Health and Information Networking



Similar documents
Mobile Communications Chapter 2: Wireless Transmission

About Me" List of Lectures" In This Course" Mobile and Sensor Systems. Lecture 1: Introduction to Wireless Systems" " Dr. Cecilia Mascolo" "

CS263: Wireless Communications and Sensor Networks

EPL 657 Wireless Networks

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Revision of Lecture Eighteen

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

How To Make A Multi-User Communication Efficient

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Lecture 17: Wireless Networking"

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

10. Wireless Networks

Lecture 7 Multiple Access Protocols and Wireless

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

: Instructor

Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4]

CSE 123A Computer Networks

Appendix C GSM System and Modulation Description

communication over wireless link handling mobile user who changes point of attachment to network

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

COMP 3331/9331: Computer Networks and Applications

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

IT4405 Computer Networks (Compulsory)

TCP in Wireless Networks

Wired & Wireless LAN Connections

EECC694 - Shaaban. Transmission Channel

Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

GSM Network and Services

Ethernet, VLAN, Ethernet Carrier Grade

ECE/CS 372 introduction to computer networks. Lecture 13

How To Understand The Gsm And Mts Mobile Network Evolution

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

How To Understand The Theory Of Time Division Duplexing

Analog vs. Digital Transmission

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Controlled Random Access Methods


DATA COMMUNICATION AND NETWORKS

Computer Networks CS321

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Lecture 1. Introduction to Wireless Communications 1

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Multiple Access Techniques

MAC Algorithms in Wireless Networks

Based on Computer Networking, 4 th Edition by Kurose and Ross

Wireless Technologies for the 450 MHz band

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Wireless LAN Concepts

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Hello viewers, welcome to today s lecture on cellular telephone systems.

Introduction Chapter 1. Uses of Computer Networks

Chapter 6: Broadcast Systems. Mobile Communications. Unidirectional distribution systems DVB DAB. High-speed Internet. architecture Container

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

IT Data Communication and Networks (Optional)

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CSCI Topics: Internet Programming Fall 2008

A Performance Study of Wireless Broadband Access (WiMAX)

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Medium Access Control (MAC) and Wireless LANs

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

RTT 60.5 msec receiver window size: 32 KB

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure

How To Solve A Network Problem In An Ipa (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Questions for Mobile Communications 2 nd ed.

Antennas & Propagation. CS 6710 Spring 2010 Rajmohan Rajaraman

Data Center Networks, Link Layer Wireless (802.11)

1 Introduction to mobile telecommunications

Whitepaper n The Next Generation in Wireless Technology

RFC 2544 Testing of Ethernet Services in Telecom Networks

Introduction to Wireless Communications and Networks

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

QoS issues in Voice over IP

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Computer Networking Networks

Lecture 18: CDMA. What is Multiple Access? ECE 598 Fall 2006

Inter-Cell Interference Coordination (ICIC) Technology

Transcription:

Lecture #1 Fundamentals on Computer Networks and Wireless Networks Dr. Kun Yang School of Comp. Sci. & Elec. Eng. University of Essex, Colchester, UK Monday 16th March 2009 1 Agenda Fundamentals of Computer Networks Basics of Wireless Networks PHY: Wireless Transmission MAC: Medium Access Control Cognitive Radio Q&A 2 1

A General Communication Model Source System Carries data Destination System Trans- mission System Trans- Transmitter mission Receiver Destination System generates data to be transmitted Converts data into transmittable signals Converts received signal into data Takes incoming data workstation modem Public telephone modem server Network 3 Networking Point to point comm. not usually practical Devices are too far apart Large set of devices would need impractical number of connections Solution is a communications network 4 2

Transmission vs. Switching requires many transmission links Centralised switch network minimises transmission but requires complex switch Trade off 5 ISO OSI (Open Systems Interconnection) Reference Model application-specific protocols data representation and encoding dialog and synchronisation message transfer (and maybe error control, flow control, connection management) network routing and addressing (and maybe connection management) 7 application 6 presentation 5 session 4 transport 3 network Application- oriented End-to-end End-to-end scope Global scope data link control (framing, data transparency and maybe error control) mechanical, electrical and optical interface 2 data link 1 physical Hop-by-hop Local scope 6 3

