Unit 7 Media Access Control (MAC)

Similar documents
CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Chapter 12 Multiple Access 12.1

MAC. Fall Data Communications II 1

IEEE Medium Access Control. Medium Access Control

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Data and Computer Communications. Chapter 13 Wireless LANs

CMPE 257: Wireless and Mobile Networking

CSE 461: Wireless Networks

Mohamed Khedr.

Logical Link Control (LLC) Medium Access Control (MAC)

Computer Communication III

Wireless Local Area Networks. Networks: Wireless LANs 1

MAC in /20/06

Multiple Access Links and Protocols

CMPE 257: Wireless and Mobile Networking

Lecture 16: QoS and "

Rahman 1. Application

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Lesson 2-3: The IEEE x MAC Layer

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Data Communications. Data Link Layer Protocols Wireless LANs

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSE 6811 Ashikur Rahman

Local Area Networks NETW 901

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless Communications

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Nomadic Communications WLAN MAC Fundamentals

Wireless Local Area Networks (WLANs) Part I

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

IEEE MAC Sublayer (Based on IEEE )

Random Assignment Protocols

Wireless Protocols. Training materials for wireless trainers

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

The MAC layer in wireless networks

ECE442 Communications Lecture 3. Wireless Local Area Networks

Midterm Review EECS 122. University of California Berkeley

Wireless Networks (MAC)

ECEN 5032 Data Networks Medium Access Control Sublayer

Data Link Layer -2- Network Access

Figure.2. Hidden & Exposed node problem

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008)

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

The MAC layer in wireless networks

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

Advanced Computer Networks WLAN

Multiple Access. Data Communications and Networking

IEEE Technical Tutorial. Introduction. IEEE Architecture

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Solutions to Exercise Session 4,

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Data Link Layer -2- Network Access

IEEE WLAN (802.11) Copyright. Nomadic Communications

IEEE P Wireless Local Area Networks

Chapter 4. The Medium Access Control Sublayer

Computer Networks. Wireless LANs

Wireless Networked Systems

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Telecommunication Protocols Laboratory Course. Lecture 2

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Efficient Power MAC Protocol in Ad-hoc Network s

Wireless LANs. ITS 413 Internet Technologies and Applications

Data Link Layer: Collisions

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

3.1. Introduction to WLAN IEEE

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012

MSIT 413: Wireless Technologies Week 8

Wireless Networking & Mobile Computing

Mobile Communications Chapter 7: Wireless LANs

Internet Protocol Stack

CS263: Wireless Communications and Sensor Networks

Department of Electrical and Computer Systems Engineering

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU

Introduction to IEEE

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

CHAPTER 8: LAN Standards

Ethernet. Introduction. CSE 3213 Fall 2011

Aloha and slotted aloha

Wireless & Mobile Networking

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Master thesis 60 credits

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

Chapter 6 Medium Access Control Protocols and Local Area

EECS 122. University of California Berkeley

Transcription:

Unit 7 Media Access Control (MAC) 1

Internet Model 2

Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3

Categorization of MAC Protocols 4

Random Access When can a station access the medium? What can a station do if the medium is busy? How can a station determine the success or failure of its transmission? What can a station do if there is an access conflict? 5

Aloha Two rules Multiple access: a station sends a frame when it has a frame to send. Acknowledgment: the station waits for an ACK after its transmission. Retransmission if needed. Random backoff time to resolve collisions again. Maximum retransmission attempts The maximum utilization of the channel is only about 18% because of the rising of the number of collisions. 6

Aloha (contd.) 7

Aloha (contd.) 8

Slotted Aloha Slot time = frame transmission time Need one synchronization mechanism. Improve the maximum utilization to about 37%. 9

CSMA A station wishing to transmit first listens to the medium. Medium is busy the station just waits. Medium is idle the station may transmit. ACKs indicate successful data deliveries. 10

Nonpersistent CSMA Medium is idle transmit frames Medium is busy wait a random amount of time and then sense again. 11

