Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Similar documents
CMPE 257: Wireless and Mobile Networking

Mohamed Khedr.

CSE 461: Wireless Networks

IEEE Medium Access Control. Medium Access Control

Data and Computer Communications. Chapter 13 Wireless LANs

Multiple Access Links and Protocols

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Communications

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

The MAC layer in wireless networks

Chapter 12 Multiple Access 12.1

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CMPE 257: Wireless and Mobile Networking

Wireless Local Area Networks (WLANs) Part I

The MAC layer in wireless networks

Lecture 16: QoS and "

Unit 7 Media Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC)

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Wireless MACs: MACAW/802.11

Rahman 1. Application

ICE 1332/0715 Mobile Computing (Summer, 2008)

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

CSE 6811 Ashikur Rahman

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Mohammad Hossein Manshaei 1393

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Medium Access Control Sublayer Chapter 4

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Wireless LAN -Architecture

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Wireless Communication and Networking CMPT 371

Wireless Local Area Network (IEEE )

Media Access Control in Ad Hoc Networks

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Chapter 6 Medium Access Control Protocols and Local Area Networks

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Local Area Networks NETW 901

Aloha and slotted aloha

CMPE 257: Wireless and Mobile Networking

Wireless LAN. Access Point. Provides network connectivity over wireless media

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

MULTIPLE ACCESS PROTOCOLS 2. 1

MAC protocols. Lecturer: Dmitri A. Moltchanov

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Link Layer II: MACA and MACAW

Mobile and Sensor Systems

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Wireless LANs. ITS 413 Internet Technologies and Applications

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

MAC LAYER. Murat Demirbas SUNY Buffalo

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao

EEC-484/584 Computer Networks

Multiple Access Protocols

Wireless Communication and Networking CMPT 371

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless Networked Systems

Computer Communication III

MAC protocols for ad hoc networks

Wireless & Mobile Networking

Data Link Layer Technologies

MAC. Fall Data Communications II 1

ECE 4450:427/527 - Computer Networks Spring 2017

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

MSIT 413: Wireless Technologies Week 8

Medium Access Control Sublayer Chapter 4

Chapter 1 Basic concepts of wireless data networks (cont d)

Strengthening Unlicensed Band Wireless Backhaul

SENSOR-MAC CASE STUDY

Introduction to IEEE

CMPE 257: Wireless and Mobile Networking

Multiple Access Links and Protocols

Enabling Technologies

ECE442 Communications Lecture 3. Wireless Local Area Networks

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Outline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards

Wireless and Mobile Networks

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Hands-On Exercises: IEEE Standard

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Internet Protocol Stack

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

An Efficient Scheduling Scheme for High Speed IEEE WLANs

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Mobile & Wireless Networking. Lecture 7: Wireless LAN

INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU

Transcription:

Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1

Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the wireless medium to send or receive messages Concurrent message transmissions may interfere with each other => collisions => message drops A MAC protocol is needed to allow the efficient sharing of the wireless medium by multiple nodes 2

Design goals To ensure reliable communication across wireless links (not end-to-end reliability, only 1-hop reliability) To maximize the use of available bandwidth (keep control overhead as low as possible) To ensure fair bandwidth allocation to contending nodes To minimize delay of sending/receiving messages To minimize energy-consumption of sending/receiving messages 3

Challenges Error-prone channel Limited bandwidth Limited communication range Limited energy (for remote battery-powered nodes) Node mobility Lack of central coordination Lack of tight time synchronisation 4

Protocol classification Contention-based MAC protocols Contention arises when two or more nodes attempt to transmit at the same time over a shared channel." A contention-based protocol assumes that packet collisions may occur, and tries to detect, avoid or deal with them. Contention-free MAC protocols A contention-free protocol tries to divide the wireless channel into logical channels that do not interfere with each other (e.g. TDMA, FDMA, CDMA). Nodes transmit packets using different logical channels, and as a result, there is no contention in the network. Contention-free schemes are more applicable to fixed networks or networks with centralized control. In this course, we focus on contention-based MAC protocols 5