Layer Specific Standards Service definition (Functional description for internal use) Addressing (Service Access Point: SAP) Protocol Specification (precise syntax and semantics for interoperability) 7 What s a protocol? A human protocol and a computer network protocol Hiya Hey Got the place? Room5 time TCP connection req TCP connection response Get http://www.essex.ac.uk <file> 8 4

Protocols in OSI RM 9 The Full ISO OSI RM 10 5

Layering: Physical Communication data application transport network link physical application transport network link physical network link physical data h i l application i transport network link physical 11 The OSI Environment At Source: each layer takes data from above, adds header information to create new data unit, and then passes new data unit to layer below. At Destination: the opposite operation 12 6

Addressing socket Unicast broadcast - multicast 13 Network Structure Administrative boundaries Autonomous system (AS): intra-domain issues internal policy routing metric? Routing protocols: RIPv2, OSPFv2 Interconnection of ASs: inter-domain issues Interconnectivity information Routing protocols: BGP Service Level Agreement/Specification Business Model Border router 14 7

Network Structure : another view Access network: With dedicated links Low level of multiplexing low volume of traffic ISPs Broadband access: fixed, wireless Distribution network: (transit) interconnectivity at local level low multiplexing medium volume of traffic Metropolitan Area Network Core network backbone: international/global interconnectivity high volume of traffic high multiplexing Network edge: applications and hosts Access metro Core core (backbone) 15 A packet passes through many networks! ISP: Internet Service Provider router local ISP Tier 3 ISP Tier-2 ISP Tier 1 ISP local ISP Wireless ISP Tier-2 ISP NAP wireless ISP mobile hosts local ISP Tier-2 ISP Tier 1 ISP local ISP Tier-2 ISP local ISP Tier 1 ISP Tier-2 ISP local ISP 16 8

Agenda Fundamentals of Computer Networks Basics of Wireless Networks PHY: Wireless Transmission MAC: Medium Access Control Cognitive Radio Q&A Some slides here pay courtesy to J. Schiller, K. Guild & D. Hunter. 17 Frequencies for communication twisted pair coax cable optical transmission 1 Mm 10 km 100 m 1 m 10 mm 100 μm 1 μm 300 Hz 30 khz 3 MHz 300 MHz 30 GHz 3 THz 300 THz VLF LF MF HF VHF UHF SHF EHF infrared visible light UV VLF = Very Low Frequency UHF = Ultra High Frequency LF = Low Frequency SHF = Super High Frequency MF = Medium Frequency EHF = Extra High Frequency HF = High Frequency UV = Ultraviolet Light VHF = Very High Frequency Frequency and wave length: λ = c/f wave length λ, speed of light c 3x10 8 m/s, frequency f 18 9

Radio Frequency Spectrum 19 Frequencies for mobile communication VHF-/UHF-ranges for mobile radio simple, small antenna for cars deterministic propagation p characteristics, reliable connections SHF and higher for directed radio links, satellite communication small antenna, focusing large bandwidth available Wireless LANs use frequencies in UHF to SHF spectrum some systems planned up to EHF limitations due to absorption by water and oxygen molecules (resonance frequencies) weather dependent fading, signal loss caused by heavy rainfall etc. 20 10

Signal propagation ranges Transmission range communication possible low error rate Detection range sender detection of the signal possible transmission no communication distance possible detection Interference range interference signal may not be detected Receiving power proportional to 1/d² signal adds to the background noise 21 Signal propagation Propagation in free space always like light (straight line) Receiving power proportional to 1/d² (d = distance between ee sender and receiver) e Receiving power additionally influenced by fading (frequency dependent) shadowing reflection at large obstacles scattering at small obstacles diffraction at edges shadowing reflection scattering diffraction 22 11

Multipath propagation Signal can take many different paths between sender and receiver due to reflection, scattering, diffraction signal at sender Time dispersion: signal is dispersed over time signal at receiver interference with neighbor symbols, Inter Symbol Interference (ISI) The signal reaches a receiver directly and phase shifted distorted signal depending on the phases of the different parts 23 Digital modulation Modulation digital data is translated into an analog signal (baseband) differences in spectral efficiency, power efficiency, robustness Analog modulation shifts center frequency of baseband signal up to the radio carrier Motivation smaller antennas (e.g., λ/4) Frequency Division Multiplexing medium characteristics Basic schemes Amplitude Modulation (AM) Frequency Modulation (FM) Phase Modulation (PM) 24 12

