7C29822.038-Cimini-9/97 ALOHA Carrier-Sense Techniques Reservation Protocols Voice and Data Techniques - PRMA - Adaptive CDMA Power Control “Channel access.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Multiple Access Techniques for wireless communication
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Fundamentals of Computer Networks ECE 478/578
Multiple Access Techniques for Wireless Communications
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Efficiency Reservation Protocols Voice and Data Techniques - PRMA - Variable rate CDMA.
EE360: Lecture 7 Outline Adaptive CDMA Techniques Introduction CDMA with power control Adaptive techniques for interference reduction Rate and power adaptation.
Two Media Access Control Protocols (MAC) for Wireless Networks.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Carrier-Sense Techniques Reservation Protocols PRMA.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
EE360: Lecture 15 Outline Cellular System Capacity
Cellular System Capacity Maximum number of users a cellular system can support in any cell. Can be defined for any system. Typically assumes symmetric.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Medium Access Control Sublayer
Chap 4 Multiaccess Communication (Part 1)
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Random Access to Wireless Networks Jean-Paul M.G. Linnartz Nat.Lab., Philips Research.
Wireless Application Protocol
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Autumn2004 © University of Surrey SatComms A - part 4 - B G Evans 4.1 Satellite Communications A Part 4 Access Schemes in Satellite Networks -Professor.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
1 k2k2 k3k3 k4k4 k5k5 k6k6 k1k1 f c t time frequency code users 1) Frequency Division Multiple Access (FDMA) Total frequency band is divided into sub-frequency.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Wireless Application Protocol Multiple Access Protocols.
Chapter 13 Multiple Access.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
2. Data Link Layer: Medium Access Control. Scheduling.
Lecture Multiple Access Techniques Dr. Ghalib A. Shah
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
MEDIUM ACCESS CONTROL PROTOCOL
Channel Allocation (MAC)
Services of DLL Framing Link access Reliable delivery
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 6 Multiple Radio Access.
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

7C Cimini-9/97 ALOHA Carrier-Sense Techniques Reservation Protocols Voice and Data Techniques - PRMA - Adaptive CDMA Power Control “Channel access algorithms with active link protection for wireless communication networks with power control”: Dan O’neill Random Access

ALOHA Data is packetized. Pure ALOHA – send packet whenever data is available – a collision occurs for any partial overlap of Slotted ALOHA – packets sent during predefined timeslots – A collision occurs when packets overlap, but there is no partial overlap of packets – Packets received in error are retransmitted after random delay interval. packets (nonorthogonal slots) – Packets received in error are retransmitted after random delay interval (avoids subsequent collisions). Packets occupy a given time interval (TD technique) – same as ALOHA but with packet slotting

Throughput* Throughput – Measures fracture of time channel is used – No power limitations – Doesn’t measure true rate Assumptions Slotted ALOHA – Retransmission required for any packet overlap – Normalize slot time to 1 *Data Networks, 2 nd Ed. Bertsekas and Gallager – Infinite number of nodes – Poisson packet arrivals at rate. – For randomized retransmissions, the sum of new and backlogged packet arrivals is Poisson with rate G> : Pure ALOHA

Throughput Plot Slotted Aloha Pure Aloha Note that there are two equilibrium points for both slotted and unslotted ALOHA Comments – inefficient for heavily loaded systems – capture effect improves efficiency – combining SS with ALOHA reduces collisions S (Throughput per Packet Time) G( ) (Attempts per Packet TIme)

Throughput with Link Rates Aloha Throughput (Abramson’94) - Assumes power duty cycle is 1/G. - High efficiency for low traffic and P/N - Combines info. and queueing theory. P/N=-20 dB -10 dB 0 dB 20 dB.4.8 G Efficiency

Spread Aloha One CDMA code assigned to all users Users separated by time of arrival Collisions occur when two or more signals arrive simultaneously Advantages Simplicity of transmitter/receiver No code assignment No limit on number of users for sufficiently wideband signals (UWB) Disadvantages Multipath can significantly increase prob. of collisions RAKE harder to implement. t

Carrier-Sense Techniques Channel is sensed before transmission to determine if it is occupied. More efficient than ALOHA  fewer retransmissions Carrier sensing is often combined with collision detection in wired networks (e.g., Ethernet).  not possible in a radio environment Collision avoidance is used in current wireless LANs. (WaveLAN, IEEE802.11, Spectral Etiquette) 8C Cimini-7/98 Wired Network Busy Tone Wireless Network

Examples ARDIS – slotted CSMA RAM Mobile Data – slotted CSMA CDPD – DSMA/CD - Digital Sense Multiple Access – collisions detected at receiver and transmitted back WaveLAN – CSMA/CA 8C Cimini-7/98

– A common reservation channel is used to assign bandwidth on demand – Reservation channel requires extra BW – Offloads the access mechanism from the data channel to the control channel. - Control channel typically uses ALOHA – Very efficient if overhead traffic is a small percentage of the message traffic, and active number of users small – Very inefficient for short messaging - For CDMA, reservation process must assign unique spreading code to transmitter and receiver. Reservation Protocols 7C Cimini-9/97

Demand–Based Assignment – a common reservation channel is used to assign bandwidth on demand – reservation channel requires extra bandwidth – very efficient if overhead traffic is a small percentage of the message traffic Packet Reservation Multiple Access (PRMA) – similar to reservation ALOHA – uses a slotted channel structure – all unreserved slots are open for contention – a successful transmission in an unreserved slot effectively reserves that slot for future transmissions 7C Cimini-9/97 Common Reservation Protocols

Packet Reservation Multiple Access Time axis organized into slots and frames All unreserved slots open for contention Transmit in unreserved slots with prob. p Data users contend in every slot (Aloha). For voice users, successful transmission in an unreserved slot reserves slot for future transmissions. Delayed packets dropped. Takes advantage of voice activity (reservation lost at end of talk spurt) ,4 Frame 1 Frame 2

PRMA Analysis System states modeled as a Markov chain. Steady state probabilities used to determine blocking probability. Analysis complexity very high Equilibrium point analysis (EPA) is alternate technique Equalizes arrival and departure rate for any state Used to obtain closed form solutions to dropping probability. Results match simulations well.

Performance Reduces voice dropping probability by 1-2 orders of magnitude over Aloha User mobility When a mobile changes cells, his reservation is lost. Delay constraint of voice may be exceeded during recontention Performance loss negligible Bit errors Voice bits received in error discarded. Header bits received in error cause loss of reservation Nonnegligible performance impact

Dynamic TDMA Frames divided into request, voice, and data slots. Voice slots reserved by voice users using separate control channel. Data slots dynamically assigned based on pure ALOHA contention in request slots. Outperforms PRMA under medium to high voice traffic.

Adaptive CDMA CDMA uplink with synchronized users Fixed chip rate R c : spread signals occupy bandwidth W Voice and data users request service from base station Users admitted based on current traffic, noise, interference, and type of service request

Adaptive CDMA SIR Requirements per user Capacity constraint W: total spread bandwidth R v,R d : symbol rate for voice,data g v, g d : SIR requirement for voice,data M v,M d : number of users for voice,data P 0 : Noise and out-of-cell interference power. P t =M v P v +M d P d : total power received at base, where P v is voice user power and Pd is data user power.

Reservation Strategy Voice nonadaptive: P v, R v, and  v all fixed. Reserve some fixed number K v voice channels: maximum number is dictated by capacity equation Adapt M d, R d, and  d to maximize data throughput subject to capacity constraint under active voice users.

Rate Control: Data All data users admitted to the system Variable rate transmission used to maximize throughput given interference from voice users Variable rate transmission strategies: Variable Bit Rate: users vary bit time T d =1/R d. Multicode: users assigned multiple spreading codes, each modulated at fixed bit rate R d. Variable Constellation Size: users assigned one spreading code that is modulated with variable-size constellations

Voice Call Blocking Probability Voice blocking probability derived  from voice statistics and K v – Standard Markov analysis

Average Throughput Comparison VBR/MC VCS/MC R 0 =50 Kbps, R 0 =100 Kbps R 0 =100 Kbps R 0 =500 Kbps R 0 =50 Kbps v /  v =1 Voice call blocking probability

Analysis Multicode has the worst throughput Codes interfere with each other Variable bit rate outperforms variable constellation size In VBR the bit rate increases linearly with power In variable-rate MQAM the bit rate increases logarithmicly with power More efficient to vary the bit rate than to vary the constellation size Variable bit rate may not be practical

Throughput Gain with Voice Activity Detection v /  v =10 v /  v =3 v /  v = Voice call blocking probability P on =3/8

Power Control Improves ALOHA efficiency User with high power can capture a packet even if there is a collision Used in CDMA to maintain target SIR of voice and data users Can be used to maintain target SIR for different user classes Target SIRs must be feasible Can combine with admission control to maintain SIRs of active users

7C Cimini-9/97 Main Themes Retransmissions are power and spectrally inefficient. ALOHA has poor efficiency and does not work well for data streaming Reservation protocols are effective for long data spurts but ineffective for short messaging. Voice and data supported by reserving some channels for voice and using remaining channels for (variable-rate) data Power control can be used to maintain QOS for all users in system – new users blocked if degrade QOS for existing users