multiple access techniques for wireless communication submitted to : dr. mohab mangoud submitted by:...

38
Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Upload: jack-rodgers

Post on 28-Dec-2015

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Multiple Access Techniques for Wireless Communication

Submitted to : Dr. Mohab MangoudSubmitted by: Nader Ahmed Abu Al Arraj

Page 2: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Outline1. Introduction

2. Spread Spectrum Multiple Access (SSMA)2.1 Frequency Hopped Multiple Access (FHMA)2.2 Code Division Multiple Access (CDMA)2.3 Hybrid Spread Spectrum Techniques

3. Space division Multiple (SDMA)

4. Packet Radio4.1 Packet Radio Protocols4.2 Carrier Sense Multiple Access (CSMA) Protocols4.3 Reservation Protocols

5. Conclusion

6. References

Page 3: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

1. Introduction

• Multiple access schemes are used to allow many mobile users to share simultaneously a finite amount of radio spectrum.

• The sharing of spectrum is required to achieve high capacity by simultaneously allocating the available bandwidth (or the available amount of channels) to multiple users.

• For high quality communications, this must be done without severe degradation in the performance of the system.

Page 4: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Spread Spectrum multiple access (SSMA) uses signals which have :a transmission bandwidth that is several orders of magnitude greater than the minimum required RF bandwidth. A PN sequence converts a narrowband signal to a wideband noise-like signal before transmission.

Advantage

1. Immune to multipath interference and robust multiple access capability.

2. Efficient in a multiple user environment

2.Spread Spectrum Multiple Access (SSMA)

Page 5: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Frequency Hopped Multiple Access (FHMA)FHMA is a digital multiple access system in which the carrier frequencies of the individual users are varied in a pseudorandom fashion within a wideband channel.

In FH transmitter

1. The digital data is broken into uniform sized bursts which are transmitted on different carrier frequencies.

2. The instantaneous bandwidth of any one transmission burst is much smaller than the total spread bandwidth.

3. The pseudorandom change of the carrier frequencies of the user randomizes the occupancy of a specific channel at any given time.

2.Spread Spectrum Multiple Access (SSMA)

Page 6: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

In FH receiver:

1. A locally generated PN code is used to synchronize the receivers instantaneous frequency with that of the transmitter.

2. At any given point in time, a frequency hopped signal only occupies a single, relatively narrow channel since narrowband FM or FSK is used.

3. FHMA systems often employ energy efficient constant envelope modulation.

4. Linearity is not an issue, and the power of multiple users at the receiver does not degrade FHMA performance.

2.Spread Spectrum Multiple Access (SSMA)

Page 7: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

The difference between FHMA and FDMA

The difference between FHMA and FDMA is that the frequency hopped signal changes channels at rapid interval.

If the rate of change of the carrier frequency is greater than the symbol rate, it is referred to as a fast frequency hopping. (FDMA)

If the channel changes at a rate less than or equal to the symbol rate, it is called slow frequency hopping system.

2.Spread Spectrum Multiple Access (SSMA)

Page 8: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Advantage of FH system

1. A frequency hopped system provides a level of security, since an unintended receiver that does not know the pseudorandom sequence of frequency slots must retune rapidly to search for the signal it wishes to intercept.

2. FH signal is somewhat immune to fading, since error control coding and interleaving can be used to protect the frequency hopped signal against deep fades which may occasionally occur during the hopping sequence.

2.Spread Spectrum Multiple Access (SSMA)

Page 9: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

CDMA: Code Division Multiple Access

•The spreading signal is a pseudo-noise code sequence that has a chip rate which is orders of magnitudes greater than the data rate of the message.

•All users in CDMA system, use the same carrier frequency and may transmit simultaneously.

•In CDMA, the narrowband message signal is multiplied by a very large bandwidth signal called the spreading signal.

•Each user has its own pseudorandom codeword which is approximately orthogonal to all other codewords.

2.Spread Spectrum Multiple Access (SSMA)

Page 10: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

The near-far problem Occur

1. when many mobile users share the same channel, the strongest received mobile signal will capture the demodulator at a base station.

2. In CDMA, stronger received signal levels raise the noise floors at the base station demodulators for the weaker signals, thereby decreasing the probability that weaker signals will be received.

2.Spread Spectrum Multiple Access (SSMA)

Page 11: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Solution: power control

1. Power control is provided by each base station in a cellular system and assures that each mobile within the base station coverage area provides the same signal level to the base station receiver.

2. Power control is implemented at the base station by rapidly sampling the radio signal strength indicator levels of each mobile and then sending a power change command over the forward radio link.

