IEEE 802.11, Token Rings 4/26/2019 CS/ECE 438 - UIUC, Fall 2006.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
CS Direct Link Networks (Continued) Slide Set 6.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Spring 2003CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
8-Oct-154/598N: Computer Networks Shared Access Networks Token Ring ATM Fibre channel Myrinet.
14-Oct-15Computer Networks1 Reliable Transmission.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
1 Other LANs Token Rings Wireless –Wireless LAN (802.11, WiFi) –Broadband Wireless (802.16) –Bluetooth.
Chapter 6 Multiple Radio Access
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
WLAN.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Shared Access Networks: Token ring, Wireless Sections 2.7 & 2.8.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Media Access Methods MAC Functionality CSMA/CA with ACK
Wireless MAC.
Wireless MAC.
EA C451 (Internetworking Technologies)
Advanced Computer Networks
Medium Access Control MAC protocols: design goals, challenges,
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Communication Networks: Technology & Protocols
Computer Communication Networks
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
MACAW: A Media Access Protocol for Wireless LAN’s
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Mobile and Ad hoc Networks
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
MACAW: A Media Access Protocol for Wireless LANs
Multiple Access Mahesh Jangid Assistant Professor JVW University.
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
IEEE : Wireless LANs ALOHA, Slotted ALOHA
Services of DLL Framing Link access Reliable delivery
Medium Access Control (MAC) Sub-layer
CS 457 – Lecture 7 Wireless Networks
EEC-484/584 Computer Networks
Data Communication Networks
Performance Evaluation of an Integrated-service IEEE Network
MAC continued.
Wireless LAN Simulation IEEE MAC Protocol
Chapter 14. LAN Systems Ethernet and Fast Ethernet (CSMA/CD)
EEC-484/584 Computer Networks
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

IEEE 802.11, Token Rings 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Ethernet MAC Algorithm Listen for carrier sense before transmitting Collision: What you hear is not what you sent! Node A Node B  4/26/2019 CS/ECE 438 - UIUC, Fall 2006

CSMA/CD in WLANs? Most (if not all) radios are half-duplex Listening while transmitting is not possible Collision might not occur at sender Collision at receiver might not be detected by sender! 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism If C transmits, collision will occur at node B A B C A’s signal strength space C’s signal DATA DATA A B C 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

MACA Solution for Hidden Terminal Problem When node A wants to send a packet to node B Node A first sends a Request-to-Send (RTS) to A On receiving RTS Node A responds by sending Clear-to-Send (CTS) provided node A is able to receive the packet When a node C overhears a CTS, it keeps quiet for the duration of the transfer RTS CTS A B C 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Exposed Terminal Problem B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideally transmitted) RTS CTS A B C D 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

MACA Solution for Exposed Terminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmit RTS RTS CTS A B C D 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Collisions Still possible Binary exponential backoff RTS packets can collide! Binary exponential backoff Backoff counter doubles after every collision and reset to minimum value after successful transmission Performed by stations that experience RTS collisions RTS collisions not as bad as data collisions in CSMA Since RTS packets are typically much smaller than DATA packets 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Reliability Wireless links are prone to errors High packet loss rate detrimental to transport-layer performance Mechanisms needed to reduce packet loss rate experienced by upper layers 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

A Simple Solution to Improve Reliability - MACAW When node B receives a data packet from node A, node B sends an Acknowledgement (ACK) If node A fails to receive an ACK Retransmit the packet RTS CTS DATA ACK A B C 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Revisiting the Exposed Terminal Problem Exposed terminal solution doesn't consider CTS at node C With RTS-CTS, C doesn’t wait since it doesn’t hear A’s CTS With B transmitting DATA, C can’t hear intended receiver’s CTS C trying RTS while B is transmitting is useless RTS RTS CTS CTS A B C D 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Revisiting the Exposed Terminal Problem - MACAW One solution Have C use carrier sense before RTS Alternative B sends DS (data sending) packet before DATA: Short packet lets C know that B received A’s CTS Includes length of B’s DATA so C knows how long to wait 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Deafness For the scenario below Node A sends an RTS to B While node C is receiving from D, Node B cannot reply with a CTS B knows that D is sending to C A keeps retransmitting RTS and increasing its own BO timeout RTS RTS CTS A B C D 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Interframe Spacing Interframe spacing Varying interframe spacings Plays a large role in coordinating access to the transmission medium Varying interframe spacings Creates different priority levels for different types of traffic! 802.11 uses 4 different interframe spacings DIFS DIFS PIFS SIFS medium busy contention next frame t direct access if medium is free  DIFS 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

