Mobile Communications Chapter 3 : Media Access  Motivation  SDMA, FDMA, TDMA  Aloha  Reservation schemes  Collision avoidance, MACA  Polling  CDMA.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Mobile Communications Chapter 3 : Media Access
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Ethernet – CSMA/CD Review
Multiple access What if multiple machines are sharing the same link?
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany 3.1 Motivation SDMA, FDMA, TDMA, CDMA Aloha, reservation schemes.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Link Layer; Media Access Control Lec 03 07/03/2010 ECOM 6320.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Medium Access Control Sublayer
EEC173B/ECS152C, Spring 2010  Wireless Channel Access - Challenges: Hidden/Exposed Terminals - Access Methods: SDMA, FDMA, TDMA, CDMA  Multimedia compression.
Mobile Communications Chapter 3 : Media Access Motivation SDMA, FDMA, TDMA Aloha, reservation schemes Collision avoidance, MACA Polling CDMA, SAMA Comparison.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Ch. 3: Media Access SDMA, FDMA, TDMA Aloha, reservation schemes
Wireless Communications
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Mobile Communications
Lecture 10: Low Power MAC ECE 591. Deadline April 16—Oral Presentation of Interim Report (Progress) April 23 --Draft of Final Report May 5 – Final Report.
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 3: Medium Access Control
1 Mobile Networks Module A (Part A2) Introduction Prof. JP Hubaux
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Chapter 6 Multiple Radio Access
Mobile Communications Chapter 3 : Media Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Universität Karlsruhe Institut für Telematik ECE 591
WLAN.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
2. Data Link Layer: Medium Access Control. Scheduling.
Medium access control By Saumya Chaturvedi. PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency.
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
IT351: Mobile & Wireless Computing
IT351: Mobile & Wireless Computing
CSE 4215/5431: Mobile Communications Winter 2011
Mobile Communications Chapter 3 : Media Access
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access
Mobile Communications Media Access Chapter 3
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3: Media Access
Unit 2 Medium Access control
Mobile Communications Chapter 3 : Media Access
UNIT II Wireless Medium Access Control
Mobile Computing Chapter 2 : Media Access Control.
Multiplexing & Multiple Access
Mobile Computing Chapter 2 : Media Access Control.
Mobile Communications Chapter 3 : Media Access
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
UNIT – I MEDIUM ACCESS CONTROL
Presentation transcript:

Mobile Communications Chapter 3 : Media Access  Motivation  SDMA, FDMA, TDMA  Aloha  Reservation schemes  Collision avoidance, MACA  Polling  CDMA  SAMA  Comparison

Motivation Can we apply media access methods from fixed networks? Example CSMA/CD  Carrier Sense Multiple Access with Collision Detection  send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3) Problems in wireless networks  signal strength decreases proportional to the square of the distance  the sender would apply CS and CD, but the collisions happen at the receiver  it might be the case that a sender cannot “hear” the collision, i.e., CD does not work  furthermore, CS might not work if, e.g., a terminal is “hidden”

Hidden terminals  A sends to B, C cannot receive A  C wants to send to B, C senses a “free” medium (CS fails)  collision at B, A cannot receive the collision (CD fails)  A is “hidden” for C Exposed terminals  B sends to A, C wants to send to another terminal (not A or B)  C has to wait, CS signals a medium in use  but A is outside the radio range of C, therefore waiting is not necessary  C is “exposed” to B Motivation - hidden and exposed terminals BAC

Terminals A and B send, C receives  signal strength decreases proportional to the square of the distance  the signal of terminal B therefore drowns out A’s signal  C cannot receive A If C for example was an arbiter (e.g. base station) for sending rights, terminal B would drown out terminal A already on the physical layer Also severe problem for CDMA-networks - precise power control needed! Motivation - near and far terminals ABC

Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access)  segment space into sectors, use directed antennas  cell structure FDMA (Frequency Division Multiple Access)  assign a certain frequency to a transmission channel between a sender and a receiver  permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) TDMA (Time Division Multiple Access)  assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time The multiplexing schemes presented in chapter 2 are now used to control medium access!

