You are on page 1of 23

A property of MVG_OMALLOOR

1 MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 2002

Optical CDMA with Optical Orthogonal Code


SANGWOOK HAN
shan4@ece.utexas.edu
Department of Electrical and Computer Engineering
The University of Texas at Austin
Austin, TX 78712

Abstract - This report examines optical CDMA communi- asynchronously, without centralized control, and it does
cation techniques with optical orthogonal codes. Simulations not suffer from packet collisions. As a result, optical
that show the desired properties of theses codes and their use CDMA systems have lower latencies than TDMA or
in optical CDMA are reported. Based on the simulations, we WDMA. Furthermore, since time and frequency (or
investigate the properties of optical CDMA. Proba bility of
wavelength) slots do not need to be allocated to each
error is also evaluated.
individual user, significant performance gains can be
I. INTRODUCTION achieved through multiplexing. Also, TDMA and
WDMA systems are limited by hardware because of the
There have been many efforts to take the full advantage slot allocation requirements. In contrast, CDMA systems
of fiber-optic signal processing techniques to establish an are only limited the tolerated bit error rate relationship to
all optical CDMA communication systems since CDMA the number of users, affording the designer a much more
was first applied to the optical domain in the mid-1980s flexible network design [4].
by Prucnal, Salehi, and others [1-3]. Traditional fiber
optic communication systems use either TDMA or To establish the optical CDMA, we have to overcome
WDMA schemes to allocate bandwidth among multiple the code orthogonality problem. Many researchers have
users. Unfortunately, both present significant drawbacks proposed several codes such as prime code, optical
in local area systems requiring large numbers of users. orthogonal code, and so on. In this project, we focus on
optical orthogonal codes (OOC) among those codes. In
In a TDMA system, the total system throughput is section II, we introduce the optical orthogonal codes.
limited by the product of the number of users and their Section III discusses three simulations demonstrating the
respective transmission rates since only one user can principles of optical CDMA. The first one is for two-user
transmit at a time. For instance, if 100 users wish to synchronous channels to understand basics of optical
transmit at 1 gigabit per second, at a minimum the CDMA and the second one is for two-user asynchronous
communication hardware would need to be capable of channels. The third one is for K-user synchronous
sustaining a throughput of 100 gigabits per second, a data channels. Section IV evaluates the probability of error.
rate that would strain even the highest performance
optical networking equipment. In addition, TDMA II. O PTICAL O RTHOGONAL CODES
systems show significant latency penalties because of the
coordination required to coordinate and grant requests for An optical orthogonal code is a family of (0, 1)
time slots from users by the central node [4]. sequences with good auto- and cross-correlation
properties. Thumbtack-shaped auto-correlation enables
Unlike TDMA, a WDMA system allows each user to the effective detection of the desired signal (Fig. 2 c), and
transmit at the peak speed of the network hardware since low-profiled cross-correlation makes it easy to reduce
each channel is transmitted on a single wavelength of interference due to other users and channel noise (Fig. 2
light. A WDMA system could easily support a bandwidth d). The use of optical orthogonal codes enables a large
of one terabit per second, ideal for the needs of a local number of asynchronous users to transmit information
area network. Unfortunately, it is difficult to construct a efficiently and reliably. The lack of a network
WDMA system for a dynamic set of multiple users synchronization requirement enhances the flexibility of
because of the significant amount of coordination among the system. The codes considered here consist of truly (0,
the nodes required for successful operation. To build a 1) sequences (Fig. 1 a) and are intended for “unipolar”
WDMA network with a dynamic user base, control environments that have no negative components since you
channels and collision detection schemes would need to either have light, or you don't, while most document ed
be implemented that would waste significant bandwidth. correlation sequences are actually (+1, -1) sequences (Fig.
1 b) intended for systems having both positive and
Fortunately, an alternative to TDMA and WDMA negative components.
networking schemes, optical CDMA communication
systems , require neither the time nor the frequency An (n, w, ?a, ?c ) optical orthogonal code C is a family
management systems. Optical CDMA can operate of (0, 1) sequences of length n and weight w which satisfy

PDF processed with CutePDF evaluation edition www.CutePDF.com


A property of MVG_OMALLOOR

2 MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 2002

the following two properties [5]. other time following (1). Fig. 2 (d) shows the cross-
1) The Auto-Correlation Property: correlation between OOC 1 and OOC 2. It always takes
n−1 one and zero at any time following (2). Here 1s are taken
∑x xt=0
t t +τ
≤ λa (1) as auto-correlation constraint, ?a, and cross-correlation
constraints, ?c, since 1s are the lowest value they can be,
for any x ∈ C and any integer t, 0<t<n. and correlation is calculated by convolution sum of two
2) The Cross-Correlation Property: sequences.
n −1

∑x y ≤ λc
5 5
(2)
t t +τ 4.5 4.5

t=0 4 4

for any x ? y∈ C and any integer t.


3.5 3.5

3 3

The numbers ?a and ?c are called the auto- and cross- 2.5 2.5

2
correlation constraints. The (0, 1) sequences of an optical 2

1.5 1.5

orthogonal code are called its codewords. 1 1

0.5 0.5

0 0
5 10 15 20 25 30 5 10 15 20 25 30
1.5 1.5

1 1
(a) (b)
5
5
0.5 0.5
4.5
4.5

4
0 0 4
3.5
3.5
-0.5 -0.5 3
3

2.5
2.5
-1 -1
2
2

1.5
-1.5 -1.5 1.5
0 5 10 15 20 25 30 0 2 4 6 8 10 12 14 16
1 1

(a) (b) 0.5

0
0.5

10 20 30 40 50 60 0

Fig. 1. Examples of sequences (a) sequence for fiber 10 20 30 40 50 60

optics (b) sequence for radio frequency (c) (d)

An (n, w, ?a, ?c ) OOC C can be alternatively considered Fig. 2. (a) OOC 1 (b) OOC 2 (c) auto-correlation (d)
as a family of w sets of integers modulo n in which each cross-correlation
w set corresponds to a codeword and the integers within
each w set specify the nonzero bits. For instance, let’s II. O PTICAL CDMA
think of a simple OOC, 1101000, characterized by (7, 3, 1,
II.1.A. Two-User Synchronous Channel
1). Here we can see three 1s as the nonzero bits. Their
positions are 0th, 1st, and 3rd, respectively. Thus 1101000 The two-user synchronous channel simulated here can
can be simply represented by {0, 1, 3} (mod 7). This be characterized by the follows.
notation can simply represent codes instead of
exhaustively describing long (0, 1) sequences. Table I y (t ) = A1b1 s1 (t ) + A2 b2 s2 (t ) + σn( t) A1 = A2 = 1, t ∈ [0, T ] .
(3)
shows some optimal (n, 3, 1, 1) codes in this notation. T  w, s1 = s2
ρ =< s1 , s 2 >= ∫ s1 (t ) s2 (t )dt = 
n Optimal (n, 3, 1, 1)-codes
0
0 or 1, s1 ≠ s2
7 {0,1,3}
Let an (32, 4, 1, 1) optical code C with 2 codewords be
13 {0,1,4}, {0,2,7}
used. C can be represented by {{0, 10, 13, 28}, {0, 5, 12,
19 {0,1,5}, {0,2,8}, {0,3,10}
31}} mod(32) in Fig. 3 (d) and (e). Thus, the system can
25 {0,1,6}, {0,2,9}, {0,3,11}, {0,4,13}
31 {0,1,7}, {0,2,11}, {0,3,15}, {0,4,14}, {0,5,13} accommodate 2 transmitters simultaneously. Each
37 {0,1,11}, {0,2,9}, {0,3,17}, {0,4,12}, {0,5,18}, transmitter is assigned a w(=4) set from C, i.e.
{0,6,12} transmitter1 is assigned a {0, 10, 13, 28} set and
transmitter 2 is assigned a {0, 5, 12, 31} set. At a
43 {0,1,19}, {0,2,22}, {0,3,15}, {0,4,13}, {0,5,16},
transmitter, every information bit is encoded into a frame
{0,6,14},{0,7,17}
of n(=32) optical chips in the following way. (A chip is an
optical time slot which can assume one of two values: ON
Table I. Some Optimal (n, 3, 1, 1) Codes [5]
of OFF) Let the assigned w set for a particular transmitter
be S={s1, s 2, · · · , s w}. In this case, s 1 is a {0, 10, 13, 28}
Let’s think of C represented by {{0, 10, 13, 28}, {0, 5,
12, 31}} (mod 32) with two code words. Two code set and s 2 is a {0, 5, 12, 31} set. Assume the information
bit is 1. In the corresponding frame, which consists of n
words are shown in Fig. 2 (a) and (b), respectively. C also
optical chips, photon pulses (i.e., ON signals) are sent at
can be represented by (32, 4, 1, 1) in (n, w, ?a, ?c ) notation.
exactly the s 1th, s 2th, · · · and s wth chips (Fig. 3. f and g).
Fig. 2 (c) shows auto-correlation of OOC 1. Its maximum
In the other n-w chips, no photon pulse (i.e., OFF signals).
value is w at the correlation time and one or zero at any
A property of MVG_OMALLOOR

3 MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 2002

Transmitting Part Receiving Part

OOC 1 OOC 1
C
A Optical E Optical H J Recovered
+
User 1 • Encoder
• G G Decoder • + • Signal
Optical
Sum • • Optical + Recovered
User 2 •B Encoder • Decoder
• +
•K Signal
F I
I
D
OOC 2 OOC 2
OPTICAL OPTICAL
(a) (a)
5 5 5 5

4.5 4.5 4.5 4.5


4 4
4 4

3.5 3.5 3.5 3.5


3 3
3 3

2.5 2.5
2.5 2.5
2 2
2 2
1.5 1.5
1.5 1.5
1 1
1 1
0.5 0.5
0.5 0.5
0 0
1 2 3 4 5 6 7 8 9 1 2 3 4 5 6 7 8 9 0 0
50 100 150 200 250 300 350 50 100 150 200 250 300 350

(b) (c) (b) (c)


5
5
5 5
4.5 4.5
4.5 4.5
4
4
4 4
3.5 3.5
3.5 3.5
3
3
3 3
2.5 2.5
2.5 2.5
2 2
2 2
1.5 1.5
1.5 1.5
1 1
1 1
0.5 0.5
0.5 0.5
0 0
5 10 15 20 25 30 5 10 15 20 25 30 0 0
50 100 150 200 250 300 50 100 150 200 250 300

(d) (e) (d) (e)


5 5

4.5 4.5

4 4

3.5 3.5

3 3 Fig. 4. (a) schematic diagram for a receiving part (b)


2.5 2.5
signal at H (c) signal at I (d) signal at J (e) signal at K
2 2

1.5 1.5

0.5
1

0.5
Basically, optimal CDMA scheme is same as radio
0
50 100 150 200 250 300
0
50 100 150 200 250 300
frequency CDMA scheme except using the special codes.
Here, we use the matched filter to convert the received
(f) (g)
signal in Fig. 3 (h) assuming n(t) in (3) is zero. At the
5

4.5 receiving end, correlation-type decoders are used to


4

3.5
separate the transmitted signals. The decoder consists of a
3 bank of 2 tapped delay -lines, one for each codeword. The
2.5

2
delay taps on a particular line exactly mat ch the signature
1.5
sequence, i.e., the delays between successive taps are
1

0.5
equal to s2-s 1, s 3-s 2, · · · , optical chips, respectively. Each
0
50 100 150 200 250 300 tapped delay-line effectively calculates the correlation of
(h) the received waveform with its signature sequences. In
Fig. 4 (b) and (c), there are five different correlation
Fig. 3. (a) schematic diagram for a transmitting part (b) values, 0, 1, 2, 4, and 5. Because of the properties of
signal at A (c) signal at B (d) signal at C (e) signal at D optical orthogonal codes, the correlation between
(f) signal at E (g) signal at F (h) signal at G different signature sequences is low, 0 and 1. Thus the
delay-line output is high, 4 and 5, only when the intended
On the other hand, if the information bit is 0, no photon transmitter’s information bit is 1. However, a potential
pulses are sent in the corresponding frame, i.e., all OFF problem due to interference can be happened. When
signals are sent. In other words, the codeword set is used correlation value has 2, it is definitely due to the
as the signature sequence of the transmitter. interference. In this case, the value is always below 4 so it
A property of MVG_OMALLOOR

