Wireless and Mobile Networks: University of Science and Technology
Wireless and Mobile Networks: University of Science and Technology
• Wireless hosts. As in the case of wired networks, hosts are the end-system devices that run
applications. A wireless host might be a laptop, palmtop, smartphone, or desktop computer. The
hosts themselves may or may not be mobile.
Wireless links. A host connects to a base station (defined below) or to another wireless
host through a wireless communication link. Different wireless link technologies
have different transmission rates and can transmit over different
distances.
Figure 6.2 shows two key characteristics (coverage area and link rate) of the more popular wireless
network standards.
1
• Base station. The base station is a key part of the wireless network
infrastructure. Unlike the wireless host and wireless link, a base station has no obvious
2
counterpart in a wired network. Abase station is responsible for sending and receiving data (e.g.,
(2) The host uses that base station to relay data between it (the host) and the
larger network.
Cell towers in cellular networks and access points in 802.11 wireless LANs are examples of
base stations.
3
In adhoc networks, wireless hosts have no such
infrastructure with which to connect. In the absence of such
infrastructure, the hosts themselves must provide for
services such as routing, address assignment, DNS-like
name translation.
What is handoff?
How is addressing performed, given that a host can be in one of many possible locations?
If the host moves during a TCP connection or phone call, how is data routed so that the connection
continues uninterrupted?
4
wireless network crosses exactly one wireless hop or
multiple wireless hops, and (ii) whether there is
infrastructure such as a base station in the network:
5
Wireless and Mobile Networks
2- Signal Interference with other sources. Radio sources transmitting in the same
frequency band will interfere with each other. For example, 2.4 GHz wireless phones and
802.11b wireless LANs transmit in the same frequency band. In addition to interference
from transmitting sources, electromagnetic noise within the environment (e.g., a nearby
motor, a microwave) can result in interference.
Bit Error
Due to the above differences it is clear that bit errors will be more common
in wireless links than in wired links. For this reason, it is perhaps not
6
surprising that wireless link protocols employ error detection codes, and
link-level reliable data-transfer protocols that retransmit corrupted frames.
The receiving host receives an electromagnetic signal that is a combination of a degraded form of
the original signal transmitted by the sender and background noise in the environment.
What is SNR?
The signal-to-noise ratio (SNR) is a relative measure of the strength of the
received signal (i.e., the information being transmitted) and this noise.
The bit error rate (BER) is the probability that a transmitted bit is
received in error at the receiver.
Wireless links has a higher bit error rates than wired links.
7
The hidden terminal problem and fading make multiple access in a wireless
network considerably more complex than in a wired network.
In a CDMA protocol, each bit being sent is encoded by multiplying the bit by a signal (the code)
that changes at a much faster rate (known as the chipping rate) than the original sequence of data
bits.
8
How CDMA perform encoding and decoding?
1- Suppose that the rate at which original data bits reach the CDMA encoder defines the unit of
time; that is, each original data bit to be transmitted requires a one-bit slot time.
2- Let di be the value of the data bit for the ith bit slot. (For mathematical convenience, we
represent a data bit with a 0 value as –1.)
Each bit slot is further subdivided into M mini-slots; ( in Figure 6.5, M = 8, although in practice
M is much larger).
3- The CDMA code used by the sender consists of a sequence of M values, cm , m = 1, . . . , M,
each taking a +1 or –1 value. (In the example in Figure 6.5, the M-bit CDMA code being
used by the sender is (1, 1, 1, –1, 1, –1, –1, –1)).
4- To encode the the ith data bit, di the output of the CDMA encoder, Zi,m is:
5- The receiver would receive the encoded bits, Zi,m , and recover the original data bit, di , by
computing
9
CDMA must work in the presence of interfering senders that are encoding and transmitting their
data using a different assigned code.
But how can a CDMA receiver recover a sender’s original data bits when those data
bits are being tangled with bits being transmitted by other senders?
CDMA works under the assumption that the interfering transmitted bit signals are additive. This
means, for example, that if three senders send a 1 value, and a fourth sender sends a –1 value during
the same mini-slot, then the received signal at all receivers during that mini-slot is a 2 (since 1+ 1+
1- 1 = 2).
In the presence of multiple senders , sender s computes its encoded transmissions, Zsi,m , in
exactly the same manner as in Equation 6.1. The value received at a receiver during the mth mini-
10
slot of the ith bit slot, however, is now the sum of the transmitted bits from all N
senders during that mini-slot:
Amazingly, if the senders’ codes are chosen carefully, each receiver can recover the data sent by a
given sender out of the aggregate signal simply by using the sender’s code in exactly the same
manner as in Equation 6.2:
Example
Figure 6.6, shows a two-sender CDMA example. The M-bit CDMA code being used by the upper
sender is (1, 1, 1, –1, 1, –1, –1, –1), while the CDMA code being used by the lower sender is (1, –1,
1, 1, 1, –1, 1, 1). Figure 6.6 illustrates a receiver recovering the original data bits from the upper
sender.
11
12