lecture 7 centralized mac lecture 7 centralized mac
play

Lecture 7: Centralized MAC Lecture 7: Centralized MAC protocols - PowerPoint PPT Presentation

Lecture 7: Centralized MAC Lecture 7: Centralized MAC protocols protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Centralized MAC protocols Previous lecture contention based MAC Previous lecture contention based MAC


  1. Lecture 7: Centralized MAC Lecture 7: Centralized MAC protocols protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

  2. Centralized MAC protocols  Previous lecture – contention based MAC  Previous lecture – contention based MAC protocols, users decide who transmits when in a protocols, users decide who transmits when in a decentralized manner decentralized manner  Today’s lecture – a central entity allocates  Today’s lecture – a central entity allocates resources to users sharing a medium resources to users sharing a medium  TDMA – Time Division Multiple Access  TDMA – Time Division Multiple Access  CDMA – Code Division Multiple Access  CDMA – Code Division Multiple Access  Other concepts – SDMA, FDMA / OFDMA  Other concepts – SDMA, FDMA / OFDMA  Mainly used in cellular networks, as voice  Mainly used in cellular networks, as voice requires high QoS. requires high QoS.

  3. TDMA  Assign different time slots to different users  Assign different time slots to different users  Fixed TDMA – Each user gets a fixed time slot  Fixed TDMA – Each user gets a fixed time slot irrespective of whether he has data to send or irrespective of whether he has data to send or not not  Wastes slots when users have bursty data  Wastes slots when users have bursty data  Dynamic TDMA – the decision of which user  Dynamic TDMA – the decision of which user sends when is decided on a per-slot basis sends when is decided on a per-slot basis  Users signal their intention to send data  Users signal their intention to send data  Slots allocated to users who have data to send  Slots allocated to users who have data to send  Scheduling algorithm decides which user is scheduled  Scheduling algorithm decides which user is scheduled to transmit in which slot to transmit in which slot

  4. Scheduling algorithms  Dynamic TDMA relies on scheduling algorithms. Tradeoff between  Dynamic TDMA relies on scheduling algorithms. Tradeoff between efficiency and fairness. efficiency and fairness.  Common scheduling algorithms used in cellular networks  Common scheduling algorithms used in cellular networks  Round robin – schedule all users in a certain order. Guarantees  Round robin – schedule all users in a certain order. Guarantees fairness. fairness.  Max rate – schedule the user that has best channel conditions, i.e.,  Max rate – schedule the user that has best channel conditions, i.e., can send at highest rate. This guarantees that the network gets high can send at highest rate. This guarantees that the network gets high throughput. But may starve some users at cell edge. throughput. But may starve some users at cell edge.  Proportionally fair – schedule users according to a priority computed  Proportionally fair – schedule users according to a priority computed as p = current_rate / average_rate. The current rate is computed as p = current_rate / average_rate. The current rate is computed based on current channel conditions. So biased towards users with based on current channel conditions. So biased towards users with good channel and high rate. Also avoids starving of some users, good channel and high rate. Also avoids starving of some users, because if average_rate becomes low enough, the user priority will because if average_rate becomes low enough, the user priority will increase and he will get scheduled. increase and he will get scheduled.  Proportionally fair scheduler (or its variants )is the most common  Proportionally fair scheduler (or its variants )is the most common design used in today’s networks. design used in today’s networks.

  5. CDMA  Basic idea: transmit each user’s data using a unique code.  Basic idea: transmit each user’s data using a unique code.  Take each bit, exor with a longer bit sequence called code, and  Take each bit, exor with a longer bit sequence called code, and transmit the resulting new bit stream. transmit the resulting new bit stream.  For example, suppose a user’s code is 010011. Then, for bit 1 the user  For example, suppose a user’s code is 010011. Then, for bit 1 the user sends the code “010011”. For bit 0, the user sends the complement sends the code “010011”. For bit 0, the user sends the complement “101100”. “101100”.  At the receiver, correlate with the code to recover data.  At the receiver, correlate with the code to recover data.  If correlation with 010011 is high, then it is 1. If correlation with  If correlation with 010011 is high, then it is 1. If correlation with complement is high, then it is 0. complement is high, then it is 0.  Different users are assigned different “orthogonal” codes, that is,  Different users are assigned different “orthogonal” codes, that is, codes which have low correlation with each other. codes which have low correlation with each other.  Even if the signals of multiple users are combined, the receiver can  Even if the signals of multiple users are combined, the receiver can extract its own transmission by correlating with its own code extract its own transmission by correlating with its own code  Can be synchronous (code boundaries are aligned) or  Can be synchronous (code boundaries are aligned) or asynchronous. Codes are generated in different ways for both asynchronous. Codes are generated in different ways for both schemes. schemes.

