Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Similar documents
Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Mobile Computing. Chapter 3: Medium Access Control

Medium Access Control

Medium Access Schemes

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

Wireless Transmission & Media Access

Structure of the Lecture

Access Methods and Spectral Efficiency

COM-405 Mobile Networks. Module A (Part A2) Introduction

Cellular systems 02/10/06

UNIT 4 Spread Spectrum and Multiple. Access Technique

Physical Layer Issues

Multiple Access Techniques for Wireless Communications


An Introduction to Wireless Technologies Part 2. F. Ricci

Multiple Access Schemes

Introduction to Wireless and Mobile Networking. Hung-Yu Wei g National Taiwan University

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009

Mobile Computing Unit 1 WIRELESS COMMUNICATION FUNDAMENTALS

Multiplexing Module W.tra.2

Level 6 Graduate Diploma in Engineering Wireless and mobile communications

Channel partitioning protocols

Multiple access techniques

Wireless Transmission in Cellular Networks

Basics of Wireless and Mobile Communications

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

Multiple Access Techniques

Advanced Computer Networks. Wireless Networks Fundamentals

Mobile Communications

CDMA - QUESTIONS & ANSWERS

Multiple Access Techniques

Chapter 7 Multiple Division Techniques for Traffic Channels

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Local Area Networks NETW 901

Mobile Communications Chapter 3 : Media Access

Lecture 8 Mul+user Systems

W-CDMA for UMTS Principles

SC - Single carrier systems One carrier carries data stream

Chapter 2: Wireless Transmission. Mobile Communications. Spread spectrum. Multiplexing. Modulation. Frequencies. Antenna. Signals

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access Methods

Mobile Communication and Mobile Computing

UNIK4230: Mobile Communications. Abul Kaosher

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.

ETSI SMG#24 TDoc SMG 903 / 97. December 15-19, 1997 Source: SMG2. Concept Group Alpha - Wideband Direct-Sequence CDMA: System Description Summary

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Chapter 7. Multiple Division Techniques

ECS455: Chapter 4 Multiple Access

APPLICATION PROGRAMMING: MOBILE COMPUTING [ INEA00112W ] Marek Piasecki PhD Wireless Telecommunication

CS 218 Fall 2003 October 23, 2003

Multiple Access System

Mobile Communication Systems. Part 7- Multiplexing

Lecture 3 Cellular Systems

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Fiber Distributed Data Interface

Background: Cellular network technology

Chapter 2 Multiple access methods

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

DOPPLER SHIFT. Thus, the frequency of the received signal is

Reti di Telecomunicazione. Channels and Multiplexing

UNIT - 1 [INTRODUCTION TO WIRELESS COMMUNICATION SYSTEMS] OLUTION OF MOBILE RADIO COMMUNICATION

IMT IMT-2000 stands for IMT: International Mobile Communications 2000: the frequency range of 2000 MHz and the year 2000

Question Points Score Total 100

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks

Spread Spectrum: Definition

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

WCDMA Basics Chapter 2 OBJECTIVES:

Lauri Pirttiaho, NMP/Oulu

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

Part 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

RADIO LINK ASPECT OF GSM

Wireless and Mobile Network Architecture

CDMA Principle and Measurement

Chapter 2 Overview - 1 -

Wireless Networks. Why Wireless Networks? Wireless Local Area Network. Wireless Personal Area Network (WPAN)

MSIT 413: Wireless Technologies Week 5

UNIT II MAC, TELE COMMUNICATION AND SATELLITE SYSTEMS

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

TELE4652 Mobile and Satellite Communications

Interference management Within 3GPP LTE advanced

Direct Link Communication II: Wireless Media. Current Trend

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless and Mobile Network Architecture. Outline. Introduction. Cont. Chapter 1: Introduction

EEE 309 Communication Theory

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE

CDMA is used to a limited extent on the 800-MHz band, but is much more common in the 1900-MHz PCS band. It uses code-division multiple access by

Multiple Access. Difference between Multiplexing and Multiple Access

Cellular Wireless Networks. Chapter 10

Wireless Transmission:

SNS COLLEGE OF ENGINEERING COIMBATORE DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK

PERFORMANCE ANALYSIS OF DOWNLINK POWER CONTROL IN WCDMA SYSTEM

Technical Aspects of LTE Part I: OFDM

Difference Between. 1. Old connection is broken before a new connection is activated.

