Mobile Communications

Size: px
Start display at page:

Download "Mobile Communications"

Transcription

1 COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1

2 Multiple access Communication links by wire or radio generally provide access to several users at once. Multiple access techniques used by mobile phones include: Frequency division multiple access (FDMA), Time division multiple access (TDMA), Code division multiple access (CDMA), Orthogonal frequency division multiple access (OFDMA) Spatial division multiple access (cellular radio) Several of these are combined e.g. 2G-GSM uses FDMA, TDMA & Spatial In principle, provide connection-oriented channels that do not interfere with each other. 16/03/2018 Lecture 7 2

3 Medium access control (mac) Term reserved for wired & wireless packet switched netwrks: e.g. Ethernet where one wire is shared, e.g. Wi-Fi where one radio channel is shared. Sharing mechanism is contention at the physical layer. Much simpler than FDMA, CDMA etc Simplest version is ALOHA, invented in Hawaii: There is one wire or radio channel a broadcast channel Users can just transmit when they like! 16/03/2018 Lecture 7 3

4 Pure ALOHA (1970s) Stations transmit whenever they have data to send Success is detected at the transmitter by listening to channel while transmitting or by receiving an acknowledgement from receiver If transmission is found to be unsuccessful, send it again but not immediately. Why not? Consider why it failed probably because there was collision with somebody else s transmission. If everybody repeats immediately, collision will occur again. Insert random back-off delay after any collision This is a form of multiple access by collision sensing. 16/03/2018 Lecture 7 4

5 Transmitter Pure ALOHA (illustrated) Y R B again again Collision 2 2 again 2 Collisions 2 again 3 again t Three transmitters (Y,R & B) trying to send packets of varying length. When collisions occur, transmitters wait for random times, then re-send. 16/03/2018 Lecture 7 5

6 Transmitter Slotted ALOHA (illustrated) Y R B 50 s again 4 again 2 again t Collisions Works best when all packets have same length, say 50 microseconds. Time-domain is now divided into time-slots of 50 s. Each transmitter must wait until the start of a new slot before sending. Fewer collisions occur 16/03/2018 Lecture 7 6

7 Efficiency of ALOHA Graph reproduced from recommended text-book Assumes large number of users & equal length packets Few transmissns - few collisions Many transmissns Many collisions Pure ALOHA achieves max 18% channel utilization Slotted ALOHA achieves max 37% utilization plus 37% empty, 26% collisions 16/03/2018 Lecture 7 7

8 Explanation of previous graph If network is able to transmit fixed packets of length=p bits at B bit/s, frame time T F = P/B seconds. e.g. if P = 1000 & B = 20 Mb/s, T F = 50 microseconds We can send 20,000 frames in a second. We have 20,000 transmission opportunities per second. What percentage of these convey a successful packet? If all trans opps resulted in a successful packet it would be 100 %. Probability of successful packet per transmission opp would be 1. Call this S = (throughput per frame time) Some opps not used when there are few transmissns. Opps will be wasted when collisions occur. Successful packets may require many re-transmissions. We cannot expect S to be close to 1. 16/03/2018 Lecture 7 8

9 Attempts per packet time (G) With few transmissions, almost no re-transmissions needed: Lots of users, but they are not transmitting very often Therefore attempts per packet time G is low. Almost no collisions, but most transmit opps are not being used S is low because the network is hardly being used. As users increase their transmissions: More transmit opps are used, but number of collisions increases Therefore G increases. S rises to 0.18 for pure, but then starts to fall as more & more opps are wasted with collisions or are used for re-transmissions. Max throughput (channel utilisation efficiency) is: 18 % of its full capacity for pure ALOHA 37 % for slotted ALOHA. 16/03/2018 Lecture 7 9

10 Carrier Sense Multiple Access (CSMA) Each transmitter listens to channel before deciding whether to transmit If a carrier signal is detected, some-one else is transmitting. 1-persistent CSMA: continually monitors channel (greedy) waits until no carrier is detected, then transmits immediately. waits for random time after any collision, then starts again. non-persistent CSMA: monitors channel at random time intervals (less greedy) waits until no carrier is detected, then transmits immediately. waits for random time after any collision, then starts again. p-persistent CSMA (for slotted channels): monitors channel at each time-slot if no carrier detected, generates a random integer in range 1 to 1/p Like throwing a 1/p-sided dice. if dice shows 1 it transmits; otherwise it waits till next slot. waits for random time after any collision, then starts again. 16/03/2018 Lecture 7 10

