Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
Basics of lower layers Dmitri A. Moltchanov E-mail: [email protected] http://www.cs.tut.fi/kurssit/TLT-2636/ TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 OUTLINE • Next generation networks • The electromagnetic spectrum • Radio propagation • Modulation techniques • Two-way communications • Centralized multiple access schemes • Random multiple access schemes • Error control • Channel adaptation techniques Lecture: Basics of lower layers 2 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 1. NG networks What a next generation (NG) scenario might or should be? Network 1 IP BACKBONE Network N Network 2 Network 4 Network 3 Figure 1: The foreseen configuration of NG network: a number of interconnected technologies. Lecture: Basics of lower layers 3 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 WLAN AD HOC NETWORKS NGN BACKBONE WMAN 3G MOBILE SYSTEMS BAN/PAN Figure 2: NG networks: wireless access is the integral part. Lecture: Basics of lower layers 4 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 1.1. All-IP concept NGN: packet-switched, based on TCP/IP protocol suit. 5 Applications 4 TCP/UDP 3 IP 2 Data-link FEC, ARQ... 1 Physical ASK, FSK, PSK... HTTP, FTP, E-MAIL... TCP, UDP, RTP Figure 3: Advantages of IP protocol. IP is characterized by: • IP allows integration of voice, video, data in a single network; • IP is independent of data-link and physical layers; • IP is independent of transport and application layers. Lecture: Basics of lower layers 5 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 What advantages IP may bring: • immediately allows a rich set of applications; • allows core network to evolve independently; • allows wireless access to evolve independently. IP networks: • beginning of 90s: IP over E1/E3 (T1/T3 in NA); • middle and late 90s: IP over ATM • beginning of 00s: IP over SDH • middle of 00s: IP over MPLS over SDH Access networks • wired: ADSL/Cable modem; • wireless: 802.11b/g/n, EDGE, UMTS, LTE, 802.16d/e • some via gateways, some with seamless connectivity... Lecture: Basics of lower layers 6 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 1.2. Classification of wireless networks Based on the coverage areas: • wireless body areas network (WBAN); • wireless personal area network (WPAN); • wireless local area network (WLAN); • wireless wide area network (WWAN). BAN PAN ~1 m ~10 m LAN WAN ~500 m WAN >10 km Figure 4: Classification of wireless networks based on their coverage area. Lecture: Basics of lower layers 7 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 WBAN networks • what: BAN is the network consisting of wearable computers; • aim: is to provide the connectivity between wearable computers: headphones, displays, etc. WPAN networks • what: PAN is a network in the environment around the person; • aim: PAN connects BAN devices to other mobile and stationary devices. WLAN networks • what: usually, is a network of laptops; • aim: provide connectivity and Internet access in the high density areas. WWAN/WMAN networks • what: is a network of arbitrary mobile devices; • aim: is to provide connectivity between remote mobile devices. Lecture: Basics of lower layers 8 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 2. The electromagnetic spectrum Wireless communications: broadcast and reception of electromagnetic waves: • frequency, f : – number of cycles per second of the wave, measured in Hz. • wavelength, λ: – the length of the cycle, measured in meters. The speed of propagation waves: • varies from medium to medium; • in vacuum equals to the speed of light. The following relation holds: r = λf, (1) • r is the speed of the wave; • r = c in vacuum. Lecture: Basics of lower layers 9 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Frequency bands defined by International Telecommunication Union (ITU) is shown in Fig. 5. mostly usable for communications Infrared Frequency (Hz) 100 102 104 106 Ultraviolet 108 1010 1012 1014 1016 1018 1020 1022 1024 1026 1028 100 10-2 10-4 10-6 Radio 108 106 104 102 Wavelength (m) 10-8 10-10 10-12 10-14 10-16 10-18 10-20 Visible Microwave X-ray Gamma ray not usable: - affect health - difficult to modulate - do not propagate through obstacles Figure 5: Frequency bands in the electromagnetic spectrum. Lecture: Basics of lower layers 10 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Frequency determines properties of the transmission: • low frequency: pass through the obstacles; • higher frequency: more prone to absorbtion by rain or fog; • higher frequency: reflected by obstacles. Radio waves: • relatively easy to generate and modulate; • have the ability to path through the buildings; • may travel very long distances; • radio transmission is omni-directional. Microwave: • tend to travel in a straight lines; • can be narrowly focused and concentrated in a small beam; • cannot pass through obstacles. Lecture: Basics of lower layers 11 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Infrared waves: • cannot pass through obstacles; • relatively directional and inexpensive to implement; • used in short range communications. Visible light: • may provide very high bandwidth at a very low cost using optical laser signalling; • hard to focus a very narrow uni-directional laser; • cannot penetrate through rain and fog. Allocation of waves: • electromagnetic spectrum is a common resource; • international agreements