Medium Access Control Sublayer
|
|
- Calvin Matthews
- 6 years ago
- Views:
Transcription
1 Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014
2 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA CSMA 2 CSMA-CD in Binary Exponential Back-off Performance - IEEE Wireless (WLAN) IEEE
3 Terminology Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA n stations sharing a channel Contention for channel access Collision occurs when packets from any two stations overlap Packet start times can be continuous or slotted Carrier sensing sensing the medium to check if it is in use Packets generated by the network layer of stations Generated packets are transmitted Some packets collide will need to be retransmitted Number of transmitted packets number of generated packets.
4 Three Scenarios Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA Medium access protocols can be classified into three broad types depending on the nature of the medium and ability to sense the medium ability to detect collisions Scenario 1: Stations contending for the medium cannot sense transmissions from other stations (eg., Satellite communication) Scenario 2: Stations able to sense transmissions by other stations, but cannot listen and transmit at the same time (Short-range wireless). Scenario 3: Stations can sense the medium, and can listen and transmit at the same time ()
5 ALOHA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA n stations share a medium Stations transmit whenever they have a packet that needs to be transmitted ACK sent by the receiver. If no ACK received, stations wait for a random amount of time and retransmit. Assume all packets are of the same duration (we will use that as the unit of time)
6 ALOHA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA User A B C D E Time
7 Poisson Distribution Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA What is the probability that an event will occur exactly k times during an interval? 0 times? once? twice? 3 times? For Poisson distribution mean is the same as variance Poisson distribution with mean a (and variance a) represented as Pr{k} = ak e a k! Pr{k} is the probability of exactly k occurrences in an unit interval For example, Pr{0} = e a, Pr{1} = ae a. The mean and variance of a Poisson distribution are the same
8 ALOHA Analysis Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA Number of stations is very large. Packet creation by network layers (of all stations together) is Poisson distributed with mean N or Pr N {k} = Nk e N k! (an average of N packets generated during each unit interval) Assume each interval has the same length as the packet duration. Average number of packets transmitted in a unit interval is G. As some packets will be retransmitted, G N. Also Poisson distributed with mean G. Pr G {k} = G k e G k! Collision occurs when 2 or more frames occupy the channel at the same time. Obviously, N 1, G 1, G N. (if we have more than one packet during any interval there will be a collision).
9 Wireless (WLAN) ALOHA - Vulnerable Period ALOHA Slotted ALOHA CSMA Collides with the start of the shaded frame t Collides with the end of the shaded frame t o t o + t t o + 2t t o + 3t Time Vulnerable
10 Wireless (WLAN) Efficiency of ALOHA ALOHA Slotted ALOHA CSMA Vulnerable period is 2 intervals Assume n When a station transmits a packet, the packet will be successfully transmitted if no other packets are generated for two consecutive intervals Probability Pr G {0} = e G for one interval Probability of no other packet in the vulnerable period is Pr G {0} Pr G {0} = e 2G Throughput (for each interval) S = Ge 2G (G attempts, but only a fraction e 2G is successful).
