Wireless Mobile Networking
Wireless Mobile Networking
net/publication/360956823
CITATIONS READS
2 203
1 author:
Mahbub Hassan
UNSW Sydney
262 PUBLICATIONS 5,499 CITATIONS
SEE PROFILE
All content following this page was uploaded by Mahbub Hassan on 24 February 2024.
p,
p,
A SCIENCE PUBLISHERS BOOK
A SCIENCE PUBLISHERS BOOK
First edition published 2022
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
and by CRC Press
2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences
of their use. The authors and publishers have attempted to trace the copyright holders of
all material reproduced in this publication and apologize to copyright holders if permission
to publish in this form has not been obtained. If any copyright material has not been
acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted,
reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means,
now known or hereafter invented, including photocopying, microfilming, and recording, or in
any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access
www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please
contact mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and
are used only for identification and explanation without intent to infringe.
Acknowledgements
This book could not be written without the caring mentorship and help from
Professor Raj Jain while the author spent his sabbatical at the Washington
University in Saint Louis. The author also acknowledges sabbatical leaves,
a.k.a. Special Studies Program, granted by the University of New South Wales.
Mahbub Hassan
Contents
Preface iii
Part I: Introduction
1. Wireless and Mobile Networking: From Past to Present 3
1. Wireless History
Today’s wireless industry is built on a long and rich history of significant
discoveries and innovations over many decades. Figure 1 captures the major
developments in wireless history, which started back in 1880’s with the
discovery and experimental verification of the existence of electromagnetic
waves. In the middle of the 19th century, Maxwell derived equations that
explained how electric and magnetic fields interact to produce electromagnetic
waves. A few years later, in 1886, Hertz experimentally validated successful
transmission of radio waves and discovered that all electromagnetic waves
travel at a constant speed having the same velocity as light.
While Hertz discovered the most fundamental ingredient of wireless
communications that we enjoy today, there was no specific commercial goal
behind the discovery. Ten years later, in 1896, Marconi invented wireless
telegraph [MARCONI], which enabled transmission of telegraphic messages
completely wirelessly, without having to rely on any cables or wires between
the sending and receiving stations.
Early to middle 20th century saw the development of audio and video
broadcasting using radio and TV technologies including launching of
communications satellites to achieve global coverage.
4 Wireless and Mobile Networking
1971: Operation of the first packet radio network, ALOHANet, connecting the Hawaiian islands
Wired
Fig. 2. Wires fading into the backbone while wireless dominates the access.
6 Wireless and Mobile Networking
3. Book Outline
The book is organized into six parts, including the first one that basically
provides an introduction to the book. Each of the remaining five parts focuses
on a specific broad topic or wireless technology while the subtopics within it
are organised into multiple chapters.
Part II provides a review of the fundamentals of wireless communications
that are critical to understand the wireless technologies covered in the rest of
the book. This part contains two chapters. Chapter 2 covers the basic theories
and terminologies of ‘coding and modulation’, which is the fundamental
technique to map digital information to the underlying signal, so that a
receiver can retrieve the information from the signal using appropriate
decoder and demodulator. Chapter 3 explains the fundamentals of ‘wireless
signal propagation’ and discusses mathematical models used to capture such
propagation dynamics.
Part III covers ‘WiFi’, which is one of the most widely used wireless
networking technologies today, especially for indoor and local area
applications. WiFi has been primarily used as a networking technology
for enterprise and residential domains, as well as for connecting personal
mobile devices, such as mobile phones, tablets, laptops, etc., to the Internet
in homes, cafes, airports, and university campuses. These mainstream WiFi
predominantly used the ISM bands 2.4 GHz and 5 GHz, with the new versions
aiming to use the 6 GHz band. In addition to these mainstream WiFi, IEEE has
also released several 802.11 amendments that target some niche applications.
These niche WiFi standards operate outside the mainstream bands, both at
the very low end of the spectrum, i.e., below 1 GHz, as well as at the very
high end, i.e., 60 GHz. For example, 802.11af is targeting the exploitation of
700 MHz spectrum recently vacated by TV stations due to their digitization,
802.11ah using 900 MHz to connect emerging Internet of Things operating at
low power, and 802.11ad/ay at 60 GHz to support multi-gigabit applications
at short range. To systematically cover these developments, this part breaks
the treatment of WiFi into three chapters. Chapter 4 covers the ‘basics of
WiFi’ that are common to all WiFi versions. Chapter 5 covers the ‘mainstream
WiFi’, while Chapter 6 focuses on ‘niche WiFi’.
Part IV is dedicated to ‘cellular networks’, which are designed to provide
wide area coverage to both static and mobile users. Cellular network is the
oldest communications network technology, which has now gone through
several generations of evolution, with the fifth generation currently being
deployed. Chapter 7 covers the fundamental concepts of cellular networks with
a brief examination of the advancements brought forth by each generation up
to the fourth. While the previous four generations mainly sought to improve
the data rate and capacity of the cellular systems, 5G is designed to improve
Wireless and Mobile Networking: From Past to Present 7
is difficult to build, in disaster zones with damaged cellular towers, and even
in urban areas to absorb sudden peaks in data traffic. The final chapter of the
book, Chapter 14, examines options, characteristics, and design considerations
for such ‘aerial wireless networks’.
References
[ALOHANET] N. Abramson, The ALOHAnet–surfing for wireless data. IEEE
Communications Magazine, Dec. 2009, pp. 23–25.
[ACCENTURE] How the wireless industry powers the U.S. economy. Accenture. https://
www.accenture.com/_acnmedia/PDF-74/Accenture-Strategy-Wireless-Industry-
Powers-US-Economy-2018-POV.pdf [accessed 28 Sep. 2021].
[BLUETOOTH] 802.15.1-2002 - IEEE Standard for Telecommunications and Information
Exchange between Systems - LAN/MAN - Specific Requirements - Part 15: Wireless
Medium Access Control (MAC) and Physical Layer (PHY) Specifications for
Wireless Personal Area Networks (WPANs). pp. 1–473. In: IEEE Std 802.15.1-2002.
14 June 2002.
[BT-SIG2020] 2020Bluetooth Market Report, Bluetooth SIG. https:www.bluetooth.com.
[CISCOREPORT] Cisco Annual Internet Report (2018–2023) white paper, 9 March, 2020.
[LORAMARKET] LoRa and LoRaWAN Devices Market – Forecast (2021–2026).
https://www.industryarc.com/Report/19424/lora-and-lorawan-devices-market.
html#:~:text=LoRa%20and%20LoRaWAN%20Devices%20Market%20
Overview,36.5%25%20during%202021%2D2026 [accessed 28 Sep. 2021].
[MARCONI] Guglielmo MarconiBiographical. https://www.nobelprize.org/prizes/
physics/1909/marconi/biographical/ [accessed 28 Sep. 2021].
[WIFI, 1997]. IEEE standard for Wireless LAN medium access control (MAC) and
physical layer (PHY) specifications. pp. 1–445. In: IEEE Std 802.11-1997. 18 Nov.
1997.
Part II
Physical Layer Fundamentals
2
Wireless Coding and Modulation
the current time, which allows us to obtain the value of the wave at any time
using this formula. The period, T, of the wave is obtained as T = 1/f.
Figure 2 illustrates the frequency, amplitude, and phase of a sine wave.
Amplitude is the height of the wave, measured from zero to the maximum
value, either up or down. Note that the sine wave is cyclic, i.e., it keeps
repeating the pattern. One complete pattern is called a cycle.
Wireless Coding and Modulation 13
Q = Cos(2πft)
1
√2
I = Sin(2πft)
1 1
is sine and the y-axis cosine. With I = and Q =
, we get a single point
2 2
in the graph, which has a length (amplitude) of 1 (= √I 2 + Q 2 ), and an angle
(phase) of 45°.
1.2 Wavelength
Waves propagate through space and cover distances over time. The distance
occupied by one cycle is called the wavelength of the wave and is represented
by λ. This is the distance between two points of corresponding phase in two
consecutive cycles, as shown in Fig. 4.
In the air or space, all electromagnetic waves, irrespective of their
frequencies, travel at the speed of light, which is a universal constant of
300 m/µs. Given that it takes T sec for the wave to complete a cycle (T is
called the period of the wave) and that T = 1/f, we have
λ = cT = c/f (2)
Now we see that the wavelength is inversely proportional to its frequency.
Equation (2) is a universal formula that can be used to derive the
wavelength for any type of communication medium. For example, for acoustic
communications, which use sound waves to transmit data, the parameter c in
Equation (2) should represent the speed of sound, which is only 343 m/s in
dry air at 20º Celsius. Table 1 lists the wavelengths for some of the popular
electromagnetic frequencies.
Amplitude
Distance
Example 1
What is the wavelength of a 2.5 GHz electromagnetic signal propagating
through air?
Solution
c
Wavelength= λ=
f
300 m/µ s
=
2.5 × 109
=120 × 10−3 =120 mm =12 cm
Example 2
What is the frequency of a signal with 5 mm wavelength?
Solution
Wavelength = λ = 5 mm
Frequency = f = c/λ
= (3 × 108 m/s)/(5 × 10–3 m)
= (300 × 109)/5 = 60 GHz
Using three different sine waves, Fig. 5 illustrates the conversion from
time domain representation (left hand side) to frequency domain (right hand
side). The top sine wave has a frequency 1 ( f ) and amplitude 1 (A). In the
frequency domain, it is therefore just a pulse at frequency f = 1 (x-axis) having
a height A = 1 (y-axis). The second sine wave has three times the frequency
as the original one, but one-third its amplitude. Therefore, in the frequency
domain, its pulse is located at 3 and has a height of 0.5.
The third sine wave is actually a combination of the first and the second
waves. One can actually just add the wave values at each time instant to derive
the third one. In the frequency domain, it therefore has pulses at two frequencies.
The pulse at frequency 1 has a height of 1 and the pulse at 3 has 0.5.
The transformation of a wave from time domain to frequency domain
is called Fourier transform and from frequency domain to time domain is
Amplitude
Time Amplitude
Frequency
Amplitude
Amplitude
Time
Frequency
Amplitude
Amplitude
Time
Frequency
Fig. 5. Time domain to frequency domain conversion.
Wireless Coding and Modulation 17
called inverse Fourier transform. There are fast algorithms to do this, such
as Fast Fourier Transform (FFT) and Inverse FFT (IFFT). Most mathematical
packages, such as MATLAB, has library functions for FFT and IFFT. In
recent years, general purpose programming languages, such as Python, are
also offering library functions for FFT and IFFT.
3. Electromagnetic Spectrum
Wireless communications use the airwaves, which are basically electromagnetic
waves that can propagate through the air or even in a vacuum. Any electricity
or current flow will generate these electromagnetic waves. Therefore, many
things we use generate or utilize some forms of electromagnetic waves. TV,
power supply, remote control, microwave oven, wireless router, etc., all use
or generate electromagnetic waves of different frequencies. Even light is
basically electromagnetic waves as we use electricity to generate light.
Electromagnetic waves can have a frequency of just 10 Hz, or 300 THz!
The spectrum is all of the ‘usable’ frequency ranges. It is a natural resource
and like most natural resources, it is limited. Spectrum use is therefore highly
regulated by government authorities, such as the FCC in the US or ACMA in
Australia.
A large portion of the spectrum is reserved for various government use,
such as radar, military communications, atmospheric research, and so on.
The rest of the spectrum is often licensed to competing network operators,
which give the operators exclusive rights to specific parts of the spectrum. For
example, different TV channels or radio stations license different frequencies.
Interestingly, part of the spectrum is also allocated for use without having to
license it. Such spectrum is called license-exempt and sometimes referred to
as ‘free’ spectrum. The spectrum used by Wi-Fi, such as the 2.4 GHz band,
is a good example of such license-exempt spectrum. Table 2 lists some of the
currently available license-exempt bands.
It is important to note that although manufacturers of any product can use
license-exempt frequencies for free, they are subject to certain rules, such as
power limitation for transmitting the frequencies. For example, the maximum
transmit power of Wi-Fi products is often limited to about 100 mW, depending
on the region of operation.
Table 2. Examples of license-exempt spectrum and their use.
Wireless
Fig. 6. Spectrum allocation for different services. Wireless communication mostly uses 100 kHz to
6 GHz.
©2017 Mahbub Hassan
4. Decibels
When waves travel, they lose power. We say that the power is attenuated.
The question that arises is what would be a practical unit to measure power
attenuation that is universal in all wireless communication systems?
Power loss for electromagnetic waves can be many orders of magnitude.
For example, Wi-Fi chipsets can decode signals as weak as pico Watts, which
allows them to offer reasonable communication coverage and range around
Wireless Coding and Modulation 19
the house or office building. Now imagine a signal that was transmitted by
the Wi-Fi access point at full power of 100 mW but was received at a distant
laptop with only 1 pW of power. The loss is one trillion-folds!
Because the power loss can be many orders of magnitude, the attenuation
is measured in logarithmic units. After the inventor Graham Bell, power
attenuation was originally measured as Bel, where Bel = log10(Pin/Pout) with
Pin representing the transmitted powered and Pout the attenuated power.
Bel was found to be too large for most practical systems. Later, a new
quantity called decibel, written as dB, was introduced to measure power loss,
where
dB = 10log10(Pin/Pout)
Example 3
What is the attenuation in dB if the power is reduced by half (50% loss)?
Solution
Attenuation in dB = 10log10(2) = 3 dB
Example 4
Compute the loss in dB if the received power of a 100 mW transmitted signal
is only 1 mW
Solution
Power is reduced by a factor of 100.Attenuation = 10log10(100) = 20 dB
The concept of decibel is also used to measure the absolute signal power,
i.e., decibel can be used to measure the strength of a transmitted or received
signal. In that case, it is a measure of power in reference to 1 mW and the unit
is dBm. In other words, dBm is obtained as:
dBm = 10log10(power in milliwatt)
Example 5
Convert 1 Watt to dBm.
Solution
We have 10log10(1 W/1 mW) = 10log10(1000 mW/1 mW) = 30 dBm
Example 6
Express 1 mW in units of dBm
Solution
10log10(1) = 10 × 0 = 0 dBm (ZERO dBm does not mean there is no power!)
20 Wireless and Mobile Networking
Example 7
With 100 μW of noise, what would be the SNR in dB if the received signal
strength is 1 mW?
Solution
Psignal = 1 mW (received signal strength), Pnoise = 100 μW
SNR = 10log10(1000/100) = 10log10(10) = 10 dB
Example 8
Received signal strength is measured at 10 mW. What is the noise power if
SNR = 10 dB?
Solution
SNR = 10dB = 10log10(10 mW/Pnoise)
Pnoise = 1 mW
5. Coding Terminology
The following terminology is often used to explain the coding of digital data
on the carrier signal:
Symbol is the smallest element of a signal with a given amplitude, frequency,
and phase that can be detected. Shorter symbol duration means that more
signal elements carrying bits can be transmitted per second, and vice versa.
Baud rate refers to the number of symbols that can be transmitted per second.
It is the inverse of symbol duration and hence, sometimes referred to as the
symbol rate. It is also called the modulation rate because this is how fast the
property of the signal, i.e., its amplitude, frequency, or phase, can be changed
or modulated.
Data rate, measured in bits per second, is the number of bits that can be
transmitted per second. For example, for a binary signal, only 1 bit is
transmitted for a given signal status, i.e., only 1 bit is carried over a baud and
hence baud rate and data rate are equivalent. However, an M-ary signal has
M distinct symbols and hence can carry log2 M bits per baud or symbol. As
we will see shortly, most modern wireless modulation techniques transmit
multiple bits per symbol.
6. Modulation
Carrier waves are usually represented as sine waves. Data can be sent over a
sine carrier by modulating one or more properties of the wave. As we have
learned earlier in this chapter, there are three main properties of a wave—
amplitude, frequency, and phase, that we can modulate.
Figure 7 shows how 0’s and 1’s can be transmitted over a sine carrier by
modulating one of these three properties. When amplitude is modulated, it is
called Amplitude Shift Keying (ASK). Similarly, we have Frequency Shift
Keying (FSK) and Phase Shift Keying (PSK). In such modulations, the value
of amplitude, frequency, and phase remains constant during a fixed period,
called bit (or symbol) interval. The receiver observes the signal value during
this bit interval to demodulate the signal, i.e., extract the bit or bits transmitted
during that interval. Note that the bit interval is essentially the inverse of the
baud rate.
In Fig. 7, we used only two different values of the amplitude, frequency,
or phase to represent 0’s and 1’s. Therefore, we can send only 1 bit per
different value of the signal, i.e., 1 bit per baud. In practical communication
systems, usually more than 1 bit is transmitted per baud. For example, if we
can modulate the amplitude in a way so that we have four different values of
the amplitude, then we need 2 bits to represent each amplitude, enabling us to
transmit two bits per baud.
22 Wireless and Mobile Networking
For PSK, the phase values can be absolute, or the difference in phase with
respect to the previous phase. In Fig. 8, the top graph shows that when there is
no change in phase from the previous bit-interval to the next, it is treated as a
0 and when there is a change, it is a 1. This is called differential BPSK. With
differential, the receiver does not have to compare the phase against some
pre-established value, but rather observe the change only, which is easier to
implement.
The top graph in Fig. 8 also shows that the phase is shifted by 180º and
there is only one value to change. The corresponding 2D (I-Q) graph shows
that the two dots are 180º apart. The bottom graph shows that the phase can
switch to any of the four different values, which is called Quadrature Phase
0 1 1 0
Differential
BPSK
1 0
QPSK
00 01
Shift Keying (QPSK). In QPSK, 2 bits can be sent per baud. Here in the I-Q
graph, there are four dots and they are separated by 90 degrees.
7. QAM
To push the data rate even higher, we can combine amplitude and phase
modulations together, and it is called Quadrature Amplitude and Phase
Modulation (QAM).
Note that in QPSK, the amplitude was kept constant. However, we could
vary amplitude and get more than 2 bits per baud. A constellation diagram
is often used to visually represent a QAM. Using constellation diagrams,
Fig. 9 shows three examples of amplitude and phase combinations to achieve
different levels of QAMs. In the left most graph, we have constant amplitude,
but 2 different phases. In total we have 1 × 2 = 2 combinations, so we get 1 bit
per baud or 1 bit per symbol.
In the middle graph, we have four different phases, but just 1 amplitude.
This is actually QPSK, but we could call it 4-QAM. It has a total of
1 × 4 = 4 combinations, so we have 2 bits per symbol. In the third graph
(16-QAM), we have 3 different amplitudes; there are 4 different phases for
each of the smallest and the largest amplitudes while the medium amplitude
has 8 different phases. Thus, from 3 different amplitudes and 12 different
phases, we use a total of 4 + 4 + 8 = 16 combinations of amplitudes and
phases, which allow us to transmit 4 bits per symbol.
It is clear that we can increase the bit rates by going for higher QAMs.
Table 3 lists the use of different QAMs in practical wireless networks, showing
that latest wireless standards employ as high as 1024 QAMs. As hardware and
signal processing technology improves, we can expect even higher QAMs in
the future.
Q Q Q
01 11
Amplitude
I I I
0 1
00 10
8. Channel Capacity
The capacity of a channel basically refers to the maximum data rate or the
number of bits that can be reliably transmitted over the channel. There are
two basic theorems that explain the capacity, one by Nyquist and the other by
Shannon. Both provide formulae to calculate channel capacity in terms of bits
per second, but in slightly different contexts.
Example 9
Assume that you have discovered a novel material that has negligible electrical
noise. What is the maximum data rate that this material could achieve over
a phone wire having a bandwidth of 3100 Hz if data was encoded with
64-QAM?
Solution
We have
B = 3100
M = 64
Data rate = 2 × 3100 × log264 = 37,200 bps
Wireless Coding and Modulation 25
Example 10
For an SNR of 30 dB, what is the maximum data rate that could be achieved
over a phone wire having a bandwidth of 3100 Hz?
Solution
10 log10S/N = 30
log10S/N = 3
S/N = 103 = 1000
Shannon’s Capacity = 3100 log2(1 + 1000) = 30,894 bps
Example 11
What is the Hamming distance between 011011 and 110001?
Solution
Sequence 1: 011011
Sequence 2: 110001
---------
Difference (XOR) 101010 → Hamming distance = 3 (i.e., number of 1’s in
XOR output)
26 Wireless and Mobile Networking
Data is usually coded and the codeword, which is longer than the data, is
sent for error detection and correction purposes. Let us have a look at some
examples.
Table 4 shows the codewords for the data bits where 2-bit words are
transmitted as 5-bit words. Now let us assume that the receiver has received
00100, which is not one of the valid codewords. This means there was an error
in the transmission.
Now let us look at the hamming distance between the received sequence
and each of the valid codewords.
Distance (00100,00000) = 1 Distance (00100,00111) = 2
Distance (00100,11001) = 4 Distance (00100,11110) = 3
It is clear that most likely 00000 was sent, because it has the smallest
hamming distance. Hence, the received sequence is corrected to data 00.
Now let us assume that the received sequence was 01010. We have,
Distance (01010,00000) = 2 = Distance (01010,11110). There are two
codewords at equal distance from the received sequence. In this case, error is
detected but cannot be corrected.
Three-bit errors will not even be detected. For example, a 3-bit error
could convert the transmitted codeword 00000 to 00111, which is also a valid
codeword!
The lesson is, if we want to detect x-bit errors, any two codewords should
be apart by a Hamming distance of at least x + 1. Similarly, to correct x-bit
errors, the minimum Hamming distance required is 2x + 1. These rules provide
valuable guidelines for designing codewords.
Data Codeword
00 00000
01 00111
10 11001
11 11110
(b) FDMA: Communicating groups are all talking at the same time, but in different rooms
Hola
Hello
你好
Bonjour
(c) CDMA: Communicating groups are all talking at the same time in the same room
Fig. 10. Multiple access methods.
28 Wireless and Mobile Networking
talking at the same time in the same room, yet they do not really interfere with
each other! This is possible because different groups are talking in different
languages where people can still pick up their conversations because other
languages simply appear as noise to them. Language is the code here to avoid
interference.
50ms
Time
Fig. 11. Frequency hopping. The transmitter switches frequency every 50 ms.
Wireless Coding and Modulation 29
Tx bits
01001011011011010010
5µs Time
Fig. 12. Direct-sequence spread spectrum.
30 Wireless and Mobile Networking
Example 12
Assume that a car travelling at 120 km/hr is transmitting a packet to a roadside
access point (AP) using 2.4 GHz Wi-Fi. If the car is approaching the AP
(i.e., the AP is directly in front it), what is the frequency received by the AP?
Solution
The wavelength of the frequency is: 3×108/2.4×109 = 0.125 m
The velocity of the car is: 120 km/hr = 120×1000/3600 = 33.3 m/s
Freq diff (Doppler shift) = 33.3/0.125 = 267 Hz
Therefore, the receive frequency at the AP is 2.4 GHz + 267 Hz =
2.400000267 GHz
f-vf/c f+vf/c
Example 13
What is the coherence time for a 2.4 GHz Wi-Fi link connecting a car travelling
at 72 km/hr?
Solution
V = (72 × 1000)/3600 = 20 m/s
Doppler spread = 2vf/c = (2×20×2.4×109)/(3×108) = 320 Hz
Coherence time = 1/320 = 0.003125 s = 3.125 ms
32 Wireless and Mobile Networking
15. Duplexing
Duplexing attempts to answer the following question: how the resource should
be allocated between the transmitter and the receiver so that they both can
exchange information with each other, i.e., both can transmit and receive?
Figure 15 shows that there are two ways to achieve this: one way is to allocate
different frequencies for different directions. In this case both can talk at the
same time, achieving full-duplex communications. This is called frequency
division duplexing (FDD). The other method is to use the same frequency
for both directions, but only one entity can talk at a given time. For example,
when the base station talks, the subscriber listens and when the subscriber talks,
the base station listens. This method is called time division duplexing (TDD).
Clearly, TDD cannot achieve full-duplex, but provides only a half-duplex
communication. Despite this, many cellular deployments use TDD because
it allows more flexible sharing of downlink (base station to subscriber) and
uplink (subscriber to base station) resources without requiring paired spectrum
allocation, which is wasteful if data is asymmetric in these two directions.
Frequency 1
Base
Subscriber
Station
Frequency 2
16. Summary
1. Electric, Radio, Light, X-Rays, are all electromagnetic waves.
2. Wavelength and frequency are inversely proportional (λ = c/f ).
3. Historically, wireless communications mostly used frequencies below
6 GHz, but beyond 6 GHz is actively explored in modern wireless networks.
4. Hertz and bit rate are related by Nyquist and Shannon’s Theorems.
5. Nyquist’s theorem explains capacity for noiseless channels.
Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jai
6. Shannon’s capacity takes SNR into consideration.
7. Power is measured in dBm and path loss or antenna 3-1gain in dB.
8. dB can be added or subtracted to dBm to produce dBm, but dBm cannot
be added or subtracted with dBm.
