OEC OCDMA

download OEC OCDMA

of 23

Transcript of OEC OCDMA

  • 8/6/2019 OEC OCDMA

    1/23

    MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 20021

    Optical CDMA with Optical Orthogonal CodeSANGWOOK HAN

    [email protected] of Electrical and Computer Engineering

    The University of Texas at AustinAustin, TX 78712

    Abstract - This report examines optical CDMA communi-cation techniques with optical orthogonal codes. Simulationsthat show the desired properties of theses codes and their usein optical CDMA are reported. Based on the simulations, weinvestigate the properties of optical CDMA. Probability of error is also evaluated.

    I. INTRODUCTION

    There have been many efforts to take the full advantageof fiber-optic signal processing techniques to establish anall optical CDMA communication systems since CDMAwas first applied to the optical domain in the mid-1980sby Prucnal, Salehi, and others [1-3]. Traditional fiberoptic communication systems use either TDMA orWDMA schemes to allocate bandwidth among multiple

    asynchronously, without centralized control, and it doesnot suffer from packet collisions. As a result, opticalCDMA systems have lower latencies than TDMA orWDMA. Furthermore, since time and frequency (orwavelength) slots do not need to be allocated to eachindividual user, significant performance gains can beachieved through multiplexing. Also, TDMA and

    WDMA systems are limited by hardware because of theslot allocation requirements. In contrast, CDMA systemsare only limited the tolerated bit error rate relationship tothe number of users, affording the designer a much moreflexible network design [4] .

    To establish the optical CDMA, we have to overcomethe code orthogonality problem. Many researchers have

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    2/23

    g y p y

    MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 20022

    the following two properties [5].1) The Auto-Correlation Property:

    at

    n

    t t x x +

    =

    1

    0

    (1)

    for any x C and any integer t, 0

  • 8/6/2019 OEC OCDMA

    3/23

    MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 20023

    Transmitting Part

    (a)

    (b) (c)

    Receiving Part

    (a)

    (b) (c)

    4

    4.5

    5

    4

    4.5

    5

    50 100 150 200 250 300 3500

    0.5

    1

    1.5

    2

    2.5

    3

    3.5

    4

    4.5

    5

    50 100 150 200 250 300 3500

    .5

    1

    1.5

    2

    .5

    3

    .5

    4

    .5

    5

    4

    4.5

    5

    4

    4.5

    5

    1 2 3 4 5 6 7 8 90

    0.5

    1

    1.5

    2

    2.5

    3

    3.5

    4

    4.5

    5

    1 2 3 4 5 6 7 8 90

    0.5

    1

    1.5

    2

    2.5

    3

    3.5

    4

    4.5

    5

    OPTICAL

    H

    I

    OpticalDecoder

    OpticalDecoder

    OOC 1

    RecoveredSignal

    RecoveredSignal

    ++

    ++

    OOC 2

    G

    J

    K

    Sum

    OpticalEncoder

    OOC 1

    OpticalEncoder

    OOC 2

    User 1

    User 2

    C

    D

    A

    B

    E

    F

    G

    OPTICAL

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    4/23

    MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 20024

    can be discarded by choosing relevant threshold value.But when total number of users goes up, the cross-correlation due to interfering users adds up quickly toseverely degrade the system performance. For instance,when w is 4 like this case, accommodating 4 users make i tpossible to have 4 as the correlation value even if theintended transmitter s information bit is 0. To avoid this

    phenomenon, both high w which can be considered as thesum of 1s in the sequence, and long n are required. If weincrease only w fixing n, cross-correlation value due tothe interference can be lowered. However, OOC has verysparse marks to keep the cross-correlation low, i.e. anumber of zeros is much higher than that of ones in thesequence. It means that cross-correlation increases byitself by increasing only w. Therefore, both w and n should be increased simultaneously. But this solution alsoreveals a drawback, long signal processing time due tolong n.

    Finally the transmitted information is extracted bythresholding the correlator output in Fig. 4 (d) and (e). Inthis case, they are successfully recovered as intended.Here, 3 is chosen as the threshold values. Threshold issuewill be covered in detail in the section II.2.

    scheme for synchronization. Therefore, now we can saythat optical CDMA does need no network synchronization.

    II.2. K -User Synchronous Channel

    In the previous section, we investigated a simple 2-userchannel to understand the optical CDMA. In this section,

    we explore problems faced by increasing K (Fig. 6 a).Here we choose 7 as K , and C is (43, 3, 1, 1) having 7 set s,{{0, 1, 19}, {0, 2, 22}, {0, 3, 15}, {0, 4, 13}, {0, 5, 16},{0, 6, 14}, {0, 7, 17}}.