11 Wireless (WLAN) What s the best we can do? ALOHA Slotted ALOHA CSMA For pure ALOHA S = Ge 2G What is the best choice of G? d dg S = e 2G (1 2G) = 0 G = 0.5, S = 1 2e Maximum efficiency is only 18%
12 Example Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA 10 Mbps channel, 1000 bits per packet Satellite can receive up to 10,000 packets per sec (packet interval 1/10,000 sec) Only 1840 packets per second received successfully Efficient Operating point: G = 0.5 for best efficiency : only half a packet will be sent (on an average) during every interval 5000 packets per second sent (by all stations together) Only 1840 will reach, 3160 per/sec will collide (and will have to be retransmitted)
13 Slotted ALOHA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA Assumption - existence of some mechanism for synchronizing different stations Station will transmit only at the beginning of slot intervals. Vulnerable period is only one interval - not 2 Throughput S = Ge G Maximized when d dg S = e G (1 G) = 0 G = 1, S = 1 e Maximum efficiency less than 37% Twice as efficient as pure ALOHA
14 Example Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA Satellite can receive 10,000 packets per sec. Packet interval 1/10,000 sec Now (all stations together) can send only 3680 packets per second. Efficient Operating point: G = 1 for best efficiency : One packet (on an average) sent during every interval Or packets per second sent by all stations together Only 3680 will reach, 6320 per/sec will collide (and will have to be retransmitted)
15 Stability of ALOHA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA What happens when G increases? But first, what is the average number of attempts needed for successfully delivering a packet? Probability of success (no collision) is e G for each attempt. To successfully send one packet, e G packets have to be transmitted on an average Number of attempts increases exponentially with G
16 Wireless (WLAN) Channel Utilization With ALOHA ALOHA Slotted ALOHA CSMA S (throughput per frame time) 0.40 Slotted ALOHA: S = Ge G Pure ALOHA: S = Ge 2G G (attempts per packet time)
17 Wireless (WLAN) ALOHA Slotted ALOHA CSMA Carrier Sense Multiple Access Protocols Listen first. If no one is currently using the channel, then transmit Collisions can still occur Propagation delay (B has started transmission, but A does not know that yet) A and B wait for C (which is currently transmitting) to finish and start at the same time. Collisions inferred through the lack of ACKs Persistent and non-persistent CSMA
18 Wireless (WLAN) Non-persistent CSMA ALOHA Slotted ALOHA CSMA 1 If channel is free transmit. 2 If not stop sensing and wait (for a random time) 3 If the channel is free now, transmit 4 If not, back to 2 (stop sensing and wait)
19 Persistent CSMA Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA 1-persistent - if busy keep sensing the line till it becomes available and start transmitting immediately p-persistent (for slotted channels) if busy keep sensing the channel If free, transmit at the next slot - but with probability p Probability q = 1 p that a station will yield. Process continues till the packet has been transmitted or another station takes over the channel.
20 Wireless (WLAN) ALOHA Slotted ALOHA CSMA Channel Utilization With CSMA / ALOHA S (throughput per packet time) Pure ALOHA Slotted ALOHA 0.5-persistent CSMA 1-persistent CSMA 0.01-persistent CSMA Nonpersistent CSMA 0.1-persistent CSMA G (attempts per packet time)
21 Wireless (WLAN) ALOHA Slotted ALOHA CSMA CSMA With Collision Detection (CSMA-CD) In CSMA (and ALOHA) collisions are inferred through the lack of ACKs What if stations can send and listen at the same time? Stations can stop transmitting as soon as a collision is detected. Colliding packets will now use up only a small fraction of the time. As usual stations sense channel, and transmit only if the channel is free. If collision is detected - stop sending the packet (only part of a packet may be sent).
22 CSMA-CD States Medium Access Protocols Wireless (WLAN) ALOHA Slotted ALOHA CSMA t o Contention slots Frame Frame Frame Frame Transmission period Contention period Time Idle period
23 Wireless (WLAN) ALOHA Slotted ALOHA CSMA Seizing the Channel with CSMA-CD After a station starts transmission of a packet, it should be able to detect within a period τ d that no collision is going to occur for that packet. If τ is the maximum delay between any two stations in the channel τ d < 2τ. Why? After time τ d, the station is sure that it has seized the channel τ d is the contention period. CSMA-CD is employed in
24 Wireless (WLAN) 2τ for Collision Detection ALOHA Slotted ALOHA CSMA A Packet starts at time 0 B A Packet almost at B at τ - B (a) (b) A B A Noise burst gets back to A at 2τ B (c) Collision at time τ (d)
