Medium Access Control

Similar documents
Aloha and slotted aloha

Random Assignment Protocols

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Mobile Communications Chapter 3 : Media Access

EE 122: Ethernet and

ECE 4450:427/527 - Computer Networks Spring 2017

ECEN 5032 Data Networks Medium Access Control Sublayer

Chapter 12 Multiple Access 12.1

CSE 461: Multiple Access Networks. This Lecture

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Chapter 1 Basic concepts of wireless data networks (cont d)

ICE 1332/0715 Mobile Computing (Summer, 2008)

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CSE 461 Multiple Access. David Wetherall

Strengthening Unlicensed Band Wireless Backhaul

COS 140: Foundations of Computer Science

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Mohamed Khedr.

Packet multiple access and the Aloha protocol

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Data Communications. Automatic Repeat Request Medium Access Control

Multiple Access Protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Multiple Access Links and Protocols

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Unit 7 Media Access Control (MAC)

EL2745 Principles of Wireless Sensor Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Wireless MACs: MACAW/802.11

Media Access Control. Networked Systems (H) Lecture 5

CSE 461: Wireless Networks

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

MAC LAYER. Murat Demirbas SUNY Buffalo

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Redes de Computadores. Medium Access Control

Media Access Control in Ad Hoc Networks

Wireless Sensor Networks 8th Lecture

CSE/EE 461 Section 2

Principles of Wireless Sensor Networks

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Lecture 17: Wireless Networking"

COS 140: Foundations of Computer Science

Wireless Communications

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

CMPE 257: Wireless and Mobile Networking

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Data Link Layer: Collisions

CSE/EE 461 Wireless and Contention-Free Protocols

The MAC layer in wireless networks

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CS 3640: Introduction to Networks and Their Applications

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Chapter 6 Medium Access Control Protocols and Local Area Networks

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

Wireless Sensor Networks 7th Lecture

Wireless Medium Access Control Protocols

CSMA based Medium Access Control for Wireless Sensor Network

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

CSMA/CD (Collision Detection)

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

The Link Layer and LANs. Chapter 6: Link layer and LANs

Reminder: Datalink Functions Computer Networking. Datalink Architectures

SENSOR-MAC CASE STUDY

Multiple Access. Data Communications and Networking

Link Layer: Retransmissions

CMPE 257: Wireless and Mobile Networking

Power Laws in ALOHA Systems

Embedded Internet and the Internet of Things WS 12/13

Advanced Networking Technologies

The Medium Access Control Sublayer

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

COMP/ELEC 429/556 Introduction to Computer Networks

Local Area Networks NETW 901

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

IEEE Medium Access Control. Medium Access Control

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

Wireless Sensor Networks

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 16: QoS and "

MSIT 413: Wireless Technologies Week 8

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

MAC. Fall Data Communications II 1

Transcription:

Medium Access Control

Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide. Assume a simple but common scenario: All nodes are so close that two simultaneous transmissions will always collide. Also, assume that they are all in the same channel.

General Solution Multiplex transmissions over time. Coordinated access: Each node is somehow scheduled to transmit in certain intervals of time. Schedule chosen to avoid collision of simultaneous transmissions. Problem: Who does the coordination? How? Need a coordinator. Need to know who has packet when and who collides with whom. Random access: Simple alternative. Nodes transmit at random times. Simply hope that they do no collide. We discuss random access first.

Aloha Protocol (Slotted and Unslotted) The most primitive random access protocol Originally invented in the 70s and a pre-cursor of many advanced designs later. Still used in modified form in ultra low power communications, e.g., RFID. Protocol: Transmit packets immediately (if not transmitting already). Appears random as packets are generated randomly. Slotted version assumes that packet transmissions are synchronized with time slots.

Aloha Protocol Example Aloha collision sender A sender B sender C Slotted Aloha collision t sender A sender B sender C Prof. Dr.-Ing. Jochen H. Schiller www.jochenschiller.de MC - 2008 t

Slotted Aloha One slot = one packet Each slot has one of three states Successful (S): Exactly one node transmits. Collision (C): More than one node transmits. Idle (I): No node transmits. Assume that each node transmits in a slot with probability. The #nodes is. Normalized throughput = throughput / capacity = #successful slots/ total #slots (think why?) = Prob. of a slot being successful.

Performance Max. possible normalized throughput is 36% (18%) for slotted (unslotted) Aloha when #nodes is very large. This is obviously too poor. However, the protocol is still very attractive in IoT devices when device is resource constrained and simple protocols are favored. Poor throughput is acceptable.

