Wireless Sensor Networks 4. Medium Access

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Multiple access What if multiple machines are sharing the same link?
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
CSC4220/6220 Computer Networks
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
The Medium Access Control Sublayer
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Wireless Sensor Networks 5. Routing
Wireless Sensor Networks 4. Medium Access
Data Link Layer Lower Layers Local Area Network Standards
Media Access Methods MAC Functionality CSMA/CA with ACK
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Medium Access Control MAC protocols: design goals, challenges,
CT301 LECTURE 8.
Wireless Sensor Networks 4. Medium Access
Part III Datalink Layer 10.
MACAW: A Media Access Protocol for Wireless LAN’s
MACAW: A Media Access Protocol for Wireless LANs
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Wireless Sensor Networks 4. Medium Access
Multiple Access, Collision Avoidance for Wireless LAN’s
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
Computer Communication & Networks
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Multiple Access Methods
The Medium Access Control Sublayer
Communication Networks NETW 501
Channel Allocation Problem/Multiple Access Protocols Group 3
Chapter 12 Multiple Access
Channel Allocation Problem/Multiple Access Protocols Group 3
Data Communication Networks
Subject Name: Adhoc Networks Subject Code: 10CS841
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Part III Datalink Layer 10.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Wireless Sensor Networks 4. Medium Access Christian Schindelhauer Technische Fakultät Rechnernetze und Telematik Albert-Ludwigs-Universität Freiburg Version 29.04.2016

ISO/OSI Reference model 7. Application Data transmission, e-mail, terminal, remote login 6. Presentation System-dependent presentation of the data (EBCDIC / ASCII) 5. Session start, end, restart 4. Transport Segmentation, congestion 3. Network Routing 2. Data Link Checksums, flow control 1. Physical Mechanics, electrics

Types of Conflict Resolution Conflict-free TDMA, Bitmap FDMA, CDMA, Token Bus Contention-based Pure contention Restricted contention Other solutions z.B. MAC for directed antennae

Contention Free Protocols Simple Example: Static Time Division Multiple Access (TDMA) Each station is assigned a fixed time slot in a repeating time schedule Traffic-Bursts cause waste of bandwidth

ALOHA Algorithm Origin Once a paket is present, it will be sent 1985 by Abrahmson et al., University of Hawaii For use in satellite connections

CSMA und Transmission Time B CSMA-Problem: Transmission delay d Two stations start sending at times t and t + ε with ε <d see a free channel 2nd Station causes a collision t t+ε start sending at times t and t + ε with ε <d see one free channel second station causing a collision

Collision Detection in Ethernet – CSMA/CD B CSMA/CD – Carrier Sense Multiple Access/Collision Detection Ethernet If collision detection during reception is possible Both senders interrupt sending Waste of time is reduced Collision Detection simultaneously listening and sending must be possible Is that what happens on the channel that's identical to the message? t+ε CSMA / CD - Carrier Sense Multiple Access / Collision Detection Ethernet If collision detection is possible Later completed his transfer stations Time wasted is reduced at least one message is transmitted Collision Detection sets simultaneously listening and sending ahead on channel Is that what happens on the channel that's identical to the message?

Computation of the Backoff Algorithm: Binary Exponential Backoff k:=2 While a collision has occurred choose t randomly uniformly from {0,...,k-1} wait t time units send message (terminate in case of collision) k:= 2 k Algorithm waiting time adapts to the number of stations uniform utilization of the channel fair in the long term

Problem of Wireless Media Access Unknown number of participants broadcast many nodes simultaneously only one channel available asymmetric situations Collisions produce interference Media Access Rules to participate in a network

Aims Delay Throughput Fairness Robustness and stability Scalability against disturbances on the channel against mobility Scalability Energy efficiency

Hidden Terminal and Exposed Terminal B C Hidden Terminal Problem Exposed Terminal Problem A B C D

MACA Phil Karn MACA: A New Channel Access Method for Packet Radio 1990 Alternative names: Carrier Sensing Multiple Access / Collision Avoidance (CSMA/CA) Medium Access with Collision Avoidance (MACA) Aim Solution of the Hidden and Exposed Terminal Problem Idea Channel reservation before the communication Minimization of collision cost

Request to Send (a) A sends Request to Send (RTS) (b) B answers with Clear to Send (CTS)

Clear to Send (a) A sends Request to Send (RTS) (b) B answers with Clear to Send (CTS)

Details for Third Parties D receives CTS of B waits long enough such that B can receive the data packet E receives RTS of A and CTS of B

MACAW Bharghavan, Demers, Shenker, Zhang MACAW: A Media Access Protocol for Wireless LAN‘s, SIGCOMM 1994 Palo Alto Research Center, Xerox Aim Redesign of MACA Improved backoff Fairer bandwidth sharing using Streams Higher efficiency by 4- and 5-Handshake

Acknowledgment in the Data Link Layer MACA does not use Acks initiated by Transport Layer very inefficient How can MACA use Acks?

MACAW 4 Handshake Participants Sender sends RTS Receiver answers with CTS Sender sends data packet Receiver acknowledges (ACK) Third parties Nodes receiving RTS or CTS are blocked for some time RTS and CTS describe the transmission duration Sender repeats RTS, if no ACK has been received If receiver has sent ACK then the receiver sends (instead of CTS) another ACK

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer

MACA 4-Handshake RTS

MACAW 4-Handshake CTS

MACAW 4-Handshake Data

MACAW 4-Handshake Ack

Acknowledgments Adding ACKs to MACA In MACA done by transport layer leads to drastical improvements of throughput even for moderate error rates error rate throughput RTS-CTS- DATA RTS-CTS- DATA-ACK 40 37 0,001 0,01 17 36 0,1 2 10

MACAW 4 Handshake Worst-Case blockade Sender sends RTS Receiver is blocked Sender is free But the environment of the sender is blocked

MACAW 4-Handshake RTS

MACAW 4-Handshake CTS is missing

MACAW 5 Handshake 4-Handshake increases Exposed Terminal Problem Overheard RTS blocks nodes even if there is no data transfer Solution Exposed Terminals are informed whether data transmission occurs Short message DS (data send) 5 Handshake reduces waiting time for exposed terminals

MACAW 5 Handshake Participants Sender sends RTS Receivers answers with CTS Sender sends DS (Data Send) Sender sends DATA PACKET Receiver acknowledges (ACK) RTS and CTS announce the transmission duration Blocked nodes have received RTS and DS have received CTS Small effort decreases the number of exposed terminals

MACAW 5-Handshake RTS

MACAW 5-Handshake CTS

MACAW 5-Handshake DS

MACAW 5-Handshake Data

MACAW 5-Handshake ACK

Unfair Distribution 4 and 5-Handshake create unfair distribution A is the first to get the channel D sends RTS and is blocked A has a lot of data for B Backoff of D is doubling D has a lot of data for C At the next transmission C receives B and D, but does not receive A A has smaller backoff A has higher chance for next channel access B can receive A and C, but does not hears D