Revision of Previous Two Lectures

Similar documents
CS263: Wireless Communications and Sensor Networks

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

How To Make A Multi-User Communication Efficient

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

EPL 657 Wireless Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CSMA/CA. Information Networks p. 1

Wiereless LAN

... neither PCF nor CA used in practice

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Chapter 7 Low-Speed Wireless Local Area Networks

Revision of Lecture Eighteen

Hello viewers, welcome to today s lecture on cellular telephone systems.

Lecture 7 Multiple Access Protocols and Wireless

Wireless LAN Concepts

MAC Algorithms in Wireless Networks

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Lecture 17: Wireless Networking"

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

ECE 333: Introduction to Communication Networks Fall 2002

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

IEEE Technical Tutorial. Introduction. IEEE Architecture

Wireless Personal Area Networks (WPANs)

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

1 Wireless Media Access Control

GSM Network and Services

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

Adaptive DCF of MAC for VoIP services using IEEE networks

Algorithms for Interference Sensing in Optical CDMA Networks

ECE/CS 372 introduction to computer networks. Lecture 13

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Random Access Protocols

TCP in Wireless Networks

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

10. Wireless Networks

COMP 3331/9331: Computer Networks and Applications

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Bluetooth voice and data performance in DS WLAN environment

How To Understand The Theory Of Time Division Duplexing

RTT 60.5 msec receiver window size: 32 KB

Multiple Access Techniques

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving

3GPP Wireless Standard

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

CSE 123A Computer Networks

Philippe Klein. avb-phkl qos-overview

Course Duration: Course Content Course Description Course Objectives Course Requirements

CDMA Network Planning

In this Lecture" Access method CDMA" Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Layer and Telecommunications

Introduction to Ethernet

Real-Time (Paradigms) (51)

ECE 428 Computer Networks and Security

Performance Analysis of the IEEE Wireless LAN Standard 1

A Technical Tutorial on the IEEE Protocol

Basic processes in IEEE networks

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

Controlled Random Access Methods

IEEE Wireless LAN Standard. Updated: 5/10/2011

Figure 1: cellular system architecture

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Medium Access Control (MAC) and Wireless LANs

Performance Evaluation of Wired and Wireless Local Area Networks

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

An Overview of Wireless LAN Standards IEEE and IEEE e

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

communication over wireless link handling mobile user who changes point of attachment to network

NEW WORLD TELECOMMUNICATIONS LIMITED. 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology

1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

How To Understand The Gsm And Mts Mobile Network Evolution

Wi-Fi and Bluetooth - Interference Issues

Exercise 2 Common Fundamentals: Multiple Access

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

CS Cellular and Mobile Network Security: GSM - In Detail

Whitepaper n The Next Generation in Wireless Technology

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Data Link Layer. Page 1. Ethernet

GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

2G/3G Mobile Communication Systems

Ajay Gummalla-July 2001

GSM: PHYSICAL & LOGICAL CHANNELS

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

Multiplexing. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium.

Transcription:

Revision of Previous Two Lectures Lecture Twenty-One has discussed duplexing protocols and various multiple access techniques Central issue is how to separate different users: FDMA, TDMA, CDMA, SDMA and how to separate transmitting and receiving (forward and reverse channels): FDD, TDD, SDD It also discusses channelisation spreading codes and CDMA technology Lecture Twenty-Two has detailed DS-CDMA systems Uplink system model and multiuser detection Downlink system model and single user detection This lecture we turn to medium access control, critical sublayer linking physical layer, PHY, and network layer 300

In traditional fixed telephone network, the network is viewed as two planes User and signalling planes Common channel signalling is adopted Access to (a signalling channel in) the network is relatively simple Signalling signalling user In mobile network, user connects to network via air interface and needs more sophisticated protocol to resolve multiple access where several users compete to access a single (signalling) channel GSM call set up: mobile has to reserve a slot in the dedicated control channel to set up a call and this request has to be made via the random access channel In UTRAN, request for a control channel (signalling spreading code) is made via a similar random access channel Packet radio: many users attempt to access the single channel randomly Signalling overhead: different layers protocols add their signallings IPv6 packet: signalling overhead counts to 50% of packet In mobile networks, total network signalling overhead counts to 95% of what are transmitted in whole network, i.e. only 5% are actually users data 301