    The first issue is a threshold value. As we saw in theprevious section, interfering signal can be effectivelydiscarded by setting a relevant threshold value. Thethreshold value can be chosen under the followingcondition.

    wthreshold 0 (4)

    Fig. 6 (d) through (g) show results from several thresholdvalues, 1, 2, 3, and 5. As the threshold value goes up, therecovered signal gets similar to the ideal signal in Fig. 6(c). However, the threshold value can not be over w. If theintended information bit is 1, the correlation value is w.Therefore, the threshold over w incorrectly converts it to

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    5/23

    MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 20025

    (a)

    (b) (c)

    (a)

    (b)

    (c) (d)

    6

    7

    8

    5 0 10 0 15 0 200 2 50

    3000

    1

    2

    3

    4

    5

    6

    7

    8

    6

    7

    8

    50 100 150 2 00 250 3000

    1

    2

    3

    4

    5

    6

    7

    8

    1

    1.5

    1

    1.5

    50 100 1 50 200 2 50 3000

    0.5

    1

    1.5

    0 50 1 00 150 200 250 300

    3500

    1

    2

    3

    4

    5

    6

    7

    8

    ..

    .

    H J

    OpticalDecoder

    OOC 1

    RecoveredSignal

    + +

    OpticalDecoder

    OOC K

    RecoveredSignal

    + +

    G

    OpticalDecoder

    OOC

    RecoveredSignal

    + +

    J H G

    ?

    OpticalDecoder

    OOC

    RecoveredSignal

    + +

    HardLimiter

    J HG?

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    6/23

    MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 20026

    IV. PROBABILITY OF E RROR

    The probability of error per bit is defined as

    PE = p ( LI th | b=0)? p (b=0)+ p ( LI < th | b=1) ? p(b=1) (6)

    where PE , LI , th , and b are the probability of error, lightintensity, threshold, and intended binary information bit,respectively. Here, an interesting point is that p ( LI < t h |b=1) is always equal to zero because p ( LI < t h |b=1)= p (w+I < t h) = p (w+ I -th

  • 8/6/2019 OEC OCDMA

    7/23

    Interference Avoidance in Optical CDMA Networks

    Purushotham KamathAdvisors: Joseph D. Touch and Joseph A. Bannister

    USC/ISIMarina del Rey, CA 90292

    {pkamath, touch, joseph }@isi.edu

    Abstract Interference Avoidance is a media access controlmechanism that prevents throughput degradation in a broadcast

    all optical Local Area Network (LAN) built on optical CodeDivision Multiple Access (CDMA) technology. Optical CDMA isa multiplexing technology that allows the utilization of the largetransmission capacity of an optical ber. However, the throughputof an optical CDMA broadcast LAN network degrades quicklydue to multiuser interference. Interference Avoidance controlsinterference and prevents throughput degradation due to interfer-ence at high loads. It is based on two mechanisms: state estimationand transmission scheduling . Algorithms for state estimation andtransmission scheduling are proposed and evaluated. Analysisand simulation show how they prevent degradation of throughputat high loads. A testbed implementation of state estimation andtransmission scheduling hardware is in progress.

    I. INTRODUCTION

    Optical CDMA is a code division multiplexing technologythat allows several transmitters to transmit simultaneously on

    i l b N d i i d d f O

    Fig. 1. Interference avoidance

    If the receiver is currently receiving a packet, this kind of false

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    8/23

    III . S TATE ESTIMATION

    Assume that several nodes on an optical CDMA LANare transmitting simultaneously on different codewords. Each

    codeword is shifted by a different phase shift that depends onthe exact instant it was transmitted. The state of the line ata point on the line is the sum of the codewords taken over awindow of N chips. E.g. , in Figure 1(c), the state of the lineis [0120111].

    Arrivals and departures of packets continuously changethis state of the line. The on-off keying of the codewordsalso changes the state of the line. The objective of stateestimation is to determine the true state , i.e. the sum of the

    codewords being transmitted with appropriate phase shifts. Awindow based state estimation algorithm can give a reasonableestimate of the true state of the line. The node determines thestate by sampling the line. This is called the sensed state Thisis repeated for a window of time, say W bits. The estimatedstate is twice the average of the sensed states taken overover the window. State estimation can be either performedcontinuously or on-demand , i.e. when a packet arrives.

    The performance of an on-demand window based state es-

    timation algorithm has been measured through simulation andthe results of system performance are described in Section V.State estimation hardware needs to be implemented using

    sampling over several bits because chips are arriving fasterthan the maximum electronic processing rate. The hardwarefor state estimation is currently being implemented.