Some contention-based protocols ALOHA, slotted-aloha CSMA MACA MACAW IEEE 802.11 (DCF) 6

ALOHA, slotted-aloha Pure ALOHA Nodes access the channel when they have data to transmit. If a transmission is unsuccessful (e.g. no ACK is sent from the destination node), the source node retransmits after a random amount of time. Slotted-ALOHA Time is divided into equal size slots A node transmission always starts at the beginning of a slot If a transmission is unsuccessful, the source node retransmits at a future slot with a certain probability. 7

ALOHA slotted-aloha Node 1 Node 2 Node 3 Node 4 Node 5 Node 6 Node 7 time time successful packet unsuccessful packet 8

CSMA - physical sensing CSMA (Carrier Sense Multiple Access) The sender first senses the wireless channel If the channel is idle, the sender starts transmitting If the channel is in use the sender refrains itself from transmission until the channel is idle. CSMA/CA (CSMA with Collision Avoidance) If the channel is busy before transmission then the transmission is deferred for a "random" interval. " This reduces the probability of collisions on the channel." 9

CSMA/CA implementation Before transmitting a frame, a node senses the channel If the channel is idle for longer than DIFS (Distributed Interframe Space), the node continues with its transmission. Otherwise, if the medium is busy, the transmission is deferred until the end of the ongoing transmission. Then a backoff procedure is started. Node 1 FRAME Node 1 finds the channel idle and transmits Node 2 Node 2 finds the channel busy and defers transmission Node 3 DIFS Node 3 finds the channel busy and defers transmission 10

CSMA/CA implementation - backoff A random interval - backoff time - is selected and used to initialize the backoff timer. The backoff timer is decreased as long as the channel is idle, paused when a transmission is detected, and reactivated when the channel is sensed as idle again for more than DIFS When the backoff timer reaches 0, the node retries to send its frame. Node 1 FRAME Node 2 backoff started backoff paused backoff resumed backoff ended FRAME Node 3 backoff started backoff ended FRAME 11 DIFS DIFS DIFS

CSMA/CA implementation - backoff Binary Exponential Backoff (BEB) The backoff time is an integer number of slots uniformly chosen in the interval (0,CW-1), where CW is the Contention Window. At the first transmission attempt, CW=CW min and it is doubled at each retransmission up to CW max After a successful transmission, CW is reset to CW min 12

CSMA/CA with ACK Acknowledgement scheme: The destination node waits for SIFS (Short Interframe Space) after receiving a frame. Typically, SIFS is shorter than DIFS. The destination node sends an ACK to the source node. Source FRAME Destination DIFS SIFS ACK If the source node does not get an ACK, it considers the transmission to be unsuccessful, waits for EIFS (Extended Interframe Space) and activates the backoff algorithm. 13

The exposed node problem CSMA may cause nodes to unnecessarily refrain from accessing the medium. A B C D B transmits to A. C hears the transmission from B to A. C unnecessarily refrains from sending a message to D even though no collision would occur. 14

The hidden node problem CSMA does not avoid the hidden node problem. B C B C A A transmits to B. B receives the message. C does not hear the transmission. A A tries to transmit to B. C also tries to transmit to B. Both messages are dropped at B. 15

MACA virtual sensing MACA (Multiple Access with Collision Avoidance) [Karn 1990] Nodes reserve the channel using control messages (virtual sensing): The sender first expresses its wish to transmit by sending a Request-To-Send (RTS) message The receiver allows this transmission by sending a Clear-To- Send (CTS) message The sender then sends the Data message 16

RTS-CTS handshake CTS RTS B C CTS B C Data B C A A A A sends RTS to B. B sends a CTS to A (C overhears it). A sends Data to B. Both RTS and CTS carry information about the duration of the Data transmission. 17

