EEC173B/ECS152C, Spring 2010  Wireless Channel Access - Challenges: Hidden/Exposed Terminals - Access Methods: SDMA, FDMA, TDMA, CDMA  Multimedia compression.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Mobile Communications Chapter 3 : Media Access
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Spread Spectrum Chapter 7.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
April 25, 2005ECE 457 Cellular Communication ECE 457 Spring 2005.
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany 3.1 Motivation SDMA, FDMA, TDMA, CDMA Aloha, reservation schemes.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Mobile Communications Chapter 3 : Media Access  Motivation  SDMA, FDMA, TDMA  Aloha  Reservation schemes  Collision avoidance, MACA  Polling  CDMA.
William Stallings Data and Computer Communications 7th Edition
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Medium Access Control Sublayer
1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement:
Mobile Communications Chapter 3 : Media Access Motivation SDMA, FDMA, TDMA Aloha, reservation schemes Collision avoidance, MACA Polling CDMA, SAMA Comparison.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Ch. 3: Media Access SDMA, FDMA, TDMA Aloha, reservation schemes
Wireless Communications
Mobile Communications
Lecture 10: Low Power MAC ECE 591. Deadline April 16—Oral Presentation of Interim Report (Progress) April 23 --Draft of Final Report May 5 – Final Report.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Orthogonal Frequency Division Multiple Access (OFDMA)
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Mobile Communications Chapter 3 : Media Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Universität Karlsruhe Institut für Telematik ECE 591
COMMUNICATION SYSTEM EECB353 Chapter 7 Part III MULTIPLE ACCESS Intan Shafinaz Mustafa Dept of Electrical Engineering Universiti Tenaga Nasional
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Multiple Access Techniques.
Data and Computer Communications Ninth Edition by William Stallings Chapter 9 – Spread Spectrum Data and Computer Communications, Ninth Edition by William.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Medium access control By Saumya Chaturvedi. PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency.
Part III. Data Link Layer
Wireless Sensor Networks 4. Medium Access
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
CT301 lecture7 10/29/2015 Lect 7 NET301.
IT351: Mobile & Wireless Computing
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
IT351: Mobile & Wireless Computing
CSE 4215/5431: Mobile Communications Winter 2011
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access
Mobile Communications Media Access Chapter 3
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3 : Media Access
CT301 lecture7 10/29/2015 Lect 7 NET301.
Mobile Communications Chapter 3: Media Access
Unit 2 Medium Access control
Mobile Communications Chapter 3 : Media Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
UNIT II Wireless Medium Access Control
Multiplexing & Multiple Access
Mobile Communications Chapter 3 : Media Access
Dr. John P. Abraham Professor UTPA
Chapter 12 Media Access Control (MAC)
Presentation transcript:

EEC173B/ECS152C, Spring 2010  Wireless Channel Access - Challenges: Hidden/Exposed Terminals - Access Methods: SDMA, FDMA, TDMA, CDMA  Multimedia compression and communication basics Amit Pande, Computer Science, UC Davis comments/ feedback:

2 Medium Access Sublayer Medium Access Control (MAC) Protocols --- distributed algorithm that arbitrate access to a common shared channel among a population of users, i.e., determine when a node can transmit PhysicalNetwork Medium Access Sublayer Data Link

3 Remarks on MAC Sublayer  MAC is not important on point-to-point links  MAC is only used in broadcast or shared channel networks -Only one can send successfully at a time -Two or more simultaneous transmissions => interference -How to share a broadcast channel? -Communication about “sharing” must use the channel itself!  Examples: -Packet-switched Radio Network (Aloha) -Ethernet IEEE (CSMA/CD) -Token Ring IEEE 802.5, FDDI (Token Passing) -Cellular, Satellite, Wireless LAN (MACAW)

4 Motivation  Can we apply media access methods from fixed networks?  Example CSMA/CD -Carrier Sense Multiple Access with Collision Detection -Send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3)

5 Problems in wireless networks  Signal strength decreases proportional to the square of the distance  The sender would apply CS and CD, but the collisions happen at the receiver  It might be the case that a sender cannot “hear” the collision, i.e., CD does not work  Furthermore, CS might not work if, e.g., a terminal is “hidden”

6  Hidden terminals -A sends to B, C cannot receive A -C wants to send to B, C senses a “free” medium (CS fails) -Collision at B, A cannot receive the collision (CD fails) -A is “hidden” for C Hidden Terminals BAC

7  Exposed terminals -B sends to A, C wants to send to another terminal (not A or B) -C has to wait, CS signals a medium in use -But A is outside the radio range of C, waiting is not necessary! -C is “exposed” to B Exposed Terminals BAC D

8  Terminals A and B send, C receives -Signal strength decreases proportional to the square of the distance -The signal of terminal B therefore drowns out A’s signal -C cannot receive A  If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer  Also severe problem for CDMA-networks -Precise power control needed! Near and Far Terminals ABC

9 Taxonomy of MAC Protocols

10 Controlled Access methods  SDMA (Space Division Multiple Access) -Segment space into sectors, use directed antennas -Cell structure  FDMA (Frequency Division Multiple Access) -Assign a certain frequency to a transmission channel between a sender and a receiver -Permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum)  TDMA (Time Division Multiple Access) -Assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time => The multiplexing schemes presented before are now used to control medium access!

