SlideShare une entreprise Scribd logo
1  sur  77
Télécharger pour lire hors ligne
Wireless Application Protocol




              Common Protocols
Common Protocols

   Several strategies have been proposed to solve the shared
    medium access problem. These strategies attempt, by various
    mechanisms, to strike a balance between achieving the highest-
    quality resource allocation decision and the overhead necessary
    to reach this decision. These strategies can be classified in
    three major categories:
   Fixed assignment
    Demand assignment
   Random assignment.
Fixed-Assignment Protocols


   In fixed-assignment strategies, each node is allocated a
    predetermined fixed amount of the channel resources. Each
    node uses its allocated resources exclusively without
    competing with other nodes. Typical protocols that belong in
    this category include
   Frequency-division multiple access(FDMA)
   Time-division multiple access (TDMA)
    Code-division multiple access(CDMA)
Demand Assignment Protocols

   The main objective of demand assignment protocols is to
    improve channel utilization by allocating the capacity of the
    channel to contending nodes in an optimum or near-
    optimum fashion. Unlike fixed-assignment schemes, where
    channel capacity is assigned exclusively to the network
    nodes in a predetermined fashion regardless of their current
    communication needs, demand assignment protocols ignore
    idle nodes and consider only nodes that are ready to
    transmit.
   Polling
   Reservation
Random Assignment Protocols

   In fixed-assignment schemes, each communicating node is
    assigned a frequency band in FDMA systems or a time slot
    in TDMA systems. This assignment is static, however,
    regardless of whether or not the node has data to transmit.
    These schemes may therefore be inefficient if the traffic
    sourceis bursty. In the absence of data to be transmitted, the
    node remains idle, thereby resulting in the allocated
    bandwidth to be wasted. Random assignment strategies
    attempt to address this shortcoming by eliminating
    preallocation of bandwidth to communicating nodes.
Random Assignment Protocols

   Random assignment strategies do not exercise any
    control to determine which communicating node can
    access the medium next. Furthermore, these
    strategies do not assign any predictable or scheduled
    time for any node to transmit. To deal with
    collisions,the protocol must include a mechanism to
    detect collisions and a scheme to schedule colliding
    packets for subsequent retransmissions.
   ALOHA
   CSMA
   CSMA/CD
Multiple Access Techniques
Frequency Division Multiple Access
(FDMA)


   The FDMA scheme is used by radio systems to share the
    radio spectrum.Based on this scheme, the available
    bandwidth is divided into subchannels. Multiple channel
    access is then achieved by allocating communicating nodes
    with different carrier frequencies of the radio spectrum. The
    bandwidth of each node’s carrier is constrained within
    certain limits such that no interference, or overlap, occurs
    between different nodes. The scheme requires frequency
    synchronization among communicating nodes.
FDMA
   FDMA was the initial multiple-access




                                              Code
    technique for cellular systems
    Separates large band into smaller
                                                                       User 4
                                                             User 3
    channels.                               User 1
                                                     User 2

   Each channel has the ability to support
    user.
                                                                                Time
   Guard bands are used to separate


                                         y
    channel preventing co-channel
                                       nc
    interference                     ue
                                    eq
                                   Fr

   Narrow bandwidth (30 khz).

             f1
FDMA
FDMA
 FDMA is a continuous transmission scheme as compare to
  TDMA because fewer bits are needed for synchronization
  and framing.
 In FDMA, as unique channels are assigned to each user, so
  FDMA systems have higher cell site system cost as
  compared to TDMA system.
 In FDMA, both the transmitter and receiver operates at the
  same time so FDMA Mobile units require duplexers. These
  also increase the cost of FDMA subscriber units and base
  station.
FDMA
   Advantages
    –   Simple to implement in terms of hardware.
    –   Fairly efficient with a small base population and with
        constant traffic.
   Disadvantages
    –   Network and spectrum planning are intensive and
        time consuming.
    –   Channels are dedicated for a single user, idle
        channels add spectrum inefficiency.
Time Division Multiple Access (TDMA


   In TDMA, a radio spectrum is divided into time slots. These
    time slots are allocated for each user to transmit and receive
    information. The number of time slots is called a frame.
    Information is transferred and received in form of frame. A
    frame is consists a preamble, an information message and
    trial bits.
   Preamble contains the address and synchronization
    information of both subscriber and Base Station to identify
    each other. Trial bits contain framing information.
Time Division Multiple Access (TDMA

 In TDMA, data transmission is not continuous and
  subscriber transmitter can be turned off which result in low
  battery consumption.
 In TDMA, handoff process is much simpler for a subscriber
  because of discontinuous transmission.
 In TDMA, duplexers are not required because different
  timeslots are used for transmission and reception.
 In TDMA, the rate of transmission is very high as compare
  to FDMA.
TDMA
   Entire bandwidth is available to the
    user for finite period of time.




                                                    Code
   Users are allotted time slots for a




                                                                                  4
                                                                              er
    channel allowing sharing of a single




                                                                         3
                                                                     er


                                                                             Us
                                                                2
                                                    r1




                                                                    Us
                                                            er
    channel.                                    e




                                                           Us
                                             Us

   Requires time synchronization.
                                                                                      Time
   Each of the user takes turn in
    transmitting and receiving data in a

                                        cy
                                        en
    round robin fashion.
                                       u
                                    eq
                                   Fr
TDMA
How it works?
   User presses Push-to-Talk (PTT) button
   A control channel registers the radio to the closest base station.
   The BS assigns an available pair of channels.
   Unlike FDMA, TDMA system also assigns an available time slot
    within the channel.
   Data transmission is not continuous rather sent and received in
    bursts.
   The bursts are reassembled and appear like continuous
    transmission.
TDMA Advantages & Disadvantages


   Advantages
    –   Extended battery life and talk time
    –   More efficient use of spectrum, compared to FDMA
    –   Will accommodate more users in the same spectrum space than an
        FDMA system
   Disadvantages
    –   Network and spectrum planning are intensive
    –   Multipath interference affects call quality
    –   Dropped calls are possible when users switch in and out of different
        cells.
    –   Too few users result in idle channels (rural versus urban
        environment)
    –   Higher costs due to greater equipment
TDMA Frame Structure

   Each sequence of 8 time slots is known as a TDMA frame
Code Division Multiple Access (CDMA) 

   In CDMA, all users transmit information simultaneously by
    using the same carrier frequency. Each user has its own code
    word, which is orthogonal to other users. To detect the
    message, the receiver should know the codeword used by the
    transmitter.
Code Division Multiple Access (CDMA)

 CDMA includes the following features:
 In CDMA system many users share the same frequency.
 In CDMA unlike FDMA and TDMA the number of users is
  not limited. It has a soft capacity. But due to large number of
  users its performance degrades.
 In CDMA, each user operates independently with no
  knowledge of the other users.
CDMA

   CDMA is a spread




                                   Code
    spectrum technique used                         User 4

    to increase spectrum                   User 4


    efficiency.                           User 3

   SS has been used in                   User 2


    military applications due to          User 1
                                                         Time
    anti-jamming and security.
                               y
                              nc
                           ue
                          eq
                         Fr
CDMA
CDMA
Code-Division Multiple Access (CDMA)
   We start with a data signal with rate D, Which we
    call the bit data rate. We break each bit into k chips
    according to a fixed pattern that is specific to each
    user, called the user's code.The new channel has a
    chip data rate of kD chips per second.

