design and development of a hybrid tdma/cdma mac protocol

142
Design and Development of a Hybrid TDMA/CDMA MAC Protocol for Multimedia Wireless Networks A Thesis Submitted For the Degree of Doctor of Philosophy in the Faculty of Engineering by D. Rajaveerappa Department of Electrical Communication Engineering INDIAN INSTITUTE OF SCIENCE Bangalore – 560 012 April 2004

Upload: others

Post on 19-Feb-2022

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Design and Development of a Hybrid TDMA/CDMA

MAC Protocol for Multimedia Wireless Networks

A Thesis

Submitted For the Degree of

Doctor of Philosophy

in the Faculty of Engineering

by

D. Rajaveerappa

Department of Electrical Communication Engineering

INDIAN INSTITUTE OF SCIENCEBangalore – 560 012

April 2004

Page 2: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Acknowledgements

I would like to express my deep sense of gratitude to my research guide and teacher Prof.

(Dr.) Pallapa Venkataram, Professor, Dept. of ECE, I. I. Sc., Bangalore, for his continued

support and valuable guidance. I want to thank him for giving me the opportunity to work

on this research topic with more interest. I cannot thank him enough for his meticulous

and painstaking efforts to guide me and given me a lot of suggestions throughout my

research period.

I thank Prof. (Dr.) Anurag Kumar, Chairman, Dept. of ECE, I. I. Sc., Bangalore,

for providing me the facilities to work in his Department and his helps to me for the

completion of this work. I also thank Prof. (Dr.) Vinod Sharma, Asso. Chairman, ECE,

for his support in this regard.

I thank Prof. (Dr.) A. Selvarajan, Emiritus Professor (formerly Chairman of ECE

Department, I. I. Sc., Bangalore), for his valuable advice, support, and help during my

research period. I thank Prof. (Dr.) G. V. Anand, formerly Chairman, Dept. of ECE, I.

I. Sc., Bangalore, for providing me the facilities to work in his Department and his helps

to me for the completion of this work.

I thank my teachers, Prof. (Dr.) V. U. Reddy, Dept. of ECE, Prof. (Dr.) Kumar

N. Sivarajan, and Prof. (Dr.) M. K. Ghosh, Dept. of Mathematics for having given me

the knowledge in the field of Wireless Communications and Probability Theory. I thank

Prof. (Dr.) Utpal Mukherjee for his guidance in my course works at the beginning of my

research works.

I thank my teachers and examiners, Prof. (Dr.) Anurag Kumar, Chairman, Dept.

of ECE, Prof. (Dr.) Lawrence Jenkins, Dept. of EE, Prof. (Dr.) Jamadhagni, Dept.

i

Page 3: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Acknowledgements ii

of CEDT, for helping me to continue my research works further. I thank Prof. (Dr.)

T. S. Vedavathy and Prof. (Dr.) A.P. ShivaPrasad, Dept. of ECE, for their constant

encouragements to complete my research works. I thank all the teachers of the Department

of ECE. I also thank the administrative staffs of Dept. of ECE in this regard.

I thank Prof. (Dr.) Balakrishnan, Divisional Chairman for Information Sciences for

providing me the computing facility at SERC. I also thank Prof. (Dr.) S. M. Rao, Chair-

man of SERC, in this regard. I thank Prof. (Dr.) Pandian, Dept. of Civil Engg., formerly

CCE Chairman, for providing me the financial assistance and the hostel accommodation

for a better study at this campus. I thank Prof. (Dr.) P. Venkataram, QIP Coordinator

and CCE Chairman, Prof. (Dr.) Y. V. Venkatesh, Dean of Engg., Prof. (Dr.) V. M. H.

Govinda Rao, (formerly Dean of Engg., and QIP Coordinator), and Prof. (Dr.) D. K.

Subramaniam, Dept. of CSA, (formerly Dean of Engg.), for their academic support in

my research.

I thank our Honourable Director of I. I. Sc., Prof. (Dr.) Govardhana Mehta, Divisional

Chairmen, Deans, Council of Wardens, Registrars and other administrative staffs for their

support in my research. I thank our former Honourable Director of I.I.Sc., Prof. (Dr.)

Padmanabhan, for granting me admission to this research. I thank Dr. Panneer Selvam,

Deputy Registrar (Academic) for his valuable advice and help to finish this research work.

I thank Dr. Bharathi Venkataram, M.B.B.S., M.D., Mr. Gautham, and Mr. Manu for

their concern about my health during my stay at I.I.Sc. I thank my friend and colleagues

Mr. Abdul Gaffur, Mr. Mathi and my teachers Prof. (Dr.) Abdul Sattar and Prof. (Dr.)

T.G. Palanivelu for the constant support in my research works.

I thank Mr. Chetan Kumar, Engineer, WIPRO, Dr. Mainak Chatterjee, Mr. Sonal

Ranjan, Mr. Babu, Mr. Gopi Garge, ERNET LAB., Mr. Avinash Shenoy, TIFR, Mr.

Kiran, SERC, Mr. Madan, SERC, Mr. Gundu Rao, SERC, Ms. Sarala, SERC, and other

staffs of SERC for their helps in providing computing facility for me at SERC. I thank

Dr. RadhaKrishna Rao, my QIP colleague, and my friends Dr. Jimson Mathew, Mr.

ArunKumar M.C., Samsung, Dr. Muthuvel, Dr. Pinto George, Mr. Sridharan, Rutgers

University, and Mr. Alavi (CUSAT) for their moral support in this regard.

Page 4: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Acknowledgements iii

I thank my friends Mr. Anindya, Mr. Gowri, Mr. Mahanty, Mr. Salil, Mr. Nelson,

Dr. Mani, Mr. Appa Rao, Mr. Rayala Ravi, Mr. Srinivas (and his parents), Mr. Prabhu,

Mr. Nazar, Mr. Elango, Mr. Anoop Sharma, Mr. Rajesh Reddy, Mr. K.N.S. Reddy, Dr.

Saji Varghese, Mr. Jayanta Madhu, Mr. Sushil, Mr. Saju, Mr. Benson, Mr. Partha, Mr.

Ajay Kumar Naik, Mr. Shantanu, Mr. Joseph, Mr. Joe Mathai, Mr. Dennis, and Mr.

Srinivas for keeping me in a family environment during my research period.

I thank Prof. (Dr.) C.S. Sridhar (formerly HOD of DOE, CUSAT, Cochin), Prof.

(Dr.) K. Vasudevan, Prof. (Dr.) P.R.S. Pillai, Prof. (Dr.) K.T.Mathew, Prof. (Dr.)

K.G. Balakrishnan, HOD, DOE, CUSAT, Cochin, Dr. Tessamma Thomas, Prof. (Dr.)

Paulose Jacob, and Dr. Wilson for their encouragements to complete my research.

I thank former Honourable Vice Chancellors of Cochin University, Prof. (Dr.) K.G.

Adiyodi (Late) and Prof. (Dr.) Babu Joseph for providing me the required study leave

for the purpose of this research. I thank the present Honourable Vice Chancellor, Prof.

(Dr.) UnniKrishnan Nair for his continued support and help to finish my research. I

thank the other administrative staffs of Cochin University, Cochin, in this regard.

I thank AICTE, New Delhi, for providing me the necessary financial assistance for my

research at I.I.Sc., Bangalore.

I thank ETRI, Seoul, South Korea, for providing me financial assistance to visit their

place for the purpose of presentation of my research paper.

I thank all my teachers and professors who reviewed my research papers and this thesis

work.

I thank Prof. (Dr.) Samuelson, Prof. (Dr.) Jaya Bhaskar, Prof. (Dr.) Prabhakaran,

Dr. James Jacob, Dr. Santhosh Abraham Paul, Dr. Joy Kuri, Prof. K.L. Sebastian,

Prof. (Dr.) Lawrence Jenkins, Prof. (Dr.) Joy Thomas, Prof. (Dr.) Mohan Vasu, and

the Pastors and Brothers who paryed for my success in this research.

Finally, I thank all the members of Protocol Engineering and Technology Lab., Dept.

of ECE, I.I.Sc., and other friends who have helped me directly or indirectly in connection

with this research.

Page 5: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Abstract

A wireless local area network (WLAN) provides high bandwidth to users in a limited

geographical area. This network faces certain challenges and constraints that are not

imposed on their wired counterparts. They are: frequency allocation, interference and

reliability, security, power consumption, human safety, mobility, connection to wired LAN,

service area, handoff and roaming, dynamic configuration and the throughput. But the

wireless medium relies heavily on the features of MAC protocol and the MAC protocol

is the core of medium access control for WLANs. The available MAC protocols all have

their own merits and demerits.

In our research works, we propose a hybrid MAC protocol for WLAN. In the design, we

have combined the merits of the TDMA and CDMA systems to improve the throughput

of the WLAN in a picocellular environment. We have used the reservation and polling

methods of MAC protocols to handle both the low and high data traffics of the mobile

users. We have strictly followed the standards specified by IEEE 802.11 for WLANs to

implement the designed MAC protocol.

We have simulated the hybrid TDMA/CDMA based MAC protocols combined with

RAP (Randomly Addressed Polling) for Wireless Local Area Networks. We have de-

veloped a closed form mathematical expressions analytically for this protocol. We have

also studied the power control aspects in this environment and we derived a closed form

mathematical expressions analytically for this power control technique.

This hybrid protocol is capable of integrating different types of traffic (like CBR,

VBR and ABR services) and compiles with the requirements of next-generation systems.

The lower traffic arrival is dealt with the Random Access and the higher traffic arrival

iv

Page 6: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Abstract v

is with the Polling methods. This enables us to obtain higher throughput and low-

mean delay performance compared to the contention-reservation-based MAC schemes.

The protocol offers the ability to integrate different types of services in a flexible way

by the use of multiple slots per frame, while CDMA allows multiple users to transmit

simultaneously using their own codes. The RAP uses an efficient ”back-off” algorithm to

improve throughput at higher arrival rates of user’s data. The performance is evaluated

in terms of throughput, delay, and rejection rate using computer simulation.

A detailed simulation is carried out regarding the maximum number of users that

each base station can support on a lossy channel. This work has analyzed the desired

user’s signal quality in a single cell CDMA (Code Division Multiple Access) system in

the presence of MAI (Multiple Access Interference). Earlier power control techniques

were designed to assure that all signals are received with equal power levels. Since these

algorithms are designed for a imperfect control of power, the capacity of the system is

reduced for a given BER (Bit-Error Rate). We proposed an EPCM (Efficient Power

Control Mechanism) based system capacity which is designed for the reverse link (mobile

to base station) considering the path loss, log-normal shadowing and Rayleigh fading.

We have simulated the following applications for the further improvement of the per-

formance of the designed MAC protocol:

• Designed protocol is tested under different traffic conditions.

• The protocol is tested for multimedia traffic under application oriented QoS require-

ments.

• Buffer Management and resource allocation.

• Call Admission Control (hand-offs, arrival of new users).

• The adaptability to the variable nature of traffic.

• The propagation aspects in the wireless medium.

The proposed MAC protocol has been simulated and analysed by using C++/MATLAB

Programming in IBM/SUN-SOLARIS UNIX environment. The results were plotted using

Page 7: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Abstract vi

MATLAB software.

All the functions of the protocol have been tested by an analysis and also by simulation.

• Call admission control function of the protocol has been tested by simulation and

analysis in a multimedia wireless network topology and from analysis we found that

at low traffic the throughput is high and at high traffic the throughput is kept

constant at a reasonable high value. The simulation results also justify/coordinate

the analysis results.

• Dynamic channel allocation function of the protocol was tested and analysed and

the coordinated results show that at low traffic, high throughput and at high traffic

the throughput is constant.

• Buffer management function of the protocol simulation shows the results that the

packet loss can be controlled to a minimum by adjusting the buffer threshold level

at any traffic conditions.

• Maintenance of data transfer during the hand-offs function was simulated and the

results show that the blocked calls are less during low traffic and at high traffic the

blocked calls can be kept constant at low value.

Thus, the proposed model aimed at having high throughput, high spectral efficiency, low

delay, moderate BER and moderate blocking probability.

We have considered a pico cell with a maximum of several users and studied the

power efficiency of combined channel coding and modulation with perfect power controlled

CDMA system. Thus our simulation of the ”software radio” has flexibility in choosing the

proper channel coders dynamically depending upon the variations of AWGN channel.

Page 8: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Contents

Acknowledgements i

Abstract iv

1 Introduction 1

1.1 Multimedia Wireless Networks (MWNs) . . . . . . . . . . . . . . . . . . . 5

1.1.1 Multimedia Service Requirements . . . . . . . . . . . . . . . . . . . 8

1.2 Wireless Problems in MWNs . . . . . . . . . . . . . . . . . . . . . . . . . . 9

1.3 MAC in Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

1.3.1 OSI Layered Architecture . . . . . . . . . . . . . . . . . . . . . . . 11

1.3.2 The MAC Sublayer . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

1.4 Proposed MAC Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

1.5 Organization of the rest of the Thesis . . . . . . . . . . . . . . . . . . . . . 15

2 MAC Protocols for Multimedia Wireless Networks 16

2.1 MAC Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

2.1.1 Carrier Sense Multiple Access (CSMA) - Random Access (RA) . . . 17

2.1.2 Polling Based MAC Protocols . . . . . . . . . . . . . . . . . . . . . 20

2.1.3 FDMA Based MAC Scheme . . . . . . . . . . . . . . . . . . . . . . 23

2.1.4 TDMA Based MAC Scheme . . . . . . . . . . . . . . . . . . . . . . 24

2.1.5 DS-SS (CDMA) Based MAC Scheme . . . . . . . . . . . . . . . . . 25

2.2 Requirements of MWN’s MAC Protocol . . . . . . . . . . . . . . . . . . . 28

2.3 Some of the Existing Works on MWN’s MAC . . . . . . . . . . . . . . . . 33

vii

Page 9: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

CONTENTS viii

3 Design of the Proposed MAC Protocol 36

3.1 System Model for the Proposed MAC Protocol . . . . . . . . . . . . . . . . 37

3.2 Frame Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

3.2.1 The Random Access (RA): TDMA/CDMA . . . . . . . . . . . . . . 39

3.2.2 The Random Access Polling : RAP . . . . . . . . . . . . . . . . . . 41

3.3 Calculation of Throughput and Delay . . . . . . . . . . . . . . . . . . . . . 42

3.4 Analytical Model for the Proposed MAC Protocol . . . . . . . . . . . . . . 44

3.4.1 Random Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

3.4.2 Random Access Polling . . . . . . . . . . . . . . . . . . . . . . . . . 46

3.5 Power Control for the Proposed MAC Protocol . . . . . . . . . . . . . . . 48

3.5.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

3.5.2 The Correlation Receiver for CDMA System . . . . . . . . . . . . . 51

3.5.3 Analytical equation and performance analysis for EPCM . . . . . . 52

3.5.4 Analytical Model for the Power Control . . . . . . . . . . . . . . . . 55

4 Functions of the Proposed MAC Protocol 57

4.1 Multiuser and Multistream Admission Control . . . . . . . . . . . . . . . . 57

4.1.1 CAC Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

4.2 Channel Allocation based on the QoS Requirements of the Multimedia

Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

4.3 Buffer Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

4.4 Maintenance of Data Transfer during the Hand-offs . . . . . . . . . . . . . 75

5 Simulation 82

5.1 Simulation and Results of the Power Control Algorithm . . . . . . . . . . . 87

5.2 Results of the Admission Control of the Protocol . . . . . . . . . . . . . . 91

5.3 Results of Channel Allocation Scheme of the Protocol . . . . . . . . . . . . 93

5.4 Results of Buffer Management Scheme . . . . . . . . . . . . . . . . . . . . 94

5.5 Results of Maintenance of Data Transfer during the Hand-offs . . . . . . . 95

Page 10: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

CONTENTS ix

6 Testing of Protocol in Software Radio Environment 96

6.1 Software Radio and its Layered Architecture . . . . . . . . . . . . . . . . . 97

6.2 Source Encoding and Decoding Methods . . . . . . . . . . . . . . . . . . . 99

6.3 Channel Encoding and Decoding Techniques . . . . . . . . . . . . . . . . . 100

6.4 TDMA/CDMA System and Results . . . . . . . . . . . . . . . . . . . . . . 107

7 Conclusions 118

7.1 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

Bibliography 120

Page 11: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

List of Tables

1.1 Main parameters of different existing and emerging access technologies . . 4

4.1 Downlink Structure Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

4.2 Uplink Resource Management Matrix . . . . . . . . . . . . . . . . . . . . . 67

5.1 Simulation parameters used in MAC Power Control . . . . . . . . . . . . . 87

x

Page 12: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

List of Figures

1.1 Bi-directional radio access system as a function of the data rate, range and

mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.2 Seamless system network including a variety of access technologies . . . . . 5

1.3 Comparison of FDMA, TDMA and CDMA technologies . . . . . . . . . . . 7

1.4 The OSI Reference Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

1.5 Classification of Multiple Access Protocols . . . . . . . . . . . . . . . . . . 14

2.1 Performance of MAC Protocols: ALOHA, CSMA/CA, CSMA/CD and

TOKEN PASSING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

3.1 The infrastructure WLAN network used for the simulation of the proposed

MAC protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

3.2 The TDMA/CDMA Frame Structure . . . . . . . . . . . . . . . . . . . . . 40

3.3 The RAP Frame Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

3.4 The analytical model (Markov Model) for the performance analysis to cal-

culate the throughput and the delay. . . . . . . . . . . . . . . . . . . . . . 46

3.5 The Correlation Receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

3.6 Multipath fading due to reflection . . . . . . . . . . . . . . . . . . . . . . . 54

4.1 Illustration of Dynamic Resource Allocation for Multiplexing VBR Streams 62

4.2 Intra and Inter-bunch Links . . . . . . . . . . . . . . . . . . . . . . . . . . 63

4.3 The Zone Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

4.4 Downlink Co-channel Interference Case . . . . . . . . . . . . . . . . . . . . 66

xi

Page 13: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

LIST OF FIGURES xii

4.5 MS Uplink Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

4.6 Dynamic Threshold Vs. Total Queue Length . . . . . . . . . . . . . . . . . 71

4.7 Simulation Model of BS Switch for Buffer Management . . . . . . . . . . . 73

4.8 A Cellular Hand-off System Model . . . . . . . . . . . . . . . . . . . . . . 76

4.9 Hand-off Management Scheme . . . . . . . . . . . . . . . . . . . . . . . . . 78

5.1 Performance Curves for the Combined Protocol . . . . . . . . . . . . . . . 84

5.2 Performance Curves for the Combined Protocol . . . . . . . . . . . . . . . 85

5.3 Performance Curves for the Combined Protocol obtained from the mathe-

matical analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

5.4 Analytical results for 16 Users in 0 to 1.0 Watt Tx. Power Range . . . . . 88

5.5 Analytical results for 16 Users in 0 to 1.0 µW Tx. Power Range . . . . . . 89

5.6 Power control analysis under no fading conditions . . . . . . . . . . . . . . 89

5.7 Power control analysis under fading conditions . . . . . . . . . . . . . . . . 90

5.8 BER analysis under no fading conditions . . . . . . . . . . . . . . . . . . . 90

5.9 BER analysis under fading conditions . . . . . . . . . . . . . . . . . . . . 91

5.10 New Call Blocking Probability Performance with fading of channel . . . . . 92

5.11 New Call Blocking Probability Performance without fading of channel . . . 92

5.12 Channel Blocking Probability without Power Control . . . . . . . . . . . . 93

5.13 Channel Blocking Probability with Power Control . . . . . . . . . . . . . . 93

5.14 Packet Loss Probability Vs. Buffer Threshold Optimization Parameter . . 94

5.15 Packets Loss Vs. Buffer Threshold . . . . . . . . . . . . . . . . . . . . . . 94

5.16 Hand-off Call Blocking Probability Performance with fading of channel . . 95

5.17 Hand-off Call Blocking Probability Performance without fading of channel 95

6.1 Software Radio Block Diagram . . . . . . . . . . . . . . . . . . . . . . . . . 98

6.2 Software Radio Layering Model . . . . . . . . . . . . . . . . . . . . . . . . 98

6.3 A/D Converter in Software Radio . . . . . . . . . . . . . . . . . . . . . . . 99

6.4 Encoder for a (2,1) convolution code . . . . . . . . . . . . . . . . . . . . . 106

6.5 Syndrome calculation and error-correction for the convolution code . . . . 106

Page 14: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

LIST OF FIGURES xiii

6.6 Speech Signal of user 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

6.7 Power Control for uncoded BPSK modulation with different noise variance

σN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

6.8 Power Control for block coded BPSK modulation with different noise vari-

ance σN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

6.9 Power Control for cyclic coded BPSK modulation with different noise vari-

ance σN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

6.10 Power Control for convolution coded BPSK modulation with different noise

variance σN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

6.11 Power Control for different channel coding shemes with BPSK modulation

with noise variance σN = 1.0 . . . . . . . . . . . . . . . . . . . . . . . . . . 110

6.12 Power Control for different channel coding shemes with BPSK modulation

with noise variance σN = 2.0 . . . . . . . . . . . . . . . . . . . . . . . . . . 111

6.13 Power Control for different channel coding shemes with BPSK modulation

with noise variance σN = 3.0 . . . . . . . . . . . . . . . . . . . . . . . . . . 111

6.14 Power Control for different channel coding shemes with BPSK modulation

with noise variance σN = 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . 112

6.15 Power Control for different channel coding shemes with BPSK modulation

with noise variance σN = 5.0 . . . . . . . . . . . . . . . . . . . . . . . . . . 112

6.16 BER for user 1 with uncoded BPSK modulation when only one user is in

the cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

6.17 BER for user 1 with uncoded BPSK modulation when seven users are in

the cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

6.18 BER for user 1 with block coded BPSK modulation when only one user is

in the cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

6.19 BER for user 1 with block coded BPSK modulation when seven users are

in the cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

6.20 BER for user 1 with cyclic coded BPSK modulation when only one user is

in the cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

Page 15: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

LIST OF FIGURES xiv

6.21 BER for user 1 with cyclic coded BPSK modulation when seven users are

in the cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

6.22 BER for user 1 with convolution coded BPSK modulation when only one

user is in the cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

6.23 BER for user 1 with convolution coded BPSK modulation when seven users

are in the cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

Page 16: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1

Introduction

After the first launch of analog mobile communication systems, better known as ”first-

generation” system, there has been an explosive increase in the number of mobile users

in the last two decades. The first generation systems are based on analog technology and

provide voice services. ”Second generation” systems (like the TDMA - based systems

GSM, IS-54, ANSI-136 as well as the CDMA - based system IS-95) use digital technology

for similar services as analog systems. These systems have been extended to provide

higher data rate services and packet transmissions. To this end, GSM will incorporate

advanced schemes as High Speed Circuit Switched Data (HSCSD), General Packet Radio

Service (GPRS), and Enhanced Data Rates for GSM Evolution (EDGE) to increase the

data rates that are available for the users [1].

The first version of ”third generation” mobile radio systems called International Mobile

Telecommunications - 2000 (IMT-2000) has been standardized world wide (IMT-2000 in

ITU and UMTS in Europe). Their main goals are to support broadband data services

of upto 2 Mbps via a wideband radio interface and to enable international roaming for

circuit-switched and packet-oriented services. IMT-2000 supports time division duplex

(TDD) and frequency division duplex (FDD) to enable symmetric and asymmetric data

services in a spectrum efficient way. Third generation systems address a mass market for

mobile multimedia communications and enhanced multimedia services (please refer to fig.

1.1).