11 Randomisation CSMA relies on randomisation in various ways. Generates pseudo-random numbers for the back-off delay. Throwing a 1/p-sided dice: Generate random integer uniformly* distributed between 1 & 1/p. That s it. (* binomially) If it is 1, we have thrown a 1, therefore transmit, otherwise wait. For 0.5 persistence, need 2 sided dice, or a coin. If it is 1 or heads we transmit if it is 2 or tails we wait 16/03/2018 Lecture 7 11

12 How can collisions occur with CSMA? Does CSMA eliminates possibility of collisions? Unfortunately not. Two transmitters, A & B say, may sense the channel clear and start transmitting at exactly the same time. Transmission from A will take some time to reach B. And vice-versa. Because of these delays A, B or both may have started transmitting before they realise that the other one has started also. Therefore a collision occurs. Therefore, must continue to use the random back-off provision that was invented for ALOHA collisions. 16/03/2018 Lecture 7 12

13 Persistent and non-persistent CSMA Graph reproduced from recommended text-book. Assumes many users & equal length packets. Comparison of the channel utilization versus load for various random access protocols. 16/03/2018 Lecture 7 13

14 Comment Seem to be getting close to 100% efficiency with very low persistence. But we have not considered how long it takes packets to get through - delay 0.01 persistent CSMA only uses 1 opp out of every 100. Network seems efficiently used for a lot of users. But to any individual user it will be V E R Y S L O W. 16/03/2018 Lecture 7 14

15 CSMA with collision detection Transmitter must monitor its own transmissions Abort transmission as soon as a collision is detected. Saves time, power & transmission capacity. Used by wired Ethernet. Carrier detection is physical layer process. Result used by Medium Access Control sub-layer It is part of the data-link layer. MAC sub-layer makes decisions about when to transmit, when to back-off, etc. 16/03/2018 Lecture 7 15

16 CSMA with collision avoidance CSMA/CD is fine for wired systems but not for wireless. Wireless transmitter cannot easily monitor its own transmissions. It is either transmitting or receiving, but not both at same time Also, it is not appropriate, since what matters is collision at seen the receiver. This may be different from what is observed at the transmitter. With wireless, emphasis is on avoiding collision. IEE supports 2 transmission modes: Non-contention mode (PCF) using centralised control Contention mode (DCF) using CSMA/CA PCF is optional & not widely used. Concentrate on DCF. 16/03/2018 Lecture 7 16

17 Wi-Fi contention mode Uses real channel sensing, i.e. Transmitter senses channel, & if it is free just starts transmitting. Collisions sensed at receiver at end of transmission. Receiver sends acknowledgement (ACK) for correct packet. Transmitter re-sends (with back-off delay) when ACK not received Also virtual (RTS/CTS) channel sensing, i.e. If A wants to transmit to B, it sends a short RTS (request to send) control frame If B is ready, it sends back a CTS (clear to send) control frame. A now sends its message frame & starts an ACK timer When B receives frame, sends an ACK. If A does not receive an ACK in time, it re-transmits. When other users hear RTS or CTS, they set a network allocation vector flag (NAV) for a period of time. No transmissions allowed while NAV is set. Devices can sleep. 16/03/2018 Lecture 7 17

18 Network allocation vector (NAV) NAV is a virtual carrier sensing flag. The other devices are not sensing the carrier They are told to assume that the channel is busy. RTS/CTS also solves hidden & exposed device problems 16/03/2018 Lecture 7 18

19 Hidden device (station) problem A B C Range of transmissions from C C is hidden from A (by distance) A wants to transmit to B, but will not hear any transmissions from C. It may just assume channel is free and transmit. Messages from A and C will cause collision at B. This is bad. But if A sends RTS to B while B is talking to C, B won t hear it. So B will not send CTS, so A will not transmit until B is ready. 16/03/2018 Lecture 7 19

