+ All Categories
Home > Documents > Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the...

Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the...

Date post: 12-Jan-2016
Category:
Upload: kristopher-peters
View: 219 times
Download: 0 times
Share this document with a friend
Popular Tags:
87
Chapter 3: Medium Access Control
Transcript
Page 1: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Chapter 3:Medium Access Control

Page 2: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation

The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC schemes from wired networks.For example: CSMA/CDLet us consider carrier sense multiple access with collision detection (CDMA/CD) which works as follow:A sender senses the medium (a wire) to see if it is free. If the medium is busy, the sender waits until it is free.

Page 3: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation

If the medium is free, the sender starts transmitting data and continues to listen into the medium.If the sender now detects a collision while sending it stops at once and sends a jamming signal. why does this scheme fall in wireless networks?CDMA/CD is not really interested in collisions at the sender, but rather in those at the receiver.The signal should reach the receiver without collisions.

Page 4: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation

But the sender is the one detecting collisions.This is not a problem using a wire, and if a collision occurs somewhere in the wire, everybody will notice it.The situation is different in wireless networks.The strength of a signal decreases proportionally to the square of the distance to a sender.The sender may now apply carrier senses and detect an idle medium.Thus the sender start sending-but a collision happens at the receiver due to a second sender.

Page 5: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation

This is hidden terminal problem. That is happen to the collision detection.The sender detects no collision assumes that the data has been transmitted without errors, but actually a collision.The destroyed the data at the receiver.Thus this very common MAC scheme from wire network fails in a wireless scenario.

Page 6: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation - hidden and exposed terminals

Hidden terminals Consider the situation as show in figure. A sends to B, C cannot receive A C wants to send to B, C senses a “free” medium (CS

fails) collision at B, A cannot receive the collision (CD

fails) A is “hidden” for C

Page 7: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation - hidden and exposed terminals

BA CBACBA

Page 8: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation - hidden and exposed terminals

Exposed terminals Consider the situation as show in figure. B sends to A, C wants to send to another terminal

(not A or B) C has to wait, CS signals a medium in use but A is outside the radio range of C, therefore

waiting is not necessary C is “exposed” to B

Page 9: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation - near and far terminals

Consider the situation as show in figure.A and B are both sending with the same transmission power.As the signal strength decreases proportionally to the square of the distance, B’s signal drowns out A’s signal.As a result, C cannot receive A’s transmission.The near/far effect is a several problem of wireless networks using CDM.All signals should arrive at the receiver with more or less the same strength.

Page 10: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation - near and far terminals

A B C

Page 11: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Motivation - near and far terminals

E.g. A person standing closer to somebody could always speak louder than a person further away.Even if the sender were separated by code, the closest one would simply drown out the others.Thus, precise power control is needed to receive all senders with the same strength at a receiver.

Page 12: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

SDMA

Space division multiple access (SDMA) is used for allocating a separated space to users in wireless networks.A typical application involves assigning a optimal base station to mobile phone user.The mobile phone may receive several base stations with different quality.A MAC algorithm could now decide which base station is best, taking into account which frequencies (FSM), time slots (TDM) or code (CDM) are still available.

Page 13: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

SDMA

Typically, SDMA is never used in isolation but always in combination with one or more other schemes.The basis for the SDMA algorithm is formed by cells and sectorized antennas which constitute the infrastructure implementing space division multiplexing (SDM).

Page 14: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

FDMA

Frequency division multiple access (FDMA) comprises all algorithms allocating frequencies to transmission channels according to the frequency division multiplexing (FDM).Allocation can either be fixed (e.g.-radio station) or dynamic (e.g.- demand driven).Channels can be assigned to the same frequency at all times that is pure FDMA, or change frequencies according to a certain patter, that is FDMA combined with TDMA.

Page 15: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

FDMA

The other example of many wireless systems to narrowband interference at certain frequencies known as frequency hopping.Sender and receiver have to agree on a hopping pattern otherwise the receiver could not tune to the right frequency.Thus hopping pattern are typically fixed, at least for a longer period.The fact that it is not possible to arbitrarily jump in the frequency space.

Page 16: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

FDMA

Example : slow hopping (e.g., GSM), fast hopping (FHSS) Frequency Hopping Spread Spectrum)Furthermore, FDM is often used for simultaneous access to the medium by base station and mobile station in cellular networks. Here, the two partners typically establish a duplex channel.The two directions, Mobil station to base station and vice versa are now separated using different frequencies.

