Professional Documents
Culture Documents
Telecommunication Systems
Jorma Kekalainen
Introduction
1
Lecture notes Telecommunication Systems by Jorma Kekalainen
Course objective
Understand principal concepts of
telecommunication systems and networks
Computer networks
Internet as a detailed example
Transmission media and physical layer
Public Switched Telephone Network (PSTN)
Communication satellite systems
Radar
GPS
Information sources
1.Usually, the most precise sources are the original
sources, i.e. standards, recommendations or other
specifications.
You can pull them from the Internet e.g.
ITU-T www.itu.int/ITU-T/
IETF www.ietf.org
3GPP www.3gpp.org
or from elsewhere.
Reading just the general sections in the
specifications and scanning the rest will be usually
enough to get sufficient understanding
2. You can look for material from corresponding
courses in the Internet
3. Some may find that the books are easier to read.
2
Lecture notes Telecommunication Systems by Jorma Kekalainen
Books
Following references can be useful
Comer: Computer Networks and Internets
Duck, Read: Data Communications and Computer Networks
Elbert: The Satellite Communication Applications Handbook
Ericsson, Telia: Understanding Telecommunications, Part I & Part II
Forouzan: Data Communications and Networking
Freeman: Fundamentals of Telecommunications
Hofmann-Wellenhof, Lichtenegger, Collins: GPS Theory and Practice
Kolawole: Satellite Communication Engineering
Kurose, Ross: Computer Networking
Leick: GPS Satellite Surveying
Leon-Garcia, Widjaja: Communication Networks
Nathanson: Radar Design Principles
Parkinson, Spilker (Eds.): The Global Positioning System: Theory and
Applications
Roddy: Satellite Communications
Skolnik: Introduction to Radar Systems
Stallings: Data and Computer Communications
Tanenbaum: Computer Networks
Toomay: Radar Principles for the Non-Specialist
Abbreviations
Telecommunication/Computer networking lectures are
full of abbreviations and acronyms
E.g a random list:
ADSL, AES, AMPS, AODV, ARP, ATM, BGP, CDMA, CDN,
CGI, CIDR, DCF, DES, DHCP, DMCA, FDM, FHSS, GPRS,
GSM, HDLC, HFC, HTML, HTTP, ICMP, IMAP, ISP, ITU,
LAN, LMDS, MAC, MACA, MIME, MPEG, MPLS, MTU, NAP,
NAT, NSA, NTSC, OFDM, OSPF, PCF, PCM, PGP, PHP, PM,
POTS, PPP, PSTN, QAM, QPSK, RED, RFC, RPC, RSA, RSVP,
RTP, SSL, TCP, TDM, UDP, URL, UTP, VLAN, VPN, VSAT,
WAN, WAP, WDMA, WEP, and WWW.
Abbreviations
refer (define) concepts
describe standards & parts of telecommunication systems
3
Lecture notes Telecommunication Systems by Jorma Kekalainen
A view of history
1844 Steinheils
1826 Ohms law commercial telegraphy
1800
1850
1900
1950
Telecommunication
Communication is the exchange of
information between two or more parties.
The term telecommunication means
communication at a distance.
The word data refers to information
presented in whatever form agreed by the
parties.
Data communications are the exchange of
data between two devices via some form of
transmission medium.
4
Lecture notes Telecommunication Systems by Jorma Kekalainen
Telecommunication system
A telecommunication system must transmit
information/data to the correct destination
in an accurate and timely manner.
The effectiveness of a telecommunication
system depends on four fundamental
characteristics:
delivery,
accuracy,
timeliness, and
jitter.
Effectiveness of telecommunication
system
Fundamental characteristics are
1. Delivery. The system must deliver data
to the correct destination.
2. Accuracy. The system must deliver the
data accurately.
Data that have been altered in transmission and
left uncorrected are unusable.
10
5
Lecture notes Telecommunication Systems by Jorma Kekalainen
Effectiveness
Components
The five components that make up a
telecommunication system are
the message,
sender,
receiver,
medium, and
protocol.
12
6
Lecture notes Telecommunication Systems by Jorma Kekalainen
Components
1. Message. The message is the information (data) to be
communicated
Forms of information are text, numbers, pictures, audio, and
video.
2. Sender. The sender is the device that sends the data message
a computer, workstation, telephone handset, video camera etc.
3. Receiver. The receiver is the device that receives the message
a computer, workstation, telephone handset, television etc.
4. Transmission medium. The transmission medium is the physical
path by which a message travels from sender to receiver.
twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
5. Protocol. A protocol is a set of rules that govern data
communications.
It represents an agreement between the communicating devices.
Without a protocol, two devices may be connected but not
communicating.
13
14
7
Lecture notes Telecommunication Systems by Jorma Kekalainen
15
16
8
Lecture notes Telecommunication Systems by Jorma Kekalainen
Network
A network is a set of devices (often
referred to as nodes) connected by
communication links.
A node can be a computer or any other
device capable of sending and/or receiving
data generated by other nodes on the
network.
17
Telephone network
Smart Network
Dumb Terminals 18
9
Lecture notes Telecommunication Systems by Jorma Kekalainen
Internet
Dumb Network
Smart Terminals 19
Distributed processing
Often networks use distributed processing,
in which a task is divided among multiple
computers.
Instead of one single large machine being
responsible for all aspects of a process,
separate computers handle a subset.
20
10
Lecture notes Telecommunication Systems by Jorma Kekalainen
Network criteria
A network must be able to meet a certain
number of criteria.
The most important of these are
performance,
reliability, and
security.
21
Performance
The performance of a network depends on a
number of factors, including the number of users,
the type of transmission medium, the capabilities
of the connected hardware, and the efficiency of
the software.
Performance can be measured in many ways,
including transit time and response time.
Transit time is the amount of time required for a
message to travel from one device to another.
Response time is the elapsed time between an
inquiry and a response.
22
11
Lecture notes Telecommunication Systems by Jorma Kekalainen
23
24
12
Lecture notes Telecommunication Systems by Jorma Kekalainen
Type of connection
A network is a set of communication
devices connected by media links.
A link is a communications pathway that
transfers data from one device to another.
For communication to occur, two devices
must be connected in some way to the same
link at the same time.
There are two possible types of
connections: point-to-point and multipoint.
25
26
13
Lecture notes Telecommunication Systems by Jorma Kekalainen
27
Topology
Topology refers to the physical or logical
arrangement of a network.
Physical topology
refers to the way in which a network is laid out
physically.
Two or more devices connect to a link; two or
more links form a topology.
The topology of a network is the geometric
representation of the relationship of all
the links and linking devices (usually called
nodes) to one another.
28
14
Lecture notes Telecommunication Systems by Jorma Kekalainen
Basic topologies
Devices may be arranged in
a mesh,
star,
bus, or
ring topology.
29
Categories of topology
30
15
Lecture notes Telecommunication Systems by Jorma Kekalainen
Mesh
Every device has a dedicated point-to-point
link to every other device.
The link carries traffic only between the two
devices it connects.
In a fully connected mesh network with n
nodes, we need n(n-1)/2 duplex-mode links.
To accommodate that many links, every
device on the network must have (n-1)
input/output (I/O) ports to be connected
to the other (n-1) stations.
31
32
16
Lecture notes Telecommunication Systems by Jorma Kekalainen
Disadvantages of a mesh
topology
The main disadvantages of a mesh are related to
the amount of cabling and the number of I/O
ports required.
For these reasons a mesh topology is usually
implemented in a limited fashion, for example, as a
backbone connecting the main computers of a
hybrid network that can include several other
topologies.
One example of a mesh topology is the connection
of telephone regional offices in which each
regional office needs to be connected to every
other regional office.
34
17
Lecture notes Telecommunication Systems by Jorma Kekalainen
Star
In a star topology, each device has a dedicated
point-to-point link only to a central controller,
usually called a hub.
The devices are not directly linked to one another.
Unlike a mesh topology, a star topology does not
allow direct traffic between devices.
The controller acts as an exchange: If one device
wants to send data to another, it sends the data
to the controller, which then relays the data to
the other connected device
The star topology is used in local-area networks
(LANs)
35
36
18
Lecture notes Telecommunication Systems by Jorma Kekalainen
37
Hub is a central device in a star topology that provides a common connection among
38
the nodes.
19
Lecture notes Telecommunication Systems by Jorma Kekalainen
Bus
A bus topology is multipoint.
One long cable acts as a backbone to link all the devices in a
network.
Nodes are connected to the bus cable by drop lines and taps.
A drop line is a connection running between the device and
the main cable.
A tap is a connector that create a contact into the main
cable.
As a signal travels along the backbone, some of its energy is
transformed into heat.
For this reason there is a limit on the number of taps and on
the distance between those taps.
Bus topology was the one of the first topologies used in the
design of early local-area networks.
39
40
20
Lecture notes Telecommunication Systems by Jorma Kekalainen
Ring topology
Each device has a dedicated point-to-point
connection with only the two devices on either side
of it.
A signal is passed along the ring in one direction,
from device to device, until it reaches its
destination.
Each device in the ring incorporates a repeater.
When a device receives a signal intended for
another device, its repeater regenerates the bits
and passes them along.
To add or delete a device requires changing only
two connections.
In a simple ring, a break in the ring (such as a
disabled station) can disable the entire network.
This weakness can be solved by using a dual ring or a
switch capable of closing off the break.
42
21
Lecture notes Telecommunication Systems by Jorma Kekalainen
Repeater is a device that extends the distance a signal can travel by regenerating the
43
signal.
Hybrid topology
A network can be hybrid.
For example, we can have
a main star topology
with each branch connecting several stations in
a bus topology.
44
22
Lecture notes Telecommunication Systems by Jorma Kekalainen
45
Network categories
A network can be categorized as a personal area network
(PAN), a local area network (LAN), a metropolitan-area
network (MAN), or a wide area network (WAN).
A PAN is a data communication system covering an area the
size of a few meters around a person.
A LAN is a data communication system within a building,
plant, or campus, or between nearby buildings.
A MAN is a data communication system covering an area the
size of a town or city.
A WAN is a data communication system spanning states,
countries, or the whole world.
46
23
Lecture notes Telecommunication Systems by Jorma Kekalainen
Network categories
coverage
WAN
MAN
LAN
PAN
47
48
24
Lecture notes Telecommunication Systems by Jorma Kekalainen
49
Router: An internetworking device operating at the first three OSI layers. A router is
50
attached to two or more networks and forwards packets from one network to another.
25
Lecture notes Telecommunication Systems by Jorma Kekalainen
Internet
An internet is a network of networks.
The Internet is a collection of many
separate networks.
There are local, regional, national, and
international Internet service providers
(ISPs).
51
52
NAP A network access point
26
Lecture notes Telecommunication Systems by Jorma Kekalainen
Protocol
Simply definition: Protocol is synonymous
with rule.
A protocol is a set of rules that governs
data communication
The key elements of a protocol are syntax,
semantics, and timing.
TCP/IP is the protocol suite for the
Internet.
53
Layered architecture
Divide and conquer:
break the overall big
problem into smaller
ones with standardized
interfaces
Each layer provides a
service to upper layers
and utilizes the services
provided by lower layers
Performance may not be
optimal, but makes the
architecture simple and
flexible
54
27
Lecture notes Telecommunication Systems by Jorma Kekalainen
55
Layered protocols
Somewhat like subroutines in programming
Each layer provides services (functions) to
higher layers
Function call interface hides details of how the
service is provided
e.g. network layer asks link layer to transport a
packet across a link, without any network details
the interface is well defined
benefits
reduction in complexity
Communications between peers using
protocols
56
28
Lecture notes Telecommunication Systems by Jorma Kekalainen
Encapsulation
Lower layers deal with higher layer by
treat information from higher layer as black
box
dont look inside data
just treat as bunch of bits
just break data into blocks
encapsulate the blocks, by adding
headers (e.g. addresses)
trailers
when passing back to higher layer
layers strip headers
join blocks back together
57
source
Example: Encapsulation
message M application
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
58
29
Lecture notes Telecommunication Systems by Jorma Kekalainen
59
ITU-T Standards
G - Transmission systems and media, digital
systems and networks
H - Audiovisual and multimedia systems
I - ISDN
Q - Switching and signalling
V - Data communications over PSTN
X- Data networks and open system
communications
60
(www.itu.int)
30
Lecture notes Telecommunication Systems by Jorma Kekalainen
61
Internet Overview
31
Lecture notes Telecommunication Systems by Jorma Kekalainen
63
32
Lecture notes Telecommunication Systems by Jorma Kekalainen
loosely hierarchical
public Internet versus Institutional network
private intranet
Internet standards
RFC: Request for comments
IETF: Internet Engineering
Task Force
HTTP - Hypertext Transfer Protocol - is the standard protocol for the carriage of data around 65
an internet ( browser server).
66
33
Lecture notes Telecommunication Systems by Jorma Kekalainen
Protocols
human protocols: network protocols:
whats the time? machines rather than
I have a question humans
introductions all communication
activity in Internet
specific msgs sent governed by protocols
specific actions taken protocols define format,
when msgs received, order of msgs sent and
or other events received among network
entities, and actions
taken on msg
transmission, receipt
67
Protocols
a human protocol and a computer network protocol:
Hi
TCP connection
request
Hi
TCP connection
Got the response
time? Get http://www.awl.com/kurose-ross
2:00
<file>
time
68
34
Lecture notes Telecommunication Systems by Jorma Kekalainen
Network structure
network edge:
applications and
hosts
access networks,
physical media:
wired, wireless
communication links
network core:
interconnected
routers
network of
networks 69
Network edge
end systems (hosts):
run application programs
e.g. Web, email
at edge of network peer-peer
client/server model
client host requests, receives
service from always-on server
client/server
e.g. Web browser/server;
email client/server
peer-peer model:
minimal (or no) use of
dedicated servers
e.g. Skype, BitTorrent
70
35
Lecture notes Telecommunication Systems by Jorma Kekalainen
Keep in mind:
bandwidth (bits per
second) of access
network?
shared or dedicated?
71
Dial-up modem
central
office
telephone
network Internet
home ISP
home
dial-up modem
PC
modem (e.g., AOL)
36
Lecture notes Telecommunication Systems by Jorma Kekalainen
DSLAM
telephone
splitter network
DSL
modem central
office
home
PC
74
37
Lecture notes Telecommunication Systems by Jorma Kekalainen
Diagram: http://www.cabledatacomnews.com/cmic/diagram.html 75
cable headend
home
cable distribution
network (simplified)
76
38
Lecture notes Telecommunication Systems by Jorma Kekalainen
server(s)
cable headend
home
cable distribution
network
77
cable headend
home
cable distribution
network (simplified)
78
39
Lecture notes Telecommunication Systems by Jorma Kekalainen
FDM:
C
O
V V V V V V N
I I I I I I D D T
D D D D D D A A R
E E E E E E T T O
O O O O O O A A L
1 2 3 4 5 6 7 8 9
Channels
cable headend
home
cable distribution
network
79
Internet optical
fibers
ONT
optical
fiber
OLT
optical
central office splitter
ONT
40
Lecture notes Telecommunication Systems by Jorma Kekalainen
100 Mbps
1 Gbps
100 Mbps
server
41
Lecture notes Telecommunication Systems by Jorma Kekalainen
Home networks
Typical home network components:
DSL or cable modem
router/firewall/NAT
Ethernet
wireless access
point
wireless
to/from laptops
cable router/
cable
modem firewall
headend
wireless
access
Ethernet point
Physical media
Twisted Pair (TP)
Bit: propagates between two insulated copper
transmitter/receiver wires
pairs Category 3: traditional
physical link: what lies phone wires, 10 Mbps
between transmitter & Ethernet
receiver Category 5:
100Mbps Ethernet
guided media:
signals propagate in solid
media: copper, fiber, coax
unguided media:
signals propagate freely,
e.g., radio
84
42
Lecture notes Telecommunication Systems by Jorma Kekalainen
85
Hybrid Fiber Coax (HFC)
43
Lecture notes Telecommunication Systems by Jorma Kekalainen
Network core
mesh of interconnected
routers
the fundamental
question: how is data
transferred through net?
circuit switching:
dedicated circuit per
call: telephone net
packet-switching: data
sent thru net in
discrete chunks
87
End-end resources
reserved for call
link bandwidth, switch
capacity
dedicated resources:
no sharing
circuit-like
(guaranteed)
performance
call setup required
88
44
Lecture notes Telecommunication Systems by Jorma Kekalainen
89
frequency
time
TDM
frequency
time
90
45
Lecture notes Telecommunication Systems by Jorma Kekalainen
Numerical example
How long does it take to send a file of
640,000 bits from host A to host B over a
circuit-switched network?
All links are 1.536 Mbps
Each link uses TDM with 24 slots/sec
500 msec to establish end-to-end circuit
91
Numerical example
How long does it take to send a file of 640k bits from
host A to host B over a circuit-switched network?
All links are 1.536 Mbps
Each link uses TDM with 24 slots/sec
500 msec to establish end-to-end circuit
46
Lecture notes Telecommunication Systems by Jorma Kekalainen
93
1.5 Mb/s
B
queue of packets
waiting for output
link
D E
47
Lecture notes Telecommunication Systems by Jorma Kekalainen
Packet-switching: Store-and-forward
L
R R R
N users
circuit-switching: 1 Mbps link
10 users
packet switching:
with 35 users,
Q: how did we get value 0.0004?
probability > 10 active
at same time is less
than .0004
96
48
Lecture notes Telecommunication Systems by Jorma Kekalainen
97
roughly hierarchical
at center: tier-1 ISPs, national/international
coverage
treat each other as equals
Tier-1
providers
Tier 1 ISP
interconnect
(peer)
privately
Tier 1 ISP Tier 1 ISP
98
49
Lecture notes Telecommunication Systems by Jorma Kekalainen
Tier-2 ISPs
Tier-2 ISP pays Tier-2 ISP also peer
Tier-2 ISP privately with
tier-1 ISP for
connectivity to Tier 1 ISP each other.
rest of Internet
tier-2 ISP is
customer of
tier-1 provider Tier 1 ISP Tier 1 ISP Tier-2 ISP
99
local
ISP Tier 3 local
local local
ISP ISP
ISP ISP
Local and tier- Tier-2 ISP Tier-2 ISP
3 ISPs are
customers of Tier 1 ISP
higher tier
ISPs
connecting
them to rest Tier 1 ISP
of Internet
Tier 1 ISP Tier-2 ISP
local
Tier-2 ISP Tier-2 ISP
ISP
local local local
ISP ISP ISP 100
50
Lecture notes Telecommunication Systems by Jorma Kekalainen
local
ISP Tier 3 local
local local
ISP ISP
ISP ISP
Tier-2 ISP Tier-2 ISP
Tier 1 ISP
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
102
51
Lecture notes Telecommunication Systems by Jorma Kekalainen
transmission
A propagation
B
nodal
processing queueing
103
B
nodal
processing queueing
104
52
Lecture notes Telecommunication Systems by Jorma Kekalainen
Caravan analogy
100 km 100 km
ten-car toll toll
caravan booth booth
cars propagate at Time to push entire
100 km/hr caravan through toll
toll booth takes 12 sec to booth onto highway =
service car (transmission 12*10 = 120 sec
time) Time for last car to
car~bit; caravan ~ packet propagate from 1st to
2nd toll both:
Q: How long until caravan
100km/(100km/hr)= 1 hr
is lined up before 2nd toll
booth? A: 62 minutes
105
106
53
Lecture notes Telecommunication Systems by Jorma Kekalainen
Nodal delay
d nodal d proc d queue d trans d prop
107
Queuing delay
54
Lecture notes Telecommunication Systems by Jorma Kekalainen
Packet loss
queue (aka buffer) preceding link in buffer has
finite capacity
packet arriving to full queue dropped (lost)
lost packet may be retransmitted by previous
node, by source end system, or not at all
buffer
(waiting area) packet being transmitted
A
B
packet arriving to
full buffer is lost
109
Throughput
throughput: rate (bits/time unit) at which
bits transferred between sender/receiver
instantaneous: rate at given point in time
average: rate over longer period of time
server,
server sendswith link
bits pipe capacity
that can carry link that
pipe capacity
can carry
file of F bits
(fluid) into pipe R
fluid
s bits/sec
at rate Rfluid
c bits/sec
at rate
to send to client Rs bits/sec Rc bits/sec
110
55
Lecture notes Telecommunication Systems by Jorma Kekalainen
Throughput (more)
Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
111
Rs
per-connection
Rs Rs
end-end
throughput:
R
min(Rc,Rs,R/10)
in practice: Rc or Rc Rc
Rs is often Rc
bottleneck
56
Lecture notes Telecommunication Systems by Jorma Kekalainen
Network security
The field of network security is about:
how we can defend networks against attacks
how to design architectures that are immune to
attacks
Internet not originally designed with
(much) security in mind
original vision: a group of mutually trusting
users attached to a transparent network
Security considerations in all layers!
