Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Mobile Communications Chapter 3 : Media Access
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
CELLULAR COMMUNICATIONS 7. Multiple Access. Multiple Access  Radio spectrum is shared among number of transmissions  Uplink and downlink voice and data.
Wireless Environment.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany 3.1 Motivation SDMA, FDMA, TDMA, CDMA Aloha, reservation schemes.
Mobile Communications Chapter 3 : Media Access  Motivation  SDMA, FDMA, TDMA  Aloha  Reservation schemes  Collision avoidance, MACA  Polling  CDMA.
Link Layer; Media Access Control Lec 03 07/03/2010 ECOM 6320.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
EEC173B/ECS152C, Spring 2010  Wireless Channel Access - Challenges: Hidden/Exposed Terminals - Access Methods: SDMA, FDMA, TDMA, CDMA  Multimedia compression.
Mobile Communications Chapter 3 : Media Access Motivation SDMA, FDMA, TDMA Aloha, reservation schemes Collision avoidance, MACA Polling CDMA, SAMA Comparison.
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Ch. 3: Media Access SDMA, FDMA, TDMA Aloha, reservation schemes
Wireless Communications
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Mobile Communications
Lecture 10: Low Power MAC ECE 591. Deadline April 16—Oral Presentation of Interim Report (Progress) April 23 --Draft of Final Report May 5 – Final Report.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
Chapter 3: Medium Access Control
1 Mobile Networks Module A (Part A2) Introduction Prof. JP Hubaux
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Mobile Communications Chapter 3 : Media Access
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
2. Data Link Layer: Medium Access Control. Scheduling.
Medium access control By Saumya Chaturvedi. PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency.
Multiple Access Methods
Wireless Sensor Networks 4. Medium Access
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Outline What is Wireless LAN Wireless Transmission Types
IT351: Mobile & Wireless Computing
Communication Networks: Technology & Protocols
Wireless LANs Wireless proliferating rapidly.
IT351: Mobile & Wireless Computing
CSE 4215/5431: Mobile Communications Winter 2011
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access
Mobile Communications Media Access Chapter 3
Multiple Access Methods
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3: Media Access
Unit 2 Medium Access control
Mobile Communications Chapter 3 : Media Access
UNIT II Wireless Medium Access Control
Mobile Computing Chapter 2 : Media Access Control.
Multiplexing & Multiple Access
Mobile Computing Chapter 2 : Media Access Control.
Multiple Access Methods
Mobile Communications Chapter 3 : Media Access
Dr. John P. Abraham Professor UTPA
UNIT – I MEDIUM ACCESS CONTROL
Presentation transcript:

Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida

Motivation for Specialized MAC Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection Send when medium is free, listen to medium if collision occurs (IEEE 802.3)

Problems in wireless networks Signal strength decreases with distance Sender applies CS and CD, but collisions happen at receiver Sender may not “hear” collision, i.e., CD does not work Hidden terminal: CS might not work

Hidden & Exposed Terminals Hidden Terminals: A sends to B, C cannot hear A C wants to send to B, C senses a “free” medium (CS fails) Collision at B, A cannot receive the collision (CD fails) C is “hidden” from A BA C

Hidden & Exposed Terminals Exposed Terminals: B sends to A, C wants to send to another terminal (not A or B) C has to wait, CS signals a medium in use but A is outside radio range of C, waiting is not necessary C is “exposed” to B BAC D

Near & Far Terminals Terminals A and B send, C receives Signal strength decreases proportional to the square of the distance B’s signal drowns out A’s signal C cannot receive A

Near & Far Terminals If C was an arbiter, B would drown out A Also severe problem for CDMA-networks-precise power control needed!

MACA - collision avoidance MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance RTS (request to send): a sender uses RTS packet to request right to send before it sends a data packet CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain Sender address Receiver address Packet size

MACA - collision avoidance MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B

MACA - collision avoidance MACA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A

Access Methods 1. SDMA (Space Division Multiple Access) segment space into sectors, use directed antennas Use cells to reuse frequencies 2. FDMA (Frequency Division Multiple Access) Assign a certain frequency to a transmission channel Permanent (radio broadcast), slow hopping (GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum)

Access Methods 2. FDMA (Frequency Division Multiple Access): FDD/FDMA - general scheme, example GSM

Access Methods 3. TDMA (Time Division Multiple Access): Assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time Various TDM techniques are- Fixed TDM ALOHA (Classical & Slotted) CSMA Demand Assigned Multiple Access (DAMA) or Reservation ALOHA MACA POLLING

Access Methods 3. TDMA (Time Division Multiple Access): TDD/TDMA - general scheme, example DECT

Access Methods 4. CDMA (Code Division Multiple Access): All terminals send on same frequency at the same time using ALL the bandwidth of transmission channel Each sender has a unique random number, sender XORs the signal with this random number The receiver can “tune” into this signal if it knows the pseudo random number

Access Methods 4. CDMA (Code Division Multiple Access): Disadvantages Higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal) All signals should have the same strength at a receiver

Access Methods 4. CDMA (Code Division Multiple Access): Advantages All terminals can use the same frequency, no planning needed Huge code space (e.g. 232) compared to frequency space Interference (e.g. white noise) is not coded Forward error correction and encryption can be easily integrated

Access Methods 4. CDMA (Code Division Multiple Access): Theory Sender A sends A d = 1, key A k = (assign: „0“= -1, „1“= +1) sending signal A s = A d * A k = (-1, +1, -1, -1, +1, +1) Sender B sends B d = 0, key B k = (assign: „0“= -1, „1“= +1) sending signal B s = B d * B k = (-1, -1, +1, -1, +1, -1) Both signals superimpose in space interférence neglected(noise etc.) A s + B s = (-2, 0, 0, -2, +2, 0)

Access Methods 4. CDMA (Code Division Multiple Access): Theory Receiver wants to receive signal from sender A Apply key A k bitwise (inner product) A e = (-2, 0, 0, -2, +2, 0) · A k = = 6 Result greater than 0, therefore, original bit was „1“ Receiving B B e = (-2, 0, 0, -2, +2, 0) · B k = = -6, i.e. „0“

Access Methods 4. CDMA (Code Division Multiple Access): Signal Level

Access Methods 4. CDMA (Code Division Multiple Access): Signal Level Real systems use much longer keys resulting in a larger distance between single code words in code space.

Comparison of S/T/F/CDMA