   Basic Principles of CDMA
     – D = rate of data signal
     – Break each bit into k chips
          Chips are a user-specific fixed pattern
     – Chip data rate of new channel = kD
CDMA Example
   If k=6 and code is a sequence of 1s and -1s
    –   For a ‘1’ bit, A sends code as chip pattern
            <c1, c2, c3, c4, c5, c6>
    –   For a ‘0’ bit, A sends complement of code
            <-c1, -c2, -c3, -c4, -c5, -c6>
   Receiver knows sender’s code and performs electronic
    decode function
            <d1, d2, d3, d4, d5, d6> = received chip pattern
            <c1, c2, c3, c4, c5, c6> = sender’s code


Su ( d ) = d1× c1 + d 2 × c 2 + d 3 × c3 + d 4 × c 4 + d 5 × c5 + d 6 × c6
CDMA Example
   User A code = <1, –1, –1, 1, –1, 1>
    –   To send a 1 bit = <1, –1, –1, 1, –1, 1>
    –   To send a 0 bit = <–1, 1, 1, –1, 1, –1>
   User B code = <1, 1, –1, – 1, 1, 1>
    –   To send a 1 bit = <1, 1, –1, –1, 1, 1>
   Receiver receiving with A’s code
    –   (A’s code) x (received chip pattern)
            User A ‘1’ bit: 6 -> 1
            User A ‘0’ bit: -6 -> 0
            User B ‘1’ bit: 0 ->6 unwanted signal ignored
CDMA
   Advantages
    –   Greatest spectrum efficiency:
    –   CDMA improves call quality by filtering out background noise, cross-talk, and
        interference
    –   Simplified frequency planning - all users on a CDMA system use the same
        radio frequency spectrum.
    –   Random Walsh codes enhance user privacy; a spread-spectrum advantage
    –   Precise power control increases talk time and battery size for mobile phones
   Disadvantages
    –   Backwards compatibility techniques are costly
    –   Currently, base station equipment is expensive
    –   Low traffic areas lead to inefficient use of spectrum and equipment resources
Random Access

   Random Access Methods
    –   more efficient way of managing medium access for
        communicating short bursty messages
           in contrast to fixed-access schemes, each user gains access to
            medium only when needed -has some data to send
           drawback: users must compete to access the medium (‘random
            access’)
           collision of contending transmissions
   Random Access Methods in Wireless Networks
    –   can be divided into two groups:
           ALOHA based-no coordination between users
           carrier-sense based-indirect coordination -users sense
            availability of medium before transmitting
Random Access
          Collision Period

U ser 4

U ser 3

U ser 2                      resched uled

U ser 1

                                    Tim e
ALOHA-based Random Access

   user accesses medium as soon as it has a packet
    ready to transmit
    –   after transmission, user waits a length of time > round-trip
        delay in the network, for an ACK from the receiver
    –   if no ACK arrives, user waits a random interval of time (to
        avoid repeated collision) and retransmits
   advantages:
    –   simple, no synchronization among users required
   disadvantages:
    –   low throughput under heavy load conditions
    –   probability of collision increases as number of users
        increases
   max throughput = 18% of channel capacity
Pure-ALOHA
Slotted ALOHA
   time is divided into equal time slots –when a user
    has a packet to transmit, the packet is buffered
    and transmitted at the start of the next time slot
    –   BS transmits a beacon signal for timing, all users must
        synchronize their clocks
   advantages:
    –   partial packet collision avoided
   Disadvantages
    –    throughput still quite low!
    –   there is either no collision or a complete collision
   max throughput = 36% of channel capacity
Slotted ALOHA
Reservation ALOHA
   Time slots are divided into reservation and transmission
    slots / periods
     –   during reservation period, stations can reserve future slots in
         transmission period
     –   reservation slot size << transmission slot size
     –   collisions occur only in reservation slots
   advantages:
     –   higher throughput under heavy loads
     –   max throughput up to 80% of channel capacity
   disadvantages:
     –   more demanding on users as they have to obtain / keep ‘reservation
         list’ up-to-date
   R-Aloha is most commonly used in satellite systems
   satellite collects requests, complies ‘reservation list’ and finally
    sends the list back to users
R-ALOHA
Carrier Sense Multiple Access with Collision
Detect (CSMA/CD)


   With CSMA/CD, when an Ethernet device attempts to
    access the network to send data, the network interface on the
    workstation or server checks to see if the network is quiet.
    When the network is clear, the network interface knows that
    transmission can begin. If it does not sense a carrier, the
    interface waits a random amount of time before retrying. If
    the network is quiet and two devices try sending data at the
    same time, their signals collide. When this collision is
    detected, both devices back off and wait a random amount of
    time before retrying,
CSMA/CD Operation
   Carrier sense— Each computer on the LAN is always listening for traffic
    on the wire to determine when gaps between frame transmissions occur.
   Multiple access— Any computer can begin sending data whenever it
    detects that the network is quiet. (There is no traffic.)
   Collision detect— If two or more computers in the same CSMA/CD
    network collision domain begin sending at the same time, the bit streams
    from each sending computer interfere, or collide, with each other,
    making each transmission unreadable. If this collision occurs, each
    sending computer must be able to detect that a collision has occurred
    before it has finished sending its frame.
   Each computer must stop sending its traffic as soon as it has detected the
    collision and then wait some random length of time, called the
    back-off algorithm, before attempting to retransmit the frame.
Carrier Sense Multiple Access
(CSMA)
   Disadvantages of ALOHA
    –   users do not listen to the channel before (and while)
        transmitting
    –   suitable for networks with long propagation delays
   Carrier Sense Multiple Access
    –   polite version of ALOHA
    –   Listen to the channel before transmitting
            if sensed channel busy, back-off (defer transmission), and sense
             channel again after a random amount of time
            if channel idle, transmit entire frame
Versions of CSMA

