Mobile Communications
|
|
- Aubrey Richard
- 5 years ago
- Views:
Transcription
1 COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1
2 Multiple access Communication links by wire or radio generally provide access to several users at once. Multiple access techniques used by mobile phones include: Frequency division multiple access (FDMA), Time division multiple access (TDMA), Code division multiple access (CDMA), Orthogonal frequency division multiple access (OFDMA) Spatial division multiple access (cellular radio) Several of these are combined e.g. 2G-GSM uses FDMA, TDMA & Spatial In principle, provide connection-oriented channels that do not interfere with each other. 16/03/2018 Lecture 7 2
3 Medium access control (mac) Term reserved for wired & wireless packet switched netwrks: e.g. Ethernet where one wire is shared, e.g. Wi-Fi where one radio channel is shared. Sharing mechanism is contention at the physical layer. Much simpler than FDMA, CDMA etc Simplest version is ALOHA, invented in Hawaii: There is one wire or radio channel a broadcast channel Users can just transmit when they like! 16/03/2018 Lecture 7 3
4 Pure ALOHA (1970s) Stations transmit whenever they have data to send Success is detected at the transmitter by listening to channel while transmitting or by receiving an acknowledgement from receiver If transmission is found to be unsuccessful, send it again but not immediately. Why not? Consider why it failed probably because there was collision with somebody else s transmission. If everybody repeats immediately, collision will occur again. Insert random back-off delay after any collision This is a form of multiple access by collision sensing. 16/03/2018 Lecture 7 4
5 Transmitter Pure ALOHA (illustrated) Y R B again again Collision 2 2 again 2 Collisions 2 again 3 again t Three transmitters (Y,R & B) trying to send packets of varying length. When collisions occur, transmitters wait for random times, then re-send. 16/03/2018 Lecture 7 5
6 Transmitter Slotted ALOHA (illustrated) Y R B 50 s again 4 again 2 again t Collisions Works best when all packets have same length, say 50 microseconds. Time-domain is now divided into time-slots of 50 s. Each transmitter must wait until the start of a new slot before sending. Fewer collisions occur 16/03/2018 Lecture 7 6
7 Efficiency of ALOHA Graph reproduced from recommended text-book Assumes large number of users & equal length packets Few transmissns - few collisions Many transmissns Many collisions Pure ALOHA achieves max 18% channel utilization Slotted ALOHA achieves max 37% utilization plus 37% empty, 26% collisions 16/03/2018 Lecture 7 7
8 Explanation of previous graph If network is able to transmit fixed packets of length=p bits at B bit/s, frame time T F = P/B seconds. e.g. if P = 1000 & B = 20 Mb/s, T F = 50 microseconds We can send 20,000 frames in a second. We have 20,000 transmission opportunities per second. What percentage of these convey a successful packet? If all trans opps resulted in a successful packet it would be 100 %. Probability of successful packet per transmission opp would be 1. Call this S = (throughput per frame time) Some opps not used when there are few transmissns. Opps will be wasted when collisions occur. Successful packets may require many re-transmissions. We cannot expect S to be close to 1. 16/03/2018 Lecture 7 8
9 Attempts per packet time (G) With few transmissions, almost no re-transmissions needed: Lots of users, but they are not transmitting very often Therefore attempts per packet time G is low. Almost no collisions, but most transmit opps are not being used S is low because the network is hardly being used. As users increase their transmissions: More transmit opps are used, but number of collisions increases Therefore G increases. S rises to 0.18 for pure, but then starts to fall as more & more opps are wasted with collisions or are used for re-transmissions. Max throughput (channel utilisation efficiency) is: 18 % of its full capacity for pure ALOHA 37 % for slotted ALOHA. 16/03/2018 Lecture 7 9
10 Carrier Sense Multiple Access (CSMA) Each transmitter listens to channel before deciding whether to transmit If a carrier signal is detected, some-one else is transmitting. 1-persistent CSMA: continually monitors channel (greedy) waits until no carrier is detected, then transmits immediately. waits for random time after any collision, then starts again. non-persistent CSMA: monitors channel at random time intervals (less greedy) waits until no carrier is detected, then transmits immediately. waits for random time after any collision, then starts again. p-persistent CSMA (for slotted channels): monitors channel at each time-slot if no carrier detected, generates a random integer in range 1 to 1/p Like throwing a 1/p-sided dice. if dice shows 1 it transmits; otherwise it waits till next slot. waits for random time after any collision, then starts again. 16/03/2018 Lecture 7 10
11 Randomisation CSMA relies on randomisation in various ways. Generates pseudo-random numbers for the back-off delay. Throwing a 1/p-sided dice: Generate random integer uniformly* distributed between 1 & 1/p. That s it. (* binomially) If it is 1, we have thrown a 1, therefore transmit, otherwise wait. For 0.5 persistence, need 2 sided dice, or a coin. If it is 1 or heads we transmit if it is 2 or tails we wait 16/03/2018 Lecture 7 11
12 How can collisions occur with CSMA? Does CSMA eliminates possibility of collisions? Unfortunately not. Two transmitters, A & B say, may sense the channel clear and start transmitting at exactly the same time. Transmission from A will take some time to reach B. And vice-versa. Because of these delays A, B or both may have started transmitting before they realise that the other one has started also. Therefore a collision occurs. Therefore, must continue to use the random back-off provision that was invented for ALOHA collisions. 16/03/2018 Lecture 7 12
13 Persistent and non-persistent CSMA Graph reproduced from recommended text-book. Assumes many users & equal length packets. Comparison of the channel utilization versus load for various random access protocols. 16/03/2018 Lecture 7 13
