Module 2
Module 2
WMC
By
Dr.K.L.Sudha,
Professor, DSCE
Contents:
Multiple Access and the Cellular Principle: Introduction, FDM, TDM, Packet Radio ALOHA, Carrier Sense
Multiple Access, Packet Reservation Multiple Access Comparison of the Methods. Basic principles of CDMA,
OFDMA.
Principles of Cellular Networks: Reuse Distance Cell shape, Cell Planning with Hexagonal Cells, Methods for
Increasing Capacity, Adjacent Channel Interface, Information Theory of Multi-User Channels
Multiple Access:
• A wireless communications system uses a certain frequency band that is
assigned to this specific service. Spectrum is thus a scarce resource, and
one that cannot be easily extended.
• For this reason, a wireless system must make provisions to allow the
simultaneous communication of as many users as possible within that
band.
• The problem of letting multiple users communicate simultaneously can be
through Multiple access.
• Different MA methods are
• FDMA
• TDMA
• CDMA
• OFDMA
• SDMA
FDMA is the oldest, and conceptually most simple, multi access method.
Each user is assigned a frequency (sub)band – i.e., a (usually contiguous) part of the available
spectrum.
The assignment of frequency bands is usually done during call setup, and retained during the
whole call.
FDMA is usually combined with the Frequency Domain Duplexing (FDD) , so that two
frequency bands (with a fixed duplex distance) are assigned to each user: one for downlink
(BS-to-MS) and one for uplink (MS-to-BS) communication.
Advantages & disadvantages of FDMA
Advantages
• Pure FDMA is conceptually very simple, and has some advantages for implementation:
• The transmitter (TX) and receiver (RX) require little digital signal processing. However, this is not so
important in practice anymore, as the costs for digital processing are continuously decreasing.
• (Temporal ) synchronization is simple. Once synchronization has been established during the call setup, it is
easy to maintain it by means of a simple tracking algorithm, as transmission occurs continuously.
However, pure FDMA also has significant disadvantages, especially when used for speech communications.
• These problems arise from spectral efficiency considerations, as well as from sensitivity to multipath effects
• Frequency synchronization and stability are difficult: for speech communications, each frequency sub-band
is quite narrow (typically between 5 and 30 kHz). Local oscillators thus must be very accurate and stable. Low
spectral efficiency
• Sensitivity to fading:fading is flat in practically all environments. This has the advantage that no equalization
is required; the drawback is that there is no frequency diversity.
• Sensitivity to random Frequency Modulation (FM): due to the narrow bandwidth, the system is sensitive to
random FM
• Intermodulation: the BS needs to transmit multiple speech channels, each of which is active the whole time.
Typically, a BS uses 20–100 frequency channels. Separate amplifiers in these ranges make BS costlier.
Applications of FDMA
FDMA is mostly used for the following applications:
• Analog communications systems: here, FDMA is the only practicable
multiple access method.
• Combination of FDMA with other multiple access methods: the spectrum
allocated for a service (or a network operator) is divided into larger sub-
bands, each of which is used for serving a group of users. Within this
group, multiple access is done by means of another multiple access
method – e.g., TDMA or CDMA. Most current wireless systems use FDMA
in that way.
• High-data-rate systems: the disadvantages of FDMA are mostly relevant if
each user requires only a small bandwidth – e.g., 20 kHz. The situation can
be different for wireless Local Area Networks (LANs), where a single user
requires a bandwidth on the order of 20 MHz, and only a few frequency
channels are available.
• For TDMA, different users transmit not at different
frequencies but rather at different times.
• A time unit is subdivided into N timeslots of fixed
duration, and each user is assigned one such timeslot.
During the assigned timeslot, the user can transmit
with a high data rate (as it can use the whole system
bandwidth); subsequently, it remains silent for the
next N − 1 times-lots, when other users take their
turn.
• This process is then repeated periodically. At first
glance,this approach has the same performance as
FDMA: a user transmits only during 1/N of the
available time, but then occupies N times the
bandwidth.
Some important practical differences between FDMA & TDMA are:
• Users occupy a larger bandwidth in TDMA. This allows them to exploit the frequency diversity
available within the bandwidth allocated to the system; furthermore, the sensitivity to random
FM is reduced. On the flipside, equalizers are required to combat Inter Symbol Interference (ISI)
for most operating environments; this increases the effort needed for digital signal processing.
