Wireless Networks Book

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Networks Book Wireless Networks Local and Ad Hoc Networks Ivan Marsic Department of Electrical and Computer Engineering and the CAIP Center Rutgers University Contents CHAPTER 1................................................................................................... INTRODUCTION ..............................................................................................................................1 1.1 Summary and Bibliographical Notes................................................................................................... 6 CHAPTER 2 THE RADIO CHANNEL.......................................................................1 2.1 Introduction........................................................................................................................................ 1 2.1.1 Decibels and Signal Strength ............................................................................................................ 4 2.2 Channel Implementation..................................................................................................................... 5 2.2.1 Transmission Rate ........................................................................................................................... 5 2.2.2 Symbols To Signals.......................................................................................................................... 6 2.2.3 Modulation ...................................................................................................................................... 6 2.2.4 Noise and Error Probability ............................................................................................................. 10 2.3 Continuous Noisy Channel Capacity................................................................................................. 14 2.4 Radio Propagation: Multipath and Doppler ....................................................................................... 20 2.4.1 Large-Scale Path Loss ................................................................................................................... 21 2.4.2 Types of Wave Interactions............................................................................................................. 23 2.4.3 Doppler Shift.................................................................................................................................. 25 2.4.4 Multipath or Small-Scale Fading ...................................................................................................... 26 2.5 Equalization, Coding, and Diversity .................................................................................................. 29 2.5.1 Adaptive Equalization ..................................................................................................................... 30 2.5.2 Channel Coding or Forward Error Correction .................................................................................... 30 2.5.3 Diversity Techniques for Fading Channels........................................................................................ 31 2.5.4 Packet Error Rate .......................................................................................................................... 31 2.6 Summary and Bibliographical Notes................................................................................................. 32 Problems....................................................................................................................................................... 33 CHAPTER 3 MULTIACCESS COMMUNICATION ....................................................36 i Ivan Marsic • Rutgers University ii 3.1 Introduction...................................................................................................................................... 36 3.1.1 MAC Protocol Performance Measures.............................................................................................. 39 3.1.2 Propagation Time and Parameter β ................................................................................................. 40 3.1.3 Vulnerable Period .......................................................................................................................... 41 3.2 ALOHA Protocols ............................................................................................................................. 42 3.2.1 Throughput Analysis....................................................................................................................... 43 3.3 Carrier Sensing Protocols................................................................................................................. 48 3.3.1 Throughput Analysis of Nonpersistent CSMA.................................................................................... 51 3.3.2 CSMA/CD ..................................................................................................................................... 54 3.3.3 CSMA/CA...................................................................................................................................... 54 3.4 Other MAC Protocols........................................................................................................................ 56 3.5 Multiple-access Interference............................................................................................................. 56 3.5.1 Physical Layer Interference............................................................................................................. 57 3.5.2 Link Layer Interference: Hidden and Exposed Stations ...................................................................... 58 3.6 Summary and Bibliographical Notes................................................................................................. 61 Problems....................................................................................................................................................... 61 CHAPTER 4 IEEE 802.11 WIRELESS LAN.............................................................68 4.1 Introduction...................................................................................................................................... 68 4.1.1 Architecture and Services ............................................................................................................... 68 4.1.2 Beacons........................................................................................................................................ 72 4.2 Medium Access Control.................................................................................................................... 72 4.2.1 Interframe Spaces.......................................................................................................................... 73 4.2.2 Virtual Carrier Sensing and Network Allocation Vector ....................................................................... 75 4.2.3 ARQ and Atomic Operations ........................................................................................................... 75 4.2.4 Backoff Procedure with the DCF...................................................................................................... 78 4.2.5 Hidden and Exposed Stations ......................................................................................................... 79 4.2.6 Frame Structure............................................................................................................................. 81 4.3 Physical Layer and Rate Adaptation ................................................................................................. 82 4.3.1 Physical Signals............................................................................................................................. 82 4.3.2 Transmission Rate Adaptation......................................................................................................... 83 4.4 Power-saving Mechanisms ............................................................................................................... 85 4.4.1 Effect on Capacity.......................................................................................................................... 87 4.5 Performance Analysis....................................................................................................................... 88 4.5.1 Channel Event Probabilities ............................................................................................................ 89 4.5.2 Throughput and Delay Performance................................................................................................. 92 Chapter 1 • Introduction to Computer Networks iii 4.6 IEEE 802.11 Family of Standards ...................................................................................................... 94 4.7 Summary and Bibliographical Notes................................................................................................. 98 Problems....................................................................................................................................................... 98 CHAPTER 5 AD HOC NETWORKS ....................................................................103 5.1 Introduction.................................................................................................................................... 103 5.2 Routing Algorithms .......................................................................................................................