   Employs different node behaviour when
    channel found busy
    –   non-persistent CSMA
    –   persistent CSMA
    –   1-persistent CSMA
    –   p-persistent CSMA
Persistence Methods

   What should a station do if the channel is busy? What should
    a station do if the channel is idle? 4 methods have been
    devised to answer these questions: the I-persistent method,
    the nonpersistent method, and the p-persistent method.
    Figure shows the behavior of three persistence methods
    when a station finds a channel busy.
   Persistent:- station sense the channel, if channel is ideal it transmits
    data. if there is already some traffic going on that it does not transmit the
    data. Keep sensing.
CSMA: Persistence Methods


   Behavior of 1-persistent, Nonpersistent, p-persistent method
Persistence Methods
   I-Persistent The I-persistent method is simple and straightforward. In
    this method,after the station finds the line idle, it sends its frame
    immediately (with probability I).This method has the highest chance of
    collision because two or more stations may find the line idle and send
    their frames immediately.
   Nonpersistent:- In the nonpersistent method, a station that has a frame
    to send senses the line. If the line is idle, it sends immediately. If the line
    is not idle, it waits a random amount of time and then senses the line
    again. The nonpersistent approach reduces the chance of collision
    because it is unlikely that two or more stations will wait the same
    amount of time and retry to send simultaneously. However, this method
    reduces the efficiency of the network because the medium remains idle
    when there may be stations with frames to send.
Persistence Methods
   p-Persistent :- The p-persistent method is used if the channel has time
    slots with a slot duration equal to or greater than the maximum
    propagation time. The p-persistent approach combines the advantages of
    the other two strategies. It reduces the chance of collision and improves
    efficiency. In this method, after the station finds the line idle it follows
    these steps:
   1. With probability p, the station sends its frame.
   2. With probability q = 1 - p, the station waits for the beginning of the
    next time slot and checks the line again.
   a. If the line is idle, it goes to step 1.
   b. If the line is busy, it acts as though a collision has occurred and uses
    the backoff procedure
Flow diagram for 1-persistent, Nonpersistent, p-persistent method
CSMA/CA (Collision Avoidance)
        Invented for wireless network where we cannot detect collisions
         Collision are avoided through the use of CSMA/CA’s three strategies:
         the interframe space, the contention windows, and acknowledgement




       IFS can also be used to define the priority of a station or a frame If the
        station finds the channel busy, it does not restart the timer of the
        contention window; it stops the timer and restarts it when the channel
        becomes idle
CSMA / Collision Avoidance
   Used where CSMA/CD cannot be used
    –   e.g. in wireless medium collision cannot be easily detected
        as power of transmitting overwhelms receiving antenna
    –   CSMA/CA is designed to reduce collision probability at points
        where collisions would most likely occur
           when medium has become idle after a busy state, as several
            users could have been waiting for medium to become available
    –   key elements of CSMA/CA:
           IFS –interframe spacing –priority mechanism–the shorter the
            IFS the higher the priority for transmission
           CW intervals –contention window –intervals used for contention
            and transmission of packet frames
           Backoff counter–used only if two or more stations compete for
            transmission
CSMA/CA Algorithm


       Fram e to
       transm it

        Med ium     No    Wait until
         Id le?           Trans end s

              Yes
                           Wait IFS
       Wait IFS

                              S till      No   If m ed ium becom es busy d uring the backoff
          S till    No       Id le?                 tim e, the backoff tim er is halted and
         Id le?
                                 Yes             resum es when the m ed ium becom es id le.
             Yes         Exp b/o while
     Transm it fram e     Med ium id le

                         Transm it fram e
Example
Demand Assignment Protocols


   D e m a n d A s s ig n m e n t
    P r o t o c o ls

   Polling
   Reservation
Polling

   A widely used demand assignment scheme is polling. In this
    scheme, a master control device queries, in some
    predetermined order, each slave node about whether it has
    data to transmit. If the polled node has data to transmit, it
    informs the controller of its intention to transmit. In
    response, the controller allocates the channel to the ready
    node, which uses the full data rate to transmit its traffic. If
    the node being polled has no data to transmit, it declines the
    controller’s request. In response, the controller proceeds to
    query the next network node.
Polling


   The major drawback of polling is the substantial overhead
    caused by the large number of messages generated by the
    controller to query the communicating nodes. Furthermore,
    the efficiency of the polling scheme depends on the
    reliability of the controller.

   The main advantage of polling is that all nodes can receive
    equal access to the channel.
Reservation

   The basic idea in a reservation-based scheme is to set some time slots
    for carrying reservation messages. Since these messages are usually
    smaller than data packets, they are called minislots. When a station has
    data to send, it requests a data slot by sending a reservation message to
    the master in a reservation minislot.
   In a reservation-based scheme, if each station has its own reservation
    minislot,collision can be avoided. Moreover, if reservation requests
    have a priority field, the master can schedule urgent data before delay-
    insensitive data.
   Packet collisions can happen only when stations contend for the
    minislot, which use only a small fraction of the total bandwidth. Thus,
    the largest part of the bandwidth assigned to data packets is used
    efficiently.
Spread Spectrum
   Spread spectrum is designed to be used in wireless applications.
   The spread spectrum technique was developed initially for
    military and intelligence requirements. The essential idea is to
    spread the information signal over a wider bandwidth to make
    jamming and interception more difficult.
   In wireless applications, all stations use air (or a vacuum) as the
   medium for communication. Stations must be able to share this
    medium without interception and jamming.
Spread Spectrum
   To achieve these goals, spread spectrum techniques add
    redundancy; they spread the original spectrum needed for
    each station. If the required bandwidth for each station is B,
    spread spectrum expands it to Bss' such that Bss » B. The
    expanded bandwidth allows the source to wrap its message
    in a protective envelope for a more secure transmission
   Eg:. expensive gift. We can insert the gift in a special box to prevent it
    from being damaged during transportation, and we can use a superior
    delivery service to guarantee the safety of the package.
Spread Spectrum
   Spread spectrum achieves its goals through two principles.
   1. The bandwidth allocated to each station needs to be, by
    far, larger than what is needed. This allows redundancy.

