MSIT 413: Wireless Technologies - Northwestern...

102
NORTHWESTERN MSIT | Master of Science in Information Technology U N I V E R S I T Y MSIT 413: Wireless Technologies Week 5 Michael L. Honig Department of EECS Northwestern University January 2016

Transcript of MSIT 413: Wireless Technologies - Northwestern...

Page 1: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

MSIT 413: Wireless Technologies Week 5

Michael L. Honig Department of EECS

Northwestern University

January 2016

Page 2: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Outline

•  MIMO •  Multiple Access techniques

–  FDMA, TDMA –  OFDMA (LTE) –  CDMA (3G, 802.11b, Bluetooth) –  Random Access

Page 3: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Diversity •  Idea: Obtain multiple independent copies of the received signal.

–  Improves the chances that at least one is not faded.

•  Macroscopic (space): copies of signal are received over distances spanning many wavelengths.

•  Microscopic (space): copies of signal are received over distances spanning a fraction of a wavelength

•  Different types…

Page 4: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Microscopic Space Diversity

•  Want signals s1 and s2 to experience independent fading (why?). –  distance between antennas should be ≥ ½ wavelength. –  Ex: 900 MHz, λ = c/f ≈ 1/3 meter

2 GHz, λ ≈ 0.15 meter

Antenna 1 Antenna 2

s1 s2

Page 5: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Multiple Antennas: Multi-Input/Multi-Output (MIMO) Channel

Multi-Channel Detector

Transmitted

Data (multiple data streams)

Estimated Data

•  Multiple (M) antennas at receiver and transmitter •  Channel has multiple inputs and multiple outputs.

5

Page 6: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Single Transmit Antenna

Multi-Channel Detector

Transmitted

Data (single stream)

Estimated Data

•  Multiple receiver antennas provides spatial diversity •  Lowers error rate

•  “Single-Input/Multiple-Output (SIMO)” channel

6

Page 7: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Multi-Input/Single Output (MISO) Channel

Single-Channel Detector

Transmitted

Data (single or multiple streams)

Estimated Data

•  Transmitting the same symbol from all transmitters provides transmit spatial diversity (e.g., select the best antenna, turn the others off).

•  Practical for cellular downlink. 7

Page 8: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Downlink Beamforming

Different beams can use the same frequency!

Narrow “beam” focused on one user

8

•  M antennas at the base station (single or multiple antennas at mobiles)

•  Can support up to M data streams. •  Multi-user MIMO: multiple users on the same channel

–  Introduced in LTE, 802.11ac

Page 9: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

OFDM Signal

Orthogonal Frequency Division Multiplexing (OFDM)

Split into M substreams source

bits

Modulate Carrier f1

+

Modulate Carrier f2

Modulate Carrier fM

substream 1

substream 2

substream M …

Page 10: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Multiple Antennas: Multi-Input/Multi-Output (MIMO)Channel

•  Multiple (M) antennas at receiver and transmitter.

Multi-Channel Detector

Transmitted Data Estimated

Data

10

Page 11: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Multiple Antennas: Multi-Input/Multi-Output (MIMO)Channel

•  Multiple (M) antennas at receiver and transmitter. •  Transmitted data is divided into M substreams, one for each antenna.

•  Transmit antennas are used to multiplex multiple data streams.

Multi-Channel Detector

Substream 1

Estimated Data Substream M

11

Page 12: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Multiple Antennas: Multi-Input/Multi-Output (MIMO)Channel

•  Multiple (M) antennas at receiver and transmitter. •  Transmitted data is divided into M substreams, one for each antenna.

•  Transmit antennas are used to multiplex multiple data streams. •  Multiple receiver antennas (plus signal processing) are used to

remove interference from the different antennas.

Multi-Channel Detector

Substream 1

Estimated Data Substream M

12

Page 13: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Multiple Antennas: Multi-Input/Multi-Output (MIMO)Channel

•  Multiple (M) antennas at receiver and transmitter. •  Transmitted data is divided into M substreams, one for each antenna.

•  Transmit antennas are used to multiplex multiple data streams. •  Multiple receiver antennas (plus signal processing) are used to

remove interference from the different antennas. •  Data rate (Shannon capacity) is proportional to M!