have been drawn to allocate it; • national agreements may override them; • note: remember military usage! Lecture: Basics of lower layers 12 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 3. Radio propagation Radio waves experience the following propagation mechanisms: • Reflection: – when: wave hits an objects which is very large compared to its wavelength; – result: phase shift of 180 degrees between the incident and the reflected rays. • Diffraction: – when: wave hits an object that is comparable to its wavelength; – result: wave bends at the edges of the object, propagating in different directions. • Scattering: – when: wave goes through a medium with objects that are small compared to its wavelength; – result: wave gets scattered into several weaker outgoing signals. Lecture: Basics of lower layers 13 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Figure 6: Illustration of the radio propagation. Lecture: Basics of lower layers 14 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 3.1. Propagation models We distinguish between: • large-scale propagation models: – predict the average received signal strength at a given distance from transmitter; – what: capture path loss component; – application: estimation of the radio coverage area around the transmitter. • small-scale propagation models: – characterize the rapid fluctuations of the received signal strength; – what: capture influence of multipath components; – application: performance evaluation of data transmission over the wireless channels. Historic aspects: • most are designed for applications in cellular networks; • some are applicable to other wireless networks (e.g. ad hoc, vehicular). Lecture: Basics of lower layers 15 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Classification: • analytical models: – capture path loss based on analytical representation of propagation phenomenons; – +: allows to get predictions very quickly; – −: often too complicated; – −: limited to the complexity of mathematics. • empirical model: – based on fitting empirical formulas to a set of statistical data; – +: implicitly include all propagation phenomenons; – −: cannot be derived without measurements; – −: always specific to those environment in which measurements have been carried out. One more classification: • indoor models; • outdoor models. Lecture: Basics of lower layers 16 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 3.2. Large-scale propagation (path loss) models Figure 7: Illustration of the areas with different received local average signal strength. Examples: • free-space propagation model; • two-ray ground reflection model. See: T. Rappaport, ’Wireless communications,’ 2nd edition, Prentice Hall, 2002. Lecture: Basics of lower layers 17 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 3.3. Small-scale propagation (fading) models Used to represent rapid changes of the received signal strength. Figure 8: Attenuation due to distance and rapid fluctuations of the received signal strength. Lecture: Basics of lower layers 18 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 3.4. Small-scale (fading) models Depending on presence of LOS received signal strength has: • LOS: Rician distribution; • No-LOS: Rayleigh distribution The Rician distribution is given by: µ ¶ µ ¶ 2 2 γ (γ + A ) Aγ p(γ) = 2 exp − I , 0 σ 2σ 2 σ2 As A → 0 the Rician distribution degenerates to Rayleigh one: µ ¶ 2 γ γ p(γ) = 2 exp − 2 , γ ≥ 0, σ 2σ γ ≥ 0, (2) (3) Signal-to-noise (SNR) ratio: • received signal strength and • noise (local, interference). Lecture: Basics of lower layers 19 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Nakagami-m fading: µ ¶ mm γ m−1 mγ p(γ) = exp − , (E[γ])m Γ(m) E[γ] γ ≥ 0, (4) • E[γ] is the average received SNR • Γ(m) is the gamma function • m is the Nakagami fading parameter Nakagami-m covers almost all special cases: • m = 0.5 we get the worst possible fading case • m = 1 we get Rayleigh statistical fading model • m > 1 resulting in Rician fading channels • m → ∞ no fading Note: how got get symbol (bit) error rate? • Simon, M. and Alouini, M. ”Digital Communication Over Fading Channels”, Wiley, 2005. Lecture: Basics of lower layers 20 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 4. Modulation techniques Modulation: • why: information cannot be transferred as is; • what: converting data into electromagnetic waves; • how: altering certain properties of the carrier wave. Classification based on the nature of the data to be transmitted : • analog modulation techniques: – amplitude modulation; – frequency modulation; – phase modulation. • digital modulation techniques: – amplitude shift keying; – frequency shift keying; – phase shift keying. Lecture: Basics of lower layers 21 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 4.1. Analog modulation Characteristics: • used to transmit analog data (e.g. voice); • perform superimposing analog data signal x(t) on a predefined carrier signal c(t). Amplitude modulation: • frequency and phase of the modulating signal remains the same; • amplitude varies with that of information signal. Frequency modulation: • amplitude and phase of the modulating signal remains the same; • frequency varies with that of information signal. Phase modulation: • amplitude and frequency of the modulating signal remains the same; • phase varies with that of information signal. Lecture: Basics of lower layers 22 