IEEE Medium Access Control. Medium Access Control

Similar documents
04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CSE 461: Wireless Networks

Mohamed Khedr.

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Unit 7 Media Access Control (MAC)

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

MAC in /20/06

Lecture 16: QoS and "

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Computer Communication III

CMPE 257: Wireless and Mobile Networking

Chapter 12 Multiple Access 12.1

SENSOR-MAC CASE STUDY

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Embedded Internet and the Internet of Things WS 12/13

Local Area Networks NETW 901

MAC. Fall Data Communications II 1

Media Access Control in Ad Hoc Networks

Data and Computer Communications. Chapter 13 Wireless LANs

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

ICE 1332/0715 Mobile Computing (Summer, 2008)

Introduction to IEEE

The MAC layer in wireless networks

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Data Communications. Data Link Layer Protocols Wireless LANs

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Logical Link Control (LLC) Medium Access Control (MAC)

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks (WLANs) Part I

Multiple Access Links and Protocols

The MAC layer in wireless networks

Rahman 1. Application

Wireless Local Area Network (IEEE )

CSE 6811 Ashikur Rahman

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

MAC protocols. Lecturer: Dmitri A. Moltchanov

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Mohammad Hossein Manshaei 1393

Chapter 6 Medium Access Control Protocols and Local Area Networks

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

CMPE 257: Wireless and Mobile Networking

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Lesson 2-3: The IEEE x MAC Layer

Optional Point Coordination Function (PCF)

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Computer Networks. Wireless LANs

Internet Protocol Stack

Performance anomaly of b

Wireless Networking & Mobile Computing

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

CMPE 257: Wireless and Mobile Networking

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

WLAN Performance Aspects

Wireless Protocols. Training materials for wireless trainers

Wireless & Mobile Networking

Wireless Networks (MAC)

Nomadic Communications WLAN MAC Fundamentals

MSIT 413: Wireless Technologies Week 8

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

Wireless Networked Systems

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Mobile Communications Chapter 7: Wireless LANs

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Wireless MACs: MACAW/802.11

Department of Electrical and Computer Systems Engineering

Mobile & Wireless Networking. Lecture 7: Wireless LAN

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

Lecture (08) Wireless Traffic Flow and AP Discovery

AGOOD medium access control (MAC) protocol for wireless

Wireless Communications

Midterm Review EECS 122. University of California Berkeley

Link Layer II: MACA and MACAW

ECE442 Communications Lecture 3. Wireless Local Area Networks

MAC protocols for ad hoc networks

ECEN 5032 Data Networks Medium Access Control Sublayer

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Fairness in the IEEE network. Shun Y. Cheung

Remarks On Per-flow Differentiation In IEEE

Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control

MAC LAYER. Murat Demirbas SUNY Buffalo

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Tarek Sheltami. CCSE COE 3/8/2008 1

ICE 1332/0715 Mobile Computing (Summer, 2008)

Advanced Computer Networks WLAN

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

A SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University

Transcription:

IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1

MAC Requirements To avoid interference among simultaneous transmissions But enable as many non-interfering transmission as possible Maintain fairness among transmissions No centralized coordinators: fully distributed operations No clock synchronization: asynchronous operations 3 CSMA/CA No collision detection since on wireless network, so use collision avoidance (backoff and RTS/CTS) Includes delays that act as a priority scheme DIFS: DCF inter-frame space SIFS: short inter-frame space (SIFS < DIFS) 4 2

5 CSMA/CA Algorithm If station has frame to send, it listens to medium 1. if medium idle for DIFS, station may transmit 2. else waits until current transmission completes then a. if medium idle for DIFS start (or resume) random backoff time timer counts down while channel is idle (see Note) transmit when timer expires b. else go back to 2 Note: if channel becomes busy during the count down period, go back to 2. IEEE 802.11 Medium Access Control Logic 6 3

