Media Access Methods MAC Functionality CSMA/CA with ACK

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

13.3 CHANGES IN THE STANDARD The 10-Mbps Standard Ethernet has gone through several changes before moving to the higher data rates. These changes actually.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
CWNA Guide to Wireless LANs, Second Edition
S3C2 – LAN Switching Addressing LAN Problems. Congestion is Caused By Multitasking, Faster operating systems, More Web-based applications Client-Server.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 05. MAC and Physical Layers.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
WLAN.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Computer Engineering and Networks, College of Engineering, Majmaah University LAN TECHNOLOGIES Mohammed Saleem Bhat CEN-444 Networks Structure.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Multiple Access Methods
Wireless Sensor Networks 4. Medium Access
Outline What is Wireless LAN Wireless Transmission Types
EA C451 (Internetworking Technologies)
The University of Adelaide, School of Computer Science
CT301 LECTURE 8.
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
Network connectivity to the legacy wired LAN
Wireless Networks.
TCP and MAC interplay in Wireless Ad Hoc Networks
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Channel Allocation (MAC)
Configuring EtherChannels and Switch Troubleshooting
Net301 lecture9 11/5/2015 Lect 9 NET301.
IEEE MAC Functionality
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
Multiple Access Methods
EEC-484/584 Computer Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Wireless Local Area Network (WLAN)
basics Richard Dunn CSE July 2, 2003.
The Medium Access Control Sublayer
Introduction to Wireless Networks
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
MAC continued.
Wireless LAN Simulation IEEE MAC Protocol
EEC-484/584 Computer Networks
Is the MAC sufficient for wireless high speed mesh LANs?
ECSE-4730: Computer Communication Networks (CCN)
Conducted and Wireless Media (Part II)
Figure 3.1 Internet model.
Network connectivity to the legacy wired LAN
CSE 313 Data Communication
Multiple Access Methods
Wireless LAN Protocols
Multi-rate Medium Access Control
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

Media Access Methods MAC Functionality CSMA/CA with ACK CSMA/CA with RTS/CTS protocol Automatic data-rate fall-back In cell relay operations Ad-Hoc mode of operation

Accessing the Medium CSMA/CD (Standard Ethernet) In a CSMA/CD system the media is sensed to verify that it is not in use In CSMA/CD a station will: Defer if carrier is in use Transmit if the carrier is not in use When collision is detected station all stations involved will back off and retransmit

CSMA/CA with MAC - level Acknowledgment In a wireless environment the network adapters cannot detect collisions: Carrier Sensing - listen to the media to determine if it is free If media is free, then one of two methods is used to verify proper transmission MAC - Level Acknowledgment Request To Send / Clear To Send (RTS/CTS)

CSMA/CA MAC - level Acknowledgment Collisions still can occur (interference; incapability of sensing other carrier) IEEE 802.11 defines “low-level” ACK protocol Provides faster error recovery Makes presence of high level error recovery less critical Following a transmission, the receiving station must transmit an ACK signal back to the originating station within a specified time frame to verify proper frame transmission Message ACK

CSMA/CA MAC - level Acknowledgment An ACK signal will only be generated upon reception of a valid frame will allow the transmitting station to know that the frame was not involved in a collision or corrupted is a low overhead approach to verifying proper transmission ACK is the recommended mode of operation in a small wireless network. The alternative would be using the RTS/CTS mode in a larger cell size which is discussed in the next few slides. Message ACK

The Problem “Hidden stations” Situation that occurs in larger physical areas (typically outdoors) Loss of performance Error recovery required B A C A sends to B C doesn’t detect that, so C might also start sending a transmission Collision of messages occurs: both messages lost

The Solution CSMA/CA With Request To Sent/Clear To Send Protocol In this scenario station A wants to transmit to station B A transmits a Request To Send to B which tells B how long the transmission will take B A C A to B RTS: I want to send for 10 micro seconds

CSMA/CA With Request To Sent/Clear To Send Protocol In this scenario station A wants to transmit to station B B receives the RTS and transmits a Clear To Send to A which all other stations receive. This cause them to defer all attempts to transmit B A C RTS: I want to send for 10 micro seconds A to B B to A (all other stations take note) CTS: OK A, go ahead send for 10 micro seconds. Everybody else be quiet for 10 microseconds

