Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Similar documents
Wireless Networks (MAC)

Wireless Communication

Mohamed Khedr.

Unit 7 Media Access Control (MAC)

Local Area Networks NETW 901

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

MAC. Fall Data Communications II 1

Wireless Protocols. Training materials for wireless trainers

Lecture 16: QoS and "

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Data and Computer Communications. Chapter 13 Wireless LANs

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Lesson 2-3: The IEEE x MAC Layer

Wireless Local Area Networks (WLANs) Part I

IEEE MAC Sublayer (Based on IEEE )

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Chapter 6 Medium Access Control Protocols and Local Area Networks

Mobile & Wireless Networking. Lecture 7: Wireless LAN

MAC in /20/06

Introduction to IEEE

ECE442 Communications Lecture 3. Wireless Local Area Networks

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Data Communications. Data Link Layer Protocols Wireless LANs

IEEE Wireless LANs

Multiple Access Links and Protocols

IEEE Medium Access Control. Medium Access Control

Advanced Computer Networks WLAN

Logical Link Control (LLC) Medium Access Control (MAC)

Computer Communication III

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless Networking & Mobile Computing

Wireless LAN -Architecture

Mohammad Hossein Manshaei 1393

3.1. Introduction to WLAN IEEE

Wireless LANs. ITS 413 Internet Technologies and Applications

CSE 461: Wireless Networks

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Computer Networks. Wireless LANs

Performance anomaly of b

Transmission Control Protocol over Wireless LAN

Wireless Local Area Networks. Networks: Wireless LANs 1

Mobile Communications Chapter 7: Wireless LANs

Nomadic Communications WLAN MAC Fundamentals

CHAPTER 8: LAN Standards

CSE 6811 Ashikur Rahman

Rahman 1. Application

MSIT 413: Wireless Technologies Week 8

Wireless and Mobile Networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

Wireless Communication and Networking CMPT 371

Wireless Network Security Spring 2013

The MAC layer in wireless networks

CS698T Wireless Networks: Principles and Practice

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Network Security Spring 2012

Solutions to Exercise Session 4,

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU

Mohammad Hossein Manshaei 1393

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

IEEE Technical Tutorial. Introduction. IEEE Architecture

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Wireless Networked Systems

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

CMPE 257: Wireless and Mobile Networking

Analysis of IEEE e for QoS Support in Wireless LANs

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Internet Protocol Stack

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

IEEE WLAN (802.11) Copyright. Nomadic Communications

Hands-On Exercises: IEEE Standard

Mobile Communications Chapter 7: Wireless LANs

Wireless Communication

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

The MAC layer in wireless networks

Wireless Network Security Spring 2014

Modeling of Partially Overlapping Wireless Personal Area Networks

Wireless Communication and Networking CMPT 371

CMPE 257: Wireless and Mobile Networking

Wireless Communication Session 4 Wi-Fi IEEE standard

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Appendix A Pseudocode of the wlan_mac Process Model in OPNET

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Enhancing the DCF mechanism in noisy environment

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

Investigation of WLAN

Wireless# Guide to Wireless Communications. Objectives

Department of Electrical and Computer Systems Engineering

Wireless Network Security Spring 2015

Wireless Local Area Network (IEEE )

Master thesis 60 credits

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Telecommunication Protocols Laboratory Course. Lecture 2

Introduction. Giuseppe Bianchi, Ilenia Tinnirello

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Transcription:

802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf 2. IEEE 802.11 Tutorial By Mustafa Ergen online: http://wow.eecs.berkeley.edu/ergen/docs/ieee.pdf 3. 802.11 Wireless Networks: The Definitive Guide By Matthew S Gast

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization Modulation and rate adaptation (week 5: 03/17)

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization Modulation and rate adaptation (week 5: 03/17)

Infrastructure Mode AP BSS STA Access point (AP) announces beacons periodically Each station (STA) connects to an AP An AP and its stations form a basic service set (BSS)

Infrastructure Mode AP AP ESS STA Several APs (BSSs) could form an extended service set (ESS) A roaming user can move from one BSS to another within the ESS

Infrastructure Mode AP AP ESS STA Issues Inter-BSS interference: channel assignment Load balancing: user association

