Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Telecommunication systems have now made it possible to communicate with virtually anyone at any time. Early telegraph and telephone system used copper wire to carry signal over the earth surface and across oceans and high frequency (HF) radio, also commonly called shortwave radio, made possible inter-continental telephone links. Every communication system has its own frequency range, system, capacity, application implementation cost [21]. On the basis of transmission there are two types of communication system Wired communication system Wireless communication system
2.2.1 Frequency Division Multiple Accesses (FDMA) FDMA is one of the oldest multiple access techniques for cellular systems when continuous transmission is required for analog services. In this bandwidth is divided into a number of channels and distributed among users with a finite portion of bandwidth for
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks
14
Fig. 2.2 Channel Usage by FDMA FDMA channels have narrow bandwidth of about 30 KHz, and therefore they are usually implemented in narrow band system. Since the user has his portion of bandwidth all the time, FDMA does not require timing control, which makes it simple. Even though no two users use the same frequency band at the same time, guard bands are introduced between bands to minimize channel interference. Guard bands are unused frequency slots which separates neighboring channels. This leads to a wastage of bandwidth. In a non-continuous transmission bandwidth goes wasted since it is not being utilized for a portion of the time [20].
2.2.2 Time Division Multiple Access (TDMA) In digital systems, continuous transmission is not required as the users do not utilize the allotted bandwidth all the time. In such systems, TDMA is a approving technique compared to FDMA. Global Systems for Mobile communications i.e GSM uses the TDMA technique. In TDMA, bandwidth is available to the user but only for a finite period of time. In most cases bandwidth is divided into fewer channels compared to FDMA and the users are allotted time
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks
15
TDMA requires careful time synchronization since users share the bandwidth in the frequency domain. As the number of channel is less, channel interference is almost negligible, therefore the guard time between the channels is significantly smaller. Guard time is spacing time between the TDMA. In cellular communications, whenever a user moves from one cell to other there is a chance that user could experience a call loss if there are no free time slots. TDMA uses different time slots for transmission as well as reception [22].
2.2.3 Code Division Multiple Access In CDMA, all the users occupy the same bandwidth, though they are all assigned separate codes, which distinguish them from each other as shown in figure 2.4. CDMA systems utilize a spread spectrum technique in which a spreading signal, is uncorrelated to the signal and has a larger bandwidth, is used to spread the narrow band signal. Direct Sequence Spread Spectrum i.e DS-SS is most commonly used for code division multiple excess [23]. In Direct sequence spread spectrum, the message signal is multiplied by a Pseudo Random Noise Code, which has a noise like properties. Each user has its own code which is orthogonal to the code of every other users.
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks 16
2.3 CDMA
2.3.1 History
Code Division Multiple Access (CDMA) is a new concept in wireless communications [23]. It has achieved widespread acceptance by cellular system operators, that will dramatically increase both their system capacity and the service quality. CDMA is a form of Spread-spectrum, that have been used in military applications for years. The principle of spread spectrum is the use of noise-like waves and, as the name implies bandwidths much larger than that required for simple point to point communication at the same data rate. Firstly there were two motivation: To resist enemy efforts to jam the communications (anti-jam), or to hide the fact that communication was even taking place, from time to time called low probability of intercept. It has a history that goes back to the early days of World War second [23]. Profitable applications became promising because of two evolutionary developments. One was the accessibility of very low cost, high density digital ICs, which reduce the size and cost of the subscriber stations to an adequately low value [23].
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks 17
Introduction to CDMA CDMA is a multiple access technique that allows multiple users to transmit independent information within the same bandwidth simultaneously. Each user is assigned a pseudo-random code that is either orthogonal to the codes of all the other users or the code possesses appropriate cross-correlation properties that minimize the multiple access interference (MAI). This code is superimposed on an information signal thus, making the signal emerges to be noise like to other users. Only the intended receiver has a replica of the same code and uses it to extract the information signal [22]. This then allows the sharing of the same spectrum by multiple users without causing excessive MAI. It also ensures message privacy, since only the intended user is able to decode the signal. This code is also known as a spreading code, since it spreads the bandwidth of the original data signal into a much higher bandwidth before transmission [22].
Fig. 2.5 Classification Tree of the various types of CDMA Techniques [20].
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks
18
Advantages of CDMA One of the main advantages of CDMA is that call dropouts occur only when the phone is at least twice as far from the base station. It is used in the pastoral areas where GSM do not get to work properly. Another advantage is capacity means it has a very high spectral capacity so that it can accommodate more users [21]. Disadvantages of CDMA One major problem in CDMA technology is channel pollution, where signals from too different cell sites are present in the subscribers phone but none of them is foremost. When this situation arises the feature of the audio signal degrades. Another disadvantage is when compared to GSM it lacks international roaming capabilities [22].
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks
19
Recovered data
Spreading code signal Fig. 2.6 Model of Basic Spread Spectrum Technique
The main parameter in spread spectrum systems is the processing gain: Is the ratio of transmission and information bandwidth: Gp =
, which
processing gain calculates the number of users that can be allowed, the amount of multi-path effects and the difficulty to jam a signal [23]. Spread spectrum can be classified as follows a) Direct Sequence Spread Spectrum b) Frequency Hopping Spread Spectrum c) Time Hopping Spread Spectrum
2.4.1 DS-CDMA
Direct Sequence is the best Spread Spectrum Technique. The DS-CDMA method provides a multiple of benefits in cellular systems including ease in designing frequency channels and protection against interference, such that a high process gain is used. In DS-CDMA each user has
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks 20
The data signal is multiplied by a Pseudo Random Noise Code. A PN code is a sequence of chips its range is -1 and 1 (polar) or 0 and 1 (non-polar). This results in low cross-correlation values among the codes and the difficulty to jam or detect a data message [21]. A usual way to create a PN code is by means of at least one shift register. The chip rate decides the rate at which spreading signals are transmitted. At the receiver end, spread signals are decoded with the help of correlation functions. Cross correlation de-spreads the received signals and retrieves the transmitted signal similar to the users original signal [21]. The spreading sequences can orthogonal means 0 cross correlation or random sequences with low crosscorrelation properties.
