Mobile Communications Structure of the Lecture

Transcrição

Mobile Communications Structure of the Lecture
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Mobile Communications
Structure of the Lecture
Application Layer
• Service location
• Adaptive applications
• New applications
Transport Layer
• Congestion and flow control
• Quality of Service
Network Layer
• Addressing, routing
• Device location
• Handover
Data Link Layer
• Medium access control
• Multiplexing
• Authentication
Physical Layer
• Frequencies, modulation
• Interferences, attenuation
• Encryption
Chapter 2
• Technical Basics: Layer 1
• Methods for Medium Access: Layer 2
Chapter 3
• Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN
• Mobile Networks: GSM, GPRS, UMTS
• Satellites and Broadcast Networks
Chapter 4
• Mobility on the network layer: Mobile IP, Routing, Ad-Hoc Networks
• Mobility on the transport layer: reliable transmission, flow control, QoS
• Mobility support on the application layer
Page 0
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Channels
• The whole assigned frequency band is divided somehow in areas (channels) which
are used for different transmissions. To avoid interference between the channels,
guard spaces are needed.
• Static schemes: to avoid collisions of several transmission attempts, a transmission
gets assigned a certain channel exclusively:
Channels ki
k1
k2
k3
k4
k5
k6
Multiplexing in space:
Frequency Division
Multiple Access (FDMA)
c
c
t
Frequency
s1
Frequency
Frequency
Code
f
s2
f
c
...
t
s3
Chapter 2.2: Layer 2
Code Division
Multiple Access (CDMA)
Time Division
Multiple Access (TDMA)
...
t
Goal: multiple use of
a shared medium
Page 1
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Multiplexing
Multiplexing in 4 dimensions:
• space (si)
• time (t)
• frequency (f)
• code (c)
• Channels in a frequency band
• Static medium access methods
• Flexible medium access
methods
...
1 2 3 4 1 2 Time
Time
Time
Each transmission is
Each transmission is assigned
All transmissions take place all
a certain sub-band of the whole assigned the whole frequency the time on the whole frequency
band for certain time slots
frequency band
band, but using a code
f
Page 2
Chapter 2.2: Layer 2
Page 3
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Frequency Multiplexing
k1
k2
k3
k4
Frequency Division Duplex (FDD)
k5
k6
c
f
t
Principle:
• Separate the whole frequency band
into sub-bands
• One sub-band corresponds to one
channel, assigned to one transmission
• Usable bandwidth depends on the
frequency band and the modulation
method
• Guard spaces between the sub-bands
are necessary to avoid interference of
neighbored channels
FDD is a standard (since early systems of mobile communication) to use frequency
multiplex for a duplex communication
Principle:
• For a duplex communication, two sub-bands are used, one for sending, the other
for receiving (uplink resp. downlink)
• On technical reasons to avoid interference between the sent and the received
signal in the antennas:
– a guard space between the uplink- and the downlink frequencies is needed
(e.g. 45MHz GSM-System)
– two separate antennas have to be used, or a “duplexer” is needed which
consists of two band filters which suppress the unwished signals
Downlink
Disadvantages:
• Waste of bandwidth if the traffic is
distributed unevenly
• Inflexible
Advantages:
• Easy to implement (Radio, TV)
• No coordination necessary
Page 4
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
890.2 MHz
...
X MHZ
Du
Au
Bu
Cu
...
Frequency
X+45 MHz
Page 5
Chapter 2.2: Layer 2
Advantages:
• No guard spaces
• Throughput high even
for many users
• Low power consumption (deactivation
of sending/receiving device for
unused time slots)
124
123
122
200 kHz
1
124
123
122
Disadvantage:
• Precise synchronization
between all senders
• Guard times between
the time slots
1
t
Chapter 2.2: Layer 2
Cd
Principle:
• A transmission is assigned the whole frequency band exclusively for the
duration of a certain time slot
20 MHz
915 MHz
Bd
Time Multiplexing
f
935.2 MHz
Ad
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
FDD/FDMA in GSM
960 MHz
Dd
Uplink
Page 6
Chapter 2.2: Layer 2
k1
k2
k3
k4
k5
k6
c
f
t
Page 7
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
TDMA – Guard Times and Synchronization
TDMA - Guard Times and Synchronization
For avoiding overlapping of the signals of different senders, a precise
synchronization is necessary
Problem: Assume a central base station to which all mobile stations communicate
and which sends out synchronization signals. A mobile station near the base
station can start sending earlier as stations far away, because it receives the
synchronization signal earlier (speed of signal propagation)
Example: Distance mobile station
Example: slot duration in GSM: 577µs
=> guard time of 234µs causes a loss of 40% of transmission capacity!
