Académique Documents
Professionnel Documents
Culture Documents
1. Overview
2. Multiple Access Protocols
3. Multiplexing Techniques
4. TDMA
5. FDMA
6. CDMA
7. SDMA
8. Others
9. Example of GSM
1
Multiple Access protocols
❒ single shared communication channel
❒ two or more simultaneous transmissions by nodes:
interference
❍ only one node can send successfully at a time
❒ multiple access protocol:
❍ distributed algorithm that determines how stations share
channel, i.e., determine when station can transmit
❍ communication about channel sharing must use channel itself!
❍ what to look for in multiple access protocols:
• synchronous or asynchronous
• information needed about other stations
• robustness (e.g., to channel errors)
• performance
2
Ideal Multiple Access Protocol
Broadcast channel of rate R bps
1. When one node wants to transmit, it can send at
rate R.
2. When M nodes want to transmit, each can send at
average rate R/M
3. Fully decentralized:
❍ no special node to coordinate transmissions
❍ no synchronization of clocks, slots
4. Simple
3
MAC Protocols: a taxonomy
Three broad classes:
❒ Channel Partitioning TDMA, FDMA, CDMA
❍ divide channel into smaller “pieces” (time slots,
frequency)
❍ allocate piece to node for exclusive use
❒ Random Access ALOHA, CSMA, CSMA/CD, CSMA/CA
❍ allow collisions
❍ “recover” from collisions
❒ “Taking turns” Polling, Token passing
❍ tightly coordinate shared access to avoid collisions
5
Channel Partitioning MAC protocols: FDMA
FDMA: frequency division multiple access
❒ channel spectrum divided into frequency bands
❒ each station assigned fixed frequency band
❒ unused transmission time in frequency bands go idle
❒ example: 6-station LAN, 1,3,4 have pkt, frequency
bands 2,5,6 idle
time
frequency bands
6
Channel Partitioning (CDMA)
CDMA (Code Division Multiple Access)
❒ unique “code” assigned to each user; i.e., code set partitioning
❒ used mostly in wireless broadcast channels (cellular, satellite,
etc)
❒ all users share same frequency, but each user has own
“chipping” sequence (i.e., code) to encode data
❒ encoded signal = (original data) X (chipping sequence)
❒ decoding: inner-product of encoded signal and chipping
sequence
❒ allows multiple users to “coexist” and transmit simultaneously
with minimal interference (if codes are “orthogonal”)
7
CDMA Encode/Decode
8
CDMA: two-sender interference
9
Random Access Protocols
❒ When node has packet to send
❍ transmit at full channel data rate R.
❍ no a priori coordination among nodes
10
Slotted Aloha
❒ time is divided into equal size slots (= pkt trans. time)
❒ node with new arriving pkt: transmit at beginning of
next slot
❒ if collision: retransmit pkt in future slots with
probability p, until successful.
Pros Cons
❒ single active node can ❒ collisions, wasting slots
continuously transmit ❒ idle slots
at full rate of channel ❒ nodes may be able to
❒ highly decentralized: detect collision in less
only slots in nodes than time to transmit
need to be in sync packet
❒ simple
13
Slotted Aloha efficiency
Efficiency is the long-run ❒ For max efficiency
fraction of successful slots with N nodes, find p*
when there’s many nodes, each that maximizes
Np(1-p)N-1
with many frames to send ❒ For many nodes, take
❒ Suppose N nodes with limit of Np*(1-p*)N-1 as
many frames to send, N goes to infinity,
each transmits in slot gives 1/e = .37
with probability p
❒ prob that 1st node has At best: channel
success in a slot used for useful
= p(1-p)N-1 transmissions 37%
❒ prob that any node has of time!
a success = Np(1-p)N-1
14
Pure (unslotted) ALOHA
❒ unslotted Aloha: simpler, no synchronization
❒ when frame first arrives
❍ transmit immediately
15
Pure Aloha efficiency
P(success by given node) = P(node transmits) .
= p . (1-p)N-1 . (1-p)N-1
= p . (1-p)2(N-1)
16
CSMA: (Carrier Sense Multiple Access)
17
CSMA collisions spatial layout of nodes along ethernet
collision:
entire packet transmission
time wasted
note:
role of distance and
propagation delay in
determining collision prob.