113
57
Lecture notes Telecommunication Systems by Jorma Kekalainen
Trojan horse
Hidden part of some otherwise useful software
Virus
infection by receiving object (e.g., e-mail
attachment), actively executing
self-replicating: propagate itself to other hosts
Worm
infection by passively receiving object that
gets itself executed
self- replicating: propagates to other hosts
115
Internet history
Early packet-switching systems
116
58
Lecture notes Telecommunication Systems by Jorma Kekalainen
Internet history
1970-1980: Internetworking and proprietary nets
117
Internet history
1980-1990: new protocols, a proliferation of networks
1983: deployment of TCP/IP
1982: smtp e-mail protocol defined
1983: DNS defined for name-to-IP-
address translation
1985: ftp protocol defined
1988: TCP congestion control
118
59
Lecture notes Telecommunication Systems by Jorma Kekalainen
Internet history
1990, 2000s: commercialization, the Web, new apps
119
Internet history
2010:
~1 billion hosts
Voice, Video over IP
YouTube, gaming
wireless, mobility
120
60
Lecture notes Telecommunication Systems by Jorma Kekalainen
Layers
Why layering?
Networks are complex! Question:
many pieces: Is there any hope of
hosts organizing structure
routers of network?
links of various
media Layers: each layer implements
a service
applications
via its own internal-
protocols layer actions
hardware, software relying on services
provided by layer below
122
61
Lecture notes Telecommunication Systems by Jorma Kekalainen
Why layering?
Dealing with complex systems
explicit structure allows identification and detect
relationship of complex systems pieces
modularization eases maintenance and updating of
system
change of implementation of layers service
transparent to rest of system
e.g., change in some layer procedure doesnt
affect rest of system
123
62
Lecture notes Telecommunication Systems by Jorma Kekalainen
Some protocols
TCP - Transmission Control Protocol
TCP is a reliable protocol used by the majority of applications
on the Internet .
It provides a connection-oriented, full-duplex, point to point
service between hosts.
In addition, flow control is provided which prevents TCP
endpoints from sending data to the network if the network is
experiencing congestion.
UDP - User Datagram Protocol
UDP is a standard, connectionless, host-to-host protocol.
UDP is typically used for real time applications.
IP - Internet Protocol
IP provides a connectionless datagram service between
networks.
IP Datagram can be defined as the fundamental unit of
information which is passed across the Internet.
It contains header information such as the source and
destination addresses along with the payload data.
PPP - Point to Point Protocol
The Point to Point Protocol was designed to provide router to
router and host to network connections
126
63
Lecture notes Telecommunication Systems by Jorma Kekalainen
Encapsulation
Lower layers deal with higher layer by
treat information from higher layer as black
box
dont look inside data
just treat as bunch of bits
just break data into blocks
encapsulate the blocks, by adding
headers (e.g. addresses)
trailers
when passing back to higher layer
layers strip headers
join blocks back together
127
message M
source
application
Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
128
64
Lecture notes Telecommunication Systems by Jorma Kekalainen
Physical
down to Physical layer,
explaining what expectations
from applications, and how
such services are implemented
Bottom Up
functions are implemented
Network
Link
Physical
65
Lecture notes Telecommunication Systems by Jorma Kekalainen
131
132
66
Lecture notes Telecommunication Systems by Jorma Kekalainen
133
Routing details
OSPF - Open Shortest Path First
Open Shortest Path First is a link state (each node possesses information
about the complete network topology), hierarchical IGP (Interior Gateway
Protocol) routing algorithm. Features supported by OSPF include least cost
routing, multipath routing and load balancing.
RIP - Routing Information Protocol
Routing Information Protocol is used to manage router information within a
self contained network such as a corporate LAN (Local Area Network) or an
interconnected group of such LAN. RIP is classified by the IETF (Internet
Engineering Task Force) as one of several internal gateway protocols called
IGP (Interior Gateway Protocols).
IGP - Interior Gateway Protocol
An Interior Gateway Protocol is used to exchange routing information within
an autonomous system.
AS Autonomous System
Autonomous system (Internet), a collection of IP networks and routers
under the control of one entity (typically an Internet service provider or a
very large organization with independent connections to multiple networks,
that adhere to a single and clearly defined routing policy)
EIGRP - Enhanced Interior Gateway Routing Protocol
An advanced version of Interior Gateway Routing Protocol. It provides
superior convergence properties and operating efficiency, and combines the
advantages of link state protocols with those of distance vector protocols
(in distance-vector routing protocols each router does not possess
information about the full network topology).
134
67
Lecture notes Telecommunication Systems by Jorma Kekalainen
135
68
Lecture notes Telecommunication Systems by Jorma Kekalainen
137
User Datagram Protocol (UDP), a simple transport protocol used in the Internet. The
Internet Control Message Protocol (ICMP) is chiefly to send error messages
indicating, for instance, that a requested service is not available or that a host or
router could not be reached. The Address Resolution Protocol (ARP) is a protocol for
determining a network host's link layer or hardware address when only its Internet
138
Layer (IP) or Network Layer address is known. Packet over SONET (POS)
69
Lecture notes Telecommunication Systems by Jorma Kekalainen
TCP/IP Encapsulation
Data segment
TCP segment
IP packet
Ethernet frame
139
TCP/IP operation
140
70
Lecture notes Telecommunication Systems by Jorma Kekalainen
Hourglass IP
robustness against
technological
innovations
anyone can innovate at
either end
new applications built
by anyone
new physical/link layers
allows huge
heterogeneity
success
141
Broken layering
TCP/IP layers are broken more often than not
ICMP (Internet Control Message Protocol) - uses
IP, but controls its operation
BGP (Border Gateway Protocol) is a routing
protocol (IP layer), but is routed
IP over ATM over IP over ATM over SONET
anything involving MPLS (Multiprotocol Label
Switching)
often services are provided at multiple layers:
error and flow control, e.g. error control in SONET (sort-
of physical), link layer, IP, TCP
Note: In this light 7-layer OSI model seems
to be too complicated
142
71
Lecture notes Telecommunication Systems by Jorma Kekalainen
End-to-end principle
Put functionality as high up the stack as
possible.
pushes functionality out towards the end points
results in
dumb network, smart terminals
contrast to PSTN (Telephone Network)
smart network, dumb terminals
also allows survival of partial network failures
e.g. link failure, we can reroute
143
Distributed control
anything centralized is vulnerable
distribute physical infrastucture
distribute network control
e.g. routing protocols
OSPF (Open Shortest Path First), IS-IS, BGP
(Border Gateway Protocol)
not everything can be completely
decentralized
e.g. NOC, NCC
still can provide redundancy
Intermediate system to intermediate system (IS-IS), is a protocol used by routers to determine the
best way to forward datagrams through a packet-switched network. IS-IS protocol was defined
within OSI reference design.
A network operations center (NOC) or Network Control Center (NCC) is one or more locations from
144
which control is exercised over a computer or telecommunications network.
72
Lecture notes Telecommunication Systems by Jorma Kekalainen
Top Down
and how such services are
Network implemented
Link
Physical
Application Layer
73
Lecture notes Telecommunication Systems by Jorma Kekalainen
Application layer
Principles of network applications
Brief survey of some applications
Web and HTTP
Electronic Mail
DNS
147
Network applications
e-mail voice over IP
web real-time video
instant messaging conferencing
remote login grid computing
P2P file sharing
multi-user network
games
streaming stored video
clips
148
74
Lecture notes Telecommunication Systems by Jorma Kekalainen
Application architectures
Client-server
Peer-to-peer (P2P)
Hybrid of client-server and P2P
150
75
Lecture notes Telecommunication Systems by Jorma Kekalainen
Client-server architecture
server:
always-on host
permanent IP address
server farms for
scaling
clients:
client/server communicate with server
may be intermittently
connected
may have dynamic IP
addresses
do not communicate
directly with each other
151
152
76
Lecture notes Telecommunication Systems by Jorma Kekalainen
Processes communicating
Process: program running Client process: process
within a host. that initiates
within same host, two
communication
processes communicate Server process: process
using inter-process that waits to be
communication (defined contacted
by OS).
processes in different Note: applications with
hosts communicate by P2P architectures have
exchanging messages client processes &
server processes
154
77
Lecture notes Telecommunication Systems by Jorma Kekalainen
Sockets
host or host or
process sends/receives server server
messages to/from its
socket controlled by
application developer
socket analogous to door process process
155
Addressing processes
to receive messages, identifier includes both
process must have IP address and port
identifier numbers associated with
host device has unique process on host.
32-bit IP address Example port numbers:
Q: does IP address of HTTP server: 80
host on which process Mail server: 25
runs suffice for to send HTTP message
identifying the to web server we need:
process? IP address: e.g.
A: No, many 128.119.245.12
processes can be Port number: 80
running on same host
156
78
Lecture notes Telecommunication Systems by Jorma Kekalainen
158
79
Lecture notes Telecommunication Systems by Jorma Kekalainen
159
80
Lecture notes Telecommunication Systems by Jorma Kekalainen
Application Underlying
Application layer protocol transport protocol
81
Lecture notes Telecommunication Systems by Jorma Kekalainen
HTTP overview
HTTP: hypertext
transfer protocol
Webs application layer HTTP request
protocol
HTTP response
client/server model PC
client: browser that
requests, receives, Server
displays Web objects
server: Web server
sends objects in
response to requests
163
HTTP overview
Uses TCP: HTTP is stateless
client initiates TCP server maintains no
connection (creates socket) information about
to server, port 80 past client requests
server accepts TCP
connection from client Note
Protocols that maintain
HTTP messages (application- state are complex!
layer protocol messages) past history (state) must
exchanged between browser be maintained
(HTTP client) and Web
if server/client crashes,
server (HTTP server)
their views of state may
TCP connection closed
be inconsistent, must be
reconciled
164
82
Lecture notes Telecommunication Systems by Jorma Kekalainen
HTTP connections
Nonpersistent HTTP Persistent HTTP
At most one object is Multiple objects can
sent over a TCP be sent over single
connection. TCP connection
between client and
server.
165
166
83
Lecture notes Telecommunication Systems by Jorma Kekalainen
messages SMTP
client: sending mail mail user
agent
server server
server: receiving mail
user
server agent
user
agent
167
168
84
Lecture notes Telecommunication Systems by Jorma Kekalainen
1 mail
mail
server user
user server
2 agent
agent 3 6
4
5
169
170
85
Lecture notes Telecommunication Systems by Jorma Kekalainen
171
DNS
DNS services Why not centralize DNS?
hostname to IP single point of failure
address translation traffic volume
host aliasing distant centralized
Canonical, alias names database
mail server aliasing maintenance
load distribution
replicated Web doesnt scale!
servers: set of IP
addresses for one
canonical name
172
86
Lecture notes Telecommunication Systems by Jorma Kekalainen
13 root name
servers worldwide
b USC-ISI Marina del Rey, CA
l ICANN Los Angeles, CA
174
87
Lecture notes Telecommunication Systems by Jorma Kekalainen
175
176
88
Lecture notes Telecommunication Systems by Jorma Kekalainen
resolution example
2
Host at cis.poly.edu 3
TLD DNS server
wants IP address for 4
gaia.cs.umass.edu 5
gaia.cs.umass.edu
177
DNS name
resolution example root DNS server
recursive query: 2 3
puts burden of name 6
7
resolution on
TLD DNS server
contacted name
server
heavy load? local DNS server
dns.poly.edu 5 4
1 8
gaia.cs.umass.edu
178
89
Lecture notes Telecommunication Systems by Jorma Kekalainen
179
Transport Layer
90
Lecture notes Telecommunication Systems by Jorma Kekalainen
181
182
91
Lecture notes Telecommunication Systems by Jorma Kekalainen
connection setup
unreliable, unordered
network
data link
physicalnetwork
delivery: UDP data link
physical
extension of best- network
data link
effort IP physical network
application
transport
data link network
services not available: physical data link
physical
delay guarantees
bandwidth guarantees
183
Multiplexing/demultiplexing
Demultiplexing at rcv host: Multiplexing at send host:
gathering data from multiple
delivering received segments
sockets, enveloping data with
to correct socket
header (later used for
demultiplexing)
= socket = process
P3 P1
P1 P2 P4 application
application application
host 2 host 3
host 1
184
92
Lecture notes Telecommunication Systems by Jorma Kekalainen
185
Connectionless demultiplexing
When host receives UDP
Create sockets with port
segment:
numbers:
DatagramSocket mySocket1 = new checks destination port
DatagramSocket(12534); number in segment
DatagramSocket mySocket2 = new directs UDP segment to
DatagramSocket(12535); socket with that port
number
UDP socket identified by
two-tuple: IP datagrams with
different source IP
(dest IP address, dest port number)
addresses and/or source
port numbers directed
to same socket
186
93
Lecture notes Telecommunication Systems by Jorma Kekalainen
Connectionless demux
DatagramSocket serverSocket = new DatagramSocket(6428);
P2 P1
P1
P3
187
Connection-oriented demux
TCP socket identified Server host may support
by 4-tuple: many simultaneous TCP
source IP address sockets:
source port number each socket identified by
dest IP address its own 4-tuple
dest port number Web servers have
receiver host uses all different sockets for
four values to direct each connecting client
segment to appropriate non-persistent HTTP will
socket have different socket for
each request
188
94
Lecture notes Telecommunication Systems by Jorma Kekalainen
Connection-oriented demux
P1 P4 P5 P6 P2 P1P3
SP: 5775
DP: 80
S-IP: B
D-IP:C
189
Internet transport
protocol Why is there a UDP?
best effort service, UDP no connection
segments may be: establishment (which can
lost add delay)
delivered out of order simple: no connection state
to app at sender, receiver
connectionless: small segment header
no handshaking between no congestion control: UDP
UDP sender, receiver can blast away as fast as
each UDP segment desired
handled independently
of others
190
95
Lecture notes Telecommunication Systems by Jorma Kekalainen
UDP (more)
often used for streaming
multimedia apps 32 bits
SNMP - Simple Network Management Protocol - is part of the TCP/IP suite and
191
is used to control and manage IP gateways and other network functions.
UDP checksum
Goal: detect errors (e.g., flipped bits) in transmitted
segment
Sender: Receiver:
treat segment contents compute checksum of
as sequence of 16-bit received segment
integers check if computed checksum
checksum: addition (1s equals checksum field value:
complement sum) of NO - error detected
segment contents YES - no error detected.
sender puts checksum But maybe errors
value into UDP checksum nonetheless?
field
192
96
Lecture notes Telecommunication Systems by Jorma Kekalainen
1 1 1 1 0 0 1 1 0 0 1 1 0 0 1 1 0
1 1 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1
wraparound 1 1 0 1 1 1 0 1 1 1 0 1 1 1 0 1 1
sum 1 1 0 1 1 1 0 1 1 1 0 1 1 1 1 0 0
checksum 1 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1
193
97
Lecture notes Telecommunication Systems by Jorma Kekalainen
98
Lecture notes Telecommunication Systems by Jorma Kekalainen
send receive
side side
198
99
Lecture notes Telecommunication Systems by Jorma Kekalainen
sender, receiver:
sender sends data into underlying channel
receiver read data from underlying channel
199
200
100
Lecture notes Telecommunication Systems by Jorma Kekalainen
201
rdt2.1: Discussion
Sender: Receiver:
seq # added to pkt must check if received
two seq. #s (0,1) will packet is duplicate
suffice. state indicates whether
0 or 1 is expected pkt
must check if received seq #
ACK/NAK corrupted
note: receiver can not
twice as many states know if its last
state must remember ACK/NAK received OK
whether current pkt
at sender
has 0 or 1 seq. #
202
101
Lecture notes Telecommunication Systems by Jorma Kekalainen
203
204
102
Lecture notes Telecommunication Systems by Jorma Kekalainen
rdt3.0 in action
205
rdt3.0 in action
206
103
Lecture notes Telecommunication Systems by Jorma Kekalainen
Performance of rdt3.0
L 8000 bits
d trans 8 microseconds
R 10 9 bps
U sender: utilization fraction of time sender busy sending
U L/R .008
sender
= = = 0.00027
RTT + L / R 30.008 microsec
1KB pkt every 30 msec -> 33kB/sec thruput over 1 Gbps link
network protocol limits use of physical resources!
Definition of RTT: time for a small packet to travel from client to server and207
back.
U L/R .008
sender
= = = 0.00027
RTT + L / R 30.008 microsec
208
104
Lecture notes Telecommunication Systems by Jorma Kekalainen
Pipelined protocols
Pipelining: sender allows multiple, in-flight, yet-to-
be-acknowledged pkts
range of sequence numbers must be increased
buffering at sender and/or receiver
Increase utilization
by a factor of 3!
U 3*L/R .024
sender
= = = 0.0008
RTT + L / R 30.008 microsecon
210
105
Lecture notes Telecommunication Systems by Jorma Kekalainen
Pipelining protocols
Go-back-N: big picture: Selective repeat: big
Sender can have up to picture
N unacked packets in Sender can have up to
pipeline N unacked packets in
Receiver only sends pipeline
cumulative acks Receiver acks
Doesnt ack packet if individual packets
theres a gap Sender maintains
Sender has timer for timer for each
oldest unacked packet unacked packet
If timer expires, When timer expires,
retransmit all unacked retransmit only unack
packets packet
211
212
106
Lecture notes Telecommunication Systems by Jorma Kekalainen
Go-Back-N
Sender:
k-bit seq # in pkt header
window of up to N, consecutive unacked pkts allowed
ACK(n): ACKs all pkts up to, including seq # n - cumulative ACK
may receive duplicate ACKs (see receiver)
timer for each in-flight pkt
timeout(n): retransmit pkt n and all higher seq # pkts in window
Receiver:
ACK-only: always send ACK for correctly-received pkt with
highest in-order seq #
may generate duplicate ACKs
need only remember expectedseqnum
out-of-order pkt:
discard (dont buffer) -> no receiver buffering!
