Wireless Communications Lecture 4: Multiple Access Technologies

Similar documents
Cellular systems 02/10/06

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Politecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone

P. 241 Figure 8.1 Multiplexing

Mobile Computing. Chapter 3: Medium Access Control

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Technical Aspects of LTE Part I: OFDM

Local Area Networks NETW 901

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Outline of the Lecture

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

*Most details of this presentation obtain from Behrouz A. Forouzan. Data Communications and Networking, 5 th edition textbook

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Wireless Transmission & Media Access

Multiple Access Methods

Multiplexing. Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur

Multiple Access Techniques for Wireless Communications

Lecture 8: Media Access Control

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

A Polling Based Approach For Delay Analysis of WiMAX/IEEE Systems

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

Medium Access Schemes

2 Polling. Politecnico di Milano Facoltà di Ingegneria dell Informazione

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

DOPPLER SHIFT. Thus, the frequency of the received signal is

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Reti di Telecomunicazione. Channels and Multiplexing

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

SC - Single carrier systems One carrier carries data stream

Medium Access Control

Cooperation in Random Access Wireless Networks

Lecture 8 Mul+user Systems

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

Multiple Access System

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Multiple Access Schemes

(Refer Slide Time: 2:23)

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

6.1 Multiple Access Communications

Structure of the Lecture

Lecture on Sensor Networks

Channel partitioning protocols

Multiple Access Techniques

OFDM Transceiver using Verilog Proposal

FDM- FREQUENCY DIVISION MULTIPLEXING

ITS323: Introduction to Data Communications CSS331: Fundamentals of Data Communications

Data Communications. Unguided Media Multiplexing

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure

Comparison of MIMO OFDM System with BPSK and QPSK Modulation

Medium Access Methods. Lecture 9

Making Connections Efficient: Multiplexing and Compression

Wireless Communication

Computer Networks: Multiplexing

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simulation of Optical CDMA using OOC Code

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Multiple Access Techniques

Multiple access techniques

Orthogonal Frequency Division Multiplexing & Measurement of its Performance

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

Part A: Spread Spectrum Systems

TSIN01 Information Networks Lecture 9

Lecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday

Fiber Distributed Data Interface

Multiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions

Channel Capacity. Tom McDermott, N5EG June 1997

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Mobile Communication Systems. Part 7- Multiplexing

Digital Communications Theory. Phil Horkin/AF7GY Satellite Communications Consultant

Channel Estimation in Multipath fading Environment using Combined Equalizer and Diversity Techniques

The Long Range Wide Area Network - LoraWAN

Module 3: Physical Layer

Mobile Communications

Digi-Wave Technology Williams Sound Digi-Wave White Paper

IEEE ax / OFDMA

HSPA & HSPA+ Introduction

Multi-Carrier Systems

Part A: Spread Spectrum Systems

Mobile Communications Chapter 6: Broadcast Systems

New Cross-layer QoS-based Scheduling Algorithm in LTE System

Outline / Wireless Networks and Applications Lecture 7: Physical Layer OFDM. Frequency-Selective Radio Channel. How Do We Increase Rates?

Lecture 5 Transmission. Physical and Datalink Layers: 3 Lectures

A Wireless Communication System using Multicasting with an Acknowledgement Mark

Interference management Within 3GPP LTE advanced

Multiplexing Module W.tra.2

OFDMA and MIMO Notes

Performance Evaluation of STBC-OFDM System for Wireless Communication

Data Transmission Definition Data Transmission Analog Transmission Digital Transmission

Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic

ECS455: Chapter 4 Multiple Access

A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks

Multiple Access. Difference between Multiplexing and Multiple Access

LTE-Advanced and Release 10

Transcription:

Wireless Communications Lecture 4: Multiple Access Technologies Module Representive: Prof. Dr.-Ing. Hans D. Schotten schotten@eit.uni-kl.de Lecturer: Dr. Vincenzo Sciancalepore vincenzo.sciancalepore@neclab.eu Institute of Wireless Communication (WiCon) Department of Electrical and Computer Engineering TU Kaiserslautern SS 2018

Outline Transmission on shared means Multiplexing and Multiple Access Scheduled Access Protocols Random Access Protocols Channelization Protocols V. Sciancalepore Wireless Communications 2

How to share the means? Multiple information sent through the same physical channel This may create collisions and data loss Several tecniques may help to avoid collisions or recover from data loss

Multiplexing vs. multiple access Multiplexing allows to send data from one transmitter to multiple receivers (DOWNLINK) Multiple access is required to send data from multiple transmitters to one single receiver (UPLINK) V. Sciancalepore Wireless Communications 4

The multiple access in wireless networks Access to the same shared means can be managed by using: Random access Scheduled access Random access: Simultaneous transmissions may overlap and result in packet collision (data loss) Scheduled access: Sequential transmissions result in no collisions Channelized access: Transmission are centrally controlled to avoid collisions V. Sciancalepore Wireless Communications 5

Scheduled access λλ MM λλ MM λλ MM μμ 1 μμ 2 μμ MM When multiple transmitters have to send their packets on a shared means, we can assume different local queues that are emptied when scheduled Scheduling algorithms are defined to select which transmitter can occupy the channel and send data Polling scheme is a way to sequentially grant access (token) to any single transmitter V. Sciancalepore Wireless Communications 6