    0

    0.2

    0.4

    0.6

    0.8

    1

    0 0.2 0.4 0.6 0.8 1

    N o r m a l i z e d t h r o u g h

    p u

    t

    Normalized offered load

    Throughput vs. offered load for different Transmission Scheduling algorithms

    No transmission schedulingPseudo-cooperative

    SelfishCooperative

    Fig. 2. Throughput vs. offered load for different transmission schedulingalgorithms for simulation of a star network using a (10, 3, 2) codeset. Acontinuous window based state estimation algorithm was used with sensingwindow = 10 bits. Four transmission scheduling algorithms were evaluated:Sel sh, Pseudo-cooperative, Cooperative and None (Aloha-CDMA). A 1persistent defer algorithm was used with a retry limit of 10.

    transmission scheduling hardware is currently being imple-mented.

    V. S YSTEM PERFORMANCEThe performance of an Interference Avoidance system is

    dependent on a large number of factors such as trafc patternsand network topology. An analysis based on Poisson arrivals,exponentially distributed packet lengths random codewordassignment, perfect state estimation may be found in [2].Fi 2 h h l f li i i l i h

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    9/23

    ISI-TR-2006-617 1

    Algorithms for Transmission Scheduling

    in Optical CDMA NetworksPurushotham Kamath, Joseph D. Touch, Joseph A. BannisterUSC/ISI

    4676 Admiralty WayMarina del Rey, CA 90292

    {pkamath, touch, joseph }@isi.edu22nd May 2006

    Abstract Transmission scheduling is a media access controlmechanism that prevents degradation of throughput in opticalCDMA Local Area Networks (LANs) at high offered load. OpticalCDMA is a multiple access technique for broadcast opticalLocal Area Networks. The throughput of an optical CDMALAN at high offered load is limited by multi-user interference. Interference Avoidance , a distributed, contention based mediaaccess control mechanism, can prevent throughput degradation

    at high loads. Interference avoidance consists of state estimationand transmission scheduling . This work analyzes algorithms fortransmission scheduling under perfect state estimation. The anal-ysis shows that transmission scheduling under specic conditionscan provide upto 30% network throughput at high offered load.This compares well to non scheduled systems which have closeto zero throughput under the same conditions. Simulations showthat the performance of transmission scheduling is independent of

    The throughput of an optical CDMA LAN is limited bymulti-user interference. When several users transmit simul-taneously, their packets and hence their codewords overlap.When the optical pulses in the codeword overlap, their opticalpower is added. Optical pulses from one codeword can bedetected by receivers tuned to other codewords. As a resultreceivers may falsely detect their codewords resulting in packeterrors. These false positive errors increase with offered load,resulting in throughput collapse.

    Interference Avoidance is a contention media access controlmechanism that prevents throughput collapse in optical LANsnetworks at high offered load. It consists of state estimationand transmission scheduling State estimation is a mechanism

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    10/23

    ISI-TR-2006-617 2

    2

    1

    Node

    Receive fiberTransmit fiber

    3

    M13101021 (Line)

    0 1 0 0

    1 0 1 0

    ( C 2 )

    1 1 1 0 0 0 0 0 ( C 0 )

    01000011 (C1)

    Fig. 1. Typical optical CDMA LAN topology. Nodes are connected bytransmit and receive bers to a passive optical coupler in a star topology.

    I I . B ACKGROUND

    This section provides background on optical CDMA LANarchitecture, codeset design and receiver design.

    A. Optical CDMA LAN architecture

    The optical CDMA network considered in this work is ashared medium, packet switched, multiple access LAN. Thephysical layer is optical CDMA that uses unipolar encodingand intensity modulation over a single wavelength.

    allows the node to identify that a frame destined for it hasarrived and where the rst bit of the frame begins.

    B. Optical CDMA codeset design

    An Optical Orthogonal Codeset (OOC) is a set of (0,1)sequences of length N that satises correlation constraints [3].The term codeset is used to refer to the set of sequences, andthe term codeword is used for a member of the set. Each 0 or1 of a sequence is called a chip , and the codeword represents adata bit . For any two codewords in the codeset, the correlationconstraints are:

    N 1

    n =0 s ( i,n + ) s ( j,n )= w when i = j, = 0 otherwise

    where s ( i,n ) is the n th chip of the i th codeword, additionis modulo N and 0 N 1. is called the Maximum Collision Parameter . The number w of 1 chipsof a codeword of the codeset is called its weight. A particularcodeset is specied by the parameters (N,w, ). The size Sof the codeset is the number of codewords in the codeset.Codesets with all codewords having the same weight are called

    constant weight codesets. [3] and [4] describe several codesetconstruction methods. The codesets used in this work areconstant weight codesets generated by the greedy constructionmethod [3]. The rate at which individual chips are transmittedis called the chipping rate B . The rate at which the data bitsare transmitted is called the data rate . The chipping rate isN times the data rate The codewords are pseudo orthogonal

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    11/23

    ISI-TR-2006-617 3

    Control

    TDL

    TDL

    TDLSplitter Coupler

    Thresholddetector

    Photo-detector

    Hard-limiter

    Receivefiber

    1

    11

    111

    323

    1 11101111 1

    Fig. 2. Optical CDMA receiver: The gure shows a hard-limiting correlationdetector that consists of a hard-limiter, decoder, photo-detector and a thresholddetector. The receiver is tuned to the codeword 1110000. The power in the1st , 2nd and 3rd chip positions is summed by the decoder. The photo-detectorconverts the signal to an electrical signal and the threshold detector detects a1 bit.