2.Spread Spectrum Multiple Access (SSMA)

Page 12: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

The features of CDMA

1. Many users of a CDMA system share the same frequency.

2. CDMA has a soft capacity. Increasing the number of users in a CDMA system raises the noise floor in a linear manner.

3. Multipath fading may be substantially reduced.

4. Channel data rates are very high in CDMA systems.

5. The near-far problem occurs in CDMA system.

2.Spread Spectrum Multiple Access (SSMA)

Page 13: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Comparison of DS and FH system

DS FH

Bandwidth is relate to

PN sequence clock rate or chip rate

The tuning range of frequencies

Synchronization Very crucial Less critical

Spectrum Very wide narrow

Near-far problem

More likely to occur

Less likely to occur

2.Spread Spectrum Multiple Access (SSMA)

Page 14: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Feature FDMA TDMA CDMA

High carrier frequency stability

Required Not necessary

Not necessary

Timing/synchronizatio

n

Not required

Required Required

Near-far problem

No No Yes,power control tech.

Variable transmission

rate

Difficult Easy Easy

Fading mitigation

Equalizer not

needed

Equalizer may be needed

RAKE receiver possible

Power monitoring

Difficult Easy Easy

Zone size Any size Any size Large size difficult

Comparison of FDMA, TDMA, CDMA

Page 15: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

1. Hybrid FDMA/CDMA(FCDMA)

2. Hybrid Direct Sequence/Frequency Hopped Multiple Access (DS/FHMA)

3. Time Division CDMA(TCDMA)

4. Time Division Frequency Hopping(TDFH)

Hybrid Spread Spectrum Techniques

2.Spread Spectrum Multiple Access (SSMA)

Page 16: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

The available wideband spectrum is divided into a number of subspectras with smaller bandwidths. Each of these smaller subchannels becomes a narrowband CDMA system having processing gain lower than the original CDMA system.

Hybrid FDMA/CDMA(FCDMA)

Advantage: the required bandwidth need not be contiguous and different users and be allotted different subspectrum bandwidths depending on their requirement.

2.Spread Spectrum Multiple Access (SSMA)

Page 17: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Advantage : they avoid the near-far effect.

Disadvantage: they are not adaptable to the soft handoff process.

Hybrid Direct Sequence/Frequency Hopped Multiple Access(DS/FHMA)

This technique consists of a direct sequence modulated signal whose center frequency is made to hop periodically in a pseudorandom fashion.

2.Spread Spectrum Multiple Access (SSMA)

Frequency spectrum of a hybrid FH/DS system

Page 18: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Time Division CDMA(TCDMA)

Different spreading codes are assigned to different cells. Within each cell, only one user per cell is allotted a particular time slot.Thus at any time, only one CDMA user is transmitting in each cell. When a handoff takes place, the spreading code of the user is changed to that of the new cell.

Advantage: it avoids the near-far effect .

2.Spread Spectrum Multiple Access (SSMA)

Page 19: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Time Division Frequency Hopping (TDFH)

The subscriber can hop to a new frequency at the start of a new TDMA frame. In GSM standard, hopping sequence is predefined and the subscriber is allowed to hop only on certain frequencies which are assigned to a cell.

Advantage:

1. Avoiding a severe fade or erasure event on a particular channel.

2. Avoiding the co-channel interference problems between neighboring cells if two interfering base station transmitters are made to transmit on different frequencies at different times.

2.Spread Spectrum Multiple Access (SSMA)

Page 20: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

SDMA controls the radiated energy for each user in space. we see that different areas covered by the antenna beam may be served by the same frequency or different frequencies.

3. Space division Multiple (SDMA)

Spatially filtered base station antenna serving different user by using spot beams

Page 21: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Sectorized antennas may be thought of as a primitive application of SDMA. In the future, adaptive antennas will likely be used to simultaneously steer energy in the direction of many users at once and appear to be beast suited for TDMA and CDMA base station architectures.

3. Space division Multiple (SDMA)

Page 22: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

In packet radio (PR) access techniques, many subscribers attempt to access a single channel in an uncoordinated( or minimally coordinated) manner. Collisions from the simultaneous transmissions of multiple transmitters are detected at the base station receiver, in which case an ACK or NACK signal is broadcast by the base station to alert the desired user of received transmission.

The subscribers use a contention technique to transmit on a common channel. ALOHA protocols are the best examples of contention techniques.

The performance of contention techniques can be evaluated by the throughput(T), and the average delay(D).

4. Packet Radio

Page 23: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Vulnerable period : the time interval during which the packets are susceptible to collisions with transmissions form other users.

pV

Packet Radio Protocol

4. Packet Radio

Packet A will collide with packet B & C because of overlap in transmission time

Vulnerable period for a packet using the ALOHA protocol

Page 24: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Assumption

• All packets sent by all users have a constant packet length and fixed, channel data rate.