14 Comment Seem to be getting close to 100% efficiency with very low persistence. But we have not considered how long it takes packets to get through - delay 0.01 persistent CSMA only uses 1 opp out of every 100. Network seems efficiently used for a lot of users. But to any individual user it will be V E R Y S L O W. 16/03/2018 Lecture 7 14
15 CSMA with collision detection Transmitter must monitor its own transmissions Abort transmission as soon as a collision is detected. Saves time, power & transmission capacity. Used by wired Ethernet. Carrier detection is physical layer process. Result used by Medium Access Control sub-layer It is part of the data-link layer. MAC sub-layer makes decisions about when to transmit, when to back-off, etc. 16/03/2018 Lecture 7 15
16 CSMA with collision avoidance CSMA/CD is fine for wired systems but not for wireless. Wireless transmitter cannot easily monitor its own transmissions. It is either transmitting or receiving, but not both at same time Also, it is not appropriate, since what matters is collision at seen the receiver. This may be different from what is observed at the transmitter. With wireless, emphasis is on avoiding collision. IEE supports 2 transmission modes: Non-contention mode (PCF) using centralised control Contention mode (DCF) using CSMA/CA PCF is optional & not widely used. Concentrate on DCF. 16/03/2018 Lecture 7 16
17 Wi-Fi contention mode Uses real channel sensing, i.e. Transmitter senses channel, & if it is free just starts transmitting. Collisions sensed at receiver at end of transmission. Receiver sends acknowledgement (ACK) for correct packet. Transmitter re-sends (with back-off delay) when ACK not received Also virtual (RTS/CTS) channel sensing, i.e. If A wants to transmit to B, it sends a short RTS (request to send) control frame If B is ready, it sends back a CTS (clear to send) control frame. A now sends its message frame & starts an ACK timer When B receives frame, sends an ACK. If A does not receive an ACK in time, it re-transmits. When other users hear RTS or CTS, they set a network allocation vector flag (NAV) for a period of time. No transmissions allowed while NAV is set. Devices can sleep. 16/03/2018 Lecture 7 17
18 Network allocation vector (NAV) NAV is a virtual carrier sensing flag. The other devices are not sensing the carrier They are told to assume that the channel is busy. RTS/CTS also solves hidden & exposed device problems 16/03/2018 Lecture 7 18
19 Hidden device (station) problem A B C Range of transmissions from C C is hidden from A (by distance) A wants to transmit to B, but will not hear any transmissions from C. It may just assume channel is free and transmit. Messages from A and C will cause collision at B. This is bad. But if A sends RTS to B while B is talking to C, B won t hear it. So B will not send CTS, so A will not transmit until B is ready. 16/03/2018 Lecture 7 19
20 Exposed device (station) problem A B C Range of transmissions from C D C is exposed to A because it needlessly prevents B from transmitting to A. B wants to transmit to A who will not hear transmissions from C or D. C may be transmitting to D. B hears C & will assume channel is not free & that it cannot transmit. But, in fact, B can transmit to A while C is transmitting to D. C will not hear B because it is transmitting & D is too far away to hear B. 16/03/2018 Lecture 7 20
21 Bluetooth Architecture Basic unit of a Bluetooth system is a pico-net Consists of a master node And up to 7 slaves within 10 m. Two piconets can be connected to form a scatternet See recommended text-book Tanenbaum PP in Version 4. PP in Version 5 16/03/2018 Lecture 7 21
22 Text-book 16/03/2018 Lecture 7 22
23 Power & spatial multiplexing Remember, for mobile wireless communications transmit power affects battery life excessive transmit power also increases interference with other users e.g. in cellular system with small cells use the minimum power necessary better error correction = lower power reduce power until correctable errors occur? Trade-off of extra bits for better FEC against lower energy/bit 16/03/2018 Lecture 7 23
24 Summary Multiple access mechanisms for cellular telephony: FDMA, TDMA, CDMA & OFDMA Also spatial since transmissions have limited range. Mechanisms (MAC) for computer networks: pure & slotted ALOHA, CSMA/CD for wired PCF (non-contention mode for WiFi: optional) CSMA/CA (contention mode for WiFi) RTS/CTS (MACAW solves hidden station problem) For spatial multiplexing, transmission power must be carefully controlled Can reduce power until correctable errors occur. 16/03/2018 Lecture 7 24
Chapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More informationMedium Access Control
CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example
More informationMobile Computing. Chapter 3: Medium Access Control
Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access
More informationDOPPLER SHIFT. Thus, the frequency of the received signal is
DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa
ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access
More information1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux
1. Introduction 1.2 Medium Access Control Prof. JP Hubaux 1 Modulation and demodulation (reminder) analog baseband digital signal data digital analog 101101001 modulation modulation radio transmitter radio
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More informationChapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA
Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationMedium Access Methods. Lecture 9
Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated
More informationWireless Transmission & Media Access
Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationMultiple Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol
More informationCOM-405 Mobile Networks. Module A (Part A2) Introduction
COM-405 Mobile Networks Module A (Part A2) Introduction Prof. JP Hubaux http://mobnet.epfl.ch Note: some of the slides of this and other modules and derived from Schiller s book 1 Modulation and demodulation
