Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
Contents IEEE MAC layer operation Basic CSMA/CA operation
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Network Technology CSE Network Technology CSE3020 Week 9.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Network Topologies An introduction to Network Topologies and the Link Layer.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Opersating Mode DCF: distributed coordination function
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Improving the scalability of MAC protocols in Wireless Mesh Networks Mthulisi Velempini (Mr.)
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Wireless Media Access Protocols Hari Balakrishnan LCS and EECS Massachusetts Institute of Technology
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Multiple Access Methods
Wireless Sensor Networks 4. Medium Access
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
EA C451 (Internetworking Technologies)
Medium Access Control MAC protocols: design goals, challenges,
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
Wireless Communication and Networks
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Multiple Access Methods
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
Multiple Access Methods
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Presentation transcript:

Wireless Medium Access

Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively interfere with each other at the receiver  Receiver will “hear” the sum of the two signals (which usually means garbage)

Medium Access Control  Protocol required to coordinate access I.E. transmitters must take turns  Similar to talking in a crowded room  Also similar to hub based Ethernet

Carrier Sense Multiple Access (CSMA)  Procedure Listen to medium and wait until it is free (no one else is talking) Wait a random back off time then start talking  Advantages Fairly simple to implement Functional scheme that works  Disadvantages Can not recover from a collision (inefficient waste of medium time)

Carrier Sense Multiple Access with Collision Detection (CSMA-CD)  Procedure Listen to medium and wait until it is free Then start talking, but listen to see if someone else starts talking too If a collision occurs, stop and then start talking after a random back off time  This scheme is used for hub based Ethernet  Advantages More efficient than basic CSMA  Disadvantages Requires ability to detect collisions

Collision Detection Problem  Transmit signal is MUCH stronger than received signal  Due to high path loss in the wireless environment (up to 100dB)  Impossible to “listen” while transmitting because you will drown out anything you hear  Also transmitter may not even have much of a signal to detect due to geometry

Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA)  Procedure Similar to CSMA but instead of sending packets control frames are exchanged RTS = request to send CTS = clear to send DATA = actual packet ACK = acknowledgement

Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA)  Advantages Small control frames lessen the cost of collisions (when data is large) RTS + CTS provide “virtual” carrier sense which protects against hidden terminal collisions (where A can’t hear B) AB

Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA)  Disadvantages Not as efficient as CSMA-CD Doesn’t solve all the problems of MAC in wireless networks (more to come)

Random Contention Access  Slotted contention period Used by all carrier sense variants Provides random access to the channel  Operation Each node selects a random back off number Waits that number of slots monitoring the channel If channel stays idle and reaches zero then transmit If channel becomes active wait until transmission is over then start counting again

DCF Example data wait B1 = 5 B2 = 15 B1 = 25 B2 = 20 data wait B1 and B2 are backoff intervals at nodes 1 and 2 cw = 31 B2 = 10 © 2002 Nitin Vaidya, UIUC

Contention Window  Random number selected from [0,cw]  Small value for cw Less wasted idle slots time Large number of collisions with multiple senders (two or more stations reach zero at once)  Optimal cw for known number of contenders & know packet size Computed by minimizing expected time wastage (by both collisions and empty slots) Tricky to implement because number of contenders is difficult to estimate and can be VERY dynamic

Adaptive Contention Window  adaptively sets cw Starts with cw = 31 If no CTS or ACK then increase to 2*cw+1 (63, 127, 255) Reset to 31 on successful transmission  adaptive scheme is unfair Under contention, unlucky nodes will use larger cw than lucky nodes (due to straight reset after a success) Lucky nodes may be able to transmit several packets while unlucky nodes are counting down for access  Fair schemes should use same cw for all contending nodes (better for high congestion too)

DCF (CSMA-CA)  Full exchange with “virtual” carrier sense (called the Network Allocation Vector) RTS CTS DATA ACK Sender Receiver SenderReceiver A B A B NAV (RTS) NAV (CTS)

Virtual Carrier Sense  Provided by RTS & CTS  Designed to protect against hidden terminal collisions (when C can’t receive from A and might start transmitting)  However this is unnecessary most of the time due to physical carrier sense A B C RTSCTS

Physical Carrier Sense Mechanisms  Energy detection threshold Monitors channel during “idle” times between packets to measure the noise floor Energy levels above the this noise floor by a threshold trigger carrier sense  DSSS correlation threshold Monitors the channel for Direct Sequence Spread Spectrum (DSSS) coded signal Triggers carrier sense if the correlation peak is above a threshold More sensitive than energy detection (but only works for transmissions)  High BER disrupts transmission but not detection

Physical Carrier Sense Range  Carrier can be sensed at lower levels than packets can be received Results in larger carrier sense range than transmission range More than double the range in NS simulations  Long carrier sense range helps protect from interference Receive Range Carrier Sense Range

Hidden Terminal Revisited  Virtual carrier sense no longer needed in this situation A B C RTSCTS Physical Carrier Sense

RTS CTS Still Useful Sometimes  Obstructed hidden terminal situation  Fast collision resolution for long data packets A B

Exposed Terminal Problem  Hidden terminal is not the only challenge for a distributed wireless MAC protocol  A blocks B, and C doesn’t know what is happening (B is exposed) A BC D

Double Exposure Problem  If A and C are out of phase, there is NO time D can transmit without causing a collision A B D C