Wireless specifics. 2 A Wireless Communication System Antenna.

Slides:



Advertisements
Similar presentations
Chapter Thirteen: Multiplexing and Multiple- Access Techniques.
Advertisements

IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
Multiple Access Techniques for wireless communication
April 25, 2005ECE 457 Cellular Communication ECE 457 Spring 2005.
How is information sent and received without wires.
Wireless Networks and Spread Spectrum Technologies.
Coding Modulating Multiplexing On Wireless Media Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Lecture 8: Spread Spectrum
OFDM (Orthogonal Frequency Division Multiplexing).
Wireless and going mobile Browsing via low energy photons.
William Stallings Data and Computer Communications 7th Edition
#7 1 Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science University of Kansas 2335 Irving Hill Dr. Lawrence,
SPREAD SPECTRUM In spread spectrum (SS), we combine signals from different sources to fit into a larger bandwidth, but our goals are to prevent eavesdropping.
II. Medium Access & Cellular Standards. TDMA/FDMA/CDMA.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Wireless & Mobile Networking: Multiple Division Techniques
ESTeem Training Class Radio Technology Overview. Radio Basics Terminology – Familiarization with radio expressions Basic Components – Transmitter – Receiver.
Modulation Coding and Multiplexing Radio Frequency Signals Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Cellular Mobile Communication Systems Lecture 5
Physical Layer (2). Goal Physical layer design goal: send out bits as fast as possible with acceptable low error ratio Goal of this lecture – Review some.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
W.lilakiatsakun.  Radio Wave Fundamental  Radio Wave Attributes  RF System Component  RF Signal Propagation  RF Mathematics.
Orthogonal Frequency Division Multiple Access (OFDMA)
System parameters and performance CDMA-2000, W-CDMA (UMTS), GSM 900, WLAN a, WLAN b, Bluetooth. By Øystein Taskjelle.
How is radio signal propagated. 2 Comparison of wired and wireless transmissions WiredWireless BandwidthDepending on the media used, can be large Narrow.
Modulation-Why? 1. Low frequency signal has less energy, which means it can travel less distance. 2. Practibility of antenna.
Multiple Access Techniques for Wireless Communications (MAT)
APPLICATIONS OF SS SYSTEMS THE FUTURE LIES WITHIN.
Chapter 6 Bandwidth Utilization Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 9 Spread Spectrum.
1 Orthogonal Frequency- Division Multiplexing (OFDM) Used in DSL, WLAN, DAB, WIMAX, 4G.
COMMUNICATION SYSTEM EECB353 Chapter 7 Part III MULTIPLE ACCESS Intan Shafinaz Mustafa Dept of Electrical Engineering Universiti Tenaga Nasional
Some of the Existing Systems. Wired Communication – Telephone Company Dial-up – 56kbps DSL – Digital Subscriber Line – ADSL: Asymmetric DSL, different.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Multiple Access Techniques.
Code Division Multiple Access (CDMA) Transmission Technology
CDMA Systems. 2 How does CDMA work? Each bit (zero or one) is spread into N smaller pulses/chips (a series of zeros and ones). The receiver which knows.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Data and Computer Communications Ninth Edition by William Stallings Chapter 9 – Spread Spectrum Data and Computer Communications, Ninth Edition by William.
Physical layer continued. Limited Bandwidth Bandwidth is limited because of many reasons – The wire itself, if too long, is a capacitor and slows down.
Multiple Access Techniques for Wireless Communication
Lecture 12-13: Multi-access Aliazam Abbasfar. Outline.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
TUNALIData Communication1 Spread Spectrum Chapter 9.
Outline  Introduction (Resource Management and Utilization).  Compression and Multiplexing (Other related definitions).  The Most Important Access Utilization.
DATA AND COMPUTER COMMUNICATIONS Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Transmission Techniques Traffic channels: different users are assigned unique code and transmitted over the same frequency band, for example, WCDMA and.
 First generation systems utilized frequency axis to separate users into different channels  Second generation systems added time axis to increase number.
William Stallings Data and Computer Communications 7th Edition
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Chapter 5: Third generation systems-Wideband Digital Modulation
CT301 lecture7 10/29/2015 Lect 7 NET301.
Advanced Wireless Communication Systems
Multiple Access Techniques for Wireless Communication
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
244-6: Higher Generation Wireless Techniques and Networks
Bandwidth Utilization
Bandwidth Utilization
Bandwidth Utilization
Wireless Networks.
Wireless & Mobile Networking: Multiple Division Techniques
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Chapter 4: Digital Transmission
CT301 lecture7 10/29/2015 Lect 7 NET301.
Chapter 5: Third generation systems-Wideband Digital Modulation
Spread Spectrum A signal that occupies a bandwidth of B, is spread out to occupy a bandwidth of Bss All signals are spread to occupy the same bandwidth.
William Stallings Data and Computer Communications 7th Edition
Cellular Telephone Networks
Multiplexing Simultaneous transmission of multiple signals across a single data link As data & telecomm use increases, so does traffic Add individual links.
William Stallings Data and Computer Communications 7th Edition
Physical Layer (2).
Presentation transcript:

