SlideShare a Scribd company logo
CSN08704
Data, Audio, Video and Images
http://asecuritysite.com/comms
Telecommunications
Prof Bill Buchanan
Introduction to Wireless
Introduction
Wired
Devices
Wireless
Devices
Security ...
-Privacy.
-Authentication.
Robustness ...
-Denial of service.
-Interference.
-Crowded radio spectrum.
Bandwidth ...
-Capability to support real-time traffic.
-Limited bandwidth.
-Scalability.
Core
Network
Access
point
Access
point
Range of network
is increasing...
Typically reducing
data rate
• Mobile phone technology. This integrates with the GSM network.
• Wireless (IEEE 802.11). This normally integrated with a fixed network.
• Bluetooth. This normally allows networking between non-computer-type devices,
such as mobile phones, hi-fi’s, and so on.
• Infra-red. This technology is too slow and has a limited range for most applications.
• Line-of-sight optics. This allows for easy connections between buildings, and
involves a laser directing it beam to a receiver. It is typically used around cities and
gives speeds of several Gbps.
• UWB (Ultra-wide Bandwidth). This is a technique which spreads its radio power
over a wide range of frequencies, with an extremely low power (so as not to affect
other communications.
• WiMax.
Wireless LAN Types
Wireless Types
1Gbps100Mbps10Mbps1Mbps0.1Mbps
UWB
Wi-Fi
(100m)
IEEE 802.16
(WiMAX)
4G3G
2G/2.5G
(GSM)
ZigBee
(300m)
Bluetooth
(10m)
Range
Cellular
(Mobile)
WLAN
(Fixed)WLANWPAN
Wireless Integration
• Bandwidth generally
increases as we move
into the core.
• WMAN/Cellular often
provides backbone
connectivity.
Piconet
(Personal
WAN)
WLAN
WMAN/Cellular
Wireless Patchwork Infrastructure
• WMAN (Wireless
Metropolitan Area
Networks) – Support
backbone around city.
• WAN (Wireless Area
Network) – Supports
campus networks.
• PWAN (Personal
Wireless Area Network)
– Supports localized
networks.
PWAN
WAN
WMAN
Radio Wave Fundamentals
Radio Waves
E (Electric field)
H (Magnetic field)
Direction of
propagation
c=f 
cm
f
c
5.12
104.2
103
9
8




