Wireless

1 Introduction

1.1 Elements

1. Wireless Hosts
Wireless does not mean mobility.
2. Base Station
Typically connect to wired network.

1.2 Modes

1. Infrastructure mode

base station connects mobiles into wired network.
Handoff: mobile changes base station

2. ad hoc mode

no base station
nodes orgnize themselves into a network: route among themselves.

2 Characteristics

2.1 Differences from wired link

1. signal strength
2. interference
3. multipath propagation

2.2 SNR versus BER

SNR: signal-to-noise rate
BER: bit error rate
The higher SNR, the lower BER.

2.3 Multiple Access

1. Hidden terminal problem

2. Signal attenuation

watermark/2/text/aHR0cDovL2Jsb2cuY3Nkbi5uZXQvdG9vbWF0b28=/font/5a6L5L2T/fontsize/400/fill/I0JBQkFCMA==/dissolve/70/gravity/SouthEast" alt="">

2.4 CDMA: Code Division Multiple Access

The algorithm is as what I have recapped before

调制(modulation)
(1)先将资料的0转成 -1
A = [1,-1,1], B = [1,1,-1]
优点是在解调时,更可以差别0和1,而使解调错误率下降。
(2-1) A使用Walsh Transform的第一个channel [1,1,1,1,1,1,1,1](即其第一个basis,矩阵的第一个row)来做调制
A_m = [1,1,1,1,1,1,1,1,|-1,-1,-1,-1,-1,-1,-1,-1,|1,1,1,1,1,1,1,1,]。
(2-2) B使用Walsh Transform的第二个channel [1,1,1,1,-1,-1,-1,-1](矩阵的第二个row)来做调制
B_m = [1,1,1,1,-1,-1,-1,-1,|1,1,1,1,-1,-1,-1,-1,|-1,-1,-1,-1,1,1,1,1,]。
(3)将调制的结果相加M = A_m + B_m
M = A_m + B_m = [2,2,2,2,0,0,0,0,0,0,0,0,-2,-2,-2,-2,0,0,0,0,2,2,2,2]
(4)最后传送出去的信号为M,共同拥有24个bit。
解调(demodulation)
(1)将接收到的资料分别和channel做内积
(1-1) M和 第一个channel [1,1,1,1,1,1,1,1]做内积得到
前八码内积:[2,2,2,2,0,0,0,0] \cdot [1,1,1,1,1,1,1,1] = 8
中间八码内积:[0,0,0,0,-2,-2,-2,-2] \cdot [1,1,1,1,1,1,1,1] = -8
后八码内积:[0,0,0,0,2,2,2,2] \cdot [1,1,1,1,1,1,1,1] = 8
(1-2) M和 第二个channel [1,1,1,1,-1,-1,-1,-1]做内积得到
前八码内积:[2,2,2,2,0,0,0,0] \cdot [1,1,1,1,-1,-1,-1,-1] = 8
中间八码内积:[0,0,0,0,-2,-2,-2,-2] \cdot [1,1,1,1,-1,-1,-1,-1] = 8
后八码内积:[0,0,0,0,2,2,2,2] \cdot [1,1,1,1,-1,-1,-1,-1] = -8
(2)内积结果出来若为8,则解调为1;若为 -8,则解调为 -1
(2-1)第一个channel解调出信号为[8, -8, 8] \to [1, -1, 1]
(2-2)第二个channel解调出信号为[8, 8, -8] \to [1, 1, -1]
(3)最后,将 -1还原回0
(3-1)因此。第一个channel成功还原信号为[1, 0, 1]
(3-2)因此。第二个channel成功还原信号为[1, 1, 0]

3 Wi-Fi: IEEE 802.11 Wireless LAN

There is a family of 802 wireless LAN. They all:

1) use CSMA/CA for multiple access

2) have base-station and ad-hoc network versions

3.1 Architecture

1. Basic Service Set: contains

1) wireless hosts

2) access point: base station

3) ad hoc mode: hosts only

2. Channel

1) divided into 11 channels

2) interference possible: neighboring AP chooses same channel.

3. Association

host must associates to a AP

4. Passive/Active Scanning

1) Passive

beacon -> request -> response

2) Active

request -> reponse -> assocation request -> assocation response

3.2 Multiple Access - Avoid Collisions

1. reasons: why not collision detection

1) signal weak
2) can not sense all collisions: hidden terminal problem


2. Avoiding collisions

1) Idea: allow sender to reverse channel. Sender first send request-to-send(RTS) packets to base station using CSMA. BS broadcast clear-to-send(CTS) in response to RTS.