Re-ACK pkt with highest in-order seq # 213
GBN in
action
214
107
Lecture notes Telecommunication Systems by Jorma Kekalainen
Selective repeat
receiver individually acknowledges all correctly
received pkts
buffers pkts, as needed, for eventual in-order delivery
to upper layer
sender only resends pkts for which ACK not
received
sender timer for each unACKed pkt
sender window
N consecutive seq #s
again limits seq #s of sent, unACKed pkts
215
Selective repeat
sender receiver
data from above : pkt n in [rcvbase, rcvbase+N-1]
if next available seq # in send ACK(n)
window, send pkt out-of-order: buffer
timeout(n): in-order: deliver (also
resend pkt n, restart timer deliver buffered, in-order
pkts), advance window to
ACK(n) in [sendbase,sendbase+N]: next not-yet-received pkt
mark pkt n as received
pkt n in [rcvbase-N,rcvbase-1]
if n smallest unACKed pkt,
ACK(n)
advance window base to
next unACKed seq # otherwise:
ignore
216
108
Lecture notes Telecommunication Systems by Jorma Kekalainen
overwhelm receiver
door door
TCP TCP
send buffer receive buffer
segment
217
RST (1 bit) Reset the connection, SYN (1 bit) Synchronize sequence numbers,
218
FIN (1 bit) No more data from sender
109
Lecture notes Telecommunication Systems by Jorma Kekalainen
unnecessary
estimated RTT smoother
retransmissions average several recent
220
110
Lecture notes Telecommunication Systems by Jorma Kekalainen
221
222
111
Lecture notes Telecommunication Systems by Jorma Kekalainen
DevRTT = (1-)*DevRTT +
*|SampleRTT-EstimatedRTT|
(typically, = 0.25)
223
224
112
Lecture notes Telecommunication Systems by Jorma Kekalainen
225
X
loss
Sendbase
= 100
Seq=92 timeout
SendBase
= 120
SendBase
= 100 SendBase
= 120 premature timeout
time time
lost ACK scenario 226
113
Lecture notes Telecommunication Systems by Jorma Kekalainen
X
loss
SendBase
= 120
time
Cumulative ACK scenario
227
228
114
Lecture notes Telecommunication Systems by Jorma Kekalainen
Fast retransmit
Time-out period often If sender receives 3
relatively long: ACKs for the same
long delay before data, it supposes that
resending lost packet segment after ACKed
Detect lost segments data was lost:
via duplicate ACKs. fast retransmit: resend
Sender often sends segment before timer
many segments back-to- expires
back
If segment is lost,
there will likely be many
duplicate ACKs.
229
Host A Host B
X
timeout
time
115
Lecture notes Telecommunication Systems by Jorma Kekalainen
speed-matching
service: matching the
send rate to the
receiving apps drain
rate
application process
may be slow at reading
from buffer
231
232
116
Lecture notes Telecommunication Systems by Jorma Kekalainen
seq. #s no data
233
close
client closes socket:
clientSocket.close();
234
117
Lecture notes Telecommunication Systems by Jorma Kekalainen
timed wait
Note: with small
closed
modification, can handle
simultaneous FINs.
closed
235
TCP server
lifecycle
TCP client
lifecycle
236
118
Lecture notes Telecommunication Systems by Jorma Kekalainen
Congestion:
informally: too many sources sending too much
data too fast for network to handle
different from flow control!
manifestations:
lost packets (buffer overflow at routers)
long delays (queueing in router buffers)
a top-10 problem!
237
receivers
unlimited shared
one router,
Host B
output link buffers
infinite buffers
no retransmission
large delays
when congested
maximum
achievable
throughput
238
119
Lecture notes Telecommunication Systems by Jorma Kekalainen
239
R/3
out
out
out
R/4
a. b. c.
costs of congestion:
more work (retrans) for given goodput
unneeded retransmissions: link carries multiple copies of pkt
240
120
Lecture notes Telecommunication Systems by Jorma Kekalainen
Host B
241
H
o
s
t
B
242
121
Lecture notes Telecommunication Systems by Jorma Kekalainen
243
244
122
Lecture notes Telecommunication Systems by Jorma Kekalainen
245
24 Kbytes
behavior: probing
for bandwidth 8 Kbytes
time
time
The Maximum segment size (MSS) is the largest amount of data, specified in bytes, that TCP is
willing to send in a single segment. For best performance, the MSS should be set small enough to
246
avoid IP fragmentation, which can lead to excessive retransmissions if there is packet loss.
123
Lecture notes Telecommunication Systems by Jorma Kekalainen
248
124
Lecture notes Telecommunication Systems by Jorma Kekalainen
RTT
first loss event:
double CongWin every
RTT
done by incrementing
CongWin for every ACK
received
Summary: initial rate
is slow but ramps up
exponentially fast time
249
250
125
Lecture notes Telecommunication Systems by Jorma Kekalainen
Refinement
Q: When should the
exponential
increase switch to
linear?
A: When CongWin
gets to 1/2 of its
value before
timeout.
Implementation:
Variable Threshold
At loss event, Threshold is
set to 1/2 of CongWin just
before loss event
251
252
126
Lecture notes Telecommunication Systems by Jorma Kekalainen
253
TCP throughput
Whats the average throughout of TCP as a
function of window size and RTT?
Ignore slow start
Let W be the window size when loss occurs.
When window is W, throughput is W/RTT
Just after loss, window drops to W/2,
throughput to W/2RTT.
Average throughout: .75 W/RTT
254
127
Lecture notes Telecommunication Systems by Jorma Kekalainen
TCP fairness
Fairness goal: if K TCP sessions share same
bottleneck link of bandwidth R, each should have
average rate of R/K
TCP connection 1
bottleneck
TCP
router
connection 2
capacity R
255
Fairness (more)
Fairness and UDP Fairness and parallel TCP
connections
Multimedia apps often
do not use TCP nothing prevents app from
do not want rate opening parallel
throttled by congestion connections between 2
control hosts.
Instead use UDP: Web browsers do this
pump audio/video at Example: link of rate R
constant rate, tolerate supporting 9 connections;
packet loss
new app asks for 1 TCP, gets
Research area: TCP rate R/10
friendly new app asks for 11 TCPs,
gets R/2 !
256
128
Lecture notes Telecommunication Systems by Jorma Kekalainen
Network Layer
Network layer
transport segment from application
transport
encapsulates segments
network physical
physical
data link
physical
into datagrams
network network
data link data link
physical physical
129
Lecture notes Telecommunication Systems by Jorma Kekalainen
259
routing algorithm
value in arriving
packets header
0111 1
3 2
260
130
Lecture notes Telecommunication Systems by Jorma Kekalainen
Connection setup
important function in some network architectures:
ATM, frame relay, X.25
before datagrams flow, two end hosts and intervening
routers establish virtual connection
routers get involved
network vs transport layer connection service:
network: between two hosts (may also involve
intervening routers in case of VCs)
transport: between two processes
261
The X.25 protocol is a widely available, low speed, packet switched data service.
262
131
Lecture notes Telecommunication Systems by Jorma Kekalainen
ABR (Available Bit Rate) is QoS (Quality of Service) class used for connections that do not
require timing relationships between source and destination. ABR provides no guarantees in
terms of cell loss or delay, providing only best-effort service. Unspecified Bit Rate - 263
(UBR)
132
Lecture notes Telecommunication Systems by Jorma Kekalainen
Virtual circuits
source-to-dest path behaves much like telephone
circuit
performance-wise
network actions along source-to-destination path
call setup, teardown for each call before data can flow
each packet carries VC identifier (not destination host
address)
every router on source-destination path maintains state
for each passing connection
link, router resources (bandwidth, buffers) may be
allocated to VC (dedicated resources = predictable service)
265
VC implementation
a VC consists of:
1. path from source to destination
2. VC numbers, one number for each link along
path
3. entries in forwarding tables in routers along
path
packet belonging to VC carries VC number
(rather than destination address)
VC number can be changed on each link.
New VC number comes from forwarding table
266
133
Lecture notes Telecommunication Systems by Jorma Kekalainen
ForwardingVCtable
number
12 22 32
1 3
2
1 12 3 22
2 63 1 18
3 7 2 17
1 97 3 87
application
6. Receive data application
transport 5. Data flow begins
network 4. Call connected 3. Accept call transport
data link 1. Initiate call 2. incoming call network
data link
physical
physical
268
134
Lecture notes Telecommunication Systems by Jorma Kekalainen
Datagram networks
no call setup at network layer
routers: no state about end-to-end connections
no network-level concept of connection
application
application
transport
transport
network
data link 1. Send data 2. Receive data network
data link
physical
physical
269
Datagram or VC network?
135
Lecture notes Telecommunication Systems by Jorma Kekalainen
271
More of router architecture on Switching Systems course!
Link layer
physical layer
136
Lecture notes Telecommunication Systems by Jorma Kekalainen
IP datagram format
IP protocol version 32 bits
number total datagram
header length length (bytes)
ver head. type of length
(bytes) len service for
type of data fragment fragmentation/
16-bit identifier flgs
offset reassembly
max number time to upper header
remaining hops live layer checksum
(decremented at
32 bit source IP address
each router)
32 bit destination IP address
upper layer protocol
to deliver payload to Options (if any) E.g. timestamp,
record route
how much overhead data taken, specify
with TCP? (variable length, list of routers
20 bytes of TCP typically a TCP to visit.
or UDP segment)
20 bytes of IP
= 40 bytes + app
layer overhead
MTU - Maximum Transmission Unit is defined as the maximum packet size (in
bytes or octets), that a particular interface can handle. For example, the MTU for
274
Ethernet is 1500 bytes.
137
Lecture notes Telecommunication Systems by Jorma Kekalainen
IP addressing: Introduction
IP address: 32-bit 223.1.1.1
275
Subnets
IP address: 223.1.1.1
276
138
Lecture notes Telecommunication Systems by Jorma Kekalainen
Subnets
223.1.1.0/24
223.1.2.0/24
Recipe
To determine the
subnets, detach each
interface from its
host or router,
creating islands of
isolated networks.
Each isolated network
is called a subnet.
223.1.3.0/24
Example: Subnets
223.1.1.2
223.1.1.3
223.1.9.2 223.1.7.0
223.1.9.1 223.1.7.1
223.1.8.1 223.1.8.0
223.1.2.6 223.1.3.27
139
Lecture notes Telecommunication Systems by Jorma Kekalainen
IP addressing: CIDR
CIDR: Classless InterDomain Routing
subnet portion of address of arbitrary length
address format: a.b.c.d/x, where x is # bits in
subnet portion of address
subnet host
part part
11001000 00010111 00010000 00000000
200.23.16.0/23
279
140
Lecture notes Telecommunication Systems by Jorma Kekalainen
141
Lecture notes Telecommunication Systems by Jorma Kekalainen
283
Organization 0
200.23.16.0/23
Organization 1
Send me anything
200.23.18.0/23 with addresses
Organization 2 beginning
200.23.20.0/23 . ISP1 200.23.16.0/20
.
. . Internet
.
Organization 7 .
200.23.30.0/23
Send me anything
ISP2
with addresses
beginning
199.31.0.0/16
284
142
Lecture notes Telecommunication Systems by Jorma Kekalainen
IP addressing
285
10.0.0.4
10.0.0.2
138.76.29.7
10.0.0.3
143
Lecture notes Telecommunication Systems by Jorma Kekalainen
287
144
Lecture notes Telecommunication Systems by Jorma Kekalainen
145
Lecture notes Telecommunication Systems by Jorma Kekalainen
146
Lecture notes Telecommunication Systems by Jorma Kekalainen
2. connection to
relay initiated 1. connection to
by client relay initiated
10.0.0.1
by NATted host
3. relaying
Client
established
138.76.29.7 NAT
router
147
Lecture notes Telecommunication Systems by Jorma Kekalainen
IPv6
Initial motivation: 32-bit address space soon
to be completely allocated.
Additional motivation:
header format helps speed processing/forwarding
header changes to facilitate QoS
IPv6 datagram format:
fixed-length 40 byte header
no fragmentation allowed
295
IPv6 header
Priority: identify priority among datagrams in flow
Flow Label: identify datagrams in same flow.
(concept offlow not well defined).
Next header: identify upper layer protocol for data
296
148
Lecture notes Telecommunication Systems by Jorma Kekalainen
297
A B E F
Physical view:
IPv6 IPv6 IPv4 IPv4 IPv6 IPv6
298
149
Lecture notes Telecommunication Systems by Jorma Kekalainen
Tunneling
A B tunnel
E F
Logical view:
IPv6 IPv6 IPv6 IPv6
A B C D E F
Physical view:
IPv6 IPv6 IPv4 IPv4 IPv6 IPv6
data data
A-to-B: E-to-F:
B-to-C: B-to-C:
IPv6 IPv6
IPv6 inside IPv6 inside
IPv4 IPv4
299
routing algorithm
value in arriving
packets header
0111 1
3 2
300
150
Lecture notes Telecommunication Systems by Jorma Kekalainen
151
Lecture notes Telecommunication Systems by Jorma Kekalainen
152
Lecture notes Telecommunication Systems by Jorma Kekalainen
305
153
Lecture notes Telecommunication Systems by Jorma Kekalainen
layer
host
attaches into hosts system controller
bus
buses
(e.g., PCI)
link
physical
combination of hardware, physical
transmission
software, firmware
PCMCIA - Personal Computer Memory Card network adapter
International Association card
Adapters communicate
datagram datagram
controller controller
frame
154
Lecture notes Telecommunication Systems by Jorma Kekalainen
otherwise
309
Parity checking
Single Bit Parity: Two Dimensional Bit Parity:
Detect single bit errors Detect and correct single bit errors
0 0
310
155
Lecture notes Telecommunication Systems by Jorma Kekalainen
Internet checksum
Goal: detect errors (e.g., flipped bits) in transmitted
packet (note: used at transport layer only)
Sender: Receiver:
compute checksum of
treat segment contents
as sequence of 16-bit received segment
integers check if computed checksum
311
156
Lecture notes Telecommunication Systems by Jorma Kekalainen
CRC example
Want:
D.2r XOR R = nG
equivalently:
D.2r = nG XOR R
equivalently:
if we divide D.2r by
G, want remainder R
D.2r
R = remainder[ ]
G
humans at a
shared wire (e.g., shared RF shared RF cocktail party
cabled Ethernet) (e.g., 802.11 WiFi) (satellite) (shared air, acoustical)
314
157
Lecture notes Telecommunication Systems by Jorma Kekalainen
315
316
158
Lecture notes Telecommunication Systems by Jorma Kekalainen
Taking turns
nodes take turns, but nodes with more to send can take
longer turns
317
318
159
Lecture notes Telecommunication Systems by Jorma Kekalainen
frequency bands
FDM cable
319
160
Lecture notes Telecommunication Systems by Jorma Kekalainen
Slotted ALOHA
Assumptions: Operation:
all frames same size when node obtains fresh
time divided into equal frame, transmits in next
size slots (time to slot
transmit 1 frame) if no collision: node can
nodes start to transmit send new frame in next
only slot beginning slot
nodes are synchronized if collision: node
if 2 or more nodes
retransmits frame in
transmit in slot, all each subsequent slot
nodes detect collision with prob. p until
success
Slotted ALOHA
Pros Cons
single active node can collisions, wasting slots
continuously transmit idle slots
at full rate of channel nodes may be able to
highly decentralized: detect collision in less
only slots in nodes than time to transmit
packet
need to be in sync
clock synchronization
simple
322
161
Lecture notes Telecommunication Systems by Jorma Kekalainen
!
prob that given node At best: channel
has success in a slot = used for useful
p(1-p)N-1 transmissions 37%
prob that any node has of time!
a success = Np(1-p)N-1
323
324
162
Lecture notes Telecommunication Systems by Jorma Kekalainen
= 1/(2e) = .18
325
326
163
Lecture notes Telecommunication Systems by Jorma Kekalainen
CSMA collisions
spatial layout of nodes
collisions can still occur:
propagation delay means
two nodes may not hear
each others transmission
collision:
entire packet transmission
time wasted
note:
role of distance & propagation
delay in determining collision
probability
328
164
Lecture notes Telecommunication Systems by Jorma Kekalainen
165
Lecture notes Telecommunication Systems by Jorma Kekalainen
concerns:
polling overhead
latency slaves
single point of
failure (master)
331
data
332
166
Lecture notes Telecommunication Systems by Jorma Kekalainen
taking turns
polling from central site, token passing
Bluetooth, FDDI, IBM Token Ring
Bluetooth is a technical specification to standardize wireless transmission between a variety
of devices such as tablets, mobile phones, laptops, printers etc. The system operates at
2.45GHz over distances of ~10m and offers a gross data rate of 1Mbps.
FDDI - Fiber Distributed Data Interface - is a 100Mbps fiber optic LAN (Local Area
Network) technology employing two fiber rings and token passing technology in order to allow
333
hosts to access the network.
MAC addresses
32-bit IP address:
network-layer address
used to get datagram to destination IP subnet
334
167
Lecture notes Telecommunication Systems by Jorma Kekalainen
LAN addresses
Each adapter on LAN has unique LAN address
LAN
(wired or = adapter
wireless)
71-65-F7-2B-08-53
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
335
336
168
Lecture notes Telecommunication Systems by Jorma Kekalainen
0C-C4-11-6F-E3-98
137.196.7.88
337
338
169
Lecture notes Telecommunication Systems by Jorma Kekalainen
A E6-E9-00-17-BB-4B
222.222.222.221
1A-23-F9-CD-06-9B
111.111.111.111
222.222.222.220 222.222.222.222
111.111.111.110
B
111.111.111.112
R 49-BD-D2-C7-56-2A
CC-49-DE-D0-AB-7D
339
A
E6-E9-00-17-BB-4B
222.222.222.221
1A-23-F9-CD-06-9B
111.111.111.111
222.222.222.220 222.222.222.222
111.111.111.110 B
111.111.111.112
R 49-BD-D2-C7-56-2A
CC-49-DE-D0-AB-7D
340
170
Lecture notes Telecommunication Systems by Jorma Kekalainen
Ethernet
dominant wired LAN technology:
cheap $20 for NIC
first widely used LAN technology
simpler, cheaper than token LANs and ATM
kept up with speed race: 10 Mbps 10 Gbps
341
Star topology
bus topology popular through mid 90s
all nodes in same collision domain (can collide with each
other)
today: star topology prevails
active switch in center
each spoke runs a (separate) Ethernet protocol (nodes
do not collide with each other)
switch
171
Lecture notes Telecommunication Systems by Jorma Kekalainen
Preamble:
7 bytes with pattern 10101010 followed by one
byte with pattern 10101011
used to synchronize receiver, sender clock rates
343
344
172
Lecture notes Telecommunication Systems by Jorma Kekalainen
345
346
173
Lecture notes Telecommunication Systems by Jorma Kekalainen
Ethernets CSMA/CD
Jam Signal: make sure all Exponential Backoff:
other transmitters are Goal: adapt retransmission
aware of collision; 48 bits attempts to estimated
Bit time: .1 microsec for 10 current load
Mbps Ethernet ; heavy load: random wait
for K=1023, wait time is will be longer
about 50 msec first collision: choose K from
{0,1}; delay is K 512 bit
transmission times
after second collision: choose
K from {0,1,2,3}
after ten collisions, choose K
from {0,1,2,3,4,,1023}
347
CSMA/CD efficiency
Tprop = max prop delay between 2 nodes in LAN
ttrans = time to transmit max-size frame
1
efficiency
1 5t prop /ttrans
efficiency goes to 1
as tprop goes to 0
as ttrans goes to infinity
174
Lecture notes Telecommunication Systems by Jorma Kekalainen
MAC protocol
application and frame format
transport
network 100BASE-TX 100BASE-T2 100BASE-FX
link 100BASE-T4 100BASE-SX 100BASE-BX
physical
Manchester encoding
used in 10BaseT
each bit has a transition
allows clocks in sending and receiving nodes to
synchronize to each other
no need for a centralized, global clock among nodes!
