802.11 protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Ethernet, Wireless LAN. Ethernet Frame Format (a) DIX Ethernet, (b) IEEE
Contents IEEE MAC layer operation Basic CSMA/CA operation
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Module C- Part 1 WLAN Performance Aspects
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Wireless Networking So we talked about wired networks. What about wireless?
Introduction to Wireless LANs: Supports both Asynchronous data transfer and time bound services Asynchronous: traffic insensitive to time.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Power Management in Presented by Sweta Sarkar June 17 th, 2002.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
Exercises. Problem 1 The link delay is 270ms. Each data frame is 1000 bits. Data rate is 1Mbps. What is the link efficiency of the Stop&Wait protocol?
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
1/23 Power Management in IEEE Yu-Chee Tseng.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
MAC for WLAN Doug Young Suh Last update : Aug 1, 2009 WLAN DCF PCF.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Outline What is Wireless LAN Wireless Transmission Types
Wireless MAC.
Wireless MAC.
EA C451 (Internetworking Technologies)
Lab 7 – CSMA/CD (Data Link Layer Layer)
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
Topics in Distributed Wireless Medium Access Control
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
CS 457 – Lecture 7 Wireless Networks
EEC-484/584 Computer Networks
Power Management in IEEE
Chapter 6 Medium Access Control Protocols and Local Area Networks
Protocol Details John Bellardo UCSD.
MAC continued.
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
Presentation transcript:

protocol continued

DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for DIFS, and if channel is clear, send. – This is to avoid the unnecessary wait when the medium is not congested. – But, after every successful packet transmission, should start a backoff. (imagine the node is listening to the medium when it is also transmitting. It has another packet to send, but the medium is busy, so, it should follow the protocol to first wait for DIFS when backoff.)

DCF Yet another optimization. Suppose you have a packet to send, sensed medium to be busy, then you generate a random number, say, 6, and wait. After medium is free for DIFS and 2 time slots, someone else started transmitting. Your backoff counter is 4 at this time. What should you do? First, wait for DIFS. Then, start counting down from 4. NOT generate a new random number! This is basically to say that people who has been waiting for some time likely have higher priorities the next time medium is free.

DCF What should we do if a packet is lost? Meaning that we did not get ACK for this packet? Currently in , if a packet is lost, CW = CW * 2. CWMin = 15. CWMax = CW is reset to CWMin after every successful transmission. Basically, copying Ethernet.

DCF Slot time – b, 20us – a, 9us – g, 9us (fast slot time) SIFS: – b, 10us. – a, 16us. – g, 10us. DIFS = SIFS + 2*SLOT

EIFS ``The EIFS is derived from the SIFS and the DIFS and the length of time it takes to transmit an ACK frame at 1 Mbit/s by the following equation: EIFS = aSIFSTime + (8 x ACKSize) + aPreambleLength + aPLCPHeaderLngth+ DIFS ’’ Why having EIFS? Consider the case: – A< AP B – AP sends to A, A got it – B noticed medium busy, but did not get the packet from the AP correctly so it does not know how long to wait until the ACK is sent. B cannot hear A, so if A sends ACK, B will think that the medium is free and may send a packet, so the AP cannot get the ACK from A! – So the solution is, if you didn’t get the packet header correctly, wait for EIFS.

DCF After attempted for several times, if a packet still cannot get through, drops that packet. In some wireless cards, the retry maximum is only 1. Why abort? Consider two hidden stations, A and B, both want to send to the AP. They will start to send at the same time, and the AP won’t get the packets. So both A and B will retry. And will fail again. If we don’t set a limit to it, this will happen forever.

BSS, DS Typically, an LAN is organized into a cellular structure, where each cell is called a Basic Service Set (BSS), controlled by the base station called the Access Point (AP). The AP is connected to a Distribution System (DS) typically by Ethenet.

Frame format All frames follow the following formats: – |Preamble|PLCP header| MAC data|CRC| Preamble: – Alternating 0s and 1s, followed by a bit pattern indicating the beginning of a frame

Frame format PLCP (physical layer control procedure ) header: – length of the packet – Bit rate used – Header CRC MAC header – Check the link provided earlier

Beacon signal The AP periodically send beacon signals to announce things like – Beacon interval – Time stamp – Service set identifier (SSID) – Supported rates – Parameter sets, like channel number – Capability info – TIM How to make sure that the AP can send this beacon signal roughly in time? – PIFS = SIFS+SLOT

Joining a BSS When a station wishes to join a BSS, it can either – wait for the beacon signal broadcast by the AP – Or actively send a request (Probe request) and the AP will reply with probe response Then, authenticate the station Then, associate with the BSS

Power saving For laptops, cellphones, battery is important. They can enter the power saving mode. Basically, the AP can buffer their packets, and send in the beacon signal about these packets. The stations should periodically wake up to receive the beacon signal and if the beacon signal says they have packets, they should stay awake to receive the packets.

Rate Adaptation Wireless nodes may have different channels, some strong, some weak a and g: 6, 9, 12,18, 24,36,48,54 Mbps b: 1, 2, 5.5, 11 Mbps. Which rate should you choose? Higher data rate requires stronger channels. You should select a rate that most suitable for your channel. If you select a rate that is above the channel can take, the Packet Error Ratio is going to be high.

Rate Adapation The MadWifi code: From “Improving Loss Resilience with Multi- Radio Diversity in Wireless Networks” in Mobicom 2005.