18
CSMA/CD (Collision Detection)
CSMA/CD: carrier sensing, deferral as in CSMA
❍ collisions detected within short time
❍ colliding transmissions aborted, reducing channel
wastage
❒ collision detection:
❍ easy in wired LANs: measure signal strengths,
compare transmitted, received signals
❍ difficult in wireless LANs: receiver shut off while
transmitting
❒ human analogy: the polite conversationalist
19
CSMA/CD collision detection
20
“Taking Turns” MAC protocols
channel partitioning MAC protocols:
❍ share channel efficiently and fairly at high load
❍ inefficient at low load: delay in channel access,
1/N bandwidth allocated even if only 1 active
node!
Random access MAC protocols
❍ efficient at low load: single node can fully
utilize channel
❍ high load: collision overhead
22
Frame Relay (more)
flags address data CRC flags
23
Frame Relay -VC Rate Control
❒ Committed Information Rate (CIR)
❍ defined, “guaranteed” for each VC
❍ negotiated at VC set up time
❍ customer pays based on CIR
24
Frame Relay - CIR & Frame Marking
25
Example: GSM
❒ Frequency Band
❍ 935-960, 890-915 MHz
❍ Two pieces of 25 MHz band
(same as AMPS)
❒ AMPS has 833 user channels
❒ How about GSM?
26
Different Generations
❒ 1G
❍ analog
❒ 2G
❍ digital
❒ 3G
❍ higher data rate for multimedia applications
27
1G Cellular Systems
❒ Many Different Standards:
❍ AMPS (US)
❍ NMT (Northern Europe)
❍ TACS (Europe)
❍ NTT (Japan)
❍ many others...
❒ Spectrum
❍ around 800 and 900 MHz
28
2G Cellular Systems
❒ Four Major Standards:
❍ GSM (European)
❍ IS-54 (later becomes IS-136, US)
❍ JDC (Japanese Digital Cellular)
❍ IS-95 (CDMA, US)
29
Frequency Division Duplex (FDD)
Forward Link
mobile base
station
Reverse Link
30
Frequency Division Multiple Access
(FDMA)
idle
idle
idle
31
Number of User Channels in AMPS
32
Frequency Reuse
Radio coverage,
called a cell.
f
The same frequency can be
reused in different cells, if they
are far away from each other
33
Cellular Architecture
MS – Mobile Station
BSC – Base Station Controller
MSC – Mobile Switching Center
PSTN – Public Switched Telephone
Network
MS
BSC
segmentation
of the area
MSC PSTN into cells
34
Time Division Multiple Access
(TDMA)
35
FDMA/TDMA, example GSM
f
960 MHz 124
20 MHz
915 MHz 124
1
890.2 MHz
t
1 2 3 7 8
37
Capacity Comparison
❒ Reuse factor
❍ 7 for AMPS
❍ 3 for GSM (why smaller reuse factor?)
38
Answer
❒ AMPS
❍ reuse factor = 7
❍ no. of users / cell = 833 / 7 = 119
❒ GSM
❍ reuse factor = 3
❍ no. of users / cell = 1000 / 3 = 333
❍ almost 3 times larger than AMPS!
39
Multiple Access Methods
40
Frequency-Time Plane
Frequency
Partition of signal
space into time slots
and frequency bands
Time
41
FDMA
Frequency
Different users
transmit at different
frequency bands
simultaneously.
Time
42
TDMA
Frequency
Different users
transmit at different
time slots.
Each user occupy the
whole freq. spectrum.
Time
43
Frequency Hopping CDMA
Frequency
Time
44
Synchronization
❒ The previous figure implies that each signal
synchronizes with each of the other
signals.
❒ In practice, this is not the case.
❒ Frequency hops may collide, but it does not
occur frequently.
❍ How often collisions occur depends on the
choice of codes.
45
Direct Sequence CDMA
Frequency
Time
46
CDMA Encoding
47
Encoding Example
❒ Data bit
d1 = –1
❒ Signature sequence
(c1,c2,…,c8) = (+1,+1,+1,–1,+1,–1,–1,–1)
❒ Encoder Output
(Z1,1,Z1,2,…,Z1,8) = (–1,–1,–1,+1,–1,+1,+1,+1)
48
Bandwidth
❒ Note that the chip rate is much higher
than the data rate.