Recommended publications
  • Book IG 1800 British Telecom Rev A.Book
    Notice to Users ©2003 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior written approval. 2WIRE PROVIDES NO WARRANTY WITH REGARD TO THIS MANUAL, THE SOFTWARE, OR OTHER INFORMATION CONTAINED HEREIN AND HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE WITH REGARD TO THIS MANUAL, THE SOFTWARE, OR SUCH OTHER INFORMATION, IN NO EVENT SHALL 2WIRE, INC. BE LIABLE FOR ANY INCIDENTAL, CONSEQUENTIAL, OR SPECIAL DAMAGES, WHETHER BASED ON TORT, CONTRACT, OR OTHERWISE, ARISING OUT OF OR IN CONNECTION WITH THIS MANUAL, THE SOFTWARE, OR OTHER INFORMATION CONTAINED HEREIN OR THE USE THEREOF. 2Wire, Inc. reserves the right to make any modification to this manual or the information contained herein at any time without notice. The software described herein is governed by the terms of a separate user license agreement. Updates and additions to software may require an additional charge. Subscriptions to online service providers may require a fee and credit card information. Financial services may require prior arrangements with participating financial institutions. © British Telecommunications Plc 2002. BTopenworld and the BTopenworld orb are registered trademarks of British Telecommunications plc. British Telecommunications Plc registered office is at 81 Newgate Street, London EC1A 7AJ, registered in England No. 180000. ___________________________________________________________________________________________________________________________ Owner’s Record The serial number is located on the bottom of your Intelligent Gateway. Record the serial number in the space provided here and refer to it when you call Customer Care. Serial Number:__________________________ Safety Information • Use of an alternative power supply may damage the Intelligent Gateway, and will invalidate the approval that accompanies the Intelligent Gateway.
    [Show full text]
  • Mobile Devices 1 Development of Mobile Devices Berker Sönmez
    Mobile Devices 1 Development of Mobile Devices Berker Sönmez Faculty of Computer and Informatics 040100101 Oğuz Onur Kul Faculty of Computer and Informatics 040100105 Erdem Emekligil Faculty of Computer and Informatics 150110702 English 201 Sueda Albayrak December 22, 2011 Mobile Devices 2 Thesis: The hardware, software and connection technologies of mobile devices have developed greatly in the recent years. I. Hardware A. Inside Components 1. Chips 2. Batteries B. Outside Components 1. Cameras 2. Touch sense technologies II. Software A. New operating systems 1. iOS 2. Android B. Functional applications 1. Medical applications 2. Game applications III. Connection technologies A. New generation wireless technologies 1. 802.11(Wifi) and 802.16(WiMax) 2. Bluetooth, IrDA and HomeRF B. Advanced communication protocols 1. 3G technology 2. 4G (LTE) technology Mobile Devices 3 Technology is one of the fastest growing entities in science. Day after day, many improvements are being made, many ideas and inventions are being added to this entity. In the recent years, mobile technology gained importance since people have started living in different places and it is important to provide communication among them. Mobile devices are small, portable equipments that are used to carry out various tasks without being obliged to stay in a certain place. In the recent years, the most popular mobile devices have been mobile phones since they have become everyday objects which people carry in their pockets to wherever they travel. Using mobile devices, it is possible to view e-mails, play games, read books and complete many other tasks on the go. Therefore, the importance of mobile phones can not be overlooked.