base station 35 km
=> Duration of synchronization signal:
base station
But: decreasing efficiency, because within guard times no transmission is possible
mobile station:
Solution: Timing Advance: the base station measures the round-trip-times to a
mobile station and instructs stations far away to start sending earlier
=> Reduction of the guard time to 30µs
35 ⋅ 10 3 m
= 117 µs
3 ⋅ 10 8 m / s
round-trip-time: 234µs
Solution: insert a guard time between time slots to compensate the difference in
the round-trip-times
Slot i
Slot i+1
guard
time
Page 8
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Time and Frequency Multiplexing
Time Division Duplex (TDD)
Principle:
Combination of FDMA and TDMA
• A channel gets a certain frequency sub-band for certain time slots
• Example: GSM
Advantages:
• Protection against tapping
• Protection against frequency
selective interferences
• High data rates,
adaptation to the traffic
amount is possible
k1
k2
k3
• Only a single carrier frequency
• Separation of downlink and uplink in terms of time
k4
k5
• Flexible: if you need more capacity in the downlink than in the uplink, just
spend larger time slots in the downlink part and give the uplink part
smaller time slots
k6
c
f
Downlink - 1 ms
Dd
• But: precise coordination t
is necessary
Chapter 2.2: Layer 2
Page 9
Chapter 2.2: Layer 2
Ad
2 ms
Bd
Cd
Uplink - 1 ms
Du
Au
Bu
Cu
time
variable sender/receiver separation
Page 10
Chapter 2.2: Layer 2
Page 11
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
TDD/TDMA - Example DECT
FDD vs. TDD
FDD
TDD
(-) two carriers per connection,
separation between them
(-) efficient symmetry only possible
with two equal bandwidths of the
carriers
Flexibility
417 µs
1 2 3
11 12 1 2 3
Downlink
Uplink
(-) asymmetric connections need
different bandwidths
11 12
t
(-) Duplexer needed (antenna)
Complexity
(-) FDD “wastes” frequencies
(+) easy to implement
Efficiency and
Throughput
Chapter 2.2: Layer 2
Page 12
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
(+) one carrier per connection
(+) efficient symmetry by using
equal uplink/downlink division
(+) efficient asymmetric connections
with variable borderlines
between uplink and downlink
(+) no duplexer needed
(+) TDD only needs small frequency
bands
(-) synchronization is needed
(+) high spectral efficiency with
QAM modulation
(+) high spectral efficiency with QAM
modulation
(+) two carriers enable a high
throughput in both directions
(+) high capacity
Page 13
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Code Multiplex
Code Division Multiplex (CDM)
• For an efficient usage of the bandwidth, the whole frequency band is used by all
transmissions in parallel
• The transmissions are separated by codes
• The code realizes a signal spreading over the whole bandwidth. When choosing
codes, it must be guaranteed that they are “different enough” to separate the
transmissions (orthogonal codes)
• All stations use the same frequency and utilize the whole bandwidth of the
transmission channel simultaneously
• The signal is combined with a pseudo random number (XOR); each sender needs
a unique number
• The receiver is able to reproduce the signal if he knows the sender‘s random
number and performs a correlation function
• Bit rate ri << Bit rate rc (for optical systems: ri/rc ≤ 5000)
Advantages:
• Efficient bandwidth usage
• No coordination/synchronization needed between the stations if appropriate codes
are chosen (misleading – not really completely true)
• Good protection against tapping (military)
• Redundancies protect against interferences
Disadvantages:
• More complex signal regeneration
• Lower user data rates by coding the data
Chapter 2.2: Layer 2
Signal 1
Bi trate ri
X
Code A
Code A
Bit rate rc
+
Bit rate rc
Mixing of the data streams
on one carrier frequency
Signal n
Bit rate ri
Page 14
X
Chapter 2.2: Layer 2
X
X
Code B
Code B
Page 15
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
CDMA - Computation