1

Page 17: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 2

Mobile multimedia communication will be the concept towards a fourth generation

wireless communication in which users will want to use a wide range of different inter-

active multimedia services in personal and professional applications such as teleworking,

teleshopping, emergency services, telemaintenance, telemedicine, virtual reality, identifi-

cation, support for the handicapped, interactive training or personal television. These

services must be available to the users at anytime, from anywhere and in anyform.

Fourth Generation mobile communications (4G mobile) involve a mix of concepts and

technologies in the making. Some can be recognized as derived from 3G and are called

”evolutionary” (e.g., evolutions of WCDMA (Wideband CDMA) and cdma2000), while

others involve new approaches to wireless mobile and are sometimes labeled ”revolution-

ary” (e.g., OFDM (Orthogonal Frequency Division Multiplexing)/WCDMA or converged

broadband wireless core). The converged broadband wireless system is nothing but the to-

tal convergence of wireless mobile and wireless access communications. The future issues

in this aspect are on spectrum efficiency, dynamic bandwidth allocation, secured wireless

applications, improved quality of service, revolutionary digital transceiver technologies,

and so on.

Due to the dominating role of mobile radio access, it is expected that more handsets

than PCs (Personal Computers) will be connected to the Internet around 2004. Therefore,

mobile terminals will be the major man-machine interface instead of the PC. Given the

dominating role of IP-based data traffic, future wireless communication networks have

to be designed for economic packet data transfer. The expected data services lead to

high data rates requirements for future systems. Therefore, research activities on wireless

communication systems beyond the third generation have already started in many parts

of the world. Please refer to table 1.1.

Future wireless communication systems beyond third generation will be characterised

by a horizontal communications model between different access technologies to the user

terminals such as cellular, cordless, WLAN type systems, short range connectivity, broad-

cast systems, and wired systems. They will be integrated on a common, flexible, and

Page 18: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 3

GSM

DECT

UMTS

IEEE 802.11BRANHiperlan 2

BRANFixed Urban

Hiper AccessBlue Tooth

Total data rate per cell

Mobility & Range

0.5 Mbps 2 Mbps 20 Mbps 155 Mbps

High SpeedVehicularRural

VehicularUrban

PedestrianIndoor

Personal Area

Figure 1.1: Bi-directional radio access system as a function of the data rate, range andmobility

expandable platform to complement each other in an optimum way and to satisfy differ-

ent service requirements in a variety of radio environments. These access systems will be

connected to a seamless IP-based core network. Please refer to fig. 1.2.

Users will have a single number, e.g., a telephone number, a PIN (Personal Identi-

fication Number) number, or an IP address, for all access technologies. A new media

access system (generalized access network) connects the core network to the appropriate

access technology. It also contain mobility management. Global roaming is required for

all access technologies. Other key requirements include the internetworking between those

different access systems in terms of horizontal (intra-sytem) and vertical (inter-system)

handover as well as seamless services with service negotiations including mobility, secu-

rity, and quality of service. They will be handled in the newly developed media access

system and in the core network. The media access system connects each access system to

the common core network.

Page 19: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 4

Table 1.1: Main parameters of different existing and emerging access technologies

Systems Data rates Technology Range Mobility Frequency Application

GSM,GPRS, 9.6 Kbps to TDMA, upto high 900,1800 public,HSCSD,EDGE 384 Kbps FDD 35 Km 1900 MHz privateIMT-2000, Max. WCDMA, 30 m to high 2 GHz -do-UMTS 2 Mbps CDMA 20 KmDECT Max. TDMA upto low 1880 to office,

1.694 Mbps 500 m 1900 MHz residenceBluetooth Max. TDMA, 0.1 to low 2.4 to cable,

721 Kbps FH 100 m 2.4835 GHz small officeHiperlan 2 Max. OFDM, 50 to low 5.15 to corporate,

25 Mbps TDMA 300 m 5.35 GHZ publicIEEE802.11 Max. OFDM, 50 to low 5.47 to -do-

25 Mbps CSMA 300 m 5.725 GHzDAB 1.5 OFDM ≤ 100 high 176 to audio

Mbps Km 230 MHz broadcastDVB 5 to OFDM ≤ 100 medium below video

31 Mbps Km to high 860 MHz broadcastCable Modem ≤ 40 FDD 5 to No 60 to residential

Mbps 20 Km 860 MHzADSL ≤ 6.144 DMT 2 to No Base Band home,

Mbps no carrier 6 Km office

In addition to existing emerging radio access technologies, new radio interfaces can also

be integrated into such a seamless network architecture. Research on new radio interfaces

has already started to increase the data rates of third generation mobile radio systems

by an order of magnitude in order to reach at least 10 - 20 Mbps in a cellular environ-

ment and 2 Mbps for moving vehicles. Moreover, the cost per transmitted bit should be

reduced significantly. Candidate multiple access techniques include CDMA (Code Divi-

sion Multilple Access). This is capable of MAI (Multiple Access Interference) elimination

and ISI (Inter Symbol Interference) suppression, irrespective of the encountered wireless

frequency selective channels [2, 3].

Page 20: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 5

connect

IP Based Core Network

Media Access System

Laptop

Cell phone

Desktop PC

Fixed Telephone

ApplicationsServices &

IMT−2000UMTS

WLAN Type

To other entities

Short

range

Cellular GSM

DABDVB

Wireline DSL

New Radio Interfaces

−ions

Figure 1.2: Seamless system network including a variety of access technologies

1.1 Multimedia Wireless Networks (MWNs)

The desire to free communications from physical connection together with increasing de-

mand for new wireless services, such as internet connections, has motivated tremendous

efforts to develop Multimedia Wireless Networks. The term ”mutimedia” is referred to

the information expressed in multiple media such as: text, voice, video, graphics, im-

age and audio with different source characteristics (data rates, activity ratio, burstiness)

and different quality requirements (BER) in application such as teleconferencing, med-

ical imaging, entertainment and educational video, and advertising. It also reflects the

fact that the transmission of these informations may occur in several different channel

types (indoor, outdoor, cellular, microcellular) with different transmission characteristics.

Broadband networks based on ATM and IP will provide the integration of telecommu-

nications and computer communications for the provision of multimedia services to the

user. The third generation mobile systems should enable these multimedia services also

Page 21: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 6

to be offered to users. These mobile systems include Universal Mobile Telecommunication

Systems (UMTS) and International Mobile Telecommunications - 2000 (IMT-2000). The

personal and terminal roaming are supported by terminals and networks in future mobile

systems from which Service Providers can create a wide range of mobile multimedia ap-

plications.

A number of proposals are currently under development for future generation mobile and

personal communication systems. These systems will bring with them the potential to

provide a wide range of services operating in a wide range of wireless environments. It

is widely acknowledged that different radio interfaces for the diffferent transmission en-

vironments that are expected to be encountered. Indeed the pan-European program on

Research and Development in Advanced Communications in Europe (RACE) suggests

four different radio interfaces for the portable terminals for home, office, vehicular and

public environments. However, within each of these radio interfaces, will be the need to ac-

commodate sources with different data rates, burstiness and quality requirements. There

are wireless access options like (FDMA (Frequency Division Multiple Access), CDMA

(Code Division Multiple Access), and TDMA (Time Division Multiple Access)) available

to meet these requirements [4, 5].

For multimedia applications, it is important to know the maximum bit rate achievable for

the multiple access techniques in various channel types. One common feature for various

mobile channels is the multipath effect. It can cause severe ISI (Inter Symbol Interfer-

ence) and hence restricts the maximum data transmission rate. With the use of equalizers,

symbol rates of several times the coherence bandwidth are possible for FDMA, TDMA

systems to reduce ISI. For CDMA systems, a correlation receiver will be used which com-

bines signals from several paths. The time varying property of the multipath channel can

be estimated in a better way in a CDMA receiver than in FDMA and TDMA due to the

wider bandwidth (more information) used.

When the source is bursty it is desirable to make the channel resource available to other

users during silence periods, or at the very least to ensure that interference generated by

the silence is minimized. With FDMA and TDMA systems, it is easy to detect silence

Page 22: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 7

periods and efficiently switch off the transmitter at these times. However, in general, it is

not possible to reallocate the channel to another user until the transmission is completely

terminated. One important advantage of CDMA is that it allows the channel resource to

be reallocated to other users. In this case, this is achieved indirectly by the fact that the

reduced interference allows other users (with different codes) to access the systems and

still maintain an acceptable inteference level (this is sometimes referred to as statistical

multiplexing). But there are overloads in the case of CDMA. So, a minimum transmission

bit rate greater than zero is required in CDMA to maintain synchronization during silence

periods.

In all multiple access schemes transmission quality in any given channel and transmitter

quality can be traded (until the error floor is reached). Similarly, channel coding and in

case of CDMA, processing gain can be used to adjust bit error rate (BER) performance.

In case of FDMA and TDMA, some bandwidth adjustment will be required [6].

N: number of mobile users

. . . .

Time

Frequency

Code

FB

N1 2 3 . . . . .

.

Time

Frequency

Code

12

NTS

FDMAFB: Frequency Bands

TDMATS: Time Slots Time

Frequency

Code

12

N

DSCodes

CDMADS: Direct Sequence

Figure 1.3: Comparison of FDMA, TDMA and CDMA technologies

Adjustment of transmitter power to achieve the desired transmission quality has serious

implications for frequency reuse (cellular) schemes with a pre-assigned frequency plan

(most FDMA, TDMA cellular systems) because interference levels are changed and the

Page 23: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 8

given reuse distances may no longer be sufficient. In the case of CDMA, adjustment of

transmitter power for a given user does impact on overall system capacity, but since this

capacity has a soft limit, significant disruption is less likely. Please refer to fig. 1.3.

1.1.1 Multimedia Service Requirements

A typical distributed multimedia environment in which multiple, remotely located users

participate in a joint work or design project demand for:

• resource sharing to integrate information on a more global basis and ensure the use

of system’s available information

• multimedia data integration such as images, graphics, sound, text, and structural

data, to present information in a more immediate and understandable form

• local intelligence and autonomy to perform tasks independently of centralised system

• graphical interfaces to reduce training costs and assist occasional and inexperienced

users, and

• vendor independence to achieve free from any specific hardware vendor.

A multimedia environment, presently consists of applications accessing pages, facsim-

ile, answering machines, telephone lines, speech synthesis, and digital recording and play

back. Its key contributions are the integration of multimedia into a cohesive nomadic

information infrastructure and a graceful transition from desktop to nomadic locals. This

integration is at the service and user interface levels [7, 8].

It is important to develop new and more highly integrated nomadic computing platforms

capable of employing emerging digital wireless communication networks, but it is also

important to learn from experiments how these devices might be used. QoS (Quality of

Service) is a set of user-perceived attributes of which makes a service what it is. It is

expressed in user understandable language and manifests itself as a number of parame-

ters, all of which either subjective or objective values. Subjective QoS just determines the

degree of satisfaction of the users from the specific service. On the other hand, objective

Page 24: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 9

QoS can be the present parameters whose values are definite and can be measured by the

providers as well as by the service user.

With respect to communications, we identify two objects, ”remote operation” and ”mul-

timedia transport system”. The concept of remote operation is already defined in the OSI

application layer and also well understood in the internet world. The QoS parameters

play an important role and the multimedia transport system is one of the main actors in

the system.

1.2 Wireless Problems in MWNs

The salient features of multimedia wireless network environment may be described as the

”3M”s environment: ”real-time Multimedia, Multihop, and Mobile”. In the past, there

have been studies and implementations of systems that combined any two of these ”M”s,

but not all three. For example, real- time Multimedia and Multihop have been studied

in certain satellite system (e.g., Iridium); real-time Multimedia and Mobile are pervasive

in cellular radio system and Berkeley’s dynamic hand-off with ”hints” for multimedia,

mobile, cellular networks; and Multihop and Mobile were well studied in the 1970s Ad-

vanced Research Projects Agency (ARPA) packet radio project. A well known wireless

communication problem is the reception of the same transmissions at multiple bases. The

problem is apparent with the infrared networks, where a zone may have a number of bases.

Transmission for both types of badge contain a sequence number, allowing duplicates to

be filtered at any level in the system. Now add to this the fact that the mobile users

would typically be moving in a lower bandwidth, error-prone environment, where fading

problems are quite common.

Research in the area of wireless communications, as reported, has tended to focus either

on physical layer issues such as CDMA versus TDMA and multiple access protocols for

the wireless environment or on higher layer control isssues such as call hand-off, hierar-

chical cell design, and Dynamic Channel Allocation (DCA) among cells for the voice-call

Page 25: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 10

environment. Relatively, little has been reported on control issues arising when the wire-

less networks must carry multimedia traffic, or interface with much higher speed wired

networks designed to carry such traffic.

The solution for these problems in MWNs is the evolution towards future communica-

tion systems is strongly influenced by increasing transmission capacities, changing service

requirements and emerging ATM technologies. The next generation high performance lo-

cal and metropolitan area networks have to be designed including control schemes which

provide high throughput while simultaneously supporting real-time services. The slotted

ring architecture enchanced by spatial slot reuse is one potential approach for data trans-

mission and admission control in distributed Giga bit networks. The efficient medium

access control protocols are proposed to maintain fairness and bounded access delays and

are designed for networks operating as Gbits LAN as well as for access control to interface

users of ATM systems on a shared medium.

1.3 MAC in Wireless Networks

More recently there has been a growing interest to provide wireless access to applica-

tions that are typically of Local Area Networks giving rise to the concept of Wireless

Local Area Networks (WLANs). In general, wireless systems as a whole is divided into

distinct coverage areas called cells. Individual radio carrier frequencies are assigned to

each of the cells from a set of available frequencies in a manner such that the adjoining

cells are not on the same frequency. This minimizes the interference between cells while

allowing the same frequency to be used many times in a given system giving rise to the

concept of frequency reuse. Each cell is identified as by a base station that serves all

the mobile users in that cell. It is not possible to guarantee the users of a cell to have

good propagation conditions among themselves all the time. Hence, it is the function of

the base station to establish connectivity by allocating resources, maintain connectivity,

route data packets and monitor all kinds of activity in the cell. In wireless networks,

sharing of the spectrum is not only limited but also inherently expensive. So, a need for a

Page 26: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 11

multiple access protocol (MAC) arises whenever a resource is shared by a number of inde-

pendent users. So, one of the main consideration in the design of the wireless networks is

to incorporate multiple access schemes that make efficient use of the allocated bandwidth.

1.3.1 OSI Layered Architecture

Layering, or layered protocol architecture, is a form of hierarchical modularity that is

central to data network design. The most popular of these is the Open Systems In-

terconnection (OSI) which was developed as an international standard by International

Standard Organization (ISO). The OSI model has seven layers. The first layer is the

physical layer which provides virtual link for transmitting a sequence of bits between any

pair of nodes joined by a physical communication channel. The second layer is the data

link control (DLC) layer. The purpose of this layer is to convert unreliable bit pipe in the

physical layer to error-free packets and communicate asynchronously in both directions.

In some networks, particularly local area networks, some or all the communications take

place over multiple access links. For these links, the signals received at one node is a

function of the signals from a multiplicity of transmitting nodes, and the signal from one

node might be heard at a multiplicity of other nodes. The appropriate layers for mul-

tiaccess communication are somewhat different from those in networks of point-to-point

links. There is still a need for a DLC layer to provide a virtual error-free packet link to

higher layers, and there is still a need for a physical layer to provide a bit-pipe. However,

there is also a need for intermediate layer to manage the multiaccess link so that frames

can be sent by each node without constant interference from the other nodes. This is

called Medium Access Control (MAC). Please refer to fig. 1.4.

1.3.2 The MAC Sublayer

The MAC sublayer is usually considered as the lower sublayer of DLC layer. The ser-

vice provided by the MAC to the DLC is that of an intermittent synchronous bit-pipe.

The function of the MAC is to allocate the multiaccess channel so that each node can

Page 27: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 12

Medium Access Control

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data Link Layer

Physical Layer

Logical Link Control

Figure 1.4: The OSI Reference Model

successfully transmit its frames without undue interference from other nodes. We can

view multiaccess communication in queuing terms. Each node has a queue of packets

to be transmitted and the multiaccess channel is a common server. Ideally, the server

should view all the waiting packets as one combined queue to be served by the appropriate

queueing discipline. Unfortunately, the server does not know which node contain packets

and which do not. Thus, the interesting part of the problem is that knowledge about the

state of the queue is distributed [9-19].

Need for MAC Protocols:

Whenever there are more than one independent user, trying to access the same resources

at the same time, conflicts can occur resulting in corruption of data packets of all the con-

tending users. It is not always possible to allocate resources to individual users because

the resource is scarce and expensive. So, a need for multiple access (MA) protocol arises.

One could avoid the need for a multiple access protocol by letting each user have its own

resources. But this is not generally done because the resources are not only scarce but

also expensive.

Properties of MAC Protocols:

Page 28: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 13

The design of a MAC protocol depends upon the environment and the kind of require-

ment. In spite of the specific properties of the MAC protocol for a particular environment,

all good MAC protocols should posses the following properties:

1. The protocol must control the way in which the nodes access the channel by requiring

that the nodes confirm to certain rules.

2. The protocol must allocate the channel efficiently. The efficiency is measured in

terms of channel throughput and delay of transmissions.

3. The allocation should be fair towards individual nodes, i.e., not being partial to any

node.

4. The protocol should be capable of supporting various kinds of traffic which will have

different bit rates.

5. The protocol should be stable, i.e., it should maintain equilibrium.

6. The protocol should be robust with respect to equipment failure and changing con-

ditions.

Classification of MAC Protocols:

The MAC protocols are classified into three main groups. These are contentionless proto-

cols, contention protocols and the class of CDMA protocols. The contentionless protocols

are those in which all the nodes are scheduled in a fixed fashion and each node is allocated

a part of the resource. It can so happen that the channel is allocated to the nodes which

have something to transmit. In contention protocols the nodes cannot be sure that a

transmission will collide or not because other nodes might be transmitting at that time.

So, these protocols must resolve the conflicts. The CDMA protocols do not belong to

either the contentionless or the contention protocols. As long as the number of interfering

users is not too large, the signal-to-noise ratio will be large enough to extract the desired

signal without error. Then in this case the protocol behaves as a contentionless protocol.

However if the number of users rises above a certain limit, the interference becomes too

Page 29: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 14

large for a desired signal to be extracted and contention occurs, thus making the protocol

interference limited. Therefore, the protocol is basically contentionless unless too many

users access the same channel at the same time. This is why we place the CDMA protocols

between the contentionless and contention protocols. Please refer to fig. 1.5.

CSMA...

Polling, RAP,Token Passing,....

ALOHAs−ALOHA

Contentionless (S) Contention

CDMA

(RA)

MULTIPLE ACCESS PROTOCOLS

RARepeated

RAReservedFixed

AssignedDemandAssigned

FDMATDMA ...

ImplicitExplicit .....

S: Scheduling

RA: Random Access

Figure 1.5: Classification of Multiple Access Protocols

Performance Evaluation:

Multiple access schemes are evaluated according to various criteria. The characteristics

that are desirable are high bandwidth utilization and low message delays. But there are

other attributes which need to be considered. The ability of the protocol to simultaneously

support traffic of different priorities, variable message lengths, variable bit rates, different

delay constraints, is essential as higher bandwidth utilization is achieved by multiplexing

all traffic types. The MAC protocols are of different types, which differ by the static or

dynamic nature of bandwidth allocation algorithm, centralized or distributed nature of

decision making and the degree of adaptivity of the algorithm to the changing needs.

Page 30: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 1. Introduction 15

1.4 Proposed MAC Protocol

In our work, we have considered a wireless local area network (WLAN) to provide high

bandwidth to multimedia users in a limited geographical area. This network faces certain

challenges and constraints that are not imposed on their wired counterparts. They are:

frequency allocation, interference and reliability, security, power consumption, human

safety, mobility, connection to wired LAN, service area, handoff and roaming, dynamic

configuration and the throughput. But the wireless medium relies heavily on the features

of MAC protocol and the MAC protocol is the core of medium access control for WLANs.

The available MAC protocols all have their own merits and demerits.

This work proposes a hybrid MAC protocol for MWN. In the design, we have combined

the merits of the TDMA and CDMA systems to improve the throughput of the WLAN

in a picocellular environment. We are using the reservation and polling methods of MAC

protocols to handle both the low and high data traffics of the mobile users. We have

strictly followed the standards specified by IEEE 802.11 for WLANs to implement this

MAC protocol. We have simulated the Hybrid TDMA/CDMA based MAC protocols

combined with RAP (Randomly Addressed Polling) for Wireless Local Area Networks.

We have developed a closed form mathematical expressions analytically for this protocol.

We have also studied the power control aspects in this environment and derived a closed

form mathematical expressions analytically for this power control technique.

1.5 Organization of the rest of the Thesis

The rest of the thesis is organized as follows: chapter 2 describes about the MAC proto-

cols for Multimedia Wireless Networks, chapter 3 gives the complete details about the

design of our proposed MAC protocol, chapter 4 discusses about the various applica-

tions related to the proposed protocol, chapter 5 describes the simulation of the proposed

protocol, performance analysis of the proposed protocol, and the results of both simula-

tion and performance analysis, chapter 6 gives a detail about the testing of protocol in

software radio environment. Finally, chapter 7 concludes this thesis.

Page 31: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2

MAC Protocols for Multimedia

Wireless Networks

Since our work is aimed at developing a MAC protocol, in this chapter we briefly discuss

some of the existing MAC protocols.

2.1 MAC Protocols

The medium access control relies heavily on the features of the multiple access protocol

and hence that the protocol is the core of the medium access control for wireless networks.

Although there are many proposed multiple access protocols for wireless networks, those

meeting the features can generally be classified as CSMA, polling, TDMA and CDMA.

The general characteristics of these multiple access protocols are summarized as below

and the uplink multiple access, taking mobility into performance consideration are dis-

cussed [20, 21].

16

Page 32: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 17

2.1.1 Carrier Sense Multiple Access (CSMA) - Random Access

(RA)

Due to the popularity of Ethernet, CSMA is attractive to vendors and researchers. CSMA

is a member of the ALOHA (it is a name given by the researchers of Hawaii University,

USA) family protocols. ALOHA is applied to large-scale wireless networks. The original

version called pure ALOHA, has an unstable peak throughput around 18 percent. An im-

proved version, called slotted ALOHA, requires transmission to fall into synchronous slots

and so reduces the possible collision duration. Slot synchronization increases throughput

to 36 percent. Again, this is an unstable peak value. CSMA, which senses the status of

channel before transmitting, is the simplest way to improve ALOHA. This gives increased

throughput and therefore, the IEEE 802.3 committee chose 1-persistent CSMA with col-

lision detection (CSMA/CD) as the MAC for wired LANs.

The success of CSMA/CD in Ethernet relies on the ease of sensing the carrier by mea-

suring the current or voltage in the cable. This is the primary reason that CSMA has

been successfully applied in wired networks even though it was originally designed for

radio networks. Despite advances in technology, carrier sensing is still a major problem

for radio networks due to the hidden terminal problem. Reliable carrier (or transmission)

sensing is extremely difficult due to severe channel fading in indoor environments and the

use of directional antennas.

A second concern about CSMA is its instability. As shown in many research works,

ALOHA and CSMA protocols are not stable. This problem is seen by looking at the

delay curves. Delay increases roughly in proportion to the offered load. However, near

the peak throughput, the delay suddenly increases with a tremendous slope whose exact

value depends on the total number of users. This situation makes peak throughput a

meaningless number and requires networks to operate at low offered load. This is the rea-

son why IEEE 802.3 picked 1-persistent rather than non-persistent CSMA. Furthermore,

measurements on practical Ethernets show operating throughput around only 30 to 35

percent rather the 80 percent peak performance. Please refer fig. 2.1.