4 MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 2002

can be discarded by choosing relevant threshold value. scheme for synchronization. Therefore, now we can say
But when total number of users goes up, the cross- that optical CDMA does need no network synchronization.
correlation due to interfering users adds up quickly to
severely degrade the system performance. For instance, II.2. K-User Synchronous Channel
when w is 4 like this case, accommodating 4 users make it
possible to have 4 as the correlation value even if the In the previous section, we investigated a simp le 2-user
intended transmitter’s information bit is 0. To avoid this channel to understand the optical CDMA. In this section,
phenomenon, both high w which can be considered as the we explore problems faced by increasing K (Fig. 6 a).
sum of 1s in the sequence, and long n are required. If we Here we choose 7 as K, and C is (43, 3, 1, 1) having 7 sets,
increase only w fixing n, cross-correlation value due to {{0, 1, 19}, {0, 2, 22}, {0, 3, 15}, {0, 4, 13}, {0, 5, 16},
the interference can be lowered. However, OOC has very {0, 6, 14}, {0, 7, 17}}.
sparse marks to keep the cross-correlation low, i.e. a
number of zeros is much higher than that of ones in the The first issue is a threshold value. As we saw in the
sequence. It means that cross-correlation increases by previous section, interfering signal can be effectively
itself by increasing only w. Therefore, both w and n discarded by setting a relevant threshold value. The
should be increased simultaneously. But this solution also threshold value can be chosen under the following
reveals a drawback, long signal processing time due to condition.
long n. 0 ≤ threshold ≤ w (4)

Finally the transmitted information is extracted by Fig. 6 (d) through (g) show results from several threshold
thresholding the correlator output in Fig. 4 (d) and (e). In values, 1, 2, 3, and 5. As the threshold value goes up, the
this case, they are successfully recovered as intended. recovered signal gets similar to the ideal signal in Fig. 6
Here, 3 is chosen as the threshold values. Threshold issue (c). However, the threshold value can not be over w. If the
will be covered in detail in the section II.2. intended information bit is 1, the correlation value is w.
Therefore, the threshold over w incorrectly converts it to
II.1.B. Two-User Asynchronous Channel 0 when the intended information bit is 1. Fig. 6 (g) shows
the results by choosing threshold over w. We can clearly
In optical CDMA, all users are allowed to transmit at see that a dotted line is missed comparing to Fig. 6 (c).
any time. There is no network synchronization required.
In this section, we simulate a two-user asynchronous Even if the highest value under (4) is chosen (Fig. 6 f),
channel to investigate above statement. To verify no the recovered signal can not be exactly same as the ideal
network synchronization, the same scheme in II.I.A. is pattern. In the Fig. 6 (a), if the intended information bit is
used here except the time delay at F in Fig. 3 (a). Fig. 5 1, the correlation value is w(=3). But as we already
(b) and (c) show the recovered signals from asynchronous discussed in the previous section, the cross-correlation
and synchronous channel, respectively. They agree well due to interfering users adds up very quickly to severely
even if synchronous channel does not use any special degrade the system performance. Here, the correlation
value due to interference is even higher than w(=3). This
1.5
is the reason why the received signal can not be recovered
perfectly.
1

To figure it out above problem we introduce optical


0.5 hard-limiter [3] located before the optical tapped-delay
line (Fig. 7 a). An ideal optical hard-limiter is defined as
 1, x≥1 (5)
g ( x) = 
0
1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6

 0, 0 ≤ x < 1
(a)
1.5
Therefore, if an optical light intensity (x) is bigger than or
1.5

equal to one, the hard-limiter would clip the intensity


back to one, and if the optical light intensity is smaller
1 1
than one, the response of the optical hard-limiter would
be zero. This ideal nonlinear process would enhance the
0.5 0.5
system performance because it would exclude some
combinations of interference patterns from causing errors
0
50 100 150 200 250 300
0
50 100 150 200 250 300 as in the soft-limiter case, i.e., the patterns that caused
(b) (c) errors by analog summation of light intensity rather than
Fig. 5. (a) Intended information binary signal (b) recoverd by exact reproduction of the particular pattern with no
signal from asynchronous channel (c) recovered signal analog effect. Fig. 7 shows comparison between the
from synchronous channel systems with and without the optical hard-limiter.
A property of MVG_OMALLOOR

5 MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 2002

OOC 1 OOC

Optical H + J Recovered G Optical H J Recovered


Decoder • + • Signal • Decoder • +
+ ? Signal

G . (a)
• .
OOC K .
OOC
Optical + Recovered
Decoder • + • Signal Hard G’ Optical H’ + J’ Recovered
Limiter • Decoder • + ? Signal
(a)
8 1.5 (b)
7
8 8

6
7 7
1
5
6 6

4
5 5

3
4 4
0.5
2
3 3

1
2 2

0 0
0 50 100 150 200 250 300 350 50 100 150 200 250 300 1 1

0 0

(b) (c) 50 100 150 200 250 300 50 100 150 200 250 300

1.5 1.5
(c) (d)
8 8

7 7
1 1

6 6

5 5

0.5 0.5
4 4

3 3

2 2
0 0
50 100 150 200 250 300 50 100 150 200 250 300
1 1

0 0
(d) (e) 0 50 100 150 200 250 300 350 50 100 150 200 250 300

1.5 1.5
(e) (f)
1.5 1.5

1 1

1 1

0.5 0.5

0.5 0.5

0 0
50 100 150 200 250 300 50 100 150 200 250 300

(f) (g) 0
50 100 150 200 250 300
0
50 100 150 200 250 300

(g) (h)
Fig. 6 (a) schematic diagram of a receiving part for K
users (b) signal at H (c) ideal signal at J (d) signal at J 1.5

when threshold=1 (e) signal at J when threshold=2 (f)


signal at J when threshold=3 (g) signal at J when 1

threshold=5
0.5

All optical light intensity which is bigger than or equal


to one are clipped back to one in Fig. 7 (d). In Fig 7 (f),
0
the cross-correlation value over w due to the interference 50 100 150 200 250 300

does not exist any more. From these, the thresolding can (i)
much effectively recover the information. Fig. 7 (g) and Fig. 7. (a) receiving part without optical hard-limiter (b)
(h) show the recovered signals without and with the receiving part with optical hard-limiter (c) signal at G
optical hard-limiter, respectively. We can clearly see that (d) signal at G’ (e) signal at H (f) signal at H’ (g) signal
Fig. 7 (h) is much similar to the intended signal (Fig. 7 i). at J (h) signal at J’(i) ideal signal expected at J
Consequently, we can say that the optical hard-limiter can
effectively lower the interference effect.
A property of MVG_OMALLOOR

6 MULTIUSER WIRELESS COMMUNICATION (EE381K) CLASS PROJECT, FALL 2002

IV. P ROBABILITY OF E RROR 10


2

w=1
0 w=3
10
The probability of error per bit is defined as w=5
w=7
-2 w=9
10

10 -4

Probability of Error
PE=p(LI≥th | b=0)?p(b=0)
-6

+p(LI<th | b=1)?p(b=1) (6) 10

10 -8

-10

where PE, LI, th, and b are the probability of error, light 10

-12

intensity, threshold, and intended binary information bit, 10

respectively. Here, an interesting point is that p(LI<th | 10 -14


1 2 3 4 5 6 7 8 9
threshold
b=1) is always equal to zero because p(LI<th |
b=1)=p(w+I < th) = p(w+I-th <0)=0 under (4) where I is (b)
2

the interference due to other users. According to [4], one 10

can easily calculate the probability of error using the


100
followings.

Probability of Error
-2
10

K−1− i
1  K − 1 w2   w2 
i
K −1
(7)
PE = ∑    1 − 
2 i = th  i  2 n  2n 
-4
10


10-6
number of users=10
Fig. 8 shows several dependency of PE. In Fig. 8 (a), a number of users=30
number of users=50
10-8
length of code, n, is tested in different values, 200, 500, 1 1.5 2 2.5 3
threshold
3.5 4 4.5 5

1000, and 2000. As n goes up, PE gets lowered resulting


(c)
in long processing time. So we need to deal with the trade
off problem on the low error rate and processing time. Fig. Fig. 8. (a) n-dependency of probability of error (b) w-
8 (b) shows w-dependency of PE. As the sum of 1s in the dependency of probability of error (c) K-dependency of
code, w, goes up, PE gets lowered. Note that the highest p robability of error
threshold value under (4) would make the lowest PE on
REFERENCES
the same w. In the Fig. 8 (c), we can find K-dependency
of PE. As the number of accommodated users, K, goes up,
PE gets higher. This is definitely due to the increasing [1] P. R. Prucnal, M. A. Santoro, and R. R. Fan,
“Spread Sprectrum Fiber-Optic Local Area
interference. Observations from Fig. 8 agree well with the
Network Using Optical Processing,” IEEE J.
results in the section II.1.A .
Lightware Tech., vol. LT-4, no. 5, May 1986, pp.
V. CONCLUSION 547-54
[2] J. A. Salehi, “Code Division Multiple-Access
In this report, we introduced the optical CDMA with Techniques in Optical Fiber Networks-Part I:
the optical orthogonal codes. CDMA scheme was Fundamental Principles,” IEEE Trans. Commun.,
successfully applied by using the optical orthogonal codes. vol. 37, no. 8, Aug. 1989, pp. 824-33.
However, OOC revealed some drawbacks, requirement of [3] J. A. Salehi and C. A. Brackett, “Code Division
long sequences resulting in long signal processing time Multiple-Access Techniques in Optical Fiber
and severe degradation due to fast adding of cross- Networks-Part II: Systems Performance Analysis,”
correlation. Optical hard-limiter showed remarkable IEEE Trans. Commun., vol. 37, no. 8, Aug. 1989,
improvement in reducing interference due to other users. pp. 834-42.
We also presented that the threshold value, code length, [4] A. Stok, E. H. Sargent, “Lighting the Local Area:
and total number of users are important factors for the Optical Code-Division Multiple Access and
probability of error. Quality of Service Provisioning,” IEEE Network.,
pp . 42-46, Nov.-Dec. 2000.
10
1
[5] F. R. K Chung, J. A. Salehi, V. K. Wei, “Optical
10
0
Orthogonal Codes: Design, Analysis, and
10
-1 Applications,” IEEE Trans. Information Theory,
10-2
vol. 35, no. 3, May 1989.
Probability of Error

10-3
[6] C. F. lam, “To Spread or Not to Spread-the Myths
10-4
of Optical CDMA,” Lasers and Electro-Optics
10
-5
Society 2000 Annual Meeting. LEOS 2000. 13th
-6
n=200
n=500
Annual Meeting. IEEE, vol.2, 2000, pp. 810 -811.
10

-7
n=1000
n=2000 [7] Sergio Verdu. Multiuser Detection. Cambridge
10
1 1.5 2 2.5 3
threshold
3.5 4 4.5 5 University Press, NY, 1998
(a)
A property of MVG_OMALLOOR

Interference Avoidance in Optical CDMA Networks


Purushotham Kamath
Advisors: Joseph D. Touch and Joseph A. Bannister
USC/ISI
Marina del Rey, CA 90292
{pkamath, touch, joseph}@isi.edu