CDMA – on Signal Level I
Sender A
• Sends Ad = 1, Code Ak = 010011 (set: „0“= -1, „1“= +1)
• Sent signal As = Ad * Ak = (-1, +1, -1, -1, +1, +1)
data A
Remark: the sequences of the form
“(- 1, +1, - 1, - 1, +1, +1)” are called
chip sequences
Receiver wants to receive transmission of A:
• perform code Ak bitwise (inner produkt)
(-2, 0, 0, -2, +2, 0) · Ak = 2 + 0 + 0 + 2 + 2 + 0 = 6
Result is larger than 0, sent bit must have been a „1“
• Analogously for B
(-2, 0, 0, -2, +2, 0) · Bk = -2 + 0 + 0 - 2 - 2 + 0 = -6, thus a „0“
Ad
1
chip sequence A 0
1
0
1
0
0
1
0
0
0
1
0
1
1
0
0
1
1
data ⊕ code 1
0
1
0
1
1
1
0
0
0
1
0
0
0
1
1
0
0
Ak
As
signal A
Real systems use much longer chip sequences resulting in a larger distance
between single code words in code space
Page 16
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Page 17
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
CDMA - on Signal Level II
CDMA - on Signal Level III
As
signal A
data B
0
code A
Sender B
• Sends Bd = 0, Code Bk = 110101 (set: „0“= -1, „1“= +1)
• Sent signal Bs = Bd * Bk = (-1, -1, +1, -1, +1, -1)
Both signals interfere in the air:
• As + Bs = (-2, 0, 0, -2, +2, 0)
1
1
0
0
data A
Bd
As + Bs
Bk
Ak
Bs
(As + Bs) * Ak
1
0
1
1
0
1
Ad
code B
chip sequence B 0
0
0
1 1
0
1
0
1 0
0
0
0
1 0
1
1
1
data ⊕ code 1
1
1
0 0
1
1
0
1 0
0
0
0
1 0
1
1
1
signal B
integrator
output
comparator
output
As + Bs
Chapter 2.2: Layer 2
Page 18
Chapter 2.2: Layer 2
Page 19
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
CDMA - on Signal Level IV
data B
CDMA - on Signal Level V
1
0
Bd
0
As + Bs
As + Bs
wrong
code K
Bk
(As + Bs) * K
(As + Bs) * Bk
integrator
output
comparator
output
1
0
integrator
output
comparator
output
0
Page 20
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
(0)
?
Page 21
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
CDMA - Example
CDMA - Example
Principle:
• Each station is assigned an 8 bit chip sequence *)
• For transferring a 1 it sends its chip sequence, for transferring a 0 it sends its complement
• Bipolar notation with 0 as -1 and 1 as +1
• All chip sequences are pairwise orthogonal,
i.e. if S and T are orthogonal chip sequences (S ≠ T), then holds:
1 m
S • T ≡ ∑ S i Ti = 0 , S • T = 0 ,
m i=1
On the receiver side:
• For “filtering out” the bit stream of a certain station, the receiver must know the
chip sequence of this station
• For extracting the bits of the station with chip sequence C from the received
sequence E, it computes E • C
• For example:
E = A +B +C
S•S =1
⇒ E • C = ( A + B + C) • C = A • C + B • C + C • C = 0 + 0 + 1= 1
Result of orthogonal codes
• If two or more stations are sending at the same time, their signals are added linear
Example transmissions: (in each case exactly one bit is transferred)
Chip sequences of four
stations:
- -1C
E1 = (-1 +1 -1 +1 +1 +1 -1 -1)
A: (- 1 - 1 - 1 +1 +1 - 1 +1 +1)
-11B+C
E2 = (-2 0 0 0 +2 +2 0 -2)
B: (- 1 - 1 +1 - 1 +1 +1 +1 - 1)
10- A +B
E3 = ( 0 0 -2 +2 0 -2 0 +2)
C: (- 1 +1 - 1 +1 +1 +1 - 1 - 1)
101A+B+ C
E4 = (-1 +1 -3 +3 -1 -1 -1 +1)
1 1 1 1 A + B + C + D E5 = (-4 0 -2 0 +2 0 +2 -2)
D: (- 1 +1 - 1 - 1 - 1 - 1 +1 - 1)
1101
*) simplified example, normally at least 10 bits
Chapter 2.2: Layer 2
(0)
A + B + C + D E6 = (-2 -2 0 -2 0 -2 +4 0)
Ei = transferred chip sequence for case i
Page 22
For the six example transmissions one receives:
i.e. station transmits 1
E1 • C = (1 + 1 + 1 + 1 + 1 + 1 + 1 + 1) / 8 = 1
E 2 • C = ( 2 + 0 + 0 + 0 + 2 + 2 + 0 + 2) / 8 = 1
E3 • C = (0 + 0 + 2 + 2 + 0 − 2 + 0 − 2) / 8 = 0
E4 • C = (1 + 1 + 3 + 3 + 1 − 1 + 1 − 1) / 8 = 1
E5 • C = ( 4 + 0 + 2 + 0 + 2 + 0 − 2 + 2) / 8 = 1
E6 • C = ( 2 − 2 + 0 − 2 + 0 − 2 − 4 + 0) / 8 = −1
Chapter 2.2: Layer 2
station transmits 1
station does not transmit anything
station transmits 1
station transmits 1
station transmits 0
Page 23
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Spread Spectrum Technology
Effects of Spreading and Interference
Principle:
