Existing MACs for Wireless nets Note: in last class I said that the noise floor in 802.11b was -110 dBm) That was wrong, it was 100 dBm. Thermal = 173.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Contents IEEE MAC layer operation Basic CSMA/CA operation
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Wireless LAN (not assessed) Dr Sandra I. Woolley.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
Network Technology CSE Network Technology CSE3020 Week 9.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
Wireless Networking So we talked about wired networks. What about wireless?
Introduction to Wireless LANs: Supports both Asynchronous data transfer and time bound services Asynchronous: traffic insensitive to time.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
802.11g & e Presenter : Milk. Outline g  Overview of g  g & b co-exist QoS Limitations of e  Overview of.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Chapter 6 Multiple Radio Access
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
MAC for WLAN Doug Young Suh Last update : Aug 1, 2009 WLAN DCF PCF.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
ECEN 489, Prof. Xi Zhang Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 11.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
EA C451 (Internetworking Technologies)
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
IEEE : Wireless LANs ALOHA, Slotted ALOHA
CS 457 – Lecture 7 Wireless Networks
Protocols and the TCP/IP Suite
Chapter 6 Medium Access Control Protocols and Local Area Networks
Protocol Details John Bellardo UCSD.
Chapter 6 Multiple Radio Access.
Presentation transcript:

Existing MACs for Wireless nets Note: in last class I said that the noise floor in b was -110 dBm) That was wrong, it was 100 dBm. Thermal = 173 dBm/Hz Bandwidth = 10log10(20e6) = 10log10(2) + 10log10(1e7) = 73 dB Giving 100 dBm

Basic media access control DCF DCF – distribution coordination function Basic medium access protocol All implementations must support DCF

Wireless MAC Aloha – inefficient CSMA – listen before sending –Hidden node problem –Expose node problem Hidden node exposed node

Medium Access Collision Avoidance (MACA/MACAW ) RTS-CTS-Data-ACK Exposed nodes The media supports both A and D transmitting simultaneously. But the MAC does not The media supports both B and C transmitting simultaneously. But the MAC does not The above arguments are not true if we require ACKs. In wireless networks, it is very difficult to not have ACKs. And we will see that in some cases, higher data rates are permitted if acks are used. In this case, all transmission are two-way, and so there is no exposed node.

Basic Problems of MACA Overhead (we’ll see this later) If the CTS is not decoded, it does not mean that the node will not interfere. Example –Suppose that the noise floor is -100 dBm and the receiver needs 7 dB or more SNR or SNIR. And suppose 40 loss in the first meter –H A,B = -64 dB –A transmits at 15 dBm –So B receives A’s transmissions at -89 dBm (well above the SNR limit, we could even use a higher data rate) –H C,B =-70 dB –B transmits CTS at 15 dBm –C receives CTS at -95 dBm and is unable to decode –C transmits and B receives interference at -95 dBm. –The SNIR at B is 6 dB, not enough for 1Mbps (much less the higher data rate that was selected). A BC data

Interference with RTS/CTS More details –C will transmit if it does not hear B’s CTS. The received signal strength at B is the same that C could not receive, so it cannot be a very strong signal –How strong can it be? –Suppose that C is listening, there is interference from many transmitters so it cannot hear anything B’s CTS even though the signal is very strong. Then C could cause very high interference. –Solution: clear channel assessment (one type) if C hears a strong signal, even if it cannot decode it, it cannot transmit for a short period, to allow B to receive (even if B is not receiving) –The interference at B is the same as the signal strength received by C from B (but unable to decode). –Option 1 If C hears even a weak signal, then don’t transmit Drawback: this will cause exposed node –Option 2 If C hears a stronger signal, then don’t transmit Drawback: B might receive strong interference – defines a strong signal as around -75 dBm. Which is quite strong, and implies that B can expect interference of nearly -75 dBm! It is difficult to imagine a setting where this is useful for interference from (it could be from some other source). In , if the received signal strength is -75 dBm, it should likely be decodable (unless sent at high data rate, but CTS are always sent at low data rate) –In conclusion, C will receive B’s CTS when the SNIR is high enough. If the interference at C is strong, then C could cause strong interference.

