Wireless Sensor Networks 4. Medium Access

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Multiple access What if multiple machines are sharing the same link?
Wireless Medium Access Control Protocols
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Wireless Sensor Networks 4. Medium Access
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Wireless Sensor Networks 4. Medium Access
MEDIUM ACCESS CONTROL PROTOCOL
Medium Access Control MAC protocols: design goals, challenges,
CT301 LECTURE 8.
Part III Datalink Layer 10.
Module 3 Medium Access Control.
MACAW: A Media Access Protocol for Wireless LAN’s
High Speed LANs – Ethernet and Token Ring
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
Multiple Access, Collision Avoidance for Wireless LAN’s
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Communication Networks NETW 501
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Wireless Sensor Networks 4. Medium Access Christian Schindelhauer Technische Fakultät Rechnernetze und Telematik Albert-Ludwigs-Universität Freiburg Version 29.04.2016

ISO/OSI Reference model 7. Application Data transmission, e-mail, terminal, remote login 6. Presentation System-dependent presentation of the data (EBCDIC / ASCII) 5. Session start, end, restart 4. Transport Segmentation, congestion 3. Network Routing 2. Data Link Checksums, flow control 1. Physical Mechanics, electrics

Types of Conflict Resolution Conflict-free TDMA, Bitmap FDMA, CDMA, Token Bus Contention-based Pure contention Restricted contention Other solutions z.B. MAC for directed antennae

Contention Free Protocols Simple Example: Static Time Division Multiple Access (TDMA) Each station is assigned a fixed time slot in a repeating time schedule Traffic-Bursts cause waste of bandwidth

Bitmap Protokoll Problems of TDMA Reservation system: bitmap protocol If a station has nothing to send, then the channel is not used Reservation system: bitmap protocol Static short reservation slots for the announcement Must be received by each station Problem Set of participants must be fixed and known a-priori because of the allocation of contention slots Problems of TDMA If a station has nothing to send, then the channel is not used Reservation system: bitmap protocol Static short reservation slots for the announcement Must be received by each station problem Participants must be set a-priori known and fixed his because the allocation of contention slots

ALOHA Algorithm Origin Once a paket is present, it will be sent 1985 by Abrahmson et al., University of Hawaii For use in satellite connections

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer

ALOHA – Analysis Advantage Disadvantage simple no coordination necessary Disadvantage collisions sender does not check the channel sender does not know whether the transmission will be successful ACKs are necessary ACKs can also collide

ALOHA – Efficiency Consider Poisson-process for generation of packets describe “infinitely” many stations with similar behavior time between two transmission is exponentially distributed let G be the expectation of the transmission per packet length all packets have equal length Then we have For a successful transmission, no collision with another packet may happen How probable is a successful transmission?

ALOHA – Efficiency A packet X is disturbed if a packet starts just before X a packet starts shortly after X starts A packet is successfully transmitted, if during an interval of two packets no other packets are transmitted A package X is disturbed when a package just before X starts when a packet starts shortly before the end of X The packet is successfully transmitted, when transmitting over a period of two packets no (other) package

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer

Slotted ALOHA ALOHA‘s problem Reduction through use slots Result long vulnerability of a packet Reduction through use slots synchronization is assumed Result vulnerability is halved throughput is doubled S(G) = Ge-G optimal for G=1, S=1/e Vulnerability of a long packet (slots) Synchronization is assumed result: Vulnerability is halved Throughput is doubled

Slotted ALOHA – Effizienz A packet X is disturbed if a package starts just before X The packet is successfully transmitted, when transmitting over a period of one packets no (other) packets appears A package X is disturbed when a package just before X starts when a packet starts shortly before the end of X The packet is successfully transmitted, when transmitting over a period of two packets no (other) package

Throughput with respect to the Load (Slotted) ALOHA not a good protocol Throughput breaks down for increasing demand 1 G S Optimal

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer

CSMA und Transmission Time B CSMA-Problem: Transmission delay d Two stations start sending at times t and t + ε with ε <d see a free channel 2nd Station causes a collision t t+ε start sending at times t and t + ε with ε <d see one free channel second station causing a collision

Collision Detection in Ethernet – CSMA/CD B CSMA/CD – Carrier Sense Multiple Access/Collision Detection Ethernet If collision detection during reception is possible Both senders interrupt sending Waste of time is reduced Collision Detection simultaneously listening and sending must be possible Is that what happens on the channel that's identical to the message? t+ε CSMA / CD - Carrier Sense Multiple Access / Collision Detection Ethernet If collision detection is possible Later completed his transfer stations Time wasted is reduced at least one message is transmitted Collision Detection sets simultaneously listening and sending ahead on channel Is that what happens on the channel that's identical to the message?

