IT351: Mobile & Wireless Computing

Slides:



Advertisements
Similar presentations
Mobile Communications Chapter 3 : Media Access
Advertisements

14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany 3.1 Motivation SDMA, FDMA, TDMA, CDMA Aloha, reservation schemes.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Mobile Communications Chapter 3 : Media Access  Motivation  SDMA, FDMA, TDMA  Aloha  Reservation schemes  Collision avoidance, MACA  Polling  CDMA.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
EEC173B/ECS152C, Spring 2010  Wireless Channel Access - Challenges: Hidden/Exposed Terminals - Access Methods: SDMA, FDMA, TDMA, CDMA  Multimedia compression.
Mobile Communications Chapter 3 : Media Access Motivation SDMA, FDMA, TDMA Aloha, reservation schemes Collision avoidance, MACA Polling CDMA, SAMA Comparison.
1 Cellular communications Cellular communications BASIC TELECOMMUNICATIONS.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Ch. 3: Media Access SDMA, FDMA, TDMA Aloha, reservation schemes
Wireless Communications
Mobile Communications
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
VIT UNIVERSITY :: VELLORE
Chapter 3: Medium Access Control
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Mobile Communications Chapter 3 : Media Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Universität Karlsruhe Institut für Telematik ECE 591
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
Kelvin Hilton 2nd Generation Mobile Telecommunications Part 2.
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
2. Data Link Layer: Medium Access Control. Scheduling.
Medium access control By Saumya Chaturvedi. PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency.
Wireless Sensor Networks 4. Medium Access
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
CT301 lecture7 10/29/2015 Lect 7 NET301.
Outline What is Wireless LAN Wireless Transmission Types
Multiple Access Techniques for Wireless Communication
Medium Access Control MAC protocols: design goals, challenges,
The University of Adelaide, School of Computer Science
CT301 LECTURE 8.
Communication Networks: Technology & Protocols
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
Coding Methods in CDMA.
Channel Allocation (MAC)
IT351: Mobile & Wireless Computing
CSE 4215/5431: Mobile Communications Winter 2011
Mobile Communications Chapter 3 : Media Access
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access
Mobile Communications Media Access Chapter 3
Communication Networks NETW 501
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3 : Media Access
CT301 lecture7 10/29/2015 Lect 7 NET301.
The Medium Access Control Sublayer
Mobile Communications Chapter 3: Media Access
Unit 2 Medium Access control
Mobile Communications Chapter 3 : Media Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
CSE 4215/5431: Mobile Communications Winter 2011
UNIT II Wireless Medium Access Control
Mobile Computing Chapter 2 : Media Access Control.
Multiplexing & Multiple Access
Mobile Computing Chapter 2 : Media Access Control.
Mobile Communications Chapter 3 : Media Access
Dr. John P. Abraham Professor UTPA
UNIT – I MEDIUM ACCESS CONTROL
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

IT351: Mobile & Wireless Computing Medium Access Schemes Objectives: To study the MAC layer in wireless communication systems. To understand the main problems and challenges of wireless communications regarding the MAC layer To study the different MAC schemes available and compare between them

Outline The MAC Layer & motivation Access Methods Mmultiple Access SDMA - FDMA -CDMA TDMA Random TDMA problems Hidden & exposed terminals Near & far terminals TDMA Schemes Aloha & slotted aloha Demand Assigned Multiple Access MACA Polling mechanisms Comparison

Overview of the main chapters Support for Mobility Chapter 9: Mobile Transport Layer Chapter 8: Mobile Network Layer Chapter 4: Telecommunication Systems Chapter 5: Satellite Systems Chapter 6: Broadcast Systems Chapter 7: Wireless LAN Chapter 3: Medium Access Control Chapter 2: Wireless Transmission

Data Link Control Layer (DLC) The main role of the DLC layer is to establish reliable point to point or point to multi-point connection between different devices over wired or wireless medium. The DLC layer is subdivided into two sub-layers: The logical link control (LLC) The medium access control (MAC) Medium Access Control comprises all mechanisms that regulate user access to a medium using SDM, TDM, FDM, or CDM The main focus of the chapter is TDM

Access methods SDMA/FDMA/TDMA/ CDMA Universität Karlsruhe Institut für Telematik Mobilkommunikation SS 1998 Access methods SDMA/FDMA/TDMA/ CDMA The multiplexing schemes presented in chapter 2 are now used to control medium access! SDMA (Space Division Multiple Access) segment space into sectors, use directed antennas cell structure, sectorized antenna FDMA (Frequency Division Multiple Access) assign a certain frequency to a transmission channel between a sender and a receiver permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) Prof. Dr. Dr. h.c. G. Krüger E. Dorner / Dr. J. Schiller 15