Multi-Channel Detector

Estimated Data

Substream 1

Substream M

13

Page 14: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

WiFi Evolution: 802.11n

•  Technology based on OFDM with multiple antennas at the transmitter and receivers

•  Supports data rates up to 540 Mbps –  4 spatial streams, 40 MHz bandwidth –  Can replace USB 2.0 connections.

•  Also important part of 802.11ac (multi-user MIMO)

14

Page 15: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

The Multiple Access Problem

•  Frequency-Division (AMPS)

•  Time-Division (GSM)

•  Code-Division (3G, Bluetooth) Direct Sequence/Frequency-Hopped

•  Orthogonal Frequency Division Multiple Access (OFDMA)

•  Random Access (Wireless Data)

How can multiple mobiles “access” (communicate with) the same base station?

Page 16: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Duplexing (Two-way calls)

Frequency-Division Duplex (FDD)

Time-Division Duplex (TDD)

Channel 1

Channel 2

Time slot (frame) 1

Time slot (frame) 2

Page 17: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Combinations

•  FDMA/FDD (AMPS) •  TDMA/FDD (GSM) •  TDMA/TDD (IS-136 or 2G in the U.S.) •  CDMA/FDD (IS-95, CDMA2000) •  CDMA/TDD (3G/UMTS) •  Frequency-Hopped CDMA/TDD (Bluetooth) •  OFDMA/TDD and FDD (WiMax, 4G)

Page 18: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

The Multiple Access Problem

•  Frequency-Division (AMPS)

•  Time-Division (IS-136, GSM)

•  Code-Division (IS-95, 3G) Direct Sequence/Frequency-Hopped

•  Orthogonal Frequency Division Multiple Access (OFDMA)

•  Random Access (Wireless Data)

How can multiple mobiles access (communicate with) the same base station?

Page 19: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Cellular Spectrum (50 MHz)

A* A B A* B*

uplink

downlink

824

869 870 880 890 891.5 894

825 835 845 846.5 849

AMPS (1G): 30 kHz Channels

416 FDD Channels (requires 12.5 MHz): •  395 FDD voice channels •  21 FDD control channels

Page 20: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Properties of FDMA •  Can be analog or digital (AMPS is analog).

•  Narrowband: channel contained within coherence

bandwidth – undergoes flat fading.

•  Low capacity

•  Best for circuit-switched (dedicated) connections.

•  Requires guard channels for adjacent channel interference.

Page 21: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

The Multiple Access Problem

•  Frequency-Division (AMPS)

•  Time-Division (GSM)

•  Code-Division (IS-95, 3G) Direct Sequence/Frequency-Hopped

•  Orthogonal Frequency Division Multiple Access (OFDMA)

•  Random Access (Wireless Data)

How can multiple mobiles access (communicate with) the same base station?

Page 22: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Frame

H 1 2 N H . . .

N time slots H: Frame Header

Time Division Multiple Access

Time slots

H 1 2 N H . . .

H 1 2 N H . . .

Channel f1

Channel f2

Channel fK

. . .

Page 23: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Frame

H 1 2 N H . . . N time slots H: Frame Header

Data to or from user K + control information

Time Slot

Preamble and synch

Guard time

Time Slot

Page 24: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

H 1 2 H

TDMA/Time-Division Duplex

3 4 5 6

Uplink time slots Downlink time slots { {

Page 25: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Properties of TDMA •  Data transmission occurs in bursts.

–  Must ensure small delays for speech. –  High peak to average power on reverse link.

•  Can measure signal strength in idle time slots (e.g., for handoff).

•  Can assign multiple time slots for higher data rates.

•  Significant overhead/complexity for synchronization. –  Guard times needed between time slots for delay spread.

•  May require an equalizer to mitigate intersymbol interference.

