The module consists of the following 8 components:
2. Data link layer;
3. Medium access control sublayer;
4. Network layer;
5. Queueing theory and queueing models;
6. Cellular wireless networks;
7. Wireless local area networks;
8. Resource allocation in OFDMA systems.
Aims and Objectives
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- Be familiar with the architecture and protocols of typical communications networks
- Possess knowledge of flow control, congestion control, error control, etc. in wireless networks
- Possess knowledge of cellular wireless communications systems
- Be aware of the techniques and basic principles of wireless LANs, wireless ad-hoc networks, wireless sensor networks, etc.
- Possess knowledge of communication security and be aware of some communication security techniques
- Be aware of some routing algorithms, delay modelling, multiple-access principles, basic queueing theory, etc.
- Introduction to data networks: layered architectures, TCP/IP protocol architecture, OSI model, main functions of different layers, relationship between layers, etc.
- Structure of wireless and mobile networks, including cellular networks, wireless local area networks, ad-hoc networks, and wireless sensor networks
- Wireless multiple-access techniques, including randomised medium access (ALOHA and CSMA), FDMA, TDMA, CDMA, SDMA;
- Wireless routing: routing optimisation and routing protocols.
- Queueing theory, delay modelling, etc.
- Error-control with the emphasis on the various Automatic Repeat-reQuest (ARQ) protocols
- Cellular wireless networks: architecture, frequency reuse, multiplexing, multiple-access, broadcast, power-control, handover, interference, examples of TDMA-, CDMA- and LTE-based cellular networks, etc.
- Wireless resource-allocation
- Wireless LANs: techniques, IEEE 802.11/IEEE 802.16 physical layer, MAC sublayer protocol and frame structure, etc.
- Network security: Overview of information-theoretic security, cryptography and physical-layer security, symmetric-key algorithms, public-key algorithms, digital signatures, authentication protocols, physical-layer security techniques.
Learning and Teaching
|Preparation for scheduled sessions||18|
|Completion of assessment task||2|
|Wider reading or practice||54|
|Total study time||150|
Resources & Reading list
A. S. Tanenbaum (2003). Computer Networks. New Jersey, USA: Prentice Hall, Upper Saddle River.
W. Stallings (2007). Data and Computer Communications. New Jersey, USA: Prentice Hall, Upper Saddle River.
D. Bertsekas and R. Gallager (1992). Data Networks. New Jersey, USA: Prentice Hall, Upper Saddle River.
W. Stallings (2005). Wireless Communications and Networks. New Jersey, USA: Prentice Hall, Upper Saddle River.
A. Goldsmith (2005). Wireless Communications. Cambridge University Press.
W.C.Y. Lee (2006). Wireless and Cellular Telecommunications. USA: McGRAW-HILL.
T. S. Rappaport (1992). Wireless Communications. New Jersey, USA: Prentice Hall, Upper Saddle River.
This is how we’ll formally assess what you have learned in this module.
This is how we’ll assess you if you don’t meet the criteria to pass this module.
An internal repeat is where you take all of your modules again, including any you passed. An external repeat is where you only re-take the modules you failed.
Repeat type: Internal & External