Mobile Computing. Chapter 3: Medium Access Control

Similar documents
Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Medium Access Control

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Schemes

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

Wireless Transmission & Media Access

Structure of the Lecture

Access Methods and Spectral Efficiency

COM-405 Mobile Networks. Module A (Part A2) Introduction

Cellular systems 02/10/06


UNIT 4 Spread Spectrum and Multiple. Access Technique

Physical Layer Issues

Introduction to Wireless and Mobile Networking. Hung-Yu Wei g National Taiwan University

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009

An Introduction to Wireless Technologies Part 2. F. Ricci

Multiple Access Schemes

Multiple Access Techniques for Wireless Communications

Mobile Computing Unit 1 WIRELESS COMMUNICATION FUNDAMENTALS

Wireless Transmission in Cellular Networks

Multiplexing Module W.tra.2

Basics of Wireless and Mobile Communications

Advanced Computer Networks. Wireless Networks Fundamentals

Mobile Communications Chapter 3 : Media Access

Channel partitioning protocols

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

Level 6 Graduate Diploma in Engineering Wireless and mobile communications

Multiple Access Techniques

Chapter 2: Wireless Transmission. Mobile Communications. Spread spectrum. Multiplexing. Modulation. Frequencies. Antenna. Signals

Chapter 7 Multiple Division Techniques for Traffic Channels

Question Points Score Total 100

UNIK4230: Mobile Communications. Abul Kaosher

W-CDMA for UMTS Principles

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Mobile Communications

Lecture 8: Media Access Control

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Multiple access techniques

Mobile Communication Systems. Part 7- Multiplexing

Lecture 8 Mul+user Systems

ECS455: Chapter 4 Multiple Access

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiplexing. Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Reti di Telecomunicazione. Channels and Multiplexing

Multiple Access System

Multiple Access Techniques

UNIT II MAC, TELE COMMUNICATION AND SATELLITE SYSTEMS

Multiple Access. Difference between Multiplexing and Multiple Access

Multiple Access Methods

APPLICATION PROGRAMMING: MOBILE COMPUTING [ INEA00112W ] Marek Piasecki PhD Wireless Telecommunication

CDMA - QUESTIONS & ANSWERS

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

ETSI SMG#24 TDoc SMG 903 / 97. December 15-19, 1997 Source: SMG2. Concept Group Alpha - Wideband Direct-Sequence CDMA: System Description Summary

Chapter 7. Multiple Division Techniques

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

CS 218 Fall 2003 October 23, 2003

Wireless and Mobile Network Architecture. Outline. Introduction. Cont. Chapter 1: Introduction

Wireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN)

Wireless and Mobile Network Architecture

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Data Communications. Unguided Media Multiplexing

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Mobile Communication and Mobile Computing

SC - Single carrier systems One carrier carries data stream

EEE 309 Communication Theory

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Fiber Distributed Data Interface

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

Network Management System for Telecommunication and Internet Application

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone

Mobile Ad Hoc Networks

IMT IMT-2000 stands for IMT: International Mobile Communications 2000: the frequency range of 2000 MHz and the year 2000

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Mobile Computing and the IoT Wireless and Mobile Computing. Wireless Signals. George Roussos.

Part 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU

MSIT 413: Wireless Technologies Week 5

Wireless Network Security Spring 2016

Wireless Transmission:

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

TELE4652 Mobile and Satellite Communications

ICT 5305 Mobile Communications. Lecture - 3 April Dr. Hossen Asiful Mustafa

Module 3: Physical Layer

RADIO SYSTEMS ETIN15. Lecture no: GSM and WCDMA. Ove Edfors, Department of Electrical and Information Technology

WCDMA Basics Chapter 2 OBJECTIVES:

Chapter 1 Acknowledgment:

GSM and WCDMA RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Mobile Communications Chapter 2: Wireless Transmission

Mobile Communications Chapter 2: Wireless Transmission

Planning of LTE Radio Networks in WinProp

Background: Cellular network technology

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

Chapter 2 Multiple access methods

Local Area Networks NETW 901

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE

SLIDE #2.1. MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala

Transcription:

Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2

1. Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3) Problems in wireless networks Signal strength decreases proportional to the square of the distance The sender would apply CS and CD, but the collisions happen at the receiver. It might be the case that a sender cannot hear the collision, i.e., CD does not work Furthermore, CS might not work if, e.g., a terminal is hidden 3 Hidden and exposed terminals Hidden terminals : cause collisions A sends to B, C cannot receive A C wants to send to B, C senses a free medium (CS fails) collision at B, A cannot receive the collision (CD fails) A is hidden for C: C is hidden for A A Exposed terminals: cause unnecessary delay B sends to A, C wants to send to another terminal (not A or B) C has to wait, CS signals a medium in use But A is outside the radio range of C, therefore waiting is not necessary A collision at B does not matter because the collision is too weak to propagate to A. C is exposed to B B C 4