FDD/FDMA - general scheme, example GSM 900 MHz f t MHz 200 kHz MHz MHz 915 MHz 960 MHz  Uplinks: ~ 915 MHz, Downlinks: ~ 960 MHz  f u = 890 MHz + n * 0.2 MHz, f d = f u + 45 MHz = 935 MHz + n * 0.2 MHz  124 channels per direction

TDD/TDMA - general scheme, example DECT t downlinkuplink 417 µs  Up to 12 different mobile stations can use the same frequency.  The pattern is repeated every 10 ms, each slot has a duration of 417 µs

Mechanism  Aloha: Each station can access the medium at any time - random, distributed (no central arbiter), time-multiplex  Slotted Aloha additionally uses time-slots, sending must always start at slot boundaries Aloha Slotted Aloha Aloha/slotted aloha sender A sender B sender C collision sender A sender B sender C collision t t

CSMA –Carrier Sense Multiple Access Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length) Protocols in which stations listen for a carrier (i.e. transmission) and act accordingly are called carrier sense protocols. nonpersistent CSMA:  Channel Busy - Wait for a random length of time and sense again.  Channel Idle - Transmit.  Collision - Wait for a random length of time and try again. p-persistent CSMA:  Channel Busy - Continue sensing until free (same as idle).  Channel Idle - Transmit with probability p, and defer transmitting until the next slot with probability q = 1-p.  Collision - Wait for a random length of time and try again. 1-persistent CSMA  Channel Busy - Continue sensing until free and then grab.  Channel Idle - Transmit with probability 1.  Collision - Wait for a random length of time and try again.

Persistent and Nonpersistent CSMA Comparison of the channel utilization versus load for various random access protocols.

DAMA - Demand Assigned Multiple Access Reservation can increase efficiency to 80%  a sender reserves a future time-slot  sending within this reserved time-slot is possible without collision  reservation also causes higher delays under a light load but allow higher throughput  typical scheme for satellite links Examples for reservation algorithms:  Explicit Reservation (Reservation-ALOHA)  Implicit Reservation (PRMA)  Reservation-TDMA

Access method DAMA: Explicit Reservation Explicit Reservation (Reservation Aloha):  two modes: ALOHA mode for reservation: competition for small reservation slots, collisions possible reserved mode for data transmission within successful reserved slots (no collisions possible)  it is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time AlohareservedAlohareservedAlohareservedAloha collision t

Access method DAMA: PRMA Implicit reservation (PRMA - Packet Reservation MA):  a certain number of slots form a frame, frames are repeated  stations compete for empty slots according to the slotted aloha principle  once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send  competition for this slots starts again as soon as the slot was empty in the last frame frame 1 frame 2 frame 3 frame 4 frame time-slot collision at reservation attempts ACDABA F AC ABA A BAF A BAF D ACEEBAFD t ACDABA-F AC-ABAF- A---BAFD ACEEBAFD reservation

Access method DAMA: Reservation-TDMA Reservation Time Division Multiple Access  every frame consists of N mini-slots and x data-slots  every station has its own mini-slot and can reserve up to k data-slots using this mini-slot (i.e. x = N * k).  other stations can send data in unused data-slots according to a round-robin sending scheme (best-effort traffic) N mini-slots N * k data-slots reservations for data-slots other stations can use free data-slots based on a round-robin scheme e.g. N=6, k=2

MACA - collision avoidance MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance  RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet  CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain  sender address  receiver address  packet size Variants of this method can be found in IEEE as DFWMAC (Distributed Foundation Wireless MAC)

MACA avoids the problem of hidden terminals  A and C want to send to B  A sends RTS first  C waits after receiving CTS from B MACA avoids the problem of exposed terminals  B wants to send to A, C to another terminal  now C does not have to wait for it cannot receive CTS from A MACA examples A B C RTS CTS A B C RTS CTS RTS

