ELEC6219 Wireless and Mobile Networks
The module consists of the following 8 components: 1. Introduction; 2. Data link layer; 3. Medium access control sublayer; 4. Network layer; 5. Queueing theory and queueing models; 6. Cellular wireless networks; 7. Wireless local area networks; 8. Resource allocation in OFDMA systems.
Aims and Objectives
To introduce students to the theory, architecture, protocols and techniques in wireless and mobile networks
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- Be familiar with the architecture and protocols of typical communications networks
- Possess knowledge of flow control, congestion control, error control, etc. in wireless networks
- Be aware of some routing algorithms, delay modelling, multiple-access principles, basic queueing theory, etc.
- Possess knowledge of cellular wireless communications systems
- Be aware of the techniques and basic principles of wireless LANs, wireless ad-hoc networks, wireless sensor networks, etc.
- Possess knowledge of communication security and be aware of some communication security techniques
- Introduction to data networks: layered architectures, TCP/IP protocol architecture, OSI model, main functions of different layers, relationship between layers, etc. - Structure of wireless and mobile networks, including cellular networks, wireless local area networks, ad-hoc networks, and wireless sensor networks - Wireless multiple-access techniques, including randomised medium access (ALOHA and CSMA), FDMA, TDMA, CDMA, SDMA; - Wireless routing: routing optimisation and routing protocols. - Queueing theory, delay modelling, etc. - Error-control with the emphasis on the various Automatic Repeat-reQuest (ARQ) protocols - Cellular wireless networks: architecture, frequency reuse, multiplexing, multiple-access, broadcast, power-control, handover, interference, examples of TDMA-, CDMA- and LTE-based cellular networks, etc. - Wireless resource-allocation - Wireless LANs: techniques, IEEE 802.11/IEEE 802.16 physical layer, MAC sublayer protocol and frame structure, etc. - Network security: Overview of information-theoretic security, cryptography and physical-layer security, symmetric-key algorithms, public-key algorithms, digital signatures, authentication protocols, physical-layer security techniques.
Learning and Teaching
|Completion of assessment task||2|
|Preparation for scheduled sessions||18|
|Wider reading or practice||54|
|Total study time||150|
Resources & Reading list
A. S. Tanenbaum (2003). Computer Networks.
T. S. Rappaport (1992). Wireless Communications.
W.C.Y. Lee (2006). Wireless and Cellular Telecommunications.
A. Goldsmith (2005). Wireless Communications.
W. Stallings (2005). Wireless Communications and Networks.
D. Bertsekas and R. Gallager (1992). Data Networks.
W. Stallings (2007). Data and Computer Communications.
|Exam (2 hours)||100%|
|Exam (2 hours)||100%|
Repeat type: Internal & External