CDMA can also deal with one problem of radio transmission: frequency dependent
fading can wipe out narrow band signals for duration of the interference
• Use of a bandwidth which is much larger than the one of the modulated signal
• Spread of the signal over the complete bandwidth using a pseudo random sequence
power
Original signal of a sender: Usage of
a narrow frequency band
f
power
power
interference
spread
signal
power
detection at
receiver
f
Spreading of the signal to a broad frequency band;
at the same time, the signal power is distributed
signal
spread
interference
f
power
f
During transmission,
narrowband and
broadband interference
occur
That means: spread a narrow band signal into a broad band signal using a special
code to protect against narrow band interference
Page 24
Chapter 2.2: Layer 2
f
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Page 25
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Effects of Spreading and Interference
Spreading and Frequency-selective Fading
channel
quality
power
The receiver reconstructs the “disturbed” signal; as a
result the narrowband interference is spreaded
1
2
5
3
6
4
f
frequency
narrow band
signal
power
Using a band pass filter, those parts of the signal can
be removed which are outside the bandwidth of the
original signal
channel
quality
1
spread
spectrum
Page 26
narrowband channels:
Signal quality depends on
carrier frequency!
guard space
f
Chapter 2.2: Layer 2
User signal
Broadband interference
Narrowband interference
Chapter 2.2: Layer 2
2
2
2
2
2
spread spectrum channels:
Uniform quality for all
transmissions
frequency
Page 27
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Spread Spectrum Technology
Direct Sequence
Original signal
+1
-1
Frequency
1 chip
1 code word
+1
-1
Code sequence
+1
-1
Spread signal
Power
Advantages:
• Several signals can be transferred without coordination within the same bandwidth at
the same time
• Small susceptibility for effects of the multipath transmission: due to the high
bandwidth in any case only a small part of the frequency spectrum is affected, so that
the typical signal weakenings are weaker than with narrow-band systems
• Small influence of environmental disturbances
• Existence of transmissions (and as a result their decoding) is difficult to detect (of
special relevance for military systems)
Power
1 bit
Frequency
• Division of the signal into redundant information units (chips), the transmitter sends
several (at least 10) bits for one bit of information
• Both, sender and receiver must know the chip sequence (code)
Procedures:
• Direct Sequence Spread Spectrum (DSSS)
• Frequency Hopping Spread Spectrum (FHSS)
• Spreading, i.e. distribution of the chips over a large bandwidth
• For other users, the transmission appears to be background noise
• Re-establishment of the original, possibly disturbed signal is possible due to the
redundancy
Page 28
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Frequency Hopping
Principle:
• Doubled modulation:
a. Modulation of the data to a spread wide-band signal
b. Modulation of this signal to the carrier frequency
• The receiver processes the inverted procedure with identical chip sequences
• Integration over the bit period
60
Frequency
40
20
Frequency
Hopping signal
0
user
data
X
modulator
chipping
sequence
radio
carrier
transmitter
2
3
4
5
6
7
8
Time
Power
Frequency
1
transmit
signal
Original signal
Power
Direct Sequence
spread
spectrum
signal
Page 29
Chapter 2.2: Layer 2
Frequency
correlator
received
signal
lowpass
filtered
signal
demodulator
radio
carrier
• Carrier frequency is changed in certain time intervals in accordance to a code
sequence (synchronous change of the frequency by sender and receivers)
products
X
integrator
• Frequency hops of the signal in fixed times of approx. 20-400 ms
• Collisions are possible, if two or more senders use by coincidence the same
frequency. Therefore suitable codes must be used.
