Medium access control By Saumya Chaturvedi. PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Mobile Communications Chapter 3 : Media Access
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany 3.1 Motivation SDMA, FDMA, TDMA, CDMA Aloha, reservation schemes.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Mobile Communications Chapter 3 : Media Access  Motivation  SDMA, FDMA, TDMA  Aloha  Reservation schemes  Collision avoidance, MACA  Polling  CDMA.
Link Layer; Media Access Control Lec 03 07/03/2010 ECOM 6320.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
EEC173B/ECS152C, Spring 2010  Wireless Channel Access - Challenges: Hidden/Exposed Terminals - Access Methods: SDMA, FDMA, TDMA, CDMA  Multimedia compression.
Mobile Communications Chapter 3 : Media Access Motivation SDMA, FDMA, TDMA Aloha, reservation schemes Collision avoidance, MACA Polling CDMA, SAMA Comparison.
Shashank Srivastava Motilal Nehru National Institute Of Technology, Allahabad Medium Access Control.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Ch. 3: Media Access SDMA, FDMA, TDMA Aloha, reservation schemes
Wireless Communications
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Mobile Communications
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 3: Medium Access Control
1 Mobile Networks Module A (Part A2) Introduction Prof. JP Hubaux
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
Chapter 6 Multiple Radio Access
Mobile Communications Chapter 3 : Media Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Universität Karlsruhe Institut für Telematik ECE 591
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Wireless Sensor Networks 4. Medium Access
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
IT351: Mobile & Wireless Computing
CT301 LECTURE 8.
Wireless LANs Wireless proliferating rapidly.
Channel Allocation (MAC)
IT351: Mobile & Wireless Computing
CSE 4215/5431: Mobile Communications Winter 2011
Mobile Communications Chapter 3 : Media Access
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access
Mobile Communications Media Access Chapter 3
Multiple Access Methods
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3: Media Access
Mobile Communications Chapter 3 : Media Access
The Medium Access Control Sublayer
Mobile Communications Chapter 3: Media Access
Unit 2 Medium Access control
Mobile Communications Chapter 3 : Media Access
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Channel Allocation Problem/Multiple Access Protocols Group 3
UNIT II Wireless Medium Access Control
Mobile Computing Chapter 2 : Media Access Control.
Multiplexing & Multiple Access
Subject Name: Adhoc Networks Subject Code: 10CS841
Mobile Computing Chapter 2 : Media Access Control.
Mobile Communications Chapter 3 : Media Access
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
UNIT – I MEDIUM ACCESS CONTROL
Multiple Access Control (MAC) Protocols
Presentation transcript:

Medium access control By Saumya Chaturvedi

PRIMARY MEDIUM ACCESS CONTROL (MAC) ATTRIBUTES Collision avoidance – Basic task of a MAC protocol Energy efficiency – One of the most important attributes for sensor networks, since most nodes are battery powered Scalability and adaptively – Network size, node density and topology change

Other MAC Attributes Channel utilization – How well is the channel used? Also called bandwidth utilization or channel capacity Latency – Delay from sender to receiver; single hop or multi-hop Throughput – The amount of data transferred from sender to receiver in unit time Fairness – Can nodes share the channel equally?

MEDIUM ACCESS CONTROL (MAC) The role of medium access control (MAC) – Controls when and how each node can transmit in the wireless channel Why do we need MAC? – Wireless channel is a shared medium – Radios transmitting in the same frequency band interfere with each other – collisions – Other shared medium examples: Ethernet

MULTIPLE-ACCESS PROTOCOLS

ALOHA CHANNEL ALLOCATION

In pure ALOHA, frames are transmitted at completely arbitrary times.

PROCEDURE FOR ALOHA PROTOCOL

Mechanism – random, distributed (no central arbiter), time- multiplex – Slotted Aloha additionally uses time-slots, sending must always start at slot boundaries Aloha Slotted Aloha Aloha/slotted aloha sender A sender B sender C collision sender A sender B sender C collision t t

1-persistent CSMA Station listens. If channel idle, it transmits. If collision, wait a random time and try again. If channel busy, wait until idle. If station wants to send AND channel == idle then do send. Success here depends on transmission time - how long after the channel is sensed as idle will it stay idle (there might in fact be someone else's request on the way.)

PERSISTENCE STRATEGIES

P-Persistent CSMA Slotted channel used When station become ready to send, it sense the channel, if it is idle, transmit with probability p or defer with probability q=1-p and defer until next slot If that slot is idle either transmit or defer with probability p or q

Basic Bit map collision free protocol N station with unique address 0 to N-1 Propagation delay is negligible Each contention period consist of exactly N slots, and station send bit 1 during its slot. No other station is allowed to transmit the bit during assigned slot After N slots passed each station has complete knowledge which station wish to transmit Efficiency is d/(d+N)

