1 CSCD 439/539 Wireless Networks and Security CSDA/CA, Frames Lecture 4 Fall 2007 Some Material in these slides from J.F Kurose and K.W. Ross All material.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Ethernet, Wireless LAN. Ethernet Frame Format (a) DIX Ethernet, (b) IEEE
Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Multiple access What if multiple machines are sharing the same link?
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Technology CSE Network Technology CSE3020 Week 9.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
HY539: Mobile Computing and Wireless Networks
1 Introduction to Wireless Networks Michalis Faloutsos.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
CWNA Guide to Wireless LANs, Second Edition
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
IEEE WLAN.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
WLAN.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
EA C451 (Internetworking Technologies)
Medium Access Control MAC protocols: design goals, challenges,
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Multiple Access Mahesh Jangid Assistant Professor JVW University.
IEEE : Wireless LANs ALOHA, Slotted ALOHA
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Introduction to Wireless Networks
MAC continued.
Chapter 6 Multiple Radio Access.
Presentation transcript:

1 CSCD 439/539 Wireless Networks and Security CSDA/CA, Frames Lecture 4 Fall 2007 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright

2 Overview MAC Layer –CSMA/CA as opposed to Ethernet’s CSMA/CD –Mandatory and optional implementations of MAC schemes –Practical notes on MAC and alternative schemes

3 Background Last time –Looked at architecture, how stations and AP’s connect within a network –Typically, networks are attached in some way to an Ethernet or wired network Said they differ because many things can interfere with the signal which is broadcast –Compared with wired networks where signal is contained … in the wires

MAC Introduction Key to specification is the Medium Access Control Layer (MAC) –Recall Ethernet nodes sense the medium, transmit if the medium is idle, and listen for collisions (CSMA/CD) –If a collision is detected, after a back-off period, node retransmits the frame –Collision detection is not feasible in WLANs –Node cannot know whether signal was corrupted due to channel interference or actual collision –Thus, IEEE uses Carrier Sense Multiple Access Collision Avoidance (CSMA/CA) Adopts collision avoidance, rather than collision detection

5 Why CSMA/CD Does Not Work Collision detection problems –Hidden terminal Terminals are hidden from each other kind –Exposed terminal Because of interference, terminals don ’ t think they can send to a terminal when they can A B C A B C D HiddenExposed C can’t see A A can’t see C C doesn’t transmit to D because it senses B and A

6 Hidden Terminal Effect Hidden terminals: A, C cannot hear each other –Obstacles in the way or distance –Both transmit to B, collisions at B –Collision if 2 or more nodes transmit at same time CSMA makes sense if: –You’re the only one transmitting –Able to avoid collision if you sense another transmission Yet, collision detection doesn’t work in this case, CSMA/CD – Ethernet style But, simple collision avoidance in CSMA/CA isn’t so good either bits Crash

7 Exposed Terminal Effect Do this on the board …

MAC Specifications Because there are still problems with collisions, has several MAC choices In there are several flavors of Access methods –MAC-DCF CSMA/CA (mandatory) Physical channel sensing Collision avoidance via randomized “back-off” mechanism Minimum distance between consecutive packets ACK packet (not for broadcasts) –MAC-DCF w/ RTS/CTS (optional) Physical AND Virtual channel sensing Distributed Foundation Wireless MAC Avoids hidden terminal problem –MAC- PCF (optional) Access point polls terminals according to a list

MAC Specifications The DCF is the basis of the standard CSMA/CA access mechanisms –Like Ethernet, first checks that radio link is clear before transmitting –To avoid collisions, stations use a random backoff after each frame First transmitter seizes the channel –DCF may use CTS/RTS clearing technique to further reduce the possibility of collisions

MAC Specifications DCF (Distributed Coordination Function) details 1. Carrier Sense Multiple Access Collision Avoidance CSMA/CA –Each unit senses medium before it starts to transmit Called physical channel sensing –If medium is free for several microseconds (DIFS), unit can transmit for a limited time –If medium is busy, unit will back off for a random time before it senses again