350
175
Lecture notes Telecommunication Systems by Jorma Kekalainen
Hubs
physical-layer (dumb) repeaters:
bits coming in one link go out all other links at
same rate
all nodes connected to hub can collide with one
another
no frame buffering
no CSMA/CD at hub: host NICs detect
collisions
twisted pair
hub
351
Switch
link-layer device: smarter than hubs, take
active role
store, forward Ethernet frames
examine incoming frames MAC address,
selectively forward frame to one-or-more
outgoing links when frame is to be forwarded on
segment, uses CSMA/CD to access segment
transparent
hosts are unaware of presence of switches
plug-and-play, self-learning
switches do not need to be configured
352
176
Lecture notes Telecommunication Systems by Jorma Kekalainen
353
Switch table
A
Q: how does switch know that
C
A reachable via interface 4, B
B reachable via interface 5?
1 2
A: each switch has a switch 6 3
table, each entry: 5 4
(MAC address of host, interface
to reach host, time stamp) C
354
177
Lecture notes Telecommunication Systems by Jorma Kekalainen
A A A
switch learns which hosts
C
can be reached through B
which interfaces
1 2
when frame received, 6 3
switch learns location of
5 4
sender: incoming LAN
segment
C
records sender/location
pair in switch table B A
355
178
Lecture notes Telecommunication Systems by Jorma Kekalainen
Source: A
Example: Self-learning, Dest: A
forwarding A A A
C B
frame destination 1 2
unknown: flood A6A 3
5 4
destination A
location known: C
A A
selective send
B A
357
Interconnecting switches
switches can be connected together
S4
S1
S3
A S2
F
C D I
B
E G H
179
Lecture notes Telecommunication Systems by Jorma Kekalainen
1 S4
S1 2 S3
A S2
F
D I
B C
G H
E
359
Institutional network
mail server
to external
network
router web server
IP subnet
360
180
Lecture notes Telecommunication Systems by Jorma Kekalainen
361
362
181
Lecture notes Telecommunication Systems by Jorma Kekalainen
PPP non-requirements
no error correction/recovery
no flow control
out of order delivery OK
no need to support multipoint links (e.g., polling)
182
Lecture notes Telecommunication Systems by Jorma Kekalainen
183
Lecture notes Telecommunication Systems by Jorma Kekalainen
Byte stuffing
data transparency requirement: data field must
be allowed to include flag pattern <01111110>
Q: is received <01111110> data or flag?
367
Byte stuffing
flag byte
pattern
in data
to send
368
184
Lecture notes Telecommunication Systems by Jorma Kekalainen
Virtualization of networks
370
185
Lecture notes Telecommunication Systems by Jorma Kekalainen
ARPAnet
satellite net
"A Protocol for Packet Network Intercommunication",
V. Cerf, R. Kahn, IEEE Transactions on Communications,
371
May, 1974, pp. 637-648.
gateway
372
186
Lecture notes Telecommunication Systems by Jorma Kekalainen
187
Lecture notes Telecommunication Systems by Jorma Kekalainen
375
ATM architecture
AAL AAL
188
Lecture notes Telecommunication Systems by Jorma Kekalainen
377
AAL AAL
189
Lecture notes Telecommunication Systems by Jorma Kekalainen
ATM layer
Service: transport cells across ATM network
analogous to IP network layer
very different services than IP network layer
Guarantees ?
Network Service Congestion
Architecture Model Bandwidth Loss Order Timing feedback
190
Lecture notes Telecommunication Systems by Jorma Kekalainen
381
ATM VCs
Advantages of ATM VC approach:
QoS performance guarantee for connection
mapped to VC (bandwidth, delay, delay jitter)
Drawbacks of ATM VC approach:
Inefficient support of datagram traffic
one PVC between each source/dest pair) does
not scale (N*2 connections needed)
SVC introduces call setup latency, processing
overhead for short lived connections
191
Lecture notes Telecommunication Systems by Jorma Kekalainen
Cell header
Cell format
383
384
Resource Management records (RM-cells)
192
Lecture notes Telecommunication Systems by Jorma Kekalainen
TCS Functions:
Header checksum generation: 8 bits CRC
Cell delineation
With unstructured PMD sublayer, transmission
of idle cells when no data cells to send
385
386
193
Lecture notes Telecommunication Systems by Jorma Kekalainen
IP-over-ATM
IP over ATM
Classic IP only replace network
3 networks (e.g., (e.g., LAN segment)
LAN segments) with ATM network
MAC (802.3) and IP ATM addresses, IP
addresses addresses
ATM
network
Ethernet Ethernet
LANs LANs 387
IP-over-ATM
app
app transport
transport IP IP
IP AAL AAL
Eth Eth ATM
ATM
phy phy phy ATM phy
phy
ATM
phy
388
194
Lecture notes Telecommunication Systems by Jorma Kekalainen
389
IP-over-ATM
Issues: ATM
IP datagrams into network
ATM AAL5 PDUs
from IP addresses
to ATM addresses
just like IP
addresses to
Ethernet
802.3 MAC LANs
addresses!
390
195
Lecture notes Telecommunication Systems by Jorma Kekalainen
PPP or Ethernet
MPLS header IP header remainder of link-layer frame
header
20 3 1 5
196
Lecture notes Telecommunication Systems by Jorma Kekalainen
8 A 1 10 6 A 1
12 9 D 0
R6
0 0
D
1 1
R4 R3
R5
0 0
A
R2 in outR1 out
label label dest interface
in out out
label label dest interface 6 - A 0
8 6 A 0
393
Telecommunication Systems
394
197
Lecture notes Telecommunication Systems by Jorma Kekalainen
Physical layer
Function: Transmission of raw bit stream
between devices.
Services: Physical connection, modulation
Issues: # pins/wires, duplex, serial/parallel,
modulation
Media:
copper wire: e.g. coax, twisted pair
fibre optics
free air optics
microwave, satellite,
infra-red
395
396
198
Lecture notes Telecommunication Systems by Jorma Kekalainen
397
Guided media
Guided media, which are those that provide
a conduit from one device to another,
include twisted-pair cable, coaxial cable,
and fiber-optic cable.
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
398
199
Lecture notes Telecommunication Systems by Jorma Kekalainen
Twisted-pair cable
399
400
200
Lecture notes Telecommunication Systems by Jorma Kekalainen
401
UTP connector
402
201
Lecture notes Telecommunication Systems by Jorma Kekalainen
UTP performance
403
Note: Gauge is a measure of the thickness of the wire.
Coaxial cable
404
202
Lecture notes Telecommunication Systems by Jorma Kekalainen
405
BNC connectors
406
203
Lecture notes Telecommunication Systems by Jorma Kekalainen
407
408
204
Lecture notes Telecommunication Systems by Jorma Kekalainen
Optical fiber
409
Propagation modes
410
205
Lecture notes Telecommunication Systems by Jorma Kekalainen
Modes
411
Fiber types
412
206
Lecture notes Telecommunication Systems by Jorma Kekalainen
Fiber construction
413
414
207
Lecture notes Telecommunication Systems by Jorma Kekalainen
415
416
208
Lecture notes Telecommunication Systems by Jorma Kekalainen
417
Propagation methods
418
209
Lecture notes Telecommunication Systems by Jorma Kekalainen
Bands
419
420
210
Lecture notes Telecommunication Systems by Jorma Kekalainen
Omnidirectional antenna
421
Note
422
211
Lecture notes Telecommunication Systems by Jorma Kekalainen
Unidirectional antennas
423
Note
424
212
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
425
426
213
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
427
428
214
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
429
Note
430
215
Lecture notes Telecommunication Systems by Jorma Kekalainen
431
Note
432
216
Lecture notes Telecommunication Systems by Jorma Kekalainen
433
A sine wave
434
217
Lecture notes Telecommunication Systems by Jorma Kekalainen
435
436
218
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
437
438
219
Lecture notes Telecommunication Systems by Jorma Kekalainen
439
Note
220
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
441
Note
442
221
Lecture notes Telecommunication Systems by Jorma Kekalainen
443
Example
A sine wave is offset 1/6 cycle with respect to
time 0. What is its phase in degrees and radians?
Solution
We know that 1 complete cycle is 360.
Therefore, 1/6 cycle is
444
222
Lecture notes Telecommunication Systems by Jorma Kekalainen
445
446
223
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
447
Example
The frequency domain is more compact and useful when we
are dealing with more than one sine wave.
For example, Figure shows three sine waves, each with
different amplitude and frequency.
All can be represented by three spikes in the frequency
domain.
448
224
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
449
Note
450
225
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
451
Example
Figure shows a periodic composite signal with
frequency f.
452
226
Lecture notes Telecommunication Systems by Jorma Kekalainen
453
454
227
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
455
456
228
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
If a periodic signal is decomposed into five sine
waves with frequencies of 100, 300, 500, 700,
and 900 Hz, what is its bandwidth? Draw the
spectrum, assuming all components have a
maximum amplitude of 10 V.
Solution
Let fh be the highest frequency, fl the lowest
frequency, and B the bandwidth. Then
457
Bandwidth
458
229
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A nonperiodic composite signal has a bandwidth of 200
kHz, with a middle frequency of 140 kHz and peak
amplitude of 20 V. The two extreme frequencies have an
amplitude of 0. Draw the frequency domain of the signal.
Solution
The lowest frequency must be at 40 kHz and the highest
at 240 kHz. Figure 3.15 shows the frequency domain and
the bandwidth.
459
AM signal
An example of a nonperiodic composite
signal is the signal propagated by an AM
radio station.
Each AM radio station is assigned a 10-kHz
bandwidth.
The total bandwidth dedicated to AM radio
ranges from 530 to 1700 kHz.
460
230
Lecture notes Telecommunication Systems by Jorma Kekalainen
FM signal
Another example of a nonperiodic
composite signal is the signal propagated
by an FM radio station.
Each FM radio station is assigned a 200-
kHz bandwidth.
The total bandwidth dedicated to FM radio
ranges from 88 to 108 MHz.
461
Analog TV bandwidth
Another example of a nonperiodic composite signal is the
signal received by an old-fashioned analog black-and-white
TV.
A TV screen is made up of pixels.
If we assume a resolution of 525 700, we have 367,500
pixels per screen.
If we scan the screen 30 times per second, this is 367,500
30 = 11,025,000 pixels per second.
The worst-case scenario is alternating black and white
pixels.
We can send 2 pixels per cycle.
Therefore, we need 11,025,000 / 2 = 5,512,500 cycles per
second, or Hz.
The bandwidth needed is about 5.5 MHz.
462
231
Lecture notes Telecommunication Systems by Jorma Kekalainen
Digital signals
In addition to being represented by an
analog signal, information can also be
represented by a digital signal.
For example, a 1 can be encoded as a
positive voltage and a 0 as zero voltage.
A digital signal can have more than two
levels.
In this case, we can send more than 1 bit
for each level.
463
Two digital signals: one with two signal levels and the other
with four signal levels
464
232
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A digital signal has eight levels. How many bits
are needed per level? We calculate the number of
bits from the formula
465
Example
Assume we need to download text documents at
the rate of 100 pages per second. What is the
required bit rate of the channel?
Solution
A page is an average of 24 lines with 80
characters in each line. If we assume that one
character requires 8 bits, the bit rate is
10024808=1.536 Mbps
466
233
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A digitized voice channel, is made by digitizing a
4-kHz bandwidth analog voice signal. We need to
sample the signal at twice the highest frequency
(two samples per hertz). We assume that each
sample requires 8 bits. What is the required bit
rate?
Solution
The bit rate can be calculated as
467
Example
What is the bit rate for high-definition TV
(HDTV)?
Solution
HDTV uses digital signals to broadcast high
quality video signals. The HDTV screen is normally
a ratio of 16 : 9. There are 1920 by 1080 pixels
per screen, and the screen is renewed 30 times
per second. Twenty-four bits represents one
color pixel.
234
Lecture notes Telecommunication Systems by Jorma Kekalainen
469
Baseband transmission
470
235
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
471
472
236
Lecture notes Telecommunication Systems by Jorma Kekalainen
473
Note
474
237
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
An example of a dedicated channel where the
entire bandwidth of the medium is used as one
single channel is a LAN.
Almost every wired LAN today uses a dedicated
channel for two stations communicating with each
other.
In a bus topology LAN with multipoint connections,
only two stations can communicate with each other
at each moment in time (timesharing); the other
stations need to refrain from sending data.
In a star topology LAN, the entire channel
between each station and the hub is used for
communication between these two entities.
475
476
238
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
In baseband transmission, the required bandwidth is
In baseband transmission,
proportional the required
to the bit rate;
bandwidth is proportional
if we need to send tomore
bits faster, we need thebandwidth.
bit rate;
if we need to send bits faster, we need
more bandwidth.
477
Bandwidth requirements
478
239
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
What is the required bandwidth of a low-pass channel if we
need to send 1 Mbps by using baseband transmission?
Solution
The answer depends on the accuracy desired.
a. The minimum bandwidth, is B = bit rate /2, or 500 kHz.
479
Example
Solution
The maximum bit rate can be achieved if we use
the first harmonic. The bit rate is 2 times the
available bandwidth, or 200 kbps.
480
240
Lecture notes Telecommunication Systems by Jorma Kekalainen
481
Note
482
241
Lecture notes Telecommunication Systems by Jorma Kekalainen
483
Example
An example of transmission using modulation is the
sending of computer data through a telephone
subscriber line, the line connecting a resident to
the central telephone office.
These lines are designed to carry voice with a
limited bandwidth.
The channel is considered a bandpass channel.
We convert the digital signal from the computer
to an analog signal, and send the analog signal.
We can install two converters to change the
digital signal to analog and vice versa at the
receiving end.
The converter, in this case, is called a modem.
484
242
Lecture notes Telecommunication Systems by Jorma Kekalainen
Transmission impairment
Signals travel through transmission media,
which are not perfect.
The imperfection causes signal impairment.
This means that the signal at the beginning
of the medium is not the same as the signal
at the end of the medium.
What is sent is not what is received.
Three causes of impairment are
attenuation, distortion, and noise.
485
Causes of impairment
486
243
Lecture notes Telecommunication Systems by Jorma Kekalainen
Attenuation
487
Example
Suppose a signal travels through a transmission
medium and its power is reduced to one-half. This
means that P2 is (1/2)P1. In this case, the
attenuation (loss of power) can be calculated as
244
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A signal travels through an amplifier, and its
power is increased 10 times. This means that P2 =
10P1 . In this case, the amplification (gain of
power) can be calculated as
489
Example
One reason that engineers use the decibel to measure the
changes in the strength of a signal is that decibel numbers
can be added (or subtracted) when we are measuring
several points (cascading) instead of just two. In Figure a
signal travels from point 1 to point 4. In this case, the
decibel value can be calculated as
490
245
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
Sometimes the decibel is used to measure signal
power in milliwatts. In this case, it is referred to
as dBm and is calculated as dBm = 10 log10 Pm ,
where Pm is the power in milliwatts. Calculate the
power of a signal with dBm = 30.
Solution
We can calculate the power in the signal as
491
Example
The loss in a cable is usually defined in decibels
per kilometer (dB/km). If the signal at the
beginning of a cable with 0.3 dB/km has a power
of 2 mW, what is the power of the signal at 5 km?
Solution
The loss in the cable in decibels is 5 (0.3) =
1.5 dB. We can calculate the power as
492
246
Lecture notes Telecommunication Systems by Jorma Kekalainen
Distortion
493
Noise
494
247
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
The power of a signal is 10 mW and the power of
the noise is 1 W; what are the values of SNR and
SNRdB ?
Solution
The values of SNR and SNRdB can be calculated as
follows:
495
Example
The values of SNR and SNRdB for a noiseless
channel are
496
248
Lecture notes Telecommunication Systems by Jorma Kekalainen
497
498
249
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
499
Example
Does the Nyquist theorem bit rate agree with the
intuitive bit rate described in baseband transmission?
Solution
They match when we have only two levels. We said, in
baseband transmission, the bit rate is 2 times the
bandwidth if we use only the first harmonic in the worst
case. However, the Nyquist formula is more general than
what we derived intuitively; it can be applied to baseband
transmission and modulation. Also, it can be applied when
we have two or more levels of signals.
500
250
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
Consider a noiseless channel with a bandwidth of
3000 Hz transmitting a signal with two signal
levels. The maximum bit rate can be calculated as
501
Example
Consider the same noiseless channel transmitting
a signal with four signal levels (for each level, we
send 2 bits). The maximum bit rate can be
calculated as
502
251
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
We need to send 265 kbps over a noiseless channel with a
bandwidth of 20 kHz. How many signal levels do we need?
Solution
We can use the Nyquist formula as shown:
Example
Consider an extremely noisy channel in which the
value of the signal-to-noise ratio is almost zero.
In other words, the noise is so strong that the
signal is faint. For this channel the capacity C is
calculated as
252
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
We can calculate the theoretical highest bit rate of a
regular telephone line. A telephone line normally has a
bandwidth of 3000. The signal-to-noise ratio is usually
3162. For this channel the capacity is calculated as
This means that the highest bit rate for a telephone line
is 34.860 kbps. If we want to send data faster than this,
we can either increase the bandwidth of the line or
improve the signal-to-noise ratio.
505
Example
The signal-to-noise ratio is often given in
decibels. Assume that SNRdB = 36 and the channel
bandwidth is 2 MHz. The theoretical channel
capacity can be calculated as
506
253
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
For practical purposes, when the SNR is very
high, we can assume that SNR + 1 is almost the
same as SNR. In these cases, the theoretical
channel capacity can be simplified to
507
Example
We have a channel with a 1-MHz bandwidth. The
SNR for this channel is 63. What are the
appropriate bit rate and signal level?
Solution
First, we use the Shannon formula to find the
upper limit.
508
254
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
The Shannon formula gives us 6 Mbps, the upper
limit. For better performance we choose
something lower, 4 Mbps, for example. Then we
use the Nyquist formula to find the number of
signal levels.
509
Note
510
255
Lecture notes Telecommunication Systems by Jorma Kekalainen
Performance
One important issue in networking is the
performance of the network how good is
it?
We can discuss quality of service, an
overall measurement of network
performance.
In this section, we only introduce terms.
511
Note
In networking, we use the term bandwidth in
two contexts.
The first, bandwidth in hertz, refers to
the range of frequencies in a
composite signal or the range of
frequencies that a channel can pass.
256
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
The bandwidth of a subscriber line is 4 kHz for
voice or data. The bandwidth of this line for data
transmission can be up to 56,000 bps using a
sophisticated modem to change the digital signal
to analog.