Multiplexing Goal: multiple use of a shared medium channels k i k 1 k 2 k 3 k 4 k 5 k 6 c t c Multiplexing in 4 dimensions space (s i ) time (t) frequency (f) code (c) s 1 c f s 2 t t f s 3 f 25 Spread spectrum technology Problem of radio transmission: frequency dependent fading can wipe out narrow band signals for duration of the interference Solution: spread the narrow band signal into a broad band signal using a special code protection against narrow band interference power interference spread signal power detection at receiver signal spread interference f f protection against narrowband interference Side effects: coexistence of several signals without dynamic coordination 26 13

Signal vs. Noise The signals at the input of a receiver can be small (< 1 uv). At this level thermal noise generated by the receiver electronics is significant. A perfect receiver at room temperature would generate 4 x 10-21 W of noise per Hz of bandwidth. Noise power is proportional to absolute temperature, cooling the receiver is nice. Real receivers generate 2 8 times more noise power than this in the active devices used to amplify the small signal. The receiver performance is characterised in terms of signal to noise ratio (SNR) 27 Bit Error Rate (BER) The receiver is trying to determine the sequence of bits that were sent by the transmitter. A low signal to noise ratio (SNR) means that there is a probability that the wrong decision will be made. Bit error rate (BER) characterises the performance of a receiver. The relationship between bit error rate and SNR depends on the modulation type. The signal to noise ratio needed for a particular minimum BER is termed the power efficiency. Bit Error Rate (BER) SNR 28 14

Payload Bit Error Rate Leave itto upper layers The physical radio layer cannot support these low error rates. 29 An Mechanism to Reduce BER: ARQ ARQ: Automatic Repeat ReQuest: to repeat data that contains errors. Terminal A sends a message to Terminal B. Terminal B receives the packet with one or more errors. Terminal B has the ability to detect that errors are present. Terminal B sends a message to Terminal A requesting re-transmission. Terminal A re-transmits the errored packet. The new packet is received successfully. ARQ is only applicable when the channel error rate is very low. If the probability of a bit error occurring in a packet is significant the system will be overwhelmed by repeat requests and throughput collapses. ARQ results in a throughput reduction even when there are no errors. Terminal A has to idle while it waits for a repeat request from Terminal B. 30 15

Error Detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields Error detection not 100% reliable! protocol may miss some errors, but rarely larger EDC field yields better detection and correction 31 Parity Checking Single Bit Parity: Detect single bit errors Single Bit Parity If the sum of the bits in a packet is even, add an extra 0 to the packet. If the sum of the bits in a packet is odd, add and extra 1 to the packet. This will only detect a single bit error, if two bits are in error then it will fail. Radio channels can give rise to bursts of errors. More complex error detection schemes are needed. Cyclic Redundancy Check (CRC) codes have become the standard way of solving the problem. 32 16

Cyclic Redundancy Check view data bits, D, as a binary number choose r+1 bit pattern (generator), G goal: choose r CRC bits, R, such that <D,R> exactly divisible by G (modulo 2) receiver knows G, divides <D,R> by G. If non-zero remainder: error detected! can detect all burst errors less than r+1 bits widely used in practice (ATM, HDCL) 33 Want: D. 2 r XOR R = ng equivalently: D. 2 r = ng XOR R equivalently: if we divide D. 2 r by G, we get remainder R CRC Example R = remainder[ ] D. 2 r G 34 17

Agenda Fundamentals of Computer Networks Basics of Wireless Networks PHY: Wireless Transmission MAC: Medium Access Control Cognitive Radio Q&A 35 Multiple Access Links Wireless is Broadcast in nature. single shared broadcast channel but two or more simultaneous transmissions by nodes interference only one node can send successfully at a time 36 18

Multiple Access protocols Distributed algorithm that determines how nodes share channel, i.e., determine when a node can transmit Communication about channel sharing must use channel itself! What to look for in multiple access protocols? 37 Ideal Multiple Access Protocol Broadcast channel of rate R bps 1. When one node wants to transmit, it can send at rate R. 2. When M nodes want to transmit, each can send at average rate R/M 3. Fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4. Simple 38 19