• All other users may generate new packets at random time intervals.

• Packet transmissions occur with a Poisson distribution having a mean arrival rate of packets per second.

The traffic occupancy or throughput R:

R

is the packet duration in seconds

4. Packet Radio

Page 25: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

]Pr[]Pr[ collisionnocollisionnoRT

T: the normalized throughput.

Pr[no collision]: the probability of a user making a successful packet transmission

!)Pr(

n

eRn

Rn

Pr(n): the probability that n packets are generated by the user population during a given packet duration interval.

4. Packet Radio

Page 26: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Based on the type of access, contention protocols are categorized as :

•Random access

•Scheduled access

•Hybrid access

4. Packet Radio

Page 27: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Pure ALOHA

The pure ALOHA protocol is a random access protocol used for data transfer.

!

)2()Pr(

2

n

eRn

Rn

The vulnerable period is , the probability of no collision during the vulnerable period Pr(n):

The throughput:

RT 2Re

2

At n=0

4. Packet Radio

Page 28: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Slotted ALOHA

In slotted ALOHA, time is divided into equal time slots of length greater than the packet duration .

The vulnerable period for slotted ALOHA is only one packet duration.

The probability that on other packets will be generated during the vulnerable period is .Re

The throughput:

RT Re

4. Packet Radio

Page 29: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

How ALOHA and slotted ALOHA systems trade-off throughput for delay?

0 0.5 1 1.5 20

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

Normalized Delay(R)

Thro

ughput(

T)

slotted ALOHAALOHA

Page 30: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Carrier Sense Multiple Access(CSMA)

CSMA protocols are based on the fact that each terminal on the network is able to monitor the status of the channel before transmitting information. If the channel is idle, then the user is allowed to transmit a packet based on a particular algorithm which is common to all transmitters on the network.

There are two important parameters for CSMA protocol:

1. Detection delay

2. Propagation delay

4. Packet Radio

Page 31: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Detection delay: a function of the receiver hardware and is the time required for a terminal to sense whether or not the channel is idle.

Propagation delay: a relative measure of how fast it takes for a packet to travel from a base station to a mobile terminal.

m

Rtt bpd

: the propagation time in seconds

: the channel bit rate

: the expected number of bits in a data packet

: propagation delaydt

pt

bR

m

4. Packet Radio

Page 32: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Reservation Protocols

1. Reservation ALOHA: a packet access scheme based on time division multiplexing . In this protocol, certain packet slots are assigned with priority, and it is possible for users to reserve slots for the transmission of packets.

2. Packet Reservation Multiple Access (PRMA): it uses a discrete packet time techniques similar to reservation ALOHA and combines the cyclical frame structure of TDMA in a manner that allows each TDMA time slot to carry either voice or data, where voice is given priority.

4. Packet Radio

Page 33: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Capture Effect in Packet Radio

Capture Effect in Packet Radio (Near-far effect)

•Advantage: a particular transmitter may capture an intended receiver, many packets may survive despite collision on the channel

•Disadvantage: a stronger transmitter which is attempting to communicate to the same receiver.

A useful parameter in analyzing the capture effects in packet radio protocols is the minimum power ratio of an arriving packet, relative to the other colliding packets. This radio is called the capture ratio, and is dependent upon the receiver and the modulation used.

4. Packet Radio

Page 34: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

5.Conclusion

• Different Multiple access Techniques were presented. These include FDMA, TDMA, CDMA, SSMA, SDMA, and Packet Radio. Applications that use multiple access techniques such as GSM and others were also discussed. Multiple access techniques solved many of the problems such as channel capacity and security that face the users sharing a channel.

Page 35: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

1. Wireless Communications—Theodore S.Rappaport

6. Reference

Page 36: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Channel data rates are very high in CDMA systems.

Consequently, the symbol(chip) duration is very short and usually much less than the channel delay spread. Since PN sequences have low autocorrelation, multipath which is delayed by more than a chip will appear as noise. A RAKE receiver can be used to improve reception by collecting time delayed versions of the required signal

Page 37: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Soft handoff is performed by the MSC

which can simultaneously monitor a particular user from two or more base stations. The MSC may chose the best version of the signal at any time without switching frequencies.

Page 38: Multiple Access Techniques for Wireless Communication Submitted to : Dr. Mohab Mangoud Submitted by: Nader Ahmed Abu Al Arraj

Self-jamming is a problem in CDMA system. Self-jamming arises from the fact that the spreading sequences of different users are not exactly orthogonal, hence in the despreading of a particular PN code, non-zero contributions to the receiver decision statistic for a desired user arise from the transmissions of other users in the system.