25 Wireless (WLAN) Restrictions On Packet Size CSMA-CD in Binary Exponential Back-off Performance - IEEE With CSMA-CD there is also a restriction on minimum packet duration! What happens if packet duration is less than 2τ? It is possible that A completes the entire packet before it sensed the collision. So A does not even know that a collision occurred! Packet sizes have to be chosen such that the packet duration is greater than 2τ
26 Wireless (WLAN) Minimum Packet Size CSMA-CD in Binary Exponential Back-off Performance - IEEE For 10 Mbps LAN, maximum distance of 2500 m between two stations In practice, upto 4 repeaters may be used Round trip time is about 50µs 10 µs propagation time each way; 30 µs repeater delay Smallest allowed packet size is 500 bits prescribes 64 bytes (512 bits) as the minimum packet size. For 100 Mbps LAN standard recommends max length 250 m 5µs RTT: 2µs propagation delay and 3µs repeater delay Minimum packet size is still about 500 bits (64 bytes)
27 Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE Binary Exponential Back-off in For any station time is slotted with slot duration 2τ (a slot begins at the instant a collision is sensed) After first collision, station randomly picks 0 or 1 (prob of 1 is half) Retransmit at the next slot with probability half. If collision happens again retransmit at next slot with probability 1/4 If a third collision occurs retransmit with probability 1/8, and so on After r collisions, transmission probability is 1 2 r Binary exponential back-off. After r = 10 probability does not fall below = 1/1024
28 Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE Binary Exponential Back-off and Slotted ALOHA The contention periods in is similar to slotted ALOHA contending stations send randomly at specific time-slots When operating efficiently slotted ALOHA successfully delivers any packet with probability 1 e In, under full utilization of the channel, the probability that someone seizes the channel is 1 e.
29 Efficiency Medium Access Protocols Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE Average number of contention slots before a packet is delivered is e When is operating at its maximum capacity, for each packet delivered there is an average of e contentions. The channel is occupied by useful packets of duration P and useless contentions (on an average e contentions of duration 2τ each). Efficiency ν = P P + 2τe
30 Efficiency Medium Access Protocols Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE F - frame size (in bits) B - data rate (bits per sec) P = F B c - velocity of propagation L - maximum length of ethernet cable (maximum seperation between two stations) τ = L c ν = P P + 2τe = BLe/cF
31 Wireless (WLAN) Constant BL product CSMA-CD in Binary Exponential Back-off Performance - IEEE ν = P P + 2τe = BLe/cF Larger frame sizes results in increased efficiency Need to control BL product - higher bandwidth lines have to be shorter than lower bandwidth lines 100 Mbps lines of length L does not have 10 times the capacity of a 10 Mbps line of length L
32 Wireless (WLAN) Efficiency vs F CSMA-CD in Binary Exponential Back-off Performance - IEEE Channel efficiency byte frames 512-byte frames 256-byte frames 128-byte frames 64-byte frames
33 Wireless (WLAN) Manchester Encoding CSMA-CD in Binary Exponential Back-off Performance - IEEE Bit stream (a) Binary encoding (b) Manchester encoding (c) Differential Manchester encoding Transition here indicates a 0 Lack of transition here indicates a 1 detection of start of each bit. Each bit period divided into two intervals. Twice the bandwidth Every bit period has a transition in the middle Unambiguo
34 Wireless (WLAN) DIX (DEC, Intel, Xerox) and CSMA-CD in Binary Exponential Back-off Performance - IEEE Bytes (a) Preamble Destination address Source address Type Data Pad Destination Source (b) Preamble Length Data Pad address address Checksum Checksum Preamble - 8 octets (each ) 2. Addresses - 6 bytes each. Dest. all ones address - broadcast 3. Destination address all ones implies broadcast; bit 46 used to distinguish local and global addresses; 4. Type of payload 5. Data upto 1500 bytes. Minimum limit? 6. Pad To cater for minimum packet length 7. Checksum 8. IEEE 802.3: SoF Delimiter (for compatibility), Type to Length 1.
35 Families Medium Access Protocols Wireless (WLAN) CSMA-CD in Binary Exponential Back-off Performance - IEEE Based on speed 10Base5 (thick coax), 10Base2 (thin coax), 10Base-T (Twisted Pair), 10Base-F (Fiber optics) Fast ethernet (802.3u), 100Base-T4 (category 3 UTP), 100Base-TX (category 5), 100Base-FX (Fiber) No changes in protocol - just better wires (and better technology for ethernet cards) Backward compatibility Maximum length reduced (otherwise we need to increase minimum frame size!) Why?
