Lecture Multiple Access Techniques Dr. Ghalib A. Shah

Slides:



Advertisements
Similar presentations
IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
Advertisements

Spread Spectrum Chapter 7.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Multiple Access Techniques for wireless communication
Multiple Access Techniques for Wireless Communications
April 25, 2005ECE 457 Cellular Communication ECE 457 Spring 2005.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Which telecommunication service is better for you?
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Efficiency Reservation Protocols Voice and Data Techniques - PRMA - Variable rate CDMA.
Teknik Akses Jaringan - Non Carrier Sense Pertemuan 11 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
II. Medium Access & Cellular Standards. TDMA/FDMA/CDMA.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Medium Access Control Sublayer
Florida Institute of technologies ECE 5221 Personal Communication Systems Prepared by: Dr. Ivica Kostanic Lecture 12: Frequency allocation and channelization.
Chapter: 03-Mobile Computing Basics of Wireless Communication By: Mr. Abdul Haseeb Khan.
UNESCO/CISM SECOND ADVANCED SCHOOL OF INFORMATICS UNESCO PROJECT Advanced Course on Networking Introduction to Cellular Wireless Networks.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Orthogonal Frequency Division Multiple Access (OFDMA)
Autumn2004 © University of Surrey SatComms A - part 4 - B G Evans 4.1 Satellite Communications A Part 4 Access Schemes in Satellite Networks -Professor.
Lecture 8: Spread Spectrum
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
COMMUNICATION SYSTEM EECB353 Chapter 7 Part III MULTIPLE ACCESS Intan Shafinaz Mustafa Dept of Electrical Engineering Universiti Tenaga Nasional
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Multiple Access Techniques.
Multiple Access Techniques for Wireless Communication
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Wireless Application Protocol Multiple Access Protocols.
Outline  Introduction (Resource Management and Utilization).  Compression and Multiplexing (Other related definitions).  The Most Important Access Utilization.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
2. Data Link Layer: Medium Access Control. Scheduling.
Wireless Communication
Multiple Access Methods
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
CT301 lecture7 10/29/2015 Lect 7 NET301.
Advanced Wireless Communication Systems
Multiple Access Techniques for Wireless Communication
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
Data link layer divided into two functionality-oriented sublayers
Chapter 12 Multiple Access
Which telecommunication service is better for you?
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Computer Communication Networks
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Spread Spectrum Chapter 7.
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Multiple Access Methods
Overview Jaringan Komputer (3)
CT301 lecture7 10/29/2015 Lect 7 NET301.
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Lecture 5- Data Link Layer
CSE 4215/5431: Mobile Communications Winter 2011
Wireless Networks Fall 2007
Spread Spectrum Chapter 7.
Cellular Telephone Networks
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Lecture Multiple Access Techniques Dr. Ghalib A. Shah Wireless Networks Lecture Multiple Access Techniques Dr. Ghalib A. Shah

Outlines Review of previous lecture #5 FDMA TDMA CDMA Random Access ALOHA Slotted ALOHA Reservation-based ALOHA Summary of today’s lecture

Last Lecture Review Block Codes ARQ Hamming BCH Reed Solmon Sliding window Go-back-N

Multiple Access Techniques Frequency Division Multiple Access (FDMA) Time Division Multiple Access (TDMA) Random Access Code Division Multiple Access (CDMA) The success of wireless communication has increased the demand of radio frequency spectrum, which is a limited natural resource. In an effort to make the most efficient use of this resource, various technologies have been developed so that multiple or simultaneous users can be supported in a finite amount of spectrum. This concept is called Multiple Access. The three most commonly used methods are: FDMA TDMA CDMA Consider a large room with a group of people divided into pairs. Each pair hold their own conversation with no interest whats being said by the other pair. For these conversations to take place without interruption from others, it is necessary to define an isolated environment for each conversation. In this example, a room can be considered a slice of frequency spectrum allocated to be used by this group. Imagine each pair talking through cellular phones or radios. Applying FDMA to this scenario, the single large room would be partitioned with many dividing walls and creating a large number of small rooms. A single pair of people would enter into each small room and hold their conversation. Each room is like a single channel and no one could use this room until the current conversation is over.

FDMA FDMA was the initial multiple-access technique for cellular systems Separates large band into smaller channels. Each channel has the ability to support user. Guard bands are used to separate channel preventing co-channel interference Narrow bandwidth (30 khz). User 1 User 2 User 3 User 4 Time Frequency Code f1

Advantages Disadvantages Simple to implement in terms of hardware. Fairly efficient with a small base population and with constant traffic. Disadvantages Network and spectrum planning are intensive and time consuming. Channels are dedicated for a single user, idle channels add spectrum inefficiency.

TDMA Entire bandwidth is available to the user for finite period of time. Users are allotted time slots for a channel allowing sharing of a single channel. Requires time synchronization. Each of the user takes turn in transmitting and receiving data in a round robin fashion. User 1 User 2 User 3 User 4 Time Frequency Code As frequency spectrum experiences more traffic, spectrum efficiency becomes more important. In digital systems, continuous transmission is not required because users do not use the allotted bandwidth all the time. In such systems, TDMA is a complimentary access technique to FDMA. Global Systems for Mobile communications (GSM) uses the TDMA technique.

