Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs
|
|
- Noel Daniels
- 6 years ago
- Views:
Transcription
1 Presented at IFIP TC6 Workshop Personal Wireless Comm. April 95 Prague, Czech Rep. Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Jost Weinmiller*, Hagen Woesner*, Jean-Pierre Ebert*, Adam Wolisz*# * Technical University Berlin, Electrical Engineering Department Einsteinufer Berlin, Germany # GMD Fokus - STEP Hardenbergplatz 2, Berlin [ jost woesner ebert wolisz]@ftsu00.ee.tu-berlin.de Abstract The distributed coordination function that is used as the access scheme for asynchronous traffic within the upcoming standard for wireless LANs IEEE optionally applies the RTS/CTS message exchange to solve the hidden terminal scenario. In this paper, following a general discussion of the mechanism and its problems, we show the effectiveness or lack thereof of this mechanism in various cases like hidden terminals and fully meshed, optional (distributed) use of RTS/CTS and the dependencies from various parameters like physical preambles and packet sizes. We conclude this paper with a discussion of the results drawn from the simulations and an outline of problems that have yet to be investigated. 1. Introduction Wireless LANs (WLANs) are expected to be a major growth factor for the network industry in the upcoming years. They will play their part in the network architecture as a provider for easy and unconstrained access to the wired infrastructure - an extension of the wired network with a wireless last link to attach the large number of mobile data communication terminals (from high performance laptops to small communication devices maybe as small as pagers). Especially for such a technology that is calling for mobility of equipment across borders of any kind it is important to provide a well defined i.e. standardized interface between the elements of the architecture to avoid unnecessary limitations of the mobility due to technical interface boundaries. Therefore standardization is currently under work for the IEEE standard specifying physical layer (PHY) and media access control (MAC) for wireless LANs [1] as well as for the ETSI 2 HIPERLAN [2] standard with the same task. 1. Institute of Electrical and Electronics Engineers, Inc. 2. European Telecommunications Standards Institute
2 The IEEE working group has selected a proposal called DFWMAC 1 as the draft standard. DFWMAC integrates two coordination functions - a point coordination function for synchronous data transmission and a distributed coordination function for asynchronous data. These two modes share the mediums bandwidth in a time multiplexed manner organized in a superframe structure. The distributed coordination function shares access to the medium based on a CSMA/CA scheme that is extended with a RTS/CTS message exchange to improve performance in two aspects. If collisions occur, they occur with smaller packets, therefore the lost piece of bandwidth is smaller compared to a collision of long packets. The main purpose for the integration of the mechanism into DFWMAC however is the solution of the hidden terminal problem: The successful exchange of small messages - RTS (Request To Send) sent by the sender and CTS (Clear To Send) - reserves the area within range of the receiver and the sender for the intended transmission guaranteeing undisturbed media for the longer data packet. According to the draft standard [1] this mechanism is optionally applied whereas the rules of application of this exchange - never used, only used under certain circumstances or constantly used - are set on a per-station-basis. In this paper we present the results of our simulative analysis on the RTS/CTS message exchange, the effects in the hidden terminal case and in the fully meshed case, defining the dependencies and areas of useful application and showing its effects on the overall network performance when its application strategies are not harmonized throughout the network. Section 2 of this paper gives an overview of the hidden terminal scenario in wireless LANs and how this special problem is addressed in DFWMAC, section 3 presents simulations on the RTS/CTS mechanism in the DFWMAC standard and discusses the problems arising from it, section 4 finishes this paper with conclusions and an outlook on further problems that have to be addressed. 2. RTS/CTS operation in DFWMAC Radio networks create a problem due to their specific nature: Carrier sensing is difficult due to the hidden terminal scenario where collisions cannot be securely detected at the sending stations. This scenario is explained in Figure 1: if station B is sending to station C the medium appears used only for the stations located within the range of station B - other stations cannot sense a signal and consider the medium idle. Therefore station D might start a transmission since it does not notice B s ongoing transmission. However since the receiving station C is within range of B and D and thus receives two signals at once it will not be able to clearly understand either of the two transmission (whether destined for it or not). This collision however cannot be detected at the sending station B unless it notices the lacking acknowledgment from station C after a certain time-out. 1. DFWMAC - Distributed Foundation Wireless Medium Access Control RTS/CTS Analysis Page 2