Page 17: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

FDMA

This scheme is then called frequency division duplex (FDD).The two frequencies are also known as uplink, that is from mobile station to base station or from ground control to satellite and as downlink that is base station to mobile station or from satellite to ground control.As example for FDM and FDD show in next slide figure in that situation in a mobile phone network base on the GSM standard for 900 MHz.The basic frequency allocation scheme for GSM is fixed.

Page 18: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

FDD/FDMA - general scheme, example GSM

f

t

124

1

124

1

20 MHz

200 kHz

890.2 MHz

935.2 MHz

915 MHz

960 MHz

Page 19: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

TDMA

Compared to FDMA, time division multiple access (TDMA) offers a much more flexible scheme, which comprises all technologies that allocated certain time slots for communication, that is controlling TDM now tuning in a certain frequency in not necessary, that is the receiver can stay at the same frequency the whole time.Using only one frequency and thus every simple receivers and transmitters many different algorithms exist to control medium access.

Page 20: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

TDMA

As already mentioned listening to different frequencies at the same time is quite difficult, but listening to many channels separated in time at the same frequency is simple.Now synchronization between sender and receiver has to be achieved in the time domain.This can be done by using a fixed pattern that is allocating a certain time slot for a channel or by using dynamic allocation scheme.

Page 21: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

TDMA

Dynamic allocation schemes require an identification for each transmission as this is the case for typical wired MAC schemes (e.g.-sender address)Fixed schemes do no need an identification, but these are not as flexible considering.Varying bandwidth requirements, there are several examples for fixed and dynamic schemes as used for wireless transmission.Typically, those schemes can be combined with FDMA to achieve even greater flexibility.

Page 22: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Fixed TDM

The simplest algorithm for using TDM is allocating time slots for channels in a fixed pattern.This results in a fixed bandwidth and is the typical solution for wireless phone system.The fixed pattern can be assigned by the base station, where competition between different mobile stations that want to access the medium is solved.TDMA scheme with fixed access patterns are used for many digital mobile phone systems like IS-54,IS-136,GSM,DECT,PHS and PACS.

Page 23: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Fixed TDM

The next slide figure these fixed TDM patterns are used to implement multiple access and a duplex channel between a base station and mobile station.Assigning different slots for uplink and downlink using the same frequency is called time division duplex (TDD).As shown in the figure, the base station uses one out of 12 slots for the downlink, whereas the mobile station uses one out of 12 different slots for the uplink.Uplink and downlink are separated in time and each connection is allotted its own up and downlink pair.

Page 24: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

TDD/TDMA - general scheme, example DECT

1 2 3 11 12 1 2 3 11 12

tdownlink uplink

417 µs

Page 25: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

What is Aloha?

Aloha, also called the Aloha method, refers to a simple communications scheme in which each source (transmitter) in a network sends data whenever there is a frame to send. If the frame successfully reaches the destination (receiver), the next frame is sent.There are different types of Aloha:

Classical AlohaSlotted Aloha

Page 26: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Classical Aloha

This is exactly what the classical Aloha scheme does, a scheme which was invented at the university of Hawaii and was used in the ALOHANET for wireless connection of several stations.Aloha neither co-ordinates medium access nor does it resolve contention on the MAC layer.Instead each station can access the medium at any time as shown in next slide figure.This is a random access scheme, without a central arbiter controlling access and without co-ordination, among the stations.

Page 27: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Classical Aloha

In two or more stations access the medium at the same time, a collision occurs and the transmitted data is destroyed.Resolving this problem is to retransmission of data.

Page 28: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Classical Aloha

sender A

sender B

sender C

collision

t

Page 29: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Slotted Aloha

"Slotted Aloha" reduces the chance of collisions by dividing the channel into time slots and requiring that the user send only at the beginning of a time slot. Aloha was the basis for Ethernet, a local area network protocol.In this case, all senders have to be synchronized, transmission can only start at the begin of a time slot as shown a figure.Under the assumption stated above, the introduction of slots raises the throughput from 18 to 36 percent that is slotting double the throughput.

Page 30: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Slotted Aloha

sender A

sender B

sender C

collision

t

Page 31: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Carrier sense multiple access (CDMA)

One improvement to the basic Aloha is sensing the carrier before accessing the medium.This is what carrier sense multiple access (CSMA) schemes generally do the sensing the carrier and accessing the medium only if the carrier is idle decreases the probability of a collision.But as already mentioned in the introduction, hidden terminals cannot be detected.Thus if a hidden terminal transmits at the same time as another sender, a collision might occur at the receiver.