20 Exposed device (station) problem A B C Range of transmissions from C D C is exposed to A because it needlessly prevents B from transmitting to A. B wants to transmit to A who will not hear transmissions from C or D. C may be transmitting to D. B hears C & will assume channel is not free & that it cannot transmit. But, in fact, B can transmit to A while C is transmitting to D. C will not hear B because it is transmitting & D is too far away to hear B. 16/03/2018 Lecture 7 20

21 Bluetooth Architecture Basic unit of a Bluetooth system is a pico-net Consists of a master node And up to 7 slaves within 10 m. Two piconets can be connected to form a scatternet See recommended text-book Tanenbaum PP in Version 4. PP in Version 5 16/03/2018 Lecture 7 21

22 Text-book 16/03/2018 Lecture 7 22

23 Power & spatial multiplexing Remember, for mobile wireless communications transmit power affects battery life excessive transmit power also increases interference with other users e.g. in cellular system with small cells use the minimum power necessary better error correction = lower power reduce power until correctable errors occur? Trade-off of extra bits for better FEC against lower energy/bit 16/03/2018 Lecture 7 23

24 Summary Multiple access mechanisms for cellular telephony: FDMA, TDMA, CDMA & OFDMA Also spatial since transmissions have limited range. Mechanisms (MAC) for computer networks: pure & slotted ALOHA, CSMA/CD for wired PCF (non-contention mode for WiFi: optional) CSMA/CA (contention mode for WiFi) RTS/CTS (MACAW solves hidden station problem) For spatial multiplexing, transmission power must be carefully controlled Can reduce power until correctable errors occur. 16/03/2018 Lecture 7 24

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Chapter 2 Overview. Duplexing, Multiple Access - 1 - Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

Mobile Computing. Chapter 3: Medium Access Control

Mobile Computing. Chapter 3: Medium Access Control Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access

More information

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux 1. Introduction 1.2 Medium Access Control Prof. JP Hubaux 1 Modulation and demodulation (reminder) analog baseband digital signal data digital analog 101101001 modulation modulation radio transmitter radio

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

Medium Access Methods. Lecture 9

Medium Access Methods. Lecture 9 Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated

More information

Wireless Transmission & Media Access

Wireless Transmission & Media Access Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,

More information

Cellular systems 02/10/06

Cellular systems 02/10/06 Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from

More information

Lecture 8: Media Access Control

Lecture 8: Media Access Control Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Multiple Access Methods

Multiple Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol

More information

COM-405 Mobile Networks. Module A (Part A2) Introduction

COM-405 Mobile Networks. Module A (Part A2) Introduction COM-405 Mobile Networks Module A (Part A2) Introduction Prof. JP Hubaux http://mobnet.epfl.ch Note: some of the slides of this and other modules and derived from Schiller s book 1 Modulation and demodulation

More information

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

6.1 Multiple Access Communications

6.1 Multiple Access Communications Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

% 4 (1 $ $ !  ( # $ 5 # $ % - % +' ( % +' (( % -. ! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information

Network Management System for Telecommunication and Internet Application

Network Management System for Telecommunication and Internet Application Network Management System for Telecommunication and Internet Application Gerd Bumiller GmbH Unterschlauersbacher-Hauptstr. 10, D-906 13 Groahabersdorf, Germany Phone: +49 9105 9960-51, Fax: +49 9105 9960-19,

More information

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f. Signal Propagation and Power Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f P rcv P snd 1 d 2 f 2 quadratic decrease in distance

More information

Multiple Access Techniques

Multiple Access Techniques Multiple Access Techniques EE 442 Spring Semester Lecture 13 Multiple Access is the use of multiplexing techniques to provide communication service to multiple users over a single channel. It allows for

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Medium Access Schemes

Medium Access Schemes Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource

More information

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of

More information

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Lecture 7: Centralized MAC protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Centralized MAC protocols Previous lecture contention based MAC protocols, users decide who transmits when in a decentralized

More information

Structure of the Lecture

Structure of the Lecture Structure of the Lecture Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Channels in a frequency band Static medium access methods Flexible medium access methods Chapter 3 Wireless