513
Example
If the telephone company improved the quality of
the line and increases the bandwidth to 8 kHz, we
can send 112,000 bps by using the same
technology as in the previous case.
514
257
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A network with bandwidth of 10 Mbps can pass
only an average of 12,000 frames per minute with
each frame carrying an average of 10,000 bits.
What is the throughput of this network?
Solution
We can calculate the throughput as
Example
What is the propagation time if the distance
between the two points is 12,000 km? Assume the
propagation speed to be 2.4 108 m/s in cable.
Solution
We can calculate the propagation time as
258
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
What are the propagation time and the
transmission time for a 2.5-kbyte message (an e-
mail) if the bandwidth of the network is 1 Gbps?
Assume that the distance between the sender
and the receiver is 12,000 km and that light
travels at 2.4 108 m/s.
Solution
The propagation and transmission times are:
517
Example (cont.)
259
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
What are the propagation time and the
transmission time for a 5-Mbyte message (an
image) if the bandwidth of the network is 1
Mbps? Assume that the distance between the
sender and the receiver is 12,000 km and that
light travels at 2.4 108 m/s.
Solution
The propagation and transmission times are:
519
Example (cont.)
260
Lecture notes Telecommunication Systems by Jorma Kekalainen
521
Bandwidth-delay product
We can think about the link between two
points as a pipe.
The cross section of the pipe represents
the bandwidth, and the length of the pipe
represents the delay.
We can say the volume of the pipe defines
the bandwidth-delay product.
522
261
Lecture notes Telecommunication Systems by Jorma Kekalainen
523
Note
524
262
Lecture notes Telecommunication Systems by Jorma Kekalainen
525
Analog Transmission
526
263
Lecture notes Telecommunication Systems by Jorma Kekalainen
Digital-to-analog conversion
527
Digital-to-analog conversion
528
264
Lecture notes Telecommunication Systems by Jorma Kekalainen
529
Note
530
265
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
An analog signal carries 4 bits per signal
element. If 1000 signal elements are sent per
second, find the bit rate N.
Solution
In this case, r = 4, S = 1000, and N is unknown. We
can find the value of N from
S is the signal rate (baud). N is the data rate (bps) and r is the number of data
531
elements carried in one signal element.
Example
An analog signal has a bit rate of 8000 bps and
a baud rate of 1000 baud. How many data
elements are carried by each signal element?
How many signal elements do we need?
Solution
In this example, S = 1000, N = 8000, and r and L
are unknown. We find first the value of r and then
the value of L.
532
266
Lecture notes Telecommunication Systems by Jorma Kekalainen
534
267
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
We have an available bandwidth of 100 kHz
which spans from 200 to 300 kHz. What are
the carrier frequency and the bit rate if we
modulated our data by using ASK with d = 1?
Solution
The middle of the bandwidth is located at 250
kHz. This means that our carrier frequency can be
at fc = 250 kHz. We can use the formula for
bandwidth to find the bit rate (with d = 1 and r =
1).
535
536
268
Lecture notes Telecommunication Systems by Jorma Kekalainen
537
Example
We have an available bandwidth of 100 kHz
which spans from 200 to 300 kHz. What should
be the carrier frequency and the bit rate if we
modulated our data by using FSK with d = 1?
Solution
This problem is similar to BASK-example, but we
are modulating by using FSK. The midpoint of the
band is at 250 kHz. We choose 2f to be 50 kHz;
this means
538
269
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
We need to send data 3 bits at a time at a bit rate of 3
Mbps. The carrier frequency is 10 MHz. Calculate the
number of levels (different frequencies), the baud rate,
and the bandwidth.
Solution
We can have L = 23 = 8. The baud rate is S = 3 MHz/3 = 1
Mbaud. This means that the carrier frequencies must be 1
MHz apart (2f = 1 MHz). The bandwidth is B = 8 1MHz =
8MHz. Figure 5.8 shows the allocation of frequencies and
bandwidth.
539
540
270
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
Solution
For QPSK, 2 bits is carried by one signal element.
This means that r = 2. So the signal rate (baud
rate) is S = N (1/r) = 6 Mbaud. With a value of d
= 0, we have B = S = 6 MHz.
541
542
271
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
Show the constellation diagrams for an ASK
(OOK), BPSK, and QPSK signals.
Solution
Figure shows the three constellation diagrams.
543
Note
544
272
Lecture notes Telecommunication Systems by Jorma Kekalainen
545
546
273
Lecture notes Telecommunication Systems by Jorma Kekalainen
547
Amplitude modulation
548
274
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
549
AM band allocation
550
275
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
551
Frequency modulation
552
276
Lecture notes Telecommunication Systems by Jorma Kekalainen
FM band allocation
553
Phase modulation
554
277
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
555
Digital Transmission
556
278
Lecture notes Telecommunication Systems by Jorma Kekalainen
Digital-to-digital conversion
557
558
279
Lecture notes Telecommunication Systems by Jorma Kekalainen
559
Example
A signal is carrying data in which one data element
is encoded as one signal element ( r = 1). If the bit
rate is 100 kbps, what is the average value of the
baud rate if c (case factor) is between 0 and 1?
Solution
We assume that the average value of c is 1/2 . The
baud rate is then
560
280
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
561
Example
The maximum data rate of a channel (see Chapter
3) is Nmax = 2 B log2 L (defined by the Nyquist
formula). Does this agree with the previous
formula for Nmax?
Solution
A signal with L levels actually can carry log2L bits
per level. If each level corresponds to one signal
element and we assume the average case (c = 1/2),
then we have
562
281
Lecture notes Telecommunication Systems by Jorma Kekalainen
563
Example
In a digital transmission, the receiver clock is 0.1 percent
faster than the sender clock. How many extra bits per
second does the receiver receive if the data rate is 1 kbps?
How many if the data rate is 1 Mbps?
Solution
At 1 kbps, the receiver receives 1001 bps instead of 1000
bps.
564
282
Lecture notes Telecommunication Systems by Jorma Kekalainen
565
566
Normalized power = power needed to send 1 bit per unit line resistance
283
Lecture notes Telecommunication Systems by Jorma Kekalainen
567
L Level, I - Inverted
Note
568
284
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
569
Note
570
285
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A system is using NRZ-I to transfer 10-Mbps data. What
are the average signal rate and minimum bandwidth?
Solution
The average signal rate is S = N/2 = 500 kbaud. The
minimum bandwidth for this average baud rate is Bmin = S =
500 kHz.
571
Polar RZ scheme
572
286
Lecture notes Telecommunication Systems by Jorma Kekalainen
573
Note
574
287
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
575
Note
576
288
Lecture notes Telecommunication Systems by Jorma Kekalainen
577
Note
578
289
Lecture notes Telecommunication Systems by Jorma Kekalainen
579
580
290
Lecture notes Telecommunication Systems by Jorma Kekalainen
581
582
291
Lecture notes Telecommunication Systems by Jorma Kekalainen
583
Note
584
292
Lecture notes Telecommunication Systems by Jorma Kekalainen
585
586
293
Lecture notes Telecommunication Systems by Jorma Kekalainen
587
588
294
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
We need to send data at a 1-Mbps rate. What is the
minimum required bandwidth, using a combination of 4B/5B
and NRZ-I or Manchester coding?
Solution
First 4B/5B block coding increases the bit rate to 1.25
Mbps. The minimum bandwidth using NRZ-I is N/2 or 625
kHz. The Manchester scheme needs a minimum bandwidth
of 1 MHz. The first choice needs a lower bandwidth, but
has a DC component problem; the second choice needs a
higher bandwidth, but does not have a DC component
problem.
589
590
295
Lecture notes Telecommunication Systems by Jorma Kekalainen
591
592
296
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
593
Analog-to-digital conversion
594
297
Lecture notes Telecommunication Systems by Jorma Kekalainen
595
596
298
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
597
598
299
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
For an intuitive example of the Nyquist theorem, let us
sample a simple sine wave at three sampling rates: fs = 4f (2
times the Nyquist rate), fs = 2f (Nyquist rate), and
fs = f (one-half the Nyquist rate). Next figure shows the
sampling and the subsequent recovery of the signal.
599
600
300
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
The seemingly backward rotation of the wheels of a
forward-moving wagon in a western movie can be explained
by under-sampling. A movie is filmed at 24 frames per
second. If a wheel is rotating more than 12 times per
second, the under-sampling creates the impression of a
backward rotation.
601
Example
Telephone companies digitize voice by assuming a
maximum frequency of 4000 Hz. The sampling rate
therefore is 8000 samples per second.
602
301
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A complex low-pass signal has a bandwidth of 200
kHz. What is the minimum sampling rate for this
signal?
Solution
The bandwidth of a low-pass signal is between 0
and f, where f is the maximum frequency in the
signal. Therefore, we can sample this signal at 2
times the highest frequency (200 kHz). The
sampling rate is therefore 400,000 samples per
second.
603
Example
A complex bandpass signal has a bandwidth of 200
kHz. What is the minimum sampling rate for this
signal?
Solution
We cannot find the minimum sampling rate in this
case because we do not know where the bandwidth
starts or ends. We do not know the maximum
frequency in the signal.
604
302
Lecture notes Telecommunication Systems by Jorma Kekalainen
605
Example
What is the SNRdB in the example of Figure 4.26?
Solution
We can use the formula to find the quantization.
We have eight levels and 3 bits per sample, so
303
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A telephone subscriber line must have an SNRdB
above 40. What is the minimum number of bits per
sample?
Solution
We can calculate the number of bits as
607
Example
We want to digitize the human voice. What is the
bit rate, assuming 8 bits per sample?
Solution
The human voice normally contains frequencies
from 0 to 4000 Hz. So the sampling rate and bit
rate are calculated as follows:
608
304
Lecture notes Telecommunication Systems by Jorma Kekalainen
609
Example
We have a low-pass analog signal of 4 kHz. If we
send the analog signal, we need a channel with a
minimum bandwidth of 4 kHz. If we digitize the
signal and send 8 bits per sample, we need a
channel with a minimum bandwidth of 8 4 kHz =
32 kHz.
610
305
Lecture notes Telecommunication Systems by Jorma Kekalainen
611
612
306
Lecture notes Telecommunication Systems by Jorma Kekalainen
613
Transmission modes
The transmission of binary data across a link can
be accomplished in either parallel or serial mode.
In parallel mode, multiple bits are sent with each
clock tick.
In serial mode, 1 bit is sent with each clock tick.
While there is only one way to send parallel data,
there are three subclasses of serial transmission:
asynchronous, synchronous, and isochronous.
614
307
Lecture notes Telecommunication Systems by Jorma Kekalainen
615
Parallel transmission
616
308
Lecture notes Telecommunication Systems by Jorma Kekalainen
Serial transmission
617
Note
618
309
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
619
Asynchronous transmission
620
310
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
621
Synchronous transmission
622
311
Lecture notes Telecommunication Systems by Jorma Kekalainen
623
Note
624
312
Lecture notes Telecommunication Systems by Jorma Kekalainen
Multiplexing
Whenever the bandwidth of a medium linking two
devices is greater than the bandwidth needs of
the devices, the link can be shared.
Multiplexing is the set of techniques that allows
the simultaneous transmission of multiple signals
across a single data link.
Topics:
Frequency-Division Multiplexing
Wavelength-Division Multiplexing
Synchronous Time-Division Multiplexing
Statistical Time-Division Multiplexing
625
626
313
Lecture notes Telecommunication Systems by Jorma Kekalainen
Categories of multiplexing
627
Frequency-division multiplexing
628
314
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
629
FDM process
630
315
Lecture notes Telecommunication Systems by Jorma Kekalainen
631
Example
Assume that a voice channel occupies a bandwidth of 4 kHz.
We need to combine three voice channels into a link with a
bandwidth of 12 kHz, from 20 to 32 kHz. Show the
configuration, using the frequency domain. Assume there
are no guard bands.
Solution
We shift (modulate) each of the three voice channels to a
different bandwidth, as shown in the following figure. We
use the 20- to 24-kHz bandwidth for the first channel, the
24- to 28-kHz bandwidth for the second channel, and the
28- to 32-kHz bandwidth for the third one. Then we
combine them.
632
316
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
633
Example
Five channels, each with a 100-kHz bandwidth, are to be
multiplexed together. What is the minimum bandwidth of
the link if there is a need for a guard band of 10 kHz
between the channels to prevent interference?
Solution
For five channels, we need at least four guard bands. This
means that the required bandwidth is at least
5 100 + 4 10 = 540 kHz
634
317
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
Four data channels (digital), each transmitting at 1
Mbps, use a satellite channel of 1 MHz. Design an
appropriate configuration, using FDM.
Solution
The satellite channel is analog. We divide it into four
channels, each channel having a 250-kHz bandwidth. Each
digital channel of 1 Mbps is modulated such that each 4
bits is modulated to 1 Hz. One solution is 16-QAM
modulation. Next figure shows one possible configuration.
635
Example
636
318
Lecture notes Telecommunication Systems by Jorma Kekalainen
Analog hierarchy
637
Example
The Advanced Mobile Phone System (AMPS) uses two
bands. The first band of 824 to 849 MHz is used for
sending, and 869 to 894 MHz is used for receiving. Each
user has a bandwidth of 30 kHz in each direction. How
many people can use their cellular phones simultaneously?
Solution
Each band is 25 MHz. If we divide 25 MHz by 30 kHz, we
get 833.33. In reality, the band is divided into 832
channels. Of these, 42 channels are used for control, which
means only 790 channels are available for cellular phone
users.
638
319
Lecture notes Telecommunication Systems by Jorma Kekalainen
Wavelength-division multiplexing
639
Note
640
320
Lecture notes Telecommunication Systems by Jorma Kekalainen
641
TDM
642
321
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
643
644
322
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
645
Example
In figure, the data rate for each input connection is 3 kbps. If 1 bit at
a time is multiplexed (a unit is 1 bit), what is the duration of (a) each
input slot, (b) each output slot, and (c) each frame?
Solution
We can answer the questions as follows:
a. The data rate of each input connection is 1 kbps. This means that
the bit duration is 1/1000 s or 1 ms. The duration of the input time
slot is 1 ms (same as bit duration). 646
323
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example (cont.)
647
Example
Next figure shows synchronous TDM with a data
stream for each input and one data stream for the
output. The unit of data is 1 bit. Find (a) the input
bit duration, (b) the output bit duration, (c) the
output bit rate, and (d) the output frame rate.
648
324
Lecture notes Telecommunication Systems by Jorma Kekalainen
Solution
We can answer the questions as follows:
a. The input bit duration is the inverse of the bit rate:
1/1 Mbps = 1 s.
c. The output bit rate is the inverse of the output bit duration or
1/(4s) or 4 Mbps. This can also be deduced from the fact that the
output rate is 4 times as fast as any input rate; so the output rate
= 4 1 Mbps = 4 Mbps.
d. The frame rate is always the same as any input rate. So the frame
rate is 1,000,000 frames per second. Because we are sending 4 bits
in each frame, we can verify the result of the previous question by
multiplying the frame rate by the number of bits per frame.
649
Interleaving
650
325
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
Four channels are multiplexed using TDM. If each channel sends 100
bytes /s and we multiplex 1 byte per channel, show the frame traveling
on the link, the size of the frame, the duration of a frame, the frame
rate, and the bit rate for the link.
Solution
The multiplexer is shown below. Each frame carries 1 byte from each
channel; the size of each frame, therefore, is 4 bytes, or 32 bits.
Because each channel is sending 100 bytes/s and a frame carries 1 byte
from each channel, the frame rate must be 100 frames per second. The
bit rate is 100 32, or 3200 bps.
651
Example
A multiplexer combines four 100-kbps channels using a time slot of 2
bits. Show the output with four arbitrary inputs. What is the frame
rate? What is the frame duration? What is the bit rate? What is the
bit duration?
Solution
Figure below shows the output for four arbitrary inputs. The link
carries 50,000 frames per second. The frame duration is therefore
1/50,000 s or 20 s. The frame rate is 50,000 frames per second, and
each frame carries 8 bits; the bit rate is 50,000 8 = 400,000 bits or
400 kbps. The bit duration is 1/400,000 s, or 2.5 s.
652
326
Lecture notes Telecommunication Systems by Jorma Kekalainen
Empty slots
653
Multilevel multiplexing
654
327
Lecture notes Telecommunication Systems by Jorma Kekalainen
Multiple-slot multiplexing
655
Pulse stuffing
656
328
Lecture notes Telecommunication Systems by Jorma Kekalainen
Framing bits
657
Digital hierarchy
658
329
Lecture notes Telecommunication Systems by Jorma Kekalainen
659
660
330
Lecture notes Telecommunication Systems by Jorma Kekalainen
661
E line rates
662
331
Lecture notes Telecommunication Systems by Jorma Kekalainen
663
Spread spectrum
In spread spectrum (SS), we combine
signals from different sources to fit into a
larger bandwidth, but our goals are to
prevent eavesdropping and jamming.
To achieve these goals, spread spectrum
techniques add redundancy.
Topics:
Frequency Hopping Spread Spectrum (FHSS)
Direct Sequence Spread Spectrum
Synchronous (DSSS)
664
332
Lecture notes Telecommunication Systems by Jorma Kekalainen
Spread spectrum
665
666
333
Lecture notes Telecommunication Systems by Jorma Kekalainen
667
FHSS cycles
668
334
Lecture notes Telecommunication Systems by Jorma Kekalainen
Bandwidth sharing
669
DSSS
670
335
Lecture notes Telecommunication Systems by Jorma Kekalainen
DSSS example
671
Telecommunication Systems
Introduction to Radar
336
Lecture notes Telecommunication Systems by Jorma Kekalainen
RADAR
Radar observables:
Target range
Target angles (azimuth & elevation)
Target size (radar cross section)
Target speed (Doppler)
Target features (imaging)
673
337
Lecture notes Telecommunication Systems by Jorma Kekalainen
Description
Radar stands for RAdio Detection And Ranging,
based upon the echo from a target located across
the trajectory of an electromagnetic wave.
Usually the transmitter and the receiver are
connected to a common antenna.
The time required for the wave to go from the
emitter to the target and back to the receiver is
measured, and yields the distance R.
The frequency variation of the signal is related to
the radial velocity of the target with respect to the
source (Doppler shift).
The direction of the target is determined by
pointing a narrow beam in the direction from which
the reflected signal is the largest.
338
Lecture notes Telecommunication Systems by Jorma Kekalainen
Radar application
Surveillance
Tracking
Fire control
Target ID/ discrimination
Ground surveillance/ reconnaissance
Ground mapping
Moving target detection
Air traffic control
Missile seekers
678
339
Lecture notes Telecommunication Systems by Jorma Kekalainen
340
Lecture notes Telecommunication Systems by Jorma Kekalainen
scatterer
t1
Time delay = t2 t1 = td
t2
341
Lecture notes Telecommunication Systems by Jorma Kekalainen
First radar
First radar was Chain Home in England
HF (four spot frequencies, 20 to 55 MHz)
Tall transmit towers
Dipole detectors
A-scan display
Receive
crossed
360 240
dipoles
Transmit Receive
342
Lecture notes Telecommunication Systems by Jorma Kekalainen
Early displays
Displays
Possible Movement of
targets radar trace
Amplitude
Possible
Clutter
targets
?