C(t)
Cos (wt)
In the DS-CDMA technique, each bit of the users data are multiplied with a code in the transmitting end. The code sequence used in transmitting end performs the role of spreading
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks 21
code rate. The carrier modulation commonly used in spread spectrum is phase shift keying. Considering the figure we get [21]: (t)= m(t) C(t) (3.1) The baseband signal to yield y(t): y(t) = The band pass signal (t) is convoluted with the impulse response of the spectrum shaping filter (t) h(t), where * denotes convolution(3.2) (t) = [ (t) h(t)] cos t).. (3.3)
m(t)
Match Filter
Cos(wt)
h(t)
Clock
C(t)
The de-spread signal B (t) = A(t) [C(t) h(t)] (3.5) The output of the matched filter D(T) = (3.6).
The receiver decodes the data : D(T) > 0 decode binary 1 otherwise decode binary 0 [21].
-1 users bit
1 1 1 -1 -1 1 -1 -1
spread signal
Communication Channel
1 1 1 -1 -1 1 -1 -1
De-spread signal
-1
Received bit
-1 -1 -1 1 1 -1 1 1
-1 -1 -1 1 1 -1 1 1
spreading sequence
spreading sequence
Let us think the first bits of four users. By multiplying each bit with a PN code, users bits are represented by seven chips as shown above. User 1[1]: 1 User 2[1]: -1 User 3[1]: 1 User 4[1]: -1 C1: -1 -1 1 1 1 -1 1 C2: 1 -1 -1 1 1 1 -1 C3: -1 1 -1 -1 1 1 1 C4: 1 -1 1 -1 -1 1 1 => => => -1 -1 1 1 1 -1 1
-1 1 1 -1 -1 -1 1 -1 1 -1 -1 1 1 1
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks
23
R[1] * C1= 4-2+2+2+2= 8 > 0 => 1 R[1] * C2= -4-2+2-2-2= -8 < 0 => -1 R[1] * C3= 4+2+2-2+2= 8 > 0 => 1 R[1] * C4= -4-2-2-2+2= -8 < 0 => -1
2.4.1.1 Advantages of DS-CDMA It has an interference rejection property; every user is identified with a specific code sequence which is almost orthogonal to the other user codes. The DS-CDMA also excludes the need of channel dividing thus all users use the entire channel bandwidth.
2.4.1.2 Properties of DS-CDMA. Multiple Access - If multiple users use the channel at the same time, there will be multiple signals overlapping in time and frequency. At the receiver end coherent demodulation is used to remove the code modulation. This method concentrates the
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks 24
Transmitter Tx(B)
Transmitter Tx(A)
Receiver Rx(A)
Rx(A)
Another problem is hidden and exposed terminal in wireless Ad-hoc network. Hidden terminal problem refers- The collision of packet at the receiving node due to the simultaneous transmission of those nodes that are not within the direct transmission range of the sender. Exposed terminal problem refers- The inability of a node which is blocked due to nearby transmitting node, to transmit another node [5]. For Example if both node S1 and S2 transmit to node R1 at same time their packets collide at node R1. This happens because both nodes S1 and S2 are hidden from each other as they are not within the direct transmission range of each other. This is hidden terminal problem. On the other hand if a transmission from node S1 to another node R1 is already in progress, node S3 cannot transmit to node R2, as it concludes that its neighbor node S1 is in transmitting node and hence it should not interface with the ongoing transmission. This problem reduces the throughput of network when traffic load is high [5].
communicate with B using a given code and C wants to communicate with D using a different code. Suppose that dAB dCD, dCB<< dAB, and dAD << dCD. Then, the MAI caused by C makes it impossible for B to receive A transmission. Similarly, the Multiple access interference caused by A makes it impossible for D to receive C transmission. It is important to note that the two transmissions cannot take place simultaneously, irrespective of what transmission powers are selected if an increase in power is made to combat the MAI at B, this increased power will destroy the reception at D.
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks
27
Fig. 2.12 Example shows the Power Control alone is not enough to reduce the NearFar problem in DS-SS CDMA Ad-hoc Network
The above Fig. unveils two types of problems -. 1. Medium access problem - The use of two different spreading codes to occur at the same time is not possible for two transmissions, this problem is referred to as medium access problem. 2. Power control problem - If the terminals adjust their signal powers then two transmissions can take place at the same time so that the interference caused by one transmission is not large enough to demolish packet reception at other terminals. This is referred as power control problem. So the key solution to the near far problem must have both elements: power control and medium access.
2.6.2 DESIGN GOAL FOR PROTOCOL [5] The Following are the specifications while designing a MAC protocol for Ad-hoc network: 1. The operation of the protocol should be widen and provide quality of service for real time traffic. 2. The protocol must be a non-synchronous, dispersed operation, as well as scalable for large networks. It must also involve minimal exchange of information and must be suitable for real time implementation. 3. The protocol must be scalable to large network. Protocol should minimize the effect of hidden and exposed terminal problem.
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks
28
VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks
29