The module consists of the following 8 components:
2. Data link layer;
3. Medium access control sublayer;
4. Network layer;
5. Queueing theory and queueing models;
6. Cellular wireless networks;
7. Wireless local area networks;
8. Resource allocation in OFDMA systems.
Aims and Objectives
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- Be familiar with the architecture and protocols of typical communications networks
- Be aware of some routing algorithms, delay modelling, multiple-access principles, basic queueing theory, etc.
- Possess knowledge of communication security and be aware of some communication security techniques
- Be aware of the techniques and basic principles of wireless LANs, wireless ad-hoc networks, wireless sensor networks, etc.
- Possess knowledge of cellular wireless communications systems
- Possess knowledge of flow control, congestion control, error control, etc. in wireless networks
- Introduction to data networks: layered architectures, TCP/IP protocol architecture, OSI model, main functions of different layers, relationship between layers, etc.
- Structure of wireless and mobile networks, including cellular networks, wireless local area networks, ad-hoc networks, and wireless sensor networks
- Wireless multiple-access techniques, including randomised medium access (ALOHA and CSMA), FDMA, TDMA, CDMA, SDMA;
- Wireless routing: routing optimisation and routing protocols.
- Queueing theory, delay modelling, etc.
- Error-control with the emphasis on the various Automatic Repeat-reQuest (ARQ) protocols
- Cellular wireless networks: architecture, frequency reuse, multiplexing, multiple-access, broadcast, power-control, handover, interference, examples of TDMA-, CDMA- and LTE-based cellular networks, etc.
- Wireless resource-allocation
- Wireless LANs: techniques, IEEE 802.11/IEEE 802.16 physical layer, MAC sublayer protocol and frame structure, etc.
- Network security: Overview of information-theoretic security, cryptography and physical-layer security, symmetric-key algorithms, public-key algorithms, digital signatures, authentication protocols, physical-layer security techniques.
Learning and Teaching
|Wider reading or practice||54|
|Completion of assessment task||2|
|Preparation for scheduled sessions||18|
|Total study time||150|
Resources & Reading list
T. S. Rappaport (1992). Wireless Communications. New Jersey, USA: Prentice Hall, Upper Saddle River.
W. Stallings (2005). Wireless Communications and Networks. New Jersey, USA: Prentice Hall, Upper Saddle River.
W.C.Y. Lee (2006). Wireless and Cellular Telecommunications. USA: McGRAW-HILL.
A. S. Tanenbaum (2003). Computer Networks. New Jersey, USA: Prentice Hall, Upper Saddle River.
W. Stallings (2007). Data and Computer Communications. New Jersey, USA: Prentice Hall, Upper Saddle River.
D. Bertsekas and R. Gallager (1992). Data Networks. New Jersey, USA: Prentice Hall, Upper Saddle River.
A. Goldsmith (2005). Wireless Communications. Cambridge University Press.
This is how we’ll formally assess what you have learned in this module.
This is how we’ll assess you if you don’t meet the criteria to pass this module.
An internal repeat is where you take all of your modules again, including any you passed. An external repeat is where you only re-take the modules you failed.
Repeat type: Internal & External