Clutter
Distance
343
Lecture notes Telecommunication Systems by Jorma Kekalainen
Secondary radars
Secondary radars transmit an encoded
signal to the targets transponder
The transponder replies with an encoded
message with information about the
airplane
A typical transponder can be set to any of
identifying codes
Military transponders are called IFF
(Identification, Friend or Foe)
344
Lecture notes Telecommunication Systems by Jorma Kekalainen
Radar frequencies
Specific radar bands
Band Nominal based on ITU assignments
designation frequency range for Region 2
HF 3 30 MHz
VHF 30 300 MHz 138 144; 216 225 MHz
UHF 300 1000 MHz 420 450; 890 942 MHz
L 1000 2000 MHz 1215 1400 MHz
S 2000 4000 MHz 2300 2500; 2700 3700 MHz
C 4000 8000 MHz 5250 5925 MHz
X 8000 12,000 MHz 8500 10680 MHz
Ku 12 18 GHz 13.4 14.0; 15.7 17.7 GHz
K 18 27 GHz 24.05 24.25 GHz
Ka 27 40 GHz 33.4 36.0 GHz
mm 40 300 GHz
345
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example:
What is the wavelength for a frequency of 3 GHz?
Answer:
Wavelength = = c/f = (3 108)/(3 109)
= 10-1
= 0.1m = 10 cm
346
Lecture notes Telecommunication Systems by Jorma Kekalainen
Units
A wide mix of units is used in radar engineering
Miles, yards, meters, nautical miles, knots, hours, etc.
Calculations are easier if a standard set of units
are used
The international standards for electrical
engineers is the SI system
meters, kilograms, seconds,
Scaling in SI units
347
Lecture notes Telecommunication Systems by Jorma Kekalainen
Polarization
All radio waves are polarized
The direction of the E field defines the
polarization
Direction
E = Electric field of travel
This is a H = Magnetic field (z-axis)
linearly
polarized E
wave E, H, and z-axes are
H mutually orthogonal
Polarization
The E vector may rotate leading to
another special case: Circular polarization
348
Lecture notes Telecommunication Systems by Jorma Kekalainen
Polarization
This is a Direction
linearly of travel
polarized (z-axis)
wave E
Reflection of EM wave
349
Lecture notes Telecommunication Systems by Jorma Kekalainen
Partial reflection
Non-conductive materials allow radio waves to
pass through, but .
If dielectric constant at the surface is
different, partial reflection will occur
Medium 1 Medium 2
Incident
ray
Partially Partially
reflected transmitted
ray ray
Reflection coefficient
Can take the real part of the dielectric
constant = refractive index = n
reflection coefficient can be found from the
two refractive indices of media 1 and 2
(n1 - n2)2
ref.coeff. = 1 -
(n1 + n2)2
350
Lecture notes Telecommunication Systems by Jorma Kekalainen
351
Lecture notes Telecommunication Systems by Jorma Kekalainen
Time frequency
V(f)
V(t) This is a two-
sided spectrum
t (s) f (Hz)
0 T -2/T -1/T +1/T +2/T
0
Time frequency
V(f)
V(t)
0 T
t (s) f (Hz)
fc -2/T fc -1/T fc +1/T fc +2/T
fc
Radar pulse at a
carrier frequency of fc
352
Lecture notes Telecommunication Systems by Jorma Kekalainen
Receiver bandwidth
Radio receiver bandwidth is defined by
filters (usually at IF)
Noise bandwidth = B Hz
Baseband Passband
Ideal
V(f) V(f)
Real
f f
0 B fc - B/2 fc fc + B/2
Radar waveforms
Waves, modulated
by on-off action
of pulse envelope
Pulse at single
frequency
353
Lecture notes Telecommunication Systems by Jorma Kekalainen
Radar system
707
TX
Receiver RX
Controller
C
Display unit
354
Lecture notes Telecommunication Systems by Jorma Kekalainen
Pulse
Note: Continuous wave (CW) radar: Duty cycle = 100% (always on) 709
Pulse radar
The radars most often utilized to measure distances
emit short microwave pulses of duration , with a
pulse repetition frequency prf = fr = 1/r .
In this manner, a high pulse power is obtained, with
only a moderate average power: the ratio of average
to pulse power is the product fr.
Typical values are = 1 s and fr = 1 kHz, for which
the power ratio is 1/1000.
The transmitted wave propagate the distance R
between the transmitter and the target, then it
returns towards the radar with a time delay tar.
As it is an electromagnetic wave propagating at the
velocity of light c0, the distance R is obtained with
355
Lecture notes Telecommunication Systems by Jorma Kekalainen
Range calculation
Velocity, v = distance/time
We can assume v = 3 108 m/s = 300 m/s
Round trip distance = 150 m/s
Example: if the delay is 1500 s, the range to the
target is 225 km
Some useful numbers
Time delay = 1 s per 150 m of target range
Time delay for a target at 1 km = 6.67 s
356
Lecture notes Telecommunication Systems by Jorma Kekalainen
Range calculation
Range, R = (c0tar)/2
taris the time taken for the round trip of the
pulse from the radar to the target and back
again, in seconds.
The factor 2 appears in the denominator because
of the two-way (round-trip) propagation.
357
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
R(km) = 0.15tar(s)
= 0.15 27
= 4.05 km
Range ambiguities
The previous calculation is for a single
pulse.
Most radars send more than one pulse to
provide for sample averaging and updates
on target position in the required time
interval for tracking resolution.
Echoes from a distant target can arrive
after the second pulse in the pulse train,
leading to range ambiguities
358
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
Target #2,
range 18 km
Target #1,
range 6
km
Primary radar
prf = fr = 10 kHz
Time,
seconds
Example
Target #1,
range 6
km
Primary radar
prf = fr = 10 kHz Range in km = 0.15tar(s), lets
look at the A-scan display
Time,
seconds
359
Lecture notes Telecommunication Systems by Jorma Kekalainen
Target #1 Target #2
Target #1
Time t,
0 0.04 0.1 0.12 0.14 in ms
Unambiguous range
Unambiguous range = Runamb=c/(2fr)
fr = the pulse repetition frequency (prf)
360
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
An unambiguous range of at least 200 km is required.
What is the maximum prf to meet this requirement?
361
Lecture notes Telecommunication Systems by Jorma Kekalainen
Radar frequencies
Specific radar bands
Band Nominal based on ITU assignments
designation frequency range for Region 2
HF 3 30 MHz
VHF 30 300 MHz 138 144; 216 225 MHz
UHF 300 1000 MHz 420 450; 890 942 MHz
L 1000 2000 MHz 1215 1400 MHz
S 2000 4000 MHz 2300 2500; 2700 3700 MHz
C 4000 8000 MHz 5250 5925 MHz
X 8000 12,000 MHz 8500 10680 MHz
Ku 12 18 GHz 13.4 14.0; 15.7 17.7 GHz
K 18 27 GHz 24.05 24.25 GHz
Ka 27 40 GHz 33.4 36.0 GHz
mm 40 300 GHz
362
Lecture notes Telecommunication Systems by Jorma Kekalainen
Radar frequencies
High frequencies and
elevation angles, very
Plane
directive
wavefront
launched by As frequencies/elevation angles
radar reduce, energy forms strong ground
wave and can also produce some
scattered energy over the horizon
(OTH)
363
Lecture notes Telecommunication Systems by Jorma Kekalainen
Radar equation
The emitter feeds the antenna with a power Pf; the antenna
radiates it into space, concentrating it along one or several
privileged directions, where the antenna gain G is the
largest.
The power density decreases as 1/(4r2), where r is the
distance from the antenna.
Part of the signal reaches the target, which reflects it
partially towards the antenna.
The target is represented by its effective scattering cross
section .
The density of the reflected power decreases in turn
inversely as the square of the distance.
The antenna picks up a part of the reflected signal; its
receiving properties are represented by the effective
reception area Ae, which is itself related to the antenna gain
by the relation Ae = G2/4 , where is the wavelength.
Radar equation
The ratio of the received power Pr to the
power Pf supplied by the source is given by the
radar equation:
364
Lecture notes Telecommunication Systems by Jorma Kekalainen
Signal analysis
In the receiver, the amplified signal is fed to a data
processing unit, which compares the received signal
with the transmitted one.
However, the presence of noise complicates the
detection process: the signal-to-noise ratio must be
large enough to permit a correct operation.
As noise is a random process, its amplitude can take
large values, well above its average value, over short
periods of time.
A noise spike might well be interpreted as an echo by
the system.
To avoid false alarms, the evolution with respect to
time of the received signal is also carefully monitored.
In this manner, true echoes can be distinguished from
spurious noise spikes.
Signal buried
in Noise
(SNR < 0 dB)
Signal integrated
out of Noise
(SNR increases by N)
Signals are same each time; add coherently (N2). Noise is different each
time; doesnt add coherently (N). 730
365
Lecture notes Telecommunication Systems by Jorma Kekalainen
Resolution
Pulse length is larger than target length
Cannot resolve features along the target
732
366
Lecture notes Telecommunication Systems by Jorma Kekalainen
733
Matched filter
367
Lecture notes Telecommunication Systems by Jorma Kekalainen
Convolution process:
Move digitized pulses by each other, in steps
When data overlaps, multiply samples and sum them up
735
Example
Convolution process:
Move digitized pulses by each other, in steps
When data overlaps, multiply samples and sum them up
736
368
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
737
Example
738
369
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
740
370
Lecture notes Telecommunication Systems by Jorma Kekalainen
741
Pulse compression
Pulse compression offers a means to simultaneous
have high average power and good resolution
A long pulse can have the same bandwidth
(resolution) as a short pulse, if it is modulated in
frequency or phase
Phase-encoded pulse compression divides long
pulses into binary encoded sub-pulses
With frequency-encoded pulse compression, the
radar frequency is increased linearly as the pulse
is transmitted
742
371
Lecture notes Telecommunication Systems by Jorma Kekalainen
743
744
372
Lecture notes Telecommunication Systems by Jorma Kekalainen
Radar system
Power flux
Isotropic
antenna radiating
Ever equally in every
expanding direction
spheres of
flux
373
Lecture notes Telecommunication Systems by Jorma Kekalainen
Beam spreading
374
Lecture notes Telecommunication Systems by Jorma Kekalainen
375
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
If an isotropic antenna radiates 10 watts of
power, what is the power flux density at a
distance of 1 km?
pfd = Pf / 4R2 = 10 / 4(1,000)2
= 10 / 12,566,370.62 0.7958 10-6W/m2
= 0.7957747 W/m2
= 795.8 nW/m2
376
Lecture notes Telecommunication Systems by Jorma Kekalainen
Antenna gain
Most radar antennas are not isotropic
Additional power in the required direction
is the gain of the antenna over that of an
isotropic antenna
Define antenna gain, G, as
Antenna gain
The antenna gain of the radar is a known
value.
This is a measure of the antennas ability to
focus outgoing energy into the directed beam.
maximum radiation intensity
G
average radiation intensity
377
Lecture notes Telecommunication Systems by Jorma Kekalainen
Radiation pattern
270o 90o
The difference in
Minimum power can be
power in this described by the
direction gain in these
directions
180o
Radiation pattern
756
378
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
If the focused beam has 25 times the
power of an omnidirectional antenna with
the same transmitter power, the
directional antenna has a gain of 25 (or 14
dB).
Directional antennas
379
Lecture notes Telecommunication Systems by Jorma Kekalainen
Antenna Gain = G
1 m2
Power = Pf watts
surface
G Pf
F=
4 R2
380
Lecture notes Telecommunication Systems by Jorma Kekalainen
Main lobe
Radiation pattern
Boresight
direction
381
Lecture notes Telecommunication Systems by Jorma Kekalainen
Radiation pattern
Gain (dB)
0
-3
-40
Rectangular (or Cartesian) plot of the angle off bore sight
382
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A parabolic antenna has an aperture
diameter, D, of 2m. It will operate at 12
GHz. What is the gain, both as a ratio and
dB value?
Example
Now we can find the gain G from
383
Lecture notes Telecommunication Systems by Jorma Kekalainen
Antenna efficiency
Antennas are never perfect
The actual gain achieved is therefore less
than the theoretical gain calculated
The difference can be thought of as the
efficiency of the antenna,
Actual gain = Theoretical gain
value is between 1 (perfect) and 0
Example
Large dish antennas like radar antennas
have an aperture nearly equal to their
physical area, and have got a gain of
normally 32 up to 40 dB.
Changes of the quality of the antenna
(antenna- irregularities, like deformations
or ice) have a big influence.
384
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
Example:
The calculated gain of an antenna is 50 dB. The
efficiency of the antenna is 75%. What is the
real gain of the antenna?
Answer:
First: change 50 dB to a ratio 100,000
Second: Multiply by 0.75 gain of 75,000
Third: convert back to dB 48.8 dB
The real gain of the antenna is 48.8 dB
Antenna aperture
Note generally the same antenna is used during
transmission and reception.
In case of transmission the whole energy will be
processed by the antenna.
In case of receiving, the antenna has got the same
gain, but the antenna receives a part of the
incoming energy only.
But it is the antennas aperture, which describes
how well an antenna can catch power from an
incoming electromagnetic wave.
Thus incoming power density (watts per square
meter) aperture (square meters) = available
power from antenna (watts).
385
Lecture notes Telecommunication Systems by Jorma Kekalainen
Effective aperture
Sometimes, the real gain is calculated from
a knowledge of the effective aperture
The effective aperture of an antenna is
the physical aperture , that is:
Ae = A
386
Lecture notes Telecommunication Systems by Jorma Kekalainen
Example
A 2m diameter antenna has an efficiency
of 75%. What are the real and effective
apertures?
Real aperture, A = (radius)2 = (1)2 =
= 3.14 m2
Effective aperture = Ae = A = 3.14
= 0.75 3.14
= 2.36 m2
Example
The target radar cross sectional area
depends of:
the targets physical geometry,
the direction of the illuminating radar,
the radar transmitters frequency,
the used material types of the reflecting
surface.
387
Lecture notes Telecommunication Systems by Jorma Kekalainen
388
Lecture notes Telecommunication Systems by Jorma Kekalainen
389
Lecture notes Telecommunication Systems by Jorma Kekalainen
Dielectric targets
All the values in the previous table are for metallic
scatterers.
For dielectric targets, the reflection and, consequently, the
effective scattering cross section will be smaller.
This can be accounted for by introducing the reflection
factor for a uniform plane wave at normal incidence.
390
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note: Equivalent noise temperatures (Ta + Tr) for an antenna and a receiver system.
391
Lecture notes Telecommunication Systems by Jorma Kekalainen
783
Noise sources
Noise competes with the target echo
392
Lecture notes Telecommunication Systems by Jorma Kekalainen
Note
The radar equation provides a simple
connection between radar performance
parameters and radar design parameters.
There are different radar equations for
different radar functions.
Combination of the radar equation with
cost or other constraints permits quick
identification of critical radar design
issues.
786
393
Lecture notes Telecommunication Systems by Jorma Kekalainen
394
Lecture notes Telecommunication Systems by Jorma Kekalainen
Noise
All radars, as with all electronic equipment,
must operate in the presence of noise.
The main source of noise is termed thermal
noise and is due to agitation of electrons
caused by heat.
The noise can arise from
received atmospheric or cosmic noise
receiver noise - generated internally in the
radar receiver
Noise competes with the target echo
395
Lecture notes Telecommunication Systems by Jorma Kekalainen
Noise figure
The overall receiver sensitivity is directly
related to the noise figure of the radar
receiver.
A very low noise figure receiver is achieved
through minimizing the noise factor of the
very first block.
This component usual is characterized by a
low noise figure with high gain Low Noise
Amplifier (LNA).
Example
Sensitivity time control (STC) is used to attenuate the very strong signals
returned from nearby ground clutter targets. STC is used by adjusting the
attenuation of the receiver as a function of distance. More attenuation is applied
to close returns and attenuation is reduced as the range increases..
396
Lecture notes Telecommunication Systems by Jorma Kekalainen
False alarm
A false alarm is an erroneous radar target
detection decision caused by noise or other
interfering signals exceeding the detection
threshold.
In general, it is an indication of the presence of a
radar target when there is no valid target.
False alarms are generated by noise which exceeds
a pre-set threshold level, by the presence of
spurious signals (either internal to the radar
receiver or from sources external to the radar),
or by equipment malfunction.
A false alarm may be manifested as a momentary
blip on a display, a digital signal processor output,
an audio signal, or by all of these means.
397
Lecture notes Telecommunication Systems by Jorma Kekalainen
795
Probability of detection
The received and demodulated echo signal is
processed by a threshold logic.
If the detection threshold is set too high, there
will be very few false alarms, but the signal-to-
noise ratio required will inhibit detection of valid
targets.
If the threshold is set too low, the large number
of false alarms will mask detection of valid
targets.
Since in the mixed signal exist high noise peaks
which lie in the range of small wanted signals the
optimized threshold level shall be a balanced
compromise used by some cost function depending
on the application.
398
Lecture notes Telecommunication Systems by Jorma Kekalainen
797
399
Lecture notes Telecommunication Systems by Jorma Kekalainen
Problem
One of the important uses of the radar range equation
is in the determination of detection range, or the
maximum range at which a target has a high
probability of being detected by the radar.
Substitute the metric values from the previous
table into the radar range equation
and calculate R.
Atmospheric attenuation
Over-the-horizon
diffraction
Atmospheric refraction
800
400
Lecture notes Telecommunication Systems by Jorma Kekalainen
Fog/cloud water
content
Index of refraction
801
401
Lecture notes Telecommunication Systems by Jorma Kekalainen
Atmospheric attenuation
Radar power absorbed by water vapor
and oxygen at sea level
Attenuation is a
loss of power
High frequencies are not characterized by
well suited for long-range Ls in radar range
low-altitude surveillance equation
803
804
402
Lecture notes Telecommunication Systems by Jorma Kekalainen
Types of radar
Type Application
Pulse (incoherent) Target detection
Range measurement
Surveillance
Types of radar
Type Application
Tracking Range and Angle measurement
Fire control, Guidance
Synthetic Aperture High spatial resolution
Very rapid tracking
AEW (AWACS) Airborne pulse Doppler:
separates moving targets from clutter
using a moving radar
(Highly complicated space-time
adaptive processing)
403
Lecture notes Telecommunication Systems by Jorma Kekalainen
Doppler frequency
Doppler
Frequency
When f = 3 GHz
fd =1 kHz / 50 m/s
807
Size
Amplitude (RCS)
Radial extent (length)
Cross range extent (width)
Motion
Radial velocity
Radial acceleration
Rotation, precession 808
404
Lecture notes Telecommunication Systems by Jorma Kekalainen
Primary parameters
Primary metric parameters are range,
angle, and Doppler velocity
Parameter Resolution
Range 1/BW(=Bandwidth)
Angle /D(=Antenna size)
Velocity (Doppler) /t (=Coherent integration time)
809
Telecommunication Systems
Introduction to
Communication Satellite
Systems
405
Lecture notes Telecommunication Systems by Jorma Kekalainen
811
406
Lecture notes Telecommunication Systems by Jorma Kekalainen
Communication satellite
A communication satellite can be looked
upon as a microwave repeater
It contains several transponders which
listens to some portion of spectrum,
amplifies the incoming signal and
broadcasts it in another frequency to avoid
interference with incoming signals.