• Temporal guard intervals are required in TDMA. There has to be sufficient guard time to
compensate for the runtime of the signal between the MS and BS. It is possible that one MS is far
away from the BS, while the one that transmits in the subsequent timeslot is very close to the BS
and thus has negligible runtime. As the signals from the two users must not overlap at the BS, the
second MS must not transmit during the time it takes the first signal to propagate to the BS. Note,
however, that there is no need for frequency guard bands, as each user completely fills up the
assigned band.
• Each timeslot might require a new synchronization and channel estimation, as transmission is not
continuous. Optimization of timeslot duration is a challenging task. If it is too short, then a large
percentage of the time is used for synchronization and channel estimates (in GSM, 17% of a
timeslot are used for this purpose). If the timeslot is too long, transmission delays become too
long (which users find annoying especially for speech communications), and the channel starts to
change during one timeslot.
• For interference-limited systems, TDMA has a major advantage: during its period of inactivity, the
MS can “listen” to transmission on other timeslots. This is especially useful for the preparation of
handovers from one BS to another, when the MS has to find out whether a neighboring BS would
offer better quality, and has communications channels available
Application
• TDMA is used in the worldwide cellular standard GSM (Chapter 24) as
well as the cord-less standard DECT (Digital Enhanced Cordless
Telecommunication) and in a modified form – in the fourth-
generation cellular standards 3GPP-LTE and WiMAX
• TDMA is often combined with FDMA, e.g., in GSM. In contrast, pure
FDMA is used mainly in analog cellular and cordless systems.
Packet Radio
Packet radio shows two main differences from TDMA and FDMA:
1. Each packet has to fight for its own resources. The most common
methods for resource allocation are ALOHA systems, Carrier Sense
Multiple Access (CSMA), and packet reservation (polling).
2. Each packet can be routed to the RX in different ways – i.e., via
different relay stations. This aspect does not play a major role in
cellular systems, where connection can only be to the closest BS,
but it does play an important role in wireless ad hoc and sensor
networks, where each wireless device can act as a relay for
information originating from another wireless device.
ALOHA
• The first wireless packet radio system was the ALOHA system of the
University of Hawaii.
• For an ALOHA system, each user sends packets to the BS whenever the
data source makes them available.
• A TX does not take into consideration whether other users are already
transmitting. Now, the situation can arise that several users want to
transmit information simultaneously.
• When two TXs transmit packets at the same time, at least one of these
packets suffers so much interference that it becomes unusable, and has to
be retransmitted.
• Such collisions thus decrease the effective data rate of the system.
Therefore, an ALOHA system becomes inefficient when the load is large,
and thus the probability of collisions becomes large.
• If the starting time of packet transmission is chosen completely at random
by the TX, then the system is called a pure or un slotted ALOHA system.
• TX can determine (sense) whether the channel is currently occupied by another
user (carrier). This knowledge can be used to increase the efficiency of a packet-
switched system: if one user is transmitting, no other user is allowed to send a
signal. Such a method is called CSMA.
• It is more efficient than ALOHA, because a TX does not disturb other users that
are already on the air.
• The most important parameters of a CSMA system are detection delay and
propagation delay.
• Detection delay is a relative measure for how long it takes a TX to determine
whether the channel is currently occupied. It depends essentially on the
hardware of the system, but also on the desired false alarm probability and the
SNR.
• Propagation delay is the measure of how long a data packet takes to get from the
MS to the BS. It can happen that at time t1 , TX 1 determines that the channel is
free, and thus sends off a packet. At time t2 another TX senses the channel. If t2 −
t1 is shorter than the time it takes data packet A to get from TX 1 to TX 2, then TX
2 determines that the channel is free, and sends off data packet B. In such a case
a collision occurs.
• This description makes it clear that detection delay and propagation delay should
be much smaller than packet duration.
Packet reservation
Packet reservation in packet radio is a technique used to improve the efficiency of wireless communication by reducing collisions
and ensuring reliable transmission. It is particularly useful in networks where multiple users share the same channel.
Key Concepts of Packet Reservation in Packet Radio
• Reservation-Based Access: A node reserves a portion of the channel for its transmission instead of contending for access every
time. This reduces the chances of collisions compared to pure ALOHA or CSMA-based Types of Packet Reservation Techniques
• Dynamic Time Division Multiple Access (D-TDMA): A node reserves time slots dynamically based on demand.
