The MAC layer in wireless networks

Similar documents
The MAC layer in wireless networks

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Chapter 12 Multiple Access 12.1

CSE 461: Wireless Networks

Multiple Access Links and Protocols

Mohamed Khedr.

Unit 7 Media Access Control (MAC)

CMPE 257: Wireless and Mobile Networking

IEEE Medium Access Control. Medium Access Control

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Media Access Control in Ad Hoc Networks

Local Area Networks NETW 901

ICE 1332/0715 Mobile Computing (Summer, 2008)

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

ECEN 5032 Data Networks Medium Access Control Sublayer

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Wireless Local Area Networks. Networks: Wireless LANs 1

CMPE 257: Wireless and Mobile Networking

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Tarek Sheltami. CCSE COE 3/8/2008 1

Wireless Communications

Lecture 16: QoS and "

/99/$10.00 (c) 1999 IEEE

Aloha and slotted aloha

Rahman 1. Application

Wireless MACs: MACAW/802.11

Logical Link Control (LLC) Medium Access Control (MAC)

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

CMPE 257: Wireless and Mobile Networking

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

CSE 6811 Ashikur Rahman

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Wireless & Mobile Networking

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Wireless Networking & Mobile Computing

MAC protocols. Lecturer: Dmitri A. Moltchanov

Data Communications. Data Link Layer Protocols Wireless LANs

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Computer Communication III

/$10.00 (c) 1998 IEEE

Data Link Layer: Collisions

CSE 461: Multiple Access Networks. This Lecture

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

MAC in /20/06

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless Local Area Networks (WLANs) Part I

Wireless Networked Systems

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Data and Computer Communications. Chapter 13 Wireless LANs

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Wireless LAN MAC protocols

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Medium Access Control Sublayer

MAC. Fall Data Communications II 1

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

MAC protocols for ad hoc networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Wireless Local Area Network (IEEE )

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Computer Networks. Wireless LANs

A Survey on Modified RTS/CTS Mechanism

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Advanced Computer Networks WLAN

MAC LAYER. Murat Demirbas SUNY Buffalo

Lesson 2-3: The IEEE x MAC Layer

Wireless Networks (MAC)

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

ECE 4450:427/527 - Computer Networks Spring 2017

Wireless LAN -Architecture

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Internet Protocol Stack

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Midterm Review EECS 122. University of California Berkeley

Embedded Internet and the Internet of Things WS 12/13

Telecommunication Protocols Laboratory Course. Lecture 2

Mohammad Hossein Manshaei 1393

CS698T Wireless Networks: Principles and Practice

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Link Layer II: MACA and MACAW

Remarks On Per-flow Differentiation In IEEE

Performance anomaly of b

COMMUNICATION NETWORKS NETW 501

Transcription:

The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when? (and where)? Avoid collisions (no Collision Detection) Scarce resources utilization Channel capacity and battery power performance and QoS System level and (or vs?) user level Frame organization, and intra-, inter-layer information management Cross layering principles for adaptive behavior? Risk for spaghetti design [Kumar2003] [Kumar2003] V. Kawadia, P.R. Kumar, "A Cautionary Perspective on Cross Layer Design", Submitted for publication, 2003 (http://black1.csl.uiuc.edu/~prkumar/) 1

Collision of wireless signals Collision has destructive effect on the receiver...causes both channel and power waste Collision detection is not practical in wireless systems Collision avoidance/resolution + contention control on the sender Capture effect is possible Exploited to enhance channel reuse, if possible Collision domain: set of nodes sharing the same channel Space splitting, transitive relation 2

Wireless MAC protocols classification Multiple access protocols Distributed Contention based Contention free deterministic probabilistic Distributed dynamic centralized static deterministic access ID mapping Contention control Contention resolution random access Implicit Reservation Token based Reservation based Fixed TDMA, FDMA, CDMA No Centralized Coordinator, static allocation of resources No Centralized Coordinator, Dynamic allocation of resources Hybrid Cluster-based definitions MAC? No Centralized Coordinator, Dynamic allocation of resources Centralized Coordinator, Static allocation of resources 3

