1 k2k2 k3k3 k4k4 k5k5 k6k6 k1k1 f c t time frequency code users 1) Frequency Division Multiple Access (FDMA) Total frequency band is divided into sub-frequency.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Multiple Access Techniques for wireless communication
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Multiple Access Techniques for Wireless Communications
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Supplementary Material for Lecture 2, ComNet II Zhibin Wu
Which telecommunication service is better for you?
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
TD-SCDMA.
Teknik Akses Jaringan - Non Carrier Sense Pertemuan 11 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Medium Access Control Sublayer
Wireless Communication Arjav A. Bavarva Dept. of Electronics and Communication.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Wireless Application Protocol
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Medium Access Control NWEN302 Computer Network Design.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Medium Access Control in Wireless networks
Multiple Access Techniques for Wireless Communication
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Multiple Access Techniques PROF. MICHAEL TSAI 2016/5/6.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Chapter 13 Multiple Access.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Multiple Access Methods
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Advanced Wireless Communication Systems
Multiple Access Techniques for Wireless Communication
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
Data link layer divided into two functionality-oriented sublayers
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Multiple Access Methods
Channel Allocation Problem/Multiple Access Protocols Group 3
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

1 k2k2 k3k3 k4k4 k5k5 k6k6 k1k1 f c t time frequency code users 1) Frequency Division Multiple Access (FDMA) Total frequency band is divided into sub-frequency bands, each user uses the frequency band allocated for it If the allocated frequency band is not used, bandwidth is wasted and throughput decreases Not appropriate for bursty trafffics that have varying bandwidth requirements The FDMA is usually implemented in narrowband systems. The FDMA is a continuous (analog) transmission scheme The FDMA mobile unit uses duplexers The FDMA requries tight RF filtering to minimize adjacent channel inteference The number of channels that can be simultenously supported is Example: Example: AMPS B t : uplink : MHz, downlink: MHz. B c : each duplex channel BW:60KHz. total 666 duplex channels.

2 f t c k2k2 k3k3 k4k4 k5k5 k6k6 k1k1 Each user is assigned same frequency but different time slots either for transmit or receive Different number of time slots can be assigned to each user Due to multipath time delay, guard time is added to the transmission of each user TDMA systems transmit data in buffer-and-burst method. TDMA systems use digital modulation techiniques. N time slots comprise a frame time frequency code kullanıcılar 2) Time Division Multiple Access (TDMA) m: maximum number of TDMA users supported on each radio channel

3 One TDMA Frame Preamble Information Message Trail Slot 1 Slot 2 … … Slot N-1 Slot N Trail bitsSynch. bitsInformation bitsGuard bits efficiency of TDMA: b OH is number of overhead bits per frame b T is total number of bits per frame TDMA frame structure

4 # of reference bursts perframe # of overhead bits per burst # of traffic bursts perframe # of overhead bits per presample in each slot # of equivalent bits in each guard time inteval Bit rateFrame duration Example: Example: GSM system uses a frame structure, 8 time slots, each time slot contains bits R= kbps. a)Time duration of a bit b)Time duration of a slot c)Time duration of a frame d)A user has to wait ms the arrival time of a new frame for its next transmission

5 k2k2 k3k3 k4k4 k5k5 k6k6 k1k1 f t c time frequency code kullanıcılar Mobile users share the same frequency and time Each mobile user’s signal is spread over a large spectrum by multiplication with pseduo-noise (PN) signal No bandwidth limitation. But, CDMA has a soft capacity limit,i.e., capacity is limited by interference level(SINR). There is no absolute limit on the number of users CDMA user complex receiver compared to FDMA and TDMA. RAKE receiver can be used to improve reception by combining multipath signals coherently Self-jamming due non-orthogonality (due to multipath) of PN spreading codes may occur Near-far problem: wrong reception of high power unwanted user’s signal instead of desired user’s signal. So, power control is crucial in CDMA systems Direct sequence spreading or frequency hopped spreading techniques may be used 3) Code Division Multiple Access (CDMA)

6 4) Space Division Multiple Access (SDMA) Mobile users can transmit / receive in the same time, frequency, and code Distinct spatial locations of users are utilized by multiple antennas at the base station Implementation of fully adaptive smart antennas Capacity is larger compared to CDMA,TDMA, and FDMA Frequency Code Time

