Multiple Access Methods

Similar documents
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Cellular systems 02/10/06

Multiplexing Module W.tra.2

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Local Area Networks NETW 901

DOPPLER SHIFT. Thus, the frequency of the received signal is

Mobile Computing. Chapter 3: Medium Access Control

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Medium Access Control

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

Medium Access Methods. Lecture 9

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Mobile Communications

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

6.1 Multiple Access Communications

Wireless Transmission & Media Access

Multiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions

A feasibility study of CDMA technology for ATC. Summary

Multiple access techniques

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

SC - Single carrier systems One carrier carries data stream

TSIN01 Information Networks Lecture 9

Channel partitioning protocols

Multiple Access System

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Access Methods and Spectral Efficiency

Network Management System for Telecommunication and Internet Application

IEEE P Broadband Wireless Access Working Group

Mobile Communication Systems. Part 7- Multiplexing

Medium Access Schemes

Multiple Access Schemes

Lecture 8 Mul+user Systems

COM-405 Mobile Networks. Module A (Part A2) Introduction

Chapter 7 GSM: Pan-European Digital Cellular System. Prof. Jang-Ping Sheu

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone

Department of Computer Science and Engineering. CSE 3213: Communication Networks (Fall 2015) Instructor: N. Vlajic Date: Dec 13, 2015

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Multiple Access Techniques for Wireless Communications

Wireless WANS and MANS. Chapter 3

ECS455: Chapter 4 Multiple Access

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

Interference management Within 3GPP LTE advanced

Achieving Network Consistency. Octav Chipara

An Introduction to Wireless Technologies Part 2. F. Ricci

Chapter 1 Acknowledgment:

Multiple Access. Difference between Multiplexing and Multiple Access

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

Fiber Distributed Data Interface

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Wireless Communications Lecture 4: Multiple Access Technologies

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

UNIK4230: Mobile Communications. Abul Kaosher

Grundlagen der Rechnernetze. Introduction

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Contents. Telecom Systems Chae Y. Lee. FDM Bell Systems s FDM Synchronous TDM T1, T3 Statistical TDM Multiple Access: FDMA, TDMA, CDMA

Chapter 14. Cellular Wireless Networks

Wireless Network Pricing Chapter 2: Wireless Communications Basics

Reti di Telecomunicazione. Channels and Multiplexing

Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor

Chapter 7 Multiple Division Techniques for Traffic Channels

Lecture on Sensor Networks

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

CS 294-7: Wireless Local Area Networks. Professor Randy H. Katz CS Division University of California, Berkeley Berkeley, CA

Block code Encoder. In some applications, message bits come in serially rather than in large blocks. WY Tam - EIE POLYU

Wireless Communication

UCS-805 MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2011

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

UNIT 6 ANALOG COMMUNICATION & MULTIPLEXING YOGESH TIWARI EC DEPT,CHARUSAT


Module 3: Physical Layer

UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

WCDMA Basics Chapter 2 OBJECTIVES:

Chapter 7. Multiple Division Techniques


Multiple access and cellular systems

Difference Between. 1. Old connection is broken before a new connection is activated.

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

Communications Theory and Engineering

PULSE: A MAC Protocol for RFID Networks

Structure of the Lecture

EEE 309 Communication Theory

BASIC CONCEPTS OF HSPA

Multiple Access Techniques

Introduction to Wireless Networks p. 1 Evolution of Wireless Networks p. 2 Early Mobile Telephony p. 2 Analog Cellular Telephony p.

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Code Division Multiple Access.

