History of PD and ED reviewed

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Dynamic Sensitivity Control V2
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Doc.: IEEE /0516r0 Submission April 2015 CCA for Clauses 16, 17 and 19 Date: 2015-April Authors: Graham Smith, SR TechnologiesSlide 1 NOTE: Includes.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
Submission doc.: IEEE 11-14/1148r1 Consideration of asynchronous interference in OBSS environment Date: Authors: September 2014 Slide 1Koichi.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
WLAN b a Johan Montelius
The IEEE Specification By Matthew Ruston November 25, 2007.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 FSATIE TELECOMMUNICATION WORKSHOP Overview of WiFi Presented by David Johnson Mobile platform technology leader IcomtekCSIR.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
Submission doc.: IEEE /1013r0 September 2015 Guido R. Hiertz et al., EricssonSlide ae & ax Date: Authors:
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
Department of Computer Science, University of Peshawar Multiple Access.
WLAN.
Doc.: IEEE /0098r0 Submission November 2015 Hyunduk Kang et al, ETRISlide 1 Consideration on Neighbor Discovery Date: Authors:
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Doc.: IEEE /618r0 Submission August 2002 Bobby Jose,Slide 1 RRM Requirements discussion on CCA Bobby Jose.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
A Taxonomy of Mechanisms for Multi-Access
CT301 lecture7 10/29/2015 Lect 7 NET301.
The University of Adelaide, School of Computer Science
“Performance Comparison of the Radio Link Protocols of IEEE 802
CCA Sensitivity Date: September 2017
Communication Networks: Technology & Protocols
Wireless LANs Wireless proliferating rapidly.
Wireless Networks.
Wireless Mesh Networks
Channel Allocation (MAC)
Proposed Evaluation Methodology Additions
November 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SRM related functions in ]
Subject Name: Computer Communication Networks Subject Code: 10EC71
Subject Name: Computer Communication Networks Subject Code: 10EC71
CS 457 – Lecture 7 Wireless Networks
Proposed response to 3GPP ED request
THE IEEE MAC SUB-LAYER – chapter 14
Consideration on Neighbor Discovery
Specification overview
<month year> <doc.: IEEE doc> March 2011
120MHz channelization solution
Specification overview
CT301 lecture7 10/29/2015 Lect 7 NET301.
basics Richard Dunn CSE July 2, 2003.
The Medium Access Control Sublayer
Chapter 13 Multiple Access
Specification overview
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Specification overview
Chapter 13 Multiple Access
doc.: IEEE /xxxxr0 January 2018
Specification overview
Specification overview
CCA Sensitivity Date: September 2017
Chapter 4 Ethernet Technology
Is the MAC sufficient for wireless high speed mesh LANs?
Specification overview
Figure 3.1 Internet model.
Channelization for China’s Spectrum
Chapter 12 Media Access Control (MAC)
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

History of PD and ED reviewed September 2017 doc.: IEEE 802.11-17/1444r0 September 2017 History of PD and ED reviewed Date: 2017-09-10 Authors: Guido R. Hiertz, Ericsson Guido R. Hiertz, Ericsson

September 2017 doc.: IEEE 802.11-17/1444r0 September 2017 Abstract In this document we analyze the historical background of Preamble Detection (PD) and Energy Detection (ED). We reveal that any statements declaring ED being an older technology than PD are unjustified. Guido R. Hiertz, Ericsson Guido R. Hiertz, Ericsson

ALOHA In 1971, the University of Hawaii operated ALOHAnet September 2017 doc.: IEEE 802.11-17/1444r0 September 2017 ALOHA In 1971, the University of Hawaii operated ALOHAnet According to the ALOHA protocol devices do not apply Listen- before-talk (LBT) or related carrier sensing (CS) mechanisms Under the ALOHA protocol, devices transmit at will If another device transmits simultaneously, a device retransmit after a random period Guido R. Hiertz, Ericsson Guido R. Hiertz, Ericsson

Ethernet In 1973 to 1974, Bob Metcalfe invented Ethernet September 2017 doc.: IEEE 802.11-17/1444r0 September 2017 Ethernet In 1973 to 1974, Bob Metcalfe invented Ethernet The initial standard was formed by Digital Equipment Corporation, Intel, and Xerox (DIX) In 1980, IEEE formed project 802 In 1983, an improved version of DIX became 802.3 Ethernet (802.3) applies Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Since today’s Ethernet solely relies on full-duplex communication CSMA/CD is no more needed or applied Guido R. Hiertz, Ericsson Guido R. Hiertz, Ericsson

Ethernet Carrier Sensing (1) September 2017 Ethernet Carrier Sensing (1) Ethernet relies on CSMA Ethernet detects a Carrier signal “The MAC sublayer shall also monitor the value of carriersense to defer its own transmissions when the medium is busy.” [2] “Carrier On. This event indicates that the physical layer has detected a change in carrier sense from no carrier to carrier.” [2] This is equivalent to receiving data During a collision no data may be received The “Collision detect thresholds” defines the voltage thresholds for detecting collisions when two or more stations are transmitting simultaneously [2] Guido R. Hiertz, Ericsson