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

Multiple Access Techniques

Multiple Access Techniques Multiple Access Techniques Instructor: Prof. Dr. Noor M. Khan Department of Electrical Engineering, Faculty of Engineering, Mohammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +92

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

Multiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions

Multiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions CHAPTER 12 Multiple Access Solutions to Review Questions and Exercises Review Questions 1. The three categies of multiple access protocols discussed in this chapter are random access, controlled access,

More information

Introduction to Mobile Computing The rapidly expanding technology of cellular communication, wireless LANs, and satellite services will make information accessible anywhere and at any time. Regardless

More information

Multiple Access Techniques for Wireless Communications

Multiple Access Techniques for Wireless Communications Multiple Access Techniques for Wireless Communications Contents 1. Frequency Division Multiple Access (FDMA) 2. Time Division Multiple Access (TDMA) 3. Code Division Multiple Access (CDMA) 4. Space Division

More information

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning

More information

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This

More information

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications COMM 907: Spread Spectrum Communications Lecture 10 - LTE (4G) -Technologies used in 4G and 5G The Need for LTE Long Term Evolution (LTE) With the growth of mobile data and mobile users, it becomes essential

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Multiple Access Schemes

Multiple Access Schemes Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE

OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE 802.11 NETWORKS Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2004 APPROVED: Robert

More information

Access Methods and Spectral Efficiency

Access Methods and Spectral Efficiency Access Methods and Spectral Efficiency Yousef Dama An-Najah National University Mobile Communications Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) segment space into sectors, use

More information

Mobile Communications

Mobile Communications Mobile Communications Lecture 6 Mobile networks 16 / 03 / 18 COMP61242 Barry Cheetham 16Mar'18 Lecture 6 COMP61242 1 Quality of Service (QoS( QoS) Quality of service (QoS) is quality of a communication

More information

Multiplexing Module W.tra.2

Multiplexing Module W.tra.2 Multiplexing Module W.tra.2 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Multiplexing W.tra.2-2 Multiplexing shared medium at

More information

Advanced Computer Networks. Wireless Networks Fundamentals

Advanced Computer Networks. Wireless Networks Fundamentals Advanced Computer Networks 263 3501 00 Wireless Networks Fundamentals Patrick Stuedi Spring Semester 2014 Oriana Riva, ETH Zürich Course Outline 1. General principles of network design Review of basic

More information

Wireless Networks (PHY): Design for Diversity

Wireless Networks (PHY): Design for Diversity Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:

More information

PULSE: A MAC Protocol for RFID Networks

PULSE: A MAC Protocol for RFID Networks PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)

More information

An Opportunistic Frequency Channels Selection Scheme for Interference Minimization

An Opportunistic Frequency Channels Selection Scheme for Interference Minimization Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) An Opportunistic Frequency Channels Selection Scheme for Interference Minimization 978-1-4799-5233-5/14/$31.00

More information

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009 An Introduction to Wireless Technologies Part 2 F. Ricci 2008/2009 Content Multiplexing Medium access control Medium access control (MAC): FDMA = Frequency Division Multiple Access TDMA = Time Division

More information

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit. MOBILE COMPUTING CSE 40814/60814 Spring 2018 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch

More information

Summary of Basic Concepts

Summary of Basic Concepts Transmission Summary of Basic Concepts Sender Channel Receiver Dr. Christian Rohner Encoding Modulation Demodulation Decoding Bits Symbols Noise Terminology Communications Research Group Bandwidth [Hz]

More information

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks ISHIK UNIVERSITY Faculty of Science Department of Information Technology 2017-2018 Fall Course Name: Wireless Networks Agenda Lecture 4 Multiple Access Techniques: FDMA, TDMA, SDMA and CDMA 1. Frequency

More information

Introduction to Wireless Networks p. 1 Evolution of Wireless Networks p. 2 Early Mobile Telephony p. 2 Analog Cellular Telephony p.