Page 26: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Global System for Mobile Communications (GSM)

•  Originated in Europe –  Main objective: allow roaming across countries –  Incompatible with 1G systems

•  More than an air-interface standard: specifies wireline interfaces/functions

•  TDMA/FDMA, FDD •  Dynamic frequency assignment •  200 kHz channels •  270.833 kbps

Page 27: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

GSM Frame Structure

•  200 kHz FDD channels divided into 8 time slots per frame •  Total number of available channels = (12.5 MHz – 2 X Guard Band)/200 kHz

100 kHz guard bands è 62 channels •  Total number of traffic channels = 8 X 62 = 496 •  Channel data rate = 270.839 kbps •  Without overhead, data rate/user = 24.7 kbps

TS0

TS1

TS2

TS3

TS4

TS5

TS6

TS7

4.615 ms

156.25 bits 576.92 µs

T0 T1 T2 T22 T23 T24 I/S T10 T11 T12 S T13 T14 T15 ... … 120 ms

Tn: nth TCH frame S: Slow Associated Control Channel frame I: Idle frame

Speech Multiframe = 26 TDMA frames

Frame

Page 28: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

GSM Frame Structure

•  200 kHz FDD channels divided into 8 time slots per frame •  Total number of available channels = (12.5 MHz – 2 X Guard Band)/200 kHz

100 kHz guard bands è 62 channels Total number of traffic channels = 8 X 62 = 496 Channel data rate = 270.839 kbps Without overhead, data rate/user = 24.7 kbps

TS0

TS1

TS2

TS3

TS4

TS5

TS6

TS7

4.615 ms

156.25 bits 576.92 µs

T0 T1 T2 T22 T23 T24 I/S T10 T11 T12 S T13 T14 T15 ... … 120 ms

Tn: nth TCH frame S: Slow Associated Control Channel frame I: Idle frame

Speech Multiframe = 26 TDMA frames

Frame

Page 29: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

GSM Frame Structure

•  200 kHz FDD channels divided into 8 time slots per frame •  Total number of available channels = (12.5 MHz – 2 X Guard Band)/200 kHz

100 kHz guard bands è 62 channels •  Total number of traffic channels = 8 X 62 = 496 •  Channel data rate = 270.839 kbps •  Without overhead, data rate/user = 24.7 kbps

TS0

TS1

TS2

TS3

TS4

TS5

TS6

TS7

4.615 ms

156.25 bits 576.92 µs

T0 T1 T2 T22 T23 T24 I/S T10 T11 T12 S T13 T14 T15 ... … 120 ms

Tn: nth TCH frame S: Slow Associated Control Channel frame I: Idle frame

Speech Multiframe = 26 TDMA frames

Frame

Page 30: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

GSM Time Slots

0 1 2 3 4 5 6 7

4.615 ms

120 ms

6.12 s

3 57 1 26 1 57 3 8.25

576.92 µs

“Normal Burst” Traffic Channel (TCH)

•  148 bits/time slot •  114 coded information bits •  Frame efficiency 74% (total bits – overhead bits)/(total bits)

Superframe

Multiframe

Frame

Time slot

Hyperframe = 2048 superframes lasts ~3 hrs 28 min 54 sec

Page 31: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

GSM Capacity

•  Total bandwidth = 12.5 MHz, 200 kHz channels è 62 channels –  With cell cluster size N=3 (typical),

capacity is (62/3) x 8 ~ 165 users/cell

Page 32: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

The Multiple Access Problem

•  Frequency-Division (AMPS)

•  Time-Division (IS-136, GSM)

•  Code-Division (IS-95, 3G) Direct Sequence/Frequency-Hopped

•  Orthogonal Frequency Division Multiple Access (OFDMA) (WiMax, LTE)

•  Random Access (Wireless Data)

How can multiple mobiles access (communicate with) the same base station?

Page 33: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

OFDM Signal

Orthogonal Frequency Division Multiplexing (OFDM)

Split into M

substreams source

bits

Modulate Carrier f1

+

Modulate Carrier f2

Modulate Carrier

fM

substream 1

substream 2

substream M

Page 34: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

OFDM Spectrum

f4 frequency

Power

f1 ß 0 f2 f5 f6 f3

subchannels

Total available bandwidth

… …

M “subcarriers, or subchannels, or tones” “Orthogonal” subcarriers è no cross-channel interference.

Data spectrum for a single carrier

Page 35: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

OFDM vs OFDMA

•  OFDM is a modulation technique for a particular user. •  OFDMA is a multiple access scheme

(allows many users to access a single receiver). •  Can OFDM be combined other multiple access

techniques?

Page 36: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

OFDM vs OFDMA

•  OFDM is a modulation technique for a particular user. •  OFDMA is a multiple access scheme

(allows many users to access a single receiver). •  Can OFDM be combined other multiple access

techniques? –  Yes, e.g., FDMA and TDMA. –  OFDMA is different…

Page 37: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

OFDM vs OFDMA Overall

User 1

User 2

User 3 User 4

Overall

User 1

User 2

User 3 User 4

OFDM with FDMA

OFDM users are assigned adjacent frequency bands.