3 . RTS A B CTS C D = Area of reception for Signals from Station B = Area of reception for Signals from Station C = Area of reception for Signals from Station B and Station C Figure 1:Hidden Terminal Situation To solve this situation the RTS/CTS mechanism, developed in [3] and analyzed in [4], has been integrated in the DFWMAC in the following fashion: Each station seeking access to the medium selects a random slot within the contention window. The station with the earliest slot wins the competition and may start transmitting. Stations with a later slot number hear the other station transmitting and refrain from sending ([1] and [5]). When the RTS/CTS mechanism is applied, the winning station does not send data packets right away but sends a RTS packet to the receiving station, that responds with a CTS packet. If a station captures a RTS packet from another station and it is not the destination of the RTS packet it reads the indended transmission duration from the RTS packet and stays silent for that time (this is done by setting the Network Allocation Vector NAV). The same happens if only a CTS packet is received i.e. by a station outside of the transmission range of the sender but within the range of the receiver. This guarantees that all stations within range of either sender or receiver have knowledge of the transmission as well as of the duration of it. DIFS Source RTS SIFS SIFS DATA DIFS Destination Other Stations CTS NAV (RTS) NAV (CTS) ACK DIFS Contention Window next MPDU Defer Access Figure 2:RTS/CTS mechanism Backoff after Defer RTS/CTS Analysis Page 3
4 To sum up the effects of the RTS/CTS mechanism, we can say, that it increases bandwidth efficiency by its reduced collision probability since the ongoing transmission has been made known everywhere within the range of it increases bandwidth efficiency since if collisions occur they do not occur with the long data packets but with the relative small control packets decreases bandwidth efficiency since it transmits two additional packets without any payload decreases bandwidth efficiency since it reserves geographical space for its transmission where or when it might actually not need it. Due to the above listed trade-offs of the RTS/CTS mechanism, the DFWMAC draft standard allows its usage but does not demand it. Usage policy is set on a per-station-basis with the help of a manageable object RTS_Threshold that indicates the payload length under which the data frames should be sent without the RTS/CTS prefix. This parameter is not fixed in the draft standard and has to be set seperatly by each station. The packet size is the only parameter that is used to decide whether the mechanism is applied, however we will show in the simulations presented below, that there are several more factors relevant to guarantee efficiency gain. We identified the following elements: configuration and geometry and the physical preamble length, but there might be further dependencies. 3. Discussing the RTS/CTS Mechanism in DFWMAC In order to analyze the behavior of the DFWMAC we simulated a possible network cell. We chose Ptolemy [6] as our simulation tool for several reasons: its an object oriented general purpose simulation tool with many connectable simulation environments (discrete event, synchronous data flow, concurrent processes) for several different simulation types. It allows simple modelling, has a rich library and a big number of users, allowing exchange of experience over a dedicated newsgroup. We simulated a WLAN consisting of 8 stations using DFWMAC s distributed coordination function as the access scheme with a raw physical throughput of 2 Mbit/s. The channel and packet source model is basically the same as it is described in [7], i.e. Poisson distributed packet sources in a wireless channel model. In addition to that we simulated the signal run time, which can be left out if one only considers a range of a microcell, but which becomes considerable at distances of 300 m and more. Several parameters had to be set to a certain value for our simulations since they are not (yet) defined in the draft standard: The contention window size was set to 32 slots, lasting 4µs each, the physical preamble was set to 30 bytes unless other values are explicitly mentioned, 16 RTS packets transmission attempts with missing CTS response and 4 data packet transmissions with missing acknowledgment response are sent out before the transmission is cancelled and the packet is dropped. RTS/CTS Analysis Page 4