The basic bit-map protocol, Collision-Free Protocols

Motivation Can we apply media access methods from fixed networks? FOR WIRED NETWORK: Signal strength in entire medium is almost same On collision every one knows Interested in collision at receiver rather than at sender Example CSMA/CD: send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3) Problems in wireless networks – signal strength decreases proportional to the square of the distance – the sender would apply CS and CD, but the collisions happen at the receiver – it might be the case that have hidden terminal, far and near problem – Un-necessary delay in case of hidden terminal problem ( C want to send another mobile (other than A or B) while B is sending to A, C wait un- necessarily)

Hidden terminals – A sends to B, C cannot receive A – C wants to send to B, C senses a “free” medium (CS fails) – collision at B, A cannot receive the collision (CD fails) – A is “hidden” for C Exposed terminals – B sends to A, C wants to send to another terminal (not A or B) – C has to wait, CS signals a medium in use – but A is outside the radio range of C, therefore waiting is not necessary – C is “exposed” to B Motivation - hidden and exposed terminals BAC

Terminals A and B send, C receives – signal strength decreases proportional to the square of the distance – the signal of terminal B therefore drowns out A’s signal – C cannot receive A If C for example was an arbiter for sending rights, terminal B would drown out terminal A already on the physical layer Also severe problem for CDMA-networks - precise power control needed! Motivation - near and far terminals ABC

Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) – segment space into sectors, use directed antennas – cell structure FDMA (Frequency Division Multiple Access) – assign a certain frequency to a transmission channel between a sender and a receiver – permanent (e.g., radio broadcast), slow hopping (e.g., GSM), fast hopping (FHSS, Frequency Hopping Spread Spectrum) TDMA (Time Division Multiple Access) – assign the fixed sending frequency to a transmission channel between a sender and a receiver for a certain amount of time The multiplexing schemes presented in chapter 2 are now used to control medium access!

Prof. Dr.-Ing. Jochen Schiller, MC SS FREQUENCY DIVISION DUPLEX (FDD) Simultaneous access of medium from base station to mobile station Up-link frequency: from Mobile station to base station to 915MHZ Uplink frequency for any of n channel is fu=890MHZ+n*0.2MHZ Down-link frequency: from Mobile station to base station to 960MHZ Down-link frequency for any of n channel is fu=935MHZ+n*0.2MHZ Each up-link and down-link have 124 channel each with size of 200KHZ each.

FDD/FDMA - general scheme, example GSM f t MHz 200 kHz MHz MHz 915 MHz 960 MHz

TDM FOR DUPLEX 12 slot for each direction, total 24 slots for both Each slot have time 417Micro second Pattern is repeated after 10 millisecond. Guarantee access of medium Perfectly opted for fixed rate and symmetric connection It is too static and inflexible. Inefficient for busty data or asymmetric connection

Prof. Dr.-Ing. Jochen Schiller, MC SS TDD/TDMA - GENERAL SCHEME, EXAMPLE DECT t downlinkuplink 417 µs

DAMA - Demand Assigned Multiple Access Channel efficiency only 18% for Aloha, 36% for Slotted Aloha (assuming Poisson distribution for packet arrival and packet length) Reservation can increase efficiency to 80% – a sender reserves a future time-slot – sending within this reserved time-slot is possible without collision – reservation also causes higher delays – typical scheme for satellite links Examples for reservation algorithms: – Explicit Reservation according to Roberts (Reservation-ALOHA) Combination of reservation mechanism and fixed TDM Have reservation period followed by transmission period Collision can occur during reservation period not during transmission period. Follow explicit reservation policy Different mobile station on earth can reserve the slot for mobile satellite. – Reservation-TDMA: Combination of reserved ALOHA and best effort.

Access method DAMA: Explicit Reservation Explicit Reservation (Reservation Aloha): – two modes: ALOHA mode for reservation: competition for small reservation slots, collisions possible reserved mode for data transmission within successful reserved slots (no collisions possible) – it is important for all stations to keep the reservation list consistent at any point in time and, therefore, all stations have to synchronize from time to time AlohareservedAlohareservedAlohareservedAloha collision t

PACKET RESERVATION MULTIPLE ACCESS (PRMA)  Slots are reserved implicitly  Certain number of slots are repeated in fixed TDM manner  Satellite broadcast status of each slot to all mobile stations  All the station receive the vector and know which slot is occupied and which is free.  All station wishing to transmit can compete for free slot in ALOHA fashion  Already occupied slots are not touched  Combination of fixed and random TDM schemes with reservation policy. Ensure transmission with guaranteed data rate

Access method DAMA: PRMA Implicit reservation (PRMA - Packet Reservation MA): – a certain number of slots form a frame, frames are repeated – stations compete for empty slots according to the slotted aloha principle – once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send – competition for this slots starts again as soon as the slot was empty in the last frame frame 1 frame 2 frame 3 frame 4 frame time-slot collision at reservation attempts ACDABA F AC ABA A BAF A BAF D ACEEBAFD t ACDABA-F AC-ABAF- A---BAFD ACEEBAFD reservation

Access method DAMA: Reservation- TDMA Reservation Time Division Multiple Access – every frame consists of N mini-slots and x data-slots – every station has its own mini-slot and can reserve up to k data-slots using this mini-slot (i.e. x = N * k). – other stations can send data in unused data-slots according to a round-robin sending scheme (best-effort traffic) N mini-slots N * k data-slots reservations for data-slots other stations can use free data-slots based on a round-robin scheme e.g. N=6, k=2