   2. The expanding of the original bandwidth B to the
    bandwidth Bss must be done by a process that is independent
    of the original signal. In other words, the spreading process
    occurs after the signal is created by the source.
Spread Spectrum
   After the signal is created by the source, the spreading
    process uses a spreading code and spreads the bandwidth.
   The spreading code is a series of numbers that look random,
    but are actually a pattern.
Spread Spectrum
   Input is fed into a channel encoder that produces an analog
    signal with a relatively narrow bandwidth around some
    center frequency. This signal is further modulated using a
    sequence of digits known as a spreading code or Spreading
    sequence.
Spread Spectrum
   Spread-spectrum techniques are methods by which a signal (e.g. an
    electrical, electromagnetic signal) generated in a particular bandwidth is
    deliberately spread in the frequency domain, resulting in a signal with a
    wider bandwidth. These techniques are used for a variety of reasons,
    including the establishment of secure communications, increasing
    resistance to natural interference and jamming, to prevent detection, and
    to limit
Spread Spectrum
Spread Spectrum
Spread Spectrum

   Types of spreading:
    –   direct sequence spread spectrum (DSSS)
    –   frequency hopping spread spectrum (FHSS)
Frequency hopping spread spectrum
(FHSS)

   The frequency hopping spread spectrum (FHSS) technique uses M
    different carrier frequencies that are modulated by the source signal.

   At one moment, the signal modulates one carrier frequency; at the next
    moment, the signal modulates another carrier frequency.

   If an intruder tries to intercept the transmitted signal, she can only
   access a small piece of data because she does not know the spreading
    sequence to quickly adapt herself to the next hop.
Frequency Hoping Spread Spectrum
(FHSS)
   Signal is broadcast over seemingly random series of radio
    frequencies
    –   A number of channels allocated for the FH signal
    –   Width of each channel corresponds to bandwidth of input signal
   Signal hops from frequency to frequency at fixed intervals
    –   Transmitter operates in one channel at a time
    –   Bits are transmitted using some encoding scheme
    –   At each successive interval, a new carrier frequency is selected
   Channel sequence dictated by spreading code
Frequency Hoping Spread Spectrum
   Receiver, hopping between frequencies in synchronization
    with transmitter, picks up message
   Advantages
    –   Attempts to jam signal on one frequency succeed only at knocking
        out a few bits
Frequency Hoping Spread Spectrum
   Frequency   Hopping   Spread   Spectrum
    (FHSS)
    FHSS
Frequency Hopping Spread
Spectrum (FHSS)


   Suppose we have decided to have eight hopping frequencies.
    This is extremely low for real applications and is just for
    illustration.
   In this case, Mis 8 and k is 3. The pseudorandom code
    generator will create eight different 3-bit patterns. These are
    mapped to eight different frequencies in the frequency table
Frequency Selection in FHSS
Frequency Cycles
Bandwidth Sharing
FHSS Performance Considerations

   Large number of frequencies used
   Results in a system that is quite resistant to jamming
    –   Jammer must jam all frequencies
    –   With fixed power, this reduces the jamming power in any
        one frequency band
Direct Sequence Spread Spectrum
(DSSS
   The direct sequence spread spectrum technique also
    expands the bandwidth of the original signal, but the process
    is different.
   In DSSS, we replace each data bit with n bits using a
    spreading code. In other words, each bit is assigned a code
    of n bits, called chips, where the chip rate is n times that of
    the data
Direct Sequence Spread Spectrum
(DSSS)
   Each bit in original signal is represented by multiple bits in
    the transmitted signal
   Spreading code spreads signal across a wider frequency band
    –   Spread is in direct proportion to number of bits used
   One technique combines digital information stream with the
    spreading code bit stream using exclusive-OR
DSSS

   Direct Sequence Spread Spectrum (DSSS)
   Replace each data bit with n bits using a spreading code
   Each bit is assigned a code of n bits called chips
DSSS Example
Direct Sequence Spread Spectrum
(DSSS)

Contenu connexe

Tendances

Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile ComputingKABILESH RAMAR
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Device to Device Communication-5G technology
Device to Device Communication-5G technologyDevice to Device Communication-5G technology
Device to Device Communication-5G technologykaishik gundu
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategiesAJAL A J
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALOFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALprem kamal
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over WirelessFarooq Khan
 

Tendances (20)

Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
 
TDMA
TDMATDMA
TDMA
 
Device to Device Communication-5G technology
Device to Device Communication-5G technologyDevice to Device Communication-5G technology
Device to Device Communication-5G technology
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
CWDM vs DWDM Technology
CWDM vs DWDM TechnologyCWDM vs DWDM Technology
CWDM vs DWDM Technology
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
D2D - Device to Device Communication
D2D - Device to Device CommunicationD2D - Device to Device Communication
D2D - Device to Device Communication
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALOFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 

En vedette

12 multiple access
12 multiple access12 multiple access
12 multiple accessbheemsain
 
Multiplexing and Multiple access
Multiplexing and Multiple accessMultiplexing and Multiple access
Multiplexing and Multiple accessDr. Ghanshyam Singh
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA ViVek Patel
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECEajitece
 
multiple access techniques used in wireless communication
multiple access techniques used in wireless communicationmultiple access techniques used in wireless communication
multiple access techniques used in wireless communicationSajid ali
 

En vedette (13)

12 multiple access
12 multiple access12 multiple access
12 multiple access
 
Appia vs cactus
Appia vs cactusAppia vs cactus
Appia vs cactus
 
Multiplexing and Multiple access
Multiplexing and Multiple accessMultiplexing and Multiple access
Multiplexing and Multiple access
 
Ch12
Ch12Ch12
Ch12
 
Aloha
AlohaAloha
Aloha
 
Zig Bee
Zig BeeZig Bee
Zig Bee
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
CDMA
CDMACDMA
CDMA
 
Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA Code Division Multiple Access- CDMA
Code Division Multiple Access- CDMA
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
multiple access techniques used in wireless communication
multiple access techniques used in wireless communicationmultiple access techniques used in wireless communication
multiple access techniques used in wireless communication
 
csma ca
 csma ca csma ca
csma ca
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 

Similaire à Common protocols

Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessvish0110
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access proceduresabishajesus
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniquesBibhu Prasad
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...NadaAAmin
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxNAVAMISURESH2
 
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...Bharat Bhushan
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access SchemesDileep Kadavarath
 
computer networking ppt.pptx
computer networking ppt.pptxcomputer networking ppt.pptx
computer networking ppt.pptxSaemaAzim
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple accessJAIGANESH SEKAR
 
Multiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdmaMultiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdmaShadab Siddiqui
 
Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532kassayemamo
 
Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Soumen Santra
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 

Similaire à Common protocols (20)

v unit (1).pptx
v unit (1).pptxv unit (1).pptx
v unit (1).pptx
 
Chapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple accessChapter8,,,,,,,multiple access
Chapter8,,,,,,,multiple access
 
Multiple access procedures
Multiple access proceduresMultiple access procedures
Multiple access procedures
 
MA Presentation.pptx
MA Presentation.pptxMA Presentation.pptx
MA Presentation.pptx
 
04_20.pptx
04_20.pptx04_20.pptx
04_20.pptx
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
scribd.vpdfs.com_multiple-access-fdma-cdma-tdma-sdma-dsss-fhss-aloha-packet-r...
 