CS 218 Fall 2003 October 23, 2003

Chapter 2 Overview - 1 -

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 2: Overview of Modern Wireless Communication Systems

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Transcription:

Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004

Content of presentation Protocol Classification Conflict-Free Access Protocols Static Allocation TDMA FDMA CDMA Dynamic Allocation Polling Token passing Contention Access Protocol Static Resolution Aloha Carrier sensing protocols Dynamic Resolution Binary Tree Page 2

Protocol Classification Multiple Access Protocols Contention Conflict Free Static Resolution Dynamic Resolution Dynamic Allocation Static Allocation ALOHA Carrier sensing Binary tree Polling TDMA Token passing FDMA CDMA Page 3

Conflict-Free Access Protocols Static Allocation = Fixed Assignment: I.e. fixed allocated channel resource Resource can be frequency, or time, or both Predetermined basis to a single user Basic access methods: FDMA Frequency-Division Multiple Access TDMA Time-division Multiple Access CDMA Code-Division Multiple access Some other formats: Combination of the basic access methods Implemented with various multi-user access algorithm Page 4

Frequency-Division Multiple Access Built upon Frequency-division multiplexing scheme It is the simplest and oldest form of multiplexing A fixed subchannel is assigned to a user terminal and is retained until released by the user At receiver, the user terminal filters the designated channel out if the composite signal Currently used in Cellular mobile telephone VHF & UHF land-mobile radio system Satellite networks Characteristics: Efficient when information is steady flow Inefficient when data are sporadic 1, 2, 3 1 2 3 Guard band t f Page 5

FDMA Performance System model: M independent queues M/G/1 queueing system Throughput-Delay Page 6

Time-Division Multiple Access Built upon Time-division multiplexing transmission format Deterministic allocation of time interval time-slots Time slots are organized into frames T1 channel : 1.544 Mbits/s Multiplexing 24 PCM encoded voice channel Each channel is 64 kbits/s Each channel sampled at an 8-kHz rate Each sample is encoded into 8 bits Used in new digital cellular network Europe (GSM) Japan (JDC) America (IS-54) 1 2 3 Guard time 1, 2, 3 w t f Page 7

TDMA Performance System model: M independent queues M/D/1 queueing system Throughput-Delay Comparison between FDMA and CDMA Page 8

Hybrid of TDMA and FDMA TDMA and FDMA can be implemented together to get optimized function and performance For example TDMA/FDMA TDMA/TDD/FDMA Amplitude Amplitude 2 1 8 8 8 6 7 6 7 6 7 5 5 5 5 3 4 3 4 3 4 3 4 2 2 2 1 1 1 Rx Rx 8 6 7 F1 F2 F1' F2' Frequency 4 5 6 Rx 8 Rx 7 4 5 6 Rx F1 F2 F3 F4 Frequency 8 Rx 7 4 5 6 Rx 8 Rx 7 2 3 Rx 3 Rx 3 Rx 3 Rx 2 2 2 1 Rx 1 Rx 1 Rx 1 Rx 4 5 6 Rx 8 Rx 7 Page 9

Code-Division Multiple Access Hybrids combination of FDMA and TDMA Characteristics Multiple users Simultaneously operating Entire bandwidth of time-frequency domain Separated by distinct user-signal codes (Spread spectrum) Two common CDMA Direct sequence (DS) CDMA Frequency Hopping (FH) CDMA Spreading code ML (Maximum length) code Gold code Walsh-Hadamard code Page 10

CDMA --- Spreading Page 11

CDMA --- De-spreading Page 12

Dynamic Allocation Protocols Dynamic Allocation = On demand Realized via reservation schemes Basic access methods: Polling Token passing Others MSAP BRAM MiniSlotted Alternative Priority Broadcast Recognition Access Method Page 13

Polling Techniques (1) Centralized control One station is equipped as a controller Periodically polling all the other stations Classification Hub polling Roll polling Polling procedure Hub polling From furthest station Polled station starts sending if it has something to transmit If not, a negative response is detected by the controller The polled station transmits the poll mesage to its neighbor in upstream (control) Control message finally is regained by the controller Page 14

Polling Techniques (2) Roll polling Controller keeps a polling list, giving the order in which the terminals are polled Polled station starts sending if it has something to transmit If not, a negitve reply is detected by the controller Controller then polls the next terminals in the sequence Initial exchange of short messages required(between a station and the controler ) Page 15

Charactertistics and performance Polling protocols are efficient in systems Propagtion delay is small Overhead is low Number of stations shouldn t be large (proportional to overhead) Polling protocols are inefficient Lightly loaded Part of stations have data to transmit Subdivide stations into subsets (variations) Hub polling overhead is much smaller than that of roll polling Applications: Widely used in dedicated telephone networks for data communications Generally not been adopted in existing mobile data network or WLAN Page 16

