CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Medium Access Issues David Holmer
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
Lecture 9: Multiple Access Protocols
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Broadcast network access control Some slides used.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Lecture 4 Wireless Medium Access Control
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Decoding Collisions Shyamnath Gollakota Dina Katabi.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Ethernet: Distributed Packet Switching for Local Computer Networks Authors: Robert M. Metcalfe and David R. Boggs Presentation: Christopher Peery.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Network Technologies essentials Week 3: Retransmission, sharing links, switching Compilation made by Tim Moors, UNSW Australia Original slides by David.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Multiple Access.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
The Medium Access Control Sublayer
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Topic Multiplexing is the network word for the sharing of a resource
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Hidden Terminal Decoding and Mesh Network Capacity
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Decoding Collisions Shyamnath Gollakota Dina Katabi.
Distributed Systems 6. Medium Access Control Sublayer
Presentation transcript:

CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is in charge; this is a distributed system

CSE 461 University of Washington2 Topic (2) We will explore random multiple access control (MAC) protocols – This is the basis for classic Ethernet – Remember: data traffic is bursty Zzzz..Busy!Ho hum

CSE 461 University of Washington3 ALOHA Network Seminal computer network connecting the Hawaiian islands in the late 1960s – When should nodes send? – A new protocol was devised by Norm Abramson … Hawaii

CSE 461 University of Washington4 ALOHA Protocol Simple idea: – Node just sends when it has traffic. – If there was a collision (no ACK received) then wait a random time and resend That’s it!

CSE 461 University of Washington5 ALOHA Protocol (2) Some frames will be lost, but many may get through… Good idea?

CSE 461 University of Washington6 ALOHA Protocol (3) Simple, decentralized protocol that works well under low load! Not efficient under high load – Analysis shows at most 18% efficiency – Improvement: divide time into slots and efficiency goes up to 36% We’ll look at other improvements

CSE 461 University of Washington7 Classic Ethernet ALOHA inspired Bob Metcalfe to invent Ethernet for LANs in 1973 – Nodes share 10 Mbps coaxial cable – Hugely popular in 1980s, 1990s : © 2009 IEEE

CSE 461 University of Washington8 CSMA (Carrier Sense Multiple Access) Improve ALOHA by listening for activity before we send (Doh!) – Can do easily with wires, not wireless So does this eliminate collisions? – Why or why not?

CSE 461 University of Washington9 CSMA (2) Still possible to listen and hear nothing when another node is sending because of delay

CSE 461 University of Washington10 CSMA (3) CSMA is a good defense against collisions only when BD is small X

CSE 461 University of Washington11 CSMA/CD (with Collision Detection) Can reduce the cost of collisions by detecting them and aborting (Jam) the rest of the frame time – Again, we can do this with wires X X X X Jam!

CSE 461 University of Washington12 CSMA/CD Complications Want everyone who collides to know that it happened – Time window in which a node may hear of a collision is 2D seconds X

CSE 461 University of Washington13 CSMA/CD Complications (2) Impose a minimum frame size that lasts for 2D seconds – So node can’t finish before collision – Ethernet minimum frame is 64 bytes X

CSE 461 University of Washington14 CSMA “Persistence” What should a node do if another node is sending? Idea: Wait until it is done, and send What now?

CSE 461 University of Washington15 CSMA “Persistence” (2) Problem is that multiple waiting nodes will queue up then collide – More load, more of a problem Now! Uh oh

CSE 461 University of Washington16 CSMA “Persistence” (3) Intuition for a better solution – If there are N queued senders, we want each to send next with probability 1/N Send p=½Whew Send p=½

CSE 461 University of Washington17 Binary Exponential Backoff (BEB) Cleverly estimates the probability – 1st collision, wait 0 or 1 frame times – 2nd collision, wait from 0 to 3 times – 3rd collision, wait from 0 to 7 times … BEB doubles interval for each successive collision – Quickly gets large enough to work – Very efficient in practice

Classic Ethernet, or IEEE Most popular LAN of the 1980s, 1990s – 10 Mbps over shared coaxial cable, with baseband signals – Multiple access with “1-persistent CSMA/CD with BEB” CSE 461 University of Washington18

CSE 461 University of Washington19 Modern Ethernet Based on switches, not multiple access, but still called Ethernet – We’ll get to it in a later segment Switch Twisted pair Switch ports

CSE 461 University of Washington20 Topic How do wireless nodes share a single link? (Yes, this is WiFi!) – Build on our simple, wired model Send?

CSE 461 University of Washington21 Wireless Complications Wireless is more complicated than the wired case (Surprise!) 1.Nodes may have different areas of coverage – doesn’t fit Carrier Sense » 2.Nodes can’t hear while sending – can’t Collision Detect » ≠ CSMA/CD

CSE 461 University of Washington22 Different Coverage Areas Wireless signal is broadcast and received nearby, where there is sufficient SNR

Hidden Terminals Nodes A and C are hidden terminals when sending to B – Can’t hear each other (to coordinate) yet collide at B – We want to avoid the inefficiency of collisions CSE 461 University of Washington23

Exposed Terminals B and C are exposed terminals when sending to A and D – Can hear each other yet don’t collide at receivers A and D – We want to send concurrently to increase performance CSE 461 University of Washington24