Apr7.pdf
Apr7.pdfApr7.pdf
Apr7.pdf
 
WCN U5.pptx
WCN U5.pptxWCN U5.pptx
WCN U5.pptx
 
COMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptxCOMMUNICATION TECHNIQUES.pptx
COMMUNICATION TECHNIQUES.pptx
 
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...B.I.T , MESRA [M.Tech] Assignment  : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
B.I.T , MESRA [M.Tech] Assignment : MULTIPLE ACCESS TECHNIQUES FOR WIRELESS ...
 
Satellite Multiple Access Schemes
Satellite Multiple Access SchemesSatellite Multiple Access Schemes
Satellite Multiple Access Schemes
 
Air Interface
Air InterfaceAir Interface
Air Interface
 
computer networking ppt.pptx
computer networking ppt.pptxcomputer networking ppt.pptx
computer networking ppt.pptx
 
Ea 452 chap9
Ea 452 chap9Ea 452 chap9
Ea 452 chap9
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple access
 
Multiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdmaMultiplexing tdma fdma cdma wdma
Multiplexing tdma fdma cdma wdma
 
Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532Fdma tdma-cdma-151223125532
Fdma tdma-cdma-151223125532
 
Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)Frequency Division Multiplexing Access (FDMA)
Frequency Division Multiplexing Access (FDMA)
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 

Plus de Mr SMAK

Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Mr SMAK
 
Assigments2009
Assigments2009Assigments2009
Assigments2009Mr SMAK
 
Evaluation of cellular network
Evaluation of cellular networkEvaluation of cellular network
Evaluation of cellular networkMr SMAK
 
Cellular network
Cellular networkCellular network
Cellular networkMr SMAK
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1Mr SMAK
 
Lecture 6
Lecture  6Lecture  6
Lecture 6Mr SMAK
 
Parallel architecture
Parallel architectureParallel architecture
Parallel architectureMr SMAK
 
Lecture 3
Lecture 3Lecture 3
Lecture 3Mr SMAK
 
Lecture 2
Lecture 2Lecture 2
Lecture 2Mr SMAK
 
Lecture 1
Lecture 1Lecture 1
Lecture 1Mr SMAK
 
Lecture 6
Lecture  6Lecture  6
Lecture 6Mr SMAK
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1Mr SMAK
 
Chapter 2 ASE
Chapter 2 ASEChapter 2 ASE
Chapter 2 ASEMr SMAK
 
Structure of project plan and schedule
Structure of project plan and scheduleStructure of project plan and schedule
Structure of project plan and scheduleMr SMAK
 
Proposal format
Proposal formatProposal format
Proposal formatMr SMAK
 
Proposal announcement batch2009
Proposal announcement batch2009Proposal announcement batch2009
Proposal announcement batch2009Mr SMAK
 
List ofsuparco projectsforuniversities
List ofsuparco projectsforuniversitiesList ofsuparco projectsforuniversities
List ofsuparco projectsforuniversitiesMr SMAK
 
Fyp timeline & assessment policy batch 2009
Fyp timeline & assessment policy batch 2009Fyp timeline & assessment policy batch 2009
Fyp timeline & assessment policy batch 2009Mr SMAK
 
Fyp registration form batch 2009
Fyp registration form batch 2009Fyp registration form batch 2009
Fyp registration form batch 2009Mr SMAK
 

Plus de Mr SMAK (20)

Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)Fyp list batch-2009 (project approval -rejected list)
Fyp list batch-2009 (project approval -rejected list)
 
Assigments2009
Assigments2009Assigments2009
Assigments2009
 
Week1
Week1Week1
Week1
 
Evaluation of cellular network
Evaluation of cellular networkEvaluation of cellular network
Evaluation of cellular network
 
Cellular network
Cellular networkCellular network
Cellular network
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
 
Parallel architecture
Parallel architectureParallel architecture
Parallel architecture
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
 
Lecture 6.1
Lecture  6.1Lecture  6.1
Lecture 6.1
 
Chapter 2 ASE
Chapter 2 ASEChapter 2 ASE
Chapter 2 ASE
 
Structure of project plan and schedule
Structure of project plan and scheduleStructure of project plan and schedule
Structure of project plan and schedule
 
Proposal format
Proposal formatProposal format
Proposal format
 
Proposal announcement batch2009
Proposal announcement batch2009Proposal announcement batch2009
Proposal announcement batch2009
 
List ofsuparco projectsforuniversities
List ofsuparco projectsforuniversitiesList ofsuparco projectsforuniversities
List ofsuparco projectsforuniversities
 
Fyp timeline & assessment policy batch 2009
Fyp timeline & assessment policy batch 2009Fyp timeline & assessment policy batch 2009
Fyp timeline & assessment policy batch 2009
 
Fyp registration form batch 2009
Fyp registration form batch 2009Fyp registration form batch 2009
Fyp registration form batch 2009
 

Dernier

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Dernier (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Common protocols