  6. CDMA (2)  Example, user A uses code 010011 and user B uses code  Example, user A uses code 010011 and user B uses code 110101 (example from Schiller’s textbook) 110101 (example from Schiller’s textbook)  Suppose A wants to send bit 1 and B wants to send bit 0.  Suppose A wants to send bit 1 and B wants to send bit 0. Let’s assume we send -1 for code bit 0. Let’s assume we send -1 for code bit 0.  A sends (-1,1,-1,-1,1,1) and B sends (-1,-1,1,-1,1,-1)  A sends (-1,1,-1,-1,1,1) and B sends (-1,-1,1,-1,1,-1)  In a simplistic model where both signals combine, we get (-  In a simplistic model where both signals combine, we get (- 2,0,0,-2,2,0) 2,0,0,-2,2,0)  Correlate received signal with A’s code gives +6  bit 1  Correlate received signal with A’s code gives +6  bit 1  Correlate with B’s code word gives -6  bit 0  Correlate with B’s code word gives -6  bit 0  If B’s transmit power is much higher than A’s, that is, B’s bit  If B’s transmit power is much higher than A’s, that is, B’s bit sequence is scaled up, then harder to decode A’s bit. sequence is scaled up, then harder to decode A’s bit.  Power control is very important in CDMA, as other  Power control is very important in CDMA, as other transmissions appear as noise and reduce SNR transmissions appear as noise and reduce SNR

  7. Frequency Domain View of CDMA  Multiplying a bit with a code is equivalent to spreading  Multiplying a bit with a code is equivalent to spreading the spectrum in the frequency domain (recall: faster the spectrum in the frequency domain (recall: faster pulses -> wider bandwidth) pulses -> wider bandwidth)  That is, each user uses a larger bandwidth than the  That is, each user uses a larger bandwidth than the original signal original signal  However, CDMA is not inefficient because many users  However, CDMA is not inefficient because many users are multiplexed over the same wider band are multiplexed over the same wider band  This idea can be used for a single user too – spread  This idea can be used for a single user too – spread spectrum modulation scheme spectrum modulation scheme  Achieves low rates, but useful with frequency selective  Achieves low rates, but useful with frequency selective fading and resilience to jamming by enemies fading and resilience to jamming by enemies  Direct Sequence Spread Spectrum (DSSS) is used for the 1  Direct Sequence Spread Spectrum (DSSS) is used for the 1 and 2 Mbps rates in 802.11b. A special 11 bit code is used and 2 Mbps rates in 802.11b. A special 11 bit code is used to spread each bit. to spread each bit.

  8. Other ways of multiplexing  Space Division Multiple Access (SDMA) – the idea  Space Division Multiple Access (SDMA) – the idea behind having “cells” in cellular networks. behind having “cells” in cellular networks. Frequencies used in one cell can be reused in Frequencies used in one cell can be reused in another cell that is some distance away. another cell that is some distance away.  Frequency Division Multiple Access (FDMA) –  Frequency Division Multiple Access (FDMA) – assign multiple narrow channels to different assign multiple narrow channels to different users. users.  Orthogonal Frequency Division Multiple Access  Orthogonal Frequency Division Multiple Access (OFDMA) – Similar to OFDM, but different sub (OFDMA) – Similar to OFDM, but different sub carriers can be allocated to different transmitters. carriers can be allocated to different transmitters.

  9. Challenges in centralized MACs  TDMA requires tight time synchronization  TDMA requires tight time synchronization  CDMA requires fine-grained power control  CDMA requires fine-grained power control (and possibly time sync) (and possibly time sync)  FDMA requires very precise channel filters to  FDMA requires very precise channel filters to restrict users to specific frequencies restrict users to specific frequencies

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend