Wireless Media Access Control (MAC)
|
|
- Todd Hardy
- 7 years ago
- Views:
Transcription
1 Wireless Media Access Control (MAC) Li-Hsing Yen National University of Kaohsiung What is it all about? Consider an audioconference where if one person speaks, all can hear if more than one person speaks at the same time, both voices are garbled How should participants coordinate actions so that the number of messages exchanged per second is maximized time spent waiting for a chance to speak is minimized This is the multiple access problem 1
2 Some Simple Solutions Use a moderator a speaker must wait for moderator to call on him or her, even if no one else wants to speak what if the moderator s connection breaks? Distributed solution speak if no one else is speaking but if two speakers are waiting for a third to finish, guarantee collision Designing good schemes is surprisingly hard! Contexts for the Multiple Access Problem Broadcast transmission medium message from any transmitter is received by all receivers Colliding messages are garbled Goal maximize message throughput minimize mean waiting time 2
3 Solving the Problem First, choose a base technology to isolate traffic from different stations can be in time domain or in frequency domain Then, choose how to allocate a limited number of transmission resources to a larger set of contending users Design Choices Centralized vs. distributed design is there a moderator or not? in a centralized solution one of the stations is a master and the others are slaves in a distributed solution, all stations are peers Circuit-mode vs. packet-mode do stations send steady streams or bursts of packets? with streams, doesn t make sense to contend for every packet with packets, makes sense to contend for every packet to avoid wasting bandwidth 3
4 Constraint: Spectrum Scarcity radio spectrum is hard to come by only a few frequencies available for longdistance communication multiple access schemes must be careful not to waste bandwidth Constraint: Radio Link Properties radio links are error prone fading multipath interference hidden terminals transmitter heard only by a subset of receivers capture on collision, station with higher power overpowers the other lower powered station may never get a chance to be heard 4
5 Performance Metric: Normalized Throughput (Goodput) fraction of link capacity used to carry nonretransmitted packets example with no collisions, 1000 packets/sec with a particular scheme and workload, 250 packets/sec goodput = 0.25 Performance Metric: Stability with heavy load, is all the time spent on resolving contentions? Yes unstable with a stable algorithm, throughput does not decrease with offered load if infinite number of uncontrolled stations share a link, then instability is guaranteed but if sources reduce load when overload is detected, can achieve stability 5
6 Performance Metrics: Mean Delay and Fairness Mean delay amount of time a station has to wait before it successfully transmits a packet depends on the load and the characteristics of the medium Fairness no single definition no-starvation : source eventually gets a chance to send Base Technologies Isolates data from different sources Three basic choices Frequency division multiple access (FDMA) Time division multiple access (TDMA) Code division multiple access (CDMA) 6
7 Frequency-Division Multiple Access (FDMA) Each user is assigned a different radio frequency (channel) Channel information may be transmitted in a dedicated frequency Frequency... guard band FDMA Simplest Best suited for analog links Each station has its own frequency band, separated by guard bands Receivers tune to the right frequency Number of frequencies is limited reduce transmitter power; reuse frequencies in nonadjacent cells 7
8 Time-Division Multiple Access (TDMA) Users are assigned time slots to share a physical channel All stations transmit data on same frequency, but at different times => needs time synchronization guard time frame Time TDMA: Pros and Cons Pros users can be given different amounts of bandwidth mobiles can use idle times to determine best base station can switch off power when not transmitting Cons synchronization overhead greater problems with multipath interference on wireless links 8
9 TDMA Over FDMA Cellular systems always overlays TDMA on top of an FDMA structure Frequency Time Spread Spectrum Modulation Schemes spread spectrum ( 展頻 ): uses a wider spectrum than is strictly necessary for carrying the transmitter s signal DSSS Direct Sequence Spread Spectrum FHSS Frequency Hopping Spread Spectrum Users separated both by time and frequency Send at a different frequency at each time slot OFDMA Orthogonal Frequency Division Multiple Access 9