5 Originally, the RTS/CTS mechanism was introduced to solve the hidden terminal problem. In result our first simulations intended to show the positive effect of this mechanism in this case. In further simulations we evaluated the use of RTS/CTS in a fully meshed network (i.e. without hidden terminals) and special values for certain parameters RTS/CTS in the hidden terminal scenario To show the effect of the RTS/CTS mechanism, we simulated the following scenario: There are 8 stations in a cell, where station 1 is hidden to stations 2 and 3, respectively. All of the outer stations (1,2 and 3) try to send data to the inner, i.e. audible to all, stations. The destinations of data traffic are shown in Figure 3. Meter Figure 3:Map of the stations in the hidden terminal simulation Meter The result of these simulations was that using the RTS/CTS does not completely solve the hidden terminal problem, even though significant improvements can be achieved. The breakdown of inbound data traffic in the case of higher load stems from the fact that the mutually hidden stations become synchronized by an earlier data exchange in the area between them. In result, they start their backoff counters at the same time but they are unable to detect the begin of transmission of the other station. Figure 4 shows the through- RTS/CTS Analysis Page 5
6 put achieved by the different stations when RTS/CTS is permanently switched off. The relevant differences are clearly visible in the higher load range. The stations that are hidden to other stations hardly get any packets through due to the above mentioned synchronization effect. The stations that attempt to send towards the hidden stations have significantly lower throughput than the two stations 5 and 7 that only send to non-hidden stations. The first group successfully gets packets through, however many acknowledgment packets are destroyed by traffic from the hidden stations. Throughput per station in % stations 5,7 stations 4,6 station 8 stations 1,2,3 Offered Load per station in % Figure 4:Throughput per Station, Hidden Terminals, RTS/CTS off Figure 5 shows the same setup when RTS/CTS is permanently used. This figure shows clearly that still the hidden terminal scenario is not solved: Station 1 still hardly gets any packets through, but its throughput is improved compared to the figure without RTS/ CTS. The same goes for stations 2 and 3 - all of the hidden stations benefit from the captured CTS packets. The non-hidden terminals all achieve the same (high) throughput due to the fact that outbound traffic is protected by the RTS packets. RTS/CTS Analysis Page 6
7 Throughput per station in % all other stations stations 2,3 station 1 Offered Load per station in % Figure 5:Throughput per station, Hidden Terminals, RTS/CTS on 3.2. RTS/CTS in a fully meshed network In the above paragraph we showed the performance gain that can be achieved by applying the RTS/CTS mechanism in the case with hidden terminals. For the fully meshed case we followed several different goals in our simulations: we showed that there are situations where application of the mechanism has significant positive effects as well as there are situations with significant negative effects thus proving that there cannot be an overall same strategy on the usage policy we then tried to analyze the relevant factors that determine the efficiency of the mechanism under fixed non-extreme circumstances we defined a range of values for useful application of RTS/CTS (RTS_Threshold parameter) we investigated asymmetric usage policies of the mechanism. Our first two simulations were meant to show extreme situations, one resulting in significant negative effect in using RTS/CTS, one resulting in significant negative effects RTS/CTS Analysis Page 7
8 when NOT using it, both compared to a realistic scenario. The first situation was determined by a short packet length of only 64 byte payload, while the PHY preamble was set to 30 bytes. Since observations of Ethernet traffic show that a very large number of packets is shorter than 100 byte, this situation can actually be considered realistic. Both figures show decreasing performance - lower throughput and higher access delay due to the higher overhead of the RTS/CTS extension. Throughput per station in % Not using RTS/CTS Using RTS/CTS Offered Load in % Figure 6:Negative effect on throughput, if packet size is small Access Delay in ms Using RTS/CTS Not using RTS/CTS Offered Load in % Figure 7:Negative effect on access delay, if packet size is small RTS/CTS Analysis Page 8
9 For the following simulations we used packet sizes from an Ethernet trace (Leland trace, [8]) i.e. packet sizes are distributed as in real ethernet traffic with an average packet size of 682 byte. It shows that using the RTS/CTS mechanism permanently in this case is significantly better than not using it. Throughput in Kbyte/s Using RTS/CTS Not using RTS/CTS Offered Load in % Figure 8:Positive effect on throughput, if packet size is larger (mean=682 byte) Access Delay in ms Not using RTS/CTS Using RTS/CTS Offered Load in % Figure 9:Positive effect on access delay, if packet size is larger (mean=682 byte) RTS/CTS Analysis Page 9