Contention Algorithms Having central access point: communication between users (MS) via base Down link: based MS, base has control, can avoid contention Uplink: MS base, many users compete to access, causing multiple access interference, and requiring protocols to resolve contention No central access point, e.g. Ad hoc networks, many users compete to access, and having contention problem Two categories of contention protocols Random access: no coordination among users Scheduled access: coordination among users, e.g. taking turns to access 302

Packet Radio ased on random access: transmission of a user is done by bursts of data (packets) Collision from simultaneous transmissions of multiple transmitters is detected by base station, who sends out ACK or NACK accordingly ACK: has received the packet from a particular user, and NACK: the previous packet was not received correctly Note the perfect feedback employed Performance: throughput S (packets/s) which defines the average number of packets successfully transmitted per unit time, and average delay D (s) experienced by a packet Define the vulnerable time as the time interval during which packets are susceptible to collisions with other users transmissions, and assume constant packet length τ (s) and fixed channel rate Packets transmission is Poisson distribution with time mean arrival rate λ (packets/s) ALOHA: Normalised channel traffic or average number of Tx 1 old and new packets submitted per packet time is G = λτ (unit in Erlang) Tx 2 The throughput is then given by S = G Prob(no collision) τ Vulnerable period: 2 τ 303

ALOHA Class ALOHA: also called pure ALOHA, whenever a user has a packet to send It simply transmits the packet and waits for ACK If collision occurs (NACK), it waits for a random period of time and retransmits the packet again Slotted ALOHA: time is divided into slots of equal length greater or equal to the packet duration τ, and packet transmission can only start at beginning of a time slot Probability that a packet does not suffer from a collision is given by j e 2G, ALOHA P 0 = e G, slotted ALOHA The throughput/packet time is then j G e 2G, S = G e G, Maximum throughput of ALOHA: ALOHA slotted ALOHA ds dg = e 2G 2Ge 2G = 0 G max = 1 2 S max = 1 2 e 1 = 0.1839 Maximum throughput of slotted ALOHA: ds dg = e G Ge G = 0 G max = 1 S max = e 1 = 0.3679 304

Carrier Sense Multiple Access A user wishing to transmit first listens to the medium to see if another transmission is in progress (carrier sense) If the channel is in use, it must wait. If the medium is idle, it may transmit 1-persistent: a user keeps listening to see if channel is free and, as soon as the channel is idle, it transmits Nonpersistent: when the channel is busy, it waits for a random period of time before trying to listen again. This is less greedy p-persistent: for slotted systems. When the channel is free during current slot, it transmits with probability p and defers until next slot with probability 1 p Detection delay is determined by receiver hardware: a small detection time means that a user can detect a free channel rapidly Propagation delay is critical to performance A small propagation delay means that as soon as a user launches a packet, others knows quickly and will defer to transmit, thus reducing collisions 305

CSMA (continue) A random contention algorithm is characterised by its statistics: Average throughput S(G) and average delay D(G) as well as their variances as functions of network load G For CSMA, (a) throughput versus load, and (b) trade-off throughput versus delay S (throughput per packet time) 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 Pure ALOHA Slotted ALOHA 0.5-persistent CSMA 1-persistent CSMA 0.01persistent CSMA Nonpersistent CSMA 0.1-persistent CSMA 1 2 3 4 5 6 7 8 9 G (attempts per packet time) Throughput Normalized delay (a) (b) Method performs very well for small p in terms of S at high load G However, for smaller p, users must wait longer (larger delay) to attempt transmission Hence, characteristics of dashed curve in (b) is preferred etter performance can be achieved if user continues to listen to medium while transmitting and stops transmission immediately if collision is detected This leads to CSMA with collision detection 306

CSMA with Collision Detection A user wishes to transmit: 1. Listens to see if the channel is free. If the channel is idle, it transmits. If the channel is busy, it keeps listening until the channel is free, then transmits immediately (1-persistent) 2. During the transmission, it keeps listening to detect collision. If a collision is detected, it stops transmitting immediately, and waits a random period of time before goes back to step 1. States of CSMA/CD: transmission period, contention period and idle period Let τ be end-to-end (two farthest users) propagation time Worst case time to detect collision is 2τ: Frames should be long enough to allow collision detection prior to the end of transmission, otherwise CSMA/CD degrades to CSMA inary exponential backoff is used: when repeatedly facing collisions, mean value of random delay is doubled Transmission period t o Contention period Contention slots Frame Frame Frame Frame Time Idle period Packet starts Packet almost A A at time 0 at at τ - A (a) (c) Collision at time τ A (b) Noise burst gets back to A at 2τ (d) 307