Frequency diversity is determined by (BW of signal)/(coherence BW)

OFDMA

User subcarrier assignments are permuted across the entire available frequency band.

So what??

Page 38: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

OFDM vs OFDMA Overall

User 1

User 2

User 3 User 4

Overall

User 1

User 2

User 3 User 4

OFDM (with FDMA)

OFDM users are assigned adjacent frequency bands.

Frequency diversity is determined by (BW of signal)/(coherence BW)

OFDMA

User subcarrier assignments are permuted across the entire available frequency band.

Each sub-carrier may experience independent fading. Frequency diversity is determined by the number of sub-carriers.

Also provides interference diversity.

Page 39: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

•  Each user can be assigned a time/frequency slice. •  Requires a time/frequency scheduler.

OFDM/TDMA and OFDMA TDMA

TDMA\OFDMA

t

N

m

OFDM/TDMA:

subchannels

Each color represents a different user, which is assigned particular time slots.

Different sub-carriers can be assigned to different users.

time slot t

Page 40: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

WiMax OFDMA Frame Structure (TDD example)

(downlink) (uplink)

Page 41: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Adaptive Rate Control

frequency

channel gain

f1 f2

large channel gain è higher data rate small channel gain

è lower data rate

•  How can we control the rate per subchannel? –  Change the modulation format (e.g., choose from QPSK/16-QAM/64 QAM) –  Change the code rate (i.e., change the number of redundant bits)

•  Requires feedback from receiver to transmitter

Page 42: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

The Multiple Access Problem

•  Use different frequencies (FDMA)

•  Use different time slots (TDMA)

•  Use different pulse shapes (CDMA)

How can multiple mobiles access (communicate with) the same base station?

Page 43: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Code Division Multiple Access •  Users transmit simultaneously over

the same frequency band •  Performance limited by interference

Page 44: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Two-User Example

time User 1:

T T/2

time T

T/2

User 2:

T 2T 3T 4T 5T

s2(t) 1 0 1 1 0

T 2T 3T 4T 5T s1(t)

1 1 0 1 0 bits:

T 2T 4T 5T

received signal r(t)= s1(t)+s2(t)

How to recover each users’ bits? 3T

2

-2

1

-1

Page 45: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Chip Sequence

time T

T/2

User 2:

T 2T 3T 4T 5T

s2(t) 1 0 1 1 0

chips

bits:

1 -1 1 1 -1 Transmitted chips: -1 1 -1 -1 1

chip duration Tc

symbol duration T=2Tc

User 2’s chip sequence (1, -1) is called a signature.

Page 46: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Chip Sequence

time T T/2

User 1:

chips

1 1 -1 1 -1 Transmitted chips: 1 1 -1 1 -1

chip duration Tc

symbol duration T=2Tc

T 2T 3T 4T 5T s1(t)

1 1 0 1 0 bits: 1

-1

User 1’s signature is (1, 1).

Page 47: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Two-User Example

T 2T 3T 4T 5T

s2(t)

T 2T 3T 4T 5T s1(t)

T 2T 4T 5T

r(t)= s1(t)+s2(t)

3T

2

-2

1

-1

1 -1 1 1 -1 Transmitted chips: -1 1 -1 -1 1

2 0 0 2 -2 Received chips: 0 2 -2 0 0

1 1 -1 1 -1 Transmitted chips: 1 1 -1 1 -1

1 0 1 1 0

1 1 0 1 0

Page 48: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Correlation

Given two sequences: a1, a2, a3, …, aN

b1, b2, b3, …, bN

The correlation between the sequences is defined as:

(a1 x b1) + (a2 x b2) + (a3 x b3) + … + (aN x bN)

Examples: 1 1 1 1 1 correlated with 1 1 1 1 1 = 5 1 1 1 1 1 correlated with 1 -1 1 -1 1 = 1 2 4 1 3 1 correlated with -2 1 8 2 0 = -4 + 4 + 8 +6 + 0 = 14

If the correlation between two sequences is zero, they are said to be orthogonal.