407
Lecture notes Telecommunication Systems by Jorma Kekalainen
408
Lecture notes Telecommunication Systems by Jorma Kekalainen
Ground segment
Collection of facilities, Users and Applications
Applications
Traditionally
weather satellites
radio and TV broadcast satellites
military satellites
satellites for navigation and localization (e.g., GPS)
Telecommunication
global telephone connections replaced by fiber optics
backbone for global networks
connections for communication in remote places or
underdeveloped areas
global mobile communication
satellite systems extend cellular phone systems
(e.g., GSM )
818
409
Lecture notes Telecommunication Systems by Jorma Kekalainen
small cells
(spotbeams)
base station
or gateway
footprint
819
Satellite communication
When using a satellite for long distance
communications, the satellite acts as a repeater.
An earth station transmits the signal up to the
satellite (uplink), which in turn retransmits it to the
receiving earth station (downlink).
Different frequencies are used for uplink/downlink.
410
Lecture notes Telecommunication Systems by Jorma Kekalainen
Advantages of satellite
communication
Can reach over large geographical area
Flexible (if transparent transponders)
Easy to install new circuits
Circuit costs independent of distance
Broadcast possibilities
Mobile applications
Terrestrial network "by-pass" , temporary
applications (restoration)
Provision of service to remote areas
User has control over own network
1-for-N multipoint standby possibilities
411
Lecture notes Telecommunication Systems by Jorma Kekalainen
Transparent transponders
Disadvantages of satellite
communication
Large up front capital costs (space
segment and launch)
Terrestrial break even distance expanding
(approx. size of Europe)
Interference and propagation delay
Congestion of frequencies and orbits
412
Lecture notes Telecommunication Systems by Jorma Kekalainen
Breakeven distance
The cost of satellite circuit is independent of
distance on the Earth between the two ends,
whilst the cost of a terrestrial circuit is
approximately directly proportional to that
distance.
The concept of a "breakeven" distance where the
costs are equal has been used to determine where
services should be routed via satellite.
This breakeven distance varies according to the
size of the route, growth rate, and any special
networking requirements.
413
Lecture notes Telecommunication Systems by Jorma Kekalainen
User services
414
Lecture notes Telecommunication Systems by Jorma Kekalainen
Satellite signals
Use to transmit signals and data over long
distances
Weather forecasting
Television broadcasting
Internet communication
Global Positioning Systems
Satellite phone
415
Lecture notes Telecommunication Systems by Jorma Kekalainen
Basics
Satellites in circular orbits
attractive force Fg = m g (R/r)
centrifugal force Fc = m r
m: mass of the satellite
R: radius of the earth (R = 6370 km)
r: distance to the center of the earth
g: acceleration of gravity (g = 9.81 m/s)
: angular velocity ( = 2 f, f: rotation frequency)
Stable orbit
gR 2
r3
Fg = Fc ( 2 f ) 2
831
Basics
elliptical or circular orbits
complete rotation time depends on distance satellite-earth
inclination: angle between orbit and equator
elevation: angle between satellite and horizon
LOS (Line of Sight) to the satellite necessary for
connection
high elevation needed, less absorption due to e.g. buildings
Uplink: connection base station - satellite
Downlink: connection satellite - base station
typically separated frequencies for uplink and downlink
transponder used for sending/receiving and shifting of
frequencies
transparent transponder: only shift of frequencies
regenerative transponder: additionally signal regeneration
832
416
Lecture notes Telecommunication Systems by Jorma Kekalainen
16
12
4 synchronous distance
35,786 km
10 20 30 40 x106 m
radius
833
Based on eccentricity
Circular with centre at the earths centre
Elliptical with one foci at earths centre
417
Lecture notes Telecommunication Systems by Jorma Kekalainen
Inclination
plane of satellite orbit
satellite orbit
perigee
i
inclination i
equatorial plane
835
Elevation
Elevation:
angle e between center of satellite beam
and surface
Minimal elevation:
elevation needed at least e
to communicate with the satellite
836
418
Lecture notes Telecommunication Systems by Jorma Kekalainen
837
419
Lecture notes Telecommunication Systems by Jorma Kekalainen
Satellite orbits
Four different types of satellite orbits can
be identified depending on the shape and
diameter of the orbit:
GEO: geostationary orbit, ca. 36000 km above
earth surface
LEO (Low Earth Orbit): ca. 500 - 1500 km
MEO (Medium Earth Orbit) or ICO (Intermediate
Circular Orbit): ca. 6000 - 20000 km
HEO (Highly Elliptical Orbit) elliptical orbits
839
Examples
Geosynchronous orbit
(GEO): 36,000 km above
Earth, includes commercial
and military
communications satellites,
satellites providing early
warning of ballistic missile
launch.
Medium Earth Orbit
(MEO): from 5000 to
15000 km, they include
navigation satellites (GPS,
Galileo, Glonass).
Low Earth Orbit (LEO):
from 500 to 1000 km above
Earth, includes military
intelligence satellites,
weather satellites.
420
Lecture notes Telecommunication Systems by Jorma Kekalainen
Satellite orbits
Satellite orbits
GEO (Inmarsat)
HEO MEO (ICO)
LEO inner and outer Van
(Globalstar, Allen belts
Irdium)
earth
1000
Van-Allen-Belts: 10000
ionized particles
2000 - 6000 km and 35768
km
15000 - 30000 km
above earth surface
842
421
Lecture notes Telecommunication Systems by Jorma Kekalainen
Geostationary satellites
Orbit 35,786 km distance to earth surface, orbit in
equatorial plane (inclination 0)
complete rotation exactly one day, satellite is
synchronous to earth rotation
Fix antenna positions, no adjusting necessary
Satellites typically have a large footprint (up to 34% of
earth surface!), therefore difficult to reuse frequencies
Bad elevations in areas with latitude above 60 due to fixed
position above the equator
High transmit power needed
High latency due to long distance (ca. 275 ms)
not useful for global coverage for small mobile phones and
data transmission, typically used for radio and TV
transmission
Theoretically 3 Satellites can cover the earth (120 apart)
843
422
Lecture notes Telecommunication Systems by Jorma Kekalainen
LEO systems
Orbit ca. 500 - 1500 km above earth surface
Visibility of a satellite ca. 10 - 40 minutes
Global radio coverage possible
Latency comparable with terrestrial long distance
connections, ca. 5 - 10 ms
Smaller footprints, better frequency reuse
Now handover necessary from one satellite to
another
Many satellites necessary for global coverage
More complex systems due to moving satellites
845
Examples:
Iridium (start 1998, 66 satellites)
Bankruptcy in 2000, deal with US DoD (free use,
saving from deorbiting)
Globalstar (start 1999, 48 satellites)
Not many customers, low stand-by times for mobiles
423
Lecture notes Telecommunication Systems by Jorma Kekalainen
MEO systems
Orbit ca. 5000 - 12000 km above earth surface
Comparison with LEO systems:
Slower moving satellites
Less satellites needed
Simpler system design
For many connections no hand-over needed
Higher latency, ca. 70 - 80 ms
Higher sending power needed
Special antennas for small footprints needed
Example:
ICO (Intermediate Circular Orbit, Inmarsat) start 2000
847
424
Lecture notes Telecommunication Systems by Jorma Kekalainen
The C band is the most frequently used. The Ka and Ku bands are reserved
exclusively for satellite communication but are subject to rain attenuation.
Note
Satellite communications in the FSS (Fixed Satellite
Services) frequency band were initially developed in
order to provide transmission links between the
public switched telephone networks (PSTNs) of
different countries.
Frequency bands are allocated to different services
at World Radio-communication Conferences (WRCs).
Bands are generally allocated to more than one radio
services.
Bands have traditionally been divided into
commercial" and "government/military" bands,
although this is becoming less clear-cut as
"commercial" operators move to utilize "government"
bands.
425
Lecture notes Telecommunication Systems by Jorma Kekalainen
Earths atmosphere
Atmospheric losses
Different types of atmospheric losses can
disturb radio wave transmission in satellite
systems:
Atmospheric absorption
Atmospheric attenuation
Random ionospheric disturbances
426
Lecture notes Telecommunication Systems by Jorma Kekalainen
Atmospheric absorption
Energy absorption by atmospheric gases, which
varies with the frequency of the radio waves.
Two absorption peaks are observed (for 90
elevation angle):
22.3 GHz from resonance absorption in water
vapour (H2O)
60 GHz from resonance absorption in oxygen (O2)
For other elevation angles:
[AA] = [AA]90 cosec
Atmospheric attenuation
Rain is the main cause of atmospheric attenuation
(snow has little effect on attenuation because of its
low water content).
Total attenuation from rain can be determined by:
A = L [dB]
where [dB/km] is called the specific attenuation, and can be
calculated from specific attenuation coefficients in tabular
form that can be found in literature
where L [km] is the effective path length of the signal
through the rain; note that this differs from the geometric
path length due to fluctuations in the rain density.
427
Lecture notes Telecommunication Systems by Jorma Kekalainen
Atmospheric attenuation
Attenuation of
Example: satellite systems at 4-6 GHz
the signal in %
50
40 rain
absorption
30
fog absorption
e
20
10
atmospheric
absorption
5 10 20 30 40 50
elevation of the satellite
855
428
Lecture notes Telecommunication Systems by Jorma Kekalainen
Linear polarization
Electromagnetic waves
consist of an electric and a
magnetic field vibrating at
right angles to each other.
Polarization is the property
of electromagnetic waves
that describes the direction
of the transverse electric
field.
Linear polarization
(horizontal or vertical):
the two orthogonal
components of the electric
field are inphase;
The direction of the line in
the plane depends on the
relative amplitudes of the
two components.
Linear polarization
Circular polarization
The two components
are exactly 90 out of
phase and have exactly
the same amplitude.
Elliptical polarization
All other cases.
429
Lecture notes Telecommunication Systems by Jorma Kekalainen
Alternating polarizations
Alternating vertical and
horizontal polarization is widely
used on satellite communications
This reduces interference
between programs on the same
frequency band transmitted
from adjacent satellites (One
uses vertical, the next
horizontal, and so on)
Allows for reduced angular
separation between the
satellites.
Routing
One solution: Inter Satellite Links (ISL)
reduced number of gateways needed
forward connections or data packets within the satellite
network as long as possible
only one uplink and one downlink per direction needed for
the connection of two mobile phones
Problems
more complex focusing of antennas between satellites
high system complexity due to moving routers
higher fuel consumption
thus shorter lifetime
Iridium and Teledesic planned with ISL
Other systems use gateways and additionally
terrestrial networks 860
430
Lecture notes Telecommunication Systems by Jorma Kekalainen
431
Lecture notes Telecommunication Systems by Jorma Kekalainen
Summary
Satellite systems can provide a variety of
services including
broadband communications,
audio/video distribution networks,
navigation,
worldwide customer service and
military command and control.
Satellite systems are also expected to play a
role in the 5G global infrastructure providing
the wide area coverage necessary for the
realization of the optimal communication
anywhere and anytime.
432
Lecture notes Telecommunication Systems by Jorma Kekalainen
Telecommunication Systems
Public Switched
Telephone Network (PSTN)
Importance of telephony
Official name: the Public Switched
Telephone Network (PSTN)
New technologies revolutionizing plain old
telephone service (POTS)
More options are bringing more complex
elements
WANs are based on telephone technology
and regulation
866
433
Lecture notes Telecommunication Systems by Jorma Kekalainen
867
868
434
Lecture notes Telecommunication Systems by Jorma Kekalainen
2. 2.
Access Line Access Line
(Local Loop) (Local Loop)
2. & 3. End office
Switch (Class 5)
3. Transport Core
3.
Switch 3. Trunk
Line
870
435
Lecture notes Telecommunication Systems by Jorma Kekalainen
4. Signaling System
(SS7 in the U.S.)
Recap
Customer premises equipment
Access system
Local loop and termination equipment at the end office
switch
Transport Core
Transport is the carriage of voice
Signaling
Signaling is the control of calling
872
436
Lecture notes Telecommunication Systems by Jorma Kekalainen
Circuit switching
A circuit is an
end-to-end connection
between two subscribers.
Capacity is reserved on all trunk lines
and switches along the way.
873
Time
437
Lecture notes Telecommunication Systems by Jorma Kekalainen
Voice traffic:
Fairly constant use of capacity;
Circuit switching is fairly efficient
875
Data traffic:
Short bursts, long silences;
Circuit switching is inefficient for data traffic
876
438
Lecture notes Telecommunication Systems by Jorma Kekalainen
877
878
439
Lecture notes Telecommunication Systems by Jorma Kekalainen
Analog
signal
Sound
wave
879
Local Local
loop loop
(Analog) Switch (Digital)
(Digital)
880
440
Lecture notes Telecommunication Systems by Jorma Kekalainen
Analog Digital
ADC Digital
signal switch
internal
signal
Codec
Local loop
DAC
Home
telephone
881
Frequency
Channel 1 / Circuit A
Channel 2 / Circuit D
Channel 3 / Circuit C
Channel 4 / unused
Channel 5 / Circuit E
882
441
Lecture notes Telecommunication Systems by Jorma Kekalainen
Bandpass filtering
Analog
Analog electric
voice signal
signal
Subscriber
Filter at end office switch
883
Bandpass filtering
Signal
442
Lecture notes Telecommunication Systems by Jorma Kekalainen
PCM
0
Sample Time
885
PCM
0
Sample Time
886
443
Lecture notes Telecommunication Systems by Jorma Kekalainen
0
Sample Time
Intensity of Sample
(125/255 or 01111101)
887
888
444
Lecture notes Telecommunication Systems by Jorma Kekalainen
889
Point-to-Point
SONET/SDH
TDM
Ring
Trunk Line
890
445
Lecture notes Telecommunication Systems by Jorma Kekalainen
SONET/SDH Ring
Telephone
switch
2.
Rings can be Break
wrapped if a
Telephone
trunk line
switch
is broken. SONET/SDH Ring
Still a complete
loop.
891
ATM
Network
446
Lecture notes Telecommunication Systems by Jorma Kekalainen
Signaling System 7
Signaling is the control of transmissions (setup, tear down,
billing, etc.)
SS7 - Signalling System No. 7
A CCS (Common Channel Signalling) system defined by the ITU-
T (International Telecommunications Union -Telecommunication
Standardization Sector). SS7 is used in many modern telecoms
networks and provides a suite of protocols which enables circuit
and non circuit related information to be routed about and
between networks. The main protocols include MTP (Message
Transfer Part), SCCP (Signalling Connection Control Part) and
ISUP (ISDN User Part).
Also known as C7
Packet-Switched Technology
Operates in parallel with the circuit-switched PSTN
Uses the same transmission links as the PSTN
893
Cellular Telephony
447
Lecture notes Telecommunication Systems by Jorma Kekalainen
Cellular telephony
Mobile Telephone
PSTN
Switching Office (MTSO)
Cellsite
G
Channel D K
47
B H N
A E L P
O
C I Handover
F M
J
895
Cellular telephony
Mobile Telephone
PSTN
Switching Office
Cellsite
G
D K
B H N
A E L P
Service area is divided into cells.
C I O
Cellsite in each cell communicates F M
with cellphones.
J
MTSO controls all cellsites,
896
links cellular system to PSTN.
448
Lecture notes Telecommunication Systems by Jorma Kekalainen
Cellular telephony
Mobile Telephone
PSTN
Switching Office
Cellsite
G
Channel D K
47
B H N
A E L P
C I O
F M
Why cells?
So channels can be reused in different cells. J
Channel reuse allows more customers
to be supported. 897
Cellular technology
Handover (handoff)
Moving between cells in a system (city)
Roaming
Moving between systems (cities)
898
449
Lecture notes Telecommunication Systems by Jorma Kekalainen
Channel reuse
Traditional cellular technologies
Used FDMA, sometimes with TDMA within
channels
Could not reuse channels in adjacent cells
Typically, a channel is reused roughly every seven
cells
So if there are 25 cells, each channel will be
reused about three times
B H
A E
Ch 47 Ch 47
C D
899
Channel reuse
Newer cellular systems use CDMA
Code division multiple access
Type of spread spectrum transmission that
allows multiple subscribers to transmit
simultaneously in a single channel
Allows channel reuse in adjacent cells
If there are 25 cells, each channel can be
reused 25 times
CDMA supports many more customers because
of greater channel reuse
900
450
Lecture notes Telecommunication Systems by Jorma Kekalainen
Generation 1G 2nd 3G 4G
Data transfer
30 kbps to 5 Mbps to
Data Transfer Rate is difficult; 10 kbps
500 kbps 100 Mbps
~5 kbps
901
451
Lecture notes Telecommunication Systems by Jorma Kekalainen
452
Lecture notes Telecommunication Systems by Jorma Kekalainen
905
Evolution to 4G
906
453
Lecture notes Telecommunication Systems by Jorma Kekalainen
907
Connections of networks
908
454
Lecture notes Telecommunication Systems by Jorma Kekalainen
909
910
455
Lecture notes Telecommunication Systems by Jorma Kekalainen
IP Telephony (VoIP)
IP telephony (VoIP)
IP telephony is the transmission of digitized
voice over IP
Also called voice over IP (VoIP)
Packet switching should reduce costs
compared to traditional long-distance and
international telephone calling
Can integrate voice with data services,
allowing new applications
912
456
Lecture notes Telecommunication Systems by Jorma Kekalainen
IP telephony
User either has
PC with IP telephony software
Or
IP telephone with built-in
codec and IP functionality;
Plugs directly into an IP network
PC with
IP Telephony
IP
Software
Internet
IP Telephone
with
Codec and
PSTN
IP Functionality
913
IP telephony
Media Gateway
Connects IP telephony system to the PSTN.
Does signaling and transport format
conversion.
IP
Internet Media
Gateway
PSTN
914
457
Lecture notes Telecommunication Systems by Jorma Kekalainen
Speech codecs
Codec Transmission Rate
G.711 64 kbps
G.721 32 kbps Several
different codecs
G.722 48, 56, 64 kbps can be used.
G.722.1 24, 32 kbps
Vary in
G.723 5.33, 6.4 kbps compression
G.723.1A 5.3, 6.3 kbps and sound
G.726 16, 24, 32, 40 kbps Quality.
G.728 16 kbps
G.729AB 8 kbps
915
IP telephony protocols
Signaling: H.323 or SIP
(Call setup, breakdown, etc.)
Transport
(Voice Transmission)
PC with IP IP Telephone
Telephony Software (Can connect
directly to wall jack)
H.323 specifies how real time services may be implemented over IP networks. The 3 steps
include H.225 signaling for agents to request access to the H.323 domain. H.245 signaling is
then employed for call setup, including the media streams to be used. Finally data is
transported using RTP (Real Time Protocol).
SIP - Session Initiation Protocol is an IETF protocol designed to facilitate the
establishment, maintenance and termination of multimedia sessions, which could be as
straightforward as a VoIP call but may be a much more sophisticated multimedia experience,
916
incorporating voice and video.
458
Lecture notes Telecommunication Systems by Jorma Kekalainen
IP telephony transport
UDP (User Datagram Protocol)
Used at the transport layer instead of TCP
Efficient
No opens, closes, ACKs
So creates less delay, load on the network
Unreliable
No error correction
OK because there is no time to retransmit voice packets
Receiver interpolates between received packets
917
IP telephony transport
RTP (Real Time Protocol)
Contains a sequence number so that voice packets
can be put in order even if unreliable IP and UDP
deliver them out of order
918
459
Lecture notes Telecommunication Systems by Jorma Kekalainen
920
460
Lecture notes Telecommunication Systems by Jorma Kekalainen
Deregulation
Deregulation: remove protections & restrictions
To increase competition, lowering prices
Varies by country
Varies by service within countries
Data, long-distance, and customer premises
deregulation is high.
