Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Similar documents
Multiple Access Techniques for Wireless Communications

Access Methods and Spectral Efficiency

Lecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday

Wireless Transmission & Media Access

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

Technical Aspects of LTE Part I: OFDM

Cellular systems 02/10/06

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Multiple Access. Difference between Multiplexing and Multiple Access

Multiple Access Techniques

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Multiple Access Schemes

UNIK4230: Mobile Communications. Abul Kaosher

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Mobile Computing. Chapter 3: Medium Access Control

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Medium Access Control

Background: Cellular network technology

Structure of the Lecture

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Introduction to Wireless and Mobile Networking. Hung-Yu Wei g National Taiwan University

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Channel partitioning protocols

EEE 309 Communication Theory

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 3 Cellular Systems

References. What is UMTS? UMTS Architecture

S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY

ECS455: Chapter 4 Multiple Access

Multiplexing Module W.tra.2

Multiple Access Techniques

Page 1. Outline : Wireless Networks Lecture 6: Final Physical Layer. Direct Sequence Spread Spectrum (DSSS) Spread Spectrum

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Part 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU

Computational Complexity of Multiuser. Receivers in DS-CDMA Systems. Syed Rizvi. Department of Electrical & Computer Engineering

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE

SC - Single carrier systems One carrier carries data stream

UNIT 4 Spread Spectrum and Multiple. Access Technique

Code Division Multiple Access.

Chapter 1 Acknowledgment:

OFDMA PHY for EPoC: a Baseline Proposal. Andrea Garavaglia and Christian Pietsch Qualcomm PAGE 1

Spread Spectrum: Definition

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

Medium Access Schemes

Welcome to SSY145 Wireless Networks Lecture 2

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks

Mobile Communications TCS 455

Multiple access techniques

ISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies

Multiple Access Technique Lecture 8

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

Further Vision on TD-SCDMA Evolution

Erik Haas and Michael Schnell German Aerospace Center - DLR. J. Prinz, C.Rihacek, and M. Sajatovic Frequentis Nachrichtentechnik G.m.b.H.

Long Term Evolution (LTE)

Investigation on Multiple Antenna Transmission Techniques in Evolved UTRA. OFDM-Based Radio Access in Downlink. Features of Evolved UTRA and UTRAN

Academic Course Description

Interference management Within 3GPP LTE advanced

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

3G long-term evolution

An Introduction to Wireless Technologies Part 2. F. Ricci

EC 551 Telecommunication System Engineering. Mohamed Khedr

Wireless LANs/data networks

Difference Between. 1. Old connection is broken before a new connection is activated.

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

RADIO LINK ASPECT OF GSM

UNIK4230: Mobile Communications

Radio Interface and Radio Access Techniques for LTE-Advanced

Chapter 7 Multiple Division Techniques for Traffic Channels

Communications Theory and Engineering

History of the Digital Mobile Radio Systems in NTT & DoCoMo

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Multiple Access System

Lecture 8: Media Access Control

IFH SS CDMA Implantation. 6.0 Introduction

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

CDMA - QUESTIONS & ANSWERS

ITM 1010 Computer and Communication Technologies

ECS455: Chapter 4 Multiple Access

Academic Course Description. CO2110 OFDM/OFDMA COMMUNICATIONS Third Semester, (Odd semester)

802.11ax Design Challenges. Mani Krishnan Venkatachari

Multiple Antenna Processing for WiMAX

Chapter 7. Multiple Division Techniques

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

2012 LitePoint Corp LitePoint, A Teradyne Company. All rights reserved.

Question Points Score Total 100

Level 6 Graduate Diploma in Engineering Wireless and mobile communications

Chapter 6 Applications. Office Hours: BKD Tuesday 14:00-16:00 Thursday 9:30-11:30

Required Background (You must satisfy All of the following requirements ) BSEE GPA>3 for technical Courses

Mobile Communication Systems. Part 7- Multiplexing

From 2G to 4G UE Measurements from GSM to LTE. David Hall RF Product Manager

Multi-Carrier Systems

Opportunistic Communication in Wireless Networks

Wireless Networks (PHY): Design for Diversity

Dynamic Resource Allocation for Efficient Wireless Packet Data Communcations

Transcription:

Lecture 7: Centralized MAC protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Centralized MAC protocols Previous lecture contention based MAC protocols, users decide who transmits when in a decentralized manner Today s lecture a central entity allocates resources to users sharing a medium TDMA Time Division Multiple Access CDMA Code Division Multiple Access Other concepts SDMA, FDMA / OFDMA Mainly used in cellular networks, as voice requires high QoS.