    [Show full text]
  • Generating Signals for Wireless Lans, Part I: IEEE 802.11B
    Products: SMIQ, AMIQ, WinIQSIM™, SMIQK16, AMIQK16 Generating Signals for Wireless LANs, Part I: IEEE 802.11b With Wireless Local Area Networks (WLAN) already entering the mass markets, generating signals to WLAN standards will become increasingly important. Signal sources are needed in R&D (or production) to test RF modules, to evaluate basic receiver functionality or when new designs are being evolved. This Application Note focuses on the most commonly used standard IEEE 802.11b. Topics covered include technical aspects of the physical layers as well as details on configuring available signal sources. Subject to change – Gernot Bauer 8/2002 – 1GP49_1E Generating Signals for WLANs, Part I: 802.11b Contents 1 Introduction to Wireless LAN Systems......................................................................................3 2 The IEEE 802.11 and 11b Standards ..........................................................................................5 2.1 The 802.11 and 11b PHY ....................................................................................................6 2.1.1 Defined Transmission Methods.................................................................................6 2.1.1.1 Low Rate Modulation with Barker Spreading................................................7 2.1.1.2 High Rate CCK Modulation...........................................................................8 2.1.1.3 High Rate PBCC Modulation ........................................................................9 2.1.2 The PLCP..................................................................................................................9
    [Show full text]
  • On-Demand Routing in Multi-Hop Wireless Mobile Ad Hoc Networks
    Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 2, Issue. 7, July 2013, pg.317 – 321 RESEARCH ARTICLE ON-DEMAND ROUTING IN MULTI-HOP WIRELESS MOBILE AD HOC NETWORKS P. Umamaheswari 1, K. Ranjith singh 2 1Periyar University, TamilNadu, India 2Professor of PGP College, TamilNadu, India 1 [email protected]; 2 [email protected] Abstract— An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any preexisting network infrastructure or centralized administration. Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth. This thesis argues that such protocols must operate in an on-demand fashion and that they must carefully limit the number of nodes required to react to a given topology change in the network. I have embodied these two principles in a routing protocol called Dynamic Source Routing (DSR). As a result of its unique design, the protocol adapts quickly to routing changes when node movement is frequent, yet requires little or no overhead during periods in which nodes move less frequently. By presenting a detailed analysis of DSR’s behavior in a variety of situations, this thesis generalizes the lessons learned from DSR so that they can be applied to the many other new routing protocols that have adopted the basic DSR framework. The thesis proves the practicality of the DSR protocol through performance results collected from a full-scale 8 node tested, and it demonstrates several methodologies for experimenting with protocols and applications in an ad hoc network environment, including the emulation of ad hoc networks.
    [Show full text]
  • A Load Awareness Medium Access Control Protocol for Wireless Ad
    A Load Awareness Medium Access Control Protocol for Single-Hop Wireless Ad Hoc Networks Chih-Min Chao1, Jang-Ping Sheu2, and I-Cheng Chou2 1 Department of Computer Science and Engineering National Taiwan Ocean University, 20224, Taiwan Tel: +886-2-24622192 ext 6651, Fax: +886-2-24623249 Email: [email protected] 2 Department of Computer Science and Information Engineering National Central University, Taiwan Email: [email protected], [email protected] Abstract A contention-based wireless ad hoc medium access control (MAC) protocol, such as car- rier sense multiple access with collision avoidance (CSMA/CA), has excellent e±ciency when the system is light-loaded. The main drawback of such protocols is their ine±ciency and un- bounded delay when the system load is heavy. On the other hand, a contention-free MAC protocol, such as token passing, has a better and fair throughput when the system is heavy- loaded. The main drawback of such protocols is their ine±ciency when only a small amount of users want to transmit. In this paper, we propose a new load awareness single-hop wireless ad hoc MAC protocol (which is called the LA protocol) that exploits the bene¯ts of both contention-based and contention-free protocols. A contention-based MAC protocol is used when the system is light-loaded and a contention-free one is used otherwise. Our LA protocol, which operates in a distributed fashion and is fully compatible with the IEEE 802.11 wireless local area network (WLAN) standard, can switch smoothly between the contention-based pro- tocol and the contention-free one.
    [Show full text]
  • WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK TECHNOLOGY: an OVERVIEW with OTHER BROADBAND WIRELESS NETWORKS
    WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK TECHNOLOGY: AN OVERVIEW WITH OTHER BROADBAND WIRELESS NETWORKS by Chris A. Nwabueze, M. Eng., MNSE, MNIEEE, MIEE. Silas A. Akaneme, M. Eng., MNSE, MNIEEE, MIEEE Dept. of Electrical/Electronic Engineering, Anambra State University, Uli. E-mail: [email protected]. ABSTRACT Wireless Fidelity (Wi-Fi) broadband network technology has made tremendous impact in the growth of broadband wireless networks. There exists today several Wi-Fi access points that allow employees, partners and customers to access corporate data from almost anywhere and anytime. Wireless broadband networks are expected to grow in terms of broadband speed and coverage, while Wi-Fi can be integrated with WiMAX networks to provide Internet connectivity to mobile Wi-Fi users. This paper explores the Wi-Fi broadband wireless network technology, its uses, advantages and disadvantages, comparison with other broadband wireless networks and integration with WiMAX network. Key Words: Broadband, Wireless Fidelity (Wi-Fi), World Wide Interoperability for Microwave Access (WiMAX), IEEE 802.11 standards. 1.0 INTRODUCTION 802.11a [12]. Wi-Fi is owned by the Wi-Fi Wi-Fi stands for “Wireless Fidelity” and Alliance which is a consortium of separate was used to describe Wireless LAN and independent companies agreeing to a (WLAN) products that are based on the set common interoperable products based IEEE 802.11 standards. Wi-Fi uses both on the family of IEEE 802.11 standards single carrier direct-sequence spread [11]. spectrum radio technology and multi-carrier Wi-Fi certifies products via a set of OFDM (Orthogonal Frequency Division established test procedures to establish Multiplexing) radio technology.