• Packet Reservation Multiple Access (PRMA): A hybrid of TDMA and ALOHA, where a node reserves slots if it successfully sends a
packet.
• Reservation ALOHA (R-ALOHA): A modified version of ALOHA where successful transmissions reserve future slots.
Advantages of Packet Reservation:
• Reduces Collisions: Since packets are sent in reserved slots, contention is minimized.
• Improves Throughput: More efficient than pure random access schemes like ALOHA.
• Supports Real-Time Applications: Useful for applications requiring Quality of Service (QoS), such as voice and video transmission.
Challenges and Limitations
• Overhead: Reservation requests and acknowledgments add control overhead.
• Latency: Reservation delays may increase end-to-end latency.
• Scalability: Managing reservations in large networks can be complex.
Packet reservation is widely used in satellite networks, military communications, and cellular systems to ensure efficient and
reliable data transmission.
Polling
• In Packet Reservation, Polling is a controlled access method where a central
controller (or base station) sequentially invites nodes (or terminals) to
transmit their data. It ensures that only one node transmits at a time,
reducing collisions and improving channel efficiency.
• Types of Polling in Packet Reservation
• Round-Robin Polling: The controller polls each node in a fixed sequence.
Suitable for networks with uniform traffic loads.
• Priority-Based Polling: Nodes with higher priority (e.g., emergency data or
voice traffic) are polled first. Used in QoS-sensitive applications.
• Demand-Based Polling: Only nodes that previously indicated they have
data to send are polled. Reduces overhead by skipping idle nodes.
Polling is commonly used in wireless LANs, satellite communication, and
military networks where controlled access is crucial.
Code Division Multiple Access (CDMA)
• The origins of CDMA can also be traced to military communications research,
especially the development of the Direct Sequence–Spread Spectrum (DS-SS)
• Each user is assigned a different spreading code, which determines the wideband
signal that is multiplied by the information symbols. Thus, many users can
transmit simultaneously in a wide band.
• At the receiver, the desired signal is
obtained by correlating the received
signal with the spreading signal of the
desired user.
• Other users thus become wideband
interferers; after passing through the de-
spreader, the amount of interference
power seen by the detector is equal to
the Cross Correlation Function (CCF)
between the spreading sequence of the
interfering user and the spreading
sequence of the desired user.
• The choice of spreading sequences is an essential factor for the quality of a
CDMA system. Sequences have to have good ACFs and a small cross
correlation.
• One possible choice is m-sequences; with a shift register of length Nreg , it
is possible to generate 2Nreg − 1 sequences that have max ACF and
ACF /CCF = MC . Alternative sequences include Gold and Kasami sequences
• CDMA requires accurate power control. If ACF /CCF has a finite value, the
receiver cannot suppress interfering users perfectly. When the received
interference power becomes much larger than the power from the desired
transmitter, it exceeds the interference suppression capability of the de-
spreading receiver. Thus, each MS has to adjust its power in such a way
that the powers of all the signals arriving at the BS are approximately the
same.
• Experience has shown that power control has to be accurate within about
±1 dB in order to fully exploit the theoretical capacity of CDMA systems.
• CDMA system assumed a flat-fading channel. This assumption is violated
under all practical circumstances.
• The basic nature of a CDMA system is to spread the signal over a large
bandwidth; thus, it can be anticipated that the transfer function of the
channel exhibits variations over this bandwidth.
• Assume an ideal spreading sequence . The de-spreader output then
exhibits multiple peaks: more precisely, one for each Multi Path
Component (MPC) that can be resolved by the receiver – i.e., spaced at
least TC apart.
• Each of the peaks contains information about the transmit signal. Thus, all
peaks should be used in the detection process: just using the largest
correlation peak would mean that we discard a lot of the arriving signal.
• A receiver that can use multiple correlation peaks is the so-called Rake
receiver, which collects (“rakes up”) the energy from different MPCs.
Rake Receiver
• Rake receiver consists of a bank of correlators.
• Each correlator is sampled at a different time (with delay τ ), and thus
collects energy from the MPC with delay τ . The sample values from the
correlators are then weighted and combined.