10 In the same scenario as above we determined the gain or loss of throughput and delay versus load, if RTS/CTS is used, depending on the packet size. Since the packet size on the wireless channel consists of the MAC-layer packet size and the physical layers preamble the length of this latter part has to be taken into account when determining the RTS_Threshold parameter. Our simulations gave larger best values for RTS_Treshold for larger physical preambles. Since this physical preamble has different lengths depending on the channel used - for the defined physical layers in the specification those values are 128 bits with a variable number of stuff bits for 2.4GHz FHSS 1 channel, 192 bits for the 2.4GHz DSSS 2 channel and between 96 and 112 slots of 250ns length plus 32 bits for the baseband infrared channel - therefore this value has to be taken into account when configuring the RTS_Threshold parameter. This gets even more difficult in the case of the 2.4GHz FHSS channel as well as for the infrared channel, where no fixed length is added but a variable number of bits. Total throughput in % RTS/CTS on RTS/CTS off Offered Load in % Figure 10:Throughput vs. Load, PHY_preamble=0 If we assume the physical preamble to be non-existent we get the highest total throughput for RTS_threshold=64, i.e. RTS/CTS is switched on permanently since no packets are smaller than 64 bytes. 1. FHSS - Frequency Hopping Spread Spectrum 2. DSSS - Direct Sequence Spread Spectrum RTS/CTS Analysis Page 10
11 Total throughput in % RTS_threshold =256 RTS/CTS on RTS/CTS off Figure 11:Throughput vs. Load, PHY_preamble=30 bytes For a physical preamble length of 30 bytes, we achieve best results for RTS_threshold around 256 bytes. Total throughput in % Offered Load in % RTS/CTS off RTS_threshold=1024 RTS/CTS on Figure 12:Throughput vs. Load, PHY_preamble=100 bytes Offered Load in % RTS/CTS Analysis Page 11
12 For the extreme (and slightly unrealistic) case of the PHY_preamble having 100 bytes we get optimal values for RTS_threshold around 512 bytes. Summing up we can say that for the proposed PHY_preamble sizes of the draft standard we recommend, based on our simulations, a value of around 200 byte MPDU size for the RTS_threshold. This of course depends on the source model of our simulations. Since traffic on a wireless network can be expected similar to Ethernet traffic we consider our applied source model to be reasonable. The use of RTS/CTS in the DFWMAC draft standard is managed on a per-station basis. This can result in asymmetric configurations in the network, e.g. one station does never use the mechanism, all the others do. We simulated some of those asymmetric configurations to determine whether the stations behaving different than the rest might win performance at the cost of the others, whether they will loose or whether they will cause degradation of the overall network performance. It showed that there is no individual gain for a station which does for some reason not behave like the others, but that there is a small decrease in the overall performance Total throughput per group in % using RTS/CTS The strategy based on setting a fixed value for RTS_Threshold obviously does not optimize the optional use of the mechanism. We will experiment with a different approach trying to design it as a load adaptive scheme: Considering the fact that under low load connot using RTS/CTS Figure 13:Throughput vs. Load 4 Stations use RTS/CTS, 4 Stations don t 4. Conclusions % Offered Load per group RTS/CTS Analysis Page 12
13 dition in the network the few collisions caused by the hidden terminal scenario do not harm the overall performance as much as under high load condition, it seems to be reasonable only to use RTS/CTS when load is high. However it is not trivial to get the knowledge about current load to the stations. One thinkable switch-on criteria could be an experienced collision: once a data packet collided the next attempt would have to be preceded by a RTS/CTS exchange (possibly this step to more secure transmission should only take place after two or more collided attempts). This strategy however leaves it open when the station should switch back to non-rts/cts mode - after each successful transmission of a data packet, after a certain silence period, after a certain time period or other. As we have shown several factors have significant influence on the efficiency with which the RTS/CTS mechanism can be applied in the context of DFWMAC. At current standing we cannot advise for or against its use. This is especially true considering further uncertainties e.g.what happens if PCF is also used, i.e. DCF is only partly active? what happens if considerably different signal strength levels are sent out from different stations (e.g. when the battery power is low in one station) and therefore the station can hear all stations but is not heard by all of them? Another topic for further work could be the exploitation of the hidden terminal scenario - since the collision can only occur at the receiving side of the communication it is not necessary to reserve space around the sending side. A station only hearing the RTS packet and the data packets but not the CTS packet can assume, that it is out of range of the receiving station and thus not disturbing the ongoing communication. It could therefore start communication with another