CSMA/CA With Request To Sent/Clear To Send Protocol In this scenario station A wants to transmit to station B A now transmits to B and since all other stations are aware of the transmission, via the previous CTS, no collisions should occur. B A C RTS: I want to send for 10 micro seconds A to B CTS: OK A, go ahead send for 10 micro seconds. Everybody else be quiet for 10 microseconds B to A (all other stations take note) A to B Transmit: 10 micro seconds

CSMA/CA With Request To Sent/Clear To Send Protocol In this scenario station A wants to transmit to station B Following the transmission B will reply with an ACK signal which all other stations regard as meaning the media is clear B A C RTS: I want to send for 10 micro seconds A to B CTS: OK A, go ahead send for 10 micro seconds. Everybody else be quiet for 10 microseconds B to A (all other stations take note) Transmit: 10 micro seconds A to B B to A ACK: I received the transmission

RTS/CTS Issues Defaults to the off state Can be switched on when a problem arises with hidden nodes Increased overhead No interruptions when large files are transmitted Big picture: Since most communication is from the AccessPoint (during normal operations) hidden nodes even when present will probably NOT be an issue. This is why the RTS/CTS mode should only be used when absolutely required.

Message Fragmentation (not available yet but planned for the future) MAC level function to fragment large messages into smaller frames (user definable) Improves performance in RF polluted environments Can be switched off to avoid the overhead in RF clean environments interference Interference in a large frame requires re-transmission of the frame. Fragmenting reduces the frame size and the required time to re-transmit since only a portion of the original frame will need to be retransmitted.

Multi-rate operations Fall back to lower data-rate when communications quality decreases Out of range situations Interference Operating bandwidth High 11Mbps Medium 5.5Mbps Standard 2Mbps Low 1Mbps

Why the Need for Data Rate Fall Back? As the Signal to Noise Ratio falls to unacceptable levels, to support the data rate that is being used, the system will automatically fall back to the next lower speed. Operating with a lower data rate makes the system better able to deal with a poor signal quality.

Data Rate Fall Back 802.11B 11Mbps High Speed device will fall back in the following order: High 11Mbps Medium 5.5Mbps Standard 2Mbps Low 1Mbps 802.11 2Mbps device will fall back in the following order:

Advantages of Multiple Data Rates User configurable option to use a fixed data rate if desired. Wireless Network adapter in AccessPoint is capable of supporting different data-rates “simultaneously” e.g. operates at “High” speed in communication to nearby station and at “Low” speed to station that is further away This provides a simple reliable method to automatically regulate the wireless network!!!

Issues With Multiple Data Rates High Data Rate 11Mbps Low Date Rate 2Mbps Note: both stations are in the same cell but are operating at different speeds. The AccessPoint is capable of communication to each station. Stations can communicate with each other through the AccessPoint.

What is In-cell relay AccessPoint acts as wireless repeater to relay all intercell station-to-station communication Communication from one station to another station in the same wireless cell is via the AccessPoint. Implications of all intercell traffic going to the AccessPoint: Effective size of the cell increases Because Stations only need to be in the range of the AccessPoint and not in the range of all other stations in the wireless network Reduced performance in peer to peer communication within one cell since all communications have to involve the AccessPoint.

Station A wants to communicate with Station B Using Cell Relay Station A wants to communicate with Station B A transmits to B but the communication goes to the AccessPoint Station D Station B Station E RoamAbout AccessPoint Station A

Station A wants to communicate with Station B Using Cell Relay Station A wants to communicate with Station B A transmits to B but the communication goes to the AccessPoint Station D Station B Station E RoamAbout AccessPoint Station A

Cell Relay In the previous example, the AccessPoint relayed the transmission from the source to all the other stations in the cell Note that even though station B was closer to A than was the AccessPoint was used to relay the transmission.

Ad-Hoc Mode of Operation In the Ad-Hoc mode of operation, the wireless network is comprised of a peer-to-peer network without the aid of an AccessPoint. Ad-Hoc network

Using the AccessPoint Wired LAN (Ethernet) AccessPoint network

Building to Building Used to connect two separate locations with a wireless bridge connection Link is dedicated to the point-to-point connection Directional antennas are used for extended distances