CSMA with CD Performance Let R be data rate (bps), d be link distance (m), V be propagation velocity (m/s), and L average frame (packet) length (bits). The link parameter is defined as: a = propagation time frame time = R d L V Maximum possible utilisation of the channel is expressed as the ratio of throughput to capacity View time in slots, with slot length 2τ and τ = d V. Recall CSMA/CD model: transmission, contention and idle periods. Under heavy load assumption no idle time Let T t be average transmission interval and T c be average contention interval. The maximum utilisation or efficiency is given by U = T t + T c Since T t = 1 2a 2τ and it can be shown T c = e 2τ, U = T t 1 1 + 5.44a Example. Guided media V = 2 10 8 (m/s), 10 Mbps LANs (Ethernet) with τ = 25.6 µs: Frame length 64 bytes U = 0.27, and frame length 1024 bytes U = 0.85 308

WDMA LAN Wavelength division multiple access for optic communications is similar to FDMA. In this kind of fiber optics LANs, a channel is a wavelength band A user gets two channels: control and data. A channel has fixed time slots, and data channel s last slot contains information on free slots in its control channel communicates with A: m time slots for control To contact A, reads status slot in A s data channel to see A has any control slots unused; then makes Tx request in a free slot in A s control channel Station A X X X X X X X X S n + 1 time slots for data X X X X X X X X X X 's data channel 's control channel S A's control channel is used by other stations to contact A Used by to transmit data If A accepts Tx request, can send data on a specific slot of its own data channel and tell A where to pick up C D C's control channel C's data channel D's control channel D's data channel Time λ 309

Wireless LAN Wireless LANs use packet radio with short range, and typically there is a single channel covering the entire bandwidth (a few Mbps). CSMA would not work because: Hidden station problem: when A is transmitting to, if C senses the medium, it will falsely conclude that it can transmit, as it cannot hear A A (a) C Radio range Exposed station problem: when is transmitting to A, if C senses medium, it hears an ongoing transmission and falsely concludes that it may not transmit to D, but in fact it can safely do so Multiple access with collision avoidance (MACA): sense activity around intended receiver. Consider that A is trying to communicate with : A transmits a Request to Send (RTS) to D Range of A's transmitter A (b) C D answers with a Clear to Send (CTS) C can hear the RTS from A but not the CTS from, and it can freely transmit C A RTS D C A CTS Range of 's transmitter D hears only CTS from, and must keep silent (a) (b) E E D 310

Cellular Network: User Channels The concepts of cells and frequency reuse are fundamental to cellular radio. A cell maintains a set of frequency slots (channels). Two cells separated by a sufficiently long distance may use the same set of frequency slots (co-channels). This greatly improves bandwidth efficiency G F A E C D G F G F A E A E C D C D (a) (b) GSM: global systems for mobile communications uses a mixture of FDMA and TDMA technologies GSM has 124 downlink channels and 124 uplink channels (FDM) per cell. Each such channel has a frequency band of 200 khz and can support 8 separate users (TDM). Theoretically, there are 8 124 = 992 fully duplex (downlink/uplink) channels per cell, but many of them may not be used for avoiding co-channel interference with neighboring cells Frequency 959.8 MHz 935.4 MHz 935.2 MHz 914.8 MHz 890.4 MHz 890.2 MHz TDM frame Time Channel 124 2 1 124 2 1 ase to mobile Mobile to base 311

Cellular Network: Control Channels In a cellular network, each cell is assigned with a set of user channels, and it also has a set of control channels, and GSM s control channels: roadcast control channel: continuously broadcasts the base identity and the channel status. y monitoring this channel, mobile knows which cell it is in Dedicated control channel: is for location updating, registration, and call setup. Through this channel, a base knows who are in its cell Common control channel: consists of three logic sub-channels Paging channel: is used by the base to announce incoming calls. Mobile continuously monitors this channel to see any call for it Random access channel: is used by mobile to request a slot on the dedicated control channel, for call setup The access to the random access channel is based on slotted ALOHA Access grant channel: is used to announce the assigned slot (who is granted access to which slot of the dedicated control channel) 312