Page 33: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 18

0 1 2 3 4 5 6 7 8 9 100

0.2

0.4

0.6

0.8

1

G(Offered Load)

S(T

hro

ughput)

MAC Protocol Performance

Pure ALOHA Slotted ALOHACSMA

0 1 2 3 4 50

0.2

0.4

0.6

0.8

1

G(Offered Load)

S(T

hro

ughput)

Pure ALOHA Slotted ALOHA CSMA NP−CSMA/CA 1P−CSMA/CA Slotted NP−CSMA/CASlotted 1P−CSMA/CASlotted NP−CSMA/CD

10−1

100

101

0

0.2

0.4

0.6

0.8

1

a (Propagation Time/Frame Transmission Time)

U (

Util

izatio

n)

MAC Protocol Performance

TOKEN(N=2) TOKEN(N=5) TOKEN(N=10) CSMA/CD(N=2) CSMA/CD(N=5) CSMA/CD(N=10)

0 5 10 15 20 250.2

0.4

0.6

0.8

1

N (Number of Active Stations)

U (

Util

izatio

n)

TOKEN(a=0.1) TOKEN(a=0.5) TOKEN(a=1.0) CSMA/CD(a=0.1)CSMA/CD(a=0.5)CSMA/CD(a=1.0)

Figure 2.1: Performance of MAC Protocols: ALOHA, CSMA/CA, CSMA/CD and TO-KEN PASSING

Finally, the another concern about these protocols are spatial domain factors. Infras-

tructure LANs typically have a cellular structure, with base station (or an access point)

taking charge of one cell so that seamless service to mobile nodes is supported. Conse-

quently, interference from other cells (most likely neighboring cells) may influence MAC

protocol operation, and this intruduces spatial domain effects. The possibility that this

situation occurs is not small in a severe, unpredictable fading channel such as indoor radio

channels. The probability can be estimated from the system design and fading statistics.

A good example to demonstrate this factor is slotted ALOHA [22, 23].

CSMA is better than slotted ALOHA, but the slotted non-persistent CSMA is better

than CSMA. In this, each mobile node has a probability ’p’ to ”hear” two base stations

(in a two-cell interference model) when it is in an overlapped region. Since the strength

of a received signal is not a simple function of geographical distance, especially in indoor

fading channels, the fading and wave propagation effects can be considered. The nodes

in different cells may sense each others’ carrier. Assume a mobile node in a cell has a

probability ’q’ to sense the carriers (transmissions) in another cell. Finally, the hidden

terminal must be considered. This effect is stochastically modelled by the probability

’Ph’ that a node becomes a hidden terminal of another. The reason to use stochastic

Page 34: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 19

modelling is to best represent the mobility and channel dynamics. The analytical results

based on the above parametric model yield numerical results shown in fig. 2.1. It is

observed that the throughput is reduced to 40 to 45 percent even with small ’Ph’ and ’p’.

But in practical wireless LANs, interference may come from several cells. Because of this

instability, CSMA may not be attractive for wireless networks.

To alleviate the problem and to increase reliability, a modification of CSMA - CSMA

with collision avoidance (CSMA/CA) - is possibly adopted. However, in general, unless

associated with polling or constrained token passing or handshaking, it is believed useless

since fading usually lasts for a time equal to a few symbols at the data rate of LANs. The

protocol that represents the current focus of IEEE 802.11 committee, uses CSMA/CA

with a four way handshake to combat indoor channels [24].

The basic concept is that every ready user sends a request-to-send (RTS) to the access

point using CSMA/CA. When the access point gets an RTS from a user, the access point

polls that user by sending clear-to-send (CTS). The ready user then sends its packets to

the access point. After correctly receiving the packet, the access point sends a positive

acknowledgement (PACK) to the user. The performance analysis of this four way hand-

shake CSMA/CA protocol is done as follows: assume that the (RTS)-(CTS) transmission

cycle occupies a normalized (to packet transmission) time ’b’ and that the polling is per-

fectly reliable and contains no overhead. A non-persistent CSMA is adopted in the (RTS)

transmission while the random backoff time to achieve the upper bound on throughput.

Therefore, collision of RTS packets is the only possible loss for the protocol. It is also

stochastically modelled as: the hidden terminal with probability ’Ph’, joint region frac-

tion ’p’, and the interference from a node in another cells with probability ’q’. Then, the

throughput is around 0.42 when Ph = 0.2, higher than that of the original non-persistent

CSMA with the same hidden terminal probability. Although this is not a significant in-

crease (10 percent), it is still a success to combat the hidden terminal problem caused by

fading channels. However, it pays a price in the case where there is no hidden terminal.

The throughput reduces to 63 percent, a substantial reduction from the original CSMA,

the cause is of course the (RTS)-(CTS) overhead. Another problem associated with this

Page 35: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 20

protocol is opertaion in huge multicell wireless LANs since the CSMA can be influenced

by the interference [25-29].

2.1.2 Polling Based MAC Protocols

As previously discussed, the distributed random access protocols do not perform well for

multiple access in wireless networks, a some kind of centralized protocols can be consid-

ered here. Token passing among the mobile nodes is obviously not feasible since loss of

token is very likely in fading channels, especially in wireless networks that do not guar-

antee a fully connected or well connected network topology.

The next possibility is to use polling, since typical wireless networks have an infrastructure

that connects base station to serve mobile nodes under their coverage. Such centralized

multiple access control has robustness in the presence of fading and dynamic channel

characteristics. Therefore, it has been proposed as a frame structure for medium access

control of wireless LANs. However, it is hard for polling to achieve high efficiency in

spite of its good reliability. Base stations using polling typically require a hand-shaking

procedure and a strict registration process for mobile nodes which implies a restricted

roaming service. Also, even short packets for hand-shaking require an overhead for car-

rier and timing recovery. Such an overhead never occupies a short duration especially in

the severe fading channels.

Randomly Addressed Polling (RAP):

It seems that a multiple access protocol for wireless LANs must be a compromise between

centralized and decentralized protocols to enjoy the advantages of both without suffering

from their primary disadvantages. Therefore, a family of new multiple access control pro-

tocols, called Randomly Addressed Polling (RAP) are proposed, which can be considered

as a decentralized version of polling. RAP is based on the following ideas:

• A centralized protocol (such as polling) is reliable, especially for wireless networks

that usually operate in very unpredictable channels, though it requires constant

monitoring of all nodes.

Page 36: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 21

• Constant monitoring of all mobile nodes is not feasible in wireless networks. RAP

requires the knowledge of the ”random address(es)” of only active users (rather than

all users).

The operation of RAP, designed for the infrastructure wireless networks, is summerized

as follows:

Step 1: When a base station is ready to collect uplink packets, it broadcasts a ”READY”

message to all mobile nodes in its coverage area (the ”READY” indication may be piggy-

backed on a previous message, thereby avoiding an extra transmission).

Step 2: Each active mobile node that intends to transmit generates a random number

from the set IR = {0, 1, 2, ..., P − 1}. This random number may be generated in advance

before the reception of ”READY”.

Step 3: All active mobile nodes simultaneously transmit their random numbers. Trans-

mission must be simultaneous and orthogonal; for example, by orthogonal codes such as

those for Code Division Multiple Access (CDMA), or by different frequencies. Further-

more, random number exchange can be divided into ’L’ identical ”stages” where each

stage involves the generation and exchange of random numbers as described above.

Step 4: In general, a mobile node may transmit its random number ’Q’ times at each

stage. The base station may use some sort of voting policy to decide the correctly trans-

mitted random number(s). With the error-free transmission assumed, Q=1 is enough. In

case the base station cannot recognize certain number(s), it assumes no reception.

Step 5: The base station listens to all random numbers (”addresses”) at each stage, based

on the device with the centralized architecture. Suppose there are ’N’ active mobile nodes.

At the lth(1 ≤ l ≤ L) stage, there are ’N’ random numbers represented so as to be dis-

tinguishable by the base stations. Let these ’N’ random numbers be r11, r2

2, ..., rlN which

may not be distinct at the lth stage. If there is no response from the mobile nodes, stop

this polling cycle.

Step 6: Among these ’L’ stages, suppose that the base station received the largest number

of distinct random addresses at the l∗th stage. Denote these numbers as R1 < ... < RN∗.

Then the base station polls according to the mobile nodes’ l∗th random numbers. When

Page 37: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 22

the base station polls mobile nodes with Rr(1 ≤ r ≤ N∗) at the l∗th stage, the mobile

nodes who sent the random number at the l∗th stage transmit packet(s) to the base sta-

tion. Collision is possible since there might be two mobile nodes sending the same random

numbers. If N = N∗, no collision exists.

Step 7: If the base station successfully/unsuccessfully receives the packet from any mo-

bile node, it sends a positive/negative acknowledge (”PACK”/”NACK”) right away before

polling the next one(s). If the mobile node receives ”PACK”, it removes the packet from

its buffer. Otherwise, the mobile node(s) keep the packet(s) for future polling. After

all scheduled transmissions, the base station re-polls again (i.e., repeats steps 1 to 6).

Although re-polling may allow new active mobile nodes to join, it is assumed that no

new active mobile node is allowed to join re-polling for the simplicity of analysis and

congestion control.

As the downlink (from the network to mobile node) transmission is typically done by

broadcasting, but only on the uplink multiple access protocol. Note that RAP requires

no handoff for users roaming from one cell to another cell. A mobile node can send

packet(s) to all reachable base stations. If any form of handoff is needed for the purpose

of network management, handoff can be initiated completely by mobile users.

To illustrate the procedures of RAP, consider an example. Suppose there are mobile nodes

A,B,C,D,E,F,G, and H, under the coverage of a base station (or an access point). We

choose P=5 and L=2 as the parameters of RAP. At the beginning of the polling cycle,

only A,D,E,G, and H, have packets to transmit. When ”READY” is received by these

active nodes, random numbers are generated by them according to step 2.

A:3,0 D:2,3 E:2,1 G:1,4 H:1,1

The base station collects the random addresses by proper orthogonal signalling and de-

tection. At the first stage, the base station recognizes random addresses 3,2, and 1. At

the second stage, the base station recognizes addresses 0,3,1, and 4. Therefore, the base

station polls mobile nodes according to the random addresses of the second stage. When

the base station polls ’0’, the mobile node ’A’ sends its packet. Under error-free assump-

tion, ’A’ will receive ”PACK” from base station to complete its uplink data transmission,

Page 38: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 23

as will ’D’ and ’G’. However, when the base station polls ’1’ of the second stage, packets

from ’E’ and ’H’ collide. Not considering the capture effect (since a good power control is

assumed) both ’E’ and ’H’ will receive ”NACK” and go to the re-polling cycle. Of course,

considering the possibility of channel errors, A,D, and G may also receive ”NACK” and

join the re-polling.

2.1.3 FDMA Based MAC Scheme

In FDMA, signals from various users are assigned different frequencies, just as in the

analog systems. Guard bands are maintained between adjacent signal spectra to minimize

cross talk between channels.

The advantages of FDMA are:

1. A capacity increase can be obtained by reducing the information bit rate and using

efficient digital codes.

2. Technological advances required for implementation are simple.

3. A system can be configured so that improvements in terms of speech coder bit rate

reduction could be readily incorporated.

The disadvantages of FDMA are:

1. Since the system arhitecture, based on FDMA, does not differ significantly from

the analog system, and the improvement available in capacity depends on operation

at a reduced S/I (Signal Power-to-Interference Power) ratio. But the narrowband

digital approach give only limited advantages in this regard so that modest capacity

improvements could be expected from a given spectrum allocation.

2. Narrowband technology involves narrowband filters, and because these are not real-

ized in Very Large-Scale Integrated (VLSI) digital circuits, this may set a high cost

”floor” for terminals even under volume production conditions.

Page 39: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 24

3. The maximum bit rate per channel is fixed and small, inhibiting the flexibility in

bit rate capability that may be a requirement for computer file transfer in some

applications in future.

2.1.4 TDMA Based MAC Scheme

In a TDMA system, data from each user is configured in a time intervals called slots.

Several slots make up a frame. Each slot is made up of a preamble plus information bits

addressed to various stations. The function of the preamble is to provide identification and

incidental information and to allow synchronization of the slot at the intended receiver.

Gaurd times are used between each users’ transmissions to minimize cross talk between

channels. The data is transmitted via a radio carrier from a base station to several active

mobiles in the downlink. In the reverse direction (uplink), transmissions from mobile to

base station is time sequenced and synchronized on a common frequency for TDMA.

A TDMA system using multiple slots can support a wide range of user bit rates by

selecting the lowest multiplexing rate or a multiple of it. This enables supporting a

variety of voice-coding techniques at efficient bit rates with different voice qualities. Data

communication customers could make the same kinds of decisions, choosing and paging

for digital data rates as required. This would allow customers to request and pay for

bandwidth on demand.

The advantages of TDMA are:

1. TDMA permits a flexible bit rates not only for multiples of basic single channel rate

but also submultiples for low bit rate broadcast type traffic.

2. TDMA potentially integrates into VLSI without narrowband filters, giving a low

cost floor in volume production.

3. TDMA offers the oppurtunity for frame by frame monitoring of signal strength/bit

error rates to enable either mobiles or base stations to initiate and execute handoffs.

4. TDMA utilizes bandwidth more efficiently because no frequency guard band is re-

quired between channels.

Page 40: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 25

5. TDMA transmits each signal with sufficient guard time between slots to accommo-

date:

(a) Time inaccuracies because of clock instability,

(b) Delay spread,

(c) Transmission time delay because of propagation distance, and

(d) The ”tails” of signal pulses in TDMA because of transient responses.

The disadvantages of TDMA are:

1. For mobiles particularly handsets, TDMA on the uplink demands high peak power

in transmit mode, which shortens battery life,

2. TDMA requires a substantial amount of signal processing for matched filtering and

correlation detection for synchronizing with a time slot.

2.1.5 DS-SS (CDMA) Based MAC Scheme

In wideband system, the entire system bandwidth is made available to each user and is

many times larger than the bandwidth required to transmit informations. Such systems

are known as ”Spread Spectrum” (SS) systems. There are two fundamental types of

SS: Direct Sequence Spread Spectrum (DS-SS) and Frequency Hopping Spread Spectrum

(FH-SS).

In DS-SS, the user’s data is spreaded using a Pseudo-Random sequence code (PN code)

and modulated and then transmitted. The received signal after despreading, resolves into

multiple signals with different time delays. A RAKE receiver can recover the multiple

time-delayed signals and can combine them into one signal, providing an inherent time

diversity receiver with lower frequency of deep fades. When many mobile users transmit

data to a common base station, then each user will use a unique PN code to spread his

data for transmission. The PN codes of all users are orthogonal. It is this correlation

property of the codes that makes it possible for the extraction of the desired signal at the

receiver. By multiplying the information-bearing signal b(t) by the spreading code c(t),

Page 41: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 26

each information bit is chopped into a number of small time increments commonly called

as chips. The transmitted signal m(t), thus may be expressed as:

m(t) = c(t).b(t) (2.1)

which is a wideband signal. The received signal r(t) contains of the transmitted signal

m(t) plus the additive interference i(t). The interference signal contains MAI (Multiple

Access Interference) and fading and any other external interference signals. Therefore,

r(t) = m(t) + i(t) + n(t) = c(t).b(t) + i(t) + n(t) (2.2)

where, n(t) is Additive White Gaussian Noise (AWGN) in the receiver. To receive the

original signal b(t), the received signal r(t) is multiplied by the code which was used in

the transmitter. Therefore, the demodulated output z(t) at the receiver is given by

z(t) = c(t).r(t) = c2(t).b(t) + c(t).i(t) + c(t).n(t) (2.3)

Since, c2(t) = 1 (the autocorrelation property of the PN code),

z(t) = b(t) + c(t).i(t) + c(t).n(t) (2.4)

Thus, the information-bearing signal b(t) is reproduced at the receiver along with the

interference plus noise components. It is to be noticed that the information-bearing

signal b(t) is narrow band and the spurious component [c(t).i(t)] is wideband. Hence, by

applying the multiplier output to a base-band LPF filter with a bandwidth just enough

to accommodate the signal b(t), the spurious component [c(t).i(t)] is made narrowband,

thus removing most of its power. The effect of i(t) is then significantly reduced at the

receiver output. But the orthogonal properties of the PN codes must be maintained to

eliminate the MAI problem in a CDMA system, i.e., ci(t).cj(t) = 0; i �= j where ci(t) is

the PN code of ith user and cj(t) is the PN code of jth user. The advantages of CDMA

are:

Page 42: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 27

1. The transmission bandwidth exceeds the coherence bandwidth.

2. Provides an inherent robustness against mobile channel degradations.

3. It has greater resistance to interference effects in a frequency reuse situation.

4. There is no hard limit on the number of mobile users who can simultaneously gain

access.

5. The interleaving and error-correcting codes are effective with CDMA system.

6. It tolerates a fair amount of interfering signals compared to FDMA and TDMA,

which typically cannot tolerate any such interference. Because of this, the problem

of frequency band assignment and adjacent cell interference are greatly simplified.

7. Since the interference with others is not a problem, the flexibility in system design

and deployment are significantly improved.

8. Capacity improvements with DS-CDMA also result from voice activity patterns dur-

ing two-way conversation (i.e., times when a party is not talking) that cannot be

cost-effectively exploited in FDMA or TDMA systems. So, CDMA can accommo-

date more mobile users than FDMA and TDMA radios on the same bandwidth.

9. DS-CDMA share the same frequencies in adjacent microcells whereas with TDMA

and FDMA it is not feasible.

10. Further capacity gains can also result from antenna technology advancement by

using directional antennas, which allow the microcell area to be divided into sectors.

11. CDMA signals are secured in wireless medium because of the unique PN code used

by a user.

The disadvantages of CDMA are:

1. There is a graceful degradation of the performance of CDMA system when the

number of mobile users increases i.e., under heavy load.

Page 43: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 28

2. The proper generation of orthogonal PN codes requires a complicated hardware

system.

3. Because of the mobility of users in a multimedia wireless mobile networks, there is

a problem called ”near-far” problem (i.e., the received power at the base station is

different for different users).

In a cell containing ’N’ mobile users, the number of effective interferers is (N-1) regardless

of how they are distributed within the cell. Because of this, the quality of a particular

user is degraded. To remove the ”near-far” problem, we use ”Automatic Power Control

(APC)”. The APC operates such that the incident power at the center of the cell from

each mobile is the same as for every other mobile in the cell, regardless of the distance from

the center of the cell. APC conserves battery power in the mobiles, minimizes interference

to other users, and helps to overcome fading.

Frequency Hopping (FH) is the periodic changing of frequency or frequency set associated

with transmission. If the modulation is multiple Frequency Shift Keying (FSK), two or

more frequencies are in the set that change at each hop. For other modulations, a single

center or carrier frequency is changed at each hop. So, the FH signals may be considered

as a sequences of modulated pulses with pseudo-random carrier frequencies. The set of

possible carrier frequencies is called the hop set. FH systems work best when a limited

number of signals are sent in the presence of non-hopped signals where mutual interference

can be avoided. The major advantage of FH system is that it can operate very well in

frequency selective fading channel environment. The major disadvantage with FH system

is with increasing hopping rate, the cost of a frequency synthesizer increasing and its

reliability decreases, synchronization becomes more difficult.

2.2 Requirements of MWN’s MAC Protocol

The requirements for a decent MAC protocols are described below, may generally be

considered as the expected features of any wireless networks [30-35].

Page 44: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 29

1. Throughput: Since the spectrum is a scarce resource, throughput is definitely one

of the most critical consideration in the design of a MAC protocol. For example,

with 10 Mbps physical transmission and over 80 percent throughput for CSMA/CD,

Ethernet can deliver over 8 Mbps performance in principle. But practically, it is

only 3 to 3.5 Mbps performance more important than the theoretical throughput.

2. Delay: Delay characteristics are important for every application, but especially for

time- bounded services and multimedia applications such as voice and video.

3. Transparent to Different PHY Layer: The physical transmission layer includes direct

sequence spread spectrum, frquency-hopped spread spectrum and diffused infrared.

These physical transmission layers are different not only in system design but also in

propagation characteristics; however, one MAC must handle all of them. One way

to achieve this goal is to have a physical dependent layer, a physical convergence

layer, and an appropriate MAC-PHY interface in each station. Based on such an

architecture, a single MAC can exchange data with different PHYs transparently

via MAC-PHY interface.

4. Ability to Serve Data, Voice and Video: With the increasing popularity of multi-

media applications, desirable wireless network must be able to provide some time-

bounded services such as voice and video in addition to the mandatory data services.

5. Fairness of Access: The fading characteristics of indoor channels may cause unequal

received power at the base station even when power control is enforced. Such a

situation may result in unfair access to network. That is one mobile node may have

much less power received at the base station than another mobile node. When the

MAC protocol is operating in the contention mode (necessary for initial registration

and often used for uplink traffic), the disadvantaged mobile node may not have the

chance to access the channel for a while. A MAC protocol should be able to resolve

this situation since it is possible that capture can happen with as small as 6 to 9 dB

power difference while the dynamic range of fading can be as large as several tens

of dB.

Page 45: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 30

6. Battery Power Consumption: Since mobile nodes typically rely on battery power,

efficient utilization of transmit and receive power is another important considera-

tion for a MAC protocol. Since, we need power to constantly monitor access points

or handshake with stations for the purpose of synchronization, power control or

exchanging state information, very limited power should be used for packet trans-

mission. Sleep mode should be possible at the receiver front end. Active receive

mode may consume more battery power than transmission mode operation since

modern commercial digital communication systems may typically have transmis-

sion power like 100 mW but need 100 mA of current to support the digital signal

processor operation at the receiver.

7. Maximum Number of Nodes: According to market studies, a single cell wireless

network may need to support hundreds of nodes. Therefore, a MAC should not

limit the maximum number of nodes in order to maintain satisfactory performance.

8. Robustness in Collocated Networks: It is quite likely for two or more wireless net-

works to operate in the same region or in same region where interference between

different networks exists. Some protocols cannot function normally in this situation.

Consider two wireless LANs that operate in two nearby buildings. For certain parts

of these LANs, it may be more difficult to communicate with other parts of their

own LANs than to communicate with the other LAN. Serious trouble can result

from this situation if the MAC uses token passing. It is possible to wrongly pass the

token to a node in the other network. Generally speaking, there are two concerns

for collocated networks. Other users may illegally break into the network, causing

seurity crisis. This can be solved by an appropriate authentication procedure for

new users. Another issue is the interference from collocated networks. For example,

if we apply traditional CSMA protocols in wireless LANs, interference from another

network can cause disastrous hidden terminals.

9. Ability to Support Handoff/Roaming Between Service Areas: A MAC protocol has to

support a handoff function to serve nodes moving from one cell to another. In indoor

Page 46: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 31

environments, due to the fast fading, handoff is not a straight forward problem.

For time-bounded handoff services, the ability of a MAC to support handoff in

real-time is not an easy task either, especially if we take power consumption into

considerations. In second-generation cellular networks, a central switching office

controls handoff; this is not practical for wireless networks. This makes handoffs in

wireless networks more difficult and most likely to be done in distributed fashion.

10. Establish Peer-to-Peer Connectivity without a priori Knowledge: A MAC of a wire-

less network should support adhoc networking. Therefore, there should be no re-

quirement for a priori information about network topology (e.g., whether there is

communication among all nodes).

11. Unauthorized Network Access Impact on Throughput: Since neither the MAC nor the

network management function can identify any unauthorized access before receiv-

ing its transmission, such access inevitably has impact on the network throughput

and delay. A successful MAC and network security scheme should reject such an

unauthorized access and minimize its impact.