MACA - COLLISION AVOIDANCE MACA (Multiple Access with Collision Avoidance) uses short signaling packets for collision avoidance – RTS (request to send): a sender request the right to send from a receiver with a short RTS packet before it sends a data packet – CTS (clear to send): the receiver grants the right to send as soon as it is ready to receive Signaling packets contain – sender address – receiver address – packet size Variants of this method can be found in IEEE as DFWMAC (Distributed Foundation Wireless MAC)

MACA avoids the problem of hidden terminals – A and C want to send to B – A sends RTS first – C waits after receiving CTS from B MACA avoids the problem of exposed terminals – B wants to send to A, C to another terminal – now C does not have to wait for it cannot receive CTS from A MACA examples A B C RTS CTS A B C RTS CTS RTS

MACA variant: DFWMAC in IEEE idle wait for the right to send wait for ACK senderreceiver packet ready to send; RTS time-out; RTS CTS; data ACK RxBusy idle wait for data RTS; RxBusy RTS; CTS data; ACK time-out  data; NAK ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy time-out  NAK; RTS

Polling mechanisms If one terminal can be heard by all others, this “central” terminal (a.k.a. base station) can poll all other terminals according to a certain scheme – now all schemes known from fixed networks can be used (typical mainframe - terminal scenario) Example: Randomly Addressed Polling – base station signals readiness to all mobile terminals – terminals ready to send can now transmit a random number without collision with the help of CDMA or FDMA (the random number can be seen as dynamic address) – the base station now chooses one address for polling from the list of all random numbers (collision if two terminals choose the same address) – the base station acknowledges correct packets and continues polling the next terminal – this cycle starts again after polling all terminals of the list

Access method CDMA CDMA (Code Division Multiple Access) – all terminals send on the same frequency probably at the same time and can use the whole bandwidth of the transmission channel – each sender has a unique random number, the sender XORs the signal with this random number – the receiver can “tune” into this signal if it knows the pseudo random number, tuning is done via a correlation function Disadvantages: – higher complexity of a receiver (receiver cannot just listen into the medium and start receiving if there is a signal) – all signals should have the same strength at a receiver Advantages: – all terminals can use the same frequency, no planning needed – huge code space (e.g ) compared to frequency space – interferences (e.g. white noise) is not coded – forward error correction and encryption can be easily integrated

CDMA in theory Sender A – sends A d = 1, key A k = (assign: „0“= -1, „1“= +1) – sending signal A s = A d * A k = (-1, +1, -1, -1, +1, +1) Sender B – sends B d = 0, key B k = (assign: „0“= -1, „1“= +1) – sending signal B s = B d * B k = (-1, -1, +1, -1, +1, -1) Both signals superimpose in space – interference neglected (noise etc.) – A s + B s = (-2, 0, 0, -2, +2, 0) Receiver wants to receive signal from sender A – apply key A k bitwise (inner product) A e = (-2, 0, 0, -2, +2, 0)  A k = = 6 result greater than 0, therefore, original bit was „1“ – receiving B B e = (-2, 0, 0, -2, +2, 0)  B k = = -6, i.e. „0“

CDMA on signal level I data A key A signal A data  key key sequence A Real systems use much longer keys resulting in a larger distance between single code words in code space AdAd AkAk AsAs

CDMA on signal level II signal A data B key B key sequence B signal B A s + B s data  key BdBd BkBk BsBs AsAs

CDMA on signal level III AkAk (A s + B s ) * A k integrator output comparator output A s + B s data A AdAd

CDMA on signal level IV integrator output comparator output BkBk (A s + B s ) * B k A s + B s data B BdBd

comparator output CDMA on signal level V wrong key K integrator output (A s + B s ) * K A s + B s (0) ?

Aloha has only a very low efficiency, CDMA needs complex receivers to be able to receive different senders with individual codes at the same time Idea: use spread spectrum with only one single code (chipping sequence) for spreading for all senders accessing according to aloha. Combination of CDMA and TDMA SAMA - Spread Aloha Multiple Access 1 sender A 0 sender B 0 1 t narrow band send for a shorter period with higher power spread the signal e.g. using the chipping sequence („CDMA without CD“) Problem: find a chipping sequence with good characteristics 1 1 collision

Comparison SDMA/TDMA/FDMA/CDMA

QUESTIONS 1.Consider the case where a mobile station receives different signals from different base stations and these signals is of different length. Discuss the methods used for selection of base station for your mobile. 2.Consider a mobile system where mobility of mobile station is more. Whether MACA (Multiple Access with Collision Avoidance) will be able to deal the hidden terminal problem occur in this situation? Explain with reason. 3. A Mobile services required to deals supported with arbitrary number of devices ( Mobiles). Discuss how Spread ALOHA Multiple Access SAMA a combination of CDMA and TDMA can be able to provide robust services with better collision rate?

TUTORIAL SHEET NO 2 Submission date: Submission Mode-Electronics copy only (in a group of 10 students )