chipping
sequence
sampled
sums
receiver
• Interference are limited to short periods, simple implementation
• Not as robust as DSSS, easier to tap
decision
Chapter 2.2: Layer 2
data
Page 30
Chapter 2.2: Layer 2
Page 31
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Frequency Hopping
Frequency Hopping
Two variants:
• Fast change (fast hopping): several frequencies per bit
• Slow change (slow hopping): several bits per frequency
Principle:
• Vary the carrier frequency in discrete levels:
Level sequences are determined by pseudo random sequence
Receiver must use identical sequence
• Two categories regarding the number of transferred bits per level:
Max. one bit: Fast Frequency Hopping
Several bits: Slow Frequency Hopping
user
data
spread
signal
narrowband
signal
modulator
transmitter
received
signal
Data
narrowband
signal
data
modulator
demodulator
frequency
synthesizer
frequency
synthesizer
demodulator
receiver
hopping
sequence
hopping
sequence
Chapter 2.2: Layer 2
Page 32
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Space Division Multiple Access (SDMA)
Frequency Planning
• Space Multiplexing means: base stations serve a certain space (cell) only,
different base stations have a distance large enough to supply different regions
• Mobile stations communicate only with the base station in range
• Advantages of a cell structure:
The same frequencies can be used in different cells for different users, i.e.
higher capacity, higher number of users possible
Less transmission power
More robust against break-down
Propagation of signals is (relatively) easy to handle
• Problems:
Fixed network needed for connecting base stations
Handover (changing from one cell to another) necessary
Interference with neighbored cells at cell borders – avoid using the same
frequencies in neighbored cells!
• Cell sizes from 300 m in cities to 35 km on the country side for GSM – even less
for higher frequencies, e.g. 10 – 30 m for Wireless LAN
Chapter 2.2: Layer 2
Page 33
Chapter 2.2: Layer 2
Page 34
Frequency reuse only with a certain distance between the base stations
Standard model using 7 frequencies:
k3
k5
k4
k2
k6
k1
k3
An area in which all frequencies are used, is called cluster
• Fixed frequency assignment:
Certain frequencies are assigned to a certain cell
Problem: different traffic load in different cells
k5
k4
k7
k1
k2
• Dynamic frequency assignment:
Base station chooses frequencies depending on the frequencies already
used in neighbor cells
More capacity in cells with more traffic
Assignment can also be based on interference measurements
Chapter 2.2: Layer 2
Page 35
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Frequency Planning
f3
f3
f2
f1
f1
f1
f3
f2
f1
f3
• CDM systems: cell size depends on current load
• Additional traffic appears as noise to other users
• If the noise level is too high users drop out of cells
f3
f2
f3
f2
Cell Breathing
f1
f3
3 cell cluster
f2
f3
f2
f3
f5
f4
7 cell cluster
f6
f1
f3
f2
f2
f2
f
f1 f
f
h2 1 f3
h2 1 f3
3
h
h
g2 1 h3 g2 1 h3
g2
g1
g1
g1
g3
g3
g3
f5
f4
f7
f1
f3
f2
f6
f7
f2
f5
f2
3 cell cluster with
3 sector antennas
Page 36
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
SDMA
segment space into
cells/sectors
Terminals
only one terminal can
be active in one
cell/one sector
Signal
separation
cell structure, directed
antennas
TDMA
segment sending
time into disjoint
time-slots, demand
driven or fixed
patterns
all terminals are
active for short
periods of time on
the same frequency
synchronization in
the time domain
FDMA
segment the
frequency band into
disjoint sub-bands
Channel Access
CDMA
spread the spectrum
using orthogonal codes
every terminal has its all terminals can be active
own frequency,
at the same place at the
uninterrupted
same moment,
uninterrupted
filtering in the
code plus special
frequency domain
receivers
Advantages very simple, increases established, fully
simple, established,
robust
inflexible, antennas
Disadvantages typically fixed
inflexible,
frequencies are a
scarce resource
flexible, less frequency
planning needed, soft
handover
complex receivers, needs
more complicated power
control for senders
typically combined
with TDMA
(frequency hopping
patterns) and SDMA
(frequency reuse)
still faces some problems,
higher complexity,
lowered expectations; will
be integrated with
TDMA/FDMA
capacity per km²
Comment
only in combination
with TDMA, FDMA or
CDMA useful
Chapter 2.2: Layer 2
digital, flexible
guard space
needed (multipath
propagation),
synchronization
difficult
standard in fixed
networks, together
with FDMA/SDMA
used in many
mobile networks
Page 37
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Comparison of SDMA/TDMA/FDMA/CDMA
Approach
Idea
Chapter 2.2: Layer 2
Page 38
• FDMA and simple TDMA are in general to inflexible for data communication
• CDMA is very complex
• DSSS and FHSS do no access control, but increase the robustness of a
transmission
• Maybe we could use proofed mechanisms from data communication in fixed
networks instead of or in combination with static mechanisms?