Abstract— Interference Avoidance is a media access control


mechanism that prevents throughput degradation in a broadcast
all optical Local Area Network (LAN) built on optical Code
Division Multiple Access (CDMA) technology. Optical CDMA is
a multiplexing technology that allows the utilization of the large
transmission capacity of an optical fiber. However, the throughput
of an optical CDMA broadcast LAN network degrades quickly
due to multiuser interference. Interference Avoidance controls
interference and prevents throughput degradation due to interfer-
ence at high loads. It is based on two mechanisms: state estimation
and transmission scheduling. Algorithms for state estimation and
transmission scheduling are proposed and evaluated. Analysis
and simulation show how they prevent degradation of throughput
at high loads. A testbed implementation of state estimation and
transmission scheduling hardware is in progress.
Fig. 1. Interference avoidance
I. I NTRODUCTION
Optical CDMA is a code division multiplexing technology
that allows several transmitters to transmit simultaneously on If the receiver is currently receiving a packet, this kind of false
an optical fiber. Nodes transmit using codewords from an Op- positive error can result in the loss of the packet.
tical Orthogonal Codeset (OOC) [1]. An OOC is a set of (0,1) Related work in the area of Optical CDMA mostly focuses
sequences of length N that satisfies certain autocorrelation and on code design [1] or system design [3]. A survey of related
cross-correlation constraints. The term codeset is used to refer work may be found in [2].
to the set of such sequences, and the term codeword is used
This work demonstrates thats Interference Avoidance can
for a member of the set. Each 0 or 1 of a sequence is called
control interference and improve the throughput of an optical
a chip, and the sequence represents a data bit. The number w
CDMA LAN at high loads.
of 1 chips of a codeword of the codeset is called its Hamming
weight. Codesets are designed so that the autocorrelation of
any codeword and the cross-correlation between any pair of II. I NTERFERENCE AVOIDANCE
codewords in the codeset is constrained below a value called
the Maximum Collision Parameter κ. Consider the codewords shown in Figure 1(a). The figure is
A node transmits data by ON-OFF keying (OOK) of a a snapshot of data bits sent by two nodes (codewords 1 and
codeword. Optical CDMA receivers are correlation receivers. 2). A third node is preparing to transmit on codeword 3. If
By connecting nodes on the network in a star, bus or ring transmitted with the chip offset shown in Figure 1(a) a false
topology any node can transmit to any other using the re- positive error would probably occur. If it was sent three chip
ceiver’s codeword. More details on the system architecture of times later (Figure 1(b)), all three packets could be transmitted
an optical CDMA network may be found in [2]. correctly. (Codeword 3 has at least one chip that does not
The advantage of optical CDMA is that it allows utilization interfere with codewords 1 and 2. Hence no false positive can
of the available transmission capacity of an optical fiber. Data occur and it will be received correctly).
processing can occur at electronic speeds while encoding and Interference Avoidance uses the above principle. A node
decoding can be done all optically at a higher chipping rate [3]. estimates the state of the line (state estimation). Given the
The main problem with using optical CDMA in a LAN state estimate and the codeword to be transmitted, it decides
is that at high loads multiuser interference errors result in the appropriate time instant to transmit such that there is no
low network throughput [4]. The reason is that a correlation interference (transmission scheduling). Interference avoidance
receiver set to receive a particular codeword will erroneously reduces interference and improves throughput. Note that any
detect a 1 bit if there are other codewords on the line which packet arrivals in the time between the state estimation and
have ‘1 chips’ in the same locations as the expected codeword. the transmission can still cause interference.
A property of MVG_OMALLOOR

III. S TATE ESTIMATION Throughput vs. offered load for different Transmission Scheduling algorithms
1
No transmission scheduling
Assume that several nodes on an optical CDMA LAN Pseudo-cooperative
Selfish
are transmitting simultaneously on different codewords. Each 0.8 Cooperative

Normalized throughput
codeword is shifted by a different phase shift that depends on
the exact instant it was transmitted. The state of the line at 0.6

a point on the line is the sum of the codewords taken over a


0.4
window of N chips. E.g., in Figure 1(c), the state of the line
is [0120111].
0.2
Arrivals and departures of packets continuously change
this state of the line. The on-off keying of the codewords 0
also changes the state of the line. The objective of state 0 0.2 0.4 0.6 0.8 1
Normalized offered load
estimation is to determine the true state, i.e. the sum of the
codewords being transmitted with appropriate phase shifts. A Fig. 2. Throughput vs. offered load for different transmission scheduling
window based state estimation algorithm can give a reasonable algorithms for simulation of a star network using a (10, 3, 2) codeset. A
continuous window based state estimation algorithm was used with sensing
estimate of the true state of the line. The node determines the window = 10 bits. Four transmission scheduling algorithms were evaluated:
state by sampling the line. This is called the sensed state This Selfish, Pseudo-cooperative, Cooperative and None (Aloha-CDMA). A 1-
is repeated for a window of time, say W bits. The estimated persistent defer algorithm was used with a retry limit of 10.
state is twice the average of the sensed states taken over
over the window. State estimation can be either performed
continuously or on-demand, i.e. when a packet arrives. transmission scheduling hardware is currently being imple-
The performance of an on-demand window based state es- mented.
timation algorithm has been measured through simulation and V. S YSTEM PERFORMANCE
the results of system performance are described in Section V.
The performance of an Interference Avoidance system is
State estimation hardware needs to be implemented using
dependent on a large number of factors such as traffic patterns
sampling over several bits because chips are arriving faster
and network topology. An analysis based on Poisson arrivals,
than the maximum electronic processing rate. The hardware
exponentially distributed packet lengths random codeword
for state estimation is currently being implemented.
assignment, perfect state estimation may be found in [2].
IV. T RANSMISSION SCHEDULING Figure 2 shows the results of a realistic simulation that uses
a traffic model based on real network traffic. The protocol
Given an accurate estimate of the true state of the line, a is called Interference Sensing/Interference Detection (IS/ID).
node can use a transmission scheduling algorithm to determine Nodes estimate the state and schedule transmissions. If in-
the appropriate time to transmit. terference is detected during transmission, the transmission
The following classes of transmission scheduling algorithms is aborted and the node backs off. The simulation assumed
have been identified: a star network, a window based on demand state estimation
• Selfish algorithms: These algorithms schedule the trans- algorithm, three different types of transmission scheduling
mission of a packet such that other codewords on the line algorithms and a defer algorithm for retransmission [6].
will not interfere and cause loss of this packet Both analysis and simulation confirm that the throughput
• Cooperative algorithms: These algorithms schedule the of a system without Interference Avoidance degrades with
transmission of a packet such that the transmission of increasing load, while the throughput of an Interference Avoid-
this codeword will not interfere and cause loss of other ance system remains constant at high loads.
packets on the line.
• Pseudo-cooperative: These algorithms control interfer-
R EFERENCES
ence by limiting either the number or size of ’1’ chip [1] H. Chung, J. Salehi, and V. Wei, “Optical orthogonal codes: Design,
overlaps. analysis, and applications,” IEEE Transactions on Information theory,
vol. 35, no. 3, pp. 595–605, May 1989.
Transmission scheduling algorithms can be analyzed using a [2] P. Kamath, J. D. Touch, and J. A. Bannister, “The need for media access
Markov chains [5] approach by reducing the state description control in optical CDMA networks,” in IEEE Infocom, vol. 4, March
2004, pp. 2208–2219.
to a simpler form to make it mathematically tractable. The [3] J. Salehi, “Code division multiple-access techniques in optical fiber
average throughput of different transmission scheduling algo- networks - Part 1: Fundamental principles,” IEEE Transactions on Com-
rithms may obtained from this model. The average throughput munications, vol. 37, no. 8, pp. 824–833, Aug. 1989.
[4] C. Lam, “To spread or not to spread: The myths of optical CDMA,” in
of the algorithms may be compared to an upper bound on the IEEE Lasers and Electro-Optics Society Annual Meeting, vol. 2, 2000,
throughput of an optical CDMA network obtained through a pp. 810–811.
combinatorial analysis [5]. [5] P. Kamath, J. D. Touch, and J. A. Bannister, “Transmission scheduling
in optical CDMA networks,” in Under submission, Jan 2005.
The transmission scheduling algorithms will be imple- [6] ——, “Algorithms for interference sensing in optical CDMA networks,”
mented in electronics while the transmission delays can be in IEEE International Conference on Communications, vol. 3, June 2004,
controlled by selecting from a set of optical delay lines. The pp. 1720–1724.
A property of MVG_OMALLOOR
ISI-TR-2006-617 1

Algorithms for Transmission Scheduling


in Optical CDMA Networks
Purushotham Kamath, Joseph D. Touch, Joseph A. Bannister
USC/ISI
4676 Admiralty Way
Marina del Rey, CA 90292
{pkamath, touch, joseph}@isi.edu
22nd May 2006

Abstract— Transmission scheduling is a media access control The throughput of an optical CDMA LAN is limited by
mechanism that prevents degradation of throughput in optical multi-user interference. When several users transmit simul-
CDMA Local Area Networks (LANs) at high offered load. Optical taneously, their packets and hence their codewords overlap.
CDMA is a multiple access technique for broadcast optical
Local Area Networks. The throughput of an optical CDMA When the optical pulses in the codeword overlap, their optical
LAN at high offered load is limited by multi-user interference. power is added. Optical pulses from one codeword can be
Interference Avoidance, a distributed, contention based media detected by receivers tuned to other codewords. As a result
access control mechanism, can prevent throughput degradation receivers may falsely detect their codewords resulting in packet
at high loads. Interference avoidance consists of state estimation errors. These false positive errors increase with offered load,
and transmission scheduling. This work analyzes algorithms for
transmission scheduling under perfect state estimation. The anal- resulting in throughput collapse.
ysis shows that transmission scheduling under specific conditions
can provide upto 30% network throughput at high offered load. Interference Avoidance is a contention media access control
This compares well to non scheduled systems which have close mechanism that prevents throughput collapse in optical LANs
to zero throughput under the same conditions. Simulations show networks at high offered load. It consists of state estimation
that the performance of transmission scheduling is independent of and transmission scheduling. State estimation is a mechanism
codeset length and degrades with increase in codeset weight. The by which nodes on the network estimate the state of the line.
results also show that the performance of transmission scheduling
does not degrade when used with realistic network traffic based Transmission scheduling is a mechanism by which nodes use
on traffic obtained from a real network. the estimated state to schedule their transmissions to avoid
KEYWORDS: Networks, Optical communication, Code divi- packet losses due to interference.
sion multiaccess, Protocols, Access control.
The contribution of this paper is the analysis of transmission
scheduling algorithms for optical CDMA under perfect state
I. I NTRODUCTION estimation. The analysis quantifies the difference between
throughput of systems with and without transmission schedul-
This work considers a shared medium, packet switched ing. The analysis shows that transmission scheduling under
optical CDMA LAN in which several nodes are connected specific conditions can provide upto 30% throughput at high
to a passive star coupler to form an all optical broadcast offered load. In contrast, non scheduled systems have close
network. Each node on the network is allocated an optical to zero throughput under the same conditions. A sensitivity
CDMA codeword to receive on. Optical CDMA codewords study of the transmission scheduling algorithms shows that the
are sequences of zeroes and ones (unipolar codewords) that performance gain depends on certain codeword parameters.
are transmitted asynchronously. The codewords are transmitted The performance is independent of codeword length and
by binary intensity modulation i.e. a one in the codeword is degrades with increase in codeword weight. The performance
represented by pulse of light. Nodes use ON-OFF keying of does not degrade with a traffic model based on traffic obtained
the codeword to transmit binary data. To transmit a 1 bit the from a real network.
codeword is sent and to transmit a 0 bit, an all zeros codeword
is sent. When a node wants to transmit, it tunes its transmitter The paper is organized as follows. Section II provides
to the receiver’s codeword and transmits. The code division background on optical CDMA. Section III-A discusses the
multiplexing allows several pairs of users to communicate motivation for Interference Avoidance. Section III-C discusses
simultaneously. the channel characteristics of optical CDMA and a represen-
tation for the state of the network. Section III-D defines the
1 This material is based upon work supported by the Defense Advanced transmission scheduling algorithms. Section IV analyzes the
Research Projects Agency under contract no. N66001-02-1-8939 issued by the performance of the transmission scheduling algorithms and
Space and Naval Warfare Systems Center (SPAWAR). Any opinions, findings, Section V discusses a sensitivity study of the algorithms.
and conclusions or recommendations expressed in this material are those of
the authors and do not necessarily reflect the views of the Defense Advanced Section VI discusses the related work in this field. Section VII
Research Projects Agency, SPAWAR, or the U.S. Government. discusses the conclusions and future work.
A property of MVG_OMALLOOR
ISI-TR-2006-617 2