Overhead in (ignoring backoff) Packet arrives from network layer DIFS Check that the channel is idle RTS RTS arrives at receiver SIFS CTS CTS arrives at sender SIFS Data data arrives at receiver SIFS ACK done NAV

Frame formats –RTS (20B) Frame control (2B) –Protocols version (2bits) ( = 00, so if not 00, then the following means something different) –Type (2 bits)- management, control,data, reserved –subtype (4bits), e.g., control|RTS, management|beacon,… –To DS (DP) (1 bit) –From DS (1bit) –More frag (1b) –This is a Retry (1b) –Pwr mgt (1b) (=1 means the STA will go to power save (i.e., periodic sleep) after the frame is received) –More data (1b) – if a STA is in power save mode, then this is sued to signify that more data is waiting, so maybe the STA should wake up and get the data!) –Protected frame (1b) (WEP, etc.) –Order (1b) –Duration / ID (2B) (but MSB is zero, so 15 bits for the duration) in microsec (rounded up) (ID is used in power save mode) –RA receiver address (6B) –TA transmitter address (6B) –FCS – CRC-32 (4B) –CTS (14B) –Frame control –Duration = duration in RTS – time to transmit CTS – 1 SIFS –RA (no transmit address) –FCS –ACK (14B) –Frame control –Duration = 0 unless it is an ACK one for several more frames of a fragmented packet –RA –FCS –Data frame 34B overhead –Frame control (2B) –Duration (2B) –Address 1 (6B) –Address 2 (6B) –Address 3 (6B) (homework, what are these addresses used for) –Sequence control 2B (for fragmenting) –Address 4 (6B) –Frame body, up to 2312B –FCS 4B Frame sizes (and contents) MAC frames are called MPDU (MAC protocol Data Unit)

Physical Protocol Data Unit (802.11b) PLCP (phy layer convergence protocol = phy with MAC frame inside) PLCP preamble (144 bits) –SYNC (128b) – to let the physical layer acquire sync (transmitter actually begins transmitting before this. This period is called ramp up where the transmitter goes from 0 zero to full/desired power. This typically takes ~ 1us) –SFD (16b)– like a radio ID, IEEE has SFD-F3A0hex PLCP header (48 bits) –Signal (8b) – specifies the modulation –Service (8b) – reserved –Length (16b) in micro seconds –CRC (16b) PLCP SYNC and header always take 192 us MPDU (MAC protocol data unit) or PSDU (PLCP service Data unit)

Short PLCP (optional) Preamble – 72 bits at 1 Mbps PLCP header – 48 bits at 2Mbps The preamble and header at 96 us MPDU / PSDU at 2, 5.5, … Mbps –Since the PLCP is sent at 2 Mbps, the channel must be able to support 2 or more Mbps –In practice the short header does not work well unless the channel is very good.

g PLCP preamble and header are similar to b PSDU –Long Training sequence 1.6 us guard interval Long training symbol (3.2 us) Long training symbol (3.2us) (again) Total = 8 us –OFDM signal Guard interval 0.8 us (why why why is it reduced to 8 us?) Signal 3.2 us Total 4 us Transmitted at 6 Mbps OFDM modulation – which is the worst performing modulation – it has the same SNR-BER relationship at 9 and 12 Mbps. –Data –6 us of quiet time (time to decode) to SIFS is 16 us

overhead Four 192b from PLCP –At 1Mbps = 192 microsec so 768 microsec 82B from RTS, CTS, ACK, data –656 mic sec at 1Mbps –328 micro sec at 2Mbps –131 at 5Mbps –60 at 11Mbps –12 at 54Mbps 1 DIFS, 3 SIFS, 4 propagation delays –30 microsec + 3*20 micro + 4*2 microsec = 98 microsec Total overhead time –1552 mic sec at 1Mbps –1194 micro sec at 2Mbps –997 at 5Mbps –925 at 11Mbps –878 at 54Mbps Data duration –40B packet 320 mic at 1Mbps => efficiency data duration over all duration = 17% 160 2Mpbs => 11% 64 => 6% 29 => 3% 6 at 54 Mbps => 0.6% –1500B packet mic at 1Mbps => 89% Mpbs => 83% 2400 => 70% 1090 => 54% 222 at 54 Mbps => 20% Small packets and high data rates are a problem. Increasing packet size would help efficiency (similar things occur in wired TCP) can transmit multiple frames with one set of overhead

