Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Medium Access Issues David Holmer
Multiple access What if multiple machines are sharing the same link?
Wireless Environment.
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Introduction to Wireless Networks Michalis Faloutsos.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Medium Access Control Sublayer
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
Medium Access Control NWEN302 Computer Network Design.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
2. Data Link Layer: Medium Access Control. Scheduling.
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
Multiple Access Methods
Wireless Sensor Networks 4. Medium Access
IT351: Mobile & Wireless Computing
Data link layer divided into two functionality-oriented sublayers
Medium Access Control MAC protocols: design goals, challenges,
Communication Networks: Technology & Protocols
Contention-based protocols with Reservation Mechanisms
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Channel Allocation (MAC)
IT351: Mobile & Wireless Computing
CS 457 – Lecture 7 Wireless Networks
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Multiple Access Methods
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols

Networking basics Medium Access Control (MAC) Protocol The Open Systems Interconnection (OSI) model is a product of the Open Systems Interconnection effort at the International Organization for Standardization (ISO).

Characteristics of Wireless Networks Multiplexing: in a mobile and wireless network, the wireless medium is shared by many nodes. Hence, multiple use of a shared medium is a major challenge in wireless networking. Most decisions for accessing the wireless medium is made in the MAC layer.

The wireless channels can be multiplexed in four dimensions: Multiplexing The wireless channels can be multiplexed in four dimensions: Time(t): A channel gets the whole frequency spectrum for a certain amount of time. Space(s): Same frequency can be reused when the base stations are separated in space. Frequency(f): The whole spectrum is separated into smaller frequency bands. Code(c):Each channel uses a unique code for transmitting.

Time Division Multiplex (TDM) A channel gets the whole frequency spectrum for a certain amount of time. Only one user for the medium at a time. Usually the throughput is high even with many users. However, no two users should use the medium at the same time. Precise synchronization is needed. f t

Space multiplexing : Cellular Networks Same frequency can be reused when the base stations are separated in space. The reuse of frequencies depend on signal propagation range. Example : fixed frequency assignment for reuse with distance 2.

Frequency Division Multiplex (FDM) The whole spectrum is separated into smaller frequency bands. A band is allocated to a channel for the whole time. This is somewhat inflexible if the traffic is non-uniform. An example is radio or TV broadcast. The bandwidth is wasted if a station is off the air. f t

Code Division Multiplex (CDM) Each channel uses a unique code for transmitting. All channels use the same frequency spectrum at the same time. However, signal regeneration is very complex and requires complex HW/SW support. c t f

Code Division Multiplexing CDMA has ben adopted for the 3G mobile phone technology. CDMA is not very suitable for ad hoc networking as we cannot expect specialized hardware/software support at the nodes. TDMA and its variations are most suitable for ad hoc networking.

Demand Assignment Multiple Access (DAMA) In a DAMA protocol, nodes first reserve slots which they intend to use for broadcasting. Each round of broadcast is preceded by a reservation round. DAMA protocols are widely used in satellite communication and increasingly being used in wireless networking.

An example of Time Demand Assignment Multiplexing CSMA/CD: Carrier Sense Multiple Access with Collision Detection When a node wants to broadcast, it checks whether any other node is broadcasting (senses the carrier). A node broadcasts when no other node is broadcasting. Otherwise, it tries later at a random interval.

CSMA Problems in Wireless Medium Collision detection is easy in wired networks but difficult in wireless medium. Collision avoidance to reduce wasted transmissions Transmission Range of S R S

CSMA Problems in Wireless Medium With only one antenna/radio, nodes can only listen or send. Full duplex radios are extremely expensive. CSMA gives rise to hidden terminal and exposed terminal problems.

Message Loss due to Collision Using CSMA in wireless medium results in message loss and requires retransmission of lost messages. A node spends much more energy while receiving or transmitting messages. Hence, retransmission wastes a lot of energy.

Hidden Terminal Problem Other senders’ information are hidden from the current sender, so that transmissions at the same receiver cause collisions. R S1 S2

MACA – Multiple Access Collision Avoidance R S2 S1 Use of additional signaling packets Sender asks receiver whether it is able to receive a transmission - Request to Send (RTS) Receiver agrees, sends out a Clear to Send (CTS) Sender sends, receiver Acknowledgements (ACKs) S1 RTS 3 DATA 1 2 R CTS 4 ACK S2 Detect Collision Find Transmission Complete time

Exposed Terminal Problem The sender mistakenly think the medium is in use, so that it unnecessarily defers the transmission. R1 R2 R1 time S1 S2 R2 CTS 1 2 3 RTS DATA Find medium in use Wait until medium is clear

Synchronization MACA – continued There is a global clock. Every node knows the current time. There is a global schedule. Every node knows the schedule. Name Time Tom 1:00 pm – 2:00 pm Peter 2:00 pm – 3:00 pm John 3:00 pm – 4:00 pm

MACA – continued time 2 5 1 4 3 6 t1 t2 t3 t4 t5 t6 When a node hears an RTS from a neighboring node, but not the corresponding CTS, that node can deduce that it is an exposed terminal and is permitted to transmit to other neighboring nodes. R1 R2 S1 S2 S2 R1 time S1 R2 2 CTS 5 1 RTS DATA Exposed Terminal S2 RTS 4 3 6 CTS DATA t1 t2 t3 t4 t5 t6

MACA – continued Collision handling If a packet is lost (collision), the node back off for a random time interval before retrying

If N1  N2, can N3  N2 simultaneously? Quiz If N1  N2, can N3  N2 simultaneously? Why this situation happens in wireless network? How to solve it? N2 N3 N1 S1 R S2 RTS CTS ACK DATA 1 2 3 4 time

If N2  N1, can N3  N4 simultaneously? Quiz If N2  N1, can N3  N4 simultaneously? Why RTS/CTS mechanism do not allow N3  N4? How to solve it? N1 N4 N2 N3 RTS CTS DATA S2 R1 time S1 R2 t1 t2 t3 t4 t5 t6 1 2 3 4 5 6

Quiz Node 1 Node 2 Node 3 Node 4 time Is there any collision happens? What kind of problem (hidden/exposed) shown in the figure? Node 1 RTS DATA CTS Node 2 Node 3 CTS RTS Node 4 RTS time

Quiz Node 1 Node 2 Node 3 Node 4 time If N1  N2, can N3  N4? How to solve the problem? Node 1 RTS DATA Node 2 CTS Node 3 RTS DATA Node 4 CTS time

Hidden Terminal Problem Summary Hidden Terminal Problem Other senders’ information are hidden from the current sender, so that transmissions at the same receiver cause collisions. Exposed Terminal Problem The sender mistakenly think the medium is in use, so that it unnecessarily defers the transmission.

No MAC protocol does all this! Conclusions A Perfect MAC Protocol Collision avoidance to reduce wasted transmissions Cope with hidden terminal problems Allow exposed terminals to talk Reasonable fairness No MAC protocol does all this!