Slides 2
Slides 2
• Modulation
• Multiplexing
• Medium Access Control
• Channel Allocation
analog
baseband
digital
data signal
digital analog
101101001 modulation modulation radio transmitter
radio
carrier
analog
baseband
digital
signal data
analog synchronization
demodulation decision 101101001 radio receiver
radio
carrier
S(t)
Time
0
1 0 1 1 0 1
+
0 Time
Bit
Wireless and Mobile Networks 2.7
Amplitude Modulation (AM)
Carrier signal
Time
AM signal
s(t) Time
Message signal
Time
x(t)
Carrier signal
for message signal ‘0’ Time
1 0 1 1 0 1
Message signal x(t)
Time
FSK signal s(t)
Time
ï A cos(2pf1t )
ì binary 1
s (t ) = í
î A cos(2pf 2t )
ï binary 0
• very simple
• low bandwidth requirements t
• very susceptible to interference
• Optical fiber 1 0 1
ïA cos(2pf1t + q (0) )
ì binary 1
s (t ) = í
îA cos(2pf 2t + q (0) )
ï binary 0
§ For MSK, the two frequencies satisfy the following equations:
§ This spacing between the two frequencies is the minimum that can be
used and permit successful detection of the signal at the receiver. This is
the reason for the term minimum in MSK.
§ Provides superior bandwidth efficiency to BFSK with only a modest
decrease in error performance.
§ Used in some mobile commutation systems.
1 0 1 1 0 1 0
data bit
even 0101
even bits odd 0011
MSK
signal
t
No phase shifts!
Wireless and Mobile Networks 2.17
Gaussian Minimum Shift Keying
(GMSK)
§ The spectrum of an MSK signal has sidebands extending beyond a
bandwidth equals to the data rate
§ This can be reduced by passing the modulating signal through a low
pass filter prior to applying it to the carrier.
o Gaussian filter
o Its impulse response should show no overshoot with sharp cut-off
ì f0,0 = 0 ì f0 , 0 = p / 4
ï f0,1 = p / 2 ï f = 3p / 4
ï ï 0,1
í or
í
ï f1,0 = p ï f1, 0 = -3 p / 4
ïî f1,1 = 3p / 2 ïî f1,1 = -p / 4
19 2.19
Phase-Shift Keying (PSK)
• Four-level PSK (QPSK)
• Each element represents more than one bit
æ pö
A cosç 2pf c t + ÷
ì è 4ø
11
ï
ï
æ
A cosç 2pf c t +
3p ö
÷ 01
s (t ) = í è
æ
4 ø
3p ö
A cosç 2pf c t - ÷ 00
ï è 4 ø
ï
î æ
A cosç 2pf c t - ÷
pö 10
è 4ø
2.20
QPSK Signal Constellation
Q Q
0,1
1 0 1,1 0,0
I I
1,0
21 2.21
p/4 QPSK
ü The phase of the carrier is: q k = q k -1 +, fk
ü where θk is carrier phase shift corresponding to input bit pairs.