RTS-CTS handshake If control (RTS-CTS) messages collide with each other or with data packets, a backoff procedure is activated (backoff is binary exponential). RTS-CTS helps to avoid some cases of the hidden and exposed node problems, because: All neighbors of the sender hear the RTS. All neighbors of the receiver hear the CTS. However, it does not always avoid these problems! 18

MACAW MACAW [Bharghavan et al. 1994] extends MACA RTS-CTS-DS-Data-ACK RTS CTS DS Data ACK 19

MACAW MACAW extends MACA with acknowledgements an improved backoff mechanism => fair allocation of the medium to contending nodes DS (Data Sending) message: Say that a neighbor of the sender overhears an RTS but not a CTS (from the receiver) In this case it can t tell if RTS-CTS was successful or not When it overhears the DS, it realizes that the RTS- CTS was successful, and it defers its own transmission 20

IEEE 802.11 Standard MAC and physical protocol for wireless LANs The MAC layer offers two types of services: Distributed Coordination Function (DCF) Point Coordination Function (PCF) contention-free services PCF DCF contention services Physical Layer DCF combines physical sensing (CSMA/CA) and virtual sensing (RTS-CTS-Data-ACK) 21

IEEE 802.11 DCF - virtual sensing RTS and CTS include the busy channel duration Nodes that overhear RTS/CTS set timer NAV (Network Allocation Vector) to the busy channel duration A node starts backoff after NAV becomes zero Source node RTS Frame Destin. node CTS ACK Another node DIFS SIFS SIFS NAV RTS NAV CTS Backoff Time 22

802.11 standards 802.11 (1997): First WLAN standard by IEEE 2.4GHz (unregulated) 2 Mbps too slow for most applications 802.11b (1999) 2.4 GHz, interference from microwave ovens, cordless phones, etc. 11 Mbps 802.11g (2002-2003) 2.4 GHz, backwards compatible with 802.11b 54 Mbps 802.11n (2009) MIMO: multiple wireless antennas in tandem to transmit and receive +100 Mbps 802.11ac (2014) 5 GHz band, up to 7Gbps Multi user MIMO 23

Contention-free multiple access TDMA (Time Division Multiple Access) Time is divided into timeslots Nodes transmit one after the other using their own timeslot TDMA requires good time synchronization FDMA (Frequency Division Multiple Access) The available bandwidth is divided into multiple frequency channels / bands. A transmitter-receiver pair uses a dedicated frequency channel for communication CDMA (Code Division Multiple Access) Every transmitter uses the entire spectrum (not a specific frequency)" The transmissions are differentiated through a unique code assigned to each node (that is independent of the data being transmitted)" 24

IEEE 802.11 PCF IEEE 802.11 PCF (Point Coordination Function) One node, called Access Point (AP), coordinates the transmissions of its neighbors The AP polls neighbors one after the other, and allows them to transmit in a round robin manner PCF is not suitable for large multi-hop networks 25

Bluetooth Piconet: One node, called the master can communicate with up to 7 nodes called the slaves Bluetooth uses 79 channels (each 1 MHz wide) and changes channels up to 1600 times per second Each channel is divided into time slots of 625 µsecs The master switches from slave to slave in a round-robin fashion Time-Division Duplex (TDD): master (downlink) and slave (uplink) transmissions occur in alternative slots Slaves can talk back to the master immediately after they are polled by the master 26

Summary Contention-based protocols Aloha, slotted-aloha: no physical sensing CSMA: physical sensing CSMA/CA: physical sensing and backoff MACA and MACAW: virtual sensing using control packets (RTS/CTS) IEEE 802.11 DCF: physical and virtual sensing Contention-free protocols IEEE 802.11 PCF Bluetooth 27

Related reading Standard textbook: Section 2.3 Section 2.5 Sections 6.1-6.5.1 Internet sources: http://www.utdallas.edu/~mxw013200/mac_adhoc.html http://sss-mag.com/pdf/802_11tut.pdf http://attila.sdsu.edu/~kumar/mac_survey.pdf 28