Wireless LAN Protocols

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Networks: Wireless LANs1 Wireless Local Area Networks.
1 The Medium Access Control Sublayer Chapter 4. 2 The Medium Access Control Sublayer This chapter deals with broadcast networks and their protocols. In.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
ECE 4450:427/527 - Computer Networks Spring 2015
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
1 Effectiveness of Physical and Virtual Carrier Sensing in IEEE Wireless Ad Hoc Networks Fu-Yi Hung and Ivan Marsic WCNC 2007.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
Part III. Data Link Layer
Media Access Methods MAC Functionality CSMA/CA with ACK
ICUPC’98 Jing Deng and Zygmunt J. Hass
Outline What is Wireless LAN Wireless Transmission Types
The University of Adelaide, School of Computer Science
CT301 LECTURE 8.
Communication Networks: Technology & Protocols
Chapter 6 Wireless and Mobile Networks
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
Network connectivity to the legacy wired LAN
MACAW: A Media Access Protocol for Wireless LAN’s
MACAW: A Media Access Protocol for Wireless LANs
TCP and MAC interplay in Wireless Ad Hoc Networks
Channel Allocation (MAC)
CT1303 LAN Rehab AlFallaj.
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
THE IEEE MAC SUB-LAYER – chapter 14
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Mobile Communications Chapter 3 : Media Access
EEC-484/584 Computer Networks
زير لايه دسترسي به لايه انتقال
The Medium Access Control Sublayer
Introduction to Wireless Networks
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
ECSE-4730: Computer Communication Networks (CCN)
CSE 313 Data Communication
Figure 3.1 Internet model.
Network connectivity to the legacy wired LAN
Wireless LANs CS 352, Lecture 16
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Wireless LAN Protocols Lalyer-1 & Layer-2 Wireless LAN Protocols

Wireless LAN Protocols Difference between mobile and portable Portable: Requires wired connection to a fixed network E.g. Notebook Computer Mobile: Requires wireless communication E.g Portable computers communicating by radio Basic assumption: Whenever a receiver is within range of two active transmitters, the resulting signal is garbled TANENBAUM Computer Networks 1 2

CSMA for Wireless LAN This is not a good choice because what matters is the interference at the receiver, not at the sender Hidden Station Problem A station may not able to detect a communication with its neighbor Exposed Station Problem A station may falsely conclude that it can not communicate with its neighbor due to communication going on the other end TANENBAUM Computer Networks 1 3

Hidden and Exposed Station Problems A is transmitting to B, If C senses the medium, it won’t hear A. Because A is out of C’s range C will falsly conclude that it can transmit to B If C start transmitting to B, it will interfere at B B is transmitting to A, If C senses the medium, it will hear an ongoing tranasmission and falsly conclude that it may not send to D. TANENBAUM Computer Networks 1 4

Multiple Access with collision Avoidance Protocol A sends Request To Send (RTS) to B that indicates the length of the data frame that will eventually follow B replies with a Clear To Send (CTS) that contains the length of the data expected (copied from RTS) As it receives CTS, A begins transmission Note that hidden and exposed station problems are solved in this protocol Hidden station hears RTS Exposed station hears CTS TANENBAUM Computer Networks 1 5

The MACA Protocol TANENBAUM Computer Networks 1 6

Required Reading Tanenbaum Sections 4.1 4.2 TANENBAUM Computer Networks 1 7