Page 49: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Correlator Receiver

r(t) Sample Chips

Correlate with desired user’s signature

Bit Decision < 0 à 0 > 0 à 1

estimated bits

Page 50: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Why Does This Work?

Correlate with User 1’s signature

A1 s1 + A2 s2

signature (1,1) amplitude

Correlate with User 1’s signature

A2 s2 0

The user signatures are orthogonal.

Now observe that:

Correlate with User 1’s signature

A1 s1

2A1

2A1

Page 51: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Correlator, or “Matched Filter” Receiver

Correlate with User 1’s signature

A1s1+ A2s2 User 1’s bits

Correlate with User 2’s signature

User 2’s bits

The correlator is “matched” to user 1’s signature s1, and rejects s2 (and vice versa).

Bit Decision < 0 à 0 > 0 à 1

Bit Decision < 0 à 0 > 0 à 1

Page 52: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Observations •  Users transmit simultaneously (not TDMA). •  Users overlap in frequency (not FDMA).

frequency

Spectrum: User 1

0

signal bandwidth is roughly 1/T

frequency 0

signal bandwidth is roughly 1/Tc = 2/T Spectrum: User 2

Bandwidth expansion (factor of 2) è “spread spectrum” signaling.

Page 53: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Users and Bandwidth Expansion To guarantee orthogonal signatures (no interference), the length of the signatures must be ≥ the number of users.

Example (4 users):

time T/2 T/4 User 3: 3T/4

T time T/2 T/4 User 4: 3T/4

T

time T/2 T/4 User 2: 3T/4

T time T/2 T/4 User 1: 3T/4

T

The chip rate is 4 times the symbol rate, hence the bandwidth expansion is a factor of 4.

signature: 1 1 1 1 signature: 1 1 -1 -1

signature: 1 -1 -1 1 signature: 1 -1 1 -1

Page 54: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Correlator Receiver (4 users)

Correlate with User 1’s signature

s1+ s2 + s3 + s4 User 1’s bits

Correlate with User 2’s signature

User 2’s bits

Bit Decision < 0 à 0 > 0 à 1

Bit Decision < 0 à 0 > 0 à 1

Correlate with User 3’s signature

User 3’s bits Bit Decision < 0 à 0 > 0 à 1

Correlate with User 4’s signature

User 4’s bits Bit Decision < 0 à 0 > 0 à 1

Page 55: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

DS-CDMA Transmitter

Spreader (generate chips)

Modulator (e.g., QPSK)

Source bits chips RF signal

Ex: 100 source symbols, processing gain = 10 è 1000 chips

X

sin 2πfct

Baseband signal Passband (RF) signal

time

Nyquist chip shape

Tc

Page 56: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Orthogonality and Asynchronous Users

•  Orthogonality among users requires: –  Synchronous transmissions –  No multipath

T 2T 3T 4T 5T s1(t)

1

-1

1 1 0 1 0

T 2T 3T 4T 5T

s2(t) 1 0 1 1 0

time

Asynchronous users can start transmissions at different times.

Chips are misaligned è signatures are no longer orthogonal!

Page 57: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Correlator, or “Matched Filter” Receiver

Correlate with User 1’s signature

s1(t) + s2(t-τ)

Correlate with User 2’s signature

The multiple access interference adds to the background noise and can cause errors. For this reason, CDMA is said to be interference-limited. Because CDMA users are typically asynchronous, and because of multipath, it is difficult to maintain orthogonal signatures at the receiver. Consequently, in practice, the signatures at the transmitter are randomly generated.

Bit Decision < 0 à 0 > 0 à 1

Bit Decision < 0 à 0 > 0 à 1

delay Signal 1 + multiple acess interference (MAI) From user 2

Signal 2 + multiple acess interference (MAI) From user 1

Page 58: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Processing Gain (PG)

The performance of CDMA depends crucially on the Processing Gain:

Bandwidth of spread signal / Symbol rate (minimum bandwidth needed)

or equivalently, Number of chips per symbol

Page 59: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Processing Gain (PG)

The performance of CDMA depends crucially on the Processing Gain:

Bandwidth of spread signal / Symbol rate (minimum bandwidth needed)

or equivalently, Number of chips per symbol

Fundamental tradeoff: increasing the PG

•  decreases the correlation between random signatures. •  decreases interference. •  increases the bandwidth of the signal.