IEEE 802.11 Medium Access Control WIFI has two modes of operation: distributed coordination function with no central control (access point), and point coordination function with base station controlling activities in its cell For DCF, medium access control protocol is based on MACA (multiple access with collision avoidance) To cope with noisy wireless channels, 802.11 allows frames to be fragmented into smaller pieces, each with its own checksum Fragments are individually numbered and acknowledged using stop-and-wait Once channel has been acquired using RTS and CTS, multiple fragments can be sent in row For PCF, base station polls users, asking them if they have frames to send and controls transmission order no collision, a signed up user is guaranteed a certain fraction of bandwidth ase periodically broadcasts a beacon frame, which contains system parameters, such as hopping frequencies and dwell times (for FHSS), clock synchronisation, etc., and it also invites new users to sign up for polling service Control frame or next fragment may be sent here 802.11 lets PCF and DCF to coexist within a cell by carefully defining interframe time interval: after a frame has been sent, a certain dead time is required before any user may sent frame ACK SIFS PIFS DIFS PCF frames may be sent here EIFS Time DCF frames may be sent here ad frame recovery done here 313

roadband Wireless IEEE 802.16 air interface for fixed broadband wireless access systems, also called wireless MAN, wireless local loop, or WIMAX has protocol stack: It provides multimegabits wireless services for voice, Internet, movies on demand, etc. Physical layer operates in 10 to 66 GHz range, and base has multiple antennas, each pointing at a separate sector Physical medium dependent sublayer Service specific convergence sublayer MAC sublayer common part Security sublayer Transmission convergence sublayer QPSK QAM-16 QAM-64 Upper layers Data link layer Physical layer For close-in subscribers, 64QAM is used, so typical 25 MHz spectrum offers 150 Mbps; for medium-distance subscribers, 16QAM is used; and for distant subscribers QPSK is used Data link layer consists of three sublayers Security sublayer manages encryption, decryption, and key management, crucial for privacy and security Service-specific convergence replaces logical link control, providing seamlessly interface for network layer that may have both datagram protocols and ATM QAM-64 (6 bits/baud) QAM-16 (4 bits/baud) QPSK (2 bits/baud) 314

802.16 MAC Sublayer Protocol 802.16 MAC sublayer is completely connection oriented to provide quality-of-service guarantees for telephony and multimedia, and MAC frames occupy an integral number of physical layer time slots Each frame is composed of subframes, and the first two are downstream and upstream maps These two maps tell what is in which time slot and which time slots are free Downstream map also contains system parameters to inform new users as they come on-line Downstream channel: base simply decides what to put in which subframe Upstream channel: there are competing subscribers and its allocation is tied to class of service Constant bit rate: dedicate certain time slots to each connection and bandwidth is fixed through the connection, providing typical telephone channel service Real-time variable bit rate: for compressed multimedia and other soft real-time applications in which bandwidth needed each instant may vary ase polls subscriber at fixed interval to ask how much bandwidth is needed this time Non-real-time variable bit rate: for non-real-time heavy transmissions such as large file transfers ase polls subscribers often at non rigidly defined intervals to see who needs this service est-efforts: no polling and subscriber contends for bandwidth with others Requests for bandwidth are done in time slots marked in upstream map as available for contention. Successful request will be noted in next downstream map, and unsuccessful subscriber has to wait a random period of time before try again 315

Summary asic concepts of contention: example of random access packet radio, throughput and average delay, vulnerable time, Poisson distribution and mean arrival rate Contention algorithms: pure ALOHA, slotted ALOHA, CSMA (1-persistent, nonpersistent and p-persistent), trade-off between throughput and delay Contention algorithms: CSMA with CD, states, worst case detection time, link parameter, efficiency WDMA LANs: access protocol Wireless LANs: hidden and exposed station problems (why CSMA does not work), access protocol MACA (key: sense intended receiver) Control channels and call set up in cellular network, e.g. GSM IEEE 802.11 WLAN MAC, IEEE 802.16 broadband wireless MAC 316