IEEE 802.11 - CSMA/CA Sensing the medium If free for an Inter-Frame Space (IFS) Station can start sending (IFS depends on service type) If busy Station waits for a free IFS, then waits a random back-off time (collision avoidance, multiple of slot-time) If another station transmits during back-off time The back-off timer stops (fairness) contention window (randomized back-off mechanism) DIFS DIFS medium busy next frame direct access if medium is free  DIFS t slot time 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Types of IFS SIFS DIFS Short interframe space Used for highest priority transmissions RTS/CTS frames and ACKs DIFS DCF interframe space Minimum idle time for contention-based services (> SIFS) 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Types of IFS PIFS EIFS PCF interframe space Minimum idle time for contention-free service (>SIFS, <DIFS) EIFS Extended interframe space Used when there is an error in transmission 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Backoff Interval When transmitting a packet, choose a backoff interval in the range [0,cw] cw is contention window Count down the backoff interval when medium is idle Count-down is suspended if medium becomes busy When backoff interval reaches 0, transmit RTS 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

DCF Example B1 = 25 B2 = 20 B1 = 5 B2 = 15 data wait data wait B2 = 10 B1 and B2 are backoff intervals at nodes 1 and 2 cw = 31 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Backoff Interval The time spent counting down backoff intervals is a part of MAC overhead Large cw Large backoff intervals Can result in larger overhead Small cw larger number of collisions (when two nodes count down to 0 simultaneously) 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Backoff Interval The number of nodes attempting to transmit simultaneously may change with time Some mechanism to manage contention is needed IEEE 802.11 DCF Contention window cw is chosen dynamically depending on collision occurrence 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Binary Exponential Backoff in DCF When a node fails to receive CTS in response to its RTS, it increases the contention window cw is doubled (up to an upper bound) When a node successfully completes a data transfer, it restores cw to Cwmin cw follows a sawtooth curve 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Ring Example Token Ring Networks IBM: 4Mbps token ring IEEE 802.5: 16Mbps 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Ring Focus on Fiber Distributed Data Interface (FDDI) Outline 100 Mbps Was (not is) a candidate to replace Ethernet Used in some MAN backbones (LAN interconnects) Outline Rationale Topologies and components MAC algorithm Priority Feedback Token management 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Ring Why emulate a shared medium with point-to-point links? Why a shared medium? Convenient broadcast capabilities Switches costly Why emulation? Simpler MAC algorithm Fairer access arbitration Fully digital (802.3 collision detection requires analog) 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Ring: Topology and Components Relay Single Relay Multistation access units Host From Previous MSAU To Next MSAU Host Relay From Previous Host To Next Host Host Relay From Previous Host To Next Host 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Ring: Dual Ring Example Token Ring Networks FDDI: 1000Mbps Fiber Distributed Data Interface 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

  FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure   4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Multistation Access Unit Each station imposes a delay E.g. 50 ms Maximum of 500 Stations Upper limit of 100km Need 200km of fiber Uses 4B/5B encoding Can be implemented over copper 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Ring: Basic Concepts Frames flow in one direction Upstream to downstream Token Special bit pattern rotates around ring Stations Must capture token before transmitting Must remove frame after it has cycled Must release token after transmitting Service Stations get round-robin service 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Ring: Basic Concepts Immediate release Used in FDDI Token follows last frame immediately Delayed release Used in IEEE 802.5 Token sent after last frame returns to sender 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Release Early Release Delayed Release 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Ring: Media Access Control Parameters Token Holding Time (THT) Upper limit on how long a station can hold the token Each station is responsible for ensuring that the transmission time for its packet will not exceed THT Token Rotation Time (TRT) How long it takes the token to traverse the ring. TRT  ActiveNodes x THT + RingLatency Target Token Rotation Time (TTRT) Agreed-upon upper bound on TRT 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