11 IEEE Medium Specifications CSMA Version of the Protocol Sense channel idle for DIFS sec (Distributed Inter Frame Space) transmit frame (no Collision Detection) Receiver returns ACK after SIFS (Short Inter Frame Space) if channel sensed busy => binary backoff (like Ethernet) NAV: Network Allocation Vector – essentially a timer is set for other stations See next slide …

12 Carrier Sensing Details requires carrier sensing to determine if medium available. Two types of carriersensing functions in manage this process: –physical carrier-sensing –virtual carrier-sensing functions If either carrier-sensing function indicates medium is busy, MAC reports this to higher layers

13 Carrier Sensing Details Physical carrier-sensing functions provided by physical layer –Depend on medium and modulation used –It is difficult or expensive to build good physical carrier-sensing hardware for RF-based media Transceivers can transmit and receive simultaneously only if they incorporate expensive electronics Most hardware is half-duplex, can’t send/receive at the same time Plus, hidden nodes still possible so physical carrier-sensing cannot provide all the necessary information

14 Carrier Sensing Details Virtual carrier-sensing is provided by the Network Allocation Vector (NAV) –Most frames carry a duration field –Can reserve medium for a fixed time –The NAV is a timer that indicates the amount of time the medium will be reserved –Stations set NAV to time for which they expect to use the medium, –Other stations count down from the NAV to 0 –When NAV is nonzero, virtual carrier-sensing function says medium is busy –When NAV reaches 0, virtual carrier-sensing function says medium is idle

15 Virtual Carrier Sensing with RTS/CTS and NAV NAV is carried in frame headers on the RTS and CTS frames; it is depicted on its own line show NAV relating to actual transmissions in the air. When NAV bar is present on NAV line, stations defer access to medium because virtual carrier-sensing mechanism indicates busy medium

16 To ensure sequence is not interrupted, Node1 sets the NAV in its RTS to block access to the medium while the RTS transmitted All stations hear RTS defer access to medium until NAV elapses RTS frames not necessarily heard by every station in network So, Node2, the receiver of intended transmission responds with CTS that includes shorter NAV This NAV prevents other stations from accessing medium until transmission completes After sequence completes, the medium can be used by any station after distributed interframe space (DIFS), shown by contention window, Backoff Node1 Node2

17 Interframe Spacing Like Ethernet, interframe spacing plays a large role in coordinating access to the transmission medium – uses four different interframe spaces –Three are used to determine medium access SIFS, DIFS, PIFS

18 Interframe Spacing Varying interframe spacings create different priority levels for different types of traffic Logic behind this is simple: –High-priority traffic doesn’t have to wait as long after the medium is idle. –So, if any high-priority traffic waiting, it grabs network before low-priority frames have a chance –To assist with interoperability between different data rates, the interframe space is a fixed amount of time, independent of the transmission speed

19 Interframe Spacing Short interframe space (SIFS) –SIFS used for highest-priority transmissions, such as RTS/CTS frames and positive acknowledgments –High-priority transmissions can begin once the SIFS has elapsed PCF interframe space (PIFS) –PIFS, sometimes erroneously called the priority interframe space, is used by the PCF during contention-free operation –Stations with data in the contention-free period can transmit after the PIFS has elapsed and preempt any contention-based traffic DCF interframe space (DIFS) –DIFS is minimum medium idle time for contention-based services –Stations may have immediate access to the medium if it has been free for a period longer than the DIFS.