Wireless Coding and Modulation 33
Review Exercises
In the previous chapter, we learned how the bits are transmitted to the wireless
channel. In this chapter we will discuss how these bits travel or propagate
through the wireless channel before reaching to the receiver.
2. Antenna
Transmitter converts electrical energy to electromagnetic waves and the
receiver converts these electromagnetic waves back to electrical energy. It
is important to note that the same antenna is used for both transmission and
reception. Therefore, a device can use the same antenna for both transmitting
bits and receiving bits.
Depending on how the antennas radiate or receive power, there can be
three types of antennas as illustrated in Fig. 1. An antenna is called omni-
directional if the power from it radiates in (or it receives power from) all
directions. A directional antenna, on the other hand, can focus most of
its power in the desired direction. Finally, an isotropic antenna refers to a
theoretical antenna that radiates or receives uniformly in each direction in
space, without reflections and losses. Note that due to reflections and losses
in practical environments, the omni-directional antenna does not radiate or
receive in all directions uniformly.
An isotropic transmitting antenna cannot produce much power at the
receiver because the power is dissipated to all directions and gets wasted.
36 Wireless and Mobile Networking
Given that the receivers are likely to be contained in some space, for example,
in a horizontal plane rather than in a sphere, antennas are designed to control
the power in a way so that the receivers receive more power compared to a
theoretical isotropic antenna. Antenna gain refers to the ratio of the power at
a particular point to the power with isotropic antenna, which gives a measure
of power for the antenna. Antenna gain is expressed in dBi, which means
‘decibel relative to isotropic’. For example, if an antenna is advertised as
3 dBi, it means that it will produce twice as much power than an isotropic
antenna. Note that an isotropic antenna will have a gain of 0 dBi.
Example 1
How much stronger a 17 dBi antenna receives (transmits) the signal compared
to the isotropic antenna?
Solution
Let
Power of isotropic antenna = Piso
Power of 17 dBi antenna = P
We have
17 = 10log10(P/Piso)
Thus P/Piso = 101.7 = 50.12, i.e., the 17 dBi antenna will receive (transmit) the
signal 50.12 times stronger than the isotropic antenna albeit using the same
transmit power.
Reflection
Scattering
Diffraction
the reflected signal may actually cancel out the original signal (destructive),
or strengthen it (constructive).
Similarly, diffraction happens when the edge of an impenetrable body is
large, relative to signal wavelength, but the phase shift is calculated differently
than a reflection.
Finally, scattering happens when the size of the object is in the order of
the wavelength. This means a light post can cause scattering for low frequency
signals (large wavelength), but would cause reflection for very high frequency
signals, such as 60 GHz. However, for 60 GHz, very tiny objects, such as
snowflakes, hailstones, can cause scattering.
An interesting outcome of reflection, diffraction, and scattering is that
the receiver can still receive the signal even if there is no LoS between
the transmitter and the receiver. This is a great advantage for wireless
communications. For example, it is not possible to have a LoS to the Wi-Fi
access point or router located in the garage or in a central location from every
room in the house. We, however, can still receive signals from the AP. It is
because of this bouncing property of wireless signals. On the other hand, when
we have LoS, we do not have to depend on signal bouncing, but the reflection,
diffraction and scattering then actually cause some form of interference with
the LoS signal.
4. Channel Model
Now that we have some appreciation of the signal propagation through the
radio channel and how it can get affected by different physical phenomena,
we need to find a way to predict or estimate the signal that may be received at
a given location under certain transmissions. This is called channel modeling.
Figure 3 shows that there is a transmitter mounted on a tower to transmit
signals to subscriber devices, which may be located anywhere around the
tower. Power profile of the received signal at the subscriber station can be
obtained by convolving the power profile of the transmitted signal with the
impulse response of the channel. Note that convolution in time is multiplication
in frequency.
Mathematically, after propagating through the channel H, transmitted
signal x becomes y, i.e.,
y( f ) = H( f ).x( f ) + n( f ) (1)
where H( f ) is channel response, and n( f ) is the noise. Note that x, y, H, and
n are all functions of the signal frequency f.
Wireless Signal Propagation 39
Channel
5. Path Loss
When a signal travels through space, it loses power. This is called ‘path loss’
or signal attenuation. As a result of path loss, the power of a signal at the
receiver (received power) is usually only a fraction of the original or input
power used at the transmitter to generate the signal.
Path loss depends on the length of the path travelled by the signal. The
larger the distance between the transmitter and receiver, the higher the path
loss, and vice versa. Clearly, the path loss must be estimated and factored in
properly when a wireless link is designed. Different path loss models are used
forHassan
©2017 Mahbub estimating path loss in different scenarios. Two popular path loss models
are the Frii’s model designed for free space with no reflections, and the 2-ray
model that takes reflections from the ground into consideration. Frii’s model
is used as a guide for ideal scenarios whereas 2-ray is a more practical model
used widely in wireless communications. We will examine 2-ray later in the
chapter after discussing multipath reflections.
In free space without any absorbing or reflecting objects, the path loss
depends on the distance as well as on the frequency (or wavelength) according
to the following Frii’s law:
2 2
λ c
=PR P= GT GR PT GT GR (2)
4π d 4π fd
T
where PR and PT are the received and transmitted powers (in Watts), respectively,
while GT and GR are transmitter and receiver antenna gains in linear scale,
respectively. We see that, for a given frequency, path loss increases as inverse
square of distance, which is sometimes referred to as the d–2 law (path loss
exponent = 2). It is also observed that path loss increases as inverse square of
the frequency, which means that the signal power attenuates more rapidly for
higher frequency signals, and vice versa.
40 Wireless and Mobile Networking
Fig. 4. Power spreading in space and received power calculation for Frii’s law.
Equation (2) shows path loss in linear scale. For the convenience of
calculating the link budget, however, path loss is actually measured in dB. By
converting Equation (2) in dB, we obtain:
2
λ
PRdB = PTdB + GTdB + GRdB + 10log10 (3)
4π d
where PRdB and PTdB refer to receive and transmit powers, respectively, in
dBm, while GTdB and GRdB are the antenna gains in dBi. Thus, the path loss is
obtained as:
2
λ
Path Loss = −GTdB − GRdB − 10log10
PTdB − PRdB = (4)
4π d
For isotropic antennas (GTdB and GRdB are both 0 dB), path loss is reduced
to the following simple formula:
2
λ 4π d 4π fd
Path loss(dB) = −10log10 == 20log10 20log10
4π d λ c
4π (5)
= 20log10 (d ) + 20log10 ( f ) + 20log10
c
= 20log10 (d ) + 20log10 ( f ) − 147.55
where d is in meter, f in Hz, and c = 3 × 108 m/s. Equation (5) implies that for
free-space propagation, the received power decays with distance (transmitter-
receiver separation) or frequency at a rate of 20 dB/decade, i.e., the signal
loses 20 dB for every decade (tenfold) increase in distance or frequency.
A simple explanation for Frii’s path loss formula in Equation (2) can be
given, using a sphere around an isotropic point power source at the center
radiating a power of PT as shown in Fig. 4. Basically, the power from the
Wireless Signal Propagation 41
source spreads in space in all directions equally. As such, the power density on
the surface of the sphere decreases with increasing sphere radius, d. With 4πd 2
being the area of the sphere, we have a power density of PT/4πd 2. Therefore,
the total power received at an antenna located at the sphere surface becomes
equal to the power density times the antenna area. We have learned that
antenna size is dependent on the frequency or the wavelength. Given that the
ideal antenna has an area of λ2/4π, the received power at the antenna is equal
2
λ
to PT , which is given by the Frii’s law in Equation (2) for isotropic
4π d
antennas with unit gains.
Example 2
If 50 W power is applied to a 900 MHz frequency at a transmitter, find the
receive power at a distance of 100 meter from the transmitter (assume free
space path loss with unit antenna gains).
Solution
Unit antenna gain means: GT = GR = 1.
We have d = 100 m, f = 900×106 Hz, PT = 50 W, c = 3×108 m/sec, and π = 3.14
2
c
=PR P=
T 3.5µW
4π fd
Example 3
What is the received power in dBm at 10 meters from a 2.4 GHz Wi-Fi router
transmitting with 100 mW of power (assume free space path loss with unit
antenna gains)?
Solution
Unit antenna gain means: GT = GR = 0 dBm.
We have d = 10 m, f = 2.4×109 Hz, PT = 100 mW = 20 dBm, c = 3×108 m/sec,
and π = 3.14
4π fd
=Pathloss 20
=log10 dB 60 dB
c
PR = PT – pathloss = 20 – 60 = – 40 dBm
6. Receiver Sensitivity
If the path loss is too much, the SNR at the receiver could be too low for
decoding the data. The noise at the receiver is a function of the channel
bandwidth, i.e., larger the bandwidth, the higher the total noise power, and
42 Wireless and Mobile Networking
vice versa. The noise is also sensitive to the circuits and hardware of the
receiver and the operating temperature, which is called the ‘noise figure’
of the receiver. Receiver sensitivity refers to the minimum received signal
strength (RSS) required for that receiver to be able to decode information.
Noise, bandwidth, and modulation affect the receiver sensitivity. For example,
Bluetooth specifies that, at room temperature, devices must be able to achieve
a minimum receiver sensitivity of –70 dBm to –82 dBm [BTBLOG].
Example 4
To increase the coverage with low transmit power, a manufacturer produced
Bluetooth chipsets with a receiver sensitivity of –80 dBm. What is the
maximum communication range that can be achieved for this chipset for a
transmit power of 1 mW? Assume Free Space Path Loss with unit antenna
gains.
Solution
Bluetooth frequency f = 2.4 GHz, PT = 1 mW, PR = –80 dBm = 10–8 mW
We have
2
c
PR = PT
4π df
c
d= PT / PR
4π f
= 99.5 meter
7. Multipath Propagation
As wireless signals reflect from typical objects and surfaces around us, they
can reach the receiver through multiple paths. Figure 5 illustrates the multipath
phenomenon and explains its effect at the receiver. Here we have a cellular
tower transmitting radio signals omni-directionally. A mobile phone antenna
is receiving not just one copy of the signal (the LoS), but another copy of the
same signal that is reflected from a nearby high-rise building (NLoS). We
make two observations:
• The LoS signal reaches the receiver first followed by the NLoS copy. This
is due to the longer path length of the NLoS signal compared to the LoS
path.
• The signal strength for LoS is higher compared to that of NLoS. This is
because the NLoS signal travels further distance and hence attenuates
more compared to the LoS.
Wireless Signal Propagation 43
Figure 5 considers only a single NLoS path. In reality, there are many
NLoS paths due to many reflecting surfaces. For multipath, there are also
phase differences among the received signals copies due to the differences
in their travelling time (different paths have different lengths). Such phase
differences, however, are not shown in Fig. 5 as it illustrates the signals only
as simple impulses.
8. Inter-symbol Interference
One problem with multipath is that the receiver continues to receive the signal
well after the transmitter has finished transmitting the signal. This increases
the time the receiver has to dedicate to decode one symbol or one bit, i.e.,
the symbol interval has to be longer than the ideal case when no NLoS paths
exist. If we do not adjust the symbol interval adequately, then the signals from
the previous symbol will enter into the next symbol interval and interfere
with the new symbol. As a result, even if there were no other transmitters,
the same transmitter would interfere with its own signal at the receiver. This
phenomenon is called inter-symbol interference.
The process of inter-symbol interference is illustrated in Fig. 6 with two
short pulses, dark and light at the transmitter, which become much wider at
the receiver due to multipath. We can see that the dark symbol, which was
transmitted before the light, is interfering with the light symbol. To reduce
this interference at the receiver, the transmitter has to use much wider symbol
intervals. As a result of having to widen the bit intervals at the receiver, we
44 Wireless and Mobile Networking
have to reduce the data rate or bits per second as the data rate is inverse of the
symbol length.
9. Delay Spread
Now let us examine the effect of multipath more closely. Recall that when
a single pulse is transmitted, multiple pulses arrive at the receiver. As a
result, the transmitter cannot transmit two pulses quickly, one after the other.
Otherwise the late arrivals will collide with the new transmission.
One good thing, however, is that the subsequent arrival of the signal
copies are attenuated further and further. So we really do not have to wait too
long, but just enough so that the next arrivals are below some threshold power.
The time between the first and the last versions of the signal above the
power threshold is called the delay spread. The concept of delay spread is
illustrated in Fig. 7. One thing to notice here is that the amplitude of the late
Time
Time
Delay Spread
Fig. 7. Multipath propagation and delay spread.
Wireless Signal Propagation 45
Transmitter
Receiver
ht
hr
Ground
Horizontal Distance d
Fig. 8. 2-ray propagation model and d–4 power law.
46 Wireless and Mobile Networking
frequency. However, the 2-ray pathloss of Equation (7) is valid only when the
distance is greater than a threshold (cross-over distance), i.e., when d ≥ dbreak:
ht hr ht hr f
d break 4=
= λ 4 c (8)
The 2-ray model shows that the higher the base station antenna, the higher
the received power at the mobile device on the ground. This explains why the
radio base stations are mounted on high towers, on the rooftop, and so on.
500m Example 5
A 2 m tall user is holding his smartphone at half of his height while standing
800 m from a 10 m-high base station. The base station is transmitting a
1.8 GHz signal using a transmission power of 30 dBm. What is the received
power (in dBm) at the smartphone? Assume unit gain antennas.
Solution
We have ht = 10 m, hr = 1 m, d = 500 m, f = 1.8×109 Hz, PT = 30 dBm,
c = 3×108 m/sec
ht hr f
d break 4=
= c 240m
This means that the 2-ray model can be applied to estimate the pathloss at
800 m.
d2
pathloss 20
= =log10 87.96 dB
ht hr
The received power = 30 – 87.96 = –57.96 dBm (approx.)
11. Fading
One interesting aspect of multipath we discussed earlier is that the multipath
signals can be either constructive or destructive. It depends on how the phase
changes happen due to reflection. As Fig. 9 shows, if the phases are aligned,
multipath can increase the signal amplitude. On the other hand, the multipath
can cancel out the signal if totally out of phase.
Sometimes by moving the receiver only a few centimetres, big differences
in signal amplitude can be brought about due to changes in multipath. This is
called small-scale fading.
Wireless Signal Propagation 47
12. Shadowing
If there is an object blocking the LoS, then the power received will be much
lower due to the blockage. Figure 10 shows how the power suddenly decreases
due to the shadowing effect when the receiver is moved.
14. MIMO
Traditionally, single antennas were used for all types of wireless
communications. In recent years, multiple antennas are increasingly being
used to increase the quality, reliability, and capacity of wireless communication
systems. Multiple Input Multiple Output (MIMO) is a framework used to
describe such systems where ‘multiple input’ refers to multiple antennas at the
transmitter while ‘multiple output’ refers to multiple antennas at the receiver.
Under this framework, the transmitter or receiver could have single antennas,
leading to four possible MIMO configurations as explained in Table 1.
These configurations are typically enumerated using two numbers.
For example, a 2×2 MIMO refers to a system with 2 Tx antennas and 2 Rx
antennas while a 4×2 MIMO refers to 4 Tx antennas and 2 Rx antennas.
A fundamental benefit of MIMO comes from the fact that, if the antennas
are spaced λ/2 or more apart, then the signals from different antennas can be
uncorrelated, creating multiple independent spatial channels over the same
frequency as illustrated in Fig. 12. These spatial channels can be exploited to
either improve the reliability of the communication using a technique called
spatial diversity or increase the data rate by exploiting spatial multiplexing.
Finally, it is also possible to increase the coverage range and signal strength
by exploiting multiple Tx antennas to focus the beam at a narrow angle, which
is known as beam forming.
Configuration Explanation
SISO single input (1 Tx antenna) single output (1 Rx antenna)
SIMO single input (1 Tx antenna) multiple output (> 1 Rx antenna)
MISO multiple input (> 1 Tx antenna) single output (1 Rx antenna)
MIMO multiple input (> 1 Tx antenna) multiple output (> 1 Rx antenna)
Wireless Signal Propagation 49
Ch1
Tx Rx Tx Rx
>λ/2
Ch1
Rx Tx Rx
>λ/2
Tx
>λ/2
>λ/2
Ch4
Example 6
What is the degrees of freedom for an 802.11ac WiFi system with the access
point having 8 antennas and communicating to a laptop equipped with
2 antennas?
Solution
Degrees of freedom = min(8,2) = 2
50 Wireless and Mobile Networking
14.3 Beamforming
The idea of beamforming is to direct the wireless signal towards a specific
receiver, thus creating a strong signal at the intended receiver but no or weak
signal elsewhere. Figure 14 shows an example of beamforming used by a
Wi-Fi router to create strong beams towards intended receivers. Beamforming
is also used by cellular towers to direct beams to specific houses or mobile
users. The primary advantage of beamforming is to concentrate the transmit
power in narrow beams instead of radiating it in all directions. This in turn
improves the signal quality and eventually the data rate and reliability of the
communication links between the transmitter and the intended receivers.
Single-antenna transmitters cannot realize beamforming. To create
beams, a transmitter would need to transmit the signal via multiple closely
spaced antennas. A typical way to achieve beamforming is to exploit an array
of antennas where each antenna sends the same signal at slightly different
times (phase shifted) to create constructive signal combinations at the target
receiver (within the beam) and destructive interference elsewhere (outside the
beam). We have already seen examples of such constructive and destructive
signal combinations in the context of small-scale fading due to multipath
reflections (Fig. 9). For beamforming, however, only line-of-sight signals
transmitted by multiple antennas located at the transmitter are involved.
In practical wireless communication systems, the beam needs to be
steered dynamically as the location of the receiver changes, either because a
new receiver is targeted, or the target receiver has moved to a new location.
Even for a fixed beam, changes in the wireless propagation environment
require adjustment in antenna phase shifts and amplitudes to maintain the
beam properties. The phase shifts and amplitudes for all individual antennas
of the antenna array will thus have to be recomputed continuously, which
is computationally complex. Special digital signal processing (DSP) chips
are used to achieve this, which however lead to increased cost and power
consumption for beamforming systems. Fortunately, with advancements in
DSP and low-power electronics, beamforming is becoming widely available
in consumer electronics, such as in WiFi routers.
Wireless Signal Propagation 51
15. OFDM
It turns out that instead of using a big fat pipe or a wide band/channel on
its entirety for modulation and coding, it is much more effective to divide
the band into many narrower orthogonal subbands/subcarriers or subchannels
and then modulate each subchannel independently with a BPSK, QPSK,
16-QAM, 64-QAM, etc., depending on the fading in the channel. The frequency
selective modulation helps address the frequency selective fading experienced
in typical environments, leading to many advantages, such as better protection
against frequency selective burst errors and narrowband interference which
affects only a small fraction of subchannels. This process is called Orthogonal
Frequency Division Multiplexing (OFDM). Figure 15 illustrates the OFDM
process highlighting the fact that the symbol durations in OFDM get extended
due to the lower data rates caused by narrower channels. Less inter-symbol
interference due to longer symbols is therefore another added advantage of
OFDM.
So how many subdivisions are good? The higher the number of
subdivisions the better it can address the frequency selective fading and
interference, but they have to be orthogonal to avoid inter-channel interference.
Two channels are orthogonal if the peak power of a channel is at the bottom of
the neighbouring channel, as shown in Fig. 16.
Due to its many benefits, both WiFi and cellular systems employ OFDM.
Having many subcarriers allows OFDM to use some of them as pilots to
Wider Symbols
Narrower Symbols Narrower Channel
Wider Channel
Peak
Power
Null
Frequency
Fig. 16. Orthogonal subcarriers in OFDM.
help estimate the channel in real-time while data is being sent over the other
subcarriers. For example, the basic 802.11a WiFi has a total of 64 OFDM
subcarriers for each of its 20 MHz channels where 4 of them are used as pilots.
We will examine the details of WiFi OFDM in later chapters.
Example 7
With a subcarrier spacing of 10 kHz, how many subcarriers will be available
in an OFDM system with 20 MHz channel bandwidth?
Solution
#of subcarriers = channel bandwidth/subcarrier spacing = 20 MHz/10 kHz =
2000
16. OFDMA
OFDM, which is a multiplexing technology, can also be used as a multiple
access technology. Orthogonal Frequency Division Multiple Access
(OFDMA), is based on OFDM. Note that the ‘M’ in OFDM stands for
multiplexing, but the ‘M’ in OFDMA stands for multiple.
In OFDM, the spectrum is divided into many subcarriers for multiplexing
efficiency, such as longer symbol durations, etc. Now we can do multiple
access over OFDM by allocating different subsets of subcarriers to different
users. We can even change the subcarrier subset over time to make more
efficient allocation over time. Such dynamic allocation of subcarrier subsets
of OFDM is called OFDMA.
Figure 17 illustrates the difference between OFDM and OFDMA. In
OFDM, all subcarriers are given to the same user. Then using TDMA, OFDM
subcarriers can be shared between different users, but that would be TDMA,
not OFDMA. In OFDMA, we see a 2D scheduling framework, where different
users are allocated a different ‘block’, i.e., a subset of subcarriers over certain
Wireless Signal Propagation 53
time slots. OFDMA has been used in cellular systems for many years and is
currently being considered for the latest WiFi standard.
18. Summary
Q1. With a subcarrier spacing of 10 kHz, how many subcarriers will be used
in an OFDM system with 8 MHz channel bandwidth?
(a) 8, (b) 80, (c) 800, (d) 8000
Q2. Let us consider an OFDM system that uses the same carrier spacing
irrespective of the channel bandwidth used. It employs 1024 subcarriers
for 10 MHz channel. How many subcarriers will be used if the channel
was 1.25 MHz wide?
(a) 1000, (b) 1024, (c) 1280, (d) 128
Q3. You have bought a 2.4 GHz WiFi router with two dipole antennas
claiming effective antenna gain of 6 dB. Your laptop has a single dipole
with 0 dB gain and it claims a receiver sensitivity of –64 dBm. What is
the maximum distance from the router your laptop can receive data if
the router always use a transmit power of 20 dB?
(a) 10 m, (b) 20 m, (c) 215 m, (d) 315 m
Q4. You have bought a 2.4 GHz WiFi router with antenna gain of 6 dB and
default transmission power of 100 mW. Your laptop has a 0 dB antenna
gain and claims a receiver sensitivity of –60 dBm. Can you connect
your laptop to the router from a distance of 150 m?
(a) YES, (b) NO
Q5. An omni-directional antenna radiates power in ALL directions equally.
(a) True (b) False
Q6. A lamp post would cause scattering for a 300 GHz transmission.
(a) True (b) False
Q7. In the presence of multipath, symbols get wider at the receiver.
(a)True (b) False
Q8. Symbols must be wider than the delay spread to avoid inter-symbol
interference.
(a) True (b) False
Q9. MIMO is only useful with the presence of multipath and scattering.
(a) True (b) False
Q10. In OFDM, all subcarriers carry data.
(a) True (b) False
56 Wireless and Mobile Networking
Review Exercises
You want to set up an over-water link to provide data service to a ferry. The
maximum distance from the terminal to the ferry is 10 km. The antenna
heights are 20 m at the terminal and 10 m at the ferry. You can use 20 dBi
antennas at each end and 1W transmit power. What will be the received power
in Watts and dBm?
References
[BTBLOG] Bluetooth Special Interest Group Blog; accessed 18 October, 2021. https://
www.bluetooth.com/blog/.
[Munoz, 2009] Munoz, David, Frantz Bouchereau, Cesar Vargas and Rogerio Enriquez.
(2009). Position Location Techniques and Applications, Academic Press, 2009.
Part III
WiFi and Wireless Local
Area Networks
4
WiFi Basics
WiFi, which stands for ‘Wireless Fidelity’, is one of the most widely used
wireless networking technologies today, with millions of them deployed
in our homes and workplaces. WiFi is also increasingly available in many
indoor and outdoor public places, such as airports, shopping malls, parks,
and university campuses. All personal mobile devices, such as smartphones,
tablets, and laptops are fitted with WiFi interfaces, making them very easy to
be connected to such networks wherever they are available. In most cases,
WiFi is available for free to use or at least there is no limit imposed on the
volume of data for paid subscriptions, making it the most desired option to get
connected to the Internet. WiFi has gone through many years of developments
and upgrades over the last decade, resulting in increased level of complexity
adopted in its recent standards. This chapter will explain the basic features and
functions of the WiFi technology, while the more advanced versions will be
examined at later chapters.
them. With WiFi, wireless LAN now has its ‘fidelity’, i.e., its ability to work
with others. Note that the display of the WiFi icon, i.e., a small radar symbol,
when trying to connect a device to a WiFi network is not about certifying the
WiFi product, but to basically indicate that the device is connected to WiFi.
