Logical Link Control (LLC) Medium Access Control (MAC)

Similar documents
CSE 6811 Ashikur Rahman

Rahman 1. Application

Mohamed Khedr.

Unit 7 Media Access Control (MAC)

CSE 461: Wireless Networks

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Multiple Access Links and Protocols

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

ICE 1332/0715 Mobile Computing (Summer, 2008)

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE Medium Access Control. Medium Access Control

Lecture 16: QoS and "

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CMPE 257: Wireless and Mobile Networking

Computer Communication III

CMPE 257: Wireless and Mobile Networking

MAC in /20/06

Local Area Networks NETW 901

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

MAC. Fall Data Communications II 1

Chapter 12 Multiple Access 12.1

Data Communications. Data Link Layer Protocols Wireless LANs

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Wireless Local Area Networks (WLANs) Part I

The MAC layer in wireless networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Wireless LANs. ITS 413 Internet Technologies and Applications

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Embedded Internet and the Internet of Things WS 12/13

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

The MAC layer in wireless networks

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Wireless Networks (MAC)

Media Access Control in Ad Hoc Networks

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Nomadic Communications WLAN MAC Fundamentals

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Computer Networks. Wireless LANs

Aloha and slotted aloha

Data and Computer Communications. Chapter 13 Wireless LANs

CSE 461: Multiple Access Networks. This Lecture

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Wireless Networked Systems

IEEE Technical Tutorial. Introduction. IEEE Architecture

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

Wireless Communications

Lesson 2-3: The IEEE x MAC Layer

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Wireless Network Security Spring 2013

Internet Protocol Stack

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Introduction to IEEE

ECE442 Communications Lecture 3. Wireless Local Area Networks

Data Link Layer: Collisions

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Wireless & Mobile Networking

Wireless MACs: MACAW/802.11

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Wireless Local Area Networks. Networks: Wireless LANs 1

Multiple Access. Data Communications and Networking

MAC protocols. Lecturer: Dmitri A. Moltchanov

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Performance anomaly of b

Telecommunication Protocols Laboratory Course. Lecture 2

EE 122: Ethernet and

ICE 1332/0715 Mobile Computing (Summer, 2008)

IEEE WLAN (802.11) Copyright. Nomadic Communications

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

Wireless Network Security Spring 2014

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Wireless Networking & Mobile Computing

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Wireless Network and Mobility

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Mohammad Hossein Manshaei 1393

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Multiple Access in Cellular and Systems

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

MULTIPLE ACCESS PROTOCOLS 2. 1

Wireless Network Security Spring 2012

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

On exploiting spatial reuse in wireless ad hoc networks

Wireless Network Security Spring 2015

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

CHAPTER 8: LAN Standards

Figure.2. Hidden & Exposed node problem

Transcription:

Overview of IEEE 802.11

Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation. MAC controls access to the physical channel according to a predetermined set of rules Network Datalink Physical Logical Link Control (LLC) Medium Access Control (MAC)

Wireless Medium: A Chaotic Environment

The Design Challenges are... Medium access to shared medium Noisy and unreliable wireless channel... Collision detection is not possible always... Mobility changes neighbor set

Reservation-based Two approaches Contention-based

Reservation-based Two approaches - TDMA (slotted access to channel) - requires tight coordination - requires time synchronization - grows with n - FDMA (Frequency is divided)

Reservation-based Two approaches - TDMA (slotted access to channel) - requires tight coordination - requires time synchronization - grows with n - FDMA (Frequency is divided) Contention-based - Works nicely for single shared wireless channel. - More suitable for ad hoc wireless network

Contention based MAC: IEEE 802.11 Infrastructure based Without infrastructure

IEEE 802.11 with Access Point

Hybrid Network

But we will discuss on ad hoc wireless networks No Access Point Coordination is more difficult IEEE 802.11--Two modes of operation: DCF (Distributed Coordination Function) Appropriate for ad hoc wireless networks No controller PCF (Point Coordination Function) Appropriate for networks with AP AP controls medium access

Inter Frame Spacing (IFS) SIFS, Slot time, DIFS (from shortest to longest) SIFS (Short Inter frame space) Provides highest priority access to the channel Defined for short control messages For example between data and ACK DIFS (Distributed inter-frame space) Used by stations that are operating under the DCF mode. Some math: SIFS < Slot time < DIFS DIFS = SIFS + 2*Slot time