More informationComputer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University
Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More information6.1 Multiple Access Communications
Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More information% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.
! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY
More informationMultiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access
More informationIlenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello
Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative
More informationNetwork Management System for Telecommunication and Internet Application
Network Management System for Telecommunication and Internet Application Gerd Bumiller GmbH Unterschlauersbacher-Hauptstr. 10, D-906 13 Groahabersdorf, Germany Phone: +49 9105 9960-51, Fax: +49 9105 9960-19,
More informationFree space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.
Signal Propagation and Power Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f P rcv P snd 1 d 2 f 2 quadratic decrease in distance
More informationMultiple Access Techniques
Multiple Access Techniques EE 442 Spring Semester Lecture 13 Multiple Access is the use of multiplexing techniques to provide communication service to multiple users over a single channel. It allows for
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationMedium Access Schemes
Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource
More informationCOSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B
MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of
More informationLecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday
Lecture 7: Centralized MAC protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Centralized MAC protocols Previous lecture contention based MAC protocols, users decide who transmits when in a decentralized
More informationStructure of the Lecture
Structure of the Lecture Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Channels in a frequency band Static medium access methods Flexible medium access methods Chapter 3 Wireless
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer
Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,
More informationMultiple Access Techniques
Multiple Access Techniques Instructor: Prof. Dr. Noor M. Khan Department of Electrical Engineering, Faculty of Engineering, Mohammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +92
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationMultiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions
CHAPTER 12 Multiple Access Solutions to Review Questions and Exercises Review Questions 1. The three categies of multiple access protocols discussed in this chapter are random access, controlled access,
More informationIntroduction to Mobile Computing The rapidly expanding technology of cellular communication, wireless LANs, and satellite services will make information accessible anywhere and at any time. Regardless
More informationMultiple Access Techniques for Wireless Communications
Multiple Access Techniques for Wireless Communications Contents 1. Frequency Division Multiple Access (FDMA) 2. Time Division Multiple Access (TDMA) 3. Code Division Multiple Access (CDMA) 4. Space Division
More informationLecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning
More informationWi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering
Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This
More informationLecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications
COMM 907: Spread Spectrum Communications Lecture 10 - LTE (4G) -Technologies used in 4G and 5G The Need for LTE Long Term Evolution (LTE) With the growth of mobile data and mobile users, it becomes essential
More informationWireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN
Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic
More informationMultiple Access Schemes
Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationOPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE
OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE 802.11 NETWORKS Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2004 APPROVED: Robert
More informationAccess Methods and Spectral Efficiency
Access Methods and Spectral Efficiency Yousef Dama An-Najah National University Mobile Communications Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) segment space into sectors, use
More informationMobile Communications
Mobile Communications Lecture 6 Mobile networks 16 / 03 / 18 COMP61242 Barry Cheetham 16Mar'18 Lecture 6 COMP61242 1 Quality of Service (QoS( QoS) Quality of service (QoS) is quality of a communication
More informationMultiplexing Module W.tra.2
Multiplexing Module W.tra.2 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Multiplexing W.tra.2-2 Multiplexing shared medium at
More informationAdvanced Computer Networks. Wireless Networks Fundamentals
Advanced Computer Networks 263 3501 00 Wireless Networks Fundamentals Patrick Stuedi Spring Semester 2014 Oriana Riva, ETH Zürich Course Outline 1. General principles of network design Review of basic
More informationWireless Networks (PHY): Design for Diversity
Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:
More informationPULSE: A MAC Protocol for RFID Networks
PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)
More informationAn Opportunistic Frequency Channels Selection Scheme for Interference Minimization
Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) An Opportunistic Frequency Channels Selection Scheme for Interference Minimization 978-1-4799-5233-5/14/$31.00
More informationAn Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009
An Introduction to Wireless Technologies Part 2 F. Ricci 2008/2009 Content Multiplexing Medium access control Medium access control (MAC): FDMA = Frequency Division Multiple Access TDMA = Time Division
More informationMOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.