TDMA Assign different time slots to different users Fixed TDMA Each user gets a fixed time slot irrespective of whether he has data to send or not Wastes slots when users have bursty data Dynamic TDMA the decision of which user sends when is decided on a per-slot basis Users signal their intention to send data Slots allocated to users who have data to send Scheduling algorithm decides which user is scheduled to transmit in which slot

Scheduling algorithms Dynamic TDMA relies on scheduling algorithms. Tradeoff between efficiency and fairness. Common scheduling algorithms used in cellular networks Round robin schedule all users in a certain order. Guarantees fairness. Max rate schedule the user that has best channel conditions, i.e., can send at highest rate. This guarantees that the network gets high throughput. But may starve some users at cell edge. Proportionally fair schedule users according to a priority computed as p = current_rate / average_rate. The current rate is computed based on current channel conditions. So biased towards users with good channel and high rate. Also avoids starving of some users, because if average_rate becomes low enough, the user priority will increase and he will get scheduled. Proportionally fair scheduler (or its variants )is the most common design used in today s networks.

CDMA Basic idea: transmit each user s data using a unique code. Take each bit, exor with a longer bit sequence called code, and transmit the resulting new bit stream. For example, suppose a user s code is 010011. Then, for bit 1 the user sends the code 010011. For bit 0, the user sends the complement 101100. At the receiver, correlate with the code to recover data. If correlation with 010011 is high, then it is 1. If correlation with complement is high, then it is 0. Different users are assigned different orthogonal codes, that is, codes which have low correlation with each other. Even if the signals of multiple users are combined, the receiver can extract its own transmission by correlating with its own code Can be synchronous (code boundaries are aligned) or asynchronous. Codes are generated in different ways for both schemes.

CDMA (2) Example, user A uses code 010011 and user B uses code 110101 (example from Schiller s textbook) Suppose A wants to send bit 1 and B wants to send bit 0. Let s assume we send -1 for code bit 0. A sends (-1,1,-1,-1,1,1) and B sends (-1,-1,1,-1,1,-1) In a simplistic model where both signals combine, we get (- 2,0,0,-2,2,0) Correlate received signal with A s code gives +6 bit 1 Correlate with B s code word gives -6 bit 0 If B s transmit power is much higher than A s, that is, B s bit sequence is scaled up, then harder to decode A s bit. Power control is very important in CDMA, as other transmissions appear as noise and reduce SNR

Frequency Domain View of CDMA Multiplying a bit with a code is equivalent to spreading the spectrum in the frequency domain (recall: faster pulses -> wider bandwidth) That is, each user uses a larger bandwidth than the original signal However, CDMA is not inefficient because many users are multiplexed over the same wider band This idea can be used for a single user too spread spectrum modulation scheme Achieves low rates, but useful with frequency selective fading and resilience to jamming by enemies Direct Sequence Spread Spectrum (DSSS) is used for the 1 and 2 Mbps rates in 802.11b. A special 11 bit code is used to spread each bit.

Other ways of multiplexing Space Division Multiple Access (SDMA) the idea behind having cells in cellular networks. Frequencies used in one cell can be reused in another cell that is some distance away. Frequency Division Multiple Access (FDMA) assign multiple narrow channels to different users. Orthogonal Frequency Division Multiple Access (OFDMA) Similar to OFDM, but different sub carriers can be allocated to different transmitters.

Challenges in centralized MACs TDMA requires tight time synchronization CDMA requires fine-grained power control (and possibly time sync) FDMA requires very precise channel filters to FDMA requires very precise channel filters to restrict users to specific frequencies

Multiple Access in Cellular Networks All cellular networks use SDMA to partition frequencies to cells 2G networks mainly used plain TDMA (in GSM networks) or CDMA within a cell 3G networks use a combination of TDMA and CDMA in a cell Voice mainly uses CDMA Special high speed data channels exist in some 3G technologies. These use a combination of TDMA and CDMA. In every slot, a single user or multiple users can be scheduled. If multiple users, they are multiplexed using different codes. 4G / LTE uses TDMA + OFDMA on the downlink. That is, in each slot, a single user can be scheduled, or multiple users can be scheduled over multiple subcarriers in OFDM.