36 Wireless (WLAN) Gigabit ethernet (802.3z) CSMA-CD in Binary Exponential Back-off Performance - IEEE Once again backward compatible Need to reduce length further - unacceptable Carrier extension - Padding to extend frame to 512 bytes. Frame bursting - concatenated sequence of frames.
37 Wireless (WLAN) IEEE Hidden / Exposed Station Problem Case 1: A B. C senses medium but does not hear A s transmission as C is out of range. If C transmits to B we have collision. Hidden Station Problem. A is hidden from C Case 2: B A. C needs to transmit to D. C senses medium and assumes that it cannot transmit. Actually it can as A s reception will not be affected. Exposed Station Problem. What is needed? Interference at the Rx is the problem - not the interference at the transmitter! A B C D A B C D Radio range (a) (b)
38 A Medium Access Protocols Wireless (WLAN) IEEE Multiple Access with Collision Avoidance (A) Rx should send a short frame to indicate that it is ready to receive from a source. Other stations hearing the Rx will yield. RTS (Request to Send) and CTS (Clear to Send) packets.
39 Wireless (WLAN) IEEE A B. A sends RTS to B. B responds with CTS. C hears RTS but not CTS. C waits a reasonable amount of time for CTS, and failing to hear it can start Tx to some other node. D hears CTS but not RTS. D should desist until the packet following CTS is finished. Range of A's transmitter Range of B's transmitter C A RTS B D C A CTS B D E E (a) (b)
40 Wireless (WLAN) AW - A for Wireless IEEE Some enhancements to A layer acknowledgements. To receive ACK there should be no collision at the transmitter of the original packet. So exposed station problem is deliberately not addressed. CSMA for transmitting RTS Back-off algorithm for each source-destination pair instead of for each station. Additional information exchange about congestion.
41 Wireless (WLAN) Virtual Channel Sensing IEEE A RTS Data B CTS ACK C NAV D NAV Time
42 Modes Medium Access Protocols Wireless (WLAN) IEEE DCF - Distributed Coordination Function Each node determine what to do next PCF - Point Coordination Function Base station broadcasts beacon frames ( times per sec) Could provide QOS guarantees Coordinator can even request nodes to go to sleep
43 Wireless (WLAN) PCF - DCF Coordination IEEE SIFS - Short IFS, PIFS - PCF IFS, DIFS - DCF IFS, EIFS - Extended IFS Control frame or next fragment may be sent here SIFS PIFS DIFS PCF frames may be sent here EIFS DCF frames may be sent here Bad frame recovery done here ACK Time
44 Wireless (WLAN) Frame Structure IEEE Bytes Frame control Address 1 Address 2 Address 3 Seq. Address 4 Data Duration Checksum Bits Version Type Subtype 1 To From DS DS MF Retry Pwr More W O Frame control
45 Frame Control Medium Access Protocols Wireless (WLAN) IEEE subfields! Version, Data type (data, control, management), subtype (RTS, CTS) To DS, From DS - for interoperability with MF - more fragments Retry - retransmission (ABP 0) Power management (sleep) More - additional frames to be sent W - WEP in use O - strict processing
46 Other Fields Medium Access Protocols Wireless (WLAN) IEEE Duration (includes duration of ACK) - for managing NAV Address 3 and 4 - to handle handover for inter-cell traffic Sequence - frame number
47 Wireless (WLAN) Protocol Stack IEEE Upper layers sublayer Logical link control Data link layer Infrared FHSS DSSS a OFDM b HR-DSSS g OFDM Physical layer
48 Wireless (WLAN) Bit-map protocol Binary Countdown Especially suitable for small number of stations that are close to each other (very little delay)
49 Bit Map Protocol Medium Access Protocols Wireless (WLAN) 8 Contention slots Frames 8 Contention slots d 2
50 Binary Countdown Medium Access Protocols Wireless (WLAN) Bit time Result Stations 0010 and 0100 see this 1 and give up Station 1001 sees this 1 and gives up
51 Wireless (WLAN) Width of each reservation slot should be of the order of the maximum delay between stations (so there is no ambiguity as to which station(s) is making a reservation) Number of reservation slots proportional to number of stations (in bit-map protocol) Number of reservation slots proportional to log2 of number of stations for each packet (in binary countdown) However, if number of packets is proportional to number of stations, even for binary countdown the total overhead (for reservation slots) will depend on the number of stations!
