CSE 461: Wireless Networks

Similar documents
IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

IEEE Medium Access Control. Medium Access Control

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Mohamed Khedr.

Lecture 16: QoS and "

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CMPE 257: Wireless and Mobile Networking

Unit 7 Media Access Control (MAC)

Introduction to IEEE

MAC in /20/06

ICE 1332/0715 Mobile Computing (Summer, 2008)

Data and Computer Communications. Chapter 13 Wireless LANs

Computer Communication III

Wireless Local Area Network (IEEE )

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Logical Link Control (LLC) Medium Access Control (MAC)

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Wireless Local Area Networks (WLANs) Part I

The MAC layer in wireless networks

Chapter 12 Multiple Access 12.1

Multiple Access Links and Protocols

Wireless LANs. ITS 413 Internet Technologies and Applications

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

CSE 6811 Ashikur Rahman

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Rahman 1. Application

Nomadic Communications WLAN MAC Fundamentals

Data Communications. Data Link Layer Protocols Wireless LANs

MAC. Fall Data Communications II 1

Wireless Local Area Networks. Networks: Wireless LANs 1

Media Access Control in Ad Hoc Networks

Local Area Networks NETW 901

The MAC layer in wireless networks

CMPE 257: Wireless and Mobile Networking

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Lesson 2-3: The IEEE x MAC Layer

Wireless MACs: MACAW/802.11

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Internet Protocol Stack

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Performance anomaly of b

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Wireless Protocols. Training materials for wireless trainers

CMPE 257: Wireless and Mobile Networking

Lecture (08) Wireless Traffic Flow and AP Discovery

MSIT 413: Wireless Technologies Week 8

Chapter 6 Medium Access Control Protocols and Local Area Networks

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Mohammad Hossein Manshaei 1393

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Wireless Communications

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

SENSOR-MAC CASE STUDY

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Embedded Internet and the Internet of Things WS 12/13

IEEE WLAN (802.11) Copyright. Nomadic Communications

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

ECEN 5032 Data Networks Medium Access Control Sublayer

CSE 461: Multiple Access Networks. This Lecture

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Wireless Networking & Mobile Computing

ECE442 Communications Lecture 3. Wireless Local Area Networks

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

IEEE Technical Tutorial. Introduction. IEEE Architecture

Wireless LAN -Architecture

MAC protocols. Lecturer: Dmitri A. Moltchanov

Wireless & Mobile Networking

Optional Point Coordination Function (PCF)

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

IEEE MAC Sublayer (Based on IEEE )

Computer Networks. Wireless LANs

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Link Layer: Retransmissions

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Communication and Networking CMPT 371

Topic 4. Wireless LAN IEEE

Wireless Network Security Spring 2013

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

MAC protocols for ad hoc networks

3.1. Introduction to WLAN IEEE

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Wireless Network Security Spring 2012

Wireless Communication and Networking CMPT 371

Link Layer II: MACA and MACAW

Link Layer. (continued)

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

ICE 1332/0715 Mobile Computing (Summer, 2008)

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

6th Slide Set Computer Networks

Transcription:

CSE 461: Wireless Networks

Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

802.11 Protocol Stages Discovery Ben s laptop: Is network UniversityOfWashingtonCSE out there? This is the SSID, or network name Sent in a probe request ACTIVE SCANNING Network: Yep, I m UniversityOfWashingtonCSE! Probe reply Alternatively, network could announce PASSIVE SCANNING Authentication Ben s laptop: Hey, this is Ben. Let me use your network Network: OK. Your credentials check.

802.11 Protocol Stages (cont.) Association Ben s laptop: Alright, I m binding to you. Here are my capabilities. Network: OK, I ve got you in my table. Here are my capabilities. Data communication Ben s laptop: Give me an IP address Ben s laptop: Stream the Daily Show

802.11 Frame Format Type is in here (e.g., probe request) Why are there FOUR addresses? Destination address (final recipient) Source address Receiver address Transmitter address

Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD?

Ethernet MAC Algorithm Node A Node B Listen for carrier sense before transmitting Collision: What you hear is not what you sent!

CSMA/CD in WLANs? Most (if not all) radios are half-duplex Listening while transmitting is not possible Collision might not occur at sender Collision at receiver might not be detected by sender! A B

Wireless Ethernet - CSMA/CA CS Carrier Sense Nodes can distinguish between an idle and a busy link MA - Multiple Access A set of nodes send and receive frames over a shared link CA Collision Avoidance Nodes use protocol to prevent collisions from occurring

IEEE 802.11 MAC Layer Standard Similar to Ethernet But consider the following: A B C

Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism If C transmits, collision will occur at node B DATA DATA A B C

MACA Solution for Hidden Terminal Problem When node A wants to send a packet to node B Node A first sends a Request-to-Send (RTS) to A On receiving RTS Node A responds by sending Clear-to-Send (CTS) provided node A is able to receive the packet When a node C overhears a CTS, it keeps quiet for the duration of the transfer RTS CTS CTS A B C

IEEE 802.11 MAC Layer Standard But we still have a problem? A B C D

Exposed Terminal Problem B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideally transmitted) RTS RTS CTS A B C D

MACA Solution for Exposed Terminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmit RTS RTS RTS CTS A B C D

IEEE 802.11 MAC Layer Standard MACAW Multiple Access with Collision Avoidance for Wireless Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS Stay quiet See RTS, but no CTS OK to transmit Receiver sends ACK for frame Neighbors stay silent until they hear ACK

