The University of Southampton

ELEC6219 Wireless and Mobile Networks

Module Overview

The aim of the module is to introduce students to the theory, architecture, protocols and techniques in wireless and mobile networks.

It is taught to the MSc in Wireless Communications and as an option for Part IV MEng in Electronics.

Aims & Objectives

Aims

Knowledge and Understanding

Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:

  • be familiar with the architecture and protocols of typical communications networks
  • possess knowledge of flow control, congestion control, error control, etc, in wireless networks
  • be aware of some routing algorithms, delay modelling, multiple-access principles, basic queueing theory, etc
  • possess knowledge of cellular wireless communications systems
  • be aware of the techniques and basic principles of wireless LANs, wireless ad-hoc networks, wireless sensor networks, etc.
  • possess knowledge of communication security and be aware of some communication security techniques

Syllabus

  • Introduction to data networks: layered architectures, TCP/IP protocol architecture, OSI model, main functions of different layers, relationship between layers, etc.;
  • Structure of wireless and mobile networks, including cellular networks, wireless local area networks, ad-hoc networks, and wireless sensor networks;
  • Wireless multiple-access techniques, including randomised medium access (ALOHA and CSMA),  FDMA, TDMA, CDMA, SDMA;
  • Wireless routing: routing optimisation and routing protocols.
  • Queueing theory, delay modelling, etc.;
  • Error-control with the emphasis on the various Automatic Repeat-reQuest (ARQ) protocols;
  • Cellular wireless networks: architecture, frequency reuse, multiplexing, multiple-access, broadcast, power-control, handover, interference, examples of TDMA-, CDMA- and LTE-based cellular networks, etc.;
  • Wireless resource-allocation;
  • Wireless LANs: techniques, IEEE 802.11/IEEE 802.16 physical layer, MAC sublayer protocol and frame structure, etc.
  • Network security: Overview of information-theoretic security, cryptography and physical-layer security, symmetric-key algorithms, public-key algorithms, digital signatures, authentication protocols, physical-layer security techniques.

Learning & Teaching

Learning & teaching methods

ActivityDescriptionHours
Lecture36
Tutorial12

Assessment

Assessment methods

MethodHoursPercentage contribution
Exam2 hours100%

Referral Method: By examination

Share this module FacebookTwitterWeibo