Ad Hoc Mode Clients form a peer-to-peer network without a centralized coordinator Clients communicate with each other via multihop routing

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization Modulation and rate adaptation (week 5: 03/17)

Two Operational Modes Distributed coordination function (DCF) Stations contend for transmission opportunities in a distributed way Point coordination function (PCF) AP sends poll frames to trigger transmissions

DCF Start contention after the channel keeps idle for DIFS AP responds ACK if the frame passes the CRC check Retransmit the frame until the retry limit is reached

Prioritized Interframe Spacing SIFS > PIFS > DIFS SIFS (Short interframe space): ACK, CTS PIFS (PCF interframe space): CF-Poll DIFS (DCF interframe space): data frame

Frame Format The following figu part of the frames a Data ACK Overhead of a 1500 byte packet (ignore contention, assume all bits sent at 1Mbps) = 1 T Data / (T DIFS + T PLCP + T MAC + T Data + T SIFS + T ACK ) = 1 (1500*8)/(50[DIFS] + 34*8 +1500*8 + 10[SIFS] + 14*8)

Fragmentation and Aggregation Large frame Reduced overhead, but less reliable Packet delivery ratio of an N-bit packet = (1-BER) N Fragmentation Break a frame into into small pieces so that interference only affects small fragments Aggregation Aggregate multiple small frames in order to reduce the overhead

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization Modulation and rate adaptation (week 5: 03/17)

ALOHA Original ALOHA Slotted ALOHA First distributed access control (about 1970) Transmit immediately whenever a node has data to send Do not sense the medium before transmission

CSMA/CA Carrier sense multiple access with collision avoidance STAs listen to the channel before transmission

Exponential Backoff 1. Each STA maintains a contention window Initialized to CW min = 32 2. Randomly pick a number, say k, between [0,CW-1] 3. Count down from k 4. Start transmission when k = 0 if the channel is still idle 5. Double CW for every unsuccessful transmission, up to CW max

Theoretical Performance of DCF G. Bianchi, "Performance analysis of the IEEE 802.11 distributed coordinabon funcbon," Selected Areas in CommunicaBons, IEEE Journal on 18, no. 3 (2000): 535-547 Markov Chain model for the backoff window size

We will cover Medium Access Control Infrastructure mode vs. Ad Hoc mode DCF vs. PCF CSMA/CA with exponential backoff Hidden terminal Physical Layer Basics Packet Detection OFDM Synchronization Modulation and rate adaptation (week 5: 03/17)

Hidden Terminal Two nodes hidden to each other transmit at the same time, leading to collision

802.11 s Solution: RTS/CTS Rx Tx2 Tx1 Tx1 sends RTS whenever it wins contention Rx broadcasts CTS Nodes that receive CTS defer their transmissions

802.11 s Solution: RTS/CTS Usually disabled in practice due to its expensive overhead

Recent Solutions to Hidden Terminals Embrace collisions and try to decode collisions ZigZag decoding S. Gollakota and D. Katabi, ZigZag decoding: combating hidden terminals in wireless networks, ACM SIGCOMM, 2008 Rateless code A. Gudipati and S. Katti, Strider: automatic rate adaptation and collision handling, ACM SIGCOMM, 2011

Other Issues Performance anomaly M. Heusse, et al., "Performance anomaly of 802.11b," IEEE INFOCOM, 2003 Expensive overhead due to increasing data rates K. Tan, et al., "Fine-grained channel access in wireless LAN," ACM SIGCOMM, 2011 S. Sen, et al., No time to countdown: migrating backoff to the frequency domain, ACM MobiCom, 2011 Flexible channelization S. Rayanchu, et al., FLUID: improving throughputs in enterprise wireless LANs through flexible channelization, ACM MOBICOM, 2012

Performance Anomaly r ij =54 Mb/s r uv =6 Mb/s b 54 =36.2 Mb/s when l 54 sends alone c 54 =4.14 Mb/s as contending with l 6 b 6 =5.4 Mb/s when l 6 sends alone c 6 =4.37 Mb/s as contending with l 54 t p/b 54 p/b 6 Channel is almost occupied by low-rate links è Everyone gets a similar throughput, regardless of its bit-rate