    [Show full text]
  • Short-Range Wireless Communication This Page Intentionally Left Blank Short-Range Wireless Communication
    Short-range Wireless Communication This page intentionally left blank Short-range Wireless Communication Alan Bensky Newnes is an imprint of Elsevier The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom 50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States © 2019 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
    [Show full text]
  • Development of Wireless Local Area Networks in OECD Countries”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2003-04-16), “Development of Wireless Local Area Networks in OECD Countries”, OECD Digital Economy Papers, No. 71, OECD Publishing, Paris. http://dx.doi.org/10.1787/233145088433 OECD Digital Economy Papers No. 71 Development of Wireless Local Area Networks in OECD Countries OECD Unclassified DSTI/ICCP/TISP(2002)10/FINAL Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 16-Apr-2003 ___________________________________________________________________________________________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Unclassified DSTI/ICCP/TISP(2002)10/FINAL Cancels & replaces the same document of 14 April 2003 Working Party on Telecommunication and Information Services Policies DEVELOPMENT OF WIRELESS LOCAL AREA NETWORKS IN OECD COUNTRIES English - Or. English JT00142903 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/ICCP/TISP(2002)10/FINAL FOREWORD In December 2002, this report was presented to the Working Party on Telecommunications and Information Services Policy (TISP). It was recommended to be made public by the Committee for Information, Computer and Communications Policy in March 2003. The report was prepared by Mr. Atsushi Umino of the OECD's Directorate for Science, Technology and Industry. It is published on the responsibility of the Secretary-General of the OECD. Copyright OECD, 2003 Applications for permission to reproduce or translate all or part of this material should be made to: Head of Publications Service, OECD, 2 rue André-Pascal, 75775 Paris Cedex 16, France. 2 DSTI/ICCP/TISP(2002)10/FINAL TABLE OF CONTENTS MAIN POINTS............................................................................................................................................
    [Show full text]
  • Ad Hoc Networks – Design and Performance Issues
    HELSINKI UNIVERSITY OF TECHNOLOGY Department of Electrical and Communications Engineering Networking Laboratory UNIVERSIDAD POLITECNICA´ DE MADRID E.T.S.I. Telecomunicaciones Juan Francisco Redondo Ant´on Ad Hoc Networks – design and performance issues Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Telecommunications Engineering Espoo, May 2002 Supervisor: Professor Jorma Virtamo Abstract of Master’s Thesis Author: Juan Francisco Redondo Ant´on Thesis Title: Ad hoc networks – design and performance issues Date: May the 28th, 2002 Number of pages: 121 Faculty: Helsinki University of Technology Department: Department of Electrical and Communications Engineering Professorship: S.38 – Networking Laboratory Supervisor: Professor Jorma Virtamo The fast development wireless networks have been experiencing recently offers a set of different possibilities for mobile users, that are bringing us closer to voice and data communications “anytime and anywhere”. Some outstanding solutions in this field are Wireless Local Area Networks, that offer high-speed data rate in small areas, and Wireless Wide Area Networks, that allow a greater mobility for users. In some situations, like in military environment and emergency and rescue operations, the necessity of establishing dynamic communications with no reliance on any kind of infrastructure is essential. Then, the ease of quick deployment ad hoc networks provide becomes of great usefulness. Ad hoc networks are formed by mobile hosts that cooperate with each other in a distributed way for the transmissions of packets over wireless links, their routing, and to manage the network itself. Their features condition their design in several network layers, so that parameters like bandwidth or energy consumption, that appear critical in a multi-layer design, must be carefully taken into account.