Evolutionary perspective of distributed MAC Distributed, contention-based wireless MAC Problem: the frame vulnerability (collision risk) Needs resolution in distributed way (no centralized coordinator) let s analyze the time domain first Aloha [Abramson1970]: no coordination Slotted Aloha CSMA [Kleinrock1975]: listen before to transmit Slotted CSMA CSMA/CD: listen before and while transmitting (unpractical in wireless scenarios) CSMA/CA + contention resolution (reactive resolution of collisions) CSMA/CA + contention control (preventive/reactive reduction of risk of collisions) [Abramson1970] N. Abramson, ``The ALOHA system - another alternative for computer communications'', Proc. Fall Joint Comput. Conf. AFIPS, 1970 [Kleinrock1975] L. Kleinrock, F.A. Tobagi ``Packet Switching in Radio Channels: Part I - Carrier Sense Multiple-Access modes and their throughput-delay characteristics'', IEEE Transactions on Communications, Vol Com-23, No. 12, pp.1400-1416, 1975 4

The ALOHA protocol yes Packet ready? transmit no An integral part of the ALOHA protocol is feedback from the receiver Feedback occurs after a packet is sent No coordination among sources wait for a round-trip time delay packet transmission k times yes positive ack? no compute random backoff integer k 5

The ALOHA protocol STA i Frame size frame1 ok1 time STA j early1 late2 ok2 time Collision domain collision early1 Frame1 late2 ok2 ok1 time New1+frame1 coll. Frame1+New2 coll. Frame vulnerability time: twice the frame size 6

Slotted ALOHA Packet ready? no yes Wait for start of next slot transmit wait for a round-trip time quantized in slots delay packet transmission k times yes positive ack? no compute random backoff integer k 7

Slotted ALOHA STA i Framesize STA j frame1 time slot Propagation delay frame1 time frame2 frame2 time Collision domain NEW frame1 collision frame1 frame2 time Frame1+frame2 collision Frame vulnerability time: the frame size (slot + propagation) 8

CSMA Protocol Packet ready Channel Busy? no transmit yes wait for a round-trip time delay packet transmission k times yes positive ack? no compute random backoff integer k 9

CSMA Protocol STA i Frame size STA j frame1 Propagation delay frame1 time early2 Collision domain late2 collision Frame1 detected... late2 time NEW late2 early2 frame1 late2 time Frame1+late2 vulnerability Frame1+early2 vulnerability Frame vulnerability time: twice the propagation delay 10

Slotted CSMA Protocol STA i Frame size STA j frame1 Propagation delay frame1 time frame2 Collision domain collision Frame1 detected... frame2 time NEW frame2 frame1 frame2 time Frame1+frame2 vulnerability Frame vulnerability time: the propagation delay 11

Throughput comparison 1 Analytical Results 0.9 Slotted CSMA Pure CSMA 0.8 0.7 0.6 S (Throug ghput) 0.5 0.4 Slotted Aloha 0.3 0.2 Pure Aloha 0.1 0 10-3 10-2 10-1 10 0 10 1 10 2 10 3 10 4 10 5 Offered Load: G 12

CSMA/CA: the IEEE 802.11 Wireless LAN 1 Medium Access Control (MAC) protocol: 2 coordination functions co-exist in a superframe structure (time division) Distributed Coordination Function (DCF) Ad-Hoc networks (peer to peer) Distributed control (no base station) contention based access (no QoS, no minimum delay) CSMA/CA access protocol with Binary Exponential Backoff Point Coordination Function (PCF) Centralized control (Base station) Polling based access (soft QoS, minimum delay) minimum bandwidth guarantee Will be analyzed later... 13

Evolutionary perspective of distributed MAC Distributed, contention-based wireless MAC Problem: the frame vulnerability (collision risk) Needs resolution in distributed way (no centralized coordinator) let s analyze the Space domain MACA [Karn1990]: RTS/, no carrier sense (MACA-BI, RIMA...) MACAW [Bharghavan et al.1994]: RTS/, no carrier sense and immediate ACK (more reliable and efficient Link Layer Control) FAMA [Fullmer et al.1995]: RTS/, carrier sense + other stuff Main solution: RTS/ mechanism Today under some criticisms [Karn1990] P. Karn, ""MACA - A new Channel Access Method for Packet Radio", proc. 9-th Computer Networking Conference, September 1990 [Bharghavan et al. 1994] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, "MACAW: A Media Access Protocol for Wireless LAN's," proc. ACM SIGCOMM'94, pp.212-225, London, 1994 [Fullmer et al. 1995] C.L. Fullmer, J.J. Garcia-Luna-Aceves, "Floor Acquisition Multiple Access (FAMA) for Packet Radio Networks", Proc. ACM Sigcomm'95 Cambridge, MA, 1995 14

