CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Wireless Networking So we talked about wired networks. What about wireless?
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
CSE 561 – Multiple Access David Wetherall Spring 2000.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Network Technologies essentials Week 3: Retransmission, sharing links, switching Compilation made by Tim Moors, UNSW Australia Original slides by David.
Medium Access Control Sub Layer
Multiple Access.
Chapter 6 Multiple Radio Access
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed Systems 7. Medium Access Control Sublayer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2015/2016.
The Medium Access Control Sublayer
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Computer Engineering and Networks, College of Engineering, Majmaah University LAN TECHNOLOGIES Mohammed Saleem Bhat CEN-444 Networks Structure.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Link Layer 5.1 Introduction and services
Topic Multiplexing is the network word for the sharing of a resource
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Distributed Systems 6. Medium Access Control Sublayer
Presentation transcript:

CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is in charge; this is a distributed system

CSE 461 University of Washington2 Topic (2) We will explore random multiple access control (MAC) protocols – This is the basis for classic Ethernet – Remember: data traffic is bursty Zzzz..Busy!Ho hum

CSE 461 University of Washington3 ALOHA Network Seminal computer network connecting the Hawaiian islands in the late 1960s – When should nodes send? – A new protocol was devised by Norm Abramson … Hawaii

CSE 461 University of Washington4 ALOHA Protocol Simple idea: – Node just sends when it has traffic. – If there was a collision (no ACK received) then wait a random time and resend That’s it!

CSE 461 University of Washington5 ALOHA Protocol (2) Some frames will be lost, but many may get through… Good idea?

CSE 461 University of Washington6 ALOHA Protocol (3) Simple, decentralized protocol that works well under low load! Not efficient under high load – Analysis shows at most 18% efficiency – Improvement: divide time into slots and efficiency goes up to 36% We’ll look at other improvements

CSE 461 University of Washington7 Classic Ethernet ALOHA inspired Bob Metcalfe to invent Ethernet for LANs in 1973 – Nodes share 10 Mbps coaxial cable – Hugely popular in 1980s, 1990s : © 2009 IEEE

CSE 461 University of Washington8 CSMA (Carrier Sense Multiple Access) Improve ALOHA by listening for activity before we send (Doh!) – Can do easily with wires, not wireless So does this eliminate collisions? – Why or why not?

CSE 461 University of Washington9 CSMA (2) Still possible to listen and hear nothing when another node is sending because of delay

CSE 461 University of Washington10 CSMA (3) CSMA is a good defense against collisions only when BD is small X

CSE 461 University of Washington11 CSMA/CD (with Collision Detection) Can reduce the cost of collisions by detecting them and aborting (Jam) the rest of the frame time – Again, we can do this with wires X X X X Jam!

CSE 461 University of Washington12 CSMA/CD Complications Want everyone who collides to know that it happened – Time window in which a node may hear of a collision is 2D seconds X

CSE 461 University of Washington13 CSMA/CD Complications (2) Impose a minimum frame size that lasts for 2D seconds – So node can’t finish before collision – Ethernet minimum frame is 64 bytes X

CSE 461 University of Washington14 CSMA “Persistence” What should a node do if another node is sending? Idea: Wait until it is done, and send What now?

CSE 461 University of Washington15 CSMA “Persistence” (2) Problem is that multiple waiting nodes will queue up then collide – More load, more of a problem Now! Uh oh

CSE 461 University of Washington16 CSMA “Persistence” (3) Intuition for a better solution – If there are N queued senders, we want each to send next with probability 1/N Send p=½Whew Send p=½

CSE 461 University of Washington17 Binary Exponential Backoff (BEB) Cleverly estimates the probability – 1st collision, wait 0 or 1 frame times – 2nd collision, wait from 0 to 3 times – 3rd collision, wait from 0 to 7 times … BEB doubles interval for each successive collision – Quickly gets large enough to work – Very efficient in practice

Classic Ethernet, or IEEE Most popular LAN of the 1980s, 1990s – 10 Mbps over shared coaxial cable, with baseband signals – Multiple access with “1-persistent CSMA/CD with BEB” CSE 461 University of Washington18

CSE 461 University of Washington19 Modern Ethernet Based on switches, not multiple access, but still called Ethernet – We’ll get to it in a later segment Switch Twisted pair Switch ports

CSE 461 University of Washington20 Topic How do wireless nodes share a single link? (Yes, this is WiFi!) – Build on our simple, wired model Send?