T
f =
1
T
c = f 
c = 3 x 108 m/s
Wavelength (m)
Frequency (Hz)
EM Spectrum
103 102 101 1 10-1 10-2 10-3 10-4 10-5 10-6 10-7 10-8 10-9 10-10 10-11 10-12
106 107 108 109 1010 1011 1012 1013 1014 1015 1016 1017 10-9 10-10 10-11 10-12
Radio waves
Microwaves
Infrared Ultraviolet
X-rays
Light
AM radio
(535kHz-
1.7MHz)
FM radio
(88-108MHz)
Wireless Comms
(2.4 and 5GHz)
Wavelength (m)
Frequency (Hz)
Cell phone
(800/ 900MHz)
GPS
(1.2-1.5GHz)
TV
(174-220MHz)
Radio Waves Microwaves Infra-red Ultra-violet X-rays
Gamma
rays
Radio Wave (AM) f=1.7MHz, Bav=170kbps.
Radio Wave (TV) f=200MHz, Bav =20Mbps.
Radio Wave (Mobile phone) f=900MHz, Bav =90Mbps.
Microwave (IEEE 802.11b) f=2.4GHz, Bav =240Mbps.
Infra-red f=1013Hz, Bav =1Tbps.
Power levels
AM radio
(535kHz-
1.7MHz)
FM radio
(88-108MHz)
Wireless Comms
(2.4 and 5GHz)
Cell phone
(800/ 900MHz)
GPS
(1.2-1.5GHz)
TV
(174-220MHz)
106 109
(1GHz)
107 108 1010
Power level
UWB pulse
is spread
across the frequency
spectrum
Noise floor
Frequency (Hz)
RF Bands
LF MF HF VHF UHF
TV signalsFM radioLF radio AM radio
Microwave
Radar/ Satellite/
Wireless
Propagate well over large distances Line-of-sight communications
Radio wave propagation
From 50kHz to 2.5GHz
13.56MHz
(globally defined standard)
135kHz 860-930MHz 2.45GHz
Low range (<0.5m) Med range (1m)High range (5m)Med range (1m)
Issues in Wireless Networks
General Issues
• Multipath radio wave propagation. Radio wave propagate outwards in all
directions, and will thus hit obstacles, which causes multiple paths for the radio
wave. These waves thus add/subtract to signal, and can cause distortion on the
wave.
• Radio data frames collide. Two or more radio devices can be transmitting a data
frame at the same time using the same radio frequency. The data frames may
thus collide and cause errors in the data frames.
• Out-of-range threshold. Wireless devices which are at the boundary of the
wireless domain can suffer from problems with signal strength as the data frames
is being transmitted. This will typically occur when a device is moving around the
threshold of the domain, as weak signal strengths are more affected by noise
than strong ones.
• Noisy environment. Many types of electrical equipment can generate high-
frequency radio waves, which might interfere with the transmitted data frame.
RF Problems: Reflections and Absortions
MetalMetal
Non-
conductor
Non-
conductor
Reflection
from metal
objects
Absorption
(due to density)
Fading
RF Problems: Multipath
Tx Rx
Cellular Technology
Time Slot 1 Time Slot 2 Time Slot 3 Time Slot n
TDM is used in the telephone network,
GSM/3G, and also in network switching.
Time Domain Multiplexing (TDM)
Frequency Domain Multiplexing (FDM)
Frequency Slot 1
FDM is used by Radio Stations and
most Wireless Networks.
Frequency Slot 2
Frequency Slot n
Available Radio Band
B1 B2 B3 B4 B5 Bn
B5
B2
Available radio
band can be split
into sub-bands
to allow simultaneous
communications
Frequency Band Division
• First generation (1G). First generation mobile phones (1G) had
very low transmission rates (typically just a few KB/s),
• Second generation (2G and 2.5G). These are devices improved
this to give several hundred KB/s.
• Third generation (3G). These devices give almost workstation
network bandwidths (several MBps), which allows for full
multimedia transmissions.
• Fourth generation (4G). Always-on connections.
Mobile Phone Network
GSM
network
GSM
gateway
Internet
POTS
(Plain Old
Telephone
System)
Mobile phone technology
If we wish to setup
radio transmitters
how many different
radio frequencies do
we need?
Cellular networks
If we wish to setup
radio transmitters
how many different
radio frequencies do
we need?
3
2
1
2
1
2
1
3
2
3
1
3
Cellular networks
3
2
1
2
1
2
1
3
2
Mobile device will
continually scan for other
frequencies, even when it
connects to one (in this
case, frequency 3).
Sometimes there must
be a handover between
two cells, if a user moves
from one to another, and
is still in a call.
3
1
3
Cellular networks
Spread Spectrum
Spread Spectrum and Frequency Hopping
To avoid interference in the band, radio LANs (RLANs) use either
Frequency Hopping or Direct Sequence Spread Spectrum
techniques (FHSS & DSSS). These two methods avoid or lower the
potential for interference within the band as shown in the next slide.
Spread spectrum technologies work by spreading the actual signal
over a wider bandwidth for transmission. Using these methods
provides resilience from narrow band interference and also reduces
interference to other sources using the ISM (Industrial, Scientific and
Medical) band.
Frequency Hopping Spread Spectrum technology works by splitting
the ISM band into 79 1MHz channels. Data is transmitted in a
sequence over the available channels, spreading the signal across the
band according to a hopping pattern, which has been determined
between the wireless devices. Each channel can only be occupied for
a limited period of time before the system has to hop.
Spread Spectrum and Frequency Hopping
Military systems have been using Spread Spectrum
and Frequency Hopping for many years. This is to:
• Avoid jamming on a certain channel.
• Avoid noise on a certain channel.
• Confuse the enemy as the transmitting frequency
moves in a way that only the sender and receiver
known. Imagine having to move the dial of your radio
receiver, each minute to a certain frequency in a give
way. Such as Radio 1 is broadcast on 909MHz from
12:00, then 915MHz until 12:01, then 900MHz unit
12:02, and so on.
FHSS
2400MHz 2483.5MHz
CH2 -22MHz
Ch74 Ch75Ch03Ch02Ch01
1MHz
CH1 - 22MHz CH7 - 22MHz CH13 - 22MHz
DSSS
Non
overlapping
channels
IEEE 802.11 Networks
IEEE 802.11 - Wireless
• IEEE 802.11a. 802.11a deals with communications available in the 5GHz
frequency, and has a maximum data rate of 54 Mbps.
• IEEE 802.11b. 802.11b, or Wi-Fi, is the standard that is most commonly
used in wireless LAN communications. It has a maximum bandwidth of
11Mbps, at a frequency of 2.4GHz.
• IEEE 802.11g. 802.11g is a proposed standard that hopes to provide
54Mbps maximum bandwidth over a 2.4GHz connection, the same
frequency as the popular 802.11b standard.
• IEEE 802.11c. 802.11c is a group set up to deal with bridging operations
when developing access points.
• IEEE 802.11f. 802.11f is concerned with standardising access point roaming
which is involved in making sure that interoperability between access
points is guaranteed
2.4GHz
802.11b (11Mbps)
802.11g (54Mbps)
5GHz
802.11a (54Mbps)
IEEE 802.11b
Operating Channels:
11 for N. America, 14 Japan, 13 Europe (ETSI), 2 Spain, 4 France
Operating Frequency:
2.412-2.462 GHz (North America), 2.412-2.484 GHz (Japan), 2.412-2.472 GHz (Europe
ETSI), 2.457-2.462 GHz (Spain), 2.457-2.472 GHz (France)
Data Rate:
1, 2, 5.5 or 11Mbps
Media Access Protocol:
CSMA/CA, 802.11 Compliant
Range:
11Mbps: 140m (460 feet)
5.5Mbps: 200m (656 feet)
2Mbps: 270m (885 feet)
1Mbps: 400m (1311 feet)
RF Technology:
Direct Sequence Spread Spectrum
Modulation:
CCK (11Mps, 5.5Mbps), DQPSK (2Mbps), DBPSK (1Mbps)
Network settings
• Authentication algorithm. This sets whether the adapter uses an open
system (where other nodes can listen to the communications), or uses
encryption (using either a WEP key, or a shared key).
• Channel. If an ad-hoc network is used, then the nodes which communicate
must use the same channel.
• Fragmentation threshold. This can be used to split large data frames into
smaller fragments. The value can range from 64 to 1500 bytes. This is used
to improve the efficiency when there is a high amount of traffic on the
wireless network, as smaller frames make more efficient usage of the
network.
• Network type. This can either be set to an infrastructure network (which
use access points, or wireless hubs) or Ad-hoc, which allows nodes to
interconnect without the need for an access point.
Network settings (cont.)
• Preamble mode. This can either be set to Long (which is the default) or short.
A long preamble allows for interoperatively with 1Mbps and 2Mbps DSSS
specifications. The shorter allows for faster operations (as the preamble is kept
to a minimum) and can be used where the transmission parameters must be
maximized, and that there are no interoperatablity problems.
• RTS/CTS threshold. The RTS Threshold prevents the Hidden Node problem,
where two wireless nodes are within range of the same access point, but are
not within range of each other. As they do not know that they both exist on the
network, they may try to communicate with the access point at the same time.
When they do, their data frames may collide when arriving simultaneously at
the Access Point, which causes a loss of data frames from the nodes. The RTS
threshold tries to overcome this by enabling the handshaking signals of Ready
To Send (RTS) and Clear To Send (CTS). When a node wishes to communicate
with the access point it sends a RTS signal to the access point. Once the access
point defines that it can then communicate, the access point sends a CTS
message. The node can then send its data.
CSN08704
Data, Audio, Video and Images
http://asecuritysite.com/comms
Telecommunications
Prof Bill Buchanan
Introduction to Wireless

More Related Content

What's hot

Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
Rituraj Tyagi
 
Wifi wimax
Wifi wimaxWifi wimax
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
Basil John
 
Wireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.xWireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.x
Pawan Koshta
 
IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)
Sushant Kushwaha
 
Pan
PanPan
Wide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM EvolutionWide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM Evolution
Don Norwood
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standards
M.k. Praveen
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
ruledbyrobotics2080
 
Wireless lan
Wireless lanWireless lan
C04 wireless telecommunication-systems[1]
C04 wireless telecommunication-systems[1]C04 wireless telecommunication-systems[1]
C04 wireless telecommunication-systems[1]
Rio Nguyen
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
mahipal9
 
Personal Area Network
Personal Area NetworkPersonal Area Network
Personal Area Network
Faizan Rasool
 
Network communication
Network communicationNetwork communication
Network communication
Md. Mujahiduzzaman
 
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
ProfArshadAbbas
 
Wireless LANs and Mobile Networks
Wireless LANs and Mobile NetworksWireless LANs and Mobile Networks
Wireless LANs and Mobile Networks
Lakshmi Sarvani Videla
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
Joe Christensen
 
Evaluating the Effect of Channel Bonding on Throughput in 802.11n
Evaluating the Effect of Channel Bonding on Throughput in 802.11nEvaluating the Effect of Channel Bonding on Throughput in 802.11n
Evaluating the Effect of Channel Bonding on Throughput in 802.11n
Vaideesh Ravi Shankar
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
Sammar Khan
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
Rashmi Joaa
 

What's hot (20)

Wireless Local Loop
Wireless Local LoopWireless Local Loop
Wireless Local Loop
 
Wifi wimax
Wifi wimaxWifi wimax
Wifi wimax
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Wireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.xWireless pan technologies ieee 802.15.x
Wireless pan technologies ieee 802.15.x
 
IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)
 
Pan
PanPan
Pan
 
Wide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM EvolutionWide-Area Wireless Networks (WANS) – GSM Evolution
Wide-Area Wireless Networks (WANS) – GSM Evolution
 
Wireless communication and its standards
Wireless communication and its standardsWireless communication and its standards
Wireless communication and its standards
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
C04 wireless telecommunication-systems[1]
C04 wireless telecommunication-systems[1]C04 wireless telecommunication-systems[1]
C04 wireless telecommunication-systems[1]
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
Personal Area Network
Personal Area NetworkPersonal Area Network
Personal Area Network
 
Network communication
Network communicationNetwork communication
Network communication
 
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
Lectures On Wireless Communication By Professor Dr Arshad Abbas Khan
 
Wireless LANs and Mobile Networks
Wireless LANs and Mobile NetworksWireless LANs and Mobile Networks
Wireless LANs and Mobile Networks
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Evaluating the Effect of Channel Bonding on Throughput in 802.11n
Evaluating the Effect of Channel Bonding on Throughput in 802.11nEvaluating the Effect of Channel Bonding on Throughput in 802.11n
Evaluating the Effect of Channel Bonding on Throughput in 802.11n
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 

Viewers also liked

Telecommunication, internet and wireless technology
Telecommunication, internet and wireless technologyTelecommunication, internet and wireless technology
Telecommunication, internet and wireless technology
Kristina Pesic
 
Telecommunication and networks
Telecommunication  and networksTelecommunication  and networks
Telecommunication and networks
Sergio Bedoya Fernandez
 
Bluetooth
BluetoothBluetooth
Bluetooth
Akshya Kasot
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
Hemant Nagwekar
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Prof. Othman Alsalloum
 
Telecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless TechnologyTelecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless Technology
Syed Ali Roshaan Raza
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networking
Milan Padariya
 
Telecommunication
TelecommunicationTelecommunication
Telecommunication
shahryarshahzad
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
UMaine
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Kaushal Kaith
 

Viewers also liked (10)

Telecommunication, internet and wireless technology
Telecommunication, internet and wireless technologyTelecommunication, internet and wireless technology
Telecommunication, internet and wireless technology
 
Telecommunication and networks
Telecommunication  and networksTelecommunication  and networks
Telecommunication and networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Telecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless TechnologyTelecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless Technology
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networking
 
Telecommunication
TelecommunicationTelecommunication
Telecommunication
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesPresentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless Technologies
 