• Alternatively, we can interpret the Rake receiver as a tapped delay line,
whose outputs are weighted and added up. The tap delays, as well as the
tap weights, are adjustable, and matched to the channel.
• Note that the taps are usually spaced at least one chip duration apart, but
there is no requirement for the taps to be spaced at regular intervals.
• The combination of the receiver filter and the Rake receiver constitutes a
filter that is matched to the receive signal. The receive filter is matched to
the transmit signal, while the Rake receiver is matched to the channel.
• the receiver adds up the (weighted) signal from the different Rake fingers
in a coherent way. They provide delay diversity (frequency diversity). A
Rake receiver is thus a diversity receiver.
Synchronization
• Synchronization is one of the most important practical problems of a
CDMA system.
• Mathematically speaking, synchronization is an estimation problem in
which we determine the optimum sampling time out of an infinitely large
ensemble of possible values – i.e., the continuous time.
• Implementation is facilitated by splitting the problem into two partial
problems:
• Acquisition: a first step determines in which time interval (of duration TC or
TC/2) the optimum sampling time lies. This is a hypothesis-testing problem:
we test a finite number of hypotheses, each of which assumes that the
sampling time is in a certain interval. The hypotheses can be tested in
parallel or serially.
• Tracking: as soon as this interval has been determined, a control loop can
be used to fine-tune the sampling time to its exact value.
PN Sequences
Shift register based sequences of finite length
M-sequence
Gold sequence
Kasami sequence
Walsh Hadamard codes –orthogonal codes
Prime based sequences
Advantages of CDMA over Other MA
• Better Spectral Efficiency: CDMA utilizes spread spectrum techniques, allowing more
users to share the bandwidth efficiently compared to TDMA and FDMA.
• Resistance to Interference and Noise: Since CDMA uses pseudo-random codes to
separate users, it is highly resistant to narrowband interference and jamming.
• Increased Security: CDMA signals appear as noise to unauthorized users, making it
harder to intercept and decode compared to FDMA and TDMA.
• Soft Handoff Capability: Unlike TDMA and FDMA, which use hard handoffs
(disconnecting from one cell before connecting to another), CDMA enables seamless
soft handoff, improving call quality.
• Better Capacity: CDMA systems handle more users per MHz of bandwidth compared to
TDMA and FDMA, reducing congestion issues.
• Robust Against Multipath Fading: CDMA takes advantage of rake receivers to extract
multipath signals constructively, unlike TDMA and FDMA, which suffer more from fading
effects.
• Dynamic Resource Allocation: In TDMA and FDMA, each user gets a fixed slot or
frequency, even if they are not transmitting. CDMA dynamically allocates resources
based on demand, improving efficiency.
Disadvantages of CDMA over Other MAs
• Near-Far Problem: Stronger signals from nearby users can overpower weaker
signals from distant users, requiring power control mechanisms to maintain
fairness.
• More Complex Synchronization: CDMA requires precise synchronization of
pseudo-random codes, which makes the system design more complex compared
to TDMA and FDMA.
• Increased Power Consumption: Continuous transmission in CDMA consumes
more power, making it less battery-efficient for mobile devices compared to
TDMA.
• Higher Implementation Cost: Due to the need for advanced signal processing
(e.g., spread spectrum techniques, rake receivers, and power control), CDMA-
based systems are costlier to deploy.
• Self-Interference (MAI - Multiple Access Interference): In CDMA, users share the
same frequency spectrum, leading to mutual interference, which requires
complex error correction and decoding.
• Code Management Issues: Unique spreading codes must be assigned carefully to
avoid code collisions and ensure proper separation between users.
OFDMA(Orthogonal Frequency Division Multiple Access)
• OFDMA is a multi-user version of Orthogonal Frequency Division Multiplexing
(OFDM), used in modern wireless communication systems such as 4G LTE, 5G,
and Wi-Fi 6 (802.11ax). It allows multiple users to simultaneously share the same
channel by dividing it into smaller subcarriers. Each user is assigned a subset of
these subcarriers, improving efficiency and reducing interference.
• OFDM, is a modulation format that allows the transmission of high data rates for
a single user; it is not (as sometimes erroneously stated) a multiple access format.
• In order to realize multiple access, it can be combined with various multiple
access methods.