Page 32: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Carrier sense multiple access (CDMA)

Still, this basic scheme is used in most wireless LANs.Several versions of CSMA exist.Non-persistent CSMA:

The stations sense the carrier and start sending immediately if the medium is idle.If the medium is busy the station pauses a random amount of time before sensing the medium again and repeating this pattern.

Page 33: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Carrier sense multiple access (CDMA)

P-Persistent CSMA:

In systems nodes also sense the medium, but only transmit with a probability of P, with the station reschedule to the next slot with the probability P that is access is slotted in addition.

I-Persistent CSMA:

in systems all stations wishing to transmit access the medium at the same time, as soon as it becomes idle.

Page 34: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Carrier sense multiple access (CDMA)

CSMA with collision avoidance (CSMA/CD) is one of the access schemes used in wireless LANs following the standard IEEE 802.11.

Page 35: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Demand assigned multiple access (DAMA)

A general improvement of aloha access systems can also be achieved by reservation mechanisms and combinations with some (fixed) TDM patterns.These schemes typically have a reservation period followed by a transmission period.During the reservation period, stations can reserve future slots in the transmission period.

Page 36: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Demand assigned multiple access

While, depending on the scheme, collision may occur during the reservation period, the transmission period can then be accessed without collision or split into transmission periods with and without collision.In general these schemes cause a higher delay under a light load, but allow higher throughput.One basic scheme is demand assigned multiple access (DAMA) also called reservation Aloha, a scheme typical for satellite system.

Page 37: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Demand assigned multiple access

Show in this next slide figure has two modes.ALOHA mode for reservation:competition for small reservation slots, collisions possible Reserved mode for data transmission within successful reserved slots (no collisions possible)During a contention phase following the slotted Aloha scheme, all stations can try to reserve future slots.

Page 38: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Demand assigned multiple access

For example, different stations on earth try to reserve access time for satellite transmission.Thus collisions during the reservation phase do not destroy data transmission, but only the short requests for data transmission.If successful, a time slot in the future is reserved, and no other station is allowed to transmit during this slots.

Page 39: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Demand assigned multiple access

Aloha reserved Aloha reserved Aloha reserved Aloha

collision

t

Page 40: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Demand assigned multiple access

Therefore, the satellite collects all successful requests and sends back a reservation list indicating access rights for future slots.All ground stations have obey this list.To maintain the fixed TDM pattern of reservation and transmission, the stations have to be synchronized from time to time.DAMA is an explicit reservation scheme.Each transmission slot has to be reserved explicitly.

Page 41: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Packet Reservation Multiple Access(PRMA)

An example for an implicit reservation scheme is packet reservation multiple access (PRMA).Here, slots can be reserved implicitly according to the following scheme.Show in the figure a certain number of slots forms a frame.The frame is repeated in time, that is a fixed TDM pattern is applied.The base station now broadcasts the status of each slot to all mobile stations.

Page 42: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Packet Reservation Multiple Access(PRMA)

frame1

frame2

frame3

frame4

frame5

1 2 3 4 5 6 7 8 time-slot

collision at reservation attempts

A C D A B A F

A C A B A

A B A F

A B A F D

A C E E B A F Dt

ACDABA-F

ACDABA-F

AC-ABAF-

A---BAFD

ACEEBAFD

reservation

Page 43: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Packet Reservation Multiple Access(PRMA)

All stations receiving this vector will then know which slot is occupied and which slot is currently free.In the example, the base station broadcasts the reservation status ‘ACDABA-F’ to all stations, here, A to F.This means that slots one to six and eight are occupied, but slot seven is free in the following transmission.All stations wishing to transmit for this free slot in Aloha fashion.In the example shown, more than one station wants to access this slot, thus a collision occurs.

Page 44: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Packet Reservation Multiple Access(PRMA)

The base station returns the reservation status ‘ACDABA-F’ indicating that the reservation of slot seven failed and that nothing has changed for the other slots.Again stations can compete for this slot.Additionally, station D has stopped sending in slot three and station F in slot eight.This is noticed by the base station after the second frame.Before the third frame starts, the base station indicates that slots three and eight are now idle.