Hidden and Exposed terminals: RTS/ The space domain: Hidden and exposed terminals: space vulnerability RTS/ mechanism to contrast Hidden terminals Hidden terminals: B does not sense traffic, but the receiver C cannot receive its packet due to a transmission from A to C (A hidden to B) to seize the channel, according to CSMA/CA, a station transmits a short RTS (request to send) packet and waits for the (Clear to Send) response. A transmit RTS to C and seizes the coverage area C respond with to A (B receive the and does not transmit even if it cannot sense A s transmission) A Collision on C A to C C B D B to D Adopt RTS/ Time A RTS C RTS Data B Space 15

RTS/ drawbacks RTS/ is not a guaranteed solution and it is additional overhead Power asymmetry, detection and interference range >> transmission range A RTS C B 16

Ad hoc Multi-hop: Time/Space problems A bi-directional chain of MAC frames TCP streams (Data + Ack) Self-contention (MAC layer problem) Inter-stream self-contention (Data vs. Ack TCP streams) Intra-stream self-contention (same TCP stream) How to obtain coordination? New proposed solutions Fast forward Quick exchange Flow numbering (pre-routing at the MAC layer???) Frame transmission by forward invitation 17

MACA: slotted RTS/, no CS MACA: eliminates the carrier sensing...because the contention is on the receiver! Introduces slotted RTS/ (30 bytes each) and slot time equals the RTS (and ) duration Allow exploitation of concurrent spatial transmission if the receiver is not exposed to two hidden transmitter terminals Variations: MACA-BI, RIMA (receiver initiated) A Collision on B and C? C to A C B D B to D Adopt RTS/ Time A RTS C RTS Data B Space 18

MACAW: no cs + slotted RTS/ + ACK MACAW: fairness of the backoff procedure MILD + Binary Exponential Backoff Cooperation-based backoff values (space-issues of contention) no carrier sensing before both slotted RTS/ Introduces ACK (RTS DATA ACK) Efficient retransmission policy at Data Link layer Problem: both sender and receiver act as receiver during frame transmissions (no concurrent space exploitation of the channel) A Collision on C A to C C B D B to D Adopt RTS/ Time A RTS C RTS Data B Space 19

FAMA: cs + slotted RTS/ + ACK FAMA: re-introduces carrier sensing before both slotted RTS/ Introduces lower bound for size of RTS/ and -dominance Floor acquisition: principle for time and space contention A Collision on C A to C C B D B to D Adopt RTS/ Time A RTS C RTS Data B Space 20

Ad hoc Multi-hop: Time/Space problems Source to destination stream: TCP DATA Destination to Source stream: TCP ACK RTS RTS Ti ime TCP DATA ACK TCP ACK ACK ew Contention RTS DATA ACK ew Contention RTS 21

Ad hoc Multi-hop: Time/Space problems Fast Forward intra-stream Quick Exchange inter-stream RTS Sender s Neighbors Sender Receiver Receiver s Neighbors Ti ime DATA ACK + RTS ACK + RTS DATA NAV (RTS) RTS DATA1 NAV () ACK + RTS ACK + RTS DATA NAV (DATA1) ACK1 DATA2 ACK2 NAV (ACK1) ACK 22

Modified NAV policy Difs Sifs Difs Sifs RTS DATA RTS DATA Source Source Sifs Sifs Sifs Sifs ACK ACK Destination Destination Others NAV (RTS) NAV () Others NAV (RTS) NAV () NAV (DATA) NAV (DATA) [ Time ] Defer Access Defer Access 23

CSMA/CA: the IEEE 802.11 Wireless LAN 1 Medium Access Control (MAC) protocol: 2 coordination functions co-exist in a superframe structure (time division) Distributed Coordination Function (DCF) Ad-Hoc networks (peer to peer) Distributed control (no base station) contention based access (no QoS, no minimum delay) CSMA/CA access protocol with Binary Exponential Backoff Point Coordination Function (PCF) Centralized control (Base station) Polling based access (soft QoS, minimum delay) minimum bandwidth guarantee 24

IEEE 802.11 MAC protocol architecture contention free services Contention based services MAC sublayer Point Coordination Function (PCF) Distributed Coordination Function (DCF) Fundamental Access Method Physical Layer (PHY) 25

