0% found this document useful (0 votes)
10 views

Thi 2

IOT

Uploaded by

thanh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Thi 2

IOT

Uploaded by

thanh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Using multiple antennas, often referred to as Multiple Input Multiple Output (MIMO), offers several

benefits in wireless communication systems:

1. Increased Capacity and Throughput:


o Spatial Multiplexing: Multiple antennas can transmit different data streams
simultaneously, increasing the overall data rate without needing additional bandwidth or
power.
2. Improved Signal Quality:
o Diversity Gain: Multiple antennas can provide redundancy, allowing the receiver to
combine signals from different paths, reducing the likelihood of deep fades and
improving signal reliability.
3. Enhanced Coverage and Range:
o Beamforming: Multiple antennas can direct the signal towards the intended receiver,
increasing the effective signal strength and reducing interference to and from other users.
4. Better Interference Management:
o Interference Cancellation: MIMO systems can distinguish between signals from
different sources, allowing for better management and reduction of interference.
5. Higher Spectral Efficiency:
o By utilizing the available spectrum more efficiently, MIMO systems can support more
users and higher data rates within the same frequency band.
6. Increased Robustness and Reliability:
o Improved Resilience: The use of multiple antennas provides a safeguard against signal
blockage or degradation, enhancing the overall reliability of the communication system.

These benefits make MIMO a critical technology in modern wireless communication systems, including
Wi-Fi, 4G LTE, and 5G networks.

Wireless vs Mobility

Wireless Communication

Definition:

 Wireless communication refers to the transmission of data or voice over a distance without the
use of wires or cables. The communication is done via electromagnetic waves such as radio
waves, microwaves, etc.

Key Points:

1. Wireless Links:
o Characteristics include signal strength, interference, and multipath propagation.
o Can be indoor or outdoor with varying ranges and data rates.
2. Types of Wireless Networks:
o WiFi (IEEE 802.11): Commonly used for local area networks.
o Bluetooth: Used for short-range communication in personal area networks.
o Cellular Networks (4G/5G): Used for wide-area mobile communication.
3. Multiple Access Control:
Techniques like CSMA/CA (for WiFi), FDMA, TDMA, CDMA, and OFDMA (for
o
cellular networks) are used to manage how multiple devices share the communication
medium.
4. Challenges:
o Decreased signal strength due to path loss.
o Interference from other devices sharing the same frequency bands.
o Multipath propagation causing signal distortion.

Mobility

Definition:

 Mobility refers to the ability of a device or user to move within or between different networks
while maintaining a continuous connection to the network.

Key Points:

1. Mobility Management:
o Principles: Handling the transition of devices from one network to another (e.g.,
handovers in cellular networks).
o Practice: Implementing protocols and mechanisms to ensure seamless connectivity.
2. Types of Mobility:
o Within the Same Network: Device moves but stays within the same network (e.g.,
moving within a WiFi network).
o Between Networks: Device moves from one network to another (e.g., from one cellular
tower to another).
3. Mobility in Cellular Networks:
o 4G/5G Mobility:
 Involves base station handovers and maintaining continuous service.
 Uses elements like MME, S-GW, P-GW, and eNode-B in 4G, and similar
components in 5G for managing mobility.
 Handover procedures are crucial for maintaining active sessions and minimizing
interruptions.
4. Impact on Higher Layer Protocols:
o Mobility can affect higher-layer protocols like TCP and UDP due to issues like packet
loss, delay, and bandwidth variability.
o TCP may misinterpret mobility-related packet loss as network congestion, leading to
reduced throughput.
5. Mobile IP:
o A protocol designed to support mobility by allowing devices to move across different IP
networks while maintaining a permanent IP address.

Summary

 Wireless Communication deals with how devices communicate over a medium without physical
connections.
 Mobility deals with the movement of devices and maintaining continuous service during that
movement.
 Both concepts are integral to modern wireless networks, ensuring efficient communication and
seamless user experiences as devices move.

