chap-3 media access
TRANSCRIPT
-
8/3/2019 Chap-3 Media Access
1/21
Mobile Communications
Chap -3 Media Access
-
8/3/2019 Chap-3 Media Access
2/21
2
Motivation for a specialized MAC
Can we apply media access methods from fixed networks?
So let us considercarrier sense multiple access with collision
detection, (CSMA/CD) which works as follows in wired Network.
A sender senses the medium (a wire or coaxial cable) to see if it is free. If
the medium is busy, the sender waits until it is free. If the medium is free,
the sender starts transmitting data and continues to listen into the medium.
If the sender detects a collision while sending, it stops at once and sends a
jamming signal. Why does this scheme fail in wireless networks?
signal strength decreases proportional to the square of the distance(ISI
Problem)
it might be the case that a sender cannot hear the collision, i.e., CD does
not work furthermore, CS might not work if, e.g., a terminal is hidden
-
8/3/2019 Chap-3 Media Access
3/21
-
8/3/2019 Chap-3 Media Access
4/21
4
Motivation:- hidden and exposed terminal
Exposed terminals B sends to A, C wants to send to another terminal (not A or B)
C has to wait, CS signals a medium in use
but A is outside the radio range of C, therefore waiting is not necessary
C is exposed to B
Now , B sends something
to A and C wants to send
data to some other mobile
phone outside the range of
A,B and C. C senses the carrier and detects that carrier is busy. Hence C post
pones its transmission. But as A is outside the interference range of C, waitingis not necessary. So in this situation , C is exposed to B.
BA C
A C
-
8/3/2019 Chap-3 Media Access
5/21
5
Motivation - near and far terminals
Terminals A and B send, C receives
signal strength decreases proportional to the square of the distance
the signal of terminal B therefore drowns out As signal
C cannot receive A
If C for example was an arbiter for sending rights, terminal B would drown outterminal A
A B C
-
8/3/2019 Chap-3 Media Access
6/21
MACA - collision avoidance
MACA (Multiple Access with Collision Avoidance) uses short signaling
packets for collision avoidance
RTS (request to send): a sender request the right to send from a receiver
with a short RTS packet before it sends a data packet
CTS (clear to send): the receiver grants the right to send as soon as it is
ready to receive
Signaling packets contain sender address
receiver address
packet size
-
8/3/2019 Chap-3 Media Access
7/21
MACA examples
MACA avoids the problem of hidden terminals
A and C want to
send to B
A sends RTS first
C waits after receiving
CTS from B
MACA avoids the problem of exposed terminals
B wants to send to A, C
to another terminal
now C does not have
to wait for it cannot
receive CTS from A
A B C
RTS
CTSCTS
A B C
RTS
CTS
RTS
-
8/3/2019 Chap-3 Media Access
8/218
Access Methods
To overcome this problems, signals can be divided into Different like
SDMA,FDMA,TDMA, and CDMA
1 ) SDMA :-
Space Division Multiple Access (SDMA) is used for allocating a
separated space to users in wireless networks.
A typical application involves assigning an optimal base station to a
mobile phone user. The mobile phone may receive several basestations with different quality. A MAC algorithm could now decide
which base station is best, taking into account which frequencies
(FDM), time slots (TDM) or code (CDM) are still available (depending
on the technology).
The basis for the SDMA algorithm is formed by cells . use directed antennas
Use cells to reuse frequencies
-
8/3/2019 Chap-3 Media Access
9/219
Access Methods
2) FDMA : -
Frequency division multiple access (FDMA) comprises all algorithms
allocating frequencies to transmission channels according to the
frequency division multiplexing (FDM) .
Allocation can either be fixed (as for radio stations).
Channels can be assigned to the same frequency at all times, i.e., FDMA,
or change frequencies according to a certain pattern, i.e., FDMA
combined with TDMA.
Furthermore, FDM is often used for simultaneous access to the medium
by base station and mobile station in cellular networks. Here the two
partners typically establish a duplex channel, i.e., a channel that allows
for simultaneous transmission in both directions. The two directions,
mobile station to base station and vice versa are now separated using
different frequencies. This scheme is then called frequency division
duplex (FDD).
-
8/3/2019 Chap-3 Media Access
10/2110
Access Methods
Again, both partners have to know the frequencies in advance; they
cannot just listen into the medium. The two frequencies are also known
as uplink, i.e., from mobile station to base station or from ground controlto satellite, and as downlink, i.e., from base station to mobile station or
from satellite to ground control.
As for example FDM and FDD, Figure shows the situation in a mobile
phone network based on the GSM standard for 900 MHz. The basicfrequency allocation scheme for GSM is fixed and regulated by national
authorities. All uplinks use the band between 890.2 and 915 MHz, all
downlinks use 935.2 to 960 MHz. According to FDMA, the base station,
shown on the right side, allocates a certain frequency for up- and
downlink to establish a duplex channel with a mobile phone.