1 allows the node to identify that a frame destined for it has


2)
10
(C arrived and where the first bit of the frame begins.
Node 10
00
01

B. Optical CDMA codeset design


13101021 (Line)
01000011 (C1)
M 2 An Optical Orthogonal Codeset (OOC) is a set of (0,1)
sequences of length N that satisfies correlation constraints [3].
11
Transmit fiber Receive fiber 10
00
00
The term codeset is used to refer to the set of sequences, and
(C
0) the term codeword is used for a member of the set. Each 0 or
1 of a sequence is called a chip, and the codeword represents a
3 data bit. For any two codewords in the codeset, the correlation
constraints are:
N −1
X =w when i = j, τ = 0
s(i,n+τ ) s(j,n)
≤κ otherwise
Fig. 1. Typical optical CDMA LAN topology. Nodes are connected by n=0
transmit and receive fibers to a passive optical coupler in a star topology. where s(i,n) is the nth chip of the ith codeword, addition
is modulo N and 0 ≤ τ ≤ N − 1. κ is called the
Maximum Collision Parameter. The number w of ‘1 chips’
II. BACKGROUND of a codeword of the codeset is called its weight. A particular
codeset is specified by the parameters (N, w, κ). The size S
This section provides background on optical CDMA LAN
of the codeset is the number of codewords in the codeset.
architecture, codeset design and receiver design.
Codesets with all codewords having the same weight are called
constant weight codesets. [3] and [4] describe several codeset
A. Optical CDMA LAN architecture construction methods. The codesets used in this work are
The optical CDMA network considered in this work is a constant weight codesets generated by the greedy construction
shared medium, packet switched, multiple access LAN. The method [3]. The rate at which individual chips are transmitted
is called the chipping rate B. The rate at which the data bits
physical layer is optical CDMA that uses unipolar encoding
and intensity modulation over a single wavelength. are transmitted is called the data rate. The chipping rate is
N times the data rate. The codewords are pseudo-orthogonal
The network consists of several nodes connected by optical
because optical CDMA uses unipolar encoding1.
fiber to a passive star coupler as shown in Figure 1. The optical
coupler consists of several inputs and output ports. Each node
is connected to one input and one output port by a transmit and C. Optical CDMA receiver design
receiver fiber respectively. Signals transmitted on the inputs The optical CDMA receiver (also called a decoder) is a
enter the coupler, merge and are transmitted on all outputs. hard-limiting correlation receiver [5]. The receiver decodes the
The star coupler is passive i.e. the input power is split equally codeword in the received signal and regenerates the transmitted
among the receive fibers and is transmitted to all nodes on the data. Figure 2 depicts the operation of a receiver. The input
receive fibers. The signal at the output of the coupler on any signal from the coupler is a multilevel optical signal. The
receive fiber is given by receiver converts it to a digital optical signal by hard limiting
K
the power in each chip of the received signal. It then decodes
the signal to detect a 1 or 0 bit. Let R be the received
X
r(t) = (1/K) si (t)
i=1
signal (an N dimensional vector whose components are non-
negative integers), and C the codeword being received (an
where K is the number of ports connected to the coupler and N dimensional vector whose components are binary values).
si (t) is the signal entering on the ith transmit fiber. The signals Let R = [r0 r1 r2 ...rN −1 ] and C = [c0 c1 c2 ...cN −1 ]. Then the
on the transmit fibers si (t) are binary optical signals and the received bit b is given by
signal on a receive fiber r(t) is a multilevel optical signal.
The signal on the receive fiber may be amplified or attenuated b = 1 if (C · h(R) ≥ w)
after the coupler. = 0 otherwise
The network is based on a Tunable Transmitter-Fixed Re-
ceiver (TT-FR) architecture. A receiver chooses a codeword to PN −1· of two vectors [u0 u1 ...uN −1 ] ·
where the dot product
receive on and a transmitter which needs to communicate with [v0 v1 ...vN −1 ] = i=0 ui vi and h() is the hardlimiting
a receiver tunes to the receiver’s codeword. A TT-FR architec- operation defined as
ture eliminates the need for pre-transmission coordination [1]. h(R) = [s0 s1 ...si ...sN −1 ]
The network uses codeword sharing. If the number of nodes is where si = 0 if 0 ≤ ri < 1
greater than the codewords, the codewords are shared among
receivers. A higher layer unique identifier such as a link layer si = 1 if ri ≥ 1
address is used to demultiplex packets sharing a codeword. 1 This contrasts with CDMA on the wireless medium where bipolar encod-
Every node runs a frame synchronization algorithm [2] which ing is feasible. Bipolar codewords can be designed to be orthogonal.
A property of MVG_OMALLOOR
ISI-TR-2006-617 3

0 1 1 0 0 1 0 0 C3
0 1 0 0 1 0 1 0 C2
Control
0 1 0 0 0 0 1 1 C1
0 0 0 0 0 0 0 0 C0 (0 bit)
1 1 1 1 1 3 0 1 Line
Splitter TDL Coupler
Receive
Hard- t=0 1 2 3 4 5 6 7 8 9 10
fiber Photo- Threshold
limiter TDL (a)
detector detector
0 1 1 0 0 1 0 0 C3
TDL
0 1 0 0 1 0 1 0 C2
1 0 1 0 0 0 0 1 1 C1
3 3 1
2
1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 0 0 0 1 1 0 0 C0 (1 bit)
2 1 1 1 2 4 0 1 Line

t=0 1 2 3 4 5 6 7 8 9 10
(b)

Fig. 2. Optical CDMA receiver: The figure shows a hard-limiting correlation


detector that consists of a hard-limiter, decoder, photo-detector and a threshold Fig. 3. A bit error. In (a) C0 is OFF. Codewords C1 and C2 have chip overlaps
detector. The receiver is tuned to the codeword 1110000. The power in the with the 1 chips of C0. A false positive error will occur at the receiver. In
1st , 2nd and 3rd chip positions is summed by the decoder. The photo-detector (b) C0 is ON, so no false positive error will occur.
converts the signal to an electrical signal and the threshold detector detects a
1 bit.

from an (8, 3, 3) codeset2 . The figure is a snapshot of data


bits on an optical fiber sent by four nodes. Their combined
III. I NTERFERENCE AVOIDANCE signal on the line is indicated below the codewords. C0 is
the codeword being received. C1 and C2 have 1 chips that
overlap with C0’s 1 chips. Figure 3(a) shows the case when a
This section defines the transmission scheduling problem ‘0’ data bit is transmitted by the node sending C0. Figure 3(b)
and discusses algorithms for transmission scheduling. First shows the case when a ‘1’ data bit is transmitted. In (a)
it discusses the the problem of interference, the need for the receiver will erroneously detect a codeword (C0) because
interference avoidance and how it can be implemented as two other codewords overlap with it. The receiver tuned to
a contention media access control (MAC) protocol. Next, it C0 will falsely detect a ‘1’ data bit. This results in an error
discusses state and state estimation which are needed for and the loss of the data packet (unless other error correction
transmission scheduling. Finally, it defines the transmission mechanisms are used). This is an interference error. Therefore,
scheduling problem and discusses the algorithms. the condition for correct reception of a codeword is that at least
one of it’s ‘1 chips’ must not have a chip overlap with any
other codeword on the line. This works assumes that if an
interference error occurs in one bit of a packet, then the entire
A. The need for Interference Avoidance packet is lost.
A simple example can illustrate the principle behind Inter-
Interference occurs due to the multiplexing of packets on ference Avoidance. Consider the codewords shown in Figure 4.
a receive fiber. Interference errors increase as the offered The codewords are from a (8, 3, 3) codeset. The signal on
load on the network increases. Prior work [6] has shown that the line is called the state of the line (state will be defined
without media access control, at high offered load (100%) formally in Section III-C). If the codeword C0 is transmitted
the throughput of the network approaches zero. The bursty as shown in Figure 4(a) a false positive error would occur and
nature of data traffic means that in a operational network the packet sent on codeword C0 would be lost. If it was sent at
there will be periods of overload. Interference Avoidance is a different chip offset i.e. one chip time later (Figure 4(b)), all
a distributed, contention based media access control protocol three packets could be transmitted correctly. When delayed,
for broadcast, packet based, shared medium optical CDMA codeword C0 has at least one chip that does not interfere with
Local Area Networks. It improves the throughput of optical codewords C1, C2 and C3. Hence no false positive can occur
CDMA LANs under such conditions. and it will be received correctly. Interference Avoidance uses
the above principle. A transmitting node estimates the state of
When two or more packets overlap at a point on a receive
the line (state estimation) and schedules its packet transmis-
fiber (line), the codewords of the packets overlap. Codeword
sions to avoid interference errors (transmission scheduling).
overlaps may cause interference errors at the receiver. When a
codeword overlap occurs, two ‘1 chips’ of different codewords 2 The figure shows the codewords as chip synchronous. In reality this may
may overlap. This is termed a chip overlap. An interference not be true. Salehi [5] studied the effect of both chip synchronous and chip
error will occur during the reception of a codeword if there are asynchronous transmission on a correlation receiver and showed that the chip
synchronous case is a upper bound on the BER of the system. Following this
enough other codewords on the line which have chip overlaps result, this work (analysis, simulation and explanations) all assume that the
with the codeword being received. Figure 3 shows codewords codewords are chip synchronous on the fiber as shown in the figure.
A property of MVG_OMALLOOR
ISI-TR-2006-617 4

0 1 1 0 0 1 0 0 C3
0 1 0 0 1 0 1 0 C2
0 1 0 0 0 0 1 1 C1 Optical CDMA
1 0 0 0 1 1 0 0 Transmitter
C0 (1 bit) Bus
(from node Transmit
2 1 1 1 2 4 0 1 Line processor) fiber
(to coupler)
Transmission
t=0 1 2 3 4 5 6 7 8 9 10 Transmit
scheduling
buffer
module
(a) Receive
fiber
0 1 1 0 0 1 0 0 C3 (from
coupler)
0 1 0 0 1 0 1 0 C2 State State
Bus estimation observation
0 1 0 0 0 0 1 1 C1 module module
(to node
1 0 0 0 1 1 0 0 C0 (1 bit) processor)

2 1 1 1 4 1 1 1 Line
Receive Optical CDMA
buffer Receiver
t=0 1 2 3 4 5 6 7 8 9 10
(b)

Fig. 4. An interference error is caused in C0 in (a). No error is caused when Fig. 5. Block diagram of an Interference Avoidance Network Interface Card.
the same codewords are sent with a different set of chip offsets. (b) shows
codeword C0 delayed by 1 chip time