Challenges of Wireless communication

Wireless communication offers numerous benefits but also comes with several challenges that need to be
addressed:

1. Interference:

 Description: Interference occurs when multiple wireless signals overlap, causing disruption and
degradation in communication quality.
 Sources: Common sources include other wireless networks, electronic devices, and physical
obstructions.

2. Signal Attenuation:

 Description: Signal strength decreases as the distance between the transmitter and receiver
increases.
 Factors: This can be exacerbated by physical obstacles such as buildings, walls, and terrain, as
well as atmospheric conditions.

3. Security:

 Description: Wireless communication is more susceptible to security threats compared to wired


communication.
 Risks: Potential threats include eavesdropping, hacking, and unauthorized access. Ensuring
secure encryption and authentication methods is crucial.

4. Bandwidth Limitations:

 Description: The available spectrum for wireless communication is limited and shared among
multiple users and applications.
 Impact: This can lead to congestion and reduced performance, especially in densely populated
areas.

5. Energy Consumption:

 Description: Wireless devices, especially mobile ones, rely on batteries, and maintaining
wireless communication can be power-intensive.
 Challenge: Balancing performance with energy efficiency is essential to prolong battery life and
ensure device usability.

6. Latency:

 Description: Wireless networks can experience higher latency compared to wired networks due
to signal processing and propagation delays.
 Impact: This can affect real-time applications like video conferencing and online gaming, which
require low latency for optimal performance.

7. Capacity and Scalability:

 Description: As the number of wireless devices increases, managing network capacity and
ensuring scalability becomes more complex.
 Solution: Implementing advanced technologies like MIMO, beamforming, and small cells can
help manage capacity issues.

8. Regulatory and Compliance Issues:

 Description: Wireless communication is subject to regulations that vary by country and region.
 Challenge: Ensuring compliance with local regulations regarding frequency usage, power limits,
and other technical standards is essential.

9. Quality of Service (QoS):

 Description: Maintaining consistent quality of service can be challenging due to varying signal
strengths, interference, and network congestion.
 Strategies: Implementing QoS protocols and prioritizing traffic can help manage and improve
service quality.

10. Compatibility and Interoperability:

 Description: Wireless communication involves various standards and technologies, which can
lead to compatibility issues between different devices and networks.
 Solution: Adhering to international standards and ensuring interoperability through testing and
certification can mitigate these issues.

Addressing these challenges requires continuous advancements in technology, rigorous security


measures, efficient spectrum management, and adherence to regulatory standards to ensure reliable and
secure wireless communication

IEEE 802.11 Standards

The IEEE 802.11 standards encompass a set of protocols for wireless local area networks (WLANs). Here
are some of the most common standards:

1. IEEE 802.11a: Operates in the 5 GHz band with a maximum data rate of 54 Mbps.
2. IEEE 802.11b: Operates in the 2.4 GHz band with a maximum data rate of 11 Mbps.
3. IEEE 802.11g: Also operates in the 2.4 GHz band but offers higher data rates up to 54 Mbps.
4. IEEE 802.11n: Uses both the 2.4 GHz and 5 GHz bands, supporting data rates up to 600 Mbps
with multiple input multiple output (MIMO) technology.
5. IEEE 802.11ac: Operates in the 5 GHz band, providing data rates up to several Gbps with
advanced MIMO and beamforming techniques.
6. IEEE 802.11ax (Wi-Fi 6): Works in both 2.4 GHz and 5 GHz bands, improving efficiency,
capacity, and coverage, supporting data rates up to 10 Gbps.
Components of IEEE 802.11 Architecture

The architecture of IEEE 802.11 networks consists of several key components:

1. Station (STA): Any device with wireless network interface.


2. Access Point (AP): A device that allows wireless devices to connect to a wired network.
3. Basic Service Set (BSS): A group of STAs that communicate with each other under one AP.
4. Extended Service Set (ESS): Multiple BSSs interconnected through a distribution system,
typically using multiple APs.
5. Distribution System (DS): The infrastructure used to connect multiple APs, usually a wired
network.
6. Wireless Medium: The radio frequency spectrum used for wireless communication.