52 A Typical LAN Medium Access Protocols Wireless (WLAN) Bridge Backbone LAN B B B B File server Cluster on a single LAN Workstation LAN
53 Bridges Medium Access Protocols Wireless (WLAN) Bridges interconnect LANs Need for bridges LANs might have sprouted independently Sometimes (geographically well distributed) cheaper to connect different segments with a bridge than run a single cable Controlling load in each LAN Very large physical distances (greater than 2500 m) Reliability Security
54 Wireless (WLAN) Local Internetworking Should the frame be forwarded? To whom? Hash tables F G H Bridge LAN 4 A B B1 C B2 D E LAN 1 LAN 2 LAN 3
55 Backward Learning Medium Access Protocols Wireless (WLAN) Hash tables are empty at first If route to destination not known flood over all lines If destination and source are on the same line discard packet If destination and source are on different lines, forward Backward learning operate in promiscuous mode Inspect source address of each packet seen to get some knowledge of the topology
56 Wireless (WLAN) Repeaters, Hubs, Bridges, Switches, Routers, Gateways Application layer Transport layer Application gateway Transport gateway Packet (supplied by network layer) Network layer Router Frame header Packet header TCP header User data CRC Data link layer Physical layer Bridge, switch Repeater, hub (a) Frame (built by data link layer) (b)
57 Wireless (WLAN) Hubs, Bridges, Switches A B C D A B C D Host A B C D Hub Bridge Switch LAN E F G H (a) E F G H (b) E F G H (c)
Chapter 4: The Medium Access Layer
Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002 Medium Access Layer Point-to-point versus broadcast networks Broadcast
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationChapter 4. The Medium Access Control Sublayer
Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and
More informationComputer Networks. Medium Access Sublayer (Part I)
Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationOutline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Review Multiple access protocols IEEE 802
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 9 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review Multiple access protocols IEEE 802
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationMedium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology
Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationOutline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards
EEC-682/782 Computer Networks I Lecture 9 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationPage 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands
Outline 18-759 : Wireless s Lecture 11: 80.11 Peter Steenkiste Dina Papagiannaki Spring Semester 009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste, CMU 1 80 protocol overview Wireless LANs
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationOutline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD
Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More informationThe Medium Access Control Sublayer
The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationMedium Access Control Sublayer Chapter 4
Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationOverview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV
Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationMedium Access Control Sublayer Chapter 4
Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 The
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationTelecommunication Protocols Laboratory Course. Lecture 2
Telecommunication Protocols Laboratory Course Lecture 2 Last time We began our study of telecommunication protocols at the Logical Link Control sub-layer (LLC) LLC issues Connectionless vs connection-oriented
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationCHAPTER 8: LAN Standards
CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER
More informationEthernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers
Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol
More informationCS/ECE 439: Wireless Networking. MAC Layer Road to Wireless
CS/ECE 439: Wireless Networking MAC Layer Road to Wireless Multiple Access Media Media access Controlling which frame should be sent over the link next Easy for point-to-point links; half versus full duplex
More informationIEEE Technical Tutorial. Introduction. IEEE Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationIEEE WLAN (802.11) Copyright. Nomadic Communications
Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications
More informationData and Computer Communications. Chapter 11 Local Area Network
Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationOutline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William
More informationMAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users
MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationWLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione
Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More information