Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Similar documents
Chapter 1 Basic concepts of wireless data networks (cont d)

Data Link Layer Technologies

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

Wireless Communications

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

CMPE 257: Wireless and Mobile Networking

Unit 7 Media Access Control (MAC)

Rahman 1. Application

Multiple Access Links and Protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Data Link Layer: Collisions

ECE 4450:427/527 - Computer Networks Spring 2017

CMPE 257: Wireless and Mobile Networking

Chapter 12 Multiple Access 12.1

MSIT 413: Wireless Technologies Week 8

Aloha and slotted aloha

Mobile Communications Chapter 3 : Media Access

Logical Link Control (LLC) Medium Access Control (MAC)

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

MULTIPLE ACCESS PROTOCOLS 2. 1

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Medium Access Control Sublayer Chapter 4

Mobile and Sensor Systems

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Multiple Access in Cellular and Systems

CSE 6811 Ashikur Rahman

Wireless Networking: An Introduction. Hongwei Zhang

ECEN 5032 Data Networks Medium Access Control Sublayer

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

COS 140: Foundations of Computer Science

Strengthening Unlicensed Band Wireless Backhaul

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Wireless Local Area Networks. Networks: Wireless LANs 1

ECE 4450:427/527 - Computer Networks Spring 2017

Multiple-access protocols

Long Distance Wireless Communication. Principally satellite communication:

Chapter 6 Medium Access Control Protocols and Local Area Networks

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Chapter 6 Wireless and Mobile Networks

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

MAC LAYER. Murat Demirbas SUNY Buffalo

CSMA based Medium Access Control for Wireless Sensor Network

Data Link Layer -2- Network Access

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

The Medium Access Control Sublayer

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Chapter 4. The Medium Access Control Sublayer

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Wireless LAN. Access Point. Provides network connectivity over wireless media

Link Layer: Retransmissions

Multiple Access Links and Protocols

COS 140: Foundations of Computer Science

Mobile Wireless Networking Medium Access Control

CSC 4900 Computer Networks: Wireless Networks

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CC451 Computer Networks

Medium Access Control

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Last Lecture: Data Link Layer

CSE 461 Multiple Access. David Wetherall

Chapter 3 MEDIA ACCESS CONTROL

Multiple Access Protocols

Local Area Networks (LANs) SMU CSE 5344 /

Random Assignment Protocols

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

CSE 461: Multiple Access Networks. This Lecture

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Chapter 6 Medium Access Control Protocols and Local Area Networks

Data Link Layer -2- Network Access

COMP 3331/9331: Computer Networks and Applications

The MAC layer in wireless networks

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

CSC 4900 Computer Networks: The Link Layer

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

EE 122: Ethernet and

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

Wireless and Mobile Networks 7-2

Multiple Access. Data Communications and Networking

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

COMP/ELEC 429/556 Introduction to Computer Networks

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Module 6: Wireless Mobile Networks

The MAC layer in wireless networks

MAC protocols for ad hoc networks

Local Area Networks NETW 901

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Transcription:

Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University

Medium Access Control

Topology 3

Simplex and Duplex 4

FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum are related but differnt 5

FDMA 6

TDMA 7

Hybrid FDM/TDMA 8

DSSS and chip 9

Spreading with DSSS 10

FHSS code 11

Spreading with FHSS 12

Wireless MAC

What s s MAC Medium Access Control Sharing the wireless medium The MAC protocol defines a set of rules for the orderly access of a shared media wireless channel by multiple mobile devices a set of services that support real-time voice and video, and reliable delivery of data plays a crucial role in the efficient and fair sharing of scarce wireless bandwidth 14

Issues in MAC Multiple devices need to share the channel efficiently Problems: interfere, contention, access control, channel quality varies over space and time Different service requirements Voice (real-time, reservation-based) Data (best effort, reliable deliver) Different approaches and trade-offs Centralized vs. Distributed Other challenges Mobility, power conservation, security considerations It s a difficult problem Near-far, hidden terminals, time-varying channel, burst errors, etc. 15

Classify Wireless MACs hybrid of random access & guaranteed access Random Reservation Access (RRA) 16

Centralized vs. Distributed Control Distributed wireless networks such as packet radio or ad hoc networks have no central controller. Usually single shared frequency Centralized wireless networks, infrastructure mode in WLANS, cellular MAC, broadcast on the down link and the AP or BS can control the uplink access according to QOS. Various approaches exist. Slotted systems, requires network wide synchronization for use of discrete time slots. Easy to achieve in centralized networks, much more challenging in ad hoc or packet radio networks. 17