Medium Access Control (MAC) MAC is concerned with controlling each terminal s access to the radio resource. Prevention of collisions i blocking. Fairness in allocating resource Quality of service (QoS): latency (delay), jitter, loss. Distinction between infrastructure networks and adhoc networks Infrastructure networks can have a centralised view of the problem Each terminal can be allocated its resource The infrastructure is responsible for solving the MAC problem Ad-hoc networks require distributed MAC Each terminal has to be responsible for its own MAC 39 Basic Wireless Network Types 40 20

MAC Protocols: a taxonomy Three broad classes: Channel Partitioning divide id channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusive use Random Access channel not divided, allow collisions recover from collisions Taking turns tightly coordinate shared access to avoid collisions 41 Channel Allocation Fixed Channel Allocation Certain Channels are assigned to each cell. Easy to implement but problems when traffic load changes Borrowing Channel Allocation Neigbouring busy cells borrow channels from quiet ones The borrowed channel may be being re-used in a neighbouring cell. Dynamic Channel Allocation A brain dynamically allocates channels to cells depending on their load Where is the brain?? 42 21

Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3) Problems in wireless networks signal strength decreases proportional to the square of the distance the sender would apply CS and CD, but the collisions happen at the receiver it might be the case that a sender cannot hear the collision, i.e., CD does not work furthermore, CS might not work if, e.g., a terminal is hidden 43 Hidden and exposed terminals Hidden terminals A sends to B, C cannot receive A C wants to send to B, C senses a free medium (CS fails) collision at B, A cannot receive the collision (CD fails) A is hidden for C Exposed terminals A B C B sends to A, C wants to send to another terminal (not A or B) C has to wait, CS signals a medium in use but A is outside the radio range of C, therefore waiting is not necessary C is exposed to B 44 22

Near and far terminals Terminals A and B send, C receives signal strength decreases proportional to the square of the distance the signal of terminal B therefore drowns out A s signal C cannot receive A A B C If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer Also severe problem for CDMA-networks where transmitters share transmission frequencies and transmission time - precise power control needed! 45 Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) segment space into sectors, use directed antennas cell structure FDMA (Frequency Division Multiple Access) assign a certain frequency to a transmission channel between a sender and a receiver permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) TDMA (Time Division Multiple Access) assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time The multiplexing schemes are now used to control medium access! 46 23

An FDD/FDMA Example - GSM f 960 MHz 124 935.2 MHz 915 MHz 1 124 20 MHz 200 khz 890.2 MHz 1 t 47 A TDD/TDMA Example: DECT DECT: Digital Enhanced Cordless Telecommunications 417 µs 1 2 3 11 12 1 2 3 11 12 downlink uplink t 48 24

Aloha/slotted aloha Mechanism random, distributed (no central arbiter), time-multiplex Slotted Aloha additionally uses time-slots, sending must always start t at slot boundaries Aloha collision sender A sender B sender C Slotted Aloha collision t sender A sender B sender C t 49 DAMA - Demand Assigned Multiple Access Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length) Reservation can increase efficiency to 80% a sender reserves a future time-slot sending within this reserved time-slot is possible without collision reservation also causes higher delays typical scheme for satellite links Examples for reservation algorithms: Explicit Reservation (Reservation-ALOHA) Implicit Reservation (PRMA: Packet Reservation MA) 50 25

MACA - collision avoidance MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance RTS (request to send): a sender requests the right to send from a receiver with a short RTS packet before it sends a data packet CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain sender address receiver address packet size Variants of this method can be found in IEEE802.11 as DFWMAC (Distributed Foundation Wireless MAC) 51 MACA examples: RTS/CTS MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first RTS C waits after receiving CTS from B CTS (A) CTS(A) A B C MACA avoids the problem of exposed terminals B wants to send to A, and C wants to send to another terminal now C does not have RTS to wait because it cannot receive CTS from A CTS A B C RTS CTS 52 D 26

Polling mechanisms If one terminal can be heard by all others, this central terminal (a.k.a. base station) can poll all other terminals according to a certain scheme Example: Randomly Addressed Polling base station signals readiness to all mobile terminals terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address) the base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address) the base station acknowledges correct packets and continues polling the next terminal this cycle starts again after polling all terminals of the list 53 Access method CDMA CDMA (Code Division Multiple Access) all terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel each sender has a unique random number, the sender XORs the signal with this random number the receiver can tune into this signal if it knows the pseudo random number, tuning is done via a correlation function Disadvantages: higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal) all signals should have the same strength at a receiver Advantages: all terminals can use the same frequency, no planning needed huge code space (e.g. 2 32 ) compared to frequency space forward error correction and encryption can be easily integrated 54 27

