Multimedia Support for Wireless W-CDMA with Dynamic Spreading By Ju Wang Mehmet Ali Elicin And Jonathan C.L. Liu Lecture by Seth Caplan.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Switching Technology presented by Hussain Ahmad BA-Abdullah. Fawaz abdullah AL-Amri. prof : Adel Ali.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Jaringan Komputer Lanjut Packet Switching Network.
Multiple Access Techniques for wireless communication
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Lecture 4. US Systems. Advanced Mobile Phone System Analog Signal Processing at the sender side Compress Pre Emphasize Limit Low Pass Filter + Frequency.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
1 Cross-Layer Design for Wireless Communication Networks Ness B. Shroff Center for Wireless Systems and Applications (CWSA) School of Electrical and Computer.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Efficiency Reservation Protocols Voice and Data Techniques - PRMA - Variable rate CDMA.
Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb.
Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb.
A Novel Multiple Access Scheme for Ethernet Passive Optical Network Professor : Ho-Ting Wu Speaker : Rui-Yi Jian 2004 – 08 – 11.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
CS352- Link Layer Dept. of Computer Science Rutgers University.
Medium Access Control Sublayer
Switching Techniques Student: Blidaru Catalina Elena.
August 21, Mobile Computing COE 446 IS-95 Tarek Sheltami KFUPM CCSE COE Principles of Wireless Networks.
Link-Level Flow and Error Control
MAXIMIZING SPECTRUM UTILIZATION OF COGNITIVE RADIO NETWORKS USING CHANNEL ALLOCATION AND POWER CONTROL Anh Tuan Hoang and Ying-Chang Liang Vehicular Technology.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
On QoS Guarantees with Reward Optimization for Servicing Multiple Priority Class in Wireless Networks YaoChing Peng Eunyoung Chang.
Integrity in Data Communications Packets, Frames and Error Detection.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Performance evaluation of adaptive sub-carrier allocation scheme for OFDMA Thesis presentation16th Jan 2007 Author:Li Xiao Supervisor: Professor Riku Jäntti.
ELEC6219: Wireless and Mobile Networks Session 6: Local Area Networks - Case study: Ethernet (Part II) Adriana Wilde and Jeff Reeve.
Lecture 5: Cellular networks Anders Västberg Slides are a selection from the slides from chapter 10 from:
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Fair Class-Based Downlink Scheduling with Revenue Considerations in Next Generation Broadband wireless Access Systems Bader Al-Manthari, Member, IEEE,
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Ch 5. Link layer and Local Area Networks Myungchul Kim
Hybrid OFDMA/CSMA Based Medium Access Control for Next- Generation Wireless LANs Yaser Pourmohammadi Fallah, Salman Khan, Panos Nasiopoulos, Hussein Alnuweiri.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
Overload Prediction Based on Delay in Wireless OFDMA Systems E. O. Lucena, F. R. M. Lima, W. C. Freitas Jr and F. R. P. Cavalcanti Federal University of.
Lecture # 03 Switching Course Instructor: Engr. Sana Ziafat.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Tufts University. EE194-WIR Wireless Sensor Networks. February 17, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
Lecture Network layer -- May Congestion control Algorithms.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 A Cross-Layer Scheduling Algorithm With QoS Support in Wireless Networks Qingwen Liu, Student Member, IEEE, Xin Wang, Member, IEEE, and Georgios B. Giannakis,
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks Byung-Seo Kim, Yuguang Fang and Tan F. Wong Department of Electrical and Computer Engineering.
Computer Communication & Networks Lecture # 03 Circuit Switching, Packet Switching Nadeem Majeed Choudhary
Ben-Gurion University of the Negev Department of Communication Systems Engineering.
CS Spring 2011 CS 414 – Multimedia Systems Design Lecture 17 – Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2011.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Congestion Control in Data Networks and Internets
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Switching Techniques.
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Multimedia Support for Wireless W-CDMA with Dynamic Spreading
Multiple Access Control (MAC) Protocols
Presentation transcript:

Multimedia Support for Wireless W-CDMA with Dynamic Spreading By Ju Wang Mehmet Ali Elicin And Jonathan C.L. Liu Lecture by Seth Caplan

Key Words CDMA (Code Division Multiple Access) BER (Bit Error Rate) QoS (Quality of Service) SF (Spreading Factor)

Introduction Allow cell phone to do voice, audio and conventional data (ex. , ftp,…) transfers. Support multiple users with a guaranteed quality. Do all this without connection re- establishment. (ex. Sending an while talking on the phone)

Traffic Types Supported The table above shows the acceptable BER that is required to be able to process that traffic type. Minimum BER must be satisfied.

Spreading Factor Increasing the spreading factor can decrease the BER for a given number of users. Spreading factor is the key variable in determining user data rate and BER. Increasing spreading factor can increase the desired signal strength linearly.

Changes to CDMA System will dynamically change the spreading factor to allow more users and for certain traffic types. Changes to spreading factor will occur according to BER. Once a call is accepted the performance will be guaranteed for its lifetime. Mobile and Base stations need to change parameters to allow the above to work correctly.