Similar (but confusing) terms MAC (medium access control) protocol A protocol that control which user should access the medium at a given moment Multiple Access Multiple users access network simultaneously Multiplexing Combine multiple signals/transmissions into 1 transmission 18

Duplex Similar (but confusing) terms TDD (time division duplex) FDD (frequency division duplex) Multiple access TDMA (time division multiple access) FDMA (frequency division multiple access) Multiplexing TDM (time division multiplexing) FDM (frequency division multiplexing) 19

Examples FDMA/FDD E.g. AMPS FDMA/TDD E.g. CT-2 uplink downlink t 1 2 3 1 2 3 t 1 2 3 1 2 3 f f 20

More about Wireless MAC

Types of wireless MAC (1) Centralized allocation TDMA, CDMA, FDMA Cellular downlink Cellular uplink (dedicate allocation) (2) Request/Allocation Polling Cellular uplink (3) Random Access CSMA, Aloha, 802.11 22

MAC: Polling MAC between TDMA and random access Master-slave architecture E.g. BS (or AP) is the master BS sends a poll to MS Poll frame indicates MS s MAC address Uplink transmission is controlled by AP s polling 3 essential elements in polling Request: MS request for uplink transmission Poll: BS allocate bandwidth through polling Data: Uplink data transmission 23

MAC: Polling 24

Random Access MAC

ALOHA network Aloha University of Hawaii, 1970 Aloha: random access MAC A node has a packet to send, then the node sends it If the packet collides, the node retries after some time backoff Slotted-Aloha Improved version of Aloha with discrete time slots Wait to transmit until the beginning of the next time slot Example: Slotted-Aloha is used in GSM initialization. MS first contacts BS through a random access channel. Request Access Channel (RACH) 26

Aloha Aloha Slotted Aloha 27

Making Reservation in Aloha Reservation Aloha Combine Aloha with TDMA A node wishing to transmit a packet tells its neighbors of its intention by transmitting a short reservation packet in the reservation phase of the protocol. Nodes contend for this reservation subslot in an aloha fashion. 28

CSMA/CD Suitable for wired MAC Ethernet Collision Detection Detect the occurrence of collisions Minimum frame length requirement in Ethernet (to guarantee collision detection) Notify all stations about the collisions Notification should be guaranteed to be delivered to all other stations All stations back off for a random waiting time 29

Many issue to solve in Packet Radio, Ad hoc, distributed wireless Networks CSMA/CD is problematic; radios are half-duplex and can t easily listen while transmitting like Ethernet. Therefore, collision avoidance (CA) techniques are needed rather than collision detection (CD). Other issues: burst errors, hidden terminal, capture/near-far, exposed terminals CSMA/CA, RTS-CTS techniques (IEEE 802.11) better suited A B C D Cell: Coverage Range, range over which a node can transmit and receive data reliably. 30

Hidden Node D interference A B C Hidden Node 31

Exposed Node A B C? D Valid transmission Exposed Node 32

Capture occurs when a receiver can cleanly receive a transmission from one of two simultaneous transmissions. Improve performance But, result in unfairness Capture A C B P CB >> P AB 33

CSMA Carrier Sense Multiple Access (CSMA) Carrier Sense Listen (sense carrier) before transmission Improvement over Aloha Aloha doesn t consider what other users are doing Collision still occurs Backoff when carrier is busy Backoff when collision occurs CSMA/CD Collision Detection (CD) Listen for a collision with another node s transmission Nodes are able to detect collision and stop transmissionl IEEE 802.3 standard Ethernet 34

Random MAC 1 0.8 0.6 Nonpersistent CSMA Throughput (S) 0.4 0.2 0 Slotted Aloha 1-Persistent CSMA Aloha 0 2 4 6 8 10 Offered Load (G) 35

Different types of backoff 1-persistence After channel becomes idle, a node transmits its packet immediately p-persistence After channel become idle, a node transmits its packet with probability p. Non-persistence A node does not sense the channel until waiting for a random waiting period 36

Resolving Hidden Terminals Using RTS-CTS with CSMA Request-to-Send Clear-to-Send RTS A B C D A CTS B C D A DATA B C D 37