Point coordinated mode (PCF) point coordinated mode is a contention free, optional service can co-exist with the DCF in a superframe structure. central coordinator, i.e. the access point manages stations belonging to its access list. guaranteed to access the channel in a contention-free environment. 26

DCF and PCF control: IFS Each station performs a carrier sensing activity when accessing the channel priority is determined by Interframe spaces (IFS): Short IFS (SIFS) < Point IFS (PIFS) < Distributed IFS (DIFS) after a SIFS only the polled station can transmit (or ack) after a PIFS only the Base Station can transmit (and PCF takes control) after a DIFS every station can transmit according to basic access CSMA/CA (DCF restarts) SIFS PIFS DIFS Backoff period (contention) Poll DCF Trans. 1 PCF ack Base station PCF (polling based) time (scenario 2) takes control Poll trans. 1 ack Poll trans. 2 ack DCF stations wait for a DIFS... DIFS: restart DCF DCF Trans. 2 ack DCF DCF time (scenario 1: no PCF takes control) 27

Point Coordination Function (PCF) during the PCF time the base station has priority in accessing the channel Base Station waits for a PIFS after a transmission and takes control (DCF stations must wait for DIFS>PIFS) base station polls stations that reserved the channel at the end of the PCF period the Base Station releases the channel and DCF restarts (after a DIFS) SIFS PIFS DIFS Backoff period (contention) Poll PCF Base station takes control Poll trans. 1 PCF (polling based) time (scenario 2) ack Poll trans. 2 ack DCF Trans. 1 ack DCF stations wait for a DIFS... DCF Trans. 2 ack DCF DCF time (scenario 1: no PCF takes control) 28

Distributed Coordination Function (DCF) Basic Access mode: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access scheme (listen before transmit) carrier sensing performed to detect ongoing transmissions Binary Exponential Backoff over slotted idle time each station randomly selects the transmission slot in a variable sized Contention Window no Collision Detection (CD) SIFS PIFS DIFS Packet Transmitted Backoff period (contention) Backoff period DCF Trans. 1 ack DCF Trans. 2 Ack DCF DCF time (scenario 1: no PCF takes control) 29

CSMA/CA Access Mechanism Medium Busy Packet Transmitted SIFS Slot Time DIFS CSMA/CA is an efficient protocol for data traffic, like Ethernet Listen before transmit Back-off Window Always back-off before a transmission or retransmission Designed to provide fair access to the medium 30

DCF Backoff procedure Selection of a random Backoff Time CWi=contention window size at the i-th transmission attempt. CWi is doubled after each collision experienced (to reduce the contention) BackoffTime(i)=(Cwi*random())*SlotTime i 1 2 3 4 5 6 7 CW i 15 31 63 127 255 511 1023 Reduction of the Backoff Time After an idle DIFS period from the last transmission, a station decrements its Backoff Time by a Slot_time for each slot where no activity is sensed on the medium. Frozen As soon as the medium is determined to be busy, the backoff procedure is suspended. Transmission When the Backoff Time reaches zero, the station starts the transmission. 31

DCF basic access: overview DIFS DATA SIFS DIFS Successful transmission Source Collision: no CD DIFS Station A Station B L A L B Destination DIFS ACK {L A, L B, L C }= lengths of colliding packets IEEE 802.11 does not implement collision detection Station C L C COLLISION LENGTH collision length = maximum{l A, L B, L C } 32

IEEE 802.11 Contention Control Effect of high contention = many collisions 33

IEEE 802.11 Contention Control Information known due to carrier sense...allow to determine the Slot Utilization index: Slot Utilization = Num Busy Slots / Initial Backoff Slot Utilization in [0..1] 34

IEEE 802.11 Contention Control Adoption of Slot Utilization in Distributed contention control (DCC) Probability of Transmission = P_T P_T = (1- S_U) Num_Att 35

IEEE 802.11 Contention Control Probabilistic Distributed Contention Control Extends 802.11 MAC Stable (avoids collapse) 36

IEEE 802.11 Contention Control DCC => better performance (no overheads) 37

IEEE 802.11 Contention Control DCC => better performance (no overheads) 38

IEEE 802.11 Contention Control DCC distributed priority mechanism P_T=(1-S_U) S_U) Num_Att*Prior_Lev 39

IEEE 802.11 Contention Control AOB = optimum performance No need to estimate number of stations 40