20 DCF Backoff After frame transmission has completed and the DIFS has elapsed, stations may attempt to transmit congestion-based data Period called, contention window or backoff window follows the DIFS Window is divided into slots –Slot length is medium dependent –Higher-speed physical layers use shorter slot times –Stations pick a random slot and wait for that slot before attempting to access the medium –All slots are equally likely selections –When several stations are attempting to transmit, the station that picks the first slot (the station with the lowest random number) wins. –As in Ethernet, backoff time is selected from a larger range each time a transmission fails

21 DCF Backoff Continued … Contention window sizes are always 1 less than a power of 2 –e.g., 31, 63, 127, 255 –Each time the retry counter increases, the contention window moves to the next greatest power of two –The maximum size of the contention window is limited by the physical layer –For example, the DS physical layer limits the contention window to 1023 transmission slots

22 DCF Backoff Finished When contention window reaches its maximum size, it remains there until it can be reset –Allowing long contention windows when several competing stations are trying to transmit keeps MAC algorithms stable even under maximum load –Contention window is reset to its minimum size when frames are transmitted successfully, or associated retry counter is reached, and the frame is discarded

23 Practical MAC Advice

24 Practical MAC Hidden Node Problem –Other solutions to this problem –Increase power to nodes Increasing the power of the nodes can solve the hidden node problem by allowing the cell around each node to increase in size, encompassing all of the other nodes. –Use omnidirectional antennas Since nodes using directional antennas are nearly invisible to nodes that are not positioned in the direction the antenna is aimed at, directional antennas should be used only for very small networks (e.g., dedicated point-to-point connections).

25 Practical MAC Hidden Node Problem –Other solutions to this problem Remove Obstacles –Increasing the power on your mobile nodes may not work if, for example, the reason one node is hidden is that there is a cement or steel wall preventing communication with other nodes Move the Node –Another method of solving the hidden node problem is moving the nodes so that they can all hear each other. If you have found that the hidden node problem is the result of a user moving his computer to an area that is hidden from the other wireless nodes, you may have to force that user to move again.

26 Practical MAC Frottle (Freenet throttle) is an open source GNU GPL project to control traffic on wireless networks –Such control eliminates the common hidden-node effect even on large scale wireless networks Frottle works by scheduling traffic of each client, using a master node to co-ordinate actions –Eliminates collisions, and prevents clients with stronger signals from receiving bandwidth bias Frottle developed and tested on large community wireless network of WaFreeNet We have found running frottle has given us a significant improvment in the network usability

27 Practical MAC More thoughts … 1. RTS/CTS has very high overhead, particularly for small packets and where stations have variable rates. May be prohibitively expensive to use 2. Most current deployments of are based on a cellular infrastructure, and are not ad hoc Neighboring cells are usually configured to operate on different channels (frequencies) explicitly so hidden terminal problems on the downlink (to the wireless LAN clients) are actually rare On the uplink, hidden terminals could occur, but often these packets are small (e.g., TCP ACKs) and the RTS/CTS overhead is then significant

28 Practical MAC 3. In practice, many commercial WiFi cards can sense carrier as “busy” even when they can’t decode the bits, reducing the need for explicit reservations An entirely different approach to sharing wireless channels is to allocate access by time. This approach used in some cellular telephone networks, where base station determines a transmission time-schedule for clients In general, at high loads, time division makes sense; otherwise, slots are wasted Avoiding this waste in TDMA usually makes protocols more complex. At the same time, CSMA based approaches don’t perform too well when there is heavy, persistent load from a large number of nodes. Much work has been done in the community on MAC protocols, including on hybrid CSMA/TDMA protocols Ref.:

29 Measurement of RTS/CTS and CSMA/CA Other papers relating to hidden node problem and performance of MAC – Looks at timing of backoff slots as solution – Protocol booster – WiCCP is a protocol booster for b DCF based wireless networks, that provides cyclic token-passing medium access, and scheduled allocation of the available network resources, eliminating the "Hidden Node" problem.

30 Summary Looked at MAC part of –Problems encountered not found in wired networks –More complicated way of dealing with collisions on broadcast radio networks –Also, practical ways of avoiding collisions –Some research in this area …

31 Finish Next time Gone on Wed. - Conference See reading on Course Notes page Assignment – Assignment page