10 Code Division Multiple Access (CDMA) Frequency-hopping CDMA (FH/CDMA) each station transmits at a particular frequency for a short duration, then hops to another frequency Direct-sequence CDMA (DS/CDMA) each bit of the transmitter is replaced by a codeword, i.e., a sequence of bits (chips) orthogonal codewords must be chosen to prevent too much confusion at a receiver Direct-Sequence CDMA: Basic Principle Break each bit into k chips according to a fixed pattern specific to each user Bit data rate D kd chips per second Example: the code for A: c A = 1,-1,-1,1,-1,1 k =6 User A 1 0 1,-1,-1,1,-1,1-1,1,1,-1,1,-1 (complement) Decoding function Σ=6 Σ=-6 10
11 DS/CDMA: Multiple Users User A User B User C c A c B c C User B 1, 1,-1,-1, 1, Decoding with c A c A Σ=0-1, 1, 1,-1, 1, User A Decoding with c c B B Σ=0 c A and c B are orthogonal DS/CDMA Example: k = 8 A: ( ) B: ( ) C: ( ) D: ( ) C B+C A+B A+B +C A+B+C+D A+B+C +D S 1 = ( ) S 2 = ( ) S 3 = ( ) S 4 = ( ) S 5 = ( ) S 6 = ( ) 用 C 的 code 解碼 S 1 C = S 1 C = k S 2 C = S 2 C = k S 3 C = S 3 C = 0 S 4 C = S 4 C = k S 5 C = S 5 C = k S 6 C = S 6 C = -k C 傳 0 C 傳 1 C 沒傳 11
12 Theoretical Foundation A C = 0 and A C = 0 if A and C are orthogonal X (A+B+C +D) = X A + X B + X C + X D If X = C then X A = X B = X D = 0 X (A+B+C +D) = X C Pros CDMA hard to spy immune from narrowband noise no need for all stations to synchronize no hard limit on capacity of a cell all cells can use all frequencies 12
13 CDMA Cons implementation complexity need for power control to avoid capture need for a large contiguous frequency band (for direct sequence) problems installing in the field OFDMA Assign subsets of subcarriers to individual users Allows simultaneous low data rate transmissions from several users 13
14 OFDM Orthogonal Frequency Division Multiplexing Direct signal. Original reflected signal. Longer reflected signal. In OFDM, 10 (say) serial bits are converted into 10 parallel bits, each of which modulates its own radio carrier. Each carrier is now carrying a bit rate that is 1/10 th the bit rate of the original. A reflected signal path needs to be 10 times longer to cause the same interference. Longer paths are more attenuated so the strength of the interference is also less. FDD and TDD Two ways of converting a wireless medium to a duplex channel In Frequency Division Duplex, uplink and downlink use different frequencies In Time Division Duplex, uplink and downlink use different time slots Can combine with FDMA/TDMA Examples TDD/FDMA in second-generation cordless phones FDD/TDMA/FDMA in digital cellular phones 14
15 Classification of Multiple- Access Schemes Access Schem es Centralized Distributed Circuit M ode Packet Mode Packet M ode Cellular telephony Polling Reservation Decentralized polling CSM A BTM A and M ACA ALOHA Centralized Access Schemes One station is master, and the other are slaves slave can transmit only when master allows Natural fit in some situations wireless LAN, where base station is the only station that can see everyone cellular telephony, where base station is the only one capable of high transmit power 15
16 Centralized Access Schemes Pros simple master provides single point of coordination Cons master is a single point of failure need a re-election protocol master is involved in every single transfer => added delay Centralized Circuit-Mode Access Schemes When station wants to transmit, it sends a message to master using packet mode Master allocates transmission resources to slave Slave uses the resources until it is done No contention during data transfer Used primarily in cellular phone systems EAMPS: FDMA GSM/IS-54: TDMA IS-95: CDMA 16
17 Centralized Packet-Mode Access Scheme: Polling master asks each station in turn if it wants to send (roll-call polling) inefficient if only a few stations are active, overhead for polling messages is high, or system has many terminals Centralized Packet-Mode Access Scheme: Probing stations are numbered with consecutive logical addresses assume station can listen both to its own address and to a set of multicast addresses master does a binary search to locate next active station BS polls 0** 00* 01* Station replies collide collide Station transmits (assumed addresses: )
18 Centralized Packet-Mode Access: Reservation-Based Schemes master coordinates access to link using reservations Some time slots devoted to reservation messages can be smaller than data slots => minislots Stations contend for a minislot (or own one) Master decides winners and grants them access to link Packet collisions are only for minislots, so overhead on contention is reduced Minislots minislots data slots data slots data slots data slots data slots data slots reserved Reservation requests 18
