Multiple Access Techniques for Wireless Communications

Slides:



Advertisements
Similar presentations
Multiple Access Techniques for wireless communication
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
April 25, 2005ECE 457 Cellular Communication ECE 457 Spring 2005.
Lecture 8: Spread Spectrum
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
7C Cimini-9/97 ALOHA Carrier-Sense Techniques Reservation Protocols Voice and Data Techniques - PRMA - Adaptive CDMA Power Control “Channel access.
TD-SCDMA.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
II. Medium Access & Cellular Standards. TDMA/FDMA/CDMA.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Wireless & Mobile Networking: Multiple Division Techniques
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Wireless Communication Arjav A. Bavarva Dept. of Electronics and Communication.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Techniques for Wireless Communication
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Adapted from T.S. Rappaport’s Wireless Communications Chapter 9
Autumn2004 © University of Surrey SatComms A - part 4 - B G Evans 4.1 Satellite Communications A Part 4 Access Schemes in Satellite Networks -Professor.
Direct Sequence Spread Spectrum vs
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
1 Kyung Hee University Chapter 12 Multiple Access.
Chapter 6 Multiple Radio Access
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Multiple Access Techniques for Wireless Communication
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 k2k2 k3k3 k4k4 k5k5 k6k6 k1k1 f c t time frequency code users 1) Frequency Division Multiple Access (FDMA) Total frequency band is divided into sub-frequency.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
Multiple Access Techniques PROF. MICHAEL TSAI 2016/5/6.
Outline  Introduction (Resource Management and Utilization).  Compression and Multiplexing (Other related definitions).  The Most Important Access Utilization.
Komunikasi Satelit, Sukiswo, ST, MT 1 Multiple Access For Satellite Sukiswo
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Lecture Multiple Access Techniques Dr. Ghalib A. Shah
Multiple Access Methods
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Multiple Access Techniques for Wireless Communication
Advanced Wireless Communication Systems
Wireless and mobile computing
Multiple Access Techniques for Wireless Communication
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
Data link layer divided into two functionality-oriented sublayers
Part III Datalink Layer 10.
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Wireless & Mobile Networking: Multiple Division Techniques
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Multiple Access Techniques for Wireless Communications 2005/07/06 Weng Chien-Erh

Table of Contents(1) Introduction FDMA TDMA CDMA SS (Spread Spectrum) FHSS DSSS Hybrid

Table of Contents(2) Packet Radio Pure ALOHA Slotted ALOHA CSMA Reservation Protocol Reservation-ALOHA PRMA NC-PRMA

Introduction (1) Multiple Access: Enable many mobile users to share simultaneously radio spectrum. Provide for the sharing of channel capacity between a number of transmitters at different locations. Aim to share a channel between two or more signals in such way that each signal can be received without interference from another.

Introduction (2)

Introduction (3) In conventional telephone systems, it is possible to talk and listen simultaneously, called duplexing. Duplexing Allow the possibility of talking and listening simultaneously. Frequency Division Duplex (FDD) Provides two distinct bands of frequencies for every user Time Division Duplex (TDD) Multiple users share a signal channel by taking turns in time domain Each duplexing channel has both a forward time slot and a reverse time slot to facilitate bidirectional communication.

Introduction (4)

Frequency Division Multiple Access (FDMA) (1) Each transmitter is allocated a channel with a particular bandwidth. All transmitters are able to transmit simultaneously.

Frequency Division Multiple Access (FDMA) (2) Allocation of separate channels to FDMA signals

Frequency Division Multiple Access (FDMA) (3) Time-frequency characteristic of FDMA

Frequency Division Multiple Access (FDMA) (4) Features of FDMA If an FDMA channel is not in sue, then it sits idle and can’t be used by other users. Transmit simultaneously and continuously. FDMA is usually implemented in narrowband systems. Its symbol time is large as compared to the average delay spread.

Frequency Division Multiple Access (FDMA) (5) Features of FDMA (Cont.) For continuous transmission, fewer bits are needed for overhead purposes (such as synchronization and framing bits) as compared to TDMA. FDMA uses duplexers since both TX and RX operate at the same time.

Time Division Multiple Access (TDMA) (1) Transmitter share a common channel. Only one transmitter is allowed to transmit at a time. Synchronous TDMA: access to the channel is restricted to regular. Asynchronous TDMA: a station may transmit at any time that the channel is free.