Wireless specifics

2 A Wireless Communication System Antenna

3 Technologies for Cell phones to Handle Multiple Users Unique feature for voice communications: FDMA (Frequency Division Multiple Access) in 1G cellular phone technology TDMA (Time Division Multiple Access, e.g., GSM—Global Service for Mobile communications and IS-54, both use TDMA and FDMA) CDMA (Code Division Multiple Access, e.g., IS- 95, WCDMA, CDMA2000)

4 Technologies for Cell Phones to Handle Up and Down Links TDD (Time Division Duplex): forward (down link) and reverse (up link) channels use the same frequency band but alternating time slots FDD (Frequency Division Duplex): forward and reverse channels use different carrier frequencies

5 Technology used by WiFi, etc. to handle multiple users It is a time division method. Unlike the TDMA in cell phones, in WiFi no specific time slots are assigned to users. Instead, it is basically a first-come-first-served policy—users form a queue waiting for their turns to use the connection. It’s very much like the rule used in a bank or a computer network. It is good for data transmission, but not that ideal for voice transmission.

6 Techniques used by all Spread Spectrum Transmission  FHSS (Frequency Hopping Spread Spectrum)  DSSS (Direct Sequence Spread Spectrum) OFDM (Orthogonal Frequency Division Multiplexing)

7 What is Spread Spectrum Transmission The traditional transmitted signal has a bandwidth of the same order as the information signal at the baseband. For example, the bandwidth of a voice signal is about 4 kHz (the baseband). After modulation, as it being transmitted it still occupies several thousand Hz but at a much higher frequency. The spread spectrum signal occupies a much larger bandwidth.

8 Why spread spectrum It is robust against frequency selective fading in urban and indoor environments. It is robust against interference emitted by machines, microwave ovens, etc. It can be used to provide additional security, as in CDMA. It is required by regulation to use spread spectrum in unlicensed ISM (Industrial, Scientific and Medical) bands.

9 Spread spectrum methods Frequency hopping spread spectrum (FHSS)  The transmitter constantly, often randomly, shifts the center frequency of the transmitted signal.  Only the machine that knows the hopping pattern can receive the signal. Direct sequence spread spectrum (DSSS)  Each transmitted bit is spread into N smaller pulses (chips) before transmission.  Only the machine that knows the pattern of the spread can retrieve the signal.

10 FHSS Invented by Austrian-born movie star Hedy Lamarr to protect guided torpedoes from jamming The shifts in frequency (hops) occur according to a random pattern that is known only to the transmitter and the receiver. (Actually it is pseudo random: It is generated by an algorithm, so it is not really random; but to a person who does not know the pattern, it looks random.) If the center frequency moves among 100 different frequencies, the required transmission bandwidth is at least 100 times as large as the original transmission bandwidth.

11 Example of FHSS

12 FHSS and GSM If the channel coincides with a deep frequency selective fading or when the cochannel interfence from another cell using the same frequency is excessive, the distortion in the received voice signal will be large. A slow frequency hopping of hops per second can be used in GSM to tackle these problems.

