Mohamed Khedr.

Similar documents
Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSE 461: Wireless Networks

IEEE Medium Access Control. Medium Access Control

Wireless Local Area Networks (WLANs) Part I

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Lecture 16: QoS and "

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Unit 7 Media Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC)

Data and Computer Communications. Chapter 13 Wireless LANs

Introduction to IEEE

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Data Communications. Data Link Layer Protocols Wireless LANs

ICE 1332/0715 Mobile Computing (Summer, 2008)

MAC in /20/06

MAC. Fall Data Communications II 1

Wireless Local Area Network (IEEE )

Wireless Local Area Networks. Networks: Wireless LANs 1

Rahman 1. Application

CMPE 257: Wireless and Mobile Networking

CSE 6811 Ashikur Rahman

Wireless LANs. ITS 413 Internet Technologies and Applications

Local Area Networks NETW 901

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Wireless Networks (MAC)

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Chapter 6 Medium Access Control Protocols and Local Area Networks

Wireless Protocols. Training materials for wireless trainers

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Computer Communication III

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

IEEE MAC Sublayer (Based on IEEE )

ECE442 Communications Lecture 3. Wireless Local Area Networks

Lesson 2-3: The IEEE x MAC Layer

Multiple Access Links and Protocols

Media Access Control in Ad Hoc Networks

Internet Protocol Stack

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Nomadic Communications WLAN MAC Fundamentals

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

The MAC layer in wireless networks

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Chapter 12 Multiple Access 12.1

CMPE 257: Wireless and Mobile Networking

The MAC layer in wireless networks

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

3.1. Introduction to WLAN IEEE

Mobile Communications Chapter 7: Wireless LANs

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Transmission Control Protocol over Wireless LAN

Computer Networks. Wireless LANs

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

Wireless Networked Systems

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Department of Electrical and Computer Systems Engineering

IEEE Wireless LANs

ICE 1332/0715 Mobile Computing (Summer, 2008)

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

IEEE WLAN (802.11) Copyright. Nomadic Communications

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Topic 4. Wireless LAN IEEE

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Mohammad Hossein Manshaei 1393

Wireless Communications

Wireless Networking & Mobile Computing

Embedded Internet and the Internet of Things WS 12/13

Mobile Communications Chapter 7: Wireless LANs

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Wireless Network Security Spring 2014

IEEE Wireless LANs Part I: Basics

Wireless Communication Session 4 Wi-Fi IEEE standard

INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange

Medium Access Control Sublayer

Wireless Network Security Spring 2013

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Wireless Network Security Spring 2015

Wireless MACs: MACAW/802.11

Advanced Computer Networks WLAN

MSIT 413: Wireless Technologies Week 8

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Wireless LAN -Architecture

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs

Hands-On Exercises: IEEE Standard

Mohammad Hossein Manshaei 1393

Multiple Access in Cellular and Systems

Chapter 6 Wireless and Mobile Networks

Wireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.

Enabling Technologies

Transcription:

Mohamed Khedr http://webmail.aast.edu/~khedr

Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing and subnetting IP addressing and subnetting Introduction to Routing concept, Routing algorithms Routing protocols Multiple Access I Multiple access II LAN networks Token ring networks VOIP WLAN TCP Congestion control QOS

Collision avoidance Basic task medium access control Energy efficiency Scalability and adaptivity Number of nodes changes overtime Latency Fairness Throughput Bandwidth utilization

infrastructure network AP AP wired network AP: Access Point AP ad-hoc network Source: Schiller

! Wireless LAN 2.4 GHz 5 GHz 802.11 (2 Mbps) 802.11b (11 Mbps) 802.11g (22-54 Mbps) 802.11a (54 Mbps) HiperLAN2 (54 Mbps) HomeRF 2.0 (10 Mbps) Bluetooth (1 Mbps) HomeRF 1.0 (2 Mbps) 802.11e (QoS) 802.11k (RRM)

"# Random assignment approaches Dynamic number of transceivers contend for medium Distributed (peer-to-peer) algorithms for contention Great for dynamic / unplanned or distributed networks Problem: Hidden and Exposed Terminal Problems

$ % # A C B Senders A and C separated by obstacle. Each thinks the medium is free. Senders A and C out of range of each other. Each thinks medium is free. A B C

$ % # A A and C cannot hear each other. A sends to B, C cannot receive A. C wants to send to B, C senses a free medium (CS fails) Collision occurs at B. A cannot receive the collision (CD fails). A is hidden for C. B C

&'% # Range of B A B C sending Range of C D

&'% # D C A B A starts sending to B. C senses carrier, finds medium in use and has to wait for A->B to end. D is outside the range of A, therefore waiting is not necessary.

