Computer and Data Communications Semester 2 2011-2012 Mohd Nazri Mahmud Session 4a-12 March 2012.

Slides:



Advertisements
Similar presentations
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Contents IEEE MAC layer operation Basic CSMA/CA operation
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Multiple access What if multiple machines are sharing the same link?
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Module C- Part 1 WLAN Performance Aspects
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Technology CSE Network Technology CSE3020 Week 9.
Wireless Networking So we talked about wired networks. What about wireless?
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Introduction to Wireless Networks Michalis Faloutsos.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Medium Access Control Sublayer
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Wireless LAN Simulation - IEEE MAC Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Lecture 4 Wireless Medium Access Control
LOCAL AREA NETWORKS. CSMA Carrier Sense Multiple Access To minimize the chance of collision and, therefore, increase the performance, the CSMA method.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
WLAN.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
EA C451 (Internetworking Technologies)
Medium Access Control MAC protocols: design goals, challenges,
Computer Communication Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Data Communication Networks
Wireless LAN Simulation IEEE MAC Protocol
CSE 313 Data Communication
Chapter 6 Multiple Radio Access.
Presentation transcript:

Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012

 Reflection on Lab session 1: Local Area Networks  Discussion on CSMA/CA and Wireless LAN  Preparatory readings:  Chapter 12.1 CSMA/CA part and Chapter14 Wireless LAN (14.1 only). It is recommended for students to complement their study with other supplementary reading resources.  Preparatory questions for CSMA/CA and WLAN – from teaching webpage

ACB A’s Transmission range B’s Transmission range C’s Transmission range

 In a wireless network, much of the sent signal energy is lost in the transmission due to fading (multipath and shadowing). Additional energy that results from overlapping signals becomes very weak for an effective collision detection by the source stations.  Therefore, for the wireless network collision detection mechanism needs to be replaced with collision avoidance

 C senses the medium up to the required time but could not notice the transmission by A because C is out of A’s transmission range. C mistakenly thinks that the medium is free and start its transmission to B. Consequently, both A’s and C’s data collide at B and get corrupted.  The problem arises because both A and C are “hidden” from each other. This is called the HIDDEN NODE problem.

 Use handshaking mechanism  Following the detection of an idle channel, A sends Request-to- Send (RTS) signal to B. The RTS must specify the duration required for the data transfer (the Network Allocation Vector(NAV))  Upon receiving the RTS signal from A, B shall wait for a Short Inter-Frame Spacing (SIFS) period, this is to ensure that the channel is idle for B to send out a response.  If the channel is idle throughout the SIFS duration, B responds to A with a Clear-To-Send (CTS). The CTS must also contains the duration for the data transmission.  Meanwhile, C should increase its sensing duration by a DIFS (Distributed Inter-Frame Spacing) duration. The CTS send by B can reach C during the DIFS period because B use the shorter SIFS and also because C is within B’s range. C knows that B is ready to communicate with a hidden node A. Therefore, C starts to backoff. C starts its Network Allocation Vector (NAV) timer (NAV- CTS) for the duration specified by the CTS and refrains from accessing the link throughout the NAV-CTS duration.

ACB A’s Transmission range B’s Transmission range C’s Transmission range D D’s Transmission range

 B sends RTS to A.  Since C is within B’s transmission range, C knows that B will be busy communication with another station. Therefore C back-offs for the NAV-RTS duration specified in the RTS.  BUT….  Even if C sends RTS to D, the RTS will not interfere with the CTS sent by A to B because A and C are out of each other’s range. Their data will not collide at either A or D.  Thus, C has unnecessarily waited for the total duration of NAV-RTS.  C is said to be exposed to B.  This is called the EXPOSED NODE problem.

 After overhearing the RTS sent by B to A, C should wait for the CTS  If C can hear a CTS coming from B, then C knows that itself is within B’s transmission range.  But in this particular case, C is outside B’s range and the CTS from B will never reach C  Following the absence of the CTS that corresponds to the overheard RTS, C can safely assume that the transfer of data between C and D will not interfere with data transfer between A and B and proceed without waiting anymore  Nevertheless, C has to wait for an SIFS + CTS (plus some transmission and propagation delay) duration because a CTS from a station that is within C’s transmission range would have reached C by this time.

1. Interframe Space (IFS)  collisions are avoided by deferring transmission even if the channel is found idle.  Stations wait for a period of time called the interframe space or IFS.  Even though the channel may appear idle when it is sensed, a distant station may have already started transmitting.  The distant station's signal has not yet reached this station.  The IFS time allows the front of the transmitted signal by the distant station to reach this station.  If after the IFS time the channel is still idle, the station can send, but it still needs to wait a time equal to the contention time (described next).  The IFS variable can also be used to prioritize stations or frame types.  For example, a station that is assigned a shorter IFS(SIFS) has a higher priority than stations assigned with longer IFS (eg. DIFS)

 Short Interframe Space (SIFS), is the small time interval between the data frame and its acknowledgment.  used for the highest priority transmissions enabling stations with this type of information to access the radio link first.  This value is fixed per PHY and is calculated in such a way that transmitting station will be able to switch back to receive mode and be capable of decoding the incoming packets.  Examples of information which will be transmitted after the SIFS has expired include the acknowledgement(ACK) and the Clear To Send (CTS) messages.  The SIFS in IEEE are defined to be the smallest of all interframe spaces (IFS).  A SIFS duration is a constant value and it depends on the amendments.  Standard SIFS (μs) [1] [1]  IEEE b = 10  IEEE a = 16  IEEE g = 10

 DIFS  In the DCF protocol, a station has to sense the status of the wireless medium before transmitting.  If the medium is continuously idle for DCF Interframe Space (DIFS) duration, only then it is supposed to transmit a frame.  If the channel is found busy during the DIFS interval, the station should defer its transmission.  DIFS duration can be calculated by the following method.  DIFS = SIFS + (2 * Slot time)  Standard DIFS (µs)  IEEE b = 50  IEEE a = 34  IEEE g = 28 or 50

2. The contention window  an amount of time divided into slots.  Standard slot time (in microseconds) IEEE b = 20 IEEE a = 9 IEEE g = 9 or 20  A station that is ready to send chooses a random number of slots as its wait time.  The number of slots in the window changes according to the binary exponential back-off strategy.  This means that it is set to one slot the first time and then doubles each time the station cannot detect an idle channel after the IFS time.  This is very similar to the p-persistent method except that a random outcome defines the number of slots taken by the waiting station.  One interesting point about the contention window is that the station needs to sense the channel after each time slot.  However, if the station finds the channel busy, it does not restart the process; it just stops the timer and restarts it when the channel is sensed as idle.  This gives priority to the station with the longest waiting time.

3. Acknowledgment  With all these precautions, there still may be a collision resulting in destroyed data.  In addition, the data may be corrupted during the transmission.  The positive acknowledgment and the time-out timer can help guarantee that the receiver has received the frame.