❒ Consider our previous example.
❍ Suppose the original data signal occupies a
bandwidth of W.
❍ What is the bandwidth of the encoded signal?
49
Spread Spectrum Technique
Frequency Frequency
Encoding
Time Time
50
CDMA Decoding
❒ Without interfering users, the receiver
would receive the encoded bits, Zi,m , and
recover the original data bit, di, by
computing:
M
1
di =
M
∑Z
m =1
c
i ,m m
51
CDMA Decoding Example
(c1,c2,…,c8) = (+1,+1,+1,–1,+1,–1,–1,–1)
(Z1,1,Z1,2,…,Z1,8) = (–1,–1,–1,+1,–1,+1,+1,+1)
multiply
(–1,–1,–1,–1,–1,–1,–1,–1)
add and
divide by M
di = –1
52
53
Multiuser Scenario
❒ If there are N users, the signal at the
receiver becomes:
N
Z i*,m = ∑ Z in,m
n =1
❒ How can a CDMA receiver recover a user’s
original data bit?
54
2-user
example
55
Signature Sequences
❒ In order for the receiver to be able to
extract out a particular sender’s signal, the
CDMA codes must be of low correlation.
❒ Correlation of two codes, (cj,1,…, cj,M) and
(ck,1,…, ck,M) , are defined by inner product:
M
1
M
∑c
m =1
c
j ,m k ,m
56
The Meaning of Correlation
❒ What is correlation?
❍ It determines how much similarity one sequence has
with another.
❍ It is defined with a range between –1 and 1.
57
Generation of Signature
Sequences
❒ How to generate signature sequences of
low correlation?
58
Orthogonal Codes
❒ Two codes are said to be orthogonal if
their correlation is zero.
❍ no interference between the two users.
❒ In our previous two-user example, the
codes are orthogonal.
❒ How to generate orthogonal codes?
59
Walsh Codes
❒ The most common orthogonal codes used in
CDMA systems.
❒ A set of Walsh codes of length n is defined
by the rows of an n × n Hadamard matrix.
❒ Hadamard matrix can be constructed by an
iterative method.
60
Iterative Construction
H n −1 H n −1
H1 = ( 0 ) H 2n =
H n −1 H n −1
❒ Example:
0 0 0 0
0 0 0 1 0 1
H 2 = H4 =
0 1 0 0 1 1
0 1 1 0
61
Signature Sequences
❒ The signature sequences can be found by
❍ Taking the rows out
❍ Replacing 0 by –1
0 0 s1 = (− 1,− 1)
H 2 =
0 1 s2 = (− 1,+ 1)
Are they
orthogonal?
62
IS-95 Forward Link
❒ Walsh Codes of length 64 is used for
spreading in the forward link (base-to-
mobile) of IS-95.
63
PN Sequences
❒ What is Pseudo-Noise Sequences?
❍ They are deterministic.
❍ But they look like random noise.
64
Shift Register Implementation:
An Example
x1 x2 x3
x1 x2 x3 Output
1 0 0 ---
0 1 0 0
1 0 1 0
Initial state: 1 0 0
1 1 0 1
Output: 0 0 1 0 1 1 1 …
(Periodic with period 7) 1 1 1 0
0 1 1 1
The output sequence must be
periodic (why?) 0 0 1 1
The period cannot be greater than 1 0 0 1
7. (why?)
65
2.2 Multiple Access protocols
❒ single shared communication channel
❒ two or more simultaneous transmissions by nodes: interference
❍ only one node can send successfully at a time
❒ multiple access protocol:
❍ distributed algorithm that determines how stations share
channel, i.e., determine when station can transmit
❍ communication about channel sharing must use channel itself!
❍ type of protocols:
• synchronous or asynchronous
• information needed about other stations
• robustness (e.g., to channel errors)
• performance
66
2.3 Multiple Access Control Protocols
68
2.5 CSMA: Carrier Sense Multiple Access
CSMA: listen before transmit:
❒ If channel sensed idle: transmit entire pkt
❒ If channel sensed busy, defer transmission
❒ human analogy: don’t interrupt others!
69
2.6 CSMA/CD (Collision Detection)
70
CSMA/CD collision detection
71
Thank You
72