Let’s try for Ethernet: CSMA/CD
• Simply send if the medium is free, recognize if a collision occurs
Problem in wireless networks
• The signal strength decreases at least quadratic with the distance
• CS/CD are used by the sender, but collisions occur at the receiver
• Possibly, the sender can’t recognize this collision, i.e. CD fails
• Furthermore, CS can fail if a terminal is to far away (Hidden Station)
Chapter 2.2: Layer 2
Page 39
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Hidden Station and Exposed Station
Further Problem with CSMA/CD:
Power Control
Hidden Station
• A sends to B,
C cannot receive A
• C wants to send to B, C senses a
“free” medium (CS fails)
• Collision at B, A cannot receive the
collision (CD fails)
• A is “hidden” for C
Terminals A and B send, C receives
• The signal strength decreases
proportionally with the square
of the distance
• Therefore, the signal from terminal
B drowns out A’s signal
• C is not able to receive A
• Precise power control needed!
Exposed Station
• B sends to A, C wants to send to D
• C has to wait – CS signals that the
medium is in use
• A is outside the radio range of C –
waiting is not necessary!
• C is “exposed” to B
A
B
C
B
C
But: is it possible to design variants for wireless networks?
A
B
C
D
Page 40
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Chapter 2.2: Layer 2
Page 41
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Aloha/Slotted Aloha
DAMA - Demand Assigned Multiple Access
Mechanism
• Random, distributed (no central arbiter), time-multiplex
• Slotted Aloha additionally uses time slots, sending must always start at
slot boundaries
Aloha
A
• Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson
distribution for packet arrival and packet length)
• Reservation can increase efficiency to 80%
A sender reserves a future time slot
Sending within this reserved time slot is possible without collision
Reservation also causes higher delays
Typical scheme for satellite links
Collision
Sender A
Sender B
Sender C
• Examples for reservation algorithms:
Explicit Reservation according to Roberts (Reservation-ALOHA)
Implicit Reservation (PRMA)
Reservation-TDMA
t
Slotted Aloha
Collision
Sender A
Sender B
Sender C
Chapter 2.2: Layer 2
t
Page 42
Chapter 2.2: Layer 2
Page 43
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Access Method DAMA: Explicit Reservation
Access Method DAMA: PRMA
Explicit Reservation (Reservation Aloha):
• Two modes:
ALOHA mode for reservation:
competition for small reservation slots, collisions possible
Reserved mode for data transmission within successful reserved slots (no
collisions possible)
• It is important for all stations to keep the reservation list consistent at any point in
time and, therefore, all stations have to synchronize from time to time
Implicit reservation (PRMA - Packet Reservation MA):
• A certain number of slots form a frame, frames are repeated
• Stations compete for empty slots according to the slotted aloha principle
• Once a station reserves a slot successfully, this slot is automatically assigned to
this station in all following frames as long as the station has data to send
• Competition for this slots starts again as soon as the slot was empty in the last
frame
Reservation Time slot:
ACDABA-F
Collision
AC-ABA-A---BAF-
Aloha
Reserved
Aloha
Reserved
Aloha
Reserved
A---BAFD
Aloha
Page 44
Chapter 2.2: Layer 2
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Chapter 2.2: Layer 2
frame 2
A C
frame 3
A
B A F
frame 4
A
B A F D
frame 5
A C E E B A F D
A B A
Chapter 2.2: Layer 2
collision at
reservation
attempts
t
Page 45
MACA – Collision Avoidance
Reservation Time Division Multiple Access
•Every frame consists of N mini-slots and x data-slots
•Every station has its own mini-slot and can reserve up to k data-slots
using this mini-slot (i.e. x = N * k).