Figure 1 shows the difference between WiFi logo and WiFi icon. Details of
WiFi can be found from wi-fi.org, while IEEE 802.11 details are available
from ieee.org.
Standards with letters appended after an 802 standard applies only to that
particular 802 network, but not to others, for example, 802.11i will apply to
WiFi devices, but not Ethernet (802.3) devices.
When letters are appended, they can be either in lower case or upper
case. Lower case letters represent temporary or interim revisions (also
called ‘amendments’), which will eventually disappear before merging with
a standard with an uppercase letter. Standards with upper case letters are
permanent and are called ‘base standards’. For example, IEEE 802.1w-2001
was merged with IEEE 802.1D-2004. Standards were originally numbered
sequentially, such as 802.1a,…802.1z, 802.1aa, 802.1ab, and so on. Now
base standard letters are being shown during the amendments, such as IEEE
802.1Qau-2010, where Q is the base standard and au is the amendment.
It is interesting to note that while IEEE uses letters to refer to different
versions of the technology, WiFi Alliance has recently opted to use numbers
to name the WiFi versions. For example, WiFi 4 refers to IEEE 802.11n, 5
refers to 802.11ac and so on. Table 1 shows the WiFi Alliance numbers and
their corresponding IEEE standards.
4. ISM Bands
The license-exempt spectrum to be used by wireless LANs is called the
Industrial, Scientific, and Medical (ISM) band. As shown in Table 2, there
are many different available ISM bands of varying bandwidth [ITU2018].
The bands available in the lower frequency have understandably smaller
bandwidths whereas increasing bandwidth is available at higher frequency
ISM bands. For example, the 6.765 MHz band has only 30 kHz bandwidth
whereas a massive 150 MHz bandwidth is available at 5.725 GHz.
The original WiFi started with the 2.4 GHz band. However, 2.4 GHz was
already in use by a large variety of products, such as medical equipment,
microwave, garage-door openers, and so on. When the WiFi usage started to
grow, 2.4 GHz became saturated, prompting the opening of a new WiFi band
at 5.725 GHz, which is simply referred to as 5 GHz band. Most recent WiFi
routers can operate over both bands, hence they are marketed as ‘dual band’
routers. In recent years, many more bands have been released to support new
types of WiFi, which are listed in Table 3.
6. Physical Layers
The physical layer technology directly affects the data rate achievable with
WiFi. In the first version defined in 1997, spread spectrum was used to achieve
only 1 and 2 Mbps, which was soon proved to be too slow for the emerging
LAN applications. Two years later, in 1999, an advanced version of spread
spectrum was introduced for 2.4 GHz, while OFDM was introduced for the
5-GHz band to increase the data rate to 54 Mbps. In 2003, OFDM was also
successfully used in 2.4 GHz to achieve 54 Mbps channels, which was named
802.11g. OFDM has proved so successful that it still defines the physical
layer standard for today’s WiFi.
Β
Α
A B C
techniques that can avoid such collisions in the first place. Wireless LANs
therefore use collision avoidance (CA) in contrast to collision detection (CD)
used in Ethernet.
Access Mobile
Point Node
DIFS
Super Frame
Contention-Free Contention
Period Period
Time
Beacon
Fig. 6. Time critical services using the PCF function. DCF follows PCF.
Example 1
Assume that we have CWmin = 3 and CWmax = 127 configured for a given
WLAN. What would be the values of CW if there were eight successive
unsuccessful attempts after initalizing the network?
Solution
After initialization, CW = CWmin = 3
After 1st unsuccessful attempt, CW = min(7,127) = 7
After 2nd unsuccessful attempt, CW = min(15,127) = 15
Then on, 31, 63, 127, 127, 127, …
Example 2
What is the duration of PIFS and DIFS for IEEE 802.11b?
Solution
Slot time = 20 μs
SIFS = 10 μs
PIFS = SIFS + slot time = 10 + 20 = 30 μs
DIFS = SIFS + 2 x slot time = 10 + 40 = 50 μs
WiFi Basics 69
Once a node hears a frame, it sets a NAV timer for the Duration ID of
the frame and can go to sleep for conserving its battery. No physical carrier
sensing is done during this period. The node wakes up after the NAV period,
to start sensing again.
Example 3
Consider an 802.11b WLAN. A station estimates the transmission times of
RTS, CTS, and ACK as 10 μs, 10 μs, and 25 μs, respectively. What would be
the value of the duration field in the RTS header if the station wants to send a
250 μs long data frame?
Solution
802.11b has a SIFS duration of 10 μs.
Duration field in RTS = RTS_time + CTS_time + ACK_time + data_time +
3xSIFS
= 10+10+25+250+3x10 = 325 μs
Time Event
T1 Station 2 wants to transmit but the media is busy.
T2 Stations 3 and 4 want to transmit but the media is busy.
T3 Station 1 finishes transmission.
T4 Station 1 receives ack for its transmission (SIFS = 1); Stations 2, 3, and 4 set their NAVs
to 1.
T5 Medium becomes free.
T8 DIFS expires. Stations 2, 3, 4 draw backoff count between 0 and 5. The counts are 3, 1, 2.
T9 Station 3 starts transmitting and announces a duration of 8 (RTS + SIFS + CTS +
SIFS + DATA + SIFS + ACK). Station 2 and 4 pause their backoff counters at 2 and 1,
respectively.
T15 Station 3 finishes data transmission.
T16 Station 3 receives Ack.
T17 Medium becomes free.
T20 DIFS expires. Stations 2 and 4 notice that there was no transmission for DIFS. Stations 2
and 4 start their backoff counters from 2 and 1, respectively.
T21 Station 4 starts transmitting RTS.
Server
IBSS
Station
Ad-hoc
Station Station Station
Station
Ad-hoc network
DS DS
AP 1-1 AP
1-0 0-1
Source Destination
0-0
Fig. 10. 802.11 address fields and their use.
WiFi Basics 73
DS
AP 1 AP 2
B
A
BSS 1 BSS 2
Example 4
Consider the example WLAN in Fig. 13 where two BSSs are connected via a
distribution system. What is the content of the Address 3 field when Station A
wants to send a packet to Station B via AP 1?
Solution
In this case (To DS = 1, From DS = 0), Address 3 field should contain the
address of the destination station. Therefore, it should be the address of B.
14. Summary
1. 802.11 PHYs: Spread spectrum in earlier versions, but OFDM in new
versions.
2. 2.4 GHz channels (22 MHz) are mostly overlapped, while 5 GHz channels
(20 MHz) are non-overlapped, but some are shared with the radar service.
3. 802.11 uses SIFS, PIFS, DIFS for priority.
4. WLAN frames have four address fields.
5. 802.11 supports power saving mode.
Q9. It is always wise to combine two channels into a wider channel of larger
bandwidth.
(a) True
(b) False
Q10. What would be the channel width if two adjacent channels in a 5 GHz
band WiFi are combined into a single one?
(a) 44 MHz
(b) 40 MHz
(c) 44 GHz
(d) 40 GHz
(e) None of these
References
[GAST 2005] Matthew S. Gast. (2005). 802.11 Wireless Networks: The Definitive Guide,
2nd ed., O’Reilly.
[ITU 2018] Recommendation ITU-R SM.1896-1, International Telecommunication Union,
Sept. 2018.
5
Mainstream WiFi Standards
Since the introduction of the basic 802.11 wireless LAN in 1997, there have
been many amendments and advancements to date to address the requirements
of new applications and demands. While some of these amendments sought to
improve the capacity and efficiency of the mainstream WiFi used by billions
of people to access the Internet, others targeted some niche applications to
further enhance the utility of the technology. In this chapter, we will focus on
the mainstream WiFi standards while the niche standards will be examined in
the following chapter.
0 1 Data Bits
Data
Time
01001011011011010010 Chips = Code bits
Signal
Time
Fig. 1. An example of DSSS with binary modulated symbols spread with a chip rate of 10 chips
per symbol.
10 chips. Both the original 802.11 and 802.11b [802-11b] operate at 1/2 chip
per Hz, which gives a chip rate of 11 Mchips/s for the 22 MHz channel. Second,
we note that 802.11 uses a Barker code, which uses 11 chips per symbol. On
the other hand, to increase the data rate, 802.11b employs Complementary
Code Keying (CCK), which employs only eight chips to code a symbol. This
means we have a symbol rate of 1 Msps (Mega symbol per second) for the
2 Mbps rate and 1.375 Msps for the 11 Mbps data rate. The third factor that
determines the final data rate is the symbol coding, which determines how
many data bits are conveyed per symbol. For 2-Mbps rate, 802.11 uses 2 bits
per symbol, whereas for the 11 Mbps, it uses 8 bits per symbol.
Now we can verify the final data rates by multiplying the symbol rates
with the bits per symbol for each data rates. Specifically, for the 2 Mbps, we
have 1 Msps × 2 bits/symbol = 2 Mbps. For the 11 Mbps, we have 1.375 Msps
× 8 bits/symbol = 11 Mbps.
Example 1
A WLAN standard is employing a spread spectrum coding with only ½ rate,
which produces chips at a rate of ½ chips per Hz. It uses eight chips to code a
symbol and 16 QAM modulation to modulate the symbol stream. What would
be the data rate for 22 MHz channels?
Solution
Chip rate = ½ × 22 = 11 Mcps (cps = chips per second)
Symbol rate = 11/8 = 1.375 Msps (sps = symbols per second)
Bits per symbol = log2(16) = 4 [16 QAM produces 4 bits per symbol]
Data rate = symbol rate × bits per symbol = 1.375 × 4 = 5.5 Mbps
is used to avoid inter-symbol interference. The longer the delay spread, the
longer the guard interval and the lower the symbol rate.
The number of bits carried in an OFDM symbol depends on the subcarrier
structure and the modulation order of the symbol. OFDM divides a WiFi
channel into many subcarriers. All these subcarriers are divided into three
categories: data subcarriers, pilot subcarriers, and guard subcarriers. Only
the data subcarriers carry the OFDM symbols. Pilots estimate the wireless
channel, while the guards protect the symbol against interference from the
adjacent channels. The guard subcarriers are thus equally distributed to the
front and rear of the middle subcarriers.
Although the allocation of subcarriers to pilot and guard reduces the total
number of data subcarriers, it is interesting to note that each OFDM symbol
is carried over all the data subcarriers in parallel, which significantly boosts
the effective bits per symbol. For example, an OFDM with N data subcarriers,
each applying M-ary modulation, then the effective number of bits sent per
symbol is obtained as N×log2M.
Finally, the actual number of data bits per symbol is affected by the choice
of error correcting codes and their coding rates. For example, with a coding
rate of ¾, 4 bits are actually transmitted for every 3 data bits. Similarly, a
coding rate of 2/3 implies 2 data bits for every 3 bits transmitted, and so on.
The number of data bits per OFDM symbol therefore is obtained as:
Data bits per OFDM symbol = coding rate û log2M ✘#-of-data-subcarriers
Example 2
What is the data rate of an OFDM WiFi applying 64-QAM and a coding rate
of ¾ to its 48 data subcarriers? Assume a symbol interval of 4 μs.
Solution
Log2M = log264 = 6
Coded bits per symbol = log2M ✘ #-of-data-subcarriers = 6 × 48 = 288
Data bits per symbol = coding rate × 288 = ¾ × 288 = 216
Symbol rate = 1/symbol-interval = ¼ Msps (0.25 million symbols per sec)
Data rate = symbol rate × data bits per symbol = 216 × ¼ Mbps = 54 Mbps
Table 2 summarizes the five key parameters that affect data rates in
OFDM-based WiFi. In the rest of this chapter, we will examine how the
successive amendments exploited these parameters to enhance the data rates
from their predecessors.
82 Wireless and Mobile Networking
Parameter Description
Modulation Affects the number of bits per symbol; Log2M bits per symbol for M-ary
modulation; usually multiple modulation option are available.
Coding Error correcting coding affects the actual number of data bits per symbol;
usually multiple coding options are available; an integer number, called
MCS (modulation and coding system), defines a particular combination of
modulation and coding.
Guard interval Affects symbol rate; the longer the interval, the lower the symbol rate and vice
versa.
Channel Width Affects the number of achievable OFDM subcarriers and hence ultimately
the data rate; channel width can be increased by combining multiple channels
into a single one (a.k.a. channel bonding), an option available from 802.11n
onwards.
MIMO streams Number of independent data streams that can be sent in parallel; more streams
means higher achievable data rates, and vice versa; MIMO available from
802.11n onwards; newer amendments have increased number of MIMO
streams compared to their predecessor.
5. IEEE 802.11a-1999
802.11a is the first amendment to use OFDM, which allowed it to push the
date rates to 54 Mbps. Actually, 802.11a supports eight different data rates,
from a mere 6 Mbps up to 54 Mbps, by selecting a combination of modulation
and coding to dynamically adjust for the noise and interference.
802.11a divides the 20 MHz channel bandwidth into 64 subcarriers. Out
of these 64 subcarriers, six at each side are used as guards (a total of 12 guards)
and four as pilot, which leaves 48 of them to be used to carry data.
802.11a OFDM has a symbol length of 4 microseconds, which gives a
symbol rate of 0.25 M symbols/s. Therefore, with a modulation of BPSK, for
example, there will be 1 coded bit per subcarrier for each OFDM symbol, or
48 coded bits per OFDM symbol in total as the symbol is transmitted over all
of the 48 subcarriers in parallel. The actual data bits transmitted per symbol
will, however, depend on the coding used. 802.11a supports three coding
rates, 1/2, 2/3, and 3/4.
The modulation schemes are fixed and cannot be changed, i.e., to operate
at a particular data rate, the corresponding combination of modulation and
coding scheme (MCS) has to be selected. Table 3 shows the MCS combinations
of each data rate in 802.11a. Note that the data bits per symbol has to be
multiplied by the symbol rate of 0.25 M symbols/s to obtain the final net data
rate shown in the last column.
Mainstream WiFi Standards 83
Modulation Coding Rate Coded Bits per Coded Bits Data Bits per Data Rate
Subcarrier per Symbol Symbol (Mbps)
BPSK ½ 1 48 24 6
BPSK ¾ 1 48 36 9
QPSK ½ 2 96 48 12
QPSK ¾ 2 96 72 18
16-QAM ½ 4 192 96 24
16-QAM ¾ 4 192 144 36
64-QAM 2/3 6 288 192 48
64-QAM ¾ 6 288 216 54
6. IEEE 802.11g-2003
Although 802.11a was able to push the date rates to 54 Mbps, it used the
5 MHz band and was not compatible with the previous version (802.11b),
which was operating in the 2.4 GHz and at 11 Mbps. 802.11g [802-11g]
achieved 54 Mbps at 2.4 GHz using OFDM, but it could fall back to 802.11b
data rates using CCK modulation. More specifically, 802.11g OFDM data
rates are identical with 802.11a, i.e., it supports 6, 9, 12, 18, 24, 36, 48,
54 Mbps as per Table 3, while CCK supports data rates of 1, 2, 5.5, and
11 Mbps. This seamless backward compatibility made 802.11g very popular
because previous hardware designed to operate in the 2.4 GHz band can now
benefit from the higher data rates without having to switch to a new spectrum.
8. IEEE 802.11n-2009
The data rate of 54 Mbps achieved in 1999 with 802.11b served the application
demands well at that time. Since then, demand for more bandwidth continued to
soar, fueled by more devices being connected to the LAN, growing popularity
of on-demand video streaming, and so on. In late 2000, it became apparent
that new amendments must come forth to boost the speed and capacity of
wireless LANs. In fact, some vendors already started to release products with
some proprietary enhancements to meet the market demand. It was time to
standardize these developments.
In 2009, IEEE introduced 802.11n [802-11n] to significantly increase the
data rates of wireless LAN from the previous versions of 802.11a/b/g. The
target was to break the 100 Mbps mark and go well beyond that. To achieve
this major WiFi data rate boost in history, 802.11n introduced five important
techniques, which promised a massive maximum data rate of 600 Mbps.
First, it employed the MIMO technology in WiFi history for the first time
to capitalize on the potential of multiple independent streams existing over
the same frequency. Second, it reduced the coding overhead by employing
a 5/6 coding rate which is much lower than the previous minimum allowed
rate of ¾ used in 802.11a. Third, the guard interval and inter-frame spacing
were reduced to increase the number of OFDM sub-carriers that can carry data.
Fourth, it allowed a new physical layer mechanism, called channel bonding,
to combine two consecutive 20-MHz channels into a single 40-MHz channel,
sub-carriers without any guard intervals between them. Fifth, it promoted reduction of MAC
layer overhead by packing multiple frames inside a single frame, called frame
aggregation, thereby amortizing the frame header bits over many data bits.
streams, the higher the effective data rates. However, the maximum number
of independent streams are limited by the minimum number of antennas
available at the transmitter or receiver. The individual implementations may
further reduce the number of independent streams limiting the total capacity
of the MIMO infrastructure.
The convention n × m:k is used to describe the number of antennas and
streams in a given system, where n is the number of available antennas in
the transmitter and m is the number of antennas in the receiver. The number
of streams is represented by k, where k is less than or equal to min(n,m). For
example, 4 × 2: 2 means that the transmitter has four antennas, but the receiver
has only two. Only two parallel streams are used to transmit the data in this
configuration.
802.11n allows a maximum of 4 × 4: 4 configurations. When there are
more receive antennas than the number of streams, then the throughput can
be maximized by selecting the best subset of antennas. For example, with a
4 × 3: 2 configuration, the best two receive antennas should be selected for
processing the received data.
The rule of thumb is to allow a guard interval four times the multi-path
delay spread. Initial 802.11a design assumed 200 ns delay spread, which led to
800 ns guard interval. For 3200 ns data blocks, this incurs a overhead of 800/
(800 + 3200) = 20%. Detailed experimental analysis revealed that most indoor
environments have a delay spread in the range of 50–75 ns. 802.11n therefore
selects a guard interval of 400 ns, which is more than four times this value.
Now the guard interval-related overhead is reduced from 20% to only 11%.
With reduced guard intervals in time domain, the number of sub-carriers
used for guard is reduced from six to four on either side of the data subcarrier
block. This directly increases the data sub-carriers from 48 to 52 for the legacy
20-MHz channels, which will directly increase the number of data bits per
OFDM symbol and hence the ultimate net data rates.
Finally, 802.11n supports power-saving option for MIMO, which allows
putting antennas to sleep selectively. This way the power saving is extended
beyond stations, i.e., the antenna power saving can be activated even when
the station is awake.
subcarriers plus six pilots. Note that, without channel bonding, only 52 data
subcarriers can be used with four pilots. Therefore, combining two channels
with channel bonding actually provides more than double the performance
(108 data subcarriers instead of 52 + 52 = 104 subcarriers)!
Example 3
Compared to 802.11a/g, 802.11n has higher coding rate, wider channel
bandwidth, lower coding overhead, and reduced guard interval. On top of
this, 802.11n uses MIMO multiplexing to further boost the data rate. Given
that 802.11a/g has a maximum data rate of 54 Mbps, can you estimate the
maximum data rate for 802.11n that uses 4 MIMO streams (assume 64 QAM
for both of them, i.e., there is no improvement in modulation)?
Solution
Let us first estimate the maximum data rate of 802.11n by adding up the
various factors that increase data rates compared to 802.11a/g.
54 Mbps is achieved with ¾ coding for 3200 Data + 800 GI for a/g, which
basically uses a single stream (no MIMO).
802.11n has the following improvement factors:
Streaming factor = 4
Coding factor = (5/6)/(3/4) = ~ 1.11
OFDM subcarrier (plus wider bandwidth) factor = (108/48) = 2.25
Guard interval factor = (3200 + 800)/(3200 + 400) = ~ 1.11
Total improvement factor = 4 × 1.11 × 2.25 × 1.11 = ~ 11.1
Improved data rate for 802.11n = 4 × [(5/6)/(3/4)] × (108/48) × [(3200 + 800)/
(3200 + 400)] × 54 = 600 Mbps
We can also arrive at the 600 Mbps rate by directly calculating the data rate
for 802.11n from its various parameters as follows: Minimum guard interval:
400 ns (data interval = 3200 ns) → 3.6 µs symbol interval
Maximum modulation: 64 QAM
Maximum coding: 5/6
Maximum # of MIMO streams: 4 (4 × 4 MIMO)
Maximum # of data carriers: 108 (for 40 MHz bonded channels)
Coded bits per symbol = log264 ✘ #-of-data-subcarriers = 6 × 108 = 648
Data bits per symbol = coding rate × 648 = 5/6 × 648 = 540
Symbol rate = 1/symbol-interval = 1/3.6 Msps
Data rate (single MIMO stream) = symbol rate × data bits per symbol = 1/3.6
× 540 Mbps = 150 Mbps
Data rate with 4 streams = 4 × 150 = 600 Mbps
Available data rates for 802.11n for a single stream is shown in Table 4.
These data rates will increase linearly with increasing number of streams. For
Mainstream WiFi Standards 89
Table 4. Modulation, coding, and data rates for 802.11n: Single stream.
example, with three streams, the data rate for MCS 3 would be 3 × 26 = 78
Mbps for 20 MHz channel with 800 ns symbol interval.
9. IEEE 802.11ac
The race for higher data rates continues. While the goal with 802.11n was to
break the 100 Mbps mark, 802.11ac aims to hit the Gbps mark. To achieve this
incredible rate at the existing 5 GHz ISM band, 802.11ac basically continues
to tighten the 802.11n parameters to squeeze more bits out of the same
spectrum. These include more aggressive channel bonding, modulation, spatial
streaming, and piloting. A further notable enhancement in 802.11ac [802-11ac]
Mainstream WiFi Standards 91
Table 6. Modulation, coding, and data rates for 802.11ac: Single stream.
Example 4
Calculate the maximum achievable data rate for an 802.11ac mobile client
with a single antenna.
Solution
Single antenna → only 1 stream possible (even if the AP has many antennas)
Minimum guard interval: 400 ns (data interval = 3200 ns) → 3.6 µs symbol
interval
Maximum modulation: 256 QAM
Maximum coding: 5/6
Maximum # of data carriers: 468 (for 160 MHz bonded channels)
Coded bits per symbol = log2256 ✘ #-of-data-subcarriers = 8 × 468 = 3744
Data bits per symbol = coding rate × 3744 = 5/6 × 3744 = 3120
Symbol rate = 1/symbol-interval = 1/3.6 Msps
Data rate (single MIMO stream) = symbol rate × data bits per symbol = 1/3.6
× 3120 Mbps = 866.67 Mbps
Example 5
An 802.11ac mobile client fitted with two antennas is connected to a wireless
LAN via an 802.11ac access point equipped with four antennas. Calculate the
maximum achievable data rate for the mobile client.
Solution
Max. # of streams = min(2,4) = 2
Max. data rate with single stream (from previous example) = 866.67 Mbps
Therefore, max. data rate with 2 streams = 2 × 866.67 Mbps = 1.733 Gbps
Example 6
What is the maximum achievable data rate in 802.11ac?
Solution
802.11ac allows a maximum of eight MIMO streams
Maximum achievable with single stream = 866.67 Mbps
Maximum achievable data rate of 802.11ac = 8 × 866.67 = 6.9 Gbps
9.2 MU-MIMO
MU-MIMO extends the concept of MIMO over multiple users. In
MU-MIMO, the user equipment does not have to have multiple antennas on it
to benefit from MIMO. Antennas at different user equipment can be combined
seamlessly and transparently to form a MIMO system as illustrated in
Fig. 8. The users do not even have to know that their antennas are being used
Mainstream WiFi Standards 93
MIMO MU-MIMO
Fig. 8. MU-MIMO used in 802.11ac.
has 4 antennas
has 1 antenna
has 1 antenna
Fig. 9. The top figure illustrates the conventional case where all MIMO streams are consumed by a
single multi-antenna device. The bottom figure shows that with MU MIMO, multiple client devices
can share the MIMO streams generated by the transmitter, which enables even single-antenna devices
to take part in the MIMO transmission.
10. 802.11ax-2020
Up until now, 802.11 evolution was purely driven by pushing the data rates
and throughput. From the humble 2 Mbps in 1997 with 802.11 legacy, we
have reached to ~ 7 Gbps in 2013 with 802.1111ac, which is an amazing
increase of 3500X in just 16 years!
Unfortunately, WiFi is being deployed so densely, especially in urban
areas, that we cannot really use all that speed due to congestion, collisions,
and interference from neighbouring installations. A new amendment was in
order that could work efficiently in dense deployments and also support the
new type of short message communications between IoT machines.
