Cellular systems 02/10/06

Similar documents
Access Methods and Spectral Efficiency

Mobile Computing. Chapter 3: Medium Access Control

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Medium Access Control

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Introduction to Wireless and Mobile Networking. Hung-Yu Wei g National Taiwan University

An Introduction to Wireless Technologies Part 2. F. Ricci

Medium Access Schemes

Structure of the Lecture

Wireless Transmission & Media Access

Channel partitioning protocols

An Introduction to Wireless Technologies Part 2. F. Ricci 2008/2009

Question Points Score Total 100

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access Techniques for Wireless Communications

Mobile Communication Systems. Part 7- Multiplexing

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

Multiple Access Schemes

Lecture 8: Media Access Control

ECS455: Chapter 4 Multiple Access

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 8 Mul+user Systems

CS6956: Wireless and Mobile Networks Lecture Notes: 3/23/2015

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.

Multiple access techniques

Mobile Network Evolution Part 1. GSM and UMTS

Multiplexing Module W.tra.2

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

UNIT 4 Spread Spectrum and Multiple. Access Technique

Multiple Access Techniques

Reti di Telecomunicazione. Channels and Multiplexing

Advanced Computer Networks. Wireless Networks Fundamentals

Multiple Access Methods

Local Area Networks NETW 901

UNIK4230: Mobile Communications. Abul Kaosher


Wireless Transmission in Cellular Networks

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

Level 6 Graduate Diploma in Engineering Wireless and mobile communications

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks

Mobile Communication and Mobile Computing

EEE 309 Communication Theory

Chapter 7 Multiple Division Techniques for Traffic Channels

Page 1. Problems with 1G Systems. Wireless Wide Area Networks (WWANs) EEC173B/ECS152C, Spring Cellular Wireless Network

Chapter 14. Cellular Wireless Networks

Multiple Access System

Multiple Access. Difference between Multiplexing and Multiple Access

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

Chapter 2: Wireless Transmission. Mobile Communications. Spread spectrum. Multiplexing. Modulation. Frequencies. Antenna. Signals

Wireless and mobile communication

Wireless WANS and MANS. Chapter 3

COM-405 Mobile Networks. Module A (Part A2) Introduction

ICT 5305 Mobile Communications. Lecture - 3 April Dr. Hossen Asiful Mustafa

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks

GSM FREQUENCY PLANNING

Multiple Access Techniques

Technical Aspects of LTE Part I: OFDM

Wireless and Mobile Network Architecture. Outline. Introduction. Cont. Chapter 1: Introduction

Cellular Wireless Networks. Chapter 10

Wireless and Mobile Network Architecture

Network Management System for Telecommunication and Internet Application

Interference management Within 3GPP LTE advanced

Mobile Communications

Chapter 1 Acknowledgment:

Personal Communication System

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

Background: Cellular network technology

Chapter 7. Multiple Division Techniques

SNS COLLEGE OF ENGINEERING COIMBATORE DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK

Fiber Distributed Data Interface

Contents. Telecom Systems Chae Y. Lee. FDM Bell Systems s FDM Synchronous TDM T1, T3 Statistical TDM Multiple Access: FDMA, TDMA, CDMA

Chapter 7 GSM: Pan-European Digital Cellular System. Prof. Jang-Ping Sheu

W-CDMA for UMTS Principles

EE 577: Wireless and Personal Communications

Modeling and Dimensioning of Mobile Networks: from GSM to LTE. Maciej Stasiak, Mariusz Głąbowski Arkadiusz Wiśniewski, Piotr Zwierzykowski

3G TECHNOLOGY WHICH CAN PROVIDE AUGMENTED DATA TRANSFER RATES FOR GSM STANDARTS AND THE MODULATION TECHNIQUES

TELE4652 Mobile and Satellite Communication Systems

CDMA - QUESTIONS & ANSWERS

ETSI SMG#24 TDoc SMG 903 / 97. December 15-19, 1997 Source: SMG2. Concept Group Alpha - Wideband Direct-Sequence CDMA: System Description Summary

Multiplexing. Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Multiple Access Technique Lecture 8

Chapter 2 Multiple access methods

TELE4652 Mobile and Satellite Communications

Cooperation in Random Access Wireless Networks

ITS323: Introduction to Data Communications CSS331: Fundamentals of Data Communications