C. Optical CDMA State and State Estimation


The signal at any time at any point on the receive fiber of
B. Interference Avoidance media access control an optical CDMA LAN is a multilevel signal due to the sum
of the codewords. The state of the line is a vector of length
Interference Avoidance is a contention media access con- N equal to the sum of the codewords at output of the coupler
trol (MAC) protocol. Each node on the network contends assuming that all nodes are transmitting 1 bits.
for access to the medium using the Interference Avoidance M
X
protocol. Figure 5 shows a block digram of an Interference S(t) = [s0 s1 s2 ....sN −1 ] = rot(Ci , φi )
Avoidance Network Interface Card. It consists of an optical i=0
CDMA transmitter, optical CDMA receiver, state estimation where M is the number of codewords on the line at the output
module and transmission scheduling module (state will be of the coupler at time t, Ci = [c0 c1 ...cN −1 ] is a codeword
formally defined in Section III-C). present at the output of the coupler, rot(Ci , φi ) is a vector
The state estimation module performs two functions: receiv- of length N equal to the left rotation of the codeword Ci by
ing and estimation. It receives the multilevel optical signal on φi and φi is the number of chips between Ci ’s leading chip
the receive fiber and collects observations of the state of the (i.e. the chip that was transmitted first, c0 ) and the output of
line. It uses a series of state observations to calculate a state the coupler. It is a hypothetical, idealized representation of
estimate. The state estimation algorithm is always active. It the state of the system. It is possible that the state may never
is run continuously in a loop, collecting state observations actually be observed as a signal on the optical fiber. The state
and calculating a state estimate. The state estimation module transitions to a new value on a packet arrival or departure.
consists of both optical and electronic components. A node can receive the multilevel optical signal and convert
The transmission scheduling module uses the state estimate it to electronic form using hardware. The received data can be
and the codeword to be used for encoding to calculate a used to construct a series of state observations.
value k (where 0 ≤ k < N ) such that interference loss The state estimation problem is to calculate the state of the
is minimized if the packet’s transmission is delayed by k line given a series of state observations collected from the re-
chip times relative to the packet’s arrival time. Transmission ceive fiber. A simple state estimation algorithm could estimate
scheduling is invoked on arrival of a packet from the node the state by averaging the state observations and dividing the
processor. It reads the current state estimate and the codeword result by the probability that a codeword is transmitting a 1 bit.
for encoding and calculates the delay. The optical CDMA An appropriate higher layer encoding format (such as 8B/10B)
transmitter encodes the data and begins transmission after the may be used to ensure that the observations have a sufficient
delay. The transmission scheduling module is purely electronic number of codewords transmitting a 1 bit.
and must compute the transmission delay within a few bit This work assumes perfect state estimation i.e. all the nodes
times of the current packet’s arrival. on the network know the state of the line. Future work will
examine the impact of realistic state estimation.
The electronic part of the state estimation module and the
transmission scheduling module may be integrated and im-
plemented in a single ASIC chip and optimized for minimum D. Transmission scheduling
latency. This paper focuses on the analysis of the performance Transmission scheduling is a process by which a node, given
of a network of Interference Avoidance nodes. Future work a state estimate and a codeword to be transmitted, calculates
will examine the implementation of the NIC hardware. a codeword delay such that interference errors are reduced. If
A property of MVG_OMALLOOR
ISI-TR-2006-617 5

ctx ← Codeword to be transmitted ctx ← Codeword to be transmitted


state ← State estimate state ← State estimate
hstate ← hardlimit(state) hstate ← hardlimit(state)
td ← 0 td ← 0
for offset = 0 to N for offset = 0 to N
if (hstate & ctx 6= ctx ) then if (hstate & ctx 6= ctx ) then
mark offset as a feasible offset newstate = state + ctx
rotate ctx to the right by one chip numoverlaps = overlaps(newstate)
td ← any feasible offset if (numoverlaps < threshold)
mark offset as a feasible offset
TABLE I rotate ctx to the right by one chip
td ← any feasible offset
T HE P URE SELFISH TRANSMISSION SCHEDULING ALGORITHM
TABLE II
T HE T HRESHOLD TRANSMISSION SCHEDULING ALGORITHM

transmission can be scheduled, then the scheduling algorithm


returns an offset k such that 0 ≤ k < N . The offset is
the number of chips that the packet transmission should be erative strategy if the node schedules its transmission only if
delayed. The offset is measured with respect to the estimated it Preserves self/Preserves others or Destroys self/Preserves
state of the line. If transmission is not possible, then the packet others. Simple implementations of cooperative strategy are
transmission is deferred by returning it to a higher layer for either not feasible for all codesets or result in low throughput.
a retransmission attempt. Other defer mechanisms such as A pseudo-cooperative strategy attempts to reduce the proba-
1, non and p-persistent sensing [7] may also be used. The bility of destroying other packets on the line. It is a best effort
transmitting node does not have a receiver to detect errors in strategy which increases the probability of the events Preserves
its transmitted packet during transmission. Therefore packets self/Preserves others or Destroys self/Preserves others.
which experience interference errors during transmission are The following sections discuss three transmission schedul-
transmitted until completion. Transmission scheduling is done ing algorithms: Pure selfish, Threshold and Overlap section
on a per packet basis. scheduling. The transmission scheduling algorithms imple-
This work assumes perfect state estimation by all nodes on ment either selfish or pseudo-cooperative strategies or both.
the network. In perfect state estimation, every node knows the The section compares their performance to Aloha-CDMA i.e.
state of the line. All nodes see the same state at the same time. optical CDMA without any media access control.
The network is assumed to have zero propagation delay. It is 1) Pure selfish scheduling: The pure selfish algorithm
also assumed that state estimation is instantaneous and there is schedules a packet transmission only if the state of the line
no delay between state estimation and transmission scheduling. permits transmission without loss of its own packet. The
The transmitter knows its distance from the coupler (a = 0), algorithm is specified in Table I. The algorithm searches for
therefore it can schedule its transmission using the state esti- chip offsets where there at least one of the ‘1 chips’ from
mate. This an idealized, unrealizable state estimation algorithm the codeword to be transmitted aligns with a ‘0 chip’ in the
which allows easy analysis of transmission scheduling. state vector, thus ‘selfishly’ ensuring correct reception of this
When a packet is transmitted, interference errors could be codeword. It chooses one of these offsets at random.
caused in itself or in other packets. One of four possible events 2) Threshold scheduling: The threshold scheduling algo-
(transmission events) could occur: rithm searches for chip offsets where at least one of the ‘1
• Preserves self/Destroys other: The packet may be re- chips’ from the codeword to be transmitted aligns with a ‘0
ceived without error (i.e. preserves itself), but may cause chip’ in the state vector and the number of chip overlaps in
an error in one or more packets (i.e. destroys others) on the resulting state is below a threshold. It chooses one of these
the line. offsets at random. The threshold is expressed as a fraction of
• Preserves self/Preserves others: The packet preserves the codeword length N , called the threshold parameter α. The
itself and also preserves all other packets on the line. algorithm is specified in Table II.
• Destroys self/Preserves others: The packet destroys itself 3) Overlap section scheduling: The overlap scheduling
but preserves all other packets on the line. algorithm searches for chip offsets where at least one of the
• Destroys self/Destroys others: The packet destroys itself ‘1 chips’ from the codeword to be transmitted aligns with a
and destroys one or more other packets on the line. ‘0 chip’ in the state vector and the number of chip overlaps in
When scheduling a transmission, any one of the four the resulting state is below a threshold. It chooses one of these
transmission events could happen. A transmission scheduling offsets at random. The algorithm is specified in Table III.
strategy is a subset of the transmission events that a node tries
to achieve. A transmission scheduling algorithm is an imple- IV. P ERFORMANCE STUDY
mentation of a strategy. Two possible transmission scheduling In this section the transmission scheduling algorithms are
strategies are selfish and cooperative. An algorithm follows a analyzed and simulated. A mathematical analysis is described
selfish strategy if the node schedules its packet transmission which shows that the algorithms prevent throughput degrada-
only if the packet either Preserves self/Preserves others or tion. It is also shown that the threshold and overlap section
Preserves self/Destroys others. An algorithm follows a coop- algorithms have lower packet errors compared to the pure
A property of MVG_OMALLOOR
ISI-TR-2006-617 6

ctx ← Codeword to be transmitted 1


state ← State estimate Threshold scheduling
Overlap section scheduling
hstate ← hardlimit(state) 0.9 Pure selfish scheduling
Aloha-CDMA
td ← 0 0.8

Normalized network throughput


for offset = 0 to N
if (hstate & ctx 6= ctx ) then 0.7

newstate = state + ctx 0.6


numoverlaps = overlaps(newstate)
numones = ones(newstate) 0.5

if (numoverlaps < numones) 0.4


mark offset as a feasible offset
rotate ctx to the right by one chip 0.3

td ← any feasible offset 0.2

0.1
TABLE III
T HE OVERLAP SECTION TRANSMISSION SCHEDULING ALGORITHM 0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Normalized offered load

Fig. 6. Comparison of the performance of the transmission scheduling


algorithms based on analysis. The traffic model is Poisson arrivals with expo-
nentially distributed packet lengths. The codeset is (10, 3, 3) and codewords
selfish algorithm. A simulation study is used to validate the are chosen uniform randomly. For the threshold scheduling algorithm, the
mathematical analysis. threshold parameter was set to 0.5
The metric used to evaluate performance is the normalized
network throughput at different values of the normalized
offered load. The normalized offered load is the arrival rate of Poisson arrivals and exponentially distributed packet
(in packets/s) expressed as a fraction of the maximum possible sizes, the state transition diagram can be viewed as a
arrival rate (in packets/s) of the network when it is used as Markov chain. The Markov chain is solved for equi-
a single channel network3. The arrival rate is defined as the librium state probabilities at a particular offered load
aggregate rate at which packets arrive to all the nodes for (Appendix III).
transmission on the network. The normalized network through-
The analysis can be used to determine the normalized
put is the ratio of the number of packets that are transmitted
throughput at any normalized offered load. A graph of the nor-
over the network without error to the total number of packets
malized throughput vs. normalized offered load for different
offered for transmission multiplied by the normalized offered
scheduling algorithms is shown in Figure 6. The traffic model
load. It is a measure of the throughput of packets transmitted
is Poisson arrivals and exponentially distributed packet sizes.
without error at a particular offered load. Appendix I defines
Codeword allocation is uniform random over the codeset. The
the metrics formally and derives expressions for them.
graph indicates that a system with no transmission scheduling
(Aloha-CDMA) suffers throughput degradation. This may be
A. Analysis seen from the performance at high offered loads. Beyond
This section describes a mathematical analysis of the trans- an offered load of around 0.5, the network throughput de-
mission scheduling algorithms. The analysis follows the steps creases and tends to zero at high offered loads. In contrast,
below: the transmission scheduling algorithms all prevent throughput
• First, an expression for the normalized network through- degradation. Throughput is stabilized at around 30% of the
put is derived in terms of the aggregate arrival rate. This maximum throughput and remains stable as offered load is
expression is then expressed in terms of the number of increased.
codewords on the line (i.e. at a point on the receive
fiber) and the probability of packet error (packet error
B. Simulation
rate) (Appendix I).
• Then, a concise representation of line state which allows A discrete event based packet simulator was designed to
easy mathematical manipulation is defined (Appendix II- validate the mathematical analysis. The simulator modeled
A). multiple nodes on a broadcast shared medium optical CDMA
• Using this state representation, expressions are derived LAN. It implemented different state estimation algorithms,
for the number of codewords at a point on the line and transmission scheduling algorithms and a hard-limiting cor-
the probability of packet error when the system is in any relation receiver. Unless specified otherwise, the default pa-
state (Appendix II-B and II-C). rameters for the simulations are specified in Table IV. The
• Based on the transmission scheduling algorithm (Aloha- optical orthogonal codeset construction method was the greedy
CDMA, Pure Selfish, Threshold, Overlap section) the construction method [3]. It was used to generate several
state transition probabilities are calculated and a state codesets for a given set of codeset parameters. The results
transition diagram is constructed. Under the assumptions in this work did not depend on the codeset or the algorithm
used to generate the specific optical orthogonal codeset. The
3 For an optical CDMA network of chipping rate B chip/s, the maximum
results from the simulations are the mean of around 10 runs of
possible data rate of the network when used as a single channel network is
B b/s (the chipping rate becomes the bit rate). The maximum possible arrival anywhere from 10,000 to 100,000 packets each and standard
rate in packets/s is B divided by the average packet size in bits. deviations are shown on the graphs.
A property of MVG_OMALLOOR
ISI-TR-2006-617 7

1 10
Threshold scheduling Threshold scheduling
Overlap section scheduling Overlap section scheduling
0.9 Pure selfish scheduling 9 Pure selfish scheduling
Aloha-CDMA Aloha-CDMA
0.8 8

multiplexed at a point on the line


Normalized network throughput

Average number of codewords


0.7 7

0.6 6

0.5 5

0.4 4

0.3 3

0.2 2

0.1 1

0 0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Normalized offered load Normalized offered load

