Multiple Access Links and Protocols

Similar documents
ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Multiple Access Links and Protocols

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Chapter 5: Link layer

The Link Layer and LANs. Chapter 6: Link layer and LANs

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Chapter 5 Link Layer and LANs

MULTIPLE ACCESS PROTOCOLS 2. 1

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

CS 455/555 Intro to Networks and Communications. Link Layer

Data Link Layer: Multi Access Protocols

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CSC 4900 Computer Networks: The Link Layer

CSC 401 Data and Computer Communications Networks

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CC451 Computer Networks

Link Layer and LANs. CMPS 4750/6750: Computer Networks

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Multiple Access in Cellular and Systems

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CMPE 257: Wireless and Mobile Networking

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Chapter 6 Wireless and Mobile Networks

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Last Lecture: Data Link Layer

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter V: Link Layer

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Data and Computer Communications. Chapter 13 Wireless LANs

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CMPE 257: Wireless and Mobile Networking

Medium Access Control

Unit 7 Media Access Control (MAC)

Data Link Layer: Overview, operations

MAC in /20/06

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Chapter 6 Medium Access Control Protocols and Local Area Networks

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CMPE 150: Introduction to Computer Networks

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

Chapter 5 Link Layer and LANs

Redes de Computadores. Medium Access Control

CSE 461: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks

Wireless and Mobile Networks 7-2

Lecture 16: QoS and "

Wireless LANs. ITS 413 Internet Technologies and Applications

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Data Communications. Data Link Layer Protocols Wireless LANs

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Computer Communication III

Wireless Communications

Logical Link Control (LLC) Medium Access Control (MAC)

EE 122: Ethernet and

Rahman 1. Application

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Master Course Computer Networks IN2097

Mohamed Khedr.

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

MAC. Fall Data Communications II 1

Internet Protocol Stack

SC250 Computer Networking I. Link Layer. Prof. Matthias Grossglauser LCA/I&C.

MSIT 413: Wireless Technologies Week 8

Wireless and Mobile Networks

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

The MAC layer in wireless networks

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

CSE 6811 Ashikur Rahman

Chapter V: Link Layer

Aloha and slotted aloha

Chapter 6: Link layer and LANs. Link layer, LANs: outline. Link layer: introduction. Link layer: context. Link layer services (more)

ICE 1332/0715 Mobile Computing (Summer, 2008)

CS 3516: Computer Networks

Chapter 12 Multiple Access 12.1

ECE 4450:427/527 - Computer Networks Spring 2017

The MAC layer in wireless networks

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Mobile devices for wireless

CS 332 Computer Networks Wireless Networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

Link Layer and LANs. Our Goals. Link Layer

Local Area Networks NETW 901

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

COMP 3331/9331: Computer Networks and Applications

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Introduction to IEEE

Master Course Computer Networks IN2097

Transcription:

Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet upstream HFC 802.11 wireless LAN shared wire (e.g., cabled Ethernet) shared RF (e.g., 802.11 WiFi) shared RF (satellite) humans at a cocktail party (shared air, acoustical) 1

Multiple Access protocols single shared broadcast channel two or more simultaneous transmissions by nodes: interference collision if node receives two or more signals at the same time multiple access protocol distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit communication about channel sharing must use channel itself! no out-of-band channel for coordination 2

Ideal Multiple Access Protocol Broadcast channel of rate R bps 1. when one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M 3. fully decentralized: no special node to coordinate transmissions no synchronization of clocks, slots 4. simple 3

MAC Protocols: a taxonomy Three broad classes: Channel Partitioning divide channel into smaller pieces (time slots, frequency, code) allocate piece to node for exclusive use Random Access channel not divided, allow collisions recover from collisions Taking turns nodes take turns, but nodes with more to send can take longer turns 4

Channel Partitioning MAC protocols: TDMA TDMA: time division multiple access access to channel in "rounds" each station gets fixed length slot (length = pkt trans time) in each round unused slots go idle Example 6-station LAN: 1,3,4 have pkt, slots 2,5,6 idle 6-slot frame 1 3 4 1 3 4 5

frequency bands Channel Partitioning MAC protocols: FDMA FDMA: frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go idle Example 6-station LAN: 1,3,4 have pkt, frequency bands 2,5,6 idle 6

Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes collision, random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA 7

Slotted ALOHA Assumptions: all frames same size time divided into equal size slots (time to transmit 1 frame) nodes start to transmit only slot beginning nodes are synchronized if 2 or more nodes transmit in slot, all nodes detect collision Operation: when node obtains fresh frame, transmits in next slot if no collision: node can send new frame in next slot if collision: node retransmits frame in each subsequent slot with prob. p until success 8

Slotted ALOHA Pros single active node can continuously transmit at full rate of channel highly decentralized: only slots in nodes need to be in sync simple Cons collisions, wasting slots idle slots nodes may be able to detect collision in less than time to transmit packet clock synchronization 9

Slotted Aloha efficiency Efficiency : long-run fraction of successful slots (many nodes, all with many frames to send) suppose: N nodes with many frames to send, each transmits in slot with probability p prob that given node has success in a slot = p(1-p) N-1 prob that any node has a success = Np(1-p) N-1 max efficiency: find p* that maximizes Np(1-p) N-1 for many nodes, take limit of Np*(1-p*) N-1 as N goes to infinity, gives: Max efficiency = 1/e =.37 At best: channel used for useful transmissions 37% of time!! 10

Pure (unslotted) ALOHA unslotted Aloha: simpler, no synchronization when frame first arrives transmit immediately collision probability increases: frame sent at t 0 collides with other frames sent in [t 0-1,t 0 +1] 11

Pure Aloha efficiency P(success by given node) = P(node transmits). P(no other node transmits in [t 0-1,t 0 ]. P(no other node transmits in [t 0,t 0 +1] = p. (1-p) N-1. (1-p) N-1 = p. (1-p) 2(N-1) choosing optimum p and then letting n -> infinity... = 1/(2e) =.18 even worse than slotted Aloha! 12

13

Now, let s improve things 14

IEEE 802.11: multiple access avoid collisions: 2 + nodes transmitting at same time 802.11: CSMA - sense before transmitting don t collide with ongoing transmission by other node 802.11: no collision detection! difficult to receive (sense collisions) when transmitting due to weak received signals (fading) can t sense all collisions in any case: hidden terminal, fading goal: avoid collisions: CSMA/C(ollision)A(voidance) C A B C A B A s signal strength C s signal strength space 15

IEEE 802.11 MAC Protocol: CSMA/CA 802.11 sender 1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires 3 if no ACK then increase random backoff interval, repeat step 2 802.11 receiver - if frame received OK return ACK after SIFS (service model is connectionless, acked) DIFS sender data ACK receiver SIFS 16

IEEE 802.11 MAC: Distributed Coordination Function (DCF) Make use of CSMA (carrier sense multiple access) Use set of delays generic called Interframe Space (IFS) Algorithm Logic: 1. Station sense the medium 2. If medium idle, wait IFS, then if still idle transmit frame 3. If medium busy or become busy, defer and monitor the medium until idle 4. Then, delay IFS and sense medium 5. If medium idle, exponential backoff and if then idle, station transmit Binary exponential backoff -> handle heavy load 17

IEEE 802.11 MAC: Distributed Coordination Function (DCF) Make use of CSMA (carrier sense multiple access) Use set of delays generic called Interframe Space (IFS) Algorithm Logic: 1. Station sense the medium 2. If medium idle, wait IFS, then if still idle transmit frame 3. If medium busy or become busy, defer and monitor the medium until idle 4. Then, delay IFS and sense medium 5. If medium idle, exponential backoff and if then idle, station transmit Binary exponential backoff -> handle heavy load 18

IEEE 802.11 MAC: DCF, cont d Priority-based scheme - use 3 values for IFS: SIFS (short IFS): shortest IFS used for immediate responses such as ACK, CTS, poll response PIFS (point coordination function IFS): middle length IFS used for issuing polls by a centralized controller DIFS (distributed coordination function IFS): longest IFS used for regular asynchronous frames 19

Hidden Terminal Problem Hidden terminal problem (ad-hoc and WLAN) A B C A s signal strength C s signal strength space C A B 20