802.5 Reliability Delivery status Trailer A bit C bit Set by recipient at start of reception C bit Set by recipient on completion on reception 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

802.5 Monitor Responsible for Inserting delay Token presence Should see a token at least once per TRT Check for corrupted frames Check for orphaned frames Header Monitor bit Monitor station sets bit first time it sees packet If monitor sees packet again, it discards packet 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Maintenance: 802.5 Monitoring for a Valid Token All stations should periodically see valid transmission (frame or token) Maximum gap = ring latency + max frame < = 2.5ms Set timer at 2.5ms send claim frame if timer expires 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Timing Algorithm: 802.5 Each node measures TRT between successive tokens If measured-TRT > TTRT Token is late Don’t send If measured-TRT < TTRT Token is early OK to send Worse case: 2xTTRT between seeing token Back-to-back 2xTTRT rotations not possible 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Traffic Classes: FDDI Two classes of traffic Synchronous Asynchronous Real time traffic Can always send Asynchronous Bulk data Can send only if token is early 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Timing Algorithm: FDDI Each station is allocated Si time units for synchronous traffic per TRT TTRT is negotiated S1 + S2 + … + SN + RingLatency  TTRT Algorithm Goal Keep actual rotation time less than TTRT Allow station i to send Si units of synchronous traffic per TRT Fairly allocate remaining capacity to asynchronous traffic Regenerate token if lost 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Timing Algorithm: FDDI When a node gets the token Set TRT = time since last token Set THT = TTRT – TRT If TRT > TTRT Token is late Send synchronous data Don’t send asynchronous data If TRT < TTRT Token is early OK to send any data Send synchronous data, adjust THT If THT > 0, send asynchronous data 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

FDDI example Assume RingLatency=12 µs Three active stations Each with Si=20 µs TTRT=100 µs Stations have unlimited supply of asynchronous traffic. 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

FDDI example TRT s/a TRT s/a TRT s/a 0 0 0/0 12 12 20/88 172 160 20/0 Arrival time TRT s/a Arrival time TRT s/a Arrival time TRT s/a 0 0 0/0 12 12 20/88 172 160 20/0 252 140 20/0 344 132 20/0 432 120 20/0 4 0 0/0 124 120 20/0 196 92 20/8 276 80 20/20 368 92 20/8 456 88 20/12 8 0 0/0 148 140 20/0 228 120 20/0 320 112 20/0 400 92 20/8 492 92 20/8 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

FDDI example Arrival time TRT A Arrival time TRT A Arrival time TRT A 0 0 0 4 0 0 8 0 0 12 12 88 124 120 0 148 140 0 172 160 0 196 92 8 228 120 0 252 140 0 276 80 20 320 112 0 344 132 0 368 92 8 400 92 8 432 120 0 456 88 12 492 92 8 524 112 0 548 92 8 580 88 12 616 104 0 640 92 8 672 92 8 704 92 8 736 96 4 764 92 8 796 92 8 828 92 8 860 96 4 888 92 8 920 92 8 952 92 8 984 96 4 1012 92 8 1044 92 8 1076 92 8 1108 96 4 1136 92 8 1168 92 8 1200 92 8 1232 96 4 1260 92 8 1292 92 8 1324 92 8 1356 96 4 1384 92 8 1416 92 8 1448 92 8 1480 96 4 1508 92 8 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

FDDI Performance Synchronous traffic may consume one TTRT worth of time TRT > TTRT Worst case TRT < 2*TTRT Any asynchronous traffic plus RingLatency  TTRT Synchronous traffic < TTRT 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

FDDI Performance Can’t have two consecutive TRT = 2*TTRT After a cycle with TRT = 2*TTRT, no asynchronous traffic will be sent 4/26/2019 CS/ECE 438 - UIUC, Fall 2006

Token Maintenance: FDDI Lost Token No token when initializing ring Bit error corrupts token pattern Node holding token crashes Monitoring for a valid token Should see valid transmission (frame or token) periodically – within 2*TTRT Maximum gap = RingLatency + MaxFrame  2.5ms 4/26/2019 CS/ECE 438 - UIUC, Fall 2006