• TDMA: each user occupies the whole system bandwidth, and different users are
served at different times. At a minimum, one user transmits for one symbol
duration, but it is also possible that one user transmits/ receives multiple symbols
before the system switches to the next user.
• Packet radio: in this mode, every user transmits complete data packets, where
the modulation format for each packet is OFDM. The access of the users to the
channel is regulated by the packet access techniques like Aloha, and CSMA. This
approach is used in IEEE 802.11
• In OFDM, the frequency axis is divided into subcarriers, and the
symbol duration on each subcarrier is an OFDM symbol; the basic
time-frequency unit is also often called a resource element.
• OFDMA now assigns different resource elements to different users.
General OFDMA has no specific restrictions on how the assignment of
resource elements can be done. Note that it is possible to assign
multiple noncontiguous, resource elements to one user.
• OFDM is used for Digital Audio Broadcasting (DAB), Digital Video
Broadcasting (DVB), and wireless Local Area Networks (LANs) (IEEE
802.11a, IEEE 802.11g).
• It will also be used in fourth- generation cellular systems, including
Third Generation Partnership Project-Long-Term Evolution (3GPP-LTE )
and WiMAX.
Key Concepts
• Orthogonality: Subcarriers in OFDMA are orthogonal, meaning they do not
interfere with each other. This allows efficient spectral utilization.
• Subcarrier Allocation: The total bandwidth is divided into subcarriers, and
these are dynamically assigned to users based on channel conditions, data
rate requirements, and priority.
• Time-Frequency Resource Allocation: OFDMA enables flexible allocation in
both time and frequency domains, making it superior for diverse user
demands.
• Cyclic Prefix (CP):To combat Inter-Symbol Interference (ISI) due to
multipath propagation, a cyclic prefix is used, where the end portion of the
OFDM symbol is copied to the beginning.
• Adaptive Modulation and Coding (AMC):OFDMA supports modulation
schemes (e.g., QPSK, 16-QAM, 64-QAM, 256-QAM), allowing adaptation
based on the user's channel conditions.
Principle of Orthogonal Frequency Division Multiplexing
• OFDM splits a high-rate data stream into N parallel streams, which are then
transmitted by modulating N distinct carriers (henceforth called subcarriers
or tones).
• Symbol duration on each subcarrier thus becomes larger by a factor of N.
In order for the receiver to be able to separate signals carried by different
subcarriers, they have to be orthogonal.
• Les us assume that the subcarriers be at the frequencies fn = nW/N, where
n is an integer, and W the total available bandwidth; in the most simple
case, W = N/Ts .
• Due to the rectangular shape of pulses in the time domain, the spectrum of
each modulated carrier has a sin(x)/x shape. The spectra of different
modulated carriers overlap, but each carrier is in the spectral nulls of all
other carriers.
• Therefore, as long as the receiver does the appropriate demodulation
(multiplying by exp(−j 2πfn t) and integrating over symbol duration), the
data streams of any two subcarriers will not interfere.
Carrier spacing In FDMA and OFDMA
Implementation of Transceivers
OFDMA
Orthogonal Frequency Division Multiple Access (OFDMA) assigns different subcarriers to different
users. There are essentially three ways of assigning the subcarriers to different users :
• Assigning adjacent subcarriers to one user
• Assigning regularly spaced subcarriers to one user
• Assigning randomly spaced subcarriers to one user
Advantages of OFDMA
• High Spectral Efficiency: Better utilization of available bandwidth compared
to TDMA and FDMA.
• Reduced Interference: Orthogonal subcarriers reduce intra-cell
interference, and advanced techniques mitigate inter-cell interference.
• Flexible Resource Allocation: Dynamically assigns subcarriers based on
traffic demand and channel conditions, improving overall efficiency.
• Low Latency: OFDMA enables faster data transmission by distributing data
over multiple subcarriers.
• Improved Performance in Multipath Environments: Rake receivers are not
required, and the cyclic prefix minimizes inter-symbol interference (ISI).
• Scalability for Different Applications: Suitable for low-power IoT devices,
high-speed 5G users, and enterprise networks.
Disadvantages
• High Computational Complexity: Requires Fast Fourier Transform
(FFT) processing and adaptive algorithms, increasing processing
power demands.
• Sensitive to Carrier Frequency Offset (CFO):Any frequency
synchronization error can cause inter-carrier interference (ICI).