    III . I NTERFERENCE AVOIDANCE

    This section denes the transmission scheduling problemand discusses algorithms for transmission scheduling. Firstit discusses the the problem of interference, the need for

    (a)

    (b)

    00000000 C0 (0 bit)

    01010010

    1100010

    10311111

    0

    C2

    C1

    Line

    t=0 1 2 3 4 5 6 7 8 9 10

    00100110 C3

    01010010

    1100010 0

    C2

    C1

    t=0 1 2 3 4 5 6 7 8 9 10

    10421112 Line

    00110001 C0 (1 bit)

    00100110 C3

    Fig. 3. A bit error. In (a) C0 is OFF. Codewords C1 and C2 have chip overlapswith the 1 chips of C0 . A false positive error will occur at the receiver. In(b) C0 is ON, so no false positive error will occur.

    from an (8, 3, 3) codeset 2 . The gure is a snapshot of data

    bits on an optical ber sent by four nodes. Their combinedsignal on the line is indicated below the codewords. C0 ithe codeword being received. C1 and C2 have 1 chips thatoverlap with C0 s 1 chips. Figure 3(a) shows the case when a0 data bit is transmitted by the node sending C0 . Figure 3(b)shows the case when a 1 data bit is transmitted. In (a)the receiver will erroneously detect a codeword ( C0 ) because

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    12/23

    ISI-TR-2006-617 4

    (a)

    (b)

    01010010

    1100010 0

    C2

    C1

    t=0 1 2 3 4 5 6 7 8 9 10

    10421112

    00100110 C3

    00110001 C0 (1 bit)

    Line

    t=0 1 2 3 4 5 6 7 8 9 10

    01010010

    1100010

    00110001

    0

    C2

    C1

    C0 (1 bit)

    11141112

    00100110 C3

    Line

    Fig. 4. An interference error is caused in C0 in (a). No error is caused whenthe same codewords are sent with a different set of chip offsets. (b) showscodeword C0 delayed by 1 chip time

    B. Interference Avoidance media access control

    Interference Avoidance is a contention media access con-trol (MAC) protocol. Each node on the network contendsfor access to the medium using the Interference Avoidanceprotocol. Figure 5 shows a block digram of an InterferenceAvoidance Network Interface Card. It consists of an optical

    Bus(from node

    processor)

    Optical CDMAReceiver

    Transmitbuffer

    Stateestimation

    module

    Transmissionscheduling

    module

    Stateobservation

    module

    Optical CDMATransmitter

    Receivebuffer

    Transmit

    fiber(to coupler)

    Receivefiber

    (fromcoupler)

    Bus(to node

    processor)

    Fig. 5. Block diagram of an Interference Avoidance Network Interface Card.

    C. Optical CDMA State and State Estimation

    The signal at any time at any point on the receive ber of an optical CDMA LAN is a multilevel signal due to the sumof the codewords. The state of the line is a vector of lengthN equal to the sum of the codewords at output of the couplerassuming that all nodes are transmitting 1 bits.

    S (t) = [ s0 s1s2 ....s N 1] =M

    i =0

    rot (C i , i )

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    13/23

    ISI-TR-2006-617 5

    ctx Codeword to be transmittedstate State estimatehstate hardlimit (state )t d 0for offset = 0 to N

    if (hstate & ctx = ctx ) thenmark offset as a feasible offset

    rotate ctx to the right by one chipt d any feasible offset

    TABLE I

    T HE P URE SELFISH TRANSMISSION SCHEDULING ALGORITHM

    transmission can be scheduled, then the scheduling algorithmreturns an offset k such that 0 k < N . The offset isthe number of chips that the packet transmission should bedelayed. The offset is measured with respect to the estimatedstate of the line. If transmission is not possible, then the packettransmission is deferred by returning it to a higher layer fora retransmission attempt. Other defer mechanisms such as1, non and p-persistent sensing [7] may also be used. Thetransmitting node does not have a receiver to detect errors in

    its transmitted packet during transmission. Therefore packetswhich experience interference errors during transmission aretransmitted until completion. Transmission scheduling is doneon a per packet basis.