-
8/3/2019 Chap-3 Media Access
11/21
FDD/FDMA - general scheme, example GSM
f
t
124
1
124
1
20 MHz
200 kHz
890.2 MHz
935.2 MHz
915 MHz
960 MHz
-
8/3/2019 Chap-3 Media Access
12/2112
Access Methods
3) TDMA : -
Compared to FDMA, time division multiple access (TDMA) offers a
much more flexible scheme, which comprises all technologies that
allocate certain time slots for communication.
Now tuning in to a certain frequency is not necessary, i.e., the receiver
can stay at the same frequency the whole time. Using only one
frequency, and thus very simple receivers and transmitters, many
different algorithms exist to control medium access. As alreadymentioned, listening to different frequencies at the same time is quite
difficult, but listening to many channels separated in time at the same
frequency is simple.
E.g. radio system because it allows several users to share the same
frequency channel by dividing and signal into different timeslots.
-
8/3/2019 Chap-3 Media Access
13/21
Access method CDMA
4) CDMA (Code Division Multiple Access)
all terminals send on the same frequency probably at the same time and can use the
whole bandwidth of the transmission channel each sender has a unique random number, the sender XORs the signal with this
random number
the receiver can tune into this signal if it knows the pseudo random number, tuning
is done via a correlation function
Advantages:
all terminals can use the same frequency, no planning needed
huge code space compared to frequency space
interferences is not
error correction and encryption can be easily integrated
Disadvantages: higher complexity of a receiver (receiver cannot just listen into the medium and start
receiving if there is a signal)
all signals should have the same strength at a receiver
-
8/3/2019 Chap-3 Media Access
14/21
-
8/3/2019 Chap-3 Media Access
15/21
CDMA in theory
The following (theoretical) example explains the basic function of CDMA
before it is applied to signals:
Two senders, A and B, want to send data. CDMA assigns the following
unique and orthogonal key sequences: key Ak = 010011 for sender A, key
BK = 110101 for sender B. Sender A wants to send the bit Ad = 1, sender B
sends Bd = 0. To illustrate this example, let us assume that we code a
binary 0 as 1, a binary 1 as +1. We can then apply the standard addition
and multiplication rules. Both senders spread their signal using their key as chipping sequence (the
term spreading here refers to the simple multiplication of the data bit with
the whole chipping sequence). In reality, parts of a much longer chipping
sequence are applied to single bits for spreading. Sender A then sends the
signal As = Ad*Ak = +1*(1, +1, 1, 1, +1, +1) = (1, +1, 1, 1, +1, +1).Sender B does the same with its data to spread the signal with the code:
Bs = Bd*Bk = 1*(+1, +1, 1, +1, 1, +1) = (1, 1, +1, 1, +1, 1).
-
8/3/2019 Chap-3 Media Access
16/21
CDMA in theory
Both signals are then transmitted at the same time using the same frequency,
so, the signals superimpose in space (analog modulation is neglected in this
example). Discounting interference from other senders and environmentalnoise from this simple example, and assuming that the signals have the
same strength at the receiver, the following signal C is received at a
receiver: C = As + Bs = (2, 0, 0, 2, +2, 0).
The receiver now wants to receive data from sender A and, therefore, tunes
in to the code of A, i.e., applies As code for despreading: C*Ak =(2, 0, 0, 2, +2, 0)*(1, +1, 1, 1, +1, +1) = 2 + 0 + 0 + 2 + 2 + 0 = 6. As
the result is much larger than 0, the receiver detects a binary 1. Tuning in to
sender B, i.e., applying Bs code gives C*Bk = (2, 0, 0, 2, +2, 0)* (+1, +1,
1, +1, 1, +1) = 2 + 0 + 0 2 2 + 0 = 6. The result is negative, so a 0
has been detected.
-
8/3/2019 Chap-3 Media Access
17/21
CDMA on signal level I
data A
key A
signal A
data key
key
sequence A
Real systems use much longer keys resulting in a larger distance
between single code words in code space.
1 0 1
10 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1
01 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0
Ad
Ak
As
-
8/3/2019 Chap-3 Media Access
18/21
CDMA on signal level II
signal A
data B
key B
keysequence B
signal B
As + Bs
data key
1 0 0
00 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 111 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1
Bd
Bk
Bs
As
-
8/3/2019 Chap-3 Media Access
19/21
CDMA on signal level III
Ak
(As + Bs)
* Ak
integrator
output
comparator
output
As + Bs
data A
1 0 1
1 0 1 Ad
-
8/3/2019 Chap-3 Media Access
20/21
CDMA on signal level IV
integrator
output
comparator
output
Bk
(As + Bs)
* Bk
As + Bs
data B
1 0 0
1 0 0 Bd
-
8/3/2019 Chap-3 Media Access
21/21
comparator
output
CDMA on signal level V
wrong
key K
integrator
output
(As + Bs)
* K
As + Bs
(0) (0) ?