Page 60: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Example

•  IS-95 (2G CDMA) –  Total bandwidth = 1.25 MHz –  Data rate = 9.6 kbps –  PG ≈ 130

•  3G/CDMA2000

–  Total bandwidth = 1.25 MHz –  Data rate varies between 14.4. kbps (voice)

up to 2 Mbps (1X-DO) –  PG varies from 1 to 130

Page 61: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Properties of CDMA •  Robust with respect to interference

•  No frequency assignments (eases frequency planning)

•  Asynchronous

•  High capacity with power control –  Power control needed to solve near-far problem.

•  Wideband: benefits from frequency/path diversity.

•  Benefits from voice inactivity and sectorization. •  No loss in trunking efficiency.

•  Soft capacity: performance degrades gradually as more users are added.

•  Soft handoff

Page 62: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

U N I V E R S I T Y

Near-Far Problem SO… THEN THE THIRD

TIME I CALLED CUSTOMER SERVICE, I SAID &%$#%^…

Page 63: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N MSIT | Master of Science in Information Technology

Near-Far Problem

User 1

User 2

amplitude A1

amplitude A2

Output of correlator receiver is signal + interference. As the interferer moves closer to the base station, the interference increases. In practice, power variations can be up to 80 dB!

Conclusion: User 1’s signal is overwhelmed by interference from user 2!

Page 64: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Closed-Loop Power Control

User 1

User 2

•  Base station gives explicit instructions to mobiles to raise/lower power. •  Needed to solve near-far problem (equalizes received powers). •  Introduced by Qualcomm in the late 80’s.

raise power

lower power

Page 65: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Closed-Loop Power Control: Properties

User 1

User 2

•  Crucial part of CDMA cellular systems (IS-95, 3G). •  Minimizes battery drain. •  Complicated (increases cost) •  Requires overhead: control bits in feedback channel to tell transmitter

to lower/raise power

raise power

lower power

Page 66: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Properties of CDMA •  Robust with respect to interference

•  No frequency assignments (eases RF planning).

•  Asynchronous

•  High capacity with power control. –  Power control needed to solve near-far problem.

•  Wideband: benefits from frequency/path diversity.

•  Benefits from voice inactivity and sectorization. –  No loss in trunking efficiency.

•  Soft handoff

Page 67: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Properties of CDMA •  Robust with respect to interference

•  No frequency assignments (eases RF planning).

•  Asynchronous

•  High capacity with power control. –  Power control needed to solve near-far problem.

•  Wideband: benefits from frequency/path diversity.

•  Benefits from voice inactivity and sectorization. –  No loss in trunking efficiency.

•  Soft handoff

Page 68: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Properties of CDMA •  Robust with respect to interference

•  No frequency assignments (eases RF planning).

•  Asynchronous

•  High capacity with power control. –  Power control needed to solve near-far problem.

•  Wideband: benefits from frequency/path diversity.

•  Benefits from voice inactivity and sectorization. –  No loss in trunking efficiency.

•  Soft handoff

Page 69: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Soft Handoff (CDMA) ”Make before break”

MSC

BSC BSC

MSC

BSC BSC

MSC

BSC BSC

Hard Handoff (TDMA)

MSC

BSC BSC

MSC

BSC BSC

MSC

BSC BSC

BEFORE DURING AFTER

Page 70: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Applications of Spread-Spectrum

•  Cellular •  Military (preceded cellular applications) •  Wireless LANs (overlay)

Page 71: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Military Spread Spectrum

•  Can “hide” a signal by “spreading it out” in the frequency domain. •  Requires a very large PG (several 100 – 1000). •  Enemy must know spreading code (the “key” containing 100’s of

bits) to demodulate – too complicated for simple search. •  Spread spectrum signals have the “LPI/LPD” property:

low probability of intercept / low probability of detect.