Similar to Telecommunications: Introduction to Wireless Networks

Meixia Tao Introduction To Wireless Communications And Recent Advances
Meixia Tao Introduction To Wireless Communications And Recent AdvancesMeixia Tao Introduction To Wireless Communications And Recent Advances
Meixia Tao Introduction To Wireless Communications And Recent Advances
melvincabatuan
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
DrAdeelAkram2
 
Sky Con Presentation
Sky Con PresentationSky Con Presentation
Sky Con Presentation
Evert Bopp
 
Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik
Siber Güvenlik Toplululuğu
 
Ultra wide band
Ultra wide bandUltra wide band
Ultra wide band
jalal hussein
 
Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1
Ahmed Sakr
 
UWB and applications
UWB and applicationsUWB and applications
UWB and applications
Thomas George C
 
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit JadavAdvanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
NSConclave
 
cdma
cdmacdma
cdma
lasyateja
 
Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).
MANIRAFASHA Cedrick
 
4 g communication systems
4 g communication systems4 g communication systems
4 g communication systems
Akash R
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
Bayarmaa GBayarmaa
 
OFDM
OFDMOFDM
4G technology
4G technology 4G technology
Lecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdfLecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdf
ssuser953ee81
 
Wireless 4 g presentation
Wireless 4 g presentationWireless 4 g presentation
Wireless 4 g presentation
Murtadha ali shukur
 
Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless Networks
Yoram Orzach
 
Mobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdfMobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdf
vaibhav457294
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_Linkedin
Robert Russell
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
Katende Willy
 

Similar to Telecommunications: Introduction to Wireless Networks (20)

Meixia Tao Introduction To Wireless Communications And Recent Advances
Meixia Tao Introduction To Wireless Communications And Recent AdvancesMeixia Tao Introduction To Wireless Communications And Recent Advances
Meixia Tao Introduction To Wireless Communications And Recent Advances
 
Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
 
Sky Con Presentation
Sky Con PresentationSky Con Presentation
Sky Con Presentation
 
Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik
 
Ultra wide band
Ultra wide bandUltra wide band
Ultra wide band
 
Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1Subsampling Multi-standard receiver design, Part-1
Subsampling Multi-standard receiver design, Part-1
 
UWB and applications
UWB and applicationsUWB and applications
UWB and applications
 
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit JadavAdvanced Wireless Reconnaissance And Testing - Rohit Jadav
Advanced Wireless Reconnaissance And Testing - Rohit Jadav
 
cdma
cdmacdma
cdma
 
Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).
 
4 g communication systems
4 g communication systems4 g communication systems
4 g communication systems
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
 
OFDM
OFDMOFDM
OFDM
 
4G technology
4G technology 4G technology
4G technology
 
Lecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdfLecture 01 Introduction to WMC.pdf
Lecture 01 Introduction to WMC.pdf
 
Wireless 4 g presentation
Wireless 4 g presentationWireless 4 g presentation
Wireless 4 g presentation
 
Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless Networks
 
Mobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdfMobile-Wireless-Networks.pdf
Mobile-Wireless-Networks.pdf
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_Linkedin
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
 

More from Napier University

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
Napier University
 
Networks
NetworksNetworks
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
Napier University
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
Napier University
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
Napier University
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
Napier University
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
Napier University
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
Napier University
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
Napier University
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Napier University
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
Napier University
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
Napier University
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
Napier University
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
Napier University
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Napier University
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
Napier University
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Napier University
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
Napier University
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Napier University
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Napier University
 

More from Napier University (20)

Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Networks
NetworksNetworks
Networks
 
Memory, Big Data and SIEM
Memory, Big Data and SIEMMemory, Big Data and SIEM
Memory, Big Data and SIEM
 
What is Cyber Data?
What is Cyber Data?What is Cyber Data?
What is Cyber Data?
 