19 Distributed Schemes Compared to a centralized scheme more reliable have lower message delays often allow higher network utilization but are more complicated Almost all distributed schemes are packet mode (why?) Decentralized Polling Just like centralized polling, except there is no master Each station is assigned a slot that it uses if nothing to send, slot is wasted Also, all stations must share a time base 19
20 Decentralized Probing Also called tree based multiple access without a master (BS) Works poorly with many active stations, or when all active stations are in the same subtree (assumed addresses: ) All 0** stations transmit packets All 00* stations transmit packets station 000 transmits packet station 001 transmits packet All 01* stations transmit packets collide collide ALOHA and Its Variants one of the earliest MAC schemes Just send it! Wait for ACK Unlike polling/probing, a node with something to send doesn t have to wait for a master, or for its turn in a schedule Collisions occur when two or more stations transmit at the same time On collisions, try again after a random waiting time The range of random is fixed (no exponential backoff) channel utilization around 18% 20
21 Pros Evaluating ALOHA useful when a is large, so carrier sensing doesn t help satellite links simple no carrier sensing, no token, no timebase synchronization independent of a Cons under some mathematical assumptions, goodput is at most 18% at high loads, collisions are very frequent sudden burst of traffic can lead to instability unless backoff is exponential The Parameter a The number of packets sent by a source before the farthest station receives the first bit propagation delay a = transmission time 21
22 Slotted ALOHA A simple way to double ALOHA s capacity The time is divided into a number of time slots When a station has information to send, it waits for a time slot and then transmits window of vulnerability L Earliest start time for colliding packet 2L ALOHA L time Latest start time for colliding packet L L Slotted ALOHA L time Packet Generation Time Vs. Packet Transmission Time In Aloha, packet generation time = packet transmission time In Slotted-Aloha, packet generation time packet transmission time in most cases Slot i Slot i+1 L L time Only packets generated in this time period will collide with L All packets generated in this time period will be sent in the next slot 22
23 Reservation ALOHA (R-ALOHA) Combines slot reservation with slotted ALOHA Contend for reservation minislots using slotted ALOHA Stations independently examine reservation requests and come to consistent conclusions Simplest version divide time into frames = fixed length set of slots station that wins access to a reservation minislot using S- ALOHA can keep slot as long as it wants station that loses keeps track of idle slots and contends for them in next frame Evaluating R-ALOHA Pros supports both circuit and packet mode transfer works with large a simple Cons arriving packet has to wait for entire frame before it has a chance to send cannot preempt hogs variants of R-ALOHA avoid these problems 23
24 Carrier Sense Multiple Access (CSMA) A fundamental advance over Aloha: check whether the medium is busy before sending a packet (i.e carrier sensing) Aloha does not perform carrier sensing If medium is idle, then send If medium is busy, then wait the probability of collisions is reduced Carrier Sense: Medium Idle B wants to send to C at this time A B C The medium is idle so B starts sending Data time 24
25 Carrier Sense: Medium Busy Data B wants to send to C at this time A B C The medium Is busy so B defers sending Data B starts sending only after the medium is free time Persistent and Non-Persistent CSMA The sender sends a frame as soon as the medium becomes idle If, on sensing busy, the sender waits for idle persistent CSMA sets a timer and tries later non-persistent CSMA Problem with persistent: two stations waiting to speak will collide 25
26 Problem With Persistent CSMA B B wants to send to A at this time B senses signal so it waits too A busy C wants to send to A at this time C senses A s signal so it waits C B starts sending C starts sending as as soon as the collide soon as the medium medium becomes idle becomes idle time Reducing Collision Probability: p-persistent CSMA Basically persistent, but a waiting station does not launch a packet immediately when the medium becomes idle p: the probability of sending a packet when the medium becomes idle hard to choose p if p small, then wasted time if p large, more collisions Best p depends on the number of contending nodes 26