Spread spectrum used for covertness, not multiple access.

frequency 0 frequency 0

spread

noise level

Page 72: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Applications of Spread-Spectrum

•  Cellular •  Military (preceded cellular applications) •  Wireless LANs (WiFi)

Page 73: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Spread Spectrum Underlay •  FCC requirements on spectrum sharing in the unlicensed

(Industrial, Scientific, Medical (ISM)) bands: –  “Listen before talk” –  Transmit power is proportional to the square root of the

bandwidth. •  Spread spectrum signaling is robust with respect to a narrowband

interferer. •  To a narrowband signal, a spread spectrum signal appears as

low-level background noise.

frequency

spread spectrum signal telemetry hospital monitor

Page 74: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Frequency-Hopped CDMA

Idea: “Hop” from channel to channel during each transmission.

time

frequ

ency

f1

f4

f3

f2

f5

User 1: blue

time slots

Page 75: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Frequency-Hopped CDMA

Idea: “Hop” from channel to channel during each transmission.

time

frequ

ency

f1

f4

f3

f2

f5

User 1: blue User 2: red

time slots

collision bits are lost

Page 76: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Hop Rate •  Can make synchronous users orthogonal by assigning

hopping patterns that avoid collisions. •  “Fast” hopping generally means that the hopping

period is less than a single symbol period. •  “Slow” hopping means the hopping period spans a few

symbols. •  The hopping rate should be faster than the fade rate

(why?).

Page 77: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Hop Rate •  Can make synchronous users orthogonal by assigning

hopping patterns that avoid collisions. •  “Fast” hopping generally means that the hopping

period is less than a single symbol period. •  “Slow” hopping means the hopping period spans a few

symbols. •  The hopping rate should be faster than the fade rate

so that the channel is stationary within each hop.

Page 78: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Properties of FH-CDMA •  Exploits frequency diversity (can hop in/out of fades) •  Can avoid narrowband interference (hop around) •  No near-far problem (Can operate without power control) •  Low Probability of Detect/Intercept •  Spread spectrum technique – can overlay •  Cost of frequency synthesizer increases with hop rate •  Must use error correction to compensate for erasures due

to fading and collisions. •  Applications

–  Military (army) –  Part of original 802.11 standard –  Enhancement to GSM –  Bluetooth

Page 79: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Bluetooth: A Global Specification for Wireless Connectivity

•  Wireless Personal Area Network (WPAN).

•  Provides wireless voice and data over short-range radio links via low-cost, low-power radios (“wireless” cable).

•  Initiated by a consortium of companies (IBM, Ericsson, Nokia, Intel)

•  Standard has been developed (IEEE 802.15.1 ).

Page 80: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Bluetooth Specifications •  Allows small portable devices to communicate together in an ad-hoc

“piconet” (up to eight connected devices).

•  Frequency-hopped spread-spectrum in the 2.4 GHz UNII band.

•  Interferes with 802.11b/g/n

•  1600 hops/sec over 79 channels (1 MHz channels)

•  Range set at 10m.

•  Gross data rate of 1 Mbps (TDD). –  64 kbps voice channels

•  Second generation (Bluetooth 2.0+) supports rates up to 3 Mbps. Competes with Wireless USB.

Page 81: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

The Multiple Access Problem

•  Frequency-Division (AMPS)

•  Time-Division (IS-136, GSM)

•  Code-Division (IS-95, 3G) Direct Sequence/Frequency-Hopped

•  Orthogonal Frequency Division (WiMax, 4G)

•  Random Access (802.11, wireless data)

How can multiple mobiles access (communicate with) the same base station?

Page 82: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

802.11 Random Access

Terminals send/receive messages (packets) to/from the AP at random times (i.e., when they appear).

Station A

Station B

Station C

Access Point (AP)

Page 83: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Cellular Call Setup (Random Access) 1. Call Request 2. Send numbers to switch

4. Request Channel/Time slot/Code 3. Page Receiver

Page 84: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Medium Access Control (MAC)

•  Fixed assignment access –  Each user is assigned a dedicated channel, time slot, or code –  Appropriate for circuit-switched traffic, transferring long data

files

•  Random access: users contend for access to the channel –  Users may collide, losing packets. –  Sometimes can negotiate rate (bandwidth, time slots, codes)

and power –  Widely used in wired networks –  Used in wireless networks for requesting

channel/time slot/code, WiFi

Page 85: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Carrier Sense Multiple Access (CSMA)

Packet arrives

Sense channel Busy?

Delay transmission (non-persistent)

no

yes

Transmit packet

•  “Listen before talk” (LBT) protocol •  How do collisions occur?

Page 86: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Carrier Sense Multiple Access (CSMA)

Packet arrives

Sense channel Busy?