ü If θ0=0, input bit stream is [1011], then:
22 2.22
Quadrature Amplitude
Modulation (QAM)
Combination of AM and PSK: modulate signals using two measures of amplitude
and four possible phase shifts
Bit sequence Amplitude Phase shift
represented
000 1 0
A representative
001 2 0
QAM Table 010 1 p/2
011 2 p/2
100 1 p
101 2 p
110 1 3p/2
111 2 3p/2
23 2.23
Quadrature Amplitude Modulation
(QAM)
ü Two carriers out of phase by 90 degrees are
amplitude modulated
Q
24 2.24
Hierarchical Modulation
q Multi carrier system, about 2000 or 8000 carriers
q QPSK, 16 QAM, 64QAM
q Example: 64QAM
• good reception: resolve the entire
64QAM constellation
Q
• poor reception, mobile reception:
resolve only QPSK portion
• 6 bit per QAM symbol, 2 most
10
significant determine QPSK
I
• High Priority (HP) embedded within
a Low Priority (LP) stream
• HP service coded in QPSK (2 bit),
00
LP uses remaining 4 bit 000010 010101
• code (c) t c
t
s3
f
• Advantages
• only one carrier in the
medium at any time
• throughput high even k1 k2 k3 k4 k5 k6
for many users
c
• Disadvantages f
• precise
synchronization
necessary
t
• Advantages
k1 k2 k3 k4 k5 k6
• better protection against
tapping
c
• protection against frequency
f
selective interference
• but: precise coordination
required
s(f,t,c)
The concept
Beam 3 of SDMA
s(f,t,c)
s(f,t,c) s(f,t,c) Beam 2
Beam n Beam 1
Narrowband
Amplitude
Wideband
Frequency
f f
• Side effects:
• coexistence of several signals without dynamic coordination
• tap-proof
• Alternatives: Direct Sequence, Frequency Hopping
Wireless and Mobile Networks 2.39
Uses of Spread Spectrum
• Military - For low probability of interception of
telecommunications.
• Civil/Military - Range and positioning measurements. GPS
– satellites.
• Civil Cellular Telephony.
• Civil Wireless Networks – 802.11 and Bluetooth.
Amp.
1 2 3 4
Freq.
Channel
Wide Band
Amplitude Data
Hop
Time
Dwell
Time
Hop
Sequence
1
2
3
4
Channels Frequency
tb
user data
0 1 0 1 1 t
f
td
f3 slow
f2 hopping
(3 bits/hop)
f1
td t
f
f3 fast
f2 hopping
(3 hops/bit)
f1
Antenna
FHSS
Data Mixer 1 3 2 4
Buffer Mod
Carrier
Frequency
Sequence
Generator
1 3 2 4
Frequency Synthesizer
CH CH CH CH
Amplitude 2 3 79 80
1 MHz 1 MHz
Freq.
2.400 GHz
2.4835 GHz
Amp.
1 Signal
1 2 3 4
Freq.
Channel
DSSS Band
Amplitude
Channels
1 2 3 4 5 6 7 8 9 10 11
Freq.
22 MHz
2.401 GHz 2.473 GHz
Amplitude
Ch 1 Ch 6 Ch 11
(2.412 GHz) (2.437GHz) (2.462 GHz)
Freq.
22 MHz
2.401 GHz
3MHz 2.473 GHz
2401 MHz
2423 MHz
2426 MHz
Carrier
Frequency DSSS Antenna
Mixer
Carrier
Generator
Mod
spread
spectrum transmit
user data signal signal
X modulator
chipping radio
sequence carrier
transmitter
correlator
lowpass sampled
received filtered products sums
signal signal data
demodulator X integrator decision
radio chipping
carrier sequence
receiver
The frequency of the channel is 10 MHz either side of the dotted line.
There is 5 MHz of separation between channels.
data A Ad
1 0 1
key A
key 0 1 0 1 0 0 1 0 0 0 1 0 1 1 0 0 1 1 Ak
sequence A
data Å key 1 0 1 0 1 1 1 0 0 0 1 0 0 0 1 1 0 0
As
signal A
signal A As
data B 1 0 0 Bd
key B
key 0 0 0 1 1 0 1 0 1 0 0 0 0 1 0 1 1 1 Bk
sequence B
1 1 1 0 0 1 1 0 1 0 0 0 0 1 0 1 1 1
data Å key
Bs
signal B
As + Bs
As + Bs
Ak
(As + Bs)
* Ak
integrator
output
comparator 1 0 1
output
data B Bd
1 0 0
As + Bs
Bk
(As + Bs)
* Bk
integrator
output
comparator 1 0 0
output
As + Bs
wrong
key K
(As + Bs)
*K
integrator
output
comparator
output (0) (0) ?