27 Simple Math. If p-persistent CSMA is used, and 5 stations are contending (waiting) for the channel, what is the probability that only 1 station successfully transmits if p = 0.25? What if p = 0.75? Handling the Collision Problem: Exponential Backoff Collisions are still possible in CSMA Each station, after transmitting a packet, checks whether the packet transmission is successful on collision, choose timeout randomly from doubled range backoff range adapts to number of contending stations no need to choose p need to detect collisions: collision detect circuit => CSMA/CD 27
28 CSMA/CD Collision Detection Easy to implement in cooper media The signal amplitude on the media increases Collision starts. 1 st stops transmitting Cannot be used in wireless stations because transmitter overwhelms co-located receiver 28
29 Using ACK Frames to Detect Collisions B A Data 1 C Data 7 ACK 1 Data 2 Data 1 OK No ACK 7 Data 2 No ACK 2 CSMA/CA (Collision Avoidance) Used in wireless LANs Using explicit ACKs to detect collisions makes collisions expensive try to avoid potential collisions (collision avoidance) by random backoff (different from exponential backoff) at the beginning 29
30 Collision Avoidance: Random Backoff B When B senses no signal it starts a timer B senses signal at this time A busy When C senses no signal it starts a timer Timer value is determined by random C time CSMA/CA Algorithm First check if medium is busy Carrier sense If so, wait for medium to become idle Wait for interframe spacing (IFS) Set a contention timer to an interval randomly chosen in the range [1, CW] On timeout, send packet and wait for ack If no ack, assume packet is lost Collision avoidance try again, after doubling CW If another station transmits while counting down, freeze contention timer and unfreeze when packet completes transmission 30
31 Hidden Terminal Problem B collide A C C A 傳輸的同時 B 因聽不到 C 的訊號而送出訊號給 A A B C connectivity A B C Carrier sense 無法避免此種 collisions Hidden Terminal Problem Cannot Be Resolved by Carrier Sense B Data B s signal range A C wants to send to A at this time Data C B s a hidden terminal to C and vise versa collision C senses no signal so it starts sending time 31
32 Exposed Terminal Problem D C B deferred transmission A A B connectivity A B C D C D 不會干擾 B A 的傳送, 但 C 因聽到 B 目前的傳送而不傳送 C D Carrier sense 造成效能下降 Dealing with Hidden and Exposed Terminals CSMA/CA works when every station can receive transmissions from every other stations Not always true In both cases, carrier sense doesn t work with hidden terminal, collision because signal not detected with exposed terminal, idle station because carrier incorrectly detected 32
33 Busy Tone Multiple Access (BTMA) uses a separate busy-tone channel when station is receiving a message, it places a tone on this channel everyone who might want to talk to a station knows that it is busy even if they cannot hear transmission that that station hears this avoids both problems Problem with BTMA BTMA requires us to split frequency band more complex receivers (need two tuners) Separate bands may have different propagation characteristics scheme fails! Instead, use a single frequency band, but use explicit messages to tell others that receiver is busy (MACA) 33
34 Multiple Access Collision Avoidance (MACA) In MACA, before sending data, send a Request to Sent (RTS) to intended receiver Station, if idle, sends Clear to Send (CTS) Sender then sends data RTS/CTS contains a time duration If station overhears RTS, it waits long enough for a CTS to be sent by a receiver If a station overhears CTS, it waits long enough for the data packet to be transmitted CTS/RTS in MACA C knows A is ready to receive B B knows A is to receive C s data in d A C wants to send to A RTS(k) C overheard CTS(d) CTS(d) k d B won t send A any data in d Data the duration in RTS is for the reception of CTS RTS time 34
35 MACAW RTS and CTS both announces the duration of the transfer When receiver successfully receives data, it responds with ACK for acknowledgement Sender will retransmit RTS if no ACK is received If ACK rather than data was lost, the receiver will respond with ACK when receiving this RTS CTS/RTS in MACAW C knows A is ready to receive B B knows A is to receive C s data in d A C wants to send to A RTS(k) C overheard CTS(d) CTS(d) d B won t send A any data in d RTS Data ACK k the duration in RTS is for the transfer time 35