94 Wireless and Mobile Networking
Modulation
Coding
Interval
Symbol Data
# of Data Subcarriers Guard Interval
BPSK ½
QPSK ½, 3/4
16QAM ½, 3/4
½, 2/3, 234 468 980 1960 12.8 µs 0.8 µs 1.6 µs 3.2 µs
64QAM
3/4
256QAM 2/3, 5/6
1024QAM ¾, 5/6
Example 7
Calculate the maximum achievable data rate for 802.11ax OFDM
Solution
Minimum guard interval: 0.8 μs (data interval = 12.8 μs) → 13.6 μs symbol
interval
Maximum modulation: 1024 QAM
Maximum coding: 5/6
Maximum # of MIMO streams: 8
Maximum # of OFDM data subcarriers: 1960 (for 160 MHz channels)
Coded bits per symbol = log21024 ✘ #data-subcarriers = 10 × 1960 = 19600
Data bits per symbol = coding rate × 19600 = 5/6 × 19600 = 16333.33
Symbol rate = 1/symbol-interval = 1/13.6 Msps
Data rate (single MIMO stream) = symbol rate × data bits per symbol = 1/13.6
× 5/6 × 19600 Mbps = 1.2 Gbps
Data rate with 8 streams = 8 × 1.2 = 9.6 Gbps
10.2 OFDMA
OFDMA, which stands for Orthogonal Frequency Division Multiple Access,
has been used in cellular networks for many years. In WiFi networks, it is
introduced for the first time as an option in 802.11ax to centrally allocate
channel resources to each competing station, using fine-grained time and
frequency resource units (RUs) just like cellular networks. In OFDMA,
subcarriers are also called tones; thus each tone consists of a single subcarrier
of 78.125 kHz bandwidth. The tones are then grouped into 6 different sizes of
resource units (RUs): 26, 52, 106, 242, 484, or 996 tones. The smallest resource,
Table 8. IEEE 802.11ax OFDM data rates in Mbps: Single stream.
7 64-QAM 5/6 86.0 81.3 73.1 172.1 162.5 146.3 360.3 340.3 306.3 720.6 680.6 612.5
8 256-QAM 3/4 103.2 97.5 87.8 206.5 195.0 175.5 432.4 408.3 367.5 864.7 816.7 735.0
9 256-QAM 5/6 114.7 108.3 97.5 229.4 216.7 195.0 480.4 453.7 408.3 960.8 907.4 816.7
10 1024-QAM 3/4 129.0 121.9 109.7 258.1 243.8 219.4 540.4 510.4 459.4 1080.9 1020.8 918.8
11 1024-QAM 5/6 143.4 135.4 121.9 286.8 270.8 243.8 600.5 567.1 510.4 1201.0 1134.3 1020.8
Mainstream WiFi Standards 97
Example 8
A single antenna 802.11ax client receives a 26-tone RU allocation from the AP
when trying to transmit a 147-byte data frame. What could be the minimum
possible time required to transmit the frame?
Solution
Single antenna means single stream
Maximum data rate for single-stream 26-tone (1024-QAM@5/6, 0.8 μs GI)
= 14.7 Mbps
Data frame length in bits: 147 × 8 bits
Minimum frame transmission time: (147 × 8)/14.7 μs = 80 μs
Example 9
Calculate the maximum data rate of 802.11be.
Solution
Enhancements against 802.11ax:
Channel bandwidth factor: 320 MHz/160 MHz = 2
Modulation factor: 12 bits/symbol (log21024 = 10)/10 bits/symbol (log24096
= 12) = 1.2
MIMO factor = 16 streams/8 streams = 2
Therefore, 802.11be is expected to achieve a 4.8X (2 × 1.2 × 2 = 4.8)
improvement against 802.11ax.
Given that 802.11ax has a maximum data rate of 9.6 Gbps, 802.11be is
expected to achieve a maximum data rate of 4.8 × 9.6 = 46.08 Gbps.
1 2 3
2.4GHz
4 5 6
5GHz
7 8 9
6GHz
1 2 3
2.4GHz
1 2 3
5GHz
1 2 3
6GHz
Fig. 10. Illustration of multiband transmissions: improving throughput by allocating data from one
traffic stream to multiple bands (top); improving reliability by sending duplicate data from one traffic
stream over multiple bands (bottom).
AP1 AP2
Fig. 11. Multi-AP coordination. Downlink is handled by AP1, while AP2 handles the uplink.
100 Wireless and Mobile Networking
communications where AP1 serves the downlink traffic, while the uplink is
handled by AP2.
12. Summary
1. 802.11a/g use OFDM with 64 subcarriers in 20 MHz, which includes 48
Data, 4 Pilot, 12 guard subcarriers.
2. 802.11e introduces four queues with different AIFS and TXOP durations
and a QoS field in frames to provide enhanced support for QoS.
3. 802.11n adds MIMO, aggregation, dual band, and channel bonding.
4. IEEE 802.11ac supports multi-user MIMO with 80+80 MHz channels
256-QAM and eight streams to achieve 6.9 Gbps
5. IEEE 802.11ax supports 1024QAM, reduces OFDM carrier spacing to
78.125 kHz and increases data symbol interval to 12.8 µs. It introduced
OFDMA.
6. 802.11be expects to increase data rates up to 46 Gbps by using 4096QAM,
320 MHz channel bandwidth, and 16 MIMO streams. It uses 6 GHz band
along with 2.4 GHz and 5 GHz.
References
[802-11a] (30 Dec. 1999). IEEE standard for telecommunications and information
exchange between systems – LAN/MAN specific requirements – Part 11: Wireless
medium access control (MAC) and physical layer (PHY) specifications: High speed
physical layer in the 5 GHz band. pp. 1–102. In: IEEE Std 802.11a-1999. doi: 10.1109/
IEEESTD.1999.90606.
[802-11b] (20 Jan. 2000). IEEE standard for information technology – telecommunications
and information exchange between systems – local and metropolitan networks
– specific requirements – Part 11: Wireless LAN medium access control (MAC)
and physical layer (PHY) specifications: Higher speed physical layer (phy)
extension in the 2.4 GHz band. pp. 1–96. In: IEEE Std 802.11b-1999. doi: 10.1109/
IEEESTD.2000.90914.
[802-11g] (27 June 2003). IEEE standard for information technology – local and
metropolitan area networks – specific requirements – Part 11: Wireless LAN medium
access control (MAC) and physical layer (PHY) specifications: Further higher
data rate extension in the 2.4 GHz band. pp. 1–104. In: IEEE Std 802.11g-2003
(Amendment to IEEE Std 802.11, 1999 Edn. (Reaff 2003) as amended by IEEE Stds
802.11a-1999, 802.11b-1999, 802.11b-1999/Cor 1-2001, and 802.11d-2001). doi:
10.1109/IEEESTD.2003.94282.
[802-11e] (11 Nov. 2005). IEEE standard for information technology – local and
metropolitan area networks – Specific requirements – Part 11: Wireless LAN medium
access control (MAC) and physical layer (PHY) specifications – amendment 8:
Medium access control (MAC) quality of service enhancements. pp. 1–212. In: IEEE
Std 802.11e-2005 (Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003)). doi:
10.1109/IEEESTD.2005.97890.
[802-11n] (29 Oct. 2009). IEEE standard for information technology – local and
metropolitan area networks – specific requirements – Part 11: Wireless LAN
medium access control (MAC) and physical layer (PHY) specifications amendment
5: Enhancements for higher throughput. pp. 1–565. In: IEEE Std 802.11n-2009
(Amendment to IEEE Std 802.11-2007 as amended by IEEE Std 802.11k-2008,
IEEE Std 802.11r-2008, IEEE Std 802.11y-2008, and IEEE Std 802.11w-2009). doi:
10.1109/IEEESTD.2009.5307322.
Mainstream WiFi Standards 103
[802-11ac] (18 Dec. 2013). IEEE standard for information technology – telecommunications
and information exchange between systems. Local and metropolitan area networks –
Specific requirements, Part 11: Wireless LAN medium access control (MAC) and
physical layer (PHY) specifications – amendment 4: Enhancements for very high
throughput for operation in bands below 6 GHz. pp. 1–425. In: IEEE Std 802.11ac-
2013 (Amendment to IEEE Std 802.11-2012, as amended by IEEE Std 802.11ae-
2012, IEEE Std 802.11aa-2012, and IEEE Std 802.11ad-2012). doi: 10.1109/
IEEESTD.2013.6687187
[802-11ax] (19 May 2021). IEEE standard for information technology – telecommunications
and information exchange between systems local and metropolitan area networks –
specific requirements Part 11: Wireless LAN medium access control (MAC) and
physical layer (PHY) specifications amendment 1: Enhancements for high-efficiency
WLAN. pp. 1–767. In: IEEE Std 802.11ax-2021 (Amendment to IEEE Std 802.11-
2020). doi:10.1109/IEEESTD.2021.9442429.
[802-11ax-TUT] (Firstquarter 2019). E. Khorov, A. Kiryanov, A. Lyakhov and G.
Bianchi. A tutorial on IEEE 802.11ax high efficiency WLANs. pp. 197–216.
In: IEEE Communications Surveys & Tutorials, vol. 21, no. 1. doi: 10.1109/
COMST.2018.2871099.
[802-11be] (2020). E. Khorov, I. Levitsky and I. F. Akyildiz. Current status and directions
of IEEE 802.11be, the Future Wi-Fi 7. pp. 88664–88688. In: IEEE Access, vol. 8. doi:
10.1109/ACCESS.2020.2993448.
[802-11be-LOPEZ] D. (September 2019). Lopez-Perez, A. Garcia-Rodriguez, L. Galati-
Giordano, M. Kasslin and K. Doppler. IEEE 802.11be extremely high throughput:
The next generation of Wi-Fi technology beyond 802.11ax. pp. 113–119. In: IEEE
Communications Magazine, vol. 57, no. 9. doi:10.1109/MCOM.001.1900338.
6
Niche WiFi
ad/ay
a/n/ac/ax/be
ah
Wavelength 10 m 1m 1 dm 1 cm
HF VHF UHF SHF
Frequency 30 MHz 300 MHz 3 GHz 30 GHz
Fig. 2. TV spectrum and channels.
Radio Astronomy
FM Radio
Channel 2 3 4 5 6 7 8 12 13 14 15 37 38 82 83
Freq. 54 60 66 72 76 82 88 174 180 204 210 216 470 476 608 614 620 884 890
VHF Channels UHF Channels
Fig. 3. TV VHF and UHF channel numbers in USA (Frequencies are in MHz).
1.2 Digital TV
Analog TV broadcast has been discontinued recently in most parts of the
world. The world has switched to digital broadcast due to many advantages.
The main mantra for digital TV is that all pictures are represented as pixels and
106 Wireless and Mobile Networking
each pixel is represented by some bits. Once the pictures are converted to bits,
it becomes like computer communications. Encryption, multiplexing, mixing
with different services and types of data, etc., all become very efficient, just
like computer communication networks.
Another main advantage of going digital is that we no longer need to
provide significant guard bands between occupied frequencies because
interference from adjacent frequencies can be managed by sophisticated
framing and error-control techniques. Digital transmission also uses
compression at the transmitter and decompression at the receiver, which
further reduces spectrum usage for digital TV. Consequently, multiple digital
channels can be transmitted within 6 MHz, which was previously used to
transmit only one analog TV program. This bandwidth efficiency has freed up
a lot of TV spectrum, which is dubbed as Digital Dividend.
There was a particular demand for this ‘new’ spectrum in 700 MHz band
for Cellular, Emergency Services, and ISM. Consequently, governments
were able to raise significant revenue by auctioning a part of this spectrum
to cellular companies while reserving the rest for unlicensed use. Similar
practices were adopted in other countries.
Figure 4 illustrates the basic differences between 700 MHz and higher
frequency. The wavelength in 700 MHz is much longer and hence it can travel
far and penetrate many obstacles, such as buildings.
700 MHz has lower attenuation (1/7th to 1/9th of 1800/1900/2100 MHz),
which means it requires lower transmission power and can provide longer
mobile battery life for mobile devices. It can have larger cell radius, which
means smaller number of towers. Such long-distance propagation is good
for rural areas. It means providing cellular and wireless broadband services
to rural areas becomes more cost effective and affordable. Because of these
reasons, availability of new spectrum in 700 MHz is considered a very good
opportunity for wireless networking.
Fig. 4. Differences between 700 MHz and higher frequency. A wave cycle in 700 MHz can travel
much further than that in 2.4 GHz.
White Spaces
Time
Usage
Frequency
Allocation
Frequency
Fig. 5. Concept of spectral white space. Allocation does not mean it is used.
White
Spaces
PAWS
Station 1
GDB RLQP
AP
PAWS RLSS RLQP
Station 2
GDB AP
Station n
Fig. 8. White space database access protocols.
RLSS AP STA
CSM Request
Associate
Disassociate
Message Description
CSM Request APs asks other APs or RLSS about white space map
CSM Response White space map is provided
CVS APs supply white space map to their stations and confirm that stations are still
associated
CAQ Stations ask AP if they do not receive the map within a timeout interval
NCC Request Sent by stations to AP requesting use of a channel. AP may forward to RLSS
NCC Response Permission to transmit on requested channel
Niche WiFi 111
Master/Slave
Master
PAWS
GDB
PAWS
RLSS AP
GDB PAWS
BS
Fig. 10. The master-slave concept in PAWS.
112 Wireless and Mobile Networking
using its certificate and the database can push channel availability information
whenever some new spectrum is available or availability of an old channel
changes. Finally, to ensure security, all PAWS messages are encrypted.
Some sample PAWS messages and how they are exchanged are shown
in Fig. 11. As we can see, after the exchange of initialization messages, the
registration messages are exchanged. It is only after the registration that the
master device can send a query message to the database server and get a
response. The master device can also send batch query to include requests
for a set of slave devices located in different locations with different antenna
heights, etc., and get a batch response.
Table 2. 802.11af data rates in Mbps: Single Stream, single unbonded (6 MHz) channel.
Example 1
What is the maximum possible data rate achievable with 802.11af?
Solution 26.67
Data rate with single stream and single 6 MHz channel = 26.67 Mbps
Data rate with 4 streams and 4 bonded channels = 4 × 4 × 426.7 = 426.7 Mbps.
755 787
China
863 868
Europe
866 869 920 925
Singapore
902 928
USA
916.5 927.5
Japan
917.5 923.5
Korea
700MHz 1GHz
rate allows APs to connect 4 times more devices than existing WiFi, which is
very important for densely deployed IOT.
The spectrum allocation for HaLow is shown in Fig. 12. We can see that
different countries have allocated slightly different spectrums, but they are
close to 900 MHz, just below the GHz mark.
Example 2
If we reduce the clock speed of 802.11ac by a factor of 10, what would be the
new symbol rate (symbols/s)?
Solution
802.11ac has a symbol duration of 3.6 μs (for 400 ns GI).
New symbol duration with a 10x slower clock = 36 μs
New symbol rate = 1/(36 × 10-6) = 27,777 sym/s
116 Wireless and Mobile Networking
Example 3
In USA, 902–928 MHz has been allocated for 802.11ah. How many different
channels can be used if 16 MHz channel option is used?
Solution
902–928 MHz has a total bandwidth of 26 MHz. There is only one (non-
overlapping) 16 MHz channel possible out of 26 MHz.
Example 4
A garbage bin sensor uses 802.11ah to upload 10 bytes of bin-fill-level data
once every hour. Compared to legacy 802.11 (a/b/g/n/ac), the bin sensor has
to upload how many less bytes per day?
Solution
Legacy 802.11 MAC header length = 36 bytes
Total bytes uploaded with legacy 802.11 = 24x(10 + 36) = 1104 bytes/day
Total bytes uploaded with 802.11ah = 24x(10 + 10) = 480 bytes/day (min)
1104–480 = 624 less bytes per day
Fig. 14. Comparison of 802.11ah headers with the legacy 802.11 header.
identifies these packets via the modulation and coding scheme at the PHY.
That is, ACK, Block ACK, CTS, etc., all use different MCSs.
STA AP STA AP
SIFS SIFS
DIFS+Backoff
SIFS SIFS
SIFS
DIFS+Backoff SIFS
announces only one segment at a time. Each station knows which segment it
belongs to.
Every Delivery TIM (DTIM) interval, AP announces the TIM for the
first segment as well as a segment map which indicates the segment that has
pending data. All stations listen to the DTIM. Stations which belong to the
first segment actually have to listen to the DTIMs only, because the rest of the
beacons within the DTIM interval are for other segments. If a station is not
in the first segment, then it will find out from the DTIM whether there is any
data for its segment. If so, it will wake up for that beacon only and sleep for
the rest of the time.
For example, if DTIM announces that there is data available only for the
fourth segment, then a station which belongs to segment 2 will not wake up
until the next DTIM beacon because it knows that there is no data available
for it. Figure 16 illustrates the transmissions of DTIM and other beacons.
Beacon Interval
DTIM Beacon Interval
that replaces NAV. Like NAV, RID is also a time countdown mechanism, but
it is different than NAV in many ways.
First, RID is done in PHY, while NAV was a MAC mechanism. As such,
RID is set after the reception of PHY header, while NAV is set after the
reception of a complete MAC frame. RID is set based on the 2-bit response
indication field in the PHY header. With two bits, we have four combinations:
• Normal Response: RID ← SIFS + Ack or Block Ack time
• NDP Response: RID ← SIFS + NDP Frame time
• No Response (Broadcast frames): RID ← 0
• Long Response: RID ← SIFS + Longest transmission time (Used with
Speed Frame Exchange)
Note that although ACK is a type of NDP, it is treated separately from the
rest of the NDP packets.
intersection and use their judgment and resolve the priority (in some countries
there are 4-way stops to help drivers sort out who should go first). However, in
intersections where traffic is heavy, it is better to use some form of reservations
and allocations, using traffic lights to restrict the movement of a group of cars
at a time.
Easy Beamforming: With large antenna arrays, beams can be steered at any
direction quickly and with high accuracy.
Low Interference: At 60 GHz, signals do not travel very far, cannot penetrate
walls, and are very directional. This reduces interference with other 60 GHz
communications happening nearby. This is particularly efficient in an urban
environment where high density communications take place. For example,
with existing 2.4 GHz and 5 GHz bands, WiFi signals from different apartments
in the same building or even in adjacent buildings interfere with each other.
Directional Antennas: At 60 GHz, directional antennas and beamforming
are used to focus the power to the receiver to achieve the communication
range (power attenuates quickly at this high frequency). As a result, spatial
reuse of the same spectrum is possible.
Inherent Security: Because the signal power attenuates very quickly, it is
difficult to intercept 60 GHz communications from outside the room. This
provides an inherent high-level of security.
Some of the advantages of 60 GHz band can also work as disadvantages:
High Attenuation: As explained earlier, 60 GHz has a very high attenuation.
First, the attenuation increases with distance more rapidly than other bands
due to the high frequency. Second, there is high oxygen absorption at this
band. The combination causes significant loss of signal power at short
distances. As a result, communication range is limited to only 10 meters and
very high transmission power is needed. High antenna gain is required for
omnidirectional communication.
Directional Deafness: Because all communication is highly directional, the
conventional channel sensing-based MAC protocols, such as CSMA and
RTS/CTS, do not work. Multicasting is also more challenging because two
Niche WiFi 125
stations separated cannot receive the same beam at the same time; thus highly
narrow beams are used.
Easily Blocked: 60 GHz signals are easily blocked by humans, dogs, or any
moving object, making it necessary to deploy relays in dynamic environments.
Example 5
What is the 802.11ad OFDM data rate for 64-QAM with 5/8 coding rate?
Solution
802.11ad symbol rate = 1386/336 Msym/s
# of data subcarriers = 336
Data rate = log2(64) × (5/8) × 336 × (1386/336) = 5197.5 Mbps
Fig. 22. Illustration of 802.11ad beacon transmission for a four sector antenna; the beam is repeated
sequentially over the four sectors.
Niche WiFi 129
Example 6
An 802.11ad PCP has a multi-sector antenna with every sector covering
45 degrees. During a Beacon Time (BT), how many beacons the AP should
transmit to ensure that stations located at any direction can receive the beacon
successfully?
Solution
With 45-degree wide sectors, 360-degree coverage is achieved by 8 sectors.
The AP therefore is required to send a total of 8 beacons (repeat the same
beacons 8 times), one per sector.
Example 7
Two 802.11ad devices, STA1 and STA2, want to beamform. STA1 has
32 different antenna configurations (i.e., capable of steering the beam to
32 different directions). STA2 has only 4 beam directions. For exhaustive
search, how many training frames are transmitted in total by these two devices
before they discover the optimum beam pairs for communication?
Solution
Total combinations of antenna configurations between the two stations is 32×4
= 128. Therefore, 128 training frames are transmitted, one per specific pair of
antenna configurations, before the best combination (pair) is finally selected.
130 Wireless and Mobile Networking
T1 T2 Tx Rx R1 R2
T8 T3
R8 R3
T4
T7 R4
R7
T6 T5
R6 R5
(a)
Tx Rx
T1 T2
T8 T3
T4
T7
T6 T5
(b)
Fig. 23. Illustration of sector training approaches: (a) exhaustive search vs. (b) semi-exhaustive
search.
Example 8
Two 802.11ad devices, STA1 and STA2, want to beamform. STA1 has 16
different antenna configurations (i.e., capable of steering the beam to 16
different directions). STA2 has only 4 beam directions. For Omni-direction
Antenna approach, how many training frames are transmitted in total by these
two devices before they discover the optimum beam pairs for communication?
Solution
STA1 first transmits 16 training frames while STA2 is listening in
omnidirection. Then STA2 transmits 4 frames while STA2 is listening. Total
frames transmitted: 16 + 4 = 20.
The purpose of SLS is to find a coarse beam quickly. Note that the entire
360 degree is divided into a few sectors, so this process can be quick. For
example, if we have four sectors for devices, then the total number of sectors
that need to be probed is only 8, given the semi-exhaustive search option.
Figure 24 illustrates the SLS process. First the initiator transmits a Sector
Sweep (SS) frame over all sectors, sequentially identifying the sector ID in the
frame. When the initiator is transmitting sector sweeping frames, the responder
is receiving in the omni-directional mode. After the initiator completes frame
transmissions over all of its sectors, the role of the two devices are reversed,
i.e., the previous responder now becomes the initiator and vice versa. The
initiator then acknowledges the sector number of the responder for which it
received the highest signal strength. The responder acknowledges using an SS
ACK frame and communicates the strongest sector number for the initiator.
Now both devices know which sectors they need to use for communicating
with each other.
After the SLS, the devices can choose to further refine the beam within the
optimal sector by initiating an optional second stage, called Beam Refinement
Procedure (BRP). Basically, in BRP, devices further search through their
optimal sectors identified in SLS to find the optimal parameters in that sector
to identify a narrower beam. Note that the narrower the beam, the stronger
the signal strength is. Thus, BRP can be useful if devices need to achieve the
highest possible data rates available in 802.11ad. SLS and BRP are illustrated
in Fig. 25.
Example 9
Table 4 shows the received signal strength (RSS) at the responder for each
transmitted training frame from the beam training initiator during SLS. There
are four sectors for both initiator and responder, and the number after the
station letter denotes the sector number. For example, row 1 shows the frame
transmitted by station A on its sector 1.
What is the optimum beam (sector) pair discovered after the SLS?
Solution
The sector that produces the strongest signal is selected as the best sector. For
A, the strongest sector is 3 (–50 dBm). For B, sector 1 produces the strongest
signal at A (–49 dBm). The optimum beam pair for (A,B) therefore is (3,1).
Transmitted Sector A.1 A.2 A.3 A.4 B.1 B.2 B.3 B.4
RSSS at Responder (dBm) –70 –62 –50 –64 –49 –71 –75 –80
Niche WiFi 133
Example 10
In a given PBSS, all stations have 12 antenna sectors with 30-degree
transmission angle. Table 5 shows the beam pairs learned from beam training
among 6 stations, A to F. For example, the first row of the Table shows that A
would use its sector #1 to communicate with B while B would use its sector
#7 to communicate with A. If a communication, SP1, between A and B has
already been scheduled, can SP2, a new communication between E and F, be
spatially shared with SP1, i.e., be allocated during the same time slots without
interference?
Solution
No. During SP1, B will transmit on its beam #7, which is the same beam
number found to be optimum to communicate with E (Row 3 in the Table).
Therefore, B’s transmissions to A during SP1 will affect E. SP2 therefore
cannot be spatially shared with SP1 without interference.
4. 802.11ay
802.11ad only supports single stream and cannot bond channels (each channel
is 2.16 GHz wide). As we have seen in Table 3, a maximum of ~ 7 Gbps can
be achieved for a single channel and single stream with 802.11ad. To push the
data rates in the 60 GHz band, IEEE is about to release an extension, named
802.11ay [802-11ay], which will support 4 streams and bond up to 4 channels,
pushing the maximum achievable data rate in excess of 170 Gbps.
134 Wireless and Mobile Networking
5. Summary
1. Mainstream WiFi operates in 2.4/5 GHz band: Hugely popular and
used in many consumer products, e.g., mobile phones, tablets, laptops,
and wireless LANs. The following WiFi standards are used for these
mainstream applications: IEEE 802.11a/b/g/n/ac/ax (11n = WiFi4,
11ac = WiFi5, 11ax = WiFi6).
2. Niche WiFi introduced at both sub-GHz and 60 GHz.
3. Sub-GHz: 802.11af (700 MHz TV Whitespace: long-distance) and
802.11ah (900 MHz: IoT, sensors networks, home automation, large
number of connections).
4. 60 GHz: 802.11ad (7 Gbps; already penetrated some niche products) and
802.11ay (upcoming; 270+Gbps cable replacement, backhaul, etc.).
5. Analog to digital conversion of TV channels has freed up spectrum in
700 MHz band, which is called white space.
6. 700 MHz allows long-distance communication, which is useful for rural
areas.
7. IEEE 802.11af White-Fi can achieve up to 426.7 Mbps using OFDM,
4-stream MIMO, 256-QAM at a coding rate of 5/6.
8. PAWS is the protocol for accessing the white space databases.
9. 802.11ah uses 900 MHz band which can cover longer distances compared
to other WiFi standards.
10. 802.11ah is 802.11ac down clocked by 10x. It uses OFDM with 1/2/4/8/16
MHz channels; symbols are longer which can handle longer multi-paths.
11. 802.11ah MAC achieves higher efficiency by reducing header, aggregating
ACKs, using null data packets, and implementing speed frame exchange.
12. 802.11ah can achieve higher energy saving by allowing stations as well as
the AP to sleep using Target Wakeup Time and Restricted Access Window
mechanisms.
13. 60 GHz, a.k.a. mmWave, has large bandwidth, small antenna separation
allows easy beamforming and gigabit speeds but short distance due to
large attenuation.
14. In 60 GHz WiFi, multiple transmission can take place on the same
frequency at the same time, which is known as Spatial Frequency Sharing.
Niche WiFi 135
References
[802-11af] (October 2013). A. B. Flores, R. E. Guerra, E. W. Knightly, P. Ecclesine
and S. Pandey. IEEE 802.11af: A standard for TV white space spectrum sharing.
pp. 92–100. In: IEEE Communications Magazine, vol. 51, no. 10. doi: 10.1109/
MCOM.2013.6619571.
[802-11ah] (5 May 2017). IEEE standard for information technology – telecommunications
and information exchange between systems – local and metropolitan area networks
– specific requirements – Part 11: Wireless LAN medium access control (MAC)
and physical layer (PHY) specifications amendment 2: Sub 1 GHz license exempt
operation. pp. 1–594. In: IEEE Std 802.11ah-2016 (Amendment to IEEE Std 802.11-
2016, as amended by IEEE Std 802.11ai-2016). doi: 10.1109/IEEESTD.2017.792036.
[802-11ah-bands] (2013). Weiping Sun, Munhwan Choi and Sunghyun Choi. IEEE
802.11ah: A long range 802.11 WLAN at Sub 1 GHz. Journal of ICT Standardization,
1: 1–25. doi: 10.13052/jicts2245-800X.125.
[802-11ad] (28 Dec. 2012). IEEE standard for information technology – telecommunications
and information exchange between systems – local and metropolitan area networks
– specific requirements-Part 11: Wireless LAN medium access control (MAC) and
Niche WiFi 137
WiFi can provide high speed connectivity at low cost, but its coverage is
limited to the home or office building. In contrast, cellular networks are
designed to provide wide area coverage to both static and mobile users.
Cellular network is the oldest communications network technology, which has
now gone through several generations of evolution. In this chapter, we shall
first learn the fundamental concepts of cellular networks before examining the
advancements brought forth by each generation.
Fig. 1. Reusing 7 frequencies to cover a large area with hexagonal cells. No two adjacent cells use
the same frequency.
142 Wireless and Mobile Networking
3. Cell Sites
Cellular systems need to install radio towers (base stations) to transmit and
receive calls. Where should they put the tower? In the beginning, they were
building towers from scratch in some places, which was very costly. Then the
carriers wanted to use existing infrastructure, but due to wireless radiation as
well as pollution of scenery, no one wanted cell towers near their house (There
is this acronym NIMBY which means ‘not in my backyard’). Finally, mobile
operators started to install towers on rooftops of schools, churches, hotels,
etc., as well on traffic lights, street lamps and so on for a fee to the owners. For
non-profit organizations, such as schools and churches, that was a great way of
making money. Even some fake trees were planted to hide base stations as shown
in Fig. 2.
Fixed tower sites are good most of the time, but they cannot handle
sudden increase in demand in a given area. To serve a sudden surge of people
in a given area, such as a big circus or a fair, the operators brought in CoWs
or Cell on Wheels. The whole base station is fitted on top of a van, so the van
can go anywhere where there is a demand, as shown in Fig. 3.
Macro-cell
Pico-cell
Micro-cell
Macro-BS
Femto-cell
provide good coverage (strong signals). Some operators provide femto cells
for free to attract and retain customers.
5. Cell Geometry
Although there is no regular cell geometry in practice due to natural obstacles
to radio propagations, a model is required for planning and evaluation
purposes. A simple model would be for all cells to have identical geometry
and tessellate perfectly to avoid any coverage gaps in the service area. Radio
propagation models lead to circular cells, but unfortunately circles do not
tessellate!
As shown in Fig. 5, three options for tessellation are considered: equilateral
triangle, square, and regular hexagon. Hexagon has the largest area among the
three; hence it is typically used for modeling cellular networks.
1
Sometimes, the reuse factor is represented by the fraction 1/N.
146 Wireless and Mobile Networking
Therefore, the possible values of N are 1, 3, 4, 7, 9, 12, 13, 16, 19, 21, and
so on. Note that some values are not possible. For example, we cannot have
a cluster size of 5, because there are no combinations of integers, or I and J,
that will provide 5.
Finally, D/R is called the reuse ratio. From hexagonal geometry, it can be
shown that D/R = √3N , which means D/d = √N .
Example 1
What would be the minimum distance between the centers of two cells with
the same band of frequencies if cell radius is 1 km and the reuse factor is 1/12?
Solution
R = 1 km, N = 12
D/R = √3N
D = (3×12)1/2 1 km
= 6 km
60◦
Fig. 10. An example of frequency reuse with cluster size of 1 using sectorized antenna.
For the first pattern (1×3×1), there is only one frequency. Given the
current location of the SS as shown in the figure, it can receive the same
frequency signal from five other cells besides the current cell. Similarly, for
3×3×1, the SS is receiving frequency 2, so it will receive frequency 2 signal
from 4 other cells. Fortunately, if the SS is located in the center of the cell,
then the signal from the current cell tower will be the strongest, which will
help it to connect to this tower without any confusion.
A problem arises when the SS is located close to the edge. If it receives
the same frequency signals from both the cells, then the signal strengths may
be close to each other, creating confusion. This leads to a so-called ping-pong
effect, where the SS may switch between towers as it moves.
12. Handoff
User mobility poses challenges for cellular networks. As the user starts
to leave the coverage of a cell, the RSS becomes too weak. The user then
must connect to a new BS with a stronger RSS to keep the connection to the
network. Disconnecting from one and connecting to a new BS during an on-
going session is called ‘handoff’, which is illustrated in Fig. 13.
To handoff successfully, the new BS must have available channels to
support the on-going call; otherwise the call will be dropped. Dropping an
ongoing call is worse than rejecting a new call. BSs therefore usually reserve
some channels, called ‘guard channels’, exclusively for supporting handoff
calls. Unfortunately, guard channels increase the blocking probability of new
calls. The number of guard channels is left to the operators to optimize, i.e., it
is not part of the standard.
Example 2
A particular cellular system has the following characteristics: cluster size =
7, uniform cell size, user density = 100 users/sq. km, allocated frequency
spectrum = 900–949 MHz, bit rate required per user = 10 kbps uplink and
10 kbps downlink, and modulation code rate = 1 bps/Hz. How many users per
cell can be supported and what cell sizes are required?
Solution
49 MHz/7 = 7 MHz/cell; for symmetric bandwidth requirement in uplink/
downlink, we have 3.5 MHz/uplink or downlink
10 kbps/user = 10 kHz/user (1 bps/Hz); users/cell = 3.5 MHz/10 kHz = 350
100 users/km2; to connect 350 users, the cell area has to be 350/100 = 3.5 km2
πr2 = 3.5; r = 1.056 km
Example 3
A particular cellular system has the following characteristics: cluster size =
7, uniform cell size, user density = 100 users/sq. km, allocated frequency
spectrum = 900–949 MHz, bit rate required per user = 10 kbps uplink and
10 kbps downlink, and modulation code rate = 1 bps/Hz. If the available
spectrum for uplink/downlink is divided into 35 channels and TDMA is
employed within each channel:
1. What is the bandwidth and data rate per channel?
2. How many time slots are needed in a TDMA frame to support the required
number of users?
3. If the TDMA frame is 10 ms, how long is each user slot in the frame?
4. How many bits are transmitted in each time slot?
Solution
1. 49 MHz/7 = 7 MHz/cell; for symmetric bandwidth requirement in uplink/
downlink, we have 3.5 MHz/uplink or downlink
3.5 MHz/35 = 100 kHz/channel = 100 kbps per channel
2. With 10 kbps/user, we have 10 users/channel
3. 10 ms/10 = 1ms
4. 1 ms × 100 kbps = 100 b/slot
devices that want to connect as well as the nature of traffic they want to send,
such as voice vs. data.
In cellular word, the major changes are marked as a generation (G), which
roughly lasts for 10 years. Any major change in between the 10 years is then
marked as fraction of 10, such as 2.5G. Figure 14 shows the evolution of these
generations. The figure shows how the evolution in terms of standardization
happens in the US (or North America) and in Europe in the core technology,
such as analog vs. digital, and in traffic types, such as voice vs. data.
The following are some of the key points to note:
Technology and Traffic: The first generation (1G) was analog and using
FDMA to transmit only voice. It started digital transmission starting from 2G,
but it was voice. Data could only be transmitted by converting it into voice
signals using modems. Actual data transmission started from 2.5G and by
now it is mostly data. Voice is now transmitted over data services.
Standardization in North America and Europe: North America and Europe
continued using different standards until the end of 3G, when they converged
to LTE (Long Term Evolution).
Table 1 shows more details of each generation. Most of the standards,
such as GPRS, EDGE, WCDMA and so on are now almost extinct. One
standard that survived and very much in use worldwide, including in North
America, is GSM.
North
America
Europe
14. GSM
GSM stands for Global System for Mobile Communications. It is now
implemented in most cell phones world-wide and most countries are using
GSM. A phone without GSM support therefore would not do much.
The interesting thing is that GSM was designed back in 1990. Three
decades on, it is still a very popular technology. GSM uses Time-Division
Multiple Access (TDMA) instead of Frequency Division Multiple Access
(FDMA) used in 1G. Figure 15 shows the difference between FDMA and
TDMA. In FDMA, once a frequency was allocated to a user, no one else
was allowed to use that frequency. This wasted a lot of system capacity.
With TDMA, the same frequency could be used by multiple users shared
154 Wireless and Mobile Networking
in time. This is possible because there are many silence periods in voice
communication, which can used for other users.
GSM is defined for all major frequency bands used throughout the world.
Specifically, it supports the four bands, 850/900/1800/1900 MHz; hence,
called quad-band. Handsets, not supporting quad-band, may not operate in
some countries.
The biggest invention of GSM was to separate the user from the handset.
Prior to GSM, user subscription information was tied to the handset hardware.
It made it difficult for people to change operators and share handsets. GSM
introduced the concept of Subscriber Identity Module (SIM) card, which is
a tiny plastic that contains user subscription information. Once inserted into
a handset, that handset then is used by that user. With this concept, users can
use the handset even when they switch subscriber.
Interestingly, the reverse use is also possible with control channels. If the
control channel has no control information to carry, then some user traffic
could be sent over it. But it has to be very short. This is how the short message
service (SMS) concept was developed. Now SMS is so popular that carriers
probably are dimensioning more control channels to make profit from it.
Each 200 kHz channel is ultimately used by 8 user slots. Each 200 kHz
channel is modulated to 270.8 kbps data rate; that gives 270.8/8 = 33.85 kbps
per user. After encryption and FEC, only 9.6 kbps per slot is given, i.e., if we
send data over GSM, we can get 9.6 kbps data rate!
Voice, on the other hand, does not need high FEC. Therefore, voice can
use a higher bit rate. It turns out that voice uses 16 kbps, which is a compressed
version of the 64-kbps original voice. Note that original voice is 64 kbps
because it is sampled at 8,000 samples per second and each sample is coded
with 8 bits. The telephone system (PSTN) has a cutoff frequency at 4 kHz
because human voice does not carry a very high frequency. Nyquist sampling
theory says that we need sample at twice the frequency of the original analog
signal to avoid loss of information. That’s why voice signals are sampled at
8000 samples per second, which is twice the 4 kHz bandwidth.
This means that if you play music from a CD player over the phone, the
quality of the music will be very poor at the other end as music contains some
very high frequency components which will be filtered out by the telephone
system.
17. LTE
LTE stands for Long Term Evolution. The whole world, Europe as well as
North America, converges to the same cellular telephony technology starting
with LTE. This is also the kick start for the fourth generation of telephony.
3GPP is now the single body that coordinates all standards for cellular
telephony. Every year it releases new documents. LTE was released as 3GPP
Release 8 in 2009.
LTE is the precursor for 4G. Technically, for a technology to be called
4G, it has to meet all the requirements specified in International Mobile
Telecommunication (IMT) Advanced Requirements in ITU M.2134-2008.
LTE did not meet every criterion in that document, so it is sometimes called
pre-4G or 3.9G cellular technology. LTE was then later revised to LTE
Advanced or LTE-A to meet all the 4G specifications.
LTE supports all different bands – 700/1500/1700/2100/2600 MHz,
to satisfy spectrum allocations in different regions in the world as well as
flexible bandwidth – 1.4/3/5/10/15/20 MHz, depending on the country
[ASTELY 2009]. The bandwidth can be allocated very flexibly. It can be
divided into many users during peak hours, or the whole network bandwidth
158 Wireless and Mobile Networking
can be allocated to a single user at off-peak time, if there are no other users
competing. The maximum data rate possible in LTE can be very high.
LTE supports both Frequency Division Duplexing (FDD) and
Time Division Duplexing (TDD). For FDD, paired spectrum allocation is
required, which means that an equal amount of spectrum or frequencies have
to be allocated for uplinks and downlinks. This suits well when both uplink
and downlink have equal usage voice. In voice calls, a person speaks 50%
of the time and listens 50% of the time. However, for data, downlink is used
more heavily than uplink, as we tend to download more data than upload,
although upload traffic is increasing rapidly due to pervasive availability of
cameras and videos in mobile phones and use of social networks. TDD does
not require paired allocation. It can be unpaired and can use the spectrum
more flexibly for up and down use, which suits data very well.
LTE supports 4×4 MIMO as well as multi-user collaborative MIMO. It
supports beamforming only in the downlink. When using 4×4 MIMO with
20 MHz, i.e., the full capacity, LTE can achieve 326 Mbps for downlink and
86 Mbps for uplink. For modulation, it supports OFDM with QPSK, 16 QAM,
and 64 QAM. LTE supports OFDMA for the downlink.
Fig. 19. LTE Superframe structure. Each superframe contains 10 1-ms subframes.
Cellular Networks 159
The allocation of the blocks changes every superframe, i.e., every 10 ms,
unless for some persist scheduling, where the same resource blocks may be
allocated over a long time (over several superframes).
Example 4
For normal cyclic prefix (CP), how many resource elements (REs) are there
in 2 RBs?
Solution
With normal CP, we have 7 symbols per slot
Number of REs per RB = 12 × 7 = 84
Number of REs in 2 RB = 2 × 84 = 168
Example 5
What is the peak data rate of downlink LTE?
Solution
For peak data rate, we assume best conditions, i.e., 64 QAM (6 bits per
symbol), short CP (7 symbols per 0.5 ms slot), and 20 MHz channel
Each symbol duration = 0.5 ms/7 = 71.4 μs
Number of RB for 20 MHz = 100
Number of subcarriers per RB = 12
Number of subcarriers for 20 MHz channel = 100 × 12 = 1200
Number of bits transmitted per symbol time = 6 × 1200 bits
Data rate = (6 × 1200 bits)/(71.4 μs) = 100.8 Mbps (without MIMO)
Cellular Networks 161
20. Summary
1. In a cellular cluster of size N, the minimum distance between co-channel
cells is D = R√3N , where R represents the cell radius.
2. With sectorized antenna, it is possible to have a cluster size of just 1, i.e.,
two adjacent cells can reuse the same spectrum.
3. 1G was analog voice with FDMA.
4. 2G was digital voice with TDMA. Most widely implemented 2G is GSM.
5. 3G was voice+data with CDMA.
6. LTE is the precursor of 4G. LTE uses a super-frame of 10 subframes of
1ms each. Each subframe has one 0.5 ms slot for uplink and downlink
each. Each subcarrier in LTE is 15 kHz. 12 subcarriers (180 kHz) over
1 ms slot is used as a unit of resource in LTE.
References
[ASTELY 2009] D. Astely, E. Dahlman, A. Furuskär, Y. Jading, M. Lindström and S.
Parkvall (April 2009). LTE: the evolution of mobile broadband. pp. 44–51. In: IEEE
Communications Magazine, vol. 47, no. 4. doi: 10.1109/MCOM.2009.4907406.
[FCC 800 MHz] 800 MHz Cellular Service – FCC [accessed 22 October, 2001].
[Rappaport 2002] Theodore S. Rappaport (2002). Wireless Communications: Principles
and Practice, Prentice Hall.
8
5G Networks
5G is the fifth and latest generation of cellular networks that had just started
to roll out in 2019–2020. While the previous four generations mainly sought
to improve the data rate and capacity of the cellular systems, 5G is designed
to improve several other aspects of communications and connectivity beyond
the data rates. This chapter discusses the new applications promised by 5G
and the networking technologies behind them.
1. Key 5G Targets
5G promises to massively surpass 4G in the following three main categories:
1. Data Rate: While 4G offered the maximum data rate of 1 Gbps per user
under ideal conditions, 5G promises 20 Gbps under the same conditions.
2. Latency: Radio contribution to latency between send and receive is an
important metric for any wireless network. Latencies of cellular networks
have been very high in the past; typically, about 100 ms with 3G and then
improved to 30 ms in 4G. 5G promises latencies as low as 1 ms.
3. Connection Density: Number of devices per km2 that can connect to a
cellular base station becomes important as more and more devices need
wireless connectivity. While 4G was able to connect only 100 thousand
devices per km2, 5G promises to increase that number to 1 million.
3. 5G Technologies
To meet the massive capacity and data rate increase targets, enhancements
will be made in three fundamental areas:
Increase bps/Hz or Spectral Efficiency: Develop new coding and modulation
techniques as well as new spectrum-sharing methods to squeeze more bits
out of the given spectrum. Enhancements in this sector of R&D will linearly
increase the capacity. For example, increasing bps/Hz by a factor of 2 will
directly double the capacity of a given cell.
Reduce Cell Radius or Increase Spectral Reuse: By reducing the cell size,
the same spectrum can be reused many times in a given service area. This is the
most effective method to increase capacity. Cell sizes have been consistently
reduced over the 4 generations. 5G will continue to follow this trend.
Use New Spectrum: It has been known all along over the four generations
that despite advancements in improving spectral efficient and spectral reuse,
eventually we will need new spectrum to cope with the increasing demand for
mobile traffic. 5G will be the first generation where new spectrum from the
high frequency bands, notably millimeter wave bands, will be used.
Enhancements are also made in spectrum access techniques to address the
aggressive new targets for low latency and massive connectivity. In the rest of
this chapter, we discuss some of the key new developments in 5G to address
these challenges.
166 Wireless and Mobile Networking
U1 x1(f,t)
U2 x1(f,t) x2(f,t)
X(f,t)
U3 x1(f,t) x3(f,t)
x2(f,t)
UN x1(f,t) xN-1(f,t) xN(f,t)
… x2(f,t)
5. Full-duplex Wireless
Recall that for FDD, separate frequencies have to be allocated in uplink and
downlink to achieve full-duplex communication. For a single frequency, full-
duplex has not been possible so far due to the transmitter overwhelming the
receiver causing too much interference, as illustrated in Fig. 2. Therefore, if
single frequency is to be used for both DL and UL, then it would have to be
half-duplex, like it is in TDD. In that case, when the frequency is used for DL,
there is no traffic allowed in UL, and vice versa. Clearly, half-duplex reduces
capacity and increases latency.
With advancements in DSP and processing powers, it is now contemplated
to implement self-interference cancellation to realize full-duplex over the
same frequency, so that simultaneous transmission and reception may be
possible [FDUPLEX 2011]. Figure 3 illustrates how self-interference can
be conceptually cancelled through additional signal processing and circuits
implemented within the wireless radio. Basically, an attenuated and delayed
transmit signal should be combined with the received signal to cancel the
interference within the received signal that was caused by the over-the-air
interference from the transmitting antenna. Such full-duplex communication
would double the throughput, reduce end-to-end latency, and allow transmitters
to monitor (estimate) the channel.
168 Wireless and Mobile Networking
Self-interference
Rx Processing Tx Processing
Rx Data Tx Data
Self-interference
Σ Attenuation+Delay
Rx Signal Tx Signal
Fig. 4. Antenna shapes for 4G vs. 5G (top) and 3D beamforming with massive MIMO (bottom).
with many (> 100) antenna elements. By configuring the phase and amplitude
coefficients of each elements, the base station can form many beams of
different shapes in both vertical (elevation) and horizontal (azimuth) planes.
8. New Spectrum
Finally we come to the point when we must discuss the opportunities for
new spectrum. All those spectrum efficiency and spectrum reuse factor
enhancements techniques we have discussed so far will help improving
the capacity, but eventually we will need access to new spectrum to keep
increasing the capacity.
While previous generations used frequencies in the highly congested bands 1
below 6 GHz, there are plenty of spectrum available at higher frequencies,
between 6–100 GHz, which is also referred to as high band. In this high band,
26 GHz and 28 GHz have emerged as two of the most important 5G spectrum
bands [5G mmwave] as they can be utilized with the minimal user equipment
complexity. These bands are also called millimeter wave (mmWave) bands as
their wavelengths are close to 1 mm.
Use of mmWave bands will give 5G the much-needed spectrum boost
to address the massive capacity increase targets. As the antenna size is
proportional to the wavelength, the mmWave band will facilitate building
massive MIMO base stations with hundreds of small antenna elements for
efficient beam forming. However, signals at such high frequencies need line-
of-sight for good performance, which will force 5G to exploit them for high-
data rate short-distance communications.
9. Summary
Q1. Serving multiple users over the same frequency at the same time is
facilitated by which of the following technology?
(a) NOMA
(b) Full duplex
(c) mmWave
(d) Edge Computing
(e) Massive MIMO
Q2. Which type of antennas are better suited to serve user equipment in 3D
space?
(a) Sector antenna
(b) Planar array antenna
(c) Dish antenna
(d) Dipole antenna
(e) All of these
Q3. Which of the following scenarios can benefit from NOMA?
(a) There is always one user associated with the base station
(b) When users are experiencing different channel gains
(c) When all users experience identical channels
(d) None of these
Q4. Assume that a 5G base station is located at (0,0) and serving four users
with the following locations: U1 = (0,1), U2 = (0,2), U3 = (0,3), and
U4 = (0,4). Which user will be required to do the most computations to
decode its packets if NOMA is used?
(a) U1
(b) U2
(c) U3
(d) U4
172 Wireless and Mobile Networking
References
[ALDA 2018] Mahmoud Aldababsa, Mesut Toka, Selahattin Gökçeli, Güneş Karabulut
Kurt, Oğuz Kucur. A tutorial on nonorthogonal multiple access for 5G and
beyond. Wireless Communications and Mobile Computing, vol. 2018, Article
D 9713450, 24 pp., 2018. https://doi.org/10.1155/2018/9713450.
[FDUPLEX 2011] Jain et al. (2011). Practical, real-time, full duplex wireless. ACM
Mobicom.
[5G MIMO] B. Yang, Z. Yu, J. Lan, R. Zhang, J. Zhou and W. Hong (July 2018).
Digital beamforming-based massive MIMO transceiver for 5G millimeter-wave
communications. pp. 3403–3418. In: IEEE Transactions on Microwave Theory and
Techniques, vol. 66, no. 7. doi: 10.1109/TMTT.2018.2829702.
[5G mmwave] S. Sun, T. S. Rappaport, M. Shafi, P. Tang, J. Zhang and P. J. Smith (Sept.
2018). Propagation models and performance evaluation for 5G millimeter-wave
bands. pp. 8422–8439. In: IEEE Transactions on Vehicular Technology, vol. 67, no. 9.
doi: 10.1109/TVT.2018.2848208.
[MEC 2018] N. Abbas, Y. Zhang, A. Taherkordi and T. Skeie (Feb. 2018). Mobile edge
computing: a survey. pp. 450–465. In: IEEE Internet of Things Journal, vol. 5, no. 1.
doi: 10.1109/JIOT.2017.2750180.
Part V
Internet of Things
9
Internet of Things
Internet
Internet of Things
using a QR code via WeChat, students and staff can make a laundry service
reservation, pay, and then remotely follow the laundry cycle through an app.
a central bike management platform. Using this platform, the electric bike
owners can register for a license and monitor the status of the bike in real-time
to mitigate the risks of theft, accident, and fire.
Version 5.0 can extend the range 4X (to ~ 250 m) compared to 4.0 (at ~ 50 m)
at the expense of reducing the data rates to only a few hundred kbps, which
suits IoT sensor data updates. Version 5.0 is compatible with 4.0. More details
of all of these versions will be examined in a later chapter.
simpler than existing LTE for it to be IoT-friendly. Finally, to keep the cost
low for the mobile operators, existing cellular infrastructure must be reused
for any new services as much as possible.
To address the new market of large-scale IoT connectivity, 3GPP, i.e.,
the organization responsible for standardizing cellular networking, has
recently introduced two new modes of cellular communications, namely
NB-IoT (narrowband IoT) [NBIOT] and LTE-M (M represents machines)
[LTEM]. These two modes are designed to support low data rate and low
power intermitted data transfers from a large number of devices over a wide
area of coverage using the same mobile towers and infrastructure. Due to
their low-power consumption, these technologies are also referred to as Low
Power WAN (LPWAN). The reuse of existing towers makes these services
cost-effective for the mobile operators to support a new market. As these two
services are offered by cellular network operators, they are also often referred
to as Cellular LPWAN. It should be noted that unlike Bluetooth and WiFi,
which use unlicensed spectrum, Cellular LPWAN uses licensed spectrum.
4.3.1 NB-IoT
NB-IoT is a fast-growing cellular LPWAN technology connecting a wide
range of new IoT devices, including smart parking, utilities, wearables, and
industrial solutions. Standardized by 3GPP in 2016, it is classified as a 5G
technology. It has the following characteristics—enhanced coverage, massive
connectivity (up to 50,000 per cell), low power consumption, low cost, reuse
of installed LTE base.
Although IoT devices transmit a small amount of delay insensitive data,
they can still overwhelm the cellular network with the signalling overhead
due to the sheer number of them. Thus, many features of LTE, such as real-
time handover, guaranteed bit rates, etc., which are essential for voice and
video calls, are not available for NB-IoT. A different air-interface is therefore
designed for NB-IoT. However, the existing cellular towers can still support
both NB-IoT and normal user equipment by tagging the IoT devices with a
new user equipment category as illustrated in Fig. 3.
Enhanced coverage of up to 28dB, compared to existing LTE, is
achieved by using narrow band and allowing high number of retransmissions.
NB-IoT uses the same framing and resource allocation structure of LTE, but
it allocates only a single resource block (RB), which amounts to 180 kHz. A
data frame is allowed to be retransmitted up to 128 times in the uplink. Such
a high number of retransmissions can increase latency, but that is not an issue
for NB-IoT devices.
New power classes are defined for NB-IoT devices, which allow them to
operate with significantly low transmit power, suitable for coin cell batteries.
Internet of Things 183
Smartphone
NB-IoT Device
LTE-M Device
Fig. 3. Using different air interfaces, existing cellular towers can connect both traditional user
equipment (e.g., a smartphone) as well as the new IoT devices fitted with NB-IoT and LTE-M
connectivity modules.
Finally, NB-IoT defines new sleep modes that allow an IoT device to remain
in complete sleep for an extended period of time when the base station cannot
reach them. These sleep modes further help optimize the energy consumption
and battery lifetime of NB-IoT devices.
4.3.2 LTE-M
Similar to NB-IoT, LTE-M also supports IoT devices that send small amounts
of data infrequently and need to operate with low energy. However, unlike
NB-IoT, LTE-M can support higher bandwidth, high-speed mobility, roaming
between countries and operators, and efficient firmware updates. These
services can be useful for applications, such as asset tracking where an asset
typically moves from one country to another. LTE-M also has a lower latency
than NB-IoT, which can be beneficial for connecting devices that have more
delay-sensitive communication needs, such as an alarm or a self-driving car.
Finally, LTE-M can also support voice. Clearly, LTE-M is more complex and
costly than NB-IoT but filling a different segment within the IoT market.
5. Summary
1. IoT refers to connecting things that are not computers.
2. Only a small fraction of things is connected today and yet the number
of connected IoT devices has surpassed the total number of traditional
connected devices, i.e., mobile phones, laptops, data center computers,
etc. The scale of IoT makes it the next big Internet evolution.
3. Advancements in sensor technology and low-cost computing platforms
have worked as a catalyst for the IoT movement today.
4. There exist many different connectivity options for IoT. While early IoT
deployments relied on the classical wireless networking, e.g., Bleutooth,
WiFi, and cellular, specialized versions of these technologies are
being created to better serve the IoT needs. Even new IoT networking
technologies, e.g., LoRaWAN and Sigfox, have been designed and
deployed from scratch.
Q10. Which of the following does not contribute toward low energy objective
of LB-IoT?
(a) Narrow bandwidth
(b) Deep sleep modes
(c) New power class with lower transmit power
(d) New air interface
References
[BT5] Bluetooth 5.0. https://www.bluetooth.com/bluetooth-resources/bluetooth-5-go-
faster-go-further/ (accessed 25 October 2021).
[China-NBIOT] NB-IoT Commercialization Case Study, How China Mobile, China
Telecom and China Unicom Enable Million More IoT Devices. https://www.gsma.
com/iot/wp-content/uploads/2019/08/201902_GSMA_NB-IoT_Commercialisation_
CaseStudy.pdf [accessed 25 October 2021].
[CanadaBay] City of Canada Bay Bins Get Smart (10 October 2019). https://www.
canadabay.nsw.gov.au/news/city-canada-bay-bins-get-smart [accessed 25 October
2021].
[LORA] LoRA Alliance. https://lora-alliance.org/.
[LTEM] R. Ratasuk, N. Mangalvedhe and A. Ghosh (2015). Overview of LTE
enhancements for cellular IoT. 2015 IEEE 26th Annual International Symposium on
Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 2293–2297. doi:
10.1109/PIMRC.2015.7343680.
[NBIOT] Y. D. Beyene et al. (June 2017). NB-IoT technology overview and experience
from Cloud-RAN implementation. pp. 26–32. In: IEEE Wireless Communications,
vol. 24, no. 3. doi: 10.1109/MWC.2017.1600418.
[SIGFOX] https://www.sigfox.com/en.
10
Bluetooth
Bluetooth is the oldest and the most pervasive technology to connect a wide
range of devices and ‘things’ around us. Since its inauguration decades ago, it
has gone through several upgrades and is continuing to play a dominant role
in providing short-range connectivity for smart objects. In this chapter, we
cover its history, markets, and applications, followed by the core technologies
behind the three generations of Bluetooth.
1. Bluetooth History
The history of Bluetooth started with Ericsson’s Bluetooth Project in 1994 for
radio communication between cell phones over short distances [NIST-BT].
It was named after Danish king, Herald ‘Blatand’ Gormsson (AD 940–981).
He was fondly called Blatand, which is ‘blue tooth’ in Danish, because of his
dead tooth that looked blue [BT-SIG-ORG].
Intel, IBM, Nokia, Toshiba, and Ericsson formed Bluetooth SIG in May
1998 [NIST-BT, WIKI-BT]. Soon after, Version 1.0A of the specification
came out in late 1999. IEEE 802.15.1, which was approved in early 2002 and
was based on Bluetooth [NIST-BT]. However, all later versions of Bluetooth
were handled by Bluetooth SIG directly.
The key features of the original Bluetooth were low power, low cost, and
small form factor. Bluetooth now comes built-in with many systems on chip
and microcomputer boards, such as Intel Curie, Raspberry Pi, Arduino, and
so on.
802.11 Wi-Fi
Fig. 1. Networking technologies with different communication range; 10 m or less technologies are
at the bottom.
within the vicinity of the person. In the IoT era, with the growing dependence
on machine-to-machine communications, the name ‘personal’ may not be very
relevant for all scenarios, but the main criteria of 10 m coverage will remain.
Within WPAN, we have several competing solutions, such as Bluetooth,
Zigbee, and Body Area Networks (BANs). In this chapter, we will focus on
Bluetooth.
All WPAN protocols follow a set of basic design principles:
Battery Powered: The devices run on coin cell batteries with a couple of
hundred mAh capacity, which has to last for a few years. Maximizing the
battery life therefore is one of the major challenges.
Dynamic Topologies: Because the devices have to conserve energy, they
usually turn on for a short duration and then go back to sleep. For example,
a temperature monitor may wake up every 10 seconds and connect with the
WiFi AP to send the temperature reading and then it goes back to sleep again.
Therefore, connections are very short.
No Infrastructure: They do not depend on any access point or base station.
Avoid Interference: These devices share the same ISM bands, such as
2.4 GHz, with the high-power LAN devices, such as WiFi. How to avoid
interference with such high-power communications in the same area therefore
is a major issue to tackle.
Simple and Extreme Interoperability: As there are billions of devices, we
have more variety than LAN or MAN. The interoperability challenge therefore
is more severe than LAN or MAN.
Bluetooth 189
3. Bluetooth Market
According to a recent report from Bluetooth SIG [BT-SIG], 48 billion devices
will be connected to the Internet by 2021, of those 30% are forecasted to
include Bluetooth technology. This includes a wide range of market segments
including cars, wearables, factory instruments, and smart home products. The
forecast further shows that Bluetooth shipments are expected to grow at a rate
of 8% CAGR, from 2019 to 2024.
4. Bluetooth Versions
Since the first release of Bluetooth 1.1 endorsed by the IEEE in 2002,
there have been many updates over the years. The current version is 5.3.
Table 1 provides a chronological list of Bluetooth versions and their
capabilities [NIST-BT, BT-SIG]. Bluetooth versions prior to 4.0 are often
referred to as Bluetooth Classic. Bluetooth 4.0 is also known as Bluetooth
Smart and Bluetooth Low Energy (BLE).
5. Bluetooth Classic
We will start with Bluetooth 1.1 to understand the basic details of Bluetooth.
Bluetooth device can become a master. Basically, the device that initiates the
communication becomes the master and the devices that respond to the initial
call become the slaves. For example, when a computer is turned on, it may
advertise a message looking for a Bluetooth keyboard. If a nearby keyboard
responds and subsequently pairs with the computer, then the keyboard becomes
a slave. Slaves can only transmit when requested by the master. Active slaves
are polled by the master for transmissions. Slaves can only transmit/receive
to/from the master, i.e., slaves cannot talk to another slave in the piconet.
There can be up to seven active slaves per piconet at a time.
Beyond the active slaves within a piconet, Bluetooth allocates an 8-bit
parked address to any device wishing to join the piconet at some time in the
future. This allows up to 255 parked slaves per piconet that sleep most of the
time but may join the piconet from time to time. All parked stations are then
uniquely identifying, and they are usually referred to using some mnemonic
identifiers for human use. Any parked stations can join the piconet in 2 ms
and become active at any time. For other stations which are not parked yet,
it usually takes much longer than 2 ms to join. Figure 2 shows examples of
Bluetooth piconets with both active and parked slaves.
For more densely deployed IoT scenarios, Bluetooth can use a more
complex network topology, called scatternet, to allow a device to participate
in multiple piconets, as shown in Fig. 3. However, for a device to participate
in multiple piconets, it has to timeshare and must synchronize to the master of
the current piconet, i.e., it can be active in only one piconet and in park mode
in the other.
Master
Active Slave
Parked Slave
Master
Active Slave
Parked Slave
Note that there is no routing protocol defined, so nodes can only talk to
other nodes which are directly within the Bluetooth communication range of
about 10 m.
the BR. The EDR also uses 1 µs symbols, but it supports more advanced
modulations, namely µ/4-DQPSK with 2 bits/symbol and 8DPSK with 3 bits/
symbol. Thus, under EDR, Bluetooth classic can deliver 2 Mbps and 3 Mbps
data rates using µ/4-DQPSK and 8DPSK, respectively.
BT 1
Frequency
BT 2
Time
Fig. 5. Two close by Bluetooth piconets sharing the same frequencies without interference by hopping
between channels; in this ideal hopping scenario, the same channel is never selected by both piconets.
Bluetooth 193
5 slots, masters can only use the even numbered slots and the slaves, the odd
numbered slots. Frequencies switch only at the start of the slot that starts after
a packet transmission is completed, which may not align with slot boundaries.
Finally, the packet lengths between the master and the slaves may not have
to be symmetrical. For example, it is perfectly okay for a master to use a
short 1-slot packet, while a slave transmits a 3-slot packet. Figure 6 shows
such symmetric vs. asymmetric packet lengths. Figure 7 illustrates that the
minimum and maximum frequency hopping rates in Bluetooth are 320 Hz (all
packets are 5-slot) and 1600 Hz (all packets are 1-slot).
Example 1
Consider a Bluetooth link where the master always transmits 3-slot packets.
The transmission from the master is always followed up by a single-slot
transmission from a slave. Assuming 625 μs slots, what is the effective
frequency hopping rate (# of hopping per second)?
Solution
Given that the frequency hopping cannot occur in the middle of a packet
transmission, we only have 2 hops per 4 slots, or 1 hop per 2 slots.
The effective hopping rate = 1/(2×625×10–6) = 800 hops/s = 800 Hz
0 1 2 3 4 5
M=master, S = slave
Fig. 6. Frequency hopping for symmetric vs. asymmetric packet lengths.
194 Wireless and Mobile Networking
Fig. 7. Dependency of hopping rate on the packet length. The maximum and minimum hopping rates
are 1600 Hz and 320 Hz, respectively [BT-RS].
Bluetooth is very popular for listening to music as well as for voice calls
with earphones. Such traffic is synchronous, generating packets at fixed
intervals, where the interval depends on the audio codecs. To support such
synchronous traffic, Bluetooth reserves slots ahead of time. For asynchronous
traffic, the master simply polls each active station. Note that there is no
contention avoidance mechanism; all traffic is controlled by the master. If
there are contentions, packets get lost, which are eventually retransmitted by
the higher layer.
GFSK DPSK
Payload
Access Code Header Sync EDR Payload Body Trailer
Guard Header
(72 bits) (54 bits) (30 bits) (8168 bits) (6 bits)
(16 bits)
to DPSK (DQPSK for 2 Mbps and 8DPSK for 3 Mbps) after a guard interval
lasting between 4.75 μs to 5.25 μs. EDR payload can accommodate more data
than BR, but still fits within the maximum 5-slot due to higher data rates.
Example 2
How many slots are needed to transmit a Bluetooth Basic Rate packet if the
payload is (a) 400 bits, (b) 512 bits, and (c) 2400 bits; assume that the non-
payload portions do not change.
Solution
Bluetooth transmissions are 1, 3, or 5 slots (2, 4, 6, etc. not allowed)
Non-payload bits (max) = 54+72 = 126 bits
Each slot can carry 625 bits at most
(a) 400b payload results in 400+126 = 526b packet, which requires 1 slot
(b) 512b payload results in 512+126 = 638b packet for which 2 slots would be
sufficient, but will have to be padded for a 3-slot transmission because 2-slot
packets are not allowed
(c) 2400b payload results in 2400+126 = 2526b packet which fits in 5 slots
Each Bluetooth device has a unique 48-bit MAC address included in the
access code field of the packet header. As shown in Fig. 10, the most significant
24 bits represent the OUI (Organization Unique Identifier) or the Vendor ID.
Typically, the vendors convert each 4b into a decimal number and show the
MAC address as a string of 12 decimal digits. For example, Fig. 11 shows
the label of a Bluetooth chip from Roving Networks with a MAC address of
000666422152 where 000666 would uniquely identify Roving Networks. Here,
the decimal digits for the most significant bits are written from the left. While
the main purpose of Bluetooth MAC address is identification and authentication,
196 Wireless and Mobile Networking
specific parts of it are also used to seed the frequency hopping pseudorandom
generator for synchronizing the master and slave clocks as well as to pair the
devices at the beginning, which we shall examine shortly.
with 27 clock bits to define the pattern, Bluetooth pseudorandom pattern would
repeat itself after 227 hops, which would take at least 23.3 hours to repeat at
the maximum hopping rate of 1600 Hz. In practice, the Bluetooth connections
last much shorter than 23 hours, hence the pseudorandom sequence is not at
the risk of being repeated.
a channel is good or bad. Then, the hopping is constrained only within the
good channels, as illustrated in Fig. 15. The standard specifies that a minimum
of 20 channels are needed for hopping, i.e., a maximum of 59 channels can
be marked as bad.
Because the interference can be dynamic, the set of good channels
is likely to vary over time. Thus, the master maintains a channel map that
marks good and bad channels and sends the map to the slave periodically.
Fig. 15. AFH Illustration: hopping only between good channels [BT-RS].
Fig. 16. AFH Illustration [BT-RS]: Bluetooth avoids hopping into channels interfered by 2.4 GHz
WiFi operating over WiFi channel 6.
Figure 16 illustrates AFH when a WiFi 2.4 GHz access point is operating over
WiFi channel 6 nearby. Here the AFH successfully avoids hopping into any
of the 25–45 Bluetooth channels which are marked as bad channels by the
vendor’s channel marker algorithm at that time.
Standby
Disconnected
Transmit Connected
Active
Standby is the initial state when the station is disconnected but may try
to connect later. There are two types of inquiry that can be used when trying
to connect. The first one is called Inquiry state and the other is called Paging.
In the Inquiry state, master broadcasts an inquiry packet. Slaves scan for
inquiries and respond with their address and clock after a random delay to
avoid collision among many potential slaves responding at the same time.
Master computes the clock offset for this slave.
Master in Page state invites a slave to join the piconet. Slave enters page
response state and sends page response to master, including its device access
code if it detects the page message. Master informs slave about its clock and
address so that the slave can participate in piconet. Slave computes the clock
offset.
After the page state, it transitions to the Connected state where a short
3-bit logical address (member address within control header field) is assigned
for the slave. After the address assignment, the devices move to the Transmit
state where they can transmit and receive a packet.
Connection
Established
etc. Node can do something else though, such as scan, page or inquire. The
station holds the 3-bit address as an active node of the piconet.
Sniff: It is a low-power mode to conserve energy. Slave does not continue
with synchronous or asynchronous traffic but listens periodically after fixed
sniff intervals. It keeps the 3-bit address.
Park: This is a very low-power mode. Slave gives up its 3-bit active member
address and gets an 8-bit parked member address instead. It wakes up
periodically and listens to the beacons broadcast by the master.
Fig. 20. PHY coding in Bluetooth. Gaussian Frequency Shift Keying is different than Frequency
Shift Keying.
Bluetooth 203
and reassembly. It also controls peak bandwidth, latency, and delay variation
for different applications supporting quality of service for Bluetooth. Host
Controller Interface is basically a hardware adaptation layer that enables the
same software to run on different microchips.
When Bluetooth was designed, serial ports were major interfaces for
many computers. Therefore, most chip manufacturers supported a serial
interface to program their chips. RFCOMM layer presents a virtual wireless
serial port capability for Bluetooth, so that it can be connected to another
RFCOMM. Thus, two Bluetooth devices could in practice establish a serial
port connection between them over the air. In the modern age, serial ports are
hardly used but can be utilized if necessary.
Every Bluetooth device provides a service. A Bluetooth mouse provides a
mouse service; a Bluetooth keyboard provides a keyboard service; a Bluetooth
speaker provides a speaker service and so on. Service Discovery Protocol
(SDP) provides a standard way for devices to find such available services and
their parameters so that they can automatically connect to each other when
turned on without human intervention.
Bluetooth can also be used to transmit standard IP data. The Bluetooth
Network Encapsulation Protocol (BNEP) is used to encapsulate Ethernet/IP
packets so that they can be transmitted over Bluetooth.
Bluetooth also supports telephone. All modern cars are equipped with
Bluetooth telephone control, thus we can make or receive calls from our
smartphone using buttons on the steering wheel. Telephony has audio as
well as control signals. The telephony control is supported by the Telephony
Control Specification (TCS) protocol. TCS support call control, including
group management (multiple extensions, call forwarding, and group calls).
Finally, we come to the application profiles. In Bluetooth, each application
has a strict set of actions that it is allowed to do. For example, all actions
of a headset application are defined in headset profile (HSP). Such strict
application profiling is the key to Bluetooth’s success in global and pervasive
interoperability. Today we can buy a Bluetooth headset from any airport in the
world and it works just fine with any mobile device from any manufacturer in
any part of the world. Similarly, we have human interface device (HID) profile
to wirelessly connect a range of user input devices, such as mice, keyboards,
joysticks, and even game controllers, such as Wii PS3 controllers. Figure 21
illustrates how HID profile is used within the Bluetooth protocol stack for
connecting a wireless keyboard to the computer.
As Bluetooth became popular, the number of profiles it had to support
grew dramatically over the last few years. Table 2 inspects some of the typical
Bluetooth profiles used in many products and services. With IoT, this list is
expected to grow rapidly in the coming years to support communication with
many different objects. For example, if we wish to connect a coffee mug to the
204 Wireless and Mobile Networking
Fig. 21. Connecting a wireless keyboard with HID Bluetooth profile [BT-SF].
Internet to detect object interactions for smart home residents of the future,
then a coffee mug profile has to be defined.
Time
CI
Data Transfer
Example 3
Assuming that two BLE devices negotiate a hop increment of 10 at the
connection setup to generate the hopping frequencies during data transfers
using Algorithm #1, what would be the BLE frequency selected after the fifth
hop if Channel 0 was selected for the initial event?
Solution
Initial channel: 0
Channel after the first hop: (0+10) mod 37 = 10
Channel after the second hop: (10+10) mod 37 = 20
Channel after the third hop: (20+10) mod 37 = 30
Channel after the fourth hop: (30+10) mod 37 = 3
Channel after the fifth hop: (3+10) mod 37 = 13
Apps
Host
Controller
(GATT Server)
Temp Sensor
Temp = 22.25⚬
Upload Temp to Cloud
Convert to ESS format
(e.g., 22.25⚬ to 2225) ESS to STD format
7. Bluetooth 5
BLE (Bluetooth 4) was a major advancement compared to BT Classic in terms
of reducing energy consumption and extending battery life. BLE, however,
could not support high data rate applications, such as audio and file transfer
(e.g., quick firmware updates), and the range was still limited for some new IoT
applications. Bluetooth 5 extends BLE to realize a faster (2x) and longer range
(4x) without compromising the battery life. Advertising and frequency hopping
are also improved. Bluetooth 5 is seen as a significant new milestone in the
evolution of Bluetooth, which is expected to support many new IoT markets at
home and industrial automation, health and fitness tracking and so on.
BLE. The PHY that provides 2x data rate increase is called 2M and the PHY
providing extended range is known as Coded.
PHY 2M: The symbol duration is reduced to 55ns, which is half of BLE. This
yields 2 million symbols per second, which can support 2 Mbps with binary
modulation. It uses the same GFSK modulation, but with higher frequency
deviation to combat inter-symbol interference arising from shorter symbols.
Specifically, it has frequency deviation of 370 kHz (c.f. 180 kHz in BLE 4)
from the central frequency to denote ‘1’ or ‘0’ in FSK.
PHY Coded: It uses one million symbols per sec, the same as in BLE 4.
However, to increase the range, data is coded with FEC. Two coding rates are
used. The ½ rate cuts the data rate by half to 500 Kbps but provides 2x range
increase against BLE 4. The rate ¼ supports only 250 Kbps, but achieves 4x
range increase. Note that BLE 4 and BT Classic do not employ any FEC, i.e.,
they are not coded.
Advertising Channels
(carry header)
Data Channel
Advertising Channels
(carry header)
8. Bluetooth 5.3
In 2021, the following new features were added to Bluetooth [BT-SIG]
to further improve latency, battery life, security, and protection against
interference.