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

APPLICATION PROGRAMMING: MOBILE COMPUTING [ INEA00112W ] Marek Piasecki PhD Wireless Telecommunication

Direct Link Communication II: Wireless Media. Current Trend

RADIO LINK ASPECT OF GSM

CS 218 Fall 2003 October 23, 2003

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

DOPPLER SHIFT. Thus, the frequency of the received signal is

SC - Single carrier systems One carrier carries data stream

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Transcription:

Cellular systems 02/10/06

Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from some 100 m in cities to, e.g., 35 km on the country side (GSM) - even less for higher frequencies

Cell structure and SDM Space division multiplexing. Frequency reuse only with a certain distance between the base stations Users inside a cell use FDM or CDM. Standard model using 7 frequencies: f 3 f 2 f 4 f 5 f 1 f 3 f 2 f 6 f 7 f 4 f 5 f 1

Cellular systems Advantages of cell structures: Frequency reuse, higher capacity, higher number of users less transmission power needed more robust, decentralized base station deals with interference, transmission area etc. locally Problems: fixed network needed for the base stations handover (changing from one cell to another) necessary Frequency planning

Frequency planning Fixed frequency assignment: certain frequencies are assigned to a certain cell problem: different traffic load in different cells Dynamic frequency assignment: base station chooses frequencies depending on the frequencies already used in neighbor cells more capacity in cells with more traffic assignment can also be based on interference measurements

Cell systems f 3 f 1 f 2 f 3 f 2 f 1 f 3 f 1 f 2 f 3 f 3 f 2 f 3 f 3 f 1 f 1 f 2 f 3 3 cell cluster f 2 f 4 f 5 f 1 f 3 f 2 f 6 f 3 f 2 f 6 f 7 f 5 f 4 f 5 f 3 f 7 f 1 f 2 f 2 f 2 f 2 f f 1 3 h f 3 h f 3 h 2 h 2 1 h g 1 3 2 h g 3 1 g 3 g 3 f 1 f 1 g 2 g g 2 1 g g 1 3 3 cell cluster with 3 sector antennas 7 cell cluster

Cell breathing CDM systems: cell size depends on current load. Additional traffic appears as noise to other users If the noise level is too high users drop out of cells

Medium access control

MAC Multiple users share the same medium Medium Access Control specifies how this is implemented. General mechanisms: Space division multiplexing Time division multiplexing Frequency division multiplexing Code division multiplexing It is a distributed environment. A user does not know what the others want to do.

MAC stays in link layer Application Application Transport Transport Network Network Network Network Data Link Data Link Data Link Data Link Physical Physical Physical Physical Radio Medium

SDMA SDMA (Space Division Multiple Access) segment space into sectors, use directed antennas cell structure Cellular system A cellphone is assigned the optimal base station, although it receives signals from multiple base stations. Criteria: available resources such as frequencies (FDM), time slots (TDM) or code (CDM). SDMA is never used in isolation.

FDMA FDMA (Frequency Division Multiple Access) assign a certain frequency to a transmission channel between a sender and a receiver permanent (e.g., radio broadcast), or dynamic (demand driven). Pure FDMA (the same frequency is used at all times) or FDMA combined with TDMA (to alleviate narrowband interference). slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) Senders and receivers agree on a fixed hopping pattern.

FDMA Mobile users and base stations in cellular networks. They establish a duplex channel for simultaneous transmission in both directions. The two way transmissions are separated by different frequencies --- frequency division duplex (FDD). They agree on the frequencies in advance.

FDD/FDMA - general scheme, example GSM 960 MHz f 124 935.2 MHz 915 MHz 1 124 20 MHz 200 khz 890.2 MHz 1 t

TDMA TDMA (Time Division Multiple Access) assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time No need to tune to a certain frequency. Simple transmitters and receivers. Almost all MAC schemes for wired network use TDMA, e.g., ethernet, Token ring, ATM. Fixed allocation v.s. dynamic allocation.

Fixed TDM Allocate time slots in a fixed pattern. Fixed bandwidth for each user. Simple, each mobile phone knows its turn, which is assigned by the base station. Fixed delay. Used in a number of phone systems. Good for connections with a fixed rate, e.g., voice. Inefficient for busty data or asymmetric transmissions.