Fig. 7. Comparison of the performance of the transmission scheduling Fig. 8. Comparison of the codeword multiplexing of the different transmis-
algorithms based on simulation. The traffic model is Poisson arrivals with sion scheduling algorithms based on simulation. The traffic model is Poisson
exponentially distributed packet lengths. The codeset is (10, 3, 3) and code- arrivals with exponentially distributed packet lengths. The codeset is (10, 3, 3)
words are chosen uniform randomly. For the threshold scheduling algorithm, and codewords are chosen uniform randomly. For the threshold scheduling
the threshold parameter was set to 0.5 algorithm, the threshold parameter was set to 0.5

1
Threshold scheduling
Figure 7 shows the results of simulation for the same 0.9
Overlap section scheduling
Pure selfish scheduling
codeset as described in the analytical results. The results Aloha-CDMA
0.8
are quite similar to the analytical results. All transmission
0.7
scheduling algorithms prevent throughput degradation. Also Packet error rate

the overlap section and threshold scheduling show marginally 0.6

higher throughput than pure selfish scheduling. The analytical 0.5

model over predicts the throughput for Aloha-CDMA. This is 0.4

because the analysis is based on a finite state model. A finite 0.3


state model is suitable for transmission scheduling algorithms 0.2
which limit the traffic on the line. However for Aloha-CDMA, 0.1
the finite state model over predicts the equilibrium state
0
probabilities. As a result the analytical results differ from 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Normalized offered load
simulation.
Though Figures 6 and 7 indicate that all three scheduling Fig. 9. Comparison of the packet error rate for different transmission
scheduling algorithms based on simulation. The traffic model is Poisson
algorithms has approximately the same throughput, the algo- arrivals with exponentially distributed packet lengths. The codeset is (10, 3, 3)
rithms differ in the packet error rate. Figures 8 and 9 show and codewords are chosen uniform randomly. For the threshold scheduling
the average number of codewords multiplexed on the line at a algorithm, the threshold parameter was set to 0.5
point on a receive fiber and the average packet error rate for
the transmission scheduling algorithms.
There is a trade-off between the number of codewords at a number of codewords on the line. To the right of the maximum,
point on the line and the packet error rate. The transmission the throughput is lower due to the higher packet error rate. The
scheduling algorithm tells a node if it can transmit. It also objective of the transmission scheduling algorithm is to keep
tells the node when to transmit. By doing this the transmission the system operating point close to the maximum irrespective
scheduling algorithm controls two quantities: of the offered load. Therefore, if the transmission scheduling
• The number of codewords at a point on the line. algorithm is aggressive and allows more codewords on the
• The chip offsets of the codewords on the line which line, the packet error rate increases, lowering throughput. On
affects the packet error rate. the other hand if the algorithm is conservative and does not
The trade-off can be understood by considering the perfor- allow enough codewords on the line, the throughput remains
mance of Aloha-CDMA. As the offered load increases, the low. So the transmission scheduling algorithm must carefully
number of codewords on the line for Aloha-CDMA shows balance the number of codewords on the line and the codeword
a linear increase with offered load. Initially as the number offsets so as to maximize throughput.
of codewords on the line increases, the network throughput The difference between the three scheduling algorithms is
increases. But as the number of codewords on the line in- evident from Figure 9. There are differences in the packet error
creases further, interference errors increase and as a result the rate. The threshold and overlap section scheduling algorithms
packet error rate increases. As a result the network throughput are conservative and constrain the number of overlapping
falls. Therefore as the offered load increases, the network chips. This results in a lower number of codewords on the
throughput attains a maximum and then decreases. To the line and low errors due to interference. However the self-
left of the maximum, the throughput is lower due to the low ish algorithm is aggressive and admits a larger number of
A property of MVG_OMALLOOR
ISI-TR-2006-617 8

Parameter Default value 1


Codeset parameters: Threshold scheduling
Overlap section scheduling
0.9
Codeset length N 100 Pure selfish scheduling
Aloha-CDMA
Number of wavelengths Λ 1 0.8

Normalized network throughput at


Codeset weight w 3

normalized offered load of 1


0.7
Maximum crosscorrelation parameter κ 3
Size of codeset S 100 0.6
Chipping rate: 10 Gc/s
0.5
Codeword allocation: Uniform random
Interference Avoidance parameters: 0.4
Transmission scheduling algorithm: Threshold scheduling
0.3
Threshold: 0.5
State estimation algorithm: Perfect state estimation 0.2
Traffic parameters:
0.1
Inter-arrival time distribution Exponential
Normalized offered load 1 0
0 10 20 30 40 50 60 70 80 90 100
Packet size distribution Exponential
Codeset length N
Average packet size 1000 bytes
Destination address distribution: Uniform random Fig. 10. Comparison of the performance of the transmission scheduling
Topology parameters: algorithms as the codeset length is varied (based on simulation). The traffic
Node to coupler distance distribution Deterministic model is Poisson arrivals with exponentially distributed packet lengths. The
Average node to coupler distance 0m codeset weight is 3 and κ = 3. Codewords are chosen uniform randomly
Number of nodes 100 from the set. For the threshold scheduling algorithm, the threshold parameter
was set to 0.5
TABLE IV
PARAMETER LIST AND DEFAULT VALUES FOR THE TRANSMISSION
SCHEDULING SENSITIVITY STUDY. codeset length. Therefore, network throughput is independent
of codeset length and transmission scheduling scales with
increase in codeset length.

codewords with a higher probability of packet error. When B. Effect of varying the weight of the codeset
packets are lost due to interference errors, the higher layers Changing the codeset weight w has two effects: As w
of the protocol stack must recover through some form of is increased, the threshold on the correlation receiver can
Automatic Repeat Request (ARQ) or Forward Error Correction be increased. Increasing the threshold makes the codewords
(FEC). Therefore the threshold and overlap section scheduling more resistant to interference. This is because it takes a
algorithms are better choices because a larger fraction of the larger number of chip overlaps to cause a false positive error.
packets transmitted are transmitted without error. However, with the increase in weight, each codeword causes
more interference with other codewords. An increase in w also
V. S ENSITIVITY ANALYSIS makes it difficult for the transmission scheduling algorithm to
A simulation based study was conducted to allow a deeper schedule codewords on the line without causing interference
sensitivity analysis of the transmission scheduling algorithms. errors. This reduces the number of codewords that can be
The study considered parameters at the physical layer (codeset simultaneously transmitted on the line. The results show that
parameters), the media access control layers (the scheduling as the weight increases the throughput decreases rapidly. The
algorithm parameters) and the traffic model (packet arrival and reduction in the codewords on the line and the increased
size distributions). The objective of this study is to quantify interference offset any gains in the resistance to interference.
the impact of these factors on the transmission scheduling It has been shown [8] that codesets with higher weight have
algorithms. The sensitivity analysis consisted of quantifying better bit error rate characteristics at low loads. At low loads
the: the increase in resistance to interference dominates resulting
in higher throughput for high weight codesets. However as the
• Effect of varying the codeset length.
load is increased, the effect of interference tends to dominate,
• Effect of varying the codeset weight.
resulting in lower throughput for high weight codesets. Fig-
• Effect of different packet size distributions.
ure 11 shows a graph of the network throughput at offered
• Performance under realistic network traffic.
load of 1 vs. the weight.

A. Effect of varying the length of the codeset C. Effect of packet size distribution
Increasing the length of the codeset has several effects. As Figure 12 shows the packet throughput as the average
N increases, the scheduling algorithm can schedule a larger packet size is varied. The traffic model is Poisson arrivals
number of codewords simultaneously on the line. Therefore and exponentially distributed packet sizes. The figure shows
more nodes can transmit in parallel without error. However that the packet size has no effect on packet throughput.
the nodes transmit at a lower data rate. The results show However, studies indicate that real network traffic packet
that the two effects balance each other and the network size distributions may not be exponential [9]. Recent packet
throughput is constant when N is varied. Figure 10 shows statistics obtained from a backbone network [10] exhibit a
a graph of network throughput at an offered load of 1 vs. the trimodal distribution. In one trace, about 70% of the packet
A property of MVG_OMALLOOR
ISI-TR-2006-617 9

1 1
Threshold scheduling Threshold scheduling
Overlap section scheduling Overlap section scheduling
0.9 Pure selfish scheduling 0.9 Pure selfish scheduling
Aloha-CDMA Aloha-CDMA
0.8 0.8
Normalized network throughput at

Normalized network throughput


normalized offered load of 1

0.7 0.7

0.6 0.6

0.5 0.5

0.4 0.4

0.3 0.3

0.2 0.2

0.1 0.1

0 0
0 1 2 3 4 5 6 7 8 9 10 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Codeset weight w Normalized offered load

Fig. 11. Comparison of the performance of the transmission scheduling Fig. 13. Comparison of the performance of the transmission scheduling
algorithms as the codeset weight is varied (based on simulation). The traffic algorithms for a trimodal packet size distribution (based on simulation). The
model is Poisson arrivals with exponentially distributed packet lengths. The traffic model is Poisson arrivals with packet size distribution consisting of
codeset length is 100 and κ = 3. Codewords are chosen uniform randomly for 70% 40 byte packets, 20% 1500 byte packets and 10% 500 byte packets. The
the codeset. For the threshold scheduling algorithm, the threshold parameter codeset is (100, 3, 3) and codewords are chosen uniform randomly. For the
was set to 0.5 threshold scheduling algorithm, the threshold parameter was set to 0.5

1
Threshold scheduling
Overlap section scheduling
where short packets tend to experience lower error rates than
0.9 Pure selfish scheduling
Aloha-CDMA long packets [11].
0.8
The squeeze through effect can be demonstrated analytically
Normalized network throughput at
normalized offered load of 1

0.7 and through simulation for a network with a bimodal distri-


0.6 bution of packet sizes which uses a pure selfish transmission
0.5 scheduling algorithm and a codeset with κ = w. Consider a
0.4 network where the traffic has two packet types of sizes l1
0.3
and l2 where l1 < l2 . Let the fraction of packets of size
l1 be γ. Then the average packet size on the network is
0.2
lavg = (γ)l1 + (1 − γ)l2 . The throughput of such a network
0.1
can be calculated by finding the probability of packet error
0
0 100 200 300 400 500 600 700 800 900 1000 Perror and the number of codewords on the line Nl .
Mean packet size in bytes The average number of codewords on the line at any point
Fig. 12. Comparison of the performance of the transmission scheduling on the receive fiber Nl depends on the transmission scheduling
algorithms as the average packet length is varied (based on simulation). The
traffic model is Poisson arrivals and exponentially distributed packet sizes.
algorithm. If there are Nl codewords on the line, then Nl w
The codeset is (100, 3, 3) and codewords are chosen uniform randomly. The 1 chips were added to the state. Of these, Nl + (w − 1) 1
algorithm was threshold scheduling, the threshold parameter was set to 0.5 chips were aligned with 0 chips of the state (during selfish
scheduling) and (Nl −1)(w −1) 1 chips were added randomly
to any position (κ = w). The probability that the state vector
has no 0 chips is
sizes were 40 bytes, about 20% were 1500 bytes and the
1
remaining were around 500 bytes long. A traffic model with Pf ull = 1 − (1 − )(Nl −1)(w−1)
such a trimodal packet size distribution was used to drive a (N − (Nl + (w − 1)))
simulation that used Poisson arrivals, uniform random codeset At an offered load of 1, packets are arriving for transmission
allocation and a (100, 3, 3) codeset. The results are shown at a rate much higher than the rate at which packets are trans-
in Figure 13. The graph shows interesting behavior. Aloha- mitted (the transmission scheduling does not allow all packets
CDMA does not degrade as much as in the case of Pois- to be transmitted). When a packet departs from the line, a few
son traffic/exponential packet sizes. The other transmission chips of the state may change from 1 to 0. The next packet
scheduling algorithms have almost 25% higher throughput arrival will result in a transmission of a packet such that the
when compared to performance with exponentially distributed 0 chips will be filled. Therefore under equilibrium conditions,
packet sizes. A majority of the packets are small size packets for the pure selfish scheduling algorithm, Pf ull will be close
(40 bytes). Study indicates that the packet error rate is lower to 1. Through simulation Pf ull is determined to be around
for short packets than for long packets. Fewer long packets 0.85 for the pure selfish algorithm under Poisson arrivals and
are transmitted on the line and a large fraction of them are exponentially distributed packet sizes. It is assumed that this
lost due to errors. This squeeze through effect results in an is true for bimodal packet distributions too. Therefore, the
increase in the aggregate network packet throughput. This number of codewords on the line can be calculated by finding
behavior occurs when the fraction of shorter packets is fairly Nl such that Pf ull is close to 1.
high (60-70%). This is similar to behavior on wireless links Interference errors in a packet on the line are caused
A property of MVG_OMALLOOR
ISI-TR-2006-617 10