Introduction to Wireless Networks p. 1 Evolution of Wireless Networks p. 2 Early Mobile Telephony p. 2 Analog Cellular Telephony p. Preface p. xv Introduction to Wireless Networks p. 1 Evolution of Wireless Networks p. 2 Early Mobile Telephony p. 2 Analog Cellular Telephony p. 3 Digital Cellular Telephony p. 4 Cordless Phones p. 7

More information

Mobile Communication and Mobile Computing

Mobile Communication and Mobile Computing Department of Computer Science Institute for System Architecture, Chair for Computer Networks Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de Structure

More information

A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks

A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks Thanasis Korakis Gentian Jakllari Leandros Tassiulas Computer Engineering and Telecommunications Department University

More information

Wireless Network Pricing Chapter 2: Wireless Communications Basics

Wireless Network Pricing Chapter 2: Wireless Communications Basics Wireless Network Pricing Chapter 2: Wireless Communications Basics Jianwei Huang & Lin Gao Network Communications and Economics Lab (NCEL) Information Engineering Department The Chinese University of Hong

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Mobile Communications

Mobile Communications Quality of Service (QoS( QoS) Mobile Communications Lecture 6 Mobile networks 16 / 03 / 18 COMP61242 Barry Cheetham Quality of service (QoS) is quality of a communication link as perceived by users of

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

A Cross Layer Routing Protocol for OFDMA Based Mobile Ad Hoc Networks.

A Cross Layer Routing Protocol for OFDMA Based Mobile Ad Hoc Networks. A Cross Layer Routing Protocol for OFDMA Based Mobile Ad Hoc Networks. Xiong, Hong Yi The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses

More information

Compressed Sensing for Multiple Access

Compressed Sensing for Multiple Access Compressed Sensing for Multiple Access Xiaodai Dong Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Tohoku University, Sendai, Japan Oct. 28, 2013 Outline Background Existing

More information

An Introduction to Wireless Technologies Part 2. F. Ricci

An Introduction to Wireless Technologies Part 2. F. Ricci An Introduction to Wireless Technologies Part 2 F. Ricci Content Medium access control (MAC): FDMA = Frequency Division Multiple Access TDMA = Time Division Multiple Access CDMA = Code Division Multiple

More information

Multiple access techniques

Multiple access techniques Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ

More information

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen. T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:

More information

Difference Between. 1. Old connection is broken before a new connection is activated.

Difference Between. 1. Old connection is broken before a new connection is activated. Difference Between Hard handoff Soft handoff 1. Old connection is broken before a new connection is activated. 1. New connection is activated before the old is broken. 2. "break before make" connection

More information

SC - Single carrier systems One carrier carries data stream

SC - Single carrier systems One carrier carries data stream Digital modulation SC - Single carrier systems One carrier carries data stream MC - Multi-carrier systems Many carriers are used for data transmission. Data stream is divided into sub-streams and each

More information

Code Division Multiple Access.

Code Division Multiple Access. Code Division Multiple Access Mobile telephony, using the concept of cellular architecture, are built based on GSM (Global System for Mobile communication) and IS-95(Intermediate Standard-95). CDMA allows

More information

COMPILED BY : - GAUTAM SINGH STUDY MATERIAL TELCOM What is Wi-Fi?

COMPILED BY : - GAUTAM SINGH STUDY MATERIAL TELCOM What is Wi-Fi? What is Wi-Fi? WiFi stands for Wireless Fidelity. WiFiIt is based on the IEEE 802.11 family of standards and is primarily a local area networking (LAN) technology designed to provide in-building broadband

More information

AEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved.

AEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved. AEROHIVE NETWORKS 802.11ax DAVID SIMON, SENIOR SYSTEMS ENGINEER 1 2018 Aerohive Networks. All Rights Reserved. 2 2018 Aerohive Networks. All Rights Reserved. 8802.11ax 802.11n and 802.11ac 802.11n and

More information

Mobile Communication Systems. Part 7- Multiplexing

Mobile Communication Systems. Part 7- Multiplexing Mobile Communication Systems Part 7- Multiplexing Professor Z Ghassemlooy Faculty of Engineering and Environment University of Northumbria U.K. http://soe.ac.uk/ocr Contents Multiple Access Multiplexing

