Professional Documents
Culture Documents
Multiple Access Techniques For Wireless Communications: 2005/07/06 Weng Chien-Erh
Multiple Access Techniques For Wireless Communications: 2005/07/06 Weng Chien-Erh
Multiple Access Techniques For Wireless Communications: 2005/07/06 Weng Chien-Erh
Communications
2005/07/06
Weng Chien-Erh
Wireless Access Tech.
Lab.
Table of Contents(1)
Introduction
FDMA
TDMA
CDMA
SS (Spread Spectrum)
FHSS
DSSS
Hybrid
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Table of Contents(2)
Packet Radio
Pure ALOHA
Slotted ALOHA
CSMA
Reservation Protocol
Reservation-ALOHA
PRMA
NC-PRMA
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Introduction (1)
Multiple Access:
Enable many mobile users to share simultaneously radio
spectrum.
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Introduction (2)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Introduction (3)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Introduction (4)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab. Frequency Division Multiple Access
(FDMA) (1)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab. Frequency Division Multiple Access
(FDMA) (2)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab. Frequency Division Multiple Access
(FDMA) (3)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab. Frequency Division Multiple Access
(FDMA) (4)
Features of FDMA
If an FDMA channel is not in sue, then it sits idle and can’t
be used by other users.
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab. Frequency Division Multiple Access
(FDMA) (5)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Division Multiple Access (TDMA) (1)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Division Multiple Access (TDMA) (2)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Division Multiple Access (TDMA) (3)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Division Multiple Access (TDMA) (4)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Division Multiple Access (TDMA) (5)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Division Multiple Access (TDMA) (6)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Division Multiple Access (TDMA) (7)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Division Multiple Access (TDMA) (8)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Division Multiple Access (TDMA) (8)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Code Division Multiple Access (CDMA) (1)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Code Division Multiple Access (CDMA) (2)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Code Division Multiple Access (CDMA) (3)
example
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Code Division Multiple Access (CDMA) (4)
Features of CDMA
Many users of a CDMA system share the same frequency.
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Frequency Hopping (1)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Frequency Hopping (2)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Frequency Hopping (3)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Hopping (1)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Time Hopping (2)
TH-PPM
Ns 1
Str t wtr t iTs jT f ciN s jTc d i
i j 0
Tc
t
Tf
Ts
User1 : C(1)=[1 0 0 2] d1=0
User2 : C(2)=[0 1 2 0] d2=1
User3 : C(3)=[2 2 1 1] d3=0
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (1)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (3)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (4)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (5)
Fast hopping
Slow hopping
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (6)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (7)
Modulation
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (8)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (9)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (10)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (11)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (12)
Narrowband interference
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (13)
Wideband interference
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (14)
Gaussian noise
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (15)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (16)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Spread Spectrum Multiple Access (17)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (1)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (2)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (3)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (4)
Under normal loading, the throughput T is the same as the total off
ered load L.
The load L is the sum of the newly generated packets and the retran
smitted packets that suffered collisions.
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (5)
Pr(0) e R
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (6)
Type of Access
Contention protocols are categorized as:
Random Access: there is no coordination among that users and t
he messages are transmitted from the users as they arrive at t
he transmitter.
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (7)
Pure ALOHA
The pure ALOHA protocol is random access protocol used for
data transfer and a user accesses a channel as soon as a
message is ready to be transmitted.
After a transmission, the user waits for an acknowledgment on
either the same channel or a separate feedback channel.
In case of collisions, the terminal waits for a random period of
time and retransmits the message.
For pure ALOHA, the vulnerable period is double the packet
duration: ,
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (8)
Slotted ALOHA
In slotted ALOHA, time is divided into equal time slots of
length greater than the packet duration .
The subscribers each have synchronized clocks and transmit
a message only at the beginning of a new time slot.
The vulnerable period of slotted ALOHA is only one packet
duration, since partial collisions are prevented through
synchronization.
The probability that no other packets
R
will be generated
during the vulnerable period is e .
The throughput for the case of slotted ALOHA is thus given
by T Re R .
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (9)
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (10)
Non-persistent CSMA
p-persistent CSMA
CSMA/CD
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (11)
Reservation Protocols
Reservation ALOHA (R-ALOHA)
R-ALOHA is a packet scheme based on time division multiplexing.
Two phase: contention phase and transmission phase
Mobiles contend the channel in reservation phase (slotted-ALOHA)
Mobiles that succeed in making reservation can transmit without interference
Frame N
CCU
Wireless Access Tech. Lab.
Wireless Access Tech.
Lab.
Packet Radio (12)
Frame N
CCU
Wireless Access Tech. Lab.