36 PAMAS: Power Aware Multi-Access with Signaling Improve energy efficiency from MACA Avoid overhearing by putting node into sleep Control channel separates from data channel RTS, CTS, busy tone to avoid collision Probe packets to find neighbors transmission time Increased hardware complexity Two channels need to work simultaneously, meaning two radio systems. 36
What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts
Multiple Access An Engineering Approach to Computer Networking What is it all about? ider an audioconference where if one person speaks, all can hear if more than one person speaks at the same time, both
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More information... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationMAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
More informationLecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationMultiple Access Techniques
Chapter 8 Multiple Access Techniques Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in the most efficient manner. As the spectrum is limited,
More informationTABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
More information802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
More informationControlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationRevision of Lecture Eighteen
Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses
More informationWiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
More informationRandom Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
More informationCDMA Network Planning
CDMA Network Planning by AWE Communications GmbH www.awe-com.com Contents Motivation Overview Network Planning Module Air Interface Cell Load Interference Network Simulation Simulation Results by AWE Communications
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
More information1 Wireless Media Access Control
1 Wireless Media Access Control ANDREW D. MYERS and STEFANO BASAGNI Department of Computer Science University of Texas at Dallas Richardson, Texas, U.S.A. ABSTRACT This chapter deals with the problem of
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationLecture 1. Introduction to Wireless Communications 1
896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More information10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
More information1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2015 1 Lecture Notes 1 Interference Limited System, Cellular Systems Introduction, Power and Path Loss Reading: Mol 1, 2, 3.3, Patwari
More informationProtocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationHello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationAlgorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationHow To Understand The Theory Of Time Division Duplexing
Multiple Access Techniques Dr. Francis LAU Dr. Francis CM Lau, Associate Professor, EIE, PolyU Content Introduction Frequency Division Multiple Access Time Division Multiple Access Code Division Multiple
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationPacket Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
More informationChapter 6: Medium Access Control Layer
Chapter 6: Medium Access Control Layer Chapter 6: Roadmap Overview! Wireless MAC protocols! Carrier Sense Multiple Access! Multiple Access with Collision Avoidance (MACA) and MACAW! MACA By Invitation!
More informationPerformance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE 802.11. Kang Sun
Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE 802.11 by Kang Sun A thesis submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements
More informationFrequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationFinal Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
More informationa. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.
CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer
More informationECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
More informationWireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
More informationCHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
More informationTCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationNetworks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,
Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.
More informationPradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur
Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur ABSTRACT W-CDMA (Wideband Code-Division Multiple Access), an ITU standard derived
More informationIEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
More informationEETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Discovery and Beaconing Discovery?