12. Ability to Support Broadcast (Multicast): Although broadcasting is the natural form

of communication for wireless networks, the MAC should support multicast.

13. Critical Delays Limit Large Area Coverage: A typical coverage area for wireless

LANs may be from 500 ft2 to 1000 ft2 which introduces roughly 500 to 1000

nanoseconds (ns) propagation delay. Wireless LANs are likely to operate at more

than 10 to 20 Mchips per second (Mc/s) for DS-SS and more than 1 Msymbols per

second for other PHYs. Delay in the range of 500 to 1000 ns can cause big troubles

for some MACs. For instance, if the MAC has to operate precisely synchronously

among each pair of communication nodes, propagation delay can destroy signal

quality and thus limits the coverage area. A more exact example is a synchronous

CDMA system with 20 Mc/s transmission and a contention mode. Two nodes with

500 ns (i.e., 500 feet) difference in propagation delay can ruin the synchronization

scheme.

Page 47: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 32

14. Insensitivity to Capture Effects: Although the capture effect can increase through-

put, it can also prohibit fair access. One solution is to enforce insensitivity at the

receiver end. A MAC is expected to keep receiver sensitivity to enhance physical

transmission and avoid any potential problem from capture.

15. Support Priority Traffic: In addition to the time-bounded services, the MAC is

expected to support traffic with different priorities.

16. Ability to Support Non-reciprocal Traffic: A special feature of wireless LAN traffic

is that the downlink traffic is often much greater than the uplink traffic. A good

MAC should definitely support this feature.

17. Preservation of Packet Order: This is important for multimedia services including

voice, audio and video.

18. Ability to Work in a Wide Range of Systems: As wireless LANs may cover many

areas and may serve a wide range of number of nodes, the MAC should be robust

to geographical size and number of nodes on the LAN.

19. Limit the Complexity of PHY: A critically important concern is to keep the complex-

ity of physical layer (medium dependent layer, PHY convergence layer and MAC-

PHY interface) to a minimum. To design a wireless network is an integrated prob-

lem, from physical layer upto network management. A MAC design that pushes

difficulty into other parts/layers of the system is undesirable.

20. Ability to Market and Complexity: The final step for success of wireless network is to

deliver high-quality products in time to users, which usually means that simplicity.

In addition to above requirements, there are more concerns with infrastructure wireless

networks. Multicell coverage is governed by an access point which is typically a base

station or a repeater. The coverage of each cell should overlap neighboring cell(s) properly,

that is, the overlapping region is intended to be minimized to increase system capacity

but also kept to certain portion so that seamless service is possible. This joint region

among cells introduces extra problems. They are listed as follows:

Page 48: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 33

1. Self-Interference: There exists a possibility that more than two access points (such

as two repeaters) intend to transmit a packet to a node in the joint region simulta-

neously. This causes interference and the packet is likely to be lost.

2. Self-Collision: Another possible situation is that a node in the joint region transmits

a packet that is received by more than one access points. Collision or bandwidth

waste while routing this packet to its destination is likely without appropriate man-

agement.

3. Up-Down Collision: If node A in one cell transmitting uplink while node B in

another cell is receiving downlink, it is possible that node B may be able to hear

(receive) node A’s transmission and this situation results in collision, unless we can

perfectly schedule all transmissions. Fortunately, this situation which is similar to

the hidden terminal problem and it happens only with a very small probability if

the cells are well separated. Since up-down collisions are very destructive, any MAC

should carefully take it into account.

The first two problems are eliminated by careful coordination among access points. A

possible collision window always exists, although it can be kept small if coordination

among access points and uplink/downlink has taken care of this problem.

2.3 Some of the Existing Works on MWN’s MAC

The existing recent research works done by eminent researchers in the areas of multimedia

wireless networks (MWNs) are listed below.

1. Design of QoS Algorithms for Multimedia Communication

The technical growth in high speed networks, wireless networks, mobile computing and

powerful end-systems are enabling new types of presentational and conversational multi-

media applications, such as video conferencing, video-on-demand and news-on-demand.

The media involved in these applications are temporally continuous in nature. So, such

applications require real time multimedia communication and demand guaranteed Quality

Page 49: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 34

of Service (QoS). QoS of an application gives an intuition of how valuable the services are.

The QoS parameters generally considered in multimedia communication are: end-to-end

delay, packet error rate, delay jitter and bandwidth which are to be negotiated before

launching a presentational or conversational multimedia application.

A QoS based call admission control scheme for mobile networks is designed. This work

gives a design model of a neural network based linear programming model which enables

to use the resources optimally and advises optimal admission of new applications based

on readjusting the bandwidth allocation.

A mobile agent based QoS management system is designed to satisfy the five functional

principles of QoS architecture, i.e., integration, separation, transparency, asynchronous

resource management and performance. A mobile agent is a software module that mi-

grates sequentially through a set of nodes, remain stationary and interact with resources

remotely or perform any combination of these three extremes for reservation of resources.

It has been proved that mobile paradigm saves considerable amount of bandwidth, reduces

network traffic and enables quicker QoS readjustments.

A QoS adaptation and mixer algorithms for wireless communication is also designed.

This work proposes new QoS adaptation procedures to provide desired QoS in wired/wireless

networks which allow the system to recover automatically, if possible from QoS violations

by identifying a new configuration of system units that might support the initially agreed

QoS and by performing a user transparent transition from the original configuration to

the new one. The Mixer Algorithms are proposed and that might be used in the case of

very bad atmospheric conditions at the time of unable to support the desired QoS but

requires a timely delivery of data [36, 37].

2. Design of Multiaccess Protocols for Multimedia Wireless Networks

Optimal sharing of a common transmission medium by multiple users in a computer

networking environment has been an area of active research in the recent years. Many

multiaccess protocols have been designed, investigated and implemented for a wide range

of networks. Most of these protocols have been used in Wireless LANs offer throughput

of the order of 0.7 maximum when the propagation delay is less compared to the packet

Page 50: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 2. MAC Protocols for Multimedia Wireless Networks 35

transmission time.

An Optimal Channel Utilization Multiaccess (OCUM) protocol is designed and demon-

strated the analytical and simulated results of the protocol throughput performance.

Linnenbank, Venkataram and Mullender have designed a MAC protocol for limited

bandwidth wireless networks. The protocol is combination of autonomous algorithms for

dynamic channel assignment in a TDMA wireless multimedia system. The throughput per

mobile station is higher compared to other MAC protocols, it offers low latency for both

real-time and non-real time communication. Furthermore, the throughput and latency

remain stable under high loads [38].

Page 51: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3

Design of the Proposed MAC

Protocol

In this work we investigate the combination of TDMA with direct sequence (DS), a hybrid

protocol called TDMA/CDMA with a hand-shaking technique, request-to-send/clear-to-

send (RTS/CTS) method. The TDMA/CDMA uses multiple slots per frame while the

CDMA allows multiple users in a slot using their own DS codes. The RTS/CTS mini-

packets are exchanged between source and destination stations prior to sending the DATA

packets. This method is used when the mobile users are less in number in the cell, i.e., if

there are ’M’ number of terminals, then upto a maximum of ’M/2’ terminals are considered

in the picocellular infrastructure wireless local area network (WLAN). We also investigate

the polling schemes proposed for use in WLANs as per IEEE 802.11 standards for MAC

protocols. This protocol supports when the number of users are greater than ’M/2’ and

upto ’M’ users in the cell.

In the conflict-free polling MAC protocol, the base station may invite a portable to

transmit by broadcasting a short mini-packet with its identification. The portable will

send back a data packet, if it has any. Otherwise, it refrains from transmitting or sends

back a short ”keep alive” mini-packet. There are two major short comings of this protocol

: first, the average data packet delays are larger when the number of portables is larger

but the overall traffic across the cell is light and second, the operation of polling scheme by

36

Page 52: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 37

itself does not specify how new portables join a cell. A low-delay centralized environment

is also ideal for polling, since it provides better control. But it is impractical for bursty

data users.

Therefore, the central theme of this work is that a combination of random access and

polling may prove right for bursty data as well as the bulky data in a cellular system.

Such a centralized control over multiple access provides pretty reliable medium access

control and robustness in the presence of fading and dynamic channel characteristics. In

this work, we are confining our attention in WLANs with infrastructure. The coverage

of a base station is known as a cell in this work. To provide seamless data services,

the adjacent cells should appropriately overlap. Within a cell, many protocols based on

token passing, carrier sensing, ALOHA may be possible. But, they are all facing some

difficulties to be a perfect solution for wireless LANs. At the sametime, a more general

MAC protocol should combine multiple access and handoff into considerations. Thus the

new combined protocol proposed in this work meets the above mentioned requirements

and it is found that this is an attractive protocol for wireless networks [39].

3.1 System Model for the Proposed MAC Protocol

To describe the access system we consider only one mobile cell in which there are M active

nodes (or users) which are generating messages to be transmitted to another node. This

network is called as an infrastructure network as per the IEEE 802.11 standards where

the base station (BS) controls all the nodes within the cell. There are two kinds of links

possible in this model. One is the uplink that is concerned about the data transmission

from mobile station (MS) to BS and the another one is the downlink that is about the

data transmission from BS to MS. Topologically, the base station is, normally, positioned

to have good propagation conditions with each portable most of the time. On the other

hand, the locations of the portables are uncertain, and in some cases time varying. The

wireless propagation conditions have a strong impact on the choice of a suitable multiple

access protocol (see figure 3.1).

Page 53: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 38

MS

MSBS

MS

MS

MS : Mobile Station

BS : Base Station

Figure 3.1: The infrastructure WLAN network used for the simulation of the proposedMAC protocol

3.2 Frame Structure

For the proposed protocol, the time is divided into fixed size frames. A frame contains S

time slots for communication. There are two special slots in each frame, the Request-To-

Send (RTS) and the Clear-To-Send (CTS) slots. Apart from these slots, we have DATA

slots and the RTS/CTS slots divided into minislots [40].

• Slot Descriptions and CDMA Codes:

– RTS Slots : These slots are divided into minislots that allow the transmission

of single byte messages preceded by two synchronisation bytes. Minislots are

Page 54: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 39

used to inform the BS about the message length in the next frame and the BS

allocates data slots as per these informations available in the minislots.

– CTS Slots : The BS uses these slots to send CTS messages. It informs the

mobile stations that the MS can establish a connection set up and the BS

broadcasts a table containing the slot allocation for the current frame to the

active MSs that are within the BS’s cell.

– DATA Slots : These slots are used to send packets containing application data

and these packets may be subjected to errors due to the various propagation

conditions of the wireless medium.

– minislots : These slots are the slots within the RTS and CTS slots. The RTS

minislots are used in the uplink and the CTS minislots are used in the down-

link. The CTS minislots in TDMA/CDMA MAC protocol are arranged in the

form of a matrix containing allocation of data slots in rows and allocation of

CDMA codes in columns.

– CDMA Codes : These are the Pseudo Random Codes (PN Codes) which can

be generated by using shift registers and EX-OR logic gates. These codes are

orthogonal codes and are useful when we talk about MAI among MSs. There

are other codes like Gold and Walsh Codes for better MAI behaviour among

all MSs. The information about the allocation of CDMA codes is available in

the CTS minislots.

3.2.1 The Random Access (RA): TDMA/CDMA

In random access(RA), the uplink (UL) slots are divided into RTS minislots and data slots

and the downlink (DL) slots are divided into CTS minislots (see figure 3.2). A user who

Page 55: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 40

A, B, C, D, X

............

D

2::::

M1 M2 M3 .................... MN

: CDMA Codes

M1, M2, M3, ...., MN : Mini Slots

D1 D2 D3 .................... DL

C1, C2, C3, ....., CK

D1, D2, D3, ..., DL : DATA Slots

A

B

D

X

D

C

AC

DB X

:::

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

C

RTS : Request to Send

CTS : Clear to Send

RTS CTS

DATA

RTSRTSRTS RTS

DATA

DATA CTS

. . . . . . . .

C1

CK

FrameRTS CTS

Figure 3.2: The TDMA/CDMA Frame Structure

is ready to transmit will send a RTS signal with some control informations to BS. The

BS has a scheduling algorithm which enables the user to get a CTS signal regarding in

which data slot and with which CDMA code, the user should be in a position to transmit

the data. In the hybrid protocol, each terminal transmits during the time slot(s) that is

allowed to transmit by using its own code sequence(s). Therefore, upto certain number of

terminals are allowed to transmit simultaneously during a time-slot with acceptable BER

(Bit Error Rate). The processing of the requests of the nodes and the scheduling are done

during the CTS slot. The CTS is divided into minislots, each holding information of the

corresponding data slot in the next frame. Each minislot is further divided into grids,

where grids equal to the maximum number of nodes that can transmit data simultaneously

in a data slot. Each of these grid is initialized with a code which the scheduler allocates

Page 56: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 41

to the node which succeeded in getting a reservation for that slot. We assume that each

node generates messages with an arrival rate λ which is Poisson distributed. The message

length of each node is exponentially distributed. A node cannot generate a new message

until all packets of the current message are transmitted completely. A node which has

generated a message in the current frame cannot try to access the data slots in the same

frame.

3.2.2 The Random Access Polling : RAP

B C

B

C

Frame

Code 1

Code 2

.........

RTS(Polling)

Frame

RTS(Polling) DATA

CTSDataDataDataA BC

D X

A

XD

Unused

DATA

A

XDCTS

Figure 3.3: The RAP Frame Structure

In RTS(polling), the UL slots are grouped into access periods comprising of ’a’ slots,

’b’ codes and ’a×b’ polling periods (see figure 3.3). Here, ’p’ is the number of terminals

that are polled during one frame (p≥a). The DL slots are grouped into control and data

slots. Each active MT (Mobile Terminal) will generate a random number which will be

used for polling in the control slot. For example, if MTs A, B, C, D and X (as shown in

figure 3.3) generate the random numbers 0, 2, 2, 3 and 4 which shows the collision of MTs

B and C. The CTS shows the slot allocation for all these MTs except B and C. There

are two advantages of having access and polling periods occur cyclically. First, once an

MT synchronizes with the cycle, the possibility of incorrect channel sensing is eliminated.

Page 57: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 42

Second, the discontinuous channel sensing used here also leads to extended battery life.

When an MT generates data, to transmit, it sends a reservation burst randomly in one

of the ’a’ slots during the next access period. The reservation burst contains its identity

number among other information (for example, message length). If the access burst is

transmitted successfully (without a collision), the MT-id is put at the top of the polling

list maintained by the BS. A collision occurs when two or more MTs transmit their

reservation bursts in the same slot and none of them is included in the polling list. When

the access period is over, polling period starts and the BS polls from the top of the polling

list. After polling the MT, the BS inserts its MT-id at the bottom of the polling list if

it has still data to be transmitted, otherwise BS removes that id from the polling list

because that MT has completed its data transmission. When an MT does not get access

during an access period, it backs off with a pre-determined back-off algorithm and tries

randomly to access the next available access slots.

3.3 Calculation of Throughput and Delay

When communication requirements of the users in the system are all different, the channel

allocation and access control schemes of this proposed protocol is too complex to be

modelled. Therefore, we use a model where each connection of the same type generates

Poisson traffic with equal intensity. In this section, we evaluate the performance of the

above system model in terms of throughput, delay and rejection rate. We assume that

the users in the cell arrive at base station with a Poisson process and generates messages

over a period which is exponentially distributed.

For random access protocol :

Throughput of RAP, Sr = Nt ÷Ns (3.1)

where Nt=Number of packets transmitted successfully and Ns=Number of packets put

into the system.

Mean delay of RAP, τ r = τa + τt (3.2)

Page 58: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 43

where τa=mean access delay (in RTS slots) and τt=mean transmission time (in DATA

slots). This is calculated over all frames.

Rejection rate of RAP, Rr = Cbr ÷ Ct

r (3.3)

where Cbr=total blocked calls and Ct

r=total number of calls. A blocked call occurs when

the call is not able to get access after certain number of frames.

For polling protocol (PP):

Throughput of PP, T p = P ÷ [a+ p× k] (3.4)

where p = number of polling periods,

k = number of slots in one polling period,

a = number of access periods (in slots),

and P = number of slots polled during ’p’ number of polling periods.

Mean delay of PP, πp = πa + πt (3.5)

where πa=mean access delay (in ’a’ slots) and πt=mean transmission time (in ’p’ periods).

This is calculated over all frames.

Rejection rate of PP, Rp = Cbp ÷ Ct

p (3.6)

where Cbp=total blocked calls and Ct

p=total number of calls. A blocked call occurs when

the call is not able to get access even after certain number of frames with the maximum

number of attempts (AMAX) using a good back-off algorithm. The back-off algorithm

used in this study is given by

xb = rand(2nb − 1), nb ≤ AMAX (3.7)

where rand(n) is a function returning a random integer between zero and n, and

xb = number of access slots to backoff;

Page 59: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 44

nb = number of access attempts;

AMAX = maximum permissible attempts (depends on the total time for communication).

In both the protocols, the terminals produce messages with 1% activity of the users and

the cumulative distribution function of the message length (in packets) is given by

F (x) = 1− e−µx, 0 ≤ x ≤ 1000 (3.8)

Each message is coded in RLP (Radio Link Protocol) blocks where each block consists of

five slots and µ is the mean message length.

3.4 Analytical Model for the Proposed MAC Proto-

col

3.4.1 Random Access

For the random access protocol, we use the M/M/n/n/K Markov model as shown in the

figure 3.4. We obtain the steady state equation as:

+πA = O (3.9)

where +π is a steady state probability vector and it is equal to

+π = (π0 π1 π2 ... πn) (3.10)

and A is the generator matrix and O is a null matrix. For this Markov chain, the

recurrent non-null and the absorbing properties are satisfied. ’K’ is the number of users

and the number of data slots are ’n’. The average number of packets served by the system

is calculated as:

L =(Kρ)

∑n−1i=0

(K−1i

)ρi∑n

i=0

(Ki

)ρi

(3.11)

where ρ = λµis the offered traffic to the system with the arrival rate, λ as per Poisson

Page 60: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 45

distribution and the service rate, µ as per the exponential distribution. The packet success

probability is calculated as:

PS =c∑k=0

n∑j=0

(1− πj)(1− Pb(k)) (3.12)

where ’c’ is the number of CDMA codes allocated to the active users in a data slot and

the steady state probabilities are given as follows:

π0 =1∑n

i=0

(Ki

)ρi

(3.13)

and

πj =

(K

j

)ρjπ0; j = 1, 2, 3, ..., n (3.14)

We have assumed the channel is an AWGN and the modulation employed is DS-SS BPSK.

The BER is given by the relationship as follows:

Pb(k) =1

2erfc

√√√√ Eb

N0 +23Eb(

k−1Gp

)

(3.15)

where k=number of active users

Gp=the processing gain which is equal to RF bandwidth divided by the baseband band-

width.

Eb=the energy per bit in Joules

and N0=the two-sided psd in Watts/Hz.

The throughput is given by

T = PSL (3.16)

and the delay is given by

W =K

T− 1

λ(3.17)

Page 61: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 46

. . . . . . . . nn-1210

(K-2) (K-n+2) (K-n+1)(K-1)K

2 3 (K-n-1) (K-n)u uuuu

Figure 3.4: The analytical model (Markov Model) for the performance analysis to calcu-late the throughput and the delay.

3.4.2 Random Access Polling

For RAP protocol the analytical equations are given as follows: the probabilities that there

are ’i’ successful packets and ’j’ collision packets out of ’n’ active users in ’p’ random access

slots are given as:

qni,j =1

pn

(p

i

)(p− i

j

)∑j

n!∏jk=1 ak!

(3.18)

where ak is the number of collision packets in slots which is ≥ 2:

j∑k=1

ak = n− i (3.19)

The mean time to transmit ’n’ active users is:

T (n) =∑i,j

qni,j [i(Tp + Ts + Ta) + j(Tp + Tc + Ta + Tb) + T (n− i)] (3.20)

where Ts=packet transmission time

Tc=packet collision period

and usually these two parameters are considered to be equal in our analysis.

Page 62: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 47

Tp=time to poll an active user.

Ta=additional delays like propagation delay, overhead time to transmit and detect the

user’s random access slot number.

Tb=back-off time interval.

The busy period is calculated by the arrivals in the polling cycle is Bernoulli’s distribution

with parameter (1− e−λT (n)) and this is given as:

T =N∑n=0

(N

n

)(1− e−λT (n))

n(e−λT (n))

N−nT (n) (3.21)

where N is the total number of users in the system. The expected value of successful

packets transmission in a polling cycle is given as:

U = NTsN∑n=0

(1− e−λT (n))

(N

n

)(1− e−λT (n))

n(e−λT (n))

N−n(3.22)

The system throughput is calculated as:

S =U

T(3.23)

The average delay is:

D = Db +Dp (3.24)

where Db=time that packet arrives in the BS until the current polling cycle is over

and Dp=time that the system begins the new polling cycle until the packet is successfully

transmitted. These two time parameters are given as follows:

Db = T − 1

λ(1− e−λT ) (3.25)

Dp =

∑Nn=0 Dp(n)

N(3.26)

Page 63: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 48

where Dp(n) is given as:

Dp(n) =∑i,j

qni,j[i(i− 1)

2(Tp + Ts + Ta) +

ij

2(Tp + Tc + Ta + Tb) + (n− i)(i(Tp + Ts + Ta) +

j(Tp + Tc + Ta + Tb)) +Dp(n− i)] (3.27)

3.5 Power Control for the Proposed MAC Protocol

In this work, a detailed study is carried out regarding the maximum number of users that

each base station can support on a lossy channel. The author has analyzed the desired

user’s signal quality in a single cell CDMA (Code Division Multiple Access) system in

the presence of MAI (Multiple Access Interference). Earlier power control techniques

were designed to assure that all signals are received with equal power levels. Since these

algorithms are designed for a imperfect control of power, the capacity of the system is

reduced for a given BER (Bit-Error Rate). But the EPCM (Efficient Power Control

Mechanism) proposed in this work assures a better system capacity and the EPCM is

designed for the reverse link (mobile to base station) considering the path loss, log-normal

shadowing and Rayleigh fading. The simulation results show that the proposed method

satisfies the required quality of service for multimedia wireless LAN application. The

EPCM is also analyzed mathematically and it is found that both the simulation and the

analytical methods are coincident within the limits of approximation [41].

An important design choice in cellular wireless communication is the multiple access

capability that allows a number of users to share spectrum resources. The selected mul-

tiple access techniques strongly influence modulation, coding and handoff methods, all of

which finally determine the capacity, quality and coverage performance of the air interface.

CDMA is an emerging multiple access technique in which each user data stream is spread

using an orthogonal random sequence. The spread signal occupies a much large band-

width than the original signal making this a DS-SS (Direct Sequence- Spread Spectrum)

Page 64: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 49

modulation technique. The received signals are extracted by correlating with the corre-

sponding spreading code. This results in a coding gain for the desired user signal. But the

standard correlation receiver for CDMA system is susceptible to the near-far problem. So,

the power control technique is required in the system to maintain the trade-off between

capacity of the system and the user’s BER.