Transcription:

Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4,

Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3) Problems in wireless networks signal strength decreases proportional to the square of the distance the sender would apply CS and CD, but the collisions happen at the receiver it might be the case that a sender cannot hear the collision, i.e., CD does not work furthermore, CS might not work if, e.g., a terminal is hidden S200, COM3525 Wireless Networks Lecture 4, 2

Motivation - hidden and exposed terminals Hidden terminals A sends to B, C cannot receive A C wants to send to B, C senses a free medium (CS fails) collision at B, A cannot receive the collision (CD fails) A is hidden for C A B C Exposed terminals B sends to A, C wants to send to another terminal (not A or B) C has to wait, CS signals a medium in use but A is outside the radio range of C, therefore waiting is not necessary C is exposed to B S200, COM3525 Wireless Networks Lecture 4, 3

Motivation - near and far terminals Terminals A and B send, C receives signal strength decreases proportional to the square of the distance the signal of terminal B therefore drowns out A s signal C cannot receive A A B C If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer Also severe problem for CDMA-networks - precise power control needed! S200, COM3525 Wireless Networks Lecture 4, 4

Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) segment space into sectors, use directed antennas cell structure FDMA (Frequency Division Multiple Access) assign a certain frequency to a transmission channel between a sender and a receiver permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) TDMA (Time Division Multiple Access) assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time The multiplexing schemes are now used to control medium access! S200, COM3525 Wireless Networks Lecture 4, 5

FDD/FDMA - general scheme, example GSM 960 MHz f 24 935.2 MHz 200 khz 95 MHz 24 20 MHz 890.2 MHz t S200, COM3525 Wireless Networks Lecture 4, 6

TDD/TDMA - general scheme, example DECT 47 µs 2 3 2 2 3 2 downlink uplink t S200, COM3525 Wireless Networks Lecture 4, 7

Frequency Division Multiple Access Concept: assign different frequency bands to different users no sharing of a frequency band between two users user separation using band-pass filters continuous flow two-way: two frequency bands or Time Division Duplex (TDD) Advantages: simple receivers longer symbol duration: no-need for equalization low inter-symbol interference e.g., 50kb/s QPSK =>40 µs >> -0µs delay spread Drawbacks: frequency guard bands, costly tight RF band-filters, long fading duration: need slow frequency hopping may need spatial diversity (multiple antennas/beam forming) Rx/Tx S200, COM3525 Wireless Networks Lecture 4, 8

Frequency Selection Frequency management: Fixed (cellular phones-base stations): reuse factor On demand (cellular phones-mobile terminals) Dynamic (cordless/wlan): based on sensing interference levels Problems: congestion management, dynamic load, Antenna implications: High antennas (e.g., 50m): higher coverage but higher interference between base stations (need for synchronization) Low antennas: higher attenuation, lower coverage, better reuse Conclusion: Pure FDMA is only interesting for simple cordless systems (CT-2) S200, COM3525 Wireless Networks Lecture 4, 9

Time Division Multiple Access Concept: use the same frequency over non-overlapping periods of time Advantages: simple filters (window) transmit and receive over the same frequency channel Drawbacks: users must be synchronized with BS (master clock over a BCH) guard times: common 30-50µs, may be less in recent systems short symbol duration: need for equalization, training sequences... high inter-symbol interference e.g., 50Kbps, QPSK, 8 users: 5 µs symbol duration delay spread: µs (cordless), upto 20µs for cellular S200, COM3525 Wireless Networks Lecture 4, 0

FDMA/TDMA First channel allocation: random access channel (RACH) to send short requests ALOHA type protocol over the RACH One can use both FDMA and TDMA examples: GSM system, D-AMPS Frequency M9 M9 M5 M6 M5 M6 M M2 M3 M4 M M2 M3 M4 Time cycle S200, COM3525 Wireless Networks Lecture 4,

Access method CDMA CDMA (Code Division Multiple Access) all terminals send on the same frequency probably at the same ti me and can use the whole bandwidth of the transmission channel codes generate signals with good-correlation properties signals from another user appear as noise (use spread spectrum technology) signals are spread over a wideband using pseudo-noise sequences (e.g., each sender has a unique random number, the sender XORs the signal with this random number) the receiver can tune into this signal if it knows the pseudo random number, tuning is done via a correlation function Disadvantages: higher complexity of a receiver (receiver cannot just listen int o the medium and start receiving if there is a signal) all signals should have the same strength at a receiver (near -far effect) Advantages: all terminals can use the same frequency => no planning needed; macrodiversity huge code space (e.g. 2 32 ) compared to frequency space interferences (e.g. white noise) is not coded forward error correction and encryption can be easily integrated S200, COM3525 Wireless Networks Lecture 4, 2