Basic CSMA/CA operations Fig. 6.69 (Leon-Garcia) 7 Carrier Sense in 802.11 Physical carrier sense Virtual carrier sense using Network Allocation Vector (NAV) Header of data frame specifies duration of data transmission Neighboring nodes stay silent during this period, then wake up to continue sensing the medium. 8 4

Transmission without RTS/CTS Fig. 6.71 (Leon-Garcia) 9 Backoff Interval When channel is busy, choose a backoff interval in the range [0, cw]. Count down the backoff interval when medium is idle for DIFS. Count down is suspended if medium becomes busy again. When backoff interval reaches 0, transmit data. Binary exponential backoff When a node fails to receive ACK, cw is doubled up (up to an upper bound). When a data transfer completes successfully, cw is reset to cw min. 10 5

Carrier Sensing Transmission range Sensing range Sensing range > Transmission range Problems Hidden terminal problem Exposed terminal problem Note: contention matters only at the receiver s terminal 11 Hidden Terminal Problem B A X No carrier OK to transmit 12 6

Exposed Terminal Problem B Y X A Presence of carrier holds off transmission 13 Solutions to Hidden Terminal Problem MACA [Karn 1990] Proposes to solve the hidden terminal problem by RTS/CTS dialog MACAW [Bharghanvan 1994] Increasing reliability by RTS/CTS/DATA/ACK dialog IEEE 802.11 CSMA/CA Also use RTS/CTS/DATA/ACK dialog 14 7

RTS/CTS dialog (1) Defer RTS Any node hearing this RTS will defer medium access 15 RTS/CTS dialog (2) Defer Defer RTS CTS Any node hearing this CTS will defer medium access 16 8

RTS/CTS/DATA/ACK dialog Defer Defer Data ACK 17 Transmission with RTS/CTS Fig. 6.72 (Leon-Garcia) 18 9

IEEE 802.11 CSMA/CA Example DIFS: DCF inter-frame space SISF: short inter-frame space 19 IEEE 802.11 MAC (1) CSMA/CA Contention-based random access Collision detection not possible while transmitting Uses RTS/CTS exchange to avoid hidden terminal problem Any node overhearing a CTS cannot transmit for the duration of the transfer. Any node overhearing an RTS cannot transmit for the duration of the transfer (to avoid collision with ACK) Uses ACK to achieve reliability 20 10

IEEE 802.11 MAC (2) Carrier sense in 802.11 Physical carrier sense Virtual carrier sense using Network Allocation Vector (NAV) RTS/CTS specify duration of subsequent DATA/ACK NAV is updated based on overheard RTS/CTS /DATA Collision avoidance Nodes stay silent when carrier sensed busy (physical/virtual) Backoff intervals are used to reduce collision probability 21 Backoff Interval When channel is busy, choose a backoff interval in the range [0, cw]. Count down the backoff interval when medium is idle for DIFS. Count down is suspended if medium becomes busy again. When backoff interval reaches 0, transmit RTS. Binary exponential backoff in 802.11 DCF: When a node fails to receive CTS, cw is doubled up (up to an upper bound). When a data transfer completes successfully, cw is reset to cw min. 22 11

CW min and CW max 23 For IEEE 802.11b, CW min = 31 Disadvantages of IEEE 802.11 DCF High power consumption Hidden terminal problem not totally solved (e.g., collision of RTS) Exposed terminal problem not solved Fairness problem among different transmitting nodes Only providing best-effort service 24 12

Priority IFS Values SIFS (short IFS) for all immediate response actions (see later) DIFS (DCF IFS) used as minimum delay for asynchronous frames contending for access 25 SIFS Use SIFS gives highest priority over stations waiting PIFS or DIFS time SIFS used in following circumstances: Acknowledgment (ACK) station responds with ACK after waiting SIFS gap for efficient collision recovery (there is no collision detection) and multi-frame transmission Clear to Send (CTS) station ensures data frame gets through by issuing RTS and waits for CTS response from destination 26 13

IEEE 802.11 MAC Timing Basic Access Method 27 IFS and Slot Time Values 28 14

Reference Chapter 17, William Stallings 29 15