Multiple Access Mechanism

IEEE 802.11 uses the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
mechanism for multiple access. Here’s how it works:

1. Carrier Sense: Each station listens to the wireless medium to check if it is idle before
transmitting.
2. Collision Avoidance: To avoid collisions, a station waits for a random backoff time after the
medium is sensed idle before transmitting.
3. Acknowledgment: After successful transmission, the receiving station sends an acknowledgment
(ACK) to confirm the reception.
4. Request to Send (RTS) / Clear to Send (CTS): Optional mechanism used to further reduce the
risk of collisions, particularly in environments with hidden nodes.

This combination of listening before transmitting and avoiding collisions ensures efficient and reliable
communication in wireless networks.

Components of 4G Network Architecture

The architecture of a 4G network, often based on the LTE (Long-Term Evolution) standard, includes
several key components:

 Mobile Device (User Equipment - UE):

 Smartphones, tablets, laptops, and IoT devices with 4G LTE radios.


 Each device has a 64-bit International Mobile Subscriber Identity (IMSI) stored on a SIM card.

 Base Station (eNode-B):

 Located at the edge of the carrier's network.


 Manages wireless radio resources and mobile devices within its coverage area (cell).
 Coordinates device authentication with other network elements.
 Plays an active role in user mobility and optimizes radio use by coordinating with nearby base
stations.

 Mobility Management Entity (MME):


 Manages device authentication (both device-to-network and network-to-device).
 Handles mobile device management, including handover between cells, tracking, paging device
location, and setting up tunneling paths from mobile devices to PDN Gateway (P-GW).

 Serving Gateway (S-GW):

 Acts as an intermediary between the mobile device and the PDN Gateway (P-GW).
 Lies on the data path from the mobile device to/from the internet.
 Facilitates data forwarding and routing.

 PDN Gateway (P-GW):

 Gateway to the mobile cellular network.


 Functions similarly to an internet gateway router, providing NAT (Network Address Translation)
services.
 Supports extensive use of tunneling for data transfer.

 Home Subscriber Service (HSS):

 Stores information about mobile devices for which the network is their "home network."
 Works with the MME to authenticate devices and manage subscription information.

Association/Hand-off between Mobile User and Base Station

The association and hand-off process in 4G networks involves several steps:

1. Initial Association:
o When a mobile user (UE) powers on, it searches for available networks and selects the
best eNodeB based on signal strength and quality.
o The UE initiates a connection request, and the eNodeB forwards this request to the MME.
o The MME authenticates the user with the HSS and establishes a session by assigning
resources and IP addresses.
2. Hand-off (Handover):
o As the UE moves, it may need to switch from one eNodeB to another to maintain a strong
and reliable connection.
o The serving eNodeB detects that a handover is needed based on signal quality
measurements and coordinates with the target eNodeB.
o The serving eNodeB informs the MME of the impending handover.
o The MME updates the SGW with the new routing information.
o The target eNodeB prepares to receive the UE and allocates the necessary resources.
o The UE switches its connection to the target eNodeB, and data transmission resumes with
minimal interruption.

Key Differences between 4G and Previous Generations

1. All-IP Network:
o 4G networks use an all-IP (Internet Protocol) core network, unlike previous generations
which used a mix of circuit-switched and packet-switched networks. This transition to an
all-IP architecture allows for more efficient and flexible handling of data and voice
services .
2. Enhanced Data Rates:
o 4G networks, specifically LTE (Long-Term Evolution), offer significantly higher data
rates compared to previous generations. 4G provides peak data rates up to 100 Mbps for
high mobility and up to 1 Gbps for low mobility, while 3G networks offered data rates up
to 2 Mbps .
3. Improved Latency:
o 4G networks are designed to reduce latency, which is the time it takes for data to travel
from the source to the destination. This improvement is crucial for applications that
require real-time responsiveness, such as online gaming and video conferencing .
4. Better Spectrum Efficiency:
o 4G networks utilize spectrum more efficiently than previous generations. They employ
advanced techniques such as Orthogonal Frequency Division Multiplexing (OFDM) and
Multiple Input Multiple Output (MIMO) to enhance the capacity and reliability of
wireless communication .
5. Support for Heterogeneous Networks:
o 4G infrastructure supports the integration of various types of networks, including macro
cells, micro cells, pico cells, and femto cells. This heterogeneous network approach helps
in providing better coverage and capacity, especially in densely populated urban areas .
6. Enhanced Mobility Management:
o 4G networks provide improved mobility management, ensuring seamless handovers
between different types of networks and base stations without interrupting ongoing
services. This is crucial for maintaining service continuity for mobile users .
7. Use of SDN and NFV:
o 4G networks embrace the use of Software-Defined Networking (SDN) and Network
Functions Virtualization (NFV), which allow for more flexible and programmable
network management. These technologies enable the dynamic allocation of resources and
the creation of virtual network functions, improving overall network efficiency and
scalability .