Carrier Sense Multiple Access (CSMA) How to improve throughput? Avoid collision. Listen before talk. A node may transmit only when the medium is sensed idle. Need to implement channel sensing. Also, called carrier sensing. In standards, sometimes also called clear channel assessment (CCA).

Carrier Sensing Typically performed via energy (or power) detection. Potential implementation: Listen to channel and measure the received power. If power exceeds given threshold, channel busy. This threshold is called carrier sense threshold It takes non-zero time to sense carrier. Called carrier sensing delay.

Slotted CSMA Protocol Packet size = L (in time units). Slot size =, where is worst case propagation delay and is worst case carrier sensing delay. L A packet C Signal sensed

P-persistence 1. If wish to transmit in a slot i, sense carrier first. 2. Channel busy -> go to next slot i+1. 3. Channel idle -> still go to next slot i+1. (Note channel sensing can take a whole slot.) Transmit with probability p in slot i+1. (Note that p =1 may result in a lot of collisions). 4. If no transmission, still sense carrier. Repeat.

Very good performance provided packets are large compared to slot Numerical Results 0.001 0.01 0.05 0.1 Various values of are chosen from 0.001 to 0.1 Of note, is packet size in slots [Utilization is same as normalized throughput] [From Nitin Vaidya s notes]

Backoff Backoff is a simple way to implement p-persistence in practical protocols. Backoff = number of valid transmission opportunities skipped before actual transmission. Randomly chosen, but bounded. Example: Backoff interval is chosen uniformly at random in range [Bmin, Bmax]. Initialize a counter by this value. Decrement counter after each slot at each valid transmission opportunity (i.e., slot detected idle). On a valid opportunity, if counter 0, transmit.

Responding to Packet Losses Packet losses can occur due to collisions. Multiple nodes can decide to start transmission in the same slot. To reduce collision, access probability (p) must be reduced. Can be achieved by increasing the window over which the backoff interval is chosen. Exponential backoff: [0,cw-1] -> [0,2*cw-1] on packet loss.

Network Assumptions Recall our assumption so far has been that nodes are close such that two simultaneous transmissions will always collide. This also means that any two nodes that may collide also carrier sense each other. We have seen that collisions are still possible. But randomization was used to reduce this possibility. Now, we consider the possibility that two nodes may not be able sense each other s carrier, but their transmissions could still collide. 15

Hidden Terminals A B C A and C cannot carrier sense each other. But their transmissions can collide at B. A and C are hidden terminals. A CSMA-based protocol will cause frequent collisions. 16

Observation A B C The real issue is that carrier sensing is done at transmitter. But collision happens at the receiver. Information asymmetry: Information available at transmitter and receiver are not the same. 17

Simple Solution A B C Make carrier sensing more sensitive. Thus, both A and C will actually sense each other. Works, but this worsens another problem. 18

Exposed Terminal Problem D C A B In principle, A->B and C->D transmissions can go in parallel without collisions. But A and C can hear each other. C will wait for A->B to end before starting C->D. A and C are exposed terminals. More sensitive carrier sensing increases exposed terminal problem.

More Involved Solutions to Hidden Terminal Problem A B C Virtual carrier sensing implement carrier sensing at the receiver via additional control messaging. Busy tone approach a receiver when busy receiving emits a tone. Transmitters carrier sense on this tone. 20

Summary So Far Random access protocols are attractive for IoT for simplicity of implementation and completely distributed operation. Standard: IEEE 802.15.4 personal area network standard is based on CSMA protocol ideas discussed. Zigbee is based on this.

Alternative: Scheduled Access Suppose time is slotted. Schedule transmissions in slots so that they do not collide. Cannot be scheduled in the same slot, if they collide sender A sender B sender C t

Recall Example A signal B interference C D If the SINR condition is not satisfied, we say that packets collide. If A->B and C->D transmissions collide, they must be scheduled in a different slot.

TDM Scheduling TDM = Time Division Multiplexing There must be a central scheduler e.g., an access point that must know Who can collide with whom Who has packets to send and allocate slots accordingly. Advantages: No collisions at all. Also, can conserve power easily just switch off when no slots scheduled. Disadvantage: Need a scheduler that must know interference and traffic information.

We covered Summary So Far Physical layer Medium access protocols targeting wireless short range networks In the next lecture, we will cover Routing layer Localization RF-powered backscatter networks