1 1
Simulation Threshold scheduling
Analysis Overlap section scheduling
0.9 0.9 Pure selfish scheduling
Aloha-CDMA
0.8 0.8

Normalized network throughput


Normalized network throughput

0.7 0.7
at an offered load of 1

0.6 0.6

0.5 0.5

0.4 0.4

0.3 0.3

0.2 0.2

0.1 0.1

0 0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Fraction of short packets Normalized offered load

Fig. 14. The squeeze through effect. The throughput is maximized when Fig. 15. Comparison of the performance of the transmission scheduling
the fraction of short packets is 0.9. The graph shows both analytical and algorithms for a realistic traffic model (based on simulation). The traffic
simulation results. The transmission scheduling algorithm is pure selfish. The model was based on real network traffic traces (see description). The codeset
packet sizes are 50 bytes and 1000 bytes. The codeset is (100,3,3). is (100, 3, 3) and codewords are allocated to addresses. For the threshold
scheduling algorithm, the threshold parameter was set to 0.5

by packets that arrive during the packet’s transmission. The


transmission scheduling algorithm allows only a fraction of the low error rates. The throughput attains a maximum when the
arriving packets (called colliding packets) to be transmitted. fraction of short packets reaches a particular value (around
The probability of packet error in a codeword on the line is 0.9).
the probability that at least one of its colliding packets causes The higher throughput of shorter packets may not be a
an interference error. If the number of colliding packets is nc , desirable characteristic, because it is unfair to longer packets.
then nc 1 chips are added to the state selfishly (align with 0 Future work will address the issue of providing a uniform
chips) and nc (w − 1) 1 chips are added to the state in random dropping probability to all traffic. Possible alternatives include
positions. These random positions are chosen from N − 1 using constant packet sizes or varying the codeset length.
possible choices (1 chip is chosen selfishly). The probability
that one of the added 1 chips overlaps with the one of the 1
chips of the codeword on the line is p = w/(N − 1). The D. Performance with real network traffic
probability of packet error is the probability that more than The assumption of Poisson arrival and exponential dis-
w − 1 overlaps occur. Therefore, tributed packets lengths is convenient for analysis. However,
w−1
X  nc (w − 1)  the inter-arrival and packet size distribution of real network
Perror = 1 − pk (1 − p)nc (w−1)−k traffic could be different depending on when and where it is
k
k=0 observed.
At a normalized offered load of 1, the average packet inter- Simulations were performed with traffic traces obtained
arrival time is tarrival = lavg /B where B is the chipping rate from a real network link to understand the impact of real
of the network. The transmission time for packets of type 1 is packet arrival times. Traffic traces from a single OC48 [12]
t1 = l1 /(B/N ) where N is the codeset length. The average link were used. Several of these traces were merged to generate
number of colliding packets for packet type 1 is, traffic of different offered loads. The packet sizes, source
addresses, and destination addresses were preserved during
nc1 = (t1 /tarrival ) ∗ (Nl /N )
merging. The packet size distribution was trimodal (35% of
A similar expression can be derived for nc2 . This can be used the packets were 40 bytes, 30% were 500 bytes and 35% were
to calculate the probability of packet error for each type of 1500 bytes). The traffic file had approximately 6000 unique
packet Perror1 and Perror2 . source addresses and 40000 unique destination addresses. In
The normalized network throughput based on the definition contrast to all the previously described results, in this case
in Appendix I is given by the nodes mapped destination addresses to codewords before
transmission. Where codewords were insufficient, codeword
T h = (Nl /N )(γ(1 − Perror1 ) + (1 − γ)(1 − Perror2 ))
reuse was used.
The results of the simulation are shown in Figure 15. The
A graph of normalized network throughput vs. the fraction results indicate that the performance is similar to that of
of short packets is shown in Figure 14. The packet sizes were the Poisson arrivals/exponentially distributed model, indicating
set to 50 bytes and 1000 bytes. The results (both analysis that it was a fairly reasonable choice for analysis. Note that
and simulation) show that the normalized network throughput the performance improvements of the previous section due to
peaks at a particular value of the fraction of small packets the squeeze through effect are not visible here. The proportion
confirming the squeeze through effect. The long packets expe- of smaller packets (40 bytes) in the traffic was not sufficient
rience high packet error rates and the short packets experience to cause the squeeze through effect.
A property of MVG_OMALLOOR
ISI-TR-2006-617 11

VI. R ELATED WORK systems state is a scalar variable and media access control
is through admission control i.e. the number of simultaneous
Work related to Interference Avoidance can be divided into users is controlled.
four areas: Bit error rate analysis of optical CDMA networks,
optical CDMA codeset design, FEC for optical CDMA and
media access control in optical/wireless networks. VII. C ONCLUSIONS AND FUTURE WORK
Salehi [5], [8] analyzed an optical CDMA based network This work has presented an analysis of transmission
and developed expressions for the bit error rate of a network scheduling algorithms for optical CDMA media access control.
that uses codesets with κ = 1. The analysis also determined The analysis quantified the difference between throughput of
the bit error rate for codesets with different lengths and systems with and without transmission scheduling and showed
weights and with hard-limiting at low loads using Aloha- that transmission scheduling achieved 30% throughput while
CDMA. This work examines these results in the context of non scheduled systems had close to zero throughput. Simula-
transmission scheduling at high offered loads. tions showed that the throughput of transmission scheduling is
The area of optical CDMA code design has focused on con- independent of codeset length. It also showed that an increase
struction of codesets with large size. Chung et al. [3] described in weight can lead to a degradation in the performance of these
several algorithms to construct OOCs. These constructions are algorithms, although the degradation is not as bad as systems
for codes with maximum crosscorrelation parameter κ = 1. without transmission scheduling. Simulations also showed that
Chung and Kumar [13] described a method for construction transmission scheduling prevents degradation when used with
of codes with κ = 2. Several construction methods for OOCs a realistic traffic model based on traffic obtained from a real
are described in [4] and [14] among others. network.
Efforts at reducing packet errors in optical CDMA have Limitations of this work include the fact that it assumes per-
mostly focused on using error correcting codes on top of fect state estimation and neglects errors due to synchronization
optical CDMA. Hsu et al. [15] analyzed the performance of and receiver contention. Future work will explore the impact
slotted and unslotted optical CDMA packet networks. They of realistic state estimation.
developed expressions for the throughput of the network and Work in progress includes a testbed implementation of the
showed performance can be improved using Forward Error transmission scheduling hardware. The testbed demonstrates
Correction (FEC) codes and hard limiters. Muckenheim et a simplified form of threshold transmission scheduling by
al. [16] studied the effect of bit error probability on the packet transmitting bits such that the number of chip overlaps is
error probability and suggested the use of block codes to constrained. Measurements indicate that the bit error rate is
reduce packet errors. They also described a random delay substantially lower for this system than for a system without
protocol to reduce the errors incurred during periods of high transmission scheduling.
activity and showed throughput improvement. The mechanism
detects periods of high activity and defers transmissions. In
contrast Interference Avoidance does not use any FEC and R EFERENCES
schedules packet transmissions to avoid interference.
[1] B. Mukherjee, “WDM based local lightwave networks. Part I: Single
Contention media access control mechanisms such as Car- hop systems,” IEEE Network Magazine, vol. 6, no. 3, pp. 12–27, May
rier Sense and Collision Detection for optical networks have 1992.
[2] A. Keshavarizian and J. A. Salehi, “Optical orthogonal code acquisi-
been studied in [17]. Interference Avoidance in optical CDMA tion in fiber optic CDMA systems via simple search method,” IEEE
is analogous to carrier sensing in single channel shared Transactions on Communications, vol. 50, no. 3, pp. 473–483, March
medium networks. Interference Avoidance can be viewed as 2002.
the result of applying CSMA design principles to the optical [3] H. Chung, J. Salehi, and V. K. Wei, “Optical orthogonal codes: Design,
analysis, and applications,” IEEE Transactions on Information theory,
CDMA physical layer. vol. 35, no. 3, pp. 595–605, May 1989.
Synchronous-CDMA [18] is a CDMA based physical layer [4] O. Moreno, Z. Zhang, P. Kumar, and V. Zinoviev, “New constructions
of optimal cyclically permutable constant weight codes,” IEEE Trans-
for cable networks. Nodes reserve codewords to use in a time actions on Information Theory, vol. 41, no. 2, March 1995.
slot through a centralized controller. This mechanism is similar [5] J. Salehi, “Code division multiple-access techniques in optical fiber
to the Interference Avoidance techniques in that it performs networks - Part 1: Fundamental principles,” IEEE Transactions on
admission control and restricts the number of simultaneous Communications, vol. 37, no. 8, pp. 824–833, Aug. 1989.
[6] P. Kamath, J. D. Touch, and J. A. Bannister, “The need for media access
users on the network. However it is centralized and admission control in optical CDMA networks,” in IEEE Infocom, vol. 4, March
control is static (by codeword assignment). 2004, pp. 2208–2219.
In wireless networks, several mechanisms have been pro- [7] F. A. Tobagi and V. B. Hunt, “Performance analysis of carrier sense
multiple access with collision detection,” Computer Networks, vol. 4,
posed to take advantage of knowledge about channel condi- no. 5, pp. 245–259, Oct. 1980.
tions. State in wireless networks has to account for the chan- [8] J. Salehi and C. Brackett, “Code division multiple-access techniques in
nel noise and multi-path effects. Channel load sensing [19], optical fiber networks - Part 2: Systems performance analysis,” IEEE
Transactions on Communications, vol. 37, no. 8, pp. 834–842, Aug.
[20], [21], MIMO/CSIT based media access control [22] and 1989.
scheduling algorithms [23] are systems where wireless state [9] V. Paxson and S. Floyd, “Wide area traffic: the failure of Poisson
has been used to schedule transmissions. The differences modeling,” IEEE/ACM Transactions on Networking, vol. 3, no. 3, pp.
226–244, 1995.
between these mechanisms and Interference Avoidance are [10] Sprint ATL Labs, “Packet size distributions from an internet backbone,”
the state description and the scheduling algorithms. In these www.sprintlabs.com, March 2005.
A property of MVG_OMALLOOR
ISI-TR-2006-617 12