Fast Adjustment of Duty Cycling: As we have studied earlier in this chapter,
Bluetooth version 4.0 introduced a parameter, called Connection Interval (CI)
to duty cycle the device for improved battery life. Given the inherent trade-
off between low duty cycling (good battery life) and high throughput (lower
latency), version 4.0 allowed the CI parameter to be selected from 7.5 ms to
4s to address the needs of different applications. However, the CI value could
only be negotiated during connection set up, which made it difficult to switch
between different duty cycling modes quickly.
In many applications, the devices need to change duty cycling rates to
optimize the trade-off between battery life and latency or response time; for
214 Wireless and Mobile Networking
example, an environment monitor may start with a very low duty cycling rate
to conserve battery, but when an event of interest is detected, it would like to
switch to a high duty cycling rate to transfer the event-related data at a faster
rate to the server for immediate analysis of the event. Bluetooth 5.3 has added
a parameter that now enables a device to change the CI value as a multiple
of some base values within the connection. This allows devices to rapidly
change duty cycling for better battery life as well as latency.
Peripheral Input to Adaptive Frequency Hopping: Before Bluetooth 5.3,
only the central (master) device could decide the eligible list of frequencies
(channel map) for adaptive hopping, based on its own experience of
interference. However, with longer ranges allowed by version 5.0, the
peripheral devices (slaves) may experience different interferences than the
central device depending on the locations and environments. To achieve
improved protection against all interferences affecting the communication
between the master and the slave, Bluetooth 5.3 includes protocol enhancement
for the master to consult with the slave for deciding the final channel map to
be used in frequency hopping.
Encryption Key Size Control Enhancement: With home and commercial
building automation, Bluetooth is being used by a central controller to
communicate with many peripheral devices, such as door-locks, privacy
curtains, lights, and so on. As peripherals have better knowledge about the
security needs of the application, it is desirable for these devices to efficiently
negotiate with the central controller about the size of the encryption keys.
The new enhancement in version 5.3 allows a peripheral to convey minimum
key lengths to the central controller. While this enhancement sounds trivial,
it is designed to increase the competitiveness of Bluetooth in the competing
market for automation.
More Meta Information for Periodic Advertising: Periodic advertising is
one of the key applications of Bluetooth, where sensors and things fitted with a
Bluetooth chip periodically broadcast their sensing data, such as temperature,
pressure, etc., which are received and processed by nearby Bluetooth hosts
to infer actionable information. In many cases, such periodic advertisements
contain the same data (if there is no change in the status of the thing or
environment from the last broadcast), which creates unnecessary processing
load on the host. To address this situation, Bluetooth 5.3 adds a separate field
in the advertising packet header to contain more meta information about the
content of the advertising packet. Specifically, this header can be used by
the thing or sensor to indicate whether the packet content is the same as the
previous one. Thus, the host can stop processing the rest of the packet as soon
as the header says that it is a repeat information.
Bluetooth 215
9. Summary
1. Bluetooth Classic uses frequency hopping over 79 1-MHz channels with
1, 3, and 5-slot packets.
2. Bluetooth 4 is designed for short broadcasts by sensors. 40 2-MHz
channels are used with three channels reserved for advertising and 37
used for data transfers.
3. BT Classic uses flat application profiles to support different types of
communication services, which require different application profiles to
be defined for different types of sensing and communications.
4. BLE has a hierarchical service structure to group many sensing
measurements into a given service type, which scales for large variety of
devices and services expected in the IoT era.
5. Bluetooth 5 extends BLE to support higher data rate and longer-range. It
also has an improved advertising structure that allows advertisement of
more comprehensive information and contents.
6. Bluetooth 5.3 was released in 2021 to further improve latency, battery
life, security, and protection against interference.
Q1. Protocol A has four times the data rate of Protocol B but consumes three
times as much power. Which protocol has less energy consumption per
MB (megabyte)?
(a) Protocol A
(b) Protocol B
(c) Both protocols have the same energy consumption
Q2. If 2-slot packets were allowed in Bluetooth, we could not guarantee
(a) that the master starts in even numbered slots only
(b) that the slave starts in even numbered slots only
(c) interference-free communication
(d) error-free communication
Q3. In Bluetooth, only masters are allowed to transmit 5-slot packets.
(a) True
(b) False
Q4. In Bluetooth, the 3b member address is used to identify the
(a) Parked devices
(b) Active devices
(c) Both active and parked devices
(d) Piconet
(e) Scatternet
216 Wireless and Mobile Networking
References
[BT-SIG-ORG] ‘Origin of the Bluetooth name’, Bluetooth Special Interest Group, https://
www.bluetooth.com/about-us/bluetooth-origin/ [accessed 26 October 2021].
[BT-SIG] Bluetooth Special Interest Group. https://www.bluetooth.com/.
[BT-NI] Introduction to Bluetooth Device Testing: From Theory to Transmitter and
Receiver Measurements. National Instruments. https://download.ni.com/evaluation/
rf/intro_to_bluetooth_test.pdf [accessed 26 October 2021].
[BT-RS] Bluetooth Adaptive Frequency Hopping on an R&S CMW Application
Note. Rohde Schwarz. https://scdn.rohde-schwarz.com/ur/pws/dl_downloads/
dl_application/application_notes/1c108/1C108_0e_Bluetooth_BR_EDR_AFH.pdf
[accessed 26 October 2021].
[BT-SF] Bluetooth HID Profile user Manual. Sparkfun. https://cdn.sparkfun.com/
datasheets/Wireless/Bluetooth/RN-HID-User-Guide-v1.0r.pdf [accessed 26 October
2021].
[NIST-BT] (August 2012). Security of Bluetooth Systems and Devices. NIST. https://csrc.
nist.gov/csrc/media/publications/shared/documents/itl-bulletin/itlbul2012-08.pdf
[accessed 26 October 2021].
[PRAVIN2001] P. Bhagwat (May-June 2001). Bluetooth: Technology for short-
range wireless apps. pp. 96–103. In: IEEE Internet Computing, vol. 5, no. 3. doi:
10.1109/4236.935183.
[WIKI-BT] Bluetooth Special Interest Group, Wikipedia. https://en.wikipedia.org/wiki/
Bluetooth_Special_Interest_Group [accessed 26 October 2021].
11
LoRa and LoRaWAN
1. LoRa
LoRa is a proprietary and patented PHY technology originally developed by
a small company, called Cycleo in France [SEMTECH-BLOG]. Later it was
acquired by Semtech Corporation, which formed the LoRa Alliance [LORA-
ALLIANCE]. Now LoRa Alliance has 500+ members. The first version, LoRa,
was released to public in July 2015. Since then, it enjoyed rapid adoption with
many different types of products selling fast. For long-range IoT, this is at
the moment the major choice in the market currently implemented in over
100 million devices.
The main advantage of LoRa is the support for extremely long-range
connectivity. It supports communications up to 5 kms in urban areas depending
on how deep within indoor the sensors are located, and up to 15 kms or more
in rural areas with line of sight [LORA-SEMTECH]. Such long distances
LoRa and LoRaWAN 219
are supported with extremely low power and low cost. These advantages are
gained by trading off the data rate. LoRa supports very low rates on the order
of only a few kbps. However, these rates are sufficient for the targeted IoT
applications which only need to upload a small message once in a while.
2. LoRa Frequencies
Like 802.11ah, LoRa also uses sub-GHz ISM license-exempt bands to reach
long distances at low power. Different regions have different restrictions
on the use of LoRa frequencies. The following bands are specified in LoRa
developers’ guide from SEMTECH [LORA-SEMTECH]:
• 915 MHz in US. Power limit. No duty cycle limit.
• 868/433 MHz in Europe. 1% and 10% duty cycle limit
• 430 MHz in Asia
Note that there is a power limit in the US, but no duty cycle. It means
devices can be awake all the time and transmit as often as they like. However,
in Europe, devices have to implement 10% duty cycle, which means they can
be up only 10% of the time on an average. Limiting the duty cycle enables more
devices to be connected to the LoRa network with minimum infrastructure at
the expense of slightly higher latency.
LoRa uses channels with significantly smaller bandwidths compared to
Bluetooth, WiFi, or cellular networks. Specifically, LoRa channels are either
125 kHz or 500 kHz wide [LORA-SEMTECH]. For example, in the US,
125 kHz channels can be used only for the uplink (end device to gateway),
whereas 500 kHz can be used for both uplink and downlink.
Power
Amplitude
Noise
Received
Signal
Frequency
Symbol Duration
Channel
Bandwidth
Fig. 1. Frequency domain representation of a linearly increasing chirp symbol. The power is spread
over the entire channel bandwidth and the received signal power is below the noise floor.
Frequency Frequency
fmax fmax
Up-chirp Bandwidth
Bandwidth
Down-chirp
fmin fmin
Sweep Duration Time Sweep Duration Time
Fig. 2. Up-chirps and down-chirps.
these up-chirps and down-chirps are shown as straight lines with positive and
negative slopes, respectively (see Fig. 2).
As we can see in Fig. 2, the chirps sweep the entire bandwidth, from
the minimum frequency to the maximum frequency, within a specified chirp
sweep duration. The sweeping speed, k, is thus obtained as:
B
k= Hz / sec (1)
Ts
where B is the bandwidth in Hz and TS is the chirp sweeping duration in
second.
So, how does LoRa encode information with chirps? Clearly, these chirps
need to be modulated in some ways to convey data. In LoRa, data bits are
encoded with either up-chirps or down-chirps, depending on the direction of
communication, i.e., uplink vs. downlink. Each chirp represents one symbol,
which means that the symbol duration is equivalent to the chirp duration, TS.
LoRa shifts the starting frequency of the chirp to produce different
symbol patterns [LORA-SYMBOL]. The amount of frequency shift is then
used to code the symbol, which represents the data bits carried by that symbol.
Figure 3 illustrates an example of 4-ary modulation that uses four possible
frequency shifts, including zero shift, to create four different symbol patterns.
LoRa and LoRaWAN 221
00 01 10 11
fmax
fmin
TS
(a) Upchirps
00 01 10 11
fmax
fmin
TS
(b) Downchirps
Fig. 3. LoRa symbol patterns for 4-ary modulation.
Note that for the non-zero shifts, the chirp is ‘broken’ into two pieces because it
reaches the maximum (for up-chirp) or minimum (for down-chirp) frequency
sooner than the symbol duration. The second piece of the chirp then starts
from the minimum (for up-chirp) or maximum (for down-chirp) frequency
and continues the frequency sweep until the end of the symbol duration.
Example 1
A LoRa transmitter configured with SF = 8 can send how many bits per
symbol?
Solution
8 bits. SF = 8 means there are 28 different symbol patterns, thus each symbol
can be coded with an 8-bit pattern.
902.125
MHz
11
10 SF=2
B
4-ary modulation
01
902 00
MHz 2SF/B = 32µs
902.125
MHz 111
110
101 SF=3
100
B
8-ary modulation
011
010
902 001
000
MHz
2SF/B = 64µs
Example 2
How long a LoRa transmitter configured with SF = 10 would take to transmit
one symbol over a 125 kHz channel?
Solution
Ts = 2SF/B = 210/125 ms = 8.192 ms
symbol rate, and the coding rate (CR) that reflects the forward error correction
(FEC) overhead:
Data rate
= bits per symbol × symbol rate × coding rate
B (2)
= SF × × CR bps.
2 SF
where B is in Hz and CR is the FEC ratio between actual data bits and the
total encoded bits. In LoRa, CR can technically take values from 4/5, 4/6, 4/7,
and 4/8, although the default value of 4/5 is often used. As can be seen from
Eq. (2), data rate would be reduced nearly exponentially by increasing the SF.
Thus, SF is the main control knob used by LoRa to trade-off between data rate
and range. A total of six spreading factors, SF = 7 to SF = 12, are supported
by LoRa [LORA-SEMTECH].
Example 3
A LoRa sensor is allocated a 125 kHz uplink channel. What would be its
effective data rate if it is forced to use a spreading factor of 10 and 50%
redundancy for forward error correction?
Solution
SF = 10; 2SF = 1024; CR = 0.5
Symbol rate = B/2SF sym/s = 125,000/1024 sym/s
Effective data rate = 10 × 125000/1024 × 0.5 = ~ 610 bps
Application
Class A (basic)
MAC (LoRaWAN) Class B (beacon)
868/433 (EU) Class C (continuous)
915 (US) PHY (LoRa)
430 (AS)
Fig. 5. LoRa network protocol stack.
Join Server
The gateways are like the base stations in cellular networks. Many
gateways are controlled by a central network server. However, unlike cellular
networks, LoRa end devices do not associate with a single gateway; instead,
all gateways within range receive and process the messages transmitted by
all the end devices. The gateways work only at the PHY layer. They only
check data integrity if CRC is present. The message is dropped, if CRC is
incorrect. They pass the LoRa message to the network server only if the
CRC is correct along with some metadata, such as received signal strength
(RSSI) and timestamp. The network server actually runs the MAC and makes
all networking decisions. It assigns each device a frequency, spreading
code, eliminates duplicate receptions, and schedules acknowledgements. If
requested by the end device, the network server also implements the adaptive
data rate (ADR) for that device by dynamically controlling its transmitters’
parameters, such as its SF, bandwidth, and transmit power.
LoRa supports scalable and flexible deployment of networks by
provisioning for cost-optimized gateways. For small networks, very simple
gateways made from Raspberry Pi can be used with a limited number of
channels. For carrier-grade networks run by city municipalities, more heavy-
duty gateways with a large number of channels (up to 64 channels in the US)
can be used to deploy on the rooftop of high-rise buildings, cellular towers, etc.
LoRa and LoRaWAN 225
Payload CRC
CR
Length Present
Class A: These are the lowest power and lowest traffic LoRa devices which
mostly sleep and wake up once in a while to transmit data if a monitoring event
is detected. For each uplink (end device to gateway) transmission, the device
will be allowed to receive up to two short downlink (gateway to end device)
transmissions. One may be for ACK, but another can be used for the other
kind of information, such as an actuation signal triggered by the application
based on the uplink information. Examples of these devices include various
environmental sensors and monitors with limited actuation capabilities.
The device cannot receive anything else until it transmits again. When
it does, again it gets two credits for downlink communication. This cycle
repeats. Class A devices are very simple and they use Pure Aloha for channel
access, which is basically contention-based. Pure Aloha performs well under
light traffic, but struggles under heavy load. Its performance under sustained
heavy load approaches 1/2e or approximately 18.4%.
Class B: This is basically Class A plus extra receive window at scheduled
time following the periodic beacons from Gateway, i.e., the beacon contains
reserved slots for the stations. This class is for stations which need to receive
more frequent traffic from the network or server. All gateways transmit beacons
every 2n seconds (n = 0…7) to provide plenty of opportunity for the network
to synchronize with Class B end devices. All gateways are synchronized using
GPS, so that they all can align to the exact beacon timing.
Class C: These are the most powerful stations typically connected to
mains power and almost always awake. They can receive anytime, unless
transmitting. As such, the server enjoys the lowest latency in reaching a
Class C device compared to the other classes. Class C devices include things,
such as streetlights, electrical meters, etc., which can be constantly monitored
and controlled by a server. Figure 8 illustrates and compares the operations of
the three classes.
Beacon Beacon
Interval Interval
Tx Rx Tx Rx Tx Class C
6. Summary
The main aspects of LoRa can be summarized as follows:
1. LoRa is designed to work with narrow bandwidth channels, long symbols,
and low data rates; data rate is sacrificed for longer range.
2. LoRa modulation is a variation of chirp spread spectrum where the
modulation order as well as the frequency sweeping speed of the chirp is
modulated by an integer variable, called spreading factor (SF).
3. For a given bandwidth B Hz and spreading factor SF, modulation order
= 2SF and symbol duration = 2SF/B sec. As a result, contrary to typical
wireless communications, increasing the modulation order actually
decreases the data rate in LoRa.
4. For a given bandwidth, the larger the SF, the longer the symbol duration
and longer the range at the expense of reduced data rates.
5. Orthogonality of the SF enables transmission of multiple LoRa chirps at
the same frequency channel and at the same time slot.
6. There are six valid SF values in LoRa: 7 to 12.
7. LoRa data contains either all up-chirps or all down-chirps, depending
on the direction of communication (uplink vs. downlink); up-chirps and
down-chirps are never mixed within the same LoRa packet except for the
preamble field.
8. LoRa end devices broadcast to all gateways within a range. The gateway
with the best connectivity replies back.
9. LoRa gateways are only PHY-layer devices; all MAC processing is done
at the network server.
10. LoRa supports three classes of devices. Class A devices can sleep most
of the time to conserve energy but allow most restricted access from the
network. Class B devices can be accessed more frequently by the network
at the expense of higher energy consumption. Class C devices are usually
powered by the mains; they never sleep and hence can be reached by the
network at any time without delay.
228 Wireless and Mobile Networking
References
[HAX2017] J. Haxhibeqiri, A. Karaagac, F. Van den Abeele, W. Joseph, I. Moerman and J.
Hoebeke (2017). LoRa indoor coverage and performance in an industrial environment:
Case study. 2017 22nd IEEE International Conference on Emerging Technologies and
Factory Automation (ETFA), pp. 1–8. doi: 10.1109/ETFA.2017.8247601.
[LORA-ALLIANCE] https://lora-alliance.org/.
[LORA-SEMTECH] (December 2019). LoRa and LoRaWAN: A Technical Overview.
Semtech Corporation. https://lora-developers.semtech.com/documentation/tech-
papers-and-guides/lora-and-lorawan/ [accessed 26 October 2021].
230 Wireless and Mobile Networking
1. What is AI?
AI is a computation paradigm for machines to learn and make decisions like
humans. AI is a broad umbrella that covers many techniques, such as knowledge
acquisition, knowledge representation, expert systems, evolutionary
algorithms, and machine learning (ML). ML empowers a machine or process
to automatically learn useful information from the observed events or data and
make decisions without being explicitly programmed. Deep learning (DL) is
a special branch of ML that tries to mimic the way the complex network of
neurons works inside the human brain.
y (label)
Fig. 1. Training of supervised machine learning.
predict the label accurately and gets ready to be deployed in the real field for
decision making on unlabelled input. The training and testing processes of ML
are illustrated in Fig. 1. Supervised learning is typically used for applications
where historical data can predict the likely future events; for example, trained
on sufficient historical data, ML can predict whether a home loan customer
is likely to default. Typical supervised ML algorithms include Support Vector
Machine (SVM), k-Nearest Neighbour (k-NN), Random Forest, Neural
Network and so on.
Unsupervised ML refers to learning based on unlabelled data. Here
the goal of learning is to identify some structure in the data; for example,
unsupervised ML can separate all customers into some distinct groups, which
can be treated for some targeted campaigns.
ML can also work for some applications when there is no historical data,
but a machine or process must learn the right policy or decision from trials
and errors. This can be very useful for robots trying to learn walking, for
example. This type of learning is called reinforcement learning, which has
three primary components: (1) the agent that tries to learn the best policy,
(2) the environment with which the agent interacts, and (3) the actions that
the agent is allowed to perform. The agent should be able to observe the
outcome of an action and its objective is to choose the action that maximizes
the expected reward over a certain period. The question is—which action to
choose given a particular observation? This is called the policy. A good policy
will lead to a better reward. Hence the goal of reinforcement learning is to
learn the best policy.
DL
Conventional ML
Data
Fig. 2. Impact of increasing data on the performance of conventional ML vs. DL.
. . . . .
. . . . .
Hidden Layers
Fig. 3. Typical architecture of a deep neural network.
236 Wireless and Mobile Networking
the output of the neurons from the previous layer to the input of the next layer.
The term ‘deep’ refers to the number of hidden layers in the network—the
more the layers, the deeper the network. Traditional neural networks, which
are also sometimes used by conventional ML, contain only two or three hidden
layers at most, while deep neural networks can have hundreds.
Recall that DL learns features automatically directly from the raw data.
Each hidden layer helps in extracting some fine-grained features of the data
and in improving the classification accuracy at the output layer. Thus, a deeper
network with more layers can potentially improve the accuracy further, but it
would require more training data to learn. DL, therefore, is more data- and
resource-hungry as compared to conventional ML.
With development of sensor and IoT technology, large volumes of
data are often available in many applications’ domain. Also, with the help
of crowdsourcing, massive labelled datasets are now publicly available; for
example, the publicly available ImageNet database contains over 14 million
labelled images for any researcher to download and use in their DL research.
With advancements in Graphical Processing Units (GPUs), it is now possible
to efficiently compute many layers within a short period of time. Most
cloud services now offer DL programming platforms and GPU resources at
competitive prices for tailored training activities with DL.
The combination of data and computing resource availability has sparked
a massive interest in applying DL to solve complex problems in vision,
natural language processing, automated text processing, and in many other
fields where precise mathematical models are not readily available. Indeed,
DL has advanced to the point where they can outperform humans at winning
chess and GO and classifying images as shown in Fig. 4.
Training Run-time
Hardware y
x DL Loss
(non-linear
(under training) Function
distortion)
Label
to classify 2.4 GHz signals using a large dataset of labelled 2.4 GHz signals
could be later trained to classify 5 GHz signals with a small amount of labelled
5 GHz samples. It should be noted though that there does not exit a one-size-fit-
all transfer learning methods that can be used for all problems. Often one has to
spend time to identify an effective transfer learning method that works for the
problem at hand.
5. Summary
1. AI is a computation paradigm for machines to learn and make decisions like
humans. ML is a branch of AI that empowers a machine to automatically
learn useful information from the observed events or data. DL is a special
branch of ML that tries to mimic the way the complex network of neurons
works inside the human brain.
2. DL has a much higher training overhead and requires much more data to
learn, compared to conventional ML. The main benefits of DL are that
it can learn directly from the raw data and potentially increase accuracy
unboundedly if large datasets and computing resources are available for
training.
3. The combination of data and computing resource availability has sparked
a massive interest in applying DL to solve complex problems in a growing
number of domains. The rising complexity of future wireless systems is
motivating recent interest in exploring AI and DL as an additional aid to
solve wireless communication problems.
4. DL can potentially offer a fast approximation solution for some complex
wireless algorithms that are computationally intensive. In such scenarios,
DL can practically reduce latency and energy consumption in wireless
communications.
5. DL can provide an efficient solution to address hardware distortion in
wireless communications.
242 Wireless and Mobile Networking
6. Transfer learning is a special learning technique that can help reduce the
training overhead of DL.
7. Federated learning is an emerging learning paradigm that allows learning
from data distributed across individual wireless devices without violating
data privacy. It also reduces bandwidth and energy consumption of
distributed learning by allowing the individual devices to learn locally
and transmit only the learned model to the central learning node instead
of transmitting the large volume of raw data.
References
[Bjornsson 2020] E. Bjornson and P. Giselsson (Sept. 2020). Two applications of
deep learning in the physical layer of communication systems [Lecture Notes].
pp. 134–140. In: IEEE Signal Processing Magazine, vol. 37, no. 5. doi: 10.1109/
MSP.2020.2996545.
[DL-GOOD] Ian Goodfellow, Yoshua Bengio, Aaron Courville (2016). Deep Learning,
MIT Press.
[DL-MATLAB] Introducing Deep Learning with MATLAB, by MathWorks. https://www.
mathworks.com/campaigns/offers/deep-learning-with-matlab.html [accessed 27
October 2021].
[FL 2020] T. Li, A. K. Sahu, A. Talwalkar and V. Smith (May 2020). Federated learning:
challenges, methods, and future directions. pp. 50–60. In: IEEE Signal Processing
Magazine, vol. 37, no. 3. doi: 10.1109/MSP.2020.2975749.
[MADI 2021] A. Madi, O. Stan, A. Mayoue, A. Grivet-Sébert, C. Gouy-Pailler and
R. Sirdey (2021). A secure federated learning framework using homomorphic
encryption and verifiable computing. 2021 Reconciling Data Analytics, Automation,
Privacy, and Security: A Big Data Challenge (RDAAPS), pp. 1–8. doi: 10.1109/
RDAAPS48126.2021.9452005.
[Sammut 2011] Claude Sammut and Geoffrey I. Webb (Ed.). (2011). Encyclopedia of
Machine Learning, Springer Science & Business Media.
[TLSURVEY 2010] S. J. Pan and Q. Yang (Oct. 2010). A survey on transfer learning.
pp. 1345–1359. In: IEEE Transactions on Knowledge and Data Engineering, vol. 22,
no. 10. doi: 10.1109/TKDE.2009.191.
13
Wireless Sensing
penetrate walls; they offer more ubiquitous sensing than cameras and unlike
the cameras, they do not record privacy details. Wireless sensing can work
with ambient radio signals and hence eliminate the need to wear sensors on
the body. Due to these distinct advantages, wireless sensing is fast becoming
a critical technology in smart living.
