Medium Access Control in Wireless networks

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Contents IEEE MAC layer operation Basic CSMA/CA operation
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Wireless LAN Simulation - IEEE MAC Protocol
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Lecture 4 Wireless Medium Access Control
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
IEEE WLAN.
1 Wireless Networking Primer (few topics that may help in understanding other lectures) Nitin Vaidya University of Illinois at Urbana-Champaign.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Recitation 8 Wireless Networks.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
EA C451 (Internetworking Technologies)
Medium Access Control MAC protocols: design goals, challenges,
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
MACAW: A Media Access Protocol for Wireless LAN’s
Mobile and Ad hoc Networks
Net301 lecture9 11/5/2015 Lect 9 NET301.
IEEE : Wireless LANs ALOHA, Slotted ALOHA
Wireless Ad hoc Networking Uses material from others, notably adapted from a tutorial by Nitin Vaidya.
MAC continued.
Enhanced Backoff Scheme in CSMA/CA for IEEE
Chapter 6 Multiple Radio Access.
Presentation transcript:

Medium Access Control in Wireless networks

Wireless MAC classification Centralized Distributed Polling Guaranteed or controlled access Random access Aloha MACA(CSMA/CA) MACAW

Aloha A node transmits a packet whenever a packet arrives. In the absence of an acknowledgement, the node retransmit after waiting for a randomly chosen interval. Does this work well?

Slotted Aloha arrive

Carrier Sensing Multiple Access Listen before talk(transmitting) A node can transmit only if the channel is idle. Carrier sensing is useful to reduce the possibility that a new transmission will collide with on-going transmission. How to determine whether a channel is idle?

SINR SINR is signal (S) to interference (I) and noise (N) ratio Decrease in SINR results in a decrease in reliability of reception D B C A distance power S I

Carrier Sensing(CS) threshold If receiver power < CS threshold, then channel is idle B A distance power B’s CS Threshold

Carrier Sensing and p-Persistence It makes slots smaller than packet size. Transmit in each slot with probability p if a channel is idle. What value should p be? How long is the slot size? slot size = carrier sensing delay + prop delay + RX/Tx turnaround delay Smaller slot size reduces idle time comparing with the slotted Aloha where a slot size is a maximum packet size.

Carrier Sensing is not enough Because of hidden terminals, this doesn’t always work well in wireless. Because of exposed terminals, will reduce throughput in wireless Collision occurs at the receiver, not at the sender, so the sender listening isn’t very helpful.

Hidden terminal problem Node B can communicate with A and C, but A and C cannot hear each other. When A transmits to B, C cannot detect the transmission using carrier sensing. So if C transmits, collision will happen at node B. A B C

Exposed terminal problem When node B send a packet to node A, node C hears transmission and keeps quite. But C does not need to be quiet for transmission between C and D. A B C D

How does CS threshold affect the two problems? If C’ threshold is lowered, then C can detect A’s transmission. So C can defer transmission. (reduces hidden terminal problem) But it can worsens the exposed terminal problem. Why? D B C A distance power S threshold

Then what is optimal threshold? What happens if we decrease the CS threshold? Will it make the network throughput increased?

Busy Tone It is a way of avoiding hidden terminal problem. A receiver transmits busy tone when receiving data. All nodes hearing busy tone keep silent. Busy tone is using a separate channel.

MACA Get rid of carrier sensing of CSMA, and adds collision avoidance. claims that carrier sensing is useless because of hidden terminal problem. Use RTS/CTS packets Designed for packet radio networks

Collision avoidance in MACA When node A wants to send a packet to node B, node A first sends a Request-to-Send(RTS) to node B. On receiving RTS, node B responds by sending Clear-to-Send(CTS) if B can receive the packet. When nodes overhear a CTS, they keep quiet for the duration of the transfer. Does MACA eliminate all collisions due to hidden terminals?

IEEE 802.11 MAC: CSMA/CA There are distributed and centralized components. Distributed Coordinated Function (DCF) Point Coordination Function (PCF) PCF uses polling where AP controls as a central node. DCF uses a random access protocol called CSMA/CA which is a slightly modified version of MACA.

Why doesn’t collision detection work in wireless? Near/far problem Transmission is so loud at sender it drowns out all other transmissions. (What I hear doesn’t exactly match what I talk.) Receiver’s signal is much weaker than sender’s signal because of path loss. Sender can’t necessarily hear what receiver is receiving, so can’t tell if collision occurred.

IEEE 802.11 DCF It uses RTS-CTS exchange to reduce the hidden terminal problem. It uses ACK to achieve reliability. Any node receiving RTS and CTS can’t transmit for the duration of the transfer. This collision avoidance(CA) is used because collision cost is higher than in wired network(Ethernet). Should waste much longer idle time

CSMA/CA Wait for NAV A B RTS DATA C CTS ACK Wait for NAV D Physical carrier sense and virtual carrier sense using Network Allocation Vector (NAV) NAV is updated at each node based on the overheard RTS/CTS/DATA/ACK packets, each of which specifies the duration of a pending transmission time. Nodes keep silent when they sense virtually as well as physically. Wait for NAV A B RTS DATA C CTS ACK Wait for NAV D

NAV=10 NAV< 10 CTS A B C D E F RTS

Reserved area NAV<10 NAV<10 ACK A B C D E F DATA

RTS-CTS exchange is overhead. In 802.11 physical carrier sense is mandatory, while virtual carrier sense is optional. RTS-CTS exchange is overhead. But if data collision cost is high, it is better to use RTS-CTS. But in reality no one uses RTS/CTS. Why?

Backoff Interval Backoff interval is similar to p-persistent implementation of Ethernet. When transmitting a packet, a node chooses a backoff interval in the range [0,cw], where cw is contention window. Decrement the backoff interval by 1 each slot when the channel is idle. But countdown is suspended if the channel is busy. When backoff interval reaches 0, transmit a RTS.

Backoff interval example Node 1 and 2 have backoff interval CW1 and CW2 respectively. CW = [0, 31] CW1 = 25 CW2 = 20 CW1 = 5 CW2 = 15 RTS+DATA wait RTS+DATA wait CW2 = 10

Backoff interval The length of the backoff interval affects throughput. Choosing a large cw leads to large backoff interval and results in long waiting time. Choosing a small cw leads to larger number of collisions. Since the number of nodes attempting to transmit simultaneously may change with time, some mechanism to change cw is needed. In IEEE 802.11 DCF, cw is chosen dynamically depending on collision occurrence.

Binary exponential backoff in 802.11 When a node fails to receive CTS in response to its RTS, it doubles its cw. When a node transmits data successfully, it restores cw to the initial cw (minimum cw). So cw reduces much faster than it increases. If this is true, the binary exponential backoff is not fair.

Backoff interval and fairness [0,1] [0,2] [0,4] [0,1] A RTS RTS data data cw=1 cw=2 cw=2 cw=1 cw=1 [0,1] [0,2] [0,4] B RTS RTS wait wait cw=4 cw=1 cw=2

MACAW: Backoff algorithm The packet header has the sender’s backoff counter. Then all nodes copy this value into their backoff coutners, and basically all have the same cw. Everyone starts from the same cw after successful packet transmission. Mild decrease after success After collision, increase interval by factor of 1.5 Upon success, decrease interval by 1