    This work assumes perfect state estimation by all nodes onthe network. In perfect state estimation, every node knows thestate of the line. All nodes see the same state at the same time.

    ctx Codeword to be transmittedstate State estimatehstate hardlimit (state )t d 0for offset = 0 to N

    if (hstate & ctx = ctx ) thennewstate = state + ctxnumoverlaps = overlaps (newstate )if (numoverlaps < threshold )

    mark offset as a feasible offsetrotate ctx to the right by one chip

    t d any feasible offset

    TABLE II

    T HE T HRESHOLD TRANSMISSIONSCHEDULING ALGORITHM

    erative strategy if the node schedules its transmission only if it Preserves self/Preserves others or Destroys self/Preservesothers . Simple implementations of cooperative strategy areeither not feasible for all codesets or result in low throughput.A pseudo-cooperative strategy attempts to reduce the proba-bility of destroying other packets on the line. It is a best effortstrategy which increases the probability of the events Preserves

    self/Preserves others or Destroys self/Preserves others .The following sections discuss three transmission schedul-ing algorithms: Pure selsh, Threshold and Overlap sectionscheduling . The transmission scheduling algorithms imple-ment either selsh or pseudo-cooperative strategies or both.The section compares their performance to Aloha-CDMA i.eoptical CDMA without any media access control

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    14/23

    ISI-TR-2006-617 6

    ctx Codeword to be transmittedstate State estimatehstate hardlimit (state )t d 0for offset = 0 to N

    if (hstate & ctx = ctx ) thennewstate = state + ctxnumoverlaps = overlaps (newstate )numones = ones (newstate )if (numoverlaps < numones )

    mark offset as a feasible offsetrotate ctx to the right by one chip

    t d any feasible offset

    TABLE III

    T HE OVERLAP SECTION TRANSMISSION SCHEDULING ALGORITHM

    selsh algorithm. A simulation study is used to validate themathematical analysis.

    The metric used to evaluate performance is the normalizednetwork throughput at different values of the normalizedoffered load. The normalized offered load is the arrival rate(in packets/s) expressed as a fraction of the maximum possiblearrival rate (in packets/s) of the network when it is used asa single channel network 3 . The arrival rate is dened as theaggregate rate at which packets arrive to all the nodes fortransmission on the network. The normalized network through- put is the ratio of the number of packets that are transmittedover the network without error to the total number of packetsoffered for transmission multiplied by the normalized offered

    0

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

    N o r m a

    l i z e

    d n e

    t w o r k

    t h r o

    u g

    h p u

    t

    Normalized offered load

    Threshold schedulingOverlap section scheduling

    Pure selfish schedulingAloha-CDMA

    Fig. 6. Comparison of the performance of the transmission schedulingalgorithms based on analysis. The trafc model is Poisson arrivals with expo-nentially distributed packet lengths. The codeset is (10 , 3, 3) and codewordsare chosen uniform randomly. For the threshold scheduling algorithm, thethreshold parameter was set to 0.5

    of Poisson arrivals and exponentially distributed packetsizes, the state transition diagram can be viewed as a

    Markov chain. The Markov chain is solved for equi-librium state probabilities at a particular offered load(Appendix III).

    The analysis can be used to determine the normalizedthroughput at any normalized offered load. A graph of the nor-malized throughput vs. normalized offered load for different

    h d li l ith i h i Fi 6 Th t f d l

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    15/23

    ISI-TR-2006-617 7

    0

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

    N o r m a

    l i z e

    d n e

    t w o r k

    t h r o

    u g

    h p u

    t

    Normalized offered load

    Threshold schedulingOverlap section scheduling

    Pure selfish schedulingAloha-CDMA

    Fig. 7. Comparison of the performance of the transmission schedulingalgorithms based on simulation. The trafc model is Poisson arrivals withexponentially distributed packet lengths. The codeset is (10 , 3, 3) and code-words are chosen uniform randomly. For the threshold scheduling algorithm,the threshold parameter was set to 0.5

    Figure 7 shows the results of simulation for the samecodeset as described in the analytical results. The results

    are quite similar to the analytical results. All transmissionscheduling algorithms prevent throughput degradation. Alsothe overlap section and threshold scheduling show marginallyhigher throughput than pure selsh scheduling. The analyticalmodel over predicts the throughput for Aloha-CDMA. This isbecause the analysis is based on a nite state model. A nitestate model is suitable for transmission scheduling algorithms

    0

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

    A v e r a g e n u m

    b e r o

    f c o d e w o r d s

    m u

    l t i p l e x e

    d a

    t a p o

    i n t o n

    t h e

    l i n e

    Normalized offered load

    Threshold schedulingOverlap section scheduling

    Pure selfish schedulingAloha-CDMA

    Fig. 8. Comparison of the codeword multiplexing of the different transmis-sion scheduling algorithms based on simulation. The trafc model is Poissonarrivals with exponentially distributed packet lengths. The codeset is (10 , 3, 3and codewords are chosen uniform randomly. For the threshold schedulingalgorithm, the threshold parameter was set to 0.5