overhead w/o RTS/CTS two 192b from PLCP –At 1Mbps = 192 microsec so 384 microsec 14B from RTS, CTS, ACK, data –112 mic sec at 1Mbps –56 micro sec at 2Mbps –22 at 5Mbps –10 at 11Mbps –2 at 54Mbps 1 DIFS, 1 SIFS, 1 propagation delays –30 microsec + 20 micro + 2 microsec = 52 microsec Total overhead time –548 mic sec at 1Mbps –492 micro sec at 2Mbps –458 at 5Mbps –446 at 11Mbps –438 at 54Mbps Data duration –40B packet 320 mic at 1Mbps => efficiency data duration over all duration = 36% 160 2Mpbs => 24% 64 => 12% 29 => 6% 6 at 54 Mbps => 1% –1500B packet mic at 1Mbps => 96% Mpbs => 92% 2400 => 83% 1090 => 70% 222 at 54 Mbps => 33%\ If the packet is smaller than RTSThreshold, then RTS/CTS are not used

without RTS/CTS See write-up

Contention When a collision does occur, the transmitters must back-off Also, if a node desires to transmit (i.e., a frame is received from the upper layer), and it finds the channel busy, it should no transmit as soon as the channel is free. Random backoff –Backoff time = Random()*SlotTime –Random uniform on [0,CW] –CWMin(7) <= CW <= CWMax (1023) – depending on the previous contention experienced during this transmission –SlotTime = 20 us (CW=1023 -> ~10 ms of idle time between transmission attempts. At 1Mbps, this is a bit more than one 1500B packet.) –The backoff is a timer, for ever slot time that is DIFS after the channel is not busy, the timer decrements. –When the time reaches 0, the node attempts to transmit. –If the transmission fails, CW is doubled (but is never greater than CWMax) –After a successful transmission or the so many attempts were tried that the packet was dropped, CW = CWMin

Max number of transmissions If an RTS fails to generate a CTS, then the Short Retry count is incremented, until is reaches the short_retry_limit If the pkt size is below RTSThreshold (so no RTS is transmitted), and fails to generate an ACK, then the Short retry count is incremented –When small data pkt is successful, the short retry count is reset to zero If pkt size is above RTSThreshold and fails to result in an ACK, then the long retry is incremented. If the pkt is successfully transmitted, then long retry count is reset to 0 If a pkt is dropped due to too many failed attempts, the retry counters are set to zero

Using ACKs to increase data rate Envelop analysis –Suppose that the pkt error prob for 10 Mbps is 0 and the pkt error prob for 20 Mbps is –The effective data rate at 10 Mbps is 10 Mbps, and at 20, is 0.75*20 > 10, so 20 is better, even though there will be many losses and retransmissions. When a transmission fails, it must wait DIFS and then back off Suppose an empty channel –DIFS, Data, SIFS, ACK –If Fails, then wait, [0,7]*SlotTime and repeat the above –If Fails again, then wait, [0,13]*SlotTime and repeat the above

PCF – point coordination function Provide contention free (CFP) access Also, allows contention (CP) AP is master – it polls STAs The beacon is used to set STA’s NAV The AP does not have to use PCF. But if it does, the STAs must obey. But they will anyway, since it obeys DCF When a STA joins, it announces whether it can be polled. The AP may select to only transmit data during the CF and force STAs to use the CP to transmit All transmission must be ACKed. –If no ACK is received, the AP can retransmit the next time the AID comes up (AID = association ID) –The AP can retransmit after waiting at least PIFS

PCF – centrally controlled access When the AP wants to transmit, it waits for the current transmission to complete and then waits for PIFS and begins to transmit (the PCF may have to wait a long time to begin the CFP). Since the PIFS is smaller than the DIFS, the AP will always get the channel over the mobile hosts. When the AP has control of the channel it is called the contention-free period (CFP). Then the AP is not in a CFP, then hosts can use the DCF to transmit. The CFP begins with the AP sending a beacon. During the CFP the AP polls the mobile hosts Beacon –Timestamp (64b), beacon interval (units are 1024microsec) (16b) and capability info –CFP max duration – every mobile host saves this info into its NAV. –Service set ID (SSID), supported rates, phy parameters, CF parameters, IBSS parameters, traffic indication map –802.11d Country info and hopping pattern parameters –801.22e QBSS and EDCA parameters –802.11g ERP info –802.11h Power constraint, supported channels, channel switch announcement and quiet info –802.11i RSN info