MOBILE COMPUTING CSE 40814/60814 Spring 2018 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch
More informationSummary of Basic Concepts
Transmission Summary of Basic Concepts Sender Channel Receiver Dr. Christian Rohner Encoding Modulation Demodulation Decoding Bits Symbols Noise Terminology Communications Research Group Bandwidth [Hz]
More informationISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks
ISHIK UNIVERSITY Faculty of Science Department of Information Technology 2017-2018 Fall Course Name: Wireless Networks Agenda Lecture 4 Multiple Access Techniques: FDMA, TDMA, SDMA and CDMA 1. Frequency
More informationIntroduction to Wireless Networks p. 1 Evolution of Wireless Networks p. 2 Early Mobile Telephony p. 2 Analog Cellular Telephony p.
Preface p. xv Introduction to Wireless Networks p. 1 Evolution of Wireless Networks p. 2 Early Mobile Telephony p. 2 Analog Cellular Telephony p. 3 Digital Cellular Telephony p. 4 Cordless Phones p. 7
More informationMobile Communication and Mobile Computing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de Structure
More informationA MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks
A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks Thanasis Korakis Gentian Jakllari Leandros Tassiulas Computer Engineering and Telecommunications Department University
More informationWireless Network Pricing Chapter 2: Wireless Communications Basics
Wireless Network Pricing Chapter 2: Wireless Communications Basics Jianwei Huang & Lin Gao Network Communications and Economics Lab (NCEL) Information Engineering Department The Chinese University of Hong
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationMobile Communications
Quality of Service (QoS( QoS) Mobile Communications Lecture 6 Mobile networks 16 / 03 / 18 COMP61242 Barry Cheetham Quality of service (QoS) is quality of a communication link as perceived by users of
More informationBy Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor
Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings
More informationA Cross Layer Routing Protocol for OFDMA Based Mobile Ad Hoc Networks.
A Cross Layer Routing Protocol for OFDMA Based Mobile Ad Hoc Networks. Xiong, Hong Yi The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published
More informationMultiple Access System
Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same
More informationFiber Distributed Data Interface
Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses
More informationCompressed Sensing for Multiple Access
Compressed Sensing for Multiple Access Xiaodai Dong Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Tohoku University, Sendai, Japan Oct. 28, 2013 Outline Background Existing
More informationAn Introduction to Wireless Technologies Part 2. F. Ricci
An Introduction to Wireless Technologies Part 2 F. Ricci Content Medium access control (MAC): FDMA = Frequency Division Multiple Access TDMA = Time Division Multiple Access CDMA = Code Division Multiple
More informationMultiple access techniques
Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ
More informationT325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.
T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:
More informationDifference Between. 1. Old connection is broken before a new connection is activated.
Difference Between Hard handoff Soft handoff 1. Old connection is broken before a new connection is activated. 1. New connection is activated before the old is broken. 2. "break before make" connection
More informationSC - Single carrier systems One carrier carries data stream
Digital modulation SC - Single carrier systems One carrier carries data stream MC - Multi-carrier systems Many carriers are used for data transmission. Data stream is divided into sub-streams and each
More informationCode Division Multiple Access.
Code Division Multiple Access Mobile telephony, using the concept of cellular architecture, are built based on GSM (Global System for Mobile communication) and IS-95(Intermediate Standard-95). CDMA allows
More informationCOMPILED BY : - GAUTAM SINGH STUDY MATERIAL TELCOM What is Wi-Fi?