7 Pure ALOHA Originally developed for ground-based packet radio communications in 1970 Goal: let users transmit whenever they have something to send 1. Transmit whenever you have data to send 2. Listen to the broadcast Because broadcast is fed back, the sending host can always find out if its packet was destroyed just by listening to the downward broadcast one round-trip time after sending the packet 3. If the packet was destroyed, wait a random amount of time and send it again The waiting time must be random to prevent the same packets from colliding over and over again The Pure ALOHA Algorithm Random Access Methods for Mobile Data Networks

8 Note that if the first bit of a new packet overlaps with the last bit of a packet almost finished, both packets are totally destroyed. t : one packet transmission time Vulnerable period: 2t t0t0 t 0 +tt 0 +2tt 0 +3t t Vulnerable Due to collisions and idle periods, pure ALOHA is limited to approximately 18% throughput in the best case Throughput: Pure ALOHA Where G is total offered traffic

9 Slotted ALOHA Slotted ALOHA cuts the vulnerable period for packets from 2t to t. This doubles the best possible throughput from 18.4% to 36.8% Throughput: How? Time is slotted. Packets must be transmitted within a slot The base station transmits a beacon signal for timing, and all MSs synchronize their time slots to this beacon signal The Slotted ALOHA Algorithm 1. If a host has a packet to transmit, it waits until the beginning of the next slot before sending 2. Listen to the broadcast and check if the packet was destroyed 3. If there was a collision, wait a random number of slots and try to send again Example: In GSM system the initial contact between the MS and BS to establish a traffic channel for TDMA voice communication is performed through a random access channel using slotted ALOHA protocol. Other voice oriented systems adopy a similar approach as first step in the registration process of an MS

10 In ALOHA, users do not take into account what other users are doing when they attempt to transmit data packets and there are no mechanisms to avoid collisions A simple method to avoid collisions is to sense the channel before transmission of a packet If there is another user transmitting on the channel, it is obvious that a terminal should delay the transmission of the packet Protocols employing this concept are referred to as CSMA or listen- before-talk (LBT) protocols Using back-off algorithm, a mobile terminal delays its transmission for a later time, therefore reducing packet collision probability significantly compared with ALOHA protocol. However, collision can not be eliminated entirely When two terminals sense the channel busy, they reschedule their packets for a later time Large propagation time between the terminals reduces the effectiveness of carrier sensing in preventing collisions As a result, CSMA is applied in local area applications while ALOHA is preferred for wide area applications Carrier Sense Multiple Access (CSMA) Wireless Random Access Protocols

11 CSMA/CA (Carrier Sense Multiple Access with Collision Avoidence) CSMA/CA (Carrier Sense Multiple Access with Collision Avoidence ) Derived from CSMA/CD (Collision Detection), which is the base of Ethernet. Collision detection is easily performed on a wired network, simply by sensing voltage levels against threshold (with a wire all transmissions have approximately the same strength). Such a simple scheme is not readily applicable to wireless channels because of fading and other propagation channel chracteristics. On a wireless channel the transmitting terminal’s own signal dominates all other signals received in its vicinity, and thus the receiver may fail to recognize the collision and simply retrieve its own signal. So, the protocol can't directly detect collisions like with Ethernet and only tries to avoid them.

12 The protocol starts by listening on the channel (this is called carrier sense), and if it is found to be idle, it sends the first packet in the transmit queue. If it is busy (either another node transmission or interference), the node waits the end of the current transmission and then starts the contention (wait a random amount of time). When its contention timer expires, if the channel is still idle, the node sends the packet. The node having chosen the shortest contention delay wins and transmits its packet. The other nodes just wait for the next contention (at the end of this packet). Because the contention is a random number and done for every packets, each node is given an equal chance to access the channel (on average - it is statistic). RTS: Request To SendCTS: Clear To Send ack: Acknowledgement CSMA/CA (Carrier Sense Multiple Access with Collision Avoidence) CSMA/CA (Carrier Sense Multiple Access with Collision Avoidence )

13 RTS/CTS and hidden nodes in CSMA/CA The hidden node problem comes from the fact that all nodes may not hear each other because the attenuation is too strong between them. Because transmissions are based on the carrier sense mechanism, those nodes ignore each other and may transmit at the same time. before sending a packet, the transmitter sends a RTS and wait for a CTS from the receiver (see figure below). The reception of a CTS indicates that the receiver is able to receive the RTS, so the packet (the channel is clear in its area).