CSE 461 University of Washington21 Wireless Complications Wireless is more complicated than the wired case (Surprise!) 1.Nodes may have different areas of coverage – doesn’t fit Carrier Sense » 2.Nodes can’t hear while sending – can’t Collision Detect » ≠ CSMA/CD

CSE 461 University of Washington22 Different Coverage Areas Wireless signal is broadcast and received nearby, where there is sufficient SNR

Hidden Terminals Nodes A and C are hidden terminals when sending to B – Can’t hear each other (to coordinate) yet collide at B – We want to avoid the inefficiency of collisions CSE 461 University of Washington23

Exposed Terminals B and C are exposed terminals when sending to A and D – Can hear each other yet don’t collide at receivers A and D – We want to send concurrently to increase performance CSE 461 University of Washington24

CSE 461 University of Washington25 Nodes Can’t Hear While Sending With wires, detecting collisions (and aborting) lowers their cost More wasted time with wireless Time XXXXXXXXX Wireless Collision Resend X X Wired Collision Resend

Possible Solution: MACA MACA uses a short handshake instead of CSMA (Karn, 1990) – uses a refinement of MACA (later) Protocol rules: 1.A sender node transmits a RTS (Request-To-Send, with frame length) 2.The receiver replies with a CTS (Clear-To-Send, with frame length) 3.Sender transmits the frame while nodes hearing the CTS stay silent – Collisions on the RTS/CTS are still possible, but less likely CSE 461 University of Washington26

CSE 461 University of Washington27 MACA – Hidden Terminals A  B with hidden terminal C 1.A sends RTS, to B DCB A

CSE 461 University of Washington28 MACA – Hidden Terminals (2) A  B with hidden terminal C 2.B sends CTS, to A, and C too DCB A RTS

CSE 461 University of Washington29 MACA – Hidden Terminals (3) A  B with hidden terminal C 2.B sends CTS, to A, and C too DCB A RTS CTS Alert!

CSE 461 University of Washington30 MACA – Hidden Terminals (4) A  B with hidden terminal C 3.A sends frame while C defers Frame Quiet...

CSE 461 University of Washington31 MACA – Exposed Terminals B  A, C  D as exposed terminals – B and C send RTS to A and D DCB A

CSE 461 University of Washington32 MACA – Exposed Terminals (2) B  A, C  D as exposed terminals – A and D send CTS to B and C DCB A RTS

CSE 461 University of Washington33 MACA – Exposed Terminals (3) B  A, C  D as exposed terminals – A and D send CTS to B and C DCB A RTS CTS All OK

CSE 461 University of Washington34 MACA – Exposed Terminals (4) B  A, C  D as exposed terminals – A and D send CTS to B and C DCB A Frame

CSE 461 University of Washington , or WiFi Very popular wireless LAN started in the 1990s Clients get connectivity from a (wired) AP (Access Point) It’s a multi-access problem Various flavors have been developed over time – Faster, more features Access Point Client To Network

CSE 461 University of Washington Physical Layer Uses 20/40 MHz channels on ISM bands – b/g/n on 2.4 GHz – a/n on 5 GHz OFDM modulation (except legacy b) – Different amplitudes/phases for varying SNRs – Rates from 6 to 54 Mbps plus error correction – n uses multiple antennas; see “ with Multiple Antennas for Dummies”

Link Layer Multiple access uses CSMA/CA (next); RTS/CTS optional Frames are ACKed and retransmitted with ARQ Funky addressing (three addresses!) due to AP Errors are detected with a 32-bit CRC Many, many features (e.g., encryption, power save) CSE 461 University of Washington37 Packet from Network layer (IP)

CSMA/CA for Multiple Access Sender avoids collisions by inserting small random gaps – E.g., when both B and C send, C picks a smaller gap, goes first CSE 461 University of Washington38 Time Send?

The Future of (Guess) Likely ubiquitous for Internet connectivity – Greater diversity, from low- to high-end devices Innovation in physical layer drives speed – And power-efficient operation too More seamless integration of connectivity – Too manual now, and limited (e.g., device-to-device) CSE 461 University of Washington39