CSE 461 University of Washington25 Nodes Can’t Hear While Sending With wires, detecting collisions (and aborting) lowers their cost More wasted time with wireless Time XXXXXXXXX Wireless Collision Resend X X Wired Collision Resend

Possible Solution: MACA MACA uses a short handshake instead of CSMA (Karn, 1990) – uses a refinement of MACA (later) Protocol rules: 1.A sender node transmits a RTS (Request-To-Send, with frame length) 2.The receiver replies with a CTS (Clear-To-Send, with frame length) 3.Sender transmits the frame while nodes hearing the CTS stay silent – Collisions on the RTS/CTS are still possible, but less likely CSE 461 University of Washington26

CSE 461 University of Washington27 MACA – Hidden Terminals A  B with hidden terminal C 1.A sends RTS, to B DCB A

CSE 461 University of Washington28 MACA – Hidden Terminals (2) A  B with hidden terminal C 2.B sends CTS, to A, and C too DCB A RTS

CSE 461 University of Washington29 MACA – Hidden Terminals (3) A  B with hidden terminal C 2.B sends CTS, to A, and C too DCB A RTS CTS Alert!

CSE 461 University of Washington30 MACA – Hidden Terminals (4) A  B with hidden terminal C 3.A sends frame while C defers Frame Quiet...

CSE 461 University of Washington31 MACA – Exposed Terminals B  A, C  D as exposed terminals – B and C send RTS to A and D DCB A

CSE 461 University of Washington32 MACA – Exposed Terminals (2) B  A, C  D as exposed terminals – A and D send CTS to B and C DCB A RTS

CSE 461 University of Washington33 MACA – Exposed Terminals (3) B  A, C  D as exposed terminals – A and D send CTS to B and C DCB A RTS CTS All OK

CSE 461 University of Washington34 MACA – Exposed Terminals (4) B  A, C  D as exposed terminals – A and D send CTS to B and C DCB A Frame

ZigZag Exploits ’s behavior Retransmissions  Same packets collide again Senders use random jitters  Collisions start with interference-free bits ∆1 ∆2 PaPa PbPb PaPa PbPb Interference-free Bits

How Does ZigZag Work? ∆1 ∆2 Find a chunk that is interference-free in one collisions and has interference in the other 1 1 ∆1 ≠∆2 Decode and subtract from the other collision 1 1

∆ ∆1 How Does ZigZag Work? Find a chunk that is interference-free in one collisions and has interference in the other ∆1 ≠∆2 Decode and subtract from the other collision

∆ ∆1 How Does ZigZag Work? 3 3 Find a chunk that is interference-free in one collisions and has interference in the other ∆1 ≠∆2 Decode and subtract from the other collision

∆ ∆1 How Does ZigZag Work? Find a chunk that is interference-free in one collisions and has interference in the other ∆1 ≠∆2 Decode and subtract from the other collision

∆ ∆1 How Does ZigZag Work? Find a chunk that is interference-free in one collisions and has interference in the other ∆1 ≠∆2 Decode and subtract from the other collision

∆ ∆1 How Does ZigZag Work? Find a chunk that is interference-free in one collisions and has interference in the other ∆1 ≠∆2 Decode and subtract from the other collision

∆ ∆1 How Does ZigZag Work? Find a chunk that is interference-free in one collisions and has interference in the other ∆1 ≠∆2 Decode and subtract from the other collision

∆ ∆1 How Does ZigZag Work? Find a chunk that is interference-free in one collisions and has interference in the other ∆1 ≠∆2 Decode and subtract from the other collision Delivered 2 packets in 2 timeslots As efficient as if the packets did not collide Delivered 2 packets in 2 timeslots As efficient as if the packets did not collide

ZigZag A receiver design that decodes collisions As efficient as if the colliding packets were sent in separate time slots Experimental results shows that it reduces hidden terminal losses from 72% to 0.7%

How does the AP know it is a collision and where the second packet starts? Time AP received a collision signal ∆

Detecting Collisions and the Value of ∆ Time AP received signal Packets start with known preamble AP correlates known preamble with signal Correlation Time Correlate ∆ Preamble Correlation Detect collision and the value of ∆ Works despite interference because correlation with an independent signal is zero Preamble Correlation Detect collision and the value of ∆ Works despite interference because correlation with an independent signal is zero

How Does the AP Subtract the Signal? Channel’s attenuation or phase may change between collisions Can’t simply subtract a chunk across collisions Alice’s signal in first collision Alice’s signal in second collision

Subtracting a Chunk Decode chunk into bits – Removes effects of channel during first collision Re-modulate bits to get channel-free signal Apply effect of channel during second collision – Use correlation to estimate channel despite interference Now, can subtract!

What if AP Makes a Mistake?

∆1 ∆ Bad News: Errors can propagate 3 3 Can we deal with these errors? What if AP Makes a Mistake?

∆1 ∆2 What if AP Makes a Mistake? Good News: Temporal Diversity A bit is unlikely to be affected by noise in both collisions Get two independent decodings

Errors propagate differently in the two decodings For each bit, AP picks the decoding that has a higher PHY confidence [JB07, WKSK07] Which decoded value should the AP pick? ∆1 ∆ AP Decodes Backwards as well as Forwards

ZigZag Generalizes

∆1 ∆ Flipped order

Different packet sizes ZigZag Generalizes ∆1 ∆

ZigZag Generalizes Flipped order Different packet sizes Multiple colliding packets