Time Division Multiple Access (TDMA) (2) Allocation of time slot in TDMA

Time Division Multiple Access (TDMA) (3) Time-frequency characteristic of synchronous TDMA

Time Division Multiple Access (TDMA) (4) Features of TDMA (Cont.) TDMA systems divide the radio spectrum into time slots. Each user occupies a cyclically repeating time slot. Transmit data in a buffer-and-burst method, thus the transmission for any user is not continuous. TDMA has TDD and FDD modes.

Time Division Multiple Access (TDMA) (5) TDMA Frame Structure

Time Division Multiple Access (TDMA) (6) TDMA Frame Structure (Cont.) In TDMA, the preamble contains the address and synchronization information that both the base station and the mobiles use to identify each other. Different TDMA standards have different TDMA frame structures.

Time Division Multiple Access (TDMA) (7) Features of TDMA (Cont.) Share a single carrier frequency with several users. Data transmission is not continuous, but occurs in bursts. No duplexers is required since users employ different time slots for transmission and reception. TDMA can allocate different numbers of time slots per frame to different users, allowing bandwidth be supplied on demand to different users.

Time Division Multiple Access (TDMA) (8) Combined used of synchronous TDMA and FDMA

Time Division Multiple Access (TDMA) (8) Asynchronous TDMA: Carrier-Sense Multiple Access (CSMA) Allows a transmitter to access the channel at any time that is not being used by another transmitter.

Code Division Multiple Access (CDMA) (1) Transmitter may transmit at the same time, in the same channel. Each signal is modified by spreading it over a large bandwidth. This spreading occurs by combining the transmitter signal with a spreading sequence.

Code Division Multiple Access (CDMA) (2)

Code Division Multiple Access (CDMA) (3) example

Code Division Multiple Access (CDMA) (4) Features of CDMA Many users of a CDMA system share the same frequency. The symbol (chip) duration is very short and usually much less than the channel delay spread. The near-far problem occurs at a CDMA RX if an undesired user has a high detected power as compared to the desired user.

Frequency Hopping (1) Frequency hopping is a form of FDMA Each transmitter is allocated a group of channels, known as hop set . The transmitter transmits data in short bursts, choosing one of these channels on which to transmit each burst.

Frequency Hopping (2) Time-frequency characteristic of a single transmitter.

Frequency Hopping (3) Signal received form a pair of frequency-hopping transmitters.

Time Hopping (1) Each bit is transmitted as a single pulse, with the value of j-th bit determined by whether it arrives before or after the reference time tj.

Time Hopping (2) TH-PPM Tc t Tf Ts User1 : C(1)=[1 0 0 2] d1=0

Spread Spectrum Multiple Access (1) A transmission technique in which a PN code, independent of information data, is employed as a modulation waveform to “spread” the signal energy over a bandwidth much greater than the signal information bandwidth. At the receiver the signal is “despread” using a synchronized replica of the PN code. Direct Sequence Spread Spectrum (DSSS) Frequency Hopping Spread Spectrum (FHSS)

Spread Spectrum Multiple Access (2) Direct Sequence Spread Spectrum (DSSS) A carrier is modulated by a digital code in which the code bit rate is much larger than the information signal bit rate. These systems are also called pseudo-noise systems. Also called code division multiple access (CDMA) A short code system uses a PN code length equal to a data symbol. A long system uses a PN code length that is much longer than a data symbol.

Spread Spectrum Multiple Access (3) Direct Sequence Spread Spectrum (DSSS)

Spread Spectrum Multiple Access (4) Basic principle of DSSS For BPSK modulation

Spread Spectrum Multiple Access (5) Frequency Hopping Spread Spectrum (FHSS) It divides available bandwidth into N channels and hops between these channels according to the PN sequence. Fast hopping Slow hopping

Spread Spectrum Multiple Access (6) Frequency Hopping Spread Spectrum (FHSS)

Spread Spectrum Multiple Access (7) Modulation

Spread Spectrum Multiple Access (8)

Spread Spectrum Multiple Access (9)

Spread Spectrum Multiple Access (10) Performance in the presence of interference Narrowband interference Wideband interference Gaussian noise

Spread Spectrum Multiple Access (11)

Spread Spectrum Multiple Access (12) Narrowband interference

Spread Spectrum Multiple Access (13) Wideband interference

Spread Spectrum Multiple Access (14) Gaussian noise

Spread Spectrum Multiple Access (15) Hybrid FDMA/CDMA (FCDMA): The available wideband spectrum is divided into a number of subspectras with smaller bandwidths. Each of these smaller suchannels becomes a narrowband CDMA system having processing gain lower than the original CDMA system.

Spread Spectrum Multiple Access (16) Hybrid Direct Sequence/Frequency Hopped Multiple Access (DS/FHMA) This technique consists of a direct sequence modulated signal whose center frequency is made to hop periodically in a pseudorandom fashion. Having an advantage in that they avoid the near-far effect.

Spread Spectrum Multiple Access (17) Time Division Frequency Hopping (TDFH) The subscriber can hop to a new frequency at the start of a new TDMA frame. Has been adopted in GSM.

Packet Radio (1) In packet radio (PR) access techniques, many subscribers attempt to access a single channel in an uncoordinated (or minimally coordinated manner. Collision from the simultaneous transmissions of multiple transmitters are detected at the BS, in which case an ACK or NACK signal is broadcast by the BS to alert the desired user of received transmission. PR multiple access is very easy to implement but has low spectral efficiency and may include delays. The subscribers use a contention technique to transmit on a common channel.

Packet Radio (2) ALOHA protocols, developed for early satellite systems, allow each subscriber to transmit whenever they have data to sent. The transmitting subscribers listen to the acknowledgement feedback to determine if transmission has been successful or not. If a collision occurs, the subscriber waits a random amount of time, and then transmits the packet. The performance of contention techniques can be evaluated by throughput (T), which is defined as the average number of message successfully transmitted per unit time, and the average delay (D) experienced by a typical message burst.

Packet Radio (3) Packet Radio Protocols , vulnerable period is defined as the time interval during which the packets are susceptible to collisions with transmission form other user. Packet A suffer a collision if other terminals transmit packets during the period to

Packet Radio (4) Assume that packet transmissions occur with Poisson distribution having mean arrival rate of packets per second and is the packet duration in seconds. The traffic occupancy or throughput R is given by . R is the normalized channel traffic (measured in Erlangs) and if R > 1, then the packets generated by the users exceed the maximum transmission rate of the channel. For reasonable throughput, 0 < R < 1. Under normal loading, the throughput T is the same as the total offered load L. The load L is the sum of the newly generated packets and the retransmitted packets that suffered collisions.

Packet Radio (5) The normal throughput is given as the total offered load times the probability of successful transmission, i.e. The probability that n packets are generated by the user population during a given packet duration interval is assumed to Poisson distributed and is given as The probability that zero packets are generated (i.e., no collision) during this interval is given by

Packet Radio (6) Type of Access Contention protocols are categorized as: Random Access: there is no coordination among that users and the messages are transmitted from the users as they arrive at the transmitter. Scheduled Access: based on a coordinated access of users on the channel and the users transmit messages within allotted slots or time intervals. Hybird Access: a combination of random access and scheduled.

Packet Radio (7) Pure ALOHA The pure ALOHA protocol is random access protocol used for data transfer and a user accesses a channel as soon as a message is ready to be transmitted. After a transmission, the user waits for an acknowledgment on either the same channel or a separate feedback channel. In case of collisions, the terminal waits for a random period of time and retransmits the message. For pure ALOHA, the vulnerable period is double the packet duration: ,

Packet Radio (8) Slotted ALOHA In slotted ALOHA, time is divided into equal time slots of length greater than the packet duration . The subscribers each have synchronized clocks and transmit a message only at the beginning of a new time slot. The vulnerable period of slotted ALOHA is only one packet duration, since partial collisions are prevented through synchronization. The probability that no other packets will be generated during the vulnerable period is . The throughput for the case of slotted ALOHA is thus given by .

Packet Radio (9) Carrier Sense Multiple Access (CSMA) CSMA protocols are based on the fact that each terminal on the network is able to monitor the status of the channel before transmitting information. In CSMA, detection delay and propagation delay are two important parameters. Detection delay is a function of he receiver hardware and is the time required for a terminal to sense whether or not the channel is idle. Propagation delay is a relative measure of how fast it takes for a packet to travel from a BS to a MS.

Packet Radio (10) Several variations of the CSMA strategy 1-persistent CSMA Non-persistent CSMA p-persistent CSMA CSMA/CD Data sense multiple access(DSMA)

Packet Radio (11) Reservation Protocols Reservation ALOHA (R-ALOHA) R-ALOHA is a packet scheme based on time division multiplexing. Two phase: contention phase and transmission phase Mobiles contend the channel in reservation phase (slotted-ALOHA) Mobiles that succeed in making reservation can transmit without interference

Packet Radio (12) PRMA (Packet Reservation Multiple Access) A combination of TDMA and reservation ALOHA Ask channel resource in the talkspurt Release channel resource in the silent gap Permission probability Effect of voice activity detector

Packet Radio (13) NC-PRMA (Non-Collision Packet Reservation Multiple Access) The existing users inform the BS about their demands in a non-collision manner (time-frequency signaling scheme)