Page 45: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Packet Reservation Multiple Access(PRMA)

Additionally, station F has succeeded in reserving slot seven as also indicated by the base station.PRMA constitutes yet another combination of fixed and random TDM schemes with reservation compared to the previous schemes.As soon as a station has succeeded with a reservation, all future slots are implicitly reserved for this station.This ensures transmission with a guaranteed data rate.The slotted aloha scheme is used for idle slots only, data transmission is not destroyed by collision.

Page 46: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Access Method DAMA: Reservation TDMA

An even more fixed pattern that still allows some random access exhibited by reservation TDMA.Show in the figure.

N mini-slots N * k data-slots

reservationsfor data-slots

other stations can use free data-slotsbased on a round-robin scheme

e.g. N=6, k=2

Page 47: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Access Method DAMA: Reservation TDMA

every frame consists of N mini-slots and x data-slots every station has its own mini-slot and can reserve up

to k data-slots using this mini-slot (i.e. x = N * k). other stations can send data in unused data-slots

according to a round-robin sending scheme (best-effort traffic)

Page 48: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

MACA - collision avoidance

MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance

RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet

CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive

Page 49: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

MACA-Collision Avoidance

Signaling packets contain sender address receiver address packet size

Variants of this method can be found in IEEE802.11 as DFWMAC (Distributed Foundation Wireless MAC)

Page 50: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

MACA examples

MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B

A B C

RTS

CTSCTS

Page 51: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

MACA-Collision Avoidance

MACA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot

receive CTS from A

A B C

RTS

CTS

RTS

Page 52: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

MACA variant: DFWMAC in IEEE802.11

idle

wait for the right to send

wait for ACK

sender receiver

packet ready to send; RTS

time-out; RTS

CTS; data

ACK

RxBusy

idle

wait fordata

RTS; RxBusy

RTS; CTS

data; ACK

time-out data; NAK

ACK: positive acknowledgementNAK: negative acknowledgement

RxBusy: receiver busy

time-out NAK;RTS

Page 53: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

MACA variant: DFWMAC in IEEE802.11

Show in the previous slide figure, to simplified state machines for a sender and receiver that could realize MACA.The sender is idle until a user requests the transmission of a data packet.The sender then issues an RTS and waits for the right to send.If the receiver gets an RTS and is in an idle state, it sends back a CTS and waits for would send an RTS again a time-out.

Page 54: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

MACA variant: DFWMAC in IEEE802.11

After transmission of the data the sender waits for a positive acknowledgement to return into an idle state.The receiver sends back a positive acknowledgement if the received data was correct.Otherwise, or if the waiting time for data is too long, the receiver returns into idle state.If the sender does not receive any acknowledgment or a negative acknowledgement, it sends an RTS and again waits for the right to send.

Page 55: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

MACA variant: DFWMAC in IEEE802.11

Additionally, a receiver could indicate that it is currently busy via a separate RxBusy.Real implementations have to add more states and transitions, e.g. in order to limit the number of retries.

Page 56: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Polling In the case where one station is to be heard by all

others, polling schemes as known from the mainframe/terminal world can be applied.

Polling is a strictly centralized scheme with one master station and several slave stations.

The master can poll the slaves according to many schemes: Round robin & randomly, According to reservations, etc.

Example: Randomly Addressed Polling Base station signals readiness to all mobile

terminals.

Page 57: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Polling

Terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address).

The base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address) .

The base station acknowledges correct packets and continues polling the next terminal.

This cycle starts again after polling all terminals of the list.

Page 58: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

ISMA (Inhibit Sense Multiple Access)

Another combination of different schemes is represented by inhibit sense multiple access (ISMA).

In this scheme Current state of the medium is signaled via a “busy tone” The base station signals on the downlink (base

station to terminals) if the medium is free or not. Terminals must not send if the medium is busy. Terminals can access the medium as soon as the

busy tone stops.

Page 59: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

ISMA (Inhibit Sense Multiple Access) The base station acknowledges successful

transmission, a mobile station detects a collision only via the missing positive acknowledgement.

In case of collisions, additional back-off and retransmission mechanisms are implemented.

This Mechanism used, e.g., for Cellular Digital Packet Data (CDPD) in the Advance mobile phone system (AMPS) mobile phone system, also known as digital sense multiple access (DSMA).

Page 60: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

ISMA (Inhibit Sense Multiple Access)

Fig: Inhibit sense multiple access using a busy tone

Page 61: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

What is CDMA?

CDMA is spread spectrum based fastest growing digital wireless technology.

It is an advanced digital technology that can offer about 7 to 10 times the capacity of analog technologies and up to 6 times the capacity of digital technology such as TDMA.

Page 62: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

How CDMA Work

The words code and division are important parts of how CDMA works.

CDMA uses codes to convert between analog voice signals and digital signals.

CDMA also uses codes to separate voice and control data in to data stream called channels.

Page 63: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA Signal Generation

There are five steps in CDMA signal generation. Analog to Digital Conversion Vocoding Encoding and Interleaving Channelizing the signals Conversion of the digital signal to a Radio

Frequency (RF) signal. The use of codes is a key part of this process.

Page 64: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA Signal Generation

A/D Conversion: The first step of CDMA signal generation is analog

to digital conversion, sometimes called A/D conversion.

CDMA uses a technique called Pulse Code Modulation (PCM) to accomplish A/D conversion.

Voice compression: The second step of CDMA signal generation is

voice compression. CDMA uses a device called a vocoder to

accomplish voice compression.

Page 65: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA Signal Generation

The term “vocoder” is a contraction of the words “voice” and “code”.

Vocoders are located at the base station controller (BSC) and in the phone.

Variable length vocoders: A CDMA vocoder varies compression of the voice signal

into one of four data rates based on the rate of the user’s speech activity.

The four rates are: full, 1/2,1/4, and 1/8. The vocoder uses its full rate when a person is taking

very fast. It uses the 1/8 rate when the person is silent or nearly so.

Page 66: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA Signal Generation

Encoding & interleaving: Encoders and interleaves are built into the base

transceiver station (BTS) and the phones. The purpose of the encoding and interleaving is

to build redundancy into the signal so that information lost in transmission can be recovered.

Page 67: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Advantages CDMA

Coverage: CDMA’S features result in coverage that is

between 1.7 and 3 times that of TDMA. Power control helps the network dynamically

expand the coverage area. Coding and interleaving provide the ability to

cover a larger area for used in other systems.

Page 68: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Advantages CDMA

Capacity: CDMA capacity is ten to twenty times that of analog

systems, and it’s up to four times that of TDMA. Reasons for this include: CDMA users are separated by codes, not frequencies. Power control minimizes interference, resulting in

maximized capacity. CDMA’s soft handoff also helps increase capacity. This is because a soft handoff requires less power.

Page 69: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Advantages CDMA Clarity: Often CDMA systems can achieve “wireline” clarity

because of CDMA’s strong digital processing. The rake receiver reduces errors. The variable rate vocoder reduces the amount of data

transmitted per person, reducing interference. The soft handoff also reduces power requirements and

interference. Power control reduces errors by keeping power at an

optimal level. CDMA’s wide band signal reduces fading. Encoding and interleaving reduce errors that result

from fading.

Page 70: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Advantages CDMA

Cost: CDMA’s better coverage and capacity result in

cost benefits: Increased coverage per base transceiver station

(BTS) means fewer are needed to cover a given area.

This reduces infrastructure costs for the providers. Increased capacity increases the service provider’s

revenue potential. CDMA costs per subscriber has steadily declined

since 1995 for both cellular and PCS applications.

Page 71: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Advantages CDMA

Compatibility: CDMA phones are usually dual mode. This

means they can work in both CDMA systems and analog cellular systems.

Some CDMA phones are dual band as well as dual mode.

They can work in CDMA mode in the personal communication service (PCS) band, CDMA mode in the cellular band, or analog mode in an analog cellular network.

Page 72: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Advantages CDMA

Customer Satisfaction: CDMA results in greater customer satisfaction

because CDMA provides better: Voice quality Longer batter life due to reduced power

requirements No cross-talk because of CDMA’s unique

coding Privacy- again, because of coding.

Page 73: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Disadvantages CDMA

Higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal).

All signals should have the same strength at a receiver.