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Figure 9: Illustration of the analog amplitude modulation. Lecture: Basics of lower layers 23 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Figure 10: Illustration of the analog frequency modulations. Lecture: Basics of lower layers 24 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Figure 11: Illustration of the analog phase modulations. Lecture: Basics of lower layers 25 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 4.2. Digital modulation Characteristics: • used to transmit binary data (e.g. PCM voice); • alters certain properties of transmitting data; • difference: changes occur at discrete time instants. There are a number of digital modulation techniques: • amplitude shift keying (ASK); • frequency shift keying (FSK); • phase shift keying (PSK). Lecture: Basics of lower layers 26 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Amplitude shift keying • ∆t: transmission time of the symbol; • 1: presence of a carrier for ∆t; • 0: absence of a carrier ∆t. Mathematically ASK is represented as: A cos2πf t, for 1, c c s(t) = 0, for 0. (5) Figure 12: Illustration of the amplitude shift keying. Lecture: Basics of lower layers 27 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Frequency shift keying Let fc be the carrier frequency and ∆f be the small frequency offset. Then according to FSK: • 1: presence of carrier with frequency fc + k for a certain time; • 0: presence of carrier with frequency fc − k for the same time. Two-levels: binary FSK (BFSK): A cos2π(f + k)t, for 1, c c s(t) = Ac cos2π(fc − k)t, for 0. (6) Figure 13: Illustration of the binary frequency shift keying (BFSK). Lecture: Basics of lower layers 28 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Phase shift keying Binary PSK (BPSK): change in phase by π • 0: presence of carrier with frequency fc for a certain time; • 1: presence of carrier with a phase difference of π. Mathematically, two-level PSK (binary PSK, BPSK) is given by: A cos(2πf t + π), for 1, c c s(t) = Ac cos2πfc t, for 0. (7) Multiple phase deviation can also be used to encode multiple bits. Quadrature PSK (QPSK): change in phase by π/2: π A cos(2πf t + ), c c 4 A cos(2πf t + 3π ), c c 4 s(t) = Ac cos(2πfc t + 5π ), 4 Ac cos(2πfc t + 7π ), 4 Lecture: Basics of lower layers for 10, for 11, for 01, (8) for 00. 29 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 4.3. x-QAM Characteristics: • BPSK, QPSK, 16-QAM, 64-QAM, 256-QAM, etc. • combines advantages of amplitude and phase keying. Figure 14: Illustration of 64-QAM signal constellations. Lecture: Basics of lower layers 30 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 5. Two-way communications Two approaches: • Time division duplex: uplink and downlink on the same frequency; • Frequency division duplex: uplink and downlink on different frequencies. downlink uplink downlink uplink FRAME FRAME FRAME FRAME time frequency Figure 15: Illustration of TDD and FDD principle. Shortcomings: • −: guard bands for synchronization: inefficient use of spectrum; • −: assigned slot may not always be in use: inefficient use of spectrum. Lecture: Basics of lower layers 31 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 6. Centralized multiple access techniques Why we need multiple access scheme: • bandwidth is a scarce resource at the air interface; • there are a number of users that want to transmit. Centralized vs. random access: • centralized: master controls assignment (WWAN/WMAN); • random: stations compete for access (WLAN/WPAN/WBAN). Basically, there are four centralized multiple access schemes: • frequency division multiple access (FDMA); • time division multiple access (TDMA); • code division multiple access (CDMA). Lecture: Basics of lower layers 32 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 6.1. Frequency division multiple access What is the basis: • shares available bandwidth in the frequency domain; • available bandwidth is divided into a number of channels; • there should be a guard band between adjacent channels; • each tranbsmitter/receiver pair is assigned the same channel for operation. F1 F2 Fn Bandwidth (Hz) Figure 16: Illustration of FDMA principle. • −: guard bands: inefficient use of spectrum; • −: assigned slot may not always be in use: inefficient use of spectrum. Lecture: Basics of lower layers 33 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 6.2. Time division multiple access What is the basis: • shares the available bandwidth in the time domain; • frequency band is divided into a number of time slots; • a set of periodically repeated time slots is known as TDMA frame; • each node is assigned a slot in each frame and transmits only in this slots. time slot assigned for a transmitter/receiver pair 4 ... 