MS 4
MS 2 Shared Multiple
Access Medium
MS 1 …
MS N
Wireless and Mobile Networks 2.70
Introduction (Cont’d)
• Multiple access issues
• If more than one MS transmit at a time on
the control channel to BS, a collision
occurs
• How to determine which MS can transmit
to BS?
• Multiple access protocols
• Solving multiple access issues
• Different types:
• Contention protocols resolve a collision after it
occurs. These protocols execute a collision resolution
protocol after each collision
• Collision-free protocols ensure that a collision can
never occur
• Example CSMA/CD
• Carrier Sense Multiple Access with Collision Detection
• send as soon as the medium is free, listen into the medium if
a collision occurs (legacy method in IEEE 802.3)
• Problems in wireless networks
• signal strength decreases proportional to the square of the
distance
• the sender would apply CS and CD, but the collisions happen
at the receiver
• it might be the case that a sender cannot “hear” the
collision, i.e., CD does not work
• furthermore, CS might not work if, e.g., a terminal is
“hidden”
Wireless and Mobile Networks 2.72
Motivation - hidden and exposed terminals
• Hidden terminals
• A sends to B, C cannot receive A
• C wants to send to B, C senses a “free” medium (CS fails)
• collision at B, A cannot receive the collision (CD fails)
• A is “hidden” for C
• -> Collisions
• Exposed terminals
A B C
• B sends to A, C wants to send to another terminal (not A or B)
• C has to wait, CS signals a medium in use
• but A is outside the radio range of C, therefore waiting is not
necessary
• C is “exposed” to B
• -> Extended delays
A B C
Static
Channelization
Medium -
Sharing
Techniques Scheduling
Dynamic
Medium Access
Control Random
Access
Classification of multiple access protocols for a shared
channel.
Advantages very simple, increases established, fully simple, established, flexible, less frequency
capacity per km² digital, flexible robust planning needed, soft
handover
Dis- inflexible, antennas guard space inflexible, complex receivers, needs
advantages typically fixed needed (multipath frequencies are a more complicated power
propagation), scarce resource control for senders
synchronization
difficult
Comment only in combination standard in fixed typically combined still faces some problems,
with TDMA, FDMA or networks, together with TDMA higher complexity,
CDMA useful with FDMA/SDMA (frequency hopping lowered expectations; will
used in many patterns) and SDMA be integrated with
mobile networks (frequency reuse) TDMA/FDMA
sender A
sender B
sender C
t
sender A
sender B
sender C
t
Wireless and Mobile Networks 2.80
Pure ALOHA
1 2 3 3 2
Time
Collision
Node 3
Packet
Slot Collision
Ps = e - gT
where g is the packet rate of the traffic
• The throughput Sth of pure Aloha as: Sth = gTe - gT
Sth = Ge - G
• Differentiating Sth with respect to G and equating to zero gives
dSth
= -Ge -G + e -G = 0
dG
• The Maximum throughput of ALOHA is
1
S max = » 0.368
e
Wireless and Mobile Networks 2.84
Throughput
0.5
0.4 0.368
S: Throughput
0.3
Slotted Aloha
0.2 0.184
0.1 Aloha
00 2 4 6 8
G = gT
Wireless and Mobile Networks 2.85
DAMA - Demand Assigned Multiple Access
• Channel efficiency only 18% for Aloha, 36% for Slotted
Aloha (assuming Poisson distribution for packet arrival
and packet length)
• Reservation can increase efficiency to 80%
• a sender reserves a future time-slot
• sending within this reserved time-slot is possible without
collision
• reservation also causes higher delays
• typical scheme for satellite links
• Examples for reservation algorithms:
• Explicit Reservation according to Roberts (Reservation-
ALOHA)
• Implicit Reservation (PRMA)
• Reservation-TDMA
collision
t
Aloha reserved Aloha reserved Aloha reserved Aloha
MS 5 sense
MS 1 Packet
MS 2 Packet
Delay for MS 5
MS 3 Packet
1 2 3 4 5
Time
Delay for MS 4 Collision
MS 4 senses
Unslotted Nonpersistent
Nonpersistent CSMA (no CSMA
wait)
Slotted Nonpersistent CSMA
CSMA
1-persistent
CSMA
p-persistent
CSMA
0.6
0.5-persistent CSMA
0.5
0.4
1-persistent CSMA
0.3
0.2 Slotted
Aloha Aloha
0.1
0
0 1 2 3 4 5 6 7 8 9
Traffic Load G
e
T0+t-e B begins
transmission A B
0.8
α = 0.01
0.6
0.4 α = 0.1
α=1
0.2
Traffic load G
Contention
Contention window
DIFS window DIFS
busy
Station 1
busy
Station 3
Backoff=7 Backoff=2
(4)
busy
Station 4
(1)After packet arrival at MAC, station 3 senses medium free for DIFS, so it starts transmission
immediately (without backoff interval).