Mobile Stations

Has three types of request: –OPEN - a new connection –ALTER - change the traffic type –CLOSE - ends the connection Protocol defines 4 traffic types. (Voice, Audio, Video and Data) The base station determines weather the connection is allowed, if the connection is denied it will retry after waiting a random time period. Connection is determined by two items: –The BER requirement and min data rate. –Interference by other users.

Base Station

For all connections the station calculates the average BER corresponding to the number of users. If the BER is high, the system will increase the spreading factor and sees if the data rate can now be met by the system. This is done for all connections. There are two possibilities after the above step is taken. 1.If spreading factor is not increased then the mobile station with OPEN is immediately ACK. 2.If the spreading factor is increased then the base station must broadcast an UPDATE to all its connections to tell them about this increase. When all the existing connections have ACK to the UPDATE, then the station with the OPEN is then ACK and may start to transmit.

Fixed SF vs. Dynamic SF Dynamic spreading factor maintained the BER, and good overall performance. Where the fixed spreading factor could not maintain good BER past five users.

Total Time to Establish a Connection T endtoend = T m + T p + T d + T update + T a + T s T m - time to send request from mobile station to the base station. T p - base station processing time such as finding the spreading factor and checking all existing connections. T d - time to notify and receive ACK from destinations. T update - time needed to broadcast UPDATE messages and receive ACKs. Not done all the time. T a - is the time used to send an ACK to the mobile station. T s - the time when mobile updates channel parameters and gets ready for transmitting.

How do we Improve T endtoend ?

Improving T p T p was improved by calculating one spreading factor for each type of traffic before doing the review. This was done instead of doing the calculation for each of the connections. As a result, 25% reduction was achieved on T p.

Problems Associated with T update Must wait until a ACK is received from all mobile stations that are connected. Only one access channel is used and there will be extra delays due to possible collisions. Will grow exponentially and then settle back to small delay. Only used when UPDATE is called.

How to Improve T update Can be improved if a collision prevention/resolution algorithm is used. Increasing the number of access channels (2 access channels gave 49% reduction, 4 access channels gave 58% reduction) As access channels increase so does the interference between users which will also cause BER to increase, so 2 access channels is recommended. Higher spreading factor (128 or 160) are more tolerable to having more access channels.

Dynamic Scheduling for Multimedia Integration Can This Improve T s ? How do we continue to support voice users with guaranteed quality and integrate multimedia traffic? We implement a dynamic spreading algorithm. –What's the difference between fixed scheduling and dynamic scheduling algorithms?

The Fixed Spreading Factor Scheduling Algorithm Algorithm (FSF_Scheduling) Algorithm delays the transmission until the BER is acceptable. Algorithm will reduce the frequency of retransmission. 1.Contact the base station for the current traffic load. 2.Select an unfinished request r(i), check to see if the addition of this request will satisfy the BER requirement. 3.If the predicted BER exceeds any of the existing connection, or the BER of r(i), the r(i) is not accepted time frame. 4.Go back to 1. and check for other traffics. Otherwise, r(i) is scheduled at the next time frame.

Dynamic Spreading Factor Scheduling Algorithm This algorithm improves on the fixed scheduling algorithm by assigning traffic types dynamically. Input parameters: Nf, Ne, Na, Ni represent the number of pending FTP, , Audio and Image data request respectively. FTP[1,…,Nf]: array of pending FTP requests, the value of entry FTP[k] represents the remaining data amount yet to be transmitted. [1,…Ne]: array of pending requests. AUDIO[1,…Na]: array of pending Audio requests. IMAGE[1,…Ni]: array of pending Image requests. RBER[4]: the BER requirement of the four traffics. BER[5][1:50]: the predicated BER given the number of active users and the number of active users and the spreading factor. The first, second, up to fifth row correspond to BERs for SF = 32, 64, 96, 128 and 160.

Dynamic Spreading Factor Scheduling Algorithm Continued This algorithm shows what would occur for audio traffic (The other algorithm traffic is similar): 1.Find the minimum spreading factor SF v and Sf a such that: BER[SFv][k+N a ] < RBER[1] and BER[SFa][k+N a ] < RBER[4] 2.If both SF v and SF a are found: All audio requests are assigned with spreading factor of Sf a. Go to step (8) to update audio traffics. 3.If SF v cannot be found: 4.Use SF v = 160 as the voice spreading factor. 5.Locate the maximum audio traffic number Na such that: BER[SF v ][k + N a ] < RBER[1] 6.Find the minimum Sfa that satisfies: BER[SF a ][k + N a ] < RBER[4] 7.Decide which subset of audio traffics will be chosen if N a < N a. This should be based on fair strategy so that there is equal chance for all traffics. 8.For each of the selected audio traffics i: Calculate T f as the length of time frame. Reduce their remaining data amount AUDIO[i]- = T f * 4.096/Sf a. UPDATE array AUDIO[] and N a by deleting finished requests. 9.Continue with other traffic types.

Benefits of Dynamic Spreading Factor Algorithm No starvation of data traffic and reasonable response time. Voice communication is guaranteed to be uninterrupted. Improved performance on Ts.

Conclusion W-CDMA can support multiple traffic types. Only new calls admitted are calls that can be guaranteed. Dynamically spreading factor provides much needed improvement over fixed spreading factor. By using W-CDMA we are able to maintain an acceptable BER throughout the entire system.

Questions?