These advancements make 4G networks more capable of handling the increasing demand for high-speed
data and the proliferation of connected devices.

Applications of MANETs (Mobile Ad-Hoc Networks) in Real Life

1. Military Communications:
o Usage: Establishing communication in battlefields where infrastructure is not available.
o Benefit: Provides robust, flexible, and secure communication among soldiers, vehicles,
and headquarters.
2. Disaster Recovery:
o Usage: Facilitating communication in areas affected by natural disasters where
conventional communication infrastructure is destroyed.
o Benefit: Enables rescue teams to coordinate efforts and share information quickly.
3. Vehicular Ad-Hoc Networks (VANETs):
o Usage: Enhancing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)
communication for intelligent transportation systems.
o Benefit: Improves road safety, traffic management, and provides real-time information to
drivers.
4. Smart Homes and IoT:
o Usage: Connecting various smart devices in a home or office without a central router.
o Benefit: Facilitates seamless device communication and control within a smart
environment.
5. Community Networks:
o Usage: Providing internet access in remote or underserved areas by connecting nodes in a
peer-to-peer manner.
o Benefit: Reduces the need for extensive infrastructure, making internet access more
affordable and accessible.
6. Event Coverage:
o Usage: Temporary networks set up for communication during large events such as
festivals, concerts, or conferences.
o Benefit: Ensures reliable communication for organizers, security personnel, and
attendees.

Challenges and Difficulties in Communication and Routing

1. Dynamic Topology:
o Challenge: Frequent changes in network topology due to node mobility.
o Impact: Makes it difficult to maintain stable routes and efficient communication.
2. Limited Bandwidth:
o Challenge: Wireless communication in MANETs often has lower bandwidth compared
to wired networks.
o Impact: Can lead to congestion and reduced data transmission rates.
3. Energy Constraints:
o Challenge: Mobile devices typically operate on battery power.
o Impact: Limited energy resources require efficient power management and energy-aware
routing protocols.
4. Security Threats:
o Challenge: Vulnerable to various attacks like eavesdropping, spoofing, and denial of
service.
o Impact: Ensuring secure communication and data integrity is complex.
5. Scalability:
o Challenge: As the number of nodes increases, the routing overhead also increases.
o Impact: Can lead to performance degradation and difficulties in managing large
networks.
6. Quality of Service (QoS):
o Challenge: Ensuring consistent QoS for different applications, especially in varying
network conditions.
o Impact: Critical for applications requiring high reliability and low latency.

Network Architectures of MANETs

1. Star Topology:
o Description: All nodes are directly connected to a central node.
o Advantage: Simple and easy to set up.
o Disadvantage: Central node becomes a single point of failure.
2. Mesh Topology:
o Description: Each node is connected to multiple other nodes, creating a network with
multiple paths.
o Advantage: Highly robust and reliable, as there are multiple paths for data to travel.
o Disadvantage: Complex routing and higher overhead due to multiple connections.
3. Tree Topology:
o Description: Hierarchical structure where nodes are connected in a parent-child
relationship.
o Advantage: Efficient for hierarchical data transmission and control.
o Disadvantage: Not very robust, as failure in a parent node can isolate its child nodes.
4. Hybrid Topology:
o Description: Combines elements of different topologies, typically integrating mesh and
star topologies.
o Advantage: Balances robustness and simplicity, leveraging strengths of multiple
topologies.
o Disadvantage: Can be complex to implement and manage.