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    P a c

    k e

    t e r r o r r a

    t e

    Threshold schedulingOverlap section scheduling

    Pure selfish schedulingAloha-CDMA

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    16/23

  • 8/6/2019 OEC OCDMA

    17/23

    ISI-TR-2006-617 9

    0

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    0 1 2 3 4 5 6 7 8 9 10

    N o r m a

    l i z e

    d n e

    t w o r k

    t h r o u g

    h p u

    t a

    t

    n o r m a

    l i z e

    d o

    f f e r e

    d l o a

    d o

    f 1

    Codeset weight w

    Threshold schedulingOverlap section scheduling

    Pure selfish schedulingAloha-CDMA

    Fig. 11. Comparison of the performance of the transmission schedulingalgorithms as the codeset weight is varied (based on simulation). The trafcmodel is Poisson arrivals with exponentially distributed packet lengths. Thecodeset length is 100 and = 3 . Codewords are chosen uniform randomly forthe codeset. For the threshold scheduling algorithm, the threshold parameterwas set to 0.5

    0 3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    a l i z e

    d n e

    t w o r k

    t h r o u g

    h p u

    t a t

    o r m a

    l i z e

    d o

    f f e r e

    d l o a

    d o

    f 1

    Threshold schedulingOverlap section scheduling

    Pure selfish schedulingAloha-CDMA

    0

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

    N o r m a

    l i z e

    d n e

    t w o r k

    t h r o u g

    h p u

    t

    Normalized offered load

    Threshold schedulingOverlap section scheduling

    Pure selfish schedulingAloha-CDMA

    Fig. 13. Comparison of the performance of the transmission schedulingalgorithms for a trimodal packet size distribution (based on simulation). Thetrafc model is Poisson arrivals with packet size distribution consisting of 70% 40 byte packets, 20% 1500 byte packets and 10% 500 byte packets. Thecodeset is (100 , 3, 3) and codewords are chosen uniform randomly. For thethreshold scheduling algorithm, the threshold parameter was set to 0.5

    where short packets tend to experience lower error rates thanlong packets [11].

    The squeeze through effect can be demonstrated analyticallyand through simulation for a network with a bimodal distri-bution of packet sizes which uses a pure selsh transmissionscheduling algorithm and a codeset with = w. Consider anetwork where the trafc has two packet types of sizes land l2 where l1 < l 2 . Let the fraction of packets of size

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    18/23

    ISI-TR-2006-617 10

    0

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

    N o r m a

    l i z e

    d n e

    t w o r k

    t h r o

    u g

    h p u

    t

    a t a n o

    f f e r e

    d l o a

    d o

    f 1

    Fraction of short packets

    SimulationAnalysis

    Fig. 14. The squeeze through effect. The throughput is maximized whenthe fraction of short packets is 0.9. The graph shows both analytical andsimulation results. The transmission scheduling algorithm is pure selsh. Thepacket sizes are 50 bytes and 1000 bytes. The codeset is (100,3,3).

    by packets that arrive during the packets transmission. Thetransmission scheduling algorithm allows only a fraction of thearriving packets (called colliding packets) to be transmitted.

    The probability of packet error in a codeword on the line isthe probability that at least one of its colliding packets causesan interference error. If the number of colliding packets is n c ,then n c 1 chips are added to the state selshly (align with 0chips) and n c (w 1) 1 chips are added to the state in randompositions. These random positions are chosen from N 1possible choices (1 chip is chosen selshly) The probability

    0

    0.1

    0.2

    0.3

    0.4

    0.5

    0.6

    0.7

    0.8

    0.9

    1

    0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

    N o r m a

    l i z e

    d n e

    t w o r k

    t h r o u g

    h p u

    t

    Normalized offered load

    Threshold schedulingOverlap section scheduling

    Pure selfish schedulingAloha-CDMA

    Fig. 15. Comparison of the performance of the transmission schedulingalgorithms for a realistic trafc model (based on simulation). The trafcmodel was based on real network trafc traces (see description). The codesetis (100 , 3, 3) and codewords are allocated to addresses. For the thresholdscheduling algorithm, the threshold parameter was set to 0.5

    low error rates. The throughput attains a maximum when thefraction of short packets reaches a particular value (around

    0.9).The higher throughput of shorter packets may not be adesirable characteristic, because it is unfair to longer packets.Future work will address the issue of providing a uniformdropping probability to all trafc. Possible alternatives includeusing constant packet sizes or varying the codeset length.