  • 1. Wireless Application Protocol Common Protocols
  • 2. Common Protocols  Several strategies have been proposed to solve the shared medium access problem. These strategies attempt, by various mechanisms, to strike a balance between achieving the highest- quality resource allocation decision and the overhead necessary to reach this decision. These strategies can be classified in three major categories:  Fixed assignment  Demand assignment  Random assignment.
  • 3. Fixed-Assignment Protocols  In fixed-assignment strategies, each node is allocated a predetermined fixed amount of the channel resources. Each node uses its allocated resources exclusively without competing with other nodes. Typical protocols that belong in this category include  Frequency-division multiple access(FDMA)  Time-division multiple access (TDMA)  Code-division multiple access(CDMA)
  • 4. Demand Assignment Protocols  The main objective of demand assignment protocols is to improve channel utilization by allocating the capacity of the channel to contending nodes in an optimum or near- optimum fashion. Unlike fixed-assignment schemes, where channel capacity is assigned exclusively to the network nodes in a predetermined fashion regardless of their current communication needs, demand assignment protocols ignore idle nodes and consider only nodes that are ready to transmit.  Polling  Reservation
  • 5. Random Assignment Protocols  In fixed-assignment schemes, each communicating node is assigned a frequency band in FDMA systems or a time slot in TDMA systems. This assignment is static, however, regardless of whether or not the node has data to transmit. These schemes may therefore be inefficient if the traffic sourceis bursty. In the absence of data to be transmitted, the node remains idle, thereby resulting in the allocated bandwidth to be wasted. Random assignment strategies attempt to address this shortcoming by eliminating preallocation of bandwidth to communicating nodes.
  • 6. Random Assignment Protocols  Random assignment strategies do not exercise any control to determine which communicating node can access the medium next. Furthermore, these strategies do not assign any predictable or scheduled time for any node to transmit. To deal with collisions,the protocol must include a mechanism to detect collisions and a scheme to schedule colliding packets for subsequent retransmissions.  ALOHA  CSMA  CSMA/CD
  • 8. Frequency Division Multiple Access (FDMA)  The FDMA scheme is used by radio systems to share the radio spectrum.Based on this scheme, the available bandwidth is divided into subchannels. Multiple channel access is then achieved by allocating communicating nodes with different carrier frequencies of the radio spectrum. The bandwidth of each node’s carrier is constrained within certain limits such that no interference, or overlap, occurs between different nodes. The scheme requires frequency synchronization among communicating nodes.
  • 9. FDMA  FDMA was the initial multiple-access Code technique for cellular systems Separates large band into smaller User 4  User 3 channels. User 1 User 2  Each channel has the ability to support user. Time  Guard bands are used to separate y channel preventing co-channel nc interference ue eq Fr  Narrow bandwidth (30 khz). f1
  • 10. FDMA
  • 11. FDMA  FDMA is a continuous transmission scheme as compare to TDMA because fewer bits are needed for synchronization and framing.  In FDMA, as unique channels are assigned to each user, so FDMA systems have higher cell site system cost as compared to TDMA system.  In FDMA, both the transmitter and receiver operates at the same time so FDMA Mobile units require duplexers. These also increase the cost of FDMA subscriber units and base station.
  • 12. FDMA  Advantages – Simple to implement in terms of hardware. – Fairly efficient with a small base population and with constant traffic.  Disadvantages – Network and spectrum planning are intensive and time consuming. – Channels are dedicated for a single user, idle channels add spectrum inefficiency.
  • 13. Time Division Multiple Access (TDMA  In TDMA, a radio spectrum is divided into time slots. These time slots are allocated for each user to transmit and receive information. The number of time slots is called a frame. Information is transferred and received in form of frame. A frame is consists a preamble, an information message and trial bits.  Preamble contains the address and synchronization information of both subscriber and Base Station to identify each other. Trial bits contain framing information.
  • 14. Time Division Multiple Access (TDMA  In TDMA, data transmission is not continuous and subscriber transmitter can be turned off which result in low battery consumption.  In TDMA, handoff process is much simpler for a subscriber because of discontinuous transmission.  In TDMA, duplexers are not required because different timeslots are used for transmission and reception.  In TDMA, the rate of transmission is very high as compare to FDMA.
  • 15. TDMA  Entire bandwidth is available to the user for finite period of time. Code  Users are allotted time slots for a 4 er channel allowing sharing of a single 3 er Us 2 r1 Us er channel. e Us Us  Requires time synchronization. Time  Each of the user takes turn in transmitting and receiving data in a cy en round robin fashion. u eq Fr
  • 16. TDMA
  • 17. How it works?  User presses Push-to-Talk (PTT) button  A control channel registers the radio to the closest base station.  The BS assigns an available pair of channels.  Unlike FDMA, TDMA system also assigns an available time slot within the channel.  Data transmission is not continuous rather sent and received in bursts.  The bursts are reassembled and appear like continuous transmission.
  • 18. TDMA Advantages & Disadvantages  Advantages – Extended battery life and talk time – More efficient use of spectrum, compared to FDMA – Will accommodate more users in the same spectrum space than an FDMA system  Disadvantages – Network and spectrum planning are intensive – Multipath interference affects call quality – Dropped calls are possible when users switch in and out of different cells. – Too few users result in idle channels (rural versus urban environment) – Higher costs due to greater equipment
  • 19. TDMA Frame Structure  Each sequence of 8 time slots is known as a TDMA frame
  • 20. Code Division Multiple Access (CDMA)   In CDMA, all users transmit information simultaneously by using the same carrier frequency. Each user has its own code word, which is orthogonal to other users. To detect the message, the receiver should know the codeword used by the transmitter.
  • 21. Code Division Multiple Access (CDMA)  CDMA includes the following features:  In CDMA system many users share the same frequency.  In CDMA unlike FDMA and TDMA the number of users is not limited. It has a soft capacity. But due to large number of users its performance degrades.  In CDMA, each user operates independently with no knowledge of the other users.
  • 22. CDMA  CDMA is a spread Code spectrum technique used User 4 to increase spectrum User 4 efficiency. User 3  SS has been used in User 2 military applications due to User 1 Time anti-jamming and security. y nc ue eq Fr
  • 23. CDMA
  • 24. CDMA
  • 25. Code-Division Multiple Access (CDMA)  We start with a data signal with rate D, Which we call the bit data rate. We break each bit into k chips according to a fixed pattern that is specific to each user, called the user's code.The new channel has a chip data rate of kD chips per second.  Basic Principles of CDMA – D = rate of data signal – Break each bit into k chips  Chips are a user-specific fixed pattern – Chip data rate of new channel = kD
  • 26. CDMA Example  If k=6 and code is a sequence of 1s and -1s – For a ‘1’ bit, A sends code as chip pattern  <c1, c2, c3, c4, c5, c6> – For a ‘0’ bit, A sends complement of code  <-c1, -c2, -c3, -c4, -c5, -c6>  Receiver knows sender’s code and performs electronic decode function  <d1, d2, d3, d4, d5, d6> = received chip pattern  <c1, c2, c3, c4, c5, c6> = sender’s code Su ( d ) = d1× c1 + d 2 × c 2 + d 3 × c3 + d 4 × c 4 + d 5 × c5 + d 6 × c6