Challenges in MANET Routing

1. Dynamic Topology:
o Description: Nodes in a MANET are mobile, leading to frequent changes in network
topology.
o Impact: Routes can become invalid quickly, requiring constant updates and re-
establishment of routes.
2. Limited Bandwidth:
o Description: Wireless communication in MANETs often has lower bandwidth compared
to wired networks.
o Impact: Can lead to congestion, affecting the performance of routing protocols and the
overall network.
3. Energy Constraints:
o Description: Nodes typically rely on battery power.
o Impact: Energy-efficient routing is essential to prolong the lifetime of the nodes and the
network.
4. Security Threats:
o Description: MANETs are vulnerable to various security attacks like eavesdropping,
spoofing, and denial of service.
o Impact: Ensuring secure routing protocols is challenging due to the open nature of the
wireless medium.
5. Scalability:
o Description: The routing protocol must efficiently handle an increasing number of nodes.
o Impact: Protocols may face performance degradation as the network grows in size.
6. Quality of Service (QoS):
o Description: Providing consistent QoS is challenging due to varying network conditions
and node mobility.
o Impact: Critical for applications that require high reliability and low latency.

Approaches in Designing MANET Routing Mechanisms

1. Proactive Routing:
o Description: Maintains fresh lists of destinations and their routes by periodically
distributing routing tables throughout the network.
o Advantage: Routes are readily available when needed, leading to low latency.
o Disadvantage: High overhead due to constant route updates, even when not needed.
2. Reactive Routing:
o Description: Creates routes only when desired by the source node.
o Advantage: Lower overhead as routes are only created when necessary.
o Disadvantage: Can lead to higher latency due to route discovery process.
3. Hybrid Routing:
o Description: Combines the best features of both proactive and reactive routing.
o Advantage: Balances the trade-off between overhead and latency.
o Disadvantage: More complex to design and implement.

Groups and Names of MANET Routing Mechanisms

Reactive Routing Protocols

1. Ad-hoc On-demand Distance Vector (AODV):


o Mechanism: Establishes a route to the destination only on-demand when a source node
requests it.
o Operation: Uses route discovery and route maintenance processes. When a route is
needed, a route request (RREQ) is broadcasted, and nodes reply with route replies
(RREP) if they have the route.
2. Dynamic Source Routing (DSR):
o Mechanism: Uses source routing where the sender determines the complete sequence of
nodes through which to forward the packets.
o Operation: Maintains route caches that store the source routes known by the nodes. The
routes are updated as new routes are learned.

Proactive Routing Protocols

1. Optimized Link State Routing (OLSR):


o Mechanism: Uses periodic control message exchanges to maintain topology information
at each node.
o Operation: Selects multipoint relays (MPRs) to minimize the number of transmissions
needed. Each node maintains routes to all destinations.
2. Destination-Sequenced Distance-Vector (DSDV):
o Mechanism: Based on the Bellman-Ford algorithm, each node maintains a routing table
that includes all available destinations and the number of hops to each.
o Operation: Periodically broadcasts routing updates to ensure all nodes have consistent
routing information.

Hybrid Routing Protocols

1. Zone Routing Protocol (ZRP):


o Mechanism: Divides the network into zones and uses proactive routing within zones and
reactive routing between zones.
o Operation: Each node maintains local routing information for its own zone and uses
bordercasting for inter-zone routing.
2. Temporally Ordered Routing Algorithm (TORA):
o Mechanism: Designed to minimize reaction to topological changes, it uses a hybrid
approach to maintain routes.
o Operation: Creates routes on-demand and maintains multiple routes to the destination to
ensure robustness

MANET Routing Mechanisms: Reactive vs. Proactive

Reactive Routing Protocols

1. Ad-hoc On-demand Distance Vector (AODV):


o Mechanism: Establishes a route to the destination only when required by the source
node.
o Operation: Uses a broadcast route discovery mechanism to find routes and maintains
only active routes, reducing the need for regular updates.
o Example:
 When a node needs to communicate, it broadcasts a Route Request (RREQ)
packet.
 Nodes forward the RREQ until it reaches the destination or a node with a route to
the destination.
 The destination or intermediate node responds with a Route Reply (RREP)
packet.