Hidden Terminal Problem Hidden terminal problem (ad-hoc and WLAN) A B C A s signal strength C s signal strength space C A B 21

Hidden Terminal Problem Hidden terminal problem (ad-hoc and WLAN) - medium free near the transmitter - medium not free near the receiver => Packet collision A B C A s signal strength C s signal strength space C A B 22

Hidden Terminal Problem Hidden terminal problem (ad-hoc and WLAN) - medium free near the transmitter - medium not free near the receiver => Packet collision Possible solution: - MAC scheme using RTS-CTS scheme A B C A s signal strength space C s signal strength C A B 23

Avoiding collisions (more) idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames sender first transmits small request-to-send (RTS) packets to base station using CSMA RTS may still collide with each other (but they re short) BS broadcasts clear-to-send CTS to host in response to RTS RTS heard by all nodes because of broadcast property sender transmits (large) data frame other stations defer transmissions until it is done Avoid data frame collisions completely using small reservation packets! 24

Collision Avoidance: RTS-CTS exchange A AP B reservation collision DATA (A) defer time 25

Hidden Terminal Problem [2] Problems with RTS-CTS solution: - possible collisions between CTS and RTS - collisions between data packets due to multiple different CTS granted to different neighboring nodes - Also, adds delay and overhead 26

Exposed Terminal Problems Exposed terminal problem (ad-hoc and WLAN) - medium free near the receiver - medium busy near the transmitter => Waist of bandwidth Possible solutions: - directional antennas - separate channels for control and data 27

Issues, medium access schemes Distributed operation Synchronization Hidden terminals Exposed terminals Throughput Access delay Fairness Real-time traffic support Resource reservation Ability to measure resource availability Capability for power control Adaptive rate control Use of directional antennas 28

Issues, medium access schemes Distributed operation Synchronization Hidden terminals Exposed terminals Throughput Access delay Fairness Real-time traffic support Resource reservation Ability to measure resource availability Capability for power control Adaptive rate control Use of directional antennas 29

Issues, medium access schemes Distributed operation Synchronization Hidden terminals Exposed terminals Throughput Access delay Fairness Real-time traffic support Resource reservation Ability to measure resource availability Capability for power control Adaptive rate control Use of directional antennas 30

31

802.11 frame: addressing frame control 2 2 6 6 6 2 6 0-2312 4 duration address 1 address 2 address 3 seq control address 4 payload CRC Address 1: MAC address of wireless host or AP to receive this frame Address 2: MAC address of wireless host or AP transmitting this frame Address 3: MAC address of router interface to which AP is attached Address 4: used only in ad hoc mode 32

802.11 frame: addressing H1 R1 router Internet AP R1 MAC addr H1 MAC addr dest. address source address 802.3 frame AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address 3 802.11 frame 33

802.11 frame: more duration of reserved transmission time (RTS/CTS) frame seq # (for reliable ARQ) frame control 2 2 6 6 6 2 6 0-2312 4 duration address 1 address 2 address 3 seq control address 4 payload CRC Protocol version 2 2 4 1 1 1 1 1 1 1 1 Type Subtype To AP From AP More frag Retry Power mgt More data WEP Rsvd frame type (RTS, CTS, ACK, data) 34

35

A few more words about QoS 36

IEEE 802.11 MAC: Point Coordination Function (PCF) Alternative access method on top of DCF Polling operation by a centralized master Use PIFS when issuing polls For avoiding locking out the asynchronous traffic the superframe is used 37

IEEE 802.11 MAC protocol 38

IEEE 802.11 MAC Frame Types Six types of control frames Power save - poll (PS-poll) Request to send (RTS) Clear to send (CTS) Acknowledgment (ACK) Contention-free (CF)-end CF-end + CF-Ack Eight types of data frames Carry user data Data Data + CF-Ack Data + CF-poll Data + CF-Ack + CF-poll Do not carry user data Null Function CF-Ack CF-Poll CF-Ack + CF-Poll Management frames association request and association response reassociation request and reassociation response probe request and probe response beacon announcement traffic indication message disassociation authentication and deauthentication 39

IEEE 802.11e: Enhanced Distribution Coordination Function (EDCF) 40

IEEE 802.11 MAC protocol: parameters 41