"#"&' CSMA Carrier Sense Multiple Access Ethernet Not enough for wireless (collision at receiver) A B C Hidden terminal: A is hidden from C s CS MACA Multiple Access w/ Collision Avoidance RTS/CTS for hidden terminal problem RTS/CTS/DATA

"#"&' MACAW improved over MACA RTS/CTS/DATA/ACK Fast error recovery at link layer IEEE 802.11 Distributed Coordination Function (DCF) Largely based on MACAW

$ % A first sends a Request-to-Send (RTS) to B On receiving RTS, B responds Clear-to-Send (CTS) Hidden node C overhears CTS and keeps quiet Transfer duration is included in both RTS and CTS Exposed node overhears a RTS but not the CTS D s transmission cannot interfere at B D RTS RTS A B C CTS CTS DATA

()*+,,-!. When B receives DATA from A, B sends an ACK If A fails to receive an ACK, A retransmits the DATA Both C and D remain quiet until ACK (to prevent collision of ACK) Expected duration of transmission+ack is included in RTS/CTS packets D RTS RTS A B C CTS CTS DATA ACK

()*+,,/0 Distributed coordinate function: ad hoc mode Virtual and physical carrier sense (CS) Network allocation vector (NAV), duration field Binary exponential backoff RTS/CTS/DATA/ACK or DATA/ACK for unicast packets Broadcast packets are directly sent after CS Fragmentation support RTS/CTS reserve time for first (frag + ACK) First (frag + ACK) reserve time for second Give up tx when error happens

()*+,,$ Basic mechanism: 2 way handshaking RTS/CTS mechanism: 4 way handshaking

()*+,,/01*2 Carrier-sensing until channel idle for DIFS period If channel not idle, random backoff based on contention window If channel idle, RTS-CTS-DATA-ACK or DATA-ACK handshake If transmission unsuccessful, double contention window size Node A Node B CW=7 CW=6 CW=5 CW=4 CW=3 DATA Busy Busy DIFS period

()*+,,/01*2 Carrier-sensing until channel idle for DIFS period If channel not idle, random backoff based on contention window If channel idle, RTS-CTS-DATA-ACK or DATA-ACK handshake If transmission unsuccessful, double contention window size CW=2 CW=1 CW=0 CW=3 Node A DATA DATA ACK RTS CTS Node B DATA Busy Busy RTS CTS DATA ACK DIFS period

()*+,,/012 Timing relationship

Beacon PCF DCF Super Frame DCF PCF - Distributed Coordinated Function (Contention Period - Ad-hoc Mode) - Point Coordinated Function (Contention Free Period Infrastructure BSS) Beacon - Management Frame Synchronization of Local timers Delivers protocol related parameters

%()*+,,3# Interframe spacing in 802.11.

Inter-Frame Spacing : DIFS - 34 µsec PIFS - 25 µsec ( Used in PCF ) SIFS - 16 µsec Slot Time - 9 µsec DIFS = SIFS + (2 * Slot Time) SIFS required for turn around of Tx to Rx and vice versa

Data Transmission from Node A to B CW A DIFS ACK DATA A ACK B DIFS SIFS CW Contention Window. Starts only after DIFS. Random number r picked form range ( 0-CW ) CW min minimum value of CW CW max maximum value the CW can grow to after collisions r can be decremented only in CW CW doubles after every collision

A Collision between nodes A and C ACK DATA A DATA C DIFS SIFS DIFS Length (DATA A ) = 10 Slot times Length (DATA C ) = 15 Slot times CW after Collision 1 0 7 CW after Collision 2 0 15 CW after Collision 3 0 31 CW after Collision 4 0 6

NAV Network Allocation Vector STA A DATA STA B ACK STA C ACK DIFS SIFS DIFS NAV B and C

Point Coordinated Function (PCF) Also known as the CFP (Contention Free Period) Operation in an Infrastructure BSS STAs communicate using central authority known as PC (Point Coordinator) or AP (Access Point) No Collisions take place AP takes over medium after waiting a period of PIFS Starts with issue of a Beacon

AP taking over the Wireless medium using PIFS DATA A PIFS B DIFS SIFS DIFS DIFS - 34 µsec PIFS - 25 µsec SIFS - 16 µsec Slot Time - 9 µsec B - Beacon

()*+,, 3 4

()*+,,3% 4 53

#0'% 4

"$ Ad-Hoc Mode supports mutual communication among wireless clients only BSS Basic Service Set (BSS) - BSSID

Provides the communication between wireless clients and wired network through AP (Access Point). BSS1 BSS2 BSS3 Roaming

5% 4 NAV=0? No Yes Sense the medium (perform physical channel assessment) Medium Idle? Yes Transmit Frame No Random Backoff Time Collision? Yes No

3 0 IFS (Inter-Frame Spacing) DIFS SIFS: Short IFS DIFS PIFS: PCF IFS = SIFS + slot time PIFS DIFS: DCF IFS = SIFS + 2*slot time medium busy SIFS contention next frame Slot time Exponential Back-off Random back-off time within a contention window [0, CW] Contention window size increases with retransmission Back-off time = random() * slot time Random() = a pseudo random integer in [0,CW] CWmin <= CW <= CWmax, CW starts with CWmin and increases by every retransmission up to CWmax, and is reset to Cwmin after successful transmission time

/0 1/ 0 2 Listen before-talk scheme based on the CSMA Stations transmits when medium is free for time greater than a DIFS period Random backoff is issued when medium busy All backoff slots occur after a DIFS

4 6!&' busy B1 = 25 wait B1 = 5 data B2 = 20 busy data B2 = 15 wait B2 = 10 cw = 31 B1 and B2 are backoff intervals at nodes 1 and 2

5 6 The time spent counting down backoff intervals is a part of MAC overhead large CW large overhead however, small CW may lead to many collisions (when two nodes count down to 0 simultaneously) Since the number of nodes attempting to transmit simultaneously may change with time, we need some mechanism to manage contention IEEE 802.11: contention window CW is adapted dynamically depending on collision occurrence after each collision, CW is doubled

766()*+,,/0 Backoff procedure BEB algorithm CW max CW min CW t

/%3 Discrete and integer time scale At beginning of a slot time, backoff time counter decrements or regenerated [t, t+1], interval between 2 consecutive slot time, can be variable length

%