MAC. Fall Data Communications II 1

Similar documents
MAC in /20/06

Lesson 2-3: The IEEE x MAC Layer

Unit 7 Media Access Control (MAC)

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Mohamed Khedr.

Data Communications. Data Link Layer Protocols Wireless LANs

Computer Communication III

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile Communications Chapter 7: Wireless LANs

Lecture 16: QoS and "

Computer Networks. Wireless LANs

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

CSE 461: Wireless Networks

Multiple Access Links and Protocols

IEEE Medium Access Control. Medium Access Control

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Local Area Networks NETW 901

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Wireless Protocols. Training materials for wireless trainers

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks (WLANs) Part I

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless Communication Session 4 Wi-Fi IEEE standard

Chapter 6 Medium Access Control Protocols and Local Area Networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

Lecture (08) Wireless Traffic Flow and AP Discovery

IEEE Technical Tutorial. Introduction. IEEE Architecture

Advanced Computer Networks WLAN

IEEE MAC Sublayer (Based on IEEE )

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

CMPE 257: Wireless and Mobile Networking

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

ECE442 Communications Lecture 3. Wireless Local Area Networks

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Networking & Mobile Computing

Wireless Networks (MAC)

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Networked Systems

Wireless LANs. ITS 413 Internet Technologies and Applications

Mobile Communications Chapter 7: Wireless LANs

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Mohammad Hossein Manshaei 1393

CMPE 257: Wireless and Mobile Networking

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Performance anomaly of b

Logical Link Control (LLC) Medium Access Control (MAC)

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE WLAN (802.11) Copyright. Nomadic Communications

Embedded Internet and the Internet of Things WS 12/13

Appendix A Pseudocode of the wlan_mac Process Model in OPNET

Guide to Wireless Communications, Third Edition. Objectives

IEEE Wireless LANs

Introduction to IEEE

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Wireless Communication and Networking CMPT 371

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Midterm Review EECS 122. University of California Berkeley

3.1. Introduction to WLAN IEEE

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Solutions to Exercise Session 4,

Wireless LAN -Architecture

Nomadic Communications WLAN MAC Fundamentals

Rahman 1. Application

CSE 6811 Ashikur Rahman

Optional Point Coordination Function (PCF)

Wireless Communications

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

Chapter 7: Wireless LANs

Mohammad Hossein Manshaei 1393

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

CHAPTER 8: LAN Standards

Chapter 7: Wireless LANs

Wireless# Guide to Wireless Communications. Objectives

Chapter 6 Wireless and Mobile Networks

Internet Protocol Stack

WLAN Performance Aspects

Wireless Communication and Networking CMPT 371

Chapter 12 Multiple Access 12.1

MSIT 413: Wireless Technologies Week 8

Wireless Network Security Spring 2013

Fairness in the IEEE network. Shun Y. Cheung

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

On exploiting spatial reuse in wireless ad hoc networks

Multiple Access in Cellular and Systems

Department of Electrical and Computer Systems Engineering

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Transcription:

802.11 MAC Fall 2005 91.564 Data Communications II 1

RF Quality (ACK) Fall 2005 91.564 Data Communications II 2

Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3

MAC Coordination Functions DCF PCF HCF Fall 2005 91.564 Data Communications II 4

DCF The DCF is the basis of the standard CSMA/CA access mechanism. Like Ethernet, it first checks to see that the radio link is clear before transmitting. To avoid collisions, stations use a random backoff after each frame, with the first transmitter seizing the channel. In some circumstances, the DCF may use the CTS/RTS clearing technique to further reduce the possibility of collisions. Fall 2005 91.564 Data Communications II 5

PCF The point coordination function provides contention-free services. Special stations called point coordinators are used to ensure that the medium is provided without contention. Point coordinators reside in access points, so the PCF is restricted to infrastructure networks. To gain priority over standard contention-based services, the PCF allows stations to transmit frames after a shorter interval. The PCF is not widely implemented. Fall 2005 91.564 Data Communications II 6

HCF Some applications need to have service quality that is a step above best-effort delivery, but the rigorous timing of the PCF is not required. The HCF allows stations to maintain multiple service queues and balance access to the wireless medium in favor of applications that require better service quality. The HCF is not fully standardized yet, but is being produced as part of the eventual 802.11e specification. Fall 2005 91.564 Data Communications II 7

MAC Coordination Functions Fall 2005 91.564 Data Communications II 8

Interframe Spacing DCF IFS (DIFS) Lowest priority and longest duration Short IFS (SIFS) ACK, CTS PCF IFS (PIFS) Fall 2005 91.564 Data Communications II 9

SIFS The SIFS is used for the highestpriority transmissions, such as RTS/CTS frames and positive acknowledgments. High-priority transmissions can begin once the SIFS has elapsed. Once these high-priority transmissions begin, the medium becomes busy, so frames transmitted after the SIFS has elapsed have priority over frames that can be transmitted only after longer intervals. Fall 2005 91.564 Data Communications II 10

PIFS The PIFS, sometimes erroneously called the priority interframe space, is used by the PCF during contention-free operation. Stations with data to transmit in the contention-free period can transmit after the PIFS has elapsed and preempt any contention-based traffic. Fall 2005 91.564 Data Communications II 11

DIFS The DIFS is the minimum medium idle time for contention-based services. Stations may have immediate access to the medium if it has been free for a period longer than the DIFS. Fall 2005 91.564 Data Communications II 12

Interframe Spacing Relationships Fall 2005 91.564 Data Communications II 13

Carrier Sensing Real sensing PLCP Clear Channel Assessment (CCA) Checking RSS Decoding data Not enough to avoid collision Virtual sensing NAV (Network Allocated Vector) Fall 2005 91.564 Data Communications II 14