There are many power control techniques have been suggested for cellular communi-

cations. In CDMA, the Eb

N0(where Eb is the energy contained in a data bit and N0 is the

two-sided power spectral density of AWGN (Additive White Gaussian Noise) added to the

communication channel) at the correlation receiver output equals the signal power mul-

tiplied by coding gain, divided by the sum of receiver noise and other users’ interference

power. If one user has a high power at the base station, while its own Eb

N0will improve,

other users will suffer a lower Eb

N0. Therefore, the power of each user at the base station

must be controlled to be the same, since all users are equally important. This requires

a dynamic control of user power to compensate for spreading, shadowing and multipath

fading. This is done through open, closed and outer loop control. In open loop power

control, the mobile estimates the average propagation loss by estimating the forward link

(base station to mobile) received power and adjusts its transmit power accordingly. Open

loop compensates for spreading loss and shadowing. The variations due to multipath

fading are adjusted using a closed loop control. For this, the base station checks the Eb

N0at

the receiver correlator output against a set point and sends the mobile a step up or step

down power command. The closed loop power control is fast enough to follow Rayleigh

fading for low mobile speeds. However, at high mobile speeds closed loop control cannot

fully track fast fading. Since power control errors and its dynamics depend on the mobile

speed, these are compensated by outer loop that adjusts the set point to achieve a frame

error rate of about 1%. The set point is initially high at low speeds, then reduces with

mobile speed but increases again at higher speeds. Finally, just as reverse link power

control is used to maintain satisfactory Eb

N0at the base station, forward link control is also

necessary to compensate for variable outer cell interference and maintain the required Eb

N0

at the mobile. Hence, the cuts in interference to other users and directly translates to

Page 65: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 50

improved capacity [42, 43].

3.5.1 Definitions

i) Transmitted Power level : This is the power level at the output of the transmitting

antenna of the mobile user towards the base station.

ii) Received Power level : This is the power level at the input of the receiving antenna

of the base station, received from the mobile user.

iii) Perfect power control : The respective received power levels of mobiles at the base

station are made identical for estimating the constant BER.

iv) Imperfect power control : The level of imperfections in the power control mechanism

depends on several causes (e.g. the power control algorithms, the speed of the mobile,

the dynamic range of the transmitted power level, the distribution of mobile users in a

particular cell, the propagation statistics, etc.).

v) Path-loss : It is a large scale attenuation of the received power level at the base

station and it varies with the distance between the transmitter (mobile user) and the

receiver (base station).

vi) Short-term fading : It is defined as the amplitude variation in the received signal

level, termed signal fading, are due to the time-variant multipath characteristics of the

channel and this is also called as Rayleigh fading.

vii) Long-term fading : This is defined as the variation in the received signal level

when the surrounding environmental clutter (e.g. trees) may be vastly different at two

different locations having the same transmitter-receiver separation but have different levels

of clutter (unwanted signals) on the propagation path and this is also called as log-normal

shadowing.

viii) Reverse-Link (Up-Link) power control : It is for reducing near-end to far-end

interference. The interference occurs when a mobile unit close to the cell site can mask

the received signal at the cell site so that the signal from a far-end mobile unit is unable to

be received by the cell site at the same time. It is a unique type of interference occurring

in the mobile radio environment. This link is from mobile to base station.

Page 66: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 51

ix) Forward-Link (Down-Link) power control : It is used to reduce the necessary

interference outside its own cell boundary. This link is from base station to mobile.

3.5.2 The Correlation Receiver for CDMA System

We consider a DS-SS multiple access system with BPSK signalling and a correlation

receiver. There are K users in the system. User k’s power received at the base station is

sk(t) :

sk(t) =√2Pkbk(t− τk)ak(t− τk)

cos [ωc(t− τk) + θk] (3.28)

where, Pk is transmitted power of the signal, bk(t−τk) represents the data signal, ak(t−τk)

represents PN (pseudo-random) sequence, and cos[ωc(t− τk) + θk] represents the modu-

lating waveform. θk is the random phase which is uniformly distributed over [0, 2π], while

τk is the random delay which is uniformly distributed over [0, Tb]. Tb is the duration of the

data bit and Tc is the duration of the each chip in the PN sequence. The total number of

chips per bit, N is given by N = Tb

Tc= fcfbwhere fc is the chip rate (in chips/sec) and fb is

the data bit rate (in bits/sec).

We assume that Pk is independent for each user and independent of θk and τk . As

shown in figure 3.5, the data signal is given by bk(t) =∑∞i=−∞ bk,i pTb

(t − iTb) where

bk,i ∈ {−1,+1} is an infinite sequence of data bits and pTb(t) is a rectangular pulse with

unity amplitude and duration Tb. The spreading signal is ak(t) =∑∞j=−∞ ak,j pTc(t− jTc)

where ak,j ∈ {−1,+1} and pTc(t) is a rectangular pulse with unity amplitude and duration

Tc. Assume that we receive signal from user 1 and that θ1 = 0 and τ1 = 0. When a single

propagation path exists, the received signal for K users is given by :

r1(t) = n(t) + s1(t) +K∑k=2

sk(t− τk) (3.29)

Page 67: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 52

where n(t) is AWGN with 2-sided psd N0

2and s1(t) is the desired signal. Ak =

√Pk

P′k

where

P′k is the desired power set point of the power control algorithm.

1

2

k

b (t)

b (t)

b (t)

A a (t) cos[w t +O ]

A a (t) cos[w t +O ]

1

k

1

k

A a (t) cos[w t +O ]2 2c

c

c

:

:

:

1

2

k

A

A

A

1

2

k

n(t)

ReceiverOutput , r(t)

w : carrier angular frequency.c

AWGN

Delay

Figure 3.5: The Correlation Receiver

3.5.3 Analytical equation and performance analysis for EPCM

With perfect power control, all users assigned to a base station should have the same

received power at the base station. We consider here a single cell system with K users. In

a CDMA system (see figure 3.1), the number of users that the cell can support is limited

by the total received interference at the base station and it will vary with time. All users

share the same frequency spectrum and experience an interference from all other active

users throughout. Given a quality of service requirement, the Eb

N0ratio for user 1 is given

as :EbN0

=P1∑Kk=2 Pk

.

(fcfb

)(3.30)

Page 68: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 53

and the probability of error (BER) for user 1 in CDMA environment with BPSK modu-

lation is given as :

Pe = Q

√P1

2Tb

2√(NTc

2

6

∑Kk=2 Pk

)+ N0Tb

4

(3.31)

where P1 is the received power level of user 1 at the base station and Pk is that of kth

user.

The received power Pk of the kth user at the base station may vary due to LOS (line- of-

sight) path loss (for free space propagation α = 2 and α can vary from 1.6 to 8 depending

upon the morphology of the building) which is computed as :

Pk =Ptkλk

αGmkGbk

(4π)α[dk(t)]α (3.32)

where Ptk= transmitted power of kth user. λk =3.108(m/sec)fk(Hz)

meters, wavelength of kth user

and fk = operating carrier frequency. Gmk= kth user transmitting antenna gain, Gbk =

base station receiver antenna gain, dk(t) = distance between the kth user and the base

station and it varies with time because the user is moving and that is equal to dk ± t.vk

where vk = speed of the kth user and +ve sign indicates the user is going away from base

station and -ve sign indicates the user is coming towards the base station.

The mobile user’s radio signal R(t) can be artificially characterized by three compo-

nents LT(t), ST(t) and PL(t) based on natural physical phenomena.

R(t) = LT (t).ST (t).PL(t) (3.33)

where LT(t) = long-term fading or log-normal fading and its variation is due to the terrain

contour between the base station and the mobile unit. ST(t) = multipath fading, short-

term fading or Rayleigh fading and its variation is due to the wave reflected from the

surrounding buildings and other structures (see figure 3.6) and PL(t) = path loss and its

variation is due to the change of distance between the mobile user and the base station.

Page 69: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 54

The multipath propagation is modelled using the Bernett-Vignant Reliability Equation

FMdB = 30.log(D) + 10.log(6.A.B.f)

−10.log(1− R)− 70 (3.34)

where

R = Reliability factor

A = roughness factor for the terrain

B = climate conditioning factor of the propagation medium

D = distance between the mobile user and the base station in Km

and f = RF carrier frequency in GHz.

BSMS

~ 3 m

30 to 100 m

Direct path

Reflected path

2 Km or further

O

O 2

1

Figure 3.6: Multipath fading due to reflection

The user k’s received signal power level is :

Pk ∝ D−4 (3.35)

Page 70: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 55

But for the free space propagation, Pk is given as :

Pk ∝ D−2 (3.36)

In this work, consider initially the path loss, that is, when the user is moving with a

constant velocity and starting with some initial transmitting power, the received power

at the base station for that user is varying with time. This happens for all the users

in the particular cell served by single base station. But in order to eliminate the near-

far problem with CDMA technique, it is to maintain a constant received power for the

user with a desired quality of service (BER). Therefore, the transmitted power has to be

stepped up or down accordingly with the mobility of the user. So, first study is made

on the power control technique without the multiple access interference (MAI) assuming

that all PN codes of the users are orthogonal ideally. But in practice, it is very difficult

to maintain the orthogonality among the PN sequences and therefore include the MAI in

the consecutive analysis for calculating the BER tolerances.

3.5.4 Analytical Model for the Power Control

The distance variation of each user is given by the pdf (probability density function) as :

fD(d) =

1R2−R1

if R1 ≤ d ≤ R2

0 otherwise(3.37)

where D is a random variable which is uniformly distributed from distance R1 to R2 and

the received power at the base station is given by the pdf as :

fT (t) =

√p

2.t32 .(R2−R1)

if pR2

2≤ d ≤ p

R21

0 otherwise(3.38)

where T is a random variable defined as :

T =p

D2(3.39)

Page 71: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 3. Design of the Proposed MAC Protocol 56

where p is given as :

p =Pt.Gb.Gm.λ

2

(4.π)2(3.40)

The Rayleigh model for multipath fading is given as a pdf :

fR(r) =

rσ2

R. exp

(−r22.σ2

R

)if r ≥ 0

0 otherwise(3.41)

where R is the random variable represents the received signal envelope at the base station.

The log-normal fading for shadowing effects is modeled as a pdf :

fL(l) =

20. log e√2.π.σL.l

. exp(− (10. log l)2

2.σ2L

)if l ≥ 0

0 otherwise(3.42)

where L is the random variable for the received power at the base station. Now, we cal-

culate the expected received power W at the base station for each mobile user as : Since,

W = f(T,R,L)

E(W ) =p

R1.R2

+ 2.σ2R + exp

(σ2L

)(3.43)

where σR is the amount of deviation in received power level due to Rayleigh fading and

σL is the amount of deviation in received power level due to log-normal fading.

Then, we calculate the probability of bit-error from the equation :

Pe =1

2erfc

(√EbN0

)(3.44)

whereEbN0

=

[E(W )

I(W )

].

(fcfb

)(3.45)

The interference for the kth user is given as :

I(Wk) =K∑i=1

E(Wi)− E(Wk) (3.46)

where the details about the parameters are given in equation (3.30).

Page 72: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4

Functions of the Proposed MAC

Protocol

In this chapter we discuss the functions of the designed MAC protocol in a multimedia

wireless network in particular to admission control, channel allocation, buffer management

and data transfer during the hand-offs.

4.1 Multiuser and Multistream Admission Control

The challenge in internetworking the wireless and wired networks is to guarantee quality

of service (QoS) requirements while taking into account the radio frequency spectrum

limitations and radio propagation impairments. Call Admission Control (CAC) is one

method to manage network resources in order to adapt to traffic loading variations. In

particular, the admission control is necessary when there are various types of traffic with

various QoS requirements and when the system operates in the vicinity of its full capacity.

In this work, we propose a CAC algorithm for the TDMA/CDMA protocol. The objectives

of the CAC algorithm are to maximize the utilization of network resources and at the same

time, to provide the users who are transmitting different types of traffic with acceptable

QoS. The CAC decisions are also based on the availability of the radio resources (e.g.,

radio frequency channels and error correcting codes).

57

Page 73: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 58

The QoS requirements under considerations are indicated by BER and transmission

delay. Transmission errors are due to radio channel impairments and buffer overflows

at base stations. To maintain the same QoS, the higher the data rate, the more the

transmitted power is needed, and the interference to the other users is larger. When the

system resources are limited, admission of a high-rate data service user will degrade the

whole system’s performance. It is thus essential that a base station identifies each user’s

data rate as part of its call admission policy, with the objective of efficiently managing

system’s resources without degrading QoS for both voice and data users. However, the

wireless networks inherently accompanies handoff, that has a significant impact on the

traffic performance of the networks such as call blocking probability.

4.1.1 CAC Algorithm

The CAC in multimedia wireless networks is also affected by handoff. The CAC should

consider that an accepted call can be forced-terminated before completion of service,

which is more unbearable to users than blocking of service. The traffic performance

metrics, considered by CAC, are as follows:

• Carried Load: This represents the ratio of the bandwidth used by completely ser-

viced calls to the total capacity of mobile network. If a call is forced-terminated,

the bandwidth used by the call is not taken into account.

• Call Dropping Probability: It is the probability that an accepted call is forced-

terminated before it completes the service.

• Call Blocking Probability: It means the likelihood that a new arriving call is blocked.

Actually, it depends on the CAC scheme.

• Call Completion Probability: It means the probability that a newly arriving call

completes its service without forced-termination.

• Handoff Failure Probability: It is the probability that a handoff fails because the

target call has no free channel. This is also called as forced-termination probability.

Page 74: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 59

Admitting a new user will degrade the link quality for existing users. In order to

have high capacity and an acceptable service quality, a trade-off between channel quality,

dropping or outage, and blocking probability has to be made. So, the CAC algorithm is

used to make this trade-off [44, 45].

In the downlink, algorithm using output power levels at BSs are studied. Since the

codes are fairly orthogonal within one cell, it may be too difficult to make an admission

decision based on information from just one BS. Thus, a new call is admitted as long as

the output power levels, at the consulted BSs, stay below a certain predefined threshold.

When the maximum output power constraint is limited on a BS basis, the admission

decision is based on this algorithm:

Admit a new user if

Pb < Pbt (4.1)

where Pb is transmitted output power from BSb before the new user is admitted, i.e.,

Pb = pi at BSb, and Pbt is a predefined threshold. Here, pi is the output power from the

ith transmitter.

On the other hand, when the output power is limited on a channel basis, the admission

decision follows the following rule:

Admit a new user if

Pj < Pcht (4.2)

where Pj is the output power used by channel j and Pcht is a predefined threshold.

Consider the TDMA/CDMA system. Each frame of the TDMA/CDMA system is

divided into ’m’ slots and every packet occupies exactly one slot. Multiple users can

transmit their packets in the same slot. Therefore, for every user, the data rate is given

as ri′= mri, where ri is the data rate of type i users and the spreading factor, Fi

′=

W/ri′= Fi/m, where W is the spread bandwidth and Fi is the spreading factor of type i

users which is equal to W/ri.

Let kij denotes the number of type i users in slot j and Kj = (k1j , k2j, ..., kLj), for L

types of users (e.g., out of 50 users, 20 voice users type and 30 data users type).

Page 75: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 60

For Kj to be admissible in slot j, it must hold that

L∑i=1

kij

1 + Fi′

Qi

≤ 1

f + 1(4.3)

where f =∑Li=1

MAIiPri

, Qi = the required Eb/N0 for any type i user, MAIi = Multiple

Access Interference for type i users, and Pri = received power level of type i users.

Therefore,L∑i=1

kij

1 + Fi

mQi

≤ 1

f + 1(4.4)

Since kij = 0 if m > Fi/(fQi), to avoid trivial cases, we assume that m ≤ 1/(fQi) for

all i.

Since K =∑mj=1 Kj = (k1, k2, ..., kL), where ki denotes number of i type users in one

frame, we say K is admissible for the TDMA/CDMA system iff there existsKj , 1 ≤ j ≤ m,

such that Kj is admissible in slot j.

The basic parameters and the pseudo-code of the CAC algorithm are given as follows:

Basic Parameters:

Let C = number of channels, Th = threshold (from 0 to C), Bc = occupied bandwidth,

Br = requested bandwidth, PD = call dropping probability, and PD.tar = target call

dropping probability.

CAC Algorithm:

1. initialize Th = C

2. set timer

3. wait for call request arrival

4. if new call request arrives

5. if (Bc + Br) ≤ (C-Th)

6. admit new call with rate Br

7. else

Page 76: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 61

8. reject new call request

9. if handoff call request arrives

10. if (Bc + Br) ≤ C

11. admit handoff call with rate Br

12. else

13. reject handoff call request

14. update PD

15. if PD ≥ PD.tar

16. decrease Th

17. reset timer and go back to step (3)

18. if timer expires

19. increase Th

20. reset timer and go back to step (3)

21. else go back to step (3)

22. STOP

23. END

4.2 Channel Allocation based on the QoS Require-

ments of the Multimedia Applications

The reliable and efficient transmission of high quality variable bit rate (VBR) video

through the wireless networks generally requires network resources be allocated in a dy-

namic fashion.

Page 77: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 62

CONTROL]

Source 1

::::

::::

Source 2

Source N

RESOURCEALLOCATION

NETWORK

Buffer/Scheduler

[and CALL ADMISSION

Figure 4.1: Illustration of Dynamic Resource Allocation for Multiplexing VBR Streams

Bandwidth allocation and management for individual stream generally must be done

at the edges of the network, in order to conserve computational resources on network

switches, as illustrated in figure 4.1. Such systems will likely not have complete knowl-

edge of the network state, and must therefore make their use of network resources as

minimal as possible to maintain a given QoS. If a source requests more bandwidth than it

actually uses, the overall network utilization drops. Conversely, if the source exceeds its

bandwidth request, packet loss and delay will become significant. While off-line systems

could compute the exact dynamic bandwidth requirements for a stream before transmit-

ting it, but on-line processing is desirable in many applications. Systems such as video

conferencing and live news-on-demand absolutely require on-line processing. In addi-

tion, on-line processing is needed in any system that dynamically transcodes video, or

that splices and combines segments in a computational requirements low, the information

used to make bandwidth decision should be directly available from the compressed video

stream. The overall goal is to have resource management systems that can accurately

Page 78: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 63

estimate the required bandwidth in real time [46].

We use in this work the concept of ”bunch” of cells as a group of cells strongly inter-

connected; all resources available to a bunch are dynamically allocated by the BSC. Such

a system architecture is well suited especially for TDMA/CDMA system.

BSCBS

BS

BS

Bunch of BSs

BS

BS

BS

Bunch of BSsZone

BSC

Figure 4.2: Intra and Inter-bunch Links

So, we propose a DCA (Dynamic Channel Allocation) algorithm based on an ”Inter-

ference Matrix” based scheme. We consider a cellular system with a limited number of

BSs that are connected to a BSC. Such a bunch of cells can be used for instance to cover

a floor of a building or a group of streets. BS can use a simple antenna. In this case,

the BS-BSC link can be an optical cable carrying the radio-frequency signal and the real

transceivers may be located at the BSC level (Please refer to figure 4.2).

Between BSs, within a bunch, high speed signaling can be used for channel allocation.

The BSs in a bunch are assumed to be synchronized. The BSC has complete knowledge

of all allocated resources, actual transmission powers for any channel at any time. The

centralization at the BSC level permits the use of near optimal algorithms for resource

Page 79: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 64

allocation and management (e.g., power control, bit rate, DCA, etc.). [47, 48].

The bunch size can be adapted to the type of environment. In the indoor case, a

bunch can be a WLAN, for example. In rural environment the bunch may include only

several macro-cells (e.g., 3 cells of a sectorized site).

The Zone Concept:

In classical systems, the cell is seen as an entity. The limit between two cells generally

consists of small areas where a mobile could be received by both BSs. The pico-cells in

urban areas or in building, which we study here, do not easily integrate a regular pattern.

The given environment results in a complex propagation situation. Base stations are

likely to be located as close as necessary to guarantee a continuous coverage so that

optimal planning of base station location becomes impracticable. This leads to important

overlapping where the mobile station is received by more than one base station.

Z1

BS1BS2

BS3

Z7

Z6

Z5Z4

Z2

Z3

Figure 4.3: The Zone Concept

We account for the cells overlapping by using the concept of coverage zones. A zone

is an area that is covered homogeneously by one or several BSs. By homogeneously we

Page 80: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 65

mean that all the zone is covered by the same number of BSs (Please refer to figure 4.3).

DCA Algorithm:

Channel allocation in a bunch is made by the BSC for incoming and outgoing calls.

Resources within the bunch are allocated according to a ”Interference-Matrix” based

scheme.

A compatibility matrix (called as ”structure matrix”) of all cells within the bunch is

progressively built (please refer to table 4.1). The ”Interference-Matrix” scheme is then

used on the basis of this structure matrix. The structure matrix is defined as a record of

relation between zones and BSs. A zone could be either covered by specific BS, interfered

or non-interfered. The category of each pair (zone, BS) is related to a path loss range

(PL in dB) between the zones and BS. Two thresholds are to be defined: Lc (in dB) for

the coverage and LI (in dB) for the interference avoidance.

Table 4.1: Downlink Structure Matrix

BS

Zone C I NI

In table 4.1, C: covered ⇒ PL < Lc, I: Interfered ⇒ Lc < PL < LI , and NI: Non-

interfered ⇒ LI < PL. This matrix is an apriori known by the BSC. All BSs of the same

bunch broadcast a pilot tone (beacon channel) and the system configuration information

on the same frequency channel. Every mobile sets a list of the best received BSs and

transmits it to the BSC during the communication. This information is used to build the

structure matrix. This matrix is quasi-static. It should be updated periodically in order

to reflect the current topographic and propagation conditions.

Let us assume the simple situation where a MS in communication with BS1 is interfered

by BS2 using the same downlink channel (Please refer to figure 4.4).

In figrure 4.4, P1 (dBm) = transmitted power for BS1, P2 (dBm) = transmitted

power for BS2, PL1 = path loss for BS1, and PL2 = path loss for BS2. If the MS is

Page 81: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 66

MS

P1P2

BS1

BS2

PL1

PL2

Figure 4.4: Downlink Co-channel Interference Case

located in the zone covered by BS1, we have PL1 < Lc. According to the ”Interference-

Matrix” scheme, the situation in above case is possible only if we have PL2 > LI . If we

are not considering the fading effects, the CIR (Carrier to Interference Ratio) in dB is

(CIR)dB > (P1− Lc)− (P2− LI).

The current status of resources at the receiver site (zone on the downlink, BS on the

uplink) is recorded in a ”resource management matrix” (Please refer to table 4.2). The

matrix describes the state of each resource (i.e., free, used or blocked due to interference by

nearby users). The resource management matrix is manipulated by the DCA algorithm.

These uplink and downlink matrices are dynamically updated at call set-up, handovers and

call releases. But the CIR and handoff constraints can reduce the number of assignments

to a computationally feasible range.

In the above table 4.2, F (free): resource not used in current BS and not by neigh-

bouring BSs interfering the current zone, B (blocked): resource used by neighbouring BS

interfering the current zone, and U (used): resource used in the current BS.

Page 82: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 67

Table 4.2: Uplink Resource Management Matrix

BS

Resource F B U

The request for uplink transmission (from MS) and the zone localization of the MS is

made on a random access channel. This random access channel is the same for all BSs

for a given bunch (Please refer to figure 4.5).

When a mobile is sending a request, this request may be received by more than one

BS. The BSC deduces the zone where the mobile is from the BSs that have received the

request.

The ”allocation algorithm” operates using the structure matrix and a dynamic resource

management matrix.

Let us assume a demand for nγ resources in a location (BS on the uplink, zone on the

downlink) is received:

1. The BSC pre-selects all apriori free resources. The apriori free resources are those

with a free state in the resource management matrix.

2. The BSC sets a list of candidate resource. A candidate resource is an apriori free

resource of which allocation would not perturb other users. Let nc be the number

of candidate resources. If nc < nγ, the request is rejected. If nc > nγ , the score of

the candidate is evaluated. The BSC determines which zones would be blocked by

allocating a specific resource. If for such a zone this resource is already blocked, we

increase the resource score.