More information

Direct Link Communication II: Wireless Media. Current Trend

Direct Link Communication II: Wireless Media. Current Trend Direct Link Communication II: Wireless Media Current Trend WLAN explosion (also called WiFi) took most by surprise cellular telephony: 3G/4G cellular providers/telcos/data in the same mix self-organization

More information

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt. Wireless Networks (PHY): Design or Diversity Admin and recap Design or diversity Y. Richard Yang 9/2/212 2 Admin Assignment 1 questions Assignment 1 oice hours Thursday 3-4 @ AKW 37A Channel characteristics

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 1 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 ECS455: Chapter 4 Multiple

More information

Automatic power/channel management in Wi-Fi networks

Automatic power/channel management in Wi-Fi networks Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance

More information

Technical Aspects of LTE Part I: OFDM

Technical Aspects of LTE Part I: OFDM Technical Aspects of LTE Part I: OFDM By Mohammad Movahhedian, Ph.D., MIET, MIEEE m.movahhedian@mci.ir ITU regional workshop on Long-Term Evolution 9-11 Dec. 2013 Outline Motivation for LTE LTE Network

More information

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical

More information

Lecture 8 Mul+user Systems

Lecture 8 Mul+user Systems Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith

More information

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission

More information

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE Overview 18-759: Wireless Networks Lecture 9: OFDM, WiMAX, LTE Dina Papagiannaki & Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY [CRT02] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY MODULE NO: CPU5009 Date: Thursday 14 th January 2016

More information

Mobile Communications: Technology and QoS

Mobile Communications: Technology and QoS Mobile Communications: Technology and QoS Course Overview! Marc Kuhn, Yahia Hassan kuhn@nari.ee.ethz.ch / hassan@nari.ee.ethz.ch Institut für Kommunikationstechnik (IKT) Wireless Communications Group ETH

More information

CDMA is used to a limited extent on the 800-MHz band, but is much more common in the 1900-MHz PCS band. It uses code-division multiple access by

CDMA is used to a limited extent on the 800-MHz band, but is much more common in the 1900-MHz PCS band. It uses code-division multiple access by IS-95 CDMA PCS CDMA Frequency Use CDMA Channels Forward Channel Reverse Channel Voice Coding Mobile Power Control Rake Receivers and Soft handoffs CDMA Security CDMA is used to a limited extent on the

More information

10EC81-Wireless Communication UNIT-6

10EC81-Wireless Communication UNIT-6 UNIT-6 The first form of CDMA to be implemented is IS-95, specified a dual mode of operation in the 800Mhz cellular band for both AMPS and CDMA. IS-95 standard describes the structure of wideband 1.25Mhz

More information

Interference management Within 3GPP LTE advanced

Interference management Within 3GPP LTE advanced Interference management Within 3GPP LTE advanced Konstantinos Dimou, PhD Senior Research Engineer, Wireless Access Networks, Ericsson research konstantinos.dimou@ericsson.com 2013-02-20 Outline Introduction

More information

Next Generation Wireless LANs

Next Generation Wireless LANs Next Generation Wireless LANs 802.11n and 802.11ac ELDAD PERAHIA Intel Corporation ROBERTSTACEY Apple Inc. и CAMBRIDGE UNIVERSITY PRESS Contents Foreword by Dr. Andrew Myles Preface to the first edition

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

STUDIES IN WIRELESS HOME NETWORKING INCLUDING COEXISTENCE OF UWB AND IEEE A SYSTEMS

STUDIES IN WIRELESS HOME NETWORKING INCLUDING COEXISTENCE OF UWB AND IEEE A SYSTEMS STUDIES IN WIRELESS HOME NETWORKING INCLUDING COEXISTENCE OF UWB AND IEEE 802.11A SYSTEMS A Dissertation Presented to The Academic Faculty by Babak Firoozbakhsh In Partial Fulfillment of the Requirements

More information

Multiple Access. Difference between Multiplexing and Multiple Access

Multiple Access. Difference between Multiplexing and Multiple Access Multiple Access (MA) Satellite transponders are wide bandwidth devices with bandwidths standard bandwidth of around 35 MHz to 7 MHz. A satellite transponder is rarely used fully by a single user (for example

More information