TDD/TDMA - general scheme, example DECT DECT: each user is guaranteed access every 10 ms. 417 µs 1 2 3 11 12 1 2 3 11 12 downlink uplink t

Aloha Time division multiple access without control. Invented by U. of Hawaii Used in ALOHANET between Hawaii islands. Random access scheme. Aloha does not coordinate nor resolve contention. If multiple stations access the medium at the same time, a collision happens, data is destroyed. Resolving packet loss is left to upper layers.

Aloha Random access, no central control. Very simple. Works fine for a light load. No delay guarantee Protocol: Whenever a station has data, it transmits immediately Receivers ACK all packets No ACK = collision. Wait a random time and retransmit

Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender A sender B sender C t

Fixed assignment v.s. random access Voice and data have different characteristics Voice: continuous, steady rate. Data: bursty, assymetric. Fixed assignment: resource is assigned at the beginning of the connection and is held throughout the lifetime. Suitable for voice Examples: TDMA, FDMA, CDMA High throughput in high load, uniform traffic.

Fixed assignment v.s. random access Random access: resource is assigned per packet. Contention: compete for resources. Assignment is done in a distributed, random fashion. Collision can happen, delay is not guaranteed. Suitable for data. Throughput is low compared with fixed assignment, especially at high load. lots of collisions Handles non-uniform data traffic much better.

Aloha How well does it work? What is the throughput? Throughput = # packets transmitted/ total # packets allowed. Throughput (Aloha) = 18%. Throughput (Slotted aloha) = 36%. Packets either collide completely or do not collide at all.

Analysis of pure Aloha A packet will be in a collision if and only if another transmission begins in the vulnerable period Vulnerable period has the length of 2 packet times Frame which collides with start of red frame Frame which collides with end of red frame packet t 0 -F t 0 t 0 +F Vulnerable Period of red packet Time

Analysis of pure Aloha Assume that there are a large number (N) of users in the network All users transmit packets with a fixed (average) length of T seconds Each user transmits with a fixed probability (p) in the time period (T) Thus, the average number of packets transmitted in the system in the time period T will be R=Np.

Analysis of pure Aloha Danger period for a user s transmission starts T seconds before it initiates its transmission and ends T seconds after it completes its packet During this time period of 2T, the average number of packets transmitted will be E=2Np=2R A Poisson probability distribution indicates the probability of k events occurring in a unit time. p( k) = k E e k! E

Analysis of pure Aloha For transmission to be successful, no other user should transmit during the unit time of interest (2T). Thus the probability of a successful transmission will be p(k=0)=e -E =e -2R Therefore, the system throughput for the time period T will be S=# transmission attempts in time period T x probability of successful transmission, or S=Re -2R

Analysis of pure Aloha Optimum Throughput occurs at R=0.5 or when N = 1 2 p Average number of attempts to ensure successful transmission is N = n( 1 e 2G ) n 1 e G = e av N Optimum av i= 1 = 2. 72 attempts 2 2G

Pure Aloha 0.54 Throughput (Pure ALOHA) 0.36 0.18 Ideal (no collisions):r Pure ALOHA: Re -2R 0 0 0.5 1 1.5 2 2.5 R

Slotted Aloha Enhancement of pure ALOHA in that users can only start to transmit so that it arrives at the beginning of defined time slots of duration T Danger period for this system is only the T seconds prior to the start of the user s frame and thus E=Np and S=Re -R For this system, optimum throughput occurs if R=1.

Aloha, slotted aloha Throughput (ALOHA) 0.5 0.4 0.3 0.2 0.1 Ideal (no collisions): R Slotted ALOHA: Re -R Pure ALOHA: Re -2R 0 0 0.5 1 1.5 2 2.5 3 R

Efficiency of slotted Aloha Successful throughput S read from graph (e.g. S optimum =0.368 or 36.8% of timeslot contain successful transmissions) Number of frames with no transmissions can be found from Poisson distribution p(k=0)=0.368 or 36.8% slots Remaining time slots must contain collisions

Summary Cellular systems Medium Access Control SDMA FDMA CDMA Random Access, Aloha, Slotted Aloha Analysis of throughput of Aloha, slotted Aloha