[11] B. S. Bakshi, P. Krishna, N. H. Vaidya, and D. K. Pradhan, “Improving For any other transmission scheduling algorithm, the same
performance of TCP over wireless networks,” in International Confer- average number of packets are offered for transmission. How-
ence on Distributed Computing Systems (IDCS), May 1997, pp. 365–
373. ever the transmission scheduling algorithm does not allow all
[12] NLANR, “Traffic traces from an OC48 link,” www.nlanr.net, March of these packets to be transmitted. Let the average number
2005. of packets on the line at any point of a receive fiber be
[13] H. Chung and P. V. Kumar, “Optical orthogonal codes - new bounds
and an optimal construction,” IEEE Transactions on Information Theory, Nonline , of which a fraction Pe are lost due to error. The
vol. 36, no. 4, pp. 866–873, July 1990. ratio of the average number of error free packets transmitted
[14] R. Fuji-Hara and Y. Miao, “Optical orthogonal codes: Their bounds and to the average number of packets offered for transmission is
new optimal constructions,” IEEE Transactions on Information Theory,
vol. 46, no. 7, pp. 2396–2406, Nov. 2000. Nonline (1 − Pe )/(λ/µ)
[15] C. S. Hsu and V. O. K. Li, “Performance analysis of slotted fiber- Therefore,
optic code division multiple access (CDMA) packet networks,” IEEE
Transactions on Communications, vol. 45, no. 7, pp. 819 – 828, July T hnorm = (Nonline (1 − Pe )/(λ/µ))ρ
1997. = (Nonline (1 − Pe )/(λ/µ))(λ/µN )
[16] J. Muckenheim, K. Iversen, and D. Hampicke, “Construction of high-
efficient optical CDMA computer networks: Statistical design,” in IEEE = Nonline (1 − Pe )/N
International Conference on Communications, vol. 3, June 1998, pp.
1289–1293.
[17] C. Chae, E. Wong, and R. Tuckker, “Ethernet over passive optical A PPENDIX II
network based on optical CSMA/CD media access technique,” in In- N ORMALIZED NETWORK THROUGHPUT
ternational Symposium on Services and Local access, April 2002.
[18] Cable Television Labs Inc., “Data Over Cable Service Interface Spec- This appendix derives an expression for the normalized
ifications (DOCSIS) 2.0, Radio Frequency Interface Specification,” no. network throughput of an Interference Avoidance based optical
SP-RFIv2.0, April 2004.
[19] A. H. Abdelmonem and T. N. Saadawi, “Performance analysis of spread
CDMA LAN. First, a concise representation of line state which
spectrum packet radio network with channel load sensing,” IEEE Journal allows easy mathematical manipulation is defined. Using this
on Special Areas in Communications, vol. 7, no. 1, pp. 161–166, Jan. state representation, expressions are derived for the number of
1989.
[20] G. Judge and F. Takawira, “Spread Spectrum CDMA Packet Radio MAC
codewords on the line and the probability of error when the
Protocol using Channel Overload Detection and Blocking,” Wireless system is in any state.
Networks, vol. 6, pp. 467–479, December 2000.
[21] K. Toshimitsu, T. Yamazoto, M. Katayama, and A. Ogawa, “A novel
spread slotted Aloha system with channel load sensing protocol,” IEEE A. State representation
Journal on Special Areas in Communications, vol. 12, no. 4, pp. 665–
672, May 1994. The state of the line can be represented by a pair (n0 , n1 )
[22] S. A. Reddy and L. Tong, “Exploiting decentralized channel state infor- where n0 < N and n1 < N . n0 is the number of zeros
mation for random access,” IEEE Transations on Information Theory,
vol. 51, no. 2, pp. 537–561, Feb. 2005. in the true state and n1 is the number of ones. The number
[23] T. Shepard, “Decentralized channel management in scalable multihop of overlaps is nov = N - (n1 + n0 ). The term state will be
spread-spectrum packet radio networks,” PhD. Thesis, no. MIT/LCS/TR- used to refer to this reduced representation of the state of the
670, 1995.
line. The state of the line could be any value (n0 , n1 ) where
0 ≤ n0 ≤ N and 0 ≤ n1 ≤ N . A valid state is defined
A PPENDIX I as a state where n0 + n1 ≤ N . All other states are invalid
O PTICAL CDMA LAN PERFORMANCE METRICS (when n0 + n1 > N ) The initial state is defined as the state
Let the aggregate arrival rate of packets to the network be of the line when no codewords are on the line i.e. (N, 0). A
λ packets/s. If the average packet size is L bytes, the chipping reachable state is defined as a state which can be reached from
rate is B chips/s, then the maximum possible packet arrival the initial state by a series of state transitions due to packet
rate on a single channel network is B/8L packets/s. Therefore, arrivals. The initial state (N, 0) is, by definition, a reachable
the normalized offered load ρ is, state. The set of reachable states depends on the transmission
scheduling algorithm. When there are no codewords on the
ρ = 8Lλ/B line i.e. no node is transmitting packets, the state at a point
on the line is the initial state i.e. (N , 0), i.e. N zeroes and
Consider an optical CDMA LAN where the arrival rate of
0 ones and overlaps. The arrival of a single codeword adds
packets is λ packets/s. The service rate µ (in packets/s) of the
w ‘1 chips’ to the state of the line and the state changes.
network is the rate at which packets are transmitted on the
This is called a state transition. Let the start state of a state
network. For an optical CDMA LAN using a codeset (N ,
transition be (f romn0 , f romn1 ) and the destination state be
w, κ), an average packet size of L bytes, and a chipping
(ton0 , ton1 ). A state transition may be caused only by a packet
rate B chips/s the service rate is µ = B/(8LN ) packets/s.
arrival or departure4. When a codeword is added to the line,
Substituting for B in the expression above,
w 1 chips are added. A ‘1 chip’ could overlap with a 0, 1 or
ρ = 8Lλ/(8LN µ)) = λ/µN an overlap. Let the number of ‘1 chips’ overlapping with 0s,
1s and overlaps be c0 , c1 and coverlap respectively.
Consider an Aloha-CDMA system where packets are trans-
mitted on arrival. Consider any point on a receive fiber. If each 4 The effect of ON-OFF keyed modulation is neglected by assuming that a

packet takes an average time of 1/µ seconds at that point, then packet consists of only 1 data bits i.e. all data bits are ON. Packet arrivals
and departures are assumed to be the sole cause of any state change. This
Little’s law, the average number of packets at that point (on assumption means that the probability of error calculated is higher that the
the line) is λ/µ. true value and the throughput is the worst case throughput.
A property of MVG_OMALLOOR
ISI-TR-2006-617 13

assumed to be ON i.e. transmitting 1 bits although that may


N-w-1, w N-w, w
not necessarily be true. Therefore the calculated packet error
rate is the worst case packet error rate.
N-w-1, w-1 N-w-1, w-1

C. Number of codewords multiplexed at a point on the line


N-w-2,w-2
Consider a graph where the nodes of the graph are the states
and each state transition due to an arrival forms a directed edge
N, 0 (neglect same state transitions). For any selfish transmission
scheduling algorithm, this graph is a directed acyclic graph.
In the graph, each edge represents the arrival of exactly one
Fig. 16. State transition diagram packet. Therefore the number of codewords on the line for
a state (n0 , n1 ) depends on the number of edges from the
initial state (N, 0) to (n0 , n1 ). Both the shortest and the longest
Then, path may be calculated in polynomial time. The length of the
c0 = f romn0 − ton0 shortest and longest path from the initial state to that state are
c1 = tonoverlap − f romnoverlap lower and upper bounds on the number of codewords on the
coverlap = w − (c0 + c1 ) line when the line is in that state5 .
A valid transition is defined as a transition where the start Therefore, for valid states,
state and the destination state are valid, reachable states and
Nonline (n0 , n1 ) ≥ ShortestP ath((N, 0), (n0 , n1 ))
c0 ≥ 0
c1 ≥ 0
Nonline (n0 , n1 ) ≤ LongestP ath((N, 0), (n0 , n1 ))
coverlap ≥ 0
An admissible transition is defined as a valid transition For invalid states,
which is permitted by the transmission scheduling algorithm.
A same state transition is defined as a transition from a state Nonline (n0 , n1 ) = 0
to itself. A state transition diagram can be drawn based on
the admissible transitions. Figure 16 shows a portion of a state
transition diagram for a (N, w, κ) codeset. Because of the large D. Normalized network throughput
size of the diagram, only a few states are shown. Invalid states
are not indicated in the diagram. The diagram shows the initial From Appendix I, the normalized throughput in a state (n0 ,
state (N, 0) and state transitions to a few states. n1 ) is given by

T h(n0 , n1 ) = (Nonline (n0 , n1 )/N )(1 − Pe (n0 , n1 ))


B. Probability of packet error
The probability of error depends on the state. For a state where Nonline (n0 , n1 ) is the number of codewords on the
(n0 , n1 ), the probability of error is the probability that for line at a point on the receive fiber in any state and Pe (n0 , n1 )
any codeword, all its ‘1 chips’ overlap with other 1 chips or is the probability of error in any state.
overlaps. To calculate the probability of error, the locations of The average normalized throughput at a given offered load
the ‘1 chips’ in the codeword are assumed to be chosen random is given by
i.e. the codeset construction uses κ = w. For any selfish
N N
algorithm, in state (n0 , n1 ), if Nonline (n0 , n1 ) codewords are X X
multiplexed at a point on the line, then at most n1 codewords T hnorm = Pstate (n0 , n1 )T h(n0 , n1 )
n0 =0 n1 =0
are transmitted without error. Therefore the probability of
packet error can be approximated by the expression below: where Pstate (n0 , n1 ) is the probability of being in state
For valid states, (n0 , n1 ) at equilibrium.
Pe (n0 , n1 ) =0 when Nonline (n0 , n1 ) ≤ n1
(Nonline (n0 , n1 ) − n1 ) A PPENDIX III
= otherwise
Nonline (n0 , n1 ) E QUILIBRIUM STATE PROBABILITIES
For invalid states,
The equilibrium state probabilities are calculated by mod-
Pe (n0 , n1 ) = 0 eling state transitions as a Markov chain.
Note that a packet is considered lost if there are other 5 This work assumes the number of codewords on the line is equal to
codewords on the line whose chips overlap with all w chips the lower bound. Therefore it is a worst case assumption and the calculated
of the packet’s codeword. The other codewords on the line are throughput is a lower bound on the achievable throughput.
A property of MVG_OMALLOOR
ISI-TR-2006-617 14

A. Assumptions E. Balance equations


The analysis assumes perfect state estimation. The only When the system is in equilibrium, the flow into any state
reason for a state transition is an arrival or a departure of a must equal the flow out of the state. Therefore for a valid,
packet. Packet arrivals are assumed to be Poisson arrivals and reachable state (s0 , s1 ),
packet lengths are exponentially distributed. The distribution
(λ + N (s , s )µ)Pstate (s0 , s1 ) =
of the destination’s codeword is uniform over the codeset. PN 0 1
PN online
Under this assumption, the probability of transitioning to a PNn0 =0 Pn1 =0 Pstate (n0 , n1 )λParr (n0 , n1 , s0 , s1 )+
N
particular state on an arrival is dependent only on the current n0 =0 n1 =0 Pstate (n0 , n1 )Nonline (n0 , n1 )µPdep (n0 , n1 , s0 , s1 )
state and not on the path taken to reach that state. The Also,
probability of departure to a state is assumed to be proportional N
X N
X
to the rate of arrival from that state. Then the next state Pstate (n0 , n1 ) = 1;
is dependent only on the current state and not on the path n0 =0 n1 =0

taken to reach that state. Under these circumstances, the state These equations can be solved for the equilibrium state
transition diagram for arrivals and departures is a Markov probabilities Pstate (s0 , s1 ).
chain. Equilibrium probabilities may be found by solving the
balance equations for the system.

B. Admissible transmissions
This subsection describes how to identify admissible state
transitions given a codeset and a transmission scheduling
algorithm.6
1) Aloha-CDMA: For Aloha-CDMA, all transitions are
admissible.
2) Pure selfish scheduling: A transmission is admissible if,
c0 ≥ 1
3) Threshold scheduling: A transmission is admissible if
c0 ≥ 1
tonoverlap ≤ αN
where α is the threshold parameter.
4) Overlap section scheduling: A transmission is admissi-
ble if
c0 ≥ 1
tonoverlap ≤ ton1

C. Arrival state transition probabilities


For an admissible transition,
Parr (f romn0 , f romn1 , ton0 , ton1 ) = Nadmitted /Ntotal
where,
   
f romn0 f romn1 f romnoverlap
Nadmitted =
  c0 c1 coverlap
N
Ntotal =
w
For a non admissible transition,
Parr (f romn0 , f romn1 , ton0 , ton1 ) = 0

D. Departure state transition probabilities


The departure probabilities from one state to another state
are proportional to the arrival rates into the state. Therefore,
Pdep (s0 , s1 , d0 , d1 )
Parr (d0 ,d1 ,s0 ,s1 )
= PN P N
Parr (n0 ,n1 ,s0 ,s1 )
n0 =0 n1 =0

6 If a packet cannot be transmitted upon arrival, the system undergoes a


same state transition and the packet is dropped. During a same state transition
the number of packets on the line does not change.

You might also like