Local voice service deregulation is low.
921
Carriers
PublicTelephone and Telegraph (PTT)
authority is the traditional domestic
monopoly carrier in most countries.
Domestic transmission: within a country
UK: British Telecoms
Japan: NTT
Ireland: Eircom
922
461
Lecture notes Telecommunication Systems by Jorma Kekalainen
Carriers LATA
In the United States
U.S. is divided into regions called local access
and transport areas (LATAs)
About 200 LATAs nationwide
Small states have just one LATA
Large states have 10 to 20 LATAs
923
LATA LEC
Carriers
ILEC CLEC
In the United States
Local exchange carriers (LECs) provide
service within a LATA
Incumbent LEC (ILEC) is the traditional monopoly
carrier in the LATA
Competitive LEC (CLEC) is a new competitor
924
462
Lecture notes Telecommunication Systems by Jorma Kekalainen
Carriers
In the United States
Inter-exchange carriers (IXCs) provide
service between LATAs
IXC
LATA LATA
925
Carriers
In the United States
Point of Presence (POP) is a place in a LATA
where all carriers interconnect to provide
integrated service to all customers
LATA
POP
ILEC IXC
CLEC IXC
926
463
Lecture notes Telecommunication Systems by Jorma Kekalainen
Telephone carriers
U.S.
Intra-LATA
LECs
ILEC
CLECs
Inter-LATA
IXCs
Most of the World
PTTsfor domestic service
ICCs for Service Between Countries
928
464
Lecture notes Telecommunication Systems by Jorma Kekalainen
Telecommunication Systems
Introduction to GPS
929
What is GPS?
The Navstar Global Positioning System (GPS) is a
space-based radionavigation system owned by the
U.S. Government and operated by the U.S. Air
Force.
GPS has provided positioning, navigation, and
timing services to military and civilian users on a
continuous worldwide basis since first launch in
1978.
An unlimited number of users with a civil or
military GPS receiver can determine accurate time
and location, in any weather, day or night,
anywhere in the world.
NAVigation System with Time And Ranging Global Positioning System
NAVSTAR Global Positioning System GPS. 930
465
Lecture notes Telecommunication Systems by Jorma Kekalainen
931
L band refers to the operating frequency range of 12 GHz (=30-15 cm) in the radio
spectrum. The L band is one of the chief operating ranges used by various applications such
932 as
radars, global positioning systems (GPS), radio, telecommunications and aircraft surveillance.
466
Lecture notes Telecommunication Systems by Jorma Kekalainen
933
My location is:
500641N,
084050E
934
467
Lecture notes Telecommunication Systems by Jorma Kekalainen
935
Applications of GPS
Applications fall into five broad categories:
Location - determining a basic position
Navigation - getting from one location to
another
Tracking - monitoring the movement of people
and things
Mapping - creating maps of the world
Timing - bringing precise timing
936
468
Lecture notes Telecommunication Systems by Jorma Kekalainen
937
938
469
Lecture notes Telecommunication Systems by Jorma Kekalainen
Space segment
Control segment
User segment
940
470
Lecture notes Telecommunication Systems by Jorma Kekalainen
GPS system
Space Segment
Colorado Springs
Control Segment
941
Space segment
>30 satellites (SVs)
20,200 km orbit
one revolution in 12 hours
The orbits are so designed that at least four
satellites are always visible above 15 cut-off
angle everywhere on Earth's surface.
942
471
Lecture notes Telecommunication Systems by Jorma Kekalainen
Space segment
Each GPS satellite has several very
accurate atomic clocks on board.
The clocks operate at a fundamental
frequency of 10.23MHz.
This frequency is used to generate the
signals that are broadcasted from the
satellite.
943
Control segment
The Control segment consists of a Master Control
Station in Colorado and 4 monitor stations in Hawaii,
Ascension Island [South Atlantic], Diego Garcia
[Indian Ocean], and Kwajelein [West Pacific].
The Control segment tracks the SVs and sends their
positions to the Master Control Station.
The Master Control Station compiles all of the orbital
data and sends it back to the monitor stations.
The Control segment then sends the orbital data
back to the SVs as a navigation message.
944
472
Lecture notes Telecommunication Systems by Jorma Kekalainen
Control segment
The Control segment tracks the GPS satellites, updates
their orbiting position and calibrates and synchronizes their
clocks.
A further important function is to determine the orbit of
each satellite and predict its path for the following 24
hours.
This information is uploaded to each satellite and
subsequently broadcast from it.
This enables the GPS receiver to know where each satellite
can be expected to be found.
The satellite signals are read at the four monitor stations.
The measurements are then sent to the Master Control
Station in Colorado where they are processed to determine
any errors in each satellite.
The information is then sent back to the four monitor
stations and uploaded to the satellites. 945
Control segment
Receives information
Process information
Transmits information
946
473
Lecture notes Telecommunication Systems by Jorma Kekalainen
User segment
The User segment consists of the GPS
equipment (receiver, antenna, radios, etc.).
The User segment receives signals sent by
the Space segment.
This info is required for the User segment
to determine a position and/or time.
947
User Segment
Multiple Applications:
Aviation
Agriculture
Emergency services
GIS data collection
Navigation
Photogrammetry
Precise positioning
Surveying
Remote sensing
Recreation (hiking etc.)
Vehicle tracking
Many more ...
474
Lecture notes Telecommunication Systems by Jorma Kekalainen
949
950
475
Lecture notes Telecommunication Systems by Jorma Kekalainen
Trilateration
One measurement narrows down our
position to the surface of a sphere
951
Trilateration
Second measurement narrows it down
to the intersection of two spheres
19,000
km
20,000
km
Intersection of
two spheres is a
circle
952
476
Lecture notes Telecommunication Systems by Jorma Kekalainen
Trilateration
Third measurement narrows it to just two
points Intersection of three
spheres is only two points
953
Trilateration
Fourth measurement decides between
two points
Fourth measurement
will only go through
one of the two points
954
477
Lecture notes Telecommunication Systems by Jorma Kekalainen
Trilateration
In theory three measurements are
enough
Four measurements required to
collect 3D positions
GPS receiver must track at least four
satellites
Parallel
Sequencing
955
GPS principle
956
478
Lecture notes Telecommunication Systems by Jorma Kekalainen
Minimum 4 satellites
SV1 SV2
SV4
SV3
SVs stands for satellite vehicles = the space segment is composed of the
957
orbiting GPS satellites
4 equations 4 unknowns
RAS 1 t AS 1 E c X S1
2
X A Y S 1 YA Z
2 S1
ZA 2
R AS 2 t AS 2 E c X S2
X A Y S 2 YA Z
2 S2
ZA
2
RAS 3 t AS 3 E c X S3
X A Y S 3 YA Z
2 S3
ZA
2
RAS 4 t AS 4 E c X S4
X A Y S 4 YA Z
2 S4
ZA 2
The estimated distances from the GPS receiver to the satellites are called
pseudoranges. 958
479
Lecture notes Telecommunication Systems by Jorma Kekalainen
Satellite ranging
Measuring the distance from a satellite
Done by measuring travel time of radio signals
959
Speed-of-light measurement
Measure how long it takes the GPS
signal to get to us
Multiply that time by 300,000 km/sec
Time (sec) x 300,000 = kilometers
960
480
Lecture notes Telecommunication Systems by Jorma Kekalainen
from satellite
961
962
481
Lecture notes Telecommunication Systems by Jorma Kekalainen
Why a code?
GPS receivers use the different codes to distinguish
between satellites.
Code lets many satellites operate on the same
frequency.
Code gives us a way to increase the signal-to-noise
ratio (SNR).
Resistant to intentional or unintentional jamming by
other radio signals.
The codes can also be used as a basis for making
pseudorange measurements and therefore calculate a
position.
963
Code correlation
Correlation value
The number of bits between two codes that
have the same value.
Autocorrelation
Correspondence between a code and a
phase shifted replica of itself.
Crosscorrelation
Correspondence between a code and a
phase shifted version of another code (of the
same length).
964
482
Lecture notes Telecommunication Systems by Jorma Kekalainen
Phase delay
Cross-correlation
965
Phase delay
966
483
Lecture notes Telecommunication Systems by Jorma Kekalainen
C/A code
C/A code (Coarse Acquisition)
Uses 2 10-bit generator polynomials
1023 bits long
1 ms duration
Clock rate of 1.023MHz
Repeats indefinitely
C/A code (Coarse Acquisition) also referred to as Civil Access code. 967
P-code
PRN codes used by the military.
Clock rate of 10.23MHz
Y-Code
Replaces P-Code when anti-spoofing
is enabled (encrypted).
Not necessary for positioning
Anti-spoofing encrypts the P-code into a signal called the Y-code so that it
cannot be mimicked by a transmitter sending false information. Only users
with military GPS receivers (the U.S. and its allies) can de-crypt the Y-
code [encrypted P-code P(Y)]. 968
484
Lecture notes Telecommunication Systems by Jorma Kekalainen
969
4 ms
6 ms
970
485
Lecture notes Telecommunication Systems by Jorma Kekalainen
4 ms
6 ms
8 ms
971
7 ms
5 ms
wrong time
wrong time
Bad position
because clock is
off by one second
972
486
Lecture notes Telecommunication Systems by Jorma Kekalainen
5 ms 7 ms
9 ms
973
974
487
Lecture notes Telecommunication Systems by Jorma Kekalainen
Satellite location
With the pseudo-random code as a timing sync
pulse, and this fourth measurement to get us
perfectly synced to universal time, we have got
everything we need to measure our distance to a
satellite in space.
But for the trilateration work we not only need to
know distance, we also need to know exactly where
the satellites are.
The spacing of the satellites are arranged so that
a minimum of five satellites are in view from every
point on the globe.
On the ground all GPS receivers have an almanac
programmed into their computers that tells them
where each satellite is. 976
488
Lecture notes Telecommunication Systems by Jorma Kekalainen
977
489
Lecture notes Telecommunication Systems by Jorma Kekalainen
Almanac message
An Almanac is a set of parameters used
to calculate the rough location of each
satellite
Almanacs are used for:
Rapid satellite acquisition
Pre-mission planning
979
Ephemeris message
An Ephemeris is a set of parameters
used to determine the accurate location
of a satellite.
Ephemeris used for:
Calculating a GPS position.
980
490
Lecture notes Telecommunication Systems by Jorma Kekalainen
Signal structure
L1 carrier
1575.42 MHz, ~19 cm wavelength
Modulated by both the C/A and P(Y) codes.
P(Y) code is 90 degrees out of phase from
the C/A code.
L2 carrier
1227.60 MHz, ~24 cm wavelength
Modulated by the P(Y) code only.
981
Signal composition
Navigation message
Bit stream with data rate of 50bps.
C/A code
Bit stream with a data rate of 1.023 Mchips
per second.
L1 Carrier
Sine wave with a frequency of 1.57542 GHz.
982
491
Lecture notes Telecommunication Systems by Jorma Kekalainen
Navigation message
Navigation frame
6s
492
Lecture notes Telecommunication Systems by Jorma Kekalainen
Navigation subframe
First 3 subframes repeat every 30 seconds.
Ephemeris and clock corrections.
Subframe data
First subframe contains Satellite clock
correction terms and GPS Week number.
Frames two and three contain precise
ephemeris data
Frame four contains ionospheric and UTC data
as well as almanac for SVs 25-32.
Frame five contains almanac for SVs 1-24 and
almanac reference time.
986
493
Lecture notes Telecommunication Systems by Jorma Kekalainen
Ionosphere
Satellite
Troposphere
geometry
Receiver noise
Multipath
987
Error sources
Ionospheric refraction
Range measurement
Tropospheric refraction
988
494
Lecture notes Telecommunication Systems by Jorma Kekalainen
Error sources
990
495
Lecture notes Telecommunication Systems by Jorma Kekalainen
Environmental errors
The speed of light is only constant in a vacuum.
As a GPS signal passes through the charged particles and
through the water vapor it gets slowed down a bit, and this
creates the same kind of error as bad clocks.
The ionosphere is the layer of the atmosphere ranging in
altitude from 50 to 500 km.
It consists of ionized particles which cause a perturbing effect
on GPS signals.
While much of the error induced by the ionosphere can be
eliminated through mathematical modeling, it is still a significant
error source.
The troposphere is the lowest part of the earth's atmosphere
that encompasses atmospheric water circulation.
Although it's full of water vapor and varies in temperature and
pressure, it causes relatively little error.
991
Error modeling
We can minimize these errors caused by non-constant speed
of light using mathematical models of the atmosphere.
Much of the delay caused by a signal's trip through our
atmosphere can be predicted.
Mathematical models of the atmosphere take into account
the charged particles in the ionosphere and the varying
gaseous content of the troposphere.
Besides, the satellites constantly transmit real-time updates
to the basic ionospheric model.
A GPS receiver must take into consideration the angle each
signal is taking as it enters the atmosphere because that
angle determines the length of the trip through the
perturbing atmosphere.
992
496
Lecture notes Telecommunication Systems by Jorma Kekalainen
Atmospheric delay
GPS signals are delayed
as they pass through
the atmosphere
Rover
Base
< 10 km > 10 km
994
497
Lecture notes Telecommunication Systems by Jorma Kekalainen
Ionospheric errors
50 1000 km above the earth
Dispersive medium affects the GPS signals
996
498
Lecture notes Telecommunication Systems by Jorma Kekalainen
Obstruction
997
Multipath
Indirect ray
998
499
Lecture notes Telecommunication Systems by Jorma Kekalainen
Multipath
999
A/D conversion
Correlation process
1000
500
Lecture notes Telecommunication Systems by Jorma Kekalainen
xDOP values
Relative position between the user and the
GPS satellites affects the accuracy
1001
1002
501
Lecture notes Telecommunication Systems by Jorma Kekalainen
SV3
SV1 SV2
SV4
X, Y, Z
1003
PDOP position (3D) dilution of precision
SV1
SV4
E.g., an antenna in a window
would have a poor DOP
X, Y, Z
1004
502
Lecture notes Telecommunication Systems by Jorma Kekalainen
1005
503
Lecture notes Telecommunication Systems by Jorma Kekalainen
Accuracy
1007
Accuracy
10 metres
95% of the time
Minimum 4 Satellites
95%
Good Geometry (DOP)
No multipath
1008
504
Lecture notes Telecommunication Systems by Jorma Kekalainen
95% (100m)
68% (50 m)
50% (40m)
1010
505
Lecture notes Telecommunication Systems by Jorma Kekalainen
1011
Differential correction
<100 m
1012
506
Lecture notes Telecommunication Systems by Jorma Kekalainen
Differential GPS
1013
507
Lecture notes Telecommunication Systems by Jorma Kekalainen
Differential GPS
Differential GPS involves the cooperation of two receivers,
one that's stationary and another that's roving around
making position measurements.
The stationary receiver ties all the satellite measurements
into a solid local reference.
GPS receivers use timing signals from at least four satellites
to establish a position.
Each of those timing signals is going to have some error or
delay depending on what sort of perils have befallen it on its
trip down to us.
Since each of the timing signals has some error, then
position calculation is going to be a compounding of those
errors.
1015
Common errors
The satellites are so far out in space that the little
distances we travel here on earth are insignificant.
So if two receivers are fairly close to each other, say within
a few hundred kilometers, the signals that reach both of
them will have traveled through virtually the same slice of
atmosphere, and so will have virtually the same errors.
Differential GPS can eliminate all errors that are common to
both the reference receiver and the roving receiver.
These include everything except multipath errors (because
they occur right around the receiver) and any receiver
errors (because they are unique to the receiver).
508
Lecture notes Telecommunication Systems by Jorma Kekalainen
1017
Error transmission
Since the reference receiver has no way of knowing which of the
many available satellites a roving receiver might be using to
calculate its position, the reference receiver quickly runs through
all the visible satellites and computes each of their errors.
Then it encodes this information into a standard format and
transmits it to the roving receivers.
GPS receivers don't actually transmit corrections by themselves.
They are linked to separate radio transmitters.
The roving receivers get the complete list of errors and apply the
corrections for the particular satellites they're using.
Error transmissions not only include the timing error for each
satellite, they also include the rate of change of that error as
well.
That way the roving receiver can interpolate its position between
updates. 1018
509
Lecture notes Telecommunication Systems by Jorma Kekalainen
DGPS principle
1019
DGPS principle
SV2 SV3
SV1 Range corrections
rather than
position correction
Observed X, Y, Z
Known X, Y, Z Y Z
Rover
X
Reference Station
1020
510
Lecture notes Telecommunication Systems by Jorma Kekalainen
DGPS methods
1021
511
Lecture notes Telecommunication Systems by Jorma Kekalainen
Atmospheric
S/A
0 20 40 60 80 100
Meters
1023
Augmentation
Improving the navigation solution is sometimes referred to as
augmentation
A GPS augmentation is any system that aids GPS by providing
accuracy, integrity, availability, or any other improvement to
positioning, navigation, and timing that is not inherently part
of GPS itself.
A wide range of different augmentation systems have been
developed by both the public and private sectors.
Augmentation methods of improving accuracy rely on external
information being integrated into the calculation process
LAAS Local Area Augmentation System
WAAS Wide Area Augmentation System
EGNOS European Geostationary Navigation Overlay System
1024
512
Lecture notes Telecommunication Systems by Jorma Kekalainen
Availability - Everywhere
Accuracy - ?
1025
100 m
513
Lecture notes Telecommunication Systems by Jorma Kekalainen
6-11 m
GPS II R
C/A Code on L1
Selective Availability Off
1027
3-5 m
GPS II R(M)
C/A Code on L1
Civil Code on L2 1028
514
Lecture notes Telecommunication Systems by Jorma Kekalainen
Better
resistance to
interference
1-3 m
GPS II F
C/A Code on L1
Civil Code on L2
New Code on L5
1029
?
GPS III
Full Operational Capability 1030
515
Lecture notes Telecommunication Systems by Jorma Kekalainen
Accuracy by interoperability
Receivers
1032
516
Lecture notes Telecommunication Systems by Jorma Kekalainen
1033
Lidar principle:
GPS position of plane
Laser distance to ground
+/-0.5m Horizontal
+/-0.1m Vertical
Radar = Radio Detection and Ranging
Lidar=Light Detection and Ranging 1034
517
Lecture notes Telecommunication Systems by Jorma Kekalainen
Point features
Multiple GPS positions
are collected
For point features a number of GPS positions are recorded, while the GPS
receiver is stationary. These positions are then averaged by the PC
software before being output to your GIS so that a single GPS position
1036
is
transferred.
518
Lecture notes Telecommunication Systems by Jorma Kekalainen
Line features
Joins each GPS position
together in TIME
11:00.25
SEQUENCE
Area features 11:30.10
11:30.25
11:30.20
1037
For an area (polygon) feature, a number of GPS positions are recorded while the GPS receiver
moves around the area. The GPS positions recorded around the area are treated as vertices.
Summary
1038
519
Lecture notes Telecommunication Systems by Jorma Kekalainen
Summary
1039
Summary
To improve on precision/accuracy of
positions requires:
corrections
corrections can be applied after survey
corrections can be applied in real time
real time corrections need to be transmitted in
special formats e.g. NMEA
520