CFP beacon PIFS Data+CF-poll PIFSSIFS Data+CF-ACK from station1 Data+CF-ACK+CF-poll PIFS SIFS Data+CF-ACK from station1 Data+CF-ACK+CF-poll PIFS Data+CF-ACK+CF-poll PIFS SIFS Data+CF-ACK from station1 Data+CF-poll No ack Data+CF-ACK+CF-poll PIFS SIFS ACK+CF from station CF-ACK+CF-poll PIFS Data+CF-poll CF-ACK+CF-end PIFS All nodes update their NAV Trans error No data sent, but data was received Station had no data to send, so AP regains control after PIFS End of CFP One problem is that the mobile station may send very large packets at slow rates and hence use the channel for a long time All nodes update their NAV to us

Tim and DTim A CFP will occur after a beacon. But it does not occur after every beacon Every few beacons is a DTIM and every few DTIMs is a CFP In the TIM is a bit string with a 1 if the STA with the AID corresponding to the bit number has a data packet ready to delivery from the AP. –This string is 2008 bits long. –Node not in the list can sleep Since beacons are transmitted after listening, the CFP might be a bit late If the channel found to be busy, then the AP backoff between 0 and CWMin. This is to reduce collisions with other APS

Transmit Power control (TPC) in – h a is at 5GHz, so it might interfere with other users a is not the primary user of 5GHz. To control the impact of a on these other spectrum users, a must attempt to reduce the power and the AP must monitor the total power over all mobile nodes. Note that all a cards must have the capability to control transmission power. Power control is communicated via a new frame called the action frame The mobile maintains a variables local power constraint and country RF power constraint channel TX power. The later depends on the country and the channel. The former is received from the AP. The mobiles transmit power is country RF power constraint channel TX power - local power constraint. The mobile will report to the AP –Its min and max possible transmission power –The current transmit power –Current average link margin The AP will also demand that the mobiles are quiet so radars can be detected h supports changing to a different channel if there is not enough power allowance on the current channel. Also, a mobile might be rejected from joining a BSS if there are power problems (but this is not specified in the spec)

types a,b,g h = a with power/spectrum control d international operation f mobility, inter-AP communication e QoS i security enhancements s mesh

Features in e 8 priority classes Hybrid coordination function –Contention free period (CFP) and contention period During the contention period, the AP may still gain control and poll nodes. During CP the AP may poll all nodes but with specific priority with a single poll. In this way the nodes with high priority can compete among each other and not with low priority traffic. –During the controlled contention, nodes can only send requests for transmission ops (TXOPs) –The requests are replied to with acks from the ap –The AP polls nodes and issues TXOPs (transmit opportunities) –The CFP ends with at the time specified in the initial beacon or when a CFP end packet is sent –Within packet header is a place for node’s queue size as well as a place to request a TXOP. –Thus, the AP knows all queue sizes (but it only know the aggregate of each nodes queue size, not each priority class queue.

Features of e Enhanced DCF –Each nodes has 4 or 8 queues – one for each priority class –The queues compete for the channel internally –If the queue collide, then they increase their CW. But high priority queues increase there CW more slowly than low priority queues Block ACKs –Instead of ACKing every packet, it is possible to ack several packets. –The block ack contains the list on packets ACKed. –The block ACK can be requested –Or it can automatically occur at the end of the transfer, in which case the block ack is acked. No ACK

BSS A BSS is the set of nodes associated with an AP An IBSS is an ad hoc BSS A DS (distribution system) connects the BSS to other BSS and forms a EBSS –But usually the BSS do not directly communicate and so the BSSs are independent, and don’t form a EBSS. –But this might not be the case in future networks To support mobility To support QoS/hi-capacity

Associated First a client must be associated Then it become authenticated

/ WiMax The original WiMAX standard, IEEE , specifies WiMAX in the 10 to 66 GHz range a added support for the 2 to 11 GHz. IEEE provides up to 50 km (31 miles) data rates up to 70 Mbit/s "last mile" connectivity

Frame Control Header (FCH), Frame Control Header (FCH), specifies the burst profile and the length of one or more DL bursts The DL-MAP, UL-MAP, DL Channel Descriptor (DCD), UL Channel Descriptor (UCD), and other broadcast messages that describe the content of the frame are sent at the beginning of these first bursts. The remainder of the DL subframe is made up of data bursts to individual SS’s Each data burst assigned a burst profile that specifies the code algorithm, code rate, and modulation level that are used for those data transmitted within the burst