CSE 6811 Ashikur Rahman

Similar documents
Logical Link Control (LLC) Medium Access Control (MAC)

Rahman 1. Application

Mohamed Khedr.

Unit 7 Media Access Control (MAC)

CSE 461: Wireless Networks

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Multiple Access Links and Protocols

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

ICE 1332/0715 Mobile Computing (Summer, 2008)

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Lecture 16: QoS and "

IEEE Medium Access Control. Medium Access Control

CMPE 257: Wireless and Mobile Networking

Computer Communication III

CMPE 257: Wireless and Mobile Networking

MAC in /20/06

Local Area Networks NETW 901

The MAC layer in wireless networks

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

MAC. Fall Data Communications II 1

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Chapter 12 Multiple Access 12.1

Data Communications. Data Link Layer Protocols Wireless LANs

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

The MAC layer in wireless networks

Wireless Local Area Networks (WLANs) Part I

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Embedded Internet and the Internet of Things WS 12/13

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Media Access Control in Ad Hoc Networks

Wireless Networks (MAC)

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

ECE442 Communications Lecture 3. Wireless Local Area Networks

Wireless LANs. ITS 413 Internet Technologies and Applications

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Computer Networks. Wireless LANs

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Data Link Layer: Collisions

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Data and Computer Communications. Chapter 13 Wireless LANs

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CSE 461: Multiple Access Networks. This Lecture

Multiple Access. Data Communications and Networking

Aloha and slotted aloha

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

Wireless Networked Systems

Nomadic Communications WLAN MAC Fundamentals

IEEE Technical Tutorial. Introduction. IEEE Architecture

Internet Protocol Stack

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Wireless Communications

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Introduction to IEEE

Wireless Network Security Spring 2013

Lesson 2-3: The IEEE x MAC Layer

Wireless & Mobile Networking

Performance anomaly of b

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Wireless MACs: MACAW/802.11

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Wireless Local Area Networks. Networks: Wireless LANs 1

Telecommunication Protocols Laboratory Course. Lecture 2

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Data and Computer Communications. Chapter 11 Local Area Network

ICE 1332/0715 Mobile Computing (Summer, 2008)

MAC protocols. Lecturer: Dmitri A. Moltchanov

CSMA/CD (Collision Detection)

EE 122: Ethernet and

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Wireless Networking & Mobile Computing

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Fairness in the IEEE network. Shun Y. Cheung

Wireless Network Security Spring 2014

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Mohammad Hossein Manshaei 1393

Wireless Local Area Part 2

MULTIPLE ACCESS PROTOCOLS 2. 1

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Multiple Access Protocols

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

EECS 122. University of California Berkeley

EECS 122. University of California Berkeley. Network Architecture Network hierarchy Layering Performance. Link Layer Ethernet Wi-Fi

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Transcription:

Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation. Presentation Session MAC controls access to the physical channel according to a predetermined set of rules Transport Network Logical Link Control (LLC) Datalink Medium Access Control (MAC) Physical Wireless Medium: A Chaotic Environment The Design Challenges are... Medium access to shared medium Noisy and unreliable wireless channel... Collision detection is not possible always... Mobility changes neighbor set Two approaches Reservation-based Two approaches Reservation-based - TDMA (slotted access to channel) Contention-based - requires tight coordination - requires time synchronization - grows with n - FDMA (Frequency is divided) 1

Two approaches Reservation-based - TDMA (slotted access to channel) Contention based MAC: IEEE 802.11 - requires tight coordination - requires time synchronization Infrastructure based - grows with n - FDMA (Frequency is divided) Without infrastructure Contention-based - Works nicely for single shared wireless channel. - More suitable for ad hoc wireless network IEEE 802.11 with Access Point Hybrid Network But we will discuss on ad hoc wireless networks Inter Frame Spacing (IFS) No Access Point SIFS, Slot time, DIFS (from shortest to longest) Coordination is more difficult SIFS (Short Inter frame space) Provides highest priority access to the channel Defined for short control messages IEEE 802.11--Two modes of operation: DCF (Distributed Coordination Function) Appropriate for ad hoc wireless networks No controller PCF (Point Coordination Function) Appropriate for networks with AP AP controls medium access For example between data and ACK DIFS (Distributed inter-frame space) Used by stations that are operating under the DCF mode. Some math: SIFS < Slot time < DIFS DIFS = SIFS + 2*Slot time 2