  • 27. CDMA Example  User A code = <1, –1, –1, 1, –1, 1> – To send a 1 bit = <1, –1, –1, 1, –1, 1> – To send a 0 bit = <–1, 1, 1, –1, 1, –1>  User B code = <1, 1, –1, – 1, 1, 1> – To send a 1 bit = <1, 1, –1, –1, 1, 1>  Receiver receiving with A’s code – (A’s code) x (received chip pattern)  User A ‘1’ bit: 6 -> 1  User A ‘0’ bit: -6 -> 0  User B ‘1’ bit: 0 ->6 unwanted signal ignored
  • 28. CDMA  Advantages – Greatest spectrum efficiency: – CDMA improves call quality by filtering out background noise, cross-talk, and interference – Simplified frequency planning - all users on a CDMA system use the same radio frequency spectrum. – Random Walsh codes enhance user privacy; a spread-spectrum advantage – Precise power control increases talk time and battery size for mobile phones  Disadvantages – Backwards compatibility techniques are costly – Currently, base station equipment is expensive – Low traffic areas lead to inefficient use of spectrum and equipment resources
  • 29. Random Access  Random Access Methods – more efficient way of managing medium access for communicating short bursty messages  in contrast to fixed-access schemes, each user gains access to medium only when needed -has some data to send  drawback: users must compete to access the medium (‘random access’)  collision of contending transmissions  Random Access Methods in Wireless Networks – can be divided into two groups:  ALOHA based-no coordination between users  carrier-sense based-indirect coordination -users sense availability of medium before transmitting
  • 30. Random Access Collision Period U ser 4 U ser 3 U ser 2 resched uled U ser 1 Tim e
  • 31. ALOHA-based Random Access  user accesses medium as soon as it has a packet ready to transmit – after transmission, user waits a length of time > round-trip delay in the network, for an ACK from the receiver – if no ACK arrives, user waits a random interval of time (to avoid repeated collision) and retransmits  advantages: – simple, no synchronization among users required  disadvantages: – low throughput under heavy load conditions – probability of collision increases as number of users increases  max throughput = 18% of channel capacity
  • 33. Slotted ALOHA  time is divided into equal time slots –when a user has a packet to transmit, the packet is buffered and transmitted at the start of the next time slot – BS transmits a beacon signal for timing, all users must synchronize their clocks  advantages: – partial packet collision avoided  Disadvantages – throughput still quite low! – there is either no collision or a complete collision  max throughput = 36% of channel capacity
  • 35. Reservation ALOHA  Time slots are divided into reservation and transmission slots / periods – during reservation period, stations can reserve future slots in transmission period – reservation slot size << transmission slot size – collisions occur only in reservation slots  advantages: – higher throughput under heavy loads – max throughput up to 80% of channel capacity  disadvantages: – more demanding on users as they have to obtain / keep ‘reservation list’ up-to-date  R-Aloha is most commonly used in satellite systems  satellite collects requests, complies ‘reservation list’ and finally sends the list back to users
  • 37. Carrier Sense Multiple Access with Collision Detect (CSMA/CD)  With CSMA/CD, when an Ethernet device attempts to access the network to send data, the network interface on the workstation or server checks to see if the network is quiet. When the network is clear, the network interface knows that transmission can begin. If it does not sense a carrier, the interface waits a random amount of time before retrying. If the network is quiet and two devices try sending data at the same time, their signals collide. When this collision is detected, both devices back off and wait a random amount of time before retrying,
  • 38. CSMA/CD Operation  Carrier sense— Each computer on the LAN is always listening for traffic on the wire to determine when gaps between frame transmissions occur.  Multiple access— Any computer can begin sending data whenever it detects that the network is quiet. (There is no traffic.)  Collision detect— If two or more computers in the same CSMA/CD network collision domain begin sending at the same time, the bit streams from each sending computer interfere, or collide, with each other, making each transmission unreadable. If this collision occurs, each sending computer must be able to detect that a collision has occurred before it has finished sending its frame.  Each computer must stop sending its traffic as soon as it has detected the collision and then wait some random length of time, called the back-off algorithm, before attempting to retransmit the frame.
  • 39. Carrier Sense Multiple Access (CSMA)  Disadvantages of ALOHA – users do not listen to the channel before (and while) transmitting – suitable for networks with long propagation delays  Carrier Sense Multiple Access – polite version of ALOHA – Listen to the channel before transmitting  if sensed channel busy, back-off (defer transmission), and sense channel again after a random amount of time  if channel idle, transmit entire frame
  • 40. Versions of CSMA  Employs different node behaviour when channel found busy – non-persistent CSMA – persistent CSMA – 1-persistent CSMA – p-persistent CSMA
  • 41. Persistence Methods  What should a station do if the channel is busy? What should a station do if the channel is idle? 4 methods have been devised to answer these questions: the I-persistent method, the nonpersistent method, and the p-persistent method. Figure shows the behavior of three persistence methods when a station finds a channel busy.  Persistent:- station sense the channel, if channel is ideal it transmits data. if there is already some traffic going on that it does not transmit the data. Keep sensing.
  • 42. CSMA: Persistence Methods  Behavior of 1-persistent, Nonpersistent, p-persistent method
  • 43. Persistence Methods  I-Persistent The I-persistent method is simple and straightforward. In this method,after the station finds the line idle, it sends its frame immediately (with probability I).This method has the highest chance of collision because two or more stations may find the line idle and send their frames immediately.  Nonpersistent:- In the nonpersistent method, a station that has a frame to send senses the line. If the line is idle, it sends immediately. If the line is not idle, it waits a random amount of time and then senses the line again. The nonpersistent approach reduces the chance of collision because it is unlikely that two or more stations will wait the same amount of time and retry to send simultaneously. However, this method reduces the efficiency of the network because the medium remains idle when there may be stations with frames to send.
  • 44. Persistence Methods  p-Persistent :- The p-persistent method is used if the channel has time slots with a slot duration equal to or greater than the maximum propagation time. The p-persistent approach combines the advantages of the other two strategies. It reduces the chance of collision and improves efficiency. In this method, after the station finds the line idle it follows these steps:  1. With probability p, the station sends its frame.  2. With probability q = 1 - p, the station waits for the beginning of the next time slot and checks the line again.  a. If the line is idle, it goes to step 1.  b. If the line is busy, it acts as though a collision has occurred and uses the backoff procedure
  • 45. Flow diagram for 1-persistent, Nonpersistent, p-persistent method
  • 46. CSMA/CA (Collision Avoidance)  Invented for wireless network where we cannot detect collisions Collision are avoided through the use of CSMA/CA’s three strategies: the interframe space, the contention windows, and acknowledgement  IFS can also be used to define the priority of a station or a frame If the station finds the channel busy, it does not restart the timer of the contention window; it stops the timer and restarts it when the channel becomes idle
  • 47. CSMA / Collision Avoidance  Used where CSMA/CD cannot be used – e.g. in wireless medium collision cannot be easily detected as power of transmitting overwhelms receiving antenna – CSMA/CA is designed to reduce collision probability at points where collisions would most likely occur  when medium has become idle after a busy state, as several users could have been waiting for medium to become available – key elements of CSMA/CA:  IFS –interframe spacing –priority mechanism–the shorter the IFS the higher the priority for transmission  CW intervals –contention window –intervals used for contention and transmission of packet frames  Backoff counter–used only if two or more stations compete for transmission