Open Source Intelligence
Open Source IntelligenceOpen Source Intelligence
Open Source Intelligence
 
10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas10. Data to Information: NumPy and Pandas
10. Data to Information: NumPy and Pandas
 
2. Defence Systems
2. Defence Systems2. Defence Systems
2. Defence Systems
 
1. Cyber and Intelligence
1. Cyber and Intelligence1. Cyber and Intelligence
1. Cyber and Intelligence
 
The Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan DelatinneThe Road Ahead for Ripple, Marjan Delatinne
The Road Ahead for Ripple, Marjan Delatinne
 
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
 
ARTiFACTS, Emma Boswood
ARTiFACTS, Emma BoswoodARTiFACTS, Emma Boswood
ARTiFACTS, Emma Boswood
 
RMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris BergRMIT Blockchain Innovation Hub, Chris Berg
RMIT Blockchain Innovation Hub, Chris Berg
 
Keynote, Naseem Naqvi
Keynote, Naseem Naqvi Keynote, Naseem Naqvi
Keynote, Naseem Naqvi
 
Browser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F MondscheinBrowser-based Crypto M, C. F Mondschein
Browser-based Crypto M, C. F Mondschein
 
Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...Should we transform or adapt to blockchain - a public sector perspective?, Al...
Should we transform or adapt to blockchain - a public sector perspective?, Al...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK ShyamasundarRobust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
 
Using Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael PrabuckiUsing Blockchain for Evidence Purpose, Rafael Prabucki
Using Blockchain for Evidence Purpose, Rafael Prabucki
 
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
 
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata FereirraEmerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 