Tx
Activity
Recognition
Gesture
Sensing Algorithms Recognition
Rx Signal Features
(e.g., RSSI, CSI)
Fall Detection
4. WiFi Sensing
WiFi sensing refers to systems that try to detect human states from the WiFi
signals reflected from the human body. Working principle of WiFi sensing
system is illustrated in Fig. 2 where an existing access point (AP) or WiFi
router transmits WiFi packets, while a receiver, such as a laptop, extracts
specific signal information for sensing. RSS and channel state information
(CSI) are dominant signal informations currently used for WiFi sensing.
Activity Detection
Fig. 3. Gesture detection from WiFi RSS. Hand gestures conducted near a mobile phone receiving
WiFi
©2021 packets
Mahbub Hassanfrom
an AP (top). Raw (bottom left) and denoised RSS (bottom right) time series for
moving a hand up and down over the mobile phone [YOUSSEF 2015].
1
RSS resolutions, hence only coarse activities can be detected with limited
accuracies. For example, RSS can be used to detect a few hand gestures, but
it is not good for detecting more fine-grained activities, such as detecting
gestures of sign language or detecting daily activities of the residents.
h
x y
Tx Rx
y(f,t) = h(f,t) ✕ x(f,t) + n
a = 6, b=4
Imaginary Axis
Z = 6+j4
4
⍬
6
Real Axis
Fig. 5. Geometric plot of the complex CSI. The x-axis plots the real part while the y-axis plots the
imaginary part of the complex CSI number.
commercial WiFi chips, such as Intel 5300 and Atheros 9390, do provide CSI
for selected subcarriers, usually for 30 subcarriers which are adequate for
fine-grained sensing.
By configuring a WiFi transmitter to transmit packets at a fixed rate, a
receiver can obtain a CSI time series for each subcarrier at a target sampling
rate, e.g., 100 packets/s leads to CSI sampling at 100 Hz for each of the N time
series, where N is the number of subcarriers for which CSI is estimated. For
receiving devices with multiple (M) antennas, each antenna produces N CSI
time series for a given transmitting antenna.
While CSI time series provides more detailed frequency-dependent
channel information, it becomes overwhelming to detect patterns from so
many individual time series. Often, some dimensionality reduction, such
as Principle Component Analysis (PCA), is performed on the large number
of CSI time series to produce a single CSI time series [WIDANCE 2017],
which is then used to detect patterns for human activities. The dimensionality
reduction pre-processing is illustrated in Fig. 6.
While CSI provides both amplitude and phase values, the phase values are
typically very noisy due to frequency drifts in oscillators. This phenomenon is
particularly pronounced in WiFi receivers due to low-cost electronics compared
to cellular (3G, 4G, etc.) receivers. Therefore, phase values of the WiFi CSI
are often ignored and sensing is performed using CSI amplitudes only. Future
..
.
CSI time series for subcarrier #1
CSI time series for subcarrier #2
Rx Antenna M
..
.
CSI time series for subcarrier #N
Dimensionality
Reduction
Fig. 6. Dimensionality reduction of CSI time series.
Wireless Sensing 251
Fig. 7. CSI time series for three different human activities; Leg Swing (top), hand Push & Pull
(middle), and Hand Swipe (bottom). The amplitude (blue) shows distinct patterns while the phase
(yellow) is too noisy to be useful.
generations of WiFi radios designed to work with very high modulations, such
as 4096 QAM in the proposed 802.11be, are expected to provide cleaner phase
values as they will require stricter phase noise control for correctly detecting
very small phase differences between symbols. Figure 7 shows examples of
CSI amplitude and phase time series collected from a 802.11n WiFi receiver
for different human activities. We can see that different activities have distinct
amplitude patterns while the phase values are too noisy.
252 Wireless and Mobile Networking
5. Radar Sensing
Radar stands for RAdio Detecting And Ranging. As the name suggests, it
is a technology to detect objects and estimate the range of the object, i.e.,
how far the object is from the transmitter, using radio signals. Traditionally,
radars have been used to detect and track objects at long ranges, such as
aircraft, ships, and cars as well detecting rains. With advancements in low-
power electronics and miniaturizations, radar technology is now penetrating
the mobile and IoT consumer market, giving these consumer devices greater
sensing capability to realize the vision of smart living [TI-RADAR]. These
compact radars have much enhanced sensing capabilities than WiFi; they can
sense distance, speed, direction of movement, and sub-millimeter motions.
Tx
Rx
Clock
Radar
Fig. 8. Fundamental principle of radar.
Radar
Range
Range
Resolution
radar are illustrated in Fig. 9. We note that both the range and the resolution
are measured in units of distance, such as in meters or millimeters.
Fundamentally, the resolution directly depends on the bandwidth of the
radar signal as follows [RADAR-NATURE]:
c
Resolution = meter (2)
2B
where c is the speed of light in m/s and B is the bandwidth in Hz.
Tx pulse
Rx pulse
Pulse Radar
Fig. 10. Pulsed radar.
peak pulse power. While the transmitted pulse powers are high, the received
pulses are very weak as illustrated in Fig. 10.
Wider pulses contain more energy; hence they provide longer detection
range, but echoes from multiple objects can overlap, yielding low resolution.
Since B is inversely proportional to pulse width, the resolution of pulsed
radars can be obtained as:
c ×ω
Resolution = meter (3)
2
where ω is the pulse width in meter. Thus, narrower pulses have higher
resolution at the expense of shorter range and higher bandwidth requirements.
With advanced signal processing, it is possible to measure the frequency
of the received pulses, which enable Doppler shift calculations. Thus, radars
can also calculate the radial velocity of the target and detect whether the target
is moving closer or farther from the radar.
For large objects, such as aircraft, pulses get reflected by different parts of
the object body. With advanced signal processing, it is then possible to detect
the shape of the target and identify it.
Frequency
fmax
Amplitude
B
Slope = B/T
fmin
Sweep Duration (T) Time
Time
(a) (b)
Fig. 11. Linear chirp in amplitude-time (a) and frequency-time (b).
fTX fRX
Frequency
△f
ToF
Time
Fig. 12. Principle of FMCW radar.
256 Wireless and Mobile Networking
Reflected by object 1
ToF
Time
Fig. 13. Transmitted and received chirps in the presence of two objects.
Using the same chirp concepts, FMCW radars can detect two or more
objects located at different distances but at the same bearing. This is possible
as each object reflects the chirp with slight delays from each other. Figure 13
shows the chirp transmissions and receptions at the radar when two objects
are located at the same bearing but at different distances.
Let us now derive the resolution of FMCW radars by considering two
objects along the same bearing but with a difference of Δd meters from
each other. If we denote the instantaneous frequency difference between the
received chirps from these two objects with Δf, then we have:
∆f B
= S= (7)
2∆d/c T
where 2Δd/c is the difference between the round-trip times of the two objects.
According to the frequency detection principle, which relates to Fast Fourier
Transform, two frequencies within a signal can be distinguished if Δf > 1/T,
where T is the observation time of the signal. Thus, replacing Δf with 1/T in
Eq. (7), we obtain:
c
∆d = (8)
2B
It is interesting to note that the resolution of FMCW radar obtained in
Eq. (8) is identical to the resolution of the pulsed radar, which depends only
on the bandwidth. This means that FMCW resolution does not depend on the
slope of the chirp.
Wireless Sensing 257
Example 1
Q1. What is the resolution of a 24 GHz FMCW radar operating within the
ISM band from 24 GHz to 24.25 GHz?
Solution
Bandwidth (B) = 24.25 – 24 = 0.25 GHz
Speed of light (c) = 3×108 m/s
Resolution = c/2B = (3×108)/(2×0.25×109) = 60 cm
6. Summary
1. Wireless signals are good for both communication and sensing.
2. Two major types of wireless sensing: WiFi sensing and radar sensing.
3. Using RSS and CSI, WiFi can be used for many human sensing and
monitoring applications.
4. RSS is readily available, but cannot provide fine-grain sensing.
5. CSI can provide fine-grain sensing, but modifications are required to
access CSI in commodity WiFi devices.
6. Radar can provide accurate range and motion information; more
sophisticated sensing applications are possible with radars, but they
require dedicated infrastructure for sensing.
7. Millimeter-wave FMCW radars have emerged as a popular low-cost,
small form-factor IoT-sensing device with applications in many IoT
domains: health, smart home, smart industry, smart transport, etc.
Q1. What is the resolution of an FMCW radar utilizing the frequency band
77 GHz–81 GHz?
(a) 7.5 cm
(b) 3.75 cm
(c) 30 cm
(d) 60 cm
(e) 90 cm
Q2. What is the resolution of pulse radar operating with 100ns pulses?
(a) 5 m
(b) 10 m
(c) 15 m
(d) 20 m
(e) 100 m
258 Wireless and Mobile Networking
Q10. CSI is used by radars to detect and estimate the range of target objects.
(a) True
(b) False
References
[COMST 2021] I. Nirmal, A. Khamis, M. Hassan, W. Hu and X. Zhu (second quarter
2021). Deep learning for radio-based human sensing: recent advances and future
directions. pp. 995–1019. In: IEEE Communications Surveys & Tutorials, vol. 23,
no. 2. doi: 10.1109/COMST.2021.3058333.
[RADAR-NATURE] R. Komissarov, V. Kozlov, D. Filonov et al. (2019). Partially coherent
radar unties range resolution from bandwidth limitations. Nature Communications
10: 1423. https://doi.org/10.1038/s41467-019-09380-x.
[TI-RADAR] mmWave Radar Sensor. Texas Instrument. https://www.ti.com/sensors/
mmwave-radar/overview.html [accessed 28 October 2021].
[WIDANCE 2017] Kun Qian, Chenshu Wu, Zimu Zhou, Yue Zheng, Zheng Yang, Yunhao
Liu. (2017). Inferring Motion Direction using Commodity Wi-Fi for Interactive
Exergames. CHI.
[YOUSSEF 2015] H. Abdelnasser, M. Youssef and K. A. Harras. (2015). WiGest:
A ubiquitous WiFi-based gesture recognition system. 2015 IEEE Conference
on Computer Communications (INFOCOM), pp. 1472–1480. doi: 10.1109/
INFOCOM.2015.7218525.
14
Aerial Wireless Networks
1. Non-terrestrial Networks
Figure 1 illustrates the basic categories of non-terrestrial networks based on
their altitudes. Satellite networks deploy communications infrastructure in the
space well above the Earth’s atmosphere. While satellite networks can provide
ubiquitous coverage for the entire Earth surface, they are costly to deploy and
suffer from extended latency due to the long distance. Additionally, they are
not suitable for direct communication with small IoT sensors on the ground
due to the high transmission powers required to reach satellites.
Aerial networks refer to networks that use platforms within the Earth’s
atmosphere. As such, they are low-cost and low-latency networks that can
be quickly deployed to provide coverage at specific regions of interest.
Aerial networks can directly connect small user equipment and IoT devices
on the ground. There are two major categories of aerial networks based on
their altitudes. High Altitude Platform Station (HAPS) uses platforms like
aerostats floating in the stratosphere 20 kms from Earth’s surface [HAPS-
SOFTBANK]. HAPS can provide coverage to a large area and the platform
can be practically powered by solar power. In contrast, Unmanned Aerial
Aerial Wireless Networks 261
~36000km
GEO Satellite
Space-based
160-2000km
~20km
HAPS
Aerial
<400m
UAV/Drone
Terrestrial
Earth Surface
Vehicles (UAVs), also commonly known as drones, fly at a very low altitude,
often restricted below 400 m by regulation [FOTOUHI 2019].
UAVs have several advantages compared to HAPS. UAVs are very low-
cost equipment that can be deployed much more quickly than any other aerial
platforms. As such, they are especially suitable for unexpected and limited
duration events, such as disasters and dynamic hotspots. The low altitude
of UAVs can help establish short-range line-of-sight (LoS) communication
links with ground users offering significant performance gain. Finally, the
manoeuvrability of UAVs offers opportunities to dynamically adjusting their
location or mobility to best suit the communication environment. These benefits
of UAVs make them a promising new addition to the future wireless system that
must support communications to more diverse scenarios [MOZ 2019].
262 Wireless and Mobile Networking
UAV/Drone
ℎ
𝜃𝜃𝜃𝜃 = tan−1
h
𝑟𝑟𝑟𝑟
Elevation Angle
θ Ground
r
Fig. 2. Elevation angle in aerial wireless networks.
Aerial Wireless Networks 263
UAV/Drone
FSPL Segment
Urban Segment
FSPL
Urban
Environment
Extra-PL
Ground
Fig. 3. Air-to-ground radio propagation in aerial wireless networks.
LFS can be derived directly using the well-known Frii’s law (discussed in
Chapter 3) as follows:
4π
LFS (dB) = 20log10 (d ) + 20log10 ( f ) + 20log10 (2)
c
where d is the distance from the drone to the ground receiver, i.e., d = √h2 + r2.
LSC, however, depends on whether the receiver has a LoS with the drone or not.
LSC is very small when there is LoS, but is significantly higher for a NLoS link.
That is, if LLoS
SC
and LNLoS
SC
represent the scattering loss for LoS and NLoS links,
respectively, then we have LNLoS
SC
>> LLoS
SC
. In order to derive the A2G path loss,
we therefore need to know the probabilities of LoS and NLoS for the ground
receiver.
Critical analysis and modelling show that the probability of LoS can be
obtained as follows [HOURANI 2014]:
1
P( LoS ,θ ) = (3)
1 + eb ( a −θ )
where a and b are environment parameters which assume different values for
the four types of urban environments, namely Suburban, urban, Dense Urban,
and Highrise Urban.
264 Wireless and Mobile Networking
the cells stationary) on the ground to avoid unnecessary handoffs for ground
receivers from beams to beams. This would require sophisticated mechanical
and electronic means to address HAPS movements due to sudden wind bursts
or the circling motion in the case of heavier-than-air platforms.
fight against gravity at all time. Hybrid UAVs featuring both wings and rotors
are commercially available at a higher cost.
and network performance at all times despite changes in user locations and
demands on the ground. Using a simple scenario involving two ground
users, Fig. 7 illustrates the benefit of repositioning a UAV BS as one of the
users move. This means that such aerial networks must be empowered with
intelligent BS mobility-control algorithms that can sense network changes
and reposition the UAVs accordingly [DRONE-CELL].
5. Summary
1. Aerial network is a specific category of non-terrestrial network that
resides within the Earth’s atmosphere, i.e., below the space.
2. There are two main categories of aerial networks – HAPS at the altitude
of ~ 20 km and UAV flying below 400 m.
3. Path loss models in aerial networks are different than those experienced
in terrestrial networks.
4. HAPS can float for months whereas UAVs have a very limited flying
lifetime, lasting on the order of hours at best.
References
[DRONE-CELL] Azade Fotouhi, Ming Ding and Mahbub Hassan. (2021). Drone cells:
Improving spectral efficiency using drone-mounted flying base stations. Journal of
Network and Computer Applications, vol. 174.
[DRONE-TETHER] M. Kishk, A. Bader and M. -S. Alouini. (Dec. 2020). Aerial base
station deployment in 6G cellular networks using tethered drones: the mobility and
endurance tradeoff. pp. 103–111. In: IEEE Vehicular Technology Magazine, vol. 15,
no. 4. doi: 10.1109/MVT.2020.3017885.
[FOTOUHI 2019] A. Fotouhi et al. (fourth quarter 2019). Survey on UAV cellular
communications: practical aspects, standardization advancements, regulation, and
security challenges. pp. 3417–3442. In: IEEE Communications Surveys & Tutorials,
vol. 21, no. 4. doi: 10.1109/COMST.2019.2906228.
[HAPS 1997] G. M. Djuknic, J. Freidenfelds and Y. Okunev. (Sept. 1997). Establishing
wireless communications services via high-altitude aeronautical platforms: a concept
whose time has come? pp. 128–135. In: IEEE Communications Magazine, vol. 35,
no. 9. doi: 10.1109/35.620534.
[HAPS-SOFTBANK] Y. Shibata, N. Kanazawa, M. Konishi, K. Hoshino, Y. Ohta and
A. Nagate. (2020). System design of gigabit HAPS mobile communications. pp.
157995–158007. In: IEEE Access, vol. 8. doi: 10.1109/ACCESS.2020.3019820.
[HOURANI 2016] S. Chandrasekharan et al. (May 2016). Designing and implementing
future aerial communication networks. pp. 26–34. In: IEEE Communications
Magazine, vol. 54, no. 5. doi: 10.1109/MCOM.2016.7470932.
[HOURANI 2014] A. Al-Hourani, S. Kandeepan and S. Lardner. (Dec. 2014). Optimal LAP
altitude for maximum coverage. pp. 569–572. In: IEEE Wireless Communications
Letters, vol. 3, no. 6. doi: 10.1109/LWC.2014.2342736.
[MOZ 2019] M. Mozaffari, W. Saad, M. Bennis, Y. -H. Nam and M. Debbah (third quarter
2019). A tutorial on UAVs for wireless networks: applications, challenges, and open
problems. pp. 2334–2360. In: IEEE Communications Surveys & Tutorials, vol. 21,
no. 3. doi: 10.1109/COMST.2019.2902862.
Index
2-ray model 39, 45, 46, 54 chirp spread spectrum 219, 227
802.11af 104, 105, 108, 110–113, 134, 135 chirp sweep duration 220
802.11ah 104, 113–121, 134, 135 clear-to-send (CTS) 65
co-channel cells 145–147, 161, 162
A code division multiple access (CDMA) 27
Coherence time 31, 33
Adaptive Frequency Hopping 189, 197, 214
collision avoidance 65, 75
Aerial wireless networks 260, 262, 263
collision detection 64, 65
amplitude 11–14, 16, 21, 23, 34
constellation diagram 23
Amplitude Shift Keying (ASK) 21
contention-based period (CBP) 127, 128
Announcement Time (AT) 127
contention-free period (CFP) 67
antenna 35–37, 40, 41, 46, 48, 50, 53–56
Contention Window 67
Artificial intelligence (AI) 233, 237, 241, 242
Association Beamforming Time (A-BFT) 127, D
132
Data rate 11, 21, 23–25, 33, 34
B Data Transfer Time (DTT) 127
dB 19, 20, 25, 32–34
Backoff Count 67, 70
dBm 19, 20, 32–34
base stations 142
decibel 19, 20
Basic Channel Unit (BCU) 112
Deep learning (DL) 233–239, 241–243
basic rate 191, 195
delay spread 44, 55, 81, 87, 94, 100
Baud rate 21
Delivery TIM (DTIM) 119, 120
beacon 67, 74
Diffraction 37, 38
beam forming 48
Digital Dividend 106, 107
Beam Refinement Procedure 131
directional antenna 35, 54, 55
Bidirectional Transmit 118
Direct-Sequence Spread Spectrum (DSSS) 29
Bluetooth Classic 189, 190, 192, 195, 196,
Distributed Coordination Function (DCF) 66
205–207, 215, 216
diversity gain 49
Bluetooth Low Energy (BLE) 189, 204–212,
Doppler effect 30, 33
215
Doppler shift 30, 31, 33
Bluetooth SIG 187, 189, 208, 209
Doppler spread 30, 31, 33
Bluetooth Smart 189, 204, 205, 210
drones 260, 261
C E
carrier sense multiple access (CSMA) 66
electromagnetic waves 11, 14, 17, 18, 32
Cell on Wheels 142, 143
elevation angle 262
Channel Bonding 82, 85, 87, 88, 90, 100
enhanced data rate 189, 191
channel modeling 38
Enhanced Distributed Control Function (EDCF)
Channel Schedule Management (CSM) 110
83
channel state information (CSI) 90, 246–251,
257–259
272 Wireless and Mobile Networking
F L
Fast Fourier Transform (FFT) 17 license-exempt 61, 62
federated learning 240–243 line-of-sight 37, 50
FMCW 253–258 Long Term Evolution (LTE) 152, 153, 157–163
Fourier transform 16, 17 LoRa Alliance 218
fractional frequency reuse 149, 150 low-power wide-area networking (LPWAN)
frame aggregation 85, 89, 90 182–185, 218
frame bursting 84 LTE Advanced 153, 157
frequency 11–18, 21, 26, 28–34 LTE-A 157
Frequency Division Duplexing (FDD) 32, 142, LTE-M 182, 183, 185
158, 161
frequency division multiple access (FDMA) 26 M
frequency domains 15
machine learning (ML) 233–236, 240–243
Frequency Hopping 189, 192, 193, 196–198,
medium access control 26
200–202, 206, 207, 211, 213–216
mmWave bands 170
frequency hopping spread spectrum (FHSS) 28
Multi-AP Coordination 99
Frequency Modulated Continuous Wave 254
multiband communication 99
frequency reuse 144–146, 148–150
multipath 39, 42–47, 50, 54, 55
Frequency Shift Keying (FSK) 21
multiplexing gain 49
Frii’s law 39–41
G N
narrowband IoT 182
Gaussian Frequency Shift Keying 202
NB-IoT 176–178, 182–185
Geofencing 211
Network Allocation Vector (NAV) 67
geolocation database (GDB) 108, 111
Non-Orthogonal Multiple Access (NOMA)
Geolocation Database Dependent 108
167, 167, 170, 171
GSM 152–157, 161
non-terrestrial networks 260, 268
guard interval 80–82, 85–88, 92, 94, 95, 100,
Null Data Packets 116, 134
101
Nyquist’s Theorem 24, 25, 32
H
O
HaLow 113, 114
Orthogonal Frequency Division Multiple Access
Hamming distance 25, 26
(OFDMA) 51
hidden node problem 64, 65
Orthogonal Frequency Division Multiplexing
Hierarchical Association Identifier 116, 120
(OFDM) 51, 64, 75
High Altitude Platform Station 260
OUI (Organization Unique Identifier) 195, 196
High Frequency 105, 113, 124, 135
High Throughput Control (HTC) 90
Hybrid Coordination Function (HCF) 83
P
particular channel frequency response (CFR)
I 248
path loss 39–42, 45, 47, 48, 54
IETF 108, 111
PAWS 108, 111, 112, 134
inter-frame space (IFS) 66
PBSS Central Point (PCP) 127–129, 132, 133,
Internet of Things (IoT) 175–185
136
inter-symbol interference 43, 44, 51, 54, 55
Personal BSS (PBSS) 127, 133
Inverse FFT (IFFT) 17
phase 11–13, 21–23, 34
ISM bands 61, 62
Phase Shift Keying (PSK) 21
isotropic antenna 35, 36, 54
Physical Resource Block 159
Index 273
Piconet 189, 190, 194, 200, 202, 215 spectrum 17, 18, 28, 29, 33, 34
Point Coordination Function (PCF) 66, 83 Speed Frame Exchange 116–118, 120, 134
power management 62, 74, 76 Spread spectrum 28, 29, 33
protocol data unit (PDU) 89 spreading factor (SF) 221–223, 227–229
pseudorandom hopping 213 Subscriber Identity Module (SIM) 154, 155
successive interference cancellation (SIC) 166,
Q 167
Super-Fi 105
Quadrature Amplitude and Phase Modulation
supervised learning 233, 234
(QAM) 23
sweeping speed 220, 227–229
Symbol 21, 23, 24, 34
R symbol duration 21
Radar 246, 252–258
radio channel 35, 38 T
RAdio Detecting And Ranging 252
target wake time (TWT) 116, 120, 122, 123
radio towers 142
Time Division Duplexing (TDD) 32, 158
ready-to-send (RTS) 64, 65
time division multiple access (TDMA) 26
Receiver sensitivity 41, 42, 55
Traffic Indication Map (TIM) 74, 118, 119,
Reflection 37, 38, 45, 46
121, 122
Registered Location Query Protocol (RLQP)
Transfer learning 239, 240, 242, 243
108, 110
transmission opportunity (TXOP) 84
Registered Location Secure Server (RLSS) 108
TVWS databases 108, 135
reinforcement learning 234
Response Indication Deferral (RID) 119 U
restricted access window (RAW) 118, 120–122,
134 Ultra High Frequency (UHF) 105, 107
reuse factor 145, 146, 162 Unmanned Aerial Vehicles (UAVs) 261,
reuse ratio 146 265–268
RSS 247, 248, 257, 258 unsupervised learning 233
S V
scattering 37, 38, 55 Very High Frequency (VHF) 105, 135
Scatternet 190, 191, 215 virtual carrier sensing 69, 75
service data unit (SDU) 89
service period (SP) 127, 128 W
Shannon’s Theorem 25
White Space 105–111, 134, 135
short IFS (SIFS) 66
white space map (WSM) 110
short message service (SMS) 157
White-Fi 105, 134, 135
signal-to-noise (SNR) 20
wireless LANs 59, 62, 63, 65
small-scale fading 46, 47, 50
Wireless Personal Area Networks (WPANs)
spatial diversity 48, 49
187
spatial frequency sharing (SFS) 128, 133, 134
spatial multiplexing 48, 49
View publication stats