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    19/23

    ISI-TR-2006-617 11

    VI. R ELATED WORK

    Work related to Interference Avoidance can be divided intofour areas: Bit error rate analysis of optical CDMA networks,

    optical CDMA codeset design, FEC for optical CDMA andmedia access control in optical/wireless networks.Salehi [5], [8] analyzed an optical CDMA based network

    and developed expressions for the bit error rate of a network that uses codesets with = 1 . The analysis also determinedthe bit error rate for codesets with different lengths andweights and with hard-limiting at low loads using Aloha-CDMA. This work examines these results in the context of transmission scheduling at high offered loads.

    The area of optical CDMA code design has focused on con-struction of codesets with large size. Chung et al. [3] describedseveral algorithms to construct OOCs. These constructions arefor codes with maximum crosscorrelation parameter = 1 .Chung and Kumar [13] described a method for constructionof codes with = 2 . Several construction methods for OOCsare described in [4] and [14] among others.

    Efforts at reducing packet errors in optical CDMA havemostly focused on using error correcting codes on top of

    optical CDMA. Hsu et al. [15] analyzed the performance of slotted and unslotted optical CDMA packet networks. Theydeveloped expressions for the throughput of the network andshowed performance can be improved using Forward ErrorCorrection (FEC) codes and hard limiters. Muckenheim etal. [16] studied the effect of bit error probability on the packeterror probability and suggested the use of block codes to

    systems state is a scalar variable and media access controlis through admission control i.e. the number of simultaneoususers is controlled.

    VII. C ONCLUSIONS AND FUTURE WORK

    This work has presented an analysis of transmissionscheduling algorithms for optical CDMA media access control.The analysis quantied the difference between throughput of systems with and without transmission scheduling and showedthat transmission scheduling achieved 30% throughput whilenon scheduled systems had close to zero throughput. Simula-tions showed that the throughput of transmission scheduling isindependent of codeset length. It also showed that an increasein weight can lead to a degradation in the performance of thesealgorithms, although the degradation is not as bad as systemswithout transmission scheduling. Simulations also showed thattransmission scheduling prevents degradation when used witha realistic trafc model based on trafc obtained from a realnetwork.

    Limitations of this work include the fact that it assumes per-fect state estimation and neglects errors due to synchronizationand receiver contention. Future work will explore the impactof realistic state estimation.

    Work in progress includes a testbed implementation of thetransmission scheduling hardware. The testbed demonstratesa simplied form of threshold transmission scheduling bytransmitting bits such that the number of chip overlaps is

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    20/23

    ISI-TR-2006-617 12

    [11] B. S. Bakshi, P. Krishna, N. H. Vaidya, and D. K. Pradhan, Improvingperformance of TCP over wireless networks, in International Confer-ence on Distributed Computing Systems (IDCS) , May 1997, pp. 365373.

    [12] NLANR, Trafc traces from an OC48 link, www.nlanr.net , March

    2005.[13] H. Chung and P. V. Kumar, Optical orthogonal codes - new boundsand an optimal construction, IEEE Transactions on Information Theory ,vol. 36, no. 4, pp. 866873, July 1990.

    [14] R. Fuji-Hara and Y. Miao, Optical orthogonal codes: Their bounds andnew optimal constructions, IEEE Transactions on Information Theory ,vol. 46, no. 7, pp. 23962406, Nov. 2000.

    [15] C. S. Hsu and V. O. K. Li, Performance analysis of slotted ber-optic code division multiple access (CDMA) packet networks, IEEE Transactions on Communications , vol. 45, no. 7, pp. 819 828, July1997.

    [16] J. Muckenheim, K. Iversen, and D. Hampicke, Construction of high-

    efcient optical CDMA computer networks: Statistical design, in IEEE International Conference on Communications , vol. 3, June 1998, pp.12891293.

    [17] C. Chae, E. Wong, and R. Tuckker, Ethernet over passive opticalnetwork based on optical CSMA/CD media access technique, in In-ternational Symposium on Services and Local access , April 2002.

    [18] Cable Television Labs Inc., Data Over Cable Service Interface Spec-ications (DOCSIS) 2.0, Radio Frequency Interface Specication, no.SP-RFIv2.0, April 2004.

    [19] A. H. Abdelmonem and T. N. Saadawi, Performance analysis of spreadspectrum packet radio network with channel load sensing, IEEE Journalon Special Areas in Communications , vol. 7, no. 1, pp. 161166, Jan.

    1989.[20] G. Judge and F. Takawira, Spread Spectrum CDMA Packet Radio MACProtocol using Channel Overload Detection and Blocking, Wireless Networks , vol. 6, pp. 467479, December 2000.

    [21] K. Toshimitsu, T. Yamazoto, M. Katayama, and A. Ogawa, A novelspread slotted Aloha system with channel load sensing protocol, IEEE Journal on Special Areas in Communications , vol. 12, no. 4, pp. 665672, May 1994.