Parameters at a glance (IEEE 802.11b Standard) DIFS duration 50 micro seconds Slot time 20 micro seconds SIFS duration 10 micro seconds

Rules to consider for MAC protocols When should I access the channel What should I do if collision occurs How would I know whether my transmission was successful How can I ensure that I am sharing the channel fairly with my neighbors

We will now see how these rules are set for IEEE 802.11

Rule 1: When to access the channel? ALOHA - Transmit whenever you want (LIFE IS GOOD.. ;-) - Frequent chances of collisions - Low channel utilization (18%) A B C D

Rule 1: When to access the channel? Slotted ALOHA - Transmit only at the beginning of a slot - Chances of collisions halved - Channel utilization doubled (36%) A B C D

Rule 1: When to access the channel? CSMA (Carrier Sense Multiple Access) - Listen before you talk CS part Carrier Sensing - Physical carrier sensing If received signal strength on antenna is larger than some threshold then medium is busy (RSSI-received signal strength indicator) - Virtual Carrier sensing Discussed later on

Physical Carrier Sensing illustrated DIFS- Distributed (DCF) Inter-Frame space duration 50 micro seconds

CSMA/?? CD or CA? Collision Detection is not always possible Full duplex radio device (capable of transmitting and receiving at once) is very costly Successful transmission does not mean a successful reception (see next slide)

Physical Carrier Sensing is not good enough A B C The hidden-station problem Collision occurs

Solution: Virtual Carrier sensing

Virtual Carrier Sensing

Virtual Carrier Sensing RTS CTS

Formally VCS Duration field RTS DATA Sender CTS ACK Receiver Blue/red Node NAV (BSY) Virtual CS Yellow Node NAV (BSY)

RTS and CTS frame formats RTS CTS

When four-way handshake is used? Not for broadcast packets Doesn t make any sense For short unicast packets (not used) RTS-CTS part introduces overhead For long unicast packets Makes sense Long data packets are protected by RTS-CTS dialogue In summary There is a parameter called RTSThreshold_ If packet size is less than RTSTHreshold_ use two-way handshake (DATA_ACK) Otherwise use four way handshake

Rule 2: What if collision occurs? Back off to a random point in time and try again

Binary Exponential Back off (BEB) When BEB is used When medium is found busy either by Physical or Virtual CS (to avoid collisions) When collision occurs (to resolve contention) After every successful transmission (to deal with fairness)

BEB explained Back off Try later IEEE 802.11 uses binary exponential back off (BEB) Think about visually impaired human being Choose a random number and start counting down Choose a random number between [0, CW] CW is called contention window Suppose the random number is n Count n idle slots before transmission Pause if medium becomes busy during count down

Back-off illustrated Back off for 14 slots Slot time 20 micro seconds

Back-off illustrated (previous example ) DIFS- Distributed (DCF) Inter-Frame space duration 50 micro seconds

Why Back-off is called exponential After every unsuccessful attempts double CW CW min = 31 CW max = 1023 BEB CW 1200 1000 800 600 400 200 0 0 2 4 6 8 Attempts BEB

Rule 3: Detecting successful transmission Collision detection is absent Not a CSMA/CD like Ethernet, it is a CSMA/CA For unicast packets Provision for Acknowledgement Absent of ACK means unsuccessful transmission Take few attempts (don t try for ever) Short retry limit (typically 7) used for short packets Long retry limit (typically 5) used for long packets Probability of failure in consecutive attempts is pretty low For broadcast packets No way to know..

ACK illustrated DIFS RTS DATA Sender CTS SIFS ACK Receiver SIFS Note that DATA is followed by ACK after SIFS duration

Rule 4: Fairness issue Back off after every successful transmission What will happen if station 1 has more packet to transmit at this moment

Rule 4: Fairness issue (unhandled fairness issue) Back off after every unsuccessful attempt What will happen if this frame experiences collision

Parameters at a glance Tunable parameters Short retry limit Long retry limit Physical CS threshold RTS threshold

Putting Pieces Together Work out how duration fields are calculated?

State diagram