Page 74: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA in theory

Sender A sends Ad = +1, key Ak = 010011 (assign: “0”=

-1, “1”= +1) sending signal As = Ad * Ak = (-1, +1, -1, -1,

+1, +1) Sender B

sends Bd = 0, key Bk = 110101 (assign: “0”= -1, “1”= +1)

sending signal Bs = Bd * Bk = (-1, -1, +1, -1, +1, -1)

Page 75: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA in theory

Both signals superimpose in space interference neglected (noise etc.) C=As + Bs = (-2, 0, 0, -2, +2, 0) Receiver wants to receive signal from sender A apply A’s code for despreading : c*Ak= Ae = (-2, 0, 0, -2, +2, 0) *(-1, +1, -1, -1, +1, +1) = 2 + 0 + 0 + 2 + 2 + 0 = 6 result greater than 0, therefore, original bit was

“1”

Page 76: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA in theory

receiving B Be = (-2, 0, 0, -2, +2, 0) (-1, -1, +1, -1, +1,

-1) = -2 + 0 + 0 - 2 - 2 + 0 = -6, i.e. “0”

Page 77: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA on signal level I

The next slide figure shows a sender A that wants to transmit the bits 101.

The key of A is shown as signal and binary key sequence Ak.

After spreading, i.e., XORing Ad and Ak the resulting signal is As.

Page 78: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA on signal level I

data A

key A

signal A

data key

key sequence A

Real systems use much longer keys resulting in a larger distance between single code words in code space.

1 0 1

10 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1

01 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0

Ad

Ak

As

Page 79: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA on signal level II

Next slide figure shows: The same happens with data from sender B,

here the bits are 100. The result of spreading with the code is the

signal Bs. As and Bs now superimpose during

transmission. Thus the resulting signal is simply the sum

As+Bs as in next slide figure.

Page 80: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA on signal level II

signal A

data B

key B

keysequence B

signal B

As + Bs

data key

1 0 0

00 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1

11 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1

Bd

Bk

Bs

As

Page 81: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA on signal level III

Next slide figure shows: A receiver now tries to reconstruct the original

data from A, Ad. Therefore the receiver applies A’s key, Ak to

the received signal and feeds the result into an integrator.

The integrator adds the products and a comparator then has to decide if the result is a 0 or 1 as shown in next figure.

Page 82: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA on signal level III

Ak

(As + Bs) * Ak

integratoroutput

comparatoroutput

As + Bs

data A

1 0 1

1 0 1 Ad

Page 83: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA on signal level IV

Next slide figure shows: A receiver wants to receive B’s data and the

comparator can easily detect the original data. Looking at (As+Bs)*Bk on can also imagine

what could happen if A’s signal was much stronger.

The little peaks which are now caused by A’s signal would be much higher, and thus the result of the integrator would be wrong.

Page 84: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA on signal level IV

integratoroutput

comparatoroutput

Bk

(As + Bs) * Bk

As + Bs

data B

1 0 0

1 0 0 Bd

Page 85: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

CDMA on signal level V Next slide figure shows: What happens if a receiver has the wrong key or is

not synchronized with the chipping sequence of the transmitter.

The integrator still presents a value after each bit period but now it is not always possible for the comparator to decide for a 1 or a 0 as the signal rather resembles noise.

Even if the comparator could detect a clear 1 this could still not reconstruct the whole bit sequence transmitted by a sender.

Page 86: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

comparatoroutput

CDMA on signal level V

wrong key K

integratoroutput

(As + Bs) * K

As + Bs

(0) (0) ?

Page 87: Chapter 3: Medium Access Control. Motivation The main question in connection with MAC in the wireless is whether it is possible to use complicated MAC.

Comparison SDMA/TDMA/FDMA/CDMAApproach SDMA TDMA FDMA CDMA Idea segment space into

cells/sectors segment sending time into disjoint time-slots, demand driven or fixed patterns

segment the frequency band into disjoint sub-bands

spread the spectrum using orthogonal codes

Terminals only one terminal can be active in one cell/one sector

all terminals are active for short periods of time on the same frequency

every terminal has its own frequency, uninterrupted

all terminals can be active at the same place at the same moment, uninterrupted

Signal separation

cell structure, directed antennas

synchronization in the time domain

filtering in the frequency domain

code plus special receivers

Advantages very simple, increases capacity per km²

established, fully digital, flexible

simple, established, robust

flexible, less frequency planning needed, soft handover

Dis-advantages

inflexible, antennas typically fixed

guard space needed (multipath propagation), synchronization difficult

inflexible, frequencies are a scarce resource

complex receivers, needs more complicated power control for senders

Comment only in combination with TDMA, FDMA or CDMA useful

standard in fixed networks, together with FDMA/SDMA used in many mobile networks

typically combined with TDMA (frequency hopping patterns) and SDMA (frequency reuse)

still faces some problems, higher complexity, lowered expectations; will be integrated with TDMA/FDMA


Recommended