Near and far terminals Terminals A and B send, C receives Signal strength decreases proportional to the square of the distance The signal of terminal B therefore drowns out A s signal C cannot receive A A B C If C for example was an arbiter (base station) for sending rights, terminal B would drown out terminal A already on the physical layer. Also severe problem for CDMA -networks - precise power control needed! (why?) 5 2. Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) allocating separate space to users in wireless networks. segment space into cells, or sectors with directed antennas SDMA is never used in isolation. But always in combination with one or more other schemes (FDMA, TDMA, CDMA) FDMA (Frequency Division Multiple Access) assign a certain frequency to a transmission channel between a sender and a receiver permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) Frequency Division Duplex (FDD) used to divide up-link & down link channels. 6

FDD/FDMA - GSM 960 MHz f 124 935.2 MHz 915 MHz 1 124 20 MHz 200 khz 890.2 MHz 1 t 7 Access methods SDMA/FDMA/TDMA TDMA (Time Division Multiple Access) assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time Fixed : (fixed TDM) Allocating a certain time slot for a channel in a fixed pattern. Dynamic (Aloha) MAC addresses are open used as identification. It is flexible considering varying bandwidth requirements. Fixed TDM results in a fixed bandwidth and delay for each channel wireless phone systems IS 136 (NA TDMA), GSM, DECT, PHS Base station assigns the fixed time slot pattern. no competition. Time Division Duplex (TDD) assign different slots for uplink and down link using the same frequency. 8

TDD/TDMA - DECT 417 µs 1 2 3 11 12 1 2 3 11 12 downlink uplink t 10 msec delay 9 Multiplexing/Multiple Access/Duplex Three technologies are open confused. But, conceptually different. In practice, they are combined and there exist many possible combinations. Duplex (TDD, FDD) Multiple Access (TDDA, FDDA, CDMA) channel Multiplexing (TDM, FDM, CDM) 10

Mechanism 3. Aloha random, distributed (no central arbiter), time-multiplex Slotted Aloha additionally uses time-slots, sending must always start at slot boundaries Aloha neither coordinates medium access nor does it resolve contention on the MAC layer (left to higher layers) works fine for a light load. collision sender A sender B sender C t 11 Slotted Aloha Slotted Aloha All sender have to be synchronized. Transmission can only start at the beginning of a time slot. Slotting doubles the throughput (36%) does not guarantee bandwidth or delay to each user. collision sender A sender B sender C t 12

4. Carrier Sense Multiple Access (CSMA) simple improvement to the basic Aloha sensing the carrier before accessing the medium accessing the medium only if the carrier is idle.: decrease collision probability. used in Wireless LAN system Non-persistent CSMA Sending immediately if medium is idle. If it is busy, the station pauses a random amount of time before sensing again. P-persistent CSMA only transmit with a probability of p, with 1-p the station deferring to the next slot. CAMA/CA IEEE 802.11 13 DAMA - Demand Assigned Multiple Access Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length) Reservation can increase efficiency to 80% a sender reserves a future time-slot sending within this reserved time-slot is possible without collision Collisions may occur during the reservation periods. reservation also causes higher delays because of reservation periods typical scheme for satellite links Examples for reservation algorithms: Explicit Reservation according to Roberts (Reservation-ALOHA) Implicit Reservation (PRMA) Reservation-TDMA 14

Access method DAMA: Explicit Reservation Explicit Reservation (Reservation Aloha): two modes: ALOHA mode for reservation: competition for small reservation slots, collisions possible reserved mode for data transmission within successful reserved slots (no collisions possible) It is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time collision Aloha reserved Aloha reserved Aloha reserved Aloha t 15 Access method DAMA: PRMA Implicit reservation (PRMA - Packet Reservation MA): a certain number of slots form a frame, frames are repeated stations compete for empty slots according to the slotted aloha principle once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send competition for this slots starts again as soon as the slot was empty in the last frame reservation ACDABA-F ACDABA-F AC-ABAF- A---BAFD ACEEBAFD frame 1 frame 2 frame 3 frame 4 frame 5 1 2 3 4 5 6 7 8 time-slot A C D A B A F A C A B A A B A F A B A F D A C E E B A F D t collision at reservation attempts 16

Access method DAMA: Reservation-TDMA Reservation Time Division Multiple Access every frame consists of N mini-slots and x data-slots every station has its own mini-slot and can reserve up to k data-slots using this mini-slot (i.e. x = N * k). other stations can send data in unused data-slots according to a round-robin sending scheme (best-effort traffic) N mini-slots N * k data-slots e.g. N=6, k=2 reservations for data-slots other stations can use free data-slots based on a round-robin scheme 17 MACA - collision avoidance MACA (Multiple Access with Collision Avoidance) solves hidden terminal problem does not need a base station still random access but dynamic reservation short signaling packets for collision avoidance RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain sender address receiver address packet size Variants of this method can be found in IEEE802.11 as DFWMAC (Distributed Foundation Wireless MAC) 18

MACA examples MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first RTS C waits after receiving CTS from B CTS CTS A B C MACA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have RTS to wait for it cannot receive CTS from A RTS CTS A B C 19 MACA variant: DFWMAC in IEEE802.11 sender receiver idle idle ACK RxBusy time-out NAK; RTS wait for ACK packet ready to send; RTS wait for the right to send CTS; data time-out; RTS data; ACK time-out data; NAK wait for data RTS; CTS ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy RTS; RxBusy 20