Telecommunications: Introduction to Wireless Networks

  • 1. CSN08704 Data, Audio, Video and Images http://asecuritysite.com/comms Telecommunications Prof Bill Buchanan Introduction to Wireless
  • 3. Wired Devices Wireless Devices Security ... -Privacy. -Authentication. Robustness ... -Denial of service. -Interference. -Crowded radio spectrum. Bandwidth ... -Capability to support real-time traffic. -Limited bandwidth. -Scalability.
  • 4. Core Network Access point Access point Range of network is increasing... Typically reducing data rate
  • 5. • Mobile phone technology. This integrates with the GSM network. • Wireless (IEEE 802.11). This normally integrated with a fixed network. • Bluetooth. This normally allows networking between non-computer-type devices, such as mobile phones, hi-fi’s, and so on. • Infra-red. This technology is too slow and has a limited range for most applications. • Line-of-sight optics. This allows for easy connections between buildings, and involves a laser directing it beam to a receiver. It is typically used around cities and gives speeds of several Gbps. • UWB (Ultra-wide Bandwidth). This is a technique which spreads its radio power over a wide range of frequencies, with an extremely low power (so as not to affect other communications. • WiMax. Wireless LAN Types
  • 7. Wireless Integration • Bandwidth generally increases as we move into the core. • WMAN/Cellular often provides backbone connectivity. Piconet (Personal WAN) WLAN WMAN/Cellular
  • 8. Wireless Patchwork Infrastructure • WMAN (Wireless Metropolitan Area Networks) – Support backbone around city. • WAN (Wireless Area Network) – Supports campus networks. • PWAN (Personal Wireless Area Network) – Supports localized networks. PWAN WAN WMAN
  • 10. Radio Waves E (Electric field) H (Magnetic field) Direction of propagation c=f  cm f c 5.12 104.2 103 9 8     T f = 1 T c = f  c = 3 x 108 m/s Wavelength (m) Frequency (Hz)
  • 11. EM Spectrum 103 102 101 1 10-1 10-2 10-3 10-4 10-5 10-6 10-7 10-8 10-9 10-10 10-11 10-12 106 107 108 109 1010 1011 1012 1013 1014 1015 1016 1017 10-9 10-10 10-11 10-12 Radio waves Microwaves Infrared Ultraviolet X-rays Light AM radio (535kHz- 1.7MHz) FM radio (88-108MHz) Wireless Comms (2.4 and 5GHz) Wavelength (m) Frequency (Hz) Cell phone (800/ 900MHz) GPS (1.2-1.5GHz) TV (174-220MHz) Radio Waves Microwaves Infra-red Ultra-violet X-rays Gamma rays Radio Wave (AM) f=1.7MHz, Bav=170kbps. Radio Wave (TV) f=200MHz, Bav =20Mbps. Radio Wave (Mobile phone) f=900MHz, Bav =90Mbps. Microwave (IEEE 802.11b) f=2.4GHz, Bav =240Mbps. Infra-red f=1013Hz, Bav =1Tbps.
  • 12. Power levels AM radio (535kHz- 1.7MHz) FM radio (88-108MHz) Wireless Comms (2.4 and 5GHz) Cell phone (800/ 900MHz) GPS (1.2-1.5GHz) TV (174-220MHz) 106 109 (1GHz) 107 108 1010 Power level UWB pulse is spread across the frequency spectrum Noise floor Frequency (Hz)
  • 13. RF Bands LF MF HF VHF UHF TV signalsFM radioLF radio AM radio Microwave Radar/ Satellite/ Wireless Propagate well over large distances Line-of-sight communications Radio wave propagation From 50kHz to 2.5GHz 13.56MHz (globally defined standard) 135kHz 860-930MHz 2.45GHz Low range (<0.5m) Med range (1m)High range (5m)Med range (1m)
  • 14. Issues in Wireless Networks
  • 15. General Issues • Multipath radio wave propagation. Radio wave propagate outwards in all directions, and will thus hit obstacles, which causes multiple paths for the radio wave. These waves thus add/subtract to signal, and can cause distortion on the wave. • Radio data frames collide. Two or more radio devices can be transmitting a data frame at the same time using the same radio frequency. The data frames may thus collide and cause errors in the data frames. • Out-of-range threshold. Wireless devices which are at the boundary of the wireless domain can suffer from problems with signal strength as the data frames is being transmitted. This will typically occur when a device is moving around the threshold of the domain, as weak signal strengths are more affected by noise than strong ones. • Noisy environment. Many types of electrical equipment can generate high- frequency radio waves, which might interfere with the transmitted data frame.
  • 16. RF Problems: Reflections and Absortions MetalMetal Non- conductor Non- conductor Reflection from metal objects Absorption (due to density) Fading
  • 19. Time Slot 1 Time Slot 2 Time Slot 3 Time Slot n TDM is used in the telephone network, GSM/3G, and also in network switching. Time Domain Multiplexing (TDM)
  • 20. Frequency Domain Multiplexing (FDM) Frequency Slot 1 FDM is used by Radio Stations and most Wireless Networks. Frequency Slot 2 Frequency Slot n
  • 21. Available Radio Band B1 B2 B3 B4 B5 Bn B5 B2 Available radio band can be split into sub-bands to allow simultaneous communications Frequency Band Division
  • 22. • First generation (1G). First generation mobile phones (1G) had very low transmission rates (typically just a few KB/s), • Second generation (2G and 2.5G). These are devices improved this to give several hundred KB/s. • Third generation (3G). These devices give almost workstation network bandwidths (several MBps), which allows for full multimedia transmissions. • Fourth generation (4G). Always-on connections. Mobile Phone Network
  • 24. If we wish to setup radio transmitters how many different radio frequencies do we need? Cellular networks
  • 25. If we wish to setup radio transmitters how many different radio frequencies do we need? 3 2 1 2 1 2 1 3 2 3 1 3 Cellular networks