CTS heard by all nodes.

3.3 Frame

1. Addressing

watermark/2/text/aHR0cDovL2Jsb2cuY3Nkbi5uZXQvdG9vbWF0b28=/font/5a6L5L2T/fontsize/400/fill/I0JBQkFCMA==/dissolve/70/gravity/SouthEast" alt="">

1) Address 1: receiver

2) Address 2: sender

3) Address 3: router

2. In frame control
1) Frame type: RTS, CTS, ACK, data

3.4 Other Characteristics

1. Mobility within same subnet

Self-learning: switch will see frame from H1 and remember which switch can be used to reach H1


2. advanced capabilities

1) Rate adaptation

BER vs. SNR

2) Power management

If there is no msg to be sent to this node. This node will sleep. When the node receive ‘beacon frame’, the node will wake up.

3. Personal area network

ad box mode: master/slave/parked device

3.5 802.16: WiMax

antenna: unlike 802.11, it has a large range

downlink/uplink scheduling

4 Cellular Internet Access

4.1 Architecture

like the other architecture, it is hierarchical and consists a list of base station, users, and links or protocols.
In Cellular Internet: the hierarchical arch is formed by Mobile Switching Center. And Cell denotes the components, BS, users, air-interface(protocols)

1. Hops: two techniques

1) FDMA/TDMA: divide spectrum
2) CDMA: bit dot algorithm(see before)

4.2 Standards

2G, 2.5G, 3G

GSM -> GPRS

watermark/2/text/aHR0cDovL2Jsb2cuY3Nkbi5uZXQvdG9vbWF0b28=/font/5a6L5L2T/fontsize/400/fill/I0JBQkFCMA==/dissolve/70/gravity/SouthEast" alt="">

Mobility

1 Principles: addressing and routing

1.1 Address

First I need to clarify some address definations:

1) mobile:

care-of-address, in visited network known by home network

permanent address, in home network known by correspondent to communicate

2) home:

home agent: function entity for mobile

3) correspondent:

who mobile want to contact with.

1.2 Routing

1. Registration

Mobile moves to a visited network, and connects to home agent telling it some mobility information.
Here are three important components:
1) mobile
2) foreign agent
3) home agent

watermark/2/text/aHR0cDovL2Jsb2cuY3Nkbi5uZXQvdG9vbWF0b28=/font/5a6L5L2T/fontsize/400/fill/I0JBQkFCMA==/dissolve/70/gravity/SouthEast" alt="">

2. Indirect Routing

Mobile requests to connect with correspondent through home agent. Then correspondent transfers pkt to mobile through home agent. Mobile replies directly to correspondent.



Triangle routing Problem
On-going connection can be maintains 

3. Direct Routing

watermark/2/text/aHR0cDovL2Jsb2cuY3Nkbi5uZXQvdG9vbWF0b28=/font/5a6L5L2T/fontsize/400/fill/I0JBQkFCMA==/dissolve/70/gravity/SouthEast" alt="">

Correspondent need to get care-of-address when mobile moves to another visited network.
Some Improvement
Accommdation mobility with direct routing
when mobile moves, new FA gets pkt from old FA(Chaining)


2 Mobile IP

2.1 Indirect routing

In indirect or direct routing network, frame should be encapsulated into addresses.

Such as indirect routing network:

1) correspondent: mobile permanent address

2) home agent: add care-of-address(the address of foreign agent address) to find visited network

3) foreign agent: dissolve to a permanent address.

2.2 Agent discovery

agent advertisement: foreign/home agents advertise service by broadcasting ICMP msg.

Registration Example

foreign agent broadcast ICMP msg. And a new mobile will put out registration request to foreign agent. And then foreign agent forwards the request to the home agent and gets the reply for the mobile.

NOTE:

Mobile maintains the home agent address consistantly.

3 Handoff within Mobile Switching Center

3.1 Common:

like mobile move to another foreign network and update the information between BSS and MSC

3.2 Anchor MSC:

like the machanism mentioned above.

[Network]Wireless and Mobile的更多相关文章

  1. UVA 1456 六 Cellular Network

    Cellular Network Time Limit:3000MS     Memory Limit:0KB     64bit IO Format:%lld & %llu Submit S ...