Exhaustive polling Transmitters can transmit all packets residing in the queue when the token has been received Assuming a global arrival rate λλ, packet transmission time TT and token passing time h, let us calculate the probability that the channel is occupied while one transmitter is sending a packet at a random time tt ρρ = λλλλ The average waiting time for a packet in the queue to be transmitted is EE WW = WW 1 + WW 2 + WW 3 WW 1 = EE NN cc TT = λλλλλλ WW = ρρρρ[ww] WW 2 = ρρ TT 2 + (1 ρρ) h 2 WW 3 = MM 1 2 EE WW = ρρρρ WW + ρρ TT 2 + 1 ρρ h 2 + (MM 1) 2 h h V. Sciancalepore Wireless Communications 7

Exhaustive polling It yields the following EE WW = ρρ 2(1 ρρ) MM ρρ TT + h, where 0 ρρ 1 2(1 ρρ) Waiting time of a single queue Additional waiting time due to token passing time We can calculate the average token cycle time EE CC = λλλλ CC TT + MMM EE CC = MMM 1 ρρ V. Sciancalepore Wireless Communications 8

Gated polling Transmitters can transmit all packets that are in the queue at the time when the token arrives. Packets arriving in the queue while the transmitter is occupying the channel, need to wait for the next token. EE WW = ρρρρ WW + ρρ TT 2 + 1 ρρ h (MM 1) + h + WW 2 2 4 where WW 4 = ρρ MMM = hρρ is the additional cycle the packet may wait MM It yields EE WW = ρρ MM + ρρ TT + 2(1 ρρ) 2(1 ρρ) h V. Sciancalepore Wireless Communications 9

Limited polling Transmitters can send up to K packets when the token arrives. When K=1, the scheme is called Round Robin EE WW = ρρρρ WW + ρρ TT 2 + 1 ρρ h 2 where WW 4 = ρρ MMM = hρρ and WW MM 5 = EE[NN cc] MM + (MM 1) 2 MMM = λλee[ww]h h + WW 4 + WW 5 It yields EE WW = ρρ 2(1 ρρ h+tt TT ) TT + MM+ρρ 2(1 ρρ h+tt TT ) h, where 0 ρρ TT TT V. Sciancalepore Wireless Communications 10

Random access When transmissions are performed simultaneously, collisions may occur. The transmitter needs to get feedbacks about the status of its previous transmission. In case of collision, recovering mechanisms are needed to retransmit (and reduce the probability of collision) The simplest random access protocol is called Aloha Prof. Norman Abramson was the inventor of this first wireless network (AlohaNet) V. Sciancalepore Wireless Communications 11

Aloha random protocol The transmitter may send the packet as soon as it arrives in the queue If there is a collision (data loss), the transmitter waits for a random time and retransmit the packet Let us consider the transmission starting times distributed as a Poisson process with rate λλ with a normalized rate GG = λλλλ The success probability to send and deliver a packet depends on the probability that no other transmitter is occupying the shared means in a 2TT interval: PP ss = ee 2GG Normalized throughput is S = GGee 2GG V. Sciancalepore Wireless Communications 12

Aloha random protocol When different transmitters are synchronized, we call the protocol Slotted Aloha. This improves the performance of the pure Aloha by reducing the vunerability time window to T Normalized throughput is S = GGee GG V. Sciancalepore Wireless Communications 13

Channelization protocols FDM/FDMA: Frequency Division Multiplexing / Frequency Division Multiple Access TDM/TDMA: Time Division Multiplexing / Time Division Multiple Access CDM/CDMA: Code Division Multiplexing / Code Division Multiple Access V. Sciancalepore Wireless Communications 14

Frequency division multiple access The total available bandwidth is divided into several (small bandwidth) channels. Simple technique used for several telecommunication systems, such as cable television system, fiber optic communications or aereospace telemetry. In fiber optic systems, it may be called Wavelength Division Multiple Access (WDMA), as the light may be reffered by the wave-length instead of its frequency. V. Sciancalepore Wireless Communications 15

Time division multiple access The time is divided into several time slots that are grouped into time frames. A single frame consists of N time slots. Each transmission occurs on a isolated time slot to prevent collisions. A guard time TT gg can be defined to ensure that different transmissions do not interfere each others (because of overlapping transmissions): TT gg = max(2ττ ii ) Propagation time for transmitter i V. Sciancalepore Wireless Communications 16

Time division multiple access The guard time can play a fundamental role in the overall system efficiency When the propagation time ττ is known in advance, the transmission time can be anticipated to compensate Due to the channel condition, the propagation time ττ can vary and must be estimated and sent back to the transmitter V. Sciancalepore Wireless Communications 17

Code division multiple access Useful bits are multiplied by a code Codes are orthogonal in the code division multiplexing while they have limited correlation in the code division multiple access TT NN 1 ss ii CC ii ii=0 CC kk = ss kk V. Sciancalepore Wireless Communications 18

Code division multiple access Using the code, we can expand the radio bandwidth and allow different signals to transmit on the same radio band The signal is multiplied by the code at the receiver and reduced V. Sciancalepore Wireless Communications 19

Orthogonal division multiple access The channel is divided into multiple narrow orthogonal bands spaced so as to avoid interference. Data to be transmitted is divided into multiple bit streams that are modulated onto the subcarriers. Time slots (within each subchannel) are used to package the data V. Sciancalepore Wireless Communications 20