Token Passing Protocol (1) Two logical topologies Bus Ring Token ring is originally developed by IBM, specified in IEEE 802.5 Token ring protocol operation Networks move a small frame, called a token, around the network Possession of the token grants the right to transmit. If the node, receiving the token, has no information to send, it passes the token to the next station. If the node, possessing the token does have information to transmit Seize the token Alter 1 bit of the token Append the information to be transmitted, and send to the next station in the ring The intended destination station flips the recognized address and framecopied bits in frame status field in the frame, and sends the modified frame back out to the ring Page 17

Token Passing Protocol (2) When information reaches the sending station again, it examines and removed the frame from the ring The source station then transmits a new token Phycally star topology, logically ring topology Page 18

Token Ring Characteristics Token passing netowrks are deterministic, so the maximum propagation time is possibly calculated, more predictable than Ethernet Priority schemes can be deployed to improve the efficiency User-designated, high priority station can use network more frequently Priority Station >= Priority token can capture the token Several mechanisms for detecting and compensating for network fault One station is selected as active monitor It provides centralized source of timing information for other stations Ring-maintenance function Removal of continously circlating frames Generation of the new token No collisions occur, contention-free! Page 19

Contention Protocols No guarantee to be successful Large users ->Contention-free schemes are impractical Resolution schemes are needed Static resolution Protocol actual behavior is not influenced by the dynamics of the system Examples: Aloha family CSMA family Dynamic resolution Tracking and taking the advantage of the system changes Example: Binary-Tree CRP (collision Resolution Protocol) Page 20

Pure Aloha It is the simplest contention protocol Whenever packet needs transmission: Send without waiting If collision occurs, then wait for a random time and resend, until successful Highly inefficient at large loads. Maximum utilization of 18% at a mean load of 0.5 Page 21

Slotted Aloha Time is divided into equal size slots (= packet time) Node with new arriving packet: transmit at beginning of next slot If collision: retransmit packet in future slots with probability p, until successful. Maximum utilization of 36% at a mean load of 1 transmission/slot Node 1 1 1 1 1 Node 2 Node 3 2 2 2 3 3 3 C E C S E C E S S Page 22

Nonpresistent (NP) CSMA Impolite -> listen before talk Page 23

1-persistent CSMA Transmit as soon as when it detect the channel is idle Page 24

Slotted Carrier Sensing Protocols Page 25

CSMA/CD Carrier sense multiple access with collision detection Same as CSMA except a collision is detected Ternimate transmission immediately Time slot and non/1-persistent concepts can also be applied Slotted nonpersistent CSMA/CD Slotted 1-persistent CSMA/CD Page 26

Collision Resolution Protocol (CRP) Concentrate on Resolving Collisions as soon as they occurs Exploit feedback information to control the retransmission System model: Similar to slotted Aloha Typical protocol: Binary-Tree CRP Page 27

Binary-Tree Protocol (CRP) When collision occurs, the users are divided in two subsets Divided method can be like flipping coin Binary-Tree CRP One subset should wait until the other set has finished transmission Within one subset, if collision occurs again, performace in the similar way again Enhanced Binary-Tree CRP Enhanced method: flipping beforehand Page 28

Conclusion Multiple Access Protocols Contention Conflict Free Static Resolution Dynamic Resolution Dynamic Allocation Static Allocation ALOHA Carrier sensing Binary tree Polling TDMA Token passing FDMA CDMA Page 29

Reference [1] Raphael Rom, Moshe Sidi, Multiple Access protocols: Performance and Analysis www-comnet.technion.ac.il/rom/pdf/map.pdf [2] Simon Haykin, Michael Moher, Modern Wireless Communications ISBN 0-13-124697-6, Prentice Hall 2005 Page 30

Homework Please explain what is bit-map protocol? What s the advantage and disadvange of this protocol? What is FDDI, how it works. Please give a brief description on its MAC protocol structure and operation. Page 31

Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Any questions? Thanks!