    [22] S A R dd d L T g E l iti g d t li d h l t t i f

    For any other transmission scheduling algorithm, the sameaverage number of packets are offered for transmission. How-ever the transmission scheduling algorithm does not allow allof these packets to be transmitted. Let the average number

    of packets on the line at any point of a receive ber beN online , of which a fraction P e are lost due to error. Theratio of the average number of error free packets transmittedto the average number of packets offered for transmission isN online (1 P e )/ (/ )

    Therefore,

    T hnorm = ( N online (1 P e )/ (/ ))= ( N online (1 P e )/ (/ ))( /N )

    = N online (1

    P e )/N

    A PPENDIX IIN ORMALIZED NETWORK THROUGHPUT

    This appendix derives an expression for the normalizednetwork throughput of an Interference Avoidance based opticalCDMA LAN. First, a concise representation of line state whichallows easy mathematical manipulation is dened. Using thisstate representation, expressions are derived for the number of codewords on the line and the probability of error when thesystem is in any state.

    A. State representation

    The state of the line can be represented by a pair ( n 0 , n1

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    21/23

    ISI-TR-2006-617 13

    N, 0

    N-w, w

    N-w-1, w-1

    N-w-2,w-2

    N-w-1, w

    N-w-1, w-1

    Fig. 16. State transition diagram

    Then,c0 = from n 0 ton 0c1 = tonoverlap from noverlapcoverlap = w (c0 + c1)

    A valid transition is dened as a transition where the startstate and the destination state are valid, reachable states and

    c0 0c1 0coverlap 0

    An admissible transition is dened as a valid transitionwhich is permitted by the transmission scheduling algorithm.A same state transition is dened as a transition from a stateto itself A state transition diagram can be drawn based on

    assumed to be ON i.e. transmitting 1 bits although that maynot necessarily be true. Therefore the calculated packet errorrate is the worst case packet error rate.

    C. Number of codewords multiplexed at a point on the line

    Consider a graph where the nodes of the graph are the statesand each state transition due to an arrival forms a directed edge(neglect same state transitions). For any selsh transmissionscheduling algorithm, this graph is a directed acyclic graph.In the graph, each edge represents the arrival of exactly onepacket. Therefore the number of codewords on the line for

    a state ( n0 , n1 ) depends on the number of edges from theinitial state ( N, 0) to (n0 , n1 ). Both the shortest and the longestpath may be calculated in polynomial time. The length of theshortest and longest path from the initial state to that state arelower and upper bounds on the number of codewords on theline when the line is in that state 5 .

    Therefore, for valid states,

    N online (n0 , n 1) ShortestPath ((N, 0), (n 0 , n 1))

    N online (n 0 , n 1) LongestPath ((N, 0), (n 0 , n 1))

    For invalid states,

    N online (n0 , n 1) = 0

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    22/23

    ISI-TR-2006-617 14

    A. Assumptions

    The analysis assumes perfect state estimation. The onlyreason for a state transition is an arrival or a departure of apacket. Packet arrivals are assumed to be Poisson arrivals andpacket lengths are exponentially distributed. The distributionof the destinations codeword is uniform over the codeset.Under this assumption, the probability of transitioning to aparticular state on an arrival is dependent only on the currentstate and not on the path taken to reach that state. Theprobability of departure to a state is assumed to be proportionalto the rate of arrival from that state. Then the next stateis dependent only on the current state and not on the pathtaken to reach that state. Under these circumstances, the statetransition diagram for arrivals and departures is a Markovchain. Equilibrium probabilities may be found by solving thebalance equations for the system.

    B. Admissible transmissions

    This subsection describes how to identify admissible statetransitions given a codeset and a transmission schedulingalgorithm. 6

    1) Aloha-CDMA: For Aloha-CDMA, all transitions areadmissible.

    2) Pure selsh scheduling: A transmission is admissible if,

    c0 1

    3) Threshold scheduling: A transmission is admissible if

    c0 1

    E. Balance equations

    When the system is in equilibrium, the ow into any statemust equal the ow out of the state. Therefore for a valid,reachable state ( s0 , s1 ),

    ( + N online (s0 , s1))P state (s0 , s1) =N n 0 =0

    N n 1 =0 P state (n 0 , n 1)P arr (n0 , n 1 , s0 , s1)+

    N n 0 =0

    N n 1 =0 P state (n 0 , n 1)N online (n0 , n 1)P dep (n 0 , n 1 ,

    Also,N

    n 0 =0

    N

    n 1 =0P state (n 0 , n 1) = 1;

    These equations can be solved for the equilibrium stateprobabilities P state (s0 , s1).

    A property of MVG_OMALLOOR

  • 8/6/2019 OEC OCDMA

    23/23