Parameters at a glance (IEEE 802.11b Standard) Rules to consider for MAC protocols When should I access the channel DIFS duration 50 micro seconds What should I do if collision occurs Slot time 20 micro seconds SIFS duration 10 micro seconds How would I know whether my transmission was successful How can I ensure that I am sharing the channel fairly with my neighbors Rule 1: When to access the channel? ALOHA - Transmit whenever you want (LIFE IS GOOD.. ;-) - Frequent chances of collisions - Low channel utilization (18%) We will now see how these rules are set for IEEE 802.11 A B C D Rule 1: When to access the channel? Rule 1: When to access the channel? Slotted ALOHA - Transmit only at the beginning of a slot - Chances of collisions halved - Channel utilization doubled (36%) CSMA (Carrier Sense Multiple Access) - Listen before you talk CS part Carrier Sensing - Physical carrier sensing If received signal strength on antenna is larger than some threshold then medium is busy (RSSI-received signal strength indicator) A B C D - Virtual Carrier sensing Discussed later on 3

CSMA/?? CD or CA CA?? Physical Carrier Sensing illustrated Collision Detection is not always possible Full duplex radio device (capable of transmitting and receiving at once) is very costly Successful transmission does not mean a successful reception (see next slide) DIFS- Distributed (DCF) Inter-Frame space duration 50 micro seconds Physical Carrier Sensing is not good enough Solution: Virtual Carrier sensing The hidden-station problem Collision occurs Virtual Carrier Sensing Virtual Carrier Sensing 4

Formally VCS and frame formats Duration field DATA Sender ACK Receiver Blue/red Node Yellow Node NAV (BSY) Virtual CS NAV (BSY) When fourfour-way handshake is used? Not for broadcast packets Doesn t make any sense Back off to a random point in time and try again For short unicast packets (not used) - part introduces overhead Rule 2: What if collision occurs? For long unicast packets Makes sense Long data packets are protected by - dialogue In summary There is a parameter called Threshold_ If packet size is less than THreshold_ use two-way handshake (DATA_ACK) Otherwise use four way handshake Binary Exponential Back off (BEB) When BEB is used BEB explained When medium is found busy either by Physical or Virtual CS (to avoid collisions) When collision occurs (to resolve contention) Back off Try later IEEE 802.11 uses binary exponential back off (BEB) Think about visually impaired human being After every successful transmission (to deal with fairness) Choose a random number between [0, CW] Suppose the random number is n Count n idle slots before transmission Choose a random number and start counting down CW is called contention window Pause if medium becomes busy during count down 5

Back--off illustrated (previous Back example ) Back--off illustrated Back Back off for 14 slots Slot time 20 micro seconds DIFS- Distributed (DCF) Inter-Frame space duration 50 micro seconds Rule 3: Detecting successful transmission Why BackBack-off is called exponential After every unsuccessful attempts double CW min = 31 CW max= 1023 CW Not a CSMA/CD like Ethernet, it is a CSMA/CA For unicast packets Provision for Acknowledgement Absent of ACK means unsuccessful transmission BEB 1200 1000 800 CW Collision detection is absent 600 BEB 400 200 0 0 2 4 6 8 Take few attempts (don t try for ever) Short retry limit (typically 7) used for short packets Long retry limit (typically 5) used for long packets Probability of failure in consecutive attempts is pretty low For broadcast packets No way to know.. Attempts ACK illustrated DIFS Rule 4: Fairness issue DATA Sender SIFS ACK Receiver Back off after every successful transmission SIFS Note that DATA is followed by ACK after SIFS duration What will happen if station 1 has more packet to transmit at this moment 6

Rule 4: Fairness issue (unhandled fairness issue) Parameters at a glance Tunable parameters Short retry limit Long retry limit Physical CS threshold threshold Back off after every unsuccessful attempt What will happen if this frame experiences collision Putting Pieces Together Work out how duration fields are calculated? State diagram 7