  • 48. CSMA/CA Algorithm Fram e to transm it Med ium No Wait until Id le? Trans end s Yes Wait IFS Wait IFS S till No If m ed ium becom es busy d uring the backoff S till No Id le? tim e, the backoff tim er is halted and Id le? Yes resum es when the m ed ium becom es id le. Yes Exp b/o while Transm it fram e Med ium id le Transm it fram e
  • 50. Demand Assignment Protocols  D e m a n d A s s ig n m e n t P r o t o c o ls  Polling  Reservation
  • 51. Polling  A widely used demand assignment scheme is polling. In this scheme, a master control device queries, in some predetermined order, each slave node about whether it has data to transmit. If the polled node has data to transmit, it informs the controller of its intention to transmit. In response, the controller allocates the channel to the ready node, which uses the full data rate to transmit its traffic. If the node being polled has no data to transmit, it declines the controller’s request. In response, the controller proceeds to query the next network node.
  • 52. Polling  The major drawback of polling is the substantial overhead caused by the large number of messages generated by the controller to query the communicating nodes. Furthermore, the efficiency of the polling scheme depends on the reliability of the controller.  The main advantage of polling is that all nodes can receive equal access to the channel.
  • 53. Reservation  The basic idea in a reservation-based scheme is to set some time slots for carrying reservation messages. Since these messages are usually smaller than data packets, they are called minislots. When a station has data to send, it requests a data slot by sending a reservation message to the master in a reservation minislot.  In a reservation-based scheme, if each station has its own reservation minislot,collision can be avoided. Moreover, if reservation requests have a priority field, the master can schedule urgent data before delay- insensitive data.  Packet collisions can happen only when stations contend for the minislot, which use only a small fraction of the total bandwidth. Thus, the largest part of the bandwidth assigned to data packets is used efficiently.
  • 54. Spread Spectrum  Spread spectrum is designed to be used in wireless applications.  The spread spectrum technique was developed initially for military and intelligence requirements. The essential idea is to spread the information signal over a wider bandwidth to make jamming and interception more difficult.  In wireless applications, all stations use air (or a vacuum) as the  medium for communication. Stations must be able to share this medium without interception and jamming.
  • 55. Spread Spectrum  To achieve these goals, spread spectrum techniques add redundancy; they spread the original spectrum needed for each station. If the required bandwidth for each station is B, spread spectrum expands it to Bss' such that Bss » B. The expanded bandwidth allows the source to wrap its message in a protective envelope for a more secure transmission  Eg:. expensive gift. We can insert the gift in a special box to prevent it from being damaged during transportation, and we can use a superior delivery service to guarantee the safety of the package.
  • 56. Spread Spectrum  Spread spectrum achieves its goals through two principles.  1. The bandwidth allocated to each station needs to be, by far, larger than what is needed. This allows redundancy.  2. The expanding of the original bandwidth B to the bandwidth Bss must be done by a process that is independent of the original signal. In other words, the spreading process occurs after the signal is created by the source.
  • 57. Spread Spectrum  After the signal is created by the source, the spreading process uses a spreading code and spreads the bandwidth.  The spreading code is a series of numbers that look random, but are actually a pattern.
  • 58. Spread Spectrum  Input is fed into a channel encoder that produces an analog signal with a relatively narrow bandwidth around some center frequency. This signal is further modulated using a sequence of digits known as a spreading code or Spreading sequence.
  • 59. Spread Spectrum  Spread-spectrum techniques are methods by which a signal (e.g. an electrical, electromagnetic signal) generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reasons, including the establishment of secure communications, increasing resistance to natural interference and jamming, to prevent detection, and to limit
  • 62. Spread Spectrum  Types of spreading: – direct sequence spread spectrum (DSSS) – frequency hopping spread spectrum (FHSS)
  • 63. Frequency hopping spread spectrum (FHSS)  The frequency hopping spread spectrum (FHSS) technique uses M different carrier frequencies that are modulated by the source signal.  At one moment, the signal modulates one carrier frequency; at the next moment, the signal modulates another carrier frequency.  If an intruder tries to intercept the transmitted signal, she can only  access a small piece of data because she does not know the spreading sequence to quickly adapt herself to the next hop.
  • 64. Frequency Hoping Spread Spectrum (FHSS)  Signal is broadcast over seemingly random series of radio frequencies – A number of channels allocated for the FH signal – Width of each channel corresponds to bandwidth of input signal  Signal hops from frequency to frequency at fixed intervals – Transmitter operates in one channel at a time – Bits are transmitted using some encoding scheme – At each successive interval, a new carrier frequency is selected  Channel sequence dictated by spreading code
  • 65. Frequency Hoping Spread Spectrum  Receiver, hopping between frequencies in synchronization with transmitter, picks up message  Advantages – Attempts to jam signal on one frequency succeed only at knocking out a few bits
  • 67. Frequency Hopping Spread Spectrum (FHSS) FHSS
  • 68. Frequency Hopping Spread Spectrum (FHSS)  Suppose we have decided to have eight hopping frequencies. This is extremely low for real applications and is just for illustration.  In this case, Mis 8 and k is 3. The pseudorandom code generator will create eight different 3-bit patterns. These are mapped to eight different frequencies in the frequency table
  • 72. FHSS Performance Considerations  Large number of frequencies used  Results in a system that is quite resistant to jamming – Jammer must jam all frequencies – With fixed power, this reduces the jamming power in any one frequency band
  • 73. Direct Sequence Spread Spectrum (DSSS  The direct sequence spread spectrum technique also expands the bandwidth of the original signal, but the process is different.  In DSSS, we replace each data bit with n bits using a spreading code. In other words, each bit is assigned a code of n bits, called chips, where the chip rate is n times that of the data
  • 74. Direct Sequence Spread Spectrum (DSSS)  Each bit in original signal is represented by multiple bits in the transmitted signal  Spreading code spreads signal across a wider frequency band – Spread is in direct proportion to number of bits used  One technique combines digital information stream with the spreading code bit stream using exclusive-OR
  • 75. DSSS  Direct Sequence Spread Spectrum (DSSS)  Replace each data bit with n bits using a spreading code  Each bit is assigned a code of n bits called chips
  • 77. Direct Sequence Spread Spectrum (DSSS)

Notes de l'éditeur

  1. As frequency spectrum experiences more traffic, spectrum efficiency becomes more important. In digital systems, continuous transmission is not required because users do not use the allotted bandwidth all the time. In such systems, TDMA is a complimentary access technique to FDMA. Global Systems for Mobile communications (GSM) uses the TDMA technique.
  2. capacity increases of 8 to 10 times that of an analog system and 4 to 5 times that of other digital systems which makes it most useful in high traffic areas with a large number of users and limited spectrum