More informationMobile Communications TCS 455
Mobile Communications TCS 455 Dr. Prapun Suksompong prapun@siit.tu.ac.th Lecture 26 1 Office Hours: BKD 3601-7 Tuesday 14:00-16:00 Thursday 9:30-11:30 Announcements Read the following from the SIIT online
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More informationIn this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications Dr. Cecilia Mascolo In this Lecture In this lecture we will discuss aspects related to the MAC Layer of wireless
More informationMedium Access Control (MAC) and Wireless LANs
Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic
More informationLecture 18: CDMA. What is Multiple Access? ECE 598 Fall 2006
ECE 598 Fall 2006 Lecture 18: CDMA What is Multiple Access? Multiple users want to communicate in a common geographic area Cellular Example: Many people want to talk on their cell phones. Each phone must
More informationCellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
More informationChapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse
Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different
More informationEthernet, VLAN, Ethernet Carrier Grade
Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP
More informationAn Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e
An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (tipputhegreat@hotmail.com) Chapter
More informationMEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY
MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY Sunil Kumar 1, Vineet S. Raghavan 2 and Jing Deng 3 1 Electrical and Computer Engineering Department, Clarkson University, Potsdam,
More informationCDMA TECHNOLOGY. Brief Working of CDMA
CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile
More information2 Basic Concepts. Contents
2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a
More informationGSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving
GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving 1 Space Division Multiple Access of the signals from the MSs A BTS with n directed antennae covers mobile stations
More informationGSM Network and Services
GSM Network and Services Cellular networks GSM Network and Services 2G1723 Johan Montelius 1 The name of the game The number one priority for mobile/cellular networks is to implement full-duplex voice
More informationMultiplexing on Wireline Telephone Systems
Multiplexing on Wireline Telephone Systems Isha Batra, Divya Raheja Information Technology, Dronacharya College of Engineering Farrukh Nagar, Gurgaon, India ABSTRACT- This Paper Outlines a research multiplexing
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationA Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
More informationGTER 26 tudo o que você. quer saber sobre 802.11n
GTER 26 tudo o que você (não) quer saber sobre 802.11n Luiz Eduardo Dos Santos CISSP CWNE CEH GISP GCIH Sr. Systems & Security Engineer Americas hello agenda evolution of wi-fi what makes 11n what actually
More informationINTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA
COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue
More informationChapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of
More informationIEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More informationModern Wireless Communication
Modern Wireless Communication Simon Haykin, Michael Moher CH01-1 Chapter 1 Introduction CH01-2 1 Contents 1.1 Background 1.2 Communication Systems 1.3 Physical Layer 1.4 The Data-Link Layer 1.4.1 FDMA
More informationADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
More informationRESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More information192620010 Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4]
192620010 Mobile & Wireless Networking Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4] Geert Heijenk Outline of Lecture 5 Cellular Systems (UMTS / LTE) (1/2) q Evolution of cellular
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationHow To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
More information802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
More informationIEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
More informationData Center Networks, Link Layer Wireless (802.11)
Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?
More informationTHE development of media access control (MAC) protocols
710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan
More informationFibonacci Backoff Algorithm for Mobile Ad Hoc Networks
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk
More informationHow To Understand And Understand The Power Of A Cdma/Ds System
CDMA Technology : Pr. Dr. W. Skupin www.htwg-konstanz.de Pr. S. Flament www.greyc.fr/user/99 On line Course on CDMA Technology CDMA Technology : Introduction to Spread Spectrum Technology CDMA / DS : Principle
More informationObjectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM
More informationA Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme
A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme ANASTASIOS THANOS KTH Information and Communication Technology Master
More informationMobile Communications Chapter 2: Wireless Transmission
Mobile Communications Chapter 2: Wireless Transmission Frequencies Signals Antennas Signal propagation Multiplexing Spread spectrum Modulation Cellular systems Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationWireless Local Area Networking For Device Monitoring
Wireless Local Area Networking For Device Monitoring by Colin Goldsmith Supervised By Professor Wendi Heinzelman A thesis submitted in partial fulfillment of the Requirements for the Degree of Masters
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationThe Qualcomm CDMA Digital Cellular System
The Qualcomm CDMA Digital Cellular System Phil Karn Qualcomm, Inc 10555 Sorrento Valley Rd San Diego, CA 92121 karn@qualcomm.com Introduction Qualcomm, Inc. has developed and tested a digital spread spectrum
More information