  • 26. 3 2 1 2 1 2 1 3 2 Mobile device will continually scan for other frequencies, even when it connects to one (in this case, frequency 3). Sometimes there must be a handover between two cells, if a user moves from one to another, and is still in a call. 3 1 3 Cellular networks
  • 28. Spread Spectrum and Frequency Hopping To avoid interference in the band, radio LANs (RLANs) use either Frequency Hopping or Direct Sequence Spread Spectrum techniques (FHSS & DSSS). These two methods avoid or lower the potential for interference within the band as shown in the next slide. Spread spectrum technologies work by spreading the actual signal over a wider bandwidth for transmission. Using these methods provides resilience from narrow band interference and also reduces interference to other sources using the ISM (Industrial, Scientific and Medical) band. Frequency Hopping Spread Spectrum technology works by splitting the ISM band into 79 1MHz channels. Data is transmitted in a sequence over the available channels, spreading the signal across the band according to a hopping pattern, which has been determined between the wireless devices. Each channel can only be occupied for a limited period of time before the system has to hop.
  • 29. Spread Spectrum and Frequency Hopping Military systems have been using Spread Spectrum and Frequency Hopping for many years. This is to: • Avoid jamming on a certain channel. • Avoid noise on a certain channel. • Confuse the enemy as the transmitting frequency moves in a way that only the sender and receiver known. Imagine having to move the dial of your radio receiver, each minute to a certain frequency in a give way. Such as Radio 1 is broadcast on 909MHz from 12:00, then 915MHz until 12:01, then 900MHz unit 12:02, and so on.
  • 30. FHSS 2400MHz 2483.5MHz CH2 -22MHz Ch74 Ch75Ch03Ch02Ch01 1MHz CH1 - 22MHz CH7 - 22MHz CH13 - 22MHz DSSS Non overlapping channels
  • 32. IEEE 802.11 - Wireless • IEEE 802.11a. 802.11a deals with communications available in the 5GHz frequency, and has a maximum data rate of 54 Mbps. • IEEE 802.11b. 802.11b, or Wi-Fi, is the standard that is most commonly used in wireless LAN communications. It has a maximum bandwidth of 11Mbps, at a frequency of 2.4GHz. • IEEE 802.11g. 802.11g is a proposed standard that hopes to provide 54Mbps maximum bandwidth over a 2.4GHz connection, the same frequency as the popular 802.11b standard. • IEEE 802.11c. 802.11c is a group set up to deal with bridging operations when developing access points. • IEEE 802.11f. 802.11f is concerned with standardising access point roaming which is involved in making sure that interoperability between access points is guaranteed 2.4GHz 802.11b (11Mbps) 802.11g (54Mbps) 5GHz 802.11a (54Mbps)
  • 33. IEEE 802.11b Operating Channels: 11 for N. America, 14 Japan, 13 Europe (ETSI), 2 Spain, 4 France Operating Frequency: 2.412-2.462 GHz (North America), 2.412-2.484 GHz (Japan), 2.412-2.472 GHz (Europe ETSI), 2.457-2.462 GHz (Spain), 2.457-2.472 GHz (France) Data Rate: 1, 2, 5.5 or 11Mbps Media Access Protocol: CSMA/CA, 802.11 Compliant Range: 11Mbps: 140m (460 feet) 5.5Mbps: 200m (656 feet) 2Mbps: 270m (885 feet) 1Mbps: 400m (1311 feet) RF Technology: Direct Sequence Spread Spectrum Modulation: CCK (11Mps, 5.5Mbps), DQPSK (2Mbps), DBPSK (1Mbps)
  • 34. Network settings • Authentication algorithm. This sets whether the adapter uses an open system (where other nodes can listen to the communications), or uses encryption (using either a WEP key, or a shared key). • Channel. If an ad-hoc network is used, then the nodes which communicate must use the same channel. • Fragmentation threshold. This can be used to split large data frames into smaller fragments. The value can range from 64 to 1500 bytes. This is used to improve the efficiency when there is a high amount of traffic on the wireless network, as smaller frames make more efficient usage of the network. • Network type. This can either be set to an infrastructure network (which use access points, or wireless hubs) or Ad-hoc, which allows nodes to interconnect without the need for an access point.
  • 35. Network settings (cont.) • Preamble mode. This can either be set to Long (which is the default) or short. A long preamble allows for interoperatively with 1Mbps and 2Mbps DSSS specifications. The shorter allows for faster operations (as the preamble is kept to a minimum) and can be used where the transmission parameters must be maximized, and that there are no interoperatablity problems. • RTS/CTS threshold. The RTS Threshold prevents the Hidden Node problem, where two wireless nodes are within range of the same access point, but are not within range of each other. As they do not know that they both exist on the network, they may try to communicate with the access point at the same time. When they do, their data frames may collide when arriving simultaneously at the Access Point, which causes a loss of data frames from the nodes. The RTS threshold tries to overcome this by enabling the handshaking signals of Ready To Send (RTS) and Clear To Send (CTS). When a node wishes to communicate with the access point it sends a RTS signal to the access point. Once the access point defines that it can then communicate, the access point sends a CTS message. The node can then send its data.
  • 36. CSN08704 Data, Audio, Video and Images http://asecuritysite.com/comms Telecommunications Prof Bill Buchanan Introduction to Wireless