Ethernet Carrier Sensing (2) September 2017 Ethernet Carrier Sensing (2) Carrier sensing ≠ Energy detection If carrier detected a station defers from transmitting This is similar to 802.11’s preamble detection Collision detect threshold If no signal may be decoded the detect threshold indicates that two more stations transmit simultaneously This resembles 802.11’s Energy Detection (ED) although here it is used to detect collisions where as 802.11’s ED is used to prevent collisions Guido R. Hiertz, Ericsson

September 2017 802.11 802.11 formed out of 802.3 resp. 802.4 [4] Carrying over CSMA idea after Token-based approach failed 802.11-1997 [7] defines three different PHYs Direct Sequence Spread Spectrum (DSSS) Frequency Hopping Spread Spectrum (FHSS) Infrared (IR) Guido R. Hiertz, Ericsson

FHSS CCA consists of two conditions September 2017 FHSS CCA consists of two conditions Detection of an 802.11-compliant 1 Mb/s signal above a certain threshold Referred to as “CCA threshold (preamble)” Detection of an 802.11-compliant 1 Mb/s signal above a 20 dB higher threshold with random data Referred to as “CCA threshold (random data)” No Energy Detection scheme defined or required Guido R. Hiertz, Ericsson

September 2017 DSSS An implementation may chose from three different CCA modes CCA Mode1: Energy above threshold. CCA shall report a busy medium upon detecting any energy above the ED threshold. CCA Mode 2: Carrier sense only. CCA shall report a busy medium only upon the detection of a DSSS signal. This signal may be above or below the ED threshold. CCA Mode 3: Carrier sense with energy above threshold. CCA shall report a busy medium upon the detection of a DSSS signal with energy above the ED threshold. Any of the three modes renders an 802.11 DSSS implementation compliant with the standard Implementations seem to solely rely on carrier sensing (equivalent to preamble detection) “It is not clear how many 11b devices actually implement ED-CCA or solely use 11b preamble detect. However, because many (if not all) 11b devices use just CS, 11g OFDM transmissions must use protection mechanism that is usually a RST/CTS or CTS-to-self.” [5] “Normally, mode 2 is used.” [6] Guido R. Hiertz, Ericsson

IR First appearance of Energy Detect (ED) Carrier Sense (CS) CCA September 2017 IR First appearance of Energy Detect (ED) “The ED signal shall be set true when IR energy variations in the band between 1 MHz and 10 MHz exceed 0.001 mW/cm2. The ED shall operate independently of the CS.” Basically preventing a blinded station from transmitting Carrier Sense (CS) “The CS shall be asserted by the PHY when it detects and locks onto an incoming PLCP Preamble signal.” CCA “CCA shall be asserted ‘IDLE’ by the PHY when the CS and the ED are both false, […].” Guido R. Hiertz, Ericsson

OFDM [3] reviews the development process of 802.11a September 2017 OFDM [3] reviews the development process of 802.11a Submissions [8] to 802.11 TGa indicate that preamble detection (PD) was developed first With OFDM a missed preamble causes the remaining part of a transmission to be undecodable A mitigation mechanism was needed 802.11a introduces a mechanism to deal with missed preambles Later renamed Energy Detect (ED) Guido R. Hiertz, Ericsson

September 2017 Conclusion There are no sources that justify any statement that Energy Detection (ED) is an older approach than Preamble Detection (PD) Historical documents do not indicate any evidence for consideration of dissimilar technologies Self-centric development process, not targeting coexistence with other technologies 802.11 developed PD first ED serves as complementary or generalized approach of PD Guido R. Hiertz, Ericsson

References September 2017 doc.: IEEE 802.11-17/1444r0 September 2017 N. Abramson, “Development of the ALOHANET,” IEEE Transactions on Information Theory, vol. 31, no. 2, Mar 1985. [Online]. Available: https://doi.org/10.1109/TIT.1985.1057021 IEEE, “IEEE Standards for Local Area Networks: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications,” ANSI/IEEE Std 802.3- 1985, [Online]. Available: http://ieeexplore.ieee.org/servlet/opac?punumber=2381 G. R. Hiertz, J. S. Lee, and L. Cariou, “Co-chairmen notes on current status of 802.11ax Spatial Reuse ad hoc group,” IEEE 802.11 submission 11-15/1139, Sep. 2015. [Online]. Available: https://mentor.ieee.org/802.11/dcn/15/11-15-1139 C. A. Rypinski, “Retrospective on Development of Radio and Wire Data Communication,” IEEE 802.15 Wireless submission 15-06-0107, Mar. 2006. [Online]. Available: https://mentor.ieee.org/802.15/dcn/06/15-06-0107 G. Smith and B. Hart, “ED CCA for Clauses 16, 17,” IEEE 802.11 submission 11-14/1518r5, Oct. 2014. [Online]. Available: https://mentor.ieee.org/802.11/dcn/14/11-14-1518-05 R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan, “Understanding and mitigating the impact of RF interference on 802.11 networks.” In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '07), 2007. IEEE, “Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification” IEEE 802.11-1997, June 1997. [Online]. Available: http://ieeexplore.ieee.org/servlet/opac?punumber=5258 IEEE 802.11, “IEEE 802.11 Archive Documentation,” Last accessed 2017-08-03. [Online]. Available: http://www.ieee802.org/11/Documents/DocumentArchives/ Guido R. Hiertz, Ericsson Guido R. Hiertz, Ericsson