3. The nγ resources with the highest score are selected. The resources are allocated and

the resource management matrix is updated, accounting for the additional blocking

caused by the new allocation.

After de-allocation, the resource management matrix is updated as well. In circuit

Page 83: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 68

MS

BS1

BS2

BS3

Figure 4.5: MS Uplink Access

reservation, when not enough resources are available at request, the call is blocked or

dropped. For packet reservation, when there are not enough available resources, the

request is queued. We consider only one queue for the whole bunch. A released resource

is attributed to the first user in queue First-In-First-Out (FIFO), to whom the resource

becomes a candidate resource.

The initial power settings is an important aspect to consider. At each call set-up a

target CIR value is requested according to the service type. The DCA should determine

the physical channel that is available and that satisfies the target CIR value (CIRtarget).

We propose to classify the initial CIR value request in two categories, ”low CIR”

with the threshold, CIRL and respectively ”high CIR” with the threshold, CIRH . If

0 < CIRtarget < CIRL, then the system will return as an initial CIRtarget, CIRL. If

CIRL < CIRtarget < CIRH , then CIRH is considered as initial CIRtarget value. If

CIRtarget > CIRH , the call is not accepted.

The fine tuning of the CIRtarget value is initially proposed to the requested CIR target

Page 84: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 69

value is performed after the call set-up by the Power Control Algorithm. The system

performance was evaluated through simulation performed in a single cell. The QoS is

defined by considering the new call blocking probability for a certain CIR value. The

propagation model is used to calculate the path loss as a parameter with fading (both

Rayleigh and Log-normal).

The traffic model includes multimedia speech and video calls which are generated

according to Poisson process assuming a mean call duration for both. The mobiles are

uniformly distributed in distance over the cell area.

Refering to equ. (4.3), the spread bandwidth vector, Wk = (W1,W2, ...,WN) consists

a N number of channels available for k requests of i type users in any of the slot in a single

cell TDMA/CDMA system.

Therefore, the total bandwidth available is: W =∑Nk=1 Wk. Then the spreading factor

is: Fik =Wk

ri.

For Kj to be admissible in slot j, it must hold that (please refer to equ. (4.4))

L∑i=1

kij

1 + Fik

mQi

≤ 1

f + 1(4.5)

When a requested channel Wk is not available for a new call/hand-off call, then that

call is assumed to be blocked.

The basic parameters and the pseudo-code of the DCA algorithm are given as follows:

Basic Parameters:

Let CIRtarget = target CIR, CIRL = low CIR, and CIRH = high CIR.

Pseudo-Code:

1. begin

2. compute ’structure matrix’

3. compute ’interference matrix’

4. if 0 < CIRtarget < CIRL then CIRtarget = CIRL

5. if CIRL < CIRtarget < CIRH then CIRtarget = CIRH

Page 85: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 70

6. if CIRtarget > CIRH then call is not accepted

7. update ’structure matrix’

8. update ’interference matrix’

9. end

4.3 Buffer Management

The BS normally has a buffer to avoid packet discard due to competition for a destination

port among several packets. To improve buffer utilization, shared buffer switches have

been proposed. In such a switch, each incoming packet is lined up in the logical queue

for the appropriate output port in order to prevent an out of order packet delivery.

With the employment of a shared buffer switch, when the traffic destined to a certain

output port becomes heavy, the packets belonging to that traffic may occupy the buffer.

This prevents the packets destined to the other destination from entering the switch, and

eventually provides a large packet loss probability. To overcome this problem, a restriction

on the maximum queue length (threshold) has been introduced. When the queue length

exceeds the threshold value, the switch discards the arriving packets to be queued. But

the packet loss probability strongly depends on the traffic conditions. Consequently, one

should adapt the threshold dynamically to the traffic conditions to reduce the packet loss

probability. So, the packet loss probability can be kept below a certain value under any

traffic conditions by changing the threshold dynamically. But there can be a scheme which

decides the threshold for each logical queue according to the establishment and release

of the packet. If the threshold is small, when many packets are stored in buffer, arriving

packets may be discarded even if several buffer spaces are available. These unused spaces

result in inefficient buffer utilization. In our work, we set the thresholds to a higher value.

Thus the buffer may be used more efficiently when the switch becomes congested. To

calculate the threshold dynamically, our method employs a simple linear function which

is suitable for high-speed switching. To evaluate the performance of the proposed protocol,

Page 86: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 71

we consider two classes of traffic, a delay-sensitive class such as voice and a loss-sensitive

class such as text data and investigate methods of calculation of appropriate thresholds

for the individual traffic classes [49, 50].

Calculation of the Dynamic Threshold:

The threshold T(t) at time t is given as follows:

T (t) = c.[B −Q(t)] (4.6)

where B = the shared buffer size, Q(t) = the number of output ports, and the total

queue length at time t and c = a constant (please refer to figure 4.6).

P=1

0

B

BQ(t)

T(t)

P < 1

P > 1

Figure 4.6: Dynamic Threshold Vs. Total Queue Length

An arriving packet destined for output port i is discarded when the queue length Qi(t)

for output port i is larger than or equal to threshold T(t), that is,

Qi(t) ≥ T (t) (4.7)

Page 87: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 72

In equ. (4.6), the threshold is linearly decreased from B to 0 as the number of packets

Q(t) in the buffer increases. Thus equ. (4.6) produces a larger threshold value when Q(t)

is small, especially when the parameter c is set to a value larger than 1. In such cases, equ.

(4.6) does not work. Furthermore, the threshold decreases as Q(t) becomes large, and

eventually all of the logical queue lengths satisfy equ. (4.7). This causes packet discard

even though several buffer spaces are available. To overcome this problem, the threshold

T(t) should be set to a larger value than the logical queue length Qi(t) when the total

queue length is almost equal to the buffer size Q(t) � B. From the above discussion, in

this work, T(t) is calculated as

T (t) = B − P.Q(t) (4.8)

where P is a positive constant.

Figure 4.6 shows the dynamic threshold value as a function of the total queue length.

The simple linear function used in this work can calculate the threshold instantaneously,

which may be suitable for base station switches in which rapid processing is essential.

For simplicity, we assume a discrete time system divided into slots of fixed length

equivalent to the packet time. In such a time system, any events, such as arrivals or

departure of packets, occur at the boundaries of time slots.

Switch Model:

We consider (N x N) switch with a shared buffer which can store up to B packets.

The switch can store N arriving packets and read out N packets for departure within a

time slot. Furthermore, the time spent in the circuits composing the switch is negligibly

small. From the above assumptions, the switch can be modeled as N queues as shown

in figure 4.7. Note that due to the restriction of the shared buffer capacity, the total

queue length is maximum of B. The arriving packets are discarded when the length of the

corresponding logical queue is larger than the threshold or the buffer is full. Otherwise

they are served in FIFO (First-In-First-Out) order.

The basic parameters and the pseudo-code of the buffer management algorithm are

given as follows:

Page 88: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 73

���

���

���

���

��������

:

��������������������������

0

1

N−1

0

1

N−1

Buffer Size, B

Output PortsInput Ports

Dynamic Threshold, T(t)

:::

:::

Q(t)

Q(t)

Q(t)

1

0

N−1

::

Figure 4.7: Simulation Model of BS Switch for Buffer Management

Basic Parameters:

Let T = upper threshold for the queue length, L = lower threshold for the queue

length, L=bT where b is a constant, and ∆T = threshold control step size = B/K where

B = buffer size and K = number of bands. p1 = actual packet loss rate, θmax = pre-

specified value for packet loss rate by controlling T (vary from L to T), δ = elapsed time

used to check the loss rate mismatch, and ε = tolerance value to eliminate unnecessary

updates.

Pseudo-Code:

1. if |p1 − θmax| > ε for δ secs, then T = [T + ∆T |p1 − θmax|]

2. let ε = 0.01 and δ = 1 sec

3. begin: get new p1 value

4. start = time-now

Page 89: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 74

5. while |p1 − θmax| > ε

6. stop = time-new

7. T = [T + ∆T |p1 − θmax|]

8. break out of the while loop

9. endif

10. get new p1 value

11. endwhile

12. go to begin

Traffic Model:

As the traffic model for each input port, we consider a two-state bursty source. The

source alternates between an on state, in which a packet having the same destination is

generated at every slot, and an off state, in which no packet is generated. The duration

of the on and off periods are both assumed to follow geometric distribution.

The traffic sources are assumed to be identical and independent of each other. We

also assume that at least one packet is generated in each on period, but the duration of

an off period may be zero. Let α denote the probability of transition from on to off; then

the probability p(i) that the duration of the on period is equal to i is

p(i) = α(1− α)i−1; i ≥ 1 (4.9)

Therefore, the mean duration of the on period, that is, the mean burst length Lb is

Lb =∞∑i=1

ip(i) =1

α(4.10)

The probability q(i) that the duration of off period is equal to i is

q(i) = β(1− β)i; i ≥ 0 (4.11)

Page 90: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 75

where β denotes the probability of transitions from off to on. Thus, the mean duration

of the off period Loff is

Loff =∞∑i=0

iq(i) =1− β

β(4.12)

From equations (4.10) and (4.12), the average load on each input port, ρn is

ρn =Lb

Lb + Loff=

β

α + β − αβ(4.13)

From equ. (4.13), one can vary the average load ρn at a given burst length Lb by

adjusting the off duration Loff . In a similar way, Lb can be varied for a given ρn. The

probability γnm that an arriving packet at the input port n (0 ≤ n ≤ N − 1) is destined

to the output port m (0 ≤ m ≤ N − 1) is assumed to be given, where

N−1∑m=0

γnm = 1 (4.14)

4.4 Maintenance of Data Transfer during the Hand-

offs

In wireless networks, we allow user to move around different areas hence causing ”hand-

offs” in the network. When a user arrives for the first time to the network and the

user is assigned a channel, then he/she is considered as a ”new call”. Two of the most

important performance measures in wireless networks are the new call and the hand-off

blocking probabilities. The hand-offs are a fundamental feature in cellular systems, their

performance and efficiency strongly depend on the use of adequate hand-off algorithms.

For cellular communication systems, in order to ensure the mobility and capacity, to

maintain the desired coverage areas, to maintain the data transfer and to avoid problems

of interference, it is necessary to correctly assign the calls to the corresponding service

areas in the whole cell and in the entire network.

Page 91: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 76

The previous studies, however were based primarily on hard hand-off in TDMA sys-

tems. Unlike TDMA systems, CDMA systems can provide soft hand-off. This is a ”make-

before-break” method. When the signal from a new base station is stronger than the

threshold value PADD, a new link to the BS is established while maintaining the existing

link. In this case the call is said to be in soft hand-off. It is assumed that a mobile station

can be in soft hand-off with two BSs with strong signals. If the signal from a third BS

becomes stronger than either of the two strong signals, another hand-off occurs and the

network drops the weakest link. When the signal from either the old BS or the new BS

weakens to below PDROP , the bad connection is released and only a single good connection

is maintained after that time. Soft hand-off region may vary according to hand-off related

parameters such as PADD and PDROP , and hand-off is also affected by radio propagation

characteristics and the required Eb/N0 value. The hand-off mechanism should support

the multi-rate traffic. But high rate traffic suffers from more blockings than the low rate

traffic in a mutimedia traffic environment. In the case of high rate traffic, it is desirable

that hand-off traffic may be controlled not to suffer from severe hand-off failures compared

with low rate traffic [51, 52].

Group II

R

0.775R

CELL A CELL B

Group I

Figure 4.8: A Cellular Hand-off System Model

Page 92: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 77

For our proposed MAC protocol, soft hand-off has been modeled. In order to model

the soft hand-off, we have the following assumptions: calls are uniformly generated within

a cell. The new call arrival to a cell is a Poisson process with rate λ. The time between

decision for the mobility transitions or call termination of a user with a call in progress

will be exponentially distributed with mean 1/µ for the cell. This time is refered as ”dwell

time”. ’R’ denotes the radius of the hexagonal cell. A soft hand-off call occurs when a

mobile station either crosses the boundary or undergoes a transition event as follows:

from the normal area to the hand-off area (Please refer to figure 4.8). If the hand-off area

is larger, then it can support fast moving calls, but for slow moving calls which experience

weak fast fading and do not require receiver diversity, it can be beneficial to perform soft

hand-off, considering both the mobility of calls and the received signal strength or the bit

error rate (BER).

The Connection Admission Control (CAC) for the wireless networks must execute

certain functions for an execution of a handover (hand-off). Therefore, the implications

and requirements imposed on the CAC by the handover procedures are:

• utilisation of the radio link

• protocol

• execution time

• observance of the traffic QoS parameters

The different options and their charactreistics are as follows:

• Bandwidth Reservation: If a single user can occupy the entire bandwidth of a radio

cell, part of the capacity in neighbouring radio cells is not available for allocation

to new users or new connections. This may be the optimum solutions in terms of

execution time and QoS observance, but the utilisation of the radio link is very poor.

• Blocking of Handover Request: Only a part of the current connections are handed

over, the others have to be dropped (if the MS had two separate receivers it might be

Page 93: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 78

possible to temporarily retain the connections which could not be handed over in the

old radio cell). This option is fast and simple if the BSC knows which connections

might be dropped, but in general this is difficult to decide. For example, imagine a

mutimedia session comprising a video and an audio connections. It does not make

sense to retain one of them while dropping the other. Nevertheless, if the coherence

time of radio channel is short (which depends on the radio frequency and the user’s

speed), the handover has to be performed fast. In this case, partial blocking of the

handover request may occur.

::::

(C )

::

::::

hmThe hand−off callsarrival rate as perPoisson Process

Reservation−On−DemandQueue

Radio Resource (C)

ReservedChannel

h

Figure 4.9: Hand-off Management Scheme

We have tackled the hand-off requests by the following method: channels are reserved

for hand-off calls in a typical hand-off scheme because hand-off success is more important

than a new call acceptance. When all channels, except the reserved channels, are used,

new calls are blocked and only hand-off requests are accepted. If all channels are used,

hand-off requests are placed into a queue waiting for a free channel (please refer to figure

4.9).

Let Pr,A = received power at BS A of a signal transmitted by a MS call in soft hand-off

Page 94: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 79

with cell A and B, and Pr,B = received power at BS B of a signal transmitted by a MS

call in soft hand-off with cell A and B. If Pr,A > Pr,B, that is, if BS A is the controlling

BS of the call, the call is in the area of hand-off region for cell A, called as Group I. If

Pr,A < Pr,B, that is, if BS B is the controlling BS of the call, the call is in the area of

hand-off region for cell B, called as Group II.

A channel is borrowed from a call in soft hand-off when an incoming hand-off request

to cell occurs with no free channels. In this case, a channel is borrowed from a call in

the Group I of the cell to release a connection with the noncontrolling BS of the call. If

there are no calls in the Group I of the cell, the incoming hand-off request is placed into

a queue. If there are calls in the Group I of the cell, a channel is borrowed from a call in

the Group I and allocated to the hand-off request. In this case, channel borrowing from a

call in the Group I of one cell corresponds to channel borrowing from a call in the Group

II of a neighbor cell.

Each cell will reserve Ch channels out of a total of C available channels, exclusively for

hand-off calls, because a suddenly forced termination during a call session will be more

upsetting than a failure to connect. Every hand-off requirement is assumed to be perfectly

detected and the assignment of the channel is instantaneous, if the channel is available.

From the intrinsic property of soft hand-off process, a hand-off requirement must not be

denied immediately when there is no available channel. Instead, the hand-off requirement

shall be put into a queueing list. The available maximum queue length is equal to Q.

The ”call duration time” Tc is assumed to be exponentially distributed with mean Tc =

1/µc. Both new call arrivals and hand-off arrivals are assumed to be Poisson distributed

with rates λn and λh respectively. The new call arrival rates in two different regions

Group I and Group II are:

λn1 = the new call arrival rate in hand − off region = aλn (4.15)

and

Page 95: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 80

λn2 = the new call arrival rate in hand− off region = (1− a)λn (4.16)

where

a =area of hand− off region

area of a cell(4.17)

Both the dwell times of a call in two distinct regions are assumed to be exponentially

distributed. The mean dwell time in hand-off region is Td1 = 1/µd and that in normal

region is Td2 = 1/µD.

We assume that when a new call is generated in the hand-off region, it can ask for

channel assignment from both the cell of interest and a neighboring cell with which it can

communicate. If the cell of interest has a channel available for such a generated call, the

new call is considered as a successful new call. If not, the new generated call is said to be

blocked from the point of view of the cell of interest. However, for the later case, the new

call may successfully enter the cellular system by getting a channel assignment from the

neighboring cell and becoming a hand-off arrival for the cell of interest. Of course, if the

new call cannot get channel assignment from either of the two cells, the call is said to be

blocked by this cellular system, and the mobile unit shall try its attempt later.

The basic parameters and the pseudo-code of the hand-off algorithm are given as

follows:

Basic Parameters:

Let C = number of channels, i = number of busy channels, and pi = probability that

i channels are busy.

Pseudo-Code:

1. begin

2. if i = C then

3. if new call then reject

Page 96: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 4. Functions of the Proposed MAC Protocol 81

4. if handoff then queue

5. if i << C then

6. if new call then compute pi

7. if rand() < pi then accept

8. else reject

9. if handoff then accept

10. end

Page 97: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5

Simulation

We have used C++ programming for developing the protocol and it is purely a computer

simulation. We have simulated this protocol for the system model described earlier. For

the simulation, we have assumed the arrival of packets for all users as Poisson distributed

and the message length is exponentially distributed. The number of data slots in a frame

can be from 2 to 8 slots and the number of CDMA codes per data slot can be from 2

to 5. An efficient random binary back-off algorithm is simulated to take care of packet

collisions. The maximum number of reattempts for request to send data after collisions

permitted for each user is 6.

Parameters Used for Simulation of Random Access:

• number of nodes, N = 32 or 64

• arrival rate, λ = 0.1 to 0.5

• message length, Lm = 50

• code length, L = 15

• frame duration, T = 1.0 sec

• duration of RTS = 0.05 sec

• duration of CTS = 0.05 sec

82

Page 98: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 83

• duration of DATA Slot = 0.18 sec

• number of data slots, S = 5

• number of CDMA Codes, U = 2 or 5

Parameters Used for Simulation of Random Access Polling:

• arrival rate, λ = greater than 0.5 and upto 1.0

• a, number of access slots=3

• k, number of slots in one polling cycle=5

• p, number of polling slots=3

• number of reattempts (backoff)=6

The results are obtained as follows :

1. The figure. 5.1 shows the throughput, delay and the rejection rate of the system

for 64 users and for 32 users. The simulation was carried out for 10000 frames. We have

also considered the CDMA codes as 5 per slot in one case and 2 per slot in another case.

2. The figure. 5.2 shows the same results as figure. 5.1 but this one was obtained for

20000 frames of simulation time.

3. The figure. 5.3 shows the throughput and delay performance for 32/64 users with

5/2 CDMA codes. These results are based on Markov Model, a theoretical approach.

So, from the performance curves, we conclude that the delay is more for more number

of users when the traffic is very high and the rejection rate is very low at this point. The

throughput is almost unity at 0.5 arrival rate for both cases of 5 CDMA codes per slot

and for the 2 CDMA codes per slot. But the rejection rate is very high for 2 CDMA codes

per slot compared to that of 5 CDMA codes per slot. The throughput is almost constant

(� 0.8) when the arrival rate is 0.5 and more. This is because of the RAP protocol where

we have used a = 3, p = 3 and k = 5. The rejection rate is very small but the delay

Page 99: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 84

0 0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

arrival rate

Thro

ughput

0 0.2 0.4 0.6 0.8 10

50

100

150

200

250

300

arrival rate

Dela

y(F

ram

es)

0 0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

Arrival rate

Reje

ction r

ate

Simulation Time = 10000 frames

64 users; 5 codes64 users; 2 codes32 users; 5 codes32 users; 2 codes

Figure 5.1: Performance Curves for the Combined Protocol

Page 100: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 85

0 0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

arrival rate

Thro

ughput

0 0.2 0.4 0.6 0.8 10

50

100

150

200

250

300

arrival rate

Dela

y(F

ram

es)

0 0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

Arrival rate

Reje

ction r

ate

Simulation Time = 20000 frames

64 users; 5 codes64 users; 2 codes32 users; 5 codes32 users; 2 codes

Figure 5.2: Performance Curves for the Combined Protocol

Page 101: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 86

0 0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

arrival rate

Th

rou

gh

pu

t

Computer Simulation

0 0.2 0.4 0.6 0.8 10

5

10

15

20

25

30

35

arrival rate

De

lay(F

ram

es)

Computer Simulation

0 0.2 0.4 0.6 0.8 10.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

arrival rate

Th

rou

gh

pu

t

Mathematical Analysis

0 0.2 0.4 0.6 0.8 1−5

0

5

10

15

arrival rate

De

lay(F

ram

es)

Mathematical Analysis

5 users; 2 codes 32 users; 2 codes64 users; 2 codes

Figure 5.3: Performance Curves for the Combined Protocol obtained from the mathemat-ical analysis.

Page 102: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 87

increases with increasing arrival. We also found that the simulation and the theoretical

results are very closer in range.

5.1 Simulation and Results of the Power Control Al-

gorithm

The simulation works are carried out in C++ computer language and the results are

analysed and plotted using MATLAB. Results were generated using N=128, 1 ≤ K ≤ 20.

It was assumed that the chip period Tc = 1µsec. The PN sequences were generated

randomly. We applied it to wireless local area networks (WLANs) in the 2.4 GHz band

with 26 MHz bandwidth.

The following table 5.1 gives the details about the various simulation parameters:

Table 5.1: Simulation parameters used in MAC Power Control

i d v p fb fc Eb/N0

(movement) (distance) (velocity) (Tx. Power) (bit-rate) (chip-rate)1 100 30 0.1 192000 24384000 102 1000 30 0.05 96000 24480000 81 200 30 0.025 48000 24528000 52 1500 30 0.1 192000 24384000 101 300 30 0.05 96000 24480000 82 2000 30 0.025 48000 24528000 51 400 30 0.1 192000 24384000 102 2500 30 0.05 96000 24480000 81 100 30 0.1 192000 24384000 102 1000 30 0.05 96000 24480000 81 200 30 0.025 48000 24528000 52 1500 30 0.1 192000 24384000 101 300 30 0.05 96000 24480000 82 2000 30 0.025 48000 24528000 51 400 30 0.1 192000 24384000 102 2500 30 0.05 96000 24480000 8

In the table 5.1, i = 1 indicates that the mobile user is moving towards the base station

Page 103: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 88

and i = 2 indicates that the mobile user is moving away from the base station.