Delay transmission (non-persistent)

no

yes

Transmit packet

•  “Listen before talk” (LBT) protocol •  Collisions occur if transmitters cannot sense the other

transmission (e.g., due to large propagation delay) –  Lower probability of collision/higher throughput than ALOHA

•  Long propagation times è more collisions –  ALOHA preferred for wide area applications

Page 87: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

CSMA Example

Page 88: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

CSMA with Collision Detection (CSMA/CD)

•  Nodes detect a collision in progress, and stop transmitting before the entire packet is transmitted.

•  Assumes nodes can hear each other when they are transmitting.

•  Appropriate for wired channels. •  Problems with wireless channels:

–  Nodes cannot transmit and receive at the same frequency at the same time.

–  Not all nodes may be in range of each other.

Page 89: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Hidden Terminal Problem

•  A is transmitting to B. •  C wants to transmit to D.

Station A Station B

Station C

Station D

Page 90: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Hidden Terminal Problem

•  A is transmitting to B. •  C wants to transmit to D. •  C may not sense A’s transmission, causing a collision at B.

Station A Station B

Station C

Station D

Coverage area for station C.

Page 91: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Exposed Terminal Problem

•  B is transmitting to A. •  C wants to transmit to D

Station A Station B

Station C

Station D

Page 92: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Exposed Terminal Problem

•  B is transmitting to A. •  C wants to transmit to D. •  C senses B’s transmission, and does not transmit even though it

would not cause interference at A.

Station A Station B

Station C

Station D

Coverage area for station C.

Page 93: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Basic Problem

Carrier sensing determines whether or not there are interfering sources near the transmitter, not the receiver.

Page 94: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Solutions •  Busy-tone multiple access (BTMA)

–  Separate control channel used to indicate that the channel is idle or busy.

–  An active station transmits a busy tone on the control channel. –  Each receiver that senses a busy tone turns on its own busy tone. –  Used in ad hoc networks.

•  Digital or Data Sense Multiple Access (DSMA)

–  Used in FDD cellular mobile data networks –  Forward channel periodically broadcasts a busy/idle bit for the

reverse link. –  Mobile transmits if bit is in idle state; base station sets bit to busy. –  Not carrier sensing: sensing is performed after demodulation.

•  Multiple Access with Collision Avoidance (MACA)

Page 95: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Revealing the Hidden Terminal

•  A sends a “Request to Send (RTS)” packet to B.

Station A Station B

Station C

Station D

Coverage area for station C. RTS

Page 96: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Revealing the Hidden Terminal

•  A sends a “Request to Send (RTS)” packet to B. •  B sends a “Clear to Send (CTS)” packet to A; heard by C!

Station A Station B

Station C

Station D

Coverage area for station C. CTS

Page 97: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Revealing the Hidden Terminal

•  A sends a “Request to Send (RTS)” packet to B. •  B sends a “Clear to Send (CTS)” packet to A; heard by C! •  C is silent for duration of A’s transmission (specified in CTS)

Station A Station B

Station C

Station D

Coverage area for station C. data

Page 98: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Revealing the Hidden Terminal

What if C hears RTS, but not CTS?

Station A Station B

Station C

Station D

Coverage area for station C.

Page 99: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Exposed Terminal

C will not hear the CTS from A.

Station A Station B

Station C

Station D

Coverage area for station C. RTS

Page 100: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

RTS Collision

RTS messages from E and B collide à exponential backoff

Station A Station B

Station C

RTS

Station E

RTS

Page 101: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

Corrupted CTS

CTS message from A is corrupted due to interference from E à exponential backoff by B

Station A Station B

Station C

CTS

Station E

Data, RTS, or CTS

Page 102: MSIT 413: Wireless Technologies - Northwestern Universityusers.eecs.northwestern.edu/~mh/MSIT/Winter16/Week5.pdfN O R T H W E S T E R N MSIT | Master of Science in Information Technology

N O R T H W E S T E R N

U N I V E R S I T Y

MSIT | Master of Science in Information Technology

MACA Protocol (RTS/CTS)

•  Terminals receiving either an RTS or CTS must not transmit for the duration of the packet. (What if the terminal hears RTS but not CTS?)

•  Collision occurs if multiple nodes transmit an RTS, or the CTS is not heard due to other interference.

•  Collision è binary exponential back-off

Transmitter Receiver

Request to Send (RTS), packet length

Clear to Send (CTS), packet length

Data

Ack