Wireless Networks (MAC)

Similar documents
Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Communication

Mohamed Khedr.

Local Area Networks NETW 901

Unit 7 Media Access Control (MAC)

Wireless Protocols. Training materials for wireless trainers

Lecture 16: QoS and "

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

MAC. Fall Data Communications II 1

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Data and Computer Communications. Chapter 13 Wireless LANs

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Lesson 2-3: The IEEE x MAC Layer

ECE442 Communications Lecture 3. Wireless Local Area Networks

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Wireless Local Area Networks (WLANs) Part I

Chapter 6 Medium Access Control Protocols and Local Area Networks

IEEE MAC Sublayer (Based on IEEE )

Multiple Access Links and Protocols

IEEE Medium Access Control. Medium Access Control

MAC in /20/06

Introduction to IEEE

Data Communications. Data Link Layer Protocols Wireless LANs

Logical Link Control (LLC) Medium Access Control (MAC)

3.1. Introduction to WLAN IEEE

Advanced Computer Networks WLAN

IEEE Wireless LANs

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Computer Networks. Wireless LANs

Wireless LAN -Architecture

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Wireless Networking & Mobile Computing

Wireless LANs. ITS 413 Internet Technologies and Applications

Performance anomaly of b

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

CHAPTER 8: LAN Standards

CSE 6811 Ashikur Rahman

Rahman 1. Application

Mohammad Hossein Manshaei 1393

ICE 1332/0715 Mobile Computing (Summer, 2008)

Mobile Communications Chapter 7: Wireless LANs

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Computer Communication III

CSE 461: Wireless Networks

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

MSIT 413: Wireless Technologies Week 8

Nomadic Communications WLAN MAC Fundamentals

CS698T Wireless Networks: Principles and Practice

Wireless Communication and Networking CMPT 371

Wireless Network Security Spring 2013

Wireless Networked Systems

Mobile Communications Chapter 7: Wireless LANs

The MAC layer in wireless networks

Wireless Network Security Spring 2012

CMPE 257: Wireless and Mobile Networking

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

Transmission Control Protocol over Wireless LAN

Analysis of IEEE e for QoS Support in Wireless LANs

Mohammad Hossein Manshaei 1393

Wireless Local Area Networks. Networks: Wireless LANs 1

CMPE 257: Wireless and Mobile Networking

Wireless Network Security Spring 2014

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Wireless and Mobile Networks

INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU

Hands-On Exercises: IEEE Standard

IEEE WLAN (802.11) Copyright. Nomadic Communications

Internet Protocol Stack

IEEE Technical Tutorial. Introduction. IEEE Architecture

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Wireless Network Security Spring 2015

Solutions to Exercise Session 4,

The MAC layer in wireless networks

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Department of Electrical and Computer Systems Engineering

Wireless Communication

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Communications

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Modeling of Partially Overlapping Wireless Personal Area Networks

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Appendix A Pseudocode of the wlan_mac Process Model in OPNET

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Wireless Communication Session 4 Wi-Fi IEEE standard

Wireless# Guide to Wireless Communications. Objectives

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Introduction. Giuseppe Bianchi, Ilenia Tinnirello

Master thesis 60 credits

IEEE Wireless LANs Part I: Basics

Wireless Local Area Network (IEEE )

Investigation of WLAN

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Transcription:

802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU

Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf 2. IEEE 802.11 Tutorial By Mustafa Ergen online: http://wow.eecs.berkeley.edu/ergen/docs/ieee.pdf 3. 802.11 Wireless Networks: The Definitive Guide By Matthew Gast 4. 802.11ac: A Survival Guide By Matthew Gast online: http://chimera.labs.oreilly.com/books/1234000001739

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization Modulation and rate adaptation

Infrastructure Mode AP BSS STA Access point (AP) announces beacons periodically Each station (STA) connects to an AP An AP and its stations form a basic service set (BSS)

Infrastructure Mode AP AP ESS STA Several APs (BSSs) could form an extended service set (ESS) A roaming user can move from one BSS to another within the ESS

Infrastructure Mode AP AP ESS STA Issues Inter-BSS interference: channel assignment Load balancing: user association

Ad Hoc Mode Clients form a peer-to-peer network without a centralized coordinator Clients communicate with each other via multihop routing

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization

Two Operational Modes Distributed coordination function (DCF) Stations contend for transmission opportunities in a distributed way Point coordination function (PCF) AP sends poll frames to trigger transmissions