Collisions Still possible RTS packets can collide! Binary exponential backoff Backoff counter doubles after every collision and reset to minimum value after successful transmission Performed by stations that experience RTS collisions RTS collisions not as bad as data collisions in CSMA Since RTS packets are typically much smaller than DATA packets

Reliability Wireless links are prone to errors High packet loss rate detrimental to transport-layer performance Mechanisms needed to reduce packet loss rate experienced by upper layers

A Simple Solution to Improve Reliability - MACAW When node B receives a data packet from node A, node B sends an Acknowledgement (ACK) If node A fails to receive an ACK Retransmit the packet RTS CTS DATA CTS A ACK B ACK C

Revisiting the Exposed Terminal Problem Problem Exposed terminal solution doesn't consider CTS at node C With RTS-CTS, C doesn t wait since it doesn t hear A s CTS With B transmitting DATA, C can t hear intended receiver s CTS C trying RTS while B is transmitting is useless RTS RTS RTS CTS CTS A B C D

Revisiting the Exposed Terminal Problem - MACAW One solution Have C use carrier sense before RTS Alternative B sends DS (data sending) packet before DATA Short packet lets C know that B received A s CTS Includes length of B s DATA so C knows how long to wait

Deafness For the scenario below Node A sends an RTS to B While node C is receiving from D, Node B cannot reply with a CTS B knows that D is sending to C A keeps retransmitting RTS and increasing its own BO timeout RTS RTS CTS CTS A B C D

Request for RTS - MACAW Have B do contention on behalf of A If B receives RTS for which it must defer CTS reply Then B later sends RRTS to A when it can send A responds by starting normal RTS-CTS Others hearing RRTS defer long enough for RTS-CTS RTS RTS RRTS CTS CTS DATA A B ACK C ACK D

IEEE 802.11 Wireless MAC Distributed and centralized MAC components Distributed Coordination Function (DCF) Point Coordination Function (PCF) DCF suitable for multi-hop ad hoc networking DCF is a Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) protocol

IEEE 802.11 DCF Uses RTS-CTS exchange to avoid hidden terminal problem Any node overhearing a CTS cannot transmit for the duration of the transfer Uses ACK to achieve reliability Any node receiving the RTS cannot transmit for the duration of the transfer To prevent collision with ACK when it arrives at the sender When B is sending data to C, node A keeps quite A B C

IEEE 802.11 CSMA/CA Nodes stay silent when carrier sensed Physical carrier sense Virtual carrier sense Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK packets, each of which specified duration of a pending transmission Backoff intervals used to reduce collision probability

IEEE 802.11 Physical Carrier Sense Interference range Carrier sense range Packet A B C D E F Transmit range

IEEE 802.11 Virtual Carrier Sense RTS = Request-to-Send RTS A B C D E F Pretending a circular range

IEEE 802.11 Virtual Carrier Sense NAV = remaining duration to keep quiet RTS = Request-to-Send RTS A B C D E NAV = 10 F

IEEE 802.11 Virtual Carrier Sense CTS = Clear-to-Send CTS A B C D E F

IEEE 802.11 Virtual Carrier Sense CTS = Clear-to-Send CTS A B C D E F NAV = 8

IEEE 802.11 Virtual Carrier Sense DATA packet follows CTS DATA A B C D E F

IEEE 802.11 Virtual Carrier Sense Successful data reception acknowledged using ACK ACK A B C D E F

IEEE 802.11 Reserved area ACK A B C D E F

Interframe Spacing Interframe spacing Plays a large role in coordinating access to the transmission medium Varying interframe spacings Creates different priority levels for different types of traffic! 802.11 uses 4 different interframe spacings DIFS medium busy DIFS PIFS SIFS contention next frame direct access if medium is free DIFS t

IEEE 802.11 - CSMA/CA Sensing the medium If free for an Inter-Frame Space (IFS) Station can start sending (IFS depends on service type) If busy Station waits for a free IFS, then waits a random back-off time (collision avoidance, multiple of slot-time) If another station transmits during back-off time The back-off timer stops (fairness) DIFS medium busy DIFS direct access if medium is free DIFS contention window (randomized back-off mechanism) next frame slot time t

Types of IFS SIFS Short interframe space Used for highest priority transmissions RTS/CTS frames and ACKs DIFS DCF interframe space Minimum idle time for contention-based services (> SIFS) PIFS EIFS

Competing Stations

Backoff Interval When transmitting a packet, choose a backoff interval in the range [0,CW] CW is contention window Count down the backoff interval when medium is idle Count-down is suspended if medium becomes busy When backoff interval reaches 0, transmit RTS

DCF Example B1 = 25 wait B1 = 5 data B2 = 20 data B2 = 15 wait B2 = 10 CW = 31 B1 and B2 are backoff intervals at nodes 1 and 2

Backoff Interval The time spent counting down backoff intervals is a part of MAC overhead Large CW Large backoff intervals Can result in larger overhead Small CW Larger number of collisions (when two nodes count down to 0 simultaneously)

Backoff Interval The number of nodes attempting to transmit simultaneously may change with time Some mechanism to manage contention is needed IEEE 802.11 DCF Contention window CW is chosen dynamically depending on collision occurrence

Binary Exponential Backoff in DCF When a node fails to receive CTS in response to its RTS, it increases the contention window cw is doubled (up to an upper bound) When a node successfully completes a data transfer, it restores cw to CW min cw follows a sawtooth curve

Punchline: RTS/CTS rarely used Why? Doesn t always work Inefficient 20byte RTS + IFS + 14btye CTS + IFS = lots of overhead On most networks, more efficient to do CS and cross fingers