• Peak-to-Average Power Ratio (PAPR) Issue: High PAPR requires
efficient power amplifiers, which increases power consumption in
mobile devices.
• Inter-Cell Interference (ICI): Neighboring cells may interfere, requiring
techniques like Fractional Frequency Reuse (FFR) for mitigation.
Applications of OFDMA
• 4G LTE & 5G Networks :Downlink: OFDMA enables multiple users to
share spectrum efficiently. Uplink (5G New Radio - NR): Uses DFT-
spread OFDMA (DFT-S-OFDM) to reduce PAPR.
• Wi-Fi 6 (802.11ax):Uses OFDMA for improved efficiency, lower
latency, and better support for multiple users.
• IoT (Internet of Things):Efficient for low-power and high-density IoT
devices, improving network longevity and battery life.
• Satellite Communications: Used in satellite networks to improve
spectral efficiency and support multiple users in remote areas.
• Broadband Wireless (WiMAX - IEEE 802.16): Supports high-speed
data for long-range broadband access.
• Public Safety Networks: Used in mission-critical communication
systems due to its robustness in harsh environments.
Principles of Cellular Networks
• In a cellular system, the coverage area is divided into many small areas called “cells.”
• In each of these cells, there is one BS that provides coverage for this (and only this) cell area.
• Now, each frequency channel can be used in multiple cells. The question that naturally arises is:
can we use each frequency channel in each cell? Typically, the answer is “no.”
• Imagine the situation where user A is at the boundary of its assigned cell, so that distances from
the “useful” BS and from a neighboring BS are the same. If the neighboring BS transmits in the
same frequency channel (in order to communicate with user B in its own cell), then the SIR seen
by user A is C/I = 0 dB.
• The solution to this problem is to reuse a frequency channel not in every cell, but only in cells that
have a certain minimum distance from each other. The normalized distance between two cells
that can use the same frequency channels is called the reuse distance, D/R. This reuse distance
can be computed from link budgets.
• We can also define a cluster of cells that all use different frequencies; therefore, there can be no
co-channel interference within such a cluster. The number of cells in a cluster is called the cluster
size. The total coverage area is divided into such clusters.
• he cluster size also determines the capacity of the cellular system. An operator that has licenses
for 35 frequency channels, and uses cluster size 7, can support 5 simultaneous users in each cell.
• Maximization of capacity thus requires minimization of cluster size.
Cell Shape
• What shapes do cells normally take
on?
• Let us first consider the idealized
situation where path loss depends
only on the distance from the BS, but
not the direction. The most natural
choice would be a disk (circle), as it
provides constant power at the cell
boundary.
• However, disks cannot fill a plane
without either gaps or overlaps.
Hexagons, on the other hand, have a
shape similar to a circle, and they can
fill up a plane.
• Hexagonal shape is acceptable
theoretically. Hexagons are usually
considered as the basic cell shape
assuming equal traffic density and
flat terrine. Both may not be true
practically.
Received field strength in hilly terrain
Cell Planning with Hexagonal Cells
• Consider the hexagon whose center is at the origin of the coordinate system. Proceed now i
hexagons in the y direction, turn 60◦ counterclockwise, and proceed k hexagons in that new
direction This gets us to the cell whose center has the following distance from the origin:
D = √3√(iR + cos(60◦)kR)2 + (sin(60◦)kR)2 ----1
D/R=√3(i2+ik+k2
Note that the distance between the centers of two adjacent hexagons is √3R, where R is the
distance from the center of a hexagon to its farthest corner. Also note that only integer values of i
and k are possible.
• The task of frequency planning is to find those values of i and k that make sure that the distance
from Eq.1 is larger than the required reuse distance. Of course there is an infinite manifold of
such pairs – large values of i and k certainly satisfy the condition. What we want to find, however,
is the pair of values that minimizes cluster size, and thus maximizes spectral efficiency, while still
satisfying the minimum reuse distance.
• Due to the hexagonal layout, the relationship between cluster size N and parameters i and k is
N = i2 + ik + k2, i, k = 0, 1, 2, . . .
• This also establishes that not all integers are possible cluster sizes. Cluster size can only take on
the numbers N = 1, 3, 4, 7, 9, 12, 13, 16, 19, 21 . . .
• The relationship between reuse distance D/R and cluster size results D/R = √3N
Cluster and minimum reuse distance