Polling mechanisms If one terminal can be heard by all others, this central terminal (e.g., base station) can poll all other terminals according to a certain scheme Now all schemes known from fixed networks can be used (typical mainframe - terminal scenario) Example: Randomly Addressed Polling Base station signals readiness to all mobile terminals Terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address) The base station now chooses one address for polling from the list of all random numbers. The base station acknowledges correct packets and continues polling the next terminal. This cycle starts again after polling all terminals of the list 21 ISMA (Inhibit Sense Multiple Access) Current state of the medium is signaled via a busy tone The base station signals on the downlink (base station to terminals) if the medium is free or not Terminals must not send if the medium is busy Terminals can access the medium as soon as the busy tone stops The base station signals collisions and successful transmissions via the busy tone and acknowledgements, respectively (media access is not coordinated within this approach) mechanism used, e.g., for CDPD (Cellular Digital Packet Data) (USA, integrated into AMPS) 22

6. Access method CDMA CDMA (Code Division Multiple Access) All terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel Each sender has a unique random number (chipping sequence), the sender XORs the signal with this random number. The receiver can tune into this signal if it knows the pseudo random number, tuning is done via a correlation function. Good code for CDMA should be orthogonal to other codes orthogonal: for two vectors their inner product is 0. should have a good autocorrelation autocorrelation: absolute value of the inner product of a vector multiplied with itself. 23 Access method CDMA Disadvantages: higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal) All signals should have the same strength at a receiver Advantages: All terminals can use the same frequency, no planning needed Huge code space (e.g. 2 32 ) compared to frequency space Interferences (e.g. white noise) is not coded Forward error correction and encryption can be easily integrated 24

CDMA in theory Sender A sends A d = 1, key A k = 010011 (assign: 0 = -1, 1 = +1) sending signal A s = A d * A k = (-1, +1, -1, -1, +1, +1) Sender B sends B d = 0, key B k = 110101 (assign: 0 = -1, 1 = +1) sending signal B s = B d * B k = (-1, -1, +1, -1, +1, -1) Both signals superimpose in space interference neglected (noise etc.) A s + B s = (-2, 0, 0, -2, +2, 0) Receiver wants to receive signal from sender A apply key A k bitwise (inner product) A e = (-2, 0, 0, -2, +2, 0) A k = 2 + 0 + 0 + 2 + 2 + 0 = 6 result greater than 0, therefore, original bit was 1 receiving B B e = (-2, 0, 0, -2, +2, 0) B k = -2 + 0 + 0-2 - 2 + 0 = -6, i.e. 0 25 CDMA on signal level (1) data A key A key sequence A data key 1 0 1 0 1 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1 1 0 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0 A d A k signal A A s Real systems use much longer keys resulting in a larger distance between single code words in code space. 26

CDMA on signal level (2) signal A A s data B 1 0 0 B d key B key sequence B data key 0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1 1 1 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1 B k signal B B s A s + B s 27 data A CDMA on signal level (3) 1 0 1 A d A s + B s A k (A s + B s ) * A k integrator output comparator output 1 0 1 28

data B CDMA on signal level (4) 1 0 0 B d A s + B s B k (A s + B s ) * B k integrator output comparator output 1 0 0 29 CDMA on signal level (5) A s + B s wrong key K (A s + B s ) * K integrator output comparator output (0) (0)? 30

SAMA - Spread Aloha Multiple Access Aloha has only a very low efficiency, CDMA needs complex receivers to be able to receive different senders with individual codes at the same time. Idea: use spread spectrum with only one single code (chipping sequence) for spreading for all senders accessing according to aloha sender A 1 0 1 sender B 0 1 spread the signal e.g. using the chipping sequence 110101 1 collision narrow band send for a shorter period with higher power t Problem: find a chipping sequence with good characteristics 31 Comparison SDMA/TDMA/FDMA/CDMA Approach SDMA TDMA FDMA CDMA Idea Terminals Signal separation Advantages Disadvantages Comment segment space into cells/sectors only one terminal can be active in one cell/one sector cell structure, directed antennas very simple, increases capacity per km² inflexible, antennas typically fixed only in combination with TDMA, FDMA or CDMA useful segment sending time into disjoint time-slots, demand driven or fixed patterns all terminals are active for short periods of time on the same frequency synchronization in the time domain established, fully digital, flexible guard space needed (multipath propagation), synchronization difficult standard in fixed networks, together with FDMA/SDMA used in many mobile networks segment the frequency band into disjoint sub-bands every terminal has its own frequency, uninterrupted filtering in the frequency domain simple, established, robust inflexible, frequencies are a scarce resource typically combined with TDMA (frequency hopping patterns) and SDMA (frequency reuse) spread the spectrum using orthogonal codes all terminals can be active at the same place at the same moment, uninterrupted code plus special receivers flexible, less frequency planning needed, soft handover complex receivers, needs more complicated power control for senders still faces some problems, higher complexity, lowered expectations; will be integrated with TDMA/FDMA 32