    [Show full text]
  • Routing Issues & Performance of Different Opportunistic Routing
    Ankur Upadhyay et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (5) , 2016, 2147-2151 Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Ankur Upadhyay Abhishek Kumar Mishra Department of Computer Science & Engineering Department of Computer Science & Engineering School of Engineering & Technology, IFTM University School of Engineering & Technology, IFTM University Moradabad, India Moradabad, India Abstract— The Delay Tolerant Networks (DTN’s) are The intermittent connectivity can be defined as the sudden wireless ad-hoc networks which is connected intermittently. change of state (ups/downs) of any communication link The DTNs allow the communication between two or more between the nodes. The DTN can also be defined as a wireless nodes in the situation in which the end to end wireless ad-hoc network which is connected intermittently connectivity cannot be achieved or rarely achieved. The DTNs [3] that can tolerate longer delays, intermittent connectivity are also known as the opportunistic networks. The DTNs are and prevent data from being lost, with the use of store- best applicable or suitable in an environment which is carry-forward approach. The Store-carry-forward approach infrastructure-less. In the heterogeneous environment, the enables the nodes to take the message, store it in the buffer communication between two or more wireless nodes can be provided at each node and forward the same whenever new achieved by DTN. The selection of a routing protocol in DTN, is based on the application environment in which it is to be node comes in its communication range. In the delay deployed.
    [Show full text]
  • Faculty of Egineering and Technology Lecture -9
    FACULTY OF EGINEERING AND TECHNOLOGY WSN (MCS-033) LECTURE -9 Umesh Kumar Gera Assistant Professor Computer Science & Engineering OUTLINE .Wireless ad-hoc network (WANET) .How does it work? .Features .Advantages of WSN .Disadvantages of WSN .MCQ .Reference WIRELESS AD-HOC NETWORK (WANET) Wireless ad-hoc network (WANET) A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring a central device, such as a router or access point. When Wi- Fi networks are in ad-hoc mode, each device in the network forwards data to the others. Since the devices in the ad-hoc network can access each other's resources directly through a basic point-to-point wireless connection, central servers are unnecessary for functions such as file shares or printers. In a wireless ad-hoc network, a collection of devices (or nodes) is responsible for network operations, such as routing, security, addressing and key management. WIRELESS AD-HOC NETWORK (WANET) How does it work? Devices in the ad-hoc network require a wireless network adapter, and they need to support a hosted network. When setting up a wireless ad-hoc network, each wireless adapter must be configured for ad-hoc mode instead of infrastructure mode. All wireless adapters need to use the same service set identifier (SSID) and channel number. Creating an ad-hoc network for Windows 8 and 10 applications is more difficult than it was for earlier Windows OSes. Networking experts offer pointers on how to tackle this issue.
    [Show full text]
  • Broadband Wireless, Integrated Services, and Their Application to Intelligent Transportation Systems
    M PRODUCT MP 2000-044 Broadband Wireless, Integrated Services, and Their Application to Intelligent Transportation Systems June 2000 Keith Biesecker s Center for Telecommunications and Advanced Technology McLean, Virginia M PRODUCT MP 2000-044 Broadband Wireless, Integrated Services, and Their Application to Intelligent Transportation Systems June 2000 Keith Biesecker Sponsors: Federal Highway Administration Contract No.: DTFH61-99-C-00001 Dept. No.: Q020/Q060 Project No.: 0900610F-01 s Center for Telecommunications and Advanced Technology McLean, Virginia ABSTRACT This paper introduces some of the newer broadband wireless communications alternatives and describes how they could be used to provide high-speed connections between fixed, transportable, and mobile facilities. We also describe the new integrated service technologies – devices used to bundle voice, data, and video services for transmission over a single link. In this case, it’s a broadband wireless link. Together, the new broadband wireless and integrated service technologies can be used to provide efficient, cost effective, and flexible multi-service provisioning. We introduce this concept and discuss its potential for Intelligent Transportation Systems (ITS). Suggested Keywords: broadband, wireless, integrated service platform, multi-service access device (MSAD), integrated access device (IAD), Intelligent Transportation Systems (ITS) i ii ACKNOWLEDGMENTS The author wishes to thank Mr. Louis Ruffino and Mr. Carl Kain for their technical and editorial contributions to this effort. iii iv TABLE OF CONTENTS SECTION PAGE 1. Introduction 1-1 1.1 Purpose 1-1 1.2 Scope 1-1 1.3 Organization 1-2 2. The Concept 2-1 2.1 Integrated Services 2-1 2.2 Broadband Wireless 2-2 2.3 Applying Broadband Wireless to the Integrated Service Platform 2-4 3.
    [Show full text]