13 FHSS in or WiFi Uses 78 hopping channels each separated by 1 MHz. These frequencies are divided into three patterns of 26 hops each corresponding to channel numbers (0, 3, 6, 9, …, 75), (1, 4, 7, 10, …, 76), (2, 5, 8, 11, …, 77). These choices are available for three different systems to coexist without any hop collision. 2.5 hops per second

14 FHSS in Bluetooth Uses a fast frequency hopping (1,600 hops per second) over 79 MHz of bandwidth. That is, it hops over 79 channels each separated by 1 MHz.

15 DSSS The transmitter spreads one bit, say a one or a zero (you either have a one or a zero in the digital world), into many (N) smaller chips (they are a sequence of zeros and ones) according to a code known to the transmitter and the receiver. The receiver, using the code and a correlator, put the spread chips together to get the original bit. The bandwidth of the original signal will be N times wider after the spreading because the chip rate is N times faster than the bit rate. Therefore the signal will be more robust against interference and fading. The code used for spreading and de-spreading can be secret, if only the transmitter and the receiver know it, thus providing a security measure.

16 DSSS in The code (called Baker code) used in to spread the data bits is given by [1, 1, 1, -1, -1, -1, 1, -1, -1, 1, -1]. So one bit of data is spread to become 11 chips. The Baker code is not a secret code, so it’s not used for security. It’s used to spread the bandwidth.

17 DSSS in

18 More about DSSS The bandwidth of the transmitted DSSS signal is N times as large as that of the original signal. CDMA uses DSSS. Each user is given a unique code that other users don’t know. Although a user can receive the signals sent to other users by the transmitter, in the de-spreading process only the signal sent to that user can be detected. The interference generated by other users is very small.

OFDM (Orthogonal Frequency Division Multiplexing)

20 What is OFDM Assume we need to send data at a speed of R symbols/sec. We break the data sequence into N (an integer, say, 48) sub-sequences. The data rate of each sub-sequence will be R/N, much slower than the original sequence. N carriers are used, each having a different frequency and each sending one sub-sequence. At the receiver end, the N sub-sequences are put together to get the original data sequence.

21 Advantages of OFDM Robust against Intersymbol Interference (ISI) due to multipath propagation because:  In each sub-sequence the symbols, e.g. a 1 or a 0, are N times longer than the original symbols.  The longer the symbol, the weaker the ISI (the signals representing the same symbol but coming from multiple paths will be close enough compared with the width of the symbol so they don’t interfere with each other).

22 Advantages of OFDM Robust against frequency selective fading  To battle the frequency selective fading (signals at certain frequencies might be much weaker than that of other frequencies), error-control coding can be used in each subchannel.  If the signal for a particular subchannel(s) is weak, the transmitting power of that subchannel can be increased to compensate for the fading. High spectral efficiency (high bit rate to bandwidth ratio)

23 Drawbacks of OFDM Complexity: you need to put together N signals to rebuild the original one. Sensitive to Doppler Shift. When receiver is moving at a high speed, the received frequency will shift, too, and that can cause problem for OFDM. High peak-to-average-power ratio (PAPR) and thus lower efficiency.

24 Example: OFDM in a 64 subchannels are used, among which 48 are used for data transmission, the remaining 16 are for other purposes. The symbol rate of each channel is 250 kilo symbols per second (ksps). The actual data rate for the user is 48X250 ksps = 12 Msps. The overall bandwidth is 20 MHz.

25 SOFDMA (Scalable Orthogonal Frequency Division Multiple Access) Used in e (WiMax for mobile users) The same OFDM technique will be used, but each user may only get a part of the spectrum, depending on the application the user is running. TDMA is also used. In (WiMax for fixed users) OFDM is used and a user get all the available spectrum. Users are separated by TDMA.

26 Assigning sub-channels

27 Coding techniques Error control coding Coding for spread spectrum (CDMA)  Orthogonal codes

28 Voice-oriented and data-oriented networks Voice-oriented networks use the so-called fixed- assignment methods. Each user is assigned a slot of time, a portion of frequency band, or a specific code for the entire length of the conversation. Data-oriented networks use random-access methods. Users share the same medium (air or wire). Since data arrive at random instances, the medium will be assigned to each user in a random fashion.

29 Comparison of two methods Fixed assignment ensures constant connection, which is needed for voice communication, but can have low utilization rate. Random access method is more suitable for data communication, because data arrive in bursts.