DCF Start contention after the channel keeps idle for DIFS AP responds ACK if the frame passes the CRC check Retransmit the frame until the retry limit is reached

Prioritized Interframe Spacing SIFS > PIFS > DIFS SIFS (Short interframe space): control frames, e.g., ACK and CTS PIFS (PCF interframe space): CF-Poll DIFS (DCF interframe space): data frame

Frame Format The following figu part of the frames a Data ACK Overhead of a 1500 byte packet (ignore contention, assume all bits sent at 1Mbps) = 1 T Data / (T DIFS + T PLCP + T MAC + T Data + T SIFS + T ACK ) = 1 (1500*8)/(50[DIFS] + 34*8 +1500*8 + 10[SIFS] + 14*8)

Fragmentation and Aggregation Large frame Reduced overhead, but less reliable Packet delivery ratio of an N-bit packet = (1-BER) N Fragmentation Break a frame into into small pieces so that interference only affects small fragments Aggregation Aggregate multiple small frames in order to reduce the overhead

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization Modulation and rate adaptation (week 5: 03/17)

ALOHA Original ALOHA Slotted ALOHA First distributed access control (about 1970) Transmit immediately whenever a node has data to send Do not sense the medium before transmission

CSMA/CA Carrier sense multiple access with collision avoidance STAs listen to the channel before transmission

Exponential Backoff 1. Each STA maintains a contention window Initialized to CW min = 32 2. Randomly pick a number, say k, between [0,CW-1] 3. Count down from k when the channel becomes idle 4. Start transmission when k = 0 if the channel is still idle 5. Double CW for every unsuccessful transmission, up to CW max (1024) Q: When will collisions occur?

Theoretical Performance of DCF G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordinabon funcbon," Selected Areas in CommunicaBons, IEEE Journal on 18, no. 3 (2000): 535-547 Markov Chain model for the backoff window size

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization Modulation and rate adaptation (week 5: 03/17)

Hidden Terminal Two nodes hidden to each other transmit at the same time, leading to collision

802.11 s Solution: RTS/CTS Rx Tx2 Tx1 Tx1 sends RTS whenever it wins contention Rx broadcasts CTS Nodes that receive CTS defer their transmissions

802.11 s Solution: RTS/CTS Usually disabled in practice due to its expensive overhead

Recent Solutions to Hidden Terminals Embrace collisions and try to decode collisions ZigZag decoding S. Gollakota and D. Katabi ZigZag decoding: combating hidden terminals in wireless networks ACM SIGCOMM, 2008 Rateless code A. Gudipati and S. Katti Strider: automatic rate adaptation and collision handling ACM SIGCOMM, 2011

Other Issues Performance anomaly M. Heusse, et al., "Performance anomaly of 802.11b," IEEE INFOCOM, 2003 Expensive overhead due to increasing data rates K. Tan, et al., "Fine-grained channel access in wireless LAN," ACM SIGCOMM, 2011 S. Sen, et al., No time to countdown: migrating backoff to the frequency domain, ACM MobiCom, 2011 Flexible channelization S. Rayanchu, et al., FLUID: improving throughputs in enterprise wireless LANs through flexible channelization, ACM MOBICOM, 2012

Performance Anomaly r ij =54 Mb/s r uv =6 Mb/s b 54 =36.2 Mb/s when l 54 sends alone c 54 =4.14 Mb/s as contending with l 6 b 6 =5.4 Mb/s when l 6 sends alone c 6 =4.37 Mb/s as contending with l 54 t p/b 54 p/b 6 Channel is almost occupied by low-rate links è Everyone gets a similar throughput, regardless of its bit-rate

Summary Nice properties of WiFi Distributed random access No coordination Ensuring fairness Common issues Expensive overhead Collisions No QoS guarantee Every protocol balances the trade-off between performance and overhead

Quiz Compare the overhead of 1) enabling RTS/CTS and 2) disabling RTS/CTS for A 1500-byte packet sent at 6mbps A 1500-byte packet sent at 54mbps Packet format in 802.11a (base rate = 6mbps) Assume that the average backoff value is 16 slots Time slot = 9 us DIFS = 34us, SIFS = 16us PLCP header: 13 symbols = 52us RTS: 20 bytes CTS: 20 bytes ACK: 14 bytes MAC header: 34 bytes