What is Wi-Fi? WiFi stands for Wireless Fidelity. WiFiIt is based on the IEEE 802.11 family of standards and is primarily a local area networking (LAN) technology designed to provide in-building broadband
More informationAEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved.
AEROHIVE NETWORKS 802.11ax DAVID SIMON, SENIOR SYSTEMS ENGINEER 1 2018 Aerohive Networks. All Rights Reserved. 2 2018 Aerohive Networks. All Rights Reserved. 8802.11ax 802.11n and 802.11ac 802.11n and
More informationMobile Communication Systems. Part 7- Multiplexing
Mobile Communication Systems Part 7- Multiplexing Professor Z Ghassemlooy Faculty of Engineering and Environment University of Northumbria U.K. http://soe.ac.uk/ocr Contents Multiple Access Multiplexing
More informationDirect Link Communication II: Wireless Media. Current Trend
Direct Link Communication II: Wireless Media Current Trend WLAN explosion (also called WiFi) took most by surprise cellular telephony: 3G/4G cellular providers/telcos/data in the same mix self-organization
More informationChapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University
Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationOutline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.
Wireless Networks (PHY): Design or Diversity Admin and recap Design or diversity Y. Richard Yang 9/2/212 2 Admin Assignment 1 questions Assignment 1 oice hours Thursday 3-4 @ AKW 37A Channel characteristics
More informationECS455: Chapter 4 Multiple Access
ECS455: Chapter 4 Multiple Access Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 1 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 ECS455: Chapter 4 Multiple
More informationAutomatic power/channel management in Wi-Fi networks
Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance
More informationTechnical Aspects of LTE Part I: OFDM
Technical Aspects of LTE Part I: OFDM By Mohammad Movahhedian, Ph.D., MIET, MIEEE m.movahhedian@mci.ir ITU regional workshop on Long-Term Evolution 9-11 Dec. 2013 Outline Motivation for LTE LTE Network
More informationCROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS
CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical
More informationLecture 8 Mul+user Systems
Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith
More informationLower Layers PART1: IEEE and the ZOLERTIA Z1 Radio
Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission
More informationPage 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE
Overview 18-759: Wireless Networks Lecture 9: OFDM, WiMAX, LTE Dina Papagiannaki & Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/
More informationUNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY
[CRT02] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY MODULE NO: CPU5009 Date: Thursday 14 th January 2016
More informationMobile Communications: Technology and QoS
Mobile Communications: Technology and QoS Course Overview! Marc Kuhn, Yahia Hassan kuhn@nari.ee.ethz.ch / hassan@nari.ee.ethz.ch Institut für Kommunikationstechnik (IKT) Wireless Communications Group ETH
More informationCDMA is used to a limited extent on the 800-MHz band, but is much more common in the 1900-MHz PCS band. It uses code-division multiple access by
IS-95 CDMA PCS CDMA Frequency Use CDMA Channels Forward Channel Reverse Channel Voice Coding Mobile Power Control Rake Receivers and Soft handoffs CDMA Security CDMA is used to a limited extent on the
More information10EC81-Wireless Communication UNIT-6
UNIT-6 The first form of CDMA to be implemented is IS-95, specified a dual mode of operation in the 800Mhz cellular band for both AMPS and CDMA. IS-95 standard describes the structure of wideband 1.25Mhz
More informationInterference management Within 3GPP LTE advanced
Interference management Within 3GPP LTE advanced Konstantinos Dimou, PhD Senior Research Engineer, Wireless Access Networks, Ericsson research konstantinos.dimou@ericsson.com 2013-02-20 Outline Introduction
More informationNext Generation Wireless LANs
Next Generation Wireless LANs 802.11n and 802.11ac ELDAD PERAHIA Intel Corporation ROBERTSTACEY Apple Inc. и CAMBRIDGE UNIVERSITY PRESS Contents Foreword by Dr. Andrew Myles Preface to the first edition
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More informationSTUDIES IN WIRELESS HOME NETWORKING INCLUDING COEXISTENCE OF UWB AND IEEE A SYSTEMS
STUDIES IN WIRELESS HOME NETWORKING INCLUDING COEXISTENCE OF UWB AND IEEE 802.11A SYSTEMS A Dissertation Presented to The Academic Faculty by Babak Firoozbakhsh In Partial Fulfillment of the Requirements
More informationMultiple Access. Difference between Multiplexing and Multiple Access
Multiple Access (MA) Satellite transponders are wide bandwidth devices with bandwidths standard bandwidth of around 35 MHz to 7 MHz. A satellite transponder is rarely used fully by a single user (for example
More information