

802.11 Adaptive Contention Window

802.11 adaptively sets cw Starts with cw = 31 If no CTS or ACK then increase to 2*cw+1 (63, 127, 255) Reset to 31 on successful transmission

802.11 adaptive scheme is unfair Under contention, unlucky nodes will use larger cw than

lucky nodes (due to straight reset after a success) Lucky nodes may be able to transmit several packets while

unlucky nodes are counting down for access Fair schemes should use same cw for all contending nodes

(better for high congestion too)

Page 34: Wireless Communication Systems

802.11 DCF (CSMA-CA)

Full exchange with “virtual” carrier sense(called the Network Allocation Vector)

RTS

CTS

DATA

ACK

Sender

Receiver

Sender Receiver

A B

A

B

NAV (RTS)

NAV (CTS)

Page 35: Wireless Communication Systems

802.11 DCF (CSMA-CA)

Because of its nature, DCF supports the transmission of asynchronous signals.

A distinguishing factor of asynchronous signaling is that there are no timing requirements between data carrying frames.

For example, the DCF protocol doesn't make any attempt to deliver a series of data frames within any timeframe or at any instant in time.

As a result, there is a random amount of delay between each data frame transmission.

This form of synchronization is effective for network applications, such as e-mail, Web browsing and VPN access to corporate applications.

Page 36: Wireless Communication Systems

DCF Protocol Issues

The DCF protocol is the heart of many WLAN troubles. RF Interference is probably the biggest problem. If a source of RF interference (e.g., cordless phone or other

WLAN) is present, the DCF can block stations from transmitting for as long as the interfering signal is present.

The stations sense enough energy on the medium and wait patiently, in most cases for just a few seconds or minutes.

This causes the throughput of the network to drop significantly.

That's why you should perform an RF site survey in the facility before installing a WLAN.

Page 37: Wireless Communication Systems

DCF Protocol Issues

Similar to the impact of typical RF interference, someone could implement a denial of service attack, which is a deliberate action to instill RF interference at a level high enough to block a majority of the stations from transmitting.

Again, all of the stations will not transmit because they respectfully follow the DCF protocol.

Page 38: Wireless Communication Systems

DCF Protocol Issues

Similar to the impact of typical RF interference, someone could implement a denial of service attack, which is a deliberate action to instill RF interference at a level high enough to block a majority of the stations from transmitting.

Again, all of the stations will not transmit because they respectfully follow the DCF protocol.

Instead of lasting for only a few seconds, a denial of service attack could be planned in a way to corrupt the network for hours or days until the jamming source is found.

This type of attack will generally cause the network to be useless (i.e., throughput equal to zero).

In order to reduce this impact, maximize the use of directional antennas to minimize the reception of RF signals from outside the facility where someone could attack them with a high-powered jamming device

Page 39: Wireless Communication Systems

Virtual Carrier Sense

Provided by RTS & CTS Designed to protect against hidden terminal collisions

(when C can’t receive from A and might start transmitting)

However this is unnecessary most of the time due to physical carrier sense

A B C

RTS CTS

Page 40: Wireless Communication Systems

Physical Carrier Sense Mechanisms

Energy detection threshold Monitors channel during “idle” times between packets to

measure the noise floor Energy levels above the noise floor by a threshold trigger carrier

sense DSSS correlation threshold

Monitors the channel for Direct Sequence Spread Spectrum (DSSS) coded signal

Triggers carrier sense if the correlation peak is above a threshold More sensitive than energy detection (but only works for 802.11

transmissions) High BER disrupts transmission but not detection

Page 41: Wireless Communication Systems

Physical Carrier Sense Range

Carrier can be sensed at lower levels than packets can be received Results in larger carrier sense

range than transmission range

Long carrier sense range helps protect from interferenceReceive Range

Carrier Sense Range

Page 42: Wireless Communication Systems

Hidden Terminal Revisited

Virtual carrier sense no longer needed in this situation

A B C

RTS CTS

Physical Carrier Sense

Page 43: Wireless Communication Systems

RTS CTS Still Useful Sometimes

Obstructed hidden terminal situation

Fast collision resolution for long data packets

A B

Page 44: Wireless Communication Systems

Exposed Terminal Problem

Hidden terminal is not the only challenge for a distributed wireless MAC protocol

A blocks B, and C doesn’t know what is happening (B is exposed)

A B CD

Page 45: Wireless Communication Systems

Double Exposure Problem

If A and C are out of phase, there is NO time D can transmit without causing a collision

A B

D

C

Page 46: Wireless Communication Systems

Point Coordination Function (PCF)

As an optional access method, the 802.11 standard defines the PCF, which enables the transmission of time-sensitive information.

With PCF, a point coordinator within the access point controls which stations can transmit during any give period of time.

Within a time period called the contention free period, the point coordinator will step through all stations operating in PCF mode and poll them one at a time.

For example, the point coordinator may first poll station A, and during a specific period of time station A can transmit data frames (and no other station can send anything).

The point coordinator will then poll the next station and continue down the polling list, while letting each station to have a chance to send data.

Page 47: Wireless Communication Systems

Point Coordination Function (PCF)

Thus, PCF is a contention-free protocol and enables stations to transmit data frames synchronously, with regular time delays between data frame transmissions.

This makes it possible to more effectively support information flows, such as video and control mechanisms, having stiffer synchronization requirements.

Timing mechanisms within the 802.11 protocol ensure that stations on the WLAN alternate between the use of DCF and PCF.

As a result, the WLAN can support both asynchronous and synchronous information flows.

For a period of time, stations will access channel by using CSMA. For the following time period, the stations will wait for a poll from the point coordinator before sending data frames.

Page 48: Wireless Communication Systems

Point Coordination Function (PCF)

The big name vendors, such as Cisco, Proxim, and Symbol, don't include PCF mode in their devices as a standard.

Some chipsets have PCF functionality embedded somewhere in the firmware, but access point vendors seem to be reluctant to activate it, even though PCF has been part of the 802.11 standard since its inception in 1997.

The problem is that the 802.11 standard is fairly vague in defining portions of the PCF protocol.

As a result, you need to use the same vendor for the access points and radio cards to make it work properly.

The Wi-Fi Alliance does not include PCF functionality in their interoperability standard.

Page 49: Wireless Communication Systems

Q&A

?

Page 50: Wireless Communication Systems

Assignment #1

Explain the terms highlighted in GREEN color throughout this lecture slide

Send your assignments in Word Document Format to [email protected] or [email protected]

Last date of submission of assignment is 24th March 2009.