Network Allocation Vector Virtual carrier-sensing is provided by the Network Allocation Vector (NAV). Most 802.11 frames carry a duration field, which can be used to reserve the medium for a fixed time period. The NAV is a timer that indicates the amount of time the medium will be reserved, in microseconds. Stations set the NAV to the time for which they expect to use the medium, including any frames necessary to complete the current operation. Other stations count down from the NAV to 0. When the NAV is nonzero, the virtual carriersensing function indicates that the medium is busy; when the NAV reaches 0, the virtual carrier-sensing function indicates that the medium is idle. Fall 2005 91.564 Data Communications II 15

Using NAV for Virtual Carrier Sensing Fall 2005 91.564 Data Communications II 16

DCF Rules (1) If the medium has been idle for longer than the DIFS, transmission can begin immediately. Carrier sensing is performed using both a physical medium-dependent method and the virtual (NAV) method. If the previous frame was received without errors, the medium must be free for at least the DIFS. If the previous transmission contained errors, the medium must be free for the amount of the EIFS. Fall 2005 91.564 Data Communications II 17

DCF Rules (2) If the medium is busy, the station must wait for the channel to become idle. 802.11 refers to the wait as access deferral. If access is deferred, the station waits for the medium to be idle for the DIFS and prepares for the exponential backoff procedure. Fall 2005 91.564 Data Communications II 18

DCF Rules (3) Error recovery is the responsibility of the station sending a frame. Senders expect acknowledgments for each transmitted frame and are responsible for retrying the transmission until it is successful. Positive acknowledgments are the only indication of success. Atomic exchanges must complete in their entirety to be successful. If an acknowledgment is expected and does not arrive, the sender considers the transmission lost and must retry. All unicast data must be acknowledged. Broadcast data is not acknowledged. (As a result, unicast data has an inherently higher service quality than broadcast data, even though the radio link is inherently a broadcast medium.) Any failure increments a retry counter, and the transmission is retried. A failure can be due to a failure to gain access to the medium or a lack of an acknowledgment. However, there is a longer congestion window when transmissions are retried (see next section). Fall 2005 91.564 Data Communications II 19

DCF Rules (4) Multiframe sequences may update the NAV with each step in the transmission procedure. When a station receives a medium reservation that is longer than the current NAV, it updates the NAV. Setting the NAV is done on a frame-byframe basis Fall 2005 91.564 Data Communications II 20

DCF Rules (5) The following types of frames can be transmitted after the SIFS and thus receive maximum priority: acknowledgments, the CTS in an RTS/CTS exchange sequence, and fragments in fragment sequences. Once a station has transmitted the first frame in a sequence, it has gained control of the channel. Any additional frames and their acknowledgments can be sent using the short interframe space, which locks out any other stations. Additional frames in the sequence update the NAV for the expected additional time the medium will be used. Fall 2005 91.564 Data Communications II 21

DCF Rules (6) Extended frame sequences are required for higher-level packets that are larger than configured thresholds. Packets larger than the RTS threshold must have RTS/CTS exchange. Packets larger than the fragmentation threshold must be fragmented. Fall 2005 91.564 Data Communications II 22

Error Recovery Each frame or fragment has a single retry counter associated with it. Stations have two retry counters: the short retry count and the long retry count. Frames that are shorter than the RTS threshold are considered to be short; frames longer than the threshold are long. Depending on the length of the frame, it is associated with either a short or long retry counter. Frame retry counts begin at 0 and are incremented when a frame transmission fails. Fall 2005 91.564 Data Communications II 23

Backoff with DCF After frame transmission has completed and the DIFS has elapsed, stations may attempt to transmit congestion-based data. A period called the contention window or backoff window follows the DIFS. This window is divided into slots. Slot length is mediumdependent; higher-speed physical layers use shorter slot times. Stations pick a random slot and wait for that slot before attempting to access the medium; all slots are equally likely selections. When several stations are attempting to transmit, the station that picks the first slot (the station with the lowest random number) wins. Fall 2005 91.564 Data Communications II 24

DSSS Contention Window Size Fall 2005 91.564 Data Communications II 25

Fragmentation Fall 2005 91.564 Data Communications II 26

Generic 802.11 MAC Frame Fall 2005 91.564 Data Communications II 27

Frame Control Field Fall 2005 91.564 Data Communications II 28

Duration/ID Field Fall 2005 91.564 Data Communications II 29

Sequence Control Field Fall 2005 91.564 Data Communications II 30

IP Encapsulation in 802.11 Fall 2005 91.564 Data Communications II 31

Broadcast and Multicast Fall 2005 91.564 Data Communications II 32

Basic Positive Acknowledgement Fall 2005 91.564 Data Communications II 33

Fragmentation Fall 2005 91.564 Data Communications II 34

RTS/CTS Fall 2005 91.564 Data Communications II 35

RTS/CTS with Fragmentation Fall 2005 91.564 Data Communications II 36

Immediate PS-Poll Response Fall 2005 91.564 Data Communications II 37

Immediate PS-Poll Response with Frag. Fall 2005 91.564 Data Communications II 38

Deferred PS-Poll Response Fall 2005 91.564 Data Communications II 39

Rate Selection Every 802.11 interface on the market supports some sort of rate fallback mechanism, which steps down the data rate in response to adverse network conditions. The most common algorithms used to determine when to change the data rate depend on some loose measurement of signal quality. Fall 2005 91.564 Data Communications II 40

Beacons BSS-ID, timestamp, traffic indication map, power management, roaming RSS measurement Fall 2005 91.564 Data Communications II 41