FDD/FDMA - general scheme, example GSM 960 MHz 124 200 kHz 935.2 MHz 1 20 MHz 915 MHz 124 890.2 MHz 1 Frequency division duplex: Simultaneous access to the medium in both directions, uplink and down link ( from mobile station to base station and vice versa Ex (GSM): Fu = 890 + n*0.2 Fd = Fu + 45 = 935 + n*0.2 t

Access methods SDMA/FDMA/TDMA/CDMA (cont.) Universität Karlsruhe Institut für Telematik Mobilkommunikation SS 1998 Access methods SDMA/FDMA/TDMA/CDMA (cont.) CDMA (Code Division Multiple Access) all terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel each sender has a unique random number, the sender XORs the signal with this random number the receiver can “tune” into this signal if it knows the pseudo random number, tuning is done via a correlation function Disadvantages: higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal) all signals should have the same strength at a receiver Advantages: all terminals can use the same frequency, no planning needed huge code space (e.g. 232) compared to frequency space interferences (e.g. white noise) is not coded forward error correction and encryption can be easily integrated Prof. Dr. Dr. h.c. G. Krüger E. Dorner / Dr. J. Schiller 28

Access methods SDMA/FDMA/TDMA/CDMA (cont.) TDMA (Time Division Multiple Access) Assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time Use only one frequency, thus very simple receivers and transmitters Synchronization between sender and receiver in time domain is needed Fixed pattern (allocating certain time slot to a channel) Dynamic allocation requires identification for each transmission (e.g. MAC addresses)

Time Division Multiple Access Fixed TDM Typical solution for wireless phone system MAC is simple. The only crucial point is to access the reserved time slot at the right moment Suitable for connections with a fixed bandwidth Guarantees fixed delay (e.g. every 10 msec as in DECT) Used for many digital mobile phone systems like GSM, DECT TDD/TDMA - general scheme, example DECT 1 2 3 11 12 t downlink uplink 417 µs

Random Access Scheme (TDMA) Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send as soon as the medium is free, listen into the medium if a collision occurs (legacy method in IEEE 802.3) Problems in wireless networks signal strength decreases proportional to the square of the distance. Obstacles attenuate the signal even further the sender would apply carrier sense (CS) and collision detection (CD), but the collisions happen at the receiver it might be the case that a sender cannot “hear” the collision, i.e., CD does not work furthermore, CS might not work if, e.g., a terminal is “hidden”

Motivation - hidden and exposed terminals Hidden terminals A sends to B, C cannot receive A C wants to send to B, C senses a “free” medium (CS fails) collision at B, A cannot receive the collision (CD fails) A is “hidden” for C Exposed terminals B sends to A, C wants to send to another terminal (not A or B) C has to wait, CS signals a medium in use but A is outside the radio range of C, therefore waiting is not necessary C is “exposed” to B A B C

Motivation - near and far terminals Terminals A and B send, C receives signal strength decreases proportional to the square of the distance the signal of terminal B therefore drowns out A’s signal C cannot receive A If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer Also severe problem for CDMA-networks - precise power control needed! A B C

Aloha/slotted aloha Mechanism Aloha Slotted Aloha random, distributed (no central arbiter), time-multiplex Slotted Aloha additionally uses time-slots, sending must always start at slot boundaries Aloha Slotted Aloha collision sender A sender B sender C t collision sender A sender B sender C t

DAMA - Demand Assigned Multiple Access Channel efficiency only 18% for Aloha, 36% for Slotted Aloha Reservation can increase efficiency to 80% a sender reserves a future time-slot sending within this reserved time-slot is possible without collision reservation also causes higher delays typical scheme for satellite links Examples for reservation algorithms: Explicit Reservation (Reservation-ALOHA) Implicit Reservation Reservation-TDMA

Access method DAMA: Explicit Reservation Universität Karlsruhe Institut für Telematik Mobilkommunikation SS 1998 Access method DAMA: Explicit Reservation Explicit Reservation (Reservation Aloha): two modes: ALOHA mode for reservation: competition for small reservation slots, collisions possible reserved mode for data transmission within successful reserved slots (no collisions possible) it is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time collision t Aloha reserved Aloha reserved Aloha reserved Aloha Prof. Dr. Dr. h.c. G. Krüger E. Dorner / Dr. J. Schiller 24

MACA - collision avoidance MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain sender address receiver address packet size Variants of this method can be found in IEEE802.11 Wireless LAN

MACA examples MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B MACA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A A C RTS CTS CTS B A C RTS RTS CTS B

Polling mechanisms If one terminal can be heard by all others, this “central” terminal (a.k.a. base station) can poll all other terminals according to a certain scheme now all schemes known from fixed networks can be used (typical mainframe - terminal scenario)

Comparison SDMA/TDMA/FDMA/CDMA