MACA variant: DFWMAC in IEEE idle wait for the right to send wait for ACK senderreceiver packet ready to send; RTS time-out; RTS CTS; data ACK RxBusy idle wait for data RTS; RxBusy RTS; CTS data; ACK time-out  data; NAK ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy time-out  NAK; RTS

Polling mechanisms If one terminal can be heard by all others, this “central” terminal (a.k.a. base station) can poll all other terminals according to a certain scheme  now all schemes known from fixed networks can be used (typical mainframe - terminal scenario) Example: Randomly Addressed Polling  base station signals readiness to all mobile terminals  terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address)  the base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address)  the base station acknowledges correct packets and continues polling the next terminal  this cycle starts again after polling all terminals of the list

ISMA (Inhibit Sense Multiple Access) Current state of the medium is signaled via a “busy tone”  the base station signals on the downlink (base station to terminals) if the medium is free or not  terminals must not send if the medium is busy  terminals can access the medium as soon as the busy tone stops (busy tone is used to inhibit terminals to access the medium)  the base station signals collisions and successful transmissions via the busy tone and acknowledgements, respectively (media access is not coordinated within this approach)  mechanism used, e.g., for CDPD (Cellular Digital Packet Data) (USA, integrated into AMPS)

Access method CDMA CDMA (Code Division Multiple Access)  all terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel  each sender has a unique random number, the sender XORs the signal with this random number  the receiver can “tune” into this signal if it knows the pseudo random number, tuning is done via a correlation function Disadvantages:  higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal)  all signals should have the same strength at a receiver Advantages:  all terminals can use the same frequency, no planning needed  huge code space (e.g ) compared to frequency space  interferences (e.g. white noise) is not coded  forward error correction and encryption can be easily integrated

Access method CDMA What is a good code for CDMA?  A good autocorrelation (the absolute value of the inner product of a vector multiplied by itself should be large)  Orthogonal to other codes (Two vectors are called orthogonal if their inner product is 0. Examples of a good CDMA code:  The Baker code (+1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1)has a good autocorrelation: the inner product is large, 11, and is used for ISDN and IEEE

CDMA in theory Sender A  sends A d = 1, key A k = (assign: „0“= -1, „1“= +1)  sending signal A s = A d * A k = (-1, +1, -1, -1, +1, +1) Sender B  sends B d = 0, key B k = (assign: „0“= -1, „1“= +1)  sending signal B s = B d * B k = (-1, -1, +1, -1, +1, -1) Both signals superimpose in space  interference neglected (noise etc.)  A s + B s = (-2, 0, 0, -2, +2, 0) Receiver wants to receive signal from sender A  apply key A k bitwise (inner product) A e = (-2, 0, 0, -2, +2, 0)  A k = = 6 result greater than 0, therefore, original bit was „1“  receiving B B e = (-2, 0, 0, -2, +2, 0)  B k = = -6, i.e. „0“

CDMA on signal level I data A key A signal A data  key key sequence A Real systems use much longer keys resulting in a larger distance between single code words in code space AdAd AkAk AsAs

CDMA on signal level II signal A data B key B key sequence B signal B A s + B s data  key BdBd BkBk BsBs AsAs

CDMA on signal level III AkAk (A s + B s ) * A k integrator output comparator output A s + B s data A AdAd

CDMA on signal level IV integrator output comparator output BkBk (A s + B s ) * B k A s + B s data B BdBd

comparator output CDMA on signal level V wrong key K integrator output (A s + B s ) * K A s + B s (0) ?

Aloha has only a very low efficiency, CDMA needs complex receivers to be able to receive different senders with individual codes at the same time Idea: use spread spectrum with only one single code (chipping sequence) for spreading for all senders accessing according to aloha SAMA - Spread Aloha Multiple Access 1 sender A 0 sender B 0 1 t narrow band send for a shorter period with higher power spread the signal e.g. using the chipping sequence („CDMA without CD“) Problem: find a chipping sequence with good characteristics 1 1 collision

Comparison SDMA/TDMA/FDMA/CDMA