CDMA in theory Sender A sends A d =, key A k = 000 (assign: 0 = -, = ) sending signal A s = A d * A k = (-,, -, -,, ) Sender B sends B d = 0, key B k = 00 (assign: 0 = -, = ) sending signal B s = B d * B k = (-, -,, -,, -) Both signals superimpose in space interference neglected (noise etc.) A s B s = (-2, 0, 0, -2, 2, 0) Receiver wants to receive signal from sender A apply key A k bitwise (inner product) A e = (-2, 0, 0, -2, 2, 0) A k = 2 0 0 2 2 0 = 6 result greater than 0, therefore, original bit was receiving B B e = (-2, 0, 0, -2, 2, 0) B k = -2 0 0-2 - 2 0 = -6, i.e. 0 S200, COM3525 Wireless Networks Lecture 4, 3

CDMA on signal level I data A 0 A d key A key sequence A data key 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 A k signal A A s Real systems use much longer keys resulting in a larger distance between single code words in code space. S200, COM3525 Wireless Networks Lecture 4, 4

CDMA on signal level II signal A A s data B 0 0 B d key B key sequence B data key 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 B k signal B B s A s B s S200, COM3525 Wireless Networks Lecture 4, 5

CDMA on signal level III data A 0 A d A s B s A k (A s B s ) * A k integrator output comparator output 0 0 S200, COM3525 Wireless Networks Lecture 4, 6

CDMA on signal level IV data B 0 0 B d A s B s B k (A s B s ) * B k integrator output comparator output 0 S200, COM3525 Wireless Networks Lecture 4, 7

CDMA on signal level V A s B s wrong key K (A s B s ) * K integrator output comparator output () ()? S200, COM3525 Wireless Networks Lecture 4, 8

CDMA: Direct Sequence Each mobile is allocated a PN sequence: The elements of the PN-sequence are called chips To transmit one bit /0 send the PN-Seq/inv-PN-Seq 0 Example Hadamard Matrix: user Each mobile uses one row The rows are orthogonal user 2 = H 4 Power user 3 user 4 non-spread signal Frequency spreaded signal S200, COM3525 Wireless Networks Lecture 4, 9

Aloha/slotted aloha Mechanism random, distributed (no central arbiter), time-multiplex Slotted Aloha additionally uses time-slots, sending must always start at slot boundaries Aloha collision sender A sender B Slotted Aloha sender C t collision sender A sender B sender C t S200, COM3525 Wireless Networks Lecture 4, 20

Carrier Sense Protocols Use the fact that in some networks you can sense the medium to check whether it is currently free -persistent CSMA non-persistent CSMA p-persistent protocol CSMA with collision Detection (CSMA/CD): not applicable to wireless systems -persistent CSMA when a station has a packet: it waits until the medium is free to transmit the packet if a collision occurs, the station waits a random amount of time first transmission results in a collision if several stations are waiting for the channel S200, COM3525 Wireless Networks Lecture 4, 2

Carrier Sense Protocols (Cont d) non-persistent CSMA when a station has a packet: if the medium is free, transmit the packet otherwise wait for a random period of time and repeat the algori thm higher delays, but better performance than pure ALOHA p-persistent protocol when a station has a packet wait until the medium is free: transmit the packet with probability p wait for next slot with probability -p better throughput than other schemes but higher delay CSMA with collision Detection (CSMA/CD) stations abort their transmission when they detect a collision e.g., Ethernet, IEEE802.3 but not applicable to wireless systems S200, COM3525 Wireless Networks Lecture 4, 22

DAMA - Demand Assigned Multiple Access Channel efficiency only 8% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length) Reservation can increase efficiency to 80% a sender reserves a future time-slot sending within this reserved time-slot is possible without collision reservation also causes higher delays typical scheme for satellite links Examples for reservation algorithms: Explicit Reservation according to Roberts (Reservation-ALOHA) Implicit Reservation (PRMA) Reservation-TDMA S200, COM3525 Wireless Networks Lecture 4, 23

Access method DAMA: Explicit Reservation Explicit Reservation (Reservation Aloha): two modes: ALOHA mode for reservation: competition for small reservation slots, collisions possible reserved mode for data transmission within successful reserved slots (no coll isions possible) it is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time collision Aloha reserved Aloha reserved Aloha reserved Aloha t S200, COM3525 Wireless Networks Lecture 4, 24

Access method DAMA: PRMA Implicit reservation (PRMA - Packet Reservation MA): a certain number of slots form a frame, frames are repeated stations compete for empty slots according to the slotted aloha principle once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send competition for this slots starts again as soon as the slot was empty in the last frame reservation ACDABA-F ACDABA-F AC-ABAF- A---BAFD ACEEBAFD frame frame 2 frame 3 frame 4 frame 5 2 3 4 5 6 7 8 time-slot A C D A B A F A C A B A A B A F A B A F D A C E E B A F D t collision at reservation attempts S200, COM3525 Wireless Networks Lecture 4, 25