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer

Computation of the Backoff Algorithm: Binary Exponential Backoff k:=2 While a collision has occurred choose t randomly uniformly from {0,...,k-1} wait t time units send message (terminate in case of collision) k:= 2 k Algorithm waiting time adapts to the number of stations uniform utilization of the channel fair in the long term

Problem of Wireless Media Access Unknown number of participants broadcast many nodes simultaneously only one channel available asymmetric situations Collisions produce interference Media Access Rules to participate in a network

Aims Delay Throughput Fairness Robustness and stability Scalability against disturbances on the channel against mobility Scalability Energy efficiency

Methods Organisation Access Central control Distributed control without contention with contention

Problem of Media Access CSMA/CD not applicable Media is only locally known Bounded range Hidden Terminal Receiver collision despite carrier sensing Exposed Terminal Opportunity costs of unsent messages because of carrier sensing

Hidden Terminal and Exposed Terminal B C Hidden Terminal Problem Exposed Terminal Problem A B C D

Alternative Solutions Extended hardware Addition carrier signal blocks and ensures transmission Centralized solution Base station is the only communication partner Base station coordinates the media access

MACA Phil Karn MACA: A New Channel Access Method for Packet Radio 1990 Alternative names: Carrier Sensing Multiple Access / Collision Avoidance (CSMA/CA) Medium Access with Collision Avoidance (MACA) Aim Solution of the Hidden and Exposed Terminal Problem Idea Channel reservation before the communication Minimization of collision cost

Request to Send (a) A sends Request to Send (RTS) (b) B answers with Clear to Send (CTS)

Clear to Send (a) A sends Request to Send (RTS) (b) B answers with Clear to Send (CTS)

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer

Details for Sender A sends RTS waits certain time for CTS If A receives CTS in time A sends packet otherwise A assumes a collision at B doubles Backoff-counter and chooses a random waiting time from {1,...,Backoff } After the waiting time A repeats from the beginning

Details for Receiver After B has received RTS B sends CTS B waits some time for the data packet If the data packet arrives then the process is finished Otherwise B is not blocked

Details for Third Parties C receives RTS of A waits certain time for CTS of B If CTS does not occur C is free for own communication If CTS of B has been received then C waits long enough such that B can receive the data packet

Details for Third Parties D receives CTS of B waits long enough such that B can receive the data packet E receives RTS of A and CTS of B

MACAW Bharghavan, Demers, Shenker, Zhang MACAW: A Media Access Protocol for Wireless LAN‘s, SIGCOMM 1994 Palo Alto Research Center, Xerox Aim Redesign of MACA Improved backoff Fairer bandwidth sharing using Streams Higher efficiency by 4- and 5-Handshake

Acknowledgment in the Data Link Layer MACA does not use Acks initiated by Transport Layer very inefficient How can MACA use Acks?

MACAW 4 Handshake Participants Sender sends RTS Receiver answers with CTS Sender sends data packet Receiver acknowledges (ACK) Third parties Nodes receiving RTS or CTS are blocked for some time RTS and CTS describe the transmission duration Sender repeats RTS, if no ACK has been received If receiver has sent ACK then the receiver sends (instead of CTS) another ACK

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer

MACA 4-Handshake RTS

MACAW 4-Handshake CTS

MACAW 4-Handshake Data

MACAW 4-Handshake Ack

Acknowledgments Adding ACKs to MACA In MACA done by transport layer leads to drastical improvements of throughput even for moderate error rates error rate throughput RTS-CTS- DATA RTS-CTS- DATA-ACK 40 37 0,001 0,01 17 36 0,1 2 10

MACAW 4 Handshake Worst-Case blockade Sender sends RTS Receiver is blocked Sender is free But the environment of the sender is blocked

MACAW 4-Handshake RTS

MACAW 4-Handshake CTS is missing