1-persistent CSMA Medium is idle transmit frames Medium is busy continue listening until the channel is sensed idle; then transmit immediately. 12

P-persistent CSMA Step 1: channel sensing Medium is idle transmit frames immediately with probability p or delay transmission with probability (1-p). Medium is busy backoff procedure. Step 2: delay time setting Delay time = maximum propagation delay. Go to step 1. How to define p value? Assume n active stations The expected number of stations attempting to transmit is np. np 1 13

Persistence Strategies 14

CSMA/CD Step 1: if medium is idle, transmit; otherwise, go to step 2. Step 2: if medium is busy, continue to listen until the channel is idle, then transmit immediately. Step 3: if a collision is detected during transmission, transmit a brief jamming signal. Step 4: wait a random amount of time, then attempt to transmit again (repeat from step 1). Collision exponential backoff Waiting time = [0, 2 N maximum_propagation_time] N: the number of attempted transmissions. 15

CSMA/CD (contd.) 16

Random Access (contd.) Energy levels: zero, normal, abnormal 17

CSMA/CA Wired: double energy = collision occurs. Wireless: collision only adds 5%~10% energy no effective way to do collision detection. Three avoidance strategies: interframe space, contention window, acknowledgment. 18

CSMA/CA (contd.) 19

IEEE 802.11 20

MAC Sublayers Distributed coordination function (DCF) Point coordination function (PCF): optional in an infrastructure network 21

DCF Access method: CSMA/CA. Implemented in all stations and APs. Used within both ad hoc and infrastructure configurations. Three interframe spaces (IFS) values to enable priority access: Short IFS (SIFS) Point coordination function IFS (PIFS) Distributed coordination function IFS (DIFS) 22

DCF (contd.) All packets should be acknowledged (through ACK frame) immediately and positively. If medium is sensed idle, a STA defers a DIFS gap, then transmit MPDUs. Otherwise the STA waits till the channel becomes idle; defers a DIFS gap more, generates a random backoff period for an additional deferral time. 23

DCF (contd.) 24

DCF (contd.) Network Allocation Vector (NAV) 25

DCF (contd.) Backoff procedure The Backoff Timer should be frozen when medium is busy. The timer should be resumed only when the medium is free for a period > DIFS. Transmission shall commence whenever the Backoff Timer reaches 0. 26

DCF (contd.) Priority scheme SIFS: the highest priority ACK, CTS, data frame of a fragmented MSDU (i.e., continuous frames), and to respond to a poll from the PCF. PIFS (PCF-IFS): 2 nd highest By PCF to send any of the Contention Free Period frames. DIFS (DCF-IFS): 3 rd highest By DCF to transmit asynchronous MPDUs. EIFS (extended IFS): lowest Used when the carrier switches from idle to busy (but the information in the carrier can not be correctly decoded). 27

DCF (contd.) Protocol range Transmission range Within this range, packets can receive and decode correctly. Carrier sensing range Within this range, sender s transmission can be sensed. Carrier sensing zone When a node is within the carrier sensing zone, it can sense the signal but cannot decode it correctly. 28

DCF (contd.) NAV setting EIFS should be longer than that of ACK transmission. 29

DCF (contd.) Hidden terminal problem BA && CA B and C are hidden terminals. Solution: RTS + CTS. 30

DCF (contd.) Exposed terminal problem AB && CD A and C are exposed terminals. No effective solution. 31

DCF (contd.) 32

DCF (contd.) RTS/CTS options Never use RTS/CTS; Always use RTS/CTS; Use RTS/CTS whenever the MPDU exceeds the value to RTS_Threshold. 33

DCF (contd.) Conditions of channel release All fragments of a MSDU have been sent; An ACK is not received; It will attempt to retransmit the fragment at a later time (according to the backoff algorithm) and go through the contention procedure again. NAV setting?? A dwell time boundary is reached (TXOP). 34