How it works? User presses Push-to-Talk (PTT) button A control channel registers the radio to the closest base station. The BS assigns an available pair of channels. Unlike FDMA, TDMA system also assigns an available time slot within the channel. Data transmission is not continuous rather sent and received in bursts. The bursts are reassembled and appear like continuous transmission.

Advantages Disadvantages Extended battery life and talk time More efficient use of spectrum, compared to FDMA Will accommodate more users in the same spectrum space than an FDMA system Disadvantages Network and spectrum planning are intensive Multipath interference affects call quality Dropped calls are possible when users switch in and out of different cells. Too few users result in idle channels (rural versus urban environment) Higher costs due to greater equipment sophistication

CDMA CDMA is a spread spectrum technique used to increase spectrum efficiency. SS has been used in military applications due to anti-jamming and security. User 4 Time Frequency Code User 1 User 2 User 3

Code-Division Multiple Access (CDMA) Basic Principles of CDMA D = rate of data signal Break each bit into k chips Chips are a user-specific fixed pattern Chip data rate of new channel = kD

CDMA Example If k=6 and code is a sequence of 1s and -1s For a ‘1’ bit, A sends code as chip pattern <c1, c2, c3, c4, c5, c6> For a ‘0’ bit, A sends complement of code <-c1, -c2, -c3, -c4, -c5, -c6> Receiver knows sender’s code and performs electronic decode function <d1, d2, d3, d4, d5, d6> = received chip pattern <c1, c2, c3, c4, c5, c6> = sender’s code

CDMA Example User A code = <1, –1, –1, 1, –1, 1> To send a 1 bit = <1, –1, –1, 1, –1, 1> To send a 0 bit = <–1, 1, 1, –1, 1, –1> User B code = <1, 1, –1, – 1, 1, 1> To send a 1 bit = <1, 1, –1, –1, 1, 1> Receiver receiving with A’s code (A’s code) x (received chip pattern) User A ‘1’ bit: 6 -> 1 User A ‘0’ bit: -6 -> 0 User B ‘1’ bit: 0 -> unwanted signal ignored

Advantages Disadvantages Greatest spectrum efficiency: CDMA improves call quality by filtering out background noise, cross-talk, and interference Simplified frequency planning - all users on a CDMA system use the same radio frequency spectrum. Random Walsh codes enhance user privacy; a spread-spectrum advantage Precise power control increases talk time and battery size for mobile phones Disadvantages Backwards compatibility techniques are costly Currently, base station equipment is expensive Low traffic areas lead to inefficient use of spectrum and equipment resources capacity increases of 8 to 10 times that of an analog system and 4 to 5 times that of other digital systems which makes it most useful in high traffic areas with a large number of users and limited spectrum

Random Access Methods in Wireless Networks more efficient way of managing medium access for communicating short bursty messages in contrast to fixed-access schemes, each user gains access to medium only when needed -has some data to send drawback: users must compete to access the medium (‘random access’) collision of contending transmissions Random Access Methods in Wireless Networks can be divided into two groups: ALOHA based-no coordination between users carrier-sense based-indirect coordination -users sense availability of medium before transmitting

Random Access Collision Period User 4 User 3 rescheduled User 2 User 1 Time

ALOHA-based Random Access user accesses medium as soon as it has a packet ready to transmit after transmission, user waits a length of time > round-trip delay in the network, for an ACK from the receiver if no ACK arrives, user waits a random interval of time (to avoid repeated collision) and retransmits advantages: simple, no synchronization among users required disadvantages: low throughput under heavy load conditions probability of collision increases as number of users increases max throughput = 18% of channel capacity

Pure-ALOHA

Slotted ALOHA time is divided into equal time slots –when a user has a packet to transmit, the packet is buffered and transmitted at the start of the next time slot BS transmits a beacon signal for timing, all users must synchronize their clocks advantages: partial packet collision avoided Disadvantages throughput still quite low! there is either no collision or a complete collision max throughput = 36% of channel capacity

Slotted ALOHA

Example slotted ALOHA in GSM Two types of channels in GSM: Traffic channels (TCH): used for transmission of user data –based on FDMA/TDMA Signalling channels, used for control and management of a cellular network Random Access Channel (RACH): signalling channel for establishing access to the network (i.e. BS) employs Slotted ALOHA only channel in GSM where contention can occur

Reservation ALOHA Time slots are divided into reservation and transmission slots / periods during reservation period, stations can reserve future slots in transmission period reservation slot size << transmission slot size collisions occur only in reservation slots advantages: higher throughput under heavy loads max throughput up to 80% of channel capacity disadvantages: more demanding on users as they have to obtain / keep ‘reservation list’ up-to-date R-Aloha is most commonly used in satellite systems satellite collects requests, complies ‘reservation list’ and finally sends the list back to users

R-ALOHA

Summary FDMA TDMA CDMA Random Access Next Lecture ALOHA Slotted ALOHA Reservation-based ALOHA Next Lecture Carrier-sense based random access Spread Spectrum