(2) For station 1, 2, and 4, their DIFS intervals are interrupted by station 3. Thus, backoff
intervals for station 1, 2, and 4, are generated randomly (i.e. 9, 5, and 7, respectively).
(3) After transmission of station 2, the remaining backoff interval of station 1 is (9-5)=4.
(4) After transmission of station 2, the remaining backoff interval of station 4 is (7-5)=2.
(5) After transmission of station 4, the remaining backoff interval of station 1 is (4-2)=2.
Wireless and Mobile Networks 2.104
Random Backoff Time
• Backoff time = CW*
Random() * Slot time
• CW = starts at CWmin, CWmax
DIFS Time
Data
Source
MS SIFS
ACK
BS
DIFS Contention window
Next Frame
Other
MSs
Defer access Backoff after defer
R R R
A B C
MS
SIFS SIFS
CTS ACK
Destination
MS
DIFS
Contention window
Next Frame
Other
MSs
Defer access Backoff
C TS
Radio Transmission
range
R R R R
A
A B C D
• Channel allocation
schemes can be divided A7
A2
in general into Static
A1,4
versus Dynamic A1,5 A1,3
A6
• Fixed Channel Allocation A1 ,1
(FCA); A1,6 A1,2 A3
A1,7
• Dynamic Channel
Allocation (DCA); A5
A4
• Hybrid Channel
Allocation (HCA).
Cell 3
X Y
2
Z
A7
c
a A2
b c
a
b
A6
c
a A1
b c
a A3
b x c
a
b
A5
c
a A4
b c
a
b
X borrows some
Wireless and Mobile Networks channels from a
Simple Channel Borrowing Schemes
Scheme Description
Simple A nominal channel set is assigned to a cell, as in the FCA case. After all
Borrowing (SB) nominal channels are used, an available channel from a neighboring cell
is borrowed
Borrow from Channels that are candidates for borrowing are available channels
the Richest nominally assigned to one of the adjacent cells of the acceptor cell. If
(SBR) more than one adjacent cell has channels available for borrowing, a
channel is borrowed from the cell with the greatest number of channels
available for borrowing
Basic This is an improved version of the SBR strategy which takes channel
Algorithm (BA) blocking into account when selecting a candidate channel for borrowing.
This scheme tried to minimize the future call blocking probability in the
cell that is most affected by the channel borrowing
Basic This scheme provides for the transfer of a call from a borrowed channel
Algorithm with to a nominal channel whenever a nominal channel becomes available
Reassignment
Borrow First Instead of trying to optimize when borrowing, this algorithm selects the
Available first candidate channel it finds
Scheme Description
Mean The MSQ scheme selects the available channel
Square that minimizes the mean square of the distance
(MSQ) among the cells using the same channel
1-clique This scheme uses a set of graphs, one for each
channel, expressing the non co-channel
interference structure over the whole service
area for that channel