11 FDD/FDMA – e.g., GSM f t MHz 200 kHz MHz MHz 915 MHz 960 MHz

12 TDD/TDMA, e.g., DECT t downlinkuplink 417 µs

13 CDMA (Code Division Multiple Access)  All terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel -Each sender has a unique random number, the sender XORs the signal with this random number -The receiver can “tune” into this signal if it knows the pseudo random number, tuning is done via a correlation function

14 CDMA – Cont’d  Disadvantages: -Higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal) -All signals should have the same strength at a receiver  Advantages: -All terminals can use the same frequency, no planning needed -Huge code space (e.g ) compared to frequency space -Interferences (e.g. white noise) is not coded -Forward error correction and encryption can be easily integrated

15 CDMA: An Example  Sender A -Sends A d = 1, key A k = (assign: “0“= -1, „1“= +1) -Sending signal A s = A d * A k = (-1, +1, -1, -1, +1, +1)  Sender B -Sends B d = 0, key B k = (assign: “0“= -1, „1“= +1) -Sending signal B s = B d * B k = (-1, -1, +1, -1, +1, -1)  Both signals superimpose in space -Interference neglected (noise etc.) -A s + B s = (-2, 0, 0, -2, +2, 0)  Receiver wants to receive signal from sender A -Apply key A k bitwise (inner product) A e = (-2, 0, 0, -2, +2, 0)  A k = = 6 Result greater than 0, therefore, original bit was “1“ -Receiving B B e = (-2, 0, 0, -2, +2, 0)  B k = = -6, i.e. “0“

16 Another Example: CDMA on signal level (1) data A key A signal A data  key key sequence A Real systems use much longer keys resulting in a larger distance between single code words in code space. For this example, ‘0’ is high, ‘1’ is low AdAd AkAk AsAs

17 CDMA on signal level (2) signal A data B key B key sequence B signal B A s + B s data  key BdBd BkBk BsBs AsAs

18 CDMA on signal level (3) AkAk (A s + B s ) * A k integrator output comparator output A s + B s data A AdAd

19 CDMA on signal level (4) integrator output comparator output BkBk (A s + B s ) * B k A s + B s data B BdBd

20 comparator output CDMA on signal level (5) wrong key K integrator output (A s + B s ) * K A s + B s (0) ?

21 Implications for High-Speed Wireless Data  Controlled multiple access performs well with continuous stream traffic but inefficient for bursty traffic  Complexity: frequency division < time division < code division  Multiple data rates -Multiple frequency bands -Multiple time slots -Multiple codes

22 Comparison SDMA/TDMA/FDMA/CDMA

23 Video coding & communications state-of-the-art

24 Application Scenario

25 Terms  Sampling  RGB – YUV -Sampling -4:4:4 -4:2:2 -4:2:0

26 Steps  Prediction Model  Spatial Model  Entropy Coding -Huffman coder -Arithmetic Coder

27

28 Overview of H.264 / AVC  Latest Video coding standard  Basic design architecture similar to MPEG-x or H.26x  Better compression efficiency -Upto 50% bitrate reduction from the preceding video codec standard  Subjective quality is better  Advanced functional element  Wide variety of applications such as video broadcasting, video streaming, video conferencing, D-Cinema, HDTV.  Layered structure - consists of two layers: Network Abstraction Layer (NAL) and Video Coding Layer (VCL); supports 4:2:0 chroma sampling picture format including QCIF and CIF formats

29 H.264/AVC Profiles  Profiles and Levels for particular applications -Profile : a subset of entire bit stream of syntax, different decoder design based on the Profile Four profiles : Baseline, Main, Extended and High Streaming Video Extended Digital Storage Media Television Broadcasting Main Video Conferencing Videophone Baseline Applications Profile Studio editing High

30 Specific coding parts for the Profiles

31 H.264 Encoder (contd.)

32

33

34

35 4G Mobile BWA networks  Design QoS oriented  New techniques aimed to improve the reliability and the efficiency Enable the delivery of mobile video- on-demand services to mobile users

36 New techniques  Explicit QoS support  Frequency selective scheduling with OFDMA  Adaptive Modulation and Coding with new modulations available  Enhanced data protection mechanisms (H-ARQ)  Multiple Input Multiple Output  Relay nodes

37 Open issues  Channel variability  Bandwidth and resource management: -Call admission control -Scheduling algorithms (QoE oriented)  eMBMS (Multimedia Broadcast Multicast Service) vs unicast  Multi-layer approach

38 Scalable video coding and wireless  Scalable video coding can deal with some of the issue: -Dynamic channel condition -High error channels  Others issues: -Heterogeneous clients

39 Thanks Amit Pande Got questions?