Comparison SDMA/TDMA/FDMA/CDMA Approach SDMA TDMA FDMA CDMA Idea segment space into spread the spectrum cells/sectors using orthogonal codes Terminals Signal separation Advantages only one terminal can be active in one cell/one sector cell structure, directed antennas very simple, increases capacity per km² segment sending time into disjoint time-slots, demand driven or fixed patterns all terminals are active for short periods of time on the same frequency synchronization in the time domain established, fully digital, flexible segment the frequency band into disjoint sub-bands every terminal has its own frequency, uninterrupted filtering in the frequency domain simple, established, robust all terminals can be active at the same place at the same moment, uninterrupted code plus special receivers flexible, less frequency planning needed, soft handover Dis- inflexible, antennas guard space inflexible, complex receivers, needs advantages typically fixed needed (multipath frequencies are a more complicated power propagation), scarce resource control for senders synchronization difficult Comment only in combination with TDMA, FDMA or CDMA useful Source: IEEE Comm. Mag. standard in fixed networks, together with FDMA/SDMA used in many mobile networks typically combined with TDMA (frequency hopping patterns) and SDMA (frequency reuse) still faces some problems, higher complexity, lowered expectations; will be integrated with TDMA/FDMA 55 Wireless vs. Wired Wireless transmissions are far less robust than wired Noise If the link is too long the noise is bigger than the signal. Interference Our own, generated within the network Other people using the radio spectrum Mobility Wireless systems are inherently broadcast We may talk about point to point comm but the signals still go everywhere e e We have to engineer a multiple access scheme so that all terminals can share the available radio resource Radio spectrum is an expensive and scarce commodity -> cognitive radio? The radio channel is challenging - particularly indoors -> femto cell? 56 28

Agenda Fundamentals of Computer Networks Basics of Wireless Networks PHY: Wireless Transmission MAC: Medium Access Control Cognitive Radio Q&A 57 Pondering on Spectrum Usage The Ofcom Spectrum Vision Spectrum should be free of technology, policy and usage constraints as far as possible It should be simple and transparent for licence holders to change the ownership and use of spectrum Rights of spectrum users should be clearly defined and users should feel comfortable that they will not be changed without good cause. Source: Ofcom 58 29

Three possible ways of managing Spectrum Command & Control Zone Market Force Zone Licence-exempt Zone Managed Authorities: by: (No variations allowed, for ~100 years!) Current 94% percentage (UK) Companies nobody 0% 6% Future Trend: The regulator cannot know as much as the market. Trading existing spectrum between users Key area for innovation but do we need more? 59 What is Cognitive Radio? a radio that is aware of its surroundings and adapts intelligently. Mitola 2000 Primary users vs. secondary users Source: Ofcom 60 30

A Spectrum Usage Test (London) Source: Ofcom 61 Economics Challenges of Cog. Radio Cost of CR devices over simpler delivery mechanism likely to be higher Non-real time services for CR not as valuable Depends on spectrum congestion and demand Hidden node / sharing issues Ensure CRs do not interfere with each other Making sure that they can exist with legacy users and other Cog. Radio devices Controlling CRs to ensure they have the same spectrum picture How will groups of CRs know what s going on? Devices need to be aware of regulatory constraints Security and malicious use The flexibility of CRs enables illegal transmissions AAA 62 31

Where can I use Cog. Radio? licence-exempt (LE) bands: all right. and Licenced Bands!: not fair?! restricted to licensees? Non-time sensitive services, such as downloading could be most appropriate. But, Emergency communications (with priority flag)?? Broadband wireless services Multimedia wireless networking 63 Conceptual Timeline (IEEE 1900) 64 32

Contact, Q&A Dr Kun Yang Reader in Pervasive Networks & Services School of Comp. Science & Electronic Engineering (CSEE), University of Essex, Wivenhoe Park, Colchester, CO4 3SQ, UK Email: kunyang@essex.ac.uk http://privatewww.essex.ac.uk/~kunyang/ / 65 33