Proactive Routing Protocols

1. Optimized Link State Routing (OLSR):


o Mechanism: Continuously maintains up-to-date routing information to all nodes in the
network.
o Operation: Each node periodically exchanges topology information with its neighbors.
o Example:
 Nodes use HELLO messages to discover and maintain links with neighbors.
 Link-state information is propagated to all nodes, allowing each node to build a
complete topology map and compute optimal routes.

Summary of MANET Routing Protocols

 Proactive Routing (Table-Driven):


o Example: OLSR (Optimized Link State Routing)
o Characteristic: Maintains consistent, up-to-date routing information at all nodes.
 Reactive Routing (On-Demand):
o Example: AODV (Ad-hoc On-demand Distance Vector)
o Characteristic: Routes are created as needed, reducing overhead but potentially
increasing latency.

Multiple access control

1. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

 Description:
o CSMA/CA is used in WiFi (IEEE 802.11) networks to avoid collisions.
o Nodes sense the channel before transmitting and wait if they detect another transmission.
If the channel is idle, the node can transmit.
o Acknowledgment (ACK) frames are used to confirm successful receipt due to hidden
terminal problems.
o The protocol includes random backoff time to minimize the chances of collisions when
the channel is busy.
 Steps:

1. Sense the channel.


2. If idle, transmit the frame.
3. If busy, wait for a random backoff period.
4. Transmit once the channel is idle again.
5. Use ACK frames for confirmation.

2. RTS/CTS (Request to Send / Clear to Send)

 Description:
o An extension of CSMA/CA to further reduce collisions, especially useful in
environments with hidden terminals.
o A sender transmits an RTS frame to request access to the channel.
o The receiver responds with a CTS frame, granting permission to send.
o All nodes in the vicinity refrain from transmitting for the duration of the data
transmission.
 Steps:

1. Sender transmits RTS.


2. Receiver responds with CTS.
3. Sender transmits the data frame.
4. Receiver sends an ACK after successfully receiving the data.

3. FDMA (Frequency Division Multiple Access)

 Description:
o Used primarily in older analog cellular systems.
o Allocates separate frequency bands to different users.
o Each user operates on their own frequency to avoid interference.

4. TDMA (Time Division Multiple Access)

 Description:
o Divides the available bandwidth into time slots.
o Each user is assigned a specific time slot for transmission, allowing multiple users to
share the same frequency channel without interference.

5. CDMA (Code Division Multiple Access)

 Description:
o Allows multiple users to share the same frequency band simultaneously by assigning
unique codes to each user.
o Users' signals are spread over a wide frequency band and are distinguished by their
unique codes.
o This method is resilient to interference and is used in 3G cellular systems.
 Details:
o Encoding: Data is encoded using a unique chipping sequence.
o Decoding: The receiver uses the same chipping sequence to decode the received signal
and extract the original data.

6. OFDMA (Orthogonal Frequency Division Multiple Access)

 Description:
o A multi-user version of OFDM (Orthogonal Frequency Division Multiplexing).
o Divides the frequency band into multiple orthogonal subcarriers.
o Subsets of subcarriers are allocated to different users, allowing simultaneous transmission
without interference.
o Used in 4G LTE and 5G networks.

Examples from the Document

 WiFi (IEEE 802.11):


o Utilizes CSMA/CA and optionally RTS/CTS for collision avoidance.
o Different versions of WiFi (802.11b/g/n/ac/ax) improve data rates and range but retain
the same basic multiple access control methods.
 Cellular Networks (4G/5G):
o 4G LTE uses OFDMA for downlink and SC-FDMA (Single Carrier FDMA) for uplink to
manage multiple users efficiently.
o 5G further enhances the OFDMA approach, using it in both sub-6 GHz and mmWave
frequency bands to support a large number of users with high data rates.

You might also like