7C29822.038-Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Efficiency Reservation Protocols Voice and Data Techniques - PRMA - Variable rate CDMA.

Slides:



Advertisements
Similar presentations
Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Advertisements

Quiz Determine the minimum number of shift register stages required to create a maximal length PN sequence which has a repetition time greater than 10.
Multiple Access Techniques for wireless communication
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Multiple Access Techniques for Wireless Communications
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Three Lessons Learned Never discard information prematurely Compression can be separated from channel transmission with no loss of optimality Gaussian.
Wireless Multiaccess Using CDMA1 Wireless Multiaccess Using Code Division Multiple Access Zartash Afzal Uzmi LUMS, Lahore. Pakistan April 18, 2003.
4. Cellular Systems: Multiple Access and Interference Management Fundamentals of Wireless Communication, Tse&Viswanath 1 4. Cellular Systems: Multiple.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
7C Cimini-9/97 ALOHA Carrier-Sense Techniques Reservation Protocols Voice and Data Techniques - PRMA - Adaptive CDMA Power Control “Channel access.
APPLICATION OF SPACE-TIME CODING TECHNIQUES IN THIRD GENERATION SYSTEMS - A. G. BURR ADAPTIVE SPACE-TIME SIGNAL PROCESSING AND CODING – A. G. BURR.
EE360: Lecture 7 Outline Adaptive CDMA Techniques Introduction CDMA with power control Adaptive techniques for interference reduction Rate and power adaptation.
Two Media Access Control Protocols (MAC) for Wireless Networks.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Carrier-Sense Techniques Reservation Protocols PRMA.
Χήρας Θεόδωρος- Special Topics in Communication Networks 1 Design and performance evaluation of an RRA scheme for voice-data channel access in outdoor.
Bluetooth Radio Basics
EE360: Lecture 15 Outline Cellular System Capacity
Cellular System Capacity Maximum number of users a cellular system can support in any cell. Can be defined for any system. Typically assumes symmetric.
Medium Access Control Sublayer
Chap 4 Multiaccess Communication (Part 1)
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Techniques for Wireless Communication
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Autumn2004 © University of Surrey SatComms A - part 4 - B G Evans 4.1 Satellite Communications A Part 4 Access Schemes in Satellite Networks -Professor.
Adaptation Techniques in Wireless Packet Data Services Speaker: Chih-Wei Wang Advisor: Li-Chun Wang.
Wireless Mobile Communication and Transmission Lab. Chapter 8 Application of Error Control Coding.
Computer Networks with Internet Technology William Stallings
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Voice-Data Channel Access Integration in Third Generation Microcellular Wireless Network : Design and Performance Evaluation Allan C. Cleary Chapter 2.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
A Medium Access Protocol for Interconnecting ATM and Wireless Networks Time division multiple access/frequency division duplex. Voice mobiles require real-time.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
A Simple Transmit Diversity Technique for Wireless Communications -M
CDMA Systems. 2 How does CDMA work? Each bit (zero or one) is spread into N smaller pulses/chips (a series of zeros and ones). The receiver which knows.
1 S Post-graduate course in Radio Communications Analysis Methods for Combined Voice and Data Huibin Lin
Wireless Application Protocol Multiple Access Protocols.
Outline  Introduction (Resource Management and Utilization).  Compression and Multiplexing (Other related definitions).  The Most Important Access Utilization.
Chapter 13 Multiple Access.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Komunikasi Satelit, Sukiswo, ST, MT 1 Multiple Access For Satellite Sukiswo
2. Data Link Layer: Medium Access Control. Scheduling.
Lecture Multiple Access Techniques Dr. Ghalib A. Shah
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
244-6: Higher Generation Wireless Techniques and Networks
MEDIUM ACCESS CONTROL PROTOCOL
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Channel Allocation (MAC)
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
Services of DLL Framing Link access Reliable delivery
Multiple access.
Communication Networks NETW 501
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Subject Name: Adhoc Networks Subject Code: 10CS841
Cellular Telephone Networks
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Efficiency Reservation Protocols Voice and Data Techniques - PRMA - Variable rate CDMA

Throughput Plot G( ) (Attempts per Packet TIme) S (Throughput per Packet Time) Pure Aloha - Throughput: Fraction of time channel is used - No power limitations - Doesn’t measure true rate

Efficiency Plot Aloha Efficiency (Abramson’94) - Assumes power duty cycle is 1/G. - High efficiency for low traffic and P/N - Combines info. and queueing theory. P/N=-20 dB -10 dB 0 dB 20 dB.4.8 G Efficiency

– A common reservation channel is used to assign bandwidth on demand – Reservation channel requires extra bandwidth - Offloads the access mechanism from the data channel to the control channel. - Control channel typically uses ALOHA – Very efficient if overhead traffic is a small percentage of the message traffic, and active number of users small – Very inefficient for short messaging - For CDMA, reservation process must assign unique spreading code to transmitter and receiver. RESERVATION PROTOCOLS 7C Cimini-9/97

Spread Aloha One CDMA code assigned to all users Users separated by time of arrival –Collisions occur when two or more signals arrive simultaneously Advantages –Simplicity of transmitter/receiver –No code assignment –No limit on number of users for sufficiently wideband signals Disadvantages –Multipath can significantly increase prob. of collisions –RAKE harder to implement. t

Packet Reservation Multiple Access Time axis organized into slots and frames All unreserved slots open for contention Transmit in unreserved slots with prob. p Data users contend in every slot (Aloha). For voice users, successful transmission in an unreserved slot reserves slot for future transmissions. Delayed packets dropped. Takes advantage of voice activity (reservation lost at end of talk spurt) ,4

Performance Reduces dropping probability by 1- 2 orders of magnitude over Aloha User mobility –When a mobile changes cells, his reservation is lost. –Delay constraint of voice may be exceeded during recontention –Performance loss negligible Bit errors –Voice bits received in error discarded. –Header bits received in error cause loss of reservation –Nonnegligible performance impact

PRMA Analysis System states modeled as a Markov chain. Steady state probabilities used to determine blocking probability. Analysis complexity very high Equilibrium point analysis (EPA) is alternate technique –Equalizes arrival and departure rate for any state –Used to obtain closed form solutions to dropping probability. –Results match simulations well.

Dynamic TDMA Frames divided into request, voice, and data slots. Voice slots reserved by voice users using separate control channel. Data slots dynamically assigned based on pure ALOHA contention in request slots. Outperforms PRMA under medium to high voice traffic.

Adaptive CDMA SIR Requirements per user Capacity constraint –W: total spread bandwidth –R v,R d : symbol rate for voice,data –  v,  d : SIR requirement for voice,data –M v,M d : number of users for voice,data –P 0 : Noise and out-of-cell interference power. –P t =M v P v +M d P d : total power received at base, where P v is voice user power and Pd is data user power.

Reservation Strategy Voice nonadaptive: P v, R v, and  v all fixed. Reserve some fixed number K v voice channels: maximum number is dictated by capacity equation Adapt M d, R d, and  d to maximize data throughput subject to capacity constraint under active voice users.

Adaptive Strategies Variable bit rate: –fixed number of data users –each assigned unique code –each user transmits at max rate given voice users Multicode: –data users assigned multiple codes –each code sends a fixed rate data stream –data rate dictated by capacity Variable constellation size –each user has one code –constellation size varied

Performance Voice performance based on voice statistics and K v Multicode has the worst performance (self-interference) Variable bit rate has best performance –more power needed when varying constellation size.

7C Cimini-9/97 Main Themes Retransmissions are power and spectrally inefficient. ALOHA has poor efficiency and does not work well for data streaming Reservation protocols are effective for long data spurts but ineffective for short messaging. Voice and data can be effectively combined by reserving some channels for voice and using remaining channels for (variable-rate) data