  2. Residential Gateway System for Home Network Service

    Disclosed herein is a Residential Gateway (RG) system for home network service. The RG system receiv ...

  3. 论文翻译:2020_WaveCRN: An efficient convolutional recurrent neural network for end-to-end speech enhancement

    论文地址:用于端到端语音增强的卷积递归神经网络 论文代码:https://github.com/aleXiehta/WaveCRN 引用格式:Hsieh T A, Wang H M, Lu X, et ...

  4. (转) [it-ebooks]电子书列表

    [it-ebooks]电子书列表   [2014]: Learning Objective-C by Developing iPhone Games || Leverage Xcode and Obj ...

  5. 中国计算机学会CCF推荐国际学术会议

    中国计算机学会推荐国际学术会议 (计算机系统与高性能计算) 一.A类 序号 会议简称 会议全称 出版社 网址 1 ASPLOS Architectural Support for Programmin ...

  6. Atitit jsr规范化分类 attilax总结

    Atitit jsr规范化分类 attilax总结 按照技术类别可以分成以下几类:1.Java EE (39 JSRs) --- J2EE平台规范 2.Java SE (42 JSRs) --- J2 ...

  7. [Z] 计算机类会议期刊根据引用数排名

    一位cornell的教授做的计算机类期刊会议依据Microsoft Research引用数的排名 link:http://www.cs.cornell.edu/andru/csconf.html Th ...

  8. CCF推荐国际学术期刊

    中国计算机学会推荐国际学术期刊 (计算机系统与高性能计算) 一.A类 序号 刊物简称 刊物全称 出版社 网址 1 TOCS ACM Transactions on Computer Systems A ...

  9. CCF推荐国际学术会议

    类别如下计算机系统与高性能计算,计算机网络,网络与信息安全,软件工程,系统软件与程序设计语言,数据库.数据挖掘与内容检索,计算机科学理论,计算机图形学与多媒体,人工智能与模式识别,人机交互与普适计算, ...

随机推荐

  1. [ACM] HDU 5083 Instruction (模拟)

    Instruction Time Limit: 2000/1000 MS (Java/Others)    Memory Limit: 32768/32768 K (Java/Others) Tota ...

  2. boost uuid 学习笔记

    #include <vector>#include <iostream>#include <boost/uuid/uuid.hpp>#include <boo ...

  3. STL容器总结

    一. 种类: 标准STL序列容器:vector.string.deque和list. 标准STL关联容器:set.multiset.map和multimap. 非标准序列容器slist和rope.sl ...

  4. Qt调用摄像头(截取并保存图片)

    原地址:http://blog.csdn.net/liang19890820/article/details/12782531 Qt如何调用系统摄像设备进行显示.截图.录制?     QCamera: ...

  5. 俄罗斯方块SDK版

    前言 本来可以从俄罗斯方块控制台版改一版, 将UI接口换掉, 变成SDK版. 正好放假了, 有时间. 就用了一个星期来重头做一个新版, 享受一下静下心来, 有条不紊干活的感觉^_^ 这个工程用来验证S ...

  6. javascript 回调函数应用

    回调函数是什么在学习之前还真不知道js回调函数怎么使用及作用了,下面本文章把我在学习回调函数例子给各位同学介绍一下吧,有需了解的同学不防进入参考. 回调函数原理: 我现在出发,到了通知你”这是一个异步 ...

  7. 大容量XFS异常处理

    今天在检查报警的时候发现部分数据异常,登陆备份机查看文件状态的时候发现磁盘空间已经满了,inode也已经有问题了,因此先停掉了所有的备份进程,开始检查问题. 首先是磁盘空间满了,尝试删除部分文件,发现 ...

  8. EasyUI - Tabs

    代码: 判断是不是已经存在,如果存在,则直接选中,否则创建新的tab. $('#tabs').tabs({ fit: true, border: false }) $('#Tree').tree({ ...

  9. Java-对象多态性

    class A {  public void fun1()  {   System.out.println("<----A------>");  }  public v ...

  10. Hook任务栏时钟窗口(原理其实很简单,就是注入DLL到时钟窗口进程(explorer.exe))

    用过一些日历软件的小伙伴应该都知道它们都实现了在时钟窗口上的Hook,也就是屏蔽了系统原有的功能,实现自己的功能 某日历软件Hook时钟窗口后的效果 经过一番研究,发现原理其实很简单,就是注入DLL到 ...