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 110

−20

10−15

10−10

10−5

100

data6

Tx Power in Watts

BE

R

12345678

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 110

−20

10−15

10−10

10−5

100

Tx Power in Watts

BE

R

9 10111213141516

Figure 5.4: Analytical results for 16 Users in 0 to 1.0 Watt Tx. Power Range

These results show that when using a correlation receiver, even slight variation in the

received power levels seriously reduce the capacity of the system. So, permitting slight

variations in the received power levels for the transmitted power levels and plotted the

BER (or Eb

N0) graphs (lower and upper bounds) for different users versus time. We also

considered the fading (both short-term and long-term fadings) combined with the path-

loss and analysed the results (We cosidered an average terrain and hot humid areas with

the link reliability for all users as 99.99%. We also assumed that the short-term fading has

been compensated already). The plots for all these are presented here. The discussions

about each plot are as follows:

i) Figures 5.4 and 5.5 show the analytical results for the BER of 16 mobile users in a

single cell environment with 0 to 1.0 Watts and 0 to 1.0 µW transmitted power range

respectively.

ii) Figures 5.6 and 5.7 show the simulation results for the 16 mobile users of their desired

transmitted power levels to maintain their BER constant under no fading and fading

Page 104: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 89

0 0.2 0.4 0.6 0.8 1 1.2

x 10−5

10−20

10−15

10−10

10−5

100

data6

Tx Power in Watts

BE

R

12345678

0 0.2 0.4 0.6 0.8 1 1.2

x 10−5

10−20

10−15

10−10

10−5

100

Tx Power in Watts

BE

R

9 10111213141516

Figure 5.5: Analytical results for 16 Users in 0 to 1.0 µW Tx. Power Range

0 1 2 3 4 5 6 7 8 9 1010

−4

10−2

100

102

TRANSMIT POWER LEVELS FOR 16 Users(without fading)

Time (sec)

Tx

pow

er w

ith c

ontr

ol (

Wat

ts)

12345678

0 1 2 3 4 5 6 7 8 9 1010

−4

10−2

100

102

Time (sec)

Tx

pow

er w

ith c

ontr

ol (

Wat

ts)

9 10111213141516

Figure 5.6: Power control analysis under no fading conditions

Page 105: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 90

0 1 2 3 4 5 6 7 8 9 1010

−5

100

105

TRANSMIT POWER LEVELS FOR 16 Users(with fading)

Time (sec)

Tx

pow

er w

ith c

ontr

ol (

Wat

ts)

12345678

0 1 2 3 4 5 6 7 8 9 1010

−5

100

105

Time (sec)

Tx

pow

er w

ith c

ontr

ol (

Wat

ts)

9 10111213141516

Figure 5.7: Power control analysis under fading conditions

0 1 2 3 4 5 6 7 8 9 1010

−20

10−15

10−10

10−5

100

Time (sec)

BE

R w

ith p

ower

con

trol

BER PERFORMANCE FOR 16 Users(without fading)

12345678

0 1 2 3 4 5 6 7 8 9 1010

−20

10−15

10−10

10−5

100

Time (sec)

BE

R w

ith p

ower

con

trol

9 10111213141516

Figure 5.8: BER analysis under no fading conditions

Page 106: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 91

0 1 2 3 4 5 6 7 8 9 1010

−10

10−5

100

Time (sec)

BE

R w

ith p

ower

con

trol

BER PERFORMANCE FOR 16 Users(with fading)

12345678

0 1 2 3 4 5 6 7 8 9 1010

−10

10−5

100

Time (sec)

BE

R w

ith p

ower

con

trol

9 10111213141516

Figure 5.9: BER analysis under fading conditions

conditions respectively.

iii) Figures 5.8 and 5.9 show the simulation results for the 16 mobile users of their BER

under no fading and fading conditions respectively.

iv) And, finally it can be seen that the analytical results of figures 5.4 and 5.5 and the

simulation results of figures 5.8 and 5.9 are coincident within the limits of approximation.

5.2 Results of the Admission Control of the Protocol

The simulation results for the call-admission control technique are given in figures 5.10

and 5.11. The new call blocking probability is increasing with increasing arrival of both

new calls and the hand-off calls. The CAC performance is better when there is no fading

in the wireless channel.

Page 107: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 92

0 5 10 15 20 25 30 350.3

0.4

0.5

0.6

0.7

0.8

0.9

1

number of new calls arrival

new

cal

ls b

lock

ing

prob

abili

ty

with fading (32 users)

Figure 5.10: New Call Blocking Probability Performance with fading of channel

0 5 10 15 20 25 30 350.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

number of new calls arrival

new

cal

ls b

lock

ing

prob

abili

ty

without fading (32 users)

Figure 5.11: New Call Blocking Probability Performance without fading of channel

Page 108: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 93

5.3 Results of Channel Allocation Scheme of the Pro-

tocol

The simulation results of DCA are given in figures 5.12 and 5.13. The DCA algorithm

performance is better with power control algorithms. The channel blocking probability is

very less with power control compared to the case of without power control. The results

can be tuned for various factors like different classes of traffic (CBR, VBR, etc.), voice

activity factor, and the CDMA processing gain.

0 5 10 15 20 25 30 350

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Number of Users

Chan

nel B

lock

ing

Prob

abilit

y

Without Power Control

Figure 5.12: Channel Blocking Probability without Power Control

0 5 10 15 20 25 30 350

0.1

0.2

0.3

0.4

0.5

Number of Users

Chan

nel B

lock

ing

Prob

abilit

y

With Power Control

Figure 5.13: Channel Blocking Probability with Power Control

Page 109: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 94

5.4 Results of Buffer Management Scheme

The simulation results for the buffer management system are given in figures 5.14 and

5.15. The packet loss probability performance is varied for various suitable optimization

factor P with different arrival rate. The packets loss curves are given for different buffer

threshold levels and so the packets loss can be set at minimum by choosing proper buffer

threshold in the flexible buffers.

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 20

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Parameter, P

Pack

et L

oss

Prob

abilit

y

mean message length = 50

arrival rate=0.1arrival rate=0.5arrival rate=1.0

Figure 5.14: Packet Loss Probability Vs. Buffer Threshold Optimization Parameter

0

2

4

6

8

10

12

14

16

18 20 22 24 26 28 30

Pac

ket L

oss

(num

ber o

f pac

kets

)

Buffer Threshold

"data.dat"

Figure 5.15: Packets Loss Vs. Buffer Threshold

Page 110: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 5. Simulation 95

5.5 Results of Maintenance of Data Transfer during

the Hand-offs

The simulation results of a soft hand-off algorithm are given in figures 5.16 and 5.17.

The hand-off calls blocking probability performance is produced here for both faded and

non-faded wireless channel cases. The power control algorithm reduces the hand-off calls

blocking probability in the faded channel.

0 5 10 15 20 25 30 350.2

0.25

0.3

0.35

0.4

0.45

0.5

number of hand−off calls arrival

hand

−off

calls

blo

ckin

g pr

obab

ility

with fading (32 users)

Figure 5.16: Hand-off Call Blocking Probability Performance with fading of channel

0 5 10 15 20 25 30 350.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

number of hand−off calls arrival

hand

−off

calls

blo

ckin

g pr

obab

ility

without fading (32 users)

Figure 5.17: Hand-off Call Blocking Probability Performance without fading of channel

Page 111: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6

Testing of Protocol in Software

Radio Environment

Software radios have become well known as communication devices for performing most

of the signal processing in software. The use of DS/CDMA (Direct Sequence/Code Divi-

sion Multiple Access) technology in software radio is emerging as a topic of widespread

interest. The key issues in the implementation of software radios in a CDMA system

are the development of wide-band source coders, flexible channel codecs with powerful

error correction and small processing overhead and efficient digital modems with optimal

performance in the presence of Multiple Access Interference (MAI) and Additive White

Gaussian Noise (AWGN). This section gives a brief description of the simulation of certain

specific blocks of a software radio architecture like source coding (Huffman, Shannon-Fano

and PCM), channel coding ((17,9) double error correcting block code, (15,7) double error

correcting BCH code, (2,1) burst error correcting (upto 6 burst errors) convolution code),

digital modulation scheme (BPSK). We have considered a pico cell with a maximum of 7

users and studied the power efficiency of combined channel coding and modulation with

perfect power controlled CDMA system. Thus our simulation of the ”software radio”

has flexibility in choosing the proper channel coders dynamically depending upon the

variations of AWGN channel.

96

Page 112: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 97

6.1 Software Radio and its Layered Architecture

A software radio is a communication device that does all its digital signal processing in

user-level software. Wireless networks are statically specified by their built-in link and

physical layer functions. Conventional software radios effectively use improved analog

to digital converters and digital signal processing on a dedicated hardware, i.e., network

interface card (NIC). Implementing all the link and most of the physical layer functions

in user level software increases the flexibility and makes it possible to dynamically modify

functions such as modulation techniques and multiple access control techniques which are

otherwise fixed in traditional NICs. The signal processing involved in these layers has

been lumped into one layer because of its implementation in dedicated hardware. But to

interoperate with different networks, it may only be necessary to change small parts of

the existing layers. For instance two different computers may employ the same modula-

tion and coding but use different multiple access protocols or a given computer may need

to change the type of coding to dynamically adapt to changing channel conditions. To

facilitate this flexibility and modularity as much of the processing as possible is brought

under software control. New network interfaces can now be created by changing only a

small amount of code [53-60].

We consider a pico cell with fixed users and study the BER performance in an AWGN

channel. The generic block diagram of the software radio is shown in figure 6.1. Certain

specific blocks of these virtual radios (software radios) have been simulated. The layering

presented in figure 6.2, is a refinement of the OSI layering model which subdivides the

existing Data Link and Physical layers. The time to time variations of the AWGN channel

charecteristics are provided to the computers by a control DSP chip and the computers can

choose the type of channel coders dynamically so that optimum performance is achieved

for the applications that are in communication. We consider a DS-SS multiple access

system with BPSK signalling and a correlation receiver. There are K users in the system.

Page 113: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 98

C H A N N E L

InformationSource

InformationSink

Digital Input

Source Bits Channel Bits

Channel Bits

From other

sources

Digital WaveformsBit Stream

Source

EncodingFormatting

Channel

Encoding

Multiplex−

ingEncryption Modulation

Multiple

Access

T

RX

R

XR

Multiple

AccessReceiver

Demodula−

tion

Demulti−

plexing

Channel

Decoding

DecryptionSource

DecodingFormatting Spectrum

Spread

SpreadSpectrum

Transmitter

To other sinks

Digital Output

Sink Bits

Figure 6.1: Software Radio Block Diagram

D A T A L I N K

P H Y S I C A L

D A T A L I N K

P H Y S I C A L

LINK FRAMING LINK FRAMING

MODULATION

MULTIPLE ACCESS MULTIPLE ACCESS

R F TRANSMITTER R F RECEIVER

DEMODULATION

CHANNEL DECODING

LINE DECODING

D/A CONVERSION A/D CONVERSION

LINE ENCODING

CHANNEL ENCODING

COMPUTER A COMPUTER B

Bytes Bytes

Bits Bits

Bits Bits

Symbols Symbols

Discrete Signal Discrete Signal

Discrete SignalDiscrete Signal

Continuous Signal

Continuous Signal

Continuous Signal

Continuous Signal

HARDWARE

SOFTWARE

MEDIUMWIRELESS

Figure 6.2: Software Radio Layering Model

Page 114: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 99

6.2 Source Encoding and Decoding Methods

Analog-to-Digital Convertors (ADCs) and Digital-to-Analog Convertors (DACs) are crit-

ical components of software radios. Advances in processor technology combined with

availability of high density memory and improvement in I/O bandwidth have made soft-

ware approach an increasingly attractive alternative for implementing radio-based sys-

tems. The greatest advantage is high flexibility by allowing the support of a wide range

of modulation and coding schemes. ADCs can now be used to only sample an entire IF

band and the resultant samples streamed into computer’s memory for software processing.

That is the NIC can now be designed to contain the hardware part of A/D, i.e., the sam-

pler, producing discrete analog voltages. Quantisation and encoding can be implemented

in user-level software as shown in the figure 6.3.

S A M P L E R Q U A N T I Z E R E N C O D E R

Bit StreamContinuous-time

signal

Discrete-time

signal

SOFTWAREHARDWARE

Discrete-timesignal

H/S Interface

Figure 6.3: A/D Converter in Software Radio

It is assumed that the input signal has voltage levels lying within +10.0 to -10.0.

In uniform quantization the voltage range is divided into 64 discrete levels of step size

20.0/64. All sampled analog voltages lying within this range are encoded using one of the

source encoding techniques described below.

Page 115: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 100

Pulse code modulation (PCM) encoding scheme at a resolution (number of bits per

sample) of 6 involves assigning a 6 bit code word for the quantized levels in sequence, i.e.,

from 000000 to 111111. The sampled voltage is shifted by adding +10.0. The resultant

voltage is closely approximated to one of the quantized levels and the code corresponding

to that level is assigned to the sample. The serious drawback of this encoding scheme is

that large number of bits have to be handled. For example, if a sample occurs a large

number of times, say 100, then a total of 600 bits must be transmitted.

Huffman and Shanon-Fano encoding algorithms have been used for data compression.

The pdf (probability density function) of the signal must be known and to achieve

data compression, the sample values of the signal must not be uniformly distributed.

Variable length code words are obtained if the pdf is not uniformly distributed. In the

simulation we have assumed that all voltage levels between -10.0 and +10.0 are equally

likely to occur and a fixed probability of 1.0/64 is assigned to each of the quantized levels.

Fixed length code words of 6 bits were obtained as a result.

The Huffman and Shanon-Fano codes have the property that no code word is a prefix

of another code word. Hence decoding algorithm is simple. A lookup table of all possible

codes generated at the transmitter must be maintained at the receiver for decoding. In

the case of PCM fixed length codes and fixed probability case in Huffman and Shanon-

Fano encoding, decoding is done by taking 6 bits at a time and comparing with the set

of 64 possible codes. The position of the code in the table is mapped on to the set of

quantized levels to get the analog voltage. The only error mechanism present in the A/D

convertor is quantizing error.

6.3 Channel Encoding and Decoding Techniques

The data link layer is responsible for error free transmission. It packages the raw bits

from the physical layer into blocks of data (frames) and sends these frames with the

necessary error control to the network layer. A channel code is designed specifically for

Page 116: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 101

error detection, error correction or error prevention. Errors occur primarily in the channel

(wireless medium) due to multipath fading, shadowing, interference, reflections and path

loss and thermal noise interference in the digital hardware. To detect and correct errors

three powerful channel encoding and decoding techniques have been simulated.

The (17,9) Block Code (corrects upto 2 errors):

In this type of coding, the binary message sequence is divided into sequential blocks

each 9 bit long and each 9 bit block is coded into 17 bit block using systematic coding,

i.e., the first 9 bits of the 17 bit block are the message bits and the last 8 bits are the

parity check bits.

Let D = [d1 d2.......dk] be the data vector and C = [c1 c2.......cn] the code vector. G is

a k×n generator matrix defined by G =[Ik P T

], where Ik is a unit matrix of order k.

P is a (n−k)×k co-efficient matrix and P T is the transpose of P. The codes are generated

using the generator matrix as follows C = DG. Let H be a (n−k)×n parity-check matrix

defined by H =[P In−k

]. It is easily verified GHT = 0. Let R denote the received

vector that results from sending the code vector C over the a noisy channel. Let E be the

error vector such that R = C ⊕ E. Atmost t elements of E can be 1 and the remaining

must be 0 for correcting upto t errors. Post multiplying both sides of R = C ⊕ E by HT

and using that CHT = DGHT = 0 we get S = RHT = EHT where S is the syndrome

vector. If E = 0 i.e. no error then S = 0. If a single error has occured then S is identical

to a row of the HT matrix and that particular row position gives the position of the

element in R which is in error. If two errors have occured then S is identically equal to

the sum of some two unique rows of HT and these two row positions give the positions of

the elements in R which are in error. Error correction is simply negating the elements at

these positions. In all operations, addition means modulo 2 addition [61-68].

Decoding by syndrome calculation places restrictions in choosing the coefficient matrix

P. It is necessary that all rows of HT be distinct and the sum of any 2 rows of HT is

unique and not a row of HT . The HT matrix and the P T matrix for (17,9) code is built

Page 117: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 102

by a simple algorithm given below.

a = n-k;

b = k-1;

while(true)

( P T [b] = get new (n-k) bit word;

HT =

P T [b]

In−k

ctr = 0;

for(i=0;i < a+ 1;i++)

( for(j=i+1;j < a+ 1;j++)

( sum[ctr] = HT [a+ 1 + i] +HT [a + 1 + j];

ctr++ ;)

)

for(i=0;i < (a + 1)C2;i++)

( if (sum[i] distinct && �= rows of HT )

( a = a + 1;

b = b + 1;

break;)

else goto P T [b];

)

if (b = 0) break;

)

For (17,9) double error correcting block code the P T matrix is shown below. Any

combination of 7 rows of this matrix can be used in (15,7) double error correcting block

code. (17,9) and (15,7) code have the same error correcting capability but (17,9) is more

bandwidth efficient.

Page 118: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 103

PT =

1 1 1 1 1 1 1 1

0 0 1 0 0 1 1 1

1 0 0 1 0 0 1 1

1 1 0 0 1 1 1 0

1 1 1 1 0 0 0 0

0 1 1 1 1 0 0 1

1 0 0 1 1 1 0 1

1 1 0 0 0 1 0 1

1 0 1 0 1 0 1 1

The (15,7) BCH Code (corrects upto 2 errors):

(15,7) BCH code can correct upto 2 errors and non-systematic coding is used in the

simulation i.e. the message bits cannot be obtained directly from the coded vector. If

D(x) be the message polynomial, C(x) the code polynomial then C(x) = D(x)G(x) where

G(x) is the generator polynomial. The degree of the polynomials C(x) and G(x) are (n-1)

and (n-k) respectively. The generator polynomial of (15,7) BCH code is given by G(x) =

1⊕X4 ⊕X6 ⊕X7 ⊕X8.

If R(x) be the received vector then

R(x) = C(x)⊕ E(x)

E(x) is the error vector and α,α2,α3,.....α2t are the roots of G(x), α being the primitive

element of GF(2m).

R(αi) = C(αi) + E(αi), i = 1,2,3,....,2t.

R(αi) = D(αi)G(αi) + E(αi)

R(αi) = E(αi)

Page 119: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 104

since G(αi) = 0, αi ’s being the roots of G(x). For the (15,7) BCH code m = 4 and t

= 2 in our case.

R(αi) =∑n−1j=0 ejα

i+j,ej = {0,1}.

This set of 2t equations involves only the components of the error pattern E(x). Solving

these 2t non-linear equations for ej the error pattern can be determined. The syndrome

vectors can now be defined as:

Si =∑n−1j=0 ejα

i+j.

In this case i = 1,2,3,4 and j = 0,1,2,......,14 and only 4 syndrome equations need be

solved to locate the error patterns. After computing the syndromes specific steps were

followed for decoding. Firstly, assume that 2 errors have occured in the received data

vectors and then computing the determinant as

∆ =

∣∣∣∣∣∣∣S1 S2

S2 S3

∣∣∣∣∣∣∣.

If ∆ �= 0 then 2 errors have occured in R(x) and

M =

S1 S2

S2 S3

.

Then compute the following matrix

λ1

λ2

= M−1

S3

S4

and the λ values give the eigen values. The roots of the quadratic equation

Page 120: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 105

λ(z) = λ1z2 + λ2z + 1

give the positions at which error has occured. The quadratic equation cannot be solved

using the conventional algebraic method. The quadratic equation first has to be factorised

into 2 factors and the coefficient of z in each factor gives αr where r = 0,1,2,......,14. The

value of r in the two factors gives the positions at which error has occured. But if ∆ = 0

and S1 �= 0 then a single error has occured and M = [S1] and the entire procedure is

repeated. But if S1 = 0 there is no error in the received polynomial. After error detec-

tion and correction the message bits can be recovered by dividing the received, corrected

polynomial by the generator polynomial.

The (2,1) Convolution Code (corrects upto 6 burst errors):

The entire hardware for encoding and decoding of the information bits is simulated.

Initially, before the beginning of encoding all shift-registers are set to zero. The hardware

for the encoder is shown in figure 6.4. There is one sequence of input bits and two se-

quences of output bits, one a duplicate of the input bits and the other is the parity-check

sequence from the output of the EX-OR gate. Bits are transmitted alternately from the

two output sequences.

At the receiver, the received sequence is divided into two sequences, and from the

information bits the parity-check bits are recalculated. These are added (modulo 2 ad-

dition) to the received check bits to form the syndromes. In the absence of errors the

syndrome is a sequence of all zeros. If errors occur, a pattern occurs in the syndrome that

enables with this code the correction of any burst-error of length atmost 6. The hardware

for the decoder circuit is shown in figure 6.5.

The message bits are transmitted serially with continuous processing of information

and it is necessary to maintain an error-free guard space of 19 preceding and following

a block of 6 message bits which is difficult to maintain in a noisy dispersive channel.

Page 121: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 106

Data Bits

Parity Bits

D D D D D D1 2 3 4 5 6

EX-OR

Coded Data Bits

Figure 6.4: Encoder for a (2,1) convolution code

Corrected Data Bits

D D D D D D DD D1 2 3 4 5 6 7 8 9

D D D D D D10 11 12 13 14 15

AND

NOT

EX-OR

Syndromes

EX-OR

Parity Bits

Data Bits

Figure 6.5: Syndrome calculation and error-correction for the convolution code

Page 122: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 107

This coding produces optimum error correction for those channels which produce burst

errors. The tap positions in the encoder and decoder circuitry are determined by the

sub-generator polynomial and the sub-generator polynomial in this simulation is given by

G(x) = 1⊕X3.

6.4 TDMA/CDMA System and Results

The TDMA/CDMA MAC protocol is tested based on the software radio environment

(Digital Modulation Through AWGN, Rayleigh Fading, and Path-loss Channel).

In our TDMA/CDMA system, each user is given SS code for transmitting over the

common channel bandwidth. We make the following assumptions

• Perfect code acquisition and tracking is possible.

• All users in the DS/CDMA system communicate via a common channel bandwidth

using coherent BPSK data modulation at a common carrier frequency fc and data

rate Rb =1Tb, where Tb is the duration of a data bit.

• All users have the same chip rate Rc =1Tc

for their spread spectrum codes, where

Tc is the chip duration.

• The effect of the multiple access interference on the matched filter output of a desired

user will be assumed to be Additive White Gaussian Noise [69, 70].

The results are shown from figure 6.7 to figure 6.23 describing about the perfect power

control of all users’ received powers in the CDMA receiver considering a maximum of 7

users (the user transmits a speech signal as shown in figure 6.6) in the pico cell in an

AWGN channel.