station if that station is able to receive the signal as well undisturbed by the other ongoing communication. These problems will be the subject for our future activities in this area. References [1] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Draft Standard IEEE , P802.11/D1; The editors of IEEE [2] HIPERLAN Functional Specification Section 6 MAC Layer, Draft Version 0.6, ETSI Secretariat, December 1994 [3] MACA - A new Channel Access Method for Packet Radio, P. Karn, ARRL/CRRL Amateur Radio 9th Computer Networking Conference, Sept [4] MACAW: A Media Access Protocol for Wireless LAN s; Bharghavan V., Demers A., Shenker S., Zhang L., SIGCOM 94; macaw-cr.ps [5] Modified Backoff Algorithms for DFWMAC`s Distributed Coordination Function; Woesner H., Weinmiller J., Ebert J-P., Wolisz A.; submitted to 2. ITG-Fachtagung RTS/CTS Analysis Page 13
14 Mobile Kommunikation 95; ITG.ps.Z [6] PTOLEMY, anonymous ftp site: ftp.ptolemy.eecs.berkeley.edu, www: ptolemy.eecs.berkeley.edu, Copyright The Regents of the University of California [7] A Wireless MAC Protocol comparison, W. Diepstraten; IEEE working paper P /51, May 1992 [8] W. Leland et al.: On the Self-similar nature of Ethernet traffic (extended version), IEEE Transactions on Networking, Vol 2, No 1, Feb 1994 RTS/CTS Analysis Page 14
Physical Layers MAC - Layer. Contention Free Service used for. Contention Service. used for. time bounded traffic and for contention free
Analyzing and Improving the IEEE 802.11-MAC Protocol for Wireless LANs Jost Weinmiller, Hagen Woesner, Adam Wolisz Electrical Engineering Department Technical University Berlin, Sekr. FT5 Einsteinufer
More informationA Performance Analysis of IEEE Networks in the Presence of Hidden Stations
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationCS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationLecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW
Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationLecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW
Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final
More informationA Survey on Modified RTS/CTS Mechanism
A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationOverview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV
Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationAnalysis of IEEE e for QoS Support in Wireless LANs
Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationPerformance Analysis for Channel Utilization in Wireless LAN
Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationHands-On Exercises: IEEE Standard
Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University
More informationMobile Communications Chapter 7: Wireless LANs
Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationWireless LAN. Access Point. Provides network connectivity over wireless media
LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationEmbedded Internet and the Internet of Things WS 12/13
Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMulti-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationFigure.2. Hidden & Exposed node problem
Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationAn Enhanced IEEE Retransmission Scheme
An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationWLAN Performance Aspects
Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationLink Layer: Retransmissions
Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationLink Layer II: MACA and MACAW
Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationEfficient Power MAC Protocol in Ad-hoc Network s
Efficient Power MAC Protocol in Ad-hoc Network s Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationAnnouncements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday
ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationPERFORMANCE ANALYSIS OF INTERCONNECTIONS OF IEEE NETWORKS WITH OTHER NETWORKS
PERFORMANCE ANALYSIS OF INTERCONNECTIONS OF IEEE 802.11 NETWORKS WITH OTHER NETWORKS Marek Natkaniec Department of Telecommunications University of Mining and Metallurgy 30-059 Cracow, Poland E-mail: natkanie@kt.agh.edu.pl.
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationOverview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi
Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationIEEE Technical Tutorial. Introduction. IEEE Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More informationEVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS
MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationA Finite State Model for IEEE Wireless LAN MAC DCF
First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationOutline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD
Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific
More informationEffect of Hidden Terminals on the Performance of IEEE MAC Protocol
Effect of Hidden Terminals on the Performance of IEEE 8.11 MAC Protocol Sumit Khurana, Anurag Kahol, Anura P. Jayasumana Colorado State University Ft. Collins, Colorado, U.S.A. fkhurana, kaholg@cs.colostate.edu,
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More information