Access method DAMA: Reservation-TDMA Reservation Time Division Multiple Access every frame consists of N mini-slots and x data-slots every station has its own mini-slot and can reserve up to k data-slots using this mini-slot (i.e. x = N * k). other stations can send data in unused data-slots according to a round-robin sending scheme (best-effort traffic) N mini-slots N * k data-slots e.g. N=6, k=2 reservations for data-slots other stations can use free data-slots based on a round-robin scheme S200, COM3525 Wireless Networks Lecture 4, 26

MACA - collision avoidance MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain sender address receiver address packet size Variants of this method can be found in IEEE802. as DFWMAC (Distributed Foundation Wireless MAC) S200, COM3525 Wireless Networks Lecture 4, 27

MACA examples MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B RTS CTS CTS A B C MACA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A RTS CTS RTS A B C S200, COM3525 Wireless Networks Lecture 4, 28

MACA variant: DFWMAC in IEEE802. sender receiver ACK idle RxBusy time-out NAK; RTS wait for ACK packet ready to send; RTS wait for the right to send CTS; data time-out; RTS data; ACK time-out data; NAK idle wait for data RTS; CTS ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy RTS; RxBusy S200, COM3525 Wireless Networks Lecture 4, 29

Polling mechanisms If one terminal can be heard by all others, this central terminal (a.k.a. base station) can poll all other terminals according to a certain scheme now all schemes known from fixed networks can be used (typical mainframe - terminal scenario) Example: Randomly Addressed Polling base station signals readiness to all mobile terminals terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address) or with collisions (over the Random Access CHannel) the base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address) the base station acknowledges correct packets and continues polling the next terminal this cycle starts again after polling all terminals of the list S200, COM3525 Wireless Networks Lecture 4, 30

ISMA (Inhibit Sense Multiple Access) Current state of the medium is signaled via a busy tone the base station signals on the downlink (base station to terminals) if the medium is free or not terminals must not send if the medium is busy terminals can access the medium as soon as the busy tone stops the base station signals collisions and successful transmissions via the busy tone and acknowledgements, respectively (media access is not coordinated within this approach) mechanism used, e.g., for CDPD (USA, integrated into AMPS) S200, COM3525 Wireless Networks Lecture 4, 3

SAMA - Spread Aloha Multiple Access Aloha has only a very low efficiency, CDMA needs complex receivers to be able to receive different senders with individual codes at the same time Idea: use spread spectrum with only one single code (chipping sequence) for spreading for all senders accessing according to aloha collision sender A sender B 0 0 narrow band spread the signal e.g. using the chipping sequence 00 ( CDMA without CD ) send for a shorter period with higher power t Problem: find a chipping sequence with good characteristics S200, COM3525 Wireless Networks Lecture 4, 32

Comparison SDMA/TDMA/FDMA/CDMA Approach SDMA TDMA FDMA CDMA Idea segment space into cells/sectors Terminals only one terminal can be active in one cell/one sector Signal separation cell structure, directed antennas segment sending time into disjoint time-slots, demand driven or fixed patterns all terminals are active for short periods of time on the same frequency synchronization in the time domain segment the frequency band into disjoint sub-bands every terminal has its own frequency, uninterrupted filtering in the frequency domain spread the spectrum using orthogonal codes all terminals can be active at the same place at the same moment, uninterrupted code plus special receivers Advantages very simple, increases capacity per km² Disadvantages inflexible, antennas typically fixed Comment only in combination with TDMA, FDMA or CDMA useful established, fully digital, flexible guard space needed (multipath propagation), synchronization difficult standard in fixed networks, together with FDMA/SDMA used in many mobile networks simple, established, robust inflexible, frequencies are a scarce resource typically combined with TDMA (frequency hopping patterns) and SDMA (frequency reuse) flexible, less frequency planning needed, soft handover complex receivers, needs more complicated power control for senders still faces some problems, higher complexity, lowered expectations; will be integrated with TDMA/FDMA S200, COM3525 Wireless Networks Lecture 4, 33

Throughputs of Some Random Access Protocols Protocol Throughput Pure-ALOHA S = Ge -2G Slotted-ALOHA S = Ge -G Non slotted -persistent Slotted -persistent CSMA G G [ ( ag ( ag ( G ( 2 S = ag G ( 2 G a ) G ( ( e G ) / 2)] ag ag G ( a ) S = ag G ( ( G a [ ) e e ) ] e ae e ) a ) e a ) a ) Nonpersistent non slotted CSMA = Ge 2 a ag S ( ) e ag Nonpersistent slotted CSMA age e S = ag ag a G: load (includes both successful transmissions and retransmissions) S: successful transmission a: ratio of propagation delay to the packet transmission delay S200, COM3525 Wireless Networks Lecture 4, 34

S200, COM3525 Wireless Networks Lecture 4, 35