4 ... TDMA frame Figure 17: Illustration of TDMA principle. Lecture: Basics of lower layers 34 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 6.3. Spread spectrum techniques What is the basis: • every user uses the entire spectrum; • individual transmission are encoded with a pseudo-random sequences; • assigned codes are orthogonal so that the simultaneous transmissions are possible. There are two types of spreads spectrum techniques available: • frequency hopping spread spectrum (FHSS); – spectrum is divided into many subchannels; – two communicating systems hop on same frequencies. • direct sequence spread spectrum (DSSS). – stations are assigned orthogonal codes; – use these codes for transmission; – other stations transmissions appears an noise. Lecture: Basics of lower layers 35 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 7. Random access schemes What is the basis: • provide access to a channel for multiple concurrent stations; • is not needed when there is a centralized control; • required when the access is distributed; • can be used for decentralized access in TDMA and FDMA channels. Basic techniques: • ALOHA and slotted ALOHA; • Carrier Sense Multiple Access (CSMA); • Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA); • Carrier Sense Multiple Access with Collision Detection (CSMA/CD). Lecture: Basics of lower layers 34 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 7.1. ALOHA Pure ALOHA • a terminal transmits whenever the user data is ready; • if the sender finds that the packet get collided: – it waits for a random period of time; – sends the packet again. Throughput: low, depends on stations and traffic they generate. Slotted ALOHA • time is slotted, length on the slot is the time to transmit a packet; • node starts transmission in the beginning of slots only; • if collision occurs: – sender waits for a random number of slots; – transmits packet again. Throughput: higher than ALOHA but still low. Lecture: Basics of lower layers 35 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 7.2. Carrier Sense Multiple Access (CSMA) Why we need: • throughput of ALOHA is very low; • what to do: listen for packet transmissions. In general, there are three different CSMA schemes: • 1-persistent CSMA; • non-persistent CSMA; • p-persistent CSMA. 1-persistent CSMA • when the packet is ready for transmission the sender listens to the channel; • if the channel is free packet is immediately transmitted; • if not the senders continues to listen till the channel becomes free. Probability of starting transmission when the channel is free: 1. Lecture: Basics of lower layers 36 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Two bad effects: • Wrong ’channel free’ effect; • Synchronization effect Wrong ’channel free’ effect • an arbitrary node starts transmitting; • a node near the destination sense the channel and finds it free since packet has not yet arrived. Synchronization effect node 3 start of sensing t node 2 start of sensing t node 1 t Figure 18: Illustration of the synchronization effect. Lecture: Basics of lower layers 37 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 Non-persistent CSMA This scheme was introduced to combat with the synchronization problem. It works as follows: • when the packet is ready for transmission the sender listens the channel; • if the channel is busy the sender goes in the waiting state for a randomly chosen time; • after this time the sender sense the channel again. random waiting node 3 node 2 start of sensing start of sensing random waiting t t node 1 t Figure 19: Illustration of non-persistent CSMA. • advantage: probability of collision is less than for 1-persistent CSMA. Lecture: Basics of lower layers 38 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 p-persistent CSMA • the channel is slotted; • transmission is a free channel is performed with probability p. The scheme operates as: • when the packet is ready for transmission the sender listens the channel; • if the channel is busy the sender keeps listen the channel until it finds the channel idle; • if the channel is idle: – the sender transmits the packet in this slot with probability p; – defers transmission to the next slot with probability q = 1 − p. p1>p node 2 node 1 both have a packet p1<p p1<p t t Lecture: Basics of lower layers 39 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 7.3. Carrier sense multiple access with collision detection What is new: • capability to detect collisions. bandwidth is wasted collision is detected node 2 node 2 t node 1 t node 1 t t Figure 20: Illustration of collision detection advantages. The algorithm operates as follows: • if the collision is detected the nodes immediately aborts its current transmission; • then, the node sends a brief jamming signal; • any other transmitting node on hearing the jamming signal abort their transmissions; • after transmitting the jamming signal the node waits for a random time and repeats the CSMA. Lecture: Basics of lower layers 40 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 8. Error control BER can be high (around 10E − 4 ∼ 10E − 2): • using channel coding (adding additional bits;) • using protocols with retransmission. We distinguish between following channel coding: • coding using error detecting codes: – cyclic redundancy check (CRC). • coding using error correcting codes: – block codes (BCH); – convolutional codes, turbo codes, etc. Protocols with retransmissions: • stop-and-wait ARQ (SW-ARQ); • go-Back-N ARQ (GBN-ARQ); • selective-repeat ARQ (SR-ARQ). Lecture: Basics of lower layers 41 TLT-2636: Wireless networks D.Moltchanov, TUT, 2011 9. Channel adaptation mechanisms Why do we need something else?: • propagation conditions are too diverse; • classic error control may not be sufficient; • classic error control can be redundant. Which techniques? • power control • automatic modulation and coding; • hybrid ARQ (HARQ, various types); • spatial diversity (MIMO); • spatial multiplexing (OFDM, MIMO); • source rate adaptation. Note: these techniques makes wireless systems very complicated. Lecture: Basics of lower layers 42