This burst error correcting code should give better results than the block and BCH

code in a channel producing burst errors and is ideal for fading channels. It is necessary to

maintain an error-free guard space of 19 bits preceding and following a block of 6 message

bits in the convolution coding. This is difficult to maintain in a noisy, dispersive channel

Page 123: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 108

0 20 40 60 80 100 120−0.4

−0.3

−0.2

−0.1

0

0.1

0.2

0.3

0.4

Time (msec)

Am

plitu

de

Figure 6.6: Speech Signal of user 1

1 2 3 4 5 6 710

−5

10−4

10−3

10−2

10−1

100

Number of Users

BE

R

Ideal (σN

= 0.0)σ

N = 1.0

σN

= 2.0 σ

N = 3.0

σN

= 4.0 σ

N = 5.0

Figure 6.7: Power Control for uncoded BPSK modulation with different noise varianceσN

Page 124: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 109

1 2 3 4 5 6 710

−5

10−4

10−3

10−2

10−1

100

Number of Users

BE

R

Ideal (σN

= 0.0)σ

N = 1.0

σN

= 2.0 σ

N = 3.0

σN

= 4.0 σ

N = 5.0

Figure 6.8: Power Control for block coded BPSK modulation with different noise varianceσN

1 2 3 4 5 6 710

−5

10−4

10−3

10−2

10−1

100

Number of Users

BE

R

Ideal (σN

= 0.0)σ

N = 1.0

σN

= 2.0 σ

N = 3.0

σN

= 4.0 σ

N = 5.0

Figure 6.9: Power Control for cyclic coded BPSK modulation with different noise varianceσN

Page 125: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 110

1 2 3 4 5 6 710

−5

10−4

10−3

10−2

10−1

100

Number of Users

BE

R

Ideal (σN

= 0.0)σ

N = 1.0

σN

= 2.0 σ

N = 3.0

σN

= 4.0 σ

N = 5.0

Figure 6.10: Power Control for convolution coded BPSK modulation with different noisevariance σN

1 2 3 4 5 6 710

−5

10−4

10−3

10−2

10−1

100

Number of Users

BE

R

Ideal (σN

= 0.0)

Uncoded Block coded Cyclic coded Convolution coded

Figure 6.11: Power Control for different channel coding shemes with BPSK modulationwith noise variance σN = 1.0

Page 126: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 111

1 2 3 4 5 6 710

−5

10−4

10−3

10−2

10−1

100

Number of Users

BE

R

Ideal (σN

= 0.0)

Uncoded Block coded Cyclic coded Convolution coded

Figure 6.12: Power Control for different channel coding shemes with BPSK modulationwith noise variance σN = 2.0

1 2 3 4 5 6 710

−5

10−4

10−3

10−2

10−1

100

Number of Users

BE

R

Ideal (σN

= 0.0)

Uncoded Block coded Cyclic coded Convolution coded

Figure 6.13: Power Control for different channel coding shemes with BPSK modulationwith noise variance σN = 3.0

Page 127: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 112

1 2 3 4 5 6 710

−5

10−4

10−3

10−2

10−1

100

Number of Users

BE

R

Ideal (σN

= 0.0)

Uncoded Block coded Cyclic coded Convolution coded

Figure 6.14: Power Control for different channel coding shemes with BPSK modulationwith noise variance σN = 4.0

1 2 3 4 5 6 710

−5

10−4

10−3

10−2

10−1

100

Number of Users

BE

R

Ideal (σN

= 0.0)

Uncoded Block coded Cyclic coded Convolution coded

Figure 6.15: Power Control for different channel coding shemes with BPSK modulationwith noise variance σN = 5.0

Page 128: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 113

−15 −10 −5 0 5 10

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Uncoded BPSK (analytical)Uncoded BPSK (simulation)without Power Control with Power Control

Figure 6.16: BER for user 1 with uncoded BPSK modulation when only one user is inthe cell

−15 −10 −5 0 5 10

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Uncoded BPSK (analytical)Uncoded BPSK (simulation)without Power Control with Power Control

Figure 6.17: BER for user 1 with uncoded BPSK modulation when seven users are in thecell

Page 129: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 114

−15 −10 −5 0 5 10

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Uncoded BPSK (analytical) Block coded BPSK (simulation)without Power Control with Power Control

Figure 6.18: BER for user 1 with block coded BPSK modulation when only one user isin the cell

−15 −10 −5 0 5 10

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Uncoded BPSK (analytical) Block coded BPSK (simulation)without Power Control with Power Control

Figure 6.19: BER for user 1 with block coded BPSK modulation when seven users are inthe cell

Page 130: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 115

−15 −10 −5 0 5 10

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Uncoded BPSK (analytical) Cyclic coded BPSK (simulation)without Power Control with Power Control

Figure 6.20: BER for user 1 with cyclic coded BPSK modulation when only one user isin the cell

−15 −10 −5 0 5 10

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Uncoded BPSK (analytical) Cyclic coded BPSK (simulation)without Power Control with Power Control

Figure 6.21: BER for user 1 with cyclic coded BPSK modulation when seven users are inthe cell

Page 131: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 116

−15 −10 −5 0 5 10

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Uncoded BPSK (analytical) Convolution coded BPSK (simulation)without Power Control with Power Control

Figure 6.22: BER for user 1 with convolution coded BPSK modulation when only oneuser is in the cell

−15 −10 −5 0 5 10

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Uncoded BPSK (analytical) Convolution coded BPSK (simulation)without Power Control with Power Control

Figure 6.23: BER for user 1 with convolution coded BPSK modulation when seven usersare in the cell

Page 132: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 6. Testing of Protocol in Software Radio Environment 117

and can be avoided by splitting the continuous bit stream at the input of the encoder into

blocks of 6 bits and appending 6 zeros following the least significant information bit to

convert into 12 bit blocks. This is to ensure that all shift-registers are reset to zero and

the message bits are shifted out. The 6 information bits are now dispersed in 24 bits at

the output of the encoder. The continuous processing is now replaced by block processing

where the bits enter the encoder in blocks of 6 bits and leave in blocks of 24 bits. The

data rate is increased by 2 times but at the same time the guard space requirement is not

required and error performance in a bursty channel will be much better.

Page 133: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 7

Conclusions

In this research work, the hybrid TDMA/CDMA protocol combined with RAP has been

proposed to integrate light and heavy traffic that have to be accommodated for mobile

multimedia communications. The proposed protocol is verified by both simulation and

analytical modelling. This gives great advantages over the CSMA, polling, TDMA and

CDMA protocols in comparison to their packet delays and throughput. This proposed

protocol gives more throughput and less packet delay compared other protocols. Since,

the CDMA codes are more expensive and we need more number of CDMA codes in

CDMA system, we use only a minimum of 2 CDMA codes and a maximum of 5 CDMA

codes to get very high throughput and so our system is more economical than other MAC

protocol systems for WLANs. The rejection rate can be brought to very low level by RAP

method when the the arrival rate of users is very high. Thus we have combined the merits

of TDMA, CDMA and polling into a more attractive protocol which is very useful for

the current multimedia WLANs. The protocol performance is also tested by considering

the various digital modulation schemes, channel coding schemes and the various channel

fading conditions and that makes this new protocol system to be more realistic for UMTS

and IMT-2000. [71, 72]

The wideband channel measurement results for an indoor office environment at fre-

quency 2.4 GHz are presented and analytical BER model for the fading is simulated.

i) Path-loss: The parameters of a simple path-loss model have been studied. It can be

118

Page 134: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Chapter 7. Conclusions 119

concluded that this model gives accurate results for LOS situations.

ii). Fading: The short-term and long-term fadings are analysed using well known proba-

bilistic models.

iii) Power control: We found that the system capacity is improved with this Efficient Power

Control Mechanism (EPCM) considering MAI, path-loss and fading. We also found that

the transmitted power levels are within the reasonable limits and that are possible in

practice.

iv) BER results: The BER for a particular user is within the reasonable limit with rea-

sonable transmitted power levels which can change with time as the user moves randomly

with variable data rate (for a given application like voice,video or data). It is concluded

that this power control mechanism has more flexibility in the sytem for a given quality of

service.

v) The results of the analytical model show that the assumptions made in the derivation of

the end equations are correct because the results are more coincident with the simulation

results well within the limits of approximations.

The various applications of this proposed protocols such as Call Admission Con-

trol, Dynamic Channel Allocation, Buffer Management and the Hand-off methods were

simulated and their performance results were obtained in terms of arrival rate of new

calls/hand-off calls and the call blocking probabilities. We have tested the designed MAC

protocol in Software Radio environment and found that the QoS parameters of the pro-

tocol can be tuned to a desired level with this flexbile testing method.

7.1 Future Work

In future it should be possible to install a software radio just by down-loading the software

and with the necessary hardware of the work-station. The final conclusions of this work

for a better future generation multimedia wireless networks are given as follows:

The users should be able to have the features of the 4G MWNs so that they could

communicate at anytime, from anywhere and in anyform. The future wireless networks

may operate in THz frequencies with Gbits of data transmission.

Page 135: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

Bibliography

[1] Arogyaswami Paulraj, ”The Evolution of Mobile Communications”, IETE Technical

Review, vol. 12, no. 5-6, pp. 353-358, Sept./Dec. 1995.

[2] Ashok Jhunjhunwala and Bhaskar Ramamurthi, ”Wireless in Local Loop: Some Key

Issues”, IETE Technical Review, vol. 12, no. 5-6, pp. 309-314, Sept./Dec. 1995.

[3] David Koilpillai and S. Chennakeshu, ”Evolution to Third Generation Cellular”,

International Symposium on Wireless Communications for the Next Millennium

(ISWCM), pp. 27-34, September 1998.

[4] J. G. Proakis, ”Digital communications”, second edition, McGraw - Hill, 1989.

[5] Theodore S. Rappaport, ”Wireless Communications: principles and practice”, Pren-

tice Hall PTR, 1996.

[6] A. Chockalingam, Laurence B. Milstein, and P. Venkataram ,” Analysis of a Me-

dia Access Protocol for Wireless Messaging Systems”, International Conference on

Universal Personal Communication 1996, pp.12-16 , Sept-Oct, 1996.

[7] A. Chockalingam, P. Venkataram and A. Prabhakar, ”Throughput analysis of a class

of multiaccess protocol for packet radio networks with capture effect ”, Proceedings

of the 1991 Singapore International Conference on Networks, pp. 376-381, Sept. 5-6,

1991.

[8] A. Chockalingam, M. Zorzi, L. B. Milstein and P. Venkataram, ”Performance of a

Wireless Access Protocol on Correlated Rayleigh-Fading Channels with Capture”,

IEEE Trans. on Communications, vol. 46, No. 5, pp. 644-655, May 1998.

120

Page 136: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

BIBLIOGRAPHY 121

[9] M. J. McTiffin, A. P. Hulbert, et. al., ”Mobile Access to an ATM Network Using a

CDMA Air Interface”, IEEE J. Select. Areas Commun., vol.12, No.5, pp. 900-908,

June 1994.

[10] A. Chockalingam and L. B. Milstein, ”Capacity of DS-CDMA Networks on Fre-

quency Selective Fading Channels with Open-Loop Power Control”, IEEE Confer-

ence on Communications 1995, vol.2, pp. 703-707.

[11] Floyd Simpson and Jack M. Holtzman, ”Direct Sequence CDMA Power Control,

Interleaving and Coding”, IEEE J. Select. Areas Commun., vol.11, No.7, pp. 1085-1

095, Sept. 1993.

[12] Joseph C. Liberti, Jr. and T. S. Rappaport, ”Analytical Results for Capacity Im-

provements in CDMA”, IEEE Trans. on Vehicular Technology, vol.43, No.3, pp.680-

690, August 1994.

[13] William C. Y. Lee, ”Power Control in CDMA”, 41st IEEE Vehicular Technology

Symposium 1991, Vol.1., pp. 77-80.

[14] Adnan A. Abu-Dayya and Norman C. Beaulieu, ”Outage Probabilities in the Pres-

ence of Correlated Lognormal Interferers”, IEEE Trans. on Vehicular Technology,

vol.43., No.1., pp. 164-173., Feb 1994.

[15] Chae Y. Lee and Taehoon Park, ”A Parametric Power Control with Fast Conver-

gence in Cellular Radio systems”, IEEE Trans. on Vehicular Technology, vol.47.,

No.2., pp. 440-449., May 1998.

[16] Giovan Emanuele, et. al., ”CDMA Cellular Systems Performance with Fading, Shad-

owing, and Imperfect Power Control”, IEEE Trans. on Vehicular Technology, vol.47.,

No.2., pp. 450-459., May 1998.

[17] James S. Lehnert, ”An Efficient Technique for Evaluating Direct-Sequence Spread-

Spectrum Multiple-Access Communications”, IEEE Trans. on Communications, vol.

37, No. 8, August 1989.

Page 137: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

BIBLIOGRAPHY 122

[18] Rick Cameron and Brian Woerner, ”Performance Analysis of CDMA with Imperfect

Power Control”, IEEE Trans. on Communications, vol. 44, No. 7, July 1996.

[19] Ian Oppermann, ”Orthogonal Complex-Valued Spreading Sequences with a Wide

Range of Correlation Properties”, IEEE Trans. on Communications, vol. 45, No.

11, Nov. 1997.

[20] A. Paulraj, ”Code Division Multiple Access for Cellular Wireless Communications”,

Proc. of the Conference on Signal Processing and Communication, I. I. Sc., Banga-

lore, August 1995.

[21] Donald L. Schilling, Laurence B. Milstein and et. al., ”Spread Spectrum for Com-

mercial Communications”, IEEE Communications Magazine, pp. 66-78, April 1991.

[22] H. Taub and D. L. Schilling, ”Principles of Communication Systems”, Second Edi-

tion, McGraw-Hill, New York, 1986.

[23] Shrirang Jansi and L. F. Marakas, ”Performance Analysis of Reservation Random

Access Protocols for Wireless Access Networks”, IEEE Trans. on Communications,

vol. 42, No. 2/3/4, pp. 1223-1234, Feb./Mar./April 1994.

[24] Shinsuke Hara and Norihiko Morinaga, ”Throughput Analysis for Random Access

Protocols in a Mobile Radio Packet Network”, IEEE GLOBECOM, pp. 113-118,

Nov./December 1993.

[25] Josef Fuhl and Andreas F. Molisch, ”Capacity of Enhancement and BER in a Com-

bined SDMA/TDMA System”, Proc. of IEEE Vehicular Technology Conference, vol.

3, pp. 1481-1485, 1996.

[26] Krister Raith, and Jan Uddenfeldt, ”Capacity of Digital Cellular TDMA Systems”,

IEEE Trans. on Vehicular Technology, vol. 40, no. 2, pp. 323-332, May 1991.

[27] D. J. Goodman, R. A. Valazuella, K. T. Gayliard and B. Ramamurthi, ”Packet

Reservation Multiple Access for Local Wireless Communication”, IEEE Trans. on

Communications, vol. 37, No. 8, pp. 885-890, August 1989.

Page 138: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

BIBLIOGRAPHY 123

[28] Xiaoxin Qin and Victor O. K. Li, ”A Unified Performance Model for Reservation-

Type Multiple Access Scheme”, IEEE Trans. on Vehicular Technology, vol. 47, No.

1, pp. 173-189, February 1998.

[29] Roman Pichna, Qiang Wang and Vijay K. Bhargava, ”Performance of Cellular

Packet CDMA Carrying Two Types of Traffic”, IEEE PACIFIC RIM Conference

on Communications, Computers, and Signal Processing, pp. 453-456, May 1995.

[30] B. P. Crow, I. Widjaja, et. al., ”IEEE 802.11 Wireless Local Area Networks”, IEEE

Communications, vol. 35, No. 9, pp. 116-126, September 1997.

[31] Kwang-Cheng Chen, ”Medium Access Control of Wireless LANs for Mobile Com-

puting”, IEEE Network, vol. 8, No. 5, pp. 50-63, Sept./October 1994.

[32] David F. Bantz and Frederic J. Bauchot, ”Wireless LAN Design Alternatives”, IEEE

Network, vol. 8, No. 2, pp. 43-53, March/April 1994.

[33] Richard O. LaMaire, Arvind Krishna, Pravin Bhagwat and James Panioa, ”Wireless

LANs and Mobile Networking : Standards and Future Directions”, IEEE Commu-

nications, vol. 34, No. 8, pp. 86-94, August 1996.

[34] J. L. Sobrinho and J. M. Brazio, ”Proposal and Performance analysis of a multiple-

access protocol for high-speed wireless LANs”, Computer Networks and ISDN Sys-

tems, vol. 28, No. 3, pp. 283-305, January 1996.

[35] Savo Glisic, and Jukka Vikstedt, ”Effect of Wireless Link Characteristics on Packet-

Level QoS in CDMA/CSMA Networks”, IEEE Jl. on Select. Areas in Communica-

tions, vol. 16, no. 6, pp. 875-889, Aug. 1998.

[36] Ashish Verma and P. Venkataram, ”Performance of Centralized Bandwidth Reser-

vation Protocol in AVPNs”, Jl. of Computer Communications Review, vol. 27, No.

3, pp. 48-66, July 1997.

Page 139: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

BIBLIOGRAPHY 124

[37] Anirban Roy and P. Venkataram, ”A Multiple Access Scheme for VBR Traffic in

Broadband Wireless Local Communication”, Jl. of Computer Communications, vol.

22, No. 4, pp. 353-360, March 1999.

[38] G. R. J. Linnenbank, P. Venkataram, and et.al., ”A Request-TDMA Multiple-Access

Scheme for Wireless Multimedia Networks”, Proc. of IEEE Third Symposium on

Communications and Vehicular Technology in the Benelux, pp. 20-27.

[39] D. Rajaveerappa, ”Simulation Models of Hybrid MAC Protocols for Multimedia

Wireless Networks”, National Conference on Technology Convergence for Informa-

tion, Communications & Entertainment (NICE-2001), IETE Cochin Chapter, pp.

177-182, Feb. 2001.

[40] D. Rajaveerappa and P. Venkataram, ”TDMA/CDMA System Combined with RAP

for Multimedia Wireless Networks”, International Conference on Information, Com-

munications and Signal Processing (ICICS’99), Singapore, Dec. 1999.

[41] D. Rajaveerappa and P. Venkataram, ”An Efficient Power Control Mechanism for

Cellular Communications”, IEEE International Symposium on Communications for

the Next Millennium (ISWCM’98), NewDelhi, pp. 16-22, Sept. 1998.

[42] D. Rajaveerappa and P. Venkataram, ”Performance Analysis of an Efficient Power

Control Mechanism for Cellular Communications”, IETE (Institution of Eletronics

and Telecommunication) Journal of Research, pp. 481-488, vol. 46, No. 6, Nov./Dec.

2000.

[43] D. Rajaveerappa, ”Path-loss and Fading Models for a Perfect Power Controlled

DS/CDMA Cellular Mobile Communication System”, Proceedings of Seventh Na-

tional Symposium on Antennas & Propagation (APSYM-2000), pp. 195-200, Dec.

2000.

[44] Wha Sook Jeon and Dong Guen Jeong, ”Call Admission Control for Mobile Mul-

timedia Communications with Traffic Asymmetry between Uplink and Downlink”,

IEEE Trans. on Vehicular Technology, vol. 50, no. 1, pp. 59-66, January 2001.

Page 140: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

BIBLIOGRAPHY 125

[45] Zbigniew Dziong, Ming Jia, and Paul Mermelstein, ”Adaptive Traffic for Integrated

Services in CDMA Wireless-Access Networks”, IEEE Journal on Selected Areas in

Communications, vol. 14, no. 9, pp. 1737-1747, Dec. 1996.

[46] Jose R. Gallardo, Dimitrios Makrakis, and Marlenne Angulo, ”Dynamic Resource

Management Considering the Real Behavior of Aggregate Traffic”, IEEE Trans. on

Multimedia, vol. 3, no. 2, pp. 177-185, June 2001.

[47] Xiaoxin Qiu, Kapil Chawla and et. al., ”Network-Assisted Resource Management

for Wireless Data Networks”, IEEE Jl. on Selected Areas in Communications, vol.

19, no. 7, pp. 1222-1234, July 2001.

[48] Min Wu, Robert A. Joyce and et. al., ”Dynamic Resource Allocation via Video

Content and Short-Term Traffic Statistics”, IEEE Trans. on Multimedia, vol. 3, no.

2, pp. 186-199, June 2001.

[49] Yan Xu, Yilin Chang and Zengji Liu, ”Calculation and Analysis of Compensation

Buffer Size in Multimedia Systems”, IEEE Communications Letters, vol. 5, no. 8,

pp. 355-357, August 2001.

[50] Carlos Olivera, Jaime Bae Kim, and Tatsuya Suda, ”An Adaptive Bandwidth Reser-

vation Scheme for High-Speed Multimedia Wireless Networks”, IEEE Jl. on Select.

Areas in Communications, vol. 16, no. 6, pp. 858-874, Aug. 1998.

[51] Szu-Lin Su, Jen-Yeu Chen, and Jane-Hwa Huang, ”Performance Analysis of Soft

Handoff in CDMA Cellular Networks”, IEEE Journal on Selected Areas in Commu-

nications, vol. 14, no. 9, pp. 1762-1769, Dec. 1996.

[52] Dong-Jun Lee and Dong-Ho Cho, ”Performance Analysis of Channel-Borrowing

Handoff Scheme Based on User Mobility in CDMA Cellular Systems”, IEEE Trans.

on Vehicular Technology, vol. 49, no. 6, pp. 2276-2285, November 2000.

[53] Marvin K. Simon, Sami M. Hinedi, William C. Lindsey, ”Digital Communication

Techniques”, first edition, Prentice Hall of India, 1999.

Page 141: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

BIBLIOGRAPHY 126

[54] Vanu G . Bose, Alok B. Shah, and Michael Ismert, ”Software Radios for Wireless

Networking”, IEEE Infocom, pp. 1030-1036, 1998.

[55] Vanu G. Bose, Michael Ismert, Matt Welborn, and John Guttag, ”Virtual Radios”,

IEEE J. select. areas commun., vol. 17, No.4, pp. 591-601, April 1999.

[56] James E. Gunn, Kenneth S. Barron, and William Ruczczyk, ”A Low-Power DSP

Core-Based Software Radio Architecture”, IEEE J.select.areas commun., vol.17,

No.4, pp. 574-590, April 1999.

[57] Robert H. Walden, ”Analog-to-Digital Converter Survey and Analysis”, IEEE J.

select.areas commun., vol. 17, No. 4, pp. 539-550, April 1999.

[58] Thierry Turletti, Hans J. Bentzen, and David Tennenhouse, ”Toward the Software

Realization of a GSM Base Station”, IEEE J. select.areas commun., vol. 17, No. 4,

pp. 603-612, April 1999.

[59] J. Das, S. K. Mullick, and P. K. Chatterjee, ”Principles of Digital Communications”,

first edition, Wiley Eastern Limited, 1986.

[60] W. Wesley Peterson, ”Error Correcting Codes”, first edition, M.I.T. Press and John

Wiley & Sons Inc., 1961.

[61] George R. Cooper and Clare D. McGillem,”Modern Communications and Spread

Spectrum”, first edition, 1986.

[62] Simon Haykin, ”Communication Systems”, third edition, John Wiley & Sons Inc.

[63] Martin S . Roden, ”Digital Communication Systems Design”, second edition,

Prentice-Hall International Inc., 1985.

[64] Tri T. Ha, ”Digital Satellite Communications”, second edition, McGraw-Hill Inter-

national Edition, 1989.

[65] A. Bruce Carlson, ”Communication Systems”, third edition, McGraw-Hill Interna-

tional Edition.

Page 142: Design and Development of a Hybrid TDMA/CDMA MAC Protocol

BIBLIOGRAPHY 127

[66] K. Feher, ”Wireless Digital Communications”, Prentice Hall of India, 1995.

[67] Kambiz C. Zangi and R. David Koilpillai, ”Software Radio Issues in Cellular Base

Stations”, IEEE Journal on Selected Areas in Communications, vol. 17, no. 4, pp.

561-573, April 1999.

[68] Joseph B. Evans, Gary J. Minden, K. S. Shanmugham, et. al., ”The Rapidly De-

ployable Radio Network”, IEEE Journal on Selected Areas on Communications, vol.

17, no. 4, pp. 689-702, April 1999.

[69] M. Sridharan and D. Rajaveerappa, ”Software Radios with Flexible Channel Coding

for a Perfect Power Controlled DS/CDMA System in an AWGN Channel”, The Fifth

CDMA International Conference (CIC-2000), South Korea, pp. 24-28, vol. 2, Nov.

2000.

[70] M. Sridharan and D. Rajaveerappa, ”Software Radios for Mobile Computing in

an AWGN Channel”, International Conference on Advanced Computing (ADCOM-

2000), pp. 301-304, Dec. 2000.

[71] K. Manikandan and D. Rajaveerappa, ”Design and Development of an Efficient

Power Control Module for DS-CDMA Multimedia Wireless Networks in an AWGN,

Path-loss, Rayleigh Fading Channel”, Proceedings of The 8th National Symposium

on Antennas and Propagation (APSYM-2002), pp. 357-360, Dec., 2002.

[72] D. Rajaveerappa and M. Sreenivasan, ”Design and Development of a Hybrid

SDMA/CDMA MAC Protocol for Wireless Mobile Computing Networks”, The

Sixth International Conference/Exhibition on High Performance Computing in Asia-

Pacific Region (HPC ASIA 2002), pp. 561-562, vol.2, Dec., 2002.