•Other stations can send data in unused data-slots according to a roundrobin sending scheme (best-effort traffic)
reservations
for data-slots
1 2 3 4 5 6 7 8
A C D A B A
F
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Access Method DAMA: Reservation-TDMA
N mini-slots
frame 1
N * k data-slots
MACA (Multiple Access with Collision Avoidance) uses short signaling packets for
collision avoidance
•RTS (request to send): a sender request the right to send from a receiver with a
short RTS packet before it sends a data packet
•CTS (clear to send): the receiver grants the right to send as soon as it is ready to
receive
Signaling packets contain
•sender address
•receiver address
•packet size
e.g. N=6, k=2
Variants of this method can be found in IEEE802.11 as DFWMAC (Distributed
Foundation Wireless MAC)
other stations can use free data-slots
based on a round-robin scheme
Page 46
Chapter 2.2: Layer 2
Page 47
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
MACA – Examples
MACA avoids the problem of hidden stations
• A and C want to
send to B
• A sends RTS first
• C waits after receiving
CTS from B
Polling Mechanisms
• If one terminal can be heard by all others, this “central” terminal (a.k.a. base
station) can poll all other terminals according to a certain scheme
Now all schemes known from fixed networks can be used (typical mainframe terminal scenario)
RTS
CTS
A
MACA avoids the problem of exposed terminals
• B wants to send to A, C
to some other terminal
• C does not wait unnecessarily
because it cannot receive
CTS from A
A
Chapter 2.2: Layer 2
• Example: Randomly Addressed Polling
Base station signals readiness to all mobile terminals
Terminals ready to send can now transmit a random number without collision
with the help of CDMA or FDMA (the random number can be seen as dynamic
address)
The base station now chooses one address for polling from the list of all
random numbers (collision if two terminals choose the same address)
The base station acknowledges correct packets and continues polling the next
terminal
This cycle starts again after polling all terminals of the list
CTS
B
C
RTS
RTS
CTS
B
C
Page 48
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Page 49
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
ISMA (Inhibit Sense Multiple Access)
Other Mechanisms with Busy Tone
Current state of the medium is signaled via a “busy tone”
• The base station signals on the downlink (base station to terminals) if the
medium is free or not
• Terminals must not send if the medium is busy
• Terminals can access the medium as soon as the busy tone stops
• The base station signals collisions and successful transmissions via the busy
tone and acknowledgements, respectively (media access is not coordinated
within this approach)
Chapter 2.2: Layer 2
Chapter 2.2: Layer 2
Page 50
Collision avoidance by Out-of-Band Signaling
• Use an additional channel for signaling information
Busy Tone Multiple Access (BTMA)
• Each station hearing an ongoing transmission on the data channel sends a “busy
tone” on the additional control channel
• All terminals in the range of 2 hops of a sending terminal will wait
• No hidden stations, but many exposed stations
Receiver initiated Busy Tone Multiple Access (RI-BTMA)
• Only the receiver sends “busy tone”
• Nearly no exposed stations, but the busy tone only can be sent when the receiver
has decoded the transmission request
Wireless Collision Detect (WCD) Protocol
• Combination of BTMA and RI-BTMA: two types of “busy tones”
• First like BTMA: terminals send a busy tone “collision detect”
• After recognizing a transmission request, the receiver sends a “feedback-tone”, the
other terminals stop the “collision detect” busy tone
Chapter 2.2: Layer 2
Page 51
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
Lehrstuhl für Informatik 4
Kommunikation und verteilte Systeme
SAMA - Spread Aloha Multiple Access
Conclusion
• Aloha has only a very low efficiency, CDMA needs complex receivers to be able
to receive different senders with individual codes at the same time
• Idea: use spread spectrum with only one single code (chipping sequence) for
spreading for all senders accessing according to aloha
Layer 1
• Common modulation techniques GMSK, QPSK, QAM for all wireless networks
• Signal propagation and robustness depend on the frequency band
Collision
Sender A
Sender B
1
0
0
1
1
narrow band
1
send for a
shorter period
with higher power
Spread the signal, e.g. using the chipping sequence 110101 („CDMA without CD“)
t
Layer 2
• Static access methods TDMA/FDMA/CDMA: suitable for voice transmission
because fixed capacities can be assigned
• Dynamic access methods for data communication exist in several variants: with
reservation, using special signaling packets, polling, busy tones on additional
channels, …
• Additionally: CDMA techniques (DSSS, FHSS) can increase the robustness of a
transmission – this can be combined with